section
stringclasses 4
values | filename
stringlengths 6
32
| text
stringlengths 104
10.3M
| lang
stringclasses 44
values |
|---|---|---|---|
markdown
|
725687
|
# Presentation: 725687
## Workforce Development Information Systems in Florida
**The Florida Education and Training Placement Information Program (FETPIP)...**
**The Workforce Development Information System (WDIS)...**
**The Workforce Development Education Funding process (WDEF)...**
## Slide 2
## Automated Follow-up - FETPIP
**S. 229.8075, Florida Statutes...**
**Designates FETPIP as the state’s primary follow-up resource for all workforce development and related education programs...**
**References S.443, FS regarding Unemployment Compensation**
## Follow-up data collection
- _Purpose:_ To find out what happens to students or program participants after they leave a particular activity...
- _Findings:_ Usually focus on employment- related events after an exit...
- _Method:_ Exit Interviews, Survey-based “tracer study”... electronic data sharing.
## FETPIP-Primary Participants
***FETPIP-******Primary****** Participants***
**68 School Districts**
**Secondary and Postsecondary**
**28 Community Colleges**
**Associate degrees and certificates**
**10 State Public Universities**
**Bachelors, Masters, PHDs**
**Department of Education**
**Vocational Rehabilitation, Blind Services, Dropout Prevention, Apprenticeships**
**24 Regional Workforce Boards**
**150 Private Vocational & Technical Schools**
**Department of Labor and Employment Security**
**WIA, veterans, older workers, workers comp.**
**Department of Corrections**
**All state system releases**
**Department of Children & Families**
**TANF. Food Stamps, Food Stamps Employment, WAGES**
- 360 “Applications”, 3.5 million former students/participants
## FETPIP RECORD LINKAGES
**Quarterly**** **linkages between various participant records, wage records, & welfare records - primarily for WIA, welfare-to-work, ad hocs...
**Annual** linkages between 360 applications, each w/former students/participants and 11 state & federal administrative databases...
## Cooperating Agencies: Follow-up Resources
**Cooperating Agencies: Follow-up Resources**
**National Resources:**
- U.S. Postal Service
- U.S. Dept. of Defense
- U.S. Office of Personnel Mgt.
- WRIS...
- NSLC
**Florida Departments: **
- Education
- Agency for Workforce Innovation
- Workforce Florida, Inc.
- Revenue
- Corrections
- Children & Families
- Management Services
## Data Items Collected
** ****Employment**
- **Florida employment via state UC wage records**
** ****Industry, size-of-firm, occupation, location, earnings**
** ****Federal employment, postal employment, military service**
** ****WRIS for out-of-state employment**
** ****Postsecondary Education**
**Florida public via enrollment record systems, private via tuition vouchers**
** ****Educational level, institution, major or fields of study**
**NSC for out-of-state private and public, possibly in-state private**
** ****Florida Public Assistance**** **
**TANF, Foodstamps**** **
** ****Corrections**
**Incarcerations, Releasees**
## MAJOR USES OF FETPIP DATA
- Workforce Education Performance Funding
- Performance-Based Program Budgeting
- WIA Performance Measurement
- ITA Provider Lists
- Perkins Performance Goal Measurement
- School District Accountability
- University System Program Reviews
- Legislative Performance Reviews
- Workforce Estimating Conference
- Occupational Supply and Demand
- Career Counseling, consumer and Guidance Information
## Benefits: FETPIP
**Common core set of outcome measures across many programs, operations...**
**An accurate count of labor market supply by occupation from vocational programs...**
## Benefits: FETPIP
**Relatively inexpensive while providing more detailed, thorough information with high response levels...**
**Uses existing data..**
**Objective - non judgmental resource**
## Criticisms of the FETPIP approach...
- It’s too slow...
- Quarterly (or annual) is not frequent enough...
- It misses some types of employment...
- It misses some types of postsecondary education...
## Important start-up features: FETPIP
**Legislative Requirement - a guarantee of cooperation ...**
**Understand what the data resources are designed to do, what they are for, owner-concerns...**
**Work with owners to design an approach - if possible, reduce burdens associated with their participation...**
***more...***
## Important start-up features: FETPIP
**Start with a limited scope, create ‘fans’...**
**As you expand, listen to participants, try to accommodate their concerns...**
**Initially, try to avoid high stakes - or provide program folks with an ‘out’...**
**Have short term and long term visions for the effort...**
## Lessons Learned: FETPIP
**Recognize purposes and ownership of data resources...**
**Identify the strengths and weaknesses of data resources...**
**Surpass all requirements, expectations regarding data security...**
**Deliver on-time and honestly...**
**Get empowerment - Statutory authority and $$$ helps...**
***more...***
## Lessons Learned: FETPIP
**When people need stuff, be there...**
**Anticipate roles that the system can play in accountability, performance measurement, cost return analysis, assisting new activities in meeting evaluation needs...**
**Initially, do not try to force common data elements, definitions...**
***more...***
## Lessons Learned: FETPIP
**Work with participating agencies to detect and correct data element anomalies...**
**Correct or eliminate suspect data, including ‘bad’ SSNs...**
## Costs of Operation: FETPIP
**Year 1: ~$60,000; Year 2,3: ~$186,000; Year 4 - 8 ~$350,000; Current ~$600,000...**
**State ~$400,000, Perkins ~$60,000, WIA ~$140,000.**
**Staffing: Director, 3 Senior DBAs, 4 analyst/programmers, research assistant, clerical... **
**Mainframe costs ~$25,000 /year; postage ~$18,000;**
## Workforce Development Information System (WDIS)
**School district reporting for secondary vocational...**
**School district for reporting postsecondary vocational...**
**School district reporting for adult general education including ABE, Co-enrolled, GED, prep programs, ESOL...**
**Rx with community colleges...**
## Automated Student Data Bases
**Individually identifiable student data with SSNs or optional ID ...**
**Demographic, course, and teacher formats...**
**Approximately 75 Data Elements including derived elements...**
**Postsecondary - primarily end-of term reporting (3 Xs year)**
**Secondary - part of the overall k-12 reporting schema - enrollment surveys and an annual wrap-up survey**
**Tables for course information, standards...**
## Automated Student Data Bases
**Reporting via statewide computer network - FIRN...**
**214 edits, including 70 fatal edits...**
**referential integrity...**
**Reporting and technical assistance services...**
**Data review processes for changes...**
## Overview of the Workforce Development Education Reporting Systems
***Overview of the Workforce Development Education Reporting Systems***
## Performance Funding: WDEFF
**Combines adult general education and adult vocational education in school districts and community colleges into workforce development education...**
**Allocates $720 million in state $$$ based on a base amount, performance completions, performance placements, several targeted services, and several ‘adjustments’ for local conditions...**
**Operates performance $$$ on a competitive - ‘at risk’ basis- local entities can gain or loose money based on performance...**** **
**Eliminates categorical funding****...**
## Data That Drives the formula
- 2000-2001 Appropriation
- 1998-99 Completions
- 1997-98 Completions placed in 98-99
**2001-2002 Appropriation**
**1999-2000 Completions**
**1998-1999 Completions placed in 99-00**
- 2002-2003 Appropriation
- 2000-2001 Completions
- 1999-2000 Completions placed in 00-01
## Formula Weights...
- Vocational, Standard Length, OCP to OCP...
- AGE, Educational Difficulty, LCP to LCP...
- AS Degrees, Degrees and College Credit Certificates...
- Targeted Populations, educational Difficulty plus Combinations...
- Targeted Occupations & Placement Levels...
## Why Some LEAs Gain Money...
**Sustain or exceed performance share by-**
**Recruiting and counseling targeted students...**
**Retaining students through completion...**
**Assuring high level placements...**
**Manage data...**
**Emphasize programs that perform, fix or eliminate programs that don’t...**
## Why some LEAS lose...
**Not sustaining or reaching their share of performance...**
**Not reporting thoroughly or accurately...**
**Funding emphasis differences between the original funding methods and the new workforce development education performance method...**
## Example: Computer Systems Analyst
**70% annual growth**
**~2000 permanent annual openings**
**$15.42 Entry Wage**
**$24.25 Average Wage**
**Approximately 30,000 employed statewide**
**354 Completions (98-99 WDIS)**
**156 targeted**
**3,333 Cmpltn Points**
**212 Placements (FETPIP)**
**145 Level III Placements**
**1678 Placement Points**
**5011 Total Performance Pts @ $171.44 per point, generated ****$859,085**** in performance dollars**
**2.91% of the AS performance dollars**
**WEC 2001 - The Number 1 Florida Job**
**Completions - WDIS**
**Placements - FETPIP**
**Funding - WDEFF**
## Additional Information
- For more information please contact
- Jay Pfeiffer, Brian Savon, or Duane Whitfield
- (850) 487-0900
- Fax (850) 488-2405
- [email protected]
- [email protected]
- [email protected]
- Web: www.firn.edu/doe search on FETPIP or WDEFF
|
en
|
all-txt-docs
|
040280
|
___________________________________________________________
DISMISSED FOR LACK OF AN INTERESTED PARTY: June 30, 1993
___________________________________________________________
GSBCA 12411-P
COMTEL INDUSTRIES, INC.,
Protester,
v.
DEPARTMENT OF JUSTICE,
Respondent,
and
EXECUTONE INFORMATION SYSTEMS, INC.,
Intervenor.
Larry G. McCarty, Vice President and General Manager of
ComTel Industries, Inc., Homewood, AL, appearing for Protester.
James Roby and Harry Gastley, Office of General Counsel,
Justice Management Division, Department of Justice, Washington,
DC, counsel for Respondent.
Richard A. Alderson, Director of Federal Marketing of
EXECUTONE Information Systems, Inc., Fairfax, VA, appearing for
Intervenor.
Before Board Judges BORWICK, NEILL, and VERGILIO.
BORWICK, Board Judge.
On May 3, 1993, protester, ComTel Industries, Inc. (ComTel),
protested the placing of two purchase orders with EXECUTONE
Information Systems, Inc. (EXECUTONE), for a telephone system by
respondent, Department of Justice (DOJ), to satisfy the
requirements of the United States Attorney's Office, Miami,
Florida. The first purchase order of $291,963.42 was for a
supply of 584 telephone sets and installation of 344 of those
sets with riser cable. DOJ issued the purchase order through
EXECUTONE's GSA nonmandatory ADP schedule contract. At the same
time, DOJ issued a second purchase order on an "open market"
basis for installation of the remaining 240 phones to be
connected to existing riser cable. That purchase order was
issued for $24,754.60. The maximum order limitation (MOL) for
EXECUTONE's GSA nonmandatory ADP schedule contract was $300,000.
ComTel responded to a synopsis that DOJ had placed in the
Commerce Business Daily (CBD) announcing DOJ's intent to place an
order with EXECUTONE under the schedule contract unless a more
advantageous comparable source responded. In its response,
ComTel offered supplies and services under its own GSA Purchase
of Telephone and Services (POTS) contract.
Upon learning that DOJ had issued two purchase orders to
EXECUTONE--the larger just below the maximum order limitation of
EXECUTONE's GSA nonmandatory ADP schedule contract and the
smaller as an "open market" order--ComTel filed an agency protest
accusing DOJ of illegally splitting requirements to avoid the
maximum order limitation of the schedule contract. ComTel sought
cancellation of the purchase orders and requested that DOJ place
an order for the system under ComTel's POTS contract. After the
denial of the agency protest, ComTel filed a protest at this
Board restating its allegations.
DOJ has filed a motion to dismiss, arguing that ComTel lacks
a direct economic interest in the procurement because its
offering under the POTS contract did not meet all the
requirements for DOJ's telephone system as stated in the CBD
synopsis. As the parties agreed to submit the case on the record
pursuant to Rule 11, we allowed ComTel to reply to DOJ's motion
as part of its record submission. We conclude that ComTel lacks
a direct economic interest in this procurement as its POTS
offering did not meet DOJ's stated requirements. Therefore, we
dismiss the protest.
Findings of Fact
On March 3, 1993, DOJ issued a synopsis in the CBD
announcing its intended purchase of a telephone system from
EXECUTONE's telecommunications schedule contract, to service the
requirements of the United States Attorney's Office in Miami,
Florida. Protest File, Exhibit 3. The synopsis provided in
pertinent part:
The Miami [Florida] U.S. Attorney's Office intends to
purchase a fully digital integrated voice/data hybrid
key telephone system to include all on-premises
equipment . . . from EXECUTONE Information Systems Inc.
under GSA Contract GS00K91AGS0566-PS02. The system
must be equipped with 8 integrated CRT based operator
consoles. The operator consoles must provide a
directory by name and extension along with automatic
transfer capability. The console must also indicate
extension status between available OUT, BUSY, DND, or
FWD to voice mail. . . . The vendor will be
responsible for riser cable between the 7 floors
occupied. The vendor will be responsible for tone,
test and installing station cabling from the station
termination appearances for each station location
through customer provided modular furniture. No other
premises cabling is required. No contract award will
be made on the basis of any response to the notice
since the synopsis of intent to place an order against
a GSA schedule is not considered a request for
offers/proposal. All responsible sources may submit
written responses which identify their interest and
technical capability to respond to the requirements.
Written responses should include . . . [a] full
technical proposal showing ability to meet all
requirements. . . . If there is no affirmative
response to the effect that a comparable source is
available and that it is more advantageous to the
Government than acquiring from GSA schedule 58, an
order will be paced with EXECUTONE Information Systems
Inc. under the terms and conditions of their GSA
contract.
The synopsis described a system initially wired for 218 twenty-
nine key digital display telephones, with wiring accommodating
253 twenty-eight key digital speaker phones, 84 seventeen key
digital telephones, and 21 six key digital wall mounted
telephones. Protest File, Exhibit 3.
EXECUTONE's schedule contract provides for delivery and
installation of telecommunications equipment. The contract
defines installation as including one hundred fifty feet of
standard four pair station cable for each installed station and
station termination for each installed station. Protest File,
Exhibit 17, at C-9. The maximum order limitation is $300,000.
Id. at A-2, at 12.a.
On March 17, 1993, ComTel responded to the CBD synopsis
stating that "ComTel is the GSA POTS contractor for Florida and
all equipment and labor costs will be in accordance with
negotiated GSA POTS Contract . . . ." Protest File, Exhibit 4.
Attached to the letter was a "site/survey quote" for supply and
installation of 255 speaker phones and 255 six button sets for
$291,963.42. Protest File, Exhibit 4. ComTel also complained
that "[w]ith respect to the U.S. Department of Justice's desire
to sole source this equipment with EXECUTONE Information Systems
Inc., it should be noted that the equipment and labor
requirements, as outlined in the [synopsis], would exceed the
$300,000 sole source limit specified in the GSA Schedule 58
guidelines." Id. ComTel's submission did not offer the CRT
consoles on the eight attendant stations specified in the
synopsis; rather, ComTel offered conventional attendant consoles.
Protest File, Exhibit 4.
By telephone call of March 22, 1993, protester's Vice
President informed the COTR that protester could install the
standard attendant console and upgrade to directory based console
at a later date. The COTR never agreed to such a solution.
Affidavit of the Contracting Officer's Technical Representative
dated June 11, 1993 (Press Affidavit), 7. Later that day,
protester's representative informed the COTR that a directory-
based console would be available in April of 1993. ComTel never
submitted pricing for the directory-based console before or after
March 24, the date for responding to the synopsis. Press
Affidavit, 8. In fact, the COTR later learned from the
manufacturer that the directory-based console referenced by
ComTel is in beta test and would only be commercially available
in September of 1993, at the earliest. Press Affidavit, 9.
On March 17, EXECUTONE offered telephone sets in the
quantities specified in the synopsis. The offer included
installation of 344 phones including riser cable to the D-Mark.
The unit price (per phone) for the installation was $172.50.
EXECUTONE included a second "open market" order for installation
of 240 phones for locations "not requiring riser cable." The
unit price for installation without riser cable was $82.00 The
open market order was for $24,754.60. Protest File, Exhibit 4.
The Contracting Officer's Technical Representative (COTR)
determined that ComTel's POTS offering did not meet the synopsis
requirements for the CRT console. The COTR determined that "the
EXECUTONE System should be immediately purchased to insure that
installation of the telephone system does not delay the scheduled
move." Protest File, Exhibit 5. As part of DOJ's record
submission the COTR states in an affidavit that the move was
scheduled for late April of 1993. Press Affidavit, 2. The
COTR notes, as part of the record submission, that ComTel did not
offer the specified number of phone sets. Press Affidavit, 2.
ComTel maintains that the requirement for the CRT console was
waived in a telephone conversation but the COTR denies the
waiver. Press Affidavit, 6. We find as fact that the
requirement was not waived.
On April 5, 1993, ComTel filed an agency protest, stating
its understanding that DOJ intended to place two orders, one for
less than $300,000 against EXECUTONE's schedule contract and an
open market order for less than $25,000. ComTel maintained that
since the total of the two orders was more than $300,000, DOJ had
violated the maximum order limitation of ComTel's schedule
contract. ComTel sought DOJ's cancellation of any purchase
order to EXECUTONE and an order from ComTel's POTS contract.
Protest File, Exhibit 7.
On April 19, DOJ denied the agency protest, stating, with
respect to the open market purchase, that, "Because all necessary
cabling was supplied through the GSA schedule, the remaining 240
installations could be accomplished without charging for cabling
and accordingly was proposed as an open market purchase for under
$25,00." Protest File, Exhibit 12.
On May 3, ComTel filed a protest at this Board, referenced
its agency protest and DOJ's denial, and alleged that DOJ
violated the $300,000 purchase order limit of EXECUTONE's
schedule contract. ComTel maintained that "allowing agencies to
manipulate the guidelines . . . would be very harmful to the
viability of the [POTS] contract program." Protest Letter. On
May 14, ComTel amended its protest to seek recovery of
$249,501.12 for "lost profits," presumably the profits it would
have recovered under its POTS contract. Protest Amendment.
Discussion
Respondent filed a motion to dismiss, arguing that ComTel is
not an interested party because it failed to meet the
requirements of the CBD synopsis, and thus lacks the requisite
"direct economic interest" in the procurement. 40 U.S.C.
759(f)(9)(B) (1988).[foot #] 1 We agree. In its
agency protest and before this Board, ComTel sought cancellation
of the purchase orders to EXECUTONE and subsequent award by DOJ
under the POTS contract. However, the equipment ComTel was
prepared to offer under the POTS contract did not meet DOJ's
requirements as stated in the synopsis. In late March, the
ComTel Vice President did discuss with the COTR the possibility
of offering directory based consoles under its POTS submission,
but never submitted pricing for those consoles. Furthermore, the
availability of the consoles was unclear. ComTel has not
demonstrated it was in a position to satisfy the stated
requirements and thus lacked the requisite direct economic
interest. As ComTel has not demonstrated that it could satisfy
the requirement for the equipment needed by the Government, it is
not prejudiced by alleged splitting of part of the installation
services necessary to install that equipment.
----------- FOOTNOTE BEGINS ---------
[foot #] 1 DOJ also argues that the protest is untimely.
During a prehearing conference on this protest, a ComTel official
stated that upon reviewing the CBD synopsis, using EXECUTONE's
price list, he determined the requirement could not be performed
for $300,000 or less. DOJ argues that the protest should have
been filed no later than ten calendar days after that
determination. DOJ misfocuses the protest, which concerns an
alleged splitting of requirements by DOJ, not the propriety of
the CBD synopsis. DOJ issued the purchase orders to EXECUTONE on
March 30. ComTel filed a timely agency protest on April 9, and
timely filed here on May 3 after DOJ's denial of that protest on
April 19. Rule 5(b)(3)(iii). ComTel did add another ground of
protest in its record submission of June 10--the specification of
riser cable in the CBD synopsis. Protester maintains that
installation of riser cable in not within the scope of
EXECUTONE's schedule contract. This issue is untimely, as it
would have had to have been raised on or about March 23, some ten
calendar days after the publication of the CBD synopsis. Rule
5(b)(ii). This allegation is dismissed.
----------- FOOTNOTE ENDS -----------
The FIRMR prohibits splitting of requirements to avoid a
maximum order limitation of a schedule contract. 41 CFR 201-
39.803-3(d) (1992). When there is no appropriate schedule
contract meeting Government requirements at the lowest overall
cost, the contracting officer may elect to issue a solicitation.
41 CFR 201-39.803-3(b). ComTel might have been an interested
party had it sought a competitive solicitation for the
requirements stated in the CBD synopsis and demonstrated its
willingness to submit a bid or proposal on those requirements.
ComTel did not show that it was willing to provide what the
Government needed.
Decision
This protest is DISMISSED FOR LACK OF AN INTERESTED PARTY.
________________________________
ANTHONY S. BORWICK
Board Judge
We concur:
_________________________
EDWIN B. NEILL
Board Judge
_____________________________
JOSEPH A. VERGILIO
Board Judge
|
en
|
converted_docs
|
137387
|
PUBLIC COMMENT TO NATIONAL MATH PANEL
Sept 6-7, 2007, St. Louis
By
J. Martin Rochester
University of Missouri-St. Louis
Thank you for the opportunity to comment on the work of the National
Math Panel and the issues at stake in this project. I am a professor at
the University of Missouri-St. Louis. I should note that I am a
political scientist, not a mathematician, but nonetheless I am someone
who has spent over 30 years as a professional educator, and also as a
parent, observing one failure after another in K-12 education, as every
so-called "progressive" fad presented as a magic bullet has only added
to our shooting ourselves in the feet. I have written about this in my
book *Class Warfare* as well as in *Education Week*, *Phi Delta Kappan*,
and other publications.
Fuzzy math (or integrated math, or whatever you want to call Everyday
Math, Core-Plus and the other reform math curricula now dominant in
K-12) has been driven by the same constructivist paradigm and same
dumbing-down, populist impulses that gave us the now discredited
"whole-language" pedagogy in English. That is, in place of the old maxim
"no pain, no gain," we now have the new maxim in K-12, "if it ain't fun,
it can't be done." Under the guise of "critical thinking" and
"problem-solving," which are ubiquitous buzzwords in every discipline in
today's schools, fuzzy math is trying to make math more "interesting,"
i.e., enjoyable and entertaining and accessible to the masses, to the
bottom, to the lowest common denominator. The new math deemphasizes and
devalues direct instruction, drill and practice, basic computation
skills, and getting it right -- getting precise, correct answers. Forget
rigor -- the key concern here is to alleviate boredom and drudgery for
mathphobes and those who suffer from math anxiety. Never mind we are
inflicting this stuff on mathphobes and mathphiles alike, doing a
disservice to both. And never mind Isaac Newton's admonition that "there
is no royal road to geometry," meaning no easy path, although some
reformers seem to have found it.
Most of the math professors I have spoken to at my university are
appalled at the lack of basic computation skills students now bring to
campus from K-12. Not surprisingly, parents are having to enroll their
kids increasingly in Kumon math tutoring courses to compensate for the
failure of our schools to provide a solid foundation. In my own school
district of Clayton, one of the richest and best in the state of
Missouri, dozens of parents, including the president of the school board
(a Harvard MBA), have resorted to Kumon math for their kids ever since
fuzzy math was introduced into the district.
As a college professor, I can tell you that our K-16 education system in
America is becoming dysfunctional as we are turning the precollegiate
and collegiate levels upside down. K-12 teachers pretentiously aspire to
teach "critical thinking" in kindergarten, even though little Johnny
cannot even find the potty by himself, while we in higher ed are left to
clean up the mess, having to do more and more remediation -- in English
having to teach grammar and where to put the comma, in history having to
teach basic historical facts such as who Lenin was (that's Vladimir, not
John), and \-- yes -- in math having to teach what 2 plus 2 is.
There is an Emperors Clothes quality to the claims made by the math
reformers. I respectfully urge you to examine these claims more
carefully, since they are cut out of the same cloth as all the other
failed K-12 reforms of the recent past. Thank you.
J. Martin Rochester, Ph.D.
Curators' Distinguished Teaching Professor of Political Science
University of Missouri- St. Louis
|
en
|
converted_docs
|
477122
|
##### U.S. Department of Education September 2003
**2003-2004 *No Child Left Behind---Blue Ribbon Schools Program***
**Cover Sheet**
Name of Principal [Mr. Gregory N. Woodcock]{.underline}
(Specify: Ms., Miss, Mrs., Dr., Mr., Other) (As it should appear in the
official records)
Official School Name [Morgantown Elementary School]{.underline}
(As it should appear in the official records)
School Mailing Address [210 West Cemetery Street PO Box 337]{.underline}
(If address is P.O. Box, also include street address)
[Morgantown KY 42261-0337]{.underline}
City State Zip Code+4 (9 digits total)
Tel. [(270 ) 526-3361]{.underline} Fax [( 270 ) 526-2868]{.underline}
Website/URL [(District)]{.underline}
[www.butler.k12.ky.us](http://www.butler.k12.ky.us/) E-mail
[[email protected]]{.underline}
I have reviewed the information in this application, including the
eligibility requirements on page 2, and certify that to the best of my
knowledge all information is accurate.
Date\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_
(Principal's Signature)
Name of Superintendent [Mr. Larry K. Woods]{.underline}
(Specify: Ms., Miss, Mrs., Dr., Mr., Other)
District Name [Butler County School District]{.underline} Tel. [( 270 )
526-5624]{.underline}
I have reviewed the information in this application, including the
eligibility requirements on page 2, and certify that to the best of my
knowledge it is accurate.
Date\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_ (Superintendent's
Signature
Name of School Board
President/Chairperson \_\_\_\_[Mr. Gary
Southerland]{.underline}\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_
(Specify: Ms., Miss, Mrs., Dr., Mr., Other)
I have reviewed the information in this package, including the
eligibility requirements on page 2, and certify that to the best of my
knowledge it is accurate.
Date\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_
(School Board President's/Chairperson's Signature)
*\*Private Schools: If the information requested is not applicable,
write N/A in the space.*
**[PART I ‑ ELIGIBILITY CERTIFICATION]{.underline}**
**\[Include this page in the school's application as page 2.\]**
The signatures on the first page of this application certify that each
of the statements below concerning the school\'s eligibility and
compliance with U.S. Department of Education, Office of Civil Rights
(OCR) requirements is true and correct.
1. The school has some configuration that includes grades K-12.
(Schools with one principal, even K-12 schools, must apply as an
entire school.)
2. The school has not been in school improvement status or been
identified by the state as \"persistently dangerous\" within the
last two years. To meet final eligibility, the school must meet the
state's adequate yearly progress requirement in the 2003-2004 school
year.
3. If the school includes grades 7 or higher, it has foreign language
as a part of its core curriculum.
4. The school has been in existence for five full years, that is, from
at least September 1998.
5. The nominated school or district is not refusing the OCR access to
information necessary to investigate a civil rights complaint or to
conduct a district‑wide compliance review.
6. The OCR has not issued a violation letter of findings to the school
district concluding that the nominated school or the district as a
whole has violated one or more of the civil rights statutes. A
violation letter of findings will not be considered outstanding if
the OCR has accepted a corrective action plan from the district to
remedy the violation.
7. The U.S. Department of Justice does not have a pending suit alleging
that the nominated school, or the school district as a whole, has
violated one or more of the civil rights statutes or the
Constitution\'s equal protection clause.
8. There are no findings of violations of the Individuals with
Disabilities Education Act in a U.S. Department of Education
monitoring report that apply to the school or school district in
question; or if there are such findings, the state or district has
corrected, or agreed to correct, the findings.
**[PART II ‑ DEMOGRAPHIC DATA]{.underline}**
**All data are the most recent year available.**
**DISTRICT** (Questions 1‑2 not applicable to private schools)
1\. Number of schools in the district: [4]{.underline} Elementary
schools
[1]{.underline} Middle schools
[0]{.underline} Junior high schools
[1]{.underline} High schools
> [1]{.underline} Other (Briefly explain)
>
> Green River Youth Development Center
[7]{.underline} TOTAL
2\. District Per Pupil Expenditure: [\$ 6769]{.underline}
Average State Per Pupil Expenditure: [\$ 7033]{.underline}
**SCHOOL** (To be completed by all schools)
3\. Category that best describes the area where the school is located:
> \[ \] Urban or large central city
>
> \[ \] Suburban school with characteristics typical of an urban area
>
> \[ \] Suburban
>
> \[ X \] Small city or town in a rural area
>
> \[ \] Rural
4\. [4]{.underline} Number of years the principal has been in her/his
position at this school.
If fewer than three years, how long was the previous principal at this
school?
5\. Number of students enrolled at each grade level or its equivalent in
applying school:
----------- --------- ----------- ---------- --------- -- ----------- --------- ----------- ---------
**Grade** **\# of **\# of **Grade **Grade** **\# of **\# of **Grade
Males** Females** Total** Males** Females** Total**
**K** 45 47 **92** **7**
**1** 46 54 **100** **8**
**2** 38 44 **82** **9**
**3** 50 56 **106** **10**
**4** 42 37 **79** **11**
**5** 37 39 **76** **12**
**6** Other 4 0 4
**TOTAL 539
STUDENTS
IN THE
APPLYING
SCHOOL →**
----------- --------- ----------- ---------- --------- -- ----------- --------- ----------- ---------
6\. Racial/ethnic composition of [99 %]{.underline} White
the students in the school: [.2 %]{.underline} Black or African American
[.3 %]{.underline} Hispanic or Latino
[.3 %]{.underline} Asian/Pacific Islander
[.2 %]{.underline} American Indian/Alaskan Native
**100% Total**
7\. Student turnover, or mobility rate, during the past year:
[\_\_\_16\_\_\_]{.underline}%
> (This rate includes the total number of students who transferred to or
> from different schools between October 1 and the end of the school
> year, divided by the total number of students in the school as of
> October 1, multiplied by 100.)
----------- ---------------------------------- ------------------------
**(1)** Number of students who transferred 46
***to*** the school after October
1 until the end of the year.
**(2)** Number of students who transferred 38
***from*** the school after
October 1 until the end of the
year.
**(3)** Subtotal of all transferred 84
students \[sum of rows (1) and
(2)\]
**(4)** Total number of students in the 536
school as of October 1
**(5)** Subtotal in row (3) divided by .1600
total in row (4)
**(6)** Amount in row (5) multiplied by 16
100
----------- ---------------------------------- ------------------------
8\. Limited English Proficient students in the school:
[\_\_\_\_0]{.underline}\_\_\_%
\_\_\_\_[1\_\_\_]{.underline}Total Number Limited English Proficient
Number of languages represented: \_\_\_[1\_\_\_\_\_]{.underline}
Specify languages: [Spanish]{.underline}
9\. Students eligible for free/reduced-priced meals:
\_\_\_[57\_\_\_]{.underline}%
[\_\_\_308\_\_]{.underline}Total Number Students Who Qualify
> If this method does not produce a reasonably accurate estimate of the
> percentage of students from low‑income families or the school does not
> participate in the federally‑supported lunch program, specify a more
> accurate estimate, tell why the school chose it, and explain how it
> arrived at this estimate.
10\. Students receiving special education services:
\_\_\_[15.8]{.underline}\_%
\_\_\_\_[85\_]{.underline} Total Number of Students Served
> Indicate below the number of students with disabilities according to
> conditions designated in the Individuals with Disabilities Education
> Act.
[\_\_4\_]{.underline} Autism [\_\_1\_\_]{.underline} Orthopedic
Impairment
[\_\_0\_]{.underline} Deafness [\_\_2\_\_]{.underline} Other Health
Impaired
[\_\_0\_]{.underline} Deaf-Blindness [\_\_13\_]{.underline} Specific
Learning Disability
[\_\_1\_]{.underline} Hearing Impairment [\_\_22\_]{.underline} Speech
or Language Impairment
[\_\_10]{.underline} Mental Retardation [\_\_\_0\_]{.underline}
Traumatic Brain Injury
[\_\_3\_]{.underline} Multiple Disabilities [\_\_\_0\_]{.underline}
Visual Impairment Including Blindness
[29]{.underline} Developmentally Delayed
11. Indicate number of full‑time and part‑time staff members in each of
the categories below:
**Number of Staff**
**[Full-time]{.underline}** **[Part-Time]{.underline}**
Administrator(s) [\_\_\_\_3\_\_\_]{.underline}
[\_\_\_\_1\_\_\_\_]{.underline}
Classroom teachers [\_\_\_\_27\_\_]{.underline}
[\_\_\_\_0\_\_\_\_]{.underline}
Special resource teachers/specialists [\_\_\_\_8\_\_\_]{.underline}
[\_\_\_\_5\_\_\_\_]{.underline}
Paraprofessionals [\_\_\_ 13\_\_]{.underline} \_\_\_\_\_\_\_\_
> Support staff [\_\_\_ 11\_\_]{.underline} \_\_\_\_\_\_\_\_
>
> Total number [\_\_\_62\_\_]{.underline}\_
> [\_\_\_\_6\_\_\_]{.underline}
12\. Average school student-"classroom teacher" ratio:
[\_\_\_14:1\_\_\_]{.underline}
13\. Show the attendance patterns of teachers and students as a
percentage. The student dropout rate is defined by the state. The
student drop-off rate is the difference between the number of entering
students and the number of exiting students from the same cohort. (From
the same cohort, subtract the number of exiting students from the number
of entering students; divide that number by the number of entering
students; multiply by 100 to get the percentage drop-off rate.) Briefly
explain in 100 words or fewer any major discrepancy between the dropout
rate and the drop-off rate. (Only middle and high schools need to supply
dropout rates and only high schools need to supply drop-off rates.)
------------------------ ----------- ----------- ----------- ----------- -----------
2002-2003 2001-2002 2000-2001 1999-2000 1998-1999
Daily student attendance 95.41 95.43 95.10 94.54 93.9
Daily teacher attendance 95.50% 94.23% 92.66% 94.97% 95.66%
Teacher turnover rate 0% .09% .06% 4.6% 28%
Student dropout rate N/A N/A N/A N/A N/A
Student drop-off rate N/A N/A N/A N/A N/A
------------------------ ----------- ----------- ----------- ----------- -----------
**[PART III -- SUMMARY]{.underline}**
Morgantown Elementary School in Morgantown, Kentucky is situated in a
small town, rural setting nestled on the banks of the Green River. When
you step into the front doors of our school, you face the school's
vision statement emblazoned for all to see: "All who enter these
hallways make a commitment to [C]{.underline}ooperate with those they
encounter, exhibit a positive [A]{.underline}ttitude, act
[R]{.underline}esponsibly by putting forth a maximum
[E]{.underline}ffort towards success and achievement." That
mission/vision statement encompasses Morgantown Elementary's belief that
everyone is a stakeholder and that everyone is held accountable for the
success of our students. Establishing pride daily through our motto
"Patriots C.A.R.E." is a motivational point for our students in carrying
out the decrees set by the mission statement. The motto is posted in
every room and used as a daily means of communicating high academic and
behavioral expectations.
The geographic boundaries include both rural and city areas. The
population that the school serves has a range of socioeconomic family
units. Morgantown Elementary serves all of the city population with a
vast amount of the student population coming from a concentrated area
within the city consisting of 180 subsidized housing units. It also
serves another fourth of the county population. 57% of our students
participate in the federally funded free/reduced lunch program. From the
late 1990's to present the area has suffered a major economic blow
caused by the relocating of three major industrial plants. The
unemployment rate skyrocketed to 16.2% in January 2003 (highest in the
state of Kentucky). Educational standards were not allowed to suffer as
the economy of the area plummeted. This can be evidenced by the
continued climb of state and national test scores, (top 10% in the
state), and the absence of statistical gaps within **any** subgroups in
the No Child Left Behind analysis done by the federal government. This
can only indicate a tenacious determination on the part of our parents,
community and educators to not allow adversity to be a controlling
factor in their children's future. We have worked diligently and will
continue to work in order to sustain positive attitudes, responsible
behavior and lifelong learning for our students so that they can be
successful not only in the classroom but throughout their lives.
How has Morgantown Elementary been successful in meeting the needs of
our 500+ students? Continued growth has been accomplished through
community vision and teamwork on the part of all stakeholders. Our
Parent -Teacher Organization (PTO) plays an important role in
decision-making and developing partnerships with community agencies. Our
staff qualifications and professionalism are unsurpassed. Rigorous
curriculum planning, instructional and behavioral goal setting, and
on-going assessment of programs are integral components of our success.
Focused professional development and teacher training in the areas of
curriculum-mapping, research-based instructional strategies, and meeting
the needs of children in poverty are a crucial attribute of our success.
######
######
######
######
###### PART IV -- INDICATORS OF ACADEMIC SUCCESS
1\. In Kentucky, we believe all children can learn at high levels, given
time, effort and opportunity. We are not willing to leave any student
behind regardless of the challenges and barriers he or she might face in
school. The Commonwealth Accountability Testing System was designed to
improve this teaching and student learning in Kentucky. It includes:
- The CTBS 5-Survey Edition - A multiple-choice test that enables us
to compare our students to their peers nationally in language arts,
reading, and math.
- The Kentucky Core Content Tests -- A mixture of multiple-choice and
open-response (essay-like) questions in reading, science,
mathematics, social studies, arts and humanities, and practical
living/vocational studies.
- Writing Portfolio -- A collection of a student's best writing over
time.
- Writing Prompts -- Writing tests that measure skills developed from
writing instruction.
- Alternate portfolio -- A collection of the best works of students
with severe to profound disabilities.
The Kentucky Board of Education designed the Commonwealth Accountability
Testing Systems to accurately and reliably measure public school
progress in educating students. Each school in Kentucky is expected to
reach proficiency (100 on a 140-point scale) by the year 2014.
Professional test scorers working on behalf of Kentucky's testing
contractor, CTB-McGraw Hill, grade the tests. Each student's work in an
academic subject is identified as fitting into one of four categories:
novice, apprentice, proficient or distinguished.
- Novice work is defined as showing a minimal understanding of core
concepts and/or incorrect knowledge. A novice student also
demonstrates ineffective communication skills with answers being
unclear or ineffective.
- Work at the apprentice level demonstrates a basic knowledge of core
concepts and skills. This knowledge is conveyed however, without
consistency, substance, or detail.
- A proficient student demonstrates an understanding of major concepts
and can apply them, make connections, and solve problems.
Communication skills are accurately supported with sufficient
details.
- Student work at the distinguished level, demonstrates sophisticated
application of core concepts and processes, innovative and efficient
problem-solving strategies, effective communication and insightful
interpretations or extensions.
Testing at Morgantown Elementary is a community-supported activity.
During the two-week testing window, every effort is made to set up an
optimal testing environment for students. Because of this co-operative
spirit, our students have successfully completed state assessments with
zero exclusions. While our school's racial groups do not comprise
sufficient numbers to be statistically significant, our school's high
percentage of students who receive free/reduced lunch services make this
subgroup not a minority but the **majority.** This majority, as shown in
Part VII, Tables 1 and 2, solidly performs at proficient and
distinguished levels on the state assessment. Even our special education
population achieves high scores. This is a group that typically does not
perform well on the state assessment as evidenced by the state scores
recorded under this subgroup in Part VII, Tables 3 and 4. Additionally,
students whose tested CSI (Cognitive Skills Index) is 85 or below do not
normally experience academic success. However, at Morgantown Elementary
these students are superceding anticipated test scores as per Part VII,
Tables 5 and 6. Our school and community, while struggling with economic
setbacks, know that education is the key to Butler County's triumphant
entry into the 21^st^ century and that every student at Morgantown
Elementary can contribute to that success.
2\. In early 2000, Morgantown Elementary School volunteered to be
audited by the Kentucky Department of Education's Region 2 Service
Center personnel using the Standards and Indicators for School
Improvement document. After participating in the scholastic audit, our
staff gained insight into the value of data analysis and how it can
improve student achievement. Since then, a responsibility that was once
owned by the school administration and district office, has shifted to
classroom teachers and resource staff. The facilitative role of
administration has helped empower teachers to analyze and use data in a
way that directly impacts individual classroom practices and student
achievement.
One day a year is dedicated solely to the purpose of training staff in
evaluating school, grade level, classroom, subgroups and individual
student data. Test formatting issues, content mastery issues, attendance
and school schedules are examined to see their effect on assessment.
From this annual data disaggregating session, a *School Improvement
Plan* containing short term and long-term goals, strategies and
activities to be implemented, and evaluation/monitoring is presented to
the School Based Decision-Making Council for approval. This council is
comprised of two parents, three teachers, and one administrator. The
council's role is to monitor school-wide programs and policies that
affect student achievement.
Analysis of state (Kentucky Core Content Test) and national tests
(CTBS/McGraw-Hill)
helps to guide our staff in planning curriculum and instruction,
monitoring student achievement, identifying gaps and developing teacher
professional growth plans. Additionally, on-going assessment in
teachers' classrooms (anecdotal records, writing samples, and rubrics)
helps the teachers adjust to student's individual needs on a daily
basis.
3\. Our school's mission statement anchors our community to
accountability for student achievement. The news media, including radio
and newspaper, are communication partners in spotlighting student
performance. Communication plays a major role in Morgantown Elementary's
student success. The media provides coverage of both classroom and
school-wide recognition of student achievement. There is a variety of
communication methods our school uses. The following activities allow
for communication with stakeholders:
- Honor roll published each grading period
- Awards ceremonies held throughout the year
- Students with exemplary [A]{.underline}ttendance,
[B]{.underline}ehavior, and [C]{.underline}oursework recognized and
rewarded (ABC club)
- School Based Decision Making Council and Board of Education reports
to the community on student performance
- State and national assessment results published in comparison to
other schools
- Progress reports given to parents each nine weeks
- Parent/Teacher Conferences held each semester
- Weekly communication folders sent home with student work and
progress
- Student agendas utilized as a communication vehicle for student
performance
- Display case in school lobby highlights students and staff
achievements.
> Upon release of assessment results from the Kentucky Department of
> Education, conferences are made available to explain individual
> student results on the Kentucky Core Content test and CTBS.
>
> A community-sponsored awards ceremony is conducted for those students
> reaching the state expected standard of proficiency or beyond.
> Medallions and certificates are given and there is significant media
> coverage.
4\. The teaching staff of Morgantown Elementary is comprised of
thirty-five No Child Left Behind Highly-Qualified Teachers. Nineteen of
those teachers (54%) either teach a class at the local university, or
provide training for other educators. With a teacher turnover rate of
less than 1% for the past three years and 77% of the teaching staff with
15+ years teaching experience, our school is the one other schools in
the district look to for professional development. We have been sharing
our successes with other schools for many years! If Morgantown
Elementary is chosen for this award, our staff will continue to provide
quality mentoring for their colleagues.
Because we believe that time-on-task has a direct correlation to
learning, instruction in our classrooms is sacred time. Morgantown
Elementary exists to provide quality-learning experiences for our
students. In showcasing our students' successes, we hope that we never
lose focus of what is most important---our students' education. While
visitors to our building are always welcomed, with a Blue Ribbon school
honor, it would become necessary to provide interested parties with
information in non-classroom-intrusive ways. One solution would be to
produce a video that shows our school's research-based programs and
instructional strategies. This video could be shared with other schools.
Another way to provide others with our model would be through our
district professional development Focus on Teaching workshops held
throughout each school year. Out-of-District School personnel could also
attend these workshops focused on the specific teaching strategies,
learning programs, or instructional methods that Morgantown Elementary's
staff has found to be successful.
#
# [PART V -- CURRICULUM AND INSTRUCTION]{.underline}
#
# 1. Morgantown Elementary's curriculum is as diverse as the needs of our 500+ students. The infrastructure of Morgantown Elementary curriculum is centered around the *Kentucky Core Content for Assessment* and our district's *Butler County Curriculum Standards for grades K-5*. *Core Content for Ass*essment represents the content that has been identified by the Kentucky Department of Education's Division of Curriculum Development as essential for all students to know. *The Butler County Curriculum Standards* were developed in conjunction with the *Association for Effective Schools, Inc*. and represent both content and ability grade-level standards. Our *CHAMPS* behavioral curriculum allows for a structured, orderly environment conducive for optimal learning.
On-going assessment and individual student data drive the need for
varying instructional delivery and methodology in order to meet
students' needs. The standards set are high and expected to be met by
all children. The following is an outline of the curriculum as applies
to different subject areas:
- Language Arts- K-3 curriculum used to teach language standards is: a
combination of an integrated spelling, grammar, and controlled
vocabulary basal text; a standards-based writing program; and a
phonics and decoding curricula (varying according to developmental
appropriateness). Additionally, a direct-instruction reading
curriculum combined with communication skills and motor skills is
utilized for at-risk students in K-3. A comprehension-tracking
curriculum is in place for embedded on-going assessment in reading
across all grade levels. Grades 4 and 5 reading curricula are more
genre-based, with language skills being taught as a part of the
writing curriculum.
- Mathematics-curriculum is hands-on, manipulative-based strategies
supplemented with mathematics text across all grades. Grade 4
utilizes an individualized tracking curriculum called Accelerated
Math.
- Social Studies, Science, Arts and Humanities, and Health/ Practical
Living are all departmentalized and texts are used to supplement
curriculum standards.
All students who are not reaching their potential in Reading and Math
participate in our Extended School Services program. The curriculum
standards are the same but instructional delivery strategies differ from
the methods used in the regular classroom. In our after-school program a
whole language approach is utilized rather than phonetics for decoding
skills. Also, those students that have been identified as above average
academically, and are not reaching their potential, are offered an
accelerated curriculum after school in Math and the Arts and Humanities.
Curriculum mapping is monitored through the use of technology to track
standards mastered and standards remaining each week.
2\. The foundation of our reading curriculum is influenced by state and
national standards research-based practices and most importantly,
individual student mastery. It is our philosophy that in the early years
of development, children are [learning to read]{.underline}. As they
progress and master early decoding and fluency skills, children become
[readers that learn.]{.underline}
*Sing, Spell, Read, and Write*, a Pearson Learning product, *Benchmark
Word* *Identification*, developed by Irene Gaskins in conjunction with
Patricia Cunningham, SRA/*Direct Instruction* by McGraw-Hill are
programs that are utilized to teach phonemic awareness and fluency.
Vocabulary, fluency, and comprehension programs include a controlled
vocabulary basal by Harcourt Brace, *Accelerated Reader* and *Reading
Renaissance*, and *SRA/Corrective Reading* by McGraw-Hill. Programs and
curriculum differ for the individual level of each student.
A differentiated instruction approach is also offered in our Extended
School Services for those students that have been identified as not
mastering reading skills through the regular instructional day. Programs
include whole language instruction and language experience instruction.
Our reading curriculum is student-centered and data-driven. Our programs
are chosen based on the fact that they include on-going assessment,
group and individual accountability, and meta-cognitive elements. They
are all research-based in areas identified by the National Reading Panel
and the Center for the Improvement of Early Reading Achievement (CIERA)
to have the greatest effect on achievement in reading. The effectiveness
and sustainability of Morgantown Elementary School's approach to reading
is evident through our continued growth as proven by state and national
test results.
3\. The growth and correlation between writing and reading at Morgantown
Elementary have been both phenomenal and proportional over the last
three years. This only further substantiates that the writing curriculum
is as effective as the reading. Writing is a vehicle for our students to
apply what they have learned in reading. Children write to learn, to
demonstrate knowledge, and to communicate with a variety of audiences.
Our goal is for students to apply the essential skills that they have
learned about communicating to writing. It has been our goal to
implement developmentally appropriate practices in both writing and
reading to help students reach proficiency.
In 1996, the Kentucky Early Learning Profile (KELP) developed a
continuum that spanned a six-year period with research based
developmental learning descriptors for content areas. In 1999, Kentucky
Marker Papers was developed as a training tool so teachers had examples
and models of developmentally appropriate writing at all grade levels,
including scaffolding strategies to analyze student work and plan for
next lessons. In 2000, Morgantown Elementary used these two documents as
well as the Kentucky Core Content for Assessment to develop a
school-wide student-writing portfolio. The school's Comprehensive
Improvement Plan Writing Committee mandated a writing portfolio across
all grade levels using *Kentucky Marker Papers* as a guide for planning,
teaching, and assessing effectiveness of student written communication.
Each year the portfolio goes with the student to the next grade level
and is evaluated by the teacher to build upon skills along the writing
continuum and thus guide the student to writing proficiency.
Additionally, Title 1 Curriculum Resource Teachers go into the
classrooms to model research-based writing strategies and work
collaboratively with teachers to analyze student writing. Morgantown
Elementary teachers employ *Writers Express* and *Write Track,* by
WriteSource as curricular resources. These resources are used for
examples, models and mini-lessons that have grammar embedded into
writing skills. Additionally, Barry Lane's *Discovery Writing* program
is used for strategies in teaching revision, fiction, and nonfiction
writing.
4\. While Morgantown Elementary School strongly believes that all
children can learn, it also recognizes that all students do not learn in
the same ways or at the same pace. Consequently, the instructional
methods we use are as diverse as our students.
Foremost, Morgantown Elementary uses a proactive and positive approach
to classroom management. *CHAMPS*, a model developed by Randall Sprick,
helps teachers carefully structure classrooms in ways that foster
student learning. For each classroom activity and transition, staff
members identify and then teach students precisely what the expectations
are, thus significantly reducing the amount of misbehavior and
increasing the amount of learning that takes place in the classroom. The
*CHAMPS* model is used consistently throughout our building and provides
students a happy and safe environment in which to learn.
All classroom teachers implement Robert J. Marzano's research-based
strategies and instructional methods from *Classroom Instruction that
Works* into planning and delivery. These strategies have proven to have
statistical, positive effects on students of all grade levels and
learning styles. Marzano's
instructional strategies, direct instruction and authentic assessment
practices summarize the methods used to improve student learning at our
school.
Research shows that students must begin kindergarten at a learning
readiness level to be successful. Morgantown Elementary School's
Preschool program works diligently to provide at-risk three and four
year olds with this readiness through curricular intervention. These
preschoolers are identified as at-risk by testing for speech
communication problems and developmental delays. Staff continues to
provide students with needed intervention through Speech/Communication
and Developmentally-Delayed Programs up to age nine.
Teachers also work with at-risk students at all grade levels by applying
learning structures through classroom strategies identified by Ruby
Payne's work with the effects of poverty on student learning. These
learning structures provide students with mental models that translate
the abstract to the concrete. When mental models are directly taught for
each discipline, abstract information can be learned much more quickly
because the mind has a way to contain or hold the information.
5\. Professional development at Morgantown Elementary was traditionally
based on needs assessment surveys given to stakeholders, and state and
national test analysis. However, in the fall of 2000, the voluntary
scholastic audit helped identify professional development needs that
have made a significant impact on student achievement.
First of all, the audit identified a need for grade level standards to
guide classroom instruction. Over the course of the remaining school
year under guidance and focus from Title 1-funded curriculum staff,
teachers met together using standards developed by the *Association for
Effective Schools, Inc.,* along with state and national standards to
guide them and developed rigorous, intentional, grade level content and
ability standards. The following summer, Janet Hurt, Kentucky teacher,
administrator, and author of *Taming the Standards*, led Morgantown
Elementary School's professional development. Ms. Hurt gave our faculty
a commonsense approach to higher student achievement by explaining how
to build the knowledge and understanding necessary to design
conceptually integrated standards-based units of instruction. Using the
newly designed Butler County K-5 Standards teachers were now able to
horizontally align the curriculum and provide students with learning
situations that included both process and product.
Teachers spent the next summer learning how to utilize multiple
assessment and teaching strategies to continuously monitor and modify
instruction in order to meet student learning styles and support
proficient student work. This training was provided using a 1998
research study by Robert J. Marzano at Midcontinent Research for
Education and Learning (McREL). These researchers analyzed selected
research studies on instructional strategies that had a high probability
of enhancing student achievement for all students in all subject areas
at all grade levels. Nine categories of instructional strategies that
affect student achievement were identified and modeled in classrooms by
MES curriculum resource staff in continuous staff development.
Morgantown Elementary School incorporated these nine strategies into
primary instructional methods that help our staff achieve student
learning.
# [PART VII -- ASSESSMENT RESULTS]{.underline}
# [Table 1]{.underline}
# [Fourth Grade Reading]{.underline}
## [The Kentucky Core Content Test]{.underline}
### [Free or Reduced Lunch/Not Free or Reduced Lunch]{.underline}
---------------------------------- ------------ ----------- ------------
2002-2003 2001-2002 2000-2001
Testing month May April April
**SCHOOL SCORES**
TOTAL 101.5 91.9 84.8
At or Above Novice 100% 100% 100%
At or Above Apprentice 92% 94% 89%
At Proficient or Distinguished 85% 74% 61%
Number of students tested 78 80 106
Percent of total students tested 14% 14% 19%
Number of students excluded 0 0 0
Percent of students excluded 0% 0% 0%
SUBGROUP SCORES
1\. Free or Reduced Lunch
At or Above Novice 100% 100% 100%
At or Above Apprentice 90% 88% 83%
At Proficient or Distinguished 80% 70% 54%
Number of students tested 39 33 59
2\. Not Free or Reduced Lunch
At or Above Novice 100% 100% 100%
At or Above Apprentice 95% 98% 96%
At Proficient or Distinguished 90% 76% 72%
Number of students tested 39 45 46
**STATE SCORES**
TOTAL 83.5 81.9 80.6
At or Above Novice 100% 100% 100%
At or Above Apprentice 87% 85% 84%
At Proficient or Distinguished 62% 60% 58%
State Mean Score 545 548 547
SUBGROUP SCORES
1\. Free or Reduced Lunch
At or Above Novice 100% 100% 100%
At or Above Apprentice 81% 78% 77%
At Proficient or Distinguished 51% 48% 45%
Number of students tested 24,597 24,818 24,423
2\. Not Free or Reduced Lunch
At or Above Novice 100% 100% 100%
At or Above Apprentice 93% 92% 92%
At Proficient or Distinguished 74% 73% 71%
Number of students tested 23,973 24,070 25,138
---------------------------------- ------------ ----------- ------------
# [Table 2]{.underline}
# [Fifth Grade Mathematics]{.underline}
## [The Kentucky Core Content Test]{.underline}
### [Free or Reduced Lunch/Not Free or Reduced Lunch]{.underline}
---------------------------------- ------------ ----------- ------------
2002-2003 2001-2002 2000-2001
Testing month May April April
**SCHOOL SCORES**
TOTAL 83.2 70.8 53.8
At or Above Novice 100% 100% 100%
At or Above Apprentice 83% 76% 54%
At Proficient or Distinguished 55% 39% 20%
Number of students tested 75 108 110
Percent of total students tested 14% 19% 19%
Number of students excluded 0 0 0
Percent of students excluded 0% 0% 0%
SUBGROUP SCORES
1\. Free or Reduced Lunch
At or Above Novice 100% 100% 100%
At or Above Apprentice 69% 72% 48%
At Proficient or Distinguished 38% 35% 19%
Number of students tested 32 60 63
2\. Not Free or Reduced Lunch
At or Above Novice 100% 100% 100%
At or Above Apprentice 93% 79% 62%
At Proficient or Distinguished 67% 41% 22%
Number of students tested 43 48 45
**STATE SCORES**
TOTAL 67.6 66 63.9
At or Above Novice 100% 100% 100%
At or Above Apprentice 69% 67% 65%
At Proficient or Distinguished 38% 36% 34%
State Mean Score 558 561 558
SUBGROUP SCORES
1\. Free or Reduced Lunch
At or Above Novice 100% 100% 100%
At or Above Apprentice 58% 55% 52%
At Proficient or Distinguished 26% 23% 21%
Number of students tested 25,143 24,641 23,182
2\. Not Free or Reduced Lunch
At or Above Novice 100% 100% 100%
At or Above Apprentice 80% 79% 77%
At Proficient or Distinguished 51% 49% 46%
Number of students tested 24,537 25,152 25,937
---------------------------------- ------------ ----------- ------------
# [Table 3]{.underline}
# [Fourth Grade Reading]{.underline}
## [The Kentucky Core Content Test]{.underline}
## [Special Education/Gifted and Talented]{.underline}
---------------------------------- ------------ ----------- ------------
2002-2003 2001-2002 2000-2001
Testing month May April April
**SCHOOL SCORES**
TOTAL 101.5 91.9 84.8
At or Above Novice 100% 100% 100%
At or Above Apprentice 92% 94% 89%
At Proficient or Distinguished 85% 74% 61%
Number of students tested 78 80 106
Percent of total students tested 14% 14% 19%
Number of students excluded 0 0 0
Percent of students excluded 0% 0% 0%
SUBGROUP SCORES
1\. Special Education
At or Above Novice 100% 100% 100%
At or Above Apprentice 78% 100% 90%
At Proficient or Distinguished 56% 100% 50%
2\. Gifted and Talented
At or Above Novice 100% 100% 100%
At or Above Apprentice 100% 100% 100%
At Proficient or Distinguished 100% 100% 100%
**STATE SCORES**
TOTAL 83.5 81.9 80.6
At or Above Novice 100% 100% 100%
At or Above Apprentice 87% 85% 84%
At Proficient or Distinguished 62% 60% 58%
State Mean Score 545 548 547
SUBGROUP SCORES
1\. Special Education
At or Above Novice 100% 100% 100%
At or Above Apprentice 72% 69% 66%
At Proficient or Distinguished 42% 37% 32%
2\. Gifted and Talented
At or Above Novice 100% 100% 100%
At or Above Apprentice 99% 99% 99%
At Proficient or Distinguished 93% 93% 92%
---------------------------------- ------------ ----------- ------------
#
# [Table 4]{.underline}
# [Fifth Grade Mathematics]{.underline}
## [The Kentucky Core Content Test]{.underline}
### [Special Education/Gifted and Talented]{.underline}
---------------------------------- ------------ ----------- ------------
2002-2003 2001-2002 2000-2001
Testing month May April April
**SCHOOL SCORES**
TOTAL 83.2 70.8 53.8
At or Above Novice 100% 100% 100%
At or Above Apprentice 83% 76% 54%
At Proficient or Distinguished 55% 39% 20%
Number of students tested 75 108 110
Percent of total students tested 14% 19% 19%
Number of students excluded 0 0 0
Percent of students excluded 0% 0% 0%
SUBGROUP SCORES
1\. Special Education
At or Above Novice 100% 100% 100%
At or Above Apprentice 75% 46% 20%
At Proficient or Distinguished 75% 31% 0%
2\. Gifted and Talented
At or Above Novice 100% 100% 100%
At or Above Apprentice 100% 96% 83%
At Proficient or Distinguished 86% 73% 36%
**STATE SCORES**
TOTAL 67.6 66 63.9
At or Above Novice 100% 100% 100%
At or Above Apprentice 69% 67% 65%
At Proficient or Distinguished 38% 36% 34%
State Mean Score 558 561 558
SUBGROUP SCORES
1\. Special Education
At or Above Novice 100% 100% 100%
At or Above Apprentice 39% 36% 31%
At Proficient or Distinguished 16% 14% 10%
2\. Gifted and Talented
At or Above Novice 100% 100% 100%
At or Above Apprentice 95% 95% 94%
At Proficient or Distinguished 77% 77% 75%
---------------------------------- ------------ ----------- ------------
# [Table 5]{.underline}
# [Third Grade Reading]{.underline}
## [Comprehensive Test of Basic Skills]{.underline}
###
+---------------------------------+-----------+----------+-----------+
| | 2002-2003 | 2 | 2000-2001 |
| | | 001-2002 | |
+---------------------------------+-----------+----------+-----------+
| Testing month | May | April | April |
+---------------------------------+-----------+----------+-----------+
| | | | |
+---------------------------------+-----------+----------+-----------+
| **SCHOOL SCORES** | | | |
+---------------------------------+-----------+----------+-----------+
| | | | |
+---------------------------------+-----------+----------+-----------+
| Cognitive Skills Index (CSI) | | | |
| | | | |
| 85 & Below | | | |
+---------------------------------+-----------+----------+-----------+
| Mean Obtained | 621.0 | 601.5 | \* |
+---------------------------------+-----------+----------+-----------+
| Mean Anticipated | 595.8 | 583.3 | \* |
+---------------------------------+-----------+----------+-----------+
| Difference | 25.2 | 18.2 | \* |
+---------------------------------+-----------+----------+-----------+
#
#
#
#
#
#
# [Table 6]{.underline}
# [Third Grade Math]{.underline}
## [Comprehensive Test of Basic Skills]{.underline}
###
+---------------------------------+-----------+----------+-----------+
| | 2002-2003 | 2 | 2000-2001 |
| | | 001-2002 | |
+---------------------------------+-----------+----------+-----------+
| Testing month | May | April | April |
+---------------------------------+-----------+----------+-----------+
| | | | |
+---------------------------------+-----------+----------+-----------+
| **SCHOOL SCORES** | | | |
+---------------------------------+-----------+----------+-----------+
| | | | |
+---------------------------------+-----------+----------+-----------+
| Cognitive Skills Index (CSI) | | | |
| | | | |
| 85 & Below | | | |
+---------------------------------+-----------+----------+-----------+
| Mean Obtained | 597.9 | 583.3 | \* |
+---------------------------------+-----------+----------+-----------+
| Mean Anticipated | 573.4 | 561.2 | \* |
+---------------------------------+-----------+----------+-----------+
| Difference | 24.5 | 22.1 | \* |
+---------------------------------+-----------+----------+-----------+
|
en
|
all-txt-docs
|
372244
|
Date: Mon, 07 Sep 1998 20:19:45 -0500
From: Vince Perez on the Road <[email protected]>
Subject: Coral Bleaching in the PHILIPPINES
I found the various emails from divers reporting coral bleaching in
various spots in the Philippines, possibly caused by warm weather.
Vincent S. Perez
Trustee, World Wildlife Fund-Philippines
I just came back from a dive trip in Moal Boal, Cebu yesterday. Traces
of coral bleaching are present in Pescador Island. Temperature at avg
depth of 20m was 30'C for two days (weather was overcast). Sunken
Island, whose reef begins at 30m, has so far been spared but I noticed that
temperature at 30 to 45m was close to Pescador at 29'C. Worst hit seems
to be White Sands and Tublig (?, I'm not sure if I got the name of this spot
correctly) where rows upon rows of corals have already turned white.
These are shallow dives and the waters here were really warm.
At Pescador, we noticed that the 3-4 resident white tips which you would
usually see at 45m were absent, save for a small one, and the usual snappers
and sweet lips normally found in abundance were fewer. I would estimate
the affected areas in these dive spots to be 3%, nil so far, 20%, and 25% for
Pescador, Sunken Island, White Sands and Tublig, respectively.
Joel
Original Message from [email protected] @ HUB on 09/03:
From: "karina" <[email protected]>
Subject: Coral Bleaching is definitely happening - any solutions?
Divers have noticed coral bleaching in Anilao, Sorsogon, Palawan etc..
Karina Escudero
From: "Boy Siojo" <[email protected]>
We just came from a dive cruise which covered the areas of Busuanga-Apo
Reef-Puerto Galera-and Verde island. A phenomena called Coral Bleaching
is present. From what I know the color of the corals come from specific
bacteria living with a specific coral (please feel free to correct any mistakes
that I may make). These bacteria are at the same time a major food source
of the coral itself. The corals and the bacteria, as in any living organism on this
earth, have a certain amount of tolerance for changes in the temperature of their
environment. For those of you who have been diving regularly the past few
months, haven't you noticed that the water temperature has been unusually warm.
Wetsuits should be the order of the day when diving in Anilao during these
months and yet we have been diving without suits. The first dive of our first day
was to a wreck called Kyokozan Maru. The ship lies in about 130 ft. of water
with the deck being at 90 ft. The first thing that struck me was the wreck was white!
As I descended I noticed that all the encrusting corals have turned white, and so
did the mushroom corals and even the anemone at the railing near the pilot house
has turned white. Our next dive spot was Coconongin Point, about one hour away
from the wreck, as soon as we went in I knew that the wreck was not an isolated
case. There were dead soft corals everywhere, the hump and brain corals (porites
species) and the staghorn and table corals (acropora species) have all turned white.
Anywhere you looked there was this prevailing whiteness, it was just incredible.
Our next spot was the house reef of Club Paradise, and it was almost the same as
Coconongin Point. Apo Reef, Puerto Galera and Verde are also affected by this
phenomena. At first I thought the phenomena was localized, but from what we have
seen I think that it may be the whole of the Philippines that may be affected. When
water temperatures change the bacteria living in the corals are the first to be affected.
Once they die the corals soon follow. One of our divers had a watch with a
thermometer, and he said that the average temperature that his watch recorded during
our dive at San Agapito Point was 30 degrees celsius. The threshold of the Corals
are 32 degrees celsius. In Club Paradise they had some scientists over a couple of
weeks back and they measured it at 35 degrees celsius at 60 ft. depth!!!! That is way
too hot. We may soon see this coral bleaching start in Anilao.
. Thank you. Boy
eOLE: Produced By Microsoft MimeOLE V4.71.1712.3
Guys,
The weekend before the cruise I went to Mainit and at that time it was not as
Bobby describes it now.
Boy
----------------------------------------------------------
Boy,
I am sorry to hear about the conditions you encountered at Club Paradise.
The Diving there is one of the reasons that I finally decided to get into
Photography. I was in Anilao last weekend and sad to say had encountered
the same conditions at Mainit Point. As we approached the site one of the
divers asked what are those white patches underwater, at first I thought it
must be patches of sand. As we descended I noticed that those white patches
were staghorn corals bleached white, even some of the soft corals that are
normally color flesh where white!!, visibility was so bad about 10 - 15 feet
only, and yes the temperature was warm. Could not say whether the corals
in the deeper areas are affected as vis was really bad. But it did not seem that
the deeper part of the reef was affected. We did our first dive at Larry's on
Sunday morning, don't think this reef is affected as yet.
Cheers,
Bobby S.B.
Dear Boy,
The coral bleaching is something I have noticed as well in the last few months
around the Sorsogon area, Ticao Island, Masbate, Albay gulf (Rapu Rapu &
Santo Domingo). These areas happen to be volcanic & may have higher
temperatures due to volcanic gases. However, in Coron - same thing... I was at
Fuga Island in the Babuyan Islands, last weekend & the water was so warm I
dove wearing a swimsuit, this is totally unheard of in this area where 3-5 mil
suits are appropriate. The humpback whales also failed to migrate thru the
Babuyan area this year. They usually migrate thru the area on May and August.
I will make some inquiries from ICLARM on what can possibly be done to help
the situation. Guys, more signs that we ought to take care of our planet.. Keep me posted.
Karina
|
en
|
converted_docs
|
160379
|
{width="1.5in" height="0.55in"}
# National Mapping Program Date: June 13, 2002
Depository Library Sending
Shipping list: 2002-18-TQ
Total Maps for this list: 84
+---+--------+------+------+------------------+-------+------+------+
| # | #### | * | #### | #### NAME | # | # | * |
| # | | *OLD | NEW | | ### S | ### | *Sca |
| # | # | MAT. | MAT | | TATES | Vers | le** |
| # | ### GP | \#** | . \# | | | ion | |
| | O ITEM | | | | | Year | |
| L | | | | | | | |
| I | # | | | | | | |
| N | ### \# | | | | | | |
| E | | | | | | | |
| | | | | | | | |
| # | | | | | | | |
| # | | | | | | | |
| # | | | | | | | |
| # | | | | | | | |
| | | | | | | | |
| \ | | | | | | | |
| # | | | | | | | |
+---+--------+------+------+------------------+-------+------+------+
| 1 | 061 | TAK | 3 | ANCHORAGE C-8 | AK | 1994 | 63 |
| | 9-M-02 | 0339 | 4520 | | | | |
+---+--------+------+------+------------------+-------+------+------+
| 2 | 061 | TAK | 3 | MCCARTHY A-4 | AK | 1994 | 63 |
| | 9-M-02 | 1646 | 5820 | | | | |
+---+--------+------+------+------------------+-------+------+------+
| 3 | 061 | TAK | 3 | MCCARTHY A-5 | AK | 1994 | 63 |
| | 9-M-02 | 1647 | 5821 | | | | |
+---+--------+------+------+------------------+-------+------+------+
| 4 | 061 | TAK | 3 | MCCARTHY A-6 | AK | 1994 | 63 |
| | 9-M-02 | 1648 | 5822 | | | | |
+---+--------+------+------+------------------+-------+------+------+
| 5 | 061 | TAK | 3 | MCCARTHY B-6 | AK | 1994 | 63 |
| | 9-M-02 | 1656 | 5830 | | | | |
+---+--------+------+------+------------------+-------+------+------+
| 6 | 061 | TAK | 3 | MCCARTHY C-5 | AK | 1993 | 63 |
| | 9-M-02 | 1663 | 5837 | | | | |
+---+--------+------+------+------------------+-------+------+------+
| 7 | 061 | TAK | 3 | TYONEK C-2 | AK | 1993 | 63 |
| | 9-M-02 | 2773 | 6944 | | | | |
+---+--------+------+------+------------------+-------+------+------+
| 8 | 061 | TAK | 3 | VALDEZ C-3 | AK | 1996 | 63 |
| | 9-M-02 | 2893 | 7064 | | | | |
+---+--------+------+------+------------------+-------+------+------+
| 9 | 061 | TAZ | 4 | AGUA CALIENTW | AZ | 1996 | 24 |
| | 9-M-03 | 0009 | 0461 | HILL | | | |
+---+--------+------+------+------------------+-------+------+------+
| 1 | 061 | TAZ | 4 | BISBEE | AZ | 1996 | 24 |
| 0 | 9-M-03 | 0135 | 0584 | | | | |
+---+--------+------+------+------------------+-------+------+------+
| 1 | 061 | TAZ | 4 | CAMPO BONITO | AZ | 1996 | 24 |
| 1 | 9-M-03 | 0224 | 0673 | | | | |
+---+--------+------+------+------------------+-------+------+------+
| 1 | 061 | TAZ | 4 | CANELO PASS | AZ | 1996 | 24 |
| 2 | 9-M-03 | 0227 | 0676 | | | | |
+---+--------+------+------+------------------+-------+------+------+
| 1 | 061 | TAZ | 4 | DESERT PEAK | AZ | 1996 | 24 |
| 3 | 9-M-03 | 2232 | 2631 | | | | |
+---+--------+------+------+------------------+-------+------+------+
| 1 | 061 | TAZ | 4 | FAIRBANK | AZ | 1996 | 24 |
| 4 | 9-M-03 | 0478 | 0923 | | | | |
+---+--------+------+------+------------------+-------+------+------+
| 1 | 061 | TAZ | 4 | GALLETA FLAT | AZ | 1996 | 24 |
| 5 | 9-M-03 | 0525 | 0970 | EAST | | | |
+---+--------+------+------+------------------+-------+------+------+
| 1 | 061 | TAZ | 4 | HAY MOUNTAIN | AZ | 1996 | 24 |
| 6 | 9-M-03 | 0636 | 1081 | | | | |
+---+--------+------+------+------------------+-------+------+------+
| 1 | 061 | TAZ | 4 | HUACHUCA CITY | AZ | 1996 | 24 |
| 7 | 9-M-03 | 0687 | 1132 | | | | |
+---+--------+------+------+------------------+-------+------+------+
| 1 | 061 | TAZ | 4 | HUACHUCA PEAK | AZ | 1996 | 24 |
| 8 | 9-M-03 | 0688 | 1133 | | | | |
+---+--------+------+------+------------------+-------+------+------+
| 1 | 061 | TAZ | 4 | KUPK | AZ | 1996 | 24 |
| 9 | 9-M-03 | 2352 | 2751 | | | | |
+---+--------+------+------+------------------+-------+------+------+
| 2 | 061 | TAZ | 4 | MARANA | AZ | 1996 | 24 |
| 0 | 9-M-03 | 0846 | 1291 | | | | |
+---+--------+------+------+------------------+-------+------+------+
| 2 | 061 | TAZ | 4 | MICA MOUNTAIN | AZ | 1996 | 24 |
| 1 | 9-M-03 | 0894 | 1339 | | | | |
+---+--------+------+------+------------------+-------+------+------+
| 2 | 061 | TAZ | 4 | MILLER PEAK | AZ | 1996 | 24 |
| 2 | 9-M-03 | 0903 | 1348 | | | | |
+---+--------+------+------+------------------+-------+------+------+
| 2 | 061 | TAZ | 4 | MOUNT BIGELOW | AZ | 1996 | 24 |
| 3 | 9-M-03 | 0944 | 1388 | | | | |
+---+--------+------+------+------------------+-------+------+------+
| 2 | 061 | TAZ | 4 | MOUNT HUGHES | AZ | 1996 | 24 |
| 4 | 9-M-03 | 0957 | 1401 | | | | |
+---+--------+------+------+------------------+-------+------+------+
| 2 | 061 | TAZ | 4 | MOUNT LEMMON | AZ | 1996 | 24 |
| 5 | 9-M-03 | 0959 | 1403 | | | | |
+---+--------+------+------+------------------+-------+------+------+
| 2 | 061 | TAZ | 4 | O\'DONNELL | AZ | 1996 | 24 |
| 6 | 9-M-03 | 1023 | 1467 | CANYON | | | |
+---+--------+------+------+------------------+-------+------+------+
| 2 | 061 | TAZ | 4 | ORACLE | AZ | 1996 | 24 |
| 7 | 9-M-03 | 2420 | 2818 | | | | |
+---+--------+------+------+------------------+-------+------+------+
| 2 | 061 | TAZ | 4 | ORACLE JUNCTION | AZ | 1996 | 24 |
| 8 | 9-M-03 | 2421 | 2819 | | | | |
+---+--------+------+------+------------------+-------+------+------+
| 2 | 061 | TAZ | 4 | POTTER MOUNTAIN | AZ | 1996 | 24 |
| 9 | 9-M-03 | 1140 | 1583 | | | | |
+---+--------+------+------+------------------+-------+------+------+
| 3 | 061 | TAZ | 4 | PYEATT RANCH | AZ | 1996 | 24 |
| 0 | 9-M-03 | 1163 | 1606 | | | | |
+---+--------+------+------+------------------+-------+------+------+
| 3 | 061 | TAZ | 4 | RED ROCK | AZ | 1996 | 24 |
| 1 | 9-M-03 | 1184 | 1627 | | | | |
+---+--------+------+------+------------------+-------+------+------+
| 3 | 061 | TAZ | 4 | RINCON PEAK | AZ | 1996 | 24 |
| 2 | 9-M-03 | 1197 | 1640 | | | | |
+---+--------+------+------+------------------+-------+------+------+
| 3 | 061 | TAZ | 4 | SABINO CANYON | AZ | 1996 | 24 |
| 3 | 9-M-03 | 1234 | 1677 | | | | |
+---+--------+------+------+------------------+-------+------+------+
| 3 | 061 | TAZ | 4 | SAINT DAVID | AZ | 1996 | 24 |
| 4 | 9-M-03 | 1250 | 1693 | | | | |
+---+--------+------+------+------------------+-------+------+------+
| 3 | 061 | TAZ | 4 | SAN PEDRO RANCH | AZ | 1996 | 24 |
| 5 | 9-M-03 | 1973 | 2378 | | | | |
+---+--------+------+------+------------------+-------+------+------+
| 3 | 061 | TAZ | 4 | STEELE HILLS | AZ | 1996 | 24 |
| 6 | 9-M-03 | 1962 | 2367 | | | | |
+---+--------+------+------+------------------+-------+------+------+
| 3 | 061 | TAZ | 4 | TANQUE VERDE | AZ | 1996 | 24 |
| 7 | 9-M-03 | 1427 | 1868 | PEAK | | | |
+---+--------+------+------+------------------+-------+------+------+
| 3 | 061 | TAZ | 4 | TOMBSTONE | AZ | 1996 | 24 |
| 8 | 9-M-03 | 1470 | 1911 | | | | |
+---+--------+------+------+------------------+-------+------+------+
| 3 | 061 | TAZ | 4 | WEST OF MARANA | AZ | 1996 | 24 |
| 9 | 9-M-03 | 2590 | 2984 | | | | |
+---+--------+------+------+------------------+-------+------+------+
| 4 | 061 | TCA | 4 | CAMPO | CA | 1996 | 24 |
| 0 | 9-M-05 | 0355 | 3577 | | | | |
+---+--------+------+------+------------------+-------+------+------+
| 4 | 061 | TCA | 4 | POTRERO | C | 1996 | 24 |
| 1 | 9-M-05 | 1926 | 5126 | | A,BCN | | |
+---+--------+------+------+------------------+-------+------+------+
| 4 | 061 | TFL | 5 | SYCAMORE | FL | 1994 | 24 |
| 2 | 9-M-09 | 1021 | 1092 | | | | |
+---+--------+------+------+------------------+-------+------+------+
| 4 | 061 | TGU | 5 | DEDEDO | GU | 2000 | 24 |
| 3 | 9-M-53 | 0005 | 2671 | | | | |
+---+--------+------+------+------------------+-------+------+------+
| 4 | 061 | TGU | 5 | TALOFOFO | GU | 2000 | 24 |
| 4 | 9-M-53 | 0011 | 2677 | | | | |
+---+--------+------+------+------------------+-------+------+------+
| 4 | 061 | TIL | 5 | ALLERTON | IL | 1998 | 24 |
| 5 | 9-M-13 | 0931 | 7069 | | | | |
+---+--------+------+------+------------------+-------+------+------+
| 4 | 061 | TIL | 5 | CARLINVILLE WEST | IL | 1998 | 24 |
| 6 | 9-M-13 | 0133 | 6281 | | | | |
+---+--------+------+------+------------------+-------+------+------+
| 4 | 061 | TIL | 5 | CASEY | IL | 1998 | 24 |
| 7 | 9-M-13 | 1226 | 7350 | | | | |
+---+--------+------+------+------------------+-------+------+------+
| 4 | 061 | TIL | 5 | CLARKSVILLE | IL | 1998 | 24 |
| 8 | 9-M-13 | 1222 | 7346 | | | | |
+---+--------+------+------+------------------+-------+------+------+
| 4 | 061 | TIL | 5 | FILLMORE | IL | 1998 | 24 |
| 9 | 9-M-13 | 0279 | 6426 | | | | |
+---+--------+------+------+------------------+-------+------+------+
| 5 | 061 | TIL | 5 | OLHLMAN | IL | 1998 | 24 |
| 0 | 9-M-13 | 0591 | 6734 | | | | |
+---+--------+------+------+------------------+-------+------+------+
| 5 | 061 | TIL | 5 | PANA | IL | 1998 | 24 |
| 1 | 9-M-13 | 0613 | 6756 | | | | |
+---+--------+------+------+------------------+-------+------+------+
| 5 | 061 | TIL | 5 | PLAINVIEW | IL | 1998 | 24 |
| 2 | 9-M-13 | 0644 | 6787 | | | | |
+---+--------+------+------+------------------+-------+------+------+
| 5 | 061 | TIL | 5 | PORTERVILLE | IL | 1998 | 24 |
| 3 | 9-M-13 | 1242 | 7366 | | | | |
+---+--------+------+------+------------------+-------+------+------+
| 5 | 061 | TIL | 5 | RAYMOND NE | IL | 1998 | 24 |
| 4 | 9-M-13 | 0677 | 6820 | | | | |
+---+--------+------+------+------------------+-------+------+------+
| 5 | 061 | TIL | 5 | RISING | IL | 1998 | 24 |
| 5 | 9-M-13 | 0690 | 6832 | | | | |
+---+--------+------+------+------------------+-------+------+------+
| 5 | 061 | TIL | 5 | WAVERLY | IL | 1998 | 24 |
| 6 | 9-M-13 | 1131 | 7262 | | | | |
+---+--------+------+------+------------------+-------+------+------+
| 5 | 061 | TIL | 5 | WESTFIELD EAST | IL | 1998 | 24 |
| 7 | 9-M-13 | 1221 | 7345 | | | | |
+---+--------+------+------+------------------+-------+------+------+
| 5 | 061 | TLA | 6 | MIRE | LA | 1998 | 24 |
| 8 | 9-M-18 | 0843 | 2287 | | | | |
+---+--------+------+------+------------------+-------+------+------+
| 5 | 061 | TLA | 6 | PEVETO BEACH | LA | 1998 | 24 |
| 9 | 9-M-18 | 0556 | 2004 | | | | |
+---+--------+------+------+------------------+-------+------+------+
| 6 | 061 | TLA | 6 | PLAQUEMINE | LA | 1998 | 24 |
| 0 | 9-M-18 | 0568 | 2016 | | | | |
+---+--------+------+------+------------------+-------+------+------+
| 6 | 061 | TLA | 6 | RIGOLETS | LA | 1998 | 24 |
| 1 | 9-M-18 | 0601 | 2049 | | | | |
+---+--------+------+------+------------------+-------+------+------+
| 6 | 061 | TMT | 7 | BACHELOR | MT | 1997 | 24 |
| 2 | 9-M-26 | 2957 | 3925 | MOUNTAIN | | | |
+---+--------+------+------+------------------+-------+------+------+
| 6 | 061 | TMT | 7 | DICKIE HILLS | MT | 1997 | 24 |
| 3 | 9-M-26 | 0611 | 1639 | | | | |
+---+--------+------+------+------------------+-------+------+------+
| 6 | 061 | TMT | 7 | FOOLHEN MOUNTAIN | MT | 1997 | 24 |
| 4 | 9-M-26 | 0769 | 1794 | | | | |
+---+--------+------+------+------------------+-------+------+------+
| 6 | 061 | TMT | 7 | MUSSIGBROD LAKE | MT | 1997 | 24 |
| 5 | 9-M-26 | 1578 | 2580 | | | | |
+---+--------+------+------+------------------+-------+------+------+
| 6 | 061 | TMT | 7 | OLD BALDY | MT | 1997 | 24 |
| 6 | 9-M-26 | 3205 | 4140 | MOUNTAIN | | | |
+---+--------+------+------+------------------+-------+------+------+
| 6 | 061 | TMT | 7 | SHERIDAN | MT | 1997 | 24 |
| 7 | 9-M-26 | 1986 | 2982 | | | | |
+---+--------+------+------+------------------+-------+------+------+
| 6 | 061 | TMT | 7 | TORREY MOUNTAIN | MT | 1997 | 24 |
| 8 | 9-M-26 | 2208 | 3201 | | | | |
+---+--------+------+------+------------------+-------+------+------+
| 6 | 061 | TMT | 7 | WARREN PEAK | MT | 1997 | 24 |
| 9 | 9-M-26 | 2296 | 3286 | | | | |
+---+--------+------+------+------------------+-------+------+------+
| 7 | 061 | TND | 7 | ICE BOX CANYON | ND | 1997 | 24 |
| 0 | 9-M-34 | 0668 | 6387 | | | | |
+---+--------+------+------+------------------+-------+------+------+
| 7 | 061 | TNM | 8 | SELDON CANYON | NM | 1996 | 24 |
| 1 | 9-M-31 | 2047 | 1393 | | | | |
+---+--------+------+------+------------------+-------+------+------+
| 7 | 061 | TNM | 8 | SUMMERFORD | NM | 1996 | 24 |
| 2 | 9-M-31 | 2102 | 1444 | MOUNTAIN | | | |
+---+--------+------+------+------------------+-------+------+------+
| 7 | 061 | TNM | 8 | TAYLOR WELL | NM | 1996 | 24 |
| 3 | 9-M-31 | 2049 | 1395 | | | | |
+---+--------+------+------+------------------+-------+------+------+
| 7 | 061 | TNM | 8 | THORN WELL | NM | 1996 | 24 |
| 4 | 9-M-31 | 2050 | 1396 | | | | |
+---+--------+------+------+------------------+-------+------+------+
| 7 | 061 | TNM | 8 | NORIA | NM | 1996 | 24 |
| 5 | 9-M-31 | 2192 | 1529 | | ,CHIH | | |
+---+--------+------+------+------------------+-------+------+------+
| 7 | 061 | TPA | 9 | SHENANDOAH | PA | 1999 | 24 |
| 6 | 9-M-38 | 0747 | 1147 | | | | |
+---+--------+------+------+------------------+-------+------+------+
| 7 | 061 | TTX | 9 | FORNEY NORTH | TX | 1995 | 24 |
| 7 | 9-M-43 | 1379 | 6466 | | | | |
+---+--------+------+------+------------------+-------+------+------+
| 7 | 061 | TTX | 9 | MESQUITE | TX | 1995 | 24 |
| 8 | 9-M-43 | 2481 | 7559 | | | | |
+---+--------+------+------+------------------+-------+------+------+
| 7 | 061 | TTX | 9 | ROCKWELL | TX | 1995 | 24 |
| 9 | 9-M-43 | 3190 | 8264 | | | | |
+---+--------+------+------+------------------+-------+------+------+
| 8 | 061 | TTX | 9 | ROWLETT | TX | 1995 | 24 |
| 0 | 9-M-43 | 3235 | 8309 | | | | |
+---+--------+------+------+------------------+-------+------+------+
| 8 | 061 | TTX | 9 | WHITE ROCK LAKE | TX | 1995 | 24 |
| 1 | 9-M-43 | 4061 | 9129 | | | | |
+---+--------+------+------+------------------+-------+------+------+
| 8 | 061 | TUT | 10 | SOLDIER SUMMIT | UT | 1998 | 24 |
| 2 | 9-M-44 | 1049 | 2547 | | | | |
+---+--------+------+------+------------------+-------+------+------+
| 8 | 061 | TUT | 10 | STOCKTON | UT | 1997 | 24 |
| 3 | 9-M-44 | 1049 | 2574 | | | | |
+---+--------+------+------+------------------+-------+------+------+
| 8 | 061 | TWA | 10 | MOUNT VERNON | WA | 1998 | 24 |
| 4 | 9-M-47 | 0704 | 5953 | | | | |
+---+--------+------+------+------------------+-------+------+------+
| | | | | | | | |
+---+--------+------+------+------------------+-------+------+------+
| | | | | | | | |
+---+--------+------+------+------------------+-------+------+------+
| | | | | | | | |
+---+--------+------+------+------------------+-------+------+------+
| | | | | | | | |
+---+--------+------+------+------------------+-------+------+------+
| | | | | | | | |
+---+--------+------+------+------------------+-------+------+------+
| | | | | | | | |
+---+--------+------+------+------------------+-------+------+------+
| | | | | | | | |
+---+--------+------+------+------------------+-------+------+------+
| | | | | | | | |
+---+--------+------+------+------------------+-------+------+------+
| | | | | | | | |
+---+--------+------+------+------------------+-------+------+------+
| | | | | | | | |
+---+--------+------+------+------------------+-------+------+------+
Claims for Non-receipt of USGS Maps: Claims for maps previously selected
must be made within 60 days. To FILE A CLAIM, circle the missing item
numbers and send a copy of this shipping list to the address listed
below, or fax to the number listed below. Please complete the applicable
information.
Date: Claim Approval:
Library \# State(s) Claimed:
Library Address: DMLP Series Selected:
Phone:
**(A LIBRARY NUMBER IS REQUIRED INFORMATION TO PROCESS ALL CLAIMS.)**
**UNITED STATES**
### DEPARTMENT OF THE INTERIOR
GEOLOGICAL SURVEY
DENVER FEDERAL CENTER
MS 306, ATTN: RECEIVING Tel. (303) 202-4703
DENVER, COLORADO 80225 **Fax (303) 202-4694**
|
en
|
converted_docs
|
208624
|
{width="1.3395833333333333in"
height="0.9208333333333333in"}
Voluntary Report - public distribution Date: 10/21/2002
GAIN Report \#CU2004
**Cuba**
**Market Development Reports**
**Cuba**
**2002**
Approved by:
**Margie Bauer**
**Caribbean Basin ATO**
Prepared by:
James E. Ross & Maria A. Fernandez Mayo
> **Report Highlights:**
>
> **Cuba=s market for food sold for dollars in the retail, food service
> and food processing sectors is estimated at \$650 to 700 million per
> year in this University of Florida, International Agriculture Trade
> and Development Center Report. The complex distribution channels and
> key players, described in great detail, are evolving with every sale
> of U.S. food products to Cuba. Factors affecting the current and
> future market are also explored.**
Includes PSD changes: No
Includes Trade Matrix: No
Unscheduled Report
Miami \[C11\], CU
**Cuba: Overview of the Dollar Food Market**
**\--An Exploration of the Purchasing and Distribution System \--**
James E. Ross and Maria Antonia Fernandez Mayo[^1]
Cuba\'s purchasing and distribution system servicing the market for
dollar foods[^2] is decentralized and complex. It is composed of: 1)
retail stores trading only with dollars, 2) hotels and restaurants
catering to tourists for dollars, 3) food processing companies that sell
a portion of their production within Cuba for dollars, and 4)
institutions that receive imported food products.
System Structure
Dollar foods purchased and sold in Cuba are both produced domestically
and imported through national and foreign enterprises operating in Cuba.
Domestically produced dollar foods and beverages are grown or
manufactured by state-owned or controlled entities or by foreign
companies operating under Foreign Investment Law No. 77. Small private
farmers may also participate in the dollar food market; however, their
participation in terms of dollars is relatively insignificant.
State production entities include national food manufacturers, state
farms, and state-controlled agricultural cooperatives. A mixed
enterprise, an entity with foreign interest, generating dollar food
products may include a food manufacturer or an agricultural production
unit. A mixed enterprise producing dollar foods may take the form of a
joint-venture investment, an international economic association
contract, or a cooperated production agreement. There are no totally
foreign owned food production or manufacturing operations in Cuba.
One government agency, Alimport (Empresa Cubana Importadora de
Alimentos) is Cuba\'s main food and feedstuff importing company. Other
importing agencies of dollar foods include government-owned holding
companies that supply retail dollar stores, and government-owned
companies and mixed enterprises that own or operate tourist hotels,
resorts and restaurants. Some joint-venture hotels have agreements under
the foreign investment law to import direct, without going through a
government purchasing company. Because of the foreign company\'s
supplier contacts and expertise, government-owned hotels, at times, may
import through the joint venture or contract agreement companies. The
supply and quality of food products available through the importing
company may determine which source is used.[^3]
Foods sold or made available direct to consumers and the tourist
industry for dollars, generally, include those products classified as
consumer-oriented, but may also include products classified as
intermediate and bulk. Consumer-oriented products are imported under the
jurisdiction of the Cuban Ministry of Public Health (Ministerio de Salud
Publica\--MINSAP). Imports of intermediate and bulk agricultural
products are regulated by the Ministry of Agriculture (Ministerio de la
Agricultura\--MINAGRI). [^4]
Consumer-oriented foods may be imported through several different
agencies and companies, while some intermediate products and all bulk
commodities are imported by Alimport. Some consumer-oriented foods may
also be imported by Alimport to supply ration stores and other
institutions. Alimport also purchases imported food ingredients for the
food industry sector. In addition, dollar stores and other
government-owned companies may receive food products imported by
Alimport.
Other entities involved in the dollar food chain include in-home family
restaurants (restaurantes particulares), known generally as
Paladares.[^5] These restaurants are limited to family employment and
may serve only 12 customers at one time. They may charge their customers
in either pesos or dollars; however, most paladares request dollars for
payment. Paladares do not import food products, but purchase those
products through the retail dollar stores, state-operated agricultural
markets, semi-private agromercados, and from other sources. Economic
impact of the private restaurants on the dollar food market is
negligible.[^6]
Stores Selling Dollar Foods (TRDs)
Retail stores selling food and beverage products for dollars (ventas
minoristas en divisas) are scattered throughout the country. The stores
are owned by the Cuban government. No foreign investment in these stores
has been permitted. In all of these retail stores, known as Dollar
Stores or TRDs (Tiendas de Recuperacion en Divisas), food products that
have been imported or produced domestically are sold for dollars.
In Havana there are approximately 300 Dollar Stores, and in the entire
country roughly 1,000. Most of the Dollar Stores outside Havana are
located in the tourist areas of Varadero, Ciego de Avila, Holguin,
Santiago de Cuba, Camaguey and Pinar de Rio.
Cuba\'s dollar food market encompasses many semi-autonomous
government-owned and operated companies. The companies are incorporated
and have the Sociedad Anonima (S.A.) designation. Generally, the
companies control their own hard-currency revenues and can make
purchases on their own account. Sociedad Anonima companies must remit a
monthly payment to the government. The amount is negotiated between the
government and the company directors.[^7]
Names of the major dollar store chains and the government corporations
owning them include:
Tiendas Panamericanas (CIMEX S.A.)
Tiendas Universo (CUBANACAN S.A.)
Tiendas Caracol (HORIZONTES Hoteles S.A.)
Tiendas y Supermercados de la Sociedad Meridiano S.A.
> (CUBALSE Corporation \-- imported foodstuffs valued at \$19.7 million
> in 2001)
Tiendas TRD Caribe (GAVIOTA S.A.)
Tiendas de Habaguanex S.A. (HABAGUANEX S.A.)
Priorities for supplying the stores, whether food or non-food products,
are: first, products of national origin; second, mixed enterprises
(companies with foreign investment, either joint ventures, international
economic association contracts, or cooperative production agreements);
and third, foreign sources.
For example, products of national origin, the highest priority, could be
supplied by a state-owned company such as Frutas Selectas S.A. The
semi-autonomous company selects the best fruits and vegetables produced
by state-owned farms and state-controlled cooperatives and markets the
products to the tourist hotels and restaurants. Mixed enterprises, the
second highest priority, could include Sherritt Green or Tropiflora.
Sherritt Green is a government joint venture with Sherritt International
of Canada. Tropiflora is a joint venture with Israeli interests. Both
companies produce fruit and vegetables for sale to tourist hotels and
restaurants. The third priority would be food imports.
Prices of products sold in the Dollar Stores are normally higher than
those offered in other internal food markets. The consumer may pay a
price that is 200% or more above the imported price or the price in one
of the internal food markets.[^8] Products similar to those available in
the dollar stores may be found at lower prices in other internal
markets.
In addition to dollar stores, the Cuban retail food market includes:
ration stores (Mercado de Alimentos Racionados); agricultural or
farmers\' markets (Mercado Libre Agropecuario\--MLA); Ministry of
Agriculture markets (Mercado de Agricolas a Precios Topados);
agricultural \"fairs\" held on the last Sunday of each month (Las Ferias
Agropecuarias); urban garden markets (ventas en los huertos y
organoponicos); places of sale direct to the consumer by the CPA
(Cooperatives of Agricultural Production) and the EJT (Youth Work Army);
and the Cadena de Tiendas Imagenes\--stores selling processed foods
under the jurisdiction of the Ministry of Internal Trade\--MINCIN.[^9]
Of all of Cuba\'s official internal food markets, only the dollar stores
trade in dollars. The other internal food markets trade in pesos, but do
compete with the dollar stores. Quality of products in the dollar stores
is normally superior to those in the other internal markets.[^10]
In May 2002, the Cuban government announced that prices in the dollar
stores would be increased significantly; however, food prices were to
remain the same or decline. In fact, many food prices did fall, only
prices for chocolate products and preserved foods increased. The
increase, generally, was 10 to 15 U.S. cents above the previous price.
Tourist Hotels and Restaurants
Cuba rates its hotels on a star basis, ranging from one to five stars. A
five-star hotel is better than a four-star, etc. The rating system does
not compare facilities and services to comparable stars of hotels in
other countries, but is used only to compare quality of hotels within
Cuba. With current standards, most international tourism and the
resulting market for dollar foods, is concentrated in three, four and
five-star hotels. While two-star and one-star hotels provide a limited
market for imported dollar food products, the major source of food for
these hotels is the domestic market.
Cuba has more than 300 tourist properties with about 40,000 rooms. Less
than 100 of the tourist hotels are classified as four- and five-star
hotels. Four-star hotels account for approximately 40% of room
occupancy, while five-star and three-star hotels each account for about
20%. Annual growth in tourism in the 1990s was more than 15%, but in
2001 the number of tourists was only slightly more than the year before,
approximately 1.8 million. The slow start for tourism in 2002 could
result in even fewer tourists than recorded each of the last two years.
In the early 1990s, when tourists numbered some 300,000, only 12% of the
products and services required for the tourist industry were provided
through national production. Almost all food products needed for tourist
hotels and restaurants were imported. All of the beer and bottled water
served to tourists was imported. As a result of economic reforms in the
mid-1990s and pursuit of a policy of protectionism, the supply situation
was reversed and Cuba now supports some 65% of the tourist hotel and
restaurant needs through national production. One national brewery, a
joint venture, supplies about 95% of the tourist market for beer and
another joint venture supplies almost all of the bottled water.[^11]
The semi-autonomous companies serving the tourist industry include:
Corporacion Cubanacan, Grupo Hotelero Gran Caribe, Horizontes Hoteles,
Habaguanex, Grupo de Turismo Gaviota, Islazul, Grupo de Recreacion y
Turismo Rumbos, Compania de Marinas Puerto Sol, and the Complejo de
Convenciones. To some extent, all of the companies compete with each
other, but they concentrate on different segments of the tourist market.
No foreign investment has been introduced in the ownership of these
companies.
[Corporacion Cubanacan S.A.]{.underline} accounts for more than 40% of
the tourist market. It was formed to operate four and five star hotels,
restaurants, cafeterias, retail stores, water recreation centers,
tourist health facilities, and tourist reception and other recreation
centers. Cubanacan also produces and sells artisan handicrafts and
operates a transportation company that provides tour buses and rents
automobiles.
Many of the tourist hotels, administered as either international
economic association contracts or joint ventures, involve Cubanacan.
Joint investment arrangements under Foreign Investment Law No. 77 have
been developed by Cubanacan with Grupo Sol Melia (Spain), LTI (Germany),
Golden Tulip (Holland), and SuperClubs (Jamaica).
[Grupo Hotelero Gran Caribe S.A.]{.underline} operates more than 40
hotels classified as four and five star hotels. Gran Caribe hotels have
9,500 rooms for tourists scattered throughout the country, but are
located mainly in Havana and Varadero. In addition, the group operates
three primary tourist attractions in Havana, the Restaurant La Bodeguita
del Medio, Bar and Restaurant La Floridita and the Cabaret Tropicana.
[Horizontes Hoteles S.A.]{.underline} is a hotel chain, mostly three and
four stars, with more than 7,000 rooms. Horizontes also operates
facilities with mineral water baths, treatment for stress, etc. One spa
(centro hospitalario que atiende multiples enfermedades) treats patients
with health problems characteristic of the Caribbean.
[Grupo de Recreacion y Turismo Rumbos S.A.]{.underline}, founded in
1994, has grown approximately 20% annually. It operates facilities for
both national and international tourists in Cuba\'s major tourist cities
and rustic locations. Rumbos is diversified, and has established
businesses in: a travel agency; various types of restaurants, including
fast food (comidas rapidas, restaurantes y parrilladas); small lodges in
cities, on beaches, in the country, at golf courses, airports, and
marinas; and eco-tourism with 40 routes. Currently, Rumbos is planning
eight new golf courses to meet the standards for both international golf
amateurs and professionals.
[Compania de Marinas Puerto Sol S.A.]{.underline} was created to develop
marinas, piers, recreational boat activities, etc. The company owns 390
two star and local hotels to meet the needs of tourists and nationals.
[Grupo de Turismo Gaviota S.A.]{.underline} is a tourism company
controlled by the Revolutionary Armed Forces. It is dedicated to
operation of four and five star hotels, development of marinas,
restaurants and cafeterias, recreational water facilities, and health
facilities for tourists. It also operates a transportation company that
offers tourist buses and rental of automobiles and taxis.
[Habaguanex S.A.]{.underline} belongs to the historical office of Havana
(Oficina del Historiador de la Ciudad). It was established to develop
three and four star hotels for international tourists in the Historic
Center of Old Havana (Centro Historico de la Habana Vieja). Currently,
it is renovating various hotels and opening restaurants in the oldest
part of the city.
[Islazul S.A.]{.underline} was established to develop two and three star
hotels for international tourists seeking low-cost accommodations.
[Complejo de Convenciones]{.underline} includes operation of the Palace
of Conventions (Palacio de las Convenciones), Hotel Palco, the
restaurants, Rancho Palco and El Palenque, and Club Habana. It also
administers the Sala de Expocisiones (PABEXPO), the Mansion Residencial
(Casa de Protocol \-- House of Protocol), and the auto rental agency,
Palcocar. Basically, the complex specializes in the development of
tourist events and conventions.
A few foreign companies have negotiated contract agreements that permit
them to import food directly for their tourist facilities. Foreign
companies having arrangements under Foreign Investment Law No. 77 with
the Cuban companies often operate as hotel administrators and assume
responsibility for food and beverage services. Some have taken equity
positions in the hotels owned by the holding companies. These include,
among others: Grupo Sol Melia and Hoteles C from Spain; Accor and Club
Med from France; LTI and RIU from Germany; Delta Hotels and Resorts,
Commonwealth Hospitality Ltd., and Liesure Canada Inc. from Canada;
Viaggi di Ventaglio and Press Tours from Italy; and SuperClubs from
Jamaica. About 30% of Cuba\'s hotels involve investments with foreign
companies. There are no totally foreign owned hotels in Cuba.
Food Manufacturers
Food processors in Cuba import substantial amounts of food ingredients
for use in the manufacture of food products. About 20% of the national
production is sold for dollars, either through sales for dollars in Cuba
or by exporting.
All food manufacturers in Cuba are under the jurisdiction of the
Ministry of Food Industries (Ministerio de la Industria
Alimenticia\--MINAL), created in 1965. MINAL oversees industries
manufacturing, principally, milk and meat products, cereals,
confections, bread, biscuits and crackers, pastries, fruit and vegetable
products, alcoholic beverages, water, soft drinks, and beer. Industries
milling bulk commodities, such as wheat and rice, also are under the
jurisdiction of MINAL.
At the time of the establishment of the Ministry of Food Industries,
Cuba was importing most of the processed food consumed. In addition,
most of the primary material used by the existing national food
manufacturing industry was imported. There was little growth in food
processing until food research centers were introduced. Between 1970 and
1975, the Food and Agricultural Organization of the United Nations and
the governments of Sweden and the Netherlands provided financing for
pilot plants devoted to applied research in the lactic, meat-processing,
and vegetable and fruit-preserving branches.[^12]
International assistance from 1975 to 1990 for research and development
in Cuba\'s food industry led to substantial growth in food
manufacturing. Production increases during this period included: canned
meats, 157%; canned fruits and vegetables, 66%; cheeses, 143%; and wheat
flour, 126%. The number of production lines had grown from 57 in 1975 to
more than one thousand by 1989.
With the loss of Soviet and Eastern Block trade preferences in 1989 and
1990, there was a progressive decline in Cuban production in general
until the mid-1990s. Food industry executives were forced to introduce
products that made it possible to raise production volumes through
increased use of extenders and substitutes in products destined for the
domestic market. The imperative was to maintain nutritional values
despite a reduction in agricultural production, especially of meat
products.
Between 1989 and 1994, the worst period for the Cuban economy, the food
processing industry registered a dramatic decline of 42% in the value of
its output, along with a reduction of 74% in national raw-material
supplies from the agricultural sector, and a 34% drop in imported raw
materials.[^13]
In 1994, Cuba\'s production of manufactured food products was 45% of the
output in 1989. The output of beverages was 56%. By 2000, beverage
production had increased to 81% of the 1989 level. Food manufacturing
increased more slowly, reaching only 54%. While the food industry has
had significant growth since 1994, production remains substantially less
than the output level of more than a decade earlier.[^14]
Production lines that are growing the most include: beer, soft drinks,
mineral water, alcoholic beverages for export, powdered milk, pastas,
flour, soft cheese, ice cream, and yogurt. Wheat flour production also
showed some increase, while milled rice production decreased
substantially. In 1998 the value of production among eight \"Uniones\"
in MINAL was \$1.25 billion. About \$25 million was destined for dollar
earnings, either through the dollar stores or by exporting. Growth of
production in 1998 was 27% more than the year before. (More recent data
are not available to the authors at this time.)
Sixteen of Cuba\'s food manufacturing companies are joint ventures and
12 are Cooperated Production Agreements.[^15] Each of the 16 mixed
enterprises are associated with Coralsa (La Corporacion
Alimentaria\--CORAL S.A.), a holding company constituted within MINAL in
1996. The Ministry restructured in the mid-1990s to promote increased
support for food industry firms operating with foreign capital.
Participation of Coralsa in the 16 enterprises ranges from 40% to 50%.
Fixed assets of the companies at the time of restructuring were placed
at \$36 million. They had \$4 million in working capital and \$25.5
million in the process of investment.
Enterprises associated with Coralsa produce and market sausages, candies
and confections, products derived from wheat, instant beverages, wines,
beers, soft drinks and mineral waters, as well as technological and
refrigeration equipment for the food industry. In 1994 the mixed
enterprises had a combined value of production of \$20 million. By 2000
the value of production of the mixed enterprises had reached \$140
million.[^16]
Another area of activity in the Cuban food industries sector has been
the overseas food processing operations in which there is Cuban capital
and technology. A portion of the earnings from these industries is
returned to Cuba. Cia. De Tasajo de Uruguay, for example, was
established in Uruguay to process jerked beef and other meat products
for export to Cuba and other Latin American and African countries. A
Coralsa-owned company, Carnes del Mercosur S.A., located in Cuba,
imports and markets the products in Cuba for the internal market.
Institutions and the Role of Alimport
All dollar purchases of food for use in institutions are conducted
through Alimport, a government-owned company operating under the
auspices of the Ministry of Foreign Trade. Alimport decides who to do
business with, what quantity to buy based on end customers\' needs, and
negotiates and fixes prices. It also decides buying terms depending on:
seller, delivery terms and place, financial facilities, and freight
advantages.[^17]
For FAS and FOB operations, Alimport relies on a logistics group in
charge of chartering vessels and monitoring the whole process of
transportation from the operational standpoint. Alimport works with
Cuban flag vessels, brokers, or directly with foreign flagship owners,
and agrees on terms and operates with them as per international practice
standards.
For CFR, CIF, CPT and CIP operations, the Alimport logistics group
ensures shipping terms are in accordance with contract terms. It also
follows up on shipment and carriage of goods until delivery at port of
destination. Alimport negotiates and agrees on discharging terms with
port terminal and stevedoring companies. According to Alimport\'s
president, Alimport looks after needs of its end-customers and its
purchasing strategy is based on such needs.[^18]
In May of this year, the Cuban government designated Alimport as the
exclusive purchasing agent for U.S. based companies that want to export
food products direct from the United States to Cuba. Alimport will
purchase agricultural and branded food products from U.S. based
companies and re-sell, or transfer, the products to other Cuba-based
companies.[^19]
# Estimated Value of the Dollar Food Market
Data are not available to indicate the value of food imported or
produced domestically for each of the four major areas distributing
dollar foods and beverages dollar stores, tourist hotels and
restaurants, food manufacturers and institutions. Data and information
that are available, however, indicate food imports amount to
approximately \$650 to \$700 million, or about 14% of Cuba=s total
imports.[^20]
Approximately half of the food imported by Cuba meets the
classifications of intermediate and consumer-ready products. The
remaining half consists of bulk commodities, such as wheat, coarse
grains, pulses, and rice. Pulses and rice may enter the dollar store
market direct, as well as be provided to ration stores and institutions.
Most of the bulk and some of the intermediate products are resold to the
food manufacturing companies. A large percentage, perhaps 50%, of the
food products imported are resold through dollar stores and the tourist
hotels and restaurants.
Food products sold through the Ministry of Agriculture to the tourist
sector and dollar stores in 2001 totaled \$167.5 million, an increase of
3.46% compared to gross revenues of US\$161.7 million reported in
2000.[^21] Cuba reported gross revenues from marketing agricultural
commodities to the tourism sector of US\$59 million in 1998 and US\$70
million in 1999. Allowing for continued growth, an estimated value of
food produced under the auspices of the Minister of Agriculture and sold
for dollars this year could reach \$170 million to \$200 million.
Processed foods sold through the Ministry of Food Industries to the
tourist sector and dollar stores, assuming most of the mixed enterprise
production and some of the national company production enter the dollar
market, could range from \$200 million to \$300 million.
The value of products grown in Cuba by mixed enterprises is unknown, but
could range from \$20 to \$30 million. Food from domestic production
sold in Paladares for dollars is estimated to be relatively small.
Combining the estimated data provides a total of all foods sold in Cuba
for dollars to an estimated level ranging from \$800 million to \$1
billion.[^22] Tourists[^23] and foreign businessmen[^24], along with
Cubans who receive dollars through remittances, and various means, are
the sources of hard currency to buy the dollar foods.[^25]
The European Union and Canada provide about half of the food imports,
while Mexico, and Latin American (Argentina and Brazil for soybean
products) and Asian countries (China, Thailand and Vietnam for rice
imports) are also important sources of food imports. More than half of
Europe=s agricultural exports to Cuba, which totaled \$185 million in
1999, consisted of wheat flour, vegetable oils and consumer-ready
products, primarily dairy products and poultry meat. Wheat accounted for
about 45% of the total. Canada=s agricultural exports to Cuba, \$115
million in 1999, were largely (83%) pulses and consumer-oriented
products, such as red meat, poultry and dairy products.
Factors Affecting the Current Market
10 Cuba\'s purchasing and distribution system for dollar foods is an
intricate network of organizations authorized to import and distribute
food products in Cuba for dollars. Organizations include government
agencies, state-owned companies, mixed enterprises, associated foreign
firms and licensed private restaurants. They all purchase and/or sell
food directly or indirectly for dollars in Cuba.
20 TRDs (dollar stores) and the tourist hotels and restaurants are the
primary markets for dollar foods in Cuba. Ration stores, institutions
and food industries provide the largest market for bulk commodities, and
an important market for foods classified as intermediate and
consumer-oriented products.
30 Alimport is the country\'s largest food importing company. Food
imported by Alimport is distributed to Cuban consumers for pesos, or
sold for dollars through various channels. Distribution of food sold for
pesos is made through ration stores and government institutions. Some of
the food products and beverages imported by Alimport are sold for
dollars through dollar stores, tourist facilities, and food processors.
Government tourist hotel and restaurant holding companies, government
agencies importing for dollar stores, and mixed enterprises operating
tourist facilities are also important importers of food sold in Cuba for
dollars.
Factors Affecting the Future Market
10 The decision by the government of Cuba to make Alimport the exclusive
importing agency for food and agricultural products from the United
States raises questions regarding market strategy for U.S. exporters.
For example:
> a0 Will Alimport increase food imports from the United States to
> replenish the country\'s food reserves diminished by Hurricane
> Michelle? If so, the potential market would appear good for food
> products, such as rice, pulses, vegetable oil, dairy products, chicken
> meat, and wheat flour.
>
> b0 A large number, reportedly 50 to 100[^26], Cuba-based mixed
> enterprises,
>
> international association contract entities and government-owned
> companies have
>
> authorization from the Cuban government to import food products. Since
> November 2001, many of these companies have established contacts with
> U.S.-based companies. Will these companies be able to import the
> products they want through Alimport?
>
> c0 Also, will any of Cuba\'s authorized importing companies, other
> than Alimport, be permitted to import U.S. branded products from third
> countries, or will Alimport be the exclusive importer of these
> products?
40 Growth of Cuba\'s dollar food market, to a large extent, is
contingent on continuation of a relatively high level of remittances,
and increases in tourism and foreign investment. With elevated security
concern worldwide following events on September 11, 2001 in the United
States, and economic recession in Canada and Europe, growth of tourism
in Cuba has decreased. Foreign investment also appears to be on a
descending trend. With less tourist growth and shrinkage of disposable
income for tourists, as well as reduced foreign investment, Cuba\'s
dollar food market could be affected negatively.
50 Perhaps the greatest unknown is the future of travel restrictions for
U.S. tourists to Cuba. Lifting of the U.S. imposed restrictions on
travel could result in a large number of tourists going to Cuba. This
would create a substantial increase in demand in Cuba for dollar food
and beverage products.
**For more Reports on Cuba, please contact our office:**
**Caribbean Basin Agricultural Trade Office**
**Foreign Agricultural Service**
**United States Department of Agriculture**
909 SE 1^st^ Ave, Suite 720
Miami, FL 33131
Phone: (305) 536-5300
Fax: (305) 536-7577
email: [[email protected]]{.underline}
website: [http://www.cbato.fas.usda.gov]{.underline}
Margie Bauer, Director
Email: [[email protected]]{.underline}
Courtesy Professor and Research Associate, respectively, Department of
Food and Resource Economics, Institute of Food and Agricultural
Sciences, University of Florida. Based on a paper presented at the
Annual Meeting of the Association for the Study of the Cuban Economy
held in Coral Gables, Florida, August 1-3, 2002. Contact
[[email protected].]{.underline}
[^1]: The authors are Courtesy Professor and Research Associate,
respectively, Department of Food and Resource Economics, Institute
of Food and Agricultural Sciences, University of Florida. A more
detailed report on Cuba\'s dollar food market will be available
later this year. For a copy, contact [email protected].
[^2]: As used in this paper, the term \"dollar foods\" refers to food
and beverage products, whether imported or produced domestically,
that are sold to consumers, either foreign or Cuban, for dollars.
Dollar foods also include ingredients purchased with dollars or sold
for dollars by the food processing industry.
[^3]: Caribbean Basin Agricultural Trade Office of the USDA/Foreign
Agricultural Service in Miami. See recent reports on food laws and
the food service sector, GAIN Reports #CU2001, 2002, and 2003.
[^4]: ibid.
[^5]: Paladar, translated means palate or taste, but the origin of the
use for the Cuban family restaurants is said to be taken from a
Brazilian soap opera. The main character goes to the capital and
establishes a chain of small restaurants called Paladares.
[^6]: Henken, Ted. Tulane University. Procedings of the Tenth Annual
Meeting of the Association for the Study of the Cuban Economy
(ASCE), Miami, Florida, Aug. 3-5, 2000, p. 331.
[^7]: Cuba: A Guide for Canadian Businesses. Department of Foreign
Affairs and International Trade. The Canadian Trade Commissioner
Service, June 1999.
[^8]: Dr. Armano Nova Gonzalez, Profesor Titular Adjunto de la
Universidad de La Habana, Cuba\--Reflexiones Sobre su Economia,
2002, p. 193.
[^9]: ibid.
[^10]: For detailed information on the internal markets, including price
comparisons and an explanation of why consumers buy at TRDs when the
same product can be purchased for less at other markets, see Jose
Alvarez\'s article on page 305 of Cuba in Transition, Volume 11,
ASCE, Washington, D.C., 2001.
[^11]: Dr. Miguel Alejandro Figueras Perez. Cuba\--Reflexiones sobre su
Economia, 2002 p. 111 and 112.
[^12]: Business Tips on Cuba, August 1996, p. 20.
[^13]: op. cit., p. 18.
[^14]: Anuario Estadisticas de Cuba 2000. Capitulo VIII Sector
Industria.
[^15]: Dr. Omar Everleny Perez Villanueva. Cuba\--Reflexiones Sobre su
Economia, 2002 p. 90.
[^16]: Perez Villanueva. op. cit., p. 90.
[^17]: Presentation by Mr. Pedro Alvarez Borrego, President of Alimport,
Agricultural Sales Conference, Cancun, Mexico, Jan. 30-Feb. 2, 2002.
[^18]: ibid.
[^19]: On May 12, 2002, the president of Alimport reported that Alimport
would be the exclusive agent in Cuba for U.S. based companies.
U.S.-Cuba Trade and Economic Council.
[^20]: Estimate by authors based on USDA/FAS data showing about \$600
million in 1999 for food imports.
[^21]: U.S.-Cuba Trade and Economic Council. March 18, 2002.
[^22]: This is a preliminary estimate by the authors. It is hoped that a
more substantiated estimate can be included in the study underway.
(A reminder that an estimate of value of food entering the dollar
market in Cuba does not include food imported by Cuba that enters
the peso and institutional markets.)
[^23]: Tourists pay for food with hard currency at tourist hotels, and
provide tips for services. Those dollars are used, largely, to make
food and other purchases in the dollar stores.
[^24]: Some mixed enterprises supplement workers\' income with dollars,
either through negotiated arrangements with the Cuban government or
through other means. The dollars are then used by the Cuban workers
to purchase dollar foods and other dollar items.
[^25]: Remittances, money sent to Cubans by family members and other
contributors living overseas, are generally estimated to range
between \$600 million and \$1billion annually. These dollars, while
the route may not always be direct, end up primarily being used in
the dollar stores.
[^26]: Caribbean Basin Trade Office, USDA/FAS. (More than 300
state-owned , but decentralized, enterprises had been licensed to
import all products as of 1999 by the Ministerio del Comercio
Exterior (MINCEX), Ministry of Foreign Trade, according to the
Canadian Department of Foreign Affairs and International Trade.)
|
en
|
markdown
|
294346
|
# Presentation: 294346
## Enforcement of IP Rights – Private Responsibilities and Government Solutions
- Office of External Affairs
- United States Patent and Trademark
**Notes:**
Speak to you on how to enforce your IP Rights.
The question we’ve posed in the agenda is “Who is responsible for enforcing my IP rights?” The answer is you are, as the owner of the IP.
In a sense, IP rights are no different than regular property rights. As a property owner you are responsible in protecting your own personal property. The government can help you, and when transgressions against those rights occur, just as in the case of real property, the government can step in and provide solutions. Thus we have our title “Enforcement of IP Rights Private Responsibilities and Government Solutions.”
Actually, we will look at this as a three step process:
1- is to identify your IP. In other words, locate or find out what you have to protect.
2- once you have found the IP, then claim it as your own.
3- is enforcing the IP rights. That is once we’ve identified it, claimed it and have rights in it, how do we enforce it and stop others from taking it away or using it without our permission.
Following this presentation, we will be answering the question “Where Can I Go For Help Locally?”
I will touch on this issues, but in the upcoming presentation will discuss in more depth, what resources we as the government can provide to help you enforce those rights that you have acquired.
## Protecting Your Intellectual Property Rights
*How do you protect your IP rights?*
*Take a Three-Step Approach!*
- 1. Identify IP
- 2. Secure IP
- 3. Enforce IP
**Notes:**
Again, three step process. Will cover---
How to identify your IP.
How to locate and identify your IP assets
(IP audit)
How to secure your IP?
Strategic and Operational Measures
Tips to prevent the theft of your intellectual property before it happens
(Contracts with employees, conducting due diligence before transaction, etc.)
3. How to enforce your IPR?
Legal Measures To Remedy Theft
Understanding options if your intellectual property is stolen
## STEP 1) Identify IP
Conduct an “Internal IP Audit” to identify:
What is already protected?
What else can be protected?
- Conduct an “Internal IP Audit” to identify:
*What is already protected?*
*What else can be protected?*
- Protecting Your Intellectual Property Rights
**Notes:**
In order to protect your company’s IP, you will first need to identify your company’s IP.
Earlier today you learned of the different forms of IP. Now, we will have to apply that knowledge and analyze the various components of your business.
there are materials for which the business already may have protection
(things that are already registered or are in the process of being registered, such as pending applications)
2) then the analysis turns to determining what can be afforded protection.
## Conducting an Internal IP Audit
Trademarks:
Registered Marks (Foreign and Domestic)
Business Names (Registered, DBA)
Words, Slogans
Logos, Icons, Graphics
Domain Names
Product Packaging/Configuration
Website Design
Sound, Color, Scent
Trade Dress:
Packaging
Point-of-sale Displays
Website Design
- Trademarks:
*Registered Marks (Foreign and Domestic)*
*Business Names (Registered, DBA)*
*Words, Slogans*
*Logos, Icons, Graphics*
*Domain Names*
*Product Packaging/Configuration*
*Website Design*
*Sound, Color, Scent*
- Trade Dress:
*Packaging*
*Point-of-sale Displays*
*Website Design*
- Identifying Your Intellectual Property
**Notes:**
First- Assessment
What Trademarks do you own or Potentially have?
Anything capable of identifying/distinguishing your business
Registered marks (domestic and foreign)
Pending applications
Business names
Logos
Slogans
Domain names
Trade Dress:
Product packaging or configuration
Website Design
Remember: Anything used to identify or distinguish the source of goods
## Conducting an Internal IP Audit
Copyrights:
Registered Copyrights
Written Materials (Books, Manuals, Advertising)
Photographs
Illustrations
Computer Software
Music
Film/Video
Website Content
- Copyrights:
*Registered Copyrights*
*Written Materials (Books, Manuals, Advertising)*
*Photographs*
*Illustrations*
*Computer Software*
*Music*
*Film/Video*
*Website Content*
- Identifying Your Intellectual Property
**Notes:**
Next- Evaluate your copyrights
Determine what you have that you have copyrighted or can protect via copyright
Copyrights:
Registered Copyrights
Written Materials
Photographs
Illustrations
Computer Software
Music/Film
Website Content
## Conducting an Internal IP Audit
Patents:
Issued Patents (Foreign, Domestic)
Pending Applications (Provisional, Non-Provisional)
Invention Disclosure Statements
Mechanical Devices
Electronic Devices
Medicine/Medical Devices
Chemical Composition/Process
Computer-Based Business Process (Software)
- Patents:
*Issued Patents (Foreign, Domestic)*
*Pending Applications (Provisional, Non-Provisional)*
*Invention Disclosure Statements*
*Mechanical Devices*
*Electronic Devices*
*Medicine/Medical Devices*
*Chemical Composition/Process*
*Computer-Based Business Process (Software)*
- Identifying Your Intellectual Property
**Notes:**
Next- What can you patent
Look for potential patentable items:
e.g.
Mechanical Device
Chemical Composition/Process
Computer-Based Business Process (aka Business method patents or software patent)
Generally, there are three broad categories of patentable subject matter: processes, machines and articles of manufacture and use.
A process could be a method for making something, a method for using something, or a method for doing something. Processes include business methods, most software, medical techniques, Machines include devices and apparatuses. Articles of manufacture include mechanical devices, electrical/electronic devices and compositions of matter such as chemicals, medicines, biotech.
## Conducting an Internal IP Audit
Trade Secrets:
Customer Lists
Pricing/Cost Data
Customer Information and Sales Practices
Business Plans
Financial Data/Forecasts
Manufacturing Techniques
Design Manuals
Production Processes/Specifications
Survey/Research Data (including negative R&D)
Computer Software (source code)
Employee Knowledge
- Trade Secrets:
*Customer Lists*
*Pricing/Cost Data*
*Customer Information and Sales Practices*
*Business Plans*
*Financial Data/Forecasts*
*Manufacturing Techniques*
*Design Manuals*
*Production Processes/Specifications*
*Survey/Research Data (including negative R&D)*
*Computer Software (source code)*
*Employee Knowledge*
- Identifying Your Intellectual Property
**Notes:**
Next step in the Audit is examine business to determine what trade secrets you have to protect.
Next, determine if there are any Trade Secrets. Generally it is any information that is kept secret and provides a business with a competitive advantage.
Most business probably already have some that are protectable
Most common form of IP for a businesses. Can have an indefinite life, unlike patents
Unlike TM and patents, where federal law defines it, trade secret are covered by state law, so must look to the relevant state. But 44 states have adopted the Uniform Trade Secrets Act, so they have similar definitions.
It defines a trade secret as...(“... means information, including a formula, pattern, compilation, program, device, method, technique, or process, that: (1) derives independent economic value, actual or potential, from not being generally known to, and not being readily ascertainable by proper means by, other persons who can obtain economic value from its disclosure or use, and (2) is the subject of efforts that are reasonable under the circumstances to maintain its secrecy.”
For example-
Customer Lists
Pricing/Cost Data
Customer Information and Sales Practices
Business Plans
Financial Data/Forecasts
Manufacturing Techniques
Design Manuals
Production Processes/Specifications
Survey/Research Data (including negative R&D)
Computer source code
Employee Knowledge (inevitable disclosure theory)
-------Anything that that you have that if your competitor found out would give him an advantage
##
STEP 2) Secure IP
Confirm Ownership
Register/File for Protection
Maintain IP
_*STEP 2*_*) Secure IP*
- Confirm Ownership
- Register/File for Protection
- Maintain IP
- Protecting Your Intellectual Property Rights
**Notes:**
Once identified and determined what’s important, you can take steps to secure your IP
## Confirm Ownership of IP
Employee Contracts
Intellectual Property Assignments
License Agreements (In-Licensing and Out-Licensing)
Cooperative Research Agreements
Financing Agreements
Security Interests
Public Filings
Outside Contractor Agreements
Work-for-Hire Doctrine
- Employee Contracts
- Intellectual Property Assignments
- License Agreements (In-Licensing and Out-Licensing)
- Cooperative Research Agreements
- Financing Agreements
- Security Interests
- Public Filings
- Outside Contractor Agreements
- Work-for-Hire Doctrine
- Securing Your Intellectual Property
**Notes:**
1. CONFIRM YOU OWN THE IP
Review all documents and filings affecting title to IP to confirm a complete chain of title.
Review licenses and any contractual assignments.
Security interests, releases of security interests, changes of name
Review financing agreements, how is IP tied in?
Compare against information available to the public at the U.S. Patent and Trademark Office and the U.S. Copyright Office.
Have employees (or other parties) signed over the rights if they were involved making the IP?
Work-for-hire doctrine-
The general rule is that the person who creates a work is the author of that work. There is an exception to that principle called “works made for hire.” If a work is “made for hire,” the employer, and not the employee, is considered the author. The employer may be a firm, an organization, or an individual. Look to certain factors that characterize an “employer-employee” (Control over employee, status, (benefits, taxes) The closer an employment relationship comes to regular, salaried employment, the more likely it is that a work created within the scope of that employment would be a work made for hire.
## Register IP / File for Protection
U.S. Patent and Trademark Office
Foreign patent and trademark office
State-level trademark office
U.S. Copyright Office
Domain name registrar
No filing requirements for trade secrets
- U.S. Patent and Trademark Office
- Foreign patent and trademark office
- State-level trademark office
- U.S. Copyright Office
- Domain name registrar
- No filing requirements for trade secrets
- Securing Your Intellectual Property
**Notes:**
Once you have identified it- Prioritize IP to be pursued and protected
Those that provide real competitive advantage
Those have value in licensing, including cross-licensing
Those that enhance asset base of business
Those that can be used defensively to block competitors (specific for patents)
Evaluate benefits of protection vs. costs in getting protection
Patent filings are costly (financially and time-wise)
Consider maintaining as trade secret, instead of publicly filing for a patent.
2. REGISTER YOUR IP
Register your trademark with USPTO
File application for patent protection with USPTO
- maybe only a provisional patent applications (to lock in date of invention)
- maybe maintain invention as a trades secret and do not file for patent.
Register your copyrights with the U.S. Copyright Office at the Library of Congress
Can also file trademark at state level
Register with Customs (discuss later as part of administrative enforcement)
## Maintain IP
Pay maintenance and renewal fees
Safeguard your trade secrets
Internal Measures (inside your business)
External Measures (dealing with 3rd parties)
- Pay maintenance and renewal fees
- Safeguard your trade secrets
- Internal Measures (inside your business)
- External Measures (dealing with 3rd parties)
- Securing Your Intellectual Property
**Notes:**
MAINTAIN YOUR IP
Pay Maintenance fees and renewal fees,
**esp. for domain names
Protect Confidential Trade Secret Info. from disclosure (only considered a trade secret if business takes steps to keep the information confidential.
2.A. Internal measures to maintain secrecy
2.B. External measures to maintain secrecy.
## Safeguard Trade Secrets
Internal Measures:
Mark all trade secret and confidential documents “CONFIDENTIAL.”
Limit access and distribution of confidential documents to necessary employees.
Retrieve and shred any distributed documents.
Restrict physical access, lock premises, file cabinets, etc.
Use computer encryption, password protection, network security, esp. with laptop users.
- Internal Measures:
- Mark all trade secret and confidential documents “_*CONFIDENTIAL*_.”
- Limit access and distribution of confidential documents to necessary employees.
- Retrieve and shred any distributed documents.
- Restrict physical access, lock premises, file cabinets, etc.
- Use computer encryption, password protection, network security, esp. with laptop users.
- Securing Your Intellectual Property
**Notes:**
How to Protect trade secrets -
Implement protective measures-
Company policies and Employee Policies are very important
For Sensitive information be careful about:
Marking – “confidential” – everyone on notice that it is valuable information
Protection – physically secure the information
Storage – limit distribution
Transmission – be careful on how easily distributed case. Growing threat is use of small transportable USB/flash drives to store company data. Likely that the ease of which these can be lost, high risk of compromising trade secret info.
Destruction – shred and make sure documents are returned (e.g. failed mergers, departing employees, etc.).
If you don’t implement protective measures you jeopardized your trade secrets.
## Safeguard Trade Secrets
Internal Measures:
New Employees
Non-Disclosure/Confidentiality Agreements
Non-Compete Agreements
IP Assignments
Employee Manual
Policy and procedures on treatment of confidential and trade secret information.
Departing Employees
Return all confidential and trade secret materials.
Exit interviews to reconfirm non-disclosure and non-complete obligations.
- Internal Measures:
- New Employees
- Non-Disclosure/Confidentiality Agreements
- Non-Compete Agreements
- IP Assignments
- Employee Manual
- Policy and procedures on treatment of confidential and trade secret information.
- Departing Employees
- Return all confidential and trade secret materials.
- Exit interviews to reconfirm non-disclosure and non-complete obligations.
- Securing Your Intellectual Property
**Notes:**
Implement Internal Measures to safeguard trade secrets.
1. Non-Disclosure Agreement aka Confidentiality Agreement
A contract where a party promises that information conveyed will be maintained in secrecy. Trade secrets- only recognized if you keep them secret. Can also protect information that is not necessarily a trade secret. Can be used for non-employees also, such as in negotiations with 3rd parties to protect your IP/ confidential information.
2. Non-Compete Agreement
A contract where an employee agrees not to work for a direct competitor for a certain amount of time after leaving your company. Rule of reason (i.e. 1 year, limited geographically). Be sure to check state jurisdiction, b/c governed by state law. California has state laws that heavily restrict).
IP Assignment– Assigns ownership of that is created to employer/business.
EMPLOYEE MANUAL-
Enact policy and procedures regarding treatment of confidential information. Distribute to new employees. May courts consider terms within as if it’s a contract with the new employee.
Explains-
1. Marking things confidential, limiting distribution, using passwords...
2. For science-related business, where publications and speeches are popular explains when employees can make speeches and publications. Implements a review process for trade secrets
3. Procedure for submission of ideas and new patents; explains Invention Disclosure Statements; how to maintaining an Inventors Notebook (important to identify date of creation for patents)
FOR DEPARTEING EMPLOYEES- Conduct an Exit interviews-
Return and account for all confidential information.
Provide them copy of their NDA or non-compete
Remind them of their obligations –
Have them execute an “Acknowledgement” a document where that recognize their continuing obligations
Make sure exit process is uniform (1 person in HR do it) for consistency.
OTHER POLICIES-
Cultivate an awareness of IP among employees
Screen new employees for high ethical standards
Train employees and managers on safeguarding IP
## External Measures to Safeguard IP
Conduct IP Review of Transaction:
Identify the IP
Verify Ownership/Proper Chain of Title
Review Underlying Documents
(e.g. assignments, licenses, registrations, applications, financing agreements)
Assess the 3rd Party
Lawsuits/Threatened Claims
- Conduct IP Review of Transaction:
- Identify the IP
- Verify Ownership/Proper Chain of Title
- Review Underlying Documents
- (e.g. assignments, licenses, registrations, applications, financing agreements)
- Assess the 3rd Party
- Lawsuits/Threatened Claims
- Securing Your Intellectual Property
**Notes:**
In addition to Internal Controls you need External Controls
For many companies, the way they acquire their IP is through a 3rd party transaction.
Important with any business transaction to conduct due diligence
Transaction can be:
Acquisition
Merger
Licensing
Joint-Venture
Sale
Out-sourcing
Transactional Due Diligence- (obvious questions, but must be methodical)
Identify the IP
What is it?
– Do they/ have authority to buy/sell/license the IP?
Identify IP Owner
Are there proper assignments agreements? ...with proper consideration ... exclusive or non-exclusive...
Carefully review esp. in start-ups (ex. Employee invents something, company assumes it is theirs, files for patent, wants to license it... did employee sign a contract signing over invention?)
That’s why IP Assignments very important when hire new employees
- find out the policies they have to protect IP (ex. confirm NDAs are in place).
Any 3rd Party claims? Threats of lawsuits?
Examine the 3rd party – whether it’s a potential partner, vendor, outside contractor, consultant, licensor.
Want to know with whom you’re dealing. Do not share tech. and business secrets too readily
## External Measures to Safeguard IP
Conduct IP Review of Transaction:
Confidentiality/Non-Disclosure Agreement
Exclusivity
Territoriality
Field of use
Quality control
Inspections/Audits
Indemnification
- Conduct IP Review of Transaction:
- Confidentiality/Non-Disclosure Agreement
- Exclusivity
- Territoriality
- Field of use
- Quality control
- Inspections/Audits
- Indemnification
- Securing Your Intellectual Property
**Notes:**
External Measures to Safeguard IP
Before you enter into the transaction and reveal anything valuable-
Enter into NDA/Confidentiality Agreement - Protects your information in case deal doesn’t go through
Conduct IP Review of Transaction: Assess the Transaction-
If it’s a licensing agreement- is it
Exclusive or non-exclusive?
Can you sublicense?
What the scope?
What territory?
What time frame?
What field of use?
How will you make sure your IP is protected by the licensor?
Indemnification Clause in K- in case you get sued because the licensor didn’t really own the IP or because it may infringe some other IP
These are things to consider when entering into any IP transaction.
## External Measures to Safeguard IP:
Review market
Monitor competitor’s filings
Risk assessment
Maintain internal controls
Audit licensees
Private investigators
Take action to enforce when necessary
- Review market
- Monitor competitor’s filings
- Risk assessment
- Maintain internal controls
- Audit licensees
- Private investigators
- Take action to enforce when necessary
- Securing Your Intellectual Property
**Notes:**
Constantly Police your IP
Periodic review of market in key areas
Have employees monitor and report on new developments
Review competitors’ filings and registrations
Monitor internal controls to maintain secrecy safeguards.
Monitor and audit licensee’s to ensure compliance with licensing agreements
If infringement noticed. Take action, otherwise you risk waiver,
or barred by statute of limitations,
or court may consider consented.
## Protecting Your Intellectual Property Rights
_*STEP 3*_*) Enforce your IP*
- Legal Options:
- Civil
- Criminal
- Administrative
**Notes:**
Now that we have gone through and identified your intellectual property, and we have taken steps to secure rights in the intellectual property.
Need to enforce those rights...
How to enforce your IPR?
Legal Options To Remedy Theft:
Civil
Criminal
Administrative
## Enforcing Your Intellectual Property Rights
- Legal Options:
- 1. Civil
- State and Federal
- Alternative Dispute Resolution (ADR)
- 2. Criminal
- U.S. Department of Justice
- 3. Administrative
- U.S. Customs (Border Enforcement)
**Notes:**
Outlines the Legal options - if your intellectual property is stolen
Civil System
File Lawsuit in State or Federal Court
Consider Alternative Dispute Resolution (ADR)
Criminal System – Have criminal proceedings brought
U.S. Department of Justice
Administrative System – Seek administrative assistance
U.S. Customs (Border Enforcement)
U.S. Patent & Trademark Office
## Enforcing Your Intellectual Property Rights
- Enforcing IP Rights Through Civil System:
- Determine if IP infringed
- Send cease and desist letter
- Negotiate or enter into licensing agreement
- File claim
**Notes:**
Enforcing IP Through the Civil Court System:
First must determine whether your IP has been taken or copied
Need to make an infringement determination or if its trade secret whether its been misappropriated
Discuss Later in detail on the elements of infringement
If Infringed, Send Cease and Desist Letter
Negotiate or Enter into Licensing Agreement
File Claim By Court System or ADR (such as mediation or arbitration)
IP Litigation gets expensive very quickly, so considering ADR or entering into licensing agreement are important options
## Enforcing Your Intellectual Property Rights: Civil
*If Your IP Rights Have Been Infringed?*
- Methods of Resolving IP Disputes:
- Negotiate/Enter into Licensing Agreement
- Cease and Desist Letter
- File Lawsuit
- Alternative Dispute Resolution
**Notes:**
If you determine that your IP has been stolen, what next steps do you take?
Contact other party and negotiate/ enter into licensing agreement (should be an option throughout the process)
Send out a Cease and Desist Letter
Consider ADR
File Lawsuit
## Enforcing Your Intellectual Property Rights: Criminal
- Enforcing IP Through the Criminal System:
- U.S. Department of Justice
- Criminal Division: Computer Crime & Intellectual Property Section (CCIPS)
- U.S. Attorney’s Office: Computer Hacking and Intellectual Property Units (CHIPS)
- Federal Bureau of Investigation
- U.S. Immigration & Customs Enforcement (ICE)
- Online IP complaint form at: http://www.ice.gov
**Notes:**
Now we will consider Criminal System to Enforce your IP
US DOJ does criminal prosecution and investigation of IP related-crimes.
Criminal Division: Computer Crime & Intellectual Property Section - prosecutor
U.S. Attorney’s Office: Computer Hacking and Intellectual Property Units (CHIPS) – prosecutors
Specialized CHIPS units in CA, FLA, MO, NJ, NY, PA, TX, VA, WA
FBI – investigators
US Immigration & Customs Enforcement
The National Intellectual Property Rights Coordination Center (IPR Center)
IPR Center- multi-agency Center responsible for coordinating a unified U.S. Government response regarding IPR enforcement issues
They have an online form you can inform them of piracy and counterfeiting you may know of.
## Enforcing Your Intellectual Property Rights: Criminal vs. Civil
- Majority of IP enforcement actions in U.S. is civil not criminal
- Criminal cases = Higher burden of proof
- (beyond reasonable doubt vs. preponderance of the evidence)
- Criminal cases = Higher thresholds for penalties
- Criminal remedies can include prison term
- Factors evaluating whether to charge criminally:
- Organized crime involvement
- Public health and safety concerns
- Commercial nature
- Amount of loss and harm
**Notes:**
Briefly Compare Civil vs. Criminal Enforcement of IP
Majority of IP enforcement actions in U.S. are civil not criminal
Burden of proof is more difficult in criminal cases
- beyond reasonable doubt and willful (criminal) –
- preponderance of evidence (civil)
Higher thresholds for liability-
felony copyright infringement more at least 10 copies valued at at least $2.5K w/in 180 days. (crim)
civil infringement (no minimums)
Criminal remedies can include prison term
Factors evaluating whether to charge criminally:
Organized crime involvement
Public health and safety concerns
Commercial nature
Amount of loss and harm
## Enforcing Your Intellectual Property Rights: Administrative
- Enforcing IP Rights Through the Administrative System
- U.S. Customs and Border Protection:
- Protects federally registered copyrights and trademarks that are recorded.
- Detention, seizure and forfeiture of merchandise.
- Enforce U.S. International Trade Commission exclusion orders.
- Right to act on its own (*ex officio* authority).
**Notes:**
Next look to how your can enforce your IP by the US Administrative System
U.S. Customs System
Provides protection for federally registered copyrights and trademarks that are also recorded with U.S. Customs. (separate from registering with PTO or Copyright Office)
Involved in the Detention, Seizure and Forfeiture of Fake Merchandise
Right to act on its own called Ex officio authority – random examinations, warehouse sweeps
Also, enforces exclusion orders issued by US International Trade Commission resulting from unfair import investigations (patents).
## Enforcing Your Intellectual Property Rights: Administrative
- U.S. Customs Recordation Procedure:
- Record registered trademark and copyrights for protection:
- Must first be _registered_ with USPTO or Copyright Office.
- Patents not covered.
**Notes:**
To get protection, must record your trademark and copyright with Customs.
- copyright or trademark must first have been be registered with USPTO or Copyright Office. (separate procedure)
- Patent not covered because would have to make legal determination of patent infringement (scope of claims, etc.)
## Enforcing Your Intellectual Property Rights: Administrative
- U.S. Customs Recordation Procedure:
- At any time, owners may provide U.S. Customs with information on suspected infringers:
- Importers
- Manufacturers
- Country of origin
- Transport mode
- Entry port
- Suspected dates
**Notes:**
Owners may provide U.S. Customs with information on suspected infringers:
manufacturer, country of origin, entry ports, suspected dates, any other information they may have.
Once you record your IP, US Customs puts your info into their database accessible by CBP officers across the country and at all ports of entry. Customs can then seize infringing goods, and can start administrative proceedings against seized goods.
## Enforcing Your Intellectual Property Rights: Administrative
- U.S. Customs Recordation Procedure:
- Trademarks recordation = as long as trademark is registered.
- Copyrights recordation = 20 years, unless the copyright expires before that time.
**Notes:**
Record your registered trademarks and copyrights with them:
Trademarks are recorded for a term of years to run concurrently with the underlying registration.
Copyrights are recorded for 20 years, unless the copyright registration expires before that time.
## Enforcing Your Intellectual Property Rights: Administrative
- U.S. Customs Recordation Procedure:
- File Recordation Application electronically, at:
- https://apps.cbp.gov/e-recordations
- Application in hard-copy available at:
- http://www.cbp.gov
## Enforcing Your Intellectual Property Rights: Administrative
- U.S. Customs and Section 337 Investigations:
- U.S. Customs enforces International Trade Commission (ITC) exclusion orders that bar the importation of infringing goods.
- Right-holder can initiate process by filing complaint of infringement or unfair practices with ITC.
- Usually involves patent rights, since Customs has no authority to make patent infringement determinations.
**Notes:**
Under Section 337 of the United States Tariff Act of 1930, imported products that allegedly violate United States intellectual property rights can be barred from entry into the United States. Complaints under Section 337 are made to the United States International Trade Commission (ITC), and generally involve allegations of infringement of intellectual property rights, i.e. patents, trademarks or copyrights. Relief, in the form of an exclusion order (import prohibition of a specific article) or a cease and desist order (an order prohibiting a party from importing) or both, may be granted to the successful complainant.
The ITC can initiate an investigation under section 337 in response to a complaint or on its own initiative.
## Enforcing Your Intellectual Property Rights: Abroad
- Office of the U.S. Trade Representative (USTR)
- “Special 301” Process:
- Procedure used to identify countries that deny adequate protection for intellectual property rights.
- Countries may be designated “Priority Foreign Country”, or placed on the “Watch List” depending on level of IP protection.
- May be subject to sanctions.
- Review conducted each year, but may also be initiated at any time.
**Notes:**
Next, if considering to distribute your IP abroad also be aware of the
Office of the U.S.Trade Representative
“Special 301”
Procedure used to identify countries that deny adequate protection for intellectual property rights.
Countries may be placed on the “Watch List” depending on level of IP protection.
May be subject to sanctions.
Review conducted each year, but also OCR (out-of-cycle) if needed.
Can be initiated by industry.
Ex. Ukraine was PFC, just taken off, Brazil subject to OCR
## Enforcing Your Intellectual Property Rights: Abroad
- Seek local support to enforce your IP rights:
- Contact the local trade associations for your industry
- Contact local American Chamber of Commerce
- Contact local officials who enforce IP rights
- Hire a lawyer in the foreign market:
- Should work jointly with your U.S. lawyer providing local expertise
- Protect and enforce IP rights based on local law
**Notes:**
When entering a Foreign Market you should:
Determine the IP climate and seek local support to protect your IP
Contact the local trade associations for your industry
Contact local American Chamber of Commerce
Contact local officials who enforce IP
Hire a lawyer in the foreign market
Should work jointly with your U.S. lawyer providing local expertise
Take steps to protect and enforce your IP, based on local law
Under TRIPS we are seeing some of the same procedures such a the Customs and Border Enforcement issues I discussed.
The tips I mentioned before on protection and enforcement in the U.S. are just as applicable and should be considered here.
## Strategy Targeting Organized Piracy (STOP!) Initiative
- Most comprehensive initiative ever advanced to combat piracy and counterfeiting.
- Dismantle criminal enterprises that steal IP.
- Help companies establish their rights in the U.S. and abroad.
- Reach out to our trading partners and build an international coalition to block fake goods.
- Maintains a telephone hotline to contact an IPR
- legal expert:
*1-866-999-HALT*
**Notes:**
Lastly I would like to remind everyone about the STOP initiative.
Established in October 2004
It is the most comprehensive initiative ever advanced to combat piracy and counterfeiting.
It is designed to crack down on counterfeit and pirated goods
And also help small and mid-sized businesses in protecting their IP rights
We maintain a telephone hotline at 1-866-999-HALT
where IP experts are available to answer any questions you may have related to IP enforcement issues.
## Protecting Your Intellectual Property Rights
*How do you protect your IP rights?*
*Take a Three-Step Approach!*
- 1. Identify IP
- 2. Secure IP
- 3. Enforce IP
**Notes:**
Recap- three step process.
## Enforcement of IP Rights – Private Responsibilities and Government Solutions
- Office of External Affairs
- United States Patent and Trademark Office
**Notes:**
I hope you have found this presentation helpful and I thank you for your time.
|
en
|
markdown
|
862357
|
# Presentation: 862357
## USPHS Office of Force Readiness and Deployment Response Readiness Training Lifecycle
- “A continuous continuum”
- 1 MAR 2007
## Force Readiness Training Life Cycle
- Based on the National Response Plan, National Incident Management System
- Meets S3678 Pandemic and All Hazards Preparedness ACT objectives, DHHS Secretary’s goals
- Provides successive training building blocks
## OFRD Training Groundwork
**Training is a continuous continuum;**
** ****successive training becomes more complex**
## OFRD
**Response Education and Training Lifecycle for **
**USPHS Commission Corps Officers**
- The individual competencies and expertise of officers will be considered in
- assignment during deployments and in access to training opportunities
- It is a command expectation of all officers to be prepared, ready to deploy, and to
- exhibit leadership attributes regardless of training or deployment role
## Novice
- Leadership and Response
- Training begins with call to
- active duty
- Officers will meet basic
- readiness requirements
**Call to Active Duty – 1 Year**
##
KNOWLEDGE Objectives:
Officers will be able to describe response missions and expectations of officers
Officers will be able to explain the roles of response teams and tiers
Officer shall identify ESF-8 and specifically USPHS roles and responsibility according to the National Response Plan
Objectives for adoption of RESPONSE CULTURE:
Officers will be able to create a plan for meeting readiness standards within one year of Call to active duty.
Officers will initiate and complete the process for meeting readiness standards
- *KNOWLEDGE* Objectives:
- Officers will be able to describe response missions and expectations of officers
- Officers will be able to explain the roles of response teams and tiers
- Officer shall identify ESF-8 and specifically USPHS roles and responsibility according to the National Response Plan
- Objectives for adoption of* RESPONSE CULTURE*:
- Officers will be able to create a plan for meeting readiness standards within one year of Call to active duty.
- Officers will initiate and complete the process for meeting readiness standards
_**Goal**_: Officers will have *knowledge* of Response requirements and will adopt response *culture** *
## Responder Level
**Target 1 yr – 5 +**
- Drill down training for
- specific deployment roles
- Officers will deploy in
- response roles
## Goal: Officers will develop skills for specific deployment roles and will deploy in staff function
_**Goal**_: Officers will *develop skills* for specific deployment roles and will *deploy in staff function*
***KNOWLEDGE***** Objectives**:
- As appropriate, Officers will obtain skill through web-based training, drills and functional exercises in:
- Medical management of casualties, taking into account the needs of at- risk individuals.
- Public health aspects of public health emergencies
- Mental health aspects of public health emergencies
***DEPLOYMENT *****Objectives:**
- Officers will be trained and able to function in the public health management of disasters specifically in the areas of planning, operations, logistics, administration and finance
## Managerial Level
**Target Year 6- 20 +**
- Advanced Leadership
- Training
- Officers are capable
- of assuming leadership
- roles on deployment
- Note: Managerial training does not
- excuse Officers from being capable of
- fulfilling a responder role!
## Goal: Officers will develop skills for agency and organization management between the executive level and first level management
_**Goal**_: Officers will *develop skills* for agency and organization management between the executive level and first level management
***KNOWLEDGE***** Objectives**:
- Expand comprehension on how to support field level teams and assets
- Become experts in the roles and responsibilities of Federal, state, tribal, local, and private organizations during a public health emergency response
***DEPLOYMENT *****Objectives:**
- Officers will be capable of serving in Incident Command Roles as section chiefs, branch directors, Division/Group Supervisors, Team Leaders
## Executive Level
**Target Year 20 +**
- Executive Leadership
- Training
- Officers are capable
- of assuming senior
- leadership roles on
- deployment
## KNOWLEDGE Objectives:
Expertise in managing multi-agency coordination systems
Proficiency in advanced ICS
DEPLOYMENT Objectives:
Provide executive level multi-agency coordination
***KNOWLEDGE***** Objectives**:
- Expertise in managing multi-agency coordination systems
- Proficiency in advanced ICS
***DEPLOYMENT *****Objectives:**
- Provide executive level multi-agency coordination
_**Goal**_: Officers will *be prepared *to fill ICS roles as Unified Commander, Incident Commander, Command Staff in either area command or single command and to act as a Senior Health Official
## FY 07 OFRD Training Initiatives
**Learning Management System**
- Change to Blackboard
- One training system
- Community space
- Interface FEMA
- Enterprise Architecture/MOAS
- QA/QC
**Response Team Training **
**(Response through Manager)**
- National Priorities/HHS Playbooks
- Skills, drills, functional exercises across teams
- APHT’s, MHT’s, RDF’s
- DoD, Johns Hopkins, American Red Cross
- Ft Sam Houston – Camp Bullis
## FY 07 OFRD Training Initiatives
**Call to Active Duty (novice)**
- Identifying curriculum
- Tested 40% of operational concepts
- Need finalized curriculum approval from Transformation Officer to develop and test
**USPHS Scientific and Training Symposium**
- Available to all Tiers
- Quarantine and surge capacity
- CDC, University of Michigan, OFRD
**Direct Military Training Network BLS program for USPHS**
**HAMR team training curriculum**
## Managerial – Executive
IRCT Drill Down Training (Web Based)
Operations
Planning
Logistics
Admin/Finance
Leadership Training
Playbooks
Pan flu (workshop)
IND/RDD (Discussions plus tabletops)
Hurricanes (Discussions plus tabletops)
Possibly Earthquake, Anthrax, IED
- IRCT Drill Down Training (Web Based)
- Operations
- Planning
- Logistics
- Admin/Finance
- Leadership Training
- Playbooks
- Pan flu (workshop)
- IND/RDD (Discussions plus tabletops)
- Hurricanes (Discussions plus tabletops)
- Possibly Earthquake, Anthrax, IED
- FY 07 ASPR Training Initiatives
## Questions?
- CDR Kimberly Elenberg
- Medical Readiness Training Director
- 301-443-1476
- LCDR Patrick Denis
- Training Program Management Officer
- 301-443-1475
|
en
|
markdown
|
209373
|
# Presentation: 209373
## Computational Atomic and Molecular Physics for Transport Modeling of Fusion Plasmas
*Post-doctoral fellows*
- S.D. Loch, J. Ludlow,
- C.P. Balance, T. Minami
*Collaborators*
- N.R. Badnell, M.G. O’Mullane, H.P. Summers, K.A. Berrington, J.P. Colgan, C.J. Fontes, T.E. Evans, D.P. Stotler, P.G. Burke
*Principal Investigators*
- M.S. Pindzola, F.J. Robicheaux, D.C. Griffin,
- D.R. Schultz, J.T. Hogan
*Graduate students*
- M.C. Witthoeft, J. Hernandez, T. Topcu, A.D. Whiteford
## ITER Relevant Plasma Modeling Efforts
- Final choices for plasma-facing materials.
- Relevance of innovations in operational regimes.
- Chief experimental spectroscopic tools need reliable atomic data
- Be, C, and W components for the first wall.
- Study of Edge Localized Mode (ELM) transient in standard ITER operation
## ITER Relevant Plasma Modeling Efforts
- Two-dimensional, time dependent, multi-species transport code such as SOLPS (B2-Eirene) uses the ADAS database.
- Used for analysis at JET, ASDEX-Upgrade, DIII-D, JT-60, Tore-Supra, and Alcator C-Mod.
## Collisional-Radiative Modeling using ADAS
- Originally developed at JET
- Now used throughout the controlled fusion and astrophysics communities
- Solution to collisional-radiative equations for all atomic levels in all ionization stages of relevant elements. Thus requires
- Atomic structure for energies
- Radiative rates
- Collisional electron excitation rates
- Collisional electron ionization and recombination rates
- Collisional charge transfer recombination with hydrogen
## Collisional-Radiative Modeling using ADAS
- The problem is simplified through the assumption of quasi-static equilibrium for the excited states.
- The following data is produced, for ease of use in plasma transport codes
- Generalised collisional-radiative (GCR) coefficients
- Radiated power loss (RPL) coefficients
- Individual spectrum line emission coefficients
- We have completed the following sequences
- He, Li and Be
## AM collision calculations : Time independent R-Matrix
- Developed in the UK : P.G. Burke and co-workers
- Each atom modeled as : N-electron Hamiltonian
- Collision system modeled as : N+1 electron Hamiltonian
- Hamiltonian represented by bound and continuum basis states
- All eigenvalues and eigenvectors of 50,000 x 50,000 matrix required. This can only be solved on parallel machines.
- Thousands of energies required to map out Feshbach resonances
## AM collision calculations : Time independent R-Matrix
- R-Matrix with pseudo states calculations completed for
- He, He+
- Li, Li+, Li2+
- Be, Be+, Be2+, Be3+
- B+, B4+
- C2+, C3+, C5+
- O5+
- Standard R-Matrix completed
- Ne+, Ne4+, Ne5+
- Fe20+, Fe21+, Fe23+, Fe24+, and Fe25+
*Energy vs excitation cross section for neutral Be*
## AM Collisions : Time Dependent Close-Coupling
- Developed in the US by C. Bottcher and co-workers
- Treats the three body Coulomb breakup exactly
- Close-coupled set of 2D lattice equations
- TDCC calculations completed for
- H, He, He+
- Li, Li+, Li2+
- Be, Be+, Be2+, Be3+
- B2+, C3+, Mg+, Al2+, Si3+
- Have now started to treat
- the four body Coulomb breakup
- the three-body two Coulomb center breakup
*Ionization cross section for C**2+**. Shows the first agreement between theory and experiment for a system with significant metastable fraction.*
## AM Collisions : Time-Dependent Semi-Classical
- Developed in the study of heavy-ion nuclear fusion
- Electron in the field of two moving Coulomb fields
- 3D lattice method solved by low-order finite differences or high-order Fourier-collocation representation.
- Applications
- p+H, p+Li, α+H, Be4++H, p+H2+
- Hybrid TDSC/AOCC method
- 4D lattice close-coupling for p+He
## AM Collisions : Distorted wave and Classical Trajectory
- Uses perturbation theory.
- Accurate for radiative and autoionization rates.
- Accurate for electron collisions with highly charged ions.
- Various levels of calculation
- Intermediate coupled distorted-wave (ICDW)
- LS coupled distorted wave (LSDW)
- Configuration-average distorted-wave (CADW)
- Classical Trajectory Monte Carlo (CTMC)
*Resonance plot for Cl**13+** showing the first observation of trielectronic recombination*
## AM Collisions :Distorted wave and Classical Trajectory
- Dielectronic recombination project using ICDW for laboratory and astrophysical elements
- Li, Be, B, C and O iso-electronic sequences completed
- Support for ion storage ring experiments
- Cl13+
- Heavy element ionization/recombination using CADW
- Ar, Kr, Xe, Mo, Hf, Ta, W, Au
- Charge transfer using CTMC
- High Z ions with H, D, and He.
*Bi**7+** 5s**2**5p**6**5d**8 ** ionization cross section*
## General Science Spin-offs
- TDCC for
- (γ,2e) on He, Be, Li+, quantum dots, H2
- (2γ,2e) on He
- (γ,3e) on Li
- e+ + H
- TDSC for
- p- + H
- BEC in fields
- CTMC for
- e + atoms in ultracold plasmas
- γ + atoms in high Rydberg states
## Collaborations with existing fusion laboratories - I
- DIII-D, California
- EFDA-JET, UK
- Li generalised collisional-radiative coefficients used in impurity transport studies
- He R-Matrix excitation data used in helium beam studies, and in non-Maxwellian modeling.
## Collaborations with existing fusion laboratories - II
- RFX- Italy
- ASDEX-upgrade, Germany
- Tungsten ionization data to be used in heavy species studies
- Krypton ionization ionization data is being used in plasma transport studies
## Conclusions
- Recent advances in non-perturbative methods allows high quality atomic data to be generated for electron-ion and ion-atom collisions for low Z systems, such as Li, Be and C.
- High quality atomic data is being processed into a form useful for plasma transport modeling of wall erosion and ELM experimental studies.
- High quality atomic data for high Z systems, such as W, remains a computational grand challenge.
|
en
|
converted_docs
|
509707
|
{width="6.302083333333333in" height="1.125in"}
# Legislative Bulletin.................................................April 22, 2008
**Contents:**
**H.R. 5613**---Protecting the Medicaid Safety Net Act
H.R. 5613---Protecting the Medicaid Safety Net Act
(*Dingell, D-MI*)
**Please note the Conservative Concerns beginning on page 6, and those
highlighted throughout the bulletin.**
**[Order of Business]{.underline}**: The bill is scheduled to be
considered on Tuesday, April 22^nd^, under a motion to suspend the rules
and pass the bill.
**[Summary]{.underline}**: H.R. 5613 would extend certain existing
moratoria on the Centers for Medicare and Medicaid Services (CMS),
prohibiting the agency from promulgating rules related to the integrity
of the Medicaid program until April 1, 2009. In particular, the bill
would extend moratoria on proposed regulations placing restrictions on
intergovernmental transfers and restricting payments for graduate
medical education; the prohibitions were first enacted as part of last
year's supplemental wartime appropriation (P.L. 110-28) and are
scheduled to expire on May 25, 2008. The bill would also extend
prohibitions on CMS regulations relating to rehabilitation services, as
well as school-based administrative and transportation services; these
prohibitions were first enacted in Medicare physician payment
legislation (P.L. 110-173) last December, and are scheduled to expire on
June 30, 2008.
In addition, H.R. 5613 would impose additional new moratoria on CMS
relating to other proposed Medicaid regulations, also until April 2009.
Specifically, the bill would prohibit the Secretary of Health and Human
Services from imposing additional restrictions with respect to targeted
case management payments, the definition of outpatient hospital
services, and Medicaid provider taxes (with certain exceptions).
The bill also appropriates an additional \$25 million per year to CMS
for the purposes of anti-fraud enforcement activity within the Medicaid
program.
H.R. 5613 includes two reports to Congress on the proposed regulations.
By July 1, 2008, the Department of Health and Human Services (HHS) will
report on its justification and authority for proposing the regulations.
The bill also includes \$5 million in appropriations for HHS to hire an
independent contractor to produce a report by March 1, 2009, on the
proposed regulations and their impact on states.
H.R. 5613 also extends a web-based asset verification system to all 50
states, effective by the end of fiscal year 2013. This provision would
expand the Social Security Administration's Supplemental Security Income
(SSI) pilot program, giving states a new tool for verifying the assets
of Medicaid recipients. Currently, such a system only exists as a
demonstration project in three states: California, New Jersey, and New
York.
**[Additional Background on Changes Made in Committee]{.underline}**:
During consideration in the Energy and Commerce Committee, Chairman
Dingell and Ranking Member Joe Barton (R-TX) reached agreement on
several modifications to the legislation. The revised language
incorporated at Subcommittee narrowed the scope of the proposed
moratoria to permit CMS to engage in outreach activities with states.
Over the past several years, CMS has used various state-level audits to
reach agreements with state Medicaid agencies to curtail abusive and/or
questionable financing tactics. The revised language in H.R. 5613 would
permit CMS to continue these individual consent agreements with states,
while maintaining the moratoria on CMS' ability to enact regulations
prohibiting these activities permanently.
In addition, the substitute language adopted in Committee included the
additional \$25 million per year in anti-fraud enforcement, as well as
an independent study assessing the need for the regulations and their
potential impact on states. The Committee substitute also incorporated
the web-based asset verification system to pay for the moratorium; the
Administration had previously suggested that this program be extended as
a savings mechanism to finance portions of the farm bill.
**[Additional Background on Proposed Regulations]{.underline}**: During
the past year, the Centers for Medicare and Medicaid Services (CMS) has
attempted to move forward on several proposed regulations addressing
specific issues and service areas within the Medicaid program. Many of
these regulations respond to Government Accountability Office (GAO)
studies and reports by the HHS Inspector General highlighting areas
where the fiscal integrity of the Medicaid program needed improvement. A
brief summary of each rule that would be halted by H.R. 5613 follows:
*Intergovernmental Transfers*: This rule would limit reimbursement for
publicly-owned health providers to costs incurred, narrow the definition
of unit of government, and require providers to retain all Medicaid
payments, in order to restrain intergovernmental transfers designed
primarily to maximize states' federal Medicaid payments. A final rule
was issued on May 29, 2007; the moratorium currently in place expires on
May 25, 2008. The Congressional Budget Office (CBO) scores this
regulation as saving \$9.0 billion in federal outlays over five years,
and \$22.0 billion over a decade.
*Graduate Medical Education*: This rule would eliminate Medicaid
reimbursement for graduate medical education, on the grounds that
reimbursements for medical training are outside the statutory scope of
the Medicaid program. A Notice of Proposed Rulemaking (NPRM) was issued
on May 23, 2007; the current moratorium expires May 25, 2008. Five year
estimated savings are \$0.8 billion, and ten year estimated savings are
\$1.9 billion.
*School-Based Administrative and Transportation Services*: This rule
would prohibit federal Medicaid payments for administrative activities
performed by schools and transportation of children to and from school.
In some instances, school districts bill Medicaid for transporting
students to and from school, even though this is an educational expense,
not a reimbursable medical expense. In addition, HHS audits found that
schools were claiming capital and debt service as "administrative
services" subject to Medicaid reimbursement. The proposed rule would not
alter the current policy of reimbursing schools for *bona fide* medical
expenses incurred on school property, such as speech therapy. A final
rule was issued December 28, 2007; the current moratorium expires June
30, 2008. Five year estimated savings are \$4.2 billion, and ten year
savings are estimated at \$10.2 billion.
*Rehabilitation Services*: This rule would restrict the scope of
rehabilitation services subject to the federal Medicaid match and
eliminate coverage of day habilitation services for individuals with
developmental disabilities. In many instances, CMS has found that states
have billed therapeutic foster care as a "bundled" payment, resulting in
federal payments for activities related to foster care as opposed to
direct medical expenses. In other cases, state plans for reimbursable
expenses include recreational or social activities not directly related
to rehabilitative goals. An NPRM was issued on August 13, 2007; the
current moratorium expires on June 30, 2008. CBO scores this change as
saving \$1.4 billion over five years, and \$3.5 billion over a decade.
*Outpatient Hospital Services*: This rule would restrict the scope of
Medicaid outpatient hospital services and clarify the upper payment
classification for outpatient services to align more closely with the
Medicare definition of outpatient services. An NPRM was issued on
September 28, 2007; no moratorium is currently in place. Five year
savings are estimated at \$0.3 billion, and ten year savings are
estimated at \$0.7 billion.
*Targeted Case Management*: This rule would restrict the scope of
targeted case management services, and specify that Medicaid will not
reimburse states for services where another third party is liable for
payment. In many cases, HHS audits have found a lack of documentation
related to targeted case management claims, or state plans for
reimbursement that fall outside the scope of the Medicaid program's
focus on medical services. A final rule was issued December 4, 2007,
subject to an implementation date of March 3, 2008. The change would
save an estimated \$1.5 billion over five years, and \$3.3 billion over
ten.
*Provider Taxes*: This rule would reduce the permissible level of
Medicaid provider taxes, as included in the Tax Relief and Health Care
Act of 2006 (P.L. 109-432), and would also clarify the hold harmless
provision for provider taxes with respect to the positive correlation
between the level of provider taxes imposed by states and direct or
indirect Medicaid payments from states back to providers. A final rule
was issued February 22, 2008, subject to a compliance date of October 1,
2008. Five and ten year savings are estimated at \$0.6 billion.
In total, the proposed regulations are collectively projected to result
in approximately \$16-18 billion in savings to the federal government
over the next five fiscal years, and more than \$42 billion over a
decade.[^1] By point of comparison, these savings would constitute just
over 1% of total federal spending on Medicaid, which over the next five
years is estimated to total more than \$1.2 trillion.[^2]
**[Additional Background on GAO Reports of Medicaid
Abuses]{.underline}**: Since 1994, the Government Accountability Office
(GAO) has compiled more than a dozen reports highlighting problems with
Medicaid financing, and specifically the ways in which state governments
attempt to "game" Medicaid reimbursement policies in order to maximize
the amount of federal revenue funding state health care programs. The
persistent shortcomings in federal oversight of these state funding
schemes prompted GAO to add the Medicaid program to its list of federal
entities at high risk of mismanagement, waste, and abuse in 2003.
Several of the GAO reports discuss state reimbursement efforts for
several of the services CMS proposes to change in its new regulations.
For instance, testimony in June 2005 analyzed the ways in which 34
states---up from 10 in 2002---employed contingency-fee consultants to
maximize federal Medicaid payments. The report found that from
2000-2004, Georgia obtained \$1.5 billion in additional reimbursements,
and Massachusetts \$570 million.[^3] The report concluded that the
states' claims for targeted case management "appear to be inconsistent
with current CMS policy" and claims for rehabilitation services "were
inconsistent with federal law."[^4]
In other areas, GAO found potentially inappropriate behavior---higher
reimbursements for school-based health and administrative services that
were not fully passed on to the relevant school districts, and
questionable administrative costs, such as a 100% claim on a
Massachusetts state official's salary as a Medicaid administrative cost,
even though the official worked on unrelated projects for other states
designed to increase their own Medicaid reimbursements.[^5]
The GAO reports also demonstrate states' use of intergovernmental
transfers to maximize federal Medicaid reimbursements. In these schemes,
local-government health facilities transfer funds to the state Medicaid
agency. The Medicaid agency in turn transfers funds back to the
local-government facility---but not before filing a claim with CMS to
obtain federal reimbursement. Although permissible under current law in
many cases, GAO found that these schemes "are inconsistent with
Medicaid's federal-state partnership and fiscal integrity."[^6]
Many of the GAO reports over the past decade---whose titles are listed
at the bottom of this bulletin---have included calls for additional
federal oversight around various state Medicaid reimbursement
initiatives, particularly the need for clear and consistently applied
guidance from CMS about the permissiveness of various financing
arrangements.[^7] Several of CMS' proposed regulations attempt to remedy
this problem, and restore clarity and fiscal integrity to the Medicaid
program.
**[Additional Background on Medicaid Waste and Fraud]{.underline}**:
Although much of the debate surrounding the proposed CMS regulations has
centered on the proper scope and limits of covered services within the
Medicaid program, it is also worth noting the considerable amount of
waste and criminal fraud present within some state Medicaid programs. An
extensive investigation published by *The New York Times* in July 2005
revealed several examples of highly questionable activity within the New
York Medicaid program:
- A Brooklyn dentist who billed Medicaid for performing 991 procedures
in a single day;
- One physician who wrote 12% of all the prescriptions purchased by
New York Medicaid for an AIDS-related drug to treat wasting
syndrome---allegedly so the steroid could be re-sold on the black
market to bodybuilders;
- Over \$300 million---far more than any other state Medicaid
program---in spending on transportation services, some of which
involved rides for seniors mobile enough to rely on public
transportation and other services which investigators believe may
not have been performed at all; and
- A school administrator in Buffalo who in a single day recommended
that 4,434 students receive speech therapy funded by Medicaid---part
of \$1.2 billion in improper spending by the state on speech
services, according to a federal audit.
A former state investigator of Medicaid abuse estimated that fraudulent
claims totaled approximately 40% of all Medicaid spending in New
York---nearly \$18 billion per year, which may help explain why New
York's Medicaid expenditures greatly exceed California's, despite a
smaller overall population and fewer Medicaid beneficiaries.[^8]
However, other audits emphasize that in some cases, providers can be
victims of state efforts to reclaim additional federal Medicaid dollars.
A 2004 report from the Department of Health and Human Services'
Inspector General found that New York state required a nursing home to
return more than half of its Medicaid revenues to the state, resulting
in net revenues to the nursing home that were \$20 million less than its
operating costs. The report noted:
> The state's upper-payment-limit funding approach benefited the state
> and the county more than the nursing home. The state received \$20
> million more than it expended for the nursing home's Medicaid
> residents without effectively contributing any money, and the county
> was reimbursed 100 percent for its upper-payment-limit contribution.
> ***We are concerned that the federal government in effect provided
> almost all of the nursing home's Medicaid funding, contrary to the
> principle that Medicaid is a shared responsibility of the federal and
> state governments.***
The audit went on to note that the high level of Medicaid payments the
nursing home was required to return to the state---and the operating
losses the nursing home incurred on its Medicaid patients as a
result---led to significant levels of understaffing that may have
affected the quality of care provided to patients.[^9]
Other HHS audits reflect Medicaid reimbursement submissions by states
that either lack appropriate documentation for the claims or represent
inappropriate use of Medicaid resources. For example, one May 2003 claim
for Medicaid targeted case management reimbursement included the
following notation from the case manager explaining her contact with the
beneficiary:
> Phone call with mother. Discussed the outstanding warrant for \[name
> redacted\]. She does not know where he is. She will call police when
> he shows up.
While it may represent good public policy for this type of
contact---which attempted to locate a juvenile for whom an outstanding
arrest warrant existed---some conservatives would argue that such
actions lie outside the scope of the Medicaid program's intent and
represent a far-from-ideal expenditure of federal matching dollars.
**[Committee Action]{.underline}**: On March 13, 2008, the bill was
introduced and referred to the Energy and Commerce Committee. On April
16, 2008, the full Energy and Commerce Committee reported the bill to
the full House by a vote of 46-0.
**[Possible Conservative Concerns]{.underline}**: Numerous aspects of
this legislation may raise concerns for conservatives, including, but
not necessarily limited to, the following:
- [Process]{.underline}. H.R. 5613 is being brought to the House floor
under suspension of the rules, a procedure generally reserved for
minor authorizations and smaller pieces of legislation, such as the
naming of post offices. Some conservatives may be concerned that a
bill costing over a billion dollars is being rushed through House
floor consideration under expedited procedures.
- [Budgetary Gimmick]{.underline}. In order to comply with PAYGO
rules, H.R. 5613 would impose a moratorium on CMS action until April
2009---and the legislation contains provisions offsetting the cost
to the federal government for all savings not realized through that
date. However, staff for Energy and Commerce Committee Chairman
Dingell have publicly stated that H.R. 5613 is intended to delay the
implementation of the Medicaid rules just long enough so that a
future Administration can withdraw them. Because withdrawing the
regulations would result in approximately \$16-18 billion in lost
savings to the federal government over five years, and because
action taken by a future Administration would not be subject to
PAYGO, some conservatives may believe that H.R. 5613's sponsors
intend to violate the spirit, if not the letter, of the PAYGO
requirement under House rules.
```{=html}
<!-- -->
```
- [Undermine Previous Republican Efforts to Reform
Medicaid]{.underline}. In December 2005, 212 Members of
Congress---all Republicans---voted for legislation (P.L. 109-171)
that generated less than \$4.8 billion in savings from the Medicaid
program as a first attempt to restore its fiscal integrity. However,
if the moratoria remain intact, those modest reductions in
Medicaid's growth rate would be more than exceeded by the \$16-18
billion in foregone savings associated with the regulations' repeal.
```{=html}
<!-- -->
```
- [Encourage State Efforts to "Game" the Medicaid
Program]{.underline}. As highlighted above, nearly three dozen
states have in recent years hired contingency fee consultants
designed to maximize the portion of Medicaid costs paid for by the
federal government. Blocking regulations designed to respond to
funding mechanisms which states and their consultants have
established---and more than a dozen GAO reports over nearly 15 years
have criticized---may only further encourage states to take steps
that increase federal costs and undermine Medicaid's fiscal
integrity.
- [Harm Hospitals and Other Providers]{.underline}. As explained
above, HHS Inspector General reports have revealed that various
funding mechanisms designed to increase federal Medicaid revenues
for states have often had the ancillary effect of reducing net
payments to providers. H.R. 5613, by blocking regulations designed
to ensure that payments to Medicaid providers do not become ensnared
in various schemes by states to increase federal Medicaid spending,
may prevent some providers from seeing their net Medicaid payments
rise when the proposed regulations take effect.
**[Administration Position]{.underline}**: Although the Statement of
Administration Policy (SAP) was not available at press time, Health and
Human Services Secretary Leavitt has previously
[written](http://www.hhs.gov/asl/medicaidletter.html) to Energy and
Commerce Chairman Dingell and Ranking Member Barton indicating that the
Administration strongly opposes H.R. 5613 and would recommend a
Presidential veto.
**[Cost to Taxpayers]{.underline}**: A final score of the bill was not
available at press time. However, a preliminary CBO estimate indicated
that H.R. 5613's moratorium through April 2009 on the issuance of seven
proposed regulations would cost taxpayers \$1.65 billion over five and
ten years. However, as noted above, this score presumes the full
implementation of the regulations in April 2009 under a new
Administration. Outright repeal of the regulations would cost \$16.5
billion over five years---ten times the cost of H.R. 5613.
Additional mandatory spending---both \$25 million annually for CMS
anti-fraud enforcement activity with respect to Medicaid, and \$5
million for an independent study on the proposed regulations---would
cost \$129 million over five years, and \$254 million over ten.
H.R. 5613 would pay for this spending by extending an asset verification
pilot program currently operating in three states to all 50 states,
saving \$1.0 billion over five years and \$4.5 billion over ten. The
bill would also make adjustments to the Physician Assistance and Quality
Improvement (PAQI) fund to comply with five-year PAYGO scoring rules,
and deposit the additional savings over and above the ten-year cost of
the moratoria. Reports indicate that the \$2.6 billion in additional
ten-year savings will be withdrawn from the PAQI fund later this year to
help finance Medicare physician reimbursement legislation.
**[Does the Bill Expand the Size and Scope of the Federal
Government?]{.underline}**: Yes, the bill would prohibit CMS from taking
administrative actions (which are already built into CBO's budgetary
baseline) to prevent states from expanding the scope of the Medicaid
program.
**[Does the Bill Contain Any New State-Government, Local-Government, or
Private-Sector Mandates?]{.underline}**: No.
**[Does the Bill Comply with House Rules Regarding Earmarks/Limited Tax
Benefits/Limited Tariff Benefits?]{.underline}**: A Committee report
citing compliance with House earmark disclosure rules was unavailable at
press time.
**[Constitutional Authority]{.underline}**: A Committee report citing
constitutional authority was unavailable at press time.
**[Additional Background]{.underline}**: For further information on this
issue see:
- [*RSC Policy Brief: Medicaid and the
States*](http://www.house.gov/hensarling/rsc/doc/pb_040208_medicaidregs.doc)
- [*RSC Policy Brief: Medicaid Funding
Issues*](http://www.house.gov/hensarling/rsc/doc/pb_012208_medicaid_fmap.doc)
- [*New York Times Article: New York Medicaid Fraud May Reach into
Billions*](http://www.nytimes.com/2005/07/18/nyregion/18medicaid.html?_r=1&pagewanted=print&oref=slogin)
- [*November 2007 GAO Testimony: Medicaid Financing: Long-Standing
Concerns about Inappropriate State Arrangements Support Need for
Improved Federal
Oversight*](http://www.gao.gov/new.items/d08255t.pdf)
- [*March 2007 GAO Report: Medicaid Financing: Federal Oversight
Initiative Is Consistent with Medicaid Payment Principles but Needs
Greater Transparency*](http://www.gao.gov/new.items/d07214.pdf)
- [*June 2006 GAO Report: Medicaid Financial Management: Steps Taken
to Improve Federal Oversight but Other Actions Needed to Sustain
Efforts*](http://www.gao.gov/new.items/d06705.pdf)
- [*June 2005 GAO Testimony: Medicaid: States\' Efforts to Maximize
Federal Reimbursements Highlight Need for Improved Federal
Oversight*](http://www.gao.gov/new.items/d05836t.pdf)
- [*June 2005 GAO Testimony: Medicaid Financing: States\' Use of
Contingency-Fee Consultants to Maximize Federal Reimbursements
Highlights Need for Improved Federal
Oversight*](http://www.gao.gov/new.items/d05748.pdf)
- [*March 2004 GAO Testimony: Medicaid: Intergovernmental Transfers
Have Facilitated State Financing
Schemes*](http://www.gao.gov/new.items/d04574t.pdf)
- [*February 2004 GAO Report: Medicaid: Improved Federal Oversight of
State Financing Schemes
Needed*](http://www.gao.gov/new.items/d04228.pdf)
- [*October 2001 GAO Report: Medicaid: HCFA Reversed its Position and
Approved Additional State Financing
Schemes*](http://www.gao.gov/new.items/d02147.pdf)
- [*September 2000 GAO Testimony: Medicaid: State Financing Schemes
Again Drive Up Federal
Payments*](http://www.gao.gov/archive/2000/he00193t.pdf)
- [*April 2000 GAO Report: Medicaid in Schools: Improper Payments
Demand Improvement in HCFA
Oversight*](http://www.gao.gov/archive/2000/h600069.pdf)
- [*June 1999 GAO Testimony: Medicaid: Questionable Practices Boost
Federal Payments for School-Based
Services*](http://www.gao.gov/archive/1999/he99148t.pdf)
- [*August 1994 GAO Report: Medicaid: States Use Illusory Approaches
to Shift Program Costs to Federal
Government*](http://archive.gao.gov/t2pbat2/152543/pdf)
**[RSC Staff Contact]{.underline}**: Chris Jacobs,
<[email protected]>, (202) 226-8585
[^1]: Because CMS proposals with respect to rehabilitation services
(estimated savings of \$1.4 billion over five years), graduate
medical education (\$0.8 billion estimated savings), and the
definition of outpatient hospital services (\$0.3 billion estimated
savings) are at the proposed rulemaking stage, CBO assigns a
baseline weighting factor of 50% to the proposed regulations,
reflecting the uncertainties of the rulemaking process. Thus, while
CBO estimates a total of \$17.8 billion in savings over five years
if all rules were implemented as currently issued, a permanent
prohibition on these seven rules would require \$16.5 billion in
savings under House PAYGO rules.
[^2]: Office of Management and Budget, *Analytical Perspectives: Budget
of the United States Government, Fiscal Year 2009*, available online
at <http://www.whitehouse.gov/omb/budget/fy2009/pdf/spec.pdf>
(accessed April 1, 2008), p. 383.
[^3]: Government Accountability Office, "Medicaid Financing: States' Use
of Contingency Fee Consultants to Maximize Federal Reimbursements
Highlights Need for Increased Federal Oversight," (Washington,
Report GAO-05-748, June 2005) available online at
<http://www.gao.gov/new.items/d05748.pdf> (accessed March 31, 2008),
p. 4.
[^4]: Ibid., p. 19.
[^5]: Ibid., pp. 27-29.
[^6]: Ibid., p. 24.
[^7]: See ibid., p. 30.
[^8]: Clifford Levy and Michael Luo, "Medicaid Fraud May Reach into
Billions," *The New York Times* 18 July 2005, available online at
<http://www.nytimes.com/2005/07/18/nyregion/18medicaid.html?_r=1&pagewanted=print&oref=slogin>
(accessed March 29, 2008).
[^9]: "Adequacy of Medicaid Payments to Albany County Nursing Home,"
(Washington, DC, Department of Health and Human Services Office of
the Inspector General Report #A-02-02-01020), available online at
<http://oig.hhs.gov/oas/reports/region2/20201020.pdf> (accessed
April 20, 2008), pp. 6-7.
|
en
|
converted_docs
|
264460
|
**21 Gun Salute**\
*GSA's Action Plan to meet and exceed the 3% contracting goal with our
nation's Service-Disabled Veteran-Owned Small Businesses*
Gun 1: Awareness
- Increase public awareness
- Increase internal awareness
- Identify SDVOSBs to provide high demand products and services
Gun 2: Advocacy
- Create Veterans Advisory sub-Committee
- Advocate for SDVOSB opportunities; special emphasis: VETS GWAC
- Create a pool of advocates among buyers within GSA
Gun 3: Innovation
- Capitalize on best practices for SDVOSB outreach
- Target SDVOSBs for selected schedule buys
- Innovations in financial accreditation of small business
Gun 4: Training
- Assist SDVOSBs in finding markets
- Establish mentor program
- Provide SDVOSB training to contracting officers governmentwide
Gun 5: Recognition
- Nationally recognize SDVOSB supporters
- Recognize successes among internal GSA family
- Enhance SDVOSB brand
Gun 6: Accountability
- Hold senior leaders accountable
- Measure and enforce SDVOSB goals to ensure achievement
- Integrate procurement forecast
Gun 7: Partnerships
- Champion interagency partnerships
- Partner with veterans organizations
- Support business-to-business partnerships among SDVOSBs
|
en
|
all-txt-docs
|
317229
|
Expires:200809080553;Remove:200809080553;148894
WWUS53 KGLD 080542
SVSGLD
SEVERE WEATHER STATEMENT
NATIONAL WEATHER SERVICE GOODLAND KS
1142 PM MDT SUN SEP 7 2008
COC017-080553-
/O.EXP.KGLD.SV.W.0278.000000T0000Z-080908T0545Z/
CHEYENNE CO-
1143 PM MDT SUN SEP 7 2008
...THE SEVERE THUNDERSTORM WARNING FOR SOUTHWESTERN CHEYENNE COUNTY
WILL EXPIRE AT 1145 PM MDT/1245 AM CDT/...
THE SEVERE THUNDERSTORM THAT PROMPTED THE WARNING HAS WEAKENED AND IS
NO LONGER SEVERE.
A SEVERE THUNDERSTORM WATCH REMAINS IN EFFECT UNTIL 400 AM MDT MONDAY
MORNING FOR NORTHEASTERN COLORADO AND NORTHWESTERN KANSAS AND
SOUTHWEST NEBRASKA.
LAT...LON 3880 10248 3860 10263 3860 10265 3860 10271
3882 10313 3897 10302
TIME...MOT...LOC 0543Z 298DEG 14KT 3876 10274
$$
BULLER
|
en
|
all-txt-docs
|
483657
|
Aug. 30, 2004
Elvia Thompson
Headquarters, Washington
(Phone: 202/358-1696)
Keith Henry
Langley Research Center, Hampton, Va.
(Phone: 757/864-6120)
Leslie Williams
Dryden Flight Research Center, Edwards, Calif.
(Phone: 661/276-3893)
RELEASE: 04-279
GUINNESS WORLD RECORDS RECOGNIZES NASA SPEED RECORD
Guinness World Records has recognized the world speed record set by
NASA's hypersonic X-43A aircraft earlier this year in an experimental
flight over the Pacific Ocean. Using a scramjet engine, the
unpiloted, 12 foot-long aircraft achieved Mach 6.83 -- almost seven
times the speed of sound -- or nearly 5,000 mph, in a March 27
flight.
The accomplishment will be included in the 2006 Guinness World Records
book, set for release this time next year, as follows:
"On 27 March 2004, NASA's unmanned Hyper-X (X-43A) airplane reached
Mach 6.83, almost seven times the speed of sound. The X-43A was
boosted to an altitude of 29,000 m (95,000 ft) by a Pegasus rocket
launched from beneath a B52-B aircraft. The revolutionary 'scramjet'
aircraft then burned its engine for around 11 seconds during flight
over the Pacific Ocean."
If NASA researchers have their way, the record won't stand long. The
final flight in the Hyper-X program is scheduled to take place in
October, when another X-43A aircraft will attempt to fly at Mach 10
-- ten times the speed of sound -- or 7,200 mph.
The March 27 flight was part of NASA's Hyper-X program, designed to
demonstrate advanced high-speed propulsion system concepts to
overcome one of the greatest aeronautical research challenges --
air-breathing hypersonic flight. The advantage of air-breathing
flight is that the vehicle, whether it is aircraft or spacecraft,
scoops the air its engines need from the atmosphere rather than
carrying heavy, bulky tanks, as rockets do.
The challenge is to introduce fuel, ignite it and produce positive
thrust while highly compressed air rushes through the engine in mere
milliseconds -- roughly analogous to lighting a match and keeping it
burning in a hurricane-force wind.
Compared to rocket-powered vehicles like the Space Shuttle, scramjets
promise more airplane-like operations for increased affordability,
flexibility and safety in ultra high-speed flights within the
atmosphere and into Earth orbit.
The X-43A flight easily set a world speed record for an air-breathing
engine aircraft. The previous known record was held by a
ramjet-powered missile, which achieved slightly more than Mach 5. A
ramjet operates by subsonic combustion of fuel in a stream of air
compressed by the forward speed of the aircraft itself, as opposed to
a normal jet engine, in which the compressor section (the fan blades)
compresses the air. A scramjet (supersonic-combustion ramjet) is a
ramjet engine in which the airflow through the whole engine remains
supersonic.
The highest speed attained by a rocket-powered airplane, NASA's X-15
aircraft, was Mach 6.7. The fastest air-breathing, manned vehicle,
the SR-71, achieved slightly more than Mach 3. The X-43A more than
doubled the top speed of the jet-powered SR-71.
Guinness World Records' science editor David Hawksett has already
expressed an interest in attending the fall flight.
"Operating an atmospheric vehicle at almost Mach 7 is impressive
enough, but to be able to use oxygen from the air, instead of a fuel
tank, as it screams into the engine intakes at 5,000 mph is a
mind-boggling technical achievement. It's wonderful to see scramjet
technology finally begin to take off," said Hawksett.
The Hyper-X program is conducted by NASA's Aeronautics Research
Mission Directorate with the NASA Langley Research Center, Hampton,
Va., as lead center with responsibility for hypersonic technology
development and the NASA Dryden Flight Research Center, Edwards,
Calif., responsible for flight research and testing.
Guinness World Records issued a certificate to NASA documenting the
X-43A accomplishment, and will feature the story on its web site:
http://www.guinnessworldrecords.com
For more information on NASA's Aeronautics Research Mission
Directorate programs, including Hyper-X, on the Internet, visit:
http://www.aeronautics.nasa.gov
-end-
|
en
|
markdown
|
078073
|
# Presentation: 078073
## Spectroscopic analysis in hard x-rays and
- gamma rays
- David Smith, UCSC
- SPD summer school, June 2006
## We collect and count individual photons
**Zone 1:**
**thermal**
**Zone 2:**
**nonthermal**
**e- brem.**
**Zone 3:**
**nuclear**
**lines**
**(ions)**
**Z**
**Zone 4:**
**nontherm.**
**e- brem.**
**again**
**Z5:**
**pi-**
**on**
**de-**
**cay**
## Reminder of why we want to do solar spectroscopy:
- Temperature and density plasma diagonstics in thermal x-rays
- Inversion of hard x-ray spectrum to accelerated electron spectrum
- Gamma-ray line ratios for accelerated ion spectrum & composition
- Nuclear de-excitation line shapes for ion angular distributions &
- composition
- Positron-annihilation line shape for flaring atmosphere temperature
- and density
- Pion decay spectral signature for highest energy ion flux
- [See slides of talk by R. Murphy]
## Zone: Detectors: MeV: Physics/energy losses:
- Thicker Si, gas prop. ctrs 0.01 k-shell escape
- CdTe, CZT 0.03
- Germanium detectors 0.1
- 0.3 Compton scattering
- Scintillators: NaI 1 Compton escape
- CsI 3 Pair production
- BGO 10 511 photon escape
- 30 electron escape
- Pair tracking 100
- (Gas or silicon again, 300
- scintillation fibers)
**Zone: Detectors: MeV: Physics/****energy losses:**
**1**
**2**
**3**
**4**
**5**
**Detectors and interaction physics vs. energy:**
## Photoelectric
**absorption:**
**Dominates below about:**
**50 keV in Si**
**150 keV in Ge**
**500 keV in Pb, BGO**
**Material becomes more**
**transparent just below "edge";**
**possibility for k-shell photon**
**escape. **
**K**
**L**
**M**
## Compton scattering:
- Compton-dominated regime has minimum cross-section; escape is
- common. RHESSI detectors are only about 15% photopeak
- efficient at 2.2 MeV (solar neutron capture line)
- Free-electron approximation good but not perfect (opacity related to
- electron density only)
- Energy lost to Compton electron is a function only of scatter angle
- and starting energy (conservation of energy, momentum):
- Cross-section is more complicated; there are forward and reverse peaks at
- semirelativistic to relativistic energies
- Scatter prefers to preserve direction of electric field vector when
- scattering near 90 degrees -- therefore azimuthal angle distribution
- is a good polarization diagnostic until 90-degree scatter becomes rare
- at high energies.
## Compton scattering can take place
** ** at the Sun
- off the spacecraft into the detector
- off the Earth's atmosphere into the detector
- (if the Earth is nearby)
- out of the detector
**For example**
- Forward (small-angle) Compton scattering of the
- 2.2 MeV neutron capture line from deep in the** **
** **solar atmosphere produces a "step" continuum
- just below the line (T. Vestrand et al. 1990, ICRC).
- But so does forward scattering in any passive
- material in front of your detector
## Pair Production:
- Occurs because the field of the nucleus looks like another
- photon to a passing energetic photon
- Like photoelectric effect, cross sections increase dramatically
- with Z (strength of nuclear field)
- Minimum photon energy is 2*electron rest mass = 1022 keV
- But cross section does not become significant until > 2 MeV
- Remaining energy goes into kinetic energy of e+ and e-
- e+ and e- tend to be forward-beamed, particularly at the
- highest energies
- Positrons must slow down before annihilating (just like in the Sun)
## Electron propagation in detector:
** **Photoelectron, Compton electron or pair ionize detector material
- and lose their energy
- Range is deterministic, not probabilistic as with photons (many
- interactions). Example: ~1mm at 1 MeV in Ge
- **The resulting ionization causes the signal in detectors:**
- Diode detectors (Si, Ge, CdTe): electron/hole clouds
- are swept to opposite electrodes by applied high voltage
- and the resulting current is amplified
- Scintillators (plastic, NaI, CsI, BGO, etc.): electrons wander
- the crystal until they relax to the ground state (usually
- via a dopant site) emitting optical/UV light in the transparent
- crystal. Light is converted to a current by a phototube,
- channel plate, semiconductor, etc. and amplified
## Best reference for detector interaction
**physics, detector types and capabilities:**
** ****Radiation Detection and Measurement**
** ****by Glenn F. Knoll**
## Advantages of detectors from 100 keV to 10 MeV:
** ****Scintillators**
**NaI: **Inexpensive, medium stopping power, moderate
- energy resolution (about 7% FWHM at 1 MeV),
- hygroscopic.
**CsI: **Slightly more expensive, slightly higher stopping power,
- slightly worse resolution, neutron identification,
- somewhat hygroscopic.
**BGO (**bismuth germanate): More expensive, best stopping
- power per unit mass, worse resolution
- (about 20% FWHM at 1 MeV). Chosen for shielding
- or very-high-energy detection. Easily machined,
- non-hygroscopic
## Advantages of detectors from 100 keV to 10 MeV: Ge:
- Most expensive, requires cryogenic operation, superb
- energy resolution (about 0.3% FWHM at 1 MeV),
- worse stopping power above 500 keV
- Detector must operate < 100K so that electron/hole pairs aren't
- thermally excited.
- Purest material existing; low
- impurities allow lower
- "depletion" field. Electrical
- contacts can be traditional
- diode (n-type, p-type implant)
- or simply conductive.
- Thermal/vacuum enclosure
- (cryostat) requires space,
- cost, design effort:
**Image: LLNL**
## Radiation damage in GeDs:
- Nuclear interactions of protons/neutrons/nuclei with
- germanium atoms create lattice defects
- Lattice defects trap holes drifting through crystal, so charge is
- not completely collected; result is a "tail" on the line:
- Annealing at ~100C
- results in removal of
- this effect; no one
- knows why.
- Culprit particles are
- cosmic rays (gradual),
- radiation-belt protons,
- SEP protons (most sudden, can be most intense)
## Other semiconductor detectors (room temperature):
- Cadmium telluride/ Cadmium zinc telluride (CZT):
- Small crystals only (about 1cm3)
- Higher "Z" than Ge, better stopping power
- Worse resolution than Ge, better than scintillators
- Very good for hard-x-ray-only work
- Silicon:
- large wafers available, but thin (<= 1mm)
- Medium resolution like CZT
- Best for low energies (< 30 keV) or as a pair
- tracker at high energies (> 30 MeV)
- All semiconductor detectors can be read out in
- strips or pixels for spatial resolution, division of
- count rates. More demanding on electronics.
## Tasks of detector electronics:
- Peak identification (triggering)
- Amplification and shaping of pulse
- Energy measurement (analog-to-digital conversion)
- (Anti-) coincidence tagging and handling
- Time tagging
- Data storage
**Usual components, in order:**
- Preamplifier
- Shaping amplifier
- Peak detect
- A2D
- Computer
## Removing the effects of the instrument
- ("data reduction"):
- Channel-to-energy conversion (gain)
- Deadtime correction
- Pulse pileup (highest rates)
- Background subtraction
- Imperfect energy resolution
- detector physics & electronics
- Incomplete energy collection
- ("response matrix")
## Channel-to-energy conversion:
- Detector physics: either completely linear (semiconductor diode)
- or modestly nonlinear in a predictable way (scintillator light)
- Electronics:
- Temperature drifts
- "integral nonlinearity" -- nonlinearity across the scale
- "differential nonlinearity" -- varying widths of nearby channels
- This is usually the most straightforward part of data reduction but
- you have to ask:
- Are there spectral lines you can use to calibrate?
- Will you accumulate enough counts in the time that gain
- might drift?
- Do you need to include a calibration source onboard?
- What precision do you need to do your science?
## Deadtime (livetime) correction:
- All detectors take a finite time to process an event; significant
- issue for flares, where fluxes can be extremely high
- **Intrinsic:**
** **Semiconductor detectors: electron/hole drift times on
- order of 10 to 1000 ns.
- Scintillators:
- Decay time of scintillation response -- NaI, 250ns,
- others more or less
- **Electronic:**
- Best spectral resolution requires shaping of pulse
- to a width of a few microseconds
- Maximum throughputs vary from a few thousand to a few
- hundred thousand c/s per detector; one solution is to
- use many small detectors.
- Correcting from detected to corrected count rate fairly easy
## Pileup:
**Pileup:**
- Two pulses close enough together get treated as one by
- electronics** OR** one pulse has its energy changed slightly
- by riding on the tail of another. Unavoidable at some level.
- "Fast" electronics
- channel, without
- high energy
- resolution, can
- help reject a large
- fraction of pileup.
- The rest of the
- effect must be
- modeled.
## Sources of background
- Simulation of RHESSI background components by T. Wunderer
## Sources of background:
**Cosmic diffuse photons: **dominates unshielded or
- wide-aperture instruments below ~ 100 keV
**Earth-atmospheric photons: **dominates an unshielded,
- low-Earth orbit instrument above ~ 100 keV. Strong
- positron-annihilation line at 511 keV. Due to interactions
- of cosmic rays, therefore lowest near magnetic
- equator
**Prompt cosmic-ray interactions in detectors:** tend to
- leave > 10 MeV in large detectors, little confusion with
- solar photons
- continued.......
## Sources of background, continued:
**Prompt cosmic-ray interactions in the spacecraft: **
- Similar spectrum to Earth-atmosphere component
**Direct interaction and bremsstrahlung from particles:**
** **Huge, temporary backgrounds possible from SEPs
- (outside magnetosphere) or radiation belts (inside).
- Only an equatorial LEO is completely safe.
**Radioactivity: **delayed result of nuclear interactions of
- cosmic rays; primary component is in the detector
- itself, but lines can also be seen from surrounding
- materials
**Natural radioactivity: **40K, U, Th isotopes occuring
- naturally in the spacecraft. Generally minor.
- "Cleaner" materials (generally old) can be used.
## Coping with background:
- Scale of the problem:
- a B-class microflare will dominate any background < 10 keV
- an M-class flare will dominate any background < 30 keV
- a large X-class line flare will dominate or at least compete
- with background at all energies
## Coping with background: Reducing it
- Passive shielding: blocks photons but can glow with
- cosmic-ray secondaries just like the atmosphere
- Generally useful only below 100 keV, to block cosmic photons
- "Graded-Z" shielding: k-shell fluorescence from heavy shielding
- element is blocked by a slightly lighter element, and so on....
- RHESSI uses Ta/Sn/Fe/Al
## Coping with background: Reducing it
- Active plastic scintillator shielding: tags incoming cosmic
- rays; electronic veto during time of their prompt influence.
- No effect on incoming gammas or delayed radioactivity.
- Heavy active shielding (CsI, BGO, etc.): tags incoming
- cosmic rays **and **blocks photons, but can create
- intense local neutron environment, enhancing
- detector radioactivity.
- Best geometry is a "well" -- fewest leaks possible:
- INTEGRAL/SPI
- Your shield probably weighs
- several times what your prime
- detectors do -- Can you use it
- for science? Is it your best
- investment of money and weight?
## Coping with background: Reducing it
- Choice of orbit: low-Earth equatorial is best, followed by
- orbit outside the magnetosphere. Exposure to the
- Earth's radiation belts is worst. The belts touch the
- atmosphere at the South Atlantic Anomaly.
- SEPs give you a huge background when not protected by
- the magnetosphere. Can be a big problem for studying
- large flares since they tend to come in bunches
- Keep field of view and detector volume as small as possible
- consistent with your science
- Focus! This allows you to connect a small detector with
- a large collecting area. Excellent for faint astrophysical
- sources or nanoflares; could be deadly for large
- flares due to deadtime & pileup
## Coping with background: Subtracting it
- Good background subtraction is necessary but not sufficient:
- if background is >> signal, Poisson fluctuations in
- background can dominate errors even if the background
- is 100% understood
- When Poisson errors are small (many counts), background
- systematic errors become important unless background
- is negligible
- In practice, time variability
- makes pure modeling difficult;
- subtract background taken
- at an "analogous" time
- RHESSI lightcurves, 2 hours,
- showing bkg variation & flare
## Efficiency and off-diagonal response
- In the hard x-ray range, often only a correction of efficiency
- (effective area) versus energy is necessary:
- (counts/s/keV seen at E) / (effective area at E in cm2) =
- photons/cm2/s/keV incident
- At high energies, many counts are often shifted to low energies
- instead of just lost, and this simple division becomes a matrix
- inversion instead.
- At very low energies, window absorption can be important. This
- is normally just an efficiency correction.
- Subtlety: Fluorescence escape from the crystal
- (say 13 keV --> 4 keV) can dominate true 4 keV stuff if the latter
- is strongly absorbed.
## Off-diagonal response:
**Off-diagonal response:**
- Recorded energy differs from photon energy. Common reasons:
- Compton scatter before entering detector
- Compton scatter out of detector
- Fluorescence outside
- Fluorescence escape
- 511 keV escape
- Annihilation outside
- Energy resolution
- imperfect (always);
- only time count energy
- > photon energy
## High energy resolution
- High energy resolution
- serves to make lines more
- identifiable; also reduces
- background for line
- identification.
- Naturally broad lines are
- more difficult to see even
- with a high resolution
- instrument.
- Off-diagonal (Compton)
- response is reduced both by
- more efficient detectors
- (higher Z, larger) and by
- active shielding, which
- suppresses outward
- Comptons as well as
- inward background (e.g.
- SMM/GRS vs RHESSI).
## Response matrix at low energies, annotated by H. Hudson
## Response matrix at high energies, annotated by H. Hudson
## Order of operations is important !
**Gain correction**
**Livetime & Pileup**
**Background**
**Subtraction**
**Response matrix **
**Deconvolution**
- These first: background spectra
- may not have same gain, livetime
- This next: background doesn't
- have same response characteristics
- This is last and hardest; analogous
- to the inverse problem in imaging
## Given gain/livetime/pileup/background corrected
- spectrum (count spectrum), two routes to an
- "instrument-free" photon spectrum:
**Count spectrum**
**Response matrix**
**Photon spectrum**
**THE DIRECT ROUTE:**
**DIRECT INVERSION**
**EMISSION **
**MODELS:**
**Electron spectra**
**Ion spectra**
**Angular distrib.**
**etc.**
**"DATA REDUCTION"**
**"DATA**
** ****ANALYSIS"**
## THE DIRECT ROUTE is unfortunately very difficult;
**Response matrix**
**Model count**
** ****spectrum**
**THE DIRECT ROUTE **is unfortunately very difficult;
- can only be done for simple spectra with excellent
- counting statistics (see work by Johns-Krull, Piana,
- Kontar, Brown). More usually, use **FORWARD FITTING:**
**CONVOLUTION**
**EMISSION **
**MODELS:**
**Electron spectra**
**Ion spectra**
**Angular distrib.**
**etc.**
**MINIMIZE CHI-SQUARE**
**DATA REDUCTION AND**
**ANALYSIS ARE COMBINED**
## Error propagation:
- For gamma-ray energies, Poisson statistics are the
- dominant error. Limitations on using sqrt(N) for error:
- You must do this in units of **raw counts only**,
- not counts/s, not background subtracted counts
- It's inaccurate for N<10 or so. sqrt(N+1) is slightly
- better but still no good for N<3. Binning counts
- to broader energy channels to get N ~ 10 is
- favored by duffers but deplored by Bayesians.
- Remember to include error on background too.
- For x-rays, calibration uncertainties probably dominate.
- Errors propagated as usual. Very nice compact book:
- A Practical Guide to Data Analysis for Physical Science Students, L. Lyons
## Example: RHESSI SPEX program (by R. Schwartz)
- Image by B. Dennis
- from "RHESSI
- Spectroscopy
- First Steps"
## Wheels not to reinvent:
- Instrument response, solar and atmospheric
- photon propagation: GEANT3, GEANT4
- http://wwwinfo.cern.ch/asd/geant/
- Space radiation environment and doses: SPENVIS
- http://www.spenvis.oma.be/
- Instrument background prediction: MGGPOD
- (includes GEANT)
- Cross-section lookup: NIST XCOM
- http://www.physics.nist.gov/PhysRefData/Xcom/Text/XCOM.html
- Radioactivities, fluoresence, isotopes, etc.:
- http://ie.lbl.gov/toi/
- http://sigma-2.cesr.fr/spi/MGGPOD/
|
en
|
converted_docs
|
012276
|
Before the
**Federal Communications Commission**
**Washington, D.C. 20554**
+---------------------------------------+---+--------------------------+
| In the Matter of **)** | | C |
| | | |
| **)** | | |
| | | |
| July 2, 2002 **) WCB/Pricing 02-12** | | |
| | | |
| Annual Access Charge Tariff Filings | | |
| **)** | | |
+---------------------------------------+---+--------------------------+
**ORDER**
**Adopted:** April 26, 2002 **Released:** April 26, 2002
By the Chief, Pricing Policy Division:
I. **INTRODUCTION**
1\. This order establishes procedures for the 2002 filing of annual
access charge tariffs by all incumbent local exchange carriers (ILECs).
Specifically, it sets a modified effective date of July 2, 2002 for the
July 2002 annual tariff filings; addresses the dates on which the tariff
filings must be filed, the dates and times for filing petitions to
suspend or reject the ILEC tariff filings, and replies to any such
petitions; and addresses service of the petitions and replies. All
correspondence and comments in connection with these filings should be
designated in reference to July 2, 2002 Annual Access Charge Tariff
Filing.
II. **DISCUSSION**
**A. Tariff Effective Date, Tariff Filing Dates, and Tariff Filling
Instructions**
2\. ILECs are permitted to make their tariff filings either 15 or 7 days
prior to the effective date of their tariffs, depending on the type of
changes the tariffs propose. Because of the weekend schedule in June and
July of 2002, it is necessary to modify the usual July 1 tariff
effective date for 2002 in order to accommodate the filing of tariff
revisions under Section 204(a)(3) of the Communications Act of 1934, as
amended (the Act).[^1] Accordingly, the July 2002 effective date for
ILEC annual access tariffs is modified to be July 2, 2002.[^2] For
tariffs filed on 15 days' notice, ILECs must make their annual tariff
filings on June 17, 2002. For tariffs filed on seven days' notice, ILECs
must make their tariff filings on June 25, 2002. ILECs must use the
Electronic Tariff Filing System (ETFS) to file all of their tariff
material,[^3] including their Tariff Review Plans (TRPs). ILECs should
make every effort to file as early in the day as possible in order to
avoid any complications on meeting the June 17, 2002, and June 25, 2002,
pre-7:00 PM deadlines for filing with the ETFS. ILEC filings must be
received by ETFS after 7:00 PM Eastern Time on June 16, 2002 and before
7:00 PM Eastern Time on June 17, 2002 for the filing to be considered
officially received on June 17, 2002. ILEC filings must be received by
ETFS after 7:00 PM Eastern Time on June 24, 2002 and before 7:00 PM
Eastern Time on June 25, 2002 for the filing to be considered officially
received on June 25, 2002. ILECs are reminded that there are remote
filing sites available, at the following addresses:
> California <http://www.fccetfs.com/>
>
> Chicago [http://161.58.254.112/](http://www.161.58.254.112/)
3\. ILECs that file tariffs under the price cap ratemaking methodology
are required to file revised annual access tariffs every year.[^4] ILECs
that file tariffs under the rate-of-return ratemaking methodology are
required to file every other year. Further, ILECs filing pursuant to the
requirements of section 61.38 [^5] are required to file in even-numbered
years [^6] and those filing pursuant to section 61.39 [^7] are required
to file in odd-numbered years and are not required to submit supporting
material with the revised tariff.[^8] Since 2002 is an even-numbered
year, only the price cap ILECs and the ILECs filing pursuant to section
61.38 are required to file revised access tariffs including support
material that includes a TRP. For the 2002 annual access tariff filing,
we are requiring the ILECs that do not normally file revised access
tariffs this year to submit only supporting material in the form of a
TRP that will detail the implementation of the procedures adopted in the
MAG Order.[^9] The details of this supporting material will be spelled
out in a subsequent order.
4\. In addition to filing the TRP on ETFS, each ILEC filing a TRP should
provide the Pricing Policy Division of the Wireline Competition Bureau
with two copies of the TRP on diskette or CD-ROM. These two copies
should be marked ATTN: Raj Kannan, 5-A207, 445 12^th^ Street, SW,
Washington, DC 20554. One copy of the TRP on diskette or CD-ROM should
also be given both to the FCC Reference Information Center, Portals II,
445 12^th^ Street, SW, Room CY-A257, Washington, DC 20554 and to the
Commission's Duplication Contractor, Qualex International, Portals II,
445 12^th^ Street, SW, Room CY-B402, Washington, DC 20554. Computer
diskette or CD-ROM copies of the price cap TRP's should be submitted in
Lotus Release-5 format. We urge carriers to run a computer virus check
on each diskette or CD before submitting those disks or CDs. The
computer file on the diskette or CD-ROM should be named COSAAN01 where
"COSA" is the 4-character company study area code.
5\. Copies of the TRP filed on diskette or CD-ROM may be obtained from
Qualex International (202) 863-2893 at 445 12^th^ Street, SW, Room
CY-B402, Washington, DC 20554. Copies of any information filed
electronically may be obtained via the Internet using the ETFS at
[http://svartifoss2.fcc.gov/prod/ccb/etfs]{.underline},[^10] or from
Qualex. For more information, contact Raj Kannan at (202) 418-1540,
Pricing Policy Division, Wireline Competition Bureau.
6\. Section 61.49(k) of the Commission's rules requires price cap
carriers to file a short form TRP without rate detail information 90
days prior to the usual effective date of July 1. For this year's
filing, however, we require that this short form TRP be filed on May 1,
2002.[^11] We will issue a separate order that will provide the details
of the short form TRP and the regular TRP. Comments on the short form
TRP will be due on May 13, 2002 and replies will be due May 20, 2002.
## B. Pleading Filing Dates and Procedures
7\. In order to maximize the time available for parties to review the
tariff filings and file comments, while leaving ILECs sufficient time to
respond, we are modifying the time for filing replies to petitions to
suspend or reject tariff filings made on seven days' notice. In
accordance with the tariff filing schedules, petitions to suspend or
reject tariff filings made on 15 days' notice will be due June 24, 2002,
and replies will be due June 28, 2002. Petitions to suspend or reject
tariff filings made on seven days' notice will be due June 28, 2002 and
replies will be due no later than 12:00 noon Eastern Time on July 1,
2002.[^12]
8\. Parties filing pleadings are encouraged to use ETFS in order to
facilitate access to these documents. Comments should be addressed to
the Commission's Secretary, Marlene H. Dortch, Office of the Secretary,
Federal Communications Commission, 445 12^th^ Street, SW, Washington, DC
20554. Parties should send three paper copies of their filing to Raj
Kannan, Pricing Policy Division, Wireline Competition Bureau, Federal
Communications Commission, 445 12^th^ Street, SW, Room 5-A207,
Washington, DC 20554. Parties should also send one copy to the
Commission's duplicating contractor, Qualex International, Portals II,
445 12^th^ Street, SW, Room CY-B402, Washington, DC 20554, telephone
202-863-2893, facsimile 202-863-2898, or via e-mail
<[email protected]>**.**
9\. Filings can be sent by hand or messenger delivery, by commercial
overnight courier, or by first-class or overnight U.S. Postal Service
mail (although we continue to experience delays in receiving U.S. Postal
Service mail). The Commission\'s contractor, Vistronix, Inc., will
receive hand-delivered or messenger-delivered paper filings for the
Commission\'s Secretary at 236 Massachusetts Avenue, N.E., Suite 110,
Washington, D.C. 20002. The filing hours at this location are 8:00 a.m.
to 7:00 p.m. All hand deliveries must be held together with rubber bands
or fasteners. Any envelopes must be disposed of before entering the
building. Commercial overnight mail (other than U.S. Postal Service
Express Mail and Priority Mail) must be sent to 9300 East Hampton Drive,
Capitol Heights, MD 20743. U.S. Postal Service first-class mail, Express
Mail, and Priority Mail should be addressed to 445 12th Street, SW,
Washington, D.C. 20554. All filings must be addressed to the
Commission\'s Secretary, Office of the Secretary, Federal Communications
Commission, 445 12th Street, SW, Washington, DC 20554. The following
chart summarizes this information:
+-----------------------------------+----------------------------------+
| **TYPE OF DELIVERY** | > **PROPER DELIVERY ADDRESS** |
+-----------------------------------+----------------------------------+
| Hand-delivered paper filings | > Vistronix, Inc. |
| | > |
| | > 236 Massachusetts Avenue, NE, |
| | > |
| | > Suite 110, Washington, DC |
| | > 20002 (Weekdays - 8:00 a.m. to |
| | > 7:00 p.m.) |
+-----------------------------------+----------------------------------+
| Commercial delivered documents | > 9300 East Hampton Drive, |
| (e.g., Federal Express) including | > |
| documents sent by overnight mail | > Capitol Heights, MD 20743 |
| (this type excludes USPS Express | > |
| and Priority Mail) | > (Weekdays - 8:00 a.m. to 5:30 |
| | > p.m.) |
+-----------------------------------+----------------------------------+
| USPS First-Class, Express, and | > 445 12^th^ Street, SW |
| Priority Mail | > |
| | > Washington, DC 20554 |
+-----------------------------------+----------------------------------+
Petitioners and carriers filing in paper format should file their
originals with the Secretary as specified above, with copies to the
Chief, Pricing Policy Division at 445 12^th^ Street, SW, 5-A207,
Washington, DC 20554, and Qualex. Petitioners and carriers filing
electronically on the ETFS will **[not]{.underline}** be required to
file copies with the Pricing Policy Division or Qualex. For the purpose
of this tariff proceeding, any petitions and reply comments filed on the
ETFS will be considered officially filed with the Commission. We caution
parties that the Commission's Electronic Comment Filing System (ECFS)
will not accept these petitions and replies. We also invite members of
the general public to submit one copy of their comments, without regard
to form, by letter to the Secretary, 445 12^th^ Street, SW, Washington,
DC 20554.
# Service
10\. Because there is limited time available for review of the petitions
and replies, we establish the following service requirements for these
filings. On the date one of these filings is submitted to the
Commission, it shall be served upon the filing carrier or the
petitioner, respectively, or their attorney or other duly constituted
agent by personal delivery or by facsimile transmission.[^13] Parties
are instructed to provide contact persons and facsimile numbers in their
filings. Parties filing petitions and replies electronically are
reminded they are still required to serve copies in accordance with
these rules as stated herein.
**III. ORDERING CLAUSE**
11\. Accordingly, IT IS ORDERED that, pursuant to sections 1, 4 (i) and
(j), 201-209, of the Communications Act, as amended that this order is
HEREBY ADOPTED as described above.
12\. IT IS FURTHER ORDERED that, pursuant to section 1.3 of the
Commissions rules, 47 C.F.R. § 1.3, section 69.3 of the Commission's
rules 47 C.F.R. § 69.3, is WAIVED for the purpose specified in paragraph
2 *supra*.
13\. IT IS FURTHER ORDERED that, pursuant to section 1.3 of the
Commissions rules, 47 C.F.R. § 1.3, section 61.49(k) of the Commission's
rules, 47 C.F.R. §61.49(k), IS WAIVED for the purpose specified in
paragraph 5 *supra.*
14\. IT IS FURTHER ORDERED that, pursuant to section 1.3 of the
Commissions rules, 47 C.F.R. § 1.3, section 1.4(f) of the Commission's
rules, 47 C.F.R. § 1.4(f), IS WAIVED for the purpose specified in
paragraph 6 *supra.*
15\. IT IS FURTHER ORDERED that, pursuant to section 1.3 of the
Commissions rules, 47 C.F.R. § 1.3, section 1.47(d) of the Commission's
rules, 47 C.F.R. § 1.47(d), IS WAIVED for the purpose specified in
paragraph 8 *supra.*
> FEDERAL COMMUNICATIONS COMMISSION
>
> Tamara Preiss
>
> Chief, Pricing Policy Division
>
> Wireline Competition Bureau
[^1]: ^?^ 47 U.S.C. § 204(a)(3). Pursuant to this section of the Act,
ILECs may file certain tariffs that take effect 15 days after they
are filed. To be effective on July 1, these tariffs would have to be
filed on Sunday, June 16. The Commission, however, is closed on
Sundays.
[^2]: ^?^ We waive any inconsistent portions of section 69.3 of the
Commission's rules.
[^3]: ^?^ 47 C.F.R. § 61.13(b).
[^4]: 47 C.F.R. § 61.43.
[^5]: 47 C.F.R. § 61.38.
[^6]: 47 C.F.R. § 69.3(f)(1).
[^7]: 47 C.F.R. § 61.39.
[^8]: 47 C.F.R. § 69.3(f)(2).
[^9]: Multi-Association Group (MAG) Plan for Regulation of Interstate
Services of Non-Price Cap Incumbent Local Exchange Carriers and
Interexchange Carriers, CC Docket No. 00-256, *Second Report and
Order and Further notice of Proposed Rulemaking,* FCC 01-304 (rel.
Nov 8, 2001) (*"Rate-of-Return Access Charge Reform Order").*
[^10]: ^?^ Users may also use the alternate site for accessing ETFS at
<http://gullfoss2.fcc.gov/prod/ccb/etfs/>.
[^11]: ^?^ We waive any inconsistent portions of section 61.49(k) of the
Commission's rules.
[^12]: ^?^ We waive any inconsistent portions of section 1.4(f) of the
Commission's rules.
[^13]: ^?^ 47 C.F.R. §§ 1.773(a)(4) and (b)(3). We waive any
inconsistent portions of Section 1.47(d) of the Commission's rules.
|
en
|
markdown
|
055996
|
# Presentation: 055996
## Clinical Document Architecture for Reporting Healthcare-Associated Infection Data
- Marla Albitz
- NHSN Project Manager
- Lockheed Martin
- Division of Healthcare Quality Promotion and National Center for Preparedness, Detection and Control of Infectious Diseases
- September 10, 2008
- Atlanta, Georgia
## Acknowledgements
- Surveillance Branch/Informatics Staff
- Venu Sarraff Monica Shepard
- Jonathan Edwards Teresa Horan
- Maggie Dudeck Dan Pollock
- Dawn Sievert Wenkai Li
- Mary Andrus Carlasha Jenkins
- Kelly Peterson Bobby Ray
- Ben Kupronis
- Consultants
- Alschuler Associates
- Frazier Consulting
- Association of Professionals in Infection Control
- SAIC Development Staff
- David McClanahan
- Romaine Tenney
- NCPHI
- Sundak Ganesan
- John Vrtachnik
- GB Kesarinath
- Vendors
- Theradoc,
- ICPA
- Medmined
- Premier Inc.
- Epiquest
- Vecna
## Objectives
- Overview of the National Healthcare Safety Network (NHSN)
- The what, why and how of Clinical Document Architecture (CDA) for NHSN and Healthcare Associated Infection (HAI) Reporting
- Challenges and Lessons Learned
## Web-based system that combines facility-level clinical performance measurement with national-level public health surveillance
http://www.cdc.gov/ncidod/dhqp/nhsn_members.html
Participating healthcare facilities use the NHSN application to enter, analyze, and share data
CDC uses data collected through NHSN for aggregate analysis and reporting
- Web-based system that combines facility-level clinical performance measurement with national-level public health surveillance
- http://www.cdc.gov/ncidod/dhqp/nhsn_members.html
- Participating healthcare facilities use the NHSN application to enter, analyze, and share data
- CDC uses data collected through NHSN for aggregate analysis and reporting
## NHSN’s technical design enables data entry via secure web pages or file transfers (standard electronic messages or documents) via secure internet connections.
## Over 1700 healthcare facilities enrolled; many more expected to join
Facilities in 47 states currently enrolled.
Collaborations with Center for Medicare and Medicaid Services, Veterans Health Administration, and other federal agencies
Collaborations with vendors of infection control surveillance systems.
- Facilities in 47 states currently enrolled.
- Collaborations with Center for Medicare and Medicaid Services, Veterans Health Administration, and other federal agencies
- Collaborations with vendors of infection control surveillance systems.
## NHSN Data Collection Forms
- Surgical Site Infection
- Urinary Tract Infection
- Pneumonia
- Multi-drug Resistant Organism
- Influenza vaccination coverage Central Line Insertion Practices
- Non-protocol events such as Skin and Soft Tissue Infection
- Associated denominators
**NHSN Data Collection Forms**
## Surgical Site Infection Form
## What is CDA?
- Paper
- XML*
- <text xmlns:cda="urn:hl7-org:v3">
- <table>
- <tbody>
- <tr>
- <td valign="top">Fever</td>
- <td valign="top">Yes</td>
- </tr>
- </tbody>
- </table>
- </text>
- * Extensible Markup Language
## What is XML?
- XML stands for E**X**tensible **M**arkup **L**anguage
- XML is a **markup language **much like HTML
- XML was designed to **carry data**, not to display data
- XML tags are not predefined. You must **define your own tags **
- XML is designed to be **self-descriptive **
- XML is a **W3C Recommendation **
## NHSN Web Interface and CDA
**Healthcare Facility**
**CDC**
**CDC Firewall**
**Entry of location mapping codes and monthly reporting plan**
**Vendor system used to collect HAI data and create CDA document**
**Facility Firewall**
**Parsing**
**and**
**Validating**
- CDA Document
**NHSN Application**
- Web-based data entry and access
## Standardize the structure and content of clinical documents for electronic exchange between systems or stand alone use
Achieve semantic interoperability, i.e., the ability of two systems to share data, with no prior negotiations
Provide a structured document foundation for standards-based electronic health record systems
- Achieve semantic interoperability, i.e., the ability of two systems to share data, with no prior negotiations
- Provide a structured document foundation for standards-based electronic health record systems
**Objectives of CDA**
## CDA documents are encoded in Extensible Markup Language (XML)
CDA documents derive their meaning from the HL7 v3 Reference Information Model (RIM ) and use HL7 v3 Data Types and vocabulary
A CDA document consists of a header and a body
Header is consistent across all clinical documents - identifies and classifies the document, provides information on patient, provider, encounter, and authentication
Body contains narrative text / structured content
- CDA documents derive their meaning from the HL7 v3 Reference Information Model (RIM ) and use HL7 v3 Data Types and vocabulary
- A CDA document consists of a header and a body
- Header is consistent across all clinical documents - identifies and classifies the document, provides information on patient, provider, encounter, and authentication
- Body contains narrative text / structured content
**Technical features**
## Persistence - Documents exist over time and can be used in many contexts
Stewardship - Documents must be managed, shared by the steward
Potential for authentication - Intended use as a legal documentation
Wholeness - Document includes its relevant context
Human readability - Essential for human authentication
- Stewardship - Documents must be managed, shared by the steward
- Potential for authentication - Intended use as a legal documentation
- Wholeness - Document includes its relevant context
- Human readability - Essential for human authentication
**CDA Characteristics**
## CDA Implementation Guides
- The Continuity of Care Document (CCD ) is an approved HL7 standard.
- Operative Notes (under development)
- Patient history and physical examination (under development)
- HAI Reporting (under development, first for public health)
- Morbidity reporting from healthcare to state and local health departments (awarded)
## What is Electronic messaging?
- An HL7 message is a dataset that serves a particular communication purpose and is expressed consistent syntax with standard vocabulary.
- Messages are used to exchange data in real-time. They convey status information and provide “current” data.
- Microbiology results, ADT, Pharmacy data from already established mission critical systems in healthcare.
## Electronic Messaging vs. CDA
| | Messages | Documents |
| --- | --- | --- |
| Lifetime | Temporary | Persistent |
| Communication | Trigger based | Human initiated |
| Source | Designed per system use case | Defined by clinical precedent |
| Context | Must be defined in each segment | Document as a whole |
## Collaborators for HAI CDA Development
- NHSN Subject Matter Experts
- Implementation Guide consultants
- Vocabulary Specialists
- HL7 Structured Documents Work Group
- Infection Control Surveillance System Vendors
## Components of CDA workflow
- Implementation Guide – provides guidance to implementers of CDA.
- Validator – xsl file that validates that a given CDA is well formed in accordance to the CDA R2 standard.
- Schematron – validates the conformance to the Implementation Guidance.
- Source application that generates the CDA document
- Parsing tool that receives the CDA document – validates that the data received within the CDA document adheres to the data validation of the receiving application.
## What is a clinical statement?
- Provides a standard way of expressing a discrete item of clinical information that is recorded because of its relevance to the care of a patient.
- The end result is that clinical observations such as a “fever” observation can be communicated consistently whenever it is expressed.
**Why is the clinical statement approach important in the context of data exchange?**
## Clinical Statement Types
- Observation (e.g. lab result)
- Procedure (e.g. Knee replacement)
- SubstanceAdministration (e.g. administer a medication)
- Supply (e.g. dispensing a drug)
- Encounter (e.g. hospitalization)
- Organizer (e.g. pairing of a pathogen and susceptibility test)
- Consent (e.g. consent for the information contained in the document to be released to a third party)
## Implementation Guide: Conformance statements
- The Implementation Guide further constrains the RIM and specific direction to the implementer through conformance statements.
## Conformance statements are used to create clinical statements in XML
- <!-- Criterion of Diagnosis Observations -->
- <component>
- <observation classCode="OBS" moodCode="EVN" negationInd="false">
- <!-- template for observation: Criterion of Diagnosis Observation -->
- <templateId root="upd-9"/>
- <code codeSystem="2.16.840.1.113883.5.4" code="ASSERTION"/>
- <statusCode code="completed"/>
- <value xsi:type="CD" codeSystem="2.16.840.1.113883.6.96"
- codeSystemName="SNOMED" code="386661006" displayName=“Fever"/>
- </observation>
- </component>
## Example of NHSN Clinical Criteria for Bloodstream Infection
## <text xmlns:cda="urn:hl7-org:v3">
- <table>
- <tbody>
- <tr>
- <td valign="top">Fever</td>
- <td valign="top">Yes</td>
- </tr>
- </tbody>
- </table>
- </text>
- <!-- Criterion of Diagnosis Observations -->
- <component>
- <observation classCode="OBS" moodCode="EVN" negationInd="false">
- <!-- template for observation: Criterion of Diagnosis Observation -->
- <templateId root="upd-9"/>
- <code codeSystem="2.16.840.1.113883.5.4" code="ASSERTION"/>
- <statusCode code="completed"/>
- <value xsi:type="CD" codeSystem="2.16.840.1.113883.6.96"
- codeSystemName="SNOMED" code="386661006" displayName=“Fever"/>
- </observation>
- </component>
- Required narrative block
- Structured Body
## <text xmlns:cda="urn:hl7-org:v3">
- <table>
- <tbody>
- <tr>
- <td valign="top">Fever</td>
- <td valign="top">Yes</td>
- </tr>
- </tbody>
- </table>
- </text>
- Required narrative block
## <!-- Criterion of Diagnosis Observations -->
- <component>
- <observation classCode="OBS" moodCode="EVN" negationInd="false">
- <!-- template for observation: Criterion of Diagnosis Observation -->
- <templateId root="upd-9"/>
- <code codeSystem="2.16.840.1.113883.5.4" code="ASSERTION"/>
- <statusCode code="completed"/>
- <value xsi:type="CD" codeSystem="2.16.840.1.113883.6.96"
- **codeSystemName="SNOMED" code="386661006" displayName=“Fever"/>**
- </observation>
- </component>
- Structured Body
## Coded Value within the structured body
**Coded Value within the structured body**
## Standard Vocabulary in NHSN’sCDA Surgical Site Infection Report
**Standard Vocabulary in NHSN’s****CDA Surgical Site Infection Report **** **
- _Signs & Symptoms_
- □ Purulent drainage or material
- □ Pain or tenderness
- □ Localized swelling
- □ Redness
- □ Heat
- □ Fever
- □ Incision deliberately opened
- by surgeon
| Source | Code |
| --- | --- |
| SNOMED | 307491001 |
| NSHN term | SS_pain |
| NSHN term | SS_locSwell |
| SNOMED | 386713009 |
| SNOMED | 304214002 |
| SNOMED | 386661006 |
| NSHN term | SS_incision |
## NHSN/CDA status
- Bloodstream Infection pilot Fall 2007
- Surgical Site Infection pilot Summer 2008
- Implementation Guides currently under ballot for MDRO and clinical criteria.
- Implementation Guides currently under construction for Patient Flu and Central Line Insertion Practices events.
- Coming soon – Custom Events, UTI and PNEU
## Lessons learned
- NHSN data requirements gathering - required work on a detailed data level that in some instances called for clarification from Subject Matter Experts and close collaboration with CDA modelers.
- Identified the value of working with vendors in terms of close reviews of the IG and reality checks in the form of pilot projects while the IG remains a work in progress
- Identified the value of working with Alschuler Associates (technical expertise with CDA and know-how with respect to HL7 processes)
- Identified the value of considering receiving data electronically and through a user interface when designing business rules.
## Q & A
- Marla Albitz
- NHSN Project Manager
- Lockheed Martin contractor
- Centers for Disease Control and Prevention
- 1600 Clifton Road, NE Mail Stop A24
- Atlanta, GA 30333
- Office (404) 639-4292
- e-mail: [email protected]
**Contact Information**
|
en
|
converted_docs
|
425746
|
UNITED STATES DEPARTMENT OF EDUCATION
OFFICE OF SPECIAL EDUCATION
AND REHABILITATIVE SERVICES
REHABILITATION SERVICES ADMINISTRATION
WASHINGTON, DC 20202
[INFORMATION MEMORANDUM]{.underline}
RSA-IM-93-23
RSM-
Date: August 9, 1993
ADDRESSEES: STATE VOCATIONAL REHABILITATION AGENCIES (GENERAL)
STATE VOCATIONAL REHABILITATION AGENCIES (BLIND)
CLIENT ASSISTANCE PROGRAMS
RSA SENIOR MANAGEMENT TEAM
REGIONAL REHABILITATION CONTINUING EDUCATION
PROGRAMS
RSA DISCRETIONARY GRANTEES
SUBJECT : References to the Americans with Disabilities Act of 1990
Contained in the 1992 Amendments to the Rehabilitation Act of 1973
CONTENT : The 1992 Amendments to the Rehabilitation Act of 1973 (the
Act) contain numerous references to the Americans with Disabilities Act
of 1990 (the ADA). Some of these references ensure that the goals and
intent of the two acts are identical or working in concert. Other
modifications to the Act were made to conform language of the Act with
similar language in the ADA. This Information Memorandum highlights key
provisions/changes in the Act along with a summary of the purpose for
the changes. The language of the law is presented in **bold** print with
new language [underlined]{.underline}. A summary of the changes follows
the statutory language.
**FINDINGS; PURPOSE; POLICY**
**Section 7 Definitions**
\(8\) **[(E) For the purposes of sections 501, 503 and 504
-]{.underline}**
(i) **[for purposes of the application of subparagraph (B) to such
sections, the term \"impairment\" does not include homosexuality or
bisexuality; and]{.underline}**
**(ii) [therefore the term \"individual with a disability\" does not
include an individual on the basis of homosexuality or
bisexuality.]{.underline}**
**[(F) For the purposes of section 501, 503 and 504, the term
\"individual with a disability\" does not include an individual on the
basis of -]{.underline}**
**[(i) transvestism, transsexualism, pedophilia, exhibitionism,
voyeurism, gender identity disorders not resulting from physical
impairments, or other sexual behavior disorders;]{.underline}**
**[(ii) compulsive gambling, kleptomania, or pyromania;
or]{.underline}**
**[(iii) psychoactive substance use disorders resulting from current
illegal use of drugs.]{.underline}**
These modifications conform language in the definition of \"individual
with a disability\" to that
used in the civil rights sections of Title V of the Act so that the
protected class coverage of these
sections is similar to the protected class coverage of the ADA. They
incorporate the exclusions
from the term \"individual with a disability\" set forth in the ADA for
purposes of sections 501,
503, and 504 of the Rehabilitation Act.
**TITLE I - VOCATIONAL REHABILITATION SERVICES**
**PART A - GENERAL PROVISIONS**
**Section 100 Declaration of Policy; Authorization of Appropriations**
**(a)(1) Congress finds that --**
**[(E) enforcement of title V and of the Americans with Disabilities Act
of 1990 (42 U.S.C. 1210 et seq.) holds the promise of ending
discrimination for individuals with disabilities;]{.underline} . . .**
Under section 100(a)(1)(D), Congress identified discrimination as one of
the reasons for the significant number of individuals with disabilities
being unemployed or underemployed. With this language Congress
highlights the importance of eliminating discrimination in order for the
purposes of Title I of the Act to be fulfilled.
**Section 101 State Plans**
**(a)(6)(B) provide satisfactory assurances that facilities used in
connection with the delivery of services assisted under the plan will
comply with the Act of August 12, 1968, commonly known as the
Architectural Barriers Act of 1968, [with section 504 of this Act, and
with the Americans with Disabilities Act of 1990.]{.underline}**
States must provide assurances, as part of their State plan, that the
facilities used in the provision of services comply with the
Architectural Barriers Act, section 504 of the Act, and the ADA. The
Architectural and Transportation Barriers Compliance Board, also known
as the Access Board, establishes the accessibility standards under each
of these acts. The standards can be found at 34 CFR 104.23(c) and 41 CFR
Appendix A, Subpart 101-19.6.
**Section 103 Scope of Vocational Rehabilitation Services**
**(b) Vocational rehabilitation services, when provided for the benefit
of groups of individuals, may also include the following:**
**[(5) Technical assistance and support services to businesses that are
not subject to title I of the Americans with Disabilities Act of 1990
(42 U.S.C. 12111 et seq.) and that are seeking to employ individuals
with disabilities.]{.underline}**
This provision allows State agencies, as part of their services to
groups of individuals, to provide technical assistance and support
services to companies that are trying to employ people with disabilities
but which do not have to comply with the ADA. Generally, this would mean
companies which employ less than the current threshold of 25 employees
or the future threshold of 15 employees.
**[Section 109 Training of Employers with Respect to Americans with
Disabilities Act of 1990]{.underline}**
**[A state may expend payments received under section 111
-]{.underline}**
**[(1) to carry out a program to train employers with respect to
compliance with the requirements of title I of the Americans with
Disabilities Act of 1990 (42 U.S.C. 12111 et seq.); and]{.underline}**
**[(2) to inform employers of the existence of the program and the
availability of the services of the program.]{.underline}**
This provision authorizes the expenditure of funds under the Vocational
Rehabilitation Services Program for State programs that educate and
train employers on the employment provisions of the ADA. It also allows
for expenditures which advertise, market, or otherwise make employers
aware of the existence of these programs. This authorization is specific
to training programs concerning Title I of the ADA and does not
authorize expenditures for programs focusing on Title II (State and
Local Governments) or Title III (Program Accessibility) of the ADA.
**Section 112 Client Assistance Program**
**(a) . . .[The client assistance program shall provide information on
the available services and benefits under this Act and title I of the
Americans with Disabilities Act of 1990 (42 U.S.C. 12111 et seq.) to
individuals with disabilities in the State, especially with regard to
individuals who have traditionally been unserved or underserved by
vocational rehabilitation programs.]{.underline} . . .**
This provision requires that each CAP provide information not only on
the services and benefits under the Act but also those available under
Title I of the ADA. This provision also requires CAP to focus these
outreach efforts on unserved and underserved groups.
**PART C - INNOVATION AND EXPANSION GRANTS**
**[Section 123 Use of Funds]{.underline}**
**[A state may use funds made available under this part, directly or by
grant, contract, or other arrangement, to carry out]{.underline}**
**[(1) programs to initiate and expand employment opportunities for
individuals with severe disabilities in integrated settings that allow
for the use of on-the-job training to promote the objectives of title I
of the Americans with Disabilities Act of 1990 (42 U.S.C. 12111 et
seq.);]{.underline}**
**[. . .]{.underline}**
**[(4) programs and activities that -]{.underline}**
**[(A) assist employers in accommodating, evaluating, training or
placing individuals with disabilities in the workplace of the employer
consistent with provisions of this act and title I of the Americans with
Disabilities Act of 1990; and]{.underline}**
**. . .**
**[(11) support the provision of training and technical assistance to
clients, business, industry, labor, community rehabilitation programs,
and others regarding the implementation of the amendments made by
Rehabilitation Act]{.underline}**
> **[Amendments of 1992, of title V of this Act, and of]{.underline}**
>
> **[the Americans with Disabilities Act of 1990; and]{.underline}**
Among the authorized uses of funds under the Innovation and Expansion
grants program is the establishment of on-the-job training programs for
individuals with severe disabilities. These programs must be in
integrated settings and must promote the equal employment opportunities
objectives of the ADA. States may also provide or contract for programs
and activities under this part which assist employers with
accommodating, evaluating, training, and placing individuals with
disabilities. Again, these programs must be consistent with the goals
and objectives of the Act and the ADA. Finally, States may provide or
support the provision of training and technical assistance under this
part to anyone concerning the 1992 Amendments, the provisions of title V
(usually sections 501, 503 and 504), as well as any of the provisions of
the ADA, not simply title I of the ADA.
**TITLE II - RESEARCH**
**Section 204(b) Research Activities**
**(3)[(D)(i) In establishing Centers to conduct the research or
demonstration activities described in subparagraph (B)(iii), the
Director may establish one Center in each of the following areas of
focus:]{.underline}**
**[. . .]{.underline}**
**[(III) Employment, including supported employment, and reasonable
accommodations and reduction of environmental barriers as required by
the Americans with Disabilities Act of 1990 (42 U.S.C. 12101 et seq.)
and title V]{.underline}** \[of the Act\].
Under the Research title (Title II) of the Act, this section supports
the establishment of Rehabilitation Engineering Research Centers. One
authorized focus area (employment) of such a Center includes reasonable
accommodations and the reduction of environmental barriers as required
by the ADA and Title V of the Rehabilitation Act.
**TITLE III - TRAINING AND DEMONSTRATION PROJECTS**
**Section 302 Training**
**[(a)(3) In carrying out this subsection, the Commissioner shall
furnish training regarding the services provided under this Act, and, in
particular, services provided in accordance with amendments made by the
Rehabilitation Act Amendments of 1992, to rehabilitation counselors and
other rehabilitation personnel. In carrying out this subsection, the
Commissioner shall also furnish training to such counselors and
personnel regarding the applicability of section 504 of this Act, title
I of the Americans with Disabilities Act of 1990, and the provisions of
titles II and XVI of the Social Security Act that are related to work
incentives for individuals with disabilities.]{.underline}**
This provision stipulates that training will be provided to
rehabilitation counselors and other rehabilitation personnel on the
applicability of title I of the ADA to vocational rehabilitation and
employment of individuals with disabilities.
**TITLE IV - NATIONAL COUNCIL ON DISABILITY**
**Section 401 Duties**
**[(a)(7) gather information about the implementation, effectiveness,
and impact of the Americans with Disabilities Act of 1990 (42 U.S.C.
12101 et seq.);]{.underline}**
This section adds a new responsibility for the National Council on
Disability to gather information regarding the implementation,
effectiveness, and impact of the ADA.
**TITLE VI - EMPLOYMENT OPPORTUNITIES FOR INDIVIDUALS WITH
DISABILITIES**
**Section 621 Part B - Projects with Industry**
**[(a)(6) The Commissioner may include, as part of agreements with grant
recipients, authority for such grant recipients to provide technical
assistance to -]{.underline}**
**. . .**
**[(C) assist employers in understanding and meeting the requirements of
the Americans with Disabilities Act of 1990 (42 U.S.C. 12101 et seq.) as
the Act relates to employment of individuals with
disabilities.]{.underline}**
> This provision allows the Commissioner to include, as part of the
>
> agreements with PWI grantees, authority for them to provide technical
>
> assistance to employers concerning the employment provisions
>
> of the ADA.
\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_
Acting Commissioner
Rehabilitation Services
Administration
CC: CSAVR
NAPAS
|
en
|
converted_docs
|
030161
|
# SVX Bias Voltage Protection circuits.
The important characteristics of the needed circuits are 1) limiting the
voltage that is applied to the silicon sensors, 2) rapid operation, 3)
reliable operation and small impact on the bias voltage during normal
operation.
### Circuit Analysis
Three circuits that satisfy the above conditions can be labeled by their
effect on the bias voltage when they operate. The crowbar circuit will
short the bias output when the bias voltage exceeds the threshold value.
The clamp circuits (2 styles) try to hold the bias voltage at the
threshold value.
If a fuse is added to the circuit so it can isolate the silicon from the
supply.
The protection circuit will have leakage currents that will add to the
existing leakage of the silicon sensors. It is important to minimize
these currents in the protection circuit because sensor leakage will be
monitored as an indicator of radiation damage. There are four types of
active devices used in these circuits that can contribute to the leakage
currents. They are Zener Diodes, Silicon Controlled Rectifiers, Metal
Oxide Semiconductor Field Effect Transistors, and Transient Voltage
Suppressors. The table below shows example leakage currents for these
devices.
---------------- -------------- ----------- ----------------- ----------
Zener Diode SCR MOSFET TVS
Max Leakage (ua) \<0.1 2 1 1
---------------- -------------- ----------- ----------------- ----------
Using selected parts and their data sheet specifications, the three
circuits, crowbar, clamp1 and clamp2, add to the load on the power
supply by amounts shown in the table below.
----------------- ----------------- ----------------- -----------------
Crowbar Clamp1 Clamp2
Max Leakage (ua) 2.1 1.2 1
----------------- ----------------- ----------------- -----------------
With a fuse in line the circuit must draw enough current to melt the
fuse wire. The power supply is capable of 5 milliamps. The normal
operating current is less than 500 micro amps. The smallest fuse value
that is easily commercially available is 2 milliamps. This puts the
fault current at 2.5 times the fuse rating. The manufacturer
specifications rate the fuse opening time at 5 seconds (maximum) at
twice the fuse rating. The crowbar circuit has an advantage in that it
will minimize the voltage on the sensor during the time it takes to melt
the fuse. The two clamp circuits will hold the sensor voltage at the
threshold voltage during this time.

Figure 1 Crowbar Circuit
The "standard" power supply crowbar circuit is a good fit here. The
working voltages and currents are not taxing and allow for physically
small devices. The devices can be selected for low leakage currents. The
fault operation of the circuit removes all of the voltage, and therefore
the stress, from the SVX sensor.

Figure 2 Clamp1 Circuit
The clamp can also be optimized for leakage current and use small
devices. However, there are more parts to the circuit. Also undesirable
is the fact that if the fuse does not open, the clamp voltage remains on
the sensor until an operator takes action in response to the fault.

Figure 3 Clamp2 Circuit - Transient Voltage Suppressor
# The transient voltage suppressor is more suited protection from lightening strikes and large voltage spikes. The voltage threshold is "soft" with the device only beginning to draw current at the threshold voltage. I tested a 160-volt device and the device was not drawing 5 ma. until 170 volts. This circuit also does not remove the voltage from the sensor but clamps it at the threshold voltage. In this case, however, the voltage was not even firmly clamped.
# Conclusion
# The crowbar circuit is the first choice and will be implemented with an in line fuse. The zener diodes will be selected for the different power supply and ladder configurations but can be limited to three or four voltages. The circuit will have sites for three zeners to allow flexibility in setting the voltage. A single circuit board with five crowbars can be contained within a plastic case similar to the existing "scrambling" adapter used on some of the Caen supplies. Thus it will be a stand-alone module with connectors at each end that can be put in line with the cable to the detector. The fuse will be removable but for safety they will not be accessible without opening the case.
# Safety Issues.
The crowbar circuit should be usable on all types of CAEN power supplies
used in the CDF silicon systems, Types A509 -- SVX, A509H -- Layer 00,
and A510 -- ISL. The pin outs are different between some of these
modules but are matched to the single detector cable pin out by the use
of scrambling adapters. A single crowbar module should satisfy the needs
of all three systems if it is matched to the bias cable pin out.
### Printed Circuit Details
For purposes of this design and the following specification, references
to \"high voltage\" are defined as 512 DC volts under worst-case
conditions. Only one of the existing power supplies (A509H) is capable
of this voltage.
High voltage traces will be run on internal layers whenever possible to
minimize electrical leakage due to high humidity or condensation.
High voltage traces will be run on as few internal layers as possible,
and a minimum dielectric thickness/spacing of 0.28mm (IPC-2221 Table
6-1) around any layer (z-axis) carrying high voltage will be specified
on the master drawing. All layers carrying high voltage will be
designated on the master drawing as well.
The minimum dielectric strength of the printed circuit core material and
bonding material shall be specified on the master drawing as 750
volts/mil. The PC board fabricator will be specifically instructed to
choose prepreg resins and adhesives with similar dielectric strength
characteristics to that of the of the dielectric core material being
bonded.
The circuit board will utilize a conformal coating (soldermask) on all
external conductor layers. Via holes carrying high voltage will be given
a conformal coating over their external pads.
Adhering to IPC guidelines (IPC-2221 Table 6-1), the following minimum
high voltage trace spacing will be adhered to:
Internal HV conductors: 0.28mm (11.02 mils)
External HV conductors with conformal coating: 0.83mm (32.68 mils)
External HV component lead termination (uncoated): 1.53mm (60.24 mils)
External HV via hole pads with conformal coating: 0.83mm (32.68 mils)
External HV via hole pads without conformal coating: not permitted
The minimum spacing defined here will also apply between conductive
patterns, layer-to-layer conductive materials (z-axis) and between
conductive materials such as mounting hardware.
Minimum and maximum high voltage trace widths will be dependant upon the
current being delivered, the amount of acceptable temperature rise in
the circuit traces and the copper weight of the layers carrying the high
voltage traces. A safety factor of 100% in current capacity will be
implemented.
In normal operation the circuit will have up to 180 volts across it. In
the event of a power supply failure that applies the maximum possible
voltage to the output, the crowbar will operate at the threshold voltage
and reduce the voltage on the modules output connector to less than 2
volts. If the fuse operates normally and melts under the over current
condition, it will disconnect the crowbar from the power supply output.
If the fuse does not open, the voltage across the crowbar will be held
below 2 volts until an operator turns off the power supply.
The devices chosen for the prototype crowbar have these specifications:
+---------+---------+-----------------------+----------+-------------+
| Device | Type | Max fwd or Rev | Fwd I | Rev I - |
| | | Voltage | | leakage |
+---------+---------+-----------------------+----------+-------------+
| TCR22-8 | SCR | 600 Vdc | 1.5 A | 2 ua |
+---------+---------+-----------------------+----------+-------------+
| 1N52vv | Zener | 75 Vdc, 3 places | 6 ma | 0.1 ua |
| | | | I~z~ | |
+---------+---------+-----------------------+----------+-------------+
| 272.002 | Fuse | 125 V working, | 2 ma | NA |
| | | | | |
| | | \>500 V open | | |
+---------+---------+-----------------------+----------+-------------+
| Rn | R | 400 V | NA | NA |
| | esistor | | | |
+---------+---------+-----------------------+----------+-------------+
### Failure analysis
Failure modes of the crowbar devices after the power supply has failed:
- If the SCR fails shorted, the crowbar will not allow the voltage to
rise above a low voltage.
- If the SCR fails open, the crowbar will not protect the sensor. The
zener diodes and the resistors will have the full power supply
voltage across them. The zeners will conduct as much current as the
resistors will allow.
V ~resistors~ = V ~output~ -- V ~zeners~.
I ~resistors~ = I ~zeners~ = V ~resistors~ / R ~resistors~
The zeners for this design are expected to be in the range of 75 to 180
volts. The resistors are approximately 130 K ohms. The current should be
less than 3.3 ma. The lowest zener value (75v) will allow the voltage
across the resistor to exceed the specification of the resistor by about
10%.
- If the zeners or upper resistors fail open the crowbar will not
protect the sensor. The crowbar circuit will survive the 512 volts
across it.
- If the lower resistor fails open the crowbar will not allow the
voltage to rise above a low voltage.
- If one of the zeners fail shorted the crowbar will operate at a
significantly lower voltage.
- If upper resistor fails shorted the SCR gate current will be higher
than needed until the fuse operates of the operator turns off the
supply. The maximum current will be 1/200^th^ the maximum allowed
for this device.
- If the lower resistor fails shorted, the crowbar will clamp the
output voltage at the zener threshold voltage plus a few volts due
to the voltage developed across the conducting zeners and the upper
resistor.
### Materials safety
The plastic enclosure used for the Layer 00 module is a CN-0303 model
from PacTec Enclosures
([www.pactecenclosures.com](http://www.pactecenclosures.com/)). The case
material is a Polylac ABS plastic and it holds a UL94HB flame class
rating. The printed circuit board material is standard FR4 fiberglass
that is used throughout the industry. The components are common types
and packages used throughout the industry and HEP systems.
|
en
|
converted_docs
|
199580
|
**5.3 Vacuum Vessel**
**5.3.1 Introduction**
The vacuum vessel, shown in Fig. 5.3.1-1, provides the vacuum
environment for the plasma as well as the first confinement barrier for
radioactive materials. The vessel also serves as the support structure
for all in-vessel components, provides the first level of nuclear
shielding, and helps provide for the passive stabilization of the
plasma. The vessel system includes the torus, the ports and port
extensions, the gravity supports, the supports for internal components,
the passive stability plates, the internal control coils, and the
integrated coolant/bake-out lines.
{width="6.933333333333334in"
height="4.6722222222222225in"}
**5.3.2 Vessel Concept**
The vessel torus is a double wall sandwich structure consisting of 15 mm
thick inner and outer face-sheets attached to poloidal ribs. The space
between the face-sheets, which varies from 20 mm on the inboard side to
540 mm on the outboard side, is filled with radiation shielding material
and coolant. Water at 20-50 C and 1 MPa is used to remove nuclear
heating during normal operation. The water temperature is raised to 150C
for heating the vessel and internals during bake-out. The shielding
material can be single sized stainless steel balls with a packing
fraction of about 60% or stacked plates with a similar packing fraction.
The vessel parameters are summarized in Table 5.3.2-1.
The primary advantages of the double wall structure include higher
bending stiffness (for a given total material thickness) and better
integration of cooling and shielding. Most vacuum vessel designs in use
(JET, JT60, DIII-D) and most designs on the drawing board (ITER, KSTAR)
use full or partial double wall vacuum vessels. Figure 5.3.2-2 shows a
cutaway of the vessel and pertinent dimensions.
There are 16 sets of access ports around the torus, which are used for
RF heating, remote maintenance, diagnostics, internal cooling, fueling,
and pumping. There are large, 1.3 x 0.7 m midplane ports, upper and
lower trapezoidal ports approximately 0.15 x 0.5 m, and upper and lower
oblong vertical ports approximately .08 x 0.15 m in size. The sets of
port openings are identical at each toroidal location to provide
structural and design symmetry, but the port extensions may be varied to
match their specific purpose. The port extensions are required to extend
the vacuum boundary past the TF coil legs and through the cryostat
region. {width="5.875694444444444in"
height="4.539583333333334in"}
**5.3.3 Vessel loading and analysis**
The vessel is subjected to large gravity, seismic and electromagnetic
loads, as summarized in Table 5.3.3-1. The total vertical load is
estimated to be about 20 MN, while the net lateral load is about 7 MN.
To react these loads, the vessel is supported near the midplane on the
outboard side via vertical and lateral links to the TF coil structure.
The vertical links are attached to the radial ribs to spread the applied
loads vertically into the vessel. This minimizes the local bending
stresses in the vessel and provides a means for adjusting the vessel
location globally relative to the TF coils. Lateral supports are located
near the vertical links, and are tied to the top of the midplane ports.
The vessel must support all internal components, including the divertor
assemblies, the passive stability structure, and the first wall tiles.
The outboard divertor modules are actively cooled via pipes at each of
the upper and lower auxiliary ports. The passive stabilizing structure
is actively cooled with imbedded cooling tubes. The first wall tiles and
inboard divertor are cooled by conduction to the passive structure. All
components must have robust supports to react the electromagnetic loads
from a plasma disruption.
Preliminary structural analysis of the vessel indicates that the present
dimensions are acceptable to support the various loads. A finite element
model was developed for an earlier version of the vessel geometry, and
the stresses and deflections obtained are summarized in Table 5.3.3-2.
As seen in the table, there are some peak stresses around the divertor
supports at the top of the vessel that must be mitigated with additional
structure. Details of the stress and deflection analysis are contained
in Appendix D of this report.
**5.3.4 Passive plates and internal coils**
As indicated in Section 2, Physics, a system of highly conducting and
actively cooled passive plates and a set of internal control coils must
be incorporated into the vacuum vessel. The passive plates consist of 25
mm thick copper sheets that are bonded directly to the surface of the
vacuum vessel. The sheets are actively cooled via
internal water passages connected
through manifolds into the vessel cooling system. A bonded connection is
thought to be the most straightforward approach, since cooling can be
provided directly by the copper plates to both the
{width="6.501388888888889in"
height="4.706944444444445in"}
first wall tiles and the vessel, and continuous structural support can
be provided to the passive plates by the vessel. The method of bonding
has not been decided, but hot isostatic pressing (hipping) is one
possibility. The geometry of the passive plate system is shown in Figure
5.3.4-1.
In addition to the passive plates there are a pair of control coils
located between the outboard walls of the vessel above and below the
midplane ports. Multiple turns of conductors are run in permanent pairs
of conduits that are routed directly through the outboard wall. The
conductor will receive a moderately high radiation dose (\>10^9^ Rad)
and will be insulated with either MgO or a polyimide insulation system.
Redundant turns are being considered to mitigate one of the failure
modes. Each coil is designed to carry up to 75 kA.
**5.3.5 Fabrication and assembly**
The vessel is fabricated in octants, as shown in Figure 5.3.5-1. Each
octant consists of the torus, associated gravity and internal supports,
short reinforcing stubs around the major port openings and the active
and passive stabilizer systems. At assembly, each vessel octant is
rotated into the bore of a pre-assembled TF coil pair and connected via
the support links. The TF/VV subassemblies are then positioned relative
to each other with the mating joints located at radial planes between TF
coils, through the center of the ports.
When all the octants are in place and positioned, they are welded
together from the plasma side of the torus. The field joint for the
double wall structure uses splice plates on the plasma side to provide a
means for accessing the coil-side facesheet from the plasma side of the
torus. This type of joint has undergone significant, full scale testing
using remote welding equipment as part of the ITER R&D program. After
the vessel is welded, the gaps in the passive stabilizers are filled
with plasma sprayed copper to complete the upper and lower stabilizing
circuits. After the torus is welded, the port extensions are fitted and
welded to the port stubs. This completes the vessel
assembly.{width="5.990277777777778in"
height="4.586805555555555in"}
|
en
|
markdown
|
562998
|
# Presentation: 562998
## Facility Strategy
- RHIC performance overview
- Luminosity and polarization evolution
- (towards “enhanced luminosity”)
- Future upgrades
- EBIS
- RHIC luminosity upgrade
- eRHIC
## Gold Ion Collisions in RHIC
**RHIC**
**AGS**
**BOOSTER**
**9 GeV/u**
**Q = +79**
**1 MeV/u**
**Q = +32**
**Beam Energy = 100 GeV/u **
## RHIC Au-Au performance – 2 x design luminosity
**Injector**
**RHIC**
- design luminosity
**Luminosity [x10****26****]**
**0**
**5**
**10**
**15**
## RHIC Run 5 Delivered Cu-Cu Luminosity
**RHIC Run 5 Delivered Cu-Cu Luminosity**
## RHIC polarized proton accelerator complex
_***BRAHMS***_
_***STAR***_
_***PHENIX***_
**AGS**
**LINAC**
**BOOSTER**
- Pol. H- Source
- Spin Rotators
- (longitudinal polarization)
- Solenoid Partial Siberian Snake
- Siberian Snakes
- 200 MeV Polarimeter
- AGS Internal Polarimeter
- Rf Dipole
- RHIC pC Polarimeters
- Absolute Polarimeter (H jet)
- AGS pC Polarimeters
**Strong Helical AGS Snake**
- Helical Partial Siberian Snake
_***PHOBOS***_
- Spin Rotators
- (longitudinal polarization)
- Spin flipper
- Siberian Snakes
## New AGS helical snakes
**New AGS helical snakes**
- 2.6 m
- 2.6 m
- 30% s.c. helical snake build at BNL SMD
- Installed in March 2005
- Warm snake avoids polarization mismatch at AGS injection and extraction.
- Cold strong snake eliminates all depolarizing resonances in AGS.
- 5 % helical snake build at Tokana Industries funded by RIKEN.
## Siberian Snake in RHIC Tunnel
- Siberian Snake: 4 superconducting helical dipoles, 4Tesla, 2.4 m long with full 360 twist
- Funded by RIKEN, Japan
- Designed and constructed at BNL
## Polarization survival in RHIC
- Spin rotator ramp
- Acceleration and squeeze ramp
## RHIC – a Uniquely Flexible High Luminosity Collider
- (Nucleon-pair luminosity *A*1*A*2*L* allows comparison of different species)
- Luminosity increased by 2 orders of magnitude in 4 years.
## RHIC Accelerator Complex Operations
**7 major accelerator systems (2 Tandems, Linac, Booster, AGS, 2 RHIC rings) consisting of:**
- 6 miles of evacuated beam lines (large part of it below 10-10 Torr)
- 4.5 miles of superconducting magnets and cryostat
- 25 [email protected] He refrigerator (12 turbines, 25 compressors,...)
- 2 rapid cycling synchrotrons (16 MW and 40 MW power supplies)
- 42 high power rf systems (0.1 – 200 MHz)
- 1300 programmable DC power supplies
- 54 pulsed power systems
- FY05 operations budget ($95M, equal to the recommendation of $95M [2005$] from 2002 RHIC operations review) is sufficient for safe and efficient operation of 31 cryo-weeks with excellent availability.
- Ongoing investment to improve operating efficiency (cryo upgrade: 2 MW reduction of el. power consumption, EBIS)
## RHIC availability and time in store
**RHIC availability and time in store**
- Excellent availability despite very complex operation modes.
- Machine set-up time reduced to just 3 weeks.
**FY05Q2 Weekly Availability**
## Major contributions from non-DOE sources to the RHIC accelerator complex:
RIKEN, Japan: RHIC Spin (~ $70M, RBRC)
NASA: NASA Space Radiation Laboratory ($4.5M contribution to EBIS)
NSF and Canada: RSVP (construction not started yet, major infrastructure upgrade to Booster and AGS)
- RIKEN, Japan: RHIC Spin (~ $70M, RBRC)
- NASA: NASA Space Radiation Laboratory ($4.5M contribution to EBIS)
- NSF and Canada: RSVP (construction not started yet, major infrastructure upgrade to Booster and AGS)
**Connection to other programs**
## Future plans for RHIC
- Machine goals for next few years with upgrades in progress:
**Enhanced RHIC luminosity (112 bunches, ********* = 1m):**
**Au ****– ****Au: **** **** 8 ******** 10****26**** cm****-2**** s****-1 ****(100 GeV/nucleon) **
**For protons also 2 ******** 10****11**** protons/bunch (no IBS):**
**p******** – p********: **** **** 60 ******** 10****30**** cm****-2**** s****-1****; 70 % polarization (100 GeV)**** ****150 ******** 10****30**** cm****-2**** s****-1****; 70 % polarization (250 GeV)**(luminosity averaged over store delivered to 2 IRs)
- EBIS (low maintenance linac-based pre-injector; all species incl. U and pol. He3; avoid Tandem investment; ~ 3 year pay-back period)
- RHIC luminosity upgrade (e-cooling, ~10 **** more luminosity, R&D in progress)
- eRHIC (high luminosity (1 1033 cm-2 s-1) eA and pol. ep collider)
- 2 achieved
- 6 achieved
## EBIS/Linac-based RHIC Pre-Injector
- Highly successful development of Electron Beam Ion Source (EBIS) at BNL: meets RHIC performance requirements.
- EBIS allows for a reliable, low maintenance Linac-based pre-injector replacing the Tandem Van de Graaffs
- Greatly reduced operating costs, and avoidance of ~ 9 M$ in reliability-driven investments in the tandems
- Highly flexible to handle the multiple simultaneous needs of RHIC and NSRL
- Produces beams of ALL ion species including noble gas ions (NSRL), Uranium (RHIC) and polarized He3 (eRHIC)
- Ready to start construction, CD0 received; Cost: 19.4 M$; 3.5 year construction schedule: FY2006 – 09NASA participation ($ 4.5M)
## EBIS layout
## RHIC luminosity upgrade
- Eliminate beam blow-up from intra-beam scattering with electron beam cooling at full energy!
- What will remain the same:
- 120 bunch pattern
- 100 ns collision spacing ( ~ same data acquisition system)
- Only one beam collision between DX magnets
- 20 m magnet-free space for detectors
- No “mini-beta” quadrupoles
- Approx. the same bunch intensity
- No new beam intensity issues
- Background similar as before upgrade
- What changes:
- Smaller transverse and longitudinal emittance
- Smaller vertex region (Increased luminosity within detector acceptance)
- Beta squeeze during store to level luminosity
- Store length is limited to ~ 5 hours by “burn-off” due to Au-Au interactions (~ 200 b)
## Electron Cooling R&D
- Superconducting ERL
**Electron Cooling R&D**
- Buncher Cavity
- Cooling Solenoids (2 x 13m, 2-5 T)
- Debuncher Cavity
**Gold beam**
- Benchmarking of IBS and cooling simulation codes
- Demonstrate high precision (<10 ppm) solenoid (2-5 T)
- Demonstrate 20 nC, 100-200 mA 703.8 MHz CW SCRF electron gun
- Develop 703.8 MHz CW superconducting cavity for high intensity beams
- Build R&D Energy Recovering Linac (ERL)
- 54 MeV, 100 mAelectron beam
## RHIC Luminosity with and without Cooling
**RHIC Luminosity with and without Cooling**
- With e-cooling
- Without e-cooling
- Luminosity leveling through
- continuously adjusted cooling
- Store length limited to 4 hours by “burn-off”
- Four IRs with two at high luminosity
- 2 mm
- 5 hours
**Electron cooling simulations**
- Transverse beam profile during store
- Also able to pre-cool polarized protons at injection energy
## RHIC Luminosity Upgrade with Electron Cooling
**Gold collisions (100 GeV/n x 100 GeV/n): **** **** w/o e-cooling**** ****with e-cooling**
- Emittance (95%) m 15 40 15 3
- Beta function at IR [m] 1.0 1.0 0.5
- Number of bunches 112 112
- Bunch population [109] 1 1 0.3
- Beam-beam parameter per IR 0.0016 0.004
- Ave. store luminosity [1026 cm-2 s-1] 8 70
**Pol. Proton Collision (250 GeV x 250 GeV):**
- Emittance (95%) m 20 12
- Beta function at IR [m] 1.0 0.5
- Number of bunches 112 112
- Bunch population [1011] 2 2
- Beam-beam parameter per IR 0.007 0.012 ?
- Ave. store luminosity [1032 cm-2 s-1] 1.5 5.0
## Electron-Ion Collider at RHIC: eRHIC
**Electron-Ion Collider at RHIC: eRHIC**
- 10 GeV, 0.5 A e-ring with 1/3 of RHIC circumference (similar to PEP II HER)
- 10 GeV electron beam s1/2 for e-A : 63 GeV/u; s1/2 for e-p: 100 GeV
- Electron cooling required for high luminosity e-A and low energy e-p collisions
- Polarized e-He3 (e-n) collisions with EBIS
- Existing RHIC interaction region allows for typical asymmetric detector
- Luminosity: up to 1 1033 cm2s1 per nucleon (1 1034 cm2s1 with linac – ring scheme)
- BNL, MITcollaboration
## Summary
- Since 2000 RHIC has collided, for the first time,
- Heavy ions
- Light on heavy ions
- Polarized protons (45% beam polarization)
- Heavy ion luminosity increased by factor 100
- For next 4 years planned:
- Factor 2 increase in heavy ion luminosity
- Factor 6 increase in proton luminosity
- Factor 2 increase in proton beam polarization
- Future upgrades:
- RHIC luminosity upgrade (~10x) using electron cooling at store
- Electron-ion collider eRHIC
## Back-up material
## RHIC design, achieved and enhanced design parameters
| Mode | No ofbunches | Ions/bunch [9] | *[m] | Beampolarization | | Lpeak[cm-2s-1] | Lstore ave[cm-2s-1] | A1A2Lstore ave[cm-2s-1] | |
| --- | --- | --- | --- | --- | --- | --- | --- | --- | --- |
| Design values (1999) | | | | | | | | | |
| Au – Au | 56 | 1.0 | 2 | | | 81026 | 21026 | | 81030 |
| p – p | 56 | 100 | 2 | | | 51030 | 41030 | | 41030 |
| Achieved values (2004) | | | | | | | | | |
| Au – Au | 45 | 1.1 | 1 | | | 151026 | 41026 | | 161030 |
| p – p | 56 | 70 | 1 | | 45% | 51030 | 41030 | | 41030 |
| p – p | 56 | 170 | 1 | | | 151030 | 101030 | | 101030 |
| Enhance design values (2008) | | | | | | | | | |
| Au – Au | 112 | 1.1 | 1 | | | 301026 | 81026 | | 311030 |
| p – p | 112 | 200 | 1 | | 70% | 801030 | 651030 | | 651030 |
**Other high luminosity hadron colliders:**
- achieved goal scaled to 200 GeV
- Tevatron (2 TeV) 1001030 2001030 201030
- LHC (14 TeV) 100001030 1401030
## Alternative eRHIC Design: Linac - Ring
- Electron ring replaced by energy-recovering linac, electrons in RHIC arcs:Higher luminosity (1 1034 cm2s1), simpler IR design, multiple IRs possible, 20 GeV upgrade possible
## EBIS Completion
**EBIS Completion**
## FY06 cryo-weeks reduced from 31 to 12 weeks
Combine FY06-07 runs for some models. Avoid summer running. Begin on 10/1/06 after 15 month shutdown.
$300K (ions) - $325K (polarized proton) / week running and $75K / week power costs when off
EBIS construction is expedited. Funding increased from $2.0M to $3.6M (+ $1.5M from NASA). Reprogram AIP ($0.5M), capital ($0.7M + $0.4M)
Operations manpower reductions of 30-34 FTE (355->325-321 FTE)
The efficient and safe operation of the accelerator complex with the proposed staff size is more difficult. Present staff workload and stress levels are high. Concern that key accelerator physicists will move across the Atlantic. Loss of expertise is a major issue.
Some staff would be assigned to RSVP, if funding arrives in time.
Electron cooling R&D will be reduced as EBIS takes priority and RHICII recedes into future
Reassign waste management funding. 50% used to support FY06
- Combine FY06-07 runs for some models. Avoid summer running. Begin on 10/1/06 after 15 month shutdown.
- $300K (ions) - $325K (polarized proton) / week running and $75K / week power costs when off
- EBIS construction is expedited. Funding increased from $2.0M to $3.6M (+ $1.5M from NASA). Reprogram AIP ($0.5M), capital ($0.7M + $0.4M)
- Operations manpower reductions of 30-34 FTE (355->325-321 FTE)
- The efficient and safe operation of the accelerator complex with the proposed staff size is more difficult. _Present_ staff workload and stress levels are high. Concern that key accelerator physicists will move across the Atlantic. Loss of expertise is a major issue.
- Some staff would be assigned to RSVP, if funding arrives in time.
- Electron cooling R&D will be reduced as EBIS takes priority and RHICII recedes into future
- Reassign waste management funding. 50% used to support FY06
**Impact of FY2006 Presidential on Accel. Ops.**
## Impact of FY06P + constant effort (flat) funding on Accel. Ops.
- Combined FY06-07 run.
- With EBIS:
- Reprogram funds to complete EBIS project (FY06-09).
- No run in FY08
- Combined FY09-10 run.
- Yearly 24 cryo-weeks running FY11 and later. Reduced operations cost form EBIS completion allows for more running.
- Without EBIS:
- Reprogram funds to complete Tandem reliability upgrade (FY07-09)
- Combined FY08-08 run
- Yearly 20 cryo-weeks running FY10 and later
- The efficient and safe operation of the accelerator complex with the staff size is more difficult.
- This funding model supports the most favorable but still a dwindling long term physics program
## Impact of FY06P + “flat-flat” on Accel. Ops.
- EBIS will not be built.
- Flat-flat funding would only allow for a combined FY06-07 and a combined FY08-09 run and then unable to support a physics program thereafter.
- Loss of expertise to complete the proposed runs is significant.
- The efficient and safe operation of the accelerator complex with the FY06 staff size is more difficult.
- This funding model rapidly leads to RHIC termination.
## BNL proposed (FY2005 + constant effort)
- 31 cryo-week each year
- Physics program includes ions and polarized protons to 500 GeV cm.
- EBIS project completed in 3.5 years
- Reduce injector group manpower
- Accelerator R&D support of electron cooling for future RHICII and eRHIC would remain on a fast track.
- AIP support to continue to replace aging machine components and improve performance, eg. RHIC cryogenic system is 25 years old, would be accomplished in an orderly manner.
- RHIC running efficiency and safety are not a concern.
|
en
|
markdown
|
678957
|
# Presentation: 678957
## Poisoning Deaths-Time for a new definition?
- Lois A. Fingerhut and Clare Griffiths
- May 2004
## Counting poisoning deaths as an underlying cause of death
- ICD-definition in mortality matrix
- Unintentional
- Suicide
- Homicide
- Undetermined
- ICD codes are:
- Drug-related
- Alcohol- related
- Gases and vapors
## Drug-related codes in Mental Health Chapter of ICD
- F10-F19
- Alcohol (F10)
- Opioids (F11)
- Cocaine (F14)
- Other (F12-13, 15-16, 18-19)
- 4th digits..
## 4th digits... (leading ones in US)
- 0 acute intoxication (primarily alcohol)
- 1 harmful use
- 2 dependence syndrome (primarily alcohol)
- 3-9 other
## ICD ‘definitions’ of drug poisoning: this analysis
| | | ICD-10 |
| --- | --- | --- |
| Nondependent abuse of drugs |
305.2-.9 | F11-16, 18-19 (not .2) |
| Dependent abuse | 304 | F11-16,18-19(.2) |
| Unintentional | E850-E858 | X40-X44 |
| Suicide | E950(.0-5) | X60-X64 |
| Undetermined | E980(.0-.5) | Y10-Y19 |
| Homicide | E962.0 | X85 |
| Alcohol intoxication | 305.0 | F10.0 |
_**ICD-9**_
**Notes:**
For this presentation, my co-authors and I agreed that there were various ways one could define drug poisoning deaths. For t he orange block there was unanimous agreement. Note however, that the nondep abuse codes have never been an accepted inclusion into the definition of poisoning death. In E&W, The codes for Dependent abuse of drugs are included in their poisoning death reports (separate from all cause reports). Alcohol intox is not included but a case can be made for it...
## Drug poisoning deaths, ages 35-54 by intent and abuse
## All (??) Poisoning deaths: US 2001
## National Academy of Science May 2004
- U.S. Institute of Medicine has recommended that WHO should review and reform the ICD codes for poisoning
- NCHS should review the methodology of its existing surveys to maximize the value....for poison prevention and control.
- From: Forging a Poison Prevention and Control System (2004)
|
en
|
markdown
|
592538
|
# Presentation: 592538
## Performance-Portability and the Weather Research and Forecast Model
- John Michalakes, Richard Loft, Alfred Bourgeois
- National Center for Atmospheric Research
- Boulder, Colorado U.S.A
- HPC Asia 2001 September 25, 2001
## Outline
- WRF Model Project
- Performance portability and why
- Studies
- Storage order using whole code
- Detailed profiling using kernels
- Conclusions
## WRF Project Overview
- Develop advanced model and data-assimilation system for mesoscale NWP
- Accurate, efficient, applicable over a broad range of scales
- Focus on 1-10km resolution
- _Advanced dynamics, physics, data assimilation, nesting_
- Flexible, modular, performance-portable
- Large, multi-institution effort
- Promote closer ties between research and operations
- Pool resources
- Milestones and status
- First release Nov. 2000
- Current release: May 2001
- Research community version in 2002; full operational implementation 2004
- Dynamical cores:
- Time-split explicit Eulerian
- 5th order advection
- Height and mass coordinate
- Semi-implicit Semi-Lagrangian
- Full physics with multiple options for each type
- 3DVAR, 4DVAR
## WRF Project Overview
- Develop advanced model and data-assimilation system for mesoscale NWP
- Accurate, efficient, applicable over a broad range of scales
- Focus on 1-10km resolution
- Advanced dynamics, physics, data assimilation, nesting
- _Flexible, modular, performance-portable_
- Large, multi-institution effort
- Promote closer ties between research and operations
- Pool resources
- Milestones and status
- First release Nov. 2000
- Current release: May 2001
- Research community version in 2002; full operational implementation 2004
## WRF Project Overview
- Develop advanced model and data-assimilation system for mesoscale NWP
- Accurate, efficient, applicable over a broad range of scales
- Focus on 1-10km resolution
- Advanced dynamics, physics, data assimilation, nesting
- _Flexible, modular, performance-portable_
- Large, multi-institution effort
- Promote closer ties between research and operations
- Pool resources
- Milestones and status
- First release Nov. 2000
- Current release: May 2001
- Research community version in 2002; full operational implementation 2004
## WRF Project Overview
- Develop advanced model and data-assimilation system for mesoscale NWP
- Accurate, efficient, applicable over a broad range of scales
- Focus on 1-10km resolution
- Advanced dynamics, physics, data assimilation, nesting
- _Flexible, modular, performance-portable_
- Large, multi-institution effort
- Promote closer ties between research and operations
- Pool resources
- Milestones and status
- First release Nov. 2000
- Current release: May 2001
- Research community version in 2002; full operational implementation 2004
## WRF Project Overview
- Develop advanced model and data-assimilation system for mesoscale NWP
- Accurate, efficient, applicable over a broad range of scales
- Focus on 1-10km resolution
- Advanced dynamics, physics, data assimilation, nesting
- Flexible, modular, performance-portable
- _Large, multi-institution effort_
- _Promote closer ties between research and operations_
- _Pool resources_
- Milestones and status
- First release Nov. 2000
- Current release: May 2001
- Research community version in 2002; full operational implementation 2004
- Principal Partners:
- NCAR Mesoscale and Microscale Meteorology Division
- NOAA National Centers for Environmental Prediction
- NOAA Forecast Systems Laboratory
- U. Oklahoma Center for the Analysis and Prediction of Storms
- U.S. Air Force Weather Agency
- Additional Collaborators:
- NOAA Geophysical Fluid Dynamics Laboratory
- NASA GSFC Atmospheric Sciences Division
- NOAA National Severe Storms Laboratory
- NRL Marine Meteorology Division
- EPA Atmospheric Modeling Division
- Aerospace Inc
- University Community
## WRF Project Overview
- Develop advanced model and data-assimilation system for mesoscale NWP
- Accurate, efficient, applicable over a broad range of scales
- Focus on 1-10km resolution
- Advanced dynamics, physics, data assimilation, nesting
- Flexible, modular, performance-portable
- Large, multi-institution effort
- Promote closer ties between research and operations
- Pool resources
- _Milestones and status_
- _First release Nov. 2000_
- _Current release: May 2001_
- _Research community version in 2002; full operational implementation 2004_
## Conflicting concerns
Best possible performance
Maintainable software
What can we control?
Run-time and compiler options; libraries
Padding, alignment, sizing of arrays
Blocking factors, vector length
Storage order/loop nesting
Crucial issue in WRF design in 1999-2000: can we stay portable to vector systems?
Needed decision on storage/loop order while code still small
Trend in U.S. has been away from vector
Vector vendors dropping support, however...
Still significant installed base outside U.S.
Expedited “Storage Order” study to support decision for WRF
- Conflicting concerns
- Best possible performance
- Maintainable software
- What can we control?
- Run-time and compiler options; libraries
- Padding, alignment, sizing of arrays
- Blocking factors, vector length
- Storage order/loop nesting
- Crucial issue in WRF design in 1999-2000: can we stay portable to vector systems?
- Needed decision on storage/loop order while code still small
- Trend in U.S. has been away from vector
- Vector vendors dropping support, however...
- Still significant installed base outside U.S.
- Expedited “Storage Order” study to support decision for WRF
- Performance Portability
**Notes:**
Why is performance portability important
## WRF storage-order
- What’s the best order of three-dimensional array indices and corresponding loop nesting: IJK, KIJ, or IKJ?
- Original study:
- M. Ashworth (Daresbury Laboratory, UK), ECMWF ‘98 workshop presentation: compared k-inner versus i-inner orderings for array dimensions and loop nesting in a test kernel.
- (“Optimisation for Vector and RISC Processors,” in Towards Teracomputing, World Scientific, River Edge, NJ. 1999. pp. 353-359.)
- RISC relatively insensitive (~30% penalty)
- Vector was very sensitive, by up to factors of 4 on Fujitsu VPP300 and 8 on NEC SX-4
- Reproduce Ashworth’s study with WRF prototype
- Generated three versions, IJK, KIJ, and IKJ
- Benchmark various problem sizes on representative systems
- Present results to WRF collaborators
## IJK versus KIJ for all patch dimensions X,Y=(21,41,81); 41 levels throughout
KIJ is the favored order on RISC; IJK is strongly favored on vector for adequate length of X
Surprise: vector prefers KIJ for short X (no physics in tested prototype)
RISC penalty for IJK decreases with increased length of minor dimension
Penalty is most severe for sizes typical of a DM patch
- KIJ is the favored order on RISC; IJK is strongly favored on vector for adequate length of X
- Surprise: vector prefers KIJ for short X (no physics in tested prototype)
- RISC penalty for IJK decreases with increased length of minor dimension
- Penalty is most severe for sizes typical of a DM patch
- IJK versus KIJ on RISC and Vector
## IJK versus KIJ for all patch dimensions X,Y=(21,41,81); 41 levels throughout
KIJ is the favored order on RISC; IJK is strongly favored on vector for adequate length of X
Surprise: vector prefers KIJ for short X (no physics in tested prototype)
RISC penalty for IJK decreases with increased length of minor dimension
Penalty is most severe for sizes typical of a DM patch
- KIJ is the favored order on RISC; IJK is strongly favored on vector for adequate length of X
- Surprise: vector prefers KIJ for short X (no physics in tested prototype)
- RISC penalty for IJK decreases with increased length of minor dimension
- Penalty is most severe for sizes typical of a DM patch
- IJK versus KIJ on RISC and Vector
## IJK versus KIJ for all patch dimensions X,Y=(21,41,81); 41 levels throughout
KIJ is the favored order on RISC; IJK is strongly favored on vector for adequate length of X
Surprise: vector prefers KIJ for short X (no physics in tested prototype)
RISC penalty for IJK decreases with increased length of minor dimension
Penalty is most severe for sizes typical of a DM patch
- KIJ is the favored order on RISC; IJK is strongly favored on vector for adequate length of X
- Surprise: vector prefers KIJ for short X (no physics in tested prototype)
- RISC penalty for IJK decreases with increased length of minor dimension
- Penalty is most severe for sizes typical of a DM patch
- IJK versus KIJ on RISC and Vector
## IJK and IKJ Penalties versus KIJ: EV6
- Penalty for I-innermost is much less severe when K is middle dimension
- WRF adopted IKJ ordering in April, 2000
- IJK vs KIJ
- IKJ vs KIJ
**Notes:**
On the microprocessor platforms, KIJ is always best. And if we were able to rule out ever running on vector, KIJ would be the choice.
Given the desire to maintain vector portability, however, we were forced to look for a way to minimize the penalty for an i-innermost ordering. Surprisingly, and for reasons that are not yet understood, putting the K dimension second so that the storage and looping is over i-k slabs shows considerable improvement over the IJK ordering (where storage and looping is as i-j slabs).
This slide shows the penalty for IJK ordering relative to KIJ (left) compared with k-in-the-middle IKJ ordering relative to KIJ. The penalties, computed as 100 * (Tslow-Tfast)/Tfast, are much less, and for some subdomain sizes nominally reversed.
## Detailed Performance Studies
- Follow-on to WRF storage order experiments to determine effects of controllable aspects:
- All MxN subdomain sizes: 2 < M < 80; 2 < N < 80
- Padding: 0, 1, 2, and 3 extra cells around patch
- Effect of shared memory tile size
- Storage order
- Computational kernel: ADVANCE_W
- Implicit solver for vert. propagation of acoustic modes
- Compute-intensive, fully 3D; vertical recurrence
- Three versions: IJK, IKJ, and KIJ
## Detailed Performance Studies
- Procedure
- For each processor type
- Run ADVANCE_W test code over 6400 different domain sizes and 4 array padding options
- Generated detailed performance data using hardware performance counters available for processor
- Architectures:
- IBM
- 375 MHz (Power 3), patched version of AIX
- Hardware performance counters: Cycles, Flops, Loads, L1 cache misses, TLB misses, Prefetches, etc.
- Silicon Graphics
- 250 MHz MIPS R10000
- Perfex and Speedshop to count: Cycles, Flops, L1 misses, L2 misses, TLB misses, etc.
- Compaq, Fujitsu, NEC... (In progress)
## IBM Results
- Overall performance: KIJ is the best overall storage order but IKJ is nearly as good; IJK is worst
- Effect of varying subdomain size:
- Most significant is the occurrence of pathological TLB behavior for certain sub-domains
- Sweet spot: 15 < N < 35
- Not well correlated with L1 cache behavior (L2 could not be measured reliably)
- Prefetching appears more significant
- Effect of varying tile sizes:
- Any tiling in minor I-dimension always degraded performance
- Very slight benefit to having thin tiles in major J-dimension
## IBM Results
- Effect of varying subdomain size:
- Most significant is the occurrence of pathological TLB behavior (106 or greater) for certain sub-domains
- Sweet spot: 15 < N < 35
- Not well correlated with L1 cache behavior (L2 could not be measured reliably)
- Prefetching appears more significant
- Effect of varying tile sizes:
- Any tiling in minor I-dimension always degraded performance
- Very slight benefit to having thin tiles in major J-dimension
## IBM Results
- Effect of varying subdomain size:
- Most significant is the occurrence of pathological TLB behavior (106 or greater) for certain sub-domains
- Sweet spot: 15 < N < 35
- Not well correlated with L1 cache behavior (L2 could not be measured reliably)
- Prefetching appears more significant
- Effect of varying tile sizes:
- Any tiling in minor I-dimension always degraded performance
- Very slight benefit to having thin tiles in major J-dimension
## TLB
- IBM TLB
- 256 page-entries
- 4KB pages
- 128 two-way set associative banks
- Least recently used replacement
- 128-byte cache-lines
- Miss Penalty: 25 to hundreds of cycles
- Translation Look-aside Buffer (TLB)
- Associates virtual addresses to pages in physical memory
- ADVANCE_W has 20 3D arrays
- What happens when an arbitrary index (I,J,K) is touched in every one of these?
- Assuming arrays are allocated contiguously, the touches will be to pages at regular intervals
- _Hopefully these addresses will be scattered around memory and evenly distributed over TLB, but maybe not_
- Certain array sizes can cause clumping around a few entries, and because of the low-associativity of the IBM TLB, there isn’t much margin
## TLB
- IBM TLB
- 256 page-entries
- 4KB pages
- 128 two-way set associative banks
- Least recently used replacement
- 128-byte cache-lines
- Miss Penalty: 25 to hundreds of cycles
- Translation Look-aside Buffer (TLB)
- Associates virtual addresses to pages in physical memory
- ADVANCE_W has 20 3D arrays
- What happens when an arbitrary index (I,J,K) is touched in every one of these?
- Assuming arrays are allocated contiguously, the touches will be to pages at regular intervals
- Hopefully these addresses will be scattered around memory and evenly distributed over TLB, but maybe not
- _Certain array sizes can cause clumping around a few entries, and because of the low-associativity of the IBM TLB, there isn’t much margin_
## Remediation
- Observe that pattern does not change with array padding; it simply moves
- Detect subdomain sizes that are liable to TLB misses and pad accordingly when the arrays are allocated
- Entirely driver-level
## Remediation
- Observe that pattern does not change with array padding; it simply moves
- Detect subdomain sizes that are liable to TLB misses and pad accordingly when the arrays are allocated
- Entirely driver-level
## IBM Results
- Effect of varying subdomain size:
- Sweet spot: 15 < N < 35
- Not well correlated with L1 cache behavior (L2 could not be measured reliably)
- Prefetching appears more significant
## IBM Results
- Effect of varying subdomain size:
- Sweet spot: 15 < N < 35
- Not well correlated with L1 cache behavior (L2 could not be measured reliably)
- _Prefetching appears more significant_
## SGI Results
- Storage order
- KIJ is the best performer for N < 30; worst N > 45
- IKJ slightly better than IJK N < 30
- IJK is best for N > 45
## SGI Results
- Effect of varying subdomain size:
- L2 data cache miss behavior best explains storage order behavior
## SGI Results
- Effect of varying subdomain size:
- Pathological L1 data cache miss behavior for N = 64
## SGI Results
- Effect of varying subdomain size:
- TLB behavior interesting but not significant
## Summary
- WRF design provides flexible runtime control over tile and patch sizes, padding
- Patch size is a significant factor, and most machines exhibit “sweet spots”
- Padding can be used to avoid patch sizes that result in pathological array-memory layouts on the IBM
- Some aspects of code, such as storage order, are rigid
- Design decisions that can’t be easily changed, should be based on careful study
- KIJ ordering is overall best for microprocessors (but fatal on vector)
- IKJ ordering is best compromise between vector and microprocessors
- General observations
- Beyond these relatively high-level aspects, trying to outsmart compilers usually doesn’t pay
- Hyper-engineering, even when effective, introduces architecture dependencies
- Obtaining detailed processor performance statistics is a problem, and is likely to get worse
|
en
|
all-txt-docs
|
095916
|
MONTRLY WEATHER BEVIEW.
FLUCTUATIONS OF TEMPERATURE AND P R E W R E AT THE
BASE AND SUMMIT O F MOUNTSHINGTON.
[By Prof. H. A. HAZEN, Wenther Bureau.]
~
__-.--& . At the end of the maps in this Review will be found a continuation of the
curves previously published in July and August. There have been added thiz
month the fluctuations in pressure at the mnniit as well as at the Lase. It will be noted that these pressure changes present almost exactly the same
Frequently the suninlit curve lags a little
Eehind that at the base, as has alreadybeen noted. See Annnal Report of the
Chief Signal Officer, 1882, pp. 897-926.
Attention is called to the remarkable abruptness of the flnctnations of
temperature at Mount Washington, especially when the temperature falls atler
hase at the summit a3 at the base.
SEPTEMBER, 1891.
a htorni has passed and a high mea :q'proaches. E\amples of this may be
nvtad a< f i i l l i >w : J:LIIU:W~ r I , IS79, fall of ?Coin 8 hours: January 25. 1x79, :3 2 O in
16 hours ; Februar) 1 , 18H0, 38' in 11, huurs ; Febinary 9, 1880, 30O in 8 hours;
March 7. lh80, '36' i n 8 honrr ; .Jauiiary 32, 1S82, 41' in 16 hourb ; February
17, ISV?, allo i n 6 Lours ; ani1 hlnrcli 24, 16P", 2 4 O in 8 hours.
These vrrv railid fall5 in temperature m:ky IJe doe to the downward action
of a cold wale as a Gtorni pas'es OK. I t invariably occurs 011 the east side of
a high area and many huut\ befure its center reaches the summit.
Jt should ~I S I J be noted that the close agreement hetaeen the fluctuations of
temperature at the Lase and summit seems to indicate some general and far-
reaching effect prnducrd Iiy estended waves of heat and cold, rather than a
more or less local effect produced by the \rind or by more intense radiation
to the sky at some times rather than uthers.
The month opened warm an 9 closed OREGON* with clear, cool weather and general
1 Alrrhniirn--Cont'd 0 ' 0 0 ~
1 ~.
~
rllabnnia-Cont'd
0 Ins. Livingston(a)t ..... 92 52 74.2 1.01 I
70.6 2 .s ~ Lyiint ............................... 1.32 Tnlladegat
75.0 3.81 Opeliksi ........... yo 50 70.3 0.94 Thoninrvillet ...... 0.57 Orrvillrf 93 52 ! 75.0 1.96 ' T U W ~O O S ~ t .......
..... 3.59 Pine .\pplet ........ g j 53 73.2 3.25 TusCUI~llJia(2)t
77.0 1.70 ~e ~i i i a (1 ) t .......................... 1.03
74,3 0.77 hlt. Vernon B'ks..I 93 56
~
76.4 3.S5 Tallassee Fnlls t .
..... .......... yo 52
~
72.3 2.31 Tuscuinbis(1)t ....
73.5 4.80 Posliinntah~t ...... 91 1 57 I75.7 0.62 Uiiion Sprin s t ... ~i i i o n t o w n f . .. :...
75.1 6.90 Osnnnxt ........... ....
light frosts.
Lakeview. 2d : minimum. 22. at Weston and Beulah. 30th.
-
Temperature.-The mean was 0.7 above the normal ; maximum, 100, at
0 0
................... ............ go 54
g j 53 g j 54
54 51 91 61
yz 55
A.ecipitation.-The &,rage was 0.70 above the normal ; greatest monthly,
6.14, at Astoria ; least monthly, 0.00, at New Bridge.
Wind.-Prevailing direction, southnest.--Hoth H. E. Hayes, %aster Stale
Grange, Portland, director; B. S. Pague, Observer, Ireather Bureau, asst.
PENNSYLVANIA.
Temperature.-The mea was 5.4 above the n o r i d ; maximum, 94, at Coats-
ville, 26th, and at Somerset, 17th ; tuiniuiutu, 32, at Well~bi)ruugh and
Columbus. 30th ; greatest monthly range, 111, at Somerset ; least monthlj
range, 37, at Erie. A.ccipitatioti.--The average was 1.18 below the normal; greatest monthly,
6.00, at Kennett Square ; least monthly, 1.05, at Carlisle.
rPind.-Prevailing direction, southwest.- Uiider direction of the fiaiiklin
Institute, Philadelphia; L. N. D y, ODseruer, Ilbat?ier Bitreail, assistuni.
Q SOUTH CAROLINA.
Temperai~re.-Mnsimum, 92, itt Batesbnrgh, Greenville, and Spartanburgh,
A.ecipitation.-Greatest monthly, 6.06, at Charleston; least monthly, 0.40,
Wind.-Prevailin direction, northeaqt.-A. P. Butler, Observer, Weather
19th, and at Columbia, 33d ; minimum, 50, a t SIiartanburgh, 38th.
at Greenville.
Bureau, Columbia, %rector.
SOUTH DAKOTA.
Temperature.-The m&n was about 8.0 above the normal; maximum, 107,
at Forest City, 16th; minimum, 24, at Brookings, 29th ; greatest monthly
range, 76, at Webster ; least monthly range, 53, a t Spearfish. A.ecipitation.-The average was 0.67 below the normal; greatest monthly,
4.11, at Webster ; least monthly, 0.18, at Kimball.
Wind.--Prevailing direction, south.-S. W. Glenn, Observer, Tl'eatiicr
Bureau, Htiron, director.
TENNESSEE.
The most marked features of the month were the deficiency in rainfall and
the abnormally high temperature. These conditious rendered the niuntli
rather disastrous to farmers.
Temperature.-The mean was 2.0 above the normal; tuaAinium, 100, at
Arlin ton, 22d ; miniminu, 44, at Arlington, 4th; greatest niunthly range, 56,
at Arfngton , least monthly range, 18, at Lewisburgh.
A.ecipitation.-The average was '3.30 below the nurmal : greatest monthly,
3.08, at Bethel Springs ; least monthly, 0.00, at Waynesborongh.
69.9 2.73 Selma (2 ) t ........., 94
~
54 1 76.5 I 1.90 Vallev Headt ...... 92
..... ............... .! 3.19 , Warrior t ......... .I..
Wind.-Prevailing directions, north a d east:--J. D. Runkct, M. D.,
TEXAS.
Z'emperature.-The mean w&ahout normal in the eastern part of the state, and above the normal in all other part<, escept along the immediate coast,
where there was a slight deficiency, amounting in some localities to 3.0 ;
masimum, 100, at Graham, 12th ; minimum, 40, at Orange, ith, aud at Hans-
ford. :hl ; greatest niunthly range, 55, at H~tisford ; least monthly range, 20,
at (;nlvest4ln.
A,ecilr,ittatio,i.-The aveiage was about normal over the central and sonth-
western Iwts of the state, and the rainfall was deficient in the extreme easterji
an11 ntirthwrbtern parts, and over the coast region it was unevenly distributed;
gTente,t monthly, 11.49, at Brazoria ; least iuonthly, 0.23. at El Paso.-D.
11. Riyan, Gnlrestoii, director; I. M. Clitie, Observer, Teatker Bureau,
ass istn 11 t.
UTAH.
Tmp,erafure.- The niean w& above the normal during the first half of the
month, and below during the latter half; masimum, 104, at Saint George, 3d;
miniwutu, 28, at Scotieltl, 80th.
Precipifntion.-The average was slightly above the normal ; greatest
monthly, 3.60, at Losee ; least monthly, 0.62, at Deseret.-G. N. Salisbtwy,
Obsert,er, TI'entRer Burenu, Salt Lake City, &rector.
Naahaille, director ; J. R. Marbrrry, Observer, Weather Brireau, assistant.
I) VIRGINIA.
Ten~~erat~ire.-hIasitiiuni, l&, at Richnioncl, 19th : minimum, 42, at Dale
Enterprise, 9th ; greatect monthly range, 53, at Nottoway, C'. H., and Rich-
mund ; least monthly range, 3 1 . at Norfulk.
E3.ecil,itatioii.-Createst monthly, 3.40, at Stanardsville; least monthly, 0.98,
at Wytheville.-l~r. E. A. Craighili, Lynchbzwg?i, director ; J. hr. R$ker,
Observer, Wentker Burenri, assistant.
WASHINGTON.
Tei,~~ercrfure.-hIsximom, 00, at Fort Simcoe, 311; minimum, 26, at Water-
x ille, 20th ; greatest monthly range, 62, at Baker City, Oregon : least monthly
range, '39, at East Sound.
A e r i ~i f a f i o i i .-(~r e a t e ~t monthly, 11.06, at Tatoo4 Ialand; leakt monthly,
0.06, at Fort Simcoe. Wii,id.-Prevailing directilon, south.-E. B. Olwy, Clbswuer, it re at he^-
Eli reu t i , Olynip iic, director.
WISCONSIN.
Teni~era~irre.-Masinlum, 98, at Whitehall, 18th ; minimum, 27, at Flor-
Prrci~)itcrtiott.-Createst monthly. 2.<11. at Plover : least ntonthly, 0.02, a t ence. 4th.
CaJiz.- If7. L. Moore, Obseriw, Weather Blirercu, Miliiwukee, director.
46
........
CONTRIBUTIONS AND ORIGINAL ARTICLES.
Alabama. Ala'Jnnrn--Cont'd. 0
Bermuda *t ........ 1 5 1 f 1
7:3
1 F:; 11
Double Springs t .. .I 49 Beasemer.. ........ 74.3 1.21 Eufn~ln (2 ) ...... ../ yo
Brewtont .......... 05 50 76.0 2.00 Everereent ......... 02
0
55
2:
METEOROLOGICAL TABLES.
Heteorologieal record of Army post srcrgeona, eoluntary, and otiier co-oper- atfng obseruers, September, 1891. Neteorologicul record of voluntary observers, bc.-Continued.
Te in pera t u re. (Pnhrenheit.) (Fahrenheit.) 1 Temperature. I
I 2
~
Temperature.
C- (Fahrenheit.) .s St:ltlons. 5 I Stations.
Temperature.
1 (Fahrenheit.) 1 =$ 1 1
Carroltori t .. ....... 52.4 I 25 ~~o r <n e e t . ........ .I... ...... . Chepultepect 67.5 0.20 Fort Depositt ...... Citronellel ........ go 1 2 bo 1 77.0 2.23 Gndadent .......... .....,..... / gz 1 1
Columbiann t ........... I.. .......... j. I ? Goodwater h 7 .. .... Cordova t ........................... 3.00 Greensborough .... Deentur (I) t ........................ 0.87 JaRper t ............ Decalur (z )t ...... 1
ga I 48
1
70.4
1
1.20
!I
Livingston(I)*t ... 53
a
3 -
0
.... .... 72.6
74. 71.5 72.0
72.8
7s. 2
66.4
....
-
-2 e.
e &
InS.
1.57 2.29
1.60
1.46
0.75 0.70
3.59
2.70 3.62
.- U
-
2.02
SEPTEKBEB. 1891 .
Arieonn . Aris . Can . Co.Dan1.t
Benson ........... Buckeye t .............. Calnhasns *t ........ CanaGrande* ...... Chiricahua M t s t Crittenden ............. Do8 Cnbezos t .......... Dr oon 'iuininit* . Du%eyviile+ ....... %le Pnss ............. Fnrleys Camp ..........
MONTHLY WEATHER REVIEW .
111
92
92 I I O
.......
gz 99
.. 095
Tucson (21 ........ Wnlnut Grove t Wnlnuc Rmnclit Whipple Bnrracks .
100
........ ........ 97
Los Xnueles* ....... 1 93
Los G;rlos( I ) *... ..
~
gs
Lon B 6 0 s *.. ...... '102
Los (iatos( 2 ) ...... 8s
hlxnimoth 'rnnk* .. 113
Mare Islxnd L . H ...... hisrtinczr .......... 84 blsrysville (I )* .... 93
hlnrysvillr (2 )s .... 100
Mc~ilo Park+ ...... S4 .. 47
Neteorological record of voltcntaiy observers. &e.-Continued.
Temperature . I (F a h r e n h e i t .) I .:
B
I 1
Temperature . . I Fnlirenheir . ) G
c+ n t I nns
.. -e ....
d
E ..
.- .
0
53 49
42
30 55 3s
52
SS 00
50
50
52
53 $3
20
45
52
5"
...
... ... 56
44
5s
GO
...........
I.
... .. :: =:a
0 fiu . ' ~o ~p w i i i r r -~o n t .~ . 0
50 .I /io.3o 11 nei-enclo* .......... 1q
45.0 1 8.25 ;I Berkeley ..........
~
S g
!
~
BishopCreek' ..... 100
95 84.9
~
0 . I 8
~
k%lJCa'. ............. '
75.0 I 0.34 , Burden* 1%
......I 1'. . Boulder Creek* .... roS
72.6 I 0.35 Brentwoorlr ....... 103
86.8 0.00 ~~
Brighton' .......... 105
8.24 Bvrou* ............. IOO
0.31 , Ciliente' ........... 'roo
0.79 ' I C:ilistoo:i+ 1 9' 0 .1 5 c . nlen3ocino L . H .....
0 .2 2
I Ciintroville * ....... So
0.10 ' 8 Centreville ......., 9.1
99 0.70 ' I (%iw* .............
0.25 ~
C:isvo* .............. 82
~.b r , CaaIfmx* ............. 99 0.61 l:ulton* ............ IOL
............
..........
0 rfIs . 73.5 0.3( 01.3 0.7: 72.3 o . 1 5
54.2 0.tk
75 .I 0.0.
59.2 I . 1;
7u.3 0.3'
74.0 0 .. 01
7 4 .9 , 0.2;
72.7 . 0.5.
hS.5 0.4;
..... 3.2:
63.b 0.21
07.n 0.21
75.4 0 .I t
51.3 0 .2
t5.s 0.w
73.8 0 .M
73.0 0.a
..... 2 .q
..... 2.9;
"'I . I 1.31 76.0 , 0.M
74.7 ' 0.4:
01.5 . 1.55
...... 0.5:
55.0 I 0 . s4
72.5 . U .U
70.5 . U .E
70.9 0.9
73 . I 0.31
67 . .i
55 63
..... 53
04
..... 1 .....
60 77.4 47 1 73.7 4s Os.o
..... 81.4
40 51.5
33 64.8
52 73.5
50 74.2 41 09.8
55 s4.0
70 64 :: .
35 06.0
43 71.4
.......... ..........
..........
08 87.2
1.21
I . l i
0 . oc
0 . u
0 . 0s
0.2;
0.7:
0.1:
0 . s;
0.93
0 .2 j
I . 1:
0.5' 0.5
1.0;
0.7:
I . 15
1.24
0.48
....
0 . oc
C!o rninp + ........... 105
Crescent City .......... Cr?swnt City L.H.'. ... 1kl:ino * ........... I&
D..rvnep ........... 102
1)nnnigun ........ .I 9s
Uiineiuuir * ........ go
E:iat .tlrotherL.EI ..'.... Eclgwood " ......... l S7 El (Insco* .......... 1105
El Dorado ....... ., 10;
E I ni i I'Y* ............ lob
El Vernno* ......... I 92 Eniigrniil Gnp ....
~
53
Espwto 9s Evergreen .............. r'.irmington* ....... 103 E'rl ton ............ gg
P'ernando * ......... '104
F l o r e n c b .......... 94
Folsonl* ........... 102
F o r t Hidwell ...... 193 Fort Gnston ....... 99 Fort nissoll ......... 79
l+esno* ............ ' 103
F r u t u * ............. ' 105
U X I t" 103 Iirorpetowiit ....... 8
C;iiroy ............ ;i (iir:ird ............ IOO
............. Drltm 104
..........
...............
(ilrI1 Ellen* ........ 93
Goshen* 105 Grars Valley .......... H a ).w ~d ~ * ........ ~.80
Holliater 4 ..... IOO
Hoi-illrrook' .... ::::I 9s
H u ~i i t ~u l d l L.H ......... Hplasville t ....... 76 I n ~l i o * ............. 114
lows Hill* ......... 1 06
1 u 1 i :in t ............. 951
97 Iierler - ........... l i r e i l r * ............ 197 King City' ......... 8 102
Iiingshiir h a 1
Knight's &niid;i;$: 102
L.iurel* ............ IOI
...........
h i r e * .............. !IO0
Lmtlrrop .......... 103
57 49
45
41
.v 50
44
51 54
44.1
50
5'(
43
53 5'J
49
....
2;
....
5.7
50
5Y
5'
53
Knvrnnn * ..........
Koclilin f
.......... 105
Rumney ' .......... '103
Rncr:~!iirnt~i[z)L .... 93
.... 92
s :l r ~t n l e n l o ( 1 ] ..... ' go
11 Hrrnnrdinot ... 1100
II l l i y w H'ks .... 1 91
11 (;tdrit. l = ....... '105
I I J ...st f
.......... S9
iitii M.irg.irita* ... 97
1it:i 3Iar.n ............
r i t ~ Ynriii.a* ..... ; 30
I1t.l l ..l l l l .i ~ ....... rota ~o s i t .........
3 .E . F:irrmllon L.H.1 ...
3p:dra .. ...........
i l i h d I. . ..... '. ... 1'ropii.o- ........... 100
rllrl#bPk ......... ' I 0 2
i-rllclirr (I ) ...... ' I(S
ruhrr' ............ 110s
......... roq
iv i I low ( I )t ........ 1100
Niiitrrn .......... 104
i e r h Liuenm 1, . H . .I ....
tv i I lo 5%' ( 2 J * ........ 1 99
42
39
51 53
53 52
30
55
53
44
57 5s
s5
30
35
49
54
55 55
40
.i 0
40
50 5s
50
54
39
40 bo
50
45
40
43
50
4 2
ss 5'
50
49
53
52
52
52 6s
bO
46
42
70
52
53
...
...
...
....
....
...
%I
........... 57 so.2
$5 75.2
........... 63 . 79 .I
........... ............
0.4'.
0.0'.
1.11
0 . o(
0 .1 2
0 .0 c
0 . u
0.12
1.01
0.77 0.35
0.1:
0 . 0c
0.3
1.4'
5;. . 2
75.5
72.9 04.2
73.5 72 . o
74.6 5b . 2
03.4
D3.4
77 .I
.... ...........
41 . 7?.3 54 ' I(b.3
............. 1.22
............ 0 .7 ~
69 87.4
~
0.x
60 b1.2 ! 0.05
..........
~
0.44
............ 0.5s
37 ' 64.8 1 1.48
............ I ."j
70 . 87 . I I 0.03
49 . q1.2 I O .4 B
4s . 79.2 I 0.22
........... 1 1.3C
73.7
7 i .O
30.5 0 . I7
"7.5 0.0:
04 .I 0 .4 2
05 .I 0.42
..... ....I... ........................ ... .. ... .. Arkunsnr IC1 ty 1 ...................... BInck R8ick.i ...... 9s i 4s 75.9 1 0 .9
Brinlrley t .......... g j . 40
~
72.1
~
u.40
Conwmya ........... 92 j 53 . 7t.6 : 0.67
Cnmden f ........... 9; . 50 73.6 ! 1.45
C!ornrr Stone* ..... go 51 73.S I 0 .2 0
Dsllast ............ 94 1 4s 70.8 ' 2.33 Uardnnellet .........................
~ 1.00
77 .I )
35.2
71.9
57 . 4 56.5
71.0
'7.5
57.4
74.9
i4.7
p s >5.0
74.9
56 . 0
76.7 " . I
73.0
76.7
!5.7 '4.2
92.6
56.3
75.0
72.7 4 .S
'9 . s
74.7
70.5
is . 2
2 .7
....
....
1 0 . 0
77.2
I" . 0
I2 . 0
I? . 2
u . U"
0.27
0.3u
U .b l
0.19
0.21
0 . OC
0 . 0 C
0 . 00
0 .IO
0.02
0.70
2 .os
1.32
0.50
o . l a
0.47
0 . 48
0 .tis
0 . $9
.....
0 .2 0
0.00
0 . 00
0.00
0.29
0.00
0 . 23
0 . 'j
0.33
0.34
0 .1 5
0 . 11
.... v . b.5
Devall H l l l f l t ....... 99 45 72.2
El Dnrnrln t ........ gr 40 71.S
Fnyettevillet ...... 95 I 42 70 . : PorreskCityt ....... gb qS , 7.1.'
00
44
5?
4? 40
50
S t
4bC
5s 37
54
37 j S
53 47
37 55 55
53 32
54
54
37
44 5m
50
50
52
@I
....
....
.....
.....
0 2
Fullon .... ......................... 2.15
H e l r n a l r l t .............. 1 ............ 10.38
Gnines Lnndiug t ........ 1 ...... !......I o . a,
Harrisburgt ....... 93 1 02? 77.6 0.w
05.3
04.5 72.6
....
67.2
... 71.6
53.0
bq .5 5s .5 64.0
75.2 os . g
03.3
72.0
72.t 71.0
....
5.1. 1
;;: 1 04 . I
6S . 2
t.2.S
71.0
72.9 hS .0
i 5 .1
5y .0
t.4 . 6
....
71.0
0.50
0. bg
0.30
0. IJ
r.oQ 0.65
1.17
0.00
n . 70
1 . OS
0.27 0.17
3.35
0.08
0.77 0.25
0.95 2.50
0.50
0.35
0 .2 3
0. g i
0. e 8
1 . 1s
1.3s
0.21
0.02
0. ov
0.00
0.07
0.10
0.20
.....
U.UO
0. ou
0.00
0.04
0.50
0.q
hloruinet ...... ... 79 25 53.2 1.45 Pagodnl n?ar)t ..... ss 28 56.8 2.46
P:rrndor .I 2.73 1'I:rtorojt .......... 1 71 zz 43.7 5.98
Red Clitf ....... ....I.. ............... 2 .q
Par:tchute t
~
90 43 64.6 2.50 ........ .......... .................
.
~~~
Lenloora* .......... '16 Linie Point I .. H ... I
Liwrniore. ........ 1';;' Livingston' ....... 105
Imig Bench'. ...... , ~3
~~
Helenx(2 jt ......... 96 I 4s .. 74.4 Hot 8 lings ........ 96 47 75.0 Leati k'iI1*; ........ io2 I 45 . 75.0 Lonoken ........... ' 9s , 52 75.b
0.31
0.82
0.33
0.12
0.37
2 . og I . 00
0.53
O.tO
0.65
0.54 0.7s 0.92
0.50
0 . 2.3
j . I2
0.70
0.03
5.80
0 .til
0.82
0.3s
I . 13
0.75
1.00
0.1s
0 . oc,
0.12
0.00
1.01
0.00
0 .OH
0.49
0.9s ....
.
~
.. ..
Mndding ..................... , ..... 75.1 Monticellot ........ i 94 40 74.S
Mount N e b t ...... SS
~
51 71.S New Ciuscony ..... .I .... .. ........... Nevport(1)t ............ ' ........... Newport(z)t ....... 97
~
50
~
74.b C?sceolnt ........... 92 . 5: 71.0
Malvernt .......... 95 I 51
ueoiie T .............
8 ~(g 48 Pnrwnuldt ............. .I ...... PineCBliirt .......... 94 i 4y
Prescott t 93 1 50
Rogerst ............. 94 1 40
Ruaaelvillet ....... ... .'... . s t u t .t g a r t t ......... Texmrkann t ........
.4 4catr;rz I?lland ..... 70 j 37 AIInadrn* ........... qy 52
..........
.......... C'olifurnin . , 1
Analrrinl* ......... 100 00
Angrl lslsnd .......
~
67
~
47 Antioch' ........... ' ng ' 55
Athlone' ........... IOS
~
53 Auburn ............. g~ , so Bakersfirld* ....... i q 57 Ballast Point L . H ./.....I.. ... Baratow t .......... 16 I 49
Belmont .......... 86 , 54
Benicia Barracks .. 1 92 . 45
............. Aptosb 1 6 47
Beau niont+ ........ ~* i 50
?. .. Mercrd *. .......... 107 , 52
M i l tun [n e a r )* 57 ..... nro~lreto* .......... 1 2 . hlohnve *. .......... 105
nionsoll 103 ?dont:igue ........ 95 Monterey ........ 84
Monterey [Hotel
drl Monte)* ...... sz
N:i pa (: i by [ L ) ..... s5 N:itionnl C i t y t ..... 95
h'rP~II+?i t .......... 114
N c a l ~s l l .......... IO$
Nrwnrnn * -. 103
N i l w * 90 Norrihotft .......... 100
Norwnllr .......... 100
(hiklnnd ! I I ........ Sti Uaklmnd (z )* ....... 73 Ogilby ............ I I U
..........
....... New Cnstlet 1 Of
.... ..... .............
............... Cllet s 90
72.0
75.4 71.0
58.6
0s . 9
75.5 "j.0
71.5
02.4
77 . 3 70 . I
77 .I
73.8
08 . b
67.9
......
73.3
..... 1 ...... 3
926 MONTHLY WEATHER XNVlEW. SEPTEMBER, 1891.
~ ~
.. . ______
I . _~
Centmlin+ ......... 194 Chnrleston ......... 95
Chester$. .......... 1
Collinsvillet ....... 1'94
East Peoria* ....... gr
. 1 43 .........
1 46 52
Connecticui-Cont'd. Leh:inun ............... Mnnsneld .......... MiAlletown ..... 1. .New Hnrtford (I ) t . Newington ............. N. Groivenor Dale.
North Woodstock..
0
2 86
82
Archert ........... De h n d ( I ) t . ...... De Land ( z ) ........ E u s t i s t ............ Fort Barrancas ..... Fort Mende I ... .... Gninesville t ....... Honieland ......... Hypoluxo* i ........
94 92
go
92
97 88
83
go gr
;~ Green~tmrgh t Hnrrodsburgh t.... Loaisxt ...................... Middl~sborouglit..
1 ~e w p o r t ~:r r r a c k s .
............... go . 42
8s 49
94 i 45 Miami t ............ Orange City t.. ..... Passndena t ........ St. Frincis B'ks ... St. Petersburu t ....
Eg 94 92 87 90
Connersvillet. ..... lJe Gonia Springs .. Delphi. ............ Evnnavillet ............ Farmlnnil ......... Franklin ........... Huntingburgh .....
89
go 91
gr go gS
Tarpon Yprl,ngs t.. .
AlhRny t.. .......... Allapnhst ..........
Qeorgaa.
Americus t ........ A t h e n s (r ) ......... A t h e n s (z )t ........ Bainbrid et BI*kely*?..::::::::
92
91 go 91 88
go
;: Marion ............ Mn11 zy Mtohig:in City ..... Mount V e r n o n (i )t . Mount Vernon (2 ).
nfunciet ............ Point Isnbelt ...... Princeton b t . ...... Rockville .......... Sevnlourt.. Yh'elhvville *t . ..... 'Terre-Hautet..
\'aIpnrnisot.. ...... Vevny.. ............ Vincennes t. ........... \Vortliingtont ..... Indim Territory. Eufaulnt.. ............. Fort Supply Heal<lton 7.. South McAlestert . 1lllr:it.. ............... Wooclwardt.. .......... loton.
.............
........
....... .......
I.
go
92 94
....
93 gS
93 go
93 go ........
91
9'
8s
96
90 go
.....
Cnrtersvillet ........ Colunibus t .. ....... Corclele t ........... Enstin:int .......... Elberbon t ......... Forsyth ........... Fort Gninest. ...... Gainesville t ....... Gillrrville*t ....... Griffin t ............
90
84
96 go go 95 91 85
La F x r e t t r t .. ...... Lnlir'Cl1nrle.l ...... Lnwrenre t. ........ Lihwty Hill .......
~' h l n i i i l r v i l l r (i ) ..... ............. 1 Luling
94
fg ood
100
90
91
........ Fort Riley I 50 Fort Scirt.t. ............ F r r i n o n t t .. ........ ~;O Z
;lobe *... 90 ::ovr c1ty.t ....... 100
trenola 97 :rinnrll ........... , qs
H:ilste:id. .......... 1 6s H:rrenaville*t.. ....
~
93
HIJrtolit.. 91 h t c l i i n a o n t .......
~
93
Indrpendencet.. ... gS
I<ans;is City .......
Kirwiil t ..............
Ln Hnvpr. ... .....I., .. La!iin t... ......... ./. ... Lnrnedt ............
..........
.irninfirld.. ........ 196
Krllngg ........... ~3
...........
.........
LR C:luanet.. ...... .I.*
nl i nnexpolis ....... go
hl(Jrtl> 11 ............ I 00
Sew E~igl'tl Knnoh t 102
........ hlonniiient, 9s Mortlet.. 94
ILl:llilry ............ 9s
0-nIlal1 ............ 95 cKwe-o t... ........ 101
page Eity .......... 93
...........
(.)iJ?rllll t ...............
.
Milledgevillet. .... Millen t... ......... Monticellot.. .......... Newnan t .......... Point Peter ............ Poulant ............ Quibninn(1) ............
85
94
SS
94
Tholn!isville (z )t ..
Union Point t...... Washington t...... Way Crosst ........ Wnyiirsborough t.. West Point t ....... Alnho.
m c o a t ............
94
93 SS
88
92 go
90
........ Bnncroft t.. Hrlle Plxine ....... Hl:ikey i I le +. ....... tluii:rpnrte *..
C':irroll ............. Cedar F d l s t.. Cedar Krpicla t .....
(:h:rrles C:ity 7. ..... CI:irindn t .......... Clinton IlolIegeSprings *... Cordn v n ................ (~:vrning I I ) ............ O ~r n i n g (2 ) t ....... Corvrlon t...
......
.....
............
.......
89 94 I 00
94 87 91 90 97 go
9? go
88
90
lhilJ~J~lr:llIx.. ........... West End \Vinn.sboronpli,. ... .Iffline.
, ..... ....................
gs ' 42
Fort Bherninn ..... Henrys Lnlcet.. .... Kootenait .......... MuIIan*t .......... Ruthberg *t ....... n .t i ~t o ~.
% 95
96
;, Cornish ............ Ennt hInchi;ra ,I.. ... Fnirfielal ........... , Farniingtont ....... Fort Pri-tde.
!' Rennebrc l r s e n n l . . . I i e n t s Hill .........
I Lewiston .......... Magfielcl
Orono t ............ P e t i t hlennn ....... 1 West Jonesport .... 1 .Warylni1d
' BarrenCreekSp'gst
.......
...........
43 43
7s 3y 85
9; % 90 43 86 40
64 41
66 40
79 41 36 40
69 43 74 44
S8 , 49
Xeteorologica2 record qf oo7unfary obsel.~~crs, &e.-Continued. Neteorological record qf volrcatary oburlrem. dc-Continued. -
i
e.
Q
6 -
IW. 0.50
3.49 2.26
1.00
3 75 0.97
0.59
3 '4
2.39 2.31
3.92
3.72 4.00
1.so
1.40 0.69
2.41
1.34
4.40
....
1.00
3: : 3.30 1.23
1.44 1.41
2.34 1.74
2.54 2.30
1.45 1.67
1.52
2.71
0.49
3.03 1.65
0.43
2.96
0. bo
o. 76
0.74
3 .9 0.05
2.85
0. 08
0.92 3. I2
3.03
2. I 2
2.12
....
1.95
1.00
1 .0 0
5.00
0.40
0.17
0.75
1. 14
3.26
3.01
2.23 1.27
5.40 4.10
1.33 11.17
1.05
2. j o
2. '$4
0.59
0. ' 5
2.75
2.44
4.20
2.55 2.63
2.35
9.79 1.90
1'.
2.15
1.55
3.53 2.41 2.63
2: a
1.45
2.45 0.3s
1.58
3.08
2 .2 0
I . 10
.....
1.00
..... .....
0.53
-
r
a .-
U u
a" -
616.
5.36 4. 0s
3.46
1.35
4.64
3. a;
3.70 5.47 1.68
4. IO
I .6 b
1.41;
2.22
....
3.84
1.00
....
4.70 0.15
6. OS
1.45 4.20
6. ?i
5.02
S.51
s. 22
....
2.97
3.91 7. I O
3.72
5.40 0.70 8. 86
s. 55
7.73 0.08
6. IS
0.95
0. w
3.66
1.44
0.64
0. $3
0.94
1.87 0.07 1.41;
2. os
3.27
1.09
0.98
1.82
1.35 0.57
1.00
1.11
I. 10
1.12
0.71
1.50
1 .2 4
2.52
0.97 0. gs 0.84
1.13
2.40
2.84 3. So
2.47
3.24
0.05
0. 3s
0. b2
2.21
1.01
2 . I2
I . IO
2.01
0.44
0. u5
0.70 0.71
1.55
2.t6
1.20
0. 21
Temperature.
i (Fahrenheit.)
ii
Ytations.
P
- E:
2 z __
0
.... 63.7 64.9 62.0
68.3
64.5
....
....
.... .... 64.6
64.3
66.0 ....
....,
68. ti
70.2
69. S
69.3 .....
71.b 72.6
79.1 7Y.z
77.4
7s. 2
70.6
79.4 79.7 79.9 so. 0
.....
;%
..... 78.9
77.4 77.8
78.7 76. I
79. I
76. s 75.b 76. 5
72.9 72.3 77.0 7s. 3
73.4
72.4
73.6 75.9 74.4 72. I
77.2 70.6 70.6
74.2 73.2
.....
73.8
72.5
09.5 74.1
75.4 73.2 71.7 6s. 4
74.5
77.0 ....
.... .... 77.6 71.0
74.0 73.4
75.3 74.9 76.2
56.4 62.7
54.6 58.6
4s. 8
s4. 7 53.6 66.4
Stationa. -
2
2
.... 43 44
42
.... 4s
43 ....
.... .... 45 43
34 ....
....
50
....
52
52
51
....
49
59 60
61
54n
....
63
2
E
72
72
62
6q 66
71 61
67
Go
57
56 60
65
....
at
57
5'
59 5b 58
55 bo
51
52
61
54
....
;: 2 56
51 56 57
60
....
....
.... .... 60
54
58
2: 6r
60
23
30
23
3'
1s
30
3' 50
.... 40
44
40 ....
2
-
d
E .-
~~~
42
43 54
42
44
37
43
44
42 4s 4s
48
40
...
... ...
50
51
43
44
50
46
39
44
44
39 40 44
43 3s
46 42
45 5s 44
50
43
3s
...
....
$ .... 46
49 4s
47
42
41
39
40
....
...
35
,... ... 56
42
54
44
48
53
43
46
....
45 ....
....
4 1
46'
.... .... ....
37
3s 37 3s
29
33 34 47
52
35
35
41
37
40
4? 40
.... .... 35
39 30
39
30
35 33
43 32
49 ...
~
c d
E ... __
71.6
64.7 72. I
70. S
73.6 ts. I
72. I
06.5
72.2
63.0
72.2
08.0
....,
.... .... .... b8. 5
72. o
73. I
.... .... 70.9
.... %.3
72.3 b7.8
69.1
....
....
.... 67.2 72.0
67.5
65.6 68. 8
67. 8,
70.4
73.2 67.8
....
....
....
$2 ....
7s. 2
7s. 2
75.2 77.3 7S.o
75.8 so. 2
76.4 72.6
77.2
75.4
77.4 75.4 76.6 76.0 73.2
77.0 73.4 78.0 76.6
76. o 71.2
76.2
74.2 70. 2
76.6 76.0
76.4
73.7 70.0 76.2 76.6 76. s
....
....
....
.... .... 74.2
62.0
60.7
60. 2 ....
63.4
62.4 62.4
00.4
62. I
bo. 8
a:: ;
....
5s. 4
57.8
56.3
69. 0
~-
~
Ills.
1.4'
1.05
1 .4 2
0.92
1.52
I. 2s
I .S 2
3.34
0. 13
0. go
1.23
2.33 0.55
I.XZ
1.27
1.74
1.33
2 .5 1
0.51
1.11
0.96
I .?7
0. 04
0.53
0. so
0.26
1.35
I .os
0.24
2.51
0.49
2.25
1.55
2.00
1.70
1.28
2.00
0.40
1.74 2.14
0.66
2.47
3.55
0. 37
5.45
3.75 5.3s
5.40 1.90
3.20
0.41
3.53
1.99 5. b7 1.70 0.70
0.79
3.72 4.73
1.07
0. $8
2. 30
1.50
5.45 1.64
2.95 4.20
1.40
3. 12
0. gs
1.77
0.97
2 . Sti
1.3'
0 .j 6
1.7h
1.22
::E
2. c.0
2.12
0.15
4.00
1.15
2. I j
1.40 1.46
1.40
3.02
2.56
1.77
4.05
1.75 1.25
s. 00
2.60
' I . 40
6.00
0. S7
2.25
1.21
2.00
2 . IC
....
0
60.5
OD. s 7;. 2
70.7 72,s
0;. b
.... 71.8
y. 0
72.8,
73. 72.0
09. Y
71.5 tiS.6
65. 4
05. 7 67.2
71.8
70. z
os. 4
67. s os. g 07.0 67.6 66.3
71.4 07.9
615.4
07.9 66.8
66.7
66.6
68. I
67.4
74.9
68. 8
00.0
.... ....
.... 70.4
....
....
?a. 2
69. s
....
....
69.7
65.2
b7.S
bY.7
.... 0s. Y
.... .... 71.6
70.4
09.7 70.3 70. i
71.3
.... 69.4 tB. 6
65. I ....
... 71.1
7-1.4
.... .... ....
66.0
07.8
Mi. I
67.7 05. '.I 65. s 68. 5
69.3 73.9
05. 9 6h. 0
67."
6b. 5
64.4 9:;
..... ..... 97.5 07.7 64.6
64. a
98". 7
65.8
68.4
65. 3
73.9
05.5
.....
P;ialine ............ ! y5 1 37
~
~~ii~iiyai,ur.~it .....I g~ 40 Ple;lsant. Uxlr... ..., 94 . 37
I. 5" 3.45
3.33
3.41
1.55
3. ys
2. by
1.55 I . $4
1.90
1.2s
3 .7 3
3.91 1.33 1.53
1.27
1.33
1.92
3.59
3 . 00
1. I ?
1 .2 1
1 .2 0
1.00
2.00
3. 2 0
3. s i
0.75 1.4s
0.61
1.62
0.37
0.01
2.02
3. '33
2.99
2 . :i
1.95
2. IJ
1.00
1.55 1.39 1.23
2.45
3.73 5.65 3. js
1.b7
1.70
1.31
I . IS
1.95
1 .I j
1.48
1.sr
3.4Y 3. I1
1.85
1.71
2.79 1.92
1.46
0.34 1.64
1 .5 1
1.32
3.25
1.52
0.60
0.50
3. 0 5
1.61
0. 07
2 . al 2.04
1.05
1.9!
1.2s
I.6C
0. gc
1.93
2.3s
[.X I
I. IC
0.2c
0.6'
0.4 I
1.06
0. 31
0.4r
0.1:
0. 9:
1 .3 1
3. 0 c
0.04
0.51
1.3:
1.1:
I .I <
2.20
?. ?h
1.01
Grisgsville t . ...... 100
H r n n r p i n t .......... 97 Irislitown.. ............ Jordnns (;rutre* ..... 96
L:ll.on * 7 .. 92
Lnnnrk. ............. 92 hI;irtiiiavillr* ...... yz
h1:tscoutah .... .....' gS
.........
olney ( 11.. ......... 9.5
.......... Ollley (2)*
~
94 Orwryo * ..........., 92 1Jttnw:tt ............ 93 PIilestiiiet ........ ..! 93
Pnna *, .............. 94 Peoria ( I )t .. ....... I .. .. Peori;i [ 2 ) ......... j 93 Philo t ............. I97 P<Jlltl:lC *. ....... ...I I o 0
scdnn t.. ...........
Shlelqlst ............ gg 39
stnftor~l*t .......... sg
~
45 Strrlingr.. ......... 93, 1 42
93J
~
34k 1 ribuiie.. ..........
W:lkrtiL~ld ..... ....I g t
~
42
Wn liemey ........ 94 ...... w :l l l ~l ~~~[ I)t ........ I .......... w:lll:lce(2] ......... 1102 ......
~
Wrskon (1 ). 47 Fates 4;entret ...... 1 $ . 35
Bowling c;rrrn t ... g; 52u Burkewille-i. ..... .I.. ........ Burnsialr 7 .. ...... ./. ......... c'n~ldo * 7 .. ........ .' 92 57 ~;:itlettsl.~orght.. .. .I .. ........ C :~~l i t ~~l l ' t .......... I p s 53
.......... Se11ec;rt.. i 95 :I
, I .
i , Ulysses ........................
........
l<mitwk!/. 1
C!entr:d l ' i t y t .......... Earlinaton.. ...... .l ' o s I.';;'
WaterKury ......... go West Siinsbury ........
55.4 w .8
"9.3
fltl. J
*4
04.7 b5.5
6 .4
t7.6
fm0.0
01 .J
6.0
cm7.2
0s. 1 02. y
00.3
07.5 68.3
05. 2
b 2
b3.0
05.0
71.0
W.9 71.0
....
05. b
7% 4
....
.... .... .... 09.5 71.2
i5. 3 Ob. 0
09.2
i r .4 i5.4 74. s b9.7 69.9 69. s
70.5
70.4
72.3
7". I
05.0
....
.... ....
....
n7.2
72.8
fig. 3 70.0 bg. 8
71.3 74.2 t">. S
73.4
71.0
09.0
65.0
71.0
69. 0
70. o 70.6
b j .0
70.5
69. I
"9.4
9.3
....
....
....
....
bg. S
....
.... ....
....
75.6
.... .... .... 74.4
....
31
44
44
jh
41
39 .... ....
40
4 0
SS
3:
55
40
3
40
33
39
41
37
30
32
42
37
40
4?
....
35
.... ....
40
42
42
44
5Y
37
37
40 50
52
45
44
37
40
39
.... ....
-43
3s
4s
47
....
44
....
.... -If
30
42
40
45
3s
37
47
....
.... ....
41 3'
33 35
31
33
40
....
.... .... .... 3s
....
40
40
35
.... .... ....
41
Riley t ............. ' 93 Kucliford ......... .# 93 Hock Islaud Ars'l.. Hushville.. ........ Santlwich t ......... 91
l Edmo<tont ........ i 8, i j g F :r l ~n u u t h (r )t .............. , Fort. ~~i o r i i n s ... ...1'93
~
42
~
Fr;rnlitbrt (
. 1 t.. ..............
57
....
65
54 50 54
5! 50
03L 47 47 55
54
51
53
50
55
57 47 5b
00
, -, Ha>iner t. .......... .; 92
Hun n ):it 94 d:rckson Bwrncks.. 1 "3 ...........
.......... 67.1 ' 0 .1 5
71.4 I O.02
71.0 1.00
....
SEPTEMBER. 1891 . MONTELY WEATHER REVIEW . 227
~ - ~- ~~.______
~~
.... ~- .
~
Jfeteorological record qf voluntary &servers. &c.-Continued. ,IleteoroIogical record of voluntary observers . tl.c.--Continued. _ ..... ~- .
d a .. 0
a" -
Ill8 . 1.33 1.30
0 .bo
0.21
1.36
1 . 18
0.49 1.24
1.52
0.56
3.33 1.37 1.70
1.13
2.01
0.46
1.00
0.65 2.30 1.90
2.25
4.95 0.75 1.30
0.81
2.07
0.75
1.22
4.33
1.73 0.79 0.89 0.30
0.80
a . 30
1.93 2.03
1.54
0.39
0.09
0.93 4.24
1 . 18
1 . 16
1.45
1.49
1.05
0.90 4.20
0.67
0 . s5
1.06
1.59 0.63
0 . s7
1.05
0.30
0 . sg
0.45 0.61
2.03
1.08
0.80
1.05
0.80
0. S7 0.89
0.70
1.34 0.30
1.09 0.50
0 . .w 1.51
1.70 1.6s
1.48
0.43
0.00
2.00
0.87
1.68
0.20
0.00
....
0.00
0. co
1
....
2.s3 1.85
2.09
7.53
3.47 7.54 0.82
1 . 58
2 .6 ~
1.76
1.74 1.58
1.0s
0.86
1.35
-~
Ternpernture . (Fnhrenheit.) Stations .
...
Temperature . 1 F.ilrrenhrit . ) - . .. ci ..
2 a
11lS .
D . 25
1.54
I.@O
.-
0.sg
0.81
1.00
y . S9
r .
D . no
0.0"
3 .So
0 . .'j
0.37
0 . "5
0 . 40
0 . 15
0.39 3.27
2.1::
0.32
0.51
1.72
0.50
0.75 0.35
1.02
1.s5
0.25
1.1s
0.10
0.55
0 . s z
0.0s
0 . Di)
. C
L
c( .z .
0
76 . 5
75.0 77.6 70 .I
74.0 73.2 70.5
7 4 .2 73.2
7" . 0
75.5
75 . I
70.9 73 . s
73."
75.2
74 . n 79.5
73.2 77.0 72.9
74.0
75.4
65.6 70 . o
74.8
_I I .. , ..
....
73.6
, .... 70.7 70.3 70 . o 72 . s
bo . 2
09.7 .....
Stations .
E l 5
0
68.5
t.7.9 67.8 bb .7
.... 67.7 63.0
70.4 67.6 64.6 66.3
68.5
07.0
65.5 71.3
66.0
61.4
68.4
65. fi 66.7
63.0
65.4 69.7 6S . 0
65.9
65.3 66: 4
6 .4
....
....
....
....
6e .2
.... .... 66 .a
73.9 e b 2
.... .... 70.4' b7.3 65 .I
71.7
$1:
69.4 65.1 07.0
65.7 68.7
.... ....
57.4
65.4
53.9 60.3 64 . S
tlS.8
t.2. a
57.' 58.4
63.9 ....
55.0
50.2
04.3
57.9
$4.9
;;: 5
00 .4
t o .0
c 1 .5
64.2
55.7 64.7
57.4 61.5
59 . I
55.6 01.8
00.4
62.5
64.7
64.4
GO . 2
.... .... 59.6
b3.5 63.4
59.3 b1.J 62.6
....
55.9
64.7
03.9
....
63.6 61.4
....
~
' I
~orvinti&Cont.cl .
~ 0 ' 0
~ 0 1 Ins . ' ' .11ictiiynil--Cont.d . 0
Cuin'berlan.l(I)t ... i 65 . 40
~
67.1 ,.2.46 BerrienSprings(2) ..... Fort McHeiiry ..... So 51 ti9.3 . 4.68 1 Birch Run ......... 8s
Frederick .......... go 49 70.0 , 2.17 , Biiminghaln ....... SS
(inithersburgh* .... Sg ..... 71.1 I ..... Bronvorr ........... SY
Leonnrc1town.t ....
Tanej. t o w ~l t ..... ;. Woo qtoch ........ Maanchusctls . :
Grent F.iIIs'. ...... 65
New hlnrket ....... ! !;
0
37
4s
39
36
30
3s 35
35 39 3s
35
48
...
....
41
42
....
:: 33 34
41
45
30
48
39 58 40 46
37 36
31
42
.... .... 45
50
35
4s
34
30
43 44
32
45
40
35
45
.... ....
.... .... ....
27
3 34
25
40
30
24 2b
33 9 19
5
3"
34 34
30
30
30
34 37 19
27 29
45
3' . 16
30
2.5
42
30
48
....
Z:!
.... .... 30 39
$ 38 36 ....
33
40
37
42
....
36 ....
,Vt.bm~k;rc-Cunt'd. 0
De YIltO ........... Duniiiiig* ............ Z2 Ericrnii* t 91 E \v i w *t ........... y5
FxirGiry 92 F:tirticltl* .......... FtIit Kiulir.ira ..... $
97 F o r t lil1I.ih.L Kurt K o h l e o n ..... Fvrt Siclney ....... ! Tz Frmklinb .......... 9.1 Frrliiont* .......... 90
G;eno:r t c.erii1g.t ............
1;r:int ................. I1:irtington T ....... Haatiiigst .......... 1 %
Helrun ........... ., 90
Hulslrrgr .......... .I ....
.........
..........
.......
I:rnev:i .................
Gr., 11.1 Isl>ln.l91~ ..... 93
HAY +r i n g s t ...... / 94
............
~
2
...... ti3 . 6
64 . S
t.O . 9
r.5 . 2
bu . 1
t.5 . 0
t,5.4 c.4.0
61.7 03.7
6n . 3
5 j . ;
"3.7
tu . . 1
01 .I
1r2.2
. 2
00 . u
1.75 I . 1 .i
2.7s 2.27
2.gr
2.35
3.00
I . 27
1 .4 2
I . 39
1.117
1.51
1.42
1.55
1 .Y I
1.55
1.90
1.39
0 . sp 0.73 1.27
0 .go
n . 5. o
0.73 j . 20
2.36
1.34
2 . 17
1.55
2 . y1
j . 12
1.47 2.02
1.69
I . I..,
2.63
.... 3.01
1.40
1.37
1.33
1 .~7
I . t 7
0 . . g
1.42
3.1"
0.55
2.u2
1.50
2 . '3
2 . S;
I .c i C l
I . tl0
1.22
I .b 2
I .h O
....
0 .i t . .
U . q'J
1.92
s.y>
1 . "5
1.55
2.41
2.4a.J
1.7:)
2 .2 5
2.34
........... 52 i 0.0; C::ilumet ! sn ........... I I O I ......... ........... .........
.............. Adanis ............. i 85
hniherst ............ 80
ArnherstExSLn(l)./ 89
ArnherstExSta(2).~ 92 Andover ........... 58
h4.S I ... ' ConL~urd ............ ss C:urunn;r ........... 9" 37 03.6 . 2.21 . Crystal Falls ...... 90
65.3
~ 2.00 i tJgerfiel4 ........... go
l d9 Ashlnn rl ............ ' ................. 2.44 Ev:rrt .............. S9
$ . 6 j .d ('i.25
iF 5 2 .8 1.80 Edr.11 ...............
BlueHill(sunr.t) .. Blue Hill (base 1 ... ........ bg
BlueHill[valley) .. Boston
Cnmbridge ( I I ..... Cnrnbridge(2) ...... ....... Chestnut . Hill ...... .......... Chicopee Clinton 92
Coucordt Cotuit ............. Dewfield ..... ....
.....
.......... ...........
.........
..............
...... .......... ...... ............. ........ ............ ......... ....... Frnnringlinm ...... Gilbertville ....... (iroton ( I ) .......... Bench* ............. ........... Hoosac 'L'unnel ..... ........... K ~I I ~~I I (;reen ..... ........... LRkeCochituate ... ..... ................ .......... .......... ..... 1.0b Noble .............. So
............
RI.to....lit .............. 96 N :l t .' ~l r t %t . ........... 94
P;tIaI .\It<. t ......... 03
Pwrt 4;ilNsont ....... 1 u7 rnzi b............ I 94
ip Irlnnol t ........ 90
i i I I en7 ............ I 03
..... j oti
I l l <l l l ..l l .L t ........... ! 47
P<>IltOt.Wt ......... 144
2s
39 35
30 .
32 59.Y 37 , 59.5
QO I bo.0
~i i i j w r i h ........... 1 p5 1iiiirli;ill t .......... 95
Lrxiiigton' t ....... 97
Liim, lii ............ 91 Long Pilip ......... 110
NehraslinC:ity .... 91
........ hl:rrr u r t t e * 92 b ~l l l ~/r l l * ........... 92
NurfOlkt ........... 89
Norch L o u p t ...... sg
..........
4 J . 05.s
33 00.9
35 . 61.2
hdrinn t ............ I 9s Anvlvton (:i t r t .... ! 0 2
0j.h
65.2
60 . 4
64.7 5y . 11
01.9
t'3.7 b7.n
"5.4
62.0
bS . 5
"5.1
05.4
4; . 3
b< . 3
t.4 . 2
t.l . 0
r3.0
b3.3
02 . b
00 .I
50
.... 4s'
3s
50
44
37 45
40
42
4? 30 45
42
42
....
....
................... I r*
Lawrenre .......... hY
Leicester .......... 1 so
~e o m inster ....... .I ..... Long Plain .......... SO
Lowell [ I ) ......... Lowell(z) ......... I si 1.owe11 I 3 j ......... / 92 Ludlon.(i) ......... l bS
2 n i i ................ I So
so
anshrld ..........
39
~
70.1
40 I 70.8 4 o d 06.1
0 . tmj
0.57 O.b,
u . -, n
00.7
b2.S
'15.2
t.7. 9
63 . j
55.4
6 r .r ,
0u . 2
55
52
37
43
42
5"
51 30
42
37 34 43
44
42
37
4.5
42
50
50
....
....
....
....
.... ....
25
30
24
30
3s .-, 4
2;
2b
3:
23
30
34
35
30
4 2
40
32
30
40 ti
....
....
....
42
..... 10.54
r.y.5 1 0 . j E
72.9 0.55
...... 1.15
7" . n
....
I. ilwrt y ............ 52
I . ..iii.i..n.i Hiinlye ..... 3l.,rsl,:dl (2 1 t ...... 9'
h l l l l ' . 1,:tJlIJt.tr ...... 42 43 05.3 42 . t.7 . j
. 0.3"
0 . c. 5
I . IO
" 20
Y.01
I. . '. 7
... 53
" . 3 :
I .
I . ('4
u . sa
1.25
0 . su
0 . r>s
0.00
I .0 h
0.04
0 . t;u
1.00
0.71
0.56
0 . ss
0 .I S
0.67
I . 30
0.70
1.55
u . "7
I . Sj
...
70 . 0
71.3
7u . . >
"2.4
70.7
7r.S
r l l .2
7b . x
...... G9 . 0
7u.0 t.9 . 0
70.9 71.0
......
...... ...... ......
52.7
00 . J
5s . n1
5s . 4
"3.4
5s . 4 r+ z
54.9 53.4
66.0
lis . 8
73.7 0S.g
71 .I
03 . 2
......
............. 'son ('ity ........
Illt'B H:rllc~ll ..... ....
Elkol?) 50
96 Eurr1i.r
F-118. l u l l * ........... 102
Grnu.1 b5
(;cnlt-jlid:i 94 H ~~l l w k * 93
Hot Springs'. 95 .
Llh\rlleyYIllC ....... j go
E l y I 90
............. ................ .............
.............. ......... ........... H:iwtliornr( 1 1 % .... 93
Hawthorne (2 ) ..... 95
Hulirlmlilt f
........ SS
97 Rlill City Monitors Ranch .... s5
......
...........
.......... Pnlinn$le 9s .......... I SO
42 0s.j jo 01.0
35 1 "5.3
32 I 59.9
4" . 1.7 . I
...........
.....I ......
2.47
1.13
4 . UY
0.31
2.79 j . y2
I . h.4
1.51
4.54
5.43
0 . 9'
1.92
0.73
j . c q
1.41
1.34
2 . s5
1.23
0.4 I
1.3s
1 .2 0
0 . c. s 0.7"
I ' . 44
7 !'O
1.9'
0.29
0.22
1.50
0.77
I ' 33 0.99
0 . r. 0
I .2 D
I . In
..... I ...... 36 f'ti.4
?D ! tms.5 .; i t12.S
.. q; I 00.5
34 c10.0
j s r i . 67.5,
..........
4 1 6I.b ..... tm3.0
44 70.1
50 71.5
4s 70.4
52 7S.5
52 7ii.4
49 7f.0 49 7".9
50 73 . Y
I
..........
3%
41
3q
30
44
39 43
33
35
....
3 45
39 3s
Adrim
......... ............ Allrgnn 93 Almn .............. Ann Arbor ......... ' SS
Arbeln .................. Atlsntic ........... 77 Ball Mountnin ..... Ss
Bangor ............. 92
Benr Lnke ......... SS
Brllnire ........... 91 Bell Branch ........ 82
B.nton Hnrbor ..... gr
Benzonia .......... 8g Berlin ............. 94
...... ~-<t:l,!.abk(l.
Anslrg t ........... Ll4
. \*l i l .m l * .......... Aulmrnf I l ' t .......
b :i t rim- i ..........
Creighton t
l j u \re I I *
f.rrt.e ............... ~' u l l w r t *n n ( I l t
1:ull,*.rt.son( 2)'.
......... .I . ...
........... ........
......
.......... I H:inovrr(
.
) ........ H;iiiover (2 ) ........ 85
Lake. Villiige ........... 0.95 Littlcton 8.3
1.43 . 3l:incliwter ....... s7
0.00 Mine E'alls .............
90 i .S j N:iehnn
1.34 1 NnrthC'onwny ..... 90
2.00 Prirnichuck Stntion ....
..........
............ 1.3,)
~
Pir\vton ............ ss
62.3
h2.0
Ca.6
69 . I
62.3 66.2
"4.2
64 .I
68.4
5 S ?l
64.0
...... ..... ........... .......... 2.07 Enterpriset ........
23 8 MONTHLY. WEATHKK, REVIEW. SEPTEMBER, 1891.
__~ ~-
~
~-
~
-
N. Hnnbpahirc-Con.
Plyn1out11 ......... Strntford .......... Walpole ........... West hlilan ........ WierR Brid-e .......... Wolfhoroug%. .......... Ne10 Jerxey. Asbury Park ...... Ba onne ........... Beylev i I le. ............. Belvidere .........
Billingsport L. Ha.
Blnirstown ........ Bridgeton( I )... .... Brid r t o n (2 ) ....... cam8ien ............ Cape ,May C. H. t.. . Deokerton ......... Uover .............. Egg H:ub?.rCity ... Frnnklinvllle ...... Freehold ........... Gillette ............ Hanover ........... Highland Pnrk. .... Bi litstown ............
Junction .............. Lsnibertville ...... Moorestown ....... Mount Holly ....... Newark (I ) ........ New Brunswirk (I )
New Brunswick (2 )
Newton t ........... Oceanic ............ Paterwon.. ......... Rancocas *. ........ Readingtou j* ...... Balein h ............ Somerville ......... SouthOrmgeb ..... Tenafly ............ Trenton *... ....... Vineland .......... West Yummi t.. .... Whiting ........... 1vew Mezico.
Albert t ............ Antelope S p r i n g s t . Bernalillo ............. Bloornfiald t ....... Chninat ............ Coolidget .......... D u k e t . ............ Eddy. .............. Estalina Springst.. Polsomtg. ......... F o r t Bayard ....... F o r t Stanton ....... F o r t Wingate ...... Hillsborough t..... La Lua ............. Lordsburgh.. ..... Los L u n a s t ........ Monero t.. ......... Nogd .................. Oliot .............. Pojuaque .............. Red Canon t. ....... ? r i n g e r t ..............
Wallacet ........... New YorL
Alfred Centre ...... Arcade ( I ).
Beverlyt ...........
I"l%\yatowu ........
&os t. .................
Addison. .......... .I
.........
O
88
88
81 38
86
91
93 go 87
gt 90 39 85 97
go go So
' 86
87 84
90
88
87
93
gi 95 55
83
90
S 92 gY
93 85
94 90 8.9
84
93
93 99
87
90 89
8s
105
.... 92
3 87 91
92 96 96 S4
ya
93
93
88
l 65
ForL Porter ........ Fort Schuyler.. .... Fort Wndsworth .. Grnevn t. .......... Hninlnondsport.. .. Hevs Rand Statiout II o ne Y ni em1 Brook .
2 90
93
85
Sg
83
3.33
2.53 1.70
1.47 1.57 5.91 2.30
2.18
0.72
2.76
....
...
2.21
I
1 1
Perry City ......... Plaltsburgh ........ Plnttnburgh H'ks ..
88
89
gr
66.9 60.4
.....
3.18
3.33
2.55
s3.9
04.4 63.8
.....
2.05
1 .4 0
1.28
1.6c
West Point ............ White Plnins *..... Willets Puinl ...... Norih Carolina.
So
89
Baldwinsville ...... Batavin ................ Bedford ............... Bethlehem Centre.
Binghanitou t ...... Biooda Depot. .........
Brentwood ......... Brockport ......... BrookReld ......... Canton t ........... Carnie1 ............. Central Park, N. Y. Chennn o Forks
Boyd8 Corners.. ...
89
.... 88
88
84 68
85
3 91
.......
68.3
7F.4 m.5 71.1
73.3 09.0
49.0
...... ......
71.3
1 .1 2
1.23
2.61
1.qc
o.Rc
o.St
1.41
, 2.oc
4.4:
j .Z C
Arlii~~$oiit ......... A 3 h l ;\n d (I ). ....... Ashl:tn*l (2 )
Bandon
Beulnht ............ B u r n s t .............
........ ............
90 E6
94
72 95 79
Jonpstone Mount *. Sourhrrn P i n e s t ... \Vatlesb~irough ..... Wndeville 7.. ...... Wndiington 7.. .... 'Weldon t . .......... Willeyton ......... lVorth Dakota.
Cnrringtont ........ E l l r n d n l r t ......... FArw t .. ........... Fort Bufbrd ....... Fort Pwihina ......
.... 92 86
88
97 90 90
g6 g6
92
99
91
75.2 71.0 3.42 1.37
David8 Island ...... De KalbJunction..
DepoFit ..#... .......... Dunkirk (2 ) ............ Ension ................ Eden Centre ....... Elmirat ........... Factoryvillet.. ....
@
....
86
@
go
59.4 58.4 65.2
......
-53 2.3s
I.? 1.01
Meteorological record. of oolicnia y obserrela, &c.-Continiied. Netenidoqical record of iiolzcntarti obscrsers. &.-Continued. -
d a
0
.-
k -
IlU.
9.79
D. 65
I]. 38
2.51
3 .0 0
2.50
0. 00
0.05
0.45 0.13
3.33 3.95 0.42
2.39 2.71
1.60 3. IO
1.33
2.51
1.05
4.55 2.51
2.04
2.46
1.53 1.98
1.95
2.37 1.85
1.00
;: 2:
.... :: 23
1.50
2.54
1.99
2.82
1.77
2. I b
2.53 2.71 2.07
2.01
2.38
2 . 11
3: s 0.28
1.07
2.90
2.17
3.41
2. 02
1.01
a. 65 1.m
3.34 I. 50
1.34
2.20
1.19
1.8s
2.67
2.55 1.31
2.03
I. 17
1.57 1.31
3. og 2.45 1.71
3.25 4.12
2. 15
1.29
4. 12
1.35
2 .2 0
2.39 2.89
2.47 2.23
1.W
2.30
4.30 1.35 1.50
1.79 1.88
1.82
1.49
2.11
2 .2 0
2.49
2.43 2.77 2.90
2.57
2 .0 0
....
~
d
0.
2 u .-
d: -
Iru.. 1.23
1.43
1.75 1.71
;: d
4.45
3. IO
2.24
2.02
2.43
2.35 1.74 1.09
2.20
1.83
1.54
2.5s
Temperature. (Fahrenheit.) Stations. -
~~
Temperature. (Fahrenheit.)
I4
Temperature. !' (F a h r e n h e i t .) 1 -i i Stations. Stations. ._
i 1 .g 1 g i ' f , ' d
a 1 a
Temperature. 1 (F a h r e n h e i t .) , c
--I S= Stations.
2 Z I ' i 2 ;;
- C
A
0
58.9 64.7 62.4 60.0
..... .....
6s. 7
69.7
67. I
67.2
70.8
06. I?
70. o
72. I
70. 8
9.0
00.3
66.5
07. o
a.0
67. I
64.3 '4.9 tis. 2
6S.8
....
....
.... os. 3
67.9 68.8
b8.9
71.0
07.4 66.9
74.3 69.6
70.3 67.0
68.4 65.6
67.0
73.0
09.3 65.5
69. I
....
2:; .... 70. o
58.9 01.4
56.5
78.9
61.6
66.5
62. 8 62.6
69.6
07.3
64.3
6S.7
....
66.3
76.5
54.8
....
.... .... .... 67. a
$2.9
c.0.7
64.8
00.0
....
.... .... .... 64. I
68. 2
66.0
60.5 61.7
71.0
59.3
67.6
....
64.?
66.5
.... ....
h I .0
.... .... .... .... 62.9
66.6
6.1.3 65. I
-
i
E .-
-
0
34
35 40
32
..... .....
52
47
4 1
46
52
41
50
49 51
49
41
42
41
44
45
42
40
43
45
46
47 48
51 44
45
48
52
47
53 56 42
43 48
39
50
47 44
45
45 40
45
30 30 30
52
38
41
35 32 45
40
58
3s
.....
..... .....
.....
.....
23
41
44
.....
..... ..... ..... 40
:: 3.5
40 .....
..... ..... ..... 38
55 49
45 30
3s 43
54
.....
..... ..... 35
50
36
..... ..... ..... ..... 38 44
35
43
ti
I S
ti
l i ,. .
~~
IV. Lkihol~i-Cont'd. 0 0
Gr:Lld Fi,rkst 11 ..... S; I 32 61.6
G r :~n <l Hnpirlst ..... 07 24 63.0
Hoprt.: ............
~
S5
~
30 5 S .S
Lnk<lt:It ...............
1Cr 10 ............ , 92
~ 2s 0 I .U
0
54
53
50
43
52
49 41
40
41
38 40 42 26
40
40
...
...
.... ... ... 40
34
39 47 45 34
36 45 34
32
3s 39
37 40
37 42
38 41 42
53 37
33
30
47
33
42
42
40
30
40
33
50
51
43 42
49
54
45
M
....
.... ....
....
....
....
3s
....
....
....
.... ....
:; 51
45 5"
51
49
45
....
.... ....
5.1
46
55 60
4b
53
54
47 5s 55 55
49
48
30
32
29
:: 35 28 26
0 ' 0
26
~
53.6 26 60.8
24
~
57.0
.i? 58.6
42 , 00.6
31 61.2
28 ' 59.6
3s 61.1
48 ' 59.6
22 58.8
34 1 59.8
4 0
~
57.5
34
~
50.2
I,,*.
2.37
3. t'4
2.SY 1.50
3.23
2. go
0.72
0. 07
1.fJg
2.04
2. I 3
1.75 1 .M
1.71 1.s7
2.56
1.74 2.25
1.91
1.22
70. o
bS. 6 67.1
65. 0
G S . 4
70. o
04.9
62.5
6 4 . I
$3.5
05.4
5s. 5
64. d
61.5
0 2 .2
....
....
60.2
.... ....
......... 28 60.6
34 .....
31 57.8
20 57.4 27 02.7
33 63.3
25 SY.5 3' m.s .... 59.2
19 50.7
44 67.2
49 67.0
42 60.0
1.07 I Rloorriiii::c;rove'.. Si 2.33 I Blur Knot!.
0.51 Brookville t ........ '. ... ........ I 84 43 $7.9
37 ' 03.6
40 b5. 0 ............ 2.60
2.07
0.50 1.07
2.40
I.SO
1. j 1
1.75
1.20
1.41
3.01
0. 42
1.65
2.19
0. io
0.s2
1.48
2. I O
2.75 0.42
1.40
1.33 1.95 0.4s
1.00
a.40
1.19
2. 33
2.40
2.04
0.65
1.58
1.36
1.3tj
1.91
0.70
1.00
1.22
....
2.9s
I . 10
2.05
2.67
2. so
2. so
0. Sa
0.90
1.71
0.45 1.61
0.57 0. Yd
2.0s
1.ti3 0.7t'
1.25
3.53 0.?3
1.22
0.93
6.60
I . 17
1.05
1.4"
2.19
0. I O
0.77
1.10
?.SI
0. 30
0. I D
3.92
I.bO
2.51
2 . s2
2.9s
0.85
0. 59 I. IS
1.86
I. 27
0.39
.....
Brotvrrs Lock ... ..I ... .I ..........
9142 ............ /'02 1 ' 43
Irsville ........ 8s 1 37 12::; O l l (l )t ........ .....,...... .....
~n y I es t uwn ........
~
: : ... j. .... .I. ....
Eniporinm.. ...... .I 88 i 38
~
66.5
~.~~~n t s v l l l ~... ....... Contluence t .. ..... ...... ............. Dnvia IslRnd Daint.1 ..............
Du Bois f ............... , ...... L))'bel'ry 7. 87 1 34 ~'60:6 E a s t o n .. 66.8 Edinl,orouylr* ...... S6 , 40
~
65.4
E'raiikt'ord Arsenal.1 94 , 70.6 Fredrrick. ......................... Freeport t .. .... t.iirnrrlvitle ......... Grnmpian Hills.... Greensborough t... ..
......... ........... j 86 45
F'lcs oCNeshrrniiny.~. .... /. .;;. .;. ....
.........
......... Hulnwvllle ........ Huntingrlorit ....... Jolinstotmt ........ Kennett Square.. Kiliner*.'.. ...... L;iilcnster. .......... IJ:iniivtialr .... .... Lebnnon
.......
..... ... ... ........... ..I.. ... .'. .... hIcC'onnellaburgIi ../ 92 3y i 66.0 Rlrslioppen ........................ NewC':ratlet ........ 1'91 ! 36 I 69.8
Oil Cityt ........... , .... Uttsville .......... ,I.. .. Pnrker's 1,iintIingt .!.... Pliilndelphial I 1. ... I.. .. Pliilwlelplii:i(z).. .. Pliwnixville ....... i gi Pleas:rnt Mount.. ...... Point Pleassiit.. .. .I . ...
......... 66. Y
51 bS.4
J? ' 69.1
37 E.4
64.2
41 , $4.5
40 Q .7
43 68.4 ..........
41 ' 65.5 J4 Ob.2
44 ......... 4s 72.2
40 4.0
42 60.4
35 63.1
50 W.5
..........
..... .......... !..... ..... 1 ..... ..... I ..... 49 171.6 42 1 43.4 .....I 01.8
65.9
,
..... 2.7n
73.4 71.9 I O .5 5
..... 10.s3
.......... 46 07.3
42 67.S
&$ 65.2
.......... ..........
j?
~
67.3
41 I p j .9
4 2 167.9
..........
38
~
00.0
40 M.9
..........
..........
69.0
~
1.4c
...... 1.Sq
61.7 I d.0C .......... 47 , 70.1 44 63.1
..... Ih5.8
......... ....... Rc;irlinpt..
Pot t s tow n Qu;rkertnwn 89
S\v:lr~l,l,,ore. ...... .: 91
'Troy 1.. 90 L1 n i on to wn .........
~
s:, Wnrrent ............... Wellsborough .... .' S6
weat c~:llester ...... 190 West Newtont .... ... \Vilkrs B a r r e t ..
w YSOX ........ .:::i 91 97
Rhudc lxlaiid. 1 92
Hristol ............. E2
Fort .id;rnls. ....... I i i n o s t o n (1 ). ... ...I :i I<in&on (2 ) .......
~
82
Lont;ixle .......... , .... 0 1 neyvi Ile ......... 88 Pnwtucket
Providence (2 ) .....I 92
............
YCrk ...............
.......... .....I .....
44 I 64.6
..... I.....
......
..... I .....
.......... 33 j 62.2
40 63.3 40 1 b5.4
.......... 47 169.7
:: 1 2:: 35 43
40 34
41
23
40
33
34 30 35 43
34 30 38
29
39 34
22
5s. I
59. I
59.3 55. 7 53.0
4S.S
60.8
59.2
57. 4
55.4
5s.o 01.7
5s.5
59.0
50.4 60. 2
60. E
k3.9
....
..... 59.0 b9.2
68.3 64. I
69.0
66.4 66.0
65.4 64.4
.....
..... 68.0
66. I ....
66.5
....
32
46
44 37
40
....
2; 45 48
51
48
47
....
....
;SEPTEMBER. 1891 .
Cornwul 1 ............... Enoqhur h Falls t . H a r k w f t .......... J acksonvi I I e .......
MONTHLY WEATHER REVIEW .
45
54
sg
229
Soulh Carolina . Aiken .............. Allenrlnlet ......... Batesburgh t ....... Belniont .......... Blackvillet ........ Branchville t ....... Brewer Mine ....... Caniden t ............... Gheraw(1)t ........ Cheraw(a)t ............ .Chestert ........... Eftingheui t ............. Florencet .......... Greenville t ........ Greenwood t ....... Hardeevi I I e t ....... Jack.uonborough t .. Kin s t r e e t ......... Kit%inb *s M i l l s t ... Nichols r ............... Port Koya1.t ....... . &int Geor e s t .....
Sinipsonvllle ...... Bocivly Hill t ......
Yktesburght ....... Trial ............... Wateree t ..............
Yorkville .......... &ulk Dnkola .
Saint Mattfewst ...
%partuiiburg( 2) t ...
Winnsborought ....
.. ~-
Neteorologfcal record of voluntary obsmer8, &c.-Continued.
92
9' 92 88
90 S9 go
go
go
91 Sg
92 SS
go ' 9 5 92
SS
59 Sg 91 85
92 86
91
89 go
.
Meteorological record of cohinlary obseruers. &e.-Continued.
l!l:irksvill~ t ........... Unle Enterprise t . . t l n n v i l l e t ..............
.
E'
2 a
In6 . 2. 28
1.55
0. a7
3.31 0.66
1.07
0.68
1.85
1.37 0.58 1.48
1.93
1.04
0.91
0.33 0.18
0.72
1.60
1.42
0.38 0.76
1.82
1.78
2. 60
1.41
0.27 1.29
1.52
1 . 18
0.75 1.31
2. 40
2.91
0.64
1.73 1 . 05
1.13
1.25
2.08
1.44
0.48 0.58
1.37
4
.
0.21
1.96
1 . 10
1.00
1.70
2.49
0.42
0.92
1.74
0 .go
1.so
0.61
1.76
1 .q
0.61
2.32
2.53 2.80
4 .IO
1.44
3 .9
1.48
1.00
2. I 1
5.81
2.3s
5.14
7.69
-
90
Temperature . I (Fahrenheit . )
O*llkosht .......... Pepin .............. Pes ht igo ........... Phillips t .......... Plovert ............ Portnge ( 1 ) t ........... Prairie du Chien ... Rhinelander ....... Phawano ........... Shell Lake ......... S y r t a t ............ \ I roqunt ........... Wntrrtown ........ Wnu lies hx t ............ Westfield t ......... Wt?aton*t .......... Wliit.elinll t ........ Illyonring . Cnrnp P J o t B u t t e .. Evana ton
Fort D . A . Rusuell . Fort Fettermsnt ... Fort Mcliinnpy .... F o r t Wsshukie .... Fort Yellowatone .. 1, snder ............ Lnraniie ( I )t ....... Larumie(2) ........ L w k t .............. swntoga t .......... Shrriilnn ............... Snnilnnre .......... \vheatlallll. t ........
Gu.*hniiEE. ....... Leon ale Aldeinas .. Mamtlnn ........... h l ex i co ............ Puel #Io .............
..........
:- -mrrco .
.1 1 q1vlol~nmpo ......
- . e
?
G
.. u
~
Ins .
1.90 1.39 0.68
2.30
1.39
0.54
2.65
5.25
1.30
3 . 50
2.37 1.49 3.27
2.55 1.03
3 . IO
5.25
4.93 0.30
4.62
1.95
1.37 5.03
2 . 05
0 . 32
5.69
0.37 0.89
2 .0 6
2.39
5.40
1.37 2.14
4.40 2.30
1.35
4.04 0.71
3 .w 3 .I O
2 . 1s
2.21
0.00
....
1.21
'r .
1 .M )
4.39
5.?1
3.55
2 . 45
2.55
2.54
3.03 5 . 10
0.58
I . 90
2 . "5
2.97 3.55
0 .go
1.79 2 . 17
3.42 3 . 10
3 .I S
1.69
1.?4
0.60
2 .2 s
2.42
G . 20
0 . t 7
I . 20
'.pS
1.27
1.46
I . I 5 0.71
2 .Or;
1.53
3.59
1 .4 4
0 .0 2
v0 -.4 1
2.44
2.7s
2.7?
o . 70
0.81
1.60
1.85
2 . Ll
1.07
0.70
I . 29
2.44 2.14
2 . I b
2 .I O
....
I 91 94
go 91
&
97 88
g i
92 91 94 91
gz
98
8g
92 88
too
S7
85
79 87 78 77
9s
S7 88
65
84
go
74 76
p3
Temperature . ( Fahrenheit . )
Brookingwt ........ Cnstlewood t ...... Clsrkt .............. Cross' ............. De Smct t .............. Elkton ............
d e
E
.. U
a
~
lt16 . 2.25
z . 98
2.34
I . 47
2 .I.$
1.60
0.83
....
I . 16
I . 54
1.40
2.05
2.40
1.34 1.43
1.03
2.15
3.20
1.50
2.13
1.25
1.59 2.73 2.32
3.40 1.77
I . 12
0.9s
2.02
s . 52
3 . og 0.23
0.75 4.24
4 .So
0.06 0.14 1.78 o . 15
$ . 03
2.78
4.15
2 . 6s
0.39 0.33
2.25
1.27 1.46
1.63
0.38 0.48
3.20
1.32
5.4s
....
....
1.02
.... 4.07 I . 63
0.30 ....
$ 100
ss
92
Teinperuture . I (Fahrenheit.)
Johneonville t ......... Kingnton( I 1 t .......... Kingston Springs+ . Lewisburgli'. .....
Temperature . ' I (Fahrenheit.) 1 -:
go Sa
Stations . . C
3
0
64.0
61 .2
63.0
71.4 65.0
65.6
bo . 0
65 . 0
05.2
67.6 60.4 b4.2
66.0
68.0
67.2 63.8 65.2 67.0
.....
69.4
.....
64.9 6 4 4
62.0
65 .2
62.2
67.8
64.8 65.1
67 .a
66 . z 62 .2
61.2 61.2
....
.... 2: 3 62.6
63.9 64.8 66.4
66.0
67.3
60.4
65.7
55.8
54.9
54.5 64 . 2
b3.2
52.2
58.6
f.4.0
55.2 58.8
56.6
53.0
59.7 55 . 1
65 .I
67.7 83.7 61.8 63 . 1
87.2
Yo . 6
57.6
77.2
....
....
-
Stntions .
Tenaesnee-Con'd . Rugby ............ 86 Savaniinh * ......... i
02
0 0
53 66.6
52 72.5
54 71.3
52 71.4
0
49
59 60 60
60 58
$ .... 55
52
5s
52
58 62
56 57
64
69
58
5f 50
50 61
56
62
58
....
....
....
01
....
281
30
31
24 24
33
32
a8
27
33
29 35 37
32
40 28
34 28
31 34
'4 28
34 27
34
2s
39 35 28
39
57 44 53
so
52
43
48
53
....
36
.... ....
.... ....
49
48
49 56 55
:a 5'
50
47 ....
.... .... $3
04
52
53
48
58 60
54
....
2: ...
56
0
65.8
70.7 75.4 74.6 72 . 2
74.3
73.8 73.3
72.2
73.0
74.8 70.6
74.0 75 . B
74.3 74.8 76 . 8
74 . .f
74.0 74.4 72.0
72.9 73.2 72.0
75.6
75.6
.....
.....
.....
.....
.....
73.4
59.2' bS . 5 63.2 65 .I
63.5
64.3 64.2
65.7 70.3 b5.4 69 . o 64.i 6s . 4
@S . 3
E: T
IRP . 3.13
0.83
1.61
2.61
2.40
5.54 1.72
2 .0 0
3.26
1.21
1.31
2.05
I.SO
2.0s
0.49
3.72 3.53 1.33 1.50
1.53
1.91
2.9s
4.2s
1.77
3.42
3.47
3.3' 1.84
1.68
1.56
0.43
2 . 04
0.48
1.26
1.57 1.49 0.50
0.35
1.20
J: 2
1.11
1.66
I . 02
1.24
0 . s7
0.30
1.37
0 1 0
.I . .~~. . ~.6;:i
35 i 60.6
i 33 1 59.4 42 63.6
1 42 63.1
j 6 ' 63 .I
~
40 65.1
!
~
4s . 69.7 44 . 66.6
57
~
71.9
~
59 72.2
............
............ ............ 42
~
67.6
............ . 59 . 72.4 47 69.7 44 68.2
42 65.6
54 70.0 43 71.3 47 ' 71.6
47 75.3
44 69.7
46
39
. 32
.i 7
31
43 43 44
46
29
3s
58
~
75.4
......
38
......
~
40
40
! :; 56.i
~
26 i 57.6 !I
, 49 66.4
............. ........ 1 ......
~
46
~
68.0
.............. .............. 44 63.7
3s
~
61.6 .............
.............
c C
C
c 1 I I I F I I
1 I I
0
93
95 92 93 92 94 90
89 96 92 95 91 95
92
....
....
0
32
35 27
51
34
40
45
31
34 35 38 29
33 36 43 39
38
35 30
29
29
33
30
35
31
40
37
29
39 29
....
...
...
....
58
2;
;i
....
33
40
37
33
19
30
....
%
22
33 32
24
31
31
30 27
29
25
34 30
50
50
74
49
50 49 75
41
70
....
__
WL~coi~sin-Con t '11 . .entrnlin ........... :hippewn F s l l s t ... ;
:0111111 bus ......... :randon t .......... )odgerille t ........ Eau Claire( I ) ...... Ellaworlli .......... Embarrass* t ...... Florence t .......... ~o n d du Lac ...... Inniniowl t ........ larvey t ........... / Ingwnrdt .......... Iillsborou Ir ...... Ioriry Iudson Cree$* ......
~
.............
............. Sprin dale+ ........ 92
Yhnrp
s t r a w t e r r y .. Plains t 1 renton ............ go
Union city* ........ / 97 Waynevhorough .. go
Arthur Cityt ....... 1. ...
93 Berlin ....... ......I 99
Terna . 1
Austin( I )t .......... 93 Austin ( 2 )* .........
Big Ypring .........I.. ..
Colorndu 13) ....... ! .... (lolumtiint ........ Corsicann (z )t ...... ! '9: 94 DurIinni ........... j ....
Fort Bliss ......... 1100
Lhllas ( 2 ) t .........
DuvnI ............. ! gS
Port . Brown ........ 94
Fort McIntosh .... $6
Fort Clark ......... 98
Fredericksburgh* ti 95 (iainesville t ....... 93
Gallinat! t .......... 100
Graham t ........... IOO
Grapevine t ........ 100
Hansfordt .......... H a r t l r y t ........... 97 Hayniond He.irnrt ............ Houston t .......... Huntvvillet ........ I 92
Llano t ............. I g6
1. ongview t ......... I 94
I. u l i n g t ............ 198 RIennrdville* t ..... y5
Mesquite t ......... 1 98 M i d I nnd ................ hionntnins ringst . i 95
New Brsunrelst .... ! 95 New Ulni ..........
~
95
0dr.asnt ............ j 9 9 ~
/ 92
Pnrist ' 96
Quan:th t ........... i 94
ILohy t ............. 98
I ~o n n d Rock t ...... / 9s
. malcrson ............. erra Blnnca(1) t .. !io2
e r r a Blanca(z) ... / .... lver Fallat ....... ; 98 Tyler? ............. fig
\ enus t
\\'ne0 12 ) t .........
lilrth .
Benvert , 9'
.Creek *. ...... ' 90 It? Gote t ....... I Rg
u t g 1 93 nile* ...........
~
52
Deseret t 90 Fort ljoudns Fort DuCT>esnY::::l r;rren River t ...... GronaeCreekt .... .i .... Iielton* ............ 94
1, nke Park .......... 90
Levan ..................
Fort Hancock ..... 1102
Or:ln,yt P a l l t r r ............ .
%in Antonio
~
96
~
97
\ve:rtlierfortit ..... 1;;
............... ..............
........
............
............
............
..........
. ........... 51 6S.6
57 73.2 48 0S.r
........... 65 80.8
5s ' 77.4
54 ! 79.0
4s 75.1 60 , 76 . 1
56
~
75.6
51 7?.4
...........
03 . 7h.2
;:
~
;;;; ............ 45?1~' 6g.on
61 179.2
........... 58 176. S
52 76.2
5b 1 79.2
........... ~- ...... 65 . S
56 . S
57.4 62.7 60.7
55.8
57.2 57.5 65.9 bo 8
55.3 b3 . S
60
50
60
42
64
50
52
51
47
52
40
45
S4
01
.....
;$ 50
50
54
53
51
47
53
s2
679
40
.....
.....
s1.5
77.9 75.7 so . u
72.0 80.4
74.7 7b.o
76.7 76 . o
70.4 h7.4 63.3
76.4 76.7 77.0 Yo . 0
76.8
79.2 74.5 7b . s
75.6 77.8 77.4 81.5'
....
....
74.0
7s . I .....
57.4 9 .4
00 . d
b1.i O.h7
06.7 1.17 66.5 0.50
66.4 0.1%
63.1 0.7s
60.9 1.95 63.5 I 2.32
b2.5 1.20
67 . I
66 . S
b6.0
63 . 4 6% 4
0.3s
0; 2 5
r .. 0.71
0.26
4 .1 1
0.23
0.35
0.90
0 . R7
0.62
I . I 2
3 .OS
1.24
2.92
2 . og
0.61
0.91
o . 90
0.686
0.32
0.65
0 . 3s
2 .2 2
0.25
1.0.;
0.72
0.25
1.71
1.01
1.00
0.10
0.70
52
52 . 76.6
50 ' 7Y.S
57 75.4
5' 74.8
44 74.8
50 73.8 47 77.6
52 77.3
54 7b.4
30 60.9 30 64.1
3s 65.3
39 t,6.4
37 60.9
52 i 6 .0
...........
............
;; 2;;;
32 61.1
40 70.6
Kowlenhurgh ( I )...I... ...............
Westnnt ......... 1 ................. W h e e l i n g (r )t ....................... \Vheeling(2, +t ..... 91 . 51 72.0 White Hulp'rSp'gst ..................
n n l l e r y .......... sa . 42
~
6ti.4
I l ' i .~c u i ~i n . .
70 . o 47.6 66.6
75.2 71.5 70.2
71.5 GS . 4
72.8
73.2
...... ...... 71.3 ...... ...... 72.0
73.6
72.7 71.0 71.6 69.2
72.4
75.7 72.4 70.4 69 . o
'1 111 hers t ............ 0 I 31 153.2 1.37
39 . 66.0 10.71
34 65.8 , 0.53
40 . 04.7 , 2.8t
jo 60.2 0.29
js 67.0
~
1.05
29 59.5 1.46
2s ....... I . 73
22 th.s ' 1.71
A p p l .t o n (l )t ...... 15s
n;trnbon t I94 ntrrrot1 t ............ I 90 ...........
Bnytieltl ............ I 91
Hrnver Dnin ........ ! G I Berlin ............. 195
RlnckRivrrFaIIs .. 95 ntlttrrt1ut.t ........ 1 o~ ~ ~
._ 64.3 .
0 .0 2 ' 8 "
I ':idiz .........................
-~ ...... .... _.
Ket.eicet1 too late io be irsztl i i h yeiiercrl tEi.wrcssi~~t~ jbr September. 1891 .
~
.. -
........... 39 . 05.4 36 I h3.2
..... 1 5 Y .S
33 63.6
31 57.9
43 "5.5
34 ' 60.7
..... 53.6 34
~
64.9
1 1 Alilbrrmn . . ~'liiI<lvrstwrgli ..........
Ar'imnn . 1 Antel0 1 f. V.rlley ........ Im.h,ir\ ...... ......I.. .. Pror1:1 ............. Rnascllville
'rwIllp* ............
60 71.8 0.68
42 69.S 1.85
50 b7.2 1 2.92
I /
l...g.ul .............. 1 90
Loaeet .............
hIonnt Carmel*t ... ! sg
(:)-den ( I ) * .........
~
S6
G r k (J i t y t .........
Proinontor{. ...... 1.90 35 61.7 Provo City .............. 55.7
S t i n t t.rorgest ..... scofiel<lki ..........
Soldier Suniniitt
SOCktOn t
Hnowvillr t
Terrace' ...........
Mu.dlt .............. I 3
Pnrownn t .......... 1.9; 34 00.4
Rlclrfiel8lt .......... 95
~
32 66.5
........
32 59.1 1.37
45 04.4 1.16
41 1 63.6 0.70
c'nl tj5rnin .
'~:;tlll Q" ............. 90
Jolon .................. Plitcvrville (2 ) ...... 1 93
I 94 Yrt.k.1
I 94
Lawrence 90
..............
I l l i n n i s . i
h.nnsm . :
......... L4Jlli!4Ville
..........
.3 In ryl ufid . (:unitirrlnnd (T) ....
~
90
...... 70.0 0.40
73.8 '0.38 ............ 1 0.00 Eugene ................ ..... I ...... 1 ' ~n p p y Valley ....... 92
&n, (h Cnroli,ln .
~
22 ~
55.' 0.52 , . Tillers Ferry ..........
T .
33 ! 63.4.
~
0.37 !!
...... ' ...... 1.56 26 1 56.6 1 0.74
I I ...... 1.30 70.5 0.90
70.2 0 .7 ~ ......I ...... ' 4.22
72.4 10.27 69.4 ..... 70.8 1 1.30
67.6 .....
70.0 0.61
Ternr . ............... 1 1 Kent
............ ....
~ ~~
70.0 0.97 Brnttlehorongh(i).i 85 i 39 163.2
...... ; 0.95 Burlingtont ........ / 8s 43 53.8
. ............ 67.8 , 1.02 Chelsen 75 40 54.5
230 MONTHLY WEATHEE BEVIEW-. SEPTEMBER, 1591.
-. _-____ -
A: 2 1 0.00 I
O'O0 '
1
North Cnrdinn.
South Carolinn.
Washington ......
Tillers Ferry .....
Benumont ......... Cisco.. Qlen Ellen ......... Newark ............ Ontario ............
Worado.
Beaver Creek .......... Brandon ............... Chivington.. ...........
Go d Hill .............. Qranada.. .............. Minneapolis ...........
............
c o p e ...................
wrsy ..................
Flmida. . Eomeland .........
100
90 I&
100
r q
95
6 .q
o.71
o.05
5.71 4.79
.__
L e t t e r s of t h e alphabet denote t h e number of days missing from t h e record, thus:
4Extremea of temperature from observed readings.
the l e t t e r c indicates t h r e e days missing, etc., etc.
' t Weather Bureau instruments.
Dakota" instead of "South Dakota."
Corrcctiona: July, 1891, page 176, under "Reports received too late," etc., read "North
..
Quehec, Qur .......... ...I ZGij nionLrenl q u e . .......... 29. 8g Rocklitbe' Clnt ........... 1 29.60
l i i o g *t o n ' .~n t . .......... , 29.~0 Toronto Ont ............ 29.74 WIiitr $iver.(>ut ........ 25.70
Pnrt St.;rnley,Ont.. ..... .: 29.50 Saugeen Ont ............ 29.41 Psrry So'und,Ont ......... 29.4: Port Arthur,Ont ......... 29.20
Winnipeg, Jlnu 29.9 nfinne0ios.t nlan ........ ./ 2s.11 Qu' Appeli:, Assiniboin..
~
27.68 Medicine Hat, Assinihoia 27.57 Swift Current, Assiiiiboia ....... (.dgnry, Alberta.. ...... .( 26.3s
~~~~~~~~~~~~k .~t .~' ~:~~..~~:~~
Port R.l(~olly, B.C ............... St. Albnns, Man .......... .... 26.72 Ed nion ton A I bel ta..
Battleford kaskatchewnn, 28. IO
Grindston:. Gulf Yt. L..' 2g.q Hamilton, Bermuda.. .. .I 29.68
..........
I stony >fountain, n h ..........
27.54
--__
5.95 I Mexico ...........
Received too late .for piibliccclio,i i,n Aug(ist, 1891. I ~atcl.fronr Cullailitrn stutivlla.fiir the moirth of September. 1891.
Pressure. l'emperature. Precipitation. E
.- - 0
2 . 5;
tC'S
E
=- Z O
a > .-
&
~
W.
0w.
W.
0w.
nw.
SW.
SW.
W.
W.
W.
SW.
0.
W.
0.
Be.
....-
s w .
nu.
nw.
ne.
n. e.
8 . '
s w.
W.
a.
.....
se. n.
W.
nw. nw.
.....
sw.
ne.
-
Stations. '-
I = i d - 9
a ..
0
....
71.2
71.6
66. I
80. I
....
66.7
.....
71.8
83. I
63.5
-
Stations.
7-11 -- --
-
d
E .-
-
0
50
.... .... 69 65
64 41
54
57 60
.... .... .... .... .... .... .... ....
74
d
E .-
-~
5 Q_:
t!? S E
t o e a
B
c
__
Inches.
........ + 0.48 ........ - 0.50
$ ::;2 + 0.05
2.23 1.47
+ O.9b - 1.15
- 2.20
- 1.64
- 1.65
- 1.06
- 0.62
- 0.79
- 1.97
- 0.23
+ 0.20
- 0.14
- 0.31
- 0.15
.......
....... ....... .......
2 :..: + 5.25
- 0.27
....... ....... ....... .......
5 E
I
I o
......
Alaska.
Coal Harbor.. 70
drizonn.
Chiricahua M t s ........ Lochiel ................ Peoria ............. 108
Willcox ........... 102
0
...
94
9 9 1
93
97
...
104
....
103
2
1738. j
5.40
i
Georgia.
Quitman( I ). ......
0
....
50
44s
40
61
....
25
....
45
76 50
c
c:
f --
0
53. 3
57. 8
59. 8 59.0 57.5 57.8 59.4
57.2 52.8
57.0
55.6 91.4
53.4 61.0
bo. 3
59. I
55.7
54.4 51.6
51.2
56.4
50.8
49.3
51. I
56.4
49.6
56.4 76.8
......
01.2
01.2
......
2: ;
53.2
Bidiintia.
Richniond ........ Inches.
............. 1 30.w
29.91 ...... 30.01
30. al .. , 30.03
30.01
2.47 1
' Saint Johns, N. F... .... ., ?g.S7
....... .............
1.93 ~hnl'~Ottt.toJWll, P. E.1 ...~ Chnthnni, N.B.. ......... ~0 .0 2
Fntller Point, Que ..... ..i 20.97
birhea. hChe8.
30.01 ....... 30.06 + .04
30.10 + .os
30.~0 ....... 30.12 + .os
30. aq
30.05
30.04
..............
h i l t l s f l S .
Tribune.. .........
Ninnexota.
Rolllng i:rren ....
- 1.6 2.90
+ 1.8 3.72
+ 2.0 5.55
........ l 5 .q
............... + 3.3
~
3.05 ........ 2.15
........ 2.07
+ 4 .2
~
4.19
2.52
........ ........
~
2.03
+ 3.6
~
2.73
+ 3.: , 2.30
+ 5. , 3.24
+ 1.9 : 1.14
f 1.3 ' 0.77
- 0.4 4.27
+ 5.6 1.69
+ 0.1 1 8.59
+ 5.3 1.23
........
~
0.43
........ 1 5.71
........ 1 8 .9 1 I
..............
........ i 0.56
........ 1 1 .2 6
..... 89.4
s4.1
78.3 60.2
74.9 66.7 81.5
.... .... ..... ..... ..... ..... ..... .....
82. o
...... ......
$ :::
$2 - .OI
+ .07
+ .04
+ .oS
+ .& ......
. 01
.OI
- - .03
- .04
-
...... . 01 -
jo.00
30. co
30. Og
30.05 30.11 30.12
30.03
30.13 30. 1 1
30. Og
29.95 29.91 29.89 zq.91
29.64
29.w
29.98 29.84
29.86 29.61
30. M
.......
29.91
29.87
......
......
- .os
- .06
.oo
+ .OI
...... ...... ...... ......
SEPTEMBER, 1891. XONTHLY WEATHER REVIEW. 231
Table of miecellancous meteorological data for September, 1891- Weather Bureau okematim.
-~
Pressure, in 1 Temperature of the uir, in degrees inches. Fahrenheit.
2i ,"
Districts and uta- $$ ,* tions. -0
.- u- 3; .G
-
8m England. Eaotport .......... 53 15
Green Mountain.. .......... Portland .......... gg Munchester zf ....... 147 . I t . Killington ............. I t . Wnshington ... 6,279 21
Nurthtield.. ....... Boston ............ Nantucket ........ 14 5
Wood3 Hall....... 22 14 Vineyard Kaven.. ....... 5
Block lslund ...... 27
.. Nnrragnnsett Pier., 22 IC
New Kuven ........ rq rg New London ...... 47 21
wd. Allaniu Slnlcs.
185 21
Barrishurg ......... 377 4 Philudelphia ....... 117 21
AtlnnticCity ....... 53 18
New Hrunswick ............ Baltimore ........ 179 21
Washin-ton. D. C . I I Z 11
Lynchburgh ...... 685 21
Norfolk ........... 43 21
E. Atlantic states. 1 Charlotte... ....... I Batteras .......... 1 7?: Kitty Huwk ....... g 16
Raleigh .... .......I 393 5 Bouthport ......... 1 34 16
Charleston ........ Columhiu
Albnn ...... ......, 85 IS Newjork, N. Y ...
Cape Hznrlry ............. 18
Wilinington ....... 78 21
........... 209 20
87 11
...... 43 20
Roridn PeniRx1da.
Jupiter ...... Key West Micco ........... ........ l'nmpa ............ 36 ... Titusrille ......... 1 44 5
%tern ffdfAqtatm. ' Atlunta ........... 1 .. 131 13 Pensncolu ......... 50 12
Auhnrn IO
Mobile.. .......... Montgomery ...... 217 20
Meridinn .......... 358 ... Vicksbnrg. ....... University 5
HewOrleans ...... Port Elids
Shreveport ........ 2491 21
Fort Smith.. ...... 1 4921 IO
Little Rock, ....... 1 309 13
CorpiisChristi .... 1 201 5 Gdveston ......... 1 441 21
Palestine .......... 511 IO
Sun Antonio ....... , 705 13
Brownsrille ....... 57 16 Rio Grnnde City .../ 171 14
Uhattmnogu I3
Rnoxrille ......... 9'30 21
Meniphis .......... 1 330 21
Nushvi 11 e 553 21
1,exingtnn.. ...... .I .. .... 7 Louisville ......... 20
Indinnupolis ...... i 700 21
Cineinnuti ........
Pittshiirq ......... 847 21
Parker.shnr,gh ..... 1 638 4
Loiaer Lnke Reginn.
~
BofEilo ............ oyo 21
Osweno ............ ' 335 21
Rochester ......... 1 523 20
Erie. .............. Clevelund ......... Snndnsky 1 :st i? .... ....., bzg 15
Toledo ............
~
674 21
Detroit ............ 724 21
Upper. Lake Region.
~
Alpenn ............ 609 20
Escunnhu.. ...... ..I.. .... 21
Grnnd Haven. .... 1 628; Z I
Mnnistee .......... 615 4 Murqiiette ......... I 734 21
Snult de Ste.Marie.1 642 4 Chicago ........... 824 ZI
Milwirikee ........ 1 673 21
Qreen Bay ......... 617 6
Rin Qmnde Vnlley.
Ohio Val. & Tenn.
....... ' 7'33
.........
' 55!
.........
........ Port Eiiron 639 18
81
28 nw.
~
.;;. .;;.. 20 w.
....
~
.....
:; I ",.
99 ow.
48 ne. 41 1 n.
s e .
22 ' sw.
.........
.?.I .....
~ ~~~
I
44 24 52; 23
.............
20 30 391 17
54 15 60 17 54 * 60 16
5? 9 61 23
36 ' 5 49l 33
50 g bo! 20
5b 9 61 20
I 64.8+ 1.1)
58.44- 3.2 7f
62.8'+ 5.1 85
04.5 ...... 8F
44.0 ! ...... 51 bo.6 ..... 8:
66.714 4.6 gc 65.4 ...... 7;
05.8 ...... 8(
07.9 ...... 8(
...............
...............
......
......
51 I 8:
.......... 56 i 8:
55 ' 7;
.....
......
...
...... ...... 1 se.
4,008! nw. 3,012 8 .
...... ne.
1,948 se. 4,195 ne.
.....
......
...
...... ...... 1 se.
4,008! nw. 3,012 8 .
...... ne.
1,948 se. 4,195 ne.
ag.88 30.14 ......
23.95 30.12 ...... 29.21 30.13 ...... 30.01 30.15f .&
.................
30.14 30. I5 ...... ................. ................. 30.13 30. I D + .Os
30.02 .....I ..... : ......I 30.13f :o+
30.09 30.14 00;
.....
.. ...'..... 39 ! 8: 3 :; 8.
5s I 7'
59
~
8:
....................... 8 17 6.9/4&6' 188135.2
Ib 7 5.4bo.6 199151.6 6 6 3.d66.7 189159.3
g 4 3.6165.4 is91 60.5 8 7 4.765.8 189160.0
4 9....'67.g 189161.1
I2 6 4.7~Ob.81 188160.8
10
141
..... 1 .....
59
~
8;
b2 Sc
8 .
se. n.
n r .
w.
11.
8W. .....
nw.
e . nw.
ne. n. ne. lie. s e . ne. ne.
ne. ne.
ne. ne.
.....
.....
W.
23
30 28
24 16
28
24 IS
I4
18
42
44
24
29 24
36
...
I ..
21
,..
25 26
18 76
18 77
79 26 so
18 75
26 79
1s 79 I8 so
5 79 I9 92
191 61
59 7c
61 77 63 %
....
2 .... 62
62 68
65
65
65 70 b6
70
66
69 70
75 74
72
73
....
....
51
69
.... 69
64
69 72
65 61 62
72 71 62
62
2
....
72
07
62
60
63
58
$ 5 t
5Y
55
59 59
55
55 56
57 57 50
50
55
55
54
54
53 55
51
55
...
.... 81
R!
sc 81
77 81
77 82
se
83 96
8a
86
8j
9s
77
86
....
....
....
85
73 SO
S3
71 74 74
82
so
....
....
7s 71
73 so
77 71 46
$7 72
79 75
74 io 68
63
C*4
74 66
;:
72
75 74 74 07
70 72
54
7? 70 75
66
70 70
76
....
51
..I 91 13' SI ... ... I ..... I .... I ..... 5.46+ 1.0' 5
3.12 - 0.91 5
3.131- 1.71 c
1.69-2.2, g
3,3691 ne. 7 3 2 0 ~' n.
8,734; ne. 1,927; ne.
5,450' ne.
4,1271 ne. I ne.
4,3951 1 1 ~
S ,R ~S / ne.
6,9591 ne.
5,251' e.
5,810' ne.
...... I e.
s,449! n.
.,OSZ/ ne.
3, IPS: e . 3,909; 11.
5,6731 ne.
I
....... 11.
... ..., ne.
29.35 30 I T + .06
30. 3c: .og 30.12 30.13 ...... 19.75 30.1b ...... 30.08 30.11 ...... 30.06 30.14
30.41 30.12f :z
19.94 30.161+ .& 3O.W 30 13I-k .07
30.051 3O.10(+ .q
................
0.76'- 2.7i 5 4.04'- 2.11 10 I881 70.9 1881 70. o
1881 70. I
1881 7a.6 1891 71.6
1881/71.6 1881176. I
I%I 73.0
I
6.06' 0.01 11
4.94' 6
...... ..... 20
...... 4.05:- 1 .1 ' I 2
u.3;! .....I 3
3.43' 1 .5 i r z
4.35~-0:0i 5
2.15'- 1.0 s
0.35'- 3.71 4
0.85' ...... 1 4
4.0Ily .... 1 6
3.04 1 2
0.87'- 2.3; 6
0.57- 2.61 I .
4.05 ...... 7.01- 0.11 12
1.53- 1.9' 6
5.251- 0.6
3 .h - 0 .6 ~ I1
IJ.59- 2.8 1
1.25'- 2.7' 4
1.261 ...... 4
1.99:-1.0 6
0.74'- 2 .2 , 4
2.651+ 0.3' 7
1.05'-1.81 6
1.90- 0.7 7
,l:i+l.i:i 6
1.79-1.68 g
1.41- 1.0 s 2.s~- 1.3' 11
1.1'1- 2:o' 6
1.2s-1.61 7
2.01'- I 8' 5
.... 79.0 ......
................. 30.04' 30.0~1+ .os
29.57 30. IO^+ .05
29.74 30.12
2 9 .~0 ' 30.05(+':0;
30.02 30.03 + . 30.06~. ..... ~. .....
29.82 30 07'+ .o;,
29.75, 30. IO'+ .04
30.011 30.05'+ .os
29.52 SO.&'+ .01
29,321 30.0S1+ .u4
.................
29.60! 30: IO1+ .os'
30.001 30.021.. ....
' I
.......
19.44 30.101+ .og
........... I ...... I
29.44 30.10)+ .07'
zg. 22 30. ool+ .OI
19.47 30.1h1+ . 12
zg. 37 30.0&. ..... 29.25 30.111+ .q/ z9.36 30. IO + .& ag.421 30.09.. .... I
29.44 30 .Oq'...... 1
........ e . e .
ne.
n.
98.
.....
W. uw. s e .
ne. ne.
se. nw.
e. ne. e . ne.
....
nw.
S.
11'2.
s e .
0.
I888 1882
1880
I880 I888 1878
I880
#
#
.....
.....
:%
::2
1889 1875
1879
72.3!+ 1.1 90 77,O'- 0.5 89
72.7 ...... 92 76.61- 0.3 gr
76.0f.o.5 94 73.61 ...... 93 70.6+ 0.9 94 74.7 ...... 97
79.1 ...... 88
76.0+ 0.6
77.9- 0.3 90
75.61- 0.8 91
73.5'+ 1.1 94
74.s1+ 1.1.93
7s.n 90
75."1+ 0.2 92
..... 7 s .L 0.4 87
7S.b~+ 1.9 96 80.21- 0.6,
1854 70.5
188468.8
1887 75.9 188476.9 188471.9
1877173.6
18s4'69.8
25 ne. IO nw.
26 IIW. -- 23 I W.
2 1 1 SW.
26 ' w.
26 1 s . 38 I sw.
1 8 , w.
1883
1883'
1883 1879 1871
;%
#
8.
w .
nw.
ow.
3W.
SW.
W.
8 .
W.
T.W.
sw.
W.
S W .
....
27 19
3:
36
35
40
42
41 36
40
;:
24 71
2 0 72
19 74
24 71
14 72
' 5 75
24 69 14 76 16 76
77 *
59.2 ...... 87
66.0 ......
45 41 531 35 55
401 51 55, 41 ' 53
!232 MONTELY WEATHER REVlEW. SEPTEXIBEB, 1891.
_____ __ __
Table of ~~~iucellancoua meteorological datu for September. 1891- Wetcthcr Biweau ob~e~atiorts-Coiltilrued.
451 4
44 30
51 4
52 30 60 30
59 31
04 27
62 33
3s 41 56
44 41 60
40 291 01
42
29 27
__-__ .-
Pressure, in 1 Temperature of t h e air, In degrees inches. , Falirenhei t. Iumidi ty mid precipitatior Wind.
~-
:s i
:L:
-+.: i- 1
go:
:z i
.I
:1' ir -7
-~
51
45
4:
42
....
....
53
53
5.2
55
55
5? 50
62
54 56
57
58
....
56
....
55
50
55
43
49 50
40
41 34
41
35
44
51
35
37
37 50
54
57
61
....
62
59 44
44 41
51
43
39 28
37 44
37
35
34 40
55
51
49
52
51
49
52
47 50
53
....
....
....
44
57 62
~
-c -
:. z a -in tL *C c ;
ts'& :3 3.501+ I . I 1:
0.87;- 0.3 2 .4 3 1 - o.I
0.6bI- 0 .2 a 1.08- 2.6 - ......
0.49- 3.2, 4 0.29- 2.3' I
1.38-2.1, 2
0.46 ...... 3
0.3b ...... 4
1.29 ...... 4
0.57 - 3.0 5
h :Y -1 .9 I - 1.8
1.w ......
0.40- 1.0
0.70 ...... 1 6 0.91 ......I
Districts and sta-
tions. -
m : a,( -5
s ;
35
54
41
40 36
... 37
29 27 34 34
24
25
28
45
36
20
22
25
24
26
4s
03 48
..
..
$
2 36 38 37
4s 3h
42
30
30
4.5
2s
35
38
46
36
30
3 35 49
42
33
3s 42
24
36 24
72
'9
49
...
12
... 22
21
35 32 33 29
26
24
...
20
~
~
d .- - v u
a .-
W.
s w He.
se. n.
.... nw ee.
nw
nw
w.
W.
I1 w
11.
U' . s w .
3.
8.
3.
S.
s.
8.
n.
....
....
nw
se.
se.
ne. w .
SW.
n\v,
nw.
3.
s w .
n.
n.
e .
R.
R.
8 .
11.
3.
S\P.
ne.
ne. nu'.
nw.
sw.
.... sw. s w . s w .
s.
IIW.
S W .
sw.
se.
.... sw.
SW.
e.
.... 3.
sw.
11.
11w.
W.
nw.
....
nw. nw.
9.
~
Up.Lnke Rq.-con.l OuluLh ............ 6561 21
gztro~rs N~thur.%l. Moorhead ......... 935 11
Saiiit Vincent ..... 804 12
Bismarck ......... 1.698 17
F o r t Buford. ...... 1.899 13
Oppm Miss. Vnucy. Minnenpolis ............... Red Win ......... 758 ...
La Crosse ......... 720 19 Daven o r t ......... 613 20
D e n d i n e s ....... 869 14 Dnbuque .......... 651 19
Keokuk ........... 613 21
1
Saint PA ......... 850 21
........ 359 21
....... 571 21
Columbia.. .................. Kansas City ....... I 563 4 Springfield, Mo.... 1,356 5
Leavenworth ..... 842 21
Topeka. ................. 5
Omaha ............ 1,113 21
Crete .................... 5
Valentine ......... 2,613 7 Sioux City ......... I, 158 ... P i e r r e .. .......... I, 470.. . Euron ............. 1,310 11
Yanktonc .......... 1,232 19
F o r t Assiniboine.. a,6go 12
Custer Stationt.. .. 2,733 ... Helena ............ 4,116 12
Rapidcity ........ 3,260 6
Cheyenne ......... 6 105 21
F o r t McKinneyt.. 5:m 4
North P l a t t e ...... 2,841 17 Lander ............ 5,377 ...
Denver ............ 5,287 20
Pueblo ............ 4,734 4
Concordia ......... 1,410 7
Dod e City ........ 2,523 17 Wicfita ........... 1,366 4
Oklahoma City .... I, 139. ..
W t h r r n Sloua.
Missouri Valley.
NMlhmn slopL%
m a i s slope.
3,827 nw.
6,790 nw,
6.931 nw.
5,400 nw.
6,685 se.
4.870 SL.
3.s77 9.
4,912 SW.
5,766 11.
3,383 JW.
3,712 nw.
$055 8.
0,107 sw.
3,816 sw.
5,812 *e.
4,233 se.
8,5701 8.
...... 9.
2,947 J.
4*2osl 3.
...... 3.
5,823 3.
...... 9.
8,405 3.
9 -d 3.
6,951, ye.
12, 127' se.
7,685 S.
7,856 sw. 4.376 e.
+900 SW.
61212 nw.
6,649 11.
7,052 se.
3.577 9.
0.375 SW.
4,738; sw.
t::q ;.w.
ro,433 9.
6,221 s.
5,514 *e .
..... ..... 1873- 1873 1879 1863.
'73
1-
1879
I879
............
29.46 30.11 29.77 30.15 + .IO
29.45 30.13-k e 0 7 29.54 30.14+ .Og
,.....I ............ 2 g .q 30.09 ...... 28.71 30.11 ...... 29.22 30.10,+ .06
28.91 30.081+ .05 ..................
............ j ...... 27.30 29.971 ...... 26. 80 JO. 021.. .... 28.37 29.901.. .... 28.50 29.94 .06
27.10 29.911.. .. ../ 25.61 29.96- .031
26.61 29.911 ......
25.69 29.98- .oo
27.13 29.921- .04
...
....
......
.iI 8
I2
10
10
IO
I1
I2
I2
9
...... 71.6 ......
68.0 ...... 68.4 ...... IOI
.... .... ..... .... .....
.....
......
0.87'- 0.7
0.73- 0.11 12
...... 5.43 ......
0.2$-1.1' 7
- 0.21 0
+.69i+ 3.31 13
1.24+ 0.6. 0.88 ...... 1 4
O.gl+
O .I J + 0.2 4
0.62 0 ' 5 ' I ......
1.45 ...... 6
0.10:- 0 .2
0.77!+ 0.6;
0.5,: ... ...' 2
0.07 0.0' 0.27 ...... o.oh 0.4 0.0s 0.0 2
..................
' I
...... 24.06 29.97 ...... ...... 66
26.22 29.92!- .05 3.6' 96
29.71 29.85+ .q 83.4- 0.8110 26.27 29.53 ......
23.41 30.oj'+ .Oj 2.1 82
.....
...... 56.8
......
...... I104
3.3 100
F o r t Sill ........... Abilene ............ FortStanton ...... ,Youthern Plntsnu.
F o r t Sill ........... A Fort Stanton 6,152 8 ,Youthern Plntsn;.'*l 1 El Pnso ........... Snntn FB ........... Yuma .............
4,5$5 se.
5, 1c.o se. 4 ,z s w.
6,a;rS s.
6,504 s w .
2,0+s nw. &boo se.
..........
4,072 8 .
~~
Keeler.. .......... Mise Platenu. I 3 ~~' ~'
Carson City ............. 1 4 Winnemucca ......
Montrose ..........
.... .....
I 28 91 31 IS 6.760.0
28 61 4 20 7.0160.6
12
7; 5 18 6.6155.6
z 6 6 IS 7.156.4
18 61 12 IO 5.515h.o
!91 81 14, 6 5.066.31
.. e8: me17 ......
.. 81 7 15 .... 65.4
........ Fort Cnnby 179! 9 Nenh Bnv ..... I .... .... I... .
1883 55.3
......... 1888.54.5
186851.0
188851.2
18d56.9 1686!55.7 16SSi3.7
Olymfi. .......... 36 15
Tatoosh Island .... 1 86 141 ,7 8
Port ngeles ......
2,4361 S .
1,6701 s .
8,735 e.
2,zgs 11.
..... sw.
3,542 3.
Astoria 7 Portland .......... 60 20
Roseburgh ........ Mi, &. Coast Reg.
Eureka ........... 64 5
Red Bluff. ........ 342 14 Sacramento ....... 64 15
San Francisco ..... 19 2 1
Point Reyes Light, ...... S P ~~.W R -. 1 .' ' '
Fresno ............ 338 5
Lo8 Angeles ....... 330 15 San Diego ......... 031 20
I
3,3041 nw. 5,4011 IIW.
5,0201 RW.
0,8351 W.
..... nw.
4,704 nw.
2,532 w. 3.3y w.
n c o i n p u t i n r r h n d 1 4 (r
1) tn be conuidrrrd in
t Rvernyes
dpartures. Letters of t h e alphabet deuote number,ofdays missing from therecord.
.C.
|
en
|
converted_docs
|
518845
|
\* \* \* \* \* \* \* \*
READ AND **REMOVE THIS PAGE** BEFORE PLACING
THE SPECIFICATION SECTION IN THE CONTRACT
\* \* \* \* \* \* \* \*
[DIVISION 12: FURNISHINGS]{.underline}
SECTION 12511 ‑ HORIZONTAL LOUVER BLINDS
USE: Furnishing and installing \"venetian\" blinds and operating
hardware at windows.
**NOTES TO SPECIFIER:**
A. Options within paragraphs are identified by enclosure in brackets;
blank spaces enclosed by brackets \[\_\_\_\_\_\] provide for information
to be inserted, as appropriate, to individual projects.
B. **TO AVOID CONFLICTING REQUIREMENTS AND COSTLY MISTAKES,** the
specifier must edit (delete, substitute or add to the text). The
remaining paragraphs must be renumbered.
C. DELETE FOR FINAL COPY: Notes to the Specifier, located between lines
of asterisks; all \[brackets\], [underlining]{.underline}, **boldface**,
and *italics*, within the paragraphs; and this page. (Open Reveal Codes
\[alt F3\] to do this accurately.)
D. [To Edit "(Footer B)":]{.underline} (Corel 8). **ENTIRE FOOTER SHOULD
BE BOLDED.** Click in the footer and delete the "Project Name (ftr B)"
text and replace it with the **Name of the Project (upper and lower
case)**. Replace date with current MM/YY (WITHOUT BRACKETS).
E. The Guide Specifications are intended to be continuously reviewed and
revised. User's technical comments are appreciated. Also, other related
or similar specification that are written "from scratch" that could
benefit others, or other questions can be sent to NSTC A/E Group, ST
110, or call (303) 987-6868.
**DRAWING DATA REQUIRED:**
**REQUIRED SPEC MODIFICATIONS:**
[GENERAL NOTES]{.underline}
A. Whenever entire articles, paragraphs or subparagraphs are not
applicable, the articles, paragraphs or subparagraphs should be deleted;
when necessary, reletter or renumber articles, paragraphs or
subparagraphs.
B. See sample Work Data Sheet format enclosed with this Outline Guide
for developing the sheet to be included in the Contract. Work data
Sheets should not include items shown in the Bid Schedule, except those
developed for Contracts involving more than one project. The Work Data
Sheet is placed in the Invitation for Bids immediately preceding the
drawings.
C. THIS GUIDE IS NOT INTENDED AS A SUBSTITUTE FOR READING THE ENTIRE
SECTION.
[TECHNICAL NOTES]{.underline}
A. 1.01B: Select or add applicable specification sections. Do not list
specification sections from Division 12.
B. 1.02A: Select applicable words.
C. 1.03A; Select applicable phrase.
D. 1.03B: Insert number of copies of manufacturer\'s descriptive
literature required. Normally 5 copies are required. Distribution after
review is normally 1 copy to the COR, 3 copies to the Contractor, and 1
copy to the project file.
E. 1.03C: Insert number of copies of the manufacturer\'s installation
instructions required. Normally 5 copies are required. Distribution
after review is normally 1 copy to the COR, 3 copies to the Contractor,
and 1 copy to the project file.
F. 1.03D: Insert number of copies of shop drawings required. Normally 5
copies are required. Distribution after review is normally 1 copy to the
COR, 3 copies to the Contractor, and 1 copy to the project file.
G. 1.03E: Insert number of samples required. Normally 2 samples are
required. Distribution after review is normally 1 sample to the COR, and
1 sample to the Contractor.
H. 1.04A: Insert number of years required.
I. 1.05A: Insert number of slats required.
J. 1.05B: Insert number of assemblies required.
K. 2.01J: Select applicable cord lock and tilter operation location.
L. 2.01M: Select applicable words.
M. 4.01 and 4.02: When a \"lump sum\" Contract is used, delete the title
PART 4: MEASUREMENT AND PAYMENT, and both articles from specification
section. Measurement and payment will be addressed in Part 4 of Section
01010.
**REVISIONS OF THIS SECTION:**
CSI format, editorial changes: 11/01
Metric:
Technical Update: 06/92
SECTION 12511
HORIZONTAL LOUVER BLINDS
[PART 1: GENERAL]{.underline}
1.1 SUMMARY:
A. Section Includes: Furnishing and installing horizontal venetian
blinds and operating hardware.
1.2 SYSTEM DESCRIPTION:
A. Performance Requirements: Horizontal metal slat louver blinds
installed at window openings, manual control of raising and lowering by
\[cord;\] \[blade angle adjustable by \[cord.\] \[control wand.\]
1.3 SUBMITTALS:
A. General: Submittals shall be according to \[Section 01009 - General
Information and Requirements.\] \[and\] \[Section 01300 - Submittals.\]
\[and\] \[SEction 01365 - Certificates of Conformance.\]
B. Manufacturer\'s Literature: Submit \[[ ]{.underline}\] copies of the
manufacturer\'s descriptive data for the horizontal louver blinds to be
used on this project.
C. Installation Instructions: Submit \[[ ]{.underline}\] copies of the
manufacturer\'s installation instructions for the horizontal louver
blinds.
D. Shop Drawings: Submit \[[ ]{.underline}\] copies of shop drawings for
the horizontal louver blinds to be used on this project. Shop drawings
shall indicate the following:
1\. ab Field‑measured dimensions of openings scheduled to receive
blinds.
2\. ab Illustrations of special accessory components not included in
manufacturer\'s product data.
3\. Details of head and sill conditions, corner conditions, and
conditions between adjacent blind units.
4\. A numbering plan for identification of each blind with the proper
installation location.
E. Samples: Submit \[[ ]{.underline}\] samples of each \[color\] \[and\]
\[pattern\] \[style\] of the slats to be used on this project. Samples
shall be 6 inches long. Samples shall be actual material in \[Colors
required\] \[the full range of colors required.\]
1.4 QUALITY ASSURANCE:
A. Manufacturer Qualifications: Company specializing in manufacturing
the products specified in this Section with \[[ ]{.underline}\] years
\[documented\] experience.
B. Failure Criteria: Not limited to the following:
1\. Cord breaking.
2\. Cord lock malfunction.
3\. Tilter malfunction.
4\. Mounting brackets loosening.
1.5 MAINTENANCE:
A. Extra Materials: Furnish \[[ ]{.underline}\] additional slats.
B. Furnish \[[ ]{.underline}\] additional complete blind assemblies \[of
each size\].
[PART 2: PRODUCTS]{.underline}
2.01 MATERIALS:
A. Steel Channel Headrail: \"U\" shaped 1 inch high and 1‑1/2 inches
deep channel, fabricated from .025 inch thick sheet steel with rolled
edges at top. Head channel shall have two metal end support braces, 3/4
inch in height with full‑length double ribs for added rigidity.
B. Head Channel Hardware: Metal hardware shall be electroplated with
lift cords and ladders guided by grommets in the head channel which
prevent discoloration. Operating hardware shall be mechanically locked
into head channel. Cord lock and tilter shall be machine riveted to
assure accurate alignment.
C. Enclosed Metal Bottom Rail: Completely enclosed tubular shape, .030
inch thick electro‑galvanized and bonderized steel with prime coat of
chromate epoxy primer and finish coat of polyester baked enamel. Bottom
rail shall be formed after coating with locking groove to receive dust
cover. Thermoplastic protective caps in bottom of rail shall be used to
secure ladder ends and assure window sill protection. Bottom rail
thermoplastic end caps shall have a projecting bottom flange for window
sill protection and hold‑down bracket pins shall be molded in place.
D. Slats: Aluminum 1 inch wide, .010 inch thick before coating. Slats
shall have a precoating treatment to bond polyester baked enamel finish
coating. Total coating thickness shall be 1 mil. After coating,
thickness shall be .011 inch.
E. Ladder Drum and Cradles: Blinds shall have a cradle and ladder drum
for each ladder.
1\. Cradle: .040 inch thick electroplated steel. Cradle shall support
tilting rod, provide a smooth bearing and center ladder drum over ladder
hole. Incorporated with cradle shall be a separate grommet guide lift
cord and ladder through bottom of headrail. Grommet shall have rounded
edges to prevent cord and ladder wear and discoloration.
2\. Ladder Drum: .031 inch thick electroplated steel with a smooth
rolled edge hole each side to attach braided ladders.
F. Low Friction Cord Lock: Cord lock shall have 9/16 inch diameter nylon
main roller in conjunction with a sliding bar‑type locking mechanism.
Locking mechanism shall be free of abrasive locking teeth and offer
minimum wear to cord. Locking mechanism shall be of crash‑proof type and
shall lock automatically upon release of cord.
G. Tilter: A tilter and gear case arrangement shall be used on the wand
tilter. Gear case shall be enclosed type with worm‑and‑gear
construction. Gear shall be factory lubricated, designed for smooth
operation and shall hold slats at any angle and prevent movement of
slats due to vibration.
1\. Wand Tilter: Operated by a length of transparent extruded plastic
rod with a multi‑sided cross section measuring approximately 3/8 inch
across points. Plastic wand shall hang vertically by its own weight and
shall be of a convenient length for easy operation. Plastic wand shall
be easily detachable. Tilter shall be securely riveted to headrail.
H. Braided Slat Supports: Blinds shall have braided ladder which will
assure proper control and adequate overlap of slats.
1\. Material: Polyester yarn. Vertical component shall be not less than
.045 inch diameter nor greater than .066 inch diameter, which will
provide maximum strength and flexibility with minimum stretch.
Horizontal component, or rungs, shall be not less than four threads and
shall be 1‑3/16 inch long. There shall be 15 rungs per foot equally
spaced for proper support.
2\. Metal Clip: Machine clinched to end of each braided ladder to lock
in holes of drum and removable metal clip wire shall join braided
ladders at bottom rail. Distance between end support and end of slats
shall not exceed 6 inches. Distance between braided ladders shall not
exceed 22 inches.
I. Lift Cord: Braided with polyester jackets and rayon center core.
Cords shall be detachable, if required, and shall be of sufficient
length to properly control the raising or lowering of the blind. Lift
shall be equipped with tassel.
J. Cord Lock and Tilter Operation Locations: The cord lock and tilter
operating location when viewed from within the room: shall be located
with the \[Tilter at left, cord lock at right (standard).\] \[Tilter at
right, cord lock at left.\] \[Tilter and cord lock at left.\] \[Tilter
and cord lock at right.\]
K. Installation Brackets: Conventional hinged brackets, .042 inch thick
electrogalvanized and bonderized steel with prime coat of epoxy primer
and finish coat of polyester baked enamel in color to match headrail.
Brackets shall be marked left and right to facilitate installation and
shall have 1‑1/4 inch extrawide top to accommodate power screw driver.
Brackets shall facilitate easy removal of head channel. Optional
headrail pocket support brackets shall be electroplated, and shall
facilitate installation of blind in pocket.
L. Intermediate Support Brackets: Brackets shall be furnished for blinds
over 60 inches wide. Maximum spacing for intermediate support brackets
shall be 48 inches.
M. Size: Lengths and widths shall be as required for installation
\[between the jambs\] \[and mullions\] \[outside the jambs\] \[and
mullions\] \[as shown on the drawings.\]
N. Audio‑Visual Blinds: In addition to requirements for blinds, each
unit shall include light traps at headrail, sides and sill. Light traps
shall be constructed from aluminum or sheet steel, not less than 0.10
inch thick, U‑shaped, with legs not less than 1‑3/4 inches long. Edges
contacting blinds shall be rounded or beaded. Inside surfaces of light
traps shall be finished in a dull black color.
[PART 3: EXECUTION]{.underline}
3.1 EXAMINATION:
A. Verification of Conditions: Verify that surfaces and conditions in
which blinds will be installed are free of conditions interfering with
blind installation.
3.2 INSTALLATION:
A. General: Install blinds upon completion of construction and finish
processes in the rooms receiving blinds.
B. Horizontal Louver Blinds: Install blinds level and at a height to
permit full length operation. Use suitable type and size fasteners for
the application. Isolate metal parts from direct contact with concrete,
mortar, or dissimilar metals. Blinds installed in recessed pockets shall
be removable without disturbing the pocket. The entire blind, when
retracted, shall be contained behind the pocket. For blinds installed
outside the jambs and mullions, overlap each jamb and mullion 3/4 inch
or more when the jamb and mullion sizes permit. Include hardware,
brackets, anchors, fasteners and accessories necessary for a complete
finished installation.
C. Identification: According to the numbering plan, mark each opening
and the corresponding blind with identical numbers. For multiple windows
separated by mullions, the space required by each blind shall be
numbered separately. Use brass or aluminum plates, or stamp
corresponding numbers on unexposed surfaces of openings and the head
box. Fasten plates to the back of head box and sill track.
3.3 FIELD QUALITY CONTROL:
A. Audio‑Visual Blinds Field Test: When closed against full midday
summer sunny conditions, installed audio visual blinds shall be capable
of reducing the natural light level of the space to an average of 0.16
footcandles as measured by a footcandle meter.
3.4 ADJUSTING:
A. Requirements: Adjust clearances and overlaps to permit unencumbered
operation.
3.5 CLEANING:
A. Requirements: Clean soiled blind surfaces and components.
[PART 4: MEASUREMENT AND PAYMENT]{.underline}
4.1 METHOD OF MEASUREMENT:
A. ab Units: The work described in this section will not be measured for
payment.
4.2 BASIS OF PAYMENT:
A. Payment: No direct payment for the work described under this section
will be made. The Contractor shall include consideration for this item
in the bid price for other items of the Contract.
END OF SECTION
|
en
|
markdown
|
155967
|
# Presentation: 155967
## Communicating Evaluation Data
## Workshop Description
- This session will provide an overview of how evaluation questions and data collection can be implemented using a communications for sustainability framework.
- Participants will learn how to use marketing techniques and strategies to promote evaluation data effectively as well as to discover how to use this data to allow for the greatest impact with various target audiences in their communities.
## Session Objectives
- At the end of the session, participants will be able to
- Identify organizations within their community for potential sustainability partnerships
- Understand how to work with their evaluator to collect and disseminate data based on communications needs
- Create meaningful communications using evaluation data that is developed and gathered for specific audiences
## Sustainability Communications Mindset
- Look down the road not only for sustaining SS/HS initiatives but also for creating an environment that integrates the goals and mission of the initiatives into the fabric of your community
- Who needs to be at the table?
- What do we need to say to get them there?
- What data do we need to provide to make the information relevant to a particular audience?
## Who Needs To Be at the Table?
- Organizations with similar priorities as yours
- Think outside of the typical audiences
- Current grant partners
- Other community agencies/organizations
- Civic organizations
- Others?
## Who Needs To Be at the Table?
- Things to think about
- What are the top three priorities of our current partner agencies?
- Where is there natural alignment without money as a motivator?
- Within the community, what other organizations/agencies have priorities/vision/mission that align with one or more initiatives of SS/HS?
- Follow the money
- How does funding funnel into your community?
- How are existing youth initiatives funded?
## What Do We Need To Say to Potential Partners?
- Messages must be relevant to your audience
- Messages must be in a format that is easy for your audience to read and understand
- Messages must be delivered in a timely way by a trusted source
## Questions that you can use to help decide how to present your evaluation data to potential partners
What’s their definition of success?
What are their priorities?
What are they interested in?
What information do they trust?
What level of technical detail do they demand?
What data do you already have?
What data do you need to tell your story?
- What’s their definition of success?
- What are their priorities?
- What are they interested in?
- What information do they trust?
- What level of technical detail do they demand?
- What data do you already have?
- What data do you need to tell your story?
**What Do We Need To Say to Potential Partners?**
## Primary and Secondary Audiences for Communicating Evaluation Data
*Primary Users *are the individuals that you want to use your results; these people are your chief audience and often provide funding or other support
*Secondary Users *are individuals who may be associated with your program or have an interest in what you are doing (e.g., city council, neighborhoods, and service recipients)
## What Information Is Most Relevant to Your Audience’s Priorities?
- Description of
- Programs
- Cost
- Students
- School climate
- Services
- Change in
- Expenditures
- Student referrals
- School climate
- Academic performance
- Consumer satisfaction
## What Information Do They Trust?
- Caregiver-reported data
- Teacher-reported data
- Student-reported data
- Community member-reported data
- Administrator-reported data
- Agency staff-reported data
- Management information system data
##
Once you have completed your evaluation and analysis,
you should have information that provides an accurate
picture of your program as well as information to make
decisions about future program implementation. So, how
do you share your findings? Results can be reported not
only in a text document, but also in
Oral reports and presentations
Videos
Posters
Press releases
Newsletters
Other forms of communication
- Once you have completed your evaluation and analysis,
- you should have information that provides an accurate
- picture of your program as well as information to make
- decisions about future program implementation. So, how
- do you share your findings? Results can be reported not
- only in a text document, but also in
- Oral reports and presentations
- Videos
- Posters
- Press releases
- Newsletters
- Other forms of communication
**What Format Do We Use?**
##
Exercise:
Understanding Your Audience’s
Data Needs
- Exercise:
- Understanding Your Audience’s
- Data Needs
## Understanding Your Audience
- TO USE: Decide if each audience would prefer **quantitative** or hard data (QT); **qualitative**, self-reported, or anecdotal data (QL); or **both** (B). Then, for each audience, enter a **QT, QL, **or **B **in each of the boxes that represent the types of data your target audiences will most want to see.
| Audience Segments
Use space under each segment to specifically identify (e.g., does district leadership include superintendent? School board? Principals?) | Types of Data | | | | | | | | | | | |
| --- | --- | --- | --- | --- | --- | --- | --- | --- | --- | --- | --- | --- |
| | Descriptive | | | | | Outcome | | | | | | |
| | Students | Program | Service | Satis-faction | Climate | Student Behavior | Academic Perform. | Service Array | Costs | Satis-faction | School Climate | Academic Indicators |
| District Leadership | | | | | | | | | | | | |
| Law Enforcement | | | | | | | | | | | | |
| Mental Health Providers | | | | | | | | | | | | |
| Policymakers | | | | | | | | | | | | |
| Business Leaders | | | | | | | | | | | | |
| Faith-Based Leaders | | | | | | | | | | | | |
| Community Members | | | | | | | | | | | | |
| Other | | | | | | | | | | | | |
## Inventory Your Data
- What type(s) of data do you have?
- Where did your data come from?
- What is the quality of your data?
- What message does the data convey?
## What Data Do You Need?
- What do you currently have? What are you currently gathering?
- Depending on the status of your program evaluation you can
- Work with your evaluator to ensure that evaluation instruments that will provide you with relevant data for communications goals are developed
- Use existing evaluation data in a way that is relevant to your audience
- Some of both
## Qualitative Data
- Provides answers to open-ended questions
- Derives from notes from observations
- Uses words not numbers
- Is obtained through focus groups and unstructured interviews
- Includes contextual detail about feelings and perceptions in an effort to gain a holistic understanding
- Includes relatively few participants
- Quantitative Data
- Provides answers to close-ended questions
- Uses numbers not words
- Is obtained through structured surveys and interviews, existing records
- Often includes a large number of participants
- Provides less contextual detail
- Is amenable to common statistical procedures
**What Type(s) of Data Do You Have?**
## What Type(s) of Data Do You Have?
- Descriptive Data
- Is cross sectional
- Describes characteristics of people, organizations, or programs at a single point in time
- Outcome Data
- Is longitudinal
- Tracks people, organizations, or programs over time by using the same measures
- Assesses change in people, programs, or organizations
- Has an established baseline
##
Exercise:
Do You Have What You Need?
Data Inventory Worksheet
- Exercise:
- Do You Have What You Need?
- Data Inventory Worksheet
## Data Inventory Worksheet
- TO USE: Check off the boxes that best represent the types of data you currently are collecting. Note where you might need to collect additional data, based on your findings from the Audience Data Preferences Worksheet. Discuss with your evaluator how you might fill in those gaps.
| Data Source | Type and Quality of Data | | | | | | | | | | | |
| --- | --- | --- | --- | --- | --- | --- | --- | --- | --- | --- | --- | --- |
| | Qualitative Descriptive | | | Qualitative Outcome | | | Quantitative Descriptive | | | Quantitative Outcome | | |
| | Good | Fair | Poor | Good | Fair | Poor | Good | Fair | Poor | Good | Fair | Poor |
| Agencies | | | | | | | | | | | | |
| Parents | | | | | | | | | | | | |
| Students | | | | | | | | | | | | |
| Teachers | | | | | | | | | | | | |
| Systems Generated | | | | | | | | | | | | |
| Community Members | | | | | | | | | | | | |
| Academic Indicators | | | | | | | | | | | | |
| External Comparison | | | | | | | | | | | | |
| Other_____________ | | | | | | | | | | | | |
## So Far We’ve -
- Identified potential partners/audiences
- Analyzed the type of data and information that is relevant to them
- Determined the data that you currently have and/or are collecting and identified where there are data needs
- So how do we take all of this information and put pen to paper?
## Planning Your Project: Things To Decide Before Anyone Writes a Single Word
- Who is going to read this?
- What do they have in common?
- When they’re done reading, what do you want this audience to do or know?
- What materials do you have to work from? (See Data Inventory Worksheet)
## Planning Your Project: Things To Decide Before Anyone Writes a Single Word
- What kind of research and/or interviews are necessary? (See Audience Worksheet)
- Will this piece be printed only, or will it be posted on the Web?
- Do you need to design the piece, or must you fit the text into one that’s already designed?
- What “extras” do we need, such as sidebars, charts, or photos?
## Planning Your Project: Things To Decide Before Anyone Writes a Single Word
- Internal factors
- Who will have input, and who has the final say?
- If a lot of people will have input, who will coordinate their comments and resolve any disputes?
- Does everyone agree on the number of drafts allowed and when the draft will become final, with no more changes?
- What resources are available to help you complete this project?
## Planning Your Project: Things To Decide Before Anyone Writes a Single Word
- Internal factors
- Do you have someone who can put in the time necessary for organizing, researching, thinking, drafting, re-writing, and polishing over the life of the project?
- What is the budget for this project?
- How will your materials be distributed?
## What Information Should Be Included When Sharing Evaluation Data?
- State your program objectives
- This is important because, eventually, you will discuss how your evaluation data contributes to your stated objective.
## What Information Should Be Included When Sharing Evaluation Data?
- Describe progress toward achieving your objectives
- Describe your activities as they relate to your objectives
- Identify your beneficiaries—the number and characteristics of people you serve
- Describe your desired results—talk about the indicators of success that you have chosen. These are the factors that are most important to your program
## What Information Should Be Included When Sharing Evaluation Data?
- Describe your evaluation activities
- Identify the types of instruments you used
- Report on the information you collected
- Detail who administered your instruments, how they were administered (e.g., by mail, in person, or by telephone), and who, as well as how many people, completed them
- Note how you measured your desired result
- Discuss any problems encountered during the evaluation
## What Information Should Be Included When Sharing Evaluation Data?
- Describe the results of your evaluation
**This is the most important section!**
- Report your findings—statistics and qualitative information
- Employ graphs, charts, and tables to help convey your message
- Share stories from people who are directly involved in your program and/or your evaluation
## What Information Should Be Included When Sharing Evaluation Data?
- Compare the results of your evaluation with your objectives
- Describe how your services addressed the existing need. You can relate the need to baseline data if you have it
- Refer to previous evaluation findings (such as those reported in earlier reports) to provide a more detailed picture of the program progress
## What Information Should Be Included When Sharing Evaluation Data?
- State ideas for partner support and ask for commitment
**This is your “ask”**
- What do you want the audience to do?
- Show them a clear path to doing it
- Incorporate message development work to ensure success
## Pulling It All Together
**Harrisburg, Pennsylvania **
**Student Survey Data**
- Goal: To create meaningful communications using evaluation data that is developed and gathered for specific audiences
## Harrisburg, PAStudent Survey Data
- Purpose
- Evaluate prevention programs at the secondary level
- Life Skills Training
- TimeWise
- HealthWise
- School Transitional Environment Project (STEP)
- Teen Outreach Program
- Establish a monitoring system for social, emotional, and behavioral outcomes
## Harrisburg, PAStudent Survey Data
- Methods
- Conducted annually (beginning in October 2003)
- All students in 6th–12th grade
- Paper/pencil administration during a required class
- 77 percent response rate
## Harrisburg, PAStudent Survey Data
- Communications Goals
- Give the data back to students before the 2004 survey administration
- Integrate data into agency accountability systems
- Drive program decisions during grant period
## Harrisburg, PAStudent Survey Data
- Target audience: Project director
- Communications goal
- Drive program decisions during grant period
- Messaging
- Straightforward report of all data
- Not bad vs. good, but pointing how to improve quality
- Channel
- Bound report
## Harrisburg, PAStudent Survey Data
- Target audience: Students
- Communications goal
- Give data back to students before the 2004 survey to increase participation
- Message
- Show students that survey data is used and relevant
- Channels
- Student newsletter
- Article from student perspective in school newspaper
## Harrisburg, PAStudent Survey Data
- Target audience: Steering committee
- Communications goal
- Drive program decisions during grant period
- Messaging
- How do our students compare to national and State averages?
- These students are all our responsibility, how can we collaborate to provide the best mix of programs given these data?
- Channel
- PowerPoint presentation
## Harrisburg, PAStudent Survey Data
- Target audience: Superintendent
- Communications goal
- Integrate data into agency accountability systems
- Messaging
- The climate of schools is important; we care about the whole student (socially, emotionally, behaviorally, and academically)
- Channel
- Talking points in PowerPoint of survey highlights for Superintendent’s annual “state of the union”
## Other Audiences
- How would you use this same data for other audiences?
- Businesses?
- Community organizations?
- Parents?
- Others?
- What different information might you need for these audiences?
##
Questions?
- Questions?
|
en
|
all-txt-docs
|
111432
|
Injected Beam Statistics for Fill number 6457
Injection start time: Sun Mar 13 17:05:28 2005
Injection complete time: Sun Mar 13 17:08:52 2005
Ring Bunches/Cycles Avg Bunch in RHIC (10^6 ions) Avg Efficiency - XCBM to RHIC Bunching Eff XCBM to Uxf1 Uxf1 to Wxf Wxf to Arc Arc to RHIC
Blue 42/11 3479 1.036 NA 1.057 1.000 0.996 0.984
Yellow 43/12 3345 1.028 NA 1.053 0.999 0.984 0.992
Time BST_IN B_EARLY B_LATE AGS_other AGS_CBM XCBM Eff1* bunches uxf1 Eff2* uxf3 wxf1 Eff3* xxf1 bluEff4* bluChg bluEff5* bluEffTotal bluOld bluNew yxf1 yelEff4* yelChg yelEff5* yelEffTotal yelOld yelNew
03/13/2005 17:05:28 3919 23720 19010 20540 13100 13280 -0.547 4 13976 1.052 - 13990 1.001 13945 0.997 13722 0.984 1.033 1 13723 12 - 0 - - -1 -1
03/13/2005 17:05:32 3984 23670 18920 20540 13040 13210 -0.555 4 13930 1.055 14020 13922 0.999 13871 0.996 13639 0.983 1.032 13722 27361 -16 - 1 - - -1 -1
03/13/2005 17:05:36 3897 23750 18460 20540 13220 13410 -0.532 4 14109 1.052 14190 14122 1.001 14068 0.996 13852 0.985 1.033 27359 41212 -49 - 2 - - -2 0
03/13/2005 17:05:44 3975 24260 19630 20540 14350 14080 -0.459 4 14878 1.057 - 14882 1.000 14855 0.998 14638 0.985 1.040 41211 55849 7 - 0 - - 0 0
03/13/2005 17:05:48 3975 24460 18720 20540 12900 13080 -0.570 4 13752 1.051 13973 13764 1.001 13710 0.996 13467 0.982 1.030 55848 69315 -10 - 1 - - -1 0
03/13/2005 17:06:00 3969 23930 18780 20540 12840 13060 -0.573 4 13900 1.064 - 13912 1.001 13851 0.996 13621 0.983 1.043 69308 82929 -16 - -0 - - 0 -0
03/13/2005 17:06:08 4006 24180 19740 20540 14230 14140 -0.453 4 14907 1.054 - 14920 1.001 14877 0.997 14667 0.986 1.037 82924 97591 4 - 2 - - 0 2
03/13/2005 17:06:16 4030 24280 19390 20540 13080 13270 -0.548 4 14063 1.060 - 14050 0.999 14002 0.997 13760 0.983 1.037 97584 111344 -33 - 1 - - 1 2
03/13/2005 17:06:44 3972 24560 19430 20540 13710 13580 -0.513 4 14244 1.049 - 14244 1.000 14185 0.996 13963 0.984 1.028 111319 125283 -31 - 0 - - 1 2
03/13/2005 17:06:48 3961 24340 19160 20540 13430 13360 -0.537 4 14199 1.063 14345 14180 0.999 14135 0.997 13887 0.982 1.039 125281 139168 -9 - 0 - - 2 2
03/13/2005 17:07:04 3943 23830 18580 20540 13610 13020 -1.155 2 7073 1.086 - 7055 0.997 7010 0.994 6900 0.984 1.060 139157 146057 3 - 1 - - 1 2
03/13/2005 17:07:24 3912 23330 18440 20540 13110 12900 -0.592 4 13719 1.063 - 13732 1.001 -78 - 0 - - 146040 146040 13545 0.986 13456 0.993 1.043 2 13459
03/13/2005 17:07:36 3894 23660 18760 20540 13520 13060 -0.573 4 13957 1.069 - 13928 0.998 -50 - -0 - - 146024 146023 13715 0.985 13644 0.995 1.045 13455 27099
03/13/2005 17:07:44 3923 24450 18980 20540 13570 13290 -0.546 4 14167 1.066 - 14141 0.998 -48 - -1 - - 146013 146011 13938 0.986 13858 0.994 1.043 27097 40955
03/13/2005 17:07:52 3957 24170 19010 20540 12710 13140 -0.563 4 14019 1.067 - 14007 0.999 -65 - -1 - - 146004 146004 13740 0.981 13719 0.998 1.044 40950 54670
03/13/2005 17:07:56 3899 23820 18650 20540 12690 12890 -0.593 4 13742 1.066 13834 13733 0.999 -57 - -1 - - 146000 145999 13474 0.981 13443 0.998 1.043 54669 68112
03/13/2005 17:08:04 3888 23270 18470 20540 12910 12680 -0.620 4 13657 1.077 - 13661 1.000 -73 - -1 - - 145985 145984 13443 0.984 13358 0.994 1.053 68106 81464
03/13/2005 17:08:08 3936 22920 18310 20540 13360 13200 -0.556 4 13994 1.060 14174 13967 0.998 -48 - -1 - - 145980 145979 13733 0.983 13687 0.997 1.037 81461 95147
03/13/2005 17:08:16 3926 24260 18910 20540 12820 13020 -0.578 4 13929 1.070 - 13900 0.998 -66 - -2 - - 145968 145965 13697 0.985 13606 0.993 1.045 95139 108745
03/13/2005 17:08:32 3828 23000 17890 20540 12780 12710 -0.616 4 13762 1.083 - 13748 0.999 -34 - -1 - - 145945 145944 13520 0.983 13434 0.994 1.057 108727 122162
03/13/2005 17:08:40 3936 23520 18650 20540 12990 12880 -0.595 4 13706 1.064 - 13700 1.000 -59 - -29 - - 144328 144298 13529 0.987 13343 0.986 1.036 121599 134943
03/13/2005 17:08:44 3991 24610 19730 20540 13510 13870 -0.962 2 7390 1.066 7493 7363 0.996 -31 - -4 - - 144291 144286 7242 0.984 7208 0.995 1.039 134940 142148
03/13/2005 17:08:52 3423 19820 16270 20540 11760 12250 -2.707 1 1190 0.388 - 1178 0.990 -19 - -4 - - 144207 144203 1171 0.994 1057 0.902 0.345 142108 143164
* Eff1=AGS bunching efficiency,Eff2=XCBM to uxf1, Eff3=uxf1 to wxf, Eff4=wxf to end of arc,Eff5=end of arc to RHIC
|
en
|
log-files
|
654491
|
! Started logfile: 0537-441_X.log on Mon Oct 25 17:53:58 2004
observe 0537-441_X.edt
! Reading UV FITS file: 0537-441_X.edt
! AN table 1: 30 integrations on 153 of 153 possible baselines.
! Apparent sampling: 0.0324619 visibilities/baseline/integration-bin.
! *** This seems a bit low - see "help observe" on the binwid argument.
! Found source: 0537-441
! Warning: Unknown AN-table MNTSTA value (3).
! Will assume that it is ground-based.
!
! There are 4 IFs, and a total of 4 channels:
!
! IF Channel Frequency Freq offset Number of Overall IF
! origin at origin per channel channels bandwidth
! ------------------------------------------------------------- (Hz)
! 01 1 8.40997e+09 8e+06 1 8e+06
! 02 2 8.47997e+09 8e+06 1 8e+06
! 03 3 8.79497e+09 8e+06 1 8e+06
! 04 4 8.89997e+09 8e+06 1 8e+06
!
! Polarization(s): RR
!
! Read 1070 lines of history.
!
! Reading 596 visibilities.
select
! Selecting polarization: RR, channels: 1..4
! Reading IF 1 channels: 1..1
! Reading IF 2 channels: 2..2
! Reading IF 3 channels: 3..3
! Reading IF 4 channels: 4..4
uvweight 0,-1
! Uniform weighting is not currently selected.
! Gridding weights will be scaled by errors raised to the power -1.
! Radial weighting is not currently selected.
mapsi 2048,0.1
! Map grid = 2048x2048 pixels with 0.100x0.100 milli-arcsec cellsize.
peakw 1
! Inverting map and beam
! Estimated beam: bmin=1.412 mas, bmaj=13.18 mas, bpa=9.923 degrees
! Estimated noise=5.54004 mJy/beam.
! Added new window around map position (0, 0).
mapp
!
! Move the cursor into the plot window and press 'H' for help
mapp
!
! Move the cursor into the plot window and press 'H' for help
peakw 0.5
! Added new window around map position (0, 0).
mapp
!
! Move the cursor into the plot window and press 'H' for help
peakw 0.4
! Added new window around map position (0, 0).
clean
! clean: niter=100 gain=0.05 cutoff=0
! Component: 050 - total flux cleaned = 3.74787 Jy
! Component: 100 - total flux cleaned = 4.15749 Jy
! Total flux subtracted in 100 components = 4.15749 Jy
! Clean residual min=-0.390266 max=0.263419 Jy/beam
! Clean residual mean=0.002645 rms=0.116760 Jy/beam
! Combined flux in latest and established models = 4.15749 Jy
selfcal
! Performing phase self-cal
! Adding 36 model components to the UV plane model.
! The established model now contains 36 components and 4.15749 Jy
!
! Correcting IF 1.
! A total of 483 telescope corrections were flagged in sub-array 1.
!
! Correcting IF 2.
! A total of 483 telescope corrections were flagged in sub-array 1.
!
! Correcting IF 3.
! A total of 483 telescope corrections were flagged in sub-array 1.
!
! Correcting IF 4.
! A total of 483 telescope corrections were flagged in sub-array 1.
!
! Fit before self-cal, rms=0.505497Jy sigma=3.578824
! Fit after self-cal, rms=0.505215Jy sigma=3.576674
radp
! Using default options string "m1"
! Move the cursor into the plot window and press 'H' for help
mapp
! Inverting map and beam
! Estimated beam: bmin=1.412 mas, bmaj=13.18 mas, bpa=9.923 degrees
! Estimated noise=5.54004 mJy/beam.
!
! Move the cursor into the plot window and press 'H' for help
clean
! clean: niter=100 gain=0.05 cutoff=0
! Component: 050 - total flux cleaned = 0.0537701 Jy
! Component: 100 - total flux cleaned = 0.0566756 Jy
! Total flux subtracted in 100 components = 0.0566756 Jy
! Clean residual min=-0.387295 max=0.250680 Jy/beam
! Clean residual mean=0.002131 rms=0.114850 Jy/beam
! Combined flux in latest and established models = 4.21417 Jy
selfcal
! Performing phase self-cal
! Adding 6 model components to the UV plane model.
! The established model now contains 39 components and 4.21417 Jy
!
! Correcting IF 1.
!
! Correcting IF 2.
!
! Correcting IF 3.
!
! Correcting IF 4.
!
! Fit before self-cal, rms=0.502114Jy sigma=3.554137
! Fit after self-cal, rms=0.502102Jy sigma=3.554100
clean
! Inverting map
! clean: niter=100 gain=0.05 cutoff=0
! Component: 050 - total flux cleaned = 0.000963342 Jy
! Component: 100 - total flux cleaned = 0.00143053 Jy
! Total flux subtracted in 100 components = 0.00143053 Jy
! Clean residual min=-0.387465 max=0.250606 Jy/beam
! Clean residual mean=0.002119 rms=0.114779 Jy/beam
! Combined flux in latest and established models = 4.2156 Jy
selfcal
! Performing phase self-cal
! Adding 5 model components to the UV plane model.
! The established model now contains 41 components and 4.2156 Jy
!
! Correcting IF 1.
!
! Correcting IF 2.
!
! Correcting IF 3.
!
! Correcting IF 4.
!
! Fit before self-cal, rms=0.501906Jy sigma=3.552745
! Fit after self-cal, rms=0.501899Jy sigma=3.552680
gscale true
! Performing overall amplitude self-cal
!
! Correcting IF 1.
! A total of 15 telescope corrections were flagged in sub-array 1.
! Telescope amplitude corrections in sub-array 1:
! BR 1.00* FD 0.85 GC 1.00* GG 1.00*
! HN 1.00* KK 1.00* KP 1.06 LA 1.06
! MC 1.00* MK 1.00* NL 1.00* ON 1.00*
! OV 1.00* PT 1.11 SC 1.02 TS 1.00*
! WF 1.00* WZ 1.00*
!
!
! Correcting IF 2.
! A total of 15 telescope corrections were flagged in sub-array 1.
! Telescope amplitude corrections in sub-array 1:
! BR 1.00* FD 0.85 GC 1.00* GG 1.00*
! HN 1.00* KK 1.00* KP 1.01 LA 1.07
! MC 1.00* MK 1.00* NL 1.00* ON 1.00*
! OV 1.00* PT 1.15 SC 0.99 TS 1.00*
! WF 1.00* WZ 1.00*
!
!
! Correcting IF 3.
! A total of 15 telescope corrections were flagged in sub-array 1.
! Telescope amplitude corrections in sub-array 1:
! BR 1.00* FD 0.86 GC 1.00* GG 1.00*
! HN 1.00* KK 1.00* KP 0.94 LA 1.05
! MC 1.00* MK 1.00* NL 1.00* ON 1.00*
! OV 1.00* PT 1.18 SC 0.97 TS 1.00*
! WF 1.00* WZ 1.00*
!
!
! Correcting IF 4.
! A total of 15 telescope corrections were flagged in sub-array 1.
! Telescope amplitude corrections in sub-array 1:
! BR 1.00* FD 0.88 GC 1.00* GG 1.00*
! HN 1.00* KK 1.00* KP 1.00 LA 1.05
! MC 1.00* MK 1.00* NL 1.00* ON 1.00*
! OV 1.00* PT 1.16 SC 0.99 TS 1.00*
! WF 1.00* WZ 1.00*
!
!
! Fit before self-cal, rms=0.501899Jy sigma=3.552680
! Fit after self-cal, rms=0.120206Jy sigma=0.802821
radp
! Using default options string "m1"
! Move the cursor into the plot window and press 'H' for help
mapp
! Inverting map and beam
! Estimated beam: bmin=1.272 mas, bmaj=13.82 mas, bpa=10.24 degrees
! Estimated noise=6.2824 mJy/beam.
!
! Move the cursor into the plot window and press 'H' for help
clean
! clean: niter=100 gain=0.05 cutoff=0
! Component: 050 - total flux cleaned = -0.0010157 Jy
! Component: 100 - total flux cleaned = -0.00100633 Jy
! Total flux subtracted in 100 components = -0.00100633 Jy
! Clean residual min=-0.025157 max=0.039919 Jy/beam
! Clean residual mean=0.000029 rms=0.009944 Jy/beam
! Combined flux in latest and established models = 4.21459 Jy
selfcal
! Performing phase self-cal
! Adding 5 model components to the UV plane model.
! The established model now contains 46 components and 4.21459 Jy
!
! Correcting IF 1.
!
! Correcting IF 2.
!
! Correcting IF 3.
!
! Correcting IF 4.
!
! Fit before self-cal, rms=0.119798Jy sigma=0.800557
! Fit after self-cal, rms=0.120160Jy sigma=0.799398
selfcal true,true,1
! Performing amp+phase self-cal over 1 minute time intervals
!
! Correcting IF 1.
!
! Correcting IF 2.
!
! Correcting IF 3.
!
! Correcting IF 4.
!
! Fit before self-cal, rms=0.120160Jy sigma=0.799398
! Fit after self-cal, rms=0.115255Jy sigma=0.768505
clean
! Inverting map and beam
! Estimated beam: bmin=1.273 mas, bmaj=13.82 mas, bpa=10.23 degrees
! Estimated noise=6.28428 mJy/beam.
! clean: niter=100 gain=0.05 cutoff=0
! Component: 050 - total flux cleaned = -0.00119665 Jy
! Component: 100 - total flux cleaned = -0.000890919 Jy
! Total flux subtracted in 100 components = -0.000890919 Jy
! Clean residual min=-0.024442 max=0.038795 Jy/beam
! Clean residual mean=0.000064 rms=0.009924 Jy/beam
! Combined flux in latest and established models = 4.2137 Jy
selfcal
! Performing phase self-cal
! Adding 8 model components to the UV plane model.
! The established model now contains 50 components and 4.2137 Jy
!
! Correcting IF 1.
!
! Correcting IF 2.
!
! Correcting IF 3.
!
! Correcting IF 4.
!
! Fit before self-cal, rms=0.114772Jy sigma=0.765972
! Fit after self-cal, rms=0.114795Jy sigma=0.765777
radp
! Using default options string "m1"
! Move the cursor into the plot window and press 'H' for help
mapp
! Inverting map
!
! Move the cursor into the plot window and press 'H' for help
save 0537-441_X
! Writing UV FITS file: 0537-441_X.uvf
! Writing 50 model components to file: 0537-441_X.mod
! wwins: Wrote 1 windows to 0537-441_X.win
! restore: Substituting estimate of restoring beam from last 'invert'.
! Restoring with beam: 1.273 x 13.82 at 10.23 degrees (North through East)
! Clean map min=-0.024007 max=3.8307 Jy/beam
! Writing clean map to FITS file: 0537-441_X.fits
! Writing difmap environment to: 0537-441_X.par
![@gonzo_plot 0537-441_X]
device 0537-441_Xuv.ps/vps,1,2
! Attempting to open device: '0537-441_Xuv.ps/vps'
radplot
! Using default options string "m1"
uvplot
! Using default options string ""
device 0537-441_Xim.ps/vps
! Attempting to open device: '0537-441_Xim.ps/vps'
uvweight 0,-1
! Uniform weighting is not currently selected.
! Gridding weights will be scaled by errors raised to the power -1.
! Radial weighting is not currently selected.
loglevs -1,2048,2
! The new contour levels are:
! -1 1 2 4 8 16 32 64 128 256 512 1024 2048
cmul = imstat(rms)*3
! Inverting map and beam
! Estimated beam: bmin=1.273 mas, bmaj=13.82 mas, bpa=10.23 degrees
! Estimated noise=6.28428 mJy/beam.
mappl cln
! restore: Substituting estimate of restoring beam from last 'invert'.
! Restoring with beam: 1.273 x 13.82 at 10.23 degrees (North through East)
! Clean map min=-0.024007 max=3.8307 Jy/beam
![Exited script file: gonzo_plot]
device /xs
! Attempting to open device: '/xs'
peakw 1
! Inverting map
! Added new window around map position (-33.8, 39.6).
mapp
!
! Move the cursor into the plot window and press 'H' for help
clean 50
! clean: niter=50 gain=0.05 cutoff=0
! Component: 050 - total flux cleaned = 0.038341 Jy
! Total flux subtracted in 50 components = 0.038341 Jy
! Clean residual min=-0.023404 max=0.016209 Jy/beam
! Clean residual mean=0.000109 rms=0.005849 Jy/beam
! Combined flux in latest and established models = 4.25204 Jy
mapp
!
! Move the cursor into the plot window and press 'H' for help
save 0537-441_X
! Writing UV FITS file: 0537-441_X.uvf
! Writing 66 model components to file: 0537-441_X.mod
! wwins: Wrote 2 windows to 0537-441_X.win
! Adding 16 model components to the UV plane model.
! The established model now contains 65 components and 4.25204 Jy
! Inverting map
! restore: Substituting estimate of restoring beam from last 'invert'.
! Restoring with beam: 1.273 x 13.82 at 10.23 degrees (North through East)
! Clean map min=-0.023058 max=3.8389 Jy/beam
! Writing clean map to FITS file: 0537-441_X.fits
! Writing difmap environment to: 0537-441_X.par
![@gonzo_plot 0537-441_X]
device 0537-441_Xuv.ps/vps,1,2
! Attempting to open device: '0537-441_Xuv.ps/vps'
radplot
! Using default options string "m1"
uvplot
! Using default options string ""
device 0537-441_Xim.ps/vps
! Attempting to open device: '0537-441_Xim.ps/vps'
uvweight 0,-1
! Uniform weighting is not currently selected.
! Gridding weights will be scaled by errors raised to the power -1.
! Radial weighting is not currently selected.
loglevs -1,2048,2
! The new contour levels are:
! -1 1 2 4 8 16 32 64 128 256 512 1024 2048
cmul = imstat(rms)*3
! Inverting map and beam
! Estimated beam: bmin=1.273 mas, bmaj=13.82 mas, bpa=10.23 degrees
! Estimated noise=6.28428 mJy/beam.
mappl cln
! restore: Substituting estimate of restoring beam from last 'invert'.
! Restoring with beam: 1.273 x 13.82 at 10.23 degrees (North through East)
! Clean map min=-0.023058 max=3.8389 Jy/beam
![Exited script file: gonzo_plot]
quit
! Quitting program
! Log file 0537-441_X.log closed on Mon Oct 25 17:59:57 2004
|
en
|
converted_docs
|
033368
|
HQ 554920
January 3, 1989
CLA-2 CO:R:C:V 554920 GRV
CATEGORY: CLASSIFICATION
TARIFF NO.: 9802.00.80; 807.00
Mr. R. B. McKenny
C. S. Emery & Company, Inc.
P.O. Box 307
Derby Line, Vermont 05830
RE: Applicability of partial duty exemption under HTSUS subhead-
ing 9802.00.80 to certain vertical blinds to be imported
from Canada.
Dear Mr. McKenny:
This is in response to your letter of February 11, 1988, on
behalf of Frontenac Fabrics, Inc., requesting a ruling on the ap-
plicability of subheading 9802.00.80, Harmonized Tariff Schedule
of the United States (HTSUS) (formerly item 807.00, Tariff Sched-
ules of the United States (TSUS)), to certain vertical blinds to
be imported from Canada. Samples of both the fabric rolls to be
exported and the vertical blinds to be imported were submitted
for examination.
FACTS:
You state that rolls of fabric of U.S. origin, measuring
three and half inches wide by approximately 100 yards, will be
exported to Canada for assembly operations consisting of:
\(1\) cutting the rolled fabric to length;
\(2\) punching a one-half inch hole near one end of the
fabric for receipt of a removable plastic hanger
insert;
\(3\) folding the punched end over and sewing a one inch
hem in it to receive the removable plastic hanger
insert; and
\(4\) folding the opposite end over and sewing a two and
a half inch hem in it, the resultant pocket either
containing an inserted metal weight or not.
The completed articles\--vertical blinds\--will then be returned to
the U.S.
ISSUE:
Whether the foreign operation constitutes an \"assembly,\"
thereby entitling the vertical blinds to the partial duty
\- 2 -
exemption under HTSUS subheading 9802.00.80 (item 807.00, TSUS)
when returned to the U.S.
LAW & ANALYSIS:
As you are probably aware, on January 1, 1989, the Harmo-
nized Tariff Schedule of the United States (HTSUS) superseded and
replaced the Tariff Schedules of the United States (TSUS). TSUS
item 807.00 was carried over into the HTSUS without change as
subheading 9802.00.80. This tariff provision provides a partial
duty exemption for articles:
\... assembled abroad in whole or in part of fabricated
components, the product of the United States, which
\(a\) were exported in condition ready for assembly with-
out further fabrication, (b) have not lost their physi-
cal identity in such articles by change in form, shape,
or otherwise, and (c) have not been advanced in value
or improved in condition abroad except by being assem-
bled and except by operations incidental to the assembly
process such as cleaning, lubricating, and painting.
Under this tariff provision, there is a duty upon the full value
of the imported assembled article less the cost or value of such
U.S. components, provided the documentation requirements of sec-
tion 10.24, Customs Regulations (19 CFR 10.24), are satisfied.
Of importance to the sample fabric material submitted is
the term \"assembled.\" Section 10.16(a), Customs Regulations (19
CFR 10.16(a)), provides that:
The assembly operations performed abroad may consist
of any method used to join or fit together solid com-
ponents, such as welding, soldering, riveting, force
fitting, gluing, laminating, sewing, or the use of
fasteners\....
Court decisions construing the term \"assembly\" have uni-
formly held that the term \"assembly,\" for purposes of TSUS item
807.00, involves the joining or coming together of solids. See,
for example, United States v. Baylis Brothers Co., 59 CCPA 9,
C.A.D. 1026, 451 F.2d 643 (1971). Implicit in this construction
of the term \"assembly\" is that multiple solid components are
joined together in a manner that permanently fixes their
respective positions.
One of the problems presented in the instant case is that
the process of sewing a one-inch hem to the end of the cut fabric
containing the punched hole results in merely joining the fabric
to itself. We have previously ruled that the joining of fabric
to itself rather than to another component is not an acceptable
\- 3 -
assembly operation or an operation incidental to assembly for
purposes of TSUS item 807.00. See Headquarters Ruling Letter
554959 (August 29, 1988). Punching the one-half inch hole in the
fabric also clearly is not an operation which is incidental to
assembly under the circumstances of this case. The operations of
punching the hole in the fabric and sewing the one-inch hem
advance the value and improve the condition of the fabric by
means other than assembly and demonstrate that the fabric was not
in condition ready for assembly with other components at the time
of exportation. As a result, no allowance in duty may be made
for the value of the fabric under HTSUS subheading 9802.00.80
upon importation of the vertical blinds.
Moreover, because the plastic hanger to be inserted into
the end of the fabric with the one-inch hem is not permanently
fixed by an assembly process, but is removable, no allowance may
be made for the value of the plastic hanger under this tariff
provision. However, the process of enclosing a metal weight in
the two and a half inch hem on the other end of the fabric strip
constitutes an acceptable assembly operation since the weight
will be permanently joined to the fabric by the sewing operation.
Therefore, with respect to those vertical blinds which will have
metal weights inserted therein, allowances in duty may be made
for the value of the weights under HTSUS subheading 9802.00.80,
provided the weights are of U.S. origin.
CONCLUSION:
On the basis of the information and samples submitted, no
exemption from duty may be given under HTSUS subheading
9802.00.80 for the value of the U.S. fabric to be exported or for
the value of the plastic hangers. However, in regard to those
vertical blinds to be imported containing metal weights,
allowances in duty may be made under this tariff provision for
the cost or value of the weights if they are of U.S. origin and
the documentation requirements set forth in 19 CFR 10.24 are
satisfied.
Sincerely,
John Durant, Director
Commercial Rulings Division
CO:R:C:V:VILDERS:GRV:10/21/88:12/16/88
|
en
|
converted_docs
|
983003
|
**FEDERAL COMMUNICATIONS COMMISSION**
{width="0.84375in" height="0.84375in"}**ENFORCEMENT
BUREAU**
Northeast Region
**Chicago Office**
1550 North Northwest Highway, Room 306
Park Ridge, IL 60068
March 21, 2007
**CERTIFIED MAIL NO: 7001 1940 0006 2993 3325**
**RETURN RECEIPT REQUESTED AND FIRST CLASS U.S. MAIL**
Mr. Bruce Heimes
Clinton, IN 47842
**NOTICE OF UNLICENSED OPERATION**
Case Number: EB-07-CG-152
Document Number: W20073232001
The Chicago Office received information that your Citizens Band Radio
Service radio station was being operated illegally and causing
interference to Clinton Township Volunteer Fire Department's radio
communications. On February 28, 2007, agents from this office inspected
the radio station at your location and confirmed that you were operating
a Yaesu FT-757, Galaxy DX 99V, Galaxy DX 44V, and General AP Hill DX
2517 which are non-certified CB transceivers. Your transceivers were
also connected to RF power amplifiers. By using non-certified equipment,
you voided your authority to operate this station.
Radio stations must be licensed by the FCC pursuant to 47 U.S.C. § 301.
You are hereby warned that operation of radio transmitting equipment
without a valid radio station authorization constitutes a violation of
the Federal laws cited above and could subject the operator to severe
penalties, including, but not limited to, substantial monetary fines,
*in rem* arrest action against the offending radio equipment, and
criminal sanctions including imprisonment. (*see* 47 U.S.C. §§ 401, 501,
503 and 510).
**UNLICENSED OPERATION OF THIS RADIO STATION MUST BE DISCONTINUED
IMMEDIATELY**.
You have ten (10) days from the date of this notice to respond with any
evidence that you have authority to operate granted by the FCC. Your
response should be sent to the address in the letterhead and reference
the listed case and document number. Under the Privacy Act of 1974, 5
U.S.C. § 552a(e)(3), we are informing you that the Commission's staff
will use all relevant material information before it to determine what,
if any, enforcement action is required to ensure your compliance with
FCC Rules. This will include any information that you disclose in your
reply.
You may contact this office if you have any questions.
James M. Roop
Acting District Director
Chicago Office
Attachments:
Excerpts from the Communications Act of 1934, As Amended
Enforcement Bureau, \"Inspection Fact Sheet\", July 2003
|
en
|
converted_docs
|
767346
|
**FOR IMMEDIATE RELEASE FOR INFORMATION CONTACT:**
Tammi Schone - (605) 352-1102
# RURAL DEVELOPMENT AWARDS \$1,743,250 TO THE SISSETON WAHPETON HOUSING AUTHORITY[ *Funding to Facilitate Growth and Development* ]{.underline}
**(Sisseton, South Dakota -- December 20, 2006)** USDA Rural Development
Acting State Director Tim B. Potts today presented the Sisseton Wahpeton
Housing Authority (SWHA) with a ceremonial check representing
\$1,743,250 to construct 11-three bedroom rental units for families in
the Long Hollow district and to construct an administration building to
administer the housing program.
"The federal funding will be used for eleven individual homes with three
bedrooms. In addition, funding will assist with the construction of an
administration building which will provide service to 5,678 individuals
living in the area," said Potts.
The Sisseton-Wahpeton Oyate Reservation is located in the northeastern
part of the state near Sisseton, South Dakota. The USDA Rural
Development rural rental housing loan funds of \$1,000,000 will be used
to construct rental units for families in the Long Hollow District,
which is located on the Sisseton-Wahpeton Oyate Reservation. Tenants
will receive rental assistance so rents will be no more than 30% of
their income. The federal funds will be leveraged with an applicant
contribution of \$297,300. The USDA Rural Development community facility
loan funds of \$743,250 will be used to construct an administration
building to administer the housing programs.
"The housing shortage on the Sisseton-Wahpeton Oyate Reservation is a
major problem confronting our tribal members. We have approximately
three hundred and fifty families on our current waiting list for
affordable housing accommodations. Optimistically, this will be one of
many projects the Sisseton-Wahpeton Housing Authority and USDA Rural
Development will team up with to alleviate the housing shortage on our
reservation. The current administration building was built in 1967,
accordingly we are in desperate need for a new facility," said LeRoy
Quinn, Jr., Executive Director.
USDA Rural Development Area Director Bruce Jones and Manager Janell
Telin also attended the event. USDA Rural Development has ten offices in
the state that assist rural communities. Office locations include a
state office in Huron, along with area offices in Aberdeen, Huron,
Mitchell, Pierre, Rapid City, Sioux Falls, Sturgis, Watertown, and
Yankton.
USDA Rural Development's mission is to deliver programs in a way that
will support increasing economic opportunity and improve the quality of
life of rural residents. As a venture capital entity, Rural Development
provides equity and technical assistance to finance and foster growth in
homeownership, business development, and critical community and
technology infrastructure. Further information on rural programs is
available at a local USDA Rural Development office or by visiting USDA's
web site at <http://www/rurdev.usda.gov>.
**- USDA -**
|
en
|
converted_docs
|
089267
|
FOR IMMEDIATE RELEASE:
December 1, 2000
> WIRELESS TELECOMMUNICATIONS BUREAU ANNOUNCES
>
> COMMERCIAL WIRELESS DIVISION PERSONNEL ACTION
The following personnel action has been announced in the Wireless
Telecommunications Bureau's Commercial Wireless Division:
# Lauren Kravetz Named Special Counsel:
> Lauren H. Kravetz has been named Special Counsel in the Wireless
> Bureau's Commercial Wireless Division. Since March 1999 she has served
> as an Attorney-Advisor in the Policy and Rules Branch of the Division,
> leading the Division's review of major transactions involving wireless
> licenses. Prior to joining the Commission, Kravetz was senior
> associate at the law firm of Powell, Goldstein, Frazer & Murphy LLP,
> and she has also worked at the law firms of Squire, Sanders & Dempsey
> and Heron, Burchette, Ruckert & Rothwell. Kravetz has served as
> President of the Washington, D.C. chapter of American Women in Radio &
> Television (AWRT) and recently completed a term as a National Director
> of AWRT. Kravetz holds a J.D. from Georgetown University, where she
> was a member of the Editorial Board of the *American Criminal Law
> Review*, and a B.A, *magna cum laude*, from the University of
> California at Los Angeles.
\- FCC -
|
en
|
converted_docs
|
665769
|
**Before the**
**Federal Communications Commission**
**Washington, D.C. 20554**
+----------------------------------+----+------------------------------+
| In the matter of | * | GEN Docket No. 86-285 |
| | *) | |
| Amendment of the Schedule | ** | |
| | | |
| of Application Fees Set Forth | * | |
| | *) | |
| In Section 1.1102 through 1.1107 | ** | |
| | | |
| of the Commission's Rules | * | |
| | *) | |
| | ** | |
| | | |
| | * | |
| | *) | |
| | ** | |
| | | |
| | * | |
| | *) | |
| | ** | |
| | | |
| | * | |
| | *) | |
| | ** | |
| | | |
| | * | |
| | *) | |
| | ** | |
| | | |
| | * | |
| | *) | |
| | ** | |
| | | |
| | * | |
| | *) | |
| | ** | |
+----------------------------------+----+------------------------------+
**[ORDER]{.underline}**
**Adopted: June 23, 2004 Released: June 25, 2004**
By the Commission:
**I. INTRODUCTION**
1\. By this *Order* ("R&O"), the Commission makes rule changes to Part 0
and Part 1 of 47 C.F.R., as listed in Appendix A, and amends its
Schedule of Application Fees, 47 C.F.R. Section 1.1102 et seq., as
listed in Appendix B, to adjust its fees for processing applications and
other filings. Section 8(b) of the Communications Act, as amended,
requires that the Commission review and adjust its application fees
every two years after October 1, 1991. [^1] The increase in fees
reflects the net change in the Consumer Price Index for all Urban
Consumers of 7 percent, calculated from October 2001 to October
2003.[^2] The adjustments made to the fee schedule comport with the
statutory formula set forth in Section 8(b).
2\. Effective October 1, 2004, the Commission will withhold action on
applications and other requests for benefits upon discovery that the
entity applying for or seeking benefits is delinquent in its non-tax
debts[^3] owed to the Commission, and dismiss such applications or
requests if the delinquent debt is not resolved. Our application fee
rules have been amended to state that we will withhold action on
applications or other requests for benefits by delinquent debtors and
ultimately dismiss those applications or other requests if payment of
the delinquent debt is not made or satisfactory arrangements for payment
is not made.[^4]
3\. Accordingly, *IT IS ORDERED*, that the rule changes specified herein
be adopted and the Schedule of Application Fees, 47 C.F.R. Section
1.1102 et seq., *BE AMENDED* as set forth in the attached
amendment. It is further ordered that the rule changes and amendment to
the Schedule of Application Fees made herein will become effective 30
days after publication in the *Federal Register*.
FEDERAL COMMUNICATIONS COMMISSION
Marlene H. Dortch
Secretary
**APPENDIX A**
**RULE CHANGES**
**Part 0 of Title 47 of the Code of Federal Regulations is amended to
read as follows:**
Part 0 -- COMMISSION ORGANIZATION
1\. The Authority citations for Part 0 continue to read as follows:
Authority: Sec. 5, 48 Stat. 1068, as amended; 47 U.S.C. 155, 225, unless
otherwise noted.
2\. Section 0.481 is revised to read as follows:
[§ 0.481 Place of filing applications for radio
authorizations]{.underline}.
For locations for filing applications, and appropriate fees, see §§
1.1102-1.1107 of this chapter.
**Part 1 of Title 47 of the Code of Federal Regulations is amended to
read as follows:**
Part 1 -- PRACTICE AND PROCEDURE
3\. The Authority citations for Part 1 continue to read as follows:
Authority: 47 U.S.C. 151, 154(i), 154(j), 155, 225, 303, and 309, unless
otherwise noted.
4\. Section 1.721 is amended by revising paragraph (a)(13) to read as
follows:
[§ 1.721 Format and content of complaints.]{.underline}
**\* \* \* \* \***
> \(a\) (13) A declaration, under penalty of perjury, by the complainant
> or complainant's counsel describing the amount, method, and date of
> the complainant\'s payment of the filing fee required under §
> 1.1106(1)(c) or (d) and the complainant's 10-digit FCC Registration
> Number, if any;
**\* \* \* \* \***
5\. Section 1.735 is amended by revising paragraph (b) and paragraph
(b)(4) to read as follows:
[§ 1.735 Copies; service; separate filings against multiple
defendants]{.underline}**.**
**\* \* \* \* \***
> (b)The complainant shall file an original copy of the complaint,
> accompanied by the correct fee, in accordance with part I, subpart G
> (see § 1.1106) and, on the same day:
\* \* \* \* \*
> (b)(4) If a complaint is addressed against multiple defendants, pay a
> separate fee, in accordance with part I, subpart G (see § 1.1106), and
> file three copies of the complaint with the Office of the Commission
> Secretary for each additional defendant.
6\. Section 1.1111 is amended by revising paragraph (a)(2) and paragraph
(c) to read as follows:
[§ 1.1111 Filing Locations]{.underline}.
\* \* \* \* \*
> (a)(2) Bills for collection will be paid at the Commission's lockbox
> bank at the address of the appropriate service as established in §§
> 1.1102 through 1.1107, as set forth on the bill sent by the
> Commission. Payments must be accompanied by the bill sent by the
> Commission. Payments must be accompanied by the bill to ensure proper
> credit.
>
> \* \* \* \* \*
>
> \(c\) Fees for applications and other filings pertaining to the
> Wireless Radio Services that are submitted electronically via ULS may
> be paid electronically or sent to the Commission\'s lock box bank
> manually. When paying manually, applicants must include the
> application file number (assigned by the ULS electronic filing system
> on FCC Form 159) and submit such number with the payment in order for
> the Commission to verify that the payment was made. Manual payments
> must be received no later than ten (10) days after receipt of the
> application on ULS or the application will be dismissed. Payment
> received more than ten (10) days after electronic filing of an
> application on a Bureau/Office electronic filing system (e.g., ULS)
> will be forfeited (see §§ 1.934 and 1.1109.)
\* \* \* \* \*
7\. Section 1.1113 is amended by revising paragraph (a)(6) to read as
follows:
[§ 1.1113 Return or refund of charges]{.underline}.
**\* \* \* \* \***
> \(6\) When an application for new or modified facilities is not timely
> filed in accordance with the filing window as established by the
> Commission in a public notice specifying the earliest and latest dates
> for filing such applications.
\(b\) Comparative hearings are no longer required.
> \(c\) Applicants in the Media Services for first-come, first-served
> construction permits will be entitled to a refund of the fee, if,
> within fifteen days of the issuance of a Public Notice.
\* \* \* \* \*
8\. Section 1.1114 is amended by revising the first paragraph to read as
follows:
[§ 1.1114 General exemptions to Charges]{.underline}.
No fee established in 1.1102 through 1.1107 of this subpart, unless
otherwise qualified herein, shall be
Required for:
\* \* \* \* \*
9\. Section 1.1115 is amended by revising paragraph (a) and paragraph
(a)(2) to read as follows:
[§ 1.1115 Adjustment to Charges]{.underline}.
> \(a\) The Schedule of Charges established by Section 1.1102 through
> 1.1107 of this subpart shall be reviewed by the Commission on October
> 1, 1999 and every two years thereafter, and adjustments made, if any,
> will be reflected in the next publication of Schedule of Charges.
>
> \* \* \* \* \*
>
> (a)(2) Adjustments based upon the percentage change in the CPI-U will
> be applied against the base fees as enacted or amended by Congress in
> the year the fee was enacted or amended.
\* \* \* \* \*
10\. Section 1.1116 is amended by revising paragraph (a) to read as
follows:
[§ 1.1116 Penalty for late or insufficient payments]{.underline}**.**
> \(a\) Filings subject to fees and accompanied by defective fee
> submissions will be dismissed under § 1.1109(d) of this subpart where
> the defect is discovered by the Commission\'s staff within 30 calendar
> days from the receipt of the application or filing by the Commission.
\* \* \* \* \*
11\. Section 1.1119 is amended by revising paragraph (a) to read as
follows:
[§ 1.1119 Billing procedures]{.underline}**.**
> \(a\) The fees required for the International Telecommunications
> Settlements (§ 1.1103 of this subpart), Accounting and Audits Field
> Audits and Review of Arrest Audits (§ 1.1106 of this subpart) should
> not be paid with the filing or submission of the request. The fees
> required for requests for Special Temporary Authority (see generally
> §§1.1102, 1.1104, 1.1106 & 1.1107 of this subpart) that the applicant
> believes is of an urgent or emergency nature and are filed directly
> with the appropriate Bureau or Office should not be paid with the
> filing of the request with that Bureau or Office.
\* \* \* \* \*
------------------------------------------------------------- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- --
**APPENDIX B**
**SCHEDULE OF STATUTORY CHARGES AND PROCEDURES FOR PAYMENT**
**Part 1 of Title 47 of the Code of Federal Regulations is
amended to read as follows:**
**Part 1 - Practice and Procedure**
**1. The authority citation for Part 1 continues to read as
follows:**
**Authority: 47 U.S.C. 154, 303, 503(b)(5); 5 U.S.C. 552 and
21 U.S.C. 853a, unless otherwise noted.**
**2. Section 1.1102 is revised to read as follows:**
**[§1.1102 Schedule of charges for applications and other
filings in the wireless telecommunications
services.]{.underline}**
**Those services designated with an asterisk in the payment
type code column have associated regulatory fees that must**
**be paid at the same time the application fee is paid.**
**Please refer to §1.1152 for the appropriate regulatory**
**fee that must be paid for this service.**
------------------------------------------------------------- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- --
+--------------------+--------+--------+------+----------------------+
| **Service** | **FCC | * | **P | **Address** |
| | Form | *Fee** | ayme | |
| | No.** | | nt** | |
| | | **Am | | |
| | | ount** | **Ty | |
| | | | pe** | |
| | | | | |
| | | | **Co | |
| | | | de** | |
+====================+========+========+======+======================+
| **1. Marine | 601 & | \$ | PB | Federal |
| Coast** | 159 | 105.00 | MR\* | Communications |
| | | | | Commission |
| a\. New; | | | | |
| | | | | Wireless Bureau |
| Re | | | | Applications |
| newal/Modification | | | | |
| | | | | P.O. Box 358130 |
| | | | | |
| | | | | Pittsburgh, PA |
| | | | | 15251-5130 |
+--------------------+--------+--------+------+----------------------+
| b\. Modification, | 601 & | \$ | PBMM | Federal |
| | 159 | 105.00 | | Communications |
| Public Coast CMRS; | | | | Commission |
| | | | | |
| Non-Profit | | | | Wireless Bureau |
| | | | | Applications |
| | | | | |
| | | | | P.O. Box 358130 |
| | | | | |
| | | | | Pittsburgh, PA |
| | | | | 15251-5130 |
+--------------------+--------+--------+------+----------------------+
| c\. Assignment of | 603 & | \$ | PBMM | Federal |
| Authorization | 159 | 105.00 | | Communications |
| | | | | Commission |
| | | | | |
| | | | | Wireless Bureau |
| | | | | Applications |
| | | | | |
| | | | | P.O. Box 358130 |
| | | | | |
| | | | | Pittsburgh, PA |
| | | | | 15251-5130 |
+--------------------+--------+--------+------+----------------------+
| d\. Transfer of | 603 & | \ | PATM | Federal |
| Control | 159 | $55.00 | | Communications |
| | | | | Commission |
| | | | | |
| | | | | Wireless Bureau |
| | | | | Applications |
| | | | | |
| | | | | P.O. Box 358130 |
| | | | | |
| | | | | Pittsburgh, PA |
| | | | | 15251-5130 |
+--------------------+--------+--------+------+----------------------+
| e\. Duplicate | 601 & | \ | PADM | Federal |
| License | 159 | $55.00 | | Communications |
| | | | | Commission |
| | | | | |
| | | | | Wireless Bureau |
| | | | | Applications |
| | | | | |
| | | | | P.O. Box 358130 |
| | | | | |
| | | | | Pittsburgh, PA |
| | | | | 15251-5130 |
+--------------------+--------+--------+------+----------------------+
| f\. Special | 601 & | \$ | PCMM | Federal |
| Temporary | 159 | 150.00 | | Communications |
| Authority | | | | Commission |
| | | | | |
| | | | | Wireless Bureau |
| | | | | Applications |
| | | | | |
| | | | | P.O. Box 358130 |
| | | | | |
| | | | | Pittsburgh, PA |
| | | | | 15251-5130 |
+--------------------+--------+--------+------+----------------------+
| g\. Renewal Only | 601 & | \$ | PB | Federal |
| | 159 | 105.00 | MR\* | Communications |
| | | | | Commission |
| | | | | |
| | | | | Wireless Bureau |
| | | | | Applications |
| | | | | |
| | | | | P.O. Box 358245 |
| | | | | |
| | | | | Pittsburgh, PA |
| | | | | 15251-5245 |
+--------------------+--------+--------+------+----------------------+
| h\. Renewal | 601 & | \$ | PB | Federal |
| | 159 | 105.00 | MR\* | Communications |
| (Electronic | | | | Commission |
| Filing) | | | | |
| | | | | Wireless Bureau |
| | | | | Applications (ELT) |
| | | | | |
| | | | | P.O. Box 358994 |
| | | | | |
| | | | | Pittsburgh, PA |
| | | | | 15251-5994 |
+--------------------+--------+--------+------+----------------------+
| i\. Renewal Only | 601 & | \$ | PBMM | Federal |
| | 159 | 105.00 | | Communications |
| (Non-Profit; CMRS) | | | | Commission |
| | | | | |
| | | | | Wireless Bureau |
| | | | | Applications |
| | | | | |
| | | | | P.O. Box 358245 |
| | | | | |
| | | | | Pittsburgh, PA |
| | | | | 15251-5245 |
+--------------------+--------+--------+------+----------------------+
| j\. Renewal | 601 & | \$ | PBMM | Federal |
| (Electronic | 159 | 105.00 | | Communications |
| Filing) | | | | Commission |
| | | | | |
| Non-profit, CMRS | | | | Wireless Bureau |
| | | | | Applications |
| | | | | |
| | | | | P.O. Box 358994 |
| | | | | |
| | | | | Pittsburgh, PA |
| | | | | 15251-5994 |
+--------------------+--------+--------+------+----------------------+
| k\. Rule Waiver | 601 & | \$ | PDWM | Federal |
| | 159 | 155.00 | | Communications |
| | | | | Commission |
| | | | | |
| | | | | Wireless Bureau |
| | | | | Applications |
| | | | | |
| | | | | P.O. Box 358130 |
| | | | | |
| | | | | Pittsburgh, PA |
| | | | | 15251-5130 |
+--------------------+--------+--------+------+----------------------+
| **2. Aviation | 601 & | \$ | PB | Federal |
| Ground** | 159 | 105.00 | VR\* | Communications |
| | | | | Commission |
| a\. New; | | | | |
| | | | | Wireless Bureau |
| Re | | | | Applications |
| newal/Modification | | | | |
| | | | | P.O. Box 358130 |
| | | | | |
| | | | | Pittsburgh, PA |
| | | | | 15251-5130 |
+--------------------+--------+--------+------+----------------------+
| b\. Modification; | 601 & | \$ | PBVM | Federal |
| | 159 | 105.00 | | Communications |
| Non-Profit | | | | Commission |
| | | | | |
| | | | | Wireless Bureau |
| | | | | Applications |
| | | | | |
| | | | | P.O. Box 358130 |
| | | | | |
| | | | | Pittsburgh, PA |
| | | | | 15251-5130 |
+--------------------+--------+--------+------+----------------------+
| c\. Assignment of | 603 & | \$ | PBVM | Federal |
| Authorization | 159 | 105.00 | | Communications |
| | | | | Commission |
| | | | | |
| | | | | Wireless Bureau |
| | | | | Applications |
| | | | | |
| | | | | P.O. Box 358130 |
| | | | | |
| | | | | Pittsburgh, PA |
| | | | | 15251-5130 |
+--------------------+--------+--------+------+----------------------+
| d\. Transfer of | 603 & | \ | PATM | Federal |
| Control | 159 | $55.00 | | Communications |
| | | | | Commission |
| | | | | |
| | | | | Wireless Bureau |
| | | | | Applications |
| | | | | |
| | | | | P.O. Box 358130 |
| | | | | |
| | | | | Pittsburgh, PA |
| | | | | 15251-5130 |
+--------------------+--------+--------+------+----------------------+
| e\. Duplicate | 601 & | \ | PADM | Federal |
| License | 159 | $55.00 | | Communications |
| | | | | Commission |
| | | | | |
| | | | | Wireless Bureau |
| | | | | Applications |
| | | | | |
| | | | | P.O. Box 358130 |
| | | | | |
| | | | | Pittsburgh, PA |
| | | | | 15251-5130 |
+--------------------+--------+--------+------+----------------------+
| f\. Special | 601 & | \$ | PCVM | Federal |
| Temporary | 159 | 150.00 | | Communications |
| Authority | | | | Commission |
| | | | | |
| | | | | Wireless Bureau |
| | | | | Applications |
| | | | | |
| | | | | P.O. Box 358130 |
| | | | | |
| | | | | Pittsburgh, PA |
| | | | | 15251-5130 |
+--------------------+--------+--------+------+----------------------+
| g\. Renewal Only | 601 & | \$ | PB | Federal |
| | 159 | 105.00 | VR\* | Communications |
| | | | | Commission |
| | | | | |
| | | | | Wireless Bureau |
| | | | | Applications |
| | | | | |
| | | | | P.O. Box 358245 |
| | | | | |
| | | | | Pittsburgh, PA |
| | | | | 15251-5245 |
+--------------------+--------+--------+------+----------------------+
| h\. Renewal | 601 & | \$ | PB | Federal |
| (Electronic | 159 | 105.00 | VR\* | Communications |
| Filing) | | | | Commission |
| | | | | |
| | | | | Wireless Bureau |
| | | | | Applications (ELT) |
| | | | | |
| | | | | P.O. Box 358994 |
| | | | | |
| | | | | Pittsburgh, PA |
| | | | | 15251-5994 |
+--------------------+--------+--------+------+----------------------+
| i\. Renewal Only | 601 & | \$ | PBVM | Federal |
| | 159 | 105.00 | | Communications |
| (Non-Profit) | | | | Commission |
| | | | | |
| | | | | Wireless Bureau |
| | | | | Applications |
| | | | | |
| | | | | P.O. Box 358245 |
| | | | | |
| | | | | Pittsburgh, PA |
| | | | | 15251-5245 |
+--------------------+--------+--------+------+----------------------+
| j\. Renewal | 601 & | \$ | PBVM | Federal |
| (Electronic | 159 | 105.00 | | Communications |
| Filing) | | | | Commission |
| | | | | |
| (Non-Profit) | | | | Wireless Bureau |
| | | | | Applications (ELT) |
| | | | | |
| | | | | P.O. Box 358994 |
| | | | | |
| | | | | Pittsburgh, PA |
| | | | | 15251-5994 |
+--------------------+--------+--------+------+----------------------+
| k.. Rule Waiver | 601 & | \$ | PDWM | Federal |
| | 159 | 155.00 | | Communications |
| | | | | Commission |
| | | | | |
| | | | | Wireless Bureau |
| | | | | Applications |
| | | | | |
| | | | | P.O. Box 358130 |
| | | | | |
| | | | | Pittsburgh, PA |
| | | | | 15251-5130 |
+--------------------+--------+--------+------+----------------------+
| **3. Ship** | 605 & | \ | PA | Federal |
| | 159 | $55.00 | SR\* | Communications |
| a\. New, Renewal | | | | Commission |
| | | | | |
| Re | | | | Wireless Bureau |
| newal/Modification | | | | Applications |
| | | | | |
| | | | | P.O. Box 358130 |
| | | | | |
| | | | | Pittsburgh, PA |
| | | | | 15251-5130 |
+--------------------+--------+--------+------+----------------------+
| b\. New, Renewal | 605 & | \ | PA | Federal |
| | 159 | $55.00 | SR\* | Communications |
| Re | | | | Commission |
| newal/Modification | | | | |
| | | | | Wireless Bureau |
| (Electronic | | | | Applications (ELT) |
| Filing) | | | | |
| | | | | P.O. Box 358994 |
| | | | | |
| | | | | Pittsburgh, PA |
| | | | | 15251-5994 |
+--------------------+--------+--------+------+----------------------+
| c\. Renewal Only | 605 & | \ | PASM | Federal |
| | 159 | $55.00 | | Communications |
| (Non-profit) | | | | Commission |
| | | | | |
| | | | | Wireless Bureau |
| | | | | Applications |
| | | | | |
| | | | | P.O. Box 358130 |
| | | | | |
| | | | | Pittsburgh, PA |
| | | | | 15251-5130 |
+--------------------+--------+--------+------+----------------------+
| d Renewal Only | 605 & | \ | PASM | Federal |
| | 159 | $55.00 | | Communications |
| (Non-profit) | | | | Commission |
| | | | | |
| (Electronic | | | | Wireless Bureau |
| Filing) | | | | Applications (ELT) |
| | | | | |
| | | | | P.O. Box 358994 |
| | | | | |
| | | | | Pittsburgh, PA |
| | | | | 15251-5994 |
+--------------------+--------+--------+------+----------------------+
| e\. Modification | 605 & | \ | PASM | Federal |
| | 159 | $55.00 | | Communications |
| (Non-profit) | | | | Commission |
| | | | | |
| | | | | Wireless Bureau |
| | | | | Applications |
| | | | | |
| | | | | P.O. Box 358130 |
| | | | | |
| | | | | Pittsburgh, PA |
| | | | | 15251-5130 |
+--------------------+--------+--------+------+----------------------+
| f\. Modification | 605 & | \ | PASM | Federal |
| | 159 | $55.00 | | Communications |
| (Non-profit) | | | | Commission |
| | | | | |
| (Electronic | | | | Wireless Bureau |
| Filing) | | | | Applications (ELT) |
| | | | | |
| | | | | P.O. Box 358994 |
| | | | | |
| | | | | Pittsburgh, PA |
| | | | | 15251-5994 |
+--------------------+--------+--------+------+----------------------+
| g\. Duplicate | 605 & | \ | PADM | Federal |
| License | 159 | $55.00 | | Communications |
| | | | | Commission |
| | | | | |
| | | | | Wireless Bureau |
| | | | | Applications |
| | | | | |
| | | | | P.O. Box 358130 |
| | | | | |
| | | | | Pittsburgh, PA |
| | | | | 15251-5130 |
+--------------------+--------+--------+------+----------------------+
| h\. Duplicate | 605 & | \ | PADM | Federal |
| License | 159 | $55.00 | | Communications |
| | | | | Commission |
| (Electronic | | | | |
| Filing) | | | | Wireless Bureau |
| | | | | Applications (ELT) |
| | | | | |
| | | | | P.O. Box 358994 |
| | | | | |
| | | | | Pittsburgh, PA |
| | | | | 15251-5994 |
+--------------------+--------+--------+------+----------------------+
| i\. Exemption from | 605 & | \$ | PDWM | Federal |
| Ship Station | 159 | 155.00 | | Communications |
| | | | | Commission |
| Requirements | | | | |
| | | | | Wireless Bureau |
| | | | | Applications |
| | | | | |
| | | | | P.O. Box 358130 |
| | | | | |
| | | | | Pittsburgh, PA |
| | | | | 15251-5130 |
+--------------------+--------+--------+------+----------------------+
| j\. Rule Waiver | 605 & | \$ | PDWM | Federal |
| | 159 | 155.00 | | Communications |
| | | | | Commission |
| | | | | |
| | | | | Wireless Bureau |
| | | | | Applications |
| | | | | |
| | | | | P.O. Box 358130 |
| | | | | |
| | | | | Pittsburgh, PA |
| | | | | 15251-5130 |
+--------------------+--------+--------+------+----------------------+
| k\. Exemption from | 605 & | \$ | PDWM | Federal |
| Ship Station | 159 | 155.00 | | Communications |
| | | | | Commission |
| Requirements | | | | |
| | | | | Wireless Bureau |
| (Electronic | | | | Applications - ELT |
| Filing) | | | | |
| | | | | P.O. Box 358994 |
| | | | | |
| | | | | Pittsburgh, PA |
| | | | | 15251-5994 |
+--------------------+--------+--------+------+----------------------+
| l\. Rule Waiver | 605 & | \$ | PDWM | Federal |
| | 159 | 155.00 | | Communications |
| (Electronic | | | | Commission |
| Filing) | | | | |
| | | | | Wireless Bureau |
| | | | | Applications - ELT |
| | | | | |
| | | | | P.O. Box 358994 |
| | | | | |
| | | | | Pittsburgh, PA |
| | | | | 15251-5994 |
+--------------------+--------+--------+------+----------------------+
| **4. Aircraft** | 605 & | \ | PA | Federal |
| | 159 | $55.00 | AR\* | Communications |
| New; | | | | Commission |
| | | | | |
| Re | | | | Wireless Bureau |
| newal/Modification | | | | Applications |
| | | | | |
| | | | | P.O. Box 358130 |
| | | | | |
| | | | | Pittsburgh, PA |
| | | | | 15251-5130 |
+--------------------+--------+--------+------+----------------------+
| b\. New; | 605 & | \ | PA | Federal |
| Re | 159 | $55.00 | AR\* | Communications |
| newal/Modification | | | | Commission |
| | | | | |
| (Electronic | | | | Wireless Bureau |
| Filing) | | | | Applications (ELT) |
| | | | | |
| | | | | P.O. Box 358994 |
| | | | | |
| | | | | Pittsburgh, PA |
| | | | | 15251-5994 |
+--------------------+--------+--------+------+----------------------+
| c\. Modification | 605 & | \ | PAAM | Federal |
| | 159 | $55.00 | | Communications |
| Non-Profit | | | | Commission |
| | | | | |
| | | | | Wireless Bureau |
| | | | | Applications |
| | | | | |
| | | | | P.O. Box 358130 |
| | | | | |
| | | | | Pittsburgh, PA |
| | | | | 15251-5130 |
+--------------------+--------+--------+------+----------------------+
| d\. Modification; | 605 & | \ | PAAM | Federal |
| | 159 | $55.00 | | Communications |
| (Electronic | | | | Commission |
| Filing) | | | | |
| | | | | Wireless Bureau |
| | | | | Applications (ELT) |
| | | | | |
| | | | | P.O. Box 358994 |
| | | | | |
| | | | | Pittsburgh, PA |
| | | | | 15251-5994 |
+--------------------+--------+--------+------+----------------------+
| e\. Renewal Only | 605 & | \ | PA | Federal |
| | 159 | $55.00 | AR\* | Communications |
| | | | | Commission |
| | | | | |
| | | | | Wireless Bureau |
| | | | | Applications |
| | | | | |
| | | | | P.O. Box 358245 |
| | | | | |
| | | | | Pittsburgh, PA |
| | | | | 15251-5245 |
+--------------------+--------+--------+------+----------------------+
| f\. Renewal | 605 & | \ | PA | Federal |
| | 159 | $55.00 | AR\* | Communications |
| (Electronic | | | | Commission |
| Filing) | | | | |
| | | | | Wireless Bureau |
| | | | | Applications (ELT) |
| | | | | |
| | | | | P.O. Box 358994 |
| | | | | |
| | | | | Pittsburgh, PA |
| | | | | 15251-5994 |
+--------------------+--------+--------+------+----------------------+
| g\. Renewal Only | 605 & | \ | PAAM | Federal |
| | 159 | $55.00 | | Communications |
| (Non-Profit) | | | | Commission |
| | | | | |
| | | | | Wireless Bureau |
| | | | | Applications |
| | | | | |
| | | | | P.O. Box 358245 |
| | | | | |
| | | | | Pittsburgh, PA |
| | | | | 15251-5245 |
+--------------------+--------+--------+------+----------------------+
| h\. Renewal; | 605 & | \ | PAAM | Federal |
| Renewal/ | 159 | $55.00 | | Communications |
| | | | | Commission |
| Modification | | | | |
| | | | | Wireless Bureau |
| (Non-Profit) | | | | Applications (ELT) |
| | | | | |
| (Electronic | | | | P.O. Box 358994 |
| Filing) | | | | |
| | | | | Pittsburgh, PA |
| | | | | 15251-5994 |
+--------------------+--------+--------+------+----------------------+
| I. Duplicate | 605 & | \ | PADM | Federal |
| License | 159 | $55.00 | | Communications |
| | | | | Commission |
| | | | | |
| | | | | Wireless Bureau |
| | | | | Applications |
| | | | | |
| | | | | P.O. Box 358130 |
| | | | | |
| | | | | Pittsburgh, PA |
| | | | | 15251-5130 |
+--------------------+--------+--------+------+----------------------+
| j\. Duplicate | 605 & | \ | PADM | Federal |
| License | 159 | $55.00 | | Communications |
| | | | | Commission |
| (Electronic | | | | |
| Filing) | | | | Wireless Bureau |
| | | | | Applications (ELT) |
| | | | | |
| | | | | P.O. Box 358994 |
| | | | | |
| | | | | Pittsburgh, PA |
| | | | | 15251-5994 |
+--------------------+--------+--------+------+----------------------+
| k.. Rule Waiver | 605 & | \$ | PDWM | Federal |
| | 159 | 155.00 | | Communications |
| | | | | Commission |
| | | | | |
| | | | | Wireless Bureau |
| | | | | Applications |
| | | | | |
| | | | | P.O. Box 358130 |
| | | | | |
| | | | | Pittsburgh, PA |
| | | | | 15251-5130 |
+--------------------+--------+--------+------+----------------------+
| l\. Rule Waiver | 605 & | \$ | PDWM | Federal |
| | 159 | 155.00 | | Communications |
| (Electronic | | | | Commission |
| Filing) | | | | |
| | | | | Wireless Bureau |
| | | | | Applications (ELT) |
| | | | | |
| | | | | P.O. Box 358994 |
| | | | | |
| | | | | Pittsburgh, PA |
| | | | | 15251-5994 |
+--------------------+--------+--------+------+----------------------+
| **5. Private | 601 & | \$ | PE | Federal |
| Operational | 159 | 230.00 | OR\* | Communications |
| Fixed** | | | | Commission |
| | | | | |
| **Microwave and | | | | Wireless Bureau |
| Private** | | | | Applications |
| | | | | |
| **DEMS** | | | | P.O. Box 358130 |
| | | | | |
| a\. New; | | | | Pittsburgh, PA |
| Re | | | | 15251-5130 |
| newal/Modification | | | | |
+--------------------+--------+--------+------+----------------------+
| b\. New; | 601 & | \$ | PE | Federal |
| | 159 | 230.00 | OR\* | Communications |
| Re | | | | Commission |
| newal/Modification | | | | |
| | | | | Wireless Bureau |
| (Electronic | | | | Applications (ELT) |
| Filing) | | | | |
| | | | | P.O. Box 358994 |
| | | | | |
| | | | | Pittsburgh, PA |
| | | | | 15251-5994 |
+--------------------+--------+--------+------+----------------------+
| c\. Modification; | 601 & | \$ | PEOM | Federal |
| | 159 | 230.00 | | Communications |
| Consolidate Call | | | | Commission |
| Signs; | | | | |
| | | | | Wireless Bureau |
| Non-Profit | | | | Applications |
| | | | | |
| | | | | P.O. Box 358130 |
| | | | | |
| | | | | Pittsburgh, PA |
| | | | | 15251-5130 |
+--------------------+--------+--------+------+----------------------+
| d\. Modification; | 601 & | \$ | PEOM | Federal |
| | 159 | 230.00 | | Communications |
| Consolidate Call | | | | Commission |
| Signs; | | | | |
| | | | | Wireless Bureau |
| Non-Profit | | | | Applications (ELT) |
| | | | | |
| (Electronic | | | | P.O. Box 358994 |
| Filing) | | | | |
| | | | | Pittsburgh, PA |
| | | | | 15251-5994 |
+--------------------+--------+--------+------+----------------------+
| e\. Renewal Only | 601 & | \$ | PE | Federal |
| | 159 | 230.00 | OR\* | Communications |
| | | | | Commission |
| | | | | |
| | | | | Wireless Bureau |
| | | | | Applications |
| | | | | |
| | | | | P.O. Box 358245 |
| | | | | |
| | | | | Pittsburgh, PA |
| | | | | 15251-5245 |
+--------------------+--------+--------+------+----------------------+
| f\. Renewal | 601 & | \$ | PE | Federal |
| | 159 | 230.00 | OR\* | Communications |
| (Electronic | | | | Commission |
| Filing) | | | | |
| | | | | Wireless Bureau |
| | | | | Applications (ELT) |
| | | | | |
| | | | | P.O. Box 358994 |
| | | | | |
| | | | | Pittsburgh, PA |
| | | | | 15251-5994 |
+--------------------+--------+--------+------+----------------------+
| g\. Renewal Only | 601 & | \$ | PEOM | Federal |
| | 159 | 230.00 | | Communications |
| (Non-Profit) | | | | Commission |
| | | | | |
| | | | | Wireless Bureau |
| | | | | Applications |
| | | | | |
| | | | | P.O. Box 358245 |
| | | | | |
| | | | | Pittsburgh, PA |
| | | | | 15251-5245 |
+--------------------+--------+--------+------+----------------------+
| h.. Renewal | 601 & | \$ | PEOM | Federal |
| | 159 | 230.00 | | Communications |
| (Non-Profit) | | | | Commission |
| | | | | |
| (Electronic | | | | Wireless Bureau |
| Filing) | | | | Applications (ELT) |
| | | | | |
| | | | | P.O. Box 358994 |
| | | | | |
| | | | | Pittsburgh, PA |
| | | | | 15251-5994 |
+--------------------+--------+--------+------+----------------------+
| i\. Assignment | 603 & | \$ | PEOM | Federal |
| | 159 | 230.00 | | Communications |
| (Electronic | | | | Commission |
| Filing) | | | | |
| | | | | Wireless Bureau |
| | | | | Applications |
| | | | | |
| | | | | P.O. Box 358130 |
| | | | | |
| | | | | Pittsburgh, PA |
| | | | | 15251-5130 |
+--------------------+--------+--------+------+----------------------+
| j\. Assignment | 603 & | \$ | PEOM | Federal |
| | 159 | 230.00 | | Communications |
| (Electronic | | | | Commission |
| Filing) | | | | |
| | | | | Wireless Bureau |
| | | | | Applications (ELT) |
| | | | | |
| | | | | P.O. Box 358994 |
| | | | | |
| | | | | Pittsburgh, PA |
| | | | | 15251-5994 |
+--------------------+--------+--------+------+----------------------+
| k\. Transfer of | 603 & | \ | PATM | Federal |
| Control; | 159 | $55.00 | | Communications |
| | | | | Commission |
| Spectrum Leasing | 603-T | | | |
| | & 159 | | | Wireless Bureau |
| | | | | Applications |
| | | | | |
| | | | | P.O. Box 358130 |
| | | | | |
| | | | | Pittsburgh, PA |
| | | | | 15251-5130 |
+--------------------+--------+--------+------+----------------------+
| l\. Transfer of | 603 & | \ | PATM | Federal |
| Control; | 159 | $55.00 | | Communications |
| | | | | Commission |
| Spectrum Leasing | 603-T | | | |
| | & 159 | | | Wireless Bureau |
| (Electronic | | | | Applications (ELT) |
| Filing) | | | | |
| | | | | P.O. Box 358994 |
| | | | | |
| | | | | Pittsburgh, PA |
| | | | | 15251-5994 |
+--------------------+--------+--------+------+----------------------+
| m\. Duplicate | 601 & | \ | PADM | Federal |
| License | 159 | $55.00 | | Communications |
| | | | | Commission |
| | | | | |
| | | | | Wireless Bureau |
| | | | | Applications |
| | | | | |
| | | | | P.O. Box 358130 |
| | | | | |
| | | | | Pittsburgh, PA |
| | | | | 15251-5130 |
+--------------------+--------+--------+------+----------------------+
| n\. Duplicate | 601 & | \ | PADM | Federal |
| License | 159 | $55.00 | | Communications |
| | | | | Commission |
| (Electronic | | | | |
| Filing) | | | | Wireless Bureau |
| | | | | Applications (ELT) |
| | | | | |
| | | | | P.O. Box 358994 |
| | | | | |
| | | | | Pittsburgh, PA |
| | | | | 15251-5994 |
+--------------------+--------+--------+------+----------------------+
| o\. Special | 601 & | \$5 | PAOM | Federal |
| Temporary | 159 | 055.00 | | Communications |
| Authority | | | | Commission |
| | | | | |
| | | | | Wireless Bureau |
| | | | | Applications |
| | | | | |
| | | | | P.O. Box 358130 |
| | | | | |
| | | | | Pittsburgh, PA |
| | | | | 15251-5130 |
+--------------------+--------+--------+------+----------------------+
| p\. Special | 601 & | \ | PAOM | Federal |
| Temporary | 159 | $55.00 | | Communications |
| Authority | | | | Commission |
| | | | | |
| (Electronic | | | | Wireless Bureau |
| Filing) | | | | Applications (ELT) |
| | | | | |
| | | | | P.O. Box 358994 |
| | | | | |
| | | | | Pittsburgh, PA |
| | | | | 15251-5994 |
+--------------------+--------+--------+------+----------------------+
| q\. Rule Waiver | 601 & | \$ | PDWM | Federal |
| | 159 | 155.00 | | Communications |
| | | | | Commission |
| | | | | |
| | | | | Wireless Bureau |
| | | | | Applications |
| | | | | |
| | | | | P.O. Box 358130 |
| | | | | |
| | | | | Pittsburgh, PA |
| | | | | 15251-5130 |
+--------------------+--------+--------+------+----------------------+
| r\. Rule Waiver | 601 & | \$ | PDWM | Federal |
| | 159 | 155.00 | | Communications |
| (Electronic | | | | Commission |
| Filing) | | | | |
| | | | | Wireless Bureau |
| | | | | Applications (ELT) |
| | | | | |
| | | | | P.O. Box 358994 |
| | | | | |
| | | | | Pittsburgh, PA |
| | | | | 15251-5994 |
+--------------------+--------+--------+------+----------------------+
| **6. Land Mobile** | 601 & | \ | PA | Federal |
| | 159 | $55.00 | LR\* | Communications |
| PMRS; Intelligent | | | | Commission |
| | | | | |
| Transportation | | | | Wireless Bureau |
| Service | | | | Applications |
| | | | | |
| a\. New or | | | | P.O. Box 358130 |
| Re | | | | |
| newal/Modification | | | | Pittsburgh, PA |
| | | | | 15251-5130 |
| (Frequencies below | | | | |
| 470 MHz (except | | | | |
| 220 MHz) | | | | |
| | | | | |
| 902-928 MHz & RS | | | | |
+--------------------+--------+--------+------+----------------------+
| b\. New or | 601 & | \ | PA | Federal |
| Re | 159 | $55.00 | LR\* | Communications |
| newal/Modification | | | | Commission |
| | | | | |
| (Frequencies below | | | | Wireless Bureau |
| 470 MHz) | | | | Applications (ELT) |
| | | | | |
| (except 220 MHz) | | | | P.O. Box 358994 |
| | | | | |
| (Electronic | | | | Pittsburgh, PA |
| Filing) | | | | 15251-5994 |
+--------------------+--------+--------+------+----------------------+
| c\. New or | 601 & | \ | PA | Federal |
| Re | 159 | $55.00 | LS\* | Communications |
| newal/Modification | | | | Commission |
| | | | | |
| (Frequencies 470 | | | | Wireless Bureau |
| MHz) and | | | | Applications |
| | | | | |
| above and 220 MHz | | | | P.O. Box 358130 |
| Local) | | | | |
| | | | | Pittsburgh, PA |
| | | | | 15251-5130 |
+--------------------+--------+--------+------+----------------------+
| d\. New or | 601 & | \ | PA | Federal |
| Re | 159 | $55.00 | LS\* | Communications |
| newal/Modification | | | | Commission |
| | | | | |
| (Frequencies 470 | | | | Wireless Bureau |
| MHz) and | | | | Applications (ELT) |
| | | | | |
| above and 220 MHz | | | | P.O. Box 358994 |
| Local) | | | | |
| | | | | Pittsburgh, PA |
| (Electronic | | | | 15251-5994 |
| Filing) | | | | |
+--------------------+--------+--------+------+----------------------+
| e\. New or | 601 & | \ | PA | Federal |
| Re | 159 | $55.00 | LT\* | Communications |
| newal/Modification | | | | Commission |
| | | | | |
| (220 MHz | | | | Wireless Bureau |
| Nationwide) | | | | Applications |
| | | | | |
| | | | | P.O. Box 358130 |
| | | | | |
| | | | | Pittsburgh, PA |
| | | | | 15251-5130 |
+--------------------+--------+--------+------+----------------------+
| f\. New or | 601 & | \ | PA | Federal |
| Re | 159 | $55.00 | LT\* | Communications |
| newal/Modification | | | | Commission |
| | | | | |
| (220 MHz | | | | Wireless Bureau |
| Nationwide) | | | | Applications (ELT) |
| | | | | |
| (Electronic | | | | P.O. Box 358994 |
| Filing) | | | | |
| | | | | Pittsburgh, PA |
| | | | | 15251-5994 |
+--------------------+--------+--------+------+----------------------+
| g\. Modification; | 601 & | \ | PALM | Federal |
| | 159 | $55.00 | | Communications |
| Non-Profit; | | | | Commission |
| | | | | |
| For Profit Special | | | | Wireless Bureau |
| Emergency | | | | Applications |
| | | | | |
| and Public Safety; | | | | P.O. Box 358130 |
| and CMRS | | | | |
| | | | | Pittsburgh, PA |
| | | | | 15251-5130 |
+--------------------+--------+--------+------+----------------------+
| h\. Modification; | 601 & | \ | PALM | Federal |
| | 159 | $55.00 | | Communications |
| Non-Profit; | | | | Commission |
| | | | | |
| For Profit Special | | | | Wireless Bureau |
| Emergency | | | | Applications (ELT) |
| | | | | |
| and Public Safety; | | | | P.O. Box 358994 |
| and CMRS | | | | |
| | | | | Pittsburgh, PA |
| (Electronic | | | | 15251-5994 |
| Filing) | | | | |
+--------------------+--------+--------+------+----------------------+
| I. Renewal Only | 601 & | \ | PA | Federal |
| | 159 | $55.00 | LR\* | Communications |
| | | | | Commission |
| | | \ | PA | |
| | | $55.00 | LS\* | Wireless Bureau |
| | | | | Applications |
| | | \ | PA | |
| | | $55.00 | LT\* | P.O. Box 358245 |
| | | | | |
| | | | | Pittsburgh, PA |
| | | | | 15251-5245 |
+--------------------+--------+--------+------+----------------------+
| j\. Renewal | 601 & | \ | PA | Federal |
| | 159 | $55.00 | LR\* | Communications |
| (Electronic | | | | Commission |
| Filing) | | \ | PA | |
| | | $55.00 | LS\* | Wireless Bureau |
| | | | | Applications (ELT) |
| | | \ | PA | |
| | | $55.00 | LT\* | P.O. Box 358994 |
| | | | | |
| | | | | Pittsburgh, PA |
| | | | | 15251-5994 |
+--------------------+--------+--------+------+----------------------+
| k\. Renewal Only | 601 & | \ | PALM | Federal |
| | 159 | $55.00 | | Communications |
| (Non-Profit; CMRS; | | | | Commission |
| | | | | |
| For-Profit Special | | | | Wireless Bureau |
| Emergency | | | | Applications |
| | | | | |
| and Public Safety) | | | | P.O. Box 358245 |
| | | | | |
| | | | | Pittsburg, PA |
| | | | | 15251-5245 |
+--------------------+--------+--------+------+----------------------+
| l\. Renewal | 601 & | \ | PALM | Federal |
| | 159 | $55.00 | | Communications |
| (Non-Profit; CMRS; | | | | Commission |
| | | | | |
| For-Profit Special | | | | Wireless Bureau |
| Emergency | | | | Applications (ELT) |
| | | | | |
| and Public Safety) | | | | P.O. Box 358994 |
| | | | | |
| (Electronic | | | | Pittsburgh, PA |
| Filing) | | | | 15251-5994 |
+--------------------+--------+--------+------+----------------------+
| m\. Assignment of | 603 & | \ | PALM | Federal |
| Authorization | 159 | $55.00 | | Communications |
| | | | | Commission |
| (PMRS & CMRS) | | | | |
| | | | | Wireless Bureau |
| | | | | Applications |
| | | | | |
| | | | | P.O. Box 358130 |
| | | | | |
| | | | | Pittsburg, PA |
| | | | | 15251-5130 |
+--------------------+--------+--------+------+----------------------+
| n\. Assignment of | 603 & | \ | PALM | Federal |
| Authorization | 159 | $55.00 | | Communications |
| | | | | Commission |
| (PMRS & CMRS) | | | | |
| | | | | Wireless Bureau |
| (Electronic | | | | Applications (ELT) |
| Filing) | | | | |
| | | | | P.O. Box 358994 |
| | | | | |
| | | | | Pittsburgh, PA |
| | | | | 15251-5994 |
+--------------------+--------+--------+------+----------------------+
| o\. Transfer of | 603 & | \ | PATM | Federal |
| Control | 159 | $55.00 | | Communications |
| | | | | Commission |
| (PMRS & CMRS); | 603-T | | | |
| | & 159 | | | Wireless Bureau |
| Spectrum Leasing | | | | Applications |
| | | | | |
| | | | | P.O. Box 358130 |
| | | | | |
| | | | | Pittsburgh, PA |
| | | | | 15251-5130 |
+--------------------+--------+--------+------+----------------------+
| p\. Transfer of | 603 & | \ | PATM | Federal |
| Control | 159 | $55.00 | | Communications |
| | | | | Commission |
| (PMRS & CMRS); | 603-T | | | |
| | & 159 | | | Wireless Bureau |
| Spectrum Leasing | | | | Applications (ELT) |
| | | | | |
| (Electronic | | | | P.O. Box 358994 |
| Filing) | | | | |
| | | | | Pittsburgh, PA |
| | | | | 15251-5994 |
+--------------------+--------+--------+------+----------------------+
| q\. Duplicate | 601 & | \ | PADM | Federal |
| License | 159 | $55.00 | | Communications |
| | | | | Commission |
| | | | | |
| | | | | Wireless Bureau |
| | | | | Applications |
| | | | | |
| | | | | P.O. Box 358130 |
| | | | | |
| | | | | Pittsburgh, PA |
| | | | | 15251-5130 |
+--------------------+--------+--------+------+----------------------+
| r\. Duplicate | 601 & | \ | PADM | Federal |
| License | 159 | $55.00 | | Communications |
| | | | | Commission |
| (Electronic | | | | |
| Filing) | | | | Wireless Bureau |
| | | | | Applications (ELT) |
| | | | | |
| | | | | P.O. Box 358994 |
| | | | | |
| | | | | Pittsburgh, PA |
| | | | | 15251-5994 |
+--------------------+--------+--------+------+----------------------+
| s\. Special | 601 & | \ | PALM | Federal |
| Temporary | 159 | $55.00 | | Communications |
| Authority | | | | Commission |
| | | | | |
| | | | | Wireless Bureau |
| | | | | Applications |
| | | | | |
| | | | | P.O. Box 358130 |
| | | | | |
| | | | | Pittsburgh, PA |
| | | | | 15251-5130 |
+--------------------+--------+--------+------+----------------------+
| t\. Special | 601 & | \ | PALM | Federal |
| Temporary | 159 | $55.00 | | Communications |
| Authority | | | | Commission |
| | | | | |
| (Electronic | | | | Wireless Bureau |
| Filing) | | | | Applications (ELT) |
| | | | | |
| | | | | P.O. Box 358994 |
| | | | | |
| | | | | Pittsburgh, PA |
| | | | | 15251-5994 |
+--------------------+--------+--------+------+----------------------+
| u\. Rule Waiver | 601 & | \$ | PDWM | Federal |
| | 159 | 155.00 | | Communications |
| | | | | Commission |
| | | | | |
| | | | | Wireless Bureau |
| | | | | Applications |
| | | | | |
| | | | | P.O. Box 358130 |
| | | | | |
| | | | | Pittsburgh, PA |
| | | | | 15251-5130 |
+--------------------+--------+--------+------+----------------------+
| v\. Rule Waiver | 601 & | \$ | PDWM | Federal |
| | 159 | 155.00 | | Communications |
| (Electronic | | | | Commission |
| Filing) | | | | |
| | | | | Wireless Bureau |
| | | | | Applications (ELT) |
| | | | | |
| | | | | P.O. Box 358994 |
| | | | | |
| | | | | Pittsburgh, PA |
| | | | | 15251-5994 |
+--------------------+--------+--------+------+----------------------+
| w\. Consolidate | 601 & | \ | PALM | Federal |
| Call Signs | 159 | $55.00 | | Communications |
| | | | | Commission |
| | | | | |
| | | | | Wireless Bureau |
| | | | | Applications |
| | | | | |
| | | | | P.O. Box 358130 |
| | | | | |
| | | | | Pittsburgh, PA |
| | | | | 15251-5130 |
+--------------------+--------+--------+------+----------------------+
| x\. Consolidate | 601 & | \ | PALM | Federal |
| Call Signs | 159 | $55.00 | | Communications |
| | | | | Commission |
| (Electronic | | | | |
| Filing) | | | | Wireless Bureau |
| | | | | Applications (ELT) |
| | | | | |
| | | | | P.O. Box 358994 |
| | | | | |
| | | | | Pittsburgh, PA |
| | | | | 15251-5994 |
+--------------------+--------+--------+------+----------------------+
| **7. 218-219 MHz | 601 & | \ | PA | Federal |
| (previously | 159 | $55.00 | IR\* | Communications |
| IVDS)** | | | | Commission |
| | | | | |
| a\. New; | | | | Wireless Bureau |
| | | | | Applications |
| Re | | | | |
| newal/Modification | | | | P.O. Box 358130 |
| | | | | |
| | | | | Pittsburgh, PA |
| | | | | 15251-5130 |
+--------------------+--------+--------+------+----------------------+
| b\. New; | 601 & | \ | PA | Federal |
| | 159 | $55.00 | IR\* | Communications |
| Re | | | | Commission |
| newal/Modification | | | | |
| | | | | Wireless Bureau |
| (Electronic | | | | Applications (ELT) |
| Filing) | | | | |
| | | | | P.O. Box 358994 |
| | | | | |
| | | | | Pittsburgh, PA |
| | | | | 15251-5994 |
+--------------------+--------+--------+------+----------------------+
| c\. Modification | 601 & | \ | PAIM | Federal |
| | 159 | $55.00 | | Communications |
| | | | | Commission |
| | | | | |
| | | | | Wireless Bureau |
| | | | | Applications |
| | | | | |
| | | | | P.O. Box 358130 |
| | | | | |
| | | | | Pittsburgh, PA |
| | | | | 15251-5130 |
+--------------------+--------+--------+------+----------------------+
| d\. Modification | 601 & | \ | PAIM | Federal |
| | 159 | $55.00 | | Communications |
| (Electronic | | | | Commission |
| Filing) | | | | |
| | | | | Wireless Bureau |
| | | | | Applications (ELT) |
| | | | | |
| | | | | P.O. Box 358994 |
| | | | | |
| | | | | Pittsburgh, PA |
| | | | | 15251-5994 |
+--------------------+--------+--------+------+----------------------+
| e\. Renewal Only | 601 & | \ | PA | Federal |
| | 159 | $55.00 | IR\* | Communications |
| | | | | Commission |
| | | | | |
| | | | | Wireless Bureau |
| | | | | Applications |
| | | | | |
| | | | | P.O. Box 358245 |
| | | | | |
| | | | | Pittsburg, PA |
| | | | | 15251-5245 |
+--------------------+--------+--------+------+----------------------+
| f\. Renewal | 601 & | \ | PA | Federal |
| | 159 | $55.00 | IR\* | Communications |
| (Electronic | | | | Commission |
| Filing) | | | | |
| | | | | Wireless Bureau |
| | | | | Applications (ELT) |
| | | | | |
| | | | | P.O. Box 358994 |
| | | | | |
| | | | | Pittsburgh, PA |
| | | | | 15251-5994 |
+--------------------+--------+--------+------+----------------------+
| g\. Assignment of | 603 & | \ | PAIM | Federal |
| Authorization | 159 | $55.00 | | Communications |
| | | | | Commission |
| | | | | |
| | | | | Wireless Bureau |
| | | | | Applications |
| | | | | |
| | | | | P.O. Box 358130 |
| | | | | |
| | | | | Pittsburgh, PA |
| | | | | 15251-5130 |
+--------------------+--------+--------+------+----------------------+
| h\. Assignment of | 603 & | \ | PAIM | Federal |
| Authorization | 159 | $55.00 | | Communications |
| | | | | Commission |
| (Electronic | | | | |
| Filing) | | | | Wireless Bureau |
| | | | | Applications (ELT) |
| | | | | |
| | | | | P.O. Box 358994 |
| | | | | |
| | | | | Pittsburgh, PA |
| | | | | 15251-5994 |
+--------------------+--------+--------+------+----------------------+
| i\. Transfer of | 603 & | \ | PATM | Federal |
| Control; | 159 | $55.00 | | Communications |
| | | | | Commission |
| Spectrum Leasing | 603-T | | | |
| | & 159 | | | Wireless Bureau |
| | | | | Applications |
| | | | | |
| | | | | P.O. Box 358130 |
| | | | | |
| | | | | Pittsburgh, PA |
| | | | | 15251-5130 |
+--------------------+--------+--------+------+----------------------+
| j\. Transfer of | 603 & | \ | PATM | Federal |
| Control; | 159 | $55.00 | | Communication |
| | | | | Commission |
| Spectrum Leasing | 603-T | | | |
| | & 159 | | | Wireless Bureau |
| **(Electronic | | | | Applications (ELT) |
| Filing)** | | | | |
| | | | | P.O. Box 358994 |
| | | | | |
| | | | | Pittsburgh, PA |
| | | | | 15251-5994 |
+--------------------+--------+--------+------+----------------------+
| k\. Duplicate | 601 & | \ | PADM | Federal |
| License | 159 | $55.00 | | Communications |
| | | | | Commission |
| | | | | |
| | | | | Wireless Bureau |
| | | | | Applications |
| | | | | |
| | | | | P.O. Box 358130 |
| | | | | |
| | | | | Pittsburgh, PA |
| | | | | 15251-5130 |
+--------------------+--------+--------+------+----------------------+
| l\. Duplicate | 601 & | \ | PADM | Federal |
| License | 159 | $55.00 | | Communications |
| | | | | Commission |
| **(Electronic | | | | |
| Filing)** | | | | Wireless Bureau |
| | | | | Applications (ELT) |
| | | | | |
| | | | | P.O. Box 358994 |
| | | | | |
| | | | | Pittsburgh, PA |
| | | | | 15251-5994 |
+--------------------+--------+--------+------+----------------------+
| m\. Special | 601 & | \ | PAIM | Federal |
| Temporary | 159 | $55.00 | | Communications |
| Authority | | | | Commission |
| | | | | |
| | | | | Wireless Bureau |
| | | | | Applications |
| | | | | |
| | | | | P.O. Box 358130 |
| | | | | |
| | | | | Pittsburgh, PA |
| | | | | 15251-5130 |
+--------------------+--------+--------+------+----------------------+
| n\. Special | 601 & | \ | PAIM | Federal |
| Temporary | 159 | $55.00 | | Communications |
| Authority | | | | Commission |
| | | | | |
| **(Electronic | | | | Wireless Bureau |
| Filing)** | | | | Applications (ELT) |
| | | | | |
| | | | | P.O. Box 358994 |
| | | | | |
| | | | | Pittsburgh, PA |
| | | | | 15251-5994 |
+--------------------+--------+--------+------+----------------------+
| **8. General | 605 & | \ | PA | Federal |
| Mobile Radio | 159 | $55.00 | ZR\* | Communications |
| (GMRS)** | | | | Commission |
| | | | | |
| a\. New; | | | | Wireless Bureau |
| | | | | Applications |
| Re | | | | |
| newal/Modification | | | | P.O. Box 358130 |
| | | | | |
| | | | | Pittsburgh, PA |
| | | | | 15251-5130 |
+--------------------+--------+--------+------+----------------------+
| b\. New; | 605 & | \ | PA | Federal |
| | 159 | $55.00 | ZR\* | Communications |
| Re | | | | Commission |
| newal/Modification | | | | |
| | | | | Wireless Bureau |
| **(Electronic | | | | Applications (ELT) |
| Filing)** | | | | |
| | | | | P.O. Box 358994 |
| | | | | |
| | | | | Pittsburgh, PA |
| | | | | 15251-5994 |
+--------------------+--------+--------+------+----------------------+
| c\. Modification | 605 & | \ | PAZM | Federal |
| | 159 | $55.00 | | Communications |
| | | | | Commission |
| | | | | |
| | | | | Wireless Bureau |
| | | | | Applications |
| | | | | |
| | | | | P.O. Box 358130 |
| | | | | |
| | | | | Pittsburgh, PA |
| | | | | 15251-5130 |
+--------------------+--------+--------+------+----------------------+
| d\. Modification | 605 & | \ | PAZM | Federal |
| | 159 | $55.00 | | Communications |
| **(Electronic | | | | Commission |
| Filing)** | | | | |
| | | | | Wireless Bureau |
| | | | | Applications (ELT) |
| | | | | |
| | | | | P.O. Box 358994 |
| | | | | |
| | | | | Pittsburgh, PA |
| | | | | 15251-5994 |
+--------------------+--------+--------+------+----------------------+
| e\. Renewal Only | 605 & | \ | PA | Federal |
| | 159 | $55.00 | ZR\* | Communications |
| | | | | Commission |
| | | | | |
| | | | | Wireless Bureau |
| | | | | Applications |
| | | | | |
| | | | | P.O. Box 358245 |
| | | | | |
| | | | | Pittsburgh, PA |
| | | | | 15251-5245 |
+--------------------+--------+--------+------+----------------------+
| f\. Renewal | 605 & | \ | PA | Federal |
| | 159 | $55.00 | ZR\* | Communications |
| **(Electronic | | | | Commission |
| Filing)** | | | | |
| | | | | Wireless Bureau |
| | | | | Applications (ELT) |
| | | | | |
| | | | | P.O. Box 358994 |
| | | | | |
| | | | | Pittsburgh, PA |
| | | | | 15251-5994 |
+--------------------+--------+--------+------+----------------------+
| g\. Duplicate | 605 & | \ | PADM | Federal |
| License | 159 | $55.00 | | Communications |
| | | | | Commission |
| | | | | |
| | | | | Wireless Bureau |
| | | | | Applications |
| | | | | |
| | | | | P.O. Box 358130 |
| | | | | |
| | | | | Pittsburgh, PA |
| | | | | 15251-5130 |
+--------------------+--------+--------+------+----------------------+
| h\. Duplicate | 605 & | \$5500 | PADM | Federal |
| License | 159 | | | Communications |
| | | | | Commission |
| **(Electronic | | | | |
| Filing)** | | | | Wireless Bureau |
| | | | | Applications (ELT) |
| | | | | |
| | | | | P.O. Box 358994 |
| | | | | |
| | | | | Pittsburgh, PA |
| | | | | 15251-5994 |
+--------------------+--------+--------+------+----------------------+
| I. Special | 605 & | \ | PAZM | Federal |
| Temporary | 159 | $55.00 | | Communications |
| Authority | | | | Commission |
| | | | | |
| | | | | Wireless Bureau |
| | | | | Applications |
| | | | | |
| | | | | P.O. Box 358130 |
| | | | | |
| | | | | Pittsburgh, PA |
| | | | | 15251-5130 |
+--------------------+--------+--------+------+----------------------+
| j\. Special | 605 & | \ | PAZM | Federal |
| Temporary | 159 | $55.00 | | Communications |
| Authority | | | | Commission |
| | | | | |
| **(Electronic | | | | Wireless Bureau |
| Filing)** | | | | Applications (ELT) |
| | | | | |
| | | | | P.O. Box 358994 |
| | | | | |
| | | | | Pittsburgh, PA |
| | | | | 15251-5994 |
+--------------------+--------+--------+------+----------------------+
| k\. Rule Waiver | 605 & | \$ | PDWM | Federal |
| | 159 | 155.00 | | Communications |
| | | | | Commission |
| | | | | |
| | | | | Wireless Bureau |
| | | | | Applications |
| | | | | |
| | | | | P.O. Box 358130 |
| | | | | |
| | | | | Pittsburgh, PA |
| | | | | 15251-5130 |
+--------------------+--------+--------+------+----------------------+
| l\. Rule Waiver | 605 & | \$ | PDWM | Federal |
| | 159 | 155.00 | | Communications |
| **(Electronic | | | | Commission |
| Filing)** | | | | |
| | | | | Wireless Bureau |
| | | | | Applications (ELT) |
| | | | | |
| | | | | P.O. Box 358994 |
| | | | | |
| | | | | Pittsburgh, PA |
| | | | | 15251-5994 |
+--------------------+--------+--------+------+----------------------+
| **9. Restricted | 605 & | \ | PARR | Federal |
| Radiotelephone** | 159 | $55.00 | | Communications |
| | | | | Commission |
| a\. New (Lifetime | 605 & | | | |
| Permit) | 159 | | | Wireless Bureau |
| | | | | Applications |
| New (Limited Use) | | | | |
| | | | | P.O. Box 358245 |
| | | | | |
| | | | | Pittsburgh, PA |
| | | | | 15251-5245 |
+--------------------+--------+--------+------+----------------------+
| b\. | 605 & | \ | PADM | Federal |
| Dup | 159 | $55.00 | | Communications |
| licate/Replacement | | | | Commission |
| Permit | 605& | | | |
| | 159 | | | Wireless Bureau |
| Dup | | | | Applications |
| licate/Replacement | | | | |
| Permit | | | | P.O. Box 358130 |
| | | | | |
| (Limited Use) | | | | Pittsburgh, PA |
| | | | | 15251-5130 |
+--------------------+--------+--------+------+----------------------+
| **10. Commercial | 605 & | \ | PACS | Federal |
| Radio Operator** | 159 | $55.00 | | Communications |
| | | | | Commission |
| a\. Renewal Only; | | | | |
| Renewal/ | | | | Wireless Bureau |
| | | | | Applications |
| Modification | | | | |
| | | | | P.O. Box 358245 |
| | | | | |
| | | | | Pittsburgh, PA |
| | | | | 15251-5245 |
+--------------------+--------+--------+------+----------------------+
| b\. Duplicate | 605 & | \ | PADM | Federal |
| | 159 | $55.00 | | Communications |
| | | | | Commission |
| | | | | |
| | | | | Wireless Bureau |
| | | | | Applications |
| | | | | |
| | | | | P.O. Box 358130 |
| | | | | |
| | | | | Pittsburgh, PA |
| | | | | 15251-5130 |
+--------------------+--------+--------+------+----------------------+
| **11. Hearing** | Corres | \$9, | PFHM | Federal |
| | & 159 | 920.00 | | Communications |
| | | | | Commission |
| | | | | |
| | | | | Wireless Bureau |
| | | | | Applications |
| | | | | |
| | | | | P.O. Box 358130 |
| | | | | |
| | | | | Pittsburgh, PA |
| | | | | 15251-5130 |
+--------------------+--------+--------+------+----------------------+
| **12. Common | 601 & | \$ | CJ | Federal |
| Carrier | 159 | 230.00 | PR\* | Communications |
| Microwave** | | | | Commission |
| | | | | |
| (Pt. To Pt., Local | | | | Wireless Bureau |
| TV Trans. & | | | | Applications (ELT) |
| | | | | |
| Millimeter Wave | | | | P.O. Box 358994 |
| Service) | | | | |
| | | | | Pittsburgh, PA |
| a\. New; | | | | 15251-5994 |
| | | | | |
| Re | | | | |
| newal/Modification | | | | |
| | | | | |
| (Electronic Filing | | | | |
| Required) | | | | |
+--------------------+--------+--------+------+----------------------+
| b\. Modification; | 601 & | \$ | CJPM | Federal |
| | 159 | 230.00 | | Communications |
| Consolidate Call | | | | Commission |
| Signs | | | | |
| | | | | Wireless Bureau |
| (Electronic Filing | | | | Applications (ELT) |
| Required) | | | | |
| | | | | P.O. Box 358994 |
| | | | | |
| | | | | Pittsburgh, PA |
| | | | | 15251-5994 |
+--------------------+--------+--------+------+----------------------+
| c\. Renewal | 601 & | \$ | CJ | Federal |
| | 159 | 230.00 | PR\* | Communications |
| (Electronic Filing | | | | Commission |
| Required) | | | | |
| | | | | Wireless Bureau |
| | | | | Applications (ELT) |
| | | | | |
| | | | | P.O. Box 358994 |
| | | | | |
| | | | | Pittsburgh, PA |
| | | | | 15251-5994 |
+--------------------+--------+--------+------+----------------------+
| d\. Assignment of | 603 & | \ | CCPM | Federal |
| Authorization; | 159 | $85.00 | | Communications |
| | | | CAPM | Commission |
| Transfer of | 603-T | \ | | |
| Control; | & 159 | $55.00 | | Wireless Bureau |
| | | | | Applications (ELT) |
| Spectrum Leasing | 603 | | | |
| | /603-T | | | P.O. Box 358994 |
| Additional | & 159 | | | |
| Stations | | | | Pittsburgh, PA |
| | | | | 15251-5994 |
| (Electronic Filing | | | | |
| Required) | | | | |
+--------------------+--------+--------+------+----------------------+
| e\. Duplicate | 601 & | \ | PADM | Federal |
| License | 159 | $55.00 | | Communications |
| | | | | Commission |
| (Electronic Filing | | | | |
| Required) | | | | Wireless Bureau |
| | | | | Applications (ELT) |
| | | | | |
| | | | | P.O. Box 358994 |
| | | | | |
| | | | | Pittsburgh, PA |
| | | | | 15251-5994 |
+--------------------+--------+--------+------+----------------------+
| f\. Extension of | 601 & | \ | CCPM | Federal |
| Construction | 159 | $85.00 | | Communications |
| | | | | Commission |
| Authority | | | | |
| | | | | Wireless Bureau |
| (Electronic Filing | | | | Applications (ELT) |
| Required) | | | | |
| | | | | P.O. Box 358994 |
| | | | | |
| | | | | Pittsburgh, PA |
| | | | | 15251-5994 |
+--------------------+--------+--------+------+----------------------+
| g\. Special | 601 & | \$ | CEPM | Federal |
| Temporary | 159 | 105.00 | | Communications |
| Authority | | | | Commission |
| | | | | |
| | | | | Wireless Bureau |
| | | | | Applications |
| | | | | |
| | | | | P.O. Box 358130 |
| | | | | |
| | | | | Pittsburgh, PA |
| | | | | 15251-5130 |
+--------------------+--------+--------+------+----------------------+
| h\. Special | 601 & | \$ | CEPM | Federal |
| Temporary | 159 | 105.00 | | Communications |
| Authority | | | | Commission |
| | | | | |
| (Electronic | | | | Wireless Bureau |
| Filing) | | | | Applications (ELT) |
| | | | | |
| | | | | P.O. Box 358994 |
| | | | | |
| | | | | Pittsburgh, PA |
| | | | | 15251-5994 |
+--------------------+--------+--------+------+----------------------+
| **13. Common | 601 & | \$ | CJ | Federal |
| Carrier | 159 | 230.00 | LR\* | Communications |
| Microwave** | | | | Commission |
| | | | | |
| **(DEMS)** | | | | Wireless Bureau |
| | | | | Applications (ELT) |
| a\. New; | | | | |
| Re | | | | P.O. Box 358994 |
| newal/Modification | | | | |
| | | | | Pittsburgh, PA |
| (Electronic Filing | | | | 15251-5994 |
| Required) | | | | |
+--------------------+--------+--------+------+----------------------+
| b\. Modification; | 601 & | \$ | CJLM | Federal |
| | 159 | 230.00 | | Communications |
| Consolidate Call | | | | Commission |
| Signs | | | | |
| | | | | Wireless Bureau |
| (Electronic Filing | | | | Applications (ELT) |
| Required) | | | | |
| | | | | P.O. Box 358994 |
| | | | | |
| | | | | Pittsburgh, PA |
| | | | | 15251-5994 |
+--------------------+--------+--------+------+----------------------+
| c\. Renewal | 601 & | \$ | CJ | Federal |
| | 159 | 230.00 | LR\* | Communications |
| (Electronic Filing | | | | Commission |
| Required) | | | | |
| | | | | Wireless Bureau |
| | | | | Applications (ELT) |
| | | | | |
| | | | | P.O. Box 358994 |
| | | | | |
| | | | | Pittsburgh, PA |
| | | | | 15251-5994 |
+--------------------+--------+--------+------+----------------------+
| d\. Assignment of | 603 & | \ | CCLM | Federal |
| Authorization; | 159 | $85.00 | | Communications |
| | | | CALM | Commission |
| Transfer of | 603-T | \ | | |
| Control; | & 159 | $55.00 | | Wireless Bureau |
| | | | | Applications (ELT) |
| Spectrum Leasing | 603 | | | |
| | /603-T | | | P.O. Box 358994 |
| Additional | & 159 | | | |
| Stations | | | | Pittsburgh, PA |
| | | | | 15251-5994 |
| (Electronic Filing | | | | |
| Required) | | | | |
+--------------------+--------+--------+------+----------------------+
| e\. Duplicate | 601 & | \ | PADM | Federal |
| License | 159 | $55.00 | | Communications |
| | | | | Commission |
| (Electronic Filing | | | | |
| Required) | | | | Wireless Bureau |
| | | | | Applications (ELT) |
| | | | | |
| | | | | P.O. Box 358994 |
| | | | | |
| | | | | Pittsburgh, PA |
| | | | | 15251-5994 |
+--------------------+--------+--------+------+----------------------+
| f\. Extension of | 601 & | \ | CCLM | Federal |
| Construction | 159 | $85.00 | | Communications |
| | | | | Commission |
| Authority | | | | |
| | | | | Wireless Bureau |
| (Electronic Filing | | | | Applications (ELT) |
| Required) | | | | |
| | | | | P.O. Box 358994 |
| | | | | |
| | | | | Pittsburgh, PA |
| | | | | 15251-5994 |
+--------------------+--------+--------+------+----------------------+
| g\. Special | 601 & | \$ | CELM | Federal |
| Temporary | 159 | 105.00 | | Communications |
| Authority | | | | Commission |
| | | | | |
| | | | | Wireless Bureau |
| | | | | Applications |
| | | | | |
| | | | | P.O. Box 358130 |
| | | | | |
| | | | | Pittsburgh, PA |
| | | | | 15251-5130 |
+--------------------+--------+--------+------+----------------------+
| h\. Special | 601 & | \$ | CELM | Federal |
| Temporary | 159 | 105.00 | | Communications |
| Authority | | | | Commission |
| | | | | |
| (Electronic | | | | Wireless Bureau |
| Filing) | | | | Applications (ELT) |
| | | | | |
| | | | | P.O. Box 358994 |
| | | | | |
| | | | | Pittsburgh, PA |
| | | | | 15251-5994 |
+--------------------+--------+--------+------+----------------------+
| **14. Broadcast | 601 & | \$ | MEA | Federal |
| Auxiliary** | 159 | 125.00 | | Communications |
| | | | | Commission |
| **(Aural and TV | | | | |
| Microwave)** | | | | Wireless Bureau |
| | | | | Applications |
| a\. New; | | | | |
| Modification; | | | | P.O. Box 358130 |
| | | | | |
| Re | | | | Pittsburgh, PA |
| newal/Modification | | | | 15251-5130 |
+--------------------+--------+--------+------+----------------------+
| b\. New; | 601 & | \$ | MEA | Federal |
| Modification; | 159 | 125.00 | | Communications |
| | | | | Commission |
| Re | | | | |
| newal/Modification | | | | Wireless Bureau |
| | | | | Applications (ELT) |
| (Electronic | | | | |
| Filing) | | | | P.O. Box 358994 |
| | | | | |
| | | | | Pittsburgh, PA |
| | | | | 15251-5994 |
+--------------------+--------+--------+------+----------------------+
| c\. Special | 601 & | \$ | MGA | Federal |
| Temporary | 159 | 150.00 | | Communications |
| Authority | | | | Commission |
| | | | | |
| | | | | Wireless Bureau |
| | | | | Applications |
| | | | | |
| | | | | P.O. Box 358130 |
| | | | | |
| | | | | Pittsburgh, PA |
| | | | | 15251-5130 |
+--------------------+--------+--------+------+----------------------+
| d\. Special | 601 & | \$ | MGA | Federal |
| Temporary | 159 | 150.00 | | Communications |
| Authority | | | | Commission |
| | | | | |
| (Electronic | | | | Wireless Bureau |
| Filing) | | | | Applications (ELT) |
| | | | | |
| | | | | P.O. Box 358994 |
| | | | | |
| | | | | Pittsburgh, PA |
| | | | | 15251-5994 |
+--------------------+--------+--------+------+----------------------+
| e\. Renewal Only | 601 & | \ | MAA | Federal |
| | 159 | $55.00 | | Communications |
| | | | | Commission |
| | | | | |
| | | | | Wireless Bureau |
| | | | | Applications |
| | | | | |
| | | | | P.O. Box 358245 |
| | | | | |
| | | | | Pittsburgh, PA |
| | | | | 15251-5245 |
+--------------------+--------+--------+------+----------------------+
| f\. Renewal | 601 & | \ | MAA | Federal |
| | 159 | $55.00 | | Communications |
| (Electronic | | | | Commission |
| Filing) | | | | |
| | | | | Wireless Bureau |
| | | | | Applications (ELT) |
| | | | | |
| | | | | P.O. Box 358994 |
| | | | | |
| | | | | Pittsburgh, PA |
| | | | | 15251-5994 |
+--------------------+--------+--------+------+----------------------+
| **15. Broadcast | 601 & | \$ | MEA | Federal |
| Auxiliary** | 159 | 125.00 | | Communications |
| | | | | Commission |
| **(Remote and Low | | | | |
| Power** | | | | Wireless Bureau |
| | | | | Applications |
| a\. New; | | | | |
| Modification | | | | P.O. Box 358130 |
| | | | | |
| Re | | | | Pittsburgh, PA |
| newal/Modification | | | | 15251-5130 |
+--------------------+--------+--------+------+----------------------+
| b\. New; | 601 & | \$ | MEA | Federal |
| Modification | 159 | 125.00 | | Communications |
| | | | | Commission |
| Re | | | | |
| newal/Modification | | | | Wireless Bureau |
| | | | | Applications (ELT) |
| (Electronic | | | | |
| Filing) | | | | P.O. Box 358994 |
| | | | | |
| | | | | Pittsburgh, PA |
| | | | | 15251-5994 |
+--------------------+--------+--------+------+----------------------+
| c\. Renewal Only | 601 & | \ | MAA | Federal |
| | 159 | $55.00 | | Communications |
| | | | | Commission |
| | | | | |
| | | | | Wireless Bureau |
| | | | | Applications |
| | | | | |
| | | | | P.O. Box 358245 |
| | | | | |
| | | | | Pittsburgh, PA |
| | | | | 15251-5245 |
+--------------------+--------+--------+------+----------------------+
| d\. Renewal | 601 & | \ | MAA | Federal |
| | 159 | $55.00 | | Communications |
| (Electronic | | | | Commission |
| Filing) | | | | |
| | | | | Wireless Bureau |
| | | | | Applications (ELT) |
| | | | | |
| | | | | P.O. Box 358994 |
| | | | | |
| | | | | Pittsburgh, PA |
| | | | | 15251-5994 |
+--------------------+--------+--------+------+----------------------+
| e\. Special | 601 & | \$ | MGA | Federal |
| Temporary | 159 | 150.00 | | Communications |
| Authority | | | | Commission |
| | | | | |
| | | | | Wireless Bureau |
| | | | | Applications |
| | | | | |
| | | | | P.O. Box 358130 |
| | | | | |
| | | | | Pittsburgh, PA |
| | | | | 15251-5130 |
+--------------------+--------+--------+------+----------------------+
| f\. Special | 601 & | \$ | MGA | Federal |
| Temporary | 159 | 150.00 | | Communications |
| Authority | | | | Commission |
| | | | | |
| (Electronic | | | | Wireless Bureau |
| Filing) | | | | Applications (ELT) |
| | | | | |
| | | | | P.O. Box 358994 |
| | | | | |
| | | | | Pittsburgh, PA |
| | | | | 15251-5994 |
+--------------------+--------+--------+------+----------------------+
| **16. Pt 22 Paging | 601 & | \$ | CMD | Federal |
| & Radiotelephone** | 159 | 340.00 | | Communications |
| | | | | Commission |
| a\. New; Major | | | | |
| Mod; Additional | | | | Wireless Bureau |
| | | | | Applications (ELT) |
| Facility; Major | | | | |
| Amendment; | | | | P.O. Box 358994 |
| | | | | |
| Major Renewal/Mod; | | | | Pittsburgh, PA |
| | | | | 15251-5994 |
| Fill in | | | | |
| Transmitter | | | | |
| | | | | |
| (Per Transmitter) | | | | |
| | | | | |
| (Electronic Filing | | | | |
| Required) | | | | |
+--------------------+--------+--------+------+----------------------+
| b\. Minor Mod; | 601 & | \ | CAD | Federal |
| Renewal; | 159 | $55.00 | | Communications |
| | | | | Commission |
| Minor Renewal/Mod; | | | | |
| | | | | Wireless Bureau |
| (Per Call Sign) | | | | Applications (ELT) |
| | | | | |
| 900 MHz Nationwide | | | | P.O. Box 358994 |
| Renewal | | | | |
| | | | | Pittsburgh, PA |
| Net Organ; New | | | | 15251-5994 |
| Operator | | | | |
| | | | | |
| (Per Operator/Per | | | | |
| City | | | | |
| | | | | |
| Notice of | | | | |
| Completion of | | | | |
| | | | | |
| Construction or | | | | |
| Extension | | | | |
| | | | | |
| of Time to | | | | |
| Construct | | | | |
| | | | | |
| (Per Application | | | | |
| | | | | |
| (Electronic Filing | | | | |
| Required) | | | | |
+--------------------+--------+--------+------+----------------------+
| c\. Auxiliary Test | 601 & | \$ | CLD | Federal |
| | 159 | 295.00 | | Communications |
| (Per Transmitter); | | | | Commission |
| | | | | |
| Consolidate Call | | | | Wireless Bureau |
| Signs | | | | Applications (ELT) |
| | | | | |
| (Per Call Sign | | | | P.O. Box 358994 |
| | | | | |
| (Electronic Filing | | | | Pittsburgh, PA |
| Required) | | | | 15251-5994 |
+--------------------+--------+--------+------+----------------------+
| d\. Special | 601 & | \$ | CLD | Federal |
| Temporary | 159 | 295.00 | | Communications |
| Authority | | | | Commission |
| | | | | |
| (Per Location/Per | | | | Wireless Bureau |
| Frequency) | | | | Applications |
| | | | | |
| | | | | P.O. Box 358130 |
| | | | | |
| | | | | Pittsburgh, PA |
| | | | | 15251-5130 |
+--------------------+--------+--------+------+----------------------+
| e\. Special | 601 & | \$ | CLD | Federal |
| Temporary | 159 | 295.00 | | Communications |
| Authority | | | | Commission |
| | | | | |
| (Per Location/Per | | | | Wireless Bureau |
| Frequency) | | | | Applications (ELT) |
| | | | | |
| (Electronic | | | | P.O. Box 358994 |
| Filing) | | | | |
| | | | | Pittsburgh, PA |
| | | | | 15251-5994 |
+--------------------+--------+--------+------+----------------------+
| f\. Assignment of | 603 & | \$ | CMD | Federal |
| License or | 159 | 340.00 | | Communications |
| | | | CAD | Commission |
| Transfer of | 603-T | \ | | |
| Control; | & 159 | $55.00 | | Wireless Bureau |
| | | | | Applications (ELT) |
| Spectrum Leasing | 603 | | | |
| | /603-T | | | P.O. Box 358994 |
| (Full or Partial) | & 159 | | | |
| | | | | Pittsburgh, PA |
| (Per First Call | | | | 15251-5994 |
| Sign); | | | | |
| | | | | |
| Additional Call | | | | |
| Signs | | | | |
| | | | | |
| (Per Call Signs) | | | | |
| | | | | |
| (Electronic Filing | | | | |
| Required) | | | | |
+--------------------+--------+--------+------+----------------------+
| g\. Subsidiary | 601 & | \$ | CFD | Federal |
| Comm. Service | 159 | 150.00 | | Communications |
| | | | | Commission |
| (Per Request) | | | | |
| | | | | Wireless Bureau |
| (Electronic Filing | | | | Applications (ELT) |
| Required) | | | | |
| | | | | P.O. Box 358994 |
| | | | | |
| | | | | Pittsburgh, PA |
| | | | | 15251-5994 |
+--------------------+--------+--------+------+----------------------+
| h\. Air Ground | 409 & | \ | CAD | Federal |
| Individual | 159 | $55.00 | | Communications |
| | | | | Commission |
| (Initial License; | | | | |
| Mod; Renewal | | | | Wireless Bureau |
| | | | | Applications (ELT) |
| (Per Station) | | | | |
| | | | | P.O. Box 358994 |
| | | | | |
| | | | | Pittsburgh, PA |
| | | | | 15251-5994 |
+--------------------+--------+--------+------+----------------------+
| **17. Cellular** | 601 & | \$ | CMC | Federal |
| | 159 | 340.00 | | Communications |
| a\. New; Major | | | | Commission |
| Mod; Additional | | | | |
| | | | | Wireless Bureau |
| Facility; Major | | | | Applications (ELT) |
| Renewal/Mod | | | | |
| | | | | P.O. Box 358994 |
| (Per Call Sign) | | | | |
| | | | | Pittsburgh, PA |
| (Electronic Filing | | | | 15251-5994 |
| Required) | | | | |
+--------------------+--------+--------+------+----------------------+
| b\. Minor | 601 & | \ | CDC | Federal |
| Modification; | 159 | $90.00 | | Communications |
| | | | | Commission |
| Minor Renewal/Mod | | | | |
| | | | | Wireless Bureau |
| (Per Call Sign | | | | Applications (ELT) |
| | | | | |
| (Electronic Filing | | | | P.O. Box 358994 |
| Required) | | | | |
| | | | | Pittsburgh, PA |
| | | | | 15251-5994 |
+--------------------+--------+--------+------+----------------------+
| c\. Assignment of | 603 & | \$ | CMC | Federal |
| License; | 159 | 340.00 | | Communications |
| | | | | Commission |
| Transfer of | 603-T | | | |
| Control | & 159 | | | Wireless Bureau |
| | | | | Applications (ELT) |
| (Full or Partial) | | | | |
| | | | | P.O. Box 358994 |
| (Per Call Sign) | | | | |
| | | | | Pittsburgh, PA |
| Spectrum Leasing | | | | 15251-5994 |
| | | | | |
| (Electronic Filing | | | | |
| Required) | | | | |
+--------------------+--------+--------+------+----------------------+
| d\. Notice of | 601 & | \ | CAC | Federal |
| Extension of Time | 159 | $55.00 | | Communications |
| | | | | Commission |
| to Complete | | | | |
| Construction; | | | | Wireless Bureau |
| | | | | Applications (ELT) |
| (Per Request) | | | | |
| | | | | P.O. Box 358994 |
| Renewal | | | | |
| | | | | Pittsburgh, PA |
| (Per Call Sign) | | | | 15251-5994 |
| | | | | |
| (Electronic Filing | | | | |
| Required) | | | | |
+--------------------+--------+--------+------+----------------------+
| e\. Special | 601 & | \$ | CLC | Federal |
| Temporary | 159 | 295.00 | | Communications |
| Authority | | | | Commission |
| | | | | |
| (Per Request) | | | | Wireless Bureau |
| | | | | Applications |
| | | | | |
| | | | | P.O. Box 358130 |
| | | | | |
| | | | | Pittsburgh, PA |
| | | | | 15251-5130 |
+--------------------+--------+--------+------+----------------------+
| f\. Special | 601 & | \$ | CLC | Federal |
| Temporary | 159 | 295.00 | | Communications |
| Authority | | | | Commission |
| | | | | |
| (Per Request) | | | | Wireless Bureau |
| | | | | Applications (ELT) |
| (Electronic | | | | |
| Filing) | | | | P.O. Box 358994 |
| | | | | |
| | | | | Pittsburgh, PA |
| | | | | 15251-5994 |
+--------------------+--------+--------+------+----------------------+
| g\. Combining | 601 & | \ | CBC | Federal |
| Cellular | 159 | $75.00 | | Communications |
| Geographic | | | | Commission |
| | | | | |
| Areas | | | | Wireless Bureau |
| | | | | Applications (ELT) |
| (Per Area) | | | | |
| | | | | P.O. Box 358994 |
| (Electronic Filing | | | | |
| Required) | | | | Pittsburgh, PA |
| | | | | 15251-5994 |
+--------------------+--------+--------+------+----------------------+
| **18. Rural | 601 & | \$ | CG | Federal |
| Radio** | 159 | 155.00 | RR\* | Communications |
| | | | | Commission |
| a\. New; Major | | | | |
| Renew/Mod; | | | | Wireless Bureau |
| | | | | Applications (ELT) |
| Additional | | | | |
| Facility | | | | P.O. Box 358994 |
| | | | | |
| (Per Transmitter) | | | | Pittsburgh, PA |
| | | | | 15251-5994 |
| (Electronic Filing | | | | |
| Required) | | | | |
+--------------------+--------+--------+------+----------------------+
| b\. Major Mod; | 601 & | \$ | CGRM | Federal |
| | 159 | 155.00 | | Communications |
| Major Amendment | | | | Commission |
| | | | | |
| (Per Transmitter) | | | | Wireless Bureau |
| | | | | Applications (ELT) |
| (Electronic Filing | | | | |
| Required) | | | | P.O. Box 358994 |
| | | | | |
| | | | | Pittsburgh, PA |
| | | | | 15251-5994 |
+--------------------+--------+--------+------+----------------------+
| c\. Minor | 601 & | \ | CARM | Federal |
| Modification; | 159 | $55.00 | | Communications |
| | | | | Commission |
| (Per Transmitter) | | | | |
| | | | | Wireless Bureau |
| (Electronic Filing | | | | Applications (ELT) |
| Required) | | | | |
| | | | | P.O. Box 358994 |
| | | | | |
| | | | | Pittsburgh, PA |
| | | | | 15251-5994 |
+--------------------+--------+--------+------+----------------------+
| d\. Assignment of | 603 & | \$ | CGRM | Federal |
| License; | 159 | 155.00 | | Communications |
| | | | CARM | Commission |
| Transfer of | 603-T | \ | | |
| Control | & 159 | $55.00 | | Wireless Bureau |
| | | | | Applications (ELT) |
| (Full or Partial) | 603 | | | |
| | /603-T | | | P.O. Box 358994 |
| (Per Call Sign) | & 159 | | | |
| | | | | Pittsburgh, PA |
| Spectrum Leasing | | | | 15251-5994 |
| | | | | |
| Additional Calls | | | | |
| | | | | |
| (Per Call Sign) | | | | |
| | | | | |
| (Electronic Filing | | | | |
| Required) | | | | |
+--------------------+--------+--------+------+----------------------+
| e\. Renewal | 601 & | \ | CA | Federal |
| | 159 | $55.00 | RR\* | Communications |
| (Per Call Sign); | | | | Commission |
| | | | | |
| Minor Renewal/Mod | | | | Wireless Bureau |
| | | | | Applications (ELT) |
| (Per Transmitter) | | | | |
| | | | | P.O. Box 358994 |
| (Electronic Filing | | | | |
| Required) | | | | Pittsburgh, PA |
| | | | | 15251-5994 |
+--------------------+--------+--------+------+----------------------+
| f\. Notice of | 601 & | \ | CARM | Federal |
| Completion of | 159 | $55.00 | | Communications |
| | | | | Commission |
| Construction or | | | | |
| Extension of | | | | Wireless Bureau |
| | | | | Applications (ELT) |
| Time to Construct | | | | |
| | | | | P.O. Box 358994 |
| (Per Application) | | | | |
| | | | | Pittsburgh, PA |
| (Electronic Filing | | | | 15251-5994 |
| Required) | | | | |
+--------------------+--------+--------+------+----------------------+
| g\. Special | 601 & | \$ | CLRM | Federal |
| Temporary | 159 | 295.00 | | Communications |
| Authority | | | | Commission |
| | | | | |
| (Per Transmitter) | | | | Wireless Bureau |
| | | | | Applications (ELT) |
| | | | | |
| | | | | P.O. Box 358994 |
| | | | | |
| | | | | Pittsburgh, PA |
| | | | | 15251-5994 |
+--------------------+--------+--------+------+----------------------+
| h\. Special | 601 & | \$ | CLRM | Federal |
| Temporary | 159 | 295.00 | | Communications |
| Authority | | | | Commission |
| | | | | |
| (Per Transmitter) | | | | Wireless Bureau |
| | | | | Applications (ELT) |
| (Electronic Filing | | | | |
| Required) | | | | P.O. Box 358994 |
| | | | | |
| | | | | Pittsburgh, PA |
| | | | | 15251-5994 |
+--------------------+--------+--------+------+----------------------+
| I. Combining Call | 601 & | \$ | CLRM | Federal |
| Signs | 159 | 295.00 | | Communications |
| | | | | Commission |
| (Per Call Sign) | | | | |
| | | | | Wireless Bureau |
| (Electronic Filing | | | | Applications (ELT) |
| Required) | | | | |
| | | | | P.O. Box 358994 |
| | | | | |
| | | | | Pittsburgh, PA |
| | | | | 15251-5994 |
+--------------------+--------+--------+------+----------------------+
| j\. Auxiliary Test | 601 & | \$ | CLRM | Federal |
| Station | 159 | 295.00 | | Communications |
| | | | | Commission |
| (Per Transmitter) | | | | |
| | | | | Wireless Bureau |
| (Electronic Filing | | | | Applications (ELT) |
| Required) | | | | |
| | | | | P.O. Box 358994 |
| | | | | |
| | | | | Pittsburgh, PA |
| | | | | 15251-5994 |
+--------------------+--------+--------+------+----------------------+
| **19. Offshore | 601 & | \$ | CGF | Federal |
| Radio** | 159 | 155.00 | | Communications |
| | | | | Commission |
| a\. New; Major | | | | |
| Mod; Additional | | | | Wireless Bureau |
| | | | | Applications (ELT) |
| Facility; Major | | | | |
| Amendment; | | | | P.O. Box 358994 |
| | | | | |
| Major Renew/Mod; | | | | Pittsburgh, PA |
| | | | | 15251-5994 |
| Fill in | | | | |
| Transmitters | | | | |
| | | | | |
| (Per Transmitter) | | | | |
| | | | | |
| (Electronic Filing | | | | |
| Required) | | | | |
+--------------------+--------+--------+------+----------------------+
| b\. Consolidate | 601 & | \$ | CLF | Federal |
| Call Signs | 159 | 295.00 | | Communications |
| | | | | Commission |
| (Per Call Sign); | | | | |
| | | | | Wireless Bureau |
| Auxiliary Test | | | | Applications (ELT) |
| | | | | |
| (Per Transmitter) | | | | P.O. Box 358994 |
| | | | | |
| (Electronic Filing | | | | Pittsburgh, PA |
| Required) | | | | 15251-5994 |
+--------------------+--------+--------+------+----------------------+
| c\. Minor | 601 & | \ | CAF | Federal |
| Modification; | 159 | $55.00 | | Communications |
| | | | | Commission |
| Minor | | | | |
| Re | | | | Wireless Bureau |
| newal/Modification | | | | Applications (ELT) |
| | | | | |
| (Per Transmitter); | | | | P.O. Box 358994 |
| | | | | |
| Notice of | | | | Pittsburgh, PA |
| Completion of | | | | 15251-5994 |
| | | | | |
| Construction or | | | | |
| Extension | | | | |
| | | | | |
| of Time to | | | | |
| Construct | | | | |
| | | | | |
| (Per Application); | | | | |
| | | | | |
| Renewal (Per Call | | | | |
| Sign) | | | | |
| | | | | |
| (Electronic Filing | | | | |
| Required) | | | | |
+--------------------+--------+--------+------+----------------------+
| d\. Assignment of | 603 & | \$ | CGF | Federal |
| License; | 159 | 155.00 | | Communications |
| | | | CGF | Commission |
| Transfer of | 603-T | \$ | | |
| Control | & 159 | 155.00 | CAF | Wireless Bureau |
| | | | | Applications (ELT) |
| (Full or Partial) | 603 | \ | | |
| | /603-T | $55.00 | | P.O. Box 358994 |
| Spectrum Leasing | & 159 | | | |
| | | | | Pittsburgh, PA |
| Additional Calls | | | | 15251-5994 |
| | | | | |
| (Electronic Filing | | | | |
| Required) | | | | |
+--------------------+--------+--------+------+----------------------+
| e\. Special | 601 & | \$ | CLF | Federal |
| Temporary | 159 | 295.00 | | Communications |
| Authority | | | | Commission |
| | | | | |
| (Per Transmitter) | | | | Wireless Bureau |
| | | | | Applications |
| | | | | |
| | | | | P.O. Box 358130 |
| | | | | |
| | | | | Pittsburgh, PA |
| | | | | 15251-5130 |
+--------------------+--------+--------+------+----------------------+
| f\. Special | 601 & | \$ | CLF | Federal |
| Temporary | 159 | 295.00 | | Communications |
| Authority | | | | Commission |
| | | | | |
| (Per Transmitter) | | | | Wireless Bureau |
| | | | | Applications (ELT) |
| (Electronic Filing | | | | |
| Required) | | | | P.O. Box 358994 |
| | | | | |
| | | | | Pittsburgh, PA |
| | | | | 15251-5994 |
+--------------------+--------+--------+------+----------------------+
| **20. Multipoint | 304 & | \$ | CJM | Federal |
| Distribution | 159 | 230.00 | | Communications |
| Service** | | | | Commission |
| | or | | | |
| (Including | | | | Wireless Bureau |
| Multi-channel MDS) | 331 & | | | Applications |
| | 159 | | | |
| a\. Conditional | | | | P.O. Box 358130 |
| License | | | | |
| | | | | Pittsburgh, PA |
| | | | | 15251-5130 |
+--------------------+--------+--------+------+----------------------+
| b\. Major | 304 & | \$ | CJM | Federal |
| Modification of | 159 | 230.00 | | Communications |
| | | | | Commission |
| Conditional | or | | | |
| Licenses or | | | | Wireless Bureau |
| | 331 & | | | Applications |
| License | 159 | | | |
| Authorization | | | | P.O. Box 358130 |
| | | | | |
| | | | | Pittsburgh, PA |
| | | | | 15251-5130 |
+--------------------+--------+--------+------+----------------------+
| c\. Certification | 304-A | \$ | C | Federal |
| of Completion | & | 670.00 | PM\* | Communications |
| | | | | Commission |
| of Construction | 159 | | | |
| | | | | Wireless Bureau |
| (Per Channel) | | | | Applications |
| | | | | |
| | | | | P.O. Box 358130 |
| | | | | |
| | | | | Pittsburgh, PA |
| | | | | 15251-5130 |
+--------------------+--------+--------+------+----------------------+
| d\. License | 405 & | \$ | CJM | Federal |
| Renewal | 159 | 230.00 | | Communications |
| | | | | Commission |
| | | | | |
| | | | | Wireless Bureau |
| | | | | Applications |
| | | | | |
| | | | | P.O. Box |
| | | | | 358245358130 |
| | | | | |
| | | | | Pittsburgh, PA |
| | | | | 15251-52455130 |
+--------------------+--------+--------+------+----------------------+
| e\. Assignment or | 702305 | \ | CCM | Federal |
| Transfer | & 159 | $85.00 | | Communications |
| | | | CAM | Commission |
| \(i\) First | or | \ | | |
| Station on | | $55.00 | | Wireless Bureau |
| | 704306 | | | Applications |
| Application | & 159 | | | |
| | | | | P.O. Box 358130 |
| \(ii\) Each | 702305 | | | |
| Additional | & 159 | | | Pittsburgh, PA |
| | | | | 15251-5130 |
| Station | or | | | |
| | | | | |
| | 704306 | | | |
| | & 159 | | | |
+--------------------+--------+--------+------+----------------------+
| f\. Extension of | 701 & | \$ | CHM | Federal |
| Construction | 159 | 195.00 | | Communications |
| | | | | Commission |
| Authorization | | | | |
| | | | | Wireless Bureau |
| | | | | Applications |
| | | | | |
| | | | | P.O. Box 358130 |
| | | | | |
| | | | | Pittsburgh, PA |
| | | | | 15251-5130 |
+--------------------+--------+--------+------+----------------------+
| g\. Special | Corres | \$ | CEM | Federal |
| Temporary | & 159 | 105.00 | | Communications |
| Authority | | | | Commission |
| | | | | |
| or Request for | | | | Wireless Bureau |
| Waiver of | | | | Applications |
| | | | | |
| Prior Construction | | | | P.O. Box |
| | | | | 358155358130 |
| Authorization | | | | |
| | | | | Pittsburgh, PA |
| | | | | 15251-51555130 |
+--------------------+--------+--------+------+----------------------+
| h\. Signal Booster | 304 & | \ | CSB | Federal |
| | 159 | $75.00 | | Communications |
| \(I\) Application | | | | Commission |
| | 331 & | | | |
| | 159 | | | Wireless Bureau |
| | | | | Applications |
| | | | | |
| | | | | P.O. Box 358130 |
| | | | | |
| | | | | Pittsburgh, PA |
| | | | | 15251-5130 |
+--------------------+--------+--------+------+----------------------+
| \(ii\) | 304A & | \ | CCB | Federal |
| Certification of | 159 | $85.00 | | Communications |
| | | | | Commission |
| Completion of | | | | |
| | | | | Wireless Bureau |
| Construction | | | | Applications |
| | | | | |
| **(Electronic | | | | P.O. Box 358130 |
| Filing Only)** | | | | |
| | | | | Pittsburgh, PA |
| | | | | 15251-5130 |
+--------------------+--------+--------+------+----------------------+
| **21. | Corres | \$5, | CALA | Federal |
| Communication | & 159 | 210.00 | | Communications |
| Assistance** | | | | Commission |
| | | | | |
| **for Law | | | | Wireless Bureau |
| Enforcement** | | | | Applications |
| | | | | |
| **(CALEA)** | | | | P.O. Box 358130 |
| | | | | |
| **Petitions** | | | | Pittsburgh, PA |
| | | | | 15251-5130 |
+--------------------+--------+--------+------+----------------------+
3. **Section 1.1103 is revised to read as follows:**
> **[§1.1103 Schedule of charges for equipment approval, experimental
> radio services, and international telecommunications settlement
> services]{.underline}**.
+--------------------+--------+--------+------+----------------------+
| **Service** | **FCC | * | **P | **Address** |
| | Form | *Fee** | ayme | |
| | No.** | | nt** | |
| | | **Am | | |
| | | ount** | **Ty | |
| | | | pe** | |
| | | | | |
| | | | **Co | |
| | | | de** | |
+====================+========+========+======+======================+
| **1. | 731 & | \$ | EEC | Federal |
| Certification** | 159 | 420.00 | | Communications |
| | | | | Commission |
| a\. Receivers | | | | |
| (except TV and FM) | | | | Equipment Approval |
| | | | | Services |
| **(Electronic | | | | |
| Filing Only)** | | | | P.O. Box 358315 |
| | | | | |
| | | | | Pittsburgh, PA |
| | | | | 15251-5315 |
+--------------------+--------+--------+------+----------------------+
| b\. Devices Under | 731 & | \$1, | EGC | Federal |
| Parts 11, 15 & | 159 | 080.00 | | Communications |
| | | | | Commission |
| 18 (except | | | | |
| receivers) | | | | Equipment Approval |
| | | | | Services |
| **(Electronic | | | | |
| Filing Only)** | | | | P.O. Box 358315 |
| | | | | |
| | | | | Pittsburgh, PA |
| | | | | 15251-5315 |
+--------------------+--------+--------+------+----------------------+
| c\. All Other | 731 & | \$ | EFT | Federal |
| Devices | 159 | 545.00 | | Communications |
| | | | | Commission |
| **(Electronic | | | | |
| Filing Only)** | | | | Equipment Approval |
| | | | | Services |
| | | | | |
| | | | | P.O. Box 358315 |
| | | | | |
| | | | | Pittsburgh, PA |
| | | | | 15251-5315 |
+--------------------+--------+--------+------+----------------------+
| d\. Modifications | 731 & | \ | EAC | Federal |
| and Class II | 159 | $55.00 | | Communications |
| | | | | Commission |
| Permissive Changes | | | | |
| | | | | Equipment Approval |
| **(Electronic | | | | Services |
| Filing Only)** | | | | |
| | | | | P.O. Box 358315 |
| | | | | |
| | | | | Pittsburgh, PA |
| | | | | 15251-5315 |
+--------------------+--------+--------+------+----------------------+
| e\. Request for | 731 & | \$ | EBC | Federal |
| Confidentiality | 159 | 155.00 | | Communications |
| | | | | Commission |
| under | | | | |
| Certification | | | | Equipment Approval |
| | | | | Services |
| **(Electronic | | | | |
| Filing Only)** | | | | P.O. Box 358315 |
| | | | | |
| | | | | Pittsburgh, PA |
| | | | | 15251-5315 |
+--------------------+--------+--------+------+----------------------+
| f\. Modification | 731 & | \$ | ECC | Federal |
| and.. Class III | 159 | 545.00 | | Communications |
| | | | | Commission |
| Permissive Changes | | | | |
| | | | | Equipment Approval |
| **(Electronic | | | | Services |
| Filing Only)** | | | | |
| | | | | P.O. Box 358315 |
| | | | | |
| | | | | Pittsburgh, PA |
| | | | | 15251-5315 |
+--------------------+--------+--------+------+----------------------+
| **2. Advance | Corres | \$3, | EIS | Federal |
| approval** | & 159 | 310.00 | | Communications |
| | | | | Commission |
| **of | | | | |
| Subscription** | | | | Equipment Approval |
| | | | | Services |
| **TV Systems** | | | | |
| | | | | P.O. Box 358315 |
| | | | | |
| | | | | Pittsburgh, PA |
| | | | | 15251-5315 |
+--------------------+--------+--------+------+----------------------+
| a\. Request for | Corres | \$ | EBS | Federal |
| Confidentiality | & 159 | 155.00 | | Communications |
| | | | | Commission |
| **(Electronic | | | | |
| Filing Only)** For | | | | Equipment Approval |
| Advance Approval | | | | Services |
| of | | | | |
| | | | | P.O. Box 358315 |
| Subscription TV | | | | |
| Systems | | | | Pittsburgh, PA |
| | | | | 15251-5315 |
+--------------------+--------+--------+------+----------------------+
| **3. Assignment of | Corres | \ | EAG | Federal |
| Grantee Code** | & 159 | $55.00 | | Communications |
| | | | | Commission |
| a\. New Applicants | or | | | |
| for all | | | | Equipment Approval |
| | op | | | Services |
| Application Types, | tional | | | |
| except | elec | | | P.O. Box 358315 |
| | tronic | | | |
| Subscription TV | filing | | | Pittsburgh, PA |
| | & 159 | | | 15251-5315 |
| **(Electronic | | | | |
| Filing Optional)** | | | | |
+--------------------+--------+--------+------+----------------------+
| **4. Experimental | 442 & | \ | EAE | Federal |
| Radio Service** | 159 | $55.00 | | Communications |
| | | | | Commission |
| a\. New Station | | | | |
| Authorization | | | | Equipment Radio |
| | | | | Services |
| | | | | |
| | | | | P.O. Box 358320 |
| | | | | |
| | | | | Pittsburg, PA |
| | | | | 15251-5320 |
+--------------------+--------+--------+------+----------------------+
| b\. Modification | 442 & | \ | EAE | Federal |
| of Authorization | 159 | $55.00 | | Communications |
| | | | | Commission |
| | | | | |
| | | | | Equipment Radio |
| | | | | Services |
| | | | | |
| | | | | P.O. Box 358320 |
| | | | | |
| | | | | Pittsburg, PA |
| | | | | 15251-5320 |
+--------------------+--------+--------+------+----------------------+
| c\. Renewal of | 405 & | \ | EAE | Federal |
| Station | 159 | $55.00 | | Communications |
| | | | | Commission |
| Authorization | | | | |
| | | | | Equipment Radio |
| | | | | Services |
| | | | | |
| | | | | P.O. Box 358320 |
| | | | | |
| | | | | Pittsburg, PA |
| | | | | 15251-5320 |
+--------------------+--------+--------+------+----------------------+
| d\. Assignment of | 702 & | \ | EAE | Federal |
| Transfer of | 159 | $55.00 | | Communications |
| | | | | Commission |
| Control | or | | | |
| | | | | Equipment Radio |
| | 703 & | | | Services |
| | 159 | | | |
| | | | | P.O. Box 358320 |
| | | | | |
| | | | | Pittsburg, PA |
| | | | | 15251-5320 |
+--------------------+--------+--------+------+----------------------+
| e\. Special | Corres | \ | EAE | Federal |
| Temporary | & 159 | $55.00 | | Communications |
| Authority | | | | Commission |
| | | | | |
| | | | | Equipment Radio |
| | | | | Services |
| | | | | |
| | | | | P.O. Box 358320 |
| | | | | |
| | | | | Pittsburg, PA |
| | | | | 15251-5320 |
+--------------------+--------+--------+------+----------------------+
| f\. Additional fee | Corres | \ | EAE | Federal |
| required | & 159 | $55.00 | | Communications |
| | | | | Commission |
| for any of the | | | | |
| above | | | | Equipment Radio |
| | | | | Services |
| applications that | | | | |
| request | | | | P.O. Box 358320 |
| | | | | |
| withholding from | | | | Pittsburg, PA |
| public | | | | 15251-5320 |
| | | | | |
| inspection | | | | |
+--------------------+--------+--------+------+----------------------+
| **5. | 99 & | \$2.00 | IAT | Federal |
| International** | 159 | | | Communications |
| | | | | Commission |
| **Te | | | | |
| lecommunications** | | | | International |
| | | | | Telecommunications |
| | | | | |
| | | | | Settlements |
| | | | | |
| | | | | P.O. Box 358001 |
| | | | | |
| | | | | Pittsburgh, PA |
| | | | | 15251-5001 |
+--------------------+--------+--------+------+----------------------+
4. **Section 1.1104 is revised to read as follows:**
> **[§1.1104 Schedule of charges for applications and other filings for
> media services]{.underline}**.
>
> **Those services designated with an asterisk in the Payment Type Code
> column accept multiples if filing in the same post office box.**
+--------------------+--------+--------+------+----------------------+
| **Service** | **FCC | * | **P | **Address** |
| | Form | *Fee** | ayme | |
| | No.** | | nt** | |
| | | **Am | | |
| | | ount** | **Ty | |
| | | | pe** | |
| | | | | |
| | | | **Co | |
| | | | de** | |
+====================+========+========+======+======================+
| **1. Commercial TV | 301 & | \$3, | MVT | Federal |
| Services** | 159 | 720.00 | | Communications |
| | | | | Commission |
| a\. New and Major | 301-CA | | | |
| Change | & | | | Media Services |
| | | | | |
| Construction | 159 | | | P.O. Box 358165 |
| Permits | | | | |
| | | | | Pittsburgh, PA |
| (per application) | | | | 15251-5165 |
| | | | | |
| (Electronic | | | | |
| Filing) | | | | |
+--------------------+--------+--------+------+----------------------+
| b\. Minor Change | 301 & | \$ | MPT | Federal |
| | 159 | 830.00 | | Communications |
| (per application) | | | | Commission |
| | 301-CA | | | |
| (Electronic | & | | | Media Services |
| Filing) | | | | |
| | 159 | | | P.O. Box 358165 |
| | | | | |
| | | | | Pittsburgh, PA |
| | | | | 15251-5165 |
+--------------------+--------+--------+------+----------------------+
| c\. Main Studio | Corres | \$ | MPT | Federal |
| Request | & 159 | 830.00 | | Communications |
| | | | | Commission |
| | | | | |
| | | | | Media Services |
| | | | | |
| | | | | P.O. Box 358165 |
| | | | | |
| | | | | Pittsburgh, PA |
| | | | | 15251-5165 |
+--------------------+--------+--------+------+----------------------+
| d\. New License | 302-TV | \$ | MJT | Federal |
| | & | 250.00 | | Communications |
| (per application) | | | | Commission |
| | 159 | | | |
| | | | | Media Services |
| | 302-CA | | | |
| | & | | | P.O. Box 358165 |
| | | | | |
| | 159 | | | Pittsburgh, PA |
| | | | | 15251-5165 |
| | 3 | | | |
| | 02-DTV | | | |
| | & | | | |
| | | | | |
| | 159 | | | |
+--------------------+--------+--------+------+----------------------+
| e\. License | 303-S | \$ | MGT | Federal |
| Renewal | & | 150.00 | | Communications |
| | | | | Commission |
| (per application) | 159 | | | |
| | | | | Media Services |
| | | | | |
| | | | | P.O. Box 358165 |
| | | | | |
| | | | | Pittsburgh, PA |
| | | | | 15251-5165 |
+--------------------+--------+--------+------+----------------------+
| f\. License | 314 & | \$ | M | Federal |
| Assignment | 159 | 830.00 | PT\* | Communications |
| | | | | Commission |
| \(I\) Long Form | | | | |
| | | | | Media Services |
| (Electronic | | | | |
| Filing) | | | | P.O. Box 358350 |
| | | | | |
| | | | | Pittsburgh, PA |
| | | | | 15251-5350 |
+--------------------+--------+--------+------+----------------------+
| \(ii\) Short Form | 316 & | \$ | M | Federal |
| | 159 | 120.00 | DT\* | Communications |
| (Electronic | | | | Commission |
| Filing) | | | | |
| | | | | Media Services |
| | | | | |
| | | | | P.O. Box 358350 |
| | | | | |
| | | | | Pittsburgh, PA |
| | | | | 15251-5350 |
+--------------------+--------+--------+------+----------------------+
| g\. Transfer of | 315 & | \$ | M | Federal |
| Control | 159 | 830.00 | PT\* | Communications |
| | | | | Commission |
| \(I\) Long Form | | | | |
| | | | | Media Services |
| (Electronic | | | | |
| Filing) | | | | P.O. Box 358350 |
| | | | | |
| | | | | Pittsburgh, PA |
| | | | | 15251-5350 |
+--------------------+--------+--------+------+----------------------+
| \(ii\) Short Form | 316 & | \$ | M | Federal |
| | 159 | 120.00 | DT\* | Communications |
| (Electronic | | | | Commission |
| Filing) | | | | |
| | | | | Media Services |
| | | | | |
| | | | | P.O. Box 358350 |
| | | | | |
| | | | | Pittsburgh, PA |
| | | | | 15251-5350 |
+--------------------+--------+--------+------+----------------------+
| h\. Hearing(New | Corres | \$9, | MWT | Federal |
| and Major/Minor | & 159 | 920.00 | | Communications |
| | | | | Commission |
| Change, | | | | |
| Comparative | | | | Media Services |
| | | | | |
| Construction | | | | P.O. Box 358170 |
| Permit) | | | | |
| | | | | Pittsburgh, PA |
| | | | | 15251-5170 |
+--------------------+--------+--------+------+----------------------+
| i\. Call Sign | 380 & | \ | MBT | Federal |
| | 159 | $85.00 | | Communications |
| (Electronic | | | | Commission |
| Filing) | | | | |
| | | | | Media Services |
| | | | | |
| | | | | P.O. Box 358165 |
| | | | | |
| | | | | Pittsburgh, PA |
| | | | | 15251-5165 |
+--------------------+--------+--------+------+----------------------+
| j\. Special | Corres | \$ | MGT | Federal |
| Temporary | & 159 | 150.00 | | Communications |
| Authority | | | | Commission |
| | | | | |
| | | | | Media Services |
| | | | | |
| | | | | P.O. Box 358165 |
| | | | | |
| | | | | Pittsburgh, PA |
| | | | | 15251-5165 |
+--------------------+--------+--------+------+----------------------+
| k\. Petition for | 301 & | \$2, | MRT | Federal |
| Rulemaking for | 159 | 300.00 | | Communications |
| | | | | Commission |
| New Community of | 302-TV | | | |
| License | & | | | Media Services |
| | | | | |
| | 159 | | | P.O. Box 358165 |
| | | | | |
| | | | | Pittsburgh, PA |
| | | | | 15251-5165 |
+--------------------+--------+--------+------+----------------------+
| l\. Ownership | 323 & | \ | MAT | Federal |
| Report | 159 | $55.00 | | Communications |
| | | | | Commission |
| | Corres | | | |
| | & | | | Media Services |
| | | | | |
| | 159 | | | P.O. Box 358180 |
| | | | | |
| | | | | Pittsburgh, PA |
| | | | | 15251-5180 |
+--------------------+--------+--------+------+----------------------+
| **2. Commercial AM | 301 & | \$3, | MUR | Federal |
| Radio** | 159 | 310.00 | | Communications |
| | | | | Commission |
| **Stations** | | | | |
| | | | | Media Services |
| a\. New or Major | | | | |
| Change | | | | P.O. Box 358190 |
| | | | | |
| Construction | | | | Pittsburgh, PA |
| Permit | | | | 15251-5190 |
| | | | | |
| **(Electronic | | | | |
| Filing)** | | | | |
+--------------------+--------+--------+------+----------------------+
| b\. Minor Change | 301 & | \$ | MPR | Federal |
| | 159 | 830.00 | | Communications |
| (per application) | | | | Commission |
| | | | | |
| **(Electronic | | | | Media Services |
| Filing)** | | | | |
| | | | | P.O. Box 358190 |
| | | | | |
| | | | | Pittsburgh, PA |
| | | | | 15251-5190 |
+--------------------+--------+--------+------+----------------------+
| c\. Main Studio | Corres | \$ | MPR | Federal |
| Request | & 159 | 830.00 | | Communications |
| | | | | Commission |
| (per request) | | | | |
| | | | | Media Services |
| | | | | |
| | | | | P.O. Box 358190 |
| | | | | |
| | | | | Pittsburgh, PA |
| | | | | 15251-5190 |
+--------------------+--------+--------+------+----------------------+
| d\. New License | 302-AM | \$ | MMR | Federal |
| | & | 545.00 | | Communications |
| (per application) | | | | Commission |
| | 159 | | | |
| | | | | Media Services |
| | | | | |
| | | | | P.O. Box 358190 |
| | | | | |
| | | | | Pittsburgh, PA |
| | | | | 15251-5190 |
+--------------------+--------+--------+------+----------------------+
| e\. AM Directional | 302-AM | \$ | MOR | Federal |
| Antenna | & | 625.00 | | Communications |
| | | | | Commission |
| (per application) | 159 | | | |
| | | | | Media Services |
| | | | | |
| | | | | P.O. Box 358190 |
| | | | | |
| | | | | Pittsburgh, PA |
| | | | | 15251-5190 |
+--------------------+--------+--------+------+----------------------+
| f\. AM Remote | 301 & | \ | MAR | Federal |
| Control | 159 | $55.00 | | Communications |
| | | | | Commission |
| (per application) | | | | |
| | | | | Media Services |
| **(Electronic | | | | |
| Filing)** | | | | P.O. Box 358190 |
| | | | | |
| | | | | Pittsburgh, PA |
| | | | | 15251-5190 |
+--------------------+--------+--------+------+----------------------+
| g\. License | 303-S | \$ | MGR | Federal |
| Renewal | & | 150.00 | | Communications |
| | | | | Commission |
| (per application) | 159 | | | |
| | | | | Media Services |
| | | | | |
| | | | | P.O. Box 358190 |
| | | | | |
| | | | | Pittsburgh, PA |
| | | | | 15251-5190 |
+--------------------+--------+--------+------+----------------------+
| h\. License | 314 & | \$ | M | Federal |
| Assignment | 159 | 830.00 | PR\* | Communications |
| | | | | Commission |
| \(i\) Long Form | | | | |
| | | | | Media Services |
| **(Electronic | | | | |
| Filing)** | | | | P.O. Box 358350 |
| | | | | |
| | | | | Pittsburgh, PA |
| | | | | 15251-5350 |
+--------------------+--------+--------+------+----------------------+
| \(ii\) Short Form | 316 & | \$ | M | Federal |
| | 159 | 120.00 | DR\* | Communications |
| **(Electronic | | | | Commission |
| Filing)** | | | | |
| | | | | Mass Media Services |
| | | | | |
| | | | | P.O. Box 358350 |
| | | | | |
| | | | | Pittsburgh, PA |
| | | | | 15251-5350 |
+--------------------+--------+--------+------+----------------------+
| i\. Transfer of | 315 & | \$ | M | Federal |
| Control | 159 | 830.00 | PR\* | Communications |
| | | | | Commission |
| \(i\) Long Form | | | | |
| | | | | Media Services |
| **(Electronic | | | | |
| Filing)** | | | | P.O. Box 358350 |
| | | | | |
| | | | | Pittsburgh, PA |
| | | | | 15251-5350 |
+--------------------+--------+--------+------+----------------------+
| \(ii\) Short Form | 316 & | \$ | M | Federal |
| | 159 | 120.00 | DR\* | Communications |
| **(Electronic | | | | Commission |
| Filing)** | | | | |
| | | | | Media Services |
| | | | | |
| | | | | P.O. Box 358350 |
| | | | | |
| | | | | Pittsburgh, PA |
| | | | | 15251-5350 |
+--------------------+--------+--------+------+----------------------+
| j\. Hearing (New | Corres | \$9, | MWR | Federal |
| or Major/Minor | & 159 | 920.00 | | Communications |
| | | | | Commission |
| Change, | | | | |
| Comparative | | | | Media Services |
| | | | | |
| Construction | | | | P.O. Box 358170 |
| Permit Hearings) | | | | |
| | | | | Pittsburgh, PA |
| | | | | 15251-5170 |
+--------------------+--------+--------+------+----------------------+
| k\. Call Sign | 380 & | \ | MBR | Federal |
| | 159 | $85.00 | | Communications |
| **(Electronic | | | | Commission |
| Filing)** | | | | |
| | | | | Media Services |
| | | | | |
| | | | | P.O. Box 358165 |
| | | | | |
| | | | | Pittsburgh, PA |
| | | | | 15251-5165 |
+--------------------+--------+--------+------+----------------------+
| l\. Special | Corres | \$ | MGR | Federal |
| Temporary | & 159 | 150.00 | | Communications |
| Authority | | | | Commission |
| | | | | |
| | | | | Media Services |
| | | | | |
| | | | | P.O. Box 358190 |
| | | | | |
| | | | | Pittsburgh, PA |
| | | | | 15251-5190 |
+--------------------+--------+--------+------+----------------------+
| m\. Ownership | 323 & | \ | MAR | Federal |
| Report | 159 | $55.00 | | Communications |
| | | | | Commission |
| | or | | | |
| | | | | Media Services |
| | Corres | | | |
| | & 159 | | | P.O. Box 358180 |
| | | | | |
| | | | | Pittsburgh, PA |
| | | | | 15251-5180 |
+--------------------+--------+--------+------+----------------------+
| **3. Commercial FM | 301 & | \$2, | MTR | Federal |
| Radio** | 159 | 980.00 | | Communications |
| | | | | Commission |
| **Stations** | | | | |
| | | | | Media Services |
| a\. New or Major | | | | |
| Change | | | | P.O. Box 358195 |
| | | | | |
| Construction | | | | Pittsburgh, PA |
| Permit | | | | 15251-5195 |
| | | | | |
| **(Electronic | | | | |
| Filing)** | | | | |
+--------------------+--------+--------+------+----------------------+
| b\. Minor Change | 301 & | \$ | MPR | Federal |
| | 159 | 830.00 | | Communications |
| **(Electronic | | | | Commission |
| Filing)** | | | | |
| | | | | Mass Media Services |
| | | | | |
| | | | | P.O. Box 358195 |
| | | | | |
| | | | | Pittsburgh, PA |
| | | | | 15251-5195 |
+--------------------+--------+--------+------+----------------------+
| c\. Main Studio | Corres | \$ | MPR | Federal |
| Request | & 159 | 830.00 | | Communications |
| | | | | Commission |
| (per request) | | | | |
| | | | | Media Services |
| | | | | |
| | | | | P.O. Box 358195 |
| | | | | |
| | | | | Pittsburgh, PA |
| | | | | 15251-5195 |
+--------------------+--------+--------+------+----------------------+
| d\. New License | 302-FM | \$ | MHR | Federal |
| | & | 170.00 | | Communications |
| (Electronic | | | | Commission |
| Filing) | 159 | | | |
| | | | | Media Services |
| | | | | |
| | | | | P.O. Box 358195 |
| | | | | |
| | | | | Pittsburgh, PA |
| | | | | 15251-5195 |
+--------------------+--------+--------+------+----------------------+
| e\. FM Directional | 302-FM | \$ | MLR | Federal |
| Antenna | & | 525.00 | | Communications |
| | | | | Commission |
| (Electronic | 159 | | | |
| Filing) | | | | Media Services |
| | | | | |
| | | | | P.O. Box 358195 |
| | | | | |
| | | | | Pittsburgh, PA |
| | | | | 15251-5195 |
+--------------------+--------+--------+------+----------------------+
| f\. License | 303-S | \$ | MGR | Federal |
| Renewal | & | 150.00 | | Communications |
| | | | | Commission |
| | 159 | | | |
| | | | | Media Services |
| | | | | |
| | | | | P.O. Box 358190 |
| | | | | |
| | | | | Pittsburgh, PA |
| | | | | 15251-5190 |
+--------------------+--------+--------+------+----------------------+
| g\. License | 314 & | \$ | M | Federal |
| Assignment | 159 | 830.00 | PR\* | Communications |
| | | | | Commission |
| \(I\) Long Form | | | | |
| | | | | Media Services |
| (Electronic | | | | |
| Filing) | | | | P.O. Box 358350 |
| | | | | |
| | | | | Pittsburgh, PA |
| | | | | 15251-5350 |
+--------------------+--------+--------+------+----------------------+
| \(ii\) Short Form | 316 & | \$ | M | Federal |
| | 159 | 120.00 | DR\* | Communications |
| (Electronic | | | | Commission |
| Filing) | | | | |
| | | | | Media Services |
| | | | | |
| | | | | P.O. Box 358350 |
| | | | | |
| | | | | Pittsburgh, PA |
| | | | | 15251-5350 |
+--------------------+--------+--------+------+----------------------+
| h\. Transfer of | 315 & | \$ | M | Federal |
| Control | 159 | 830.00 | PR\* | Communications |
| | | | | Commission |
| \(I\) Long Form | | | | |
| | | | | Media Services |
| (Electronic | | | | |
| Filing) | | | | P.O. Box 358350 |
| | | | | |
| | | | | Pittsburgh, PA |
| | | | | 15251-5350 |
+--------------------+--------+--------+------+----------------------+
| \(ii\) Short Form | 316 & | \$ | M | Federal |
| | 159 | 120.00 | DR\* | Communications |
| (Electronic | | | | Commission |
| Filing) | | | | |
| | | | | Media Services |
| | | | | |
| | | | | P.O. Box 358350 |
| | | | | |
| | | | | Pittsburgh, PA |
| | | | | 15251-5350 |
+--------------------+--------+--------+------+----------------------+
| i\. Hearing (New | Corres | \$9, | MWR | Federal |
| or Major/Minor | & 159 | 920.00 | | Communications |
| | | | | Commission |
| Change, | | | | |
| Comparative | | | | Media Services |
| | | | | |
| Construction | | | | P.O. Box 358170 |
| Permit Hearings) | | | | |
| | | | | Pittsburgh, PA |
| (per application) | | | | 15251-5170 |
+--------------------+--------+--------+------+----------------------+
| j\. Call Sign | 380 & | \ | MBR | Federal |
| | 159 | $85.00 | | Communications |
| **(Electronic | | | | Commission |
| Filing)** | | | | |
| | | | | Media Services |
| | | | | |
| | | | | P.O. Box 358165 |
| | | | | |
| | | | | Pittsburgh, PA |
| | | | | 15251-5165 |
+--------------------+--------+--------+------+----------------------+
| k\. Special | Corres | \$ | MGR | Federal |
| Temporary | & 159 | 150.00 | | Communications |
| Authority | | | | Commission |
| | | | | |
| | | | | Media Services |
| | | | | |
| | | | | P.O. Box 358195 |
| | | | | |
| | | | | Pittsburgh, PA |
| | | | | 15251-5195 |
+--------------------+--------+--------+------+----------------------+
| l\. Petition for | 301 & | \$2, | MRR | Federal |
| Rulemaking for | 159 | 300.00 | | Communications |
| | | | | Commission |
| New Community of | or | | | |
| License or | | | | Media Services |
| | 302-FM | | | |
| Higher Class | & | | | P.O. Box 358195 |
| Channel | | | | |
| | 159 | | | Pittsburgh, PA |
| | | | | 15251-5195 |
+--------------------+--------+--------+------+----------------------+
| m\. Ownership | 323 & | \ | MAR | Federal |
| Report | 159 | $55.00 | | Communications |
| | | | | Commission |
| | or | | | |
| | | | | Media Services |
| | Corres | | | |
| | & 159 | | | P.O. Box 358180 |
| | | | | |
| | | | | Pittsburgh, PA |
| | | | | 15251-5180 |
+--------------------+--------+--------+------+----------------------+
| **4. FM | 349 & | \$ | MOF | Federal |
| Translators** | 159 | 625.00 | | Communications |
| | | | | Commission |
| a\. New or Major | | | | |
| Change | | | | Media Services |
| | | | | |
| Construction | | | | P.O. Box 358200 |
| Permit | | | | |
| | | | | Pittsburgh, PA |
| (Electronic | | | | 15251-5200 |
| Filing) | | | | |
+--------------------+--------+--------+------+----------------------+
| b\. New License | 350 & | \$ | MEF | Federal |
| | 159 | 125.00 | | Communications |
| (Electronic | | | | Commission |
| Filing) | | | | |
| | | | | Media Services |
| | | | | |
| | | | | P.O. Box 358200 |
| | | | | |
| | | | | Pittsburgh, PA |
| | | | | 15251-5200 |
+--------------------+--------+--------+------+----------------------+
| c\. License | 303-S | \ | MAF | Federal |
| Renewal | & 159 | $55.00 | | Communications |
| | | | | Commission |
| | | | | |
| | | | | Mass Media Services |
| | | | | |
| | | | | Media Services |
| | | | | |
| | | | | P.O. Box 358190 |
| | | | | |
| | | | | Pittsburgh, PA |
| | | | | 15251-5190 |
+--------------------+--------+--------+------+----------------------+
| d\. Special | Corres | \$ | MGF | Federal |
| Temporary | & 159 | 150.00 | | Communications |
| Authority | | | | Commission |
| | | | | |
| | | | | Media Services |
| | | | | |
| | | | | P.O. Box 358200 |
| | | | | |
| | | | | Pittsburgh, PA |
| | | | | 15251-5200 |
+--------------------+--------+--------+------+----------------------+
| e\. License | 345 & | \$ | M | Federal |
| Assignment | 159 | 120.00 | DF\* | Communications |
| | | | | Commission |
| | 314 & | | | |
| | 159 | | | Media Services |
| | | | | |
| | 316 & | | | P.O. Box 358350 |
| | 159 | | | |
| | | | | Pittsburg, PA |
| | | | | 15251-5350 |
+--------------------+--------+--------+------+----------------------+
| f\. Transfer of | 345 & | \$ | M | Federal |
| Control | 159 | 120.00 | DF\* | Communications |
| | | | | Commission |
| | 314315 | | | |
| | & 159 | | | Media Services |
| | | | | |
| | 316 & | | | P.O. Box 358350 |
| | 159 | | | |
| | | | | Pittsburgh, PA |
| | | | | 15251-5350 |
+--------------------+--------+--------+------+----------------------+
| **5. TV | 346 & | \$ | MOL | Federal |
| Translators and | 159 | 625.00 | | Communications |
| LPTV Stations** | | | | Commission |
| | | | | |
| a\. New or Major | | | | Media Services |
| Change | | | | |
| | | | | P.O. Box 358185 |
| Construction | | | | |
| Permit | | | | Pittsburgh, PA |
| | | | | 15251-5185 |
| (per application) | | | | |
| | | | | |
| (Electronic | | | | |
| Filing) | | | | |
+--------------------+--------+--------+------+----------------------+
| b\. New License | 347 & | \$ | MEL | Federal |
| | 159 | 125.00 | | Communications |
| (per application) | | | | Commission |
| | | | | |
| | | | | Media Services |
| | | | | |
| | | | | P.O. Box 358185 |
| | | | | |
| | | | | Pittsburgh, PA |
| | | | | 15251-5185 |
+--------------------+--------+--------+------+----------------------+
| c\. License | 303-S | \ | M | Federal |
| Renewal | & 159 | $55.00 | AL\* | Communications |
| | | | | Commission |
| | | | | |
| | | | | Media Services |
| | | | | |
| | | | | P.O. Box 358165 |
| | | | | |
| | | | | Pittsburgh, PA |
| | | | | 15251-5165 |
+--------------------+--------+--------+------+----------------------+
| d\. Special | Corres | \$ | MGL | Federal |
| Temporary | & 159 | 150.00 | | Communications |
| Authority | | | | Commission |
| | | | | |
| | | | | Media Services |
| | | | | |
| | | | | P.O. Box 358185 |
| | | | | |
| | | | | Pittsburgh, PA |
| | | | | 15251-5185 |
+--------------------+--------+--------+------+----------------------+
| e\. License | 345 & | \$ | M | Federal |
| Assignment | 159 | 120.00 | DL\* | Communications |
| | | | | Commission |
| | 314 & | | | |
| | 159 | | | Media Services |
| | | | | |
| | 316 & | | | P.O. Box 358350 |
| | 159 | | | |
| | | | | Pittsburgh, PA |
| | | | | 15251-5350 |
+--------------------+--------+--------+------+----------------------+
| f\. Transfer of | 345 & | \$ | M | Federal |
| Control | 159 | 120.00 | DL\* | Communications |
| | | | | Commission |
| | 314315 | | | |
| | & 159 | | | Media Services |
| | | | | |
| | 316 & | | | P.O. Box 358350 |
| | 159 | | | |
| | | | | Pittsburgh, PA |
| | | | | 15251-5350 |
+--------------------+--------+--------+------+----------------------+
| **6. FM Booster | 349 & | \$ | MOF | Federal |
| Stations** | 159 | 625.00 | | Communications |
| | | | | Commission |
| a\. New or Major | | | | |
| Change | | | | Media Services |
| | | | | |
| Construction | | | | P.O. Box 358200 |
| Permit | | | | |
| | | | | Pittsburgh, PA |
| **(Electronic | | | | 15251-5200 |
| Filing)** | | | | |
+--------------------+--------+--------+------+----------------------+
| b\. New License | 350 & | \$ | MEF | Federal |
| | 159 | 125.00 | | Communications |
| **(Electronic | | | | Commission |
| Filing)** | | | | |
| | | | | Media Services |
| | | | | |
| | | | | P.O. Box 358200 |
| | | | | |
| | | | | Pittsburgh, PA |
| | | | | 15251-5200 |
+--------------------+--------+--------+------+----------------------+
| c\. Special | Corres | \$ | MGF | Federal |
| Temporary | & 159 | 150.00 | | Communications |
| Authority | | | | Commission |
| | | | | |
| | | | | Media Services |
| | | | | |
| | | | | P.O. Box 358200 |
| | | | | |
| | | | | Pittsburgh, PA |
| | | | | 15251-5200 |
+--------------------+--------+--------+------+----------------------+
| 7\. TV Booster | 346 & | \$ | MOF | Federal |
| Stations | 159 | 625.00 | | Communications |
| | | | | Commission |
| a\. New or Major | | | | |
| Change | | | | Media Services |
| | | | | |
| **(Electronic | | | | P.O. Box 358185 |
| Filing)** | | | | |
| | | | | Pittsburgh, PA |
| | | | | 15251-5185 |
+--------------------+--------+--------+------+----------------------+
| b\. New License | 347 & | \$ | MEF | Federal |
| | 159 | 125.00 | | Communications |
| **(Electronic | | | | Commission |
| Filing)** | | | | |
| | | | | Media Services |
| | | | | |
| | | | | P.O. Box 358185 |
| | | | | |
| | | | | Pittsburgh, PA |
| | | | | 15251-5185 |
+--------------------+--------+--------+------+----------------------+
| c\. Special | Corres | \$ | MGF | Federal |
| Temporary | & 159 | 150.00 | | Communications |
| Authority | | | | Commission |
| | | | | |
| | | | | Media Services |
| | | | | |
| | | | | P.O. Box 358185 |
| | | | | |
| | | | | Pittsburgh, PA |
| | | | | 15251-5185 |
+--------------------+--------+--------+------+----------------------+
| **8. Cable | 327 & | \$ | TIC | Federal |
| Television | 159 | 230.00 | | Communications |
| Services** | | | | Commission |
| | | | | |
| a\. CARS License | | | | Media Services |
| | | | | |
| | | | | P.O. Box 358205 |
| | | | | |
| | | | | Pittsburgh, PA |
| | | | | 15215-5205 |
+--------------------+--------+--------+------+----------------------+
| b\. CARS | 327 & | \$ | TIC | Federal |
| Modifications | 159 | 230.00 | | Communications |
| | | | | Commission |
| | | | | |
| | | | | Media Services |
| | | | | |
| | | | | P.O .Box 358205 |
| | | | | |
| | | | | Pittsburgh, PA |
| | | | | 15215-5205 |
+--------------------+--------+--------+------+----------------------+
| c\. CARS License | 327 & | \$ | TIC | Federal |
| Renewal | 159 | 230.00 | | Communications |
| | | | | Commission |
| | | | | |
| | | | | Media Services |
| | | | | |
| | | | | P.O. Box 358205 |
| | | | | |
| | | | | Pittsburgh, PA |
| | | | | 15215-5205 |
+--------------------+--------+--------+------+----------------------+
| d\. CARS License | 327 & | \$ | TIC | Federal |
| Assignment | 159 | 230.00 | | Communications |
| | | | | Commission |
| | | | | |
| | | | | Media Services |
| | | | | |
| | | | | P.O. Box 358205 |
| | | | | |
| | | | | Pittsburgh, PA |
| | | | | 15215-5205 |
+--------------------+--------+--------+------+----------------------+
| e\. CARS Transfer | 327 & | \$ | TIC | Federal |
| of Control | 159 | 230.00 | | Communications |
| | | | | Commission |
| | | | | |
| | | | | Media Services |
| | | | | |
| | | | | P.O. Box 358205 |
| | | | | |
| | | | | Pittsburgh, PA |
| | | | | 15215-5205 |
+--------------------+--------+--------+------+----------------------+
| f\. Special | Corres | \$ | TGC | Federal |
| Temporary | & 159 | 150.00 | | Communications |
| Authorization | | | | Commission |
| | | | | |
| | | | | Media Services |
| | | | | |
| | | | | P.O. Box 358205 |
| | | | | |
| | | | | Pittsburgh, PA |
| | | | | 15215-5205 |
+--------------------+--------+--------+------+----------------------+
| g\. Cable Special | Corres | \$1, | TQC | Federal |
| Relief Petition | & 159 | 160.00 | | Communications |
| | | | | Commission |
| | | | | |
| | | | | Media Services |
| | | | | |
| | | | | P.O. Box 358205 |
| | | | | |
| | | | | Pittsburgh, PA |
| | | | | 15215-5205 |
+--------------------+--------+--------+------+----------------------+
| h\. 76.1801 Cable | Cor | \ | TAC | Federal |
| Community | res322 | $55.00 | | Communications |
| | & 159 | | | Commission |
| Registration | | | | |
| Statement | | | | Media Services |
| | | | | |
| **(Electronic | | | | P.O. Box 358205 |
| Filing)** | | | | |
| | | | | Pittsburgh, PA |
| | | | | 15215-5205 |
+--------------------+--------+--------+------+----------------------+
| i\. Aeronautical | Cor | \ | TAC | Federal |
| Frequency Usage | res321 | $55.00 | | Communications |
| | & 159 | | | Commission |
| Notification Sec. | | | | |
| 76.1804 | | | | Media Services |
| | | | | |
| | | | | P.O. Box 358205 |
| | | | | |
| | | | | Pittsburgh, PA |
| | | | | 15215-5205 |
+--------------------+--------+--------+------+----------------------+
> **5. Section 1.1105 is revised to read as follows:**
>
> **[§1.1105 Schedule of charges for applications and other filings for
> the wireline competition service.]{.underline}**
+--------------------+--------+--------+------+----------------------+
| **Service** | **FCC | * | **P | **Address** |
| | Form | *Fee** | ayme | |
| | No.** | | nt** | |
| | | **Am | | |
| | | ount** | **Ty | |
| | | | pe** | |
| | | | | |
| | | | **Co | |
| | | | de** | |
+====================+========+========+======+======================+
| **1. Communication | Corres | \$5, | CLEA | Federal |
| Assistance for** | & 159 | 210.00 | | Communications |
| | | | | Commission |
| **Law Enforcement | | | | |
| (CALEA)** | | | | Wireline Competition |
| | | | | Bureau - IA&TD CALEA |
| Petitions | | | | |
| | | | | P.O. Box 358140 |
| | | | | |
| | | | | Pittsburgh, PA |
| | | | | 15251-5140 |
+--------------------+--------+--------+------+----------------------+
| **2. Domestic 214 | Corres | \$ | CUT | Federal |
| Applications** | & 159 | 895.00 | | Communications |
| | | | | Commission |
| a\. Domestic Cable | | | | |
| Construction | | | | Wireline Competition |
| | | | | Bureau - CPD - 214 |
| | | | | Appls. |
| | | | | |
| | | | | P.O.Box 358145 |
| | | | | |
| | | | | Pittsburgh, PA |
| | | | | 15251-5145 |
+--------------------+--------+--------+------+----------------------+
| b\. Other | Corres | \$ | CUT | Federal |
| | & 159 | 895.00 | | Communications |
| | | | | Commission |
| | | | | |
| | | | | Wireline Competition |
| | | | | Bureau - CPD - 214 |
| | | | | Appls. |
| | | | | |
| | | | | P.O. Box 358145 |
| | | | | |
| | | | | Pittsburgh, PA |
| | | | | 15251-5145 |
+--------------------+--------+--------+------+----------------------+
| **3. Tariff | Corres | \$ | CQK | Federal |
| Filings** | & 159 | 720.00 | | Communications |
| | | | | Commission |
| a\. Filing Fees | | | | |
| | | | | Wireline Competition |
| (per transmittal | | | | Bureau - PPD Tariffs |
| or cover letter) | | | | Filings |
| | | | | |
| | | | | P.O. Box 358150 |
| | | | | |
| | | | | Pittsburgh, PA |
| | | | | 15251-5150 |
+--------------------+--------+--------+------+----------------------+
| b\. Application | Corres | \$ | CQK | Federal |
| for Special | & 159 | 720.00 | | Communications |
| Permission Filing | | | | Commission |
| (request for | | | | |
| waiver of any rule | | | | Wireline Competition |
| in | | | | Bureau - PPD Tariffs |
| | | | | Filings |
| Part 61 of the | | | | |
| Commission's | | | | P.O. Box 358150 |
| | | | | |
| Rules) | | | | Pittsburgh, PA |
| | | | | 15251-5150 |
| (per request) | | | | |
+--------------------+--------+--------+------+----------------------+
| c\. Waiver of Part | Corres | \$ | CQK | Federal |
| 69 Tariff Rules | & 159 | 720.00 | | Communications |
| | | | | Commission |
| (per request) | | | | |
| | | | | Wireline Competition |
| | | | | Bureau - PPD Tariffs |
| | | | | Filings |
| | | | | |
| | | | | P.O. Box 358150 |
| | | | | |
| | | | | Pittsburgh, PA |
| | | | | 15251-5150 |
+--------------------+--------+--------+------+----------------------+
| **4. Accounting** | Corres | \$30, | BKA | Federal |
| | & 159 | 350.00 | | Communications |
| a\. Review of | | | | Commission |
| Depreciation | | | | |
| Update Study | | | | Wireline Competition |
| | | | | Bureau - PPD - |
| (single state) | | | | Accounting Rule |
| | | | | |
| | | | | Depreciation |
| | | | | |
| | | | | P.O. Box 358140 |
| | | | | |
| | | | | Pittsburgh, PA |
| | | | | 15251-5140 |
+--------------------+--------+--------+------+----------------------+
| \(ii\) Each | Corres | \$1, | CVA | Federal |
| Additional State | & 159 | 000.00 | | Communications |
| | | | | Commission |
| | | | | |
| | | | | Wireline Competition |
| | | | | Bureau - PPD - |
| | | | | Accounting Rule |
| | | | | Depreciation |
| | | | | |
| | | | | P.O. Box |
| | | | | 358125358140 |
| | | | | |
| | | | | Pittsburgh, PA |
| | | | | 15251-51255140 |
+--------------------+--------+--------+------+----------------------+
| b\. Petition for | Corres | \$6, | BEA | Federal |
| Waiver | & 159 | 840.00 | | Communications |
| | | | | Commission |
| (per petition) | | | | |
| | | | | Wireline Competition |
| Waiver of Part 69 | | | | Services - PPD |
| Accounting | | | | Tariffs Accounting |
| | | | | Rule Waiver |
| Rules & Part 32 | | | | |
| Accounting | | | | P.O. Box 358140 |
| | | | | |
| Rules, | | | | Pittsburgh, PA |
| | | | | 15251-5140 |
| Part 36 Separation | | | | |
| Rules, | | | | |
| | | | | |
| Part 43 Reporting | | | | |
| | | | | |
| Requirements | | | | |
| | | | | |
| Part 64 Allocation | | | | |
| of Costs | | | | |
| | | | | |
| Rules | | | | |
| | | | | |
| Part 65 Rate of | | | | |
| Return & Rate | | | | |
| | | | | |
| Base Rules | | | | |
+--------------------+--------+--------+------+----------------------+
> **6. Section 1.1106 is revised to read as follows**:
>
> §**1.1106 Schedule of charges for applications and other filings for
> the enforcement services**
+--------------------+--------+--------+------+----------------------+
| **Service** | **FCC | * | **P | **Address** |
| | Form | *Fee** | ayme | |
| | No.** | | nt** | |
| | | **Am | | |
| | | ount** | **Ty | |
| | | | pe** | |
| | | | | |
| | | | **Co | |
| | | | de** | |
+====================+========+========+======+======================+
| **1. Formal | Corres | \$ | CIZ | Federal |
| Complaints** | & 159 | 180.00 | | Communications |
| | | | | Commission |
| | | | | |
| | | | | Enforcement |
| | | | | |
| | | | | P.O. Box 358120 |
| | | | | |
| | | | | Pittsburgh, PA |
| | | | | 15251-5120 |
+--------------------+--------+--------+------+----------------------+
| **2. Accounting | Corres | \$91, | BMA | Carriers will be |
| and Audits** | & 159 | 390.00 | | billed |
| | | | | |
| a\. Field Audit | | | | |
+--------------------+--------+--------+------+----------------------+
| b\. Review of | Corres | \$49, | BLA | Carriers will be |
| Arrest Audit | & 159 | 885.00 | | billed |
+--------------------+--------+--------+------+----------------------+
| **3. Development | Corres | \$49, | BLA | Federal |
| and Review of | & 159 | 885.00 | | Communications |
| Agreed upon - | | | | Commission |
| Procedures | | | | |
| Engagement** | | | | Enforcement |
| | | | | |
| | | | | P.O. Box 358125 |
| | | | | |
| | | | | Pittsburgh, PA |
| | | | | 15251-5125 |
+--------------------+--------+--------+------+----------------------+
| **4. Pole | Corres | \$ | TPC | Federal |
| Attachment | & 159 | 225.00 | | Communications |
| Complaint** | | | | Commission |
| | | | | |
| | | | | Enforcement |
| | | | | |
| | | | | P.O .Box 358110 |
| | | | | |
| | | | | Pittsburgh, PA |
| | | | | 15215-5110 |
+--------------------+--------+--------+------+----------------------+
> **7. Section 1.1107 is revised to read as follows:**
>
> **[§1.1107 Schedule of charges for applications and other filings for
> the international service.]{.underline}**
+--------------------+--------+--------+------+----------------------+
| **Service** | **FCC | * | **P | **Address** |
| | Form | *Fee** | ayme | |
| | No.** | | nt** | |
| | | **Am | | |
| | | ount** | **Ty | |
| | | | pe** | |
| | | | | |
| | | | **Co | |
| | | | de** | |
+====================+========+========+======+======================+
| **1. International | 407 & | \$ | CSN | Federal |
| Fixed Public | 159 | 750.00 | | Communications |
| Radio** | | | | Commission |
| | | | | |
| (Public & Control | | | | International |
| Stations) | | | | Bureau - Fixed |
| | | | | Public Radio |
| a\. Initial | | | | |
| Construction | | | | P.O. Box 358160 |
| Permit | | | | |
| | | | | Pittsburgh, PA |
| (per station) | | | | 15251-5160 |
+--------------------+--------+--------+------+----------------------+
| b\. Assignment or | 702 & | \$ | CSN | Federal |
| Transfer | 159 | 750.00 | | Communications |
| | | | | Commission |
| (per Application) | or | | | |
| | | | | International |
| | 704 & | | | Bureau - Fixed |
| | 159 | | | Public Radio |
| | | | | |
| | | | | P.O. Box 358160 |
| | | | | |
| | | | | Pittsburgh, PA |
| | | | | 15251-5160 |
+--------------------+--------+--------+------+----------------------+
| c\. Renewal ( per | 405 & | \$ | CON | Federal |
| license ) | 159 | 545.00 | | Communications |
| | | | | Commission |
| | | | | |
| | | | | International |
| | | | | Bureau - Fixed |
| | | | | Public Radio |
| | | | | |
| | | | | P.O. Box 358160 |
| | | | | |
| | | | | Pittsburgh, PA |
| | | | | 15251-5160 |
+--------------------+--------+--------+------+----------------------+
| d\. Modification | 403 & | \$ | CON | Federal |
| (per station) | 159 | 545.00 | | Communications |
| | | | | Commission |
| | | | | |
| | | | | International |
| | | | | Bureau - Fixed |
| | | | | Public Radio |
| | | | | |
| | | | | P.O. Box 358160 |
| | | | | |
| | | | | Pittsburgh, PA |
| | | | | 15251-5160 |
+--------------------+--------+--------+------+----------------------+
| e\. Extension of | 701 & | \$ | CKN | Federal |
| Construction | 159 | 275.00 | | Communications |
| | | | | Commission |
| Authorization (per | | | | |
| station) | | | | International |
| | | | | Bureau - Fixed |
| | | | | Public Radio |
| | | | | |
| | | | | P.O. Box 358160 |
| | | | | |
| | | | | Pittsburgh, PA |
| | | | | 15251-5160 |
+--------------------+--------+--------+------+----------------------+
| f\. Special | Corres | \$ | CKN | Federal |
| Temporary | & 159 | 275.00 | | Communications |
| Authority | | | | Commission |
| | | | | |
| or request for | | | | International |
| Waiver(per | | | | Bureau - Fixed |
| | | | | Public Radio |
| request) | | | | |
| | | | | P.O. Box 358160 |
| | | | | |
| | | | | Pittsburgh, PA |
| | | | | 15251-5160 |
+--------------------+--------+--------+------+----------------------+
| **2. Section 214 | Corres | \$13, | BIT | Federal |
| Applications** | & 159 | 390.00 | | Communications |
| | | | | Commission |
| a\. Overseas Cable | | | | |
| Construction | | | | International |
| | | | | Bureau - |
| | | | | Telecommunications |
| | | | | |
| | | | | P.O. Box 358115 |
| | | | | |
| | | | | Pittsburgh, PA |
| | | | | 15251-5115 |
+--------------------+--------+--------+------+----------------------+
| b\. Cable Landing | Corres | \$1, | CXT | Federal |
| License | & 159 | 505.00 | | Communications |
| | | | | Commission |
| \(i\) Common | | | | |
| Carrier | | | | International |
| | | | | Bureau - |
| | | | | Telecommunications |
| | | | | |
| | | | | P.O. Box 358115 |
| | | | | |
| | | | | Pittsburgh, PA |
| | | | | 15251-5115 |
+--------------------+--------+--------+------+----------------------+
| \(ii\) Non-Common | Corres | \$14, | BJT | Federal |
| Carrier | & 159 | 895.00 | | Communications |
| | | | | Commission |
| | | | | |
| | | | | International |
| | | | | Bureau - |
| | | | | Telecommunications |
| | | | | |
| | | | | P.O. Box 358115 |
| | | | | |
| | | | | Pittsburgh, PA |
| | | | | 15251-5115 |
+--------------------+--------+--------+------+----------------------+
| c\. All other | Corres | \$ | CUT | Federal |
| International 214 | & 159 | 895.00 | | Communications |
| | | | | Commission |
| Applications | | | | |
| | | | | International |
| | | | | Bureau - |
| | | | | Telecommunications |
| | | | | |
| | | | | P.O. Box 358115 |
| | | | | |
| | | | | Pittsburgh, PA |
| | | | | 15251-5115 |
+--------------------+--------+--------+------+----------------------+
| d\. Special | Corres | \$ | CUT | Federal |
| Temporary | & 159 | 895.00 | | Communications |
| Authority | | | | Commission |
| | | | | |
| (all services) | | | | International |
| | | | | Bureau - |
| | | | | Telecommunications |
| | | | | |
| | | | | P.O. Box 358115 |
| | | | | |
| | | | | Pittsburgh, PA |
| | | | | 15251-5115 |
+--------------------+--------+--------+------+----------------------+
| e\. Assignments or | Corres | \$ | CUT | Federal |
| transfers | & 159 | 895.00 | | Communications |
| | | | | Commission |
| (all services) | | | | |
| | | | | International |
| | | | | Bureau - |
| | | | | Telecommunications |
| | | | | |
| | | | | P.O. Box 358115 |
| | | | | |
| | | | | Pittsburgh, PA |
| | | | | 15251-5115 |
+--------------------+--------+--------+------+----------------------+
| **3. Fixed | 312 | \$2, | BAX | Federal |
| Satellite** | | 240.00 | | Communications |
| | Main & | | | Commission |
| ** | Sc | | | |
| Transmit/Receive** | hedule | | | International |
| | B | | | Bureau - Earth |
| **Earth Stations** | | | | Stations |
| | & 159 | | | |
| a\. Initial | | | | P.O. Box 358160 |
| Application (per | | | | |
| station) | | | | Pittsburgh, PA |
| | | | | 15251-5160 |
+--------------------+--------+--------+------+----------------------+
| b\. Modification | 312 | \$ | CGX | Federal |
| of License | | 155.00 | | Communications |
| | Main & | | | Commission |
| (per station) | Sc | | | |
| | hedule | | | International |
| | B | | | Bureau - Earth |
| | | | | Stations |
| | & 159 | | | |
| | | | | P.O. Box 358160 |
| | | | | |
| | | | | Pittsburgh, PA |
| | | | | 15251-5160 |
+--------------------+--------+--------+------+----------------------+
| c\. Assignment or | 312 | \$ | CNX | Federal |
| Transfer | | 445.00 | | Communications |
| | Main & | | | Commission |
| \(i\) First | Sc | | | |
| station | hedule | | | International |
| | A | | | Bureau - Earth |
| | | | | Stations |
| | & 159 | | | |
| | | | | P.O. Box 358160 |
| | | | | |
| | | | | Pittsburgh, PA |
| | | | | 15251-5160 |
+--------------------+--------+--------+------+----------------------+
| \(ii\) Each | Atta | \$ | CFX | Federal |
| Additional Station | chment | 150.00 | | Communications |
| | to FCC | | | Commission |
| | 312 | | | |
| | Sc | | | International |
| | hedule | | | Bureau - Earth |
| | A | | | Stations |
| | | | | |
| | & 159 | | | P.O. Box 358160 |
| | | | | |
| | | | | Pittsburgh, PA |
| | | | | 15251-5160 |
+--------------------+--------+--------+------+----------------------+
| d\. Renewal of | 405 & | \$ | CGX | Federal |
| License | 159 | 155.00 | | Communications |
| | | | | Commission |
| ( per station ) | | | | |
| | | | | International |
| | | | | Bureau - Earth |
| | | | | Stations |
| | | | | |
| | | | | P.O. Box 358160 |
| | | | | |
| | | | | Pittsburgh, PA |
| | | | | 15251-5160 |
+--------------------+--------+--------+------+----------------------+
| e\. Special | Corres | \$ | CGX | Federal |
| Temporary | & 159 | 155.00 | | Communications |
| Authority | | | | Commission |
| | | | | |
| or Waiver of Prior | | | | International |
| | | | | Bureau - Earth |
| Construction | | | | Stations |
| | | | | |
| Authorization | | | | P.O. Box 358160 |
| | | | | |
| ( per request ) | | | | Pittsburgh, PA |
| | | | | 15251-5160 |
+--------------------+--------+--------+------+----------------------+
| f\. Amendment of | 312 | \$ | CGX | Federal |
| Pending | | 155.00 | | Communications |
| | Main & | | | Commission |
| Application | Sc | | | |
| | hedule | | | International |
| ( per station ) | B | | | Bureau - Earth |
| | | | | Stations |
| | & 159 | | | |
| | | | | P.O. Box 358160 |
| | | | | |
| | | | | Pittsburgh, PA |
| | | | | 15251-5160 |
+--------------------+--------+--------+------+----------------------+
| g\. Extension of | 701 & | \$ | CGX | Federal |
| Construction | 159 | 155.00 | | Communications |
| | | | | Commission |
| Permit | | | | |
| | | | | International |
| ( per station ) | | | | Bureau - Earth |
| | | | | Stations |
| | | | | |
| | | | | P.O. Box 358160 |
| | | | | |
| | | | | Pittsburgh, PA |
| | | | | 15251-5160 |
+--------------------+--------+--------+------+----------------------+
| **4. Fixed | 312 | \$4, | BDS | Federal |
| Satellite** | | 960.00 | | Communications |
| | Main & | | | Commission |
| ** | Sc | | | |
| transmit/receive** | hedule | | | International |
| | B | | | Bureau - Earth |
| **Earth Stations | | | | Stations |
| (2 meters or** | & 159 | | | |
| | | | | P.O. Box 358160 |
| **less operating | | | | |
| in the 4/6 GHz** | | | | Pittsburgh, PA |
| | | | | 15251-5160 |
| **frequency | | | | |
| band)** | | | | |
| | | | | |
| a\. Lead | | | | |
| Application | | | | |
+--------------------+--------+--------+------+----------------------+
| b\. Routine | 312 & | \ | CAS | Federal |
| Application | | $55.00 | | Communications |
| | Main & | | | Commission |
| ( per station ) | Sc | | | |
| | hedule | | | International |
| | B | | | Bureau - Earth |
| | | | | Stations |
| | & 159 | | | |
| | | | | P.O. Box 358160 |
| | | | | |
| | | | | Pittsburgh, PA |
| | | | | 15251-5160 |
+--------------------+--------+--------+------+----------------------+
| c\. Modification | 312 | \$ | CGS | Federal |
| of License | | 155.00 | | Communications |
| | Main & | | | Commission |
| ( per station ) | Sc | | | |
| | hedule | | | International |
| | B & | | | Bureau - Earth |
| | 159 | | | Stations |
| | | | | |
| | | | | P.O. Box 358160 |
| | | | | |
| | | | | Pittsburgh, PA |
| | | | | 15251-5160 |
+--------------------+--------+--------+------+----------------------+
| d\. Assignment or | 312 | \$ | CNS | Federal |
| Transfer | | 445.00 | | Communications |
| | Main & | | | Commission |
| \(i\) First | | | | |
| Station | Sc | | | International |
| | hedule | | | Bureau - Earth |
| | A | | | Stations |
| | | | | |
| | & 159 | | | P.O. Box 358160 |
| | | | | |
| | | | | Pittsburgh, PA |
| | | | | 15251-5160 |
+--------------------+--------+--------+------+----------------------+
| \(ii\) Each | Atta | \ | CAS | Federal |
| Additional Station | chment | $55.00 | | Communications |
| | | | | Commission |
| | to 312 | | | |
| | & | | | International |
| | | | | Bureau - Earth |
| | Sc | | | Stations |
| | hedule | | | |
| | A | | | P.O. Box 358160 |
| | | | | |
| | & 159 | | | Pittsburgh, PA |
| | | | | 15251-5160 |
+--------------------+--------+--------+------+----------------------+
| e\. Renewal of | 405 & | \$ | CGS | Federal |
| License | 159 | 155.00 | | Communications |
| | | | | Commission |
| ( per station ) | | | | |
| | | | | International |
| | | | | Bureau - Earth |
| | | | | Stations |
| | | | | |
| | | | | P.O. Box 358160 |
| | | | | |
| | | | | Pittsburgh, PA |
| | | | | 15251-5160 |
+--------------------+--------+--------+------+----------------------+
| f\. Special | Corres | \$ | CGS | Federal |
| Temporary | & 159 | 155.00 | | Communications |
| Authority | | | | Commission |
| | | | | |
| or Waiver of Prior | | | | International |
| Construction | | | | Bureau - Earth |
| | | | | Stations |
| Authorization | | | | |
| | | | | P.O. Box 358160 |
| ( per request ) | | | | |
| | | | | Pittsburgh, PA |
| | | | | 15251-5160 |
+--------------------+--------+--------+------+----------------------+
| g\. Amendment of | 312 | \$ | CGS | Federal |
| Pending | | 155.00 | | Communications |
| | Main & | | | Commission |
| Application | Sc | | | |
| | hedule | | | International |
| ( per station ) | A or B | | | Bureau - Earth |
| | | | | Stations |
| | & 159 | | | |
| | | | | P.O. Box 358160 |
| | | | | |
| | | | | Pittsburgh, PA |
| | | | | 15251-5160 |
+--------------------+--------+--------+------+----------------------+
| h\. Extension of | 701 & | \$ | CGS | Federal |
| Construction | 159 | 155.00 | | Communications |
| | | | | Commission |
| Permit | | | | |
| | | | | International |
| ( per station ) | | | | Bureau - Earth |
| | | | | Stations |
| | | | | |
| | | | | P.O. Box 358160 |
| | | | | |
| | | | | Pittsburgh, PA |
| | | | | 15251-5160 |
+--------------------+--------+--------+------+----------------------+
| **5. Receive Only | 312 | \$ | CMO | Federal |
| Earth Stations** | | 340.00 | | Communications |
| | Main & | | | Commission |
| a\. Initial | | | | |
| Applications for | Sc | | | International |
| | hedule | | | Bureau - Earth |
| Registration or | B | | | Stations |
| License | | | | |
| | & 159 | | | P.O. Box 358160 |
| (per station) | | | | |
| | | | | Pittsburgh, PA |
| | | | | 15251-5160 |
+--------------------+--------+--------+------+----------------------+
| b\. Modification | 312 | \$ | CGO | Federal |
| of License or | | 155.00 | | Communications |
| | Main & | | | Commission |
| Registration | | | | |
| | Sc | | | International |
| ( per station ) | hedule | | | Bureau - Earth |
| | B | | | Stations |
| | | | | |
| | & 159 | | | P.O. Box 358160 |
| | | | | |
| | | | | Pittsburgh, PA |
| | | | | 15251-5160 |
+--------------------+--------+--------+------+----------------------+
| c\. Assignment or | 312 | \$ | CNO | Federal |
| Transfer | | 445.00 | | Communications |
| | Main & | | | Commission |
| \(i\) First | | | | |
| Station | Sc | | | International |
| | hedule | | | Bureau - Earth |
| | A | | | Stations |
| | | | | |
| | & 159 | | | P.O. Box 358160 |
| | | | | |
| | | | | Pittsburgh, PA |
| | | | | 15251-5160 |
+--------------------+--------+--------+------+----------------------+
| \(ii\) Each | Atta | \$ | CFO | Federal |
| Additional Station | chment | 150.00 | | Communications |
| | to 312 | | | Commission |
| | - | | | |
| | | | | International |
| | Sc | | | Bureau - Earth |
| | hedule | | | Stations |
| | A | | | |
| | | | | P.O. Box 358160 |
| | & 159 | | | |
| | | | | Pittsburgh, PA |
| | | | | 15251-5160 |
+--------------------+--------+--------+------+----------------------+
| d\. Renewal of | 405 & | \$ | CGO | Federal |
| License | 159 | 155.00 | | Communications |
| | | | | Commission |
| (per station) | | | | |
| | | | | International |
| | | | | Bureau - Earth |
| | | | | Stations |
| | | | | |
| | | | | P.O. Box 358160 |
| | | | | |
| | | | | Pittsburgh, PA |
| | | | | 15251-5160 |
+--------------------+--------+--------+------+----------------------+
| e\. Amendment of | 312 | \$ | CGO | Federal |
| Pending | | 155.00 | | Communications |
| | Main & | | | Commission |
| Application | | | | |
| | Sc | | | International |
| ( per station ) | hedule | | | Bureau - Earth |
| | A or B | | | Stations |
| | | | | |
| | & 159 | | | P.O. Box 358160 |
| | | | | |
| | | | | Pittsburgh, PA |
| | | | | 15251-5160 |
+--------------------+--------+--------+------+----------------------+
| f\. Extension of | 701 & | \$ | CGO | Federal |
| Construction | 159 | 155.00 | | Communications |
| Permit | | | | Commission |
| | | | | |
| ( per station ) | | | | International |
| | | | | Bureau - Earth |
| | | | | Stations |
| | | | | |
| | | | | P.O. Box 358160 |
| | | | | |
| | | | | Pittsburgh, PA |
| | | | | 15251-5160 |
+--------------------+--------+--------+------+----------------------+
| g\. Waivers | Corres | \$ | CGO | Federal |
| | & 159 | 155.00 | | Communications |
| ( per request ) | | | | Commission |
| | | | | |
| | | | | International |
| | | | | Bureau - Earth |
| | | | | Stations |
| | | | | |
| | | | | P.O. Box 358160 |
| | | | | |
| | | | | Pittsburgh, PA |
| | | | | 15251-5160 |
+--------------------+--------+--------+------+----------------------+
| **6. Fixed | 312 | \$8, | BGV | Federal |
| Satellite Very | | 260.00 | | Communications |
| Small** | Main & | | | Commission |
| | | | | |
| **Aperture** | Sc | | | International |
| | hedule | | | Bureau - Earth |
| **Terminal (VSAT) | B | | | Stations |
| Systems** | | | | |
| | & 159 | | | P.O. Box 358160 |
| a\. Initial | | | | |
| Application | | | | Pittsburgh, PA |
| | | | | 15251-5160 |
| (per station) | | | | |
+--------------------+--------+--------+------+----------------------+
| b\. Modification | 312 | \$ | CGV | Federal |
| of License | | 155.00 | | Communications |
| | Main & | | | Commission |
| ( per system ) | Sc | | | |
| | hedule | | | International |
| | B & | | | Bureau - Earth |
| | 159 | | | Stations |
| | | | | |
| | | | | P.O. Box 358160 |
| | | | | |
| | | | | Pittsburgh, PA |
| | | | | 15251-5160 |
+--------------------+--------+--------+------+----------------------+
| c\. Assignment or | 312 | \$2, | CZV | Federal |
| Transfer of | | 210.00 | | Communications |
| | Main & | | | Commission |
| System | | | | |
| | Sc | | | International |
| | hedule | | | Bureau - Earth |
| | A | | | Stations |
| | | | | |
| | & 159 | | | P.O. Box 358160 |
| | | | | |
| | | | | Pittsburgh, PA |
| | | | | 15251-5160 |
+--------------------+--------+--------+------+----------------------+
| d\. Renewal of | 405 & | \$ | CGV | Federal |
| License | 159 | 155.00 | | Communications |
| | | | | Commission |
| ( per system ) | | | | |
| | | | | International |
| | | | | Bureau - Earth |
| | | | | Stations |
| | | | | |
| | | | | P.O. Box 358160 |
| | | | | |
| | | | | Pittsburgh, PA |
| | | | | 15251-5160 |
+--------------------+--------+--------+------+----------------------+
| e\. Special | Corres | \$ | CGV | Federal |
| Temporary | & 159 | 155.00 | | Communications |
| Authority | | | | Commission |
| | | | | |
| or Waiver of Prior | | | | International |
| Construction | | | | Bureau - Earth |
| | | | | Stations |
| Authorization | | | | |
| | | | | P.O. Box 358160 |
| ( per request ) | | | | |
| | | | | Pittsburgh, PA |
| | | | | 15251-5160 |
+--------------------+--------+--------+------+----------------------+
| f\. Amendment of | 312 | \$ | CGV | Federal |
| Pending | | 155.00 | | Communications |
| | Main & | | | Commission |
| Application | | | | |
| | Sc | | | International |
| ( per system ) | hedule | | | Bureau - Earth |
| | A or B | | | Stations |
| | & | | | |
| | | | | P.O. Box 358160 |
| | 159 | | | |
| | | | | Pittsburgh, PA |
| | | | | 15251-5160 |
+--------------------+--------+--------+------+----------------------+
| g\. Extension of | 701 & | \$ | CGV | Federal |
| Construction | 159 | 155.00 | | Communications |
| | | | | Commission |
| Permit | | | | |
| | | | | International |
| ( per system ) | | | | Bureau - Earth |
| | | | | Stations |
| | | | | |
| | | | | P.O. Box 358160 |
| | | | | |
| | | | | Pittsburgh, PA |
| | | | | 15251-5160 |
+--------------------+--------+--------+------+----------------------+
| **7. Mobile | 312 | \$8, | BGB | Federal |
| Satellite Earth** | | 260.00 | | Communications |
| | Main & | | | Commission |
| **Stations** | | | | |
| | Sc | | | International |
| a\. Initial | hedule | | | Bureau - Earth |
| Applications of | B | | | Stations |
| | | | | |
| Blanket | & 159 | | | P.O. Box 358160 |
| Authorization | | | | |
| | | | | Pittsburgh, PA |
| | | | | 15251-5160 |
+--------------------+--------+--------+------+----------------------+
| b\. Initial | 312 | \$1, | CYB | Federal |
| Application for | | 985.00 | | Communications |
| | Main & | | | Commission |
| Individual Earth | | | | |
| Station | Sc | | | International |
| | hedule | | | Bureau - Earth |
| | B | | | Stations |
| | | | | |
| | & 159 | | | P.O. Box 358160 |
| | | | | |
| | | | | Pittsburgh, PA |
| | | | | 15251-5160 |
+--------------------+--------+--------+------+----------------------+
| c\. Modification | 312 | \$ | CGB | Federal |
| of License | | 155.00 | | Communications |
| | Main & | | | Commission |
| ( per system ) | | | | |
| | Sc | | | International |
| | hedule | | | Bureau - Earth |
| | B | | | Stations |
| | | | | |
| | & 159 | | | P.O. Box 358160 |
| | | | | |
| | | | | Pittsburgh, PA |
| | | | | 15251-5160 |
+--------------------+--------+--------+------+----------------------+
| d\. Assignment or | 312 | \$2, | CZB | Federal |
| Transfer | | 210.00 | | Communications |
| | Main & | | | Commission |
| ( per system ) | | | | |
| | Sc | | | International |
| | hedule | | | Bureau - Earth |
| | A | | | Stations |
| | | | | |
| | & 159 | | | P.O. Box 358160 |
| | | | | |
| | | | | Pittsburgh, PA |
| | | | | 15251-5160 |
+--------------------+--------+--------+------+----------------------+
| e\. Renewal of | 405 & | \$ | CGB | Federal |
| License | 159 | 155.00 | | Communications |
| | | | | Commission |
| ( per system ) | | | | |
| | | | | International |
| | | | | Bureau - Earth |
| | | | | Stations |
| | | | | |
| | | | | P.O. Box 358160 |
| | | | | |
| | | | | Pittsburgh, PA |
| | | | | 15251-5160 |
+--------------------+--------+--------+------+----------------------+
| f\. Special | Corres | \$ | CGB | Federal |
| Temporary | & 159 | 155.00 | | Communications |
| Authority of | | | | Commission |
| Waiver of Prior | | | | |
| Construction | | | | International |
| | | | | Bureau - Earth |
| Authorization ( | | | | Stations |
| per request ) | | | | |
| | | | | P.O. Box 358160 |
| | | | | |
| | | | | Pittsburgh, PA |
| | | | | 15251-5160 |
+--------------------+--------+--------+------+----------------------+
| g\. Amendment of | 312 | \$ | CGB | Federal |
| Pending | | 155.00 | | Communications |
| | Main & | | | Commission |
| Application | | | | |
| | Sc | | | International |
| ( per system ) | hedule | | | Bureau - Earth |
| | B | | | Stations |
| | | | | |
| | & 159 | | | P.O. Box 358160 |
| | | | | |
| | | | | Pittsburgh, PA |
| | | | | 15251-5160 |
+--------------------+--------+--------+------+----------------------+
| h\. Extension of | 701 & | \$ | CGB | Federal |
| Construction | 159 | 155.00 | | Communications |
| | | | | Commission |
| Permit | | | | |
| | | | | International |
| ( per system ) | | | | Bureau - Earth |
| | | | | Stations |
| | | | | |
| | | | | P.O. Box 358160 |
| | | | | |
| | | | | Pittsburgh, PA |
| | | | | 15251-5160 |
+--------------------+--------+--------+------+----------------------+
| **8. Radio | 312 | \$8, | BGH | Federal |
| Determination | | 260.00 | | Communications |
| Satellite** | Main & | | | Commission |
| | | | | |
| **Earth Stations** | Sc | | | International |
| | hedule | | | Bureau - Earth |
| a\. Initial | B | | | Stations |
| Application of | | | | |
| Blanket | & 159 | | | P.O. Box 358160 |
| | | | | |
| Authorization | | | | Pittsburgh, PA |
| | | | | 15251-5160 |
+--------------------+--------+--------+------+----------------------+
| b\. Initial | 312 | \$1, | CYH | Federal |
| Application for | | 985.00 | | Communications |
| Individual Earth | Main & | | | Commission |
| Station | | | | |
| | Sc | | | International |
| | hedule | | | Bureau - Earth |
| | B | | | Stations |
| | | | | |
| | & 159 | | | P.O. Box 358160 |
| | | | | |
| | | | | Pittsburgh, PA |
| | | | | 15251-5160 |
+--------------------+--------+--------+------+----------------------+
| c\. Modification | 312 | \$ | CGH | Federal |
| of License | | 155.00 | | Communications |
| | Main & | | | Commission |
| ( per system ) | | | | |
| | Sc | | | International |
| | hedule | | | Bureau - Earth |
| | B | | | Stations |
| | | | | |
| | & 159 | | | P.O. Box 358160 |
| | | | | |
| | | | | Pittsburgh, PA |
| | | | | 15251-5160 |
+--------------------+--------+--------+------+----------------------+
| d\. Assignments or | 312 | \$2, | CZH | Federal |
| Transfer | | 210.00 | | Communications |
| | Main & | | | Commission |
| ( per system ) | | | | |
| | Sc | | | International |
| | hedule | | | Bureau - Earth |
| | B | | | Stations |
| | | | | |
| | & 159 | | | P.O. Box 358160 |
| | | | | |
| | | | | Pittsburgh, PA |
| | | | | 15251-5160 |
+--------------------+--------+--------+------+----------------------+
| e\. Renewal of | 405 & | \$ | CGH | Federal |
| License | 159 | 155.00 | | Communications |
| | | | | Commission |
| ( per system ) | | | | |
| | | | | International |
| | | | | Bureau - Earth |
| | | | | Stations |
| | | | | |
| | | | | P.O. Box 358160 |
| | | | | |
| | | | | Pittsburgh, PA |
| | | | | 15251-5160 |
+--------------------+--------+--------+------+----------------------+
| f\. Special | Corres | \$ | CGH | Federal |
| Temporary | & 159 | 155.00 | | Communications |
| Authority or | | | | Commission |
| Waiver of Prior | | | | |
| Construction | | | | International |
| | | | | Bureau - Earth |
| Authorization | | | | Stations |
| | | | | |
| ( per request ) | | | | P.O. Box 358160 |
| | | | | |
| | | | | Pittsburgh, PA |
| | | | | 15251-5160 |
+--------------------+--------+--------+------+----------------------+
| g\. Amendment of | 312 & | \$ | CGH | Federal |
| Pending | | 155.00 | | Communications |
| | Sc | | | Commission |
| Application | hedule | | | |
| | B | | | International |
| ( per system ) | | | | Bureau - Earth |
| | & 159 | | | Stations |
| | | | | |
| | | | | P.O. Box 358160 |
| | | | | |
| | | | | Pittsburgh, PA |
| | | | | 15251-5160 |
+--------------------+--------+--------+------+----------------------+
| h\. Extension of | 701 & | \$ | CGH | Federal |
| Construction | 159 | 155.00 | | Communications |
| | | | | Commission |
| Permit | | | | |
| | | | | International |
| ( per system ) | | | | Bureau - Earth |
| | | | | Stations |
| | | | | |
| | | | | P.O. Box 358160 |
| | | | | |
| | | | | Pittsburgh, PA |
| | | | | 15251-5160 |
+--------------------+--------+--------+------+----------------------+
| **9. Space | 312 | \$102, | BNY | Federal |
| Stations( | | 700.00 | | Communications |
| Geostationary)** | Main & | | BNY | Commission |
| | 159 | \$102, | | |
| a\. Application | | 700.00 | | International |
| for Authority to | 312 | | | Bureau - Satellites |
| | | | | |
| Launch & Operate | Main & | | | P.O. Box 358210 |
| | 159 | | | |
| \(i\) Initial | | | | Pittsburgh, PA |
| Application | | | | 15251-5210 |
| | | | | |
| \(ii\) Replacement | | | | |
| Satellite | | | | |
+--------------------+--------+--------+------+----------------------+
| b\. Assignment or | 312 | \$7, | BFY | Federal |
| Transfer | | 340.00 | | Communications |
| | Main & | | | Commission |
| ( per satellite ) | | | | |
| | Sc | | | International |
| | hedule | | | Bureau - Satellites |
| | A | | | |
| | | | | P.O. Box 358210 |
| | & 159 | | | |
| | | | | Pittsburgh, PA |
| | | | | 15251-5210 |
+--------------------+--------+--------+------+----------------------+
| c\. Modification | 312 | \$7, | BFY | Federal |
| | | 340.00 | | Communications |
| | Main & | | | Commission |
| | 159 | | | |
| | | | | International |
| | | | | Bureau - Satellites |
| | | | | |
| | | | | P.O. Box 358210 |
| | | | | |
| | | | | Pittsburgh, PA |
| | | | | 15251-5210 |
+--------------------+--------+--------+------+----------------------+
| d\. Special | Corres | \$ | CRY | Federal |
| Temporary | & 159 | 735.00 | | Communications |
| Authority | | | | Commission |
| | | | | |
| ( per request ) | | | | International |
| | | | | Bureau - Satellites |
| | | | | |
| | | | | P.O. Box 358210 |
| | | | | |
| | | | | Pittsburgh, PA |
| | | | | 15251-5210 |
+--------------------+--------+--------+------+----------------------+
| e\. Amendment of | 312 | \$1, | CWY | Federal |
| Pending | | 470.00 | | Communications |
| | Main & | | | Commission |
| Application | 159 | | | |
| | | | | International |
| ( per request ) | | | | Bureau - Satellites |
| | | | | |
| | | | | P.O. Box 358210 |
| | | | | |
| | | | | Pittsburgh, PA |
| | | | | 15251-5210 |
+--------------------+--------+--------+------+----------------------+
| f\. Extension of | Corres | \$ | CRY | Federal |
| Launch | & 159 | 735.00 | | Communications |
| | | | | Commission |
| Authority | | | | |
| | | | | International |
| | | | | Bureau - Satellites |
| | | | | |
| | | | | P.O. Box 358210 |
| | | | | |
| | | | | Pittsburgh, PA |
| | | | | 15251-5210 |
+--------------------+--------+--------+------+----------------------+
| **10. Space | 312 | \$353, | CLW | Federal |
| Stations (NGSO)** | | 690.00 | | Communications |
| | Main & | | | Commission |
| a\. Application | 159 | | | |
| for Authority | | | | International |
| | | | | Bureau - Satellites |
| to Launch & | | | | |
| Operate | | | | P.O. Box 358210 |
| | | | | |
| (per system of | | | | Pittsburgh, PA |
| technically | | | | 15251-5210 |
| | | | | |
| identical | | | | |
| satellites) | | | | |
| | | | | |
| satellites) | | | | |
+--------------------+--------+--------+------+----------------------+
| b\. Assignment or | 312 | \$10, | CZW | Federal |
| Transfer | | 110.00 | | Communications |
| | Main & | | | Commission |
| ( per request ) | 159 | | | |
| | | | | International |
| | | | | Bureau - Satellites |
| | | | | |
| | | | | P.O. Box 358210 |
| | | | | |
| | | | | Pittsburgh, PA |
| | | | | 15251-5210 |
+--------------------+--------+--------+------+----------------------+
| c\. Modification | 312 | \$25, | CGW | Federal |
| | | 265.00 | | Communications |
| ( per request ) | Main & | | | Commission |
| | 159 | | | |
| | | | | International |
| | | | | Bureau - Satellites |
| | | | | |
| | | | | P.O. Box 358210 |
| | | | | |
| | | | | Pittsburgh, PA |
| | | | | 15251-5210 |
+--------------------+--------+--------+------+----------------------+
| d Special | Corres | \$2, | CXW | Federal |
| Temporary | & 159 | 535.00 | | Communications |
| Authority | | | | Commission |
| | | | | |
| ( per request ) | | | | International |
| | | | | Bureau - Satellites |
| | | | | |
| | | | | P.O. Box 358210 |
| | | | | |
| | | | | Pittsburgh, PA |
| | | | | 15251-5210 |
+--------------------+--------+--------+------+----------------------+
| e\. Amendment of | 312 | \$5, | CAW | Federal |
| Pending | | 055.00 | | Communications |
| | Main & | | | Commission |
| Application | 159 | | | |
| | | | | International |
| ( per request ) | | | | Bureau - Satellites |
| | | | | |
| | | | | P.O. Box 358210 |
| | | | | |
| | | | | Pittsburgh, PA |
| | | | | 15251-5210 |
+--------------------+--------+--------+------+----------------------+
| f\. Extension of | Corres | \$2, | CXW | Federal |
| Launch | & 159 | 535.00 | | Communications |
| | | | | Commission |
| Authority | | | | |
| | | | | International |
| | | | | Bureau - Satellites |
| | | | | |
| | | | | P.O. Box 358210 |
| | | | | |
| | | | | Pittsburgh, PA |
| | | | | 15251-5210 |
+--------------------+--------+--------+------+----------------------+
| **11. Direct | Corres | \$2, | MTD | Federal |
| Broadcast | & 159 | 980.00 | | Communications |
| Satellites** | | | | Commission |
| | | | | |
| a\. Authorization | | | | International |
| to Construct | | | | Bureau - Satellites |
| | | | | |
| or Major | | | | P.O. Box 358210 |
| Modification | | | | |
| | | | | Pittsburgh, PA |
| ( per request ) | | | | 15251-5210 |
+--------------------+--------+--------+------+----------------------+
| b\. Construction | Corres | \$28, | MXD | Federal |
| Permit and | & 159 | 920.00 | | Communications |
| | | | | Commission |
| Launch Authority | | | | |
| | | | | International |
| ( per request ) | | | | Bureau - Satellites |
| | | | | |
| | | | | P.O. Box 358210 |
| | | | | |
| | | | | Pittsburgh, PA |
| | | | | 15251-5210 |
+--------------------+--------+--------+------+----------------------+
| c\. License to | Corres | \$28, | MXD | Federal |
| Operate | & 159 | 920.00 | | Communications |
| | | | | Commission |
| ( per request ) | | | | |
| | | | | International |
| | | | | Bureau - Satellites |
| | | | | |
| | | | | P.O. Box 358210 |
| | | | | |
| | | | | Pittsburgh, PA |
| | | | | 15251-5210 |
+--------------------+--------+--------+------+----------------------+
| d\. Special | Corres | \$ | MGD | Federal |
| Temporary | & 159 | 150.00 | | Communications |
| Authority | | | | Commission |
| | | | | |
| ( per request ) | | | | International |
| | | | | Bureau - Satellites |
| | | | | |
| | | | | P.O. Box 358210 |
| | | | | |
| | | | | Pittsburgh, PA |
| | | | | 15251-5210 |
+--------------------+--------+--------+------+----------------------+
| e\. Hearing ( New | Corres | \$9, | MWD | Federal |
| and Major/ | & 159 | 920.00 | | Communications |
| | | | | Commission |
| Minor change, | | | | |
| comparative | | | | International Bureau |
| | | | | |
| construction | | | | P.O. Box 358270 |
| permit | | | | |
| | | | | Pittsburgh, PA |
| hearings; | | | | 15251 - 5170 |
| comparative | | | | |
| | | | | |
| license renewal | | | | |
| hearings) | | | | |
| | | | | |
| ( per request ) | | | | |
+--------------------+--------+--------+------+----------------------+
| **12. | 309 & | \$2, | MSN | Federal |
| International | 159 | 505.00 | | Communications |
| Broadcast | | | | Commission |
| Stations** | | | | |
| | | | | International Bureau |
| a\. New Station & | | | | |
| Facilities Change | | | | P.O. Box 358175 |
| Construction | | | | |
| Permit | | | | Pittsburgh, PA |
| | | | | 15251 - 5175 |
| ( per application | | | | |
| ) | | | | |
+--------------------+--------+--------+------+----------------------+
| b\. New License | 310 & | \$ | MNN | Federal |
| | 159 | 565.00 | | Communications |
| ( per application | | | | Commission |
| ) | | | | |
| | | | | International Bureau |
| | | | | |
| | | | | P.O. Box 358175 |
| | | | | |
| | | | | Pittsburgh, PA |
| | | | | 15251 - 5175 |
+--------------------+--------+--------+------+----------------------+
| c\. License | 311 & | \$ | MFN | Federal |
| Renewal | 159 | 140.00 | | Communications |
| | | | | Commission |
| ( per application | | | | |
| ) | | | | International Bureau |
| | | | | |
| | | | | P.O. Box 358175 |
| | | | | |
| | | | | Pittsburgh, PA |
| | | | | 15251 - 5175 |
+--------------------+--------+--------+------+----------------------+
| d\. License | 314 & | \ | MCN | Federal |
| Assignment or | 159 | $90.00 | | Communications |
| | | | | Commission |
| Transfer of | or | | | |
| Control | | | | International Bureau |
| | 315 & | | | |
| (per station | 159 | | | P.O. Box 358175 |
| license) | | | | |
| | or | | | Pittsburgh, PA |
| | | | | 15251 - 5175 |
| | 316 & | | | |
| | 159 | | | |
+--------------------+--------+--------+------+----------------------+
| e\. Frequency | Corres | \ | MAN | Federal |
| Assignment & | & 159 | $55.00 | | Communications |
| | | | | Commission |
| Coordination | | | | |
| | | | | International Bureau |
| (per frequency | | | | |
| hour) | | | | P.O. Box 358175 |
| | | | | |
| | | | | Pittsburgh, PA |
| | | | | 15251 - 5175 |
+--------------------+--------+--------+------+----------------------+
| f.. Special | Corres | \$ | MGN | Federal |
| Temporary | & 159 | 150.00 | | Communications |
| | | | | Commission |
| Authorization | | | | |
| | | | | International Bureau |
| (per application) | | | | |
| | | | | P.O. Box 358175 |
| | | | | |
| | | | | Pittsburgh, PA |
| | | | | 15251 - 5175 |
+--------------------+--------+--------+------+----------------------+
| **13. Permit to | 308 & | \ | MBT | Federal |
| Deliver Programs | 159 | $85.00 | | Communications |
| to Foreign | | | | Commission |
| Broadcast | | | | |
| Stations** | | | | International Bureau |
| | | | | |
| (per application) | | | | P.O. Box 358175 |
| | | | | |
| a\. Commercial | | | | Pittsburgh, PA |
| Television | | | | 15251 - 5175 |
| | | | | |
| Stations | | | | |
+--------------------+--------+--------+------+----------------------+
| b\. Commercial AM | 308 & | \ | MBR | Federal |
| or FM | 159 | $85.00 | | Communications |
| | | | | Commission |
| Radio Stations | | | | |
| | | | | International Bureau |
| | | | | |
| | | | | P.O. Box 358175 |
| | | | | |
| | | | | Pittsburgh, PA |
| | | | | 15251 - 5175 |
+--------------------+--------+--------+------+----------------------+
| **14. Recognized | Corres | \$ | CUG | Federal |
| Private Operating | & 159 | 895.00 | | Communications |
| Status** | | | | Commission |
| | | | | |
| (per application) | | | | International Bureau |
| | | | | |
| | | | | P.O. Box 358115 |
| | | | | |
| | | | | Pittsburgh, PA |
| | | | | 15251 - 5115 |
+--------------------+--------+--------+------+----------------------+
[^1]: 47 U.S.C. Section 158(b).
[^2]: The increase in the CPI-U between October 2001 (the month used to
calculate the last CPI-U adjustment of its Schedule of Application
Fees) and October 2003 is 7 percent. See Order in General Docket No.
86-285, FCC 02-202, and released July 12, 2002.
[^3]: 31 U.S.C. §§ 3701(a)(8); 3701(b).
[^4]: 47 C.F.R. §1.1910 (effective October 1, 2004)
|
en
|
converted_docs
|
200326
|
**Before the**
**Federal Communications Commission**
**Washington, D.C. 20554**
In re Application of )
)
)
**High I-Q Radio, Inc.** )
)
Noncommercial Educational FM Station ) Facility ID No. 78344
KOLI(FM), Electra, Texas )
)
Application for License to Cover Construction )
Permit ) File No. BLH-980203KB
) Application for Assignment of Construction ) File No. BAPH-980421HW
Permit to Cumulus Licensing Corp. )
# MEMORANDUM OPINION AND ORDER
**Adopted: March 17, 2004 Released: April 21, 2004**
By the Commission: Commissioner Martin concurring and issuing a
statement; Commissioners Copps and Adelstein concurring in part,
dissenting in part, and issuing a joint statement.
1\. The Commission has before it two applications for review filed by
Apex Broadcasting, L.L.C.[^1] ("Apex"), regarding the captioned
applications of High I-Q Radio, Inc. ("High"), former licensee of
station KOLI(FM), Electra, Texas. In the first application for review,
filed on October 13, 1998, Apex seeks review of a September 14, 1998,
action by the Mass Media Bureau ("Bureau") which denied Apex's February
8, 1998, "Petition for Emergency Relief" and its May 20, 1998, Informal
Objection to the captioned KOLI(FM) license application ("1998 Letter
Decision").[^2] In the second application for review, filed on September
13, 1999, Apex seeks review of the Bureau's August 10, 1999, letter
decision which both denied Apex' petition to deny the application to
assign the station from High to Cumulus Licensing Corporation
("Cumulus") and granted the KOLI(FM) license and assignment applications
("1999 Letter Decision"). For the reasons set forth below, we will (1)
deny Apex' October 13, 1998, application for review, (2) grant the
September 13, 1999, application for review in part and deny it in part;
and (3) issue admonitions to both High and Cumulus.
### Factual Background
2\. On November 8, 1995, High applied for a construction permit to build
a new noncommercial educational ("NCE") FM station on non-reserved
channel 235C2 at Electra, Texas. Electra is located approximately 25
miles from the larger community of Wichita Falls. The Commission granted
the application on May 23, 1996.
3\. On June 3, 1997, applications were filed which proposed the
assignment of three station licenses in the Wichita Falls area to
Cumulus. The Commission granted these applications on October 3, 1997.
On December 2, 1997, Cumulus closed on the transactions and became the
licensee of stations KLUR-FM and KQXC(FM), Wichita Falls and KYYI(FM),
Burkburnett, Texas.
4\. Shortly after the filing of the referenced assignment applications,
Cumulus commenced discussions with High about its Electra permit. By
letter dated July 28, 1997, Cumulus proposed to pay Larry Hickerson
("Hickerson"), High's then president, \$10,000 not to sell, offer to
sell, or solicit an offer to sell the permit to anyone other than
Cumulus for a period of 14 days. Cumulus also proposed that it and High
"agree to negotiate promptly and in good faith toward the preparation
and execution" of a Memorandum of Understanding ("MOU") in the form
attached to the letter. Hickerson signed the letter that day. According
to a declaration later submitted by Hickerson, he sought the Electra
authorization because he had intended to return to Texas, his home
state. However, Hickerson stated that he subsequently developed heart
and lung problems in 1997, which caused him to remain in Georgia and
resulted in several hospitalizations.[^3]
5\. On August 8, 1997, Cumulus' Chairman, Richard Weening ("Weening"),
executed the MOU. Hickerson, on behalf of High, signed the MOU three
days later. The MOU recited that Cumulus would acquire the equipment
necessary to operate the radio station and lease it to High. Cumulus
also agreed to loan High sufficient working capital to construct and
commence operations. The MOU also provided that, for \$27,600, High
would give Cumulus an assignable option to acquire the station's assets.
The option would be exercisable for a one-year period beginning with the
commencement of station operations. In the event Cumulus exercised the
option, it promised to pay \$238,400 for the station's assets upon
finality of the grant of an assignment application.[^4] Cumulus would
also assume all indebtedness under loans made by Cumulus to High. The
MOU further provided that the parties would enter into a time brokerage
agreement under which Cumulus would program the station from its
commencement of operation and pay High's monthly expenses, plus \$500
per month. The MOU stipulated that High was to file a copy of that
agreement with the Commission.[^5]
6\. By letter dated August 22, 1997, Weening arranged for Jack Sellmeyer
("Sellmeyer") to provide overall engineering services in connection with
the construction of the station. Although Weening informed Sellmeyer
that his invoices should be sent to Cumulus, Weening also stated that
Hickerson was Sellmeyer's client. Further, Weening advised Sellmeyer of
Hickerson's plan to do a live morning show and his desire to have
installed a "20 channel Pacific Recorder board manufactured by AirWav."
With respect to the tower, Weening stated that "the design should be
mindful of the fact that this system will likely be relocated .... For
this reason ... every effort should be made to find a used tower."
Sellmeyer coordinated the bidding process for the purchase of equipment.
Specifically, he requested and received proposals from equipment vendors
and worked with Cumulus to place orders. Sellmeyer also supervised Jeff
Chancey ("Chancey"), a technician in the Wichita Falls area, in the
construction of the station. Sellmeyer also averred that he had several
telephone conversations with Hickerson regarding station construction
and the preparation of license and STL (studio-to-transmitter link)
applications.
7\. In September 1997, Hickerson negotiated a lease for the transmitter
site and, on behalf of High, entered into a three-year lease. Upon
execution of the lease, High prepaid \$7,200 for three years' rent.
During that same month, Hickerson also worked with and later paid a
survey firm \$1,700 to determine the exact tower location.
8\. *1997 Extension Application*. On October 22, 1997, High filed an
application signed by Hickerson, to extend the KOLI(FM) permit (File No.
BMPED-971022JA). Therein, High stated that: "A firm order was placed
with Harris Corporation on October 21, 1997, for all necessary
transmitting, antenna and studio-to-transmitter link equipment for the
station." High also reported that: "The studio and satellite equipment
is expected to be ordered from Harris Corporation on October 22, 1997."
High also indicated that a tower construction order had been placed.
Moreover, High stated: "The lease for the station's studio space has
been signed" and "the space has been built out." Finally, High reported
that it had entered into a tower site lease and had paid \$7,200 for
three years' rent. The application did not disclose Cumulus's role in
ordering equipment and constructing the station. The staff granted the
extension application on December 29, 1997.
9\. *Agreements between High and Cumulus*. On December 1, 1997, High and
Cumulus executed an option agreement, a time brokerage agreement
("TBA"), a loan agreement, and a lease agreement. During the pendency of
the extension application, none of the agreements were filed with or
otherwise disclosed to the Commission. The option agreement and TBA were
filed with the Commission in February 1998, and the loan and lease
agreements in June 1998.
10\. The option agreement recited that Cumulus had previously made a
non-refundable payment of \$27,600 to High.[^6] Exercise of the option
was solely at Cumulus' discretion. The purchase price was \$238,400, the
amount that had been set forth in the MOU. As part of the option
agreement, High and Cumulus agreed to the form of the asset purchase
agreement that was to be executed upon the option's exercise. Finally,
the option agreement stated that the loan and lease agreements would be
cancelled and the loan forgiven upon consummation of the asset purchase
agreement.
11\. The TBA gave Cumulus the right to program the station. High
retained the right to preempt or refuse to broadcast any program it
deemed contrary to the public interest and to schedule and present
public interest programming. High was to retain full authority over
station operations and was required to hire a station general manager.
Under the terms of the TBA High also was solely responsible for all of
the station's expenses. Cumulus was required to reimburse High for
itemized expenses on a monthly basis. Reimbursible expenses included,
*inter alia*, the general manager's salary, tower, transmitter site and
studio space rentals, insurance premiums, telephone and utilities.
12\. High's one-year, eight-percent loan was secured by a security
interest in all station assets other than the permit. The loan amount
included \$8,662.38 for expenses already incurred by High: namely, the
three-year lease and the payment due the surveyor. In addition, Cumulus
agreed to make additional loans to cover the salaries for a station
manager and contract engineer, lease expenses, insurance premiums,
utility deposits, and hook up fees. High was required to make a written
request for funds. High was also to maintain insurance and name Cumulus
as the insured. During the period of the loan, High could not, without
Cumulus' consent: acquire an interest in any other broadcast station;
pay any bonus to any station employee; enter into an employment contract
that was not terminable at will; provide any fringe benefit other than
regular wages; or enter into any other contract, lease or agreement
concerning the station with anyone other than Cumulus, unless the matter
was terminable on no more than 30 days notice without penalty or
payment.
13\. Pursuant to the lease agreement, Cumulus would lease to High an
antenna, a transmission line, a transmitter and related equipment,
antenna and transmitter space, a main studio and related equipment. High
was to pay \$500 per month for the rental of the tower and related
equipment, and an additional \$500 per month for the studio. The
station's studio and office space was at the same address as that for
KLUR-FM, one of the other stations that Cumulus was about to acquire.
14\. *Commencement of KOLI(FM) Operation*. KOLI(FM) station construction
was completed following Commission grant of the extension application.
On January 30, 1998, the station commenced operations as an NCE station.
Shortly thereafter, High submitted a covering license application signed
by Hickerson (File No. BLH-980203KB).[^7] Therein, High stated that "due
to a change in circumstances," it would operate KOLI(FM) as a commercial
station. On February 4, 1998, the station commenced airing commercials.
High also represented that it would file its ownership report by
February 6, 1998.[^8]
15\. On February 6, 1998, Apex, a competitor in the Wichita Falls
market, filed a petition for emergency relief. Specifically, Apex sought
revocation of High's program test authority. Apex argued that KOLI(FM)
was not authorized to operate as a commercial station and that High had
violated the Commission's public file rules. Included with Apex's
petition was a promotional document from Cumulus referencing, *inter
alia*, the cost of advertising on its "4^th^ station soon to be up and
running," an apparent reference to KOLI(FM). On February 19, 1998, High
filed an opposition to Apex's petition. In addition to responding to
Apex's commercial programming and the public file arguments, High
included a declaration from Hickerson and one from James Marks
("Marks"), who identified himself as Cumulus' marketing manager in the
Wichita Falls area. Among other things, Marks averred that he responded
to a February 2, 1998, inquiry about the location of KOLI(FM)'s public
file by stating that the caller would have to call Hickerson in Georgia
in order to ascertain the file's whereabouts.[^9]
16\. On May 20, 1998, Apex filed an informal objection to High's license
application, arguing that the "automatic program test authority" ("PTA")
provisions in Section 73.1620 apply only when construction is completed
in accordance with the terms of the station's license. Because KOLI
commenced operation as a commercial station, it was not operating in
accordance with its noncommercial educational authorization, claimed
Apex, and the staff should revoke KOLI's PTA. Apex also argued that High
violated the public inspection file rule, 47 C.F.R. § 73.3526, because
the KOLI public inspection file was in Brunswick, Georgia, nearly 1000
miles from Electra, Texas. The allegations and arguments from the
informal objection and related pleadings were repeated in a petition to
deny the subsequently filed assignment application.
17\. *KOLI(FM) Assignment Application*. On April 21, 1998, Cumulus and
High filed an application to obtain Commission consent to assign the
KOLI(FM) license.[^10] On June 1, 1998, Apex filed a petition to deny
the assignment application. In addition to repeating arguments made in
its earlier pleadings, Apex also argued that Cumulus and High had
engaged in a premature transfer of control based on Cumulus' financial
involvement and the alleged role of Marks, a Cumulus employee.[^11] In
support of its claims, Apex submitted copies of web sites prepared by
Cumulus for stations KOLI(FM), KQXC and KLUR-FM. Each listed Marks as
the station general manager. In addition, the sites for KOLI(FM) and
KLUR-FM stated that Jim Nash was the music director and that Jay
Phillips was the program director and web site designer.
18\. Both High and Cumulus opposed Apex's petition. In addition to
supplying the loan and lease agreements between itself and Cumulus, High
submitted the declaration of James Driskill ("Driskill"). Driskill
identified himself as KOLI(FM)'s general manager; stated that he became
KOLI(FM)'s general manager on January 30, 1998; and averred that he was
a full-time employee of High and solely compensated by it. In its
opposition, High reported that Driskill also served as KOLI(FM)'s music
director and as an air personality under the air name "Jim Nash." High
further acknowledged that Driskill provided services, "*for no
compensation*," (emphasis in the original) as music director to
KLUR-FM.[^12] High claimed that Driskill had no other connection with
KLUR-FM or Cumulus. High further contended that it had controlled and
continued to control the station's policy decisions in the areas of
programming, personnel, and finances. High noted that, under the TBA, it
had sole responsibility for ensuring that programming met the needs of
the community of Electra and that it employed Driskill to ensure that
High met its programming responsibilities. Regarding personnel and
finances, High averred that it had no relationship with Marks and that,
in addition to Driskill, KOLI(FM) had a staff employee. High stated that
it compensated both of its employees directly. Finally, High argued that
the loan and lease agreements imposed no undue burdens. In this regard,
High observed that, under the loan agreement, its obligation was merely
to repay the sums loaned. Moreover, if Cumulus did not purchase the
station and the TBA were terminated, High had the option of purchasing
the equipment from Cumulus. In sum, High argued that its arrangement
with Cumulus was structured in accordance with Commission precedent[^13]
and that it had not prematurely transferred control of KOLI(FM) to
Cumulus.
19\. Cumulus also claimed that the loan and lease agreements comported
with Commission precedent. However, Cumulus also noted that Driskill had
a three-hour morning show on KOLI(FM), which aired Monday through
Friday. Although Cumulus acknowledged that its employees helped Driskill
produce his show, it argued that the show's content was under Driskill's
control. Finally, Cumulus submitted a declaration from Marks, who
identified himself at this point as Cumulus' time brokerage operations
manager for KOLI(FM). Marks averred that Driskill did not report to
Cumulus on any KOLI(FM) programming matters.
20\. Apex's reply alleged that as of June 23, 1998, High still had not
arranged for a local telephone number for KOLI(FM). Apex also pointed
out that Driskill was listed in the *1998 Broadcasting & Cable Yearbook*
as KLUR-FM's music director, and it argued that it was "absurd" to
believe that Driskill was insulated from his former employer, Cumulus,
merely because he was now employed by High. Apex also contended that the
nature of the financial arrangements, coupled with High's non-profit
status and lack of income, ensured that Cumulus would acquire the
station, either by purchase or by default.
21\. *1998 Letter Decision*. By letter dated September 14, 1998, the
Bureau denied Apex's informal objection and cautioned High and Cumulus
for improperly commencing commercial operations on KOLI(FM). The Bureau
took no further action on the issue of High's premature commercial
operation, stating that the violation was less egregious than that
admonished in a prior staff action.[^14] The Bureau also admonished High
for violating the Commission's public file rule, Section 73.3527.[^15]
At the same time, however, the 1998 Letter Decision withheld action on
the license and assignment applications pending submission of
information relating to the roles of High and Cumulus in constructing
and operating KOLI(FM). The letter requested, among other things, that
High and Cumulus provide (1) a copy of all attachments to the December
1, 1997, TBA between High and Cumulus; (2) Commission precedent
approving the type of negative covenants imposed on High in the December
1997 Loan Agreement; (3) the basis for the \$238,400 purchase price for
KOLI(FM) specified in the December 1, 1997, option agreement; (4) the
name or names of the persons who constructed and oversaw construction of
KOLI(FM); (5) a description of all actions taken by High to construct
KOLI(FM); and (6) specific information regarding James Driskill's duties
as KOLI(FM) general manager. High and Cumulus responded by letters dated
October 26, 1998; Apex submitted comments on the responses on November
6, 1998.
22\. Initially, High contended that it had completed the preliminary
site work. In this regard, High stated that Hickerson had located the
site referenced in the 1995 construction permit application and, in
1997, negotiated the lease, prepaid the rent, and worked with the survey
firm to establish the site's boundaries and the precise location of the
tower. However, both High and Cumulus acknowledged that the station's
facilities were constructed by Sellmeyer and Chancey.[^16] Further, both
agreed that Cumulus placed numerous construction-related orders and
directly paid vendors for these services and equipment. Finally, both
acknowledged that Cumulus leased the studio and office space for
stations KLUR-FM and KOLI(FM), and, in turn, sub-leased a portion of
that space to High. Nevertheless, High argued that Sellmeyer knew that
final authority for construction of the station rested with
Hickerson,[^17] while Cumulus insisted that the station was constructed
according to specifications provided by High. High further contended
that in July 1997, Hickerson "began negotiations with Cumulus in order
to obtain financing for the construction" of the station, which led to
the execution of the MOU, a copy of which it attached.[^18] According to
High, "negotiations continued through the fall of 1997, culminating in
the execution" of the option agreement, TBA, loan agreement, and lease
agreement in December 1997.
23\. With respect to personnel, High averred that Driskill began his
KOLI(FM) general manager duties on January 30, 1998, when the station
began broadcasting. According to Driskill, he and Hickerson negotiated
Driskill's salary and duties in January 1998. Prior to working for High,
Driskill stated that he was the music director for KLUR-FM and reported
to Jay Phillips, the station's operations director. After beginning
employment at KOLI(FM), Driskill acknowledged that he "agreed to provide
\[his\] services to station KLUR on an uncompensated basis, assisting
Mr. Phillips with music selection." Driskill further averred that in
mid-April 1998, Phillips took primary responsibility for music selection
at KLUR-FM and that in July 1998 he \[Driskill\] "ceased all activities
relating to music selection and play-list development for the station."
Driskill declared that, as KOLI(FM)'s general manager, he performed his
daily on-air shift and necessary commercial production work, prepared
the daily music log, reviewed programming provided by Cumulus, prepared
payroll and other expenses for payment and updated the public file.
Driskill also stated that he supervised the other KOLI(FM) employee, who
answered the telephone, maintained the public service record
announcements and paid some bills. According to Cumulus, Driskill
officially resigned from its employment, effective February 15, 1998.
Finally, Cumulus reported that Chancey, then a Cumulus employee,
provided engineering services for High.
24\. High's October 26, 1998, response contains an additional affidavit
from Marks. In this affidavit, Marks identified himself as the general
manager of Cumulus stations KLUR-FM, KQXC, and KYYI. Marks acknowledged
that he was responsible for programming KOLI(FM) under the TBA.
According to Marks, Cumulus initially programmed the station without
commercials. Upon the filing of the license application, Cumulus began
commercial programming.
25\. With respect to finances, High submitted copies of all attachments
to the TBA. These submissions require Cumulus to reimburse High for
salaries, rental payments, utility charges, and insurance premiums.
However, no payment amount for airtime was specified in the TBA
attachments. In response to the Bureau's inquiry about certain negative
covenants in the loan agreement,[^19] High observed that the covenants
did not flatly prohibit High from taking the specified actions but
merely required Cumulus' consent. In any event, High argued, the
covenants in the loan agreement were for the express purpose of
protecting Cumulus' investment and did not confer control of KOLI(FM)
upon Cumulus. As for the setting of the \$238,400 purchase price for the
station, the applicants contended that it was established through
arms-length negotiations as facilitated by a broker. The purchase price
did not include station equipment, and Cumulus acknowledged that the
equipment was purchased "with the contemplation that the Station, and
all related assets, would eventually be purchased by Cumulus from High."
High further observed that Cumulus had paid approximately \$6 million
for its other three Wichita Falls area stations.
26\. In its comments filed November 6, 1998, Apex argued that the
applicants' submissions compelled the conclusion that a premature
transfer of control had occurred. Regarding construction, Apex contended
that High had not undertaken any meaningful activity to construct or
supervise construction of KOLI(FM). Apex further charged that, contrary
to the claim made by High that Driskill had ceased performing any
services for Cumulus in July 1998, Driskill continued to provide
services to KLUR-FM into October 1998. Regarding Driskill's specific
duties, Apex argued that the duties were devoid of substance and were
more likely performed for Cumulus' benefit. Thus, according to Apex,
Driskill cannot be viewed as a High management-level employee.[^20]
Further, considering that funds for Driskill's salary were provided by
Cumulus, Apex argued that Driskill's role must be deemed contrary to the
cross interest policy articulated by the Bureau in *Michael R.
Birdsill*.[^21] Apex also contended that, contrary to previous
representations, High has no financial responsibility for KOLI(FM),
because Cumulus paid all expenses. Finally, Apex argued that High's
extension and license applications lacked candor inasmuch as they made
no mention of Cumulus.
27\. *April 30, 1999, Staff Inquiry Letter*. By letter dated April 30,
1999, the staff sought further information from High and Cumulus to
assess more fully the allegations related to control of Station
KOLI(FM), High's compliance with document filing rules and the main
studio rule, and the *bona fides* of High's extension and license
applications.[^22] After receiving two extensions of time, High and
Cumulus responded by letters dated July 16, 1999.[^23]
28\. In response to queries about its finances, High acknowledged that
it could not demonstrate that it had any liquid assets for construction
of KOLI(FM) other than what it received from Cumulus. Indeed, the only
pre-Cumulus payment High could verify was for a 1995 engineering charge
for preparing High's construction permit application. Moreover, once
Cumulus became involved, High could not point to any expense related to
KOLI(FM) that Cumulus had not paid directly or indirectly. As for its
failure to file the letter of intent with the Commission, High contended
that the letter of intent was nothing more than an expression of intent
to negotiate and only set forth a procedure for negotiation. As for the
MOU, High argued that it merely provided that Cumulus would assist High
with station construction and that it merely required High to negotiate
in good faith a definitive option agreement but did not constitute a
fully negotiated option or purchase agreement.
29\. With respect to the extension application, High acknowledged that
Cumulus had entered into the referenced lease agreement. High explained
that Cumulus had agreed with High to make a portion of Cumulus' space
available to High. High also explained that it made no reference to
Cumulus in its extension or license applications because it thought none
was necessary. High maintained that it answered the questions posed by
the applications based on the facts and circumstances as they then
existed. High further contended that it filed its ownership report as it
stated it would in its license application and that it supplemented its
ownership report shortly thereafter.
30\. High admitted that the option, the TBA, and the loan agreement were
not filed within the time specified by the rules, but argued that they
were filed as soon as High recognized its oversight. High attributed
this tardy filing to inadvertence. High contended that it was not
required to file either the MOU or the letter of intent. Cumulus also
conceded that, technically, it should have filed the TBA within 30 days
of its execution; however, it contended that, because the TBA did not
become effective until January 30, 1998, its filing on February 12,
1998, should be viewed as timely.
31\. Regarding construction, Cumulus acknowledged that it contacted
Sellmeyer to construct KOLI(FM)'s authorized facilities. According to
Sellmeyer, he, Cumulus, and Hickerson agreed to an arrangement where
Sellmeyer would submit his bills directly to Cumulus. Sellmeyer and High
further claimed that, during construction, telephone conversations
between Sellmeyer and Hickerson occurred.
32\. With respect to Driskill, High averred that, beginning in January
1998, Driskill and Hickerson spoke about Driskill's potential employment
and that, following Driskill's hiring, they spoke about two to three
times per week until March 1998. From then until Hickerson's death on
April 23, 1998, they spoke about once a week. Subsequently, High stated
that Driskill also telephoned High's Treasurer, Zachary Hickerson.[^24]
High did not provide the dates of any of the calls. High's response also
reflects that Driskill received a \$100 per month raise from his prior
salary upon assuming his new duties, but that he continued to provide
services to KLUR-FM, without compensation from Cumulus, through August
1998. High conceded that it neither knew nor approved of Driskill's work
for Cumulus. According to Cumulus, Driskill is eligible for re-hire.
33\. As for programming, High averred that, on Sundays at 8 a.m.,
KOLI(FM) aired a 30-minute public affairs program hosted by Driskill,
and it provided a list of the topics covered between March 29, 1998 and
July 26, 1998. However, High also conceded that "on a few occasions" a
Cumulus employee "contributed to the programming" after Driskill had
determined that the subject matter was important to the Electra
community. With respect to Driskill's morning show, High and Cumulus
acknowledged that his daily air shift was simply part of the time
brokered by Cumulus.
34\. With regard to station expenses, Cumulus conceded that as of March
1998, it had not yet established with High the payment procedures
contemplated by the TBA. As a result, Cumulus paid most of the station's
expenses directly to third party vendors. However, by July 1998, it
appears that High was paying most of the expenses that it was obligated
to pay under the TBA although, even then, the telephone and electric
bills were addressed to Cumulus. In any event, pursuant to the TBA,
Cumulus reimbursed High for the station's expenses paid by High.
Finally, notwithstanding the TBA's recitation that High was to maintain
insurance for KOLI(FM), it appears that High did not do so.
35\. *August 10, 1999, Letter Decision*. By letter dated August 10,
1999, the Bureau granted the petition to deny in part and denied it in
part, finding that Apex had not raised a substantial and material
question of fact calling for further review regarding the license and
assignment applications. The Bureau also granted the license and
assignment applications "without prejudice to whatever action, if any,
the Commission deems appropriate in light of the matters raised \[in the
two inquiry letters discussed in greater detail above.\]"
**Discussion**
*A. Applications for Review*
36*.* [October 13, 1998, application for review]{.underline}. In its
October 13, 1998, application for review, Apex argues that the 1998
Letter Decision finding erred in failing to order the termination of
KOLI(FM)'s program tests which, it claims, were undertaken in "an
intentional and unexcused violation of a clear Commission rule." Section
73.1690(c), states Apex, clearly requires grant of an application on FCC
Form 302 before a broadcaster can convert from NCE to commercial
operation,[^25] and "there is absolutely no basis, either in law or in
fact, to support the ultimate finding . . . that \[High's\] commercial
operation of its noncommercial permit was the result of an honest
mistake."
37\. We disagree and affirm the Bureau's decision. Section 399B of the
Communications Act of 1934, as amended,[^26] implemented by Section
73.503 of the Commission's Rules, prohibits NCE broadcast stations from
broadcasting announcements that promote the sale of goods and services
of for-profit entities in exchange for remuneration. It is undisputed
that High, despite holding a permit for KOLI(FM) authorizing NCE FM
operations on non-reserved FM Channel 235, commenced commercial
operations on February 4, 1998, prior to grant of the license
application proposing, *inter alia*, conversion to commercial operation.
This operation violated the terms of its authorization and Section
73.503. As noted, High claims to have believed that Section 73.1690 did
not apply to KOLI(FM), as by its terms the rule applies only to
licensees, not permittees, and it therefore needed only to notify the
Commission of its commercial operation.[^27]
38\. We conclude that the Bureau properly rejected High's contention
that Section 73.1690(c)(9) requires NCE *licensees*, but not permittees,
to receive approval of a modification of license application prior to
converting to commercial operation. As noted by the Bureau, Section
73.1690(c) requires prior Commission approval -- *i.e.*, a finding that
a conversion to commercial operations would further the public interest
-- prior to effectuation of the change. Although the rule is phrased in
terms of licensees, no rational basis exists for applying the provisions
of Section 73.1690(c)(9) to licensees while not applying those
provisions to permittees especially when, as here, the permittee is
operating pursuant to program test authority.[^28] Despite this
violation, we conclude that Apex has not established a *prima facie*
case that High engaged in disqualifying conduct by commencing commercial
operations prior to grant of the modification of license application.
Permission to change from noncommercial to commercial service on a
non-reserved channel is routinely granted, and no basis exists in this
record to consider High's request anything but routine. While its
commencement of commercial operations was premature, this action appears
to be a simple mistake and does not implicate High's basic
qualifications.[^29] Accordingly, we affirm the staff's decision not to
pursue the matter further, and we will deny Apex' October 13, 1998,
application for review.
39\. [September 13, 1999, application for review]{.underline}. In its
September 13 application for review, Apex contends that the 1999 Letter
Decision "does not constitute reasoned decision making," as required by
the Administrative Procedure Act[^30] and the federal courts. Such
"impermissible brevity" prejudiced Apex, it claims, because it is unable
to analyze the staff's reasoning. It claims that the 1999 Letter
Decision "is utterly silent as to whatever facts it may have considered
and the manner in which its ultimate conclusion was reached." We agree
that the Letter Decision did not constitute reasoned decision making. To
rectify this deficiency, we have reviewed *de novo* the pleadings that
culminated in that ruling. For the reasons set forth below, we affirm
the staff's conclusion that Apex has not raised a substantial and
material question of fact regarding the license and assignment
applications.[^31] We will, however, admonish High and Cumulus for
unauthorized transfer of control and further admonish High for its
failure to file required contracts, as discussed *infra*.
*B. Unauthorized Transfer of Control*
40\. Section 310(d) of the Communications Act states, in pertinent part:
> No construction permit or station license, or any rights thereunder,
> shall be transferred, assigned, or disposed of in any manner,
> voluntarily or involuntarily, directly or indirectly, or by transfer
> of control of any corporation holding such permit or license, to any
> person except upon application to the Commission and upon finding by
> the Commission that the public interest, convenience, and necessity
> will be served thereby.[^32]
There is no fixed formula for evaluating whether a party is in *de
facto*, or actual, control of a broadcast station.[^33] In making such a
determination, we traditionally look to whether a new entity has
obtained the right to determine the basic operating policies of the
station.[^34] Specifically, we seek to ascertain who determines the
station's policies with respect to programming, personnel and
finances.[^35] A licensee may delegate certain functions on a day-to-day
basis to an agent or employee,[^36] but such delegation cannot be
wholesale. That is, those persons assigned a task must be guided by
policies set by the permittee or licensee.[^37] Moreover, the standards
by which we measure control are equally applicable in situations
involving time brokerage agreements.[^38] Finally, when examining a
situation where relevant agreements were entered into prior to or during
construction, we also look to see who was in control of station
construction.[^39]
41\. We find that Cumulus, not High, was the entity in control of
station construction. Cumulus, in accordance with the July 28, 1997,
letter and MOU, acquired equipment and constructed the station. Cumulus
contacted and paid Sellmeyer, the engineer who oversaw construction, and
supplied and paid the technician who had on-site responsibility for
station construction. Cumulus, after receiving proposals from Sellmeyer,
also directly contracted with equipment suppliers and paid the invoices.
In addition, Cumulus arranged for KOLI(FM) studio space in conjunction
with its acquisition of studio space for three other stations. High's
documented construction activity consisted of working with the surveyor
and finalizing the lease for the land on which the tower was built.
Finally, while we recognize that the engineer, Sellmeyer, had periodic
conversations with Hickerson and supposedly understood that High was the
client, the fact remains that Cumulus retained Sellmeyer and paid his
invoices. In sum, it appears that High's role in the construction
process was minimal while Cumulus' role was dominant.[^40]
42\. With respect to programming, the TBA gives Cumulus the right to
program the station although High can preempt or refuse to broadcast any
program it deems contrary to the public interest. In addition, the TBA
gives High the right to schedule and present public interest programming
at any time it deems best. On their face, these provisions are similar
to those previously approved by the Commission. The TBA of the type
employed in this case and the parties' programming decisions under this
agreement do not constitute an unauthorized transfer of control.[^41]
43\. As far as personnel are concerned, Apex has failed to rebut High's
claim that it hired Driskill in January, 1998, to serve as station
general manager. In that capacity, High proffers that Driskill (1)
performed one daily on-air broadcast shift;[^42] (2) performed necessary
commercial production work; (3) prepared the daily music log; (4)
reviewed the programming provided by Cumulus to ensure that it comports
with Commission requirements and meets the needs of the residents of
Electra, Texas; (5) supervised High's one other KOLI(FM) station
employee;[^43] (6) prepared payroll and other expenses for payment; (7)
updated and maintained the KOLI(FM) public inspection file; and (8)
performed "any other necessary day-to-day operational activities."[^44]
High also claims that Driskill produced a weekly 30-minute public
affairs show on Sunday mornings,[^45] and Mr. Driskill states that he
also was responsible for ensuring that KOLI(FM) complies with Commission
technical standards and for requesting engineering services for the
station as necessary.[^46] However, it also is the case that Driskill
regularly performed duties for Cumulus well after he resigned from
Cumulus' employ and became KOLI(FM)'s general manager in late January
1998.[^47] Moreover, High has failed to establish that Driskill
exercised any substantive managerial responsibilities at KOLI(FM). This
lack of control is buttressed by Cumulus' substantial financial control
over station operations.
44\. With respect to finances, for the first several months after
KOLI(FM) went on the air, Cumulus paid directly most, or perhaps all, of
the station's expenses. Indeed, there is no evidence that High paid
*any* station expenses until the summer of 1998. Moreover, station
telephone and electric bills were addressed to Cumulus after that time,
and there is no indication that High maintained insurance protection, as
it was required to under the TBA. Although High maintained a bank
account at all times during its tenure as permittee of KOLI(FM), we
conclude that High permitted Cumulus to assume key managerial and
financial control over KOLI(FM) operations from the time of the letter
of intent in July 1997 and did not regain control subsequently.[^48]
C. *Material Omissions*
45\. High\'s assertions in the 1997 extension application concerning
equipment orders and station construction were truthful. At issue is
whether High\'s failure to disclose its contractual reliance on Cumulus
to complete station construction constitutes a \"willful material
omission\" in violation of Section 73.1015. We conclude it does not.
46\. A permittee may rely on external technical, financial and legal
assistance to construct its authorized station.[^49] In fact, the
Commission has concluded that a non-permittee/option holder may be
\"closely involved in the many facets of the funding and construction\"
of a new station.[^50] Nothing in the former extension of permit
application required the disclosure of the extent to which the permittee
was relying on unrelated parties for station construction or the terms
of the various related agreements. Although one can conclude that High
was wholly dependent on Cumulus to construct KOLI, essentially the same
\"charge\" can be leveled against any permittee that is relying on
lenders, equipment suppliers, and other vendors to finance and build its
authorized station. On these facts we cannot conclude that the extension
application was materially incomplete.
D. *Failure to file contracts*
47\. Section 73.3613 provides in pertinent part that each broadcast
permittee is required to file with the Commission within 30 days of
their execution, certain agreements which affect the ownership and/or
operation of the permittee's station. Specifically, a permittee is
required to file, *inter alia*: "(b) \[c\]ontracts, instruments or
documents relating to the present or future ownership or control of the
permittee . . . \[including\] (3) (iii) options to purchase stock and
other executory agreements; (5) loan agreements containing provisions
restricting the . . . permittee's freedom of operation; and (d) time
brokerage agreements. In addition, Sections 73.3615(a)(4)(i) and
73.3615(b) provide that permittees include with ownership reports filed
with their license applications "\[a\] list of all contracts still in
effect required to be filed with the FCC by \[Section\] 73.3613 showing
the date of execution and expiration of each contract."
48\. As noted above, High executed the MOU on August 11, 1997. That
document established the parameters of the High-Cumulus relationship.
Specifically, it provided that Cumulus would acquire and own the
equipment necessary to operate the radio station and that it would lease
the equipment to High. It provided that Cumulus would also loan High the
money needed to construct and commence operations. It further provided
that High would give Cumulus an assignable option to acquire the
station's assets, including the station authorization, and it set the
price of the option and described it in detail. The MOU also noted what
Cumulus would pay to acquire the station's assets, and it also provided
that Cumulus would assume all indebtedness under loans made by Cumulus
to High. Moreover, the MOU provided that the parties would enter into a
time brokerage agreement. Finally, the MOU called for High to file a
copy of the executed document with the Commission. Clearly, both Cumulus
and High understood that the MOU was a document that was related to the
future ownership of KOLI(FM).[^51] As such, it should have been filed no
later than 30 days after execution, that is, by September 11, 1997.
However, High did not file it until October 26, 1998. We also find that
High did not timely file the loan agreement, the option agreement or the
TBA, nor did it provide a list of those agreements with its ownership
report. Each of the foregoing documents was executed December 1, 1997.
The TBA and option agreement were filed in February 1998; the loan
agreement was filed in June 1998. All should have been filed within 30
days of their execution as High concedes.
**Conclusions/Actions**
49\. Based upon our review of the facts and circumstances in this case,
we conclude that an evidentiary hearing is not appropriate. The
Commission is usually hesitant to designate a renewal or assignment
application for evidentiary hearing on grounds of technical or legal
violations in the absence of misrepresentation or lack of candor.[^52]
While the record indicates that Cumulus prematurely assumed control of
station KOLI(FM), there is no evidence of any attempt to intentionally
mislead the Commission about these matters.[^53] Further, as noted
previously, High's President, Larry Hickerson, is deceased, thus
mitigating the potential for future lapses.[^54] For these reasons, we
conclude that the violations here do not raise questions about the
character qualifications of these parties to be licensees.[^55] Thus,
despite the improper actions of the parties, we believe that designation
of the subject applications for evidentiary hearing, or the institution
of revocation proceedings, would be inappropriate.
50\. As discussed above, however, we find that High apparently abdicated
control of KOLI(FM) without Commission consent upon the execution of the
MOU and that such abdication continued to the date the Commission
granted the assignment of the KOLI(FM) permit to Cumulus. Furthermore,
High admittedly failed to file the MOU or TBA, loan, and option
agreement within 30 days of their execution, as required by Section
73.3613 of the Commission's Rules, and failed to list them in its
ownership report as required by Section 73.3615. Additionally, as
discussed above, we find that Cumulus apparently obtained control of
KOLI(FM) without Commission consent upon the signing of the MOU and that
such abdication continued to the date the Commission granted the
assignment of the KOLI(FM) permit to Cumulus.
51\. Under Section 503(b)(1)(A) of the Communications Act, the
Commission may assess a forfeiture against a person who has \"failed to
comply substantially with the terms and conditions of any license \[or\]
permit . . . .\"[^56] Section 503(b)(6)(A) disallows the assessment of
forfeitures against a person \"hold\[ing\] a broadcast license issued
under title III of \[the Communications\] Act . . . if the violation
charged occurred (i) more than 1 year prior to the date of issuance of
the required notice or notice of apparent liability; or (ii) prior to
the date of commencement of the current term of such license, which ever
is earlier.\"[^57] Under Section 503(b)(6)(B), a forfeiture cannot be
imposed on a person not holding a broadcast station license "if the
violation charged occurred more than one year prior to the date of
issuance of the required notice."[^58] Because the specified violations
occurred more than one year ago, while High was the permittee of
KOLI(FM), we may not levy a forfeiture against High for the violations
discussed above.[^59] With respect to Cumulus, the unauthorized transfer
of control ended with the Bureau's August, 10, 1999 grant of the subject
assignment application. The simultaneous grant of the license
application also forecloses our ability to issue a forfeiture to Cumulus
for assuming control of the station KOLI(FM) construction permit without
Commission authorization, because the conduct at issue occurred more
than one year ago. Accordingly, we ADMONISH High and Cumulus for their
failure to comply with the Commission's rules.
52\. In light of the above actions, Apex' October 13, 1998 application
for review filed on behalf of Apex Broadcasting, L.L.C. IS DENIED, and
its September 13, 1999 application for review IS GRANTED TO THE EXTENT
INDICATED HEREIN and IS DENIED in all other respects.
FEDERAL COMMUNICATIONS COMMISSION
Marlene H. Dortch
Secretary
**JOINT STATEMENT OF**
**COMMISSIONERS MICHAEL J. COPPS AND JONATHAN S. ADELSTEIN**
**CONCURRING IN PART AND DISSENTING IN PART**
*Re: High I-Q Radio, Inc., Noncommercial Educational FM Station
KOLI(FM), Electra, Texas, Memorandum Opinion and Order*
This case is replete with violations of Commission rules, including the
unauthorized commencement of commercial operations for a noncommercial
permittee; an unauthorized transfer of control of the station; and
failure to file required documents with the Commission. We concur in
these findings.
Each of these violations would ordinarily be subject to a fine or
further enforcement action. Yet, the Order concludes that no further
action is warranted on some violations, and that the lengthy delay in
this case prevents the Commission from fining the parties for other
violations because the statute of limitations has expired. So
ultimately, Cumulus, the entity that prematurely assumed control of the
station, walks away with a minor warning, all necessary FCC
authorizations and a clean slate.
Because we are not convinced that this case raises no major questions
for further inquiry, we dissent in part.
**CONCURRING STATEMENT OF**
**COMMISSIONER KEVIN J. MARTIN**
*Re: High I-Q Radio, Inc., Noncommercial Educational FM Station
KOLI(FM), Electra, TX, Application for License to Cover Construction
Permit, Application for Assignment of Construction Permit to Cumulus
Licensing Corp., Memorandum Opinion and Order*
I agree with the findings made in this Order, including the unauthorized
commercial operation and the premature transfer of control. I am
concerned, however, that the Commission's delay in action has rendered
us powerless to issue a fine. We need to act in a more timely fashion so
that the statute of limitations does not eviscerate our ability to
enforce our rules.
[^1]: Apex indirectly controls through various subsidiaries four radio
stations licensed to Wichita Falls, Texas: KNIN-FM, KTLT, KWFS(AM),
and KWFS-FM. These stations compete with KOLI for listeners and
advertisers.
[^2]: *See Letter to High I-Q Radio, Inc. and Cumulus Licensing
Corporation*, reference 1800B3-MFW (MMB, Sept. 14, 1998). High I-Q
Radio, Inc. filed an opposition on October 28, 1998, to which Apex
filed a reply on November 9, 1999.
[^3]: Hickerson subsequently died on April 23, 1998.
[^4]: The MOU reflects that a broker hired and paid by Cumulus helped
determine the purchase price.
[^5]: High did not do so, however, until October 1998. High stated that
its failure to file promptly was due to an oversight on the part of
its counsel. Moreover, High did not submit the July 1997 letter
until July 1999. *See* *infra*.
[^6]: The record in this case does not indicate when the option price
was paid by Cumulus to High.
[^7]: S*ee* *infra* ¶ 18.
[^8]: High did file its ownership report on February 5, 1998. However,
it did not include the list of contracts required by Section
73.3615(a)(4) of the Commission's Rules.
[^9]: Apex's March 3, 1998, reply raised no new matters.
[^10]: File No. BAPH-980421HW.
[^11]: Apex also contended that High was attempting to sell an unbuilt
station for consideration far in excess of its legitimate and
prudent expenses in violation of Section 73.3597(c)(2) of the
Commission's Rules. However, by *Notice of Proposed Rule Making,*
*1998 Biennial Regulatory Review*, 13 FCC Rcd 11349, 11360 (1998),
the Commission proposed to eliminate the "no profit" rule.
Subsequently, by *Report and Order,* *1998 Biennial Regulatory
Review -- Streamlining of Mass Media Rules*, 13 FCC Rcd 23056, 23070
(1998), the Commission eliminated the no profit limitation with
respect to the sale of outstanding commercial station construction
permits. With respect to noncommercial educational stations, the
Commission eliminated the no profit limitation for permits granted
prior to the release of the Report and Order. In light of this rule
change and considering all of the circumstances, we do not believe
it necessary to consider this allegation further.
[^12]: Opposition at 7, n. 5.
[^13]: High relies principally on *Letter to William L. Silva, Esq*., 9
FCC Rcd 6155 (MMB 1994), *recon. denied,* July 24, 1995,
*application for review denied sub nom*. *Choctaw Broadcasting
Corporation*, 12 FCC Rcd 8534 (1997).
[^14]: The Bureau cited *Letter to State of Oregon Acting by and through
the State Board of Educations f/b/o Southern Oregon State College
and Mr. Thomas F. Erickson (KZRO(FM), Dunsmuir, California)*,
reference 1800B3-MFW (Aud. Serv. Div., rel. June 26, 1997)
("*KZRO*"), *aff'd on other grounds*, *Fatima Response, Inc.*, 14
FCC Rcd 18543 (1999), *recon. denied*, 15 FCC Rcd 10520 (2000).
[^15]: 47 C.F.R. § 73.3527.
[^16]: Cumulus also reported that, as of September 1, 1998, Chancey
became a Cumulus employee.
[^17]: In this regard, High submits a declaration from Sellmeyer, who
avers that "\[t\]hroughout the construction of station KOLI I
conferred via telephone with Mr. Larry Hickerson on several
occasions." Sellmeyer also states that he worked with Larry
Hickerson to prepare the STL and license applications, that he knew
the permittee was High, and that actual final authority for
construction rested with Larry Hickerson.
[^18]: The MOU, in turn, referenced a "letter of intent," which had been
executed two weeks earlier.
[^19]: The Bureau referenced provisions in the agreement pursuant to
which High was not to take any of the following actions without
Cumulus' prior written consent: (1) change its name; (2) enter into
any written or oral employment contract unless the contract is
terminable at will without penalty; (3) contract with any labor
union; or (4) enter into "any contract, lease, or agreement *with
anyone other than Cumulus*" unless the contract was terminable upon
30 days' notice without penalty (emphasis supplied).
[^20]: Apex also pointed out that one of High's own exhibits belied its
claims regarding Driskill inasmuch as it was a February 3, 1998,
letter from Cumulus' counsel addressed to Marks as "General Manager"
of stations including KOLI.
[^21]: *Michael R. Birdsill*, 7 FCC Rcd 7891 (MMB 1992).
[^22]: *Letter to High I-Q Radio, Inc. and Cumulus Licensing
Corporation,* reference 1800C1-JWS, (Enf. Div., rel. Apr. 30, 1999).
[^23]: In addition, by letter dated August 24, 1999, Apex submitted
further comments on the July 16, 1999, responses of High and
Cumulus. To the extent appropriate, Apex's comments will be
incorporated into the discussion set forth below.
[^24]: Hickerson states that:
> in the first month after Larry Hickerson's death, Mr. Driskill
> spoke with me two to three times per week, assisting me in getting
> up to speed regarding station operations as well as answering
> questions regarding the station which were relevant to the
> settlement of Larry Hickerson's estate. Beginning in approximately
> June 1998, my contacts with Mr. Driskill have become less
> frequent, depending on station activity.
July 16, 1999, High response, Letter of Zachary Hickerson, at 3.
[^25]: Section 73.1690(c)(9) states, in pertinent part, that "a
noncommercial educational . . . FM licensee on Channels 221 to 300
(except Class D stations) on a channel not reserved for
noncommercial educational use, may apply to change from educational
or commercial *via* a modification of license application, and no
exhibits are required with the application. The change will become
effective upon grant of the license application." High argued that
Section 73.1690(c)(9) did not apply here, because it was only a
permittee, not a licensee, of KOLI(FM).
[^26]: 47 U.S.C. § 399B.
[^27]: The staff previously rejected this interpretation in *KZRO*. In
fact, however, even prior to the adoption of Section 73.1690(c)(9),
the staff required the filing of a license application for consent
to convert from NCE to commercial operations.
[^28]: The "plain meaning" of a statute or regulation will not be
followed where to do so produces an absurd result in clear violation
of the intent of the drafters. *See United States v. American
Trucking Associations*, 310 U.S. 534 (1940).
[^29]: At most, the premature commencement of commercial operations
would have warranted a forfeiture for violation of Section 73.503
and operating at variance with the KOLI(FM) authorization. *See,
e.g.*, *Family Vision Ministries*, 18 FCC Rcd 1418 (2003) ("isolated
occurrence" of violation of Section 73.503 did not warrant any
sanction); *Isothermal Community College*, 17 FCC Rcd 22,666 (2002)
(license admonished for violation of Section 399B of the Act and
Section 73.503 of the Commission's rules when it broadcast numerous
promotional announcements for a for-profit concert event); and
*Russellville Educational Broadcast Foundation*, 14 FCC Rcd 13508
(\$2,500 forfeiture imposed for violation of Section 399B of the Act
and Section 73.503 of the Commission's rules when licensee aired
over 800 promotional announcements on behalf of for-profit entities
over a one-year period); *Minority Television Project Inc*., 17 FCC
Rcd 15646 (EB, rel. Aug. 9, 2002) (\$10,000 forfeiture imposed for
numerous and egregious violations of Section 399B of the Act and
Section 73.621(e) of the Commission\'s rules, but finding no other
type of sanction to be necessary or justified at the time).
[^30]: 5 U.S.C. § 551 *et seq.*
[^31]: *Serafyn v. FCC,* 149 F.3d 1213 (D.C. Cir. 1998); *Astroline
Communications Co. v. FCC*, 857 F.2d 1556, 1561-62 (D.C. Cir. 1988);
*Gencom, Inc.,* 832 F.2d 171, 180-81 (D.C. Cir. 1987); *Citizens for
Jazz on WRVR v. FCC*, 775 F.2d 392, 394-95 (D.C. Cir. 1985). The
Court of Appeals for the District of Columbia Circuit has held that
the Commission need not rigidly follow this two-step process, and
can focus on the second step when evaluating a petition to deny.
*See Mobile Communications Corp. of America v. FCC*, 77 F.3d 1399,
1409-10 (D.C. Cir. 1996), *cert. denied*, 519 U.S. 823 (1996).
[^32]: 47 U.S.C. § 310 (d). *See also* 47 C.F.R § 73.3540.
[^33]: *See, e.g*., *Stereo Broadcasters, Inc*., 55 F.C.C.2d 819, 821
(1975), *modified*, 59 F.C.C.2d 1002 (1976).
[^34]: *See* *WHDH, Inc.*, 17 F.C.C.2d 856 (1969), *aff'd sub nom*.
*Greater Boston Television Corp. v. FCC*, 444 F.2d 841 (D.C. Cir.
1970), *cert. denied*, 403 U.S. 923 (1971).
[^35]: *See* *Choctaw Broadcasting Corporation*, 12 FCC Rcd at 8538
(1997).
[^36]: S*ee, e.g*., *Southwest Texas Public Broadcasting Council*, 85
F.C.C.2d 713, 715 (1981).
[^37]: *See* *David A. Davila*, 6 FCC Rcd 2897, 2899 (1991).
[^38]: *Choctaw Broadcasting Corporation*, *supra*.
[^39]: *See* *Roy M. Speer*, 11 FCC Rcd 18393 (1996).
[^40]: *Accord*, *Roy M. Speer*, 11 FCC Rcd at 18414-17; *Salem
Broadcasting, Inc.,* 6 FCC Rcd at 4173.
[^41]: *See* *Choctaw Broadcasting Corporation*, 12 FCC Rcd at 8539;
*Manahawkin Communications Corporation,* 17 FCC Rcd 342 (2001).
[^42]: Cumulus sells the advertising time and provides the material to
be aired during Mr. Driskill's program pursuant to the TBA.
[^43]: Driskill supervised Ms. Marti Driskill, who began working at the
station on February 16, 1998, as a receptionist. Her primary duties
are answering the telephone, maintaining the public service record
announcements, and paying some bills. *See* High's October 26, 1998
response to staff inquiry letter, Declaration of James Driskill, ¶
8.
[^44]: *See* High's June 11, 1998, Opposition to Petition to Deny,
Affidavit of James Driskill, ¶¶ 5, 6; High's October 26, 1998,
response to staff inquiry letter, Declaration of James Driskill, ¶¶
6-8; and High's July 16, 1999, response to staff inquiry letter,
Letter of Zachary C. Hickerson, at 5.
[^45]: High acknowledges that Brad Austin, a Cumulus employee, has
contributed to this program "when Mr. Driskill has determined that
Mr. Austin's own public affairs programming on behalf of Cumulus is
important to the Electra Community." *See* High's July 16, 1999,
response to staff inquiry letter, Letter of Zachary C. Hickerson, at
5.
[^46]: *See* High's October 26, 1998, response to staff inquiry letter,
Declaration of James Driskill, ¶ 7.
[^47]: For example, Cumulus' webs sites for KLUR-FM and KOLI(FM),
maintained by KLUR-FM program director Jay Phillips, advertised that
Jim Nash, that is, Driskill, was the music director for Cumulus'
station KLUR-FM as of May 11, 1998. Consistent with the information
on those web sites, Driskill acknowledged that he continued to
assist Phillips in the selection of music at KLUR-FM into the summer
of 1998. Additionally, Driskill worked for Cumulus' benefit at
KOLI(FM) in the past by serving as a Saturday show host, and he
continues to work to Cumulus' benefit as the host of a three-hour
Cumulus-originated program aired Monday through Friday. The
programming for these shows was supplied by Cumulus, and Driskill
acted as host of these programs.
[^48]: *See, e.g., Ms. Sally Hoskins, President*, 13 FCC Rcd 25317 (MMB
1998).
[^49]: *Roy M. Speer,* 11 FCC Rcd at 18415.
[^50]: *Manahawkin Communications Corporation,* 17 FCC Rcd at 357, ¶ 24.
[^51]: Arguably, High should also have filed the July 1997 letter of
intent within 30 days of its execution because it also constituted a
document that related to the future ownership of KOLI. Further,
inasmuch as the document was not filed until July 1999, we could
impose a forfeiture for its untimely filing. However, we conclude
that Section 503(b)(6) also prohibits the imposition of a forfeiture
for this violation.
[^52]: *See, e.g., Edwin L. Edwards,* 16 FCC Rcd 22236, 22247-8 (2001),
and *Duchossois Communications of Maryland, Inc.*, 10 FCC Rcd 6688,
6694 (1995).
[^53]: *See Edwin L. Edwards,* 16 FCC Rcd at 22247-8.
[^54]: *See, e.g.,United Broadcasting Company,* 94 F.C.C.2d 960 (1982);
*Friendly Broadcasting Company*, 90 F.C.C.2d 225 (1982).
[^55]: *See, e.g., Edwin L. Edwards, supra; Roy M. Speer, supra
(*"serious" unauthorized transfer of control lasting for 42 months
did not necessitate designation of applications for hearing where
there was no substantial and material question of fact as to whether
parties intended to deceive the Commission); *FM Broadcasters of
Douglas County, Assignor*¸ 10 FCC Rcd 10429, 10430 (1995) (11-month
unauthorized transfer of control unaccompanied by false responses or
deception "did not put in issue the qualifications" of the parties;
forfeiture was the appropriate remedy).
[^56]: *See* 47 U.S.C. § 503(b)(1)(A).
[^57]: 47 U.S.C. § 503(b)(6)(A)(i)-(ii).
[^58]: 47 U.S.C. § 503(b)(6)(B).
[^59]: *See, e.g., California State University at Sacramento
(KKTO(FM))*, 14 FCC Rcd 10018 (MMB 1999), *citing Roy M. Speer,* 13
FCC Rcd 19911, 19920 (1998).
|
en
|
converted_docs
|
729931
|
# {width="6.489583333333333in" height="1.0520833333333333in"}
Staff Contact: Russ Vought (x68581) May 24, 2006
**Appropriations Policy Brief**
**H.R. 5427 --- Energy and Water Appropriations Act for FY 2007**
**[Comparison to the RSC Budget]{.underline}:**
**Overview:** The RSC budget provided \$829 billion in discretionary
spending for FY 2007, compared to the \$873 billion allotted in the
House-reported resolution (H.Con.Res. 376). While the RSC budget did not
apportion this discretionary spending level by subcommittee---the 302(b)
allocation process---it did call for many program reductions within the
jurisdiction of the Energy and Water Development Subcommittee. Below are
highlights:
[]{.mark}
**Applied Research for Fossil Fuels Energy.** Each year, the Department
of Energy (DoE) receives roughly \$500 million to fund applied research
on sources and uses of petroleum, coal and natural gas. Although the
federal government may have a role in basic research, it is questionable
whether it should be engaged in applied research---particularly when
this type of research is conducted by numerous private sector suppliers
generating extensive general revenues with which they fund private
fossil fuel research. Often times applied research funding is simply
corporate welfare for the oil, gas, and utility industries. The RSC
Budget would eliminate funding for the DoE Applied Research for Fossil
Fuels Energy. H.R. 5427 provides \$558.2 million for this research,
\$39.8 million less than last year.
**Energy Supply and Conservation Programs.** These programs are designed
to develop new energy conserving technology, as well as improve
productivity of existing energy technology, using basic and applied
research. Businesses have incentives to market, and customers to buy,
conservation technologies that work well. DoE is left to fund the less
reliable and less promising technologies. The RSC Budget would eliminate
funding for Energy Supply and Conservation Programs. H.R. 5427 provides
\$2 billion for these programs, \$212.9 million more than last year and
\$102 million more than the request.
**Economic Development Commissions.** Under current law, the federal
government provides annual funding to three regional development
agencies---the Appalachian Regional Commission (ARC), the Denali
Commission (Alaska), and the Delta Regional Authority (Mississippi River
Area)---to promote economic growth and development to communities in
eligible counties and parishes. The activities of these programs are
duplicated by a number of federal agencies. H.R. 5427 reduces funding
for the ARC from \$64.8 million to \$35.5 million and for the Denali
Commission from \$49.5 million to \$7.5 million. H.R. 5427 also reduces
funding for the Delta Regional Authority from \$11.9 million to \$5.9
million.
[]{.mark}
**[Items of Note]{.underline}:**
**Nuclear Energy:** Provides \$529.8 million for nuclear energy programs
(\$113.9 million more than last year and \$29.9 million less than the
request), including the Nuclear Power 2010 initiative (\$54 million) to
build the first nuclear power plant in the U.S. in three decades.
[]{.mark}
**Hydrogen Fuel Initiative:** Provides \$195.8 million for hydrogen
technology (\$40.2 million more than last year and the same as the
request).
**Outsourcing/A-76 Activities:** Prohibits funding to implement a study
to outsource or privatize Army Corps personnel employed to operate or
maintain locks and dams.
**Elk Creek Dam:** Prohibits funding to remove a section of the dam for
fish passage or study alternatives to the trap and haul facility at Elk
Creek Dam, Oregon.
**Program Terminations:** According to the Committee, H.R. 5427
terminates four programs---state energy program grants, geothermal R&D
technology, natural gas R&D technology, and construction for a mixed
oxide fuel plant---saving \$460.5 million.
**[Earmarks:]{.underline}**
According to the Committee, the bill includes \$1 billion in earmarks,
\$197 million or 16% less than last year's House-passed level. Below is
a small selection of the projects:
- \$8.4 million for Rio Solada, Phoenix, and Tempe Reaches, AZ
- \$43.5 million for Oakland Harbor, CA
- \$164 million for South Florida Everglades Ecosystem Restoration, FL
- \$90 million for New York and New Jersey Harbor, NY and NJ
- \$1.2 million for a waterline extension in Clark County
- \$1 million for Fairfield County, Village of Rushville wastewater
plant expansion
- \$1 million for the City of Louisville environmental infrastructure
improvement program
- \$2 million for Brunswick Harbor, GA
- \$200,000 for the Hemenway Valley project in Southeastern Rural NV
- \$565,000 for Crum Creek in Southeast PA
- \$4 million for Jones Inlet, NY
- \$1 million for Canaveral Harbor, FL
- \$300,000 for the Duluth Superior Harbor in MI and WI
- \$1.9 million for Burns Harbor, IN for maintenance dredging
- \$200,000 for Rock Island Boat Harbor in IL for maintenance dredging
- \$488,000 for Osceloa Harbor, AR for maintenance dredging
- \$51 million for river fish and wildlife mitigation activities in MO
- \$1.2 million for Table Rock, MO to construct a boat ramp
- \$1.8 million for Whitney Lake, TX for improvements to Ham Creek
Park
- \$1 million for Whitney Lake, TX for improvements to Kimball Bend
Park
- \$500,000 for Moss Landing Harbor, CA to complete a dredging plan
and for additional fish sampling
- \$750,000 for the Arbuckle-Simpson Aquifer Study in Oklahoma
Investigations Program
- \$19.9 million for heavy truck engine research and development
- \$1 million for the Missouri Alternative/Renewable Energy Technology
Center at Crowder College in MO
- \$1 million for Life Science Research at Michigan Research Institute
MI
- \$1 million for Augsburg College in MN
- \$500,000 for Biomedical Imaging at the University of NC
**[Funding Summaries]{.underline}:**
[]{.mark}
*In Thousands*
----------------------------------------------------------------------------- ------------ ------------ ------------ ------------ ----------- ---------- -----------
**FY 06 **FY 07 **FY 07 **Cmte Over **Cmte Over **% Over **% Over
Enacted** Request** Cmte** FY06** Request** FY06** Request**
**Corps of Engineers**
General Investigations\...\...\...\...\...\...\...\...\.... 162,360 94,000 128,000 -34,360 34,000 -21.16% 36.17%
Construction\...\...\...\...\...\...\...\...\...\...\...\...\...\... 2,348,280 1,555,000 1,929,471 -418,809 374,471 -17.83% 24.08%
Flood Control - MS River & Tributaries. 396,000 278,000 290,607 -105,393 12,607 -26.61% 4.53%
Operations & Maintenance\...\...\...\...\...\..... 1,969,110 2,258,000 2,195,471 226,361 -62,529 11.50% -2.77%
Regulatory Programs\...\...\...\...\...\...\...\...\...\... 158,400 173,000 173,000 14,600 0 9.22% 0.00%
Flood Control & Coastal Emergencies\.... 0 81,000 32,000 32,000 -49,000 0.00% -60.49%
General Expenses\...\...\...\...\...\...\...\...\...\...\..... 152,460 164,000 142,100 -10,360 -21,900 -6.80% -13.35%
Total, Corps of Engineers\...\...\...\...\..... 8,228,719 4,733,000 4,983,803 -3,244,916 250,803 -39.43% 5.30%
**Dept of Interior**
Central Utah Project\...\...\...\...\...\...\...\...\...\... 31,351 37,587 37,587 6,236 0 19.89% 0.00%
Water and Related Resources\...\...\...\...\...\... 874,679 833,424 849,122 -25,557 15,698 -2.92% 1.88%
Central Valley Project\...\...\...\...\...\...\...\...\.... 52,219 41,478 41,478 -10,741 0 -20.57% 0.00%
California Bay-Delta Restoration\...\...\..... 36,630 38,610 40110 3,480 1,500 0.00% 3.89%
Policy & Administration\...\...\...\...\...\...\...\... 57,338 58,069 58,069 731 0 1.27% 0.00%
Total, Dept of Interior\...\...\...\...\...\...\... 1,054,873 923,736 940,934 -113,939 17,198 -10.80% 1.86%
**Dept of Energy**
Energy Supply\...\...\...\...\...\...\...\...\...\...\...\...\.... 1,812,627 1,923,361 2,025,527 212,900 102,166 11.75% 5.31%
Fossil Energy Research\...\...\...\...\...\...\...\...\...\.... 592,014 469,686 558,204 -33,810 88,518 -5.71% 18.85%
Naval Petroleum and Oil Shale Reserves\.... 21,285 18,810 18,810 -2,475 0 -11.63% 0.00%
Elk Hills School Lands Fund\...\...\...\...\...\...\..... 83,160 0 0 -83,160 0 -100.00%
Strategic Petroleum Reserve\...\...\...\...\...\...\...\... 164,340 155,430 155,430 -8,910 0 -5.42% 0.00%
Northeast Home Heating Oil Reserve\...\...\... 0 4,950 4,950 4,950 0 0
Energy Information Adminstration\...\...\...\.... 85,314 89,769 89,769 4,455 0 5.22% 0.00%
Uranium Enrichment Decontam \...\...\..... 556,606 579,368 579,368 22,762 0 4.09% 0.00%
Non-Defense Environmental Services\.... 349,687 310,358 309,946 -39,741 -412 -11.36% -0.13%
Science\...\...\...\...\...\...\...\...\...\...\...\...\...\...\...\...\... 3,596,393 4,101,710 4,131,710 535,317 30,000 14.88% 0.73%
Nuclear Waste Disposal\...\...\...\...\...\...\...\..... 148,500 156,420 186,420 37,920 30,000 25.54% 19.18%
Departmental Administration\...\...\...\...\.... 250,289 278,382 278,382 28,093 0 11.22% 0.00%
Inspector General\...\...\...\...\...\...\...\...\...\...\..... 41,580 45,507 45,507 3,927 0 9.44% 0.00%
National Nuclear Security Admin\...\...\..... 9,104,497 9,315,811 9,199,811 95,314 -116,000 1.05% -1.25%
Other Defense Activities\...\...\...\...\...\...\...\... 635,577 717,788 720,788 85,211 3,000 13.41% 0.42%
Defense Nuclear Waste Disposal\...\...\...\... 346,500 388,080 388,080 41,580 0 12.00% 0.00%
Power Marketing Administrations\...\...\.... 269,725 251,975 251,975 -17,750 0 -6.58% 0.00%
Total, Dept of Energy\...\...\...\...\...\...\.... 24,046,772 24,074,717 24,373,489 326,717 298,772 1.36% 1.24%
**Independent Agencies**
Appalachian Regional Commission\...\..... 64,817 65,472 35,472 -29,345 -30,000 -45.27% -45.82%
Def Nuclear Facilities Safety Board\...\..... 21,812 22,260 22,260 448 0 2.05% 0.00%
Delta Regional Authority\...\...\...\...\...\...\..... 11,880 5,940 5,940 -5,940 0 -50.00% 0.00%
Denali Commission\...\...\...\...\...\...\...\...\...\..... 49,500 2,536 7,536 -41,964 5,000 -84.78% 197.16%
Nuclear Regulatory Commission\...\...\...\.... 116,022 148,082 152,082 36,060 4,000 31.08% 2.70%
Nuclear Waste Technical Review Board\...\...\...\... 3,572 3,670 3,670 98 0 2.74% 0.00%
Total, Independent Agencies\...\...\...\.... 268,426 248,774 227,774 -40,652 -21,000 -15.14% -8.44%
----------------------------------------------------------------------------- ------------ ------------ ------------ ------------ ----------- ---------- -----------
|
en
|
all-txt-docs
|
825472
|
WFUS53 KDMX 100001
TORDMX
IAC187-100030-
/O.NEW.KDMX.TO.W.0131.080810T0000Z-080810T0030Z/
BULLETIN - EAS ACTIVATION REQUESTED
TORNADO WARNING
NATIONAL WEATHER SERVICE DES MOINES IA
700 PM CDT SAT AUG 9 2008
THE NATIONAL WEATHER SERVICE IN DES MOINES HAS ISSUED A
* TORNADO WARNING FOR...
NORTHWESTERN WEBSTER COUNTY IN CENTRAL IOWA...
* UNTIL 730 PM CDT.
* AT 655 PM CDT...NATIONAL WEATHER SERVICE DOPPLER RADAR INDICATED A
SEVERE THUNDERSTORM CAPABLE OF PRODUCING A TORNADO NEAR CLARE...OR
11 MILES NORTHWEST OF FORT DODGE...MOVING SOUTH AT 12 MPH.
* THE TORNADO WILL BE NEAR...
BARNUM BY 720 PM CDT...
THIS IS A HAZARDOUS SITUATION. SEEK SHELTER IN A BASEMENT...OR IN AN
INTERIOR ROOM. STAY AWAY FROM WINDOWS. IF YOU ARE OUTSIDE OR IN A
CAR...SEEK SHELTER IN A REINFORCED BUILDING.
LAT...LON 4250 9422 4245 9440 4261 9442 4263 9434
TIME...MOT...LOC 0000Z 340DEG 11KT 4257 9436
$$
MOYER
|
en
|
markdown
|
040744
|
# Presentation: 040744
## Vaccines and Related Biological Products Advisory Committee Meeting
**Vaccines and Related Biological Products Advisory Committee Meeting **
**Preventive HPV Vaccine Endpoints****November 28-29, 2001****Bethesda, MD**
**Karen L. Goldenthal, M.D.**
**Division of Vaccines and **
** ****Related Products Applications**
**US Food and Drug Administration**
## Acknowledgements
**Douglas R. Pratt, M.D., M.P.H. **
**Antonia Geber, M.D. **
**Donna K. Chandler, Ph.D. **
**Jerry P. Weir, Ph.D. **
**Gopa Raychaudhuri, Ph.D. **
**Jerry D. Willett, M.D. **
**Rebecca L. Sheets, Ph.D. **
**Robert W. Anderson, Ph.D. **
**Rakesh Pandey, Ph.D. **
**Karen Midthun, M.D. **
**Theresa M. Finn, Ph.D. **
## Cervical Cancer Global Perspective
**Worldwide, 3rd most common CA in women********* **
**After breast and colon/rectum cancer**
**Developing countries: 2nd most common CA**
**Developed countries: 6th most common CA**
**Worldwide, ~400,000 to 500,000 new cases/yr**
**Disturbing trend, Finland: Between 1991-95, 60% ******** in cervical CA incidence for women <55 yrs of age****#**
**Worldwide, 190,000 deaths per yr********
**~78% in developing countries**
*******Parkin DM, et al. **_**Int J Cancer**_** 1999;80:827–41. (Worldwide CA incidence, 1990)**
********Pisani P, et al. **_**Int J Cancer**_** 1999;83:18–29. (Worldwide CA mortality, 1990)**
**#****Dillner J, 2000; Anttila et al., 1999.**
## Cervical Cancer U.S.A. Perspective
**In 1930s, cervical CA most common cause of CA deaths in U.S. women**
**Incidence/mortality rates for cervical CA declined dramatically following Pap screening & intervention**
**For 2001, ~12,900 new cases of cervical CA and 4,400 deaths due to cervical CA projected for U.S.***
**Woman's lifetime risk of cervical CA dx currently ~0.85%; risk of dying from disease is ~0.30%** **
***Janicek MF & Averette HE, 2001; Greenlee RT et al., 2001 **
****Ries LAG et al., 2000 (Surveillance, Epidemiology, & End Results [SEER] data, NCI) **
## Precursor Lesions of Cervical Carcinoma
**From Figure 6.13, DeMay RM. The Art and Science of Cytopathology. CD-ROM. ASCP. 1999.**
**Wright TC, Kurman RJ, Ferenczy A: Precancerous Lesions of the Cervix. In Kurman RJ, ed: *****Blaustein's Pathology of the Female Genital Tract.***** 4th ed. New York: Springer-Verlag NY Inc, 1994.**
**LSIL = Low Grade Squamous Intraepithelial Lesion CIN = Cervical Intraepithelial Neoplasia**
**HSIL = High Grade Squamous Intraepithelial Lesion**
** ****LSIL**** **** **** ****HSIL**
** **** ****CIN 1 CIN 2**** **** **** **** ****CIN 3**
**Normal Mild**** **** **** **** Moderate**** **** Severe**** ****Carcinoma**
** **** ****Dysplasia Dysplasia Dysplasia**** *****in situ***** **
## Above, right. CIN 3, cervix. Note adjacent koilocytes (bottom right). http://hsc.virginia.edu/med-ed/path/gyn/cervix4.html
**Above, right. CIN 3****, cervix. ****Note adjacent koilocytes (bottom right).**** **_**http://hsc.virginia.edu/med-ed/path/gyn/cervix4.html**_
**Above, left. Squamous carcinoma *****in situ***** (CIS), cervix.**** To the right is normal squamous epithelium with its basal cell layer & orderly maturation upwards. The left side shows CIS characterized by lack of maturation, altered cell polarity, nuclear pleomorphism & increased nuclear / cytoplasmic ratio. As is characteristic of CIS, neoplastic cells are confined to the epithelial layer & have not invaded through the epithelial basement membrane, under which, the submucosal stroma contains chronic inflammatory cells. **
**Cornell Medical School **_**http://www.pathinfo.com/alphlit.htm**_
## Cervical Lesions: “Pyramid” of Findings (U.S.)*
*******From ALTS: The ASCUS/LSIL Triage Study Newsletter, Vol 1, Issue 1**
****More recent projection: 12, 900 cases/yr for 2001**
**Janicek MF & Averette HE, 2001; Greenlee RT et al., 2001**
** **
**ASCUS**** = Atypical Squamous Cells of Undetermined Significance. **
**A recommendation from The Bethesda 2001 Workshop: Replace term ASCUS with **
**ASC**** (Atypical Squamous Cells). **
**Cancer** **~15,000 cases/yr****
**HSIL **
- **~300,000 cases/yr**
**LSIL**
** ****~1,250,000 cases/yr**
**ASCUS **
** ****~2,000,000 cases/yr**
## Natural History of CIN
**Table 7 (Modified) from ****Östör**** AG: Natural history of cervical intraepithelial neoplasia: A critical review **_**Int. J Gynecol. Pathol.**_** 12:186-92, 1993. (Literature Review)**
- **Regress**** ****Persist**** ****Progression to**
** **** **** **** **** **** ****CIN 3**** **** Invasion**
** ****CIN 1**** ****57%**** **** ****32%**** **** ****11%**** **** 1%**** **
** ****CIN 2**** ****43%**** **** ****35%**** **** ****22%**** **** 5%**** **
** ****CIN 3**** ****32%**** **** ****<56%**** **** **** >12%**
## Natural History of CIN
**Limitations**** of this literature review, e.g.:*******
**Biopsy may alter natural history**
**1950s-1990; Non-uniform diagnostic criteria**
**Cytology does not always predict histology **
**“****Jigsaw puzzle effect” e.g., CIN 1 & 3 in same cervix**
**Lack of long-term follow-up**
**Estimate ****CIN 3 to ICC**** “>12%” likely too low,**** ****may be ****20-30% within 5-10 yrs********
******* ****Östör**** ****AG: **_**Int J Gynecol Pathol**_** 12:186-92, 1993. (Lit Review)**
********Chang AR: CIS of the cervix & its malignant potential. A lesson from New Zealand. **_**Cytopathology**_** 1:321-8, 1990. **
## Natural History of Cervical Dysplasiaa
**Cytology Progression****b**** **** Progression to**** **** Regression**
** **** **** **** **** ****Invasive Cancer to Normal****c**
** **** ****6 mos**** ****24 mos 6 mos**** ****24 mos**** **
**ASCUS 2%**** ****7.2%**** **** 0.06%**** ****0.25%**** **** 68.2%**** **
**LSIL**** **** 6.6%**** ****20.8%**** **** 0.04%**** ****0.15%**** **** 47.4%**** **
**HSIL**** **** 6.8%**** ****23.4%**** **** 0.15%**** ****1.44%**** **** 35.0%**** **
**a****Data source: Melnikow J et al., Natural history of cervical squamous intraepithelial lesions: a meta-analysis. **_**Obstet Gynecol**_** 1998;92:727-735. Also, ****from Table 3 in: Bristow RE et al.** **Workup of the Abnormal Pap Test. **_**Clinical Cornerstone**_** 3:12-24, 2000.**
**b****Follow-up smears or biopsies showed a higher grade lesion than the**
**entry cytology. For HSIL, progression to CIN 3 (from grade 2) or CIS. ****c****Neg. result of F/U cytology or biopsy. No relationship found between proportion of subjects regressing to normal & length of follow-up. **
## HPV Vaccine Composition
**93% HPV positive by PCR*******
**5 most common HPV types:**
**HPV 16 in 50%**** HPV 31 in 5.3 % HPV 33 in 2.8%**
**HPV 18 in 14%**** HPV 45 in 8.4%**
**Subsequently, 97% HPV positive with improved retesting (e.g., more sensitive primers); 99.7 % w/author-defined adequate specimens****** **
*** ****Bosch FX et al., **_**J Natl Cancer Inst**_** 1995;87:796-802. **
**** ****Walboomers, J.M.M. **_**J. Pathol**_** 1999;189:12**** ̄****19.**
** ****Meijer C et al.: Commentary in **_**Histopathology**_** 1998;33:83-6. **
**Worldwide survey >1000 invasive cervical cancers*******
## Squamous Cell Carcinoma* - HPV 16 Most Common Type
**HPV **** **** ****Bosch**** ****Iwasawa**
**Type **** ****N=881**** ****N=352**
**HPV 16**** ****51%**** **** ****78% **
**HPV 18**** ****12%**** **** ****16%**
**Bosch FX et al. **_**JNCI**_** 87:796-802, 1995**
**Iwasawa A et al. **_**Cancer**_** 1996;77:2275–9.**
*******Cervix**
## Adenocarcinoma (Cervix) - HPV 18 - Most Common Type
**Bosch FX et al. **_**JNCI**_** 1995; 87:796-802. (Global cases)**
**Iwasawa A et al. Cancer 1996;77:2275–9. (Finnish cases)**
**Andersson S et al. **_**Eur J Cancer**_** 2001;37:246-50. (Swedish cases)**
**Pirog EC et al. **_**Am J Pathol**_** 2000;157:1055–62. (US & Polish cases)**
** *****Excludes 6 HPV neg cases of nonmucinous adenocarcinomas (clear cell, serous & mesonephric).**
**HPV**** **** Bosch**** **** Iwasawa**** **** Andersson Pirog Type**** **** N=25**** **** N=108**** **** N=131**** **** N=**** ****67***
**HPV 16 28%**** **** 17%**** **** **** 24%**** **** **** 36% **
**HPV 18 56%**** **** 56%**** **** **** 37%**** **** **** 36%**
## Incidence of Squamous Cell Carcinoma (SCC) vs. Adenocarcinoma (ADC) of the Cervix
**Cytology screening - far less impact on incidence of ADC compared to SCC***
**In U.S., review of SEER database has shown **
**A clear **_**decrease**_** in incidence of SCC, and invasive cervical cancer (ICC) overall; **
**However, an **_**increase**_** in the rate of ADC**
**Overall, similar findings in Scandinavia**
***Smith HO, et al. The rising incidence of adenocarcinoma relative to **
**squamous cell carcinoma of the uterine cervix in the U.S.--a 24-year **
**population-based study. **_**Gynecol Oncol**_** 2000;78:97-105.**
## Risk of CIN 2 or 3: Relation to HPV Type 16 and 18
**241 women presenting for ****STD evaluation**** & with ****negative**** cervical cytology***
**Followed q4 months (ave. F/U 25 mos): **
**Cytology, **_**colposcopy**_**, HPV DNA, STDs**
**CIN 2 or 3 (biopsy) in 28 women (11.6%)**
**If ****+ HPV type 16 or 18,**** ****adj. RR 11**** (4.6-26) for CIN 2 or 3 compared to those w/o HPV**
**Attributable proportion to types 16 & 18 = 52% **
**Only 36% (10/28) had LSIL Pap before HSIL Pap**
**Subset HPV DNA neg. on 1****st**** 2 visits **
**In subsequent 2 yrs, 8.6% (9/105)** had CIN 2/3 dx**
***Koutsky L, et al.: A cohort study of the risk of CIN 2 or 3 in relation to papillomavirus infection. **_**NEJM**_** 327:1272-8, 1992. (STD clinic, Seattle, WA)**
****8 of 9 cases occurred among 35 women who developed HPV infection**
## Risk of CIN 2 or 3: Relation to HPV Type 16
**1075 women with normal cytology **_**and**_** HPV negative tests at baseline***
**Followed q6 months: Pap smear & HPV DNA (median FU = 26 months)**
**If abn. cytology, referred to colposcopy/bx**
**CIN 2 or 3 (biopsy) in 28 women**** (2.6%)**
**Median time to dx = 36 months from study entry**
**20 of these CIN 2/3 cases diagnosed during work-up of the 1****st**** episode of abn. cytology**
**If ****+ HPV type 16,**** ****adj. RR 8.5**** (3.7 to 19) for CIN 2 or 3 compared to those w/o HPV**
***Woodman CB, et al. Natural history of cervical human papillomavirus infection **
**in young women: a longitudinal cohort study. **_**Lancet**_** 2001;357:1831–36.**
## Stages of Review and Regulation
**Clinical Investigational Plan**
**Phase 1**
**Safety**
**Immuno-**
**genicity**
**Phase 2**
**Immuno-genicity**
**Safety**
**Dose Ranging**
**Phase 3**
**Efficacy**
**Safety**
**Immuno-genicity**
**BLA**
**Data to support approval;**
**Inspection**
**Phase 4**
**Inspection**
**Safety**
**Efficacy**
**Lot Release**
**BLA Supplement**
**Post-approval**
**Changes:**
**New Indications**
**Dosing**
**Manufacture**
**Equipment/**
**Facilities**
- **IND**
**IND = Investigational New Drug Application; **
**BLA = Biologics License Application**
## “Theoretical” Endpoints - HPV Preventive Vaccines
**Types 16, 18 and other “high risk” types**
**Virology (various definitions of incident or persistent infection)**
**LSIL cytology (w/o biopsy confirmation) or worse with virology**
**CIN 1 histology, AIS*, or worse with virology (Hereafter = CIN 1 or worse**** ****with virology)**
**CIN 2/3 histology, AIS, or worse with virology (Hereafter = CIN 2/3 or worse**** ****w/virology)**
**Invasive cervical cancer with or w/o virology**
***AIS = Adenocarcinoma *****in situ *****(of the cervix)**
## Possible Endpoints – HPV Vaccines
**Virology (only)**** - *****Advantages***
**Feasibility**
**Smaller Trial, i.e., a few thousand**
**Populations exist in many countries w/sufficient incident HPV “infection” rate, e.g., for Type 16**** **
**U.K. - 10.5% cum for 3 yrs (Woodman CB et al., 2001)**
**U.S. - 7% cum for 2 yrs (Ho GYF et al., 1998)**
**U.S. - 4.7 / 100 person yrs (Thomas KK et al., 2000)**
**Brazil - 1.68 / 100 person yrs (Franco EL et al., 1999)**
## Possible Endpoints – HPV Vaccines
**Virology (only)**** - *****Advantages***
**HPV strongly associated with HSIL cytology, CIS and cervical cancer***
**Determine vaccine versus non-vaccine serotypes**
**Might be able to determine immune correlate**
***Koutsky LA, et al. **_**N Engl J Med**_** 1992;327:1272-8. (CIN 2/3 and HPV infection)**
**Woodman CBJ, et al. **_**Lancet**_** 2001;357:1831–36. (CIN 2/3 and HPV infection)**
**Ylitalo N, et al. **_**Lancet**_** 2000;355:2194-8. (HPV Viral load and CIS)**
**Josefsson AM, et al. **_**Lancet**_** 355:2189, 2000. (HPV Viral load and CIS)**
**Ylitalo N, et al. **_**Cancer Res**_** 2000;60:6027-32. (Long term HPV infection and CIS)**
**Bosch FX, et al. **_**J Natl Cancer Inst**_** 1995; 87:796-802. (HPV and cervical cancer)**
## Possible Endpoints - HPV Vaccines
**Virology (only)**** - *****Disadvantages***
**HPV infection is not a clinical disease**
**Most HPV infection resolves**
**Durability of protection uncertain **
**? Change in lifetime risk for HSIL histology/cancer**
**Not as proximal to cancer as other endpoints**
**e.g.,**** ****may overestimate vaccine efficacy with regard to high grade lesions/cancer**
**May want definitive high grade clinical endpoint data before extensive deployment of a new HPV vaccine**** **
## Possible Endpoints - HPV Vaccines
**Virology (only)**** - *****Disadvantages***
**Uncertainty in existence of, or detection of latent infections in the cervix**
**Detection in superficial vs. basal layer cells?**
**Could a vaccine-induced immune response make HPV DNA more difficult to detect?**
**Uncertainty distinguishing new infection from re-infection (although this problem would tend to negatively bias efficacy estimate)**
**Various definitions of persistent infection, e.g., infection X 2 at 4, 6 or 12 months, not validated in previous clinical trials **
## Possible Endpoints - HPV Vaccines
**Virology (only)**** - *****Disadvantages***
**May not identify unanticipated vaccine-associated problems with virology endpoint: **
**Alteration in HPV natural history, difficulty in detecting cervical dysplasia, enhanced disease (dysplasia, cancer)**
**Post-approval, could be difficult to detect outside context of a randomized, well-controlled trial **
**Small efficacy trial **
**Provides less well-controlled safety data **
**Could be addressed w/supplemental trials**
## Possible Endpoints - HPV Vaccines
**LSIL cytology or worse w/Virology **** - *****Advantages***
**Feasibility**
**Smaller trial, i.e., a few thousand**
**LSIL leads to many clinical work-ups in developed countries**
## Possible Endpoints - HPV Vaccines
**LSIL cytology or worse w/Virology**** - *****Disadvantages***
**Clinical relevance: About half of LSIL resolves w/o therapy **
**LSIL cytology, by itself, does not represent a definitive diagnosis **
**Need histologic diagnosis for therapy**
**Without colposcopy and biopsy, if needed, cannot R/O higher grade lesions **
**CIN 2/3 found at work-up in a % of LSIL cases, even w/o prior hx of cervical disease **
## Possible Endpoints - HPV Vaccines
**LSIL cytology or worse w/ Virology**** - *****Disadvantages (cont.)***
**Not as proximal to cancer as other endpoints**
**May want definitive high grade clinical endpoint data before extensive deployment of a new HPV vaccine **
**May be easier to identify unanticipated vaccine-associated problems with high grade disease endpoint (see earlier slide)**
**Small efficacy trial**** **
**Provides less well-controlled safety data **
**Could be addressed w/supplemental trials**
## Possible Endpoints - HPV Vaccines
**CIN 1* or worse w/ Virology**** - *****Assumptions***
**CIN 1 (biopsy) or worse (CIN 1 +) = 1****0**** endpoint**
**Virology used to classify CIN 1 + cases as vaccine serotype or not**
**Prespecify HPV testing on cervical samples vs histology to classify cases**** **
**Cases would be identified from colposcopic work-up of (mostly) ASCUS & LSIL cytology**
**Plan/algorithm for colposcopy will affect # of endpoints (more frequent = more endpoints)**
**Can’t use economics as basis for US licensure**
** ********* Histology**
## Possible Endpoints - HPV Vaccines
**CIN 1 histology or worse w/ Virology**** - *****Advantages***
**Feasibility**
**Smaller trial, i.e., a few thousand**
**Populations exist in many countries with sufficient incident CIN 1 **
**Necessitates definite work-up **
**Generates histologic dx that guides therapy**
**Data are available on the natural history of CIN 1 from initial diagnosis**
## Possible Endpoints - HPV Vaccines
**CIN 1 histology or worse w/Virology**** - *****Disadvantages***
**At least half of CIN 1 resolves w/o therapy**
**Not as proximal to cancer as other endpoints**
**May want definitive high grade clinical endpoint data before extensive deployment of a new HPV vaccine **
## Possible Endpoints - HPV Vaccines
** ****CIN 1 histology or worse w/Virology**** - *****Disadvantages (cont.)***
**May be easier to identify unanticipated vaccine-associated problems with high grade disease endpoint (see earlier slide)**
**Small efficacy trial **
**Provides less well-controlled safety data **
**Could be addressed w/supplemental trials**
## Possible Endpoints - HPV Vaccines
**CIN 2/3 or worse w/ Virology**** - *****Assumptions***
**Virology used to classify CIN 2/3 + cases as vaccine serotype or not**
**Prespecify HPV testing on cervical samples vs histology to classify cases **
**Many/most CIN 2/3 + cases would be identified from colposcopic work-up of ASCUS and LSIL********* **
**Plan/algorithm for colposcopy critical to # of endpoints (more frequent = more endpoints)**
**Many/most CIN 2/3+ cases could be those found at 1st work-up of abnormal cytology**
******* Lonky NM, et al. The clinical significance of the poor correlation of cervical dysplasia & cervical malignancy with referral cytologic results. **_**Am J Obstet Gynecol**_** 1999;181:560-6.**
## Possible Endpoints - HPV Vaccines
**CIN 2/3 histology or worse w/Virology**** - *****Advantages***
**More proximal to cervical cancer**** **
**Provides definitive high grade clinical endpoint data before, before wide-spread public health use**** **
**Natural history data - Prevent lesions that need therapy (US standard of care)**
## Possible Endpoints - HPV Vaccines
**CIN 2/3 histology or worse w/Virology**** - *****Advantages (cont.)***
**May be easier to identify unanticipated vaccine-associated problems with high grade disease endpoint (see earlier slide)**
**Larger efficacy trial **
**Implications for randomized safety database**
## Possible Endpoints - HPV Vaccines
**CIN 2/3 or worse w/Virology**** - *****Disadvantages***
**Feasibility - Subject #s may not differ from most vaccine efficacy trials; however, type of follow-up likely to be more resource intensive**
**Uncertainty trial size/ duration estimate??**
**Little natural hx data to est. trial size: women w/ baseline neg. HPV, normal cytology **
**12,000 women, randomized 1:1 (vaccine to placebo), vaccine efficacy **_**>**_** 80%, 3 1/2 yrs*******
- *** Preliminary estimate based on data from: **
**Woodman CBJ, et al. **_**Lancet**_** 2001;357:1831–36.**
## Possible Endpoints - HPV Vaccines
**Cervical Cancer w or w/o Virology**** - *****Assumptions***
**One scenario (developed country)**
**Randomize subjects; infrastructure in place for routine F/U & a method of capturing all diagnoses for an area, e.g., cancer registry and death certificates**
**Scandinavian Countries ****(Comprehensive CA registries)**
**HPV testing: Presence or absence of baseline testing before randomization, & cervical sample/ histology testing will affect efficacy level assessment**
**Esp. in U.S., many/most cervical CA cases identified from colposcopic work-up of ASC, AGC and LSIL********* **
******* Lonky NM, et al. The clinical significance of the poor correlation of cervical dysplasia & cervical malignancy with referral cytologic results. **_**Am J Obstet Gynecol**_** 1999;181:560-6.**
## Possible Endpoints - HPV Vaccines
**Cervical Cancer with or w/o Virology**** - *****Advantages***
**The major concern **_**is**_** cervical CA**
**Provides definitive high grade clinical endpoint data before, before wide-spread public health use **
**May be easier to identify unanticipated vaccine-associated problems with high grade disease endpoint (see earlier slide)**
## Possible Endpoints - HPV Vaccines
**Cervical Cancer with or w/o Virology**** - *****Advantages (cont.)***
**Give best understanding of impact of vaccine (if Type 18 included) on ****adenocarcinoma**
**Larger efficacy trial**
**Implications for randomized safety database, although detailed data not expected**
## Possible Endpoints - HPV Vaccines
**Cervical Cancer with or w/o Virology**** - *****Disadvantages***
**Feasibility**
**Uncertainty **
**Trial size/ duration estimate/ population selection/countries w/o screening program??**
## Efficacy Trial Analysis
**Statistical section of protocol ****(prospective)**
**Detailed, especially for 1****o**** endpoint**
**Interim analysis**
**Intent-to-treat**** vs. per protocol: vaccine serotypes**
**Handling of mixed infections****, esp. vaccine & non-vaccine types, in ****1****o**** endpoint analysis**
**Evidence of**** ****overall benefit**** when all endpoints, including ones attributed to non-vaccine high risk HPV types, are included in an analysis**
## Accelerated Approval (AA)
**21 CFR 601.40s Subpart E: Accelerated Approval of New Biologic Products for Serious or Life-Threatening Illnesses*******
**“...****provide ****meaningful therapeutic benefit**** to patients over existing treatments (e.g., ability to treat patients unresponsive to, or intolerant of, available therapy, or improved patient response over available therapy).”**
*****_** Federal Register**_** 57;58942-60, 1992.**
**See 21 CFR 314.500s Subpart H for AA of new drugs **
## Accelerated Approval (AA)
**“****FDA may grant marketing approval for a biological product on the basis of ****adequate and well-controlled clinical trials**** establishing that a biological product has an effect on a surrogate endpoint that is reasonably likely, based on epidemiologic, therapeutic, pathophysiologic, or other evidence, to predict clinical benefit, or on the basis of an effect on a clinical endpoint other than survival or irreversible morbidity.”**** **
## Accelerated Approval (AA)
**Intended to make available promising therapies while definitive confirmatory efficacy studies being completed **
**Confirmatory post-marketing studies:**
**Usually well underway at time of AA**
**Must be adequate and well-controlled**** **
**Must be carried out with due diligence **
**Original, and current, intent of AA regulation = serve best interests of public **
**Preventive vaccines have not been previously approved using AA regulation**
## FDA Questions
**1.**** ****Please discuss and identify the most appropriate endpoints for traditional approval of HPV vaccines intended to prevent cervical cancer: **
** ****In particular, please discuss the use of the following endpoints in clinical trials intended to demonstrate the efficacy of HPV vaccines for oncogenic types, and the indications (e.g., prevention of HPV infection, etc.) these endpoints would support: **
**a.**** ****Incident HPV infection by oncogenic HPV types **
**(i.e., at least one positive HPV DNA test result).**
**b.**** ****Persistent HPV infection by oncogenic HPV types.**
** ****- Regarding this endpoint, please also discuss the appropriate number of positive virologic results, and the interval between positive virologic results.**
**c. **** ****LSIL (cytology), associated w/oncogenic HPV types.**
**d. **** ****CIN 1, associated with oncogenic HPV types.**
**e. **** ****CIN 2/3, associated with oncogenic HPV types.**
**Cervical cancer. **
## FDA Questions (continued)
**2.**** ****Please discuss the use of the accelerated approval regulations for licensure of HPV vaccines for the prevention of cervical cancer: **
** ****Specifically, please discuss and identify possible surrogate endpoints to support accelerated approval. In particular, consider the following endpoints:**
** ****a. Incident HPV infection by oncogenic HPV types. **
** ****b. Persistent HPV infection by oncogenic HPV types. **
** ****c. LSIL (cytology), associated w/oncogenic HPV types.**
** ****d. CIN 1, associated with oncogenic HPV types.**
** **
** ****In the context of accelerated approval, please discuss and identify possible endpoints for the confirmatory trial.**
|
en
|
all-txt-docs
|
092550
|
!! spellx done
87 Demands of Vietnam Hobble
Our Steps to Outer World
The Washington Post Saturday, March 2, 1968
"No New Starts!" was the central message of the 1968 budget, and
for many long-range progressions of the Nation's ideals, may be the
most optimistic hope for 1969. It has become wearisome and
exasperating to talk, think or write about the drain of America's
resources in the Asian war. But there it is, and it is pointless
to comment on expectations for science and education without paying
homage to the tyranny of military "solutions" to world problems.
"No new starts!" was applied with particular force to NASA's
programs for the exploration of space. Many other agencies were
subjected to the attrition implied by a fixed dollar ceiling; NASA
was cut back from a 1967 expenditure level of nearly $5 billion to
$4.6 billion in fiscal 1968. This appropriation ran a half-billion
lower than President Johnson's budget request. This year he has
asked for $4.37 billion; some critics of any-space-at-all have set
their sights on reducing this to an even $4 billion.
The Apollo project has still been left virtually intact at about
$2.5 billion and the brunt of these cutbacks is taken by space
science, planetary exploration and other advanced missions. This is
paradoxical, insofar as the loss of the three astronauts in the Apollo
fire last year has played a large part in public disenchantment with
space efforts. However, NASA Administrator James E. Webb has made a
convincing case that we might still manage a lunar manned landing
by 1970, that we can hardly abandon the program at this stage, and
that a reprogramming to a stretched-out schedule would eventually
cost more than continuing with established plans. He has also
stressed the importance of unmanned planetary exploration as a basic
program for the next decade.
The momentum of this effort still leaves the possibility of
continuing a significant program after 1970, provided we make a
continued investment in advance planning and design and make
special efforts to maintain the integrity and morale of the teams
of experts who have committed their careers to space.
In this light, the deferral for another year or two of
large-scale operational spending for planetary missions need not be
a major tragedy for the overall chronicle of this frontier. There
are, in fact, potential advantages to mounting a broader, more
carefully planned campaign. An essential element of this strategy
is to leave enough time between successive missions to each target for
the data from one to be digested and to have a significant impact on
planning the next. This might impose a four-year rather than the
minimal two-year cycle of visits to Mars, unless the Mars missions
can be programmed to have far more flexibility in the revision of
details than is now provided. Against this philosophy of planning is
the pressure of technological obsolescence, and the competition with
the Soviet program.
The mapping and eventual surface analysis of Mars remain the
most plausible and rewarding next steps in the mastery of the outer
world.
---------------------------------------------------------------------
|
en
|
markdown
|
942581
|
# Presentation: 942581
## Rare Hadronic B Decays
- John Fry
- Lepton Photon 2003
## Scope of Talk
- To present updated branching fractions (BF) and CP asymmetries (ACP) for rare (charmless) B decay modes
- To show how BF and ACP are used with theoretical models to put constraints on the Standard Model and to search for New Physics.
**NB:** All results are preliminary unless referenced.
- John Fry Lepton Photon 2003
## How Good is the Standard Model?
- A. H**ö**cker et al, Eur. Phys. Jour.
- C21 (2001) 225, [hep-ph/0104062]
- K [K] and B sectors [md,
- V_ub_ , V_td_ , Sin (2)]
- consistent with each other
- and SM (theory)
- LEP
- Coupling Constants
- CPLEAR
- T consistent with CP
- Tight CPT constraint
- John Fry Lepton Photon 2003
## Motivation for Rare Decays
**SM is a **_**very**_** good approximation to reality**
** ****Hence**** **
**Need to consider processes where is small in order to be sensitive to new physics.**
**Hence processes dominated by penguin loops, or CKM**** ****- suppressed decays**
- John Fry Lepton Photon 2003
## Procedure
- Compare nature (precise, experimental measurements) with SM (theoretical models) for sensitive quantities.
- Agreement gives an alternative route to (, ) and additional constraints on the unitarity triangle.
- Disagreement means:
- New Physics .... **OR**
- Refinements needed to theoretical calculations ... ....**AND **Model-independent calculations needed
- John Fry Lepton Photon 2003
## The (theoretical) Problem
- How to go from here ...
- to branching fractions and CP asymmetry
- John Fry Lepton Photon 2003
## Classes of theoretical calculations
**QCD Factorisation** (mb >> QCD)
- Amps factorise to LO ( / mb), all orders S
- Naïve factorisation recovered in LO
**Phenomenology**
- Amplitudes of dominant processes related to
- measured BF and each other via SU(3)
**Model “Independent”**
- Isospin & minimal dynamical assumptions
- bounds on deviations from SM
- Beneke, Buchalla, Neubert & Sachrajda
- Nucl Phys B606 (2001) 245
- Beneka & Neubert Hep-ph / 0308039
- Chiang, Rosner Phys Rev D65 074035
- Chiang et al Hep-ph / 0307395
- Lipkin Phys Lett B254 (1991) 247
- Grossman, Ligeti, Nir, Quinn
- Hep-ph / 0303171
- John Fry Lepton Photon 2003
## Visualising QCD Factorisation
****
- John Fry Lepton Photon 2003
## Pictorial Phenomenology
****
**Leading Order – Naive Factorisation**
- John Fry Lepton Photon 2003
## Direct CP Violation
- CP asymmetry occurs if the decay B f ( and its charge conjugate)
- is mediated by two amplitudes with different strong and weak phases:
- John Fry Lepton Photon 2003
## Overview of B Production and Decay
**Inclusive Reconstruction**** **
**B-Flavor Tagging**
**Exclusive B Meson Reconstruction**
**CP eigenstates**
**Flavor eigenstates**
- John Fry Lepton Photon 2003
## Signal Selection
- John Fry Lepton Photon 2003
## Discrimination of B and Continuum
- John Fry Lepton Photon 2003
## Search for B0 → p pbar @ BaBar
- p
- K e
- Use the DIRC to reject K, , e,
- Smallest upper-limit BF in B0/Bdecays!
- Signal Eff = 91%
- Background Eff = 3%
- Total signal efficiency = 37%
- John Fry Lepton Photon 2003
## Slide 15
- John Fry Lepton Photon 2003
## Slide 16
- John Fry Lepton Photon 2003
## Summary of BF (10-6) for K, and KK
- Summary of BF (10-6) for K, and KK
| Mode | BaBar | Belle | CLEO | Average |
| --- | --- | --- | --- | --- |
| K+ - | 17.9 0.9 0.7 | 18.5 1.0 0.7 | 18.0 2.3 1.2 | 18.1 0.8 |
| K0 + | 17.5 1.8 1.3 | 22.0 1.9 1.1 | 18.8 3.7 2.1 | 19.6 1.5 |
| K+ 0 | 12.8 1.2 1.0 | 12.8 1.4 1.2 | 12.9 2.4 1.2 | 12.8 1.1 |
| K0 0 | 10.4 1.5 0.8 | 12.6 2.4 1.4 | 12.8 4.0 1.7 | 11.2 1.4 |
| + - | 4.7 0.6 0.2 | 4.4 0.6 0.3 | 4.5 1.4 0.5 | 4.6 0.4 |
| + 0 | 5.5 1.0 0.6 | 5.3 1.3 0.5 | 4.6 1.8 0.7 | 5.3 0.8 |
| 0 0 | 2.1 0.6 0.3 | 1.7 0.6 0.3 | < 4.4 | 1.90 0.47 |
| K+ K- | < 0.6 | < 0.7 | < 0.8 | < 0.6 |
| K+ K0 | < 1.3 | < 3.4 | < 3.3 | < 1.3 |
| K0 K0 | < 1.6 | < 3.2 | < 3.3 | < 3.2 |
- John Fry Lepton Photon 2003
**HFAG**
- J Smith (Colorado)
- J Alexander (Cornell)
- John Fry Lepton Photon 2003
## Belle
**Belle**
**Belle**
**+9.3**
** ****-8.4**
- John Fry Lepton Photon 2003
## BaBar 0 0
**BaBar ********0**** ********0**
**Sub to PRL**
- John Fry Lepton Photon 2003
## QCD_F: Ratios of & K BF’s
- BBNS NPB606 (2001) 245
- Inconsistent ?
- Data (2001)
- Data (2003)
- QCD_F: Ratios of & K BF’s
**0.42 ****± 0.11**
- John Fry Lepton Photon 2003
## Comparison of BF and ACP with Theory‡
| Mode | BFExp
(10-6) | BF pQCD
(10-6) | ACP Expt
(%) | ACP pQCD
(%) | ACP QCDF
(%) |
| --- | --- | --- | --- | --- | --- |
| K+- | 18.2 ± 0.8 | 13 – 19 | -9 ± 3† | -13 – -22 | +5 ± 10 |
| K0+ | 19.6 ± 1.5 | 14 – 26 | -1 ± 6 | -0.6 – -1.5 | 0 ± 1 |
| K+0 | 12.8 ± 1.1 | 8 – 14 | 0 ± 7 | -10 – -17 | +7 ± 10 |
| K00 | 11.2 ± 1.4 | 8 – 14 | 3 ± 37 | | -3 ± 4 |
| +- | 4.55 ± 0.44 | 6 – 11 | | 16 – 30 | -6 ± 13 |
| +0 | 5.3 ± 0.8 | 2.7 – 4.8 | -7 ± 14 | 0 | -2 ± 5 |
| 00 | 1.90 ± 0.47 | 0.33 – 0.65 | | | 45 ± 60 |
- John Fry Lepton Photon 2003
## Belle
**Belle**
- John Fry Lepton Photon 2003
## CDF
**Disentangling the B********h+h- contributions (I)**
_**B **_****** **_**h**__**+**__**h**__**-**__** from hadronic trigger**_
**Includes B****d**** ************B****s********KK,**** ****B****s********K**** ********,**** ****and B****d******** ****K******
**Monte-Carlo plot below shows:**
**B****d**** ******** ************************Bs ******** ****K****+****K****-**** B****s**** ******** ****K****±**** ********±****,**** **
**& B****d**** ******** ****K****±**** ********±**** (From Monte-Carlo)**
**all pile up in the same region**
**Must **_**disentangle **_**contributions from each mode **
**To do this we use:**
**-****Kinematical**** ****variable separation**** ****M******** vs ********=(1-p****1****/p****2****)********q****1 **
**-dE/dx based K and ******** identification**** **
**CDF**
- John Fry Lepton Photon 2003
## CDF
**M******** vs a for each B********h****+****h****-**** mode**
**dE/dx calibration using D*****± ******** ****D****0************, **
**D****0 ********K****±********±**** ****(******** from D* unambiguously distinguishes K, ******** from D****0****)**** **
_**Sanity check: Measure Ratio of Branching Ratios**_
_**CDF :**_** ********(B****d ******** ****************-****)/********(B****d******** ****K****+********-****) = 0.26 ±0.11±0.055, ****PDG:**** **
_**Yield for each mode:**_
**B****d ******** **********************
**B****d ******** ****K****±**** ********±**********
**B****s ******** ****K****± ********±**********
**B****s ******** ****K****+****K****- ********(stat) ********(stat)******
******First observation !**
_**Method works !**_** Confirmed by Sanity **
**check against ratio of branching ratios**
_**Have first observation of B**__**s **_****** **_**K+K-**_
_**Its a CP Eigenstate: Can use this**_
_**To measure **__****__**s**__** as well !!**_
**CDF**
- John Fry Lepton Photon 2003
## Disentangling the Bh+h- contributions (Blessed CDF results)
** ****ACP(B****d********K******** = ****0.02 ± 0.15(stat) ± 0.017(syst)**
** ****BR(B****d************/BR(B****d********K********= **
** ****0.26 ± 0.11(stat) ± 0.055(syst)**
** ****fs X BR(B****s********KK)/fd X BR(B****d********K********) = **
** ****0.74 ****±**** 0.20(stat) ****±**** 0.22(syst)**
**Yield of ****B****s********KK = 90 ****±****17(stat) ****±****17(syst) events**
- John Fry Lepton Photon 2003
## Is Rescattering Important?
- Could modify branching fractions and CP asymmetries in and K decays, complicating extraction of and
- KK decays are more sensitive to rescattering
- Could have significant enhancement through (for example) DD or intermediate states
| | BaBar | P_QCD* |
| --- | --- | --- |
| K+K- | <0.6 | 0.05 |
| K+K0 | <2.2 | 1.7 |
| K0K0 | <1.6 | 1.8 |
- BF(10-6)
- *Chen and Li, Phys. Rev D63, 014003 (2000)
- John Fry Lepton Photon 2003
## BF & ACP for B , K, , K
| Mode | BF (10-6) (BaBar) | BF (10-6) (Belle) | ACP % (BaBar) | ACP % (Belle) |
| --- | --- | --- | --- | --- |
| B0 → ρ+ π- | 22.6 2.8 | 29.1 6.4 | -11 7 | -38 21 |
| B0 → ρ+ K- | 7.3 1.8 | 15.1 4.1 | 19 18 | 22 23 |
| B0 → ρ0 π0 | < 2.5 | 6.0 3.1 | | |
| B+ → ρ+ π0 | 11.0 2.7 | | 23 17 | |
| B+ → ρ0 π+ | 9.3 1.3 | 8.0 2.3 | -17 11 | |
| B+ → ρ0 K+ | < 6.2 | < 12 | | |
| B0 → ω K0 | 5.3 1.4 | < 7.6 | | |
| B+ → ω K+ | 5.0 1.1 | 6.7 1.4 | -5 16 | 6 20 |
| B0 → ω π0 | < 3 | | | |
| B+ → ω π+ | 5.4 1.1 | 5.9 1.5 | 4 17 | 48 23 |
- John Fry Lepton Photon 2003
## Belle B , K
**Belle B ******** ********, K**
**K****+**
******+**
**K****S**
- John Fry Lepton Photon 2003
## BaBar: B K Dalitz Plot
- BaBar:* *B K Dalitz Plot
| B+ K*0(892)+, K*0K+ - | 10.3±1.2+1.0 |
| --- | --- |
| B+ f0(980)K+, f0 + | 9.2±1.2+2.1 |
| B+ c0 K+, c0 + | 1.46±0.35±0.12 |
| B+ D0+, D0 K+ - | 184.6±3.2±9.7 |
| B+higher K*0+, K*0K+- | 25.1±2.0+11.0 |
| B+ 0(770)K+, 0 + | < 6.2 |
| B+ K+ - + (non resonant) | < 17 |
| B+ higher fK+, f + | <12 |
**-5.7**
**-2.6**
**-2.7**
**K*****0****(892)**
**K*****0****(higher)**
**D****0**
**ρ****0**
- **f****0****(980)**
******c0**
**56.4 fb****-1**
**Branching Fractions 10**** -6**
- John Fry Lepton Photon 2003
## Belle: Dalitz Plot Amplitude Analysis
- 140 fb-1 B+ K+K+K- (Signal 1400) and K++ - (Signal 2584)
- Resonances:
- K++ - K*(890), K*(1430), (770), c0(3400), f0(980), X(1350)
- K+K+K- (1020), C0(3400), X(1500)
- Background parameterisation – fitted with large (7*) sideband sample
- Signal parameterisation – fix masses, widths except X, f0
- Fit to signal + background and determine amplitudes and phases
- John Fry Lepton Photon 2003
## Slide 32
- John Fry Lepton Photon 2003
## Belle DP Mass and Helicity Projections K
- Belle DP Mass and Helicity Projections K
- John Fry Lepton Photon 2003
## Belle Branching Fractions from Dalitz Plot
**Belle ** Branching Fractions from Dalitz Plot
- John Fry Lepton Photon 2003
**HFAG**
**J Smith (Colorado)**
**J Alexander (Cornell)**
- John Fry Lepton Photon 2003
## Longitudinal Polarisation B → V V
- fL = L /
- 100% Pol CP even
- Expect: fL ~ 1 – O(M2V/M2B)
- John Fry Lepton Photon 2003
## Belle
**Belle**
**B ******** ********+**** ********0**
- John Fry Lepton Photon 2003
## B → ρ ρ and ρ K* [BaBar & Belle]
| (Errors approximated) | BF (10-6) | ACP % | Long. Poln % |
| --- | --- | --- | --- |
| B0→ ρ0 ρ0 | < 2.1 (90 % CL) | | |
| B0→ ρ+ ρ- | 27 ± 7 ± 6 | | 99 ± 7 ± 3 |
| B+→ ρ+ ρ0
Belle | 22.5 ± 5.7 ± 5.8
31.7 ± 7.1 ± 6.7 | -19 ± 23 ± 3
0 ± 22 ± 3 | 97 ± 7 ± 4
95 ± 11 ± 2 |
| B+→ ρ0 K*+ | 10.6 ± 3.0 ± 2.4 | 20 ± 32 ± 4 | 96 ± 15 ± 4 |
- CP asymmetries consistent with zero
- Polarisation in agreement with expectation
- John Fry Lepton Photon 2003
## Why we need Theorists
**K****0********+**
******+********0**
| Mode | CKM | (fdecay)2 | Ratio | Exp Ratio | BF (10-6) |
| --- | --- | --- | --- | --- | --- |
| K0+ | 1 | 1 | 1 | 1 | 19.6 |
| K*0+ | 1 | 1.85 | 1.85 | 0.65 | 12.7 |
| +0 | 2 | 0.66 | 0.03 | 0.27 | 5.3 |
| +0 | 2 | 1.71 | 0.085 | 0.46 | 9.1 |
| +0 | 2 | 2.9 | 0.145 | 1.35 | 26.4 |
**The VPSTE effect** (Form factor corrections at 40% level)
- John Fry Lepton Photon 2003
## The unique decays B 0 0 and 0 0
**BF give model-independent**
**limits to the CP angle ******
- John Fry Lepton Photon 2003
## B K(*) BaBar & Belle
**q**
**q**
***s***
***s***
- u
- u
**B****+,0**
****
**K****(*)**
| Mode | BF (10-6) | ACP (%) | Polarisation % |
| --- | --- | --- | --- |
| K0 | 7.6 ± 1.4 9.0 ± 2.2 | | |
| K+ | 10.0 ± 1.0 9.4 ± 1.3 | 4 ± 9 1 ± 13 | |
| K*0 | 11.2 ± 1.5 10.0 ± 1.8 | 4 ± 12 7 ± 16 | 65 ± 7 43 ± 10 |
| K*+ | 12.7 ± 2.4 6.7 ± 2.2 | 16 ± 17 -13 ± 31 | 46 ± 12 |
- Expect similar BF all modes
- BF(+) < 4 10-7 [90% CL]
- No indication for rescattering – as KK
- Polarisation unexpectedly small
- John Fry Lepton Photon 2003
## Belle
**Belle**
- John Fry Lepton Photon 2003
## BR(B±K±) at CDF
- BR(B±K±) /BR(B±J/K±) = 0.0068 ±0.0021 (*stat*.) ± 0.0007 (*syst.*)
- Using PDG 2002 for BR(B±J/K±):
- BR(B±K±) = (6.9 ± 2.1 (*stat*.) ± 0.8 (*syst.*)) x 10-6
- John Fry Lepton Photon 2003
## B (')K(*) and ('), BaBar and Belle
| Mode | BF (10-6)
Belle BaBar | |
| --- | --- | --- |
| K+ | 5.3 ± 1.9 | 2.8 ± 0.8 |
| K0 | | < 4.6 |
| ' K+ | 78 ± 11 | 76.9 ± 5.6 |
| ' K0 | 68 ± 13 | 55.4 ± 6.6 |
| + | 5.4 ± 2.1 | 4.2 ± 1.0 |
| ' + | < 7 | 2.8 ± 1.3
3.4 |
| 0 | < 5.5 | |
| Mode | BF (10-6)
Belle BaBar | |
| --- | --- | --- |
| K*+ | 26.5 ± 8.4 | 25.7 ± 4.2 |
| K*0 | 16.5 ± 4.8 | 19.0 ± 2.6 |
| ' K*+ | < 90 | < 12 |
| ' K*0 | < 20 | < 6.4 |
| + | < 6.2 | 10.5 ± 3.4
4.8 |
| ' + | | 14.0 ± 5.4
3.8 |
| ' 0 | < 14 | |
- John Fry Lepton Photon 2003
## Theoretical background: (') K, K * modes
- Similarly for *K *0, *K **0 except no external tree
- Flavour singlet diagram:
- Also important for *K**
- CKM suppressed
- H Lipkin Phys Lett B254 (1991) 247
- John Fry Lepton Photon 2003
## Slide 46
- John Fry Lepton Photon 2003
## B (')K(*) and , BaBar and Belle
| Mode | ACP (%)
Belle BaBar | |
| --- | --- | --- |
| K+ | | -32 ± 22 |
| K0 | | |
| ' K+ | -2 ± 7 | 4 ± 5 |
| ' K0 | | |
| + | | -51 ± 20 |
| Mode | ACP (%)
Belle BaBar | |
| --- | --- | --- |
| K*+ | | 15 ± 14 |
| K*0 | | 3 ± 11 |
| ' K*+ | | |
| ' K*0 | | |
| + | | 6 ± 29 |
- John Fry Lepton Photon 2003
**HFAG**
**J Smith (Colorado)**
**J Alexander (Cornell)**
- John Fry Lepton Photon 2003
**HFAG**
**J Smith (Colorado)**
**J Alexander (Cornell)**
- John Fry Lepton Photon 2003
## How does theory stack up?
- Good phenomenological understanding of Branching Fractions for 2-body PP and PV decays
- [Chiang et al hep-ph/0307395; Beneke et al hep-ph/0308039; Keum et al hep-ph/0306004]
- Factorisation models give insight into dynamics, but:
- BF for 0 0 looks to be in disagreement with all predictions
- BF for K, ' K, K* final states underestimated in QCDF
- [Annihilation contribution may be too large Aleksan et al, hep-ph/0301165]
- Asymmetry data is not yet precise enough to test models
- There is still a considerable role for model-independent theoretical calculations
- John Fry Lepton Photon 2003
## When is it safe to claim New Physics?
- For B0 KS, 'KS, K+K-KS we expect to measure:
- S = sin(2) + , C = , where = O (2)
- If S and C are measured precisely (S, C << 2 = 0.05)
- Claim new physics if: |C| > 5, or |S- sin(2)| > 5
****** ****might be enhanced:** Grossman bounds using isospin
- relations and ratios of BFs.
- (K+K-KS) 0.2, ('KS) 0.5
- GLNQ Hep-ph / 0303171
- Must measure 20 BFs precisely
- to improver the limit on !
- u-amplitude might be large
- John Fry Lepton Photon 2003
## Summary – What have we learned?
- Precision measurements of branching fractions are testing factorisation models – to destruction??
- Precise measts of ACP will enable further tests of models. Is there a hint of a signal in K+- ?
- B K, K*,'K, 'K* are now almost understood, but polarisation << 100% in K* is a puzzle
- Measuring the BF for 0 0 is a triumph, but the value is surprisingly high. Increased focus on 00 for | - eff|
- Measurement of many more decay modes is needed to make model-independent tests of NP meaningful
- The expected increase in luminosity of the B Factories promises a continuing, rich harvest of physics
- John Fry Lepton Photon 2003
|
en
|
all-txt-docs
|
202653
|
FXUS61 KBUF 110235
AFDBUF
AREA FORECAST DISCUSSION
NATIONAL WEATHER SERVICE BUFFALO NY
930 PM EST MON NOV 10 2003
THE AVN STILL SEEMS TO HAVE A BETTER HANDLE ON THE EASTWARD
PROGRESSION OF THE RAIN THAT IS NOW MOVING INTO WESTERN MICHIGAN.
THE ATMOSPHERE OVER OUR FA IS STILL VERY DRY BELOW 500 MB...SO MOST
OF OUR FA WILL REMAIN DRY OVERNIGHT. I WILL LEAVE IN THE CHANCE POPS
ACROSS WESTERN NEW YORK AND INTRODUCE A CHANCE FOR A SHOWER TOWARD
MORNING ACROSS MONROE AND LIVINGSTON COUNTIES...ASSUMING THE FASTER
TREND DEPICTED BY THE GFS CONTINUES TO VERIFY.
AREA TEMPERATURES APPEAR TO HAVE ALREADY BOTTOMED OUT ACROSS WESTERN
NEW YORK AND THE GENESEE VALLEY AS THE MID AND HIGH LEVEL CLOUDS
CONTINUE TO ADVECT TO THE EAST. THE PREVIOUS FORECAST TREND OF EARLY
MINS FOLLOWED BY RISING TEMPERATURES STILL LOOKS GOOD.
THE REST OF THE PREVIOUS AFD FOLLOWS.
TUE...MODELS NOT VASTLY DIFFERENT. CLOUDS AND PRECIP WITH WARM FRONT
AND SHORT WAVE WILL BE OVER THE REGION MUCH OF THE DAY. THE BULK OF
THE PRECIP WILL BE IN THE MORNING WEST AND DURING THE AFTERNOON EAST
OF LAKE ONTARIO. QPF TAPERS OFF DURING THE EVENING. OUR REGION WILL
BE UNDER A REGION OF LITTLE DYNAMICS BUT A FAIRLY SHARP NORTH TO
SOUTH MOISTURE GRADIENT. REDUCED POPS ACROSS MOST AREAS TUESDAY
NIGHT...BUT KEPT A FEW SHOWERS OVER THE SOUTHERN TIER. DECIDED TO BE
MORE OPTIMISTIC ON WEDNESDAY WITH MUCH OF THE FIRST PART OF THE DAY
HAVING NO PRECIP AND MAYBE EVEN SOME LIMITED SUN. POPS INCREASED
DURING THE AFTERNOON WITH THE APPROACH OF NEXT SYSTEM.
WED LATE-EARLY THURSDAY. STRONG COLD FRONT WILL CROSS REGION. LIKELY
POPS WERE USED FOR THE ENTIRE CWA. MODEL FCST CAPES IN THE WESTERN
AND CENTRAL REGION IN THE 400-600 J/KG RANGE. THUNDER IS A
POSSIBILITY...BUT WONT PUT IN FCST FOR NOW. H8 TEMPS WILL DIVE FROM
THE 5-7 C RANGE ON 00Z THU TO THE -4 TO -7 RANGE BY 12Z THU. WINDS
WILL INCREASE AS THE CAA STRENGTHS ACROSS REGION...MODELS SHOW
SPEEDS INCREASING INTO THE 25-40 KNOT RANGE. THESE STRONG WINDS WILL
REMAIN THROUGH MUCH OF THURSDAY. WIND ADVISORIES MAY HAVE TO BE
REQUIRED IN FUTURE FCSTS.
XTENDED FORECAST...(THU-MON). AS PREVIOUS DISCUSSION NOTED...COLD
AIR AND LAKE EFFECT WILL BE ACROSS REGION ON THURSDAY THROUGH FRIDAY
NIGHT. UPPER LOW REMAIN JUST NORTH OF REGION WITH ABUNDANT RH
CIRCULATING ACROSS REGION. BASICALLY USED CHC POPS MOVE ENTIRE FA
WITH AREAS OF LIKELY IN FAVORED LAKE EFFECT AREAS. REGIONS TO THE
EAST OF THE LAKES ARE FAVORED THURSDAY...BUT AS THE PRESSURE
GRADIENT BECOMES MORE NORTHWESTERLY THURSDAY NIGHT THE LAKE EFFECT
IS EXPECTED TO SHIFT MORE TO THE SOUTHEAST OF THE LAKES. IT SHOULD
REMAIN IN THE AREAS SOUTHEAST OF THE LAKES UNTIL CONDITIONS BECOME
MORE UNFAVORABLE LATER FRIDAY NIGHT. STRONG WINDS THURSDAY AND
THURSDAY NIGHT MAY INHIBIT ORGANIZATION OF THE BANDS SOMEWHAT.
HIGH PRESSURE SHOULD BEGIN TO INFLUENCE THE WEATHER MORE SATURDAY
THROUGH MONDAY. NO SIGNIFICANT WEATHER IN THIS PERIOD EXCEPT A FEW
SHOWERS LATER MONDAY IN THE SW CORNER OF THE STATE...TO BLEND THE
KCLE'S GRIDS.
.BUF...NONE.
$$
TJP/PO
|
en
|
markdown
|
087966
|
# Presentation: 087966
## IT Backup Planning
- Lessons from a real-world disaster
- Michael Watson M.D., M.L.S.
- Associate Director
- LSU Health Sciences Center / Shreveport, LA
- [email protected]
## Lesson 1
- A disaster doesn’t have to be _local_ to have an impact on your library.
- Remotely hosted ILS systems can be taken offline by remote events
- Intranet-based systems are not necessarily local
- It’s not just the _library_ systems you need to worry about!
- Recommendation:
- Wherever possible, know where your critical systems are hosted. Even if you can’t influence backup policies & procedures, you’ll know where you need to devise workarounds.
## Lesson 2
- Disasters come in all sizes. Plan accordingly.
- Many disaster plans implicitly consider “mid range” disasters that affect only the library, the hospital, or the campus.
- A community-wide disaster can prevent prompt access to your collections, servers, and backup tapes.
- Small disasters are still disasters. Are there critical documents on your PC’s hard drive? When was the last time you backed them up?
- Recommendation:
- For each disaster scenario in your plan, consider the “small, medium and large” cases.
## Lesson 3
- Some mission-critical systems are outside your control.
- How does your institution handle accounts payable? Accounts receivable? Payroll? What is the potential impact of loss of these systems?
- What does your *institutional* disaster plan say about key administrative systems? Has the library’s plan considered this broader context?
- Recommendation:
- Keep your own backups of key information from institutional systems, if only in a spreadsheet.
## Lesson 4
- In large disasters, library systems won’t be the highest priorities. Backup planning should include operational procedures, not just data.
- Post-Katrina, initial IT priorities included rebuilding LSUHSC-NO IP space, located evacuated personnel, restoring key administrative systems (PeopleSoft)
- Restoration of library systems took from 2 weeks to 2 months.
- Recommendation:
- In planning, don’t think only about data; think also about operational procedures.
- List critical resources & services. For each, consider how you would continue to operate if it were to go offline for 30 days.
## Lesson 5
- Disasters are informational “black holes.”
- Lack of timely, authoritative news considerably complicates your response to events.
- Even with 12+ New Orleans Computer Services personnel working out of our computer lab, there was no definitive news on whether servers were damaged or when they might be up again.
- It may be difficult to decide when to stop waiting for your institution’s servers to come back online & request access to vendor-hosted services.
- Recommendations:
- Difficult to make, except to note that in an information vacuum, flexibility is key.
## Lesson 6
- Don’t allow the mere existence of “backup tapes” to lull you into a false sense of security.
- Losing your ILS is likely to have far-ranging affects. How will Circ, ILL, Serials, Cataloging, and Acquisitions operate if the ILS is unavailable for an extended period?
- IT support is often decentralized. The person who actually has to retrieve the backup media will not necessarily be aware of backup schedules, procedures or locations.
- IP issues may complicate remote access even if patron data files are fully backed up.
- Recommendations:
- At minimum, document your data backup procedures, schedules, and storage location of backup media in the disaster plan.
- Consider whether off-site backup is an option.
- Include remote access in your disaster planning.
## Lesson 7
- In the wake of a disaster, your colleagues and your vendors are willing to work with you.
- More than 30 vendors offered discounts, free extensions to subscriptions, temporary remote access accounts, and other assistance. Some vendors even contacted us without waiting for us to call.
- Recommendation:
- Don’t be shy about asking your colleagues and your vendors to ask for help. Chances are, many of them will be more than willing to assist in any number of ways.
- Your colleagues are invaluable resources. One of the few pleasant aspects of a decidedly unpleasant situation was the way that other libraries leaped in to assist. Consortia, Associations and individual libraries in the area provided computer hardware, temporary office space, and waived ILL fees. Expressions of moral support arrived from every quarter.
|
en
|
all-txt-docs
|
237870
|
.
ALL AMERICAN ASPHALT
May 5, 1997
WEST 93-336-DM
FEDERAL MINE SAFETY AND HEALTH REVIEW COMMISSION
1244 SPEER BOULEVARD #280
DENVER, CO 80204-3582
(303) 844-3993/FAX (303) 844-5268
May 5, 1997
SECRETARY OF LABOR : DISCRIMINATION PROCEEDINGS
MINE SAFETY AND HEALTH :
ADMINISTRATION (MSHA), :
on behalf of :
JAMES HYLES, : Docket Nos. WEST 93-336-DM
: WEST 93-436-DM
DOUGLAS MEARS, : WEST 93-337-DM
: WEST 93-437-DM
DERRICK SOTO, : WEST 93-338-DM
: WEST 93-438-DM
GREGORY DENNIS, : WEST 93-339-DM
Complainants : WEST 93-439-DM
: WEST 94-21-DM
v. :
: All American Aggregates
ALL AMERICAN ASPHALT, : Mine ID 04-03646
Respondent :
DECISION
Before: Judge Cetti
These consolidated cases are before me upon remand by the
Commission for further consideration, more specific credibility
findings, and analysis consistent with its December 1996
decision, 18 FMSHRC 2096, 2103 (December 1996).
FACTUAL AND PROCEDURAL BACKGROUND
The basic factual framework and procedural background of
these cases is set forth in my decision, 16 FMSHRC 2232 (November
1994) and is also more concisely and ably set forth in the
Commission's remand decision 18 FMSHRC 2096 as follows:
AAA is a general contractor in Corona,
California that operates an asphalt plant, a
quarry, and a plant that produces rock-based
aggregates for its own use and sale to other
con- tractors. Tr. 1136-39. In April 1991,
AAA was in the process of completing an
addition to its rock finishing plant. 16
FMSHRC at 2235. On Thursday, April 18, James
Hyles, a leadman on AAA's third or
"graveyard" shift, learned that AAA equipment
was not in place. Hyles voiced his concern
about safety conditions in the plant to Mike
Ryan, plant supervisor and a vice president
of AAA. Hyles also spoke to Patrick McGuire,
business representative of Local 12 of the
International Union of Operating Engineers
("Operating Engineers"), which represented
AAA's employees. Id. Thereafter, McGuire
visited the plant and saw the plant running
without numerous pieces of equipment in place.
Id.; Tr. 177-78.
During the weekend of startup operations,
Ryan assigned Hyles to work as leadman on a
combined second and third shift. 16 FMSHRC at
2236. When Hyles reported to work on Friday,
April 19, at 7:00 p.m., he saw equipment
lacking guards, ladders, catwalks, decks,
handrails and trip cords. Id. at 2235-36.
Working under Hyles' supervision in the
finish plant area were Greg Dennis, Doug
Mears, and Derrick Soto. Hyles warned them
to be careful, and they complained to Hyles
about conditions in the plant. Later, during
the weekend, Hyles videotaped the plant in
operation and spoke to Dennis, Mears, and
Soto about what he was doing. Id. at 2236.
Other employees on the videotape observed
Hyles' videotaping, including leadman Gary
Richter. Tr. 365-70. On Sunday night, Hyles
was involved in a minor accident when he fell
through a gap in decking. Tr. 367-70; Gov't
Ex. 23. Hyles spoke to Dennis, Mears, and
Soto about taking the videotape to the field
office of the Mine Safety and Health
Administration (MSHA). They all agreed that
the plant's condition posed dangers to
employees and that the tape should be turned
in. 16 FMSHRC at 2236; Tr. 370.
On Monday morning, Hyles went to the MSHA
field office and turned in the videotape.
16 FMSHRC at 2236; Gov't Ex. 54. After
viewing the videotape, MSHA inspectors went
to the AAA plant and saw it in operation.
MSHA issued numerous citations, including 29
unwarrantable failure violations. 16 FMSHRC
at 2236. Later that day, Ryan called Hyles
at home and told him not to report to work
that evening because someone had turned them
in and MSHA had shut the plant down. Id.
About a week later on the first day that
the plant reopened, Hyles had lunch with Ryan
and Gary White, leadman on the maintenance
shift. Ryan asked if either man knew who
turned him in. Ryan added that he wanted to
find out who it was so he could make life so
miserable for them that they would be happy
to go to work someplace else. Id.; Tr. 375-
76. Also after the plant reopened, AAA
President William Sisemore stated that he
wanted to find out who turned in the company
and make it worth their while to go
elsewhere. 16 FMSHRC at 2237, Tr. 391-504.
In June 1991, during a subsequent MSHA
investigation, Hyles, Dennis, Mears, and
Soto, in addition to other employees, were
interviewed in an investigation into Ryan's
conduct under 30 U.S.C. 820(c). Id. at
2237, Gov't Exs. 2, 3, 4, and 5.
In October 1991, Ryan, without
explanation, demoted Hyles from his position
as leadman. When asked why he was demoting
Hyles, Ryan responded that they no longer saw
eye-to-eye. 16 FMSHRC at 2237. [1] On July
7, 1992, due to an equipment move, AAA laid
off 16 of its 27 employees, includ-ing Hyles,
Dennis, Mears, and Soto. Over the succeeding
weeks, all employees but the four
complainants were called back to work, and
some employees were working overtime. When
Hyles and Soto went to the plant and saw less
senior employees working, the four filed
grievances under the collective bargaining
agreement between AAA and the Operating Engi-
neers. The grievants contended that the
contract required AAA to conduct a "bumping"
meeting prior to layoffs where employ- ees
could bid on jobs held by less senior
employees and bump those employees out of
jobs for which the more senior employee was
qualified to perform. Id. at 2238-39. The
grievances went to arbitration, and the
arbitrator found that AAA had violated the
contract by laying off employees without
conducting a bumping meeting; however, he
concluded that only Hyles was entitled to
relief to bump less senior employees, based
on his qualifications. 16 FMSHRC at 2238-39,
Gov't Ex. 51, at 11-14.
In September 1992, Hyles, Dennis, Mears,
and Soto filed discrimination complaints with
MSHA. Following the insti- tution of
temporary reinstatement proceedings, AAA
reinstated the four complainants on February
11, 1993. 16 FMSHRC at 2239-40. Upon their
reinstatement, they were assigned to
production work on the day shift. Id. at
2240.
In early March 1993, AAA reestablished a
third shift as a result of decreased
production due to wetness of material that
was being processed through the plant. AAA
temporarily assigned four of its most senior
plant repairmen to perform production work,
while paying them at their higher rate of pay
as repairmen. It was unusual for senior
employees to work the night shift, because
the day shift was seen as more desirable and
the most senior employees generally bid on
it. Id. Three weeks later, on March 23, AAA
discontinued the third shift and announced a
layoff. Rather than reassigning the four
repairmen to their regular positions, AAA
required the repairmen to participate in a
bumping meeting. Rather than bumping into
repairmen positions, they bumped into the
production jobs held by Hyles, Dennis, Mears,
and Soto. As a result the complain-ants were
the only four employees laid off. AAA
discontinued the third shift and announced a
layoff. Rather than reassigning the four
repairmen to their regular positions, AAA
required the repairmen to participate in a
bumping meeting. Rather than bumping into
repairmen positions, they bumped into the
pro-duction jobs held by Hyles, Dennis,
Mears, and Soto. As a result, the
complainants were the only four employees
laid off. AAA subsequently hired new
employees to fill the vacant repair- men
positions. Id. at 2240-41; Tr. 457, 481,
1693.
On March 24, the four complainants were
called into the layoff meeting and told that
they had been bumped by more senior employees
and that they were to bid on jobs held by
less senior employees. They were reluctant
to exercise their bump-ing rights at the
meeting for fear that Ryan would refuse to
allow them to bump into other jobs because
they were not quali- fied. Hyles and Soto
requested that they be given time to
consult with counsel from the Solicitor's
office because of the pendency of their
discrimination complaints. 16 FMSHRC at
2241. Shortly after the meeting, Operating
Engineers Business Agent McGuire called Ryan
to let him know that Hyles had decided to
bump into the plant operator position. Ryan
refused the request, stating that it was
untimely. AAA refused to accept any of the
complainants' subsequent written requests to
bump for the same reason. Id.
Following the second layoff, Hy1es,
Dennis, Mears, and Soto filed a second
discrimination complaint, alleging that the
March 1993 layoff was in retaliation for
their MSHA related safety activity. AAA
reinstated the complainants on April 26,
1993. After their reinstatement, the
complainants were frequently given reduced
working hours. In April 1993, AAA began hir-
ing ten new employees and increased its
output of finished material. In August 1993,
AAA posted a seniority list indi- cating that
Dennis, Mears and Soto had seniority dates of
January 1993. When Mears asked why the list
did not reflect his original seniority
date, Ryan responded that he had no
seniority. Id. at 2242.
The Secretary issued four complaints for
each of the two layoffs, and an eight day
hearing was held. At the close of the
hearing, the judge issued a bench decision
granting the complainants temporary
reinstatement, and a written decision
followed. 16 FMSHRC 31 (January 1994)(ALJ).
Thereafter, the judge issued his decision on
the merits of the complaints. Initially, the
judge dismissed several procedural defenses
raised by AAA, including that the complaints
were time barred under the Mine Act and that
the discrimination complaints were preempted
by the National Labor Relations Act, 29
U.S.C.
141 et seq. (1994). 16 FMSHRC at 2233-35.
On the merits, the judge found that AAA had
violated section 105(c) of the Mine Act by
laying off the complainants on two occasions
in retaliation for their MSHA related safety
activity. Id. at 2247-49.
APPLICABLE LAW
The principles governing analysis of discrimination cases
under the Mine Act are well settled. In order to establish a
prima facie case of discrimination under Section 105(c) of the
Act, a complaining miner bears the burden of production and proof
in establishing that (1) he engaged in protected activity and (2)
the adverse action complained of was motivated in any part by
that protected activity. Secretary on behalf of Pasula v.
Marshall, 663 F.2d 1211 (3rd Cir. 1981); Secretary on behalf of
Robinette v. United Castle Coal Co., 3 FMSHRC 817-18 (April
1981). The operator may rebut the prima facie case by showing
either that no protected activity occurred or that the adverse
action was in no part motivated by protected activity. If an
operator cannot rebut the prima facie case in this manner, it,
nevertheless, may defend affirmatively by proving that it also
was motivated by the miner's unprotected activity and would have
taken the adverse action in any event for the unprotected
activity alone. Pasula, supra; Robinette, supra. See also
Eastern Assoc. Coal Corp. v. FMSHRC, 813 F.2d 639, 642 (4th
Cir. 1987); Donovan v. Stafford Construction Co., 732 F.2d 954,
958-59 (D.C. Cir. 1984); Boich v. FMSHRC, 719 F.2d 194, 195-96
(6th Cir. 1983) (specifically approving the Commission's Pasula-
Robinette test). Cf. NLRB v. Transportation Management Corp.;
462 U.S. 393, 397-413 (1983) (approving nearly identical test
under National Labor Relations Act).
Direct evidence of actual discriminatory motive is rare.
Short of such evidence, illegal motive may be established if
the facts support a reasonable inference of discriminatory
intent. Secretary on behalf of Chacon v. Phelps Dodge Corp., 3
FMSHRC 2508, 2510-11 (November 1981), rev'd on other grounds sub
nom. Donovan v. Phelps Dodge Corp., 709 F.2d 86 (D.C. Cir. 1983);
Sammons v. Mine Services Co., 6 FMSHRC 1381, 1398-99 (June
1984). As the Eighth Circuit analogously stated with regard to
discrimination cases arising under the National Labor Relations
Act in NLRB v. Melrose Processing Co., 351 F.2d 693, 698 (8th
Cir. 1965):
It would indeed be the unusual case in
which the link between the discharge and
the (protected) activity could be supplied
exclusively by direct evidence. Intent is
subjective and in many cases the
discrimination can be proven only by the use
of circumstantial evidence. Furthermore, in
analyzing the evidence, circumstantial or
direct, the [NLRB] is free to draw any
reasonable inferences.
Circumstantial indicia of discriminatory intent by a mine
operator against a complaining miner or miners includes
hostility towards the miner because of his protected activity and
disparate treatment of the complaining miner by the operator.
Chacon, supra at 2510.
Docket Nos. WEST 93-336-DM, WEST 93-337-DM, WEST 93-338-DM,
WEST 93-339-DM
With respect to these four dockets (first set of dockets)
for reasons set forth below, I find and conclude that each of the
four Complainants in April 1991 engaged in protected activity,
that Ryan, the plant supervisor and vice-president, as well as
the president, Sisemore, blatantly expressed hostility to the
protected activity and a desire to find out who "turned them in"
so as to make it so miserable for them they would be glad to seek
employment elsewhere. Over a period of time, Respondent was
able to determine who the employees were that engaged in the
April 1991 protected activity and took adverse dis-
criminatory action against them in retaliation for their having
engaged in the protected activity. The adverse action taken
included not recalling Complainants back to work for a prolonged
period of time after the July 1992 layoff while less senior
employees were working and at other times between July 1992
and December 16, 1993, all of which are covered by the back-pay
stipulation set forth in the stipulation marked as Exhibit A. [2]
This adverse action resulted in a loss of wages (back-pay) for
each of the Complainants in the dollar amounts set forth in my
decision dated November 2, 1994, 16 FMSHRC 2232, which in turn,
is based on the record and the agreed dollar amounts set forth in
the stipulation signed and filed by all parties. This
stipulation was and is accepted by the undersigned Judge. On
the same basis, after consideration of the relevant statutory
criteria, I find the appropriate penalty to be assessed for the
violations of Section 105(c) found in this first set of four
dockets is $14,000.00.
Docket Nos. WEST 93-436-DM, WEST 93-437-DM, WEST 93-438-DM,
WEST 439-DM
This second set of dockets, listed above, arose out of the
second set of discrimination complaints that the four
complainants filed with MSHA in September 1992. With respect to
these dockets, Docket Nos. WEST 93-436-DM, WEST 93-437-DM, WEST
93-438-DM and WEST 93-439-DM, I find that each of the
Complainants did indeed engage in protected activity which
included taking an active part in the Section 110(c)
investigation of the plant supervisor, Ryan. It is undisputed
that the Respondent was fully aware of the Claimants' protected
activity. I find, however, that Respondent took no adverse
action against the Complainants that was motivated by the
protected activity involved in their participation in the
110(c) investigation or in their filing the second set of
discrimination complaints. I find that all the adverse action
taken against the Complainants, except for the demotion of Hyles
from his leadman position to a journeyman position, was motivated
by Respondent's animosity towards Complainants for their April
1991 protected activity, and not motivated by the protected
activity involved in the 110(c) investigation. There maybe
suspicion but there is no persuasive evidence of a causal
nexus between any adverse action and the Complain- ant's
protected activity involved in the 110(c) investigation of Ryan.
It is on this basis that I find and concluded the Secretary
has not proved there was a violation of Section 105(c) with
respect to this second set of dockets. I, therefore, dismiss
these dockets and vacate the corresponding proposed $14,000.00
penalty assessments for the alleged violations in the second set
of dockets. Likewise, I dismiss Docket No. WEST 94- 21-DM in
view of the failure to prosecute and stipulation number four of
Ex. A which clearly states "there shall be no penalty in the
case bearing Docket No. WEST 94-21-DM."
CREDIBILITY FINDINGS
Having heard and observed the demeanor of the witnesses as
they testified at the hearings, I make the following credibility
findings:
I credit the testimony of William S. Smillie, particularly
his testimony that he heard Respondent's President Sisemore and
its Vice-President and Plant Manager Mr. Ryan having a
conversation that clearly showed they wanted to find out who
filed the hazard complaint with MSHA. He heard them say in a
loud voice, as though intending him to hear, that they would like
to know who filed the hazard complaint so they could make it
worthwhile for them to leave. This was a blatant threat
against miners who engaged in statutorily protected activity and
clearly showed their intent to retaliate against the miners who
engaged in the protected activity.
I credit the testimony of the complainant James Hyles, that
Ryan asked him and leadman Gary White if they had any idea who
"turned him in" and that Ryan told them he wanted to find out who
it was and that he would make it so miserable for them, they
would be happy to go to work someplace else. I credit Hyles'
testimony that while he was in the office of President Sisemore,
he heard Sisemore say he would like to "find out who was causing
him all the problems and that he would make it worth their while
to seek employment elsewhere."
I credit the testimony of the Complainants, Hyles, Mears,
Soto and Dennis, including their testimony as to their training,
experience and their job qualifications. In view of Ryan's
blatant hostility to the Claimants' protective activity and to
his express desire to get rid of those who "turned him in". I
do not credit Ryan's testimony as to the job qualifica-
tions of the applicants during the relevant time period through
the date of the final hearing in this matter December 16, 1993.
I do not credit Ryan's testimony that neither he nor Mr.
Sisemore said anything to the effect that they wanted to find out
who had made the complaints to MSHA so that they (Management)
could make it worth their (Complainants) while to leave. I do
not credit Ryan's testimony that he did not find out who "turned
in" Respondent to MSHA in April 1991 until MSHA sent him the
discrimination complaints filed by the four Complainants.
I credit the testimony of Cathy Ann Matchett, the Special
Investigator with Mine Safety and Health Administration who
pursuant to her MSHA assignment investigated the complaints of
discrimination filed by the Complainants with MSHA. Although
much of her testimony consisted of hearsay, I credit her with
accurately summarizing the information given to her in the
course of her investigation. (See Exhibits G-18, G-19, G-31, G-
32). I credit the testimony of Patrick McGuire and Martin
Collins, the business representatives for the International Union
of Operating Engineers, Local 12. Martin Collins specializes in
rock, sand and gravel agreements for Local 12. (Tr. 1084).
Collins was called as a witness, respectively, by both Respondent
and Complainants.
**FOOTNOTES**
[1]: The Commission in footnote 3. Id. at 2402 ruled the
judge's determination that Hyles demotion did not violate 105(c)
of the Mine Act is final since the Secretary did not preserve the
demotion issue for review through a timely filed petition, nor
did the Commission order sua sponte review of the issue.
[2]: The stipulation signed by all parties is attached to
this Decision as Exhibit A.
OPERATOR'S HOSTILITY TO THE PROTECTED ACTIVITY
AND THREATS OF RETALIATION
There is strong convincing evidence of the operator's
animosity and hostility towards the protected activity and their
intention to retaliate against those employees who engaged in the
protected activity when they determined their identity.
Management's conduct was exacerbated by their making loud vocal
threats as to how they were going to retaliate against said
employee(s) once they determined who they were. Such blatant
expressions of hostility has a chilling effect on all employees.
It is an indirect threat of adverse action in retaliation against
any employee who dares to engage in protected activity. This
blatant intimidating conduct is the antithesis of the very intent
and purpose of Section 105(c) of the Mine Act. Such conduct on
the part of an operator flies in the face of the purpose and the
intent of the Mine Act. The effect and the probable intent of
such expression of hostility is to intimidate employees from
engaging in protected activity. Such expression of animosity
towards the protected activity and the express desire and
attempts to find out who "turned them in" with threats of
retaliation against those employees once their identity is known
followed by adverse action against the Complainants, supports
a reasonable inference that Respondent did, in fact, determine
the identity of the employees who participated in the protected
activity that caused Respondent "so much trouble." Knowledge of
the Respondent is reasonably inferred from the established facts
and circumstances.
THE ARBITRATOR'S DECISION
A miner's rights under a union contract are different and
subservient to the statutory protected rights of a miner under
Section 105(c) of the Mine Act. The crucial issues and
procedures are different.
The record reveals practically nothing about the arbitrator
nor does it demonstrate the adequacy of the record on which
arbitrator's conclusions were based. I have never seen the
record before the arbitrator and the decision does not appear to
name all the witnesses who testified in the arbitration
proceeding. Assuming the same witnesses testified in the arbi-
tration proceeding as in these discrimination cases under Section
105(c) of the Mine Act, it is quite clear I have made different
credibility findings than the arbitrator. Based upon the record
before me I do not give any weight to the arbitrator's decision.
In view of Management's blatant hostility to the protected activity
of the Claimants and Management's obvious desire to get rid of
Claimants, I place very little credence in Ryan's testimony as to
the qualifications of the claimants for available jobs,
particularly as compared to qualifications of less senior
employees who were working or returned to work before the
Complainants after the July 1992 layoff. I based my opinion
that All American Asphalt violated its collective bargaining
agreement in implementing the layoff in July 1992 without
conducting a pre-layoff bumping meeting, not on the decision of
the arbitrator, but on the provisions of the union contract, the
testimony of business agents for Local 12 of the Union of
Operating Engineers, and the admission of Ryan at page 2 of Ex.
G-7.
PROTECTED ACTIVITY
I find that Ryan, Respondent's vice-president and plant
manager, started running the plant in April 1991 with full
knowledge that mandatory basic safety equipment such as trip
cords, handrails, ladders, catwalks, decks and guards, were not
in place. I credit the testimony of James Hyles, the leadman of
the combined crew, that he complained to Ryan, to no avail,
about running the plant without the basic safety equipment in
place. I also credit the testimony of the Complainants that they
complained about the unsafe conditions to their leadman Hyles and
to leadman Gerald Richter. Hyles' protected activity, in
addition to his safety complaint to Ryan, included the making of
a video tape of the plant running in its unsafe condition and
his turning the video tape over to MSHA after his discussion with
the other three Complainants as to the danger involved to
employees and as to whether he should take the video tape to
MSHA.
The protected activity of Mears, Soto and Dennis consisted
of their safety complaints to leadman Hyles and Richter and
their discussion with Hyles as to the danger to employees
involved in running the plant in its unsafe condition and their
support and agreement that the Hyles video tape showing the many
violations of mandatory safety standards should be turned over to
MSHA.
In the vacated decision, I apparently was willing to go
along with Respondent's contention that they had no knowledge of
Hyles' protected activity at the time Respondent demoted Hyles in
October 1991 from his leadman position to a journeyman. I did
this only because there was no direct evidence on this point and,
most importantly, because it made no difference as to the
legality of the demotion in view of my finding and conclusion
that Respondent properly demoted Hyles for his admitted on the
job misconduct alone, irrespective of Hyles' protected
activity. While the Secretary presented some evidence that the
plant had a lax policy for inadvertent falling asleep on the job,
there was no evidence that Hyles' degree of misconduct was
tolerated in other employees. Hyles' unprotected conduct was
clearly unsuitable for an employee in a leadman position and
Respondent demoted him for his unprotected conduct alone. I
find no disparate treatment in demoting Hyles from a leadman
position to a journeyman position.
Although there is no direct evidence as to the exact time
Respondent determined the identity of those who "turned them in",
based on the reasonable inference to be drawn from the
established facts, I find that it was sometime before the July
1992 layoff and recall. First, it is established that Hyles
was observed making the video of the plant by many of the
employees who worked with Hyles on the weekend just before the
Monday MSHA shutdown of the plant. Those who observed Hyles
making the video tape of the plant's many hazardous safety
violations included leadman Richter. In this connection it is
worthy of note, for example that Smillie, a very credible
witness, testified he assumed Hyles was the one who turned the
company in because Hyles was the one who video taped the plant in
its unsafe condition. The other three Complainants worked
under Hyles and along with Hyles were exposed to the hazardous
work conditions on the weekend before the Monday morning MSHA
shutdown of the plant. When the four Complainants were not
called back to work following the July 1992 layoff while less
senior employees were working, it is reasonable, in view of the
established facts, to infer that Respondents had determined that
Complainants were the ones that engaged in the protected activity
that caused them so much trouble and for that reason
retaliated against them by not calling them back to work.
In addition, it is established that the Plant Manager, Vice-
President Ryan and President Sisemore expressed great hostility
to the protected activity and a strong desire to know who turned
the company in and caused them so much trouble. They threatened
to make life so miserable for those who engaged in the
protected activity so they would be only too glad to seek
employment elsewhere. These facts, plus the fact that the
Claimants were clearly subject to disparate treatment by the
Respondent not calling them back to work after the July 1992
layoff, while less senior employees were working lends support to
a reasonable inference that Respondent had knowledge of the
identity of the employees who participated in the protected
activity that led to the MSHA shutdown of the plant, the issuance
of 29 unwarrantable citations, and the 110(c) investigation of
the plant supervisor. It is reasonable to infer from the
evidence presented that sometime before the July 1992 layoff and
recall, Management determined the identity of the employees who
participated in the protected activity that Respondent so deeply
resented.
SENIORITY
The Union contract in effect at the relevant time (July 1992
- March 1993) states in Article XIII Section 3 the following:
Section 3: Seniority Termination. Seniority
shall be terminated by ...(3) if the
employee performs no work for the Employer
within the bargaining unit for a period of
six months ....
In view of the miners' statutorily protected rights, I find
this provision has no effect on the Claimants' seniority at any
time relevant to this decision. Any failure of Complain-
ants to perform work for Respondent for any six months or longer
period during the relevant time period up through December 16,
1993, was due to Respondent's illegal discrimination against the
Claimants. As stated before, the Union agreement is subservient
to the miners statutorily protected rights under the Mine Act.
The Respondent's seniority list for the Claimants and other
operating engineers under the Local 12 Union contract is as set
forth in Government Exhibits 13, 14, and 15. I find Claimants
seniority date at all time relevant to this decision, is their
date of hire as follows:
Name Date Hired
Hyles, James 07-09-85
Dennis, Gregory 08-21-86
Mears, Douglas 04-09-87
Soto, Derrick 07-05-88
These dates of hire establish the Claimants seniority
through all period of time relevant to this decision i.e.
through December 16, 1993, the date of the final hearing in
these cases.
FURTHER FINDINGS
1. Respondent refused to recall the Complainants back to
work after the July 1992 layoff in retaliation for Complainants
having engaged in protected activity which resulted in MSHA
issuing many citations and shutting the plant down.
2. Respondent's claim that Claimants were not recalled
shortly after the July 1992 layoff because Complainants were
not qualified for available work is pretextual.
3. Respondent manipulated the shift and job assignments in
March of 1993 for the specific planned purpose of terminating the
Claimants employment in retaliation of their protected activity
that resulted in the shutdown of the plant, the 29 unwarrantable
citations and the 110(c) investigation of Ryan, the plant manager
and vice-president of the company.
BACK-PAY AND PENALTY
In the decision of November 2, 1994 (16 FMSHRC 2232) I
directed counsel for the parties to confer with each other
with respect to the remedies due each of the Claimants and
encouraged the parties to reach a mutually agreeable
resolution or settlement of these matters.
When the parties finally informed me they could not reach an
agreement as to the specific dollar amount, I set the matter
for hearing on May 8 - 10, 1995, in Riverside California.
Just days prior to the scheduled May 1995 hearing, the
parties after conference calls on May 5th and May 8, 1995,
notified the Judge that they had reached an agreement on the
dollar amounts due. They requested cancellation of the May
hearing on the grounds that it would no longer be
necessary or productive, in any way, in view of a
stipulation reached by the parties. The scheduled hearing
was canceled and on May 22, 1995, the parties filed the
stipulation, attached hereto as Ex. A.
In the stipulation the parties, assuming liability, agree to
certain dollar amounts of back-pay due each Claimant from
April 1991 up through the date of the final hearing in these
cases, December 16, 1993. The parties stipulate that the
interest began to accrue on March 15, 1993, on the entire back-pay
award, and that Respondent shall make all legally required payroll
deductions and withholdings.
Based on the record and the stipulation attached as Exhibit
A, I enter the following:
ORDER
Respondent is ordered to pay the Complainants' back wages
and interest for all periods through the date of the final
hearing in these cases, December 16, 1993, the following
amounts:
Name Amounts
James Hyles $20,837.24 plus interest [3]
Derrick Soto $34,347.10 plus interest
Douglas Mears $38,656.34 plus interest
Gregory Dennis $36,159.32 plus interest
It is further ordered the RESPONDENTS PAY a civil penalty of
$14,000.00 to the Secretary of Labor for Respondent's violations
of Section 105(c) of the Mine Act as charged in Docket Nos. WEST
93-336-DM, WEST 93-337-DM, WEST 93-338-DM and WEST 93-339-DM. All
amounts payable by Respondent pursuant to this order shall be paid
within 40 days of the date of this decision.
It is further ORDERED that Docket Nos. WEST 93-436-DM, WEST
93-437-DM, WEST 93-438-DM, WEST 93-439-DM and WEST 94-21-DM be
DISMISSED and their corresponding proposed penalties VACATED.
August F. Cetti
Administrative Law Judge
**FOOTNOTES**
[3]: Interest shall be computed in accordance with the
Commission's decision in Secretary/Bailey v. Arkansas-Carbona, 5
FMSHRC 2042 (December 1983), at the adjusted prime rate announced
semi-annually by the Internal Revenue Service for the
underpayment and overpayment to taxes. Interest shall be
computed from March 15, 1993, until the date of payment of back-
pay awarded.
Distribution:
John C. Nangle, Esq., J. Mark Ogden, Esq., Office of the
Solicitor, U.S. Department of Labor, 3247 Federal Building,
300 North Los Angeles Street, Los Angeles, CA 90012
(Certified Mail)
Yoora Kim, Esq., Office of the Solicitor, U.S.Department of
Labor, 4015 Wilson Boulevard, Arlington, VA 22203
(Certified Mail)
Lawrence Gartner, Esq., GARTNER & YOUNG, P.C., 1925 Century
Park East #2050, Los Angeles, CA 90067-2709
(Certified Mail)
William Rehwald, Esq., REHWALD, RAMESON, LEWIS & GLASNER, 5855
Topanga Canyon Blvd., Suite 400, Woodland Hills, CA 91367-4600
(Certified Mail)
/sh
JOHN C NANGLE ESQ
J MARK OGDEN ESQ
3247 FEDERAL BUILDING
300 N LOS ANGELES ST
LOS ANGELES CA 90012
YOORA KIM ESQ
OFFICE OF THE SOLICITOR
U S DEPARTMENT OF LABOR
4015 WILSON BLVD
ARLINGTON VA 22203
LAWRENCE GARTNER ESQ
GARTNER & YOUNG PC
1925 CENTURY PARK EAST
#2050
LOS ANGELES CA 90067-2709
WILLIAM REHWALD ESQ
REHWALD RAMESON LEWIS &
GLASNER
5855 TOPANGA CANYON
BLVD #400
WOODLAND HILLS CA
91367-46001
|
en
|
all-txt-docs
|
425189
|
FXUS64 KMAF 191844
AFDMAF
AREA FORECAST DISCUSSION
NATIONAL WEATHER SERVICE MIDLAND/ODESSA TX
130 PM CDT THU JUN 19 2003
SUMMER PATTERN IN PLACE WITH UPPER RIDGE OVER AREA. WEST COAST
TROUGH COMES EAST FRIDAY AND SATURDAY FLATTENING OUT RIDGE BUT NOT
DISPLACING IT.
NO GREAT FEATURES TO FOCUS CONVECTION ALTHOUGH NEW MEXICO COUNTIES
AND WEST TEXAS MOUNTAINS HAVE BEEN GETTING PRECIP THE LAST SEVERAL
DAYS. GIVEN EASTERLY FORECASTED WINDS EXPECT THIS TO CONTINUE.
RIGHT NOW MOISTURE PACKED UP AGAINST THE MOUNTAINS BUT A WEAK DRYLINE
IS EXPECTED TO DEVELOP. DRYLINE WILL WAFFLE ACROSS THE AREA THROUGH
FRIDAY AND SHARPEN UP A LITTLE SATURDAY AND SUNDAY. DRYLINE COULD
HELP CONVECTION BUT MODEL PRECIP DOES NOT SEEM TO CONCENTRATE ON IT.
PLANNING ON ADDING POPS TO MOUNTAINS TONIGHT AND INCREASING NORTH TO
MATCH UP BETTER. MODELS TEND TO KEEP MAJORITY OF PRECIP OUT WEST.
COULD SEE A FEW STORMS AROUND PERMIAN BASIN AS MORNING/MODEL
SOUNDINGS SLIGHTLY UNSTABLE WITH SOME CAPE.
ALL GUIDANCES IN AGREEMENT... ALL HAVE WARMING TEMPS. WARMING TEMPS
ALOFT ARE EXPECTED TO CAP ATMOSPHERE NEW WEEK. WILL CONTINUE WITH
DRY FORECAST NEXT WEEK.
LATEST RADAR SHOWING A BAND OF SHOWERS/STORMS MOVING THROUGH LEA
COUNTY INTO TEXAS WITH AN ISOLATED STORM OVER DAVIS MOUNTAINS.
OVERALL...DRY CONDITIONS AND A SIGNIFICANT WARNING TREND ARE
FORECAST INTO EARLY NEXT WEEK.
INITIAL NUMBERS FOLLOW.
MAF 67/93/69/97/71 1000
CNM 63/95/66/98/68 2010
MRF 58/85/59/88/61 2010
FST 68/95/70/98/73 0000
.MAF...
TX...NONE.
NM...NONE.
$$
72
|
en
|
all-txt-docs
|
284793
|
"Derer beyden Czaaren in Reussland Iwan und Peter Alexewiz nebst dero Schwester der Princessin Sophia bisshero dreyfach-gefuehrter Regiments-Stab : und was darauff erfolget ist, nebst dem ietzigen Zustande in Reussland und allerhand curieusen Sac","txg","g340722509","0000001.gif","1","1","","0000001.jpg"
"Derer beyden Czaaren in Reussland Iwan und Peter Alexewiz nebst dero Schwester der Princessin Sophia bisshero dreyfach-gefuehrter Regiments-Stab : und was darauff erfolget ist, nebst dem ietzigen Zustande in Reussland und allerhand curieusen Sac","txg","g340722509","0000002.gif","2","2","","0000002.jpg"
"Derer beyden Czaaren in Reussland Iwan und Peter Alexewiz nebst dero Schwester der Princessin Sophia bisshero dreyfach-gefuehrter Regiments-Stab : und was darauff erfolget ist, nebst dem ietzigen Zustande in Reussland und allerhand curieusen Sac","txg","g340722509","0000003.gif","3","3","","0000003.jpg"
"Derer beyden Czaaren in Reussland Iwan und Peter Alexewiz nebst dero Schwester der Princessin Sophia bisshero dreyfach-gefuehrter Regiments-Stab : und was darauff erfolget ist, nebst dem ietzigen Zustande in Reussland und allerhand curieusen Sac","txg","g340722509","0000004.gif","4","4","","0000004.jpg"
"Derer beyden Czaaren in Reussland Iwan und Peter Alexewiz nebst dero Schwester der Princessin Sophia bisshero dreyfach-gefuehrter Regiments-Stab : und was darauff erfolget ist, nebst dem ietzigen Zustande in Reussland und allerhand curieusen Sac","txg","g340722509","0000005.gif","5","5","","0000005.jpg"
"Derer beyden Czaaren in Reussland Iwan und Peter Alexewiz nebst dero Schwester der Princessin Sophia bisshero dreyfach-gefuehrter Regiments-Stab : und was darauff erfolget ist, nebst dem ietzigen Zustande in Reussland und allerhand curieusen Sac","txg","g340722509","0000006.gif","6","6","","0000006.jpg"
"Derer beyden Czaaren in Reussland Iwan und Peter Alexewiz nebst dero Schwester der Princessin Sophia bisshero dreyfach-gefuehrter Regiments-Stab : und was darauff erfolget ist, nebst dem ietzigen Zustande in Reussland und allerhand curieusen Sac","txg","g340722509","0000007.gif","7","7","","0000007.jpg"
"Derer beyden Czaaren in Reussland Iwan und Peter Alexewiz nebst dero Schwester der Princessin Sophia bisshero dreyfach-gefuehrter Regiments-Stab : und was darauff erfolget ist, nebst dem ietzigen Zustande in Reussland und allerhand curieusen Sac","txg","g340722509","0000008.gif","8","8","","0000008.jpg"
"Derer beyden Czaaren in Reussland Iwan und Peter Alexewiz nebst dero Schwester der Princessin Sophia bisshero dreyfach-gefuehrter Regiments-Stab : und was darauff erfolget ist, nebst dem ietzigen Zustande in Reussland und allerhand curieusen Sac","txg","g340722509","0000009.gif","9","9","","0000009.jpg"
"Derer beyden Czaaren in Reussland Iwan und Peter Alexewiz nebst dero Schwester der Princessin Sophia bisshero dreyfach-gefuehrter Regiments-Stab : und was darauff erfolget ist, nebst dem ietzigen Zustande in Reussland und allerhand curieusen Sac","txg","g340722509","0000010.gif","10","10","","0000010.jpg"
"Derer beyden Czaaren in Reussland Iwan und Peter Alexewiz nebst dero Schwester der Princessin Sophia bisshero dreyfach-gefuehrter Regiments-Stab : und was darauff erfolget ist, nebst dem ietzigen Zustande in Reussland und allerhand curieusen Sac","txg","g340722509","0000011.gif","11","11","","0000011.jpg"
"Derer beyden Czaaren in Reussland Iwan und Peter Alexewiz nebst dero Schwester der Princessin Sophia bisshero dreyfach-gefuehrter Regiments-Stab : und was darauff erfolget ist, nebst dem ietzigen Zustande in Reussland und allerhand curieusen Sac","txg","g340722509","0000012.gif","12","12","","0000012.jpg"
"Derer beyden Czaaren in Reussland Iwan und Peter Alexewiz nebst dero Schwester der Princessin Sophia bisshero dreyfach-gefuehrter Regiments-Stab : und was darauff erfolget ist, nebst dem ietzigen Zustande in Reussland und allerhand curieusen Sac","txg","g340722509","0000013.gif","13","13","","0000013.jpg"
"Derer beyden Czaaren in Reussland Iwan und Peter Alexewiz nebst dero Schwester der Princessin Sophia bisshero dreyfach-gefuehrter Regiments-Stab : und was darauff erfolget ist, nebst dem ietzigen Zustande in Reussland und allerhand curieusen Sac","txg","g340722509","0000014.gif","14","14","","0000014.jpg"
"Derer beyden Czaaren in Reussland Iwan und Peter Alexewiz nebst dero Schwester der Princessin Sophia bisshero dreyfach-gefuehrter Regiments-Stab : und was darauff erfolget ist, nebst dem ietzigen Zustande in Reussland und allerhand curieusen Sac","txg","g340722509","0000015.gif","15","15","","0000015.jpg"
"Derer beyden Czaaren in Reussland Iwan und Peter Alexewiz nebst dero Schwester der Princessin Sophia bisshero dreyfach-gefuehrter Regiments-Stab : und was darauff erfolget ist, nebst dem ietzigen Zustande in Reussland und allerhand curieusen Sac","txg","g340722509","0000016.gif","16","16","","0000016.jpg"
"Derer beyden Czaaren in Reussland Iwan und Peter Alexewiz nebst dero Schwester der Princessin Sophia bisshero dreyfach-gefuehrter Regiments-Stab : und was darauff erfolget ist, nebst dem ietzigen Zustande in Reussland und allerhand curieusen Sac","txg","g340722509","0000017.gif","17","17","","0000017.jpg"
"Derer beyden Czaaren in Reussland Iwan und Peter Alexewiz nebst dero Schwester der Princessin Sophia bisshero dreyfach-gefuehrter Regiments-Stab : und was darauff erfolget ist, nebst dem ietzigen Zustande in Reussland und allerhand curieusen Sac","txg","g340722509","0000018.gif","18","18","","0000018.jpg"
"Derer beyden Czaaren in Reussland Iwan und Peter Alexewiz nebst dero Schwester der Princessin Sophia bisshero dreyfach-gefuehrter Regiments-Stab : und was darauff erfolget ist, nebst dem ietzigen Zustande in Reussland und allerhand curieusen Sac","txg","g340722509","0000019.gif","19","19","","0000019.jpg"
"Derer beyden Czaaren in Reussland Iwan und Peter Alexewiz nebst dero Schwester der Princessin Sophia bisshero dreyfach-gefuehrter Regiments-Stab : und was darauff erfolget ist, nebst dem ietzigen Zustande in Reussland und allerhand curieusen Sac","txg","g340722509","0000020.gif","20","20","","0000020.jpg"
"Derer beyden Czaaren in Reussland Iwan und Peter Alexewiz nebst dero Schwester der Princessin Sophia bisshero dreyfach-gefuehrter Regiments-Stab : und was darauff erfolget ist, nebst dem ietzigen Zustande in Reussland und allerhand curieusen Sac","txg","g340722509","0000021.gif","21","21","","0000021.jpg"
"Derer beyden Czaaren in Reussland Iwan und Peter Alexewiz nebst dero Schwester der Princessin Sophia bisshero dreyfach-gefuehrter Regiments-Stab : und was darauff erfolget ist, nebst dem ietzigen Zustande in Reussland und allerhand curieusen Sac","txg","g340722509","0000022.gif","22","22","","0000022.jpg"
"Derer beyden Czaaren in Reussland Iwan und Peter Alexewiz nebst dero Schwester der Princessin Sophia bisshero dreyfach-gefuehrter Regiments-Stab : und was darauff erfolget ist, nebst dem ietzigen Zustande in Reussland und allerhand curieusen Sac","txg","g340722509","0000023.gif","23","23","","0000023.jpg"
"Derer beyden Czaaren in Reussland Iwan und Peter Alexewiz nebst dero Schwester der Princessin Sophia bisshero dreyfach-gefuehrter Regiments-Stab : und was darauff erfolget ist, nebst dem ietzigen Zustande in Reussland und allerhand curieusen Sac","txg","g340722509","0000024.gif","24","24","","0000024.jpg"
"Derer beyden Czaaren in Reussland Iwan und Peter Alexewiz nebst dero Schwester der Princessin Sophia bisshero dreyfach-gefuehrter Regiments-Stab : und was darauff erfolget ist, nebst dem ietzigen Zustande in Reussland und allerhand curieusen Sac","txg","g340722509","0000025.gif","25","25","","0000025.jpg"
"Derer beyden Czaaren in Reussland Iwan und Peter Alexewiz nebst dero Schwester der Princessin Sophia bisshero dreyfach-gefuehrter Regiments-Stab : und was darauff erfolget ist, nebst dem ietzigen Zustande in Reussland und allerhand curieusen Sac","txg","g340722509","0000026.gif","26","26","","0000026.jpg"
"Derer beyden Czaaren in Reussland Iwan und Peter Alexewiz nebst dero Schwester der Princessin Sophia bisshero dreyfach-gefuehrter Regiments-Stab : und was darauff erfolget ist, nebst dem ietzigen Zustande in Reussland und allerhand curieusen Sac","txg","g340722509","0000027.gif","27","27","","0000027.jpg"
"Derer beyden Czaaren in Reussland Iwan und Peter Alexewiz nebst dero Schwester der Princessin Sophia bisshero dreyfach-gefuehrter Regiments-Stab : und was darauff erfolget ist, nebst dem ietzigen Zustande in Reussland und allerhand curieusen Sac","txg","g340722509","0000028.gif","28","28","","0000028.jpg"
"Derer beyden Czaaren in Reussland Iwan und Peter Alexewiz nebst dero Schwester der Princessin Sophia bisshero dreyfach-gefuehrter Regiments-Stab : und was darauff erfolget ist, nebst dem ietzigen Zustande in Reussland und allerhand curieusen Sac","txg","g340722509","0000029.gif","29","29","","0000029.jpg"
"Derer beyden Czaaren in Reussland Iwan und Peter Alexewiz nebst dero Schwester der Princessin Sophia bisshero dreyfach-gefuehrter Regiments-Stab : und was darauff erfolget ist, nebst dem ietzigen Zustande in Reussland und allerhand curieusen Sac","txg","g340722509","0000030.gif","30","30","","0000030.jpg"
"Derer beyden Czaaren in Reussland Iwan und Peter Alexewiz nebst dero Schwester der Princessin Sophia bisshero dreyfach-gefuehrter Regiments-Stab : und was darauff erfolget ist, nebst dem ietzigen Zustande in Reussland und allerhand curieusen Sac","txg","g340722509","0000031.gif","31","31","","0000031.jpg"
"Derer beyden Czaaren in Reussland Iwan und Peter Alexewiz nebst dero Schwester der Princessin Sophia bisshero dreyfach-gefuehrter Regiments-Stab : und was darauff erfolget ist, nebst dem ietzigen Zustande in Reussland und allerhand curieusen Sac","txg","g340722509","0000032.gif","32","32","","0000032.jpg"
"Derer beyden Czaaren in Reussland Iwan und Peter Alexewiz nebst dero Schwester der Princessin Sophia bisshero dreyfach-gefuehrter Regiments-Stab : und was darauff erfolget ist, nebst dem ietzigen Zustande in Reussland und allerhand curieusen Sac","txg","g340722509","0000033.gif","33","33","","0000033.jpg"
"Derer beyden Czaaren in Reussland Iwan und Peter Alexewiz nebst dero Schwester der Princessin Sophia bisshero dreyfach-gefuehrter Regiments-Stab : und was darauff erfolget ist, nebst dem ietzigen Zustande in Reussland und allerhand curieusen Sac","txg","g340722509","0000034.gif","34","34","","0000034.jpg"
"Derer beyden Czaaren in Reussland Iwan und Peter Alexewiz nebst dero Schwester der Princessin Sophia bisshero dreyfach-gefuehrter Regiments-Stab : und was darauff erfolget ist, nebst dem ietzigen Zustande in Reussland und allerhand curieusen Sac","txg","g340722509","0000035.gif","35","35","","0000035.jpg"
"Derer beyden Czaaren in Reussland Iwan und Peter Alexewiz nebst dero Schwester der Princessin Sophia bisshero dreyfach-gefuehrter Regiments-Stab : und was darauff erfolget ist, nebst dem ietzigen Zustande in Reussland und allerhand curieusen Sac","txg","g340722509","0000036.gif","36","36","","0000036.jpg"
"Derer beyden Czaaren in Reussland Iwan und Peter Alexewiz nebst dero Schwester der Princessin Sophia bisshero dreyfach-gefuehrter Regiments-Stab : und was darauff erfolget ist, nebst dem ietzigen Zustande in Reussland und allerhand curieusen Sac","txg","g340722509","0000037.gif","37","37","","0000037.jpg"
"Derer beyden Czaaren in Reussland Iwan und Peter Alexewiz nebst dero Schwester der Princessin Sophia bisshero dreyfach-gefuehrter Regiments-Stab : und was darauff erfolget ist, nebst dem ietzigen Zustande in Reussland und allerhand curieusen Sac","txg","g340722509","0000038.gif","38","38","","0000038.jpg"
"Derer beyden Czaaren in Reussland Iwan und Peter Alexewiz nebst dero Schwester der Princessin Sophia bisshero dreyfach-gefuehrter Regiments-Stab : und was darauff erfolget ist, nebst dem ietzigen Zustande in Reussland und allerhand curieusen Sac","txg","g340722509","0000039.gif","39","39","","0000039.jpg"
"Derer beyden Czaaren in Reussland Iwan und Peter Alexewiz nebst dero Schwester der Princessin Sophia bisshero dreyfach-gefuehrter Regiments-Stab : und was darauff erfolget ist, nebst dem ietzigen Zustande in Reussland und allerhand curieusen Sac","txg","g340722509","0000040.gif","40","40","","0000040.jpg"
"Derer beyden Czaaren in Reussland Iwan und Peter Alexewiz nebst dero Schwester der Princessin Sophia bisshero dreyfach-gefuehrter Regiments-Stab : und was darauff erfolget ist, nebst dem ietzigen Zustande in Reussland und allerhand curieusen Sac","txg","g340722509","0000041.gif","41","41","","0000041.jpg"
"Derer beyden Czaaren in Reussland Iwan und Peter Alexewiz nebst dero Schwester der Princessin Sophia bisshero dreyfach-gefuehrter Regiments-Stab : und was darauff erfolget ist, nebst dem ietzigen Zustande in Reussland und allerhand curieusen Sac","txg","g340722509","0000042.gif","42","42","","0000042.jpg"
"Derer beyden Czaaren in Reussland Iwan und Peter Alexewiz nebst dero Schwester der Princessin Sophia bisshero dreyfach-gefuehrter Regiments-Stab : und was darauff erfolget ist, nebst dem ietzigen Zustande in Reussland und allerhand curieusen Sac","txg","g340722509","0000043.gif","43","43","","0000043.jpg"
"Derer beyden Czaaren in Reussland Iwan und Peter Alexewiz nebst dero Schwester der Princessin Sophia bisshero dreyfach-gefuehrter Regiments-Stab : und was darauff erfolget ist, nebst dem ietzigen Zustande in Reussland und allerhand curieusen Sac","txg","g340722509","0000044.gif","44","44","","0000044.jpg"
"Derer beyden Czaaren in Reussland Iwan und Peter Alexewiz nebst dero Schwester der Princessin Sophia bisshero dreyfach-gefuehrter Regiments-Stab : und was darauff erfolget ist, nebst dem ietzigen Zustande in Reussland und allerhand curieusen Sac","txg","g340722509","0000045.gif","45","45","","0000045.jpg"
"Derer beyden Czaaren in Reussland Iwan und Peter Alexewiz nebst dero Schwester der Princessin Sophia bisshero dreyfach-gefuehrter Regiments-Stab : und was darauff erfolget ist, nebst dem ietzigen Zustande in Reussland und allerhand curieusen Sac","txg","g340722509","0000046.gif","46","46","","0000046.jpg"
"Derer beyden Czaaren in Reussland Iwan und Peter Alexewiz nebst dero Schwester der Princessin Sophia bisshero dreyfach-gefuehrter Regiments-Stab : und was darauff erfolget ist, nebst dem ietzigen Zustande in Reussland und allerhand curieusen Sac","txg","g340722509","0000047.gif","47","47","","0000047.jpg"
"Derer beyden Czaaren in Reussland Iwan und Peter Alexewiz nebst dero Schwester der Princessin Sophia bisshero dreyfach-gefuehrter Regiments-Stab : und was darauff erfolget ist, nebst dem ietzigen Zustande in Reussland und allerhand curieusen Sac","txg","g340722509","0000048.gif","48","48","","0000048.jpg"
"Derer beyden Czaaren in Reussland Iwan und Peter Alexewiz nebst dero Schwester der Princessin Sophia bisshero dreyfach-gefuehrter Regiments-Stab : und was darauff erfolget ist, nebst dem ietzigen Zustande in Reussland und allerhand curieusen Sac","txg","g340722509","0000049.gif","49","49","","0000049.jpg"
"Derer beyden Czaaren in Reussland Iwan und Peter Alexewiz nebst dero Schwester der Princessin Sophia bisshero dreyfach-gefuehrter Regiments-Stab : und was darauff erfolget ist, nebst dem ietzigen Zustande in Reussland und allerhand curieusen Sac","txg","g340722509","0000050.gif","50","50","","0000050.jpg"
"Derer beyden Czaaren in Reussland Iwan und Peter Alexewiz nebst dero Schwester der Princessin Sophia bisshero dreyfach-gefuehrter Regiments-Stab : und was darauff erfolget ist, nebst dem ietzigen Zustande in Reussland und allerhand curieusen Sac","txg","g340722509","0000051.gif","51","51","","0000051.jpg"
"Derer beyden Czaaren in Reussland Iwan und Peter Alexewiz nebst dero Schwester der Princessin Sophia bisshero dreyfach-gefuehrter Regiments-Stab : und was darauff erfolget ist, nebst dem ietzigen Zustande in Reussland und allerhand curieusen Sac","txg","g340722509","0000052.gif","52","52","","0000052.jpg"
"Derer beyden Czaaren in Reussland Iwan und Peter Alexewiz nebst dero Schwester der Princessin Sophia bisshero dreyfach-gefuehrter Regiments-Stab : und was darauff erfolget ist, nebst dem ietzigen Zustande in Reussland und allerhand curieusen Sac","txg","g340722509","0000053.gif","53","53","","0000053.jpg"
"Derer beyden Czaaren in Reussland Iwan und Peter Alexewiz nebst dero Schwester der Princessin Sophia bisshero dreyfach-gefuehrter Regiments-Stab : und was darauff erfolget ist, nebst dem ietzigen Zustande in Reussland und allerhand curieusen Sac","txg","g340722509","0000054.gif","54","54","","0000054.jpg"
"Derer beyden Czaaren in Reussland Iwan und Peter Alexewiz nebst dero Schwester der Princessin Sophia bisshero dreyfach-gefuehrter Regiments-Stab : und was darauff erfolget ist, nebst dem ietzigen Zustande in Reussland und allerhand curieusen Sac","txg","g340722509","0000055.gif","55","55","","0000055.jpg"
"Derer beyden Czaaren in Reussland Iwan und Peter Alexewiz nebst dero Schwester der Princessin Sophia bisshero dreyfach-gefuehrter Regiments-Stab : und was darauff erfolget ist, nebst dem ietzigen Zustande in Reussland und allerhand curieusen Sac","txg","g340722509","0000056.gif","56","56","","0000056.jpg"
"Derer beyden Czaaren in Reussland Iwan und Peter Alexewiz nebst dero Schwester der Princessin Sophia bisshero dreyfach-gefuehrter Regiments-Stab : und was darauff erfolget ist, nebst dem ietzigen Zustande in Reussland und allerhand curieusen Sac","txg","g340722509","0000057.gif","57","57","","0000057.jpg"
"Derer beyden Czaaren in Reussland Iwan und Peter Alexewiz nebst dero Schwester der Princessin Sophia bisshero dreyfach-gefuehrter Regiments-Stab : und was darauff erfolget ist, nebst dem ietzigen Zustande in Reussland und allerhand curieusen Sac","txg","g340722509","0000058.gif","58","58","","0000058.jpg"
"Derer beyden Czaaren in Reussland Iwan und Peter Alexewiz nebst dero Schwester der Princessin Sophia bisshero dreyfach-gefuehrter Regiments-Stab : und was darauff erfolget ist, nebst dem ietzigen Zustande in Reussland und allerhand curieusen Sac","txg","g340722509","0000059.gif","59","59","","0000059.jpg"
"Derer beyden Czaaren in Reussland Iwan und Peter Alexewiz nebst dero Schwester der Princessin Sophia bisshero dreyfach-gefuehrter Regiments-Stab : und was darauff erfolget ist, nebst dem ietzigen Zustande in Reussland und allerhand curieusen Sac","txg","g340722509","0000060.gif","60","60","","0000060.jpg"
"Derer beyden Czaaren in Reussland Iwan und Peter Alexewiz nebst dero Schwester der Princessin Sophia bisshero dreyfach-gefuehrter Regiments-Stab : und was darauff erfolget ist, nebst dem ietzigen Zustande in Reussland und allerhand curieusen Sac","txg","g340722509","0000061.gif","61","61","","0000061.jpg"
"Derer beyden Czaaren in Reussland Iwan und Peter Alexewiz nebst dero Schwester der Princessin Sophia bisshero dreyfach-gefuehrter Regiments-Stab : und was darauff erfolget ist, nebst dem ietzigen Zustande in Reussland und allerhand curieusen Sac","txg","g340722509","0000062.gif","62","62","","0000062.jpg"
"Derer beyden Czaaren in Reussland Iwan und Peter Alexewiz nebst dero Schwester der Princessin Sophia bisshero dreyfach-gefuehrter Regiments-Stab : und was darauff erfolget ist, nebst dem ietzigen Zustande in Reussland und allerhand curieusen Sac","txg","g340722509","0000063.gif","63","63","","0000063.jpg"
"Derer beyden Czaaren in Reussland Iwan und Peter Alexewiz nebst dero Schwester der Princessin Sophia bisshero dreyfach-gefuehrter Regiments-Stab : und was darauff erfolget ist, nebst dem ietzigen Zustande in Reussland und allerhand curieusen Sac","txg","g340722509","0000064.gif","64","64","","0000064.jpg"
"Derer beyden Czaaren in Reussland Iwan und Peter Alexewiz nebst dero Schwester der Princessin Sophia bisshero dreyfach-gefuehrter Regiments-Stab : und was darauff erfolget ist, nebst dem ietzigen Zustande in Reussland und allerhand curieusen Sac","txg","g340722509","0000065.gif","65","65","","0000065.jpg"
"Derer beyden Czaaren in Reussland Iwan und Peter Alexewiz nebst dero Schwester der Princessin Sophia bisshero dreyfach-gefuehrter Regiments-Stab : und was darauff erfolget ist, nebst dem ietzigen Zustande in Reussland und allerhand curieusen Sac","txg","g340722509","0000066.gif","66","66","","0000066.jpg"
"Derer beyden Czaaren in Reussland Iwan und Peter Alexewiz nebst dero Schwester der Princessin Sophia bisshero dreyfach-gefuehrter Regiments-Stab : und was darauff erfolget ist, nebst dem ietzigen Zustande in Reussland und allerhand curieusen Sac","txg","g340722509","0000067.gif","67","67","","0000067.jpg"
"Derer beyden Czaaren in Reussland Iwan und Peter Alexewiz nebst dero Schwester der Princessin Sophia bisshero dreyfach-gefuehrter Regiments-Stab : und was darauff erfolget ist, nebst dem ietzigen Zustande in Reussland und allerhand curieusen Sac","txg","g340722509","0000068.gif","68","68","","0000068.jpg"
"Derer beyden Czaaren in Reussland Iwan und Peter Alexewiz nebst dero Schwester der Princessin Sophia bisshero dreyfach-gefuehrter Regiments-Stab : und was darauff erfolget ist, nebst dem ietzigen Zustande in Reussland und allerhand curieusen Sac","txg","g340722509","0000069.gif","69","69","","0000069.jpg"
"Derer beyden Czaaren in Reussland Iwan und Peter Alexewiz nebst dero Schwester der Princessin Sophia bisshero dreyfach-gefuehrter Regiments-Stab : und was darauff erfolget ist, nebst dem ietzigen Zustande in Reussland und allerhand curieusen Sac","txg","g340722509","0000070.gif","70","70","","0000070.jpg"
"Derer beyden Czaaren in Reussland Iwan und Peter Alexewiz nebst dero Schwester der Princessin Sophia bisshero dreyfach-gefuehrter Regiments-Stab : und was darauff erfolget ist, nebst dem ietzigen Zustande in Reussland und allerhand curieusen Sac","txg","g340722509","0000071.gif","71","71","","0000071.jpg"
"Derer beyden Czaaren in Reussland Iwan und Peter Alexewiz nebst dero Schwester der Princessin Sophia bisshero dreyfach-gefuehrter Regiments-Stab : und was darauff erfolget ist, nebst dem ietzigen Zustande in Reussland und allerhand curieusen Sac","txg","g340722509","0000072.gif","72","72","","0000072.jpg"
"Derer beyden Czaaren in Reussland Iwan und Peter Alexewiz nebst dero Schwester der Princessin Sophia bisshero dreyfach-gefuehrter Regiments-Stab : und was darauff erfolget ist, nebst dem ietzigen Zustande in Reussland und allerhand curieusen Sac","txg","g340722509","0000073.gif","73","73","","0000073.jpg"
"Derer beyden Czaaren in Reussland Iwan und Peter Alexewiz nebst dero Schwester der Princessin Sophia bisshero dreyfach-gefuehrter Regiments-Stab : und was darauff erfolget ist, nebst dem ietzigen Zustande in Reussland und allerhand curieusen Sac","txg","g340722509","0000074.gif","74","74","","0000074.jpg"
"Derer beyden Czaaren in Reussland Iwan und Peter Alexewiz nebst dero Schwester der Princessin Sophia bisshero dreyfach-gefuehrter Regiments-Stab : und was darauff erfolget ist, nebst dem ietzigen Zustande in Reussland und allerhand curieusen Sac","txg","g340722509","0000075.gif","75","75","","0000075.jpg"
"Derer beyden Czaaren in Reussland Iwan und Peter Alexewiz nebst dero Schwester der Princessin Sophia bisshero dreyfach-gefuehrter Regiments-Stab : und was darauff erfolget ist, nebst dem ietzigen Zustande in Reussland und allerhand curieusen Sac","txg","g340722509","0000076.gif","76","76","","0000076.jpg"
"Derer beyden Czaaren in Reussland Iwan und Peter Alexewiz nebst dero Schwester der Princessin Sophia bisshero dreyfach-gefuehrter Regiments-Stab : und was darauff erfolget ist, nebst dem ietzigen Zustande in Reussland und allerhand curieusen Sac","txg","g340722509","0000077.gif","77","77","","0000077.jpg"
"Derer beyden Czaaren in Reussland Iwan und Peter Alexewiz nebst dero Schwester der Princessin Sophia bisshero dreyfach-gefuehrter Regiments-Stab : und was darauff erfolget ist, nebst dem ietzigen Zustande in Reussland und allerhand curieusen Sac","txg","g340722509","0000078.gif","78","78","","0000078.jpg"
"Derer beyden Czaaren in Reussland Iwan und Peter Alexewiz nebst dero Schwester der Princessin Sophia bisshero dreyfach-gefuehrter Regiments-Stab : und was darauff erfolget ist, nebst dem ietzigen Zustande in Reussland und allerhand curieusen Sac","txg","g340722509","0000079.gif","79","79","","0000079.jpg"
"Derer beyden Czaaren in Reussland Iwan und Peter Alexewiz nebst dero Schwester der Princessin Sophia bisshero dreyfach-gefuehrter Regiments-Stab : und was darauff erfolget ist, nebst dem ietzigen Zustande in Reussland und allerhand curieusen Sac","txg","g340722509","0000080.gif","80","80","","0000080.jpg"
"Derer beyden Czaaren in Reussland Iwan und Peter Alexewiz nebst dero Schwester der Princessin Sophia bisshero dreyfach-gefuehrter Regiments-Stab : und was darauff erfolget ist, nebst dem ietzigen Zustande in Reussland und allerhand curieusen Sac","txg","g340722509","0000081.gif","81","81","","0000081.jpg"
"Derer beyden Czaaren in Reussland Iwan und Peter Alexewiz nebst dero Schwester der Princessin Sophia bisshero dreyfach-gefuehrter Regiments-Stab : und was darauff erfolget ist, nebst dem ietzigen Zustande in Reussland und allerhand curieusen Sac","txg","g340722509","0000082.gif","82","82","","0000082.jpg"
"Derer beyden Czaaren in Reussland Iwan und Peter Alexewiz nebst dero Schwester der Princessin Sophia bisshero dreyfach-gefuehrter Regiments-Stab : und was darauff erfolget ist, nebst dem ietzigen Zustande in Reussland und allerhand curieusen Sac","txg","g340722509","0000083.gif","83","83","","0000083.jpg"
"Derer beyden Czaaren in Reussland Iwan und Peter Alexewiz nebst dero Schwester der Princessin Sophia bisshero dreyfach-gefuehrter Regiments-Stab : und was darauff erfolget ist, nebst dem ietzigen Zustande in Reussland und allerhand curieusen Sac","txg","g340722509","0000084.gif","84","84","","0000084.jpg"
"Derer beyden Czaaren in Reussland Iwan und Peter Alexewiz nebst dero Schwester der Princessin Sophia bisshero dreyfach-gefuehrter Regiments-Stab : und was darauff erfolget ist, nebst dem ietzigen Zustande in Reussland und allerhand curieusen Sac","txg","g340722509","0000085.gif","85","85","","0000085.jpg"
"Derer beyden Czaaren in Reussland Iwan und Peter Alexewiz nebst dero Schwester der Princessin Sophia bisshero dreyfach-gefuehrter Regiments-Stab : und was darauff erfolget ist, nebst dem ietzigen Zustande in Reussland und allerhand curieusen Sac","txg","g340722509","0000086.gif","86","86","","0000086.jpg"
"Derer beyden Czaaren in Reussland Iwan und Peter Alexewiz nebst dero Schwester der Princessin Sophia bisshero dreyfach-gefuehrter Regiments-Stab : und was darauff erfolget ist, nebst dem ietzigen Zustande in Reussland und allerhand curieusen Sac","txg","g340722509","0000087.gif","87","87","","0000087.jpg"
"Derer beyden Czaaren in Reussland Iwan und Peter Alexewiz nebst dero Schwester der Princessin Sophia bisshero dreyfach-gefuehrter Regiments-Stab : und was darauff erfolget ist, nebst dem ietzigen Zustande in Reussland und allerhand curieusen Sac","txg","g340722509","0000088.gif","88","88","","0000088.jpg"
"Derer beyden Czaaren in Reussland Iwan und Peter Alexewiz nebst dero Schwester der Princessin Sophia bisshero dreyfach-gefuehrter Regiments-Stab : und was darauff erfolget ist, nebst dem ietzigen Zustande in Reussland und allerhand curieusen Sac","txg","g340722509","0000089.gif","89","89","","0000089.jpg"
"Derer beyden Czaaren in Reussland Iwan und Peter Alexewiz nebst dero Schwester der Princessin Sophia bisshero dreyfach-gefuehrter Regiments-Stab : und was darauff erfolget ist, nebst dem ietzigen Zustande in Reussland und allerhand curieusen Sac","txg","g340722509","0000090.gif","90","90","","0000090.jpg"
"Derer beyden Czaaren in Reussland Iwan und Peter Alexewiz nebst dero Schwester der Princessin Sophia bisshero dreyfach-gefuehrter Regiments-Stab : und was darauff erfolget ist, nebst dem ietzigen Zustande in Reussland und allerhand curieusen Sac","txg","g340722509","0000091.gif","91","91","","0000091.jpg"
"Derer beyden Czaaren in Reussland Iwan und Peter Alexewiz nebst dero Schwester der Princessin Sophia bisshero dreyfach-gefuehrter Regiments-Stab : und was darauff erfolget ist, nebst dem ietzigen Zustande in Reussland und allerhand curieusen Sac","txg","g340722509","0000092.gif","92","92","","0000092.jpg"
"Derer beyden Czaaren in Reussland Iwan und Peter Alexewiz nebst dero Schwester der Princessin Sophia bisshero dreyfach-gefuehrter Regiments-Stab : und was darauff erfolget ist, nebst dem ietzigen Zustande in Reussland und allerhand curieusen Sac","txg","g340722509","0000093.gif","93","93","","0000093.jpg"
"Derer beyden Czaaren in Reussland Iwan und Peter Alexewiz nebst dero Schwester der Princessin Sophia bisshero dreyfach-gefuehrter Regiments-Stab : und was darauff erfolget ist, nebst dem ietzigen Zustande in Reussland und allerhand curieusen Sac","txg","g340722509","0000094.gif","94","94","","0000094.jpg"
"Derer beyden Czaaren in Reussland Iwan und Peter Alexewiz nebst dero Schwester der Princessin Sophia bisshero dreyfach-gefuehrter Regiments-Stab : und was darauff erfolget ist, nebst dem ietzigen Zustande in Reussland und allerhand curieusen Sac","txg","g340722509","0000095.gif","95","95","","0000095.jpg"
"Derer beyden Czaaren in Reussland Iwan und Peter Alexewiz nebst dero Schwester der Princessin Sophia bisshero dreyfach-gefuehrter Regiments-Stab : und was darauff erfolget ist, nebst dem ietzigen Zustande in Reussland und allerhand curieusen Sac","txg","g340722509","0000096.gif","96","96","","0000096.jpg"
"Derer beyden Czaaren in Reussland Iwan und Peter Alexewiz nebst dero Schwester der Princessin Sophia bisshero dreyfach-gefuehrter Regiments-Stab : und was darauff erfolget ist, nebst dem ietzigen Zustande in Reussland und allerhand curieusen Sac","txg","g340722509","0000097.gif","97","97","","0000097.jpg"
"Derer beyden Czaaren in Reussland Iwan und Peter Alexewiz nebst dero Schwester der Princessin Sophia bisshero dreyfach-gefuehrter Regiments-Stab : und was darauff erfolget ist, nebst dem ietzigen Zustande in Reussland und allerhand curieusen Sac","txg","g340722509","0000098.gif","98","98","","0000098.jpg"
"Derer beyden Czaaren in Reussland Iwan und Peter Alexewiz nebst dero Schwester der Princessin Sophia bisshero dreyfach-gefuehrter Regiments-Stab : und was darauff erfolget ist, nebst dem ietzigen Zustande in Reussland und allerhand curieusen Sac","txg","g340722509","0000099.gif","99","99","","0000099.jpg"
"Derer beyden Czaaren in Reussland Iwan und Peter Alexewiz nebst dero Schwester der Princessin Sophia bisshero dreyfach-gefuehrter Regiments-Stab : und was darauff erfolget ist, nebst dem ietzigen Zustande in Reussland und allerhand curieusen Sac","txg","g340722509","0000100.gif","100","100","","0000100.jpg"
"Derer beyden Czaaren in Reussland Iwan und Peter Alexewiz nebst dero Schwester der Princessin Sophia bisshero dreyfach-gefuehrter Regiments-Stab : und was darauff erfolget ist, nebst dem ietzigen Zustande in Reussland und allerhand curieusen Sac","txg","g340722509","0000101.gif","101","101","","0000101.jpg"
"Derer beyden Czaaren in Reussland Iwan und Peter Alexewiz nebst dero Schwester der Princessin Sophia bisshero dreyfach-gefuehrter Regiments-Stab : und was darauff erfolget ist, nebst dem ietzigen Zustande in Reussland und allerhand curieusen Sac","txg","g340722509","0000102.gif","102","102","","0000102.jpg"
"Derer beyden Czaaren in Reussland Iwan und Peter Alexewiz nebst dero Schwester der Princessin Sophia bisshero dreyfach-gefuehrter Regiments-Stab : und was darauff erfolget ist, nebst dem ietzigen Zustande in Reussland und allerhand curieusen Sac","txg","g340722509","0000103.gif","103","103","","0000103.jpg"
"Derer beyden Czaaren in Reussland Iwan und Peter Alexewiz nebst dero Schwester der Princessin Sophia bisshero dreyfach-gefuehrter Regiments-Stab : und was darauff erfolget ist, nebst dem ietzigen Zustande in Reussland und allerhand curieusen Sac","txg","g340722509","0000104.gif","104","104","","0000104.jpg"
"Derer beyden Czaaren in Reussland Iwan und Peter Alexewiz nebst dero Schwester der Princessin Sophia bisshero dreyfach-gefuehrter Regiments-Stab : und was darauff erfolget ist, nebst dem ietzigen Zustande in Reussland und allerhand curieusen Sac","txg","g340722509","0000105.gif","105","105","","0000105.jpg"
"Derer beyden Czaaren in Reussland Iwan und Peter Alexewiz nebst dero Schwester der Princessin Sophia bisshero dreyfach-gefuehrter Regiments-Stab : und was darauff erfolget ist, nebst dem ietzigen Zustande in Reussland und allerhand curieusen Sac","txg","g340722509","0000106.gif","106","106","","0000106.jpg"
"Derer beyden Czaaren in Reussland Iwan und Peter Alexewiz nebst dero Schwester der Princessin Sophia bisshero dreyfach-gefuehrter Regiments-Stab : und was darauff erfolget ist, nebst dem ietzigen Zustande in Reussland und allerhand curieusen Sac","txg","g340722509","0000107.gif","107","107","","0000107.jpg"
"Derer beyden Czaaren in Reussland Iwan und Peter Alexewiz nebst dero Schwester der Princessin Sophia bisshero dreyfach-gefuehrter Regiments-Stab : und was darauff erfolget ist, nebst dem ietzigen Zustande in Reussland und allerhand curieusen Sac","txg","g340722509","0000108.gif","108","108","","0000108.jpg"
"Derer beyden Czaaren in Reussland Iwan und Peter Alexewiz nebst dero Schwester der Princessin Sophia bisshero dreyfach-gefuehrter Regiments-Stab : und was darauff erfolget ist, nebst dem ietzigen Zustande in Reussland und allerhand curieusen Sac","txg","g340722509","0000109.gif","109","109","","0000109.jpg"
"Derer beyden Czaaren in Reussland Iwan und Peter Alexewiz nebst dero Schwester der Princessin Sophia bisshero dreyfach-gefuehrter Regiments-Stab : und was darauff erfolget ist, nebst dem ietzigen Zustande in Reussland und allerhand curieusen Sac","txg","g340722509","0000110.gif","110","110","","0000110.jpg"
"Derer beyden Czaaren in Reussland Iwan und Peter Alexewiz nebst dero Schwester der Princessin Sophia bisshero dreyfach-gefuehrter Regiments-Stab : und was darauff erfolget ist, nebst dem ietzigen Zustande in Reussland und allerhand curieusen Sac","txg","g340722509","0000111.gif","111","111","","0000111.jpg"
"Derer beyden Czaaren in Reussland Iwan und Peter Alexewiz nebst dero Schwester der Princessin Sophia bisshero dreyfach-gefuehrter Regiments-Stab : und was darauff erfolget ist, nebst dem ietzigen Zustande in Reussland und allerhand curieusen Sac","txg","g340722509","0000112.gif","112","112","","0000112.jpg"
"Derer beyden Czaaren in Reussland Iwan und Peter Alexewiz nebst dero Schwester der Princessin Sophia bisshero dreyfach-gefuehrter Regiments-Stab : und was darauff erfolget ist, nebst dem ietzigen Zustande in Reussland und allerhand curieusen Sac","txg","g340722509","0000113.gif","113","113","","0000113.jpg"
"Derer beyden Czaaren in Reussland Iwan und Peter Alexewiz nebst dero Schwester der Princessin Sophia bisshero dreyfach-gefuehrter Regiments-Stab : und was darauff erfolget ist, nebst dem ietzigen Zustande in Reussland und allerhand curieusen Sac","txg","g340722509","0000114.gif","114","114","","0000114.jpg"
"Derer beyden Czaaren in Reussland Iwan und Peter Alexewiz nebst dero Schwester der Princessin Sophia bisshero dreyfach-gefuehrter Regiments-Stab : und was darauff erfolget ist, nebst dem ietzigen Zustande in Reussland und allerhand curieusen Sac","txg","g340722509","0000115.gif","115","115","","0000115.jpg"
"Derer beyden Czaaren in Reussland Iwan und Peter Alexewiz nebst dero Schwester der Princessin Sophia bisshero dreyfach-gefuehrter Regiments-Stab : und was darauff erfolget ist, nebst dem ietzigen Zustande in Reussland und allerhand curieusen Sac","txg","g340722509","0000116.gif","116","116","","0000116.jpg"
"Derer beyden Czaaren in Reussland Iwan und Peter Alexewiz nebst dero Schwester der Princessin Sophia bisshero dreyfach-gefuehrter Regiments-Stab : und was darauff erfolget ist, nebst dem ietzigen Zustande in Reussland und allerhand curieusen Sac","txg","g340722509","0000117.gif","117","117","","0000117.jpg"
"Derer beyden Czaaren in Reussland Iwan und Peter Alexewiz nebst dero Schwester der Princessin Sophia bisshero dreyfach-gefuehrter Regiments-Stab : und was darauff erfolget ist, nebst dem ietzigen Zustande in Reussland und allerhand curieusen Sac","txg","g340722509","0000118.gif","118","118","","0000118.jpg"
"Derer beyden Czaaren in Reussland Iwan und Peter Alexewiz nebst dero Schwester der Princessin Sophia bisshero dreyfach-gefuehrter Regiments-Stab : und was darauff erfolget ist, nebst dem ietzigen Zustande in Reussland und allerhand curieusen Sac","txg","g340722509","0000119.gif","119","119","","0000119.jpg"
"Derer beyden Czaaren in Reussland Iwan und Peter Alexewiz nebst dero Schwester der Princessin Sophia bisshero dreyfach-gefuehrter Regiments-Stab : und was darauff erfolget ist, nebst dem ietzigen Zustande in Reussland und allerhand curieusen Sac","txg","g340722509","0000120.gif","120","120","","0000120.jpg"
"Derer beyden Czaaren in Reussland Iwan und Peter Alexewiz nebst dero Schwester der Princessin Sophia bisshero dreyfach-gefuehrter Regiments-Stab : und was darauff erfolget ist, nebst dem ietzigen Zustande in Reussland und allerhand curieusen Sac","txg","g340722509","0000121.gif","121","121","","0000121.jpg"
"Derer beyden Czaaren in Reussland Iwan und Peter Alexewiz nebst dero Schwester der Princessin Sophia bisshero dreyfach-gefuehrter Regiments-Stab : und was darauff erfolget ist, nebst dem ietzigen Zustande in Reussland und allerhand curieusen Sac","txg","g340722509","0000122.gif","122","122","","0000122.jpg"
"Derer beyden Czaaren in Reussland Iwan und Peter Alexewiz nebst dero Schwester der Princessin Sophia bisshero dreyfach-gefuehrter Regiments-Stab : und was darauff erfolget ist, nebst dem ietzigen Zustande in Reussland und allerhand curieusen Sac","txg","g340722509","0000123.gif","123","123","","0000123.jpg"
"Derer beyden Czaaren in Reussland Iwan und Peter Alexewiz nebst dero Schwester der Princessin Sophia bisshero dreyfach-gefuehrter Regiments-Stab : und was darauff erfolget ist, nebst dem ietzigen Zustande in Reussland und allerhand curieusen Sac","txg","g340722509","0000124.gif","124","124","","0000124.jpg"
"Derer beyden Czaaren in Reussland Iwan und Peter Alexewiz nebst dero Schwester der Princessin Sophia bisshero dreyfach-gefuehrter Regiments-Stab : und was darauff erfolget ist, nebst dem ietzigen Zustande in Reussland und allerhand curieusen Sac","txg","g340722509","0000125.gif","125","125","","0000125.jpg"
"Derer beyden Czaaren in Reussland Iwan und Peter Alexewiz nebst dero Schwester der Princessin Sophia bisshero dreyfach-gefuehrter Regiments-Stab : und was darauff erfolget ist, nebst dem ietzigen Zustande in Reussland und allerhand curieusen Sac","txg","g340722509","0000126.gif","126","126","","0000126.jpg"
"Derer beyden Czaaren in Reussland Iwan und Peter Alexewiz nebst dero Schwester der Princessin Sophia bisshero dreyfach-gefuehrter Regiments-Stab : und was darauff erfolget ist, nebst dem ietzigen Zustande in Reussland und allerhand curieusen Sac","txg","g340722509","0000127.gif","127","127","","0000127.jpg"
"Derer beyden Czaaren in Reussland Iwan und Peter Alexewiz nebst dero Schwester der Princessin Sophia bisshero dreyfach-gefuehrter Regiments-Stab : und was darauff erfolget ist, nebst dem ietzigen Zustande in Reussland und allerhand curieusen Sac","txg","g340722509","0000128.gif","128","128","","0000128.jpg"
"Derer beyden Czaaren in Reussland Iwan und Peter Alexewiz nebst dero Schwester der Princessin Sophia bisshero dreyfach-gefuehrter Regiments-Stab : und was darauff erfolget ist, nebst dem ietzigen Zustande in Reussland und allerhand curieusen Sac","txg","g340722509","0000129.gif","129","129","","0000129.jpg"
"Derer beyden Czaaren in Reussland Iwan und Peter Alexewiz nebst dero Schwester der Princessin Sophia bisshero dreyfach-gefuehrter Regiments-Stab : und was darauff erfolget ist, nebst dem ietzigen Zustande in Reussland und allerhand curieusen Sac","txg","g340722509","0000130.gif","130","130","","0000130.jpg"
"Derer beyden Czaaren in Reussland Iwan und Peter Alexewiz nebst dero Schwester der Princessin Sophia bisshero dreyfach-gefuehrter Regiments-Stab : und was darauff erfolget ist, nebst dem ietzigen Zustande in Reussland und allerhand curieusen Sac","txg","g340722509","0000131.gif","131","131","","0000131.jpg"
"Derer beyden Czaaren in Reussland Iwan und Peter Alexewiz nebst dero Schwester der Princessin Sophia bisshero dreyfach-gefuehrter Regiments-Stab : und was darauff erfolget ist, nebst dem ietzigen Zustande in Reussland und allerhand curieusen Sac","txg","g340722509","0000132.gif","132","132","","0000132.jpg"
"Derer beyden Czaaren in Reussland Iwan und Peter Alexewiz nebst dero Schwester der Princessin Sophia bisshero dreyfach-gefuehrter Regiments-Stab : und was darauff erfolget ist, nebst dem ietzigen Zustande in Reussland und allerhand curieusen Sac","txg","g340722509","0000133.gif","133","133","","0000133.jpg"
"Derer beyden Czaaren in Reussland Iwan und Peter Alexewiz nebst dero Schwester der Princessin Sophia bisshero dreyfach-gefuehrter Regiments-Stab : und was darauff erfolget ist, nebst dem ietzigen Zustande in Reussland und allerhand curieusen Sac","txg","g340722509","0000134.gif","134","134","","0000134.jpg"
"Derer beyden Czaaren in Reussland Iwan und Peter Alexewiz nebst dero Schwester der Princessin Sophia bisshero dreyfach-gefuehrter Regiments-Stab : und was darauff erfolget ist, nebst dem ietzigen Zustande in Reussland und allerhand curieusen Sac","txg","g340722509","0000135.gif","135","135","","0000135.jpg"
"Derer beyden Czaaren in Reussland Iwan und Peter Alexewiz nebst dero Schwester der Princessin Sophia bisshero dreyfach-gefuehrter Regiments-Stab : und was darauff erfolget ist, nebst dem ietzigen Zustande in Reussland und allerhand curieusen Sac","txg","g340722509","0000136.gif","136","136","","0000136.jpg"
"Derer beyden Czaaren in Reussland Iwan und Peter Alexewiz nebst dero Schwester der Princessin Sophia bisshero dreyfach-gefuehrter Regiments-Stab : und was darauff erfolget ist, nebst dem ietzigen Zustande in Reussland und allerhand curieusen Sac","txg","g340722509","0000137.gif","137","137","","0000137.jpg"
"Derer beyden Czaaren in Reussland Iwan und Peter Alexewiz nebst dero Schwester der Princessin Sophia bisshero dreyfach-gefuehrter Regiments-Stab : und was darauff erfolget ist, nebst dem ietzigen Zustande in Reussland und allerhand curieusen Sac","txg","g340722509","0000138.gif","138","138","","0000138.jpg"
"Derer beyden Czaaren in Reussland Iwan und Peter Alexewiz nebst dero Schwester der Princessin Sophia bisshero dreyfach-gefuehrter Regiments-Stab : und was darauff erfolget ist, nebst dem ietzigen Zustande in Reussland und allerhand curieusen Sac","txg","g340722509","0000139.gif","139","139","","0000139.jpg"
"Derer beyden Czaaren in Reussland Iwan und Peter Alexewiz nebst dero Schwester der Princessin Sophia bisshero dreyfach-gefuehrter Regiments-Stab : und was darauff erfolget ist, nebst dem ietzigen Zustande in Reussland und allerhand curieusen Sac","txg","g340722509","0000140.gif","140","140","","0000140.jpg"
|
de
|
markdown
|
570413
|
# Presentation: 570413
## INTEGRAL Archive at HEASARC Status and Plans
- Steve Drake
## INTEGRAL: Mission Status, Overview of US Program & Archive
- INTEGRAL is an ESA mission with NASA participation for hard X-ray/gamma-ray (15 keV-10 MeV) imaging and spectroscopy (& soft X-ray & optical instruments)
- Currently in its 4th year of operations; will be supported by ESA at least through 2010
- Spacecraft and subsystems all operating nominally
- 4th GO cycle starts in August 2006
- US investigators comprise ~25% of overall GO program (supported by NASA grants)
- NASA GOF mirrors ESA’s ISDC archive, and provides technical and scientific support to US astronomy community (2.5 science FTEs)
- Future of NASA INTEGRAL funding to be determined by 2006 MO&DA Senior Review
## INTEGRAL Archive: Milestones
**July 2004:** The ISDC INTEGRAL Public Data Archive opened with data up to revolution 66 (5-1-03).
**September 2004:** The US INTEGRAL Public Data Archive at the HEASARC opened.
**January 2005:** All public data was reprocessed into revision 2 format.
- - Rev 2 utilizes HEASARC-compatible event file formats
**February 2005: ** The US INTEGRAL Public Data Archive at the HEASARC switches over to revision 2 format data.
**February 2006:** 1.8 TB of public INTEGRAL data available from the HEASARC (most of mission up to Jan/Feb 2005)
## INTEGRAL Archive: Current Status
- New public data is available to the community within a few days of its release from the ISDC.
- The limiting factor is the low data transfer rate from the ISDC.
- ~3 spacecraft orbital revolutions = 9 days of data can be transferred per day.
- All public data through the latest ISDC release (03-31-06) is currently available from the HEASARC archive.
## Accessibility
- The US INTEGRAL Public Data Archive is accessible from the HEASARC via Browse or FTP.
- Downloading the data as a tar file is complicated by the large size of the typical observation, 1 Rev. = 3 days of data = 7-8 GB.
- The HEASARC limit for a tar file is 5 GB ==> the preferred download method is via a wget script created by Browse.
- A detailed description of all the INTEGRAL catalogs available through Browse as well as a detailed cookbook describing the downloading of data : <http://heasarc.gsfc.nasa.gov/docs/integral/inthp_archive.html>
## HEASARC and INTEGRAL/GOF
- Download previews and quick-look data
- Multi-band Images, lightcurves,
- - Roadmap for follow-up analysis
## High-level INTEGRAL Products
- Routine analysis of all public data
- Basic analysis of 600 observations in the archive
- ISGRI and SPI lightcurves for 200 bright sources:
- “INTEGRAL Bright Source Catalog”
- “INTEGRAL Source Results”
- ISGRI fluxes in 2 energy bands (23-40, 40-80 keV)
- “INTEGRAL AGN Catalog” - detailed information about 68 AGN available soon
|
en
|
markdown
|
020702
|
# Presentation: 020702
## Group Analysis with AFNI - Hands On
- The following sample group analysis comes from “How-to #5 -- Group Analysis: AFNI 3dANOVA3”, described in full detail on the AFNI website:
- http://afni.nimh.gov/pub/dist/HOWTO/howto/ht05_group/html
_**Brief description of experiment**_** ****:**
- Design:
- Rapid event-related
- “Stimulus Condition” has 4 levels:
- TM = Tool Movies
- HM = Human Movies
- TP = Tool Point Light Displays
- HP = Human Point Light Displays
**Human Movie**
**Tool Movie**
**Human Point Light**
**Tool Point Light**
## Data Collected:
1 Anatomical (SPGR) dataset for each subject
124 sagittal slices
10 Time Series (EPI) datasets for each subject
23 axial slices x 138 volumes = 3174 volumes/timepoints per run
note: each run consists of random presentations of rest and all 4 stimulus condition levels
TR = 2 sec; voxel dimensions = 3.75 x 3.75 x 5 mm
Sample size, n=7 (subjects ED, EE, EF, FH, FK, FL, FN)
Analysis Steps:
Part I: Process data for each subject first
Pre-process subjects’ data many steps involved here...
Run deconvolution analysis on each subject’s dataset --- 3dDeconvolve
Part II: Run group analysis
3-way Analysis of Variance (ANOVA) --- 3dANOVA3
i.e., Object Type (2) x Animation Type (2) x Subjects (7) = 3-way ANOVA
- 1 Anatomical (SPGR) dataset for each subject
- 124 sagittal slices
- 10 Time Series (EPI) datasets for each subject
- 23 axial slices x 138 volumes = 3174 volumes/timepoints per run
- note: each run consists of random presentations of rest and all 4 stimulus condition levels
- _TR_ = 2 sec; voxel dimensions = 3.75 x 3.75 x 5 mm
- Sample size, _n_=7 (subjects ED, EE, EF, FH, FK, FL, FN)
_**Analysis Steps**_**:**
- _**Part I**_: Process data for each subject first
- Pre-process subjects’ data many steps involved here...
- Run deconvolution analysis on each subject’s dataset --- **3dDeconvolve**
- _**Part II**_: Run group analysis
- 3-way Analysis of Variance (ANOVA) --- **3dANOVA3**
- i.e., Object Type (2) x Animation Type (2) x Subjects (7) = 3-way ANOVA
## PART I Process Data for each Subject First:
Hands-on example: Subject ED
We will begin with ED’s anat dataset and 10 time-series (3D+time) datasets:
EDspgr+orig, EDspgr+tlrc, ED_r01+orig, ED_r02+orig ... ED_r10+orig
Below is ED’s ED_r01+orig (3D+time) dataset. Notice the first two time points of the time series have relatively high intensities*. We will need to remove them later:
_**PART I **__****__** Process Data for each Subject First**_**:**
- Hands-on example: Subject **ED**
- We will begin with ED’s anat dataset and 10 time-series (3D+time) datasets:
**EDspgr+orig**, **EDspgr+tlrc**, **ED_r01+orig**, **ED_r02+orig** ... **ED_r10+orig**
- Below is ED’s **ED_r01+orig** (3D+time) dataset. Notice the first two time points of the time series have relatively high intensities*****. We will need to remove them later:
**Timepoints 0 and 1 have high intensity values**
** ****Images obtained during the first 4-6 seconds of scanning will have much larger intensities than images in the rest of the timeseries, when magnetization (and therefore intensity) has decreased to its steady state value **
## STEP 1: Check for possible “outliers” in each of the 10 time series datasets. The AFNI program to use is 3dToutcount (also run by default in to3d)
An outlier is usually seen as an isolated spike in the data, which may be due to a number of factors, such as subject head motion or scanner irregularities.
In any case, the outlier is not a true signal that results from presentation of a stimulus event, but rather, an artifact from something else -- it is noise.
foreach run (01 02 03 04 05 06 07 08 09 10)
3dToutcount -automask ED_r{$run}+orig \
> toutcount_r{$run}.1D
end
How does this program work? For each time series, the trend and Mean Absolute Deviation are calculated. Points far away from the trend are considered outliers. “Far away” is mathematically defined.
See 3dToutcount -help for specifics.
-automask: Does the outlier check only on voxels within the brain and ignores background voxels (which are detected by the program because of their smaller intensity values).
> : This is the “redirect” symbol in UNIX. Instead of displaying the results onto the screen, they are saved into a text file. In this example, the text files are called toutcount_r{$run}.1D.
- An outlier is usually seen as an isolated spike in the data, which may be due to a number of factors, such as subject head motion or scanner irregularities.
- In any case, the outlier is not a true signal that results from presentation of a stimulus event, but rather, an artifact from something else -- it is noise.
- **foreach run (01 02 03 04 05 06 07 08 09 10)**
- **3dToutcount -automask ED_r{$run}+orig \**
** **** **** **** ****> toutcount_r{$run}.1D**
** ****end**
- How does this program work? For each time series, the _trend_ and _Mean Absolute_ _Deviation_ are calculated. Points far away from the trend are considered outliers. “Far away” is mathematically defined.
- See 3dToutcount -help for specifics.
- _-automask_: Does the outlier check only on voxels within the brain and ignores background voxels (which are detected by the program because of their smaller intensity values).
- _>_ : This is the “redirect” symbol in UNIX. Instead of displaying the results onto the screen, they are saved into a text file. In this example, the text files are called toutcount_r{$run}.1D.
## Subject ED’s outlier files:
toutcount_r01.1D
toutcount_r02.1D
...
toutcount_r10.1D
Use AFNI 1dplot to display any one of ED’s outlier files. For example: 1dplot toutcount_r04.1D
- **toutcount_r01.1D**
** ****toutcount_r02.1D**** **
** **** ...**
** ****toutcount_r10.1D**
- Use AFNI **1dplot** to display any one of ED’s outlier files. For example: **1dplot toutcount_r04.1D**
_**Note**_**: “1D” is used to identify a text file. In this case, each file consists a column of 138 numbers (b/c of 138 time points).**
**High intensity values in the beginning are usually due to scanner attempting to reach steady state.**
**Outliers? If head motion, this should be cleared up with 3dvolreg. If due to something weird with the scanner, 3dDespike might work (but use sparingly).**
**time**
**Num. of ‘outlier’ voxels**
## STEP 2: Shift voxel time series so that separate slices are aligned to the same temporal origin using 3dTshift
The temporal alignment is done so it seems that all slices were acquired at the same time, i.e., the beginning of each TR.
The output dataset time series will be interpolated from the input to a new temporal grid. There are several interpolation methods to choose from, including ‘Fourier’, ‘linear’, ‘cubic’, ‘quintic’, and ‘heptic’.
foreach run (01 02 03 04 05 06 07 08 09 10)
3dTshift -tzero 0 -heptic \
-prefix ED_r{$run}_ts \
ED_r{$run}+orig
end
-tzero: Tells the program which slice’s time offset to align to. In this example, the slices are all aligned to the time offset of the first (0) slice.
-heptic: Use the 7th order Lagrange polynomial interpolation. Why 7th order? Bob Cox likes this (and that’s good enough for me).
- The temporal alignment is done so it seems that all slices were acquired at the same time, i.e., the beginning of each TR.
- The output dataset time series will be interpolated from the input to a new temporal grid. There are several interpolation methods to choose from, including ‘Fourier’, ‘linear’, ‘cubic’, ‘quintic’, and ‘heptic’.
- **foreach run (01 02 03 04 05 06 07 08 09 10)**
- **3dTshift -tzero 0 -heptic **** ****\**
- **-prefix ED_r{$run}_ts **** ****\**
- **ED_r{$run}+orig**
** ****end**
- _-tzero_: Tells the program which slice’s time offset to align to. In this example, the slices are all aligned to the time offset of the first (**0**) slice.
- _-heptic_: Use the 7th order Lagrange polynomial interpolation. Why 7th order? Bob Cox likes this (and that’s good enough for me).
## Subject ED’s newly created time shifted datasets:
ED_r01_ts+orig.HEAD ED_r01_ts+orig.BRIK
... ...
ED_r10_ts+orig.HEAD ED_r10_ts+orig.BRIK
Below is run 01 of ED’s time shifted dataset, ED_r01_ts+orig:
- Subject ED’s newly created time shifted datasets:
- **ED_r01_ts+orig.HEAD**** ****ED_r01_ts+orig.BRIK**
** **** ...**** **** **** ...**
** ****ED_r10_ts+orig.HEAD**** ****ED_r10_ts+orig.BRIK**
- Below is run 01 of ED’s time shifted dataset, **ED_r01_ts+orig**:
- Slice acquisition now in synchrony with beginning of TR
## STEP 3: Volume Register the voxel time series for each 3D+time dataset using AFNI program 3dvolreg
We will also remove the first 2 time points at this step
foreach run (01 02 03 04 05 06 07 08 09 10)
3dvolreg -verbose
-base ED_r01_ts+orig’[2]’ \
-prefix ED_r{$run}_vr \
-1Dfile dfile.r{$run}.1D \
ED_r{$run}_ts+orig’[2..137]’
end
-verbose: Prints out progress report onto screen
-base: Timepoint 2 is our base/target volume to which the remaining timepoints (3-137) will be aligned. We are ignoring timepoints 0 and 1
-prefix gives our output files a new name, e.g., ED_r01_vr+orig
-1Dfile: Save motion parameters for each run (roll, pitch, yaw, dS, dL, dP) into a file containing 6 ASCII formatted columns.
ED_r{$run}_ts+orig’[2..137]’ refers to our input datasets (runs 01-10) that will be volume registered. Notice that we are removing timepoints 0 and 1
- We will also remove the first 2 time points at this step
**foreach run (01 02 03 04 05 06 07 08 09 10)**
- **3dvolreg -verbose**
** **** **** **** ****-base ED_r01_ts+orig’[2]’ **** ****\**
- **-prefix ED_r{$run}_vr \**
- **-1Dfile dfile.r{$run}.1D**** ****\**
- **ED_r{$run}_ts+orig’[2..137]’**
** ****end**
- _-verbose_: Prints out progress report onto screen
- _-base_: Timepoint **2** is our base/target volume to which the remaining timepoints (3-137) will be aligned. We are ignoring timepoints 0 and 1
- _-prefix_ gives our output files a new name, e.g., ED_r01_vr+orig
- _-1Dfile_: Save motion parameters for each run (roll, pitch, yaw, dS, dL, dP) into a file containing 6 ASCII formatted columns.
- ED_r{$run}_ts+orig’[2..137]’ refers to our input datasets (runs 01-10) that will be volume registered. Notice that we are removing timepoints 0 and 1
## Subject ED’s newly created volume registered datasets:
ED_r01_vr+orig.HEAD ED_r01_vr+orig.BRIK
... ...
ED_r10_vr+orig.HEAD ED_r10_vr+orig.BRIK
Below is run 01 of ED’s volume registered datasets, ED_r01_vr+orig:
- **ED_r01_vr+orig.HEAD**** ****ED_r01_vr+orig.BRIK**
** **** ...**** **** **** ...**
** ****ED_r10_vr+orig.HEAD**** ****ED_r10_vr+orig.BRIK**
- Below is run 01 of ED’s volume registered datasets, **ED_r01_vr+orig**:
## STEP 4: Smooth 3D+time datasets with AFNI 3dmerge
The result of spatial blurring (filtering) is somewhat cleaner, more contiguous activation blobs
Spatial blurring will be done on ED’s time shifted, volume registered datasets:
foreach run (01 02 03 04 05 06 07 08 09 10)
3dmerge -1blur_fwhm 4 \
-doall \
-prefix ED_r{$run}_vr_bl \
ED_r{$run}_vr+orig
end
-1blur_fwhm 4 sets the Gaussian filter to have a full width half max of 4mm (You decide the type of filter and the width of the selected filter)
-doall applies the editing option (in this case the Gaussian filter) to all sub-bricks uniformly in each dataset
- The result of spatial blurring (filtering) is somewhat cleaner, more contiguous activation blobs
- Spatial blurring will be done on ED’s time shifted, volume registered datasets:
**foreach run (01 02 03 04 05 06 07 08 09 10)**
- **3dmerge -1blur_fwhm 4**** **** **** **** **** ****\**
- **-doall**** **** **** **** **** **** ****\**
- **-prefix ED_r{$run}_vr_bl **** ****\**
- **ED_r{$run}_vr+orig**
**end**
- -1blur_fwhm 4 sets the Gaussian filter to have a full width half max of 4mm (You decide the type of filter and the width of the selected filter)
- _-doall_ applies the editing option (in this case the Gaussian filter) to all sub-bricks uniformly in each dataset
## Result from 3dmerge:
**Before blurring**
**After blurring**
- Result from **3dmerge**:
**ED_r01_vr+orig**
**ED_r01_vr_bl+orig**
## STEP 5: Scaling the Data - i.e., Calculating Percent Change
This particular step is a bit more involved, because it is comprised of three parts. Each part will be described in detail:
Create a mask so that all background values (outside of the volume) are set to zero with 3dAutomask
Do a voxel-by-voxel calculation of the mean intensity value with 3dTstat
Do a voxel-by-voxel calculation of the percent signal change with 3dcalc
Why should we scale our data?
Scaling becomes an important issue when comparing data across subjects, because baseline/rest states will vary from subject to subject
The amount of activation in response to a stimulus event will also vary from subject to subject
As a result, the baseline Impulse Response Function (IRF) and the stimulus IRF will vary from subject to subject -- we must account for this variability
By converting to percent change, we can compare the activation calibrated with the relative change of signal, instead of the arbitrary baseline of FMRI signal
- This particular step is a bit more involved, because it is comprised of three parts. Each part will be described in detail:
- Create a mask so that all background values (outside of the volume) are set to zero with **3dAutomask**
- Do a voxel-by-voxel calculation of the mean intensity value with **3dTstat**
- Do a voxel-by-voxel calculation of the percent signal change with **3dcalc**
- _Why should we scale our data_?
- Scaling becomes an important issue when comparing data *across* subjects, because baseline/rest states will vary from subject to subject
- The amount of activation in response to a stimulus event will also vary from subject to subject
- As a result, the baseline Impulse Response Function (IRF) and the stimulus IRF will vary from subject to subject -- we must account for this variability
- By converting to percent change, we can compare the activation calibrated with the relative change of signal, instead of the arbitrary baseline of FMRI signal
## For example:
Subject 1 - Signal in hippocampus goes from 1000 (baseline) to 1050 (stimulus condition)
Difference = 50 IRF units
Subject 2 - Signal in hippocampus goes from 500 (baseline) to 525 (stimulus condition)
Difference = 25 IRF units
Conclusion:
Subject 1 shows twice as much activation in response to the stimulus condition than does Subject 2 --- WRONG!!
If ANOVA were run on these difference scores, the change in baseline from subject to subject would add variance to the analysis
We must control for these differences in baseline across subjects by somehow normalizing the baseline so that a reliable comparison between subjects can be made
- ***Subject 1*** - Signal in hippocampus goes from 1000 (baseline) to 1050 (stimulus condition)
- Difference = **50** IRF units
- ***Subject 2*** - Signal in hippocampus goes from 500 (baseline) to 525 (stimulus condition)
- Difference = **25** IRF units
- Conclusion:
- Subject 1 shows *twice* as much activation in response to the stimulus condition than does Subject 2 --- **WRONG!!**
- If ANOVA were run on these difference scores, the change in baseline from subject to subject would add *variance* to the analysis
- We must control for these differences in baseline across subjects by somehow normalizing the baseline so that a reliable comparison between subjects can be made
## Solution:
Compute Percent Signal Change
i.e., by what percent does the Impulse Response Function increase with presentation of the stimulus condition, relative to baseline?
Percent Change Calculation:
If A = Stimulus IRF
If B = Baseline IRF
Percent Signal Change = (A/B) * 100%
- Compute **Percent Signal Change**
- i.e., by what percent does the Impulse Response Function increase with presentation of the stimulus condition, relative to baseline?
- Percent Change Calculation:
- If **A** = _Stimulus IRF_
- If **B** = _Baseline IRF_
- **Percent Signal Change** =** (A/B) * 100%**
## Subject 1 -- Stimulus (A) = 1050, Baseline (B) = 1000
(1050/1000) * 100% = 105% or 5% increase in IRF
Subject 2 -- Stimulus (A) = 525, Baseline (B) = 500
(525/500) * 100% = 105% or 5% increase in IRF
Conclusion:
Both subjects show a 5% increase in signal change from baseline to stimulus condition
Therefore, no significant difference in signal change between these two subjects
- (1050/1000) * 100% = 105% or _**5% increase in IRF**_
***Subject 2*** -- Stimulus (A) = 525, Baseline (B) = 500
** **** **
- (525/500) * 100% = 105% or _**5% increase in IRF**_
- Conclusion:
- Both subjects show a ***5% increase*** in signal change from baseline to stimulus condition
- Therefore, no significant difference in signal change between these two subjects
## STEP 5A: Ignore any background values in a dataset by creating a mask with 3dAutomask
Values in the background have very low baseline values, which can lead to artificially large percent signal change values. Let’s remove them altogether by creating a mask of our dataset, where values inside the brain are assigned a value of “1” and values outside of the brain (e.g., noise) are assigned a value of “0”
This mask will be used later when the percent signal change in each voxel is calculated. A percent change will be computed only for voxels inside the mask
A mask will be created for each of Subject ED’s time shifted/volume registered/blurred 3D+time datasets:
foreach run (01 02 03 04 05 06 07 08 09 10)
3dAutomask -dilate 1 -prefix mask_r{$run} \
ED_r{$run}_vr_bl+orig
end
Output of 3dAutomask: A mask dataset for each 3D+time dataset:
mask_r01+orig, mask_r02+orig ... mask_r10+orig
- Values in the background have very low baseline values, which can lead to artificially large percent signal change values. Let’s remove them altogether by creating a mask of our dataset, where values inside the brain are assigned a value of “1” and values outside of the brain (e.g., noise) are assigned a value of “0”
- This mask will be used later when the percent signal change in each voxel is calculated. A percent change will be computed only for voxels inside the mask
- A mask will be created for each of Subject ED’s time shifted/volume registered/blurred 3D+time datasets:
- **foreach run (01 02 03 04 05 06 07 08 09 10)**
** **** ****3dAutomask -dilate 1 -prefix mask_r{$run} \**
** **** **** **** ****ED_r{$run}_vr_bl+orig**
** ****end**
- Output of **3dAutomask**: A mask dataset for each 3D+time dataset:
** **** ****mask_r01+orig****, ****mask_r02+orig**** ... ****mask_r10+orig**
## Now let’s take those 10 masks (we don’t need 10 separate masks) and combine them to make one master or “full mask”, which will be used to calculate the percent signal change only for values inside the mask (i.e., inside the brain).
3dcalc -- one of the most versatile AFNI programs -- is used to combine the 10 masks into one:
3dcalc -a mask_r01+orig -b mask_r02+orig -c mask_r03+orig \
-d mask_r04+orig -e mask_r05+orig -f mask_r06+orig \
-g mask_r07+orig -h mask_r08+orig -i mask_r09+orig \
-j mask_r10+orig \
-expr ‘or(a+b+c+d+e+f+g+h+i+j)’ \
-prefix full_mask
Output: full_mask+orig:
**3dcalc** -- one of the most versatile AFNI programs -- is used to combine the 10 masks into one:
- **3dcalc** **-a mask_r01+orig -b mask_r02+orig -c mask_r03+orig \**
- **-d mask_r04+orig -e mask_r05+orig -f mask_r06+orig \**
- **-g mask_r07+orig -h mask_r08+orig -i mask_r09+orig \**
- **-j mask_r10+orig**** **** **** **** **** **** **** \**
- **-expr ‘or(a+b+c+d+e+f+g+h+i+j)’**** **** **** \**
- **-prefix full_mask**
- Output: **full_mask+orig**:
- _-expr ‘or’_: Used to determine whether voxels along the edges make it to the full mask or not. If an edge voxel has a “1” value in *any* of the individual masks, the ‘or’ keeps that voxel as part of the full mask.
## STEP 5B: Create a voxel-by-voxel mean for each timeseries dataset with 3dTstat
For each voxel, add the intensity values of the 136 time points and divide by 136
The resulting mean will be inserted into the “B” slot of our percent signal change equation (A/B*100%)
foreach run (01 02 03 04 05 06 07 08 09 10)
3dTstat -prefix mean_r{$run} \
ED_r{$run}_vr_bl+orig
end
Unless otherwise specified, the default statistic for 3dTstat is to compute a voxel-by-voxel mean
Other statistics run by 3dTstat include a voxel-by-voxel standard deviation, slope, median, etc...
- For each voxel, add the intensity values of the 136 time points and divide by 136
- The resulting mean will be inserted into the “B” slot of our percent signal change equation (A/**B***100%)
- **foreach run (01 02 03 04 05 06 07 08 09 10)**
** **** **** ****3dTstat -prefix mean_r{$run} \**
** **** **** ****ED_r{$run}_vr_bl+orig**** **
** **** ****end**
- Unless otherwise specified, the default statistic for **3dTstat** is to compute a voxel-by-voxel mean
- Other statistics run by **3dTstat** include a voxel-by-voxel standard deviation, slope, median, etc...
## The end result will be a dataset consisting of a single mean value in each voxel. Below is a graph of a 3x3 voxel matrix from subject ED’s dataset mean_r01+orig:
**ED_r01_vr_bl+orig**
**mean_r01+orig**
- Timept 0: 1530
- + TP 1: 1515
- + TP 2: 1498
- + TP ...
- + TP 135: 1522
- Divide sum by 136
- Mean = 1523.346
## STEP 5C: Calculate a voxel-by-voxel percent signal change with 3dcalc
Take the 136 intensity values within each voxel, divide each one by the mean intensity value for that voxel (that we calculated in Step 3B), and multiply by 100 to get a percent signal change at each timepoint
This is where the A/B*100 equation comes into play
foreach run (01 02 03 04 05 06 07 08 09 10)
3dcalc -a ED_r{$run}_vr_bl+orig \
-b mean_r{$run}+orig \
-c full_mask+orig \
-expr “(a/b * 100) * c” \
-prefix scaled_r{$run}
end
Output of 3dcalc: 10 scaled datasets for Subject ED, where the signal intensity value at each timepoint has now been replaced with a percent signal change value
scaled_r01+orig, scaled_r02+orig ... scaled_r10+orig
- Take the 136 intensity values within each voxel, divide each one by the *mean* intensity value for that voxel (that we calculated in Step 3B), and multiply by 100 to get a percent signal change at each timepoint
- This is where the **A/B*100** equation comes into play
- **foreach run (01 02 03 04 05 06 07 08 09 10)**
** **** ****3dcalc**** ****-a ED_r{$run}_vr_bl+orig**** ****\**
** **** **** ****-b mean_r{$run}+orig**** **** **** ****\**
** **** **** ****-c full_mask+orig**** **** **** ****\**
** **** **** ****-expr “(a/b * 100) * c” **** ****\**
** **** **** ****-prefix scaled_r{$run}**** **
** ****end**
- Output of **3dcalc**: 10 scaled datasets for Subject ED, where the signal intensity value at each timepoint has now been replaced with a percent signal change value
- **scaled_r01+orig****,**** scaled_r02+orig**** ...** **scaled_r10+orig**
## E.g., Timepoint #18 above shows a percent signal change value of 101.7501
i.e., relative to the baseline (of 100), the stimulus presentation (and noise too) resulted in a percent signal change of 1.7501% at that specific timepoint
- i.e., relative to the baseline (of 100), the stimulus presentation (and noise too) resulted in a percent signal change of 1.7501% at that specific timepoint
**Timepoint #18**
**Shows index coordinates for highlighted voxel**
**Displays the timepoint highlighted in center voxel and its percent signal change value**
**scaled_r01+orig**
## STEP 6: Concatenate ED’s 10 scaled datasets into one big dataset with 3dTcat
3dTcat -prefix ED_all_runs \
scaled_r??+orig
The ?? Takes the place of having to type out each individual run, such as scaled_01+orig, scaled_r02+orig, etc. This is a helpful UNIX shortcut. You could also use the wildcard *
The output from 3dTcat is one big dataset -- ED_all_runs+orig -- which consists of 1360 volumes (i.e., 10 runs x 136 timepoints). Every voxel in this large dataset contains percent signal change values
This output file will be inserted into the 3dDeconvolve program
Do you recall those motion parameter files we created when running 3dvolreg? (No? See page 8 of this handout). We need to concatenate those files too because they will be inserted into the 3dDeconvolve command as Regressors of No Interest (RONI’s).
The UNIX program cat will concatenate these ASCII files:
cat dfile.r??.1D > dfile.all.1D
** **** **** ****3dTcat **** ****-prefix ED_all_runs**** ****\**
** **** **** **** ****scaled_r??+orig**** **
** **** **** **** **
- The **??** Takes the place of having to type out each individual run, such as **scaled_01+orig**, **scaled_r02+orig**, etc. This is a helpful UNIX shortcut. You could also use the wildcard *
- The output from **3dTcat** is one big dataset -- **ED_all_runs+orig** -- which consists of _1360_ volumes (i.e., 10 runs x 136 timepoints). Every voxel in this large dataset contains percent signal change values
- This output file will be inserted into the** ****3dDeconvolve** program
- Do you recall those motion parameter files we created when running **3dvolreg**? (No? See page 8 of this handout). We need to concatenate those files too because they will be inserted into the **3dDeconvolve** command as Regressors of No Interest (RONI’s).
- The UNIX program **cat** will concatenate these ASCII files:
- **cat dfile.r??.1D > dfile.all.1D**
## STEP 7: Perform a deconvolution analysis on Subject ED’s data with 3dDeconvolve
What is the difference between regular linear regression and deconvolution analysis?
With linear regression, the hemodynamic response is already assumed (we can get a fixed hemodynamic model by running the AFNI waver program)
With deconvolution analysis, the hemodynamic response is not assumed. Instead, it is computed by 3dDeconvolve from the data
Once the HRF is modeled by 3dDeconvolve, the program then runs a linear regression on the data
To compute the hemodynamic response function with 3dDeconvolve, we include the “minlag” and “maxlag” options on the command line
The user (you) must determine the lag time of an input stimulus
1 lag = 1 TR = 2 seconds
In this example, the lag time of the input stimulus has been determined to be about 15 lags (decided by the wise and all-knowing experimenter)
As such, we will add a “minlag” of 0 and a “maxlag” of 14 in our 3dDeconvolve command
- What is the difference between regular linear regression and deconvolution analysis?
- With _linear regression_, the hemodynamic response is already assumed (we can get a fixed hemodynamic model by running the AFNI **waver** program)
- With _deconvolution analysis_, the hemodynamic response is not assumed. Instead, it is computed by** ****3dDeconvolve** from the data
- Once the HRF is modeled by **3dDeconvolve**, the program then runs a linear regression on the data
- To compute the hemodynamic response function with **3dDeconvolve**, we include the “**minlag**” and “**maxlag**” options on the command line
- The user (you) must determine the lag time of an input stimulus
- 1 lag = 1 TR = 2 seconds
- In this example, the lag time of the input stimulus has been determined to be about 15 lags (decided by the wise and all-knowing experimenter)
- As such, we will add a “minlag” of **0** and a “maxlag” of **14** in our **3dDeconvolve** command
## 3dDeconvolve command - Part 1
3dDeconvolve -polort 2
-input ED_all_runs+orig -num_stimts 10 \
-concat ../misc_files/runs.1D \
-stim_file 1 ../misc_files/all_stims.1D’[0]’ \
-stim_label 1 ToolMovie \
-stim_minlag 1 0 -stim_maxlag 1 14 -stim_nptr 1 2 \
-stim_file 2 ../misc_files/all_stims.1D’[1]’ \
-stim_label 2 HumanMovie \
-stim_minlag 2 0 -stim_maxlag 2 14 -stim_nptr 2 2 \
-stim_file 3 ../misc_files/all_stims.1D’[2]’ \
-stim_label 3 ToolPoint \
-stim_minlag 3 0 -stim_maxlag 3 14 -stim_nptr 3 2 \
-stim_file 4 ../misc_files/all_stims.1D’[3]’ \
-stim_label 4 HumanPoint \
-stim_minlag 4 0 -stim_maxlag 4 14 -stim_nptr 4 2 \
**3dDeconvolve ****-polort 2**
** ****-input ED_all_runs+orig**** -num_stimts 10**** **** **** ****\**
** ****-concat ../misc_files/runs.1D**** **** **** **** ****\**
** ****-stim_file 1 ../misc_files/****all_stims.1D’[0]’**** **** **** ****\**
** **** ****-stim_label 1**** ****ToolMovie**** **** **** **** **** ****\**
** **** ****-stim_minlag ****1 0**** -stim_maxlag ****1 14**** -stim_nptr 1 2**** ****\**
** ****-stim_file 2 ../misc_files/****all_stims.1D’[1]’**** **** **** ****\**
** **** ****-stim_label 2 HumanMovie**** **** **** **** **** ****\**
** **** ****-stim_minlag ****2 0**** -stim_maxlag ****2 14**** -stim_nptr 2 2**** ****\**
** ****-stim_file 3 ../misc_files/****all_stims.1D’[2]’**** **** **** ****\**
** **** ****-stim_label 3 ToolPoint**** **** **** **** **** ****\**
** **** ****-stim_minlag ****3 0**** -stim_maxlag ****3 14**** -stim_nptr 3 2**** ****\**
** ****-stim_file 4 ../misc_files/****all_stims.1D’[3]’**** **** **** ****\**
** **** ****-stim_label 4 HumanPoint**** **** **** **** ****\**
** **** ****-stim_minlag**** 4 0 ****-stim_maxlag**** 4 14**** ****-stim_nptr 4 2**** ****\**
** **
**Experimenter estimates the HRF will last ~15 sec**
**# of stimulus function pts per TR. Default = 1. Here it’s set to 2**
**Our stim files for each stim condition**
**Concatenated 10 runs for subject ED**
**Our baseline is quadratic (default is “linear”)**
*Continued on next page...*
## 3dDeconvolve command - Part 2
-stim_file 5 dfile.all.1D’[0]’ -stim_base 5 \
-stim_file 6 dfile.all.1D’[1]’ -stim_base 6 \
-stim_file 7 dfile.all.1D’[2]’ -stim_base 7 \
-stim_file 8 dfile.all.1D’[3]’ -stim_base 8 \
-stim_file 9 dfile.all.1D’[4]’ -stim_base 9 \
-stim_file 10 dfile.all.1D’[5]’ -stim_base 10 \
-gltsym ../misc_files/contrast1.1D -glt_label 1 FullF \
-gltsym ../misc_files/contrast2.1D -glt_label 2 HvsT \
-gltsym ../misc_files/contrast3.1D -glt_label 3 MvsP \
-gltsym ../misc_files/contrast4.1D -glt_label 4 HMvsHP \
-gltsym ../misc_files/contrast5.1D -glt_label 5 TMvsTP \
-gltsym ../misc_files/contrast6.1D -glt_label 6 HPvsTP \
-gltsym ../misc_files/contrast7.1D -glt_label 7 HMvsTM \
** **
** ****-stim_file 5 ****dfile.all.1D’[0]’**** ****-stim_base 5**** **** **** ****\**
** ****-stim_file 6 dfile.all.1D’[1]’ -stim_base 6 **** **** ****\**
** ****-stim_file 7 dfile.all.1D’[2]’ -stim_base 7 **** **** ****\**
** ****-stim_file 8 dfile.all.1D’[3]’ -stim_base 8 **** **** ****\**
** ****-stim_file 9 dfile.all.1D’[4]’ -stim_base 9 **** **** ****\**
** ****-stim_file 10 dfile.all.1D’[5]’ -stim_base 10 **** **** ****\**
** ****-gltsym ../misc_files/contrast1.1D -glt_label 1 FullF**** ****\**
- **-gltsym ../misc_files/contrast2.1D -glt_label 2 HvsT**** ****\**
- **-gltsym ../misc_files/contrast3.1D -glt_label 3 MvsP**** ****\**
** ****-gltsym ../misc_files/contrast4.1D -glt_label 4 HMvsHP**** ****\**
- **-gltsym ../misc_files/contrast5.1D -glt_label 5 TMvsTP**** ****\**
- **-gltsym ../misc_files/contrast6.1D -glt_label 6 HPvsTP**** ****\**
- **-gltsym**** ../misc_files/contrast7.1D -glt_label 7 HMvsTM**** ****\**
**General Linear Tests, “Symbolic” usage.**
**E.g., ****+[Human Movie] -[Tool Movie]**
**rather than ****-glt**** option, e.g., ****30@0 1 -1 0 0**
**RONI’s**
**RONI’s are part of the baseline model**
*Continued on next page...*
## 3dDeconvolve command - Part 3
-iresp 1 TMirf
-iresp 2 HMirf
-iresp 3 TPirf
-iresp 4 HPirf
-full_first -fout -tout -nobout
-xpeg Xmat
-bucket ED_func
** **
** **
** ****-iresp 1 TMirf**
** ****-iresp 2 HMirf**
** ****-iresp 3 TPirf**
** ****-iresp 4 HPirf**
** ****-full_first -fout -tout -nobout**
** ****-xpeg Xmat**
** ****-bucket ED_func**
**Writes a JPEG file graphing the X matrix**
**Show Full-F first in bucket dataset, compute F-tests, compute t-tests, don’t show output of baseline coefficients in bucket dataset**
*Done with 3dDeconvolve command*
**irf**** files show the voxel-by-voxel impulse response function for each stimulus condition. Recall that the IRF was modeled using ‘min’ and ‘max’ lag options (more explanation on p.27).**
## -iresp 1 TMirf
-iresp 2 HMirf
-iresp 3 TPirf
-iresp 4 HPirf
These output files are important because they contain the estimated Impulse Response Function for each stimulus type
The percent signal change is shown at each time lag
Below is the estimated IRF for Subject ED’s “Human Movies” (HM) condition:
** ****-iresp 2 HMirf **
** ****-iresp 3 TPirf **
** ****-iresp 4 HPirf**
- These output files are important because they contain the estimated Impulse Response Function for each stimulus type
- The percent signal change is shown at each time lag
- Below is the estimated IRF for Subject ED’s “Human Movies” (HM) condition:
**Switch UnderLay:**** HMirf+orig**
**Switch OverLay:**** ED_func+orig**
## Focusing on a single voxel (from ED’s HMirf+orig dataset), we can see that the IRF is made up of 15 time lags (0-14). Recall that this lag duration was determined in the 3dDeconvolve command
Each time lag consists of a percent signal change value:
- Focusing on a single voxel (from ED’s **HMirf+orig** dataset), we can see that the IRF is made up of 15 time lags (0-14). Recall that this lag duration was determined in the **3dDeconvolve** command
- Each time lag consists of a percent signal change value:
## To run an ANOVA, only one data point can exist in each voxel
As such, the percent signal change values in the 15 lags must be averaged
In the voxel displayed below, the mean percent signal change = 1.957%
- As such, the percent signal change values in the 15 lags must be averaged
- In the voxel displayed below, the **mean percent signal change =** **1.957%**
**+**
**Mean % sig. chg,. (lags 0-14) = 1.957%**
## STEP 8: Use AFNI 3dbucket to slim down the functional dataset bucket, i.e., create a mini-bucket that contains only the sub- bricks you’re interested in
There are 152 sub-bricks in ED_func+orig.BRIK. Select the most relevant ones for further analysis and ignore the rest for now.
3dbucket -prefix ED_func_slim \
-fbuc ED_func+orig’[0,125..151]’
- There are 152 sub-bricks in **ED_func+orig.BRIK**. Select the most relevant ones for further analysis and ignore the rest for now.
** **
** **** **
** **** ****3dbucket -prefix ED_func_slim \**
** **** **** **** ****-fbuc ED_func+orig’[0,125..151]’**
## STEP 9: Compute a voxel-by-voxel mean percent signal change with AFNI 3dTstat
The following 3dTstat command will compute a voxel-by-voxel mean for each IRF dataset, of which we have four: TMirf, HMirf, TPirf, HPirf
foreach cond (TM HM TP HP)
3dTstat -prefix ED_{$cond}_irf_mean \
{$cond}irf+orig
end
- The following **3dTstat** command will compute a voxel-by-voxel mean for each IRF dataset, of which we have four: **TMirf**, **HMirf**, **TPirf**, **HPirf**
** ****foreach cond (TM HM TP HP)**
** **** ****3dTstat**** **** -prefix ED_{$cond}_irf_mean \**
** **** **** **** ****{$cond}irf+orig**
** ****end**
## The output from 3dTstat will be four irf_mean datasets, one for each stimulus type. Below are subject ED’s averaged IRF datasets:
ED_TM_irf_mean+orig ED_HM_irf_mean+orig
ED_TP_irf_mean+orig ED_HP_irf_mean+orig
Each voxel will now contain a single number (i.e., the mean percent signal change). For example:
- **ED_TM_irf_mean+orig**** ****ED_HM_irf_mean+orig**
- **ED_TP_irf_mean+orig**** ****ED_HP_irf_mean+orig**
- Each voxel will now contain a single number (i.e., the mean percent signal change). For example:
**ED_HM_irf_mean+orig**
## STEP 10: Resample the mean IRF datasets for each subject to the same grid as their Talairached anatomical datasets with adwarp
For statistical comparisons made across subjects, all datasets -- including functional overlays -- should be standardized (e.g., Talairach format) to control for variability in brain shape and size
foreach cond (TM HM TP HP)
adwarp -apar EDspgr+tlrc -dxyz 3 \
-dpar ED_{$cond}_irf_mean+orig \
end
The output of adwarp will be four Talairach transformed IRF datasets.
ED_TM_irf_mean+tlrc ED_HM_irf_mean+tlrc
ED_TP_irf_mean+tlrc ED_HP_irf_mean+tlrc
We are now done with Part 1-- Process Individual Subjects’ Data -- for Subject ED
Go back and follow the same steps for remaining 6 subjects
We can now move on to Part 2 -- RUN GROUP ANALYSIS (ANOVA)
- For statistical comparisons made across subjects, all datasets -- including functional overlays -- should be standardized (e.g., Talairach format) to control for variability in brain shape and size
- **foreach cond (TM HM TP HP)**
** **** ****adwarp**** ****-apar EDspgr+tlrc -dxyz 3**** **** \**
** **** **** ****-dpar ED_{$cond}_irf_mean+orig \**
** ****end**
- The output of **adwarp** will be four Talairach transformed IRF datasets.
- **ED_TM_irf_mean+tlrc**** **** ED_HM_irf_mean+tlrc**
- **ED_TP_irf_mean+tlrc**** **** ED_HP_irf_mean+tlrc**
- We are now done with Part 1-- Process Individual Subjects’ Data -- for Subject ED
- Go back and follow the same steps for remaining 6 subjects
- We can now move on to Part 2 -- RUN GROUP ANALYSIS (ANOVA)
## PART 2 Run Group Analysis (ANOVA3):
In our sample experiment, we have 3 factors (or Independent Variables) for our analysis of variance: “Stimulus Condition” and “Subjects”
IV 1: OBJECT TYPE 2 levels
Tools (T)
Humans (H)
IV 2: ANIMATION TYPE 2 levels
Movies (M)
Point-light displays (P)
IV 3: SUBJECTS 7 levels (note: this is a small sample size!)
Subjects ED, EE, EF, FH, FK, FL, FN
The mean IRF datasets from each subject will be needed for the ANOVA. Example:
ED_TM_irf_mean+tlrc EE_TM_irf_mean+tlrc EF_TM_irf_mean+tlrc
ED_HM_irf_mean+tlrc EE_HM_irf_mean+tlrc EF_HM_irf_mean+tlrc
ED_TP_irf_mean+tlrc EE_TP_irf_mean+tlrc EF_TP_irf_mean+tlrc
ED_HP_irf_mean+tlrc EE_HP_irf_mean+tlrc EF_HP_irf_mean+tlrc
- In our sample experiment, we have 3 factors (or Independent Variables) for our analysis of variance: “Stimulus Condition” and “Subjects”
- IV 1: OBJECT TYPE 2 levels
- Tools (T)
- Humans (H)
- IV 2: ANIMATION TYPE 2 levels
- Movies (M)
- Point-light displays (P)
- IV 3: SUBJECTS 7 levels *(note: this is a small sample size!)*
- Subjects ED, EE, EF, FH, FK, FL, FN
- The mean IRF datasets from each subject will be needed for the ANOVA. Example:
- **ED_TM_irf_mean+tlrc**** ****EE_TM_irf_mean+tlrc**** ****EF_TM_irf_mean+tlrc**
- **ED_HM_irf_mean+tlrc**** ****EE_HM_irf_mean+tlrc**** ****EF_HM_irf_mean+tlrc**
- **ED_TP_irf_mean+tlrc**** ****EE_TP_irf_mean+tlrc**** ****EF_TP_irf_mean+tlrc**
- **ED_HP_irf_mean+tlrc**** ****EE_HP_irf_mean+tlrc**** ****EF_HP_irf_mean+tlrc**
## 3dANOVA3 Command - Part 1
3dANOVA3 -type 4 \
-alevels 2 \
-blevels 2 \
-clevels 7 \
-dset 1 1 ED_TM_irf_mean+tlrc \
-dset 2 1 ED_HM_irf_mean+tlrc \
-dset 3 1 ED_TP_irf_mean+tlrc \
-dset 4 1 ED_HP_irf_mean+tlrc \
-dset 1 2 EE_TM_irf_mean+tlrc \
-dset 2 2 EE_HM_irf_mean+tlrc \
-dset 3 2 EE_TP_irf_mean+tlrc \
-dset 4 2 EE_HP_irf_mean+tlrc \
-dset 1 3 EF_TM_irf_mean+tlrc \
-dset 2 3 EF_HM_irf_mean+tlrc \
-dset 3 3 EF_TP_irf_mean+tlrc \
-dset 4 3 EF_HP_irf_mean+tlrc \
*Continued on next page...*
**irf**** datasets, created for each subj with 3dDeconvolve (See p.26)**
**IV A: Object**
**IV B: Animation**
**IV C: Subjects**
_**3dANOVA3 Command - Part 1**_
** **** ****3dANOVA3**** ****-type 4 **** **** **** ****\**
** **** **** ****-alevels 2 **** **** **** ****\**
** **** **** ****-blevels 2 **** **** **** ****\**
** **** **** ****-clevels 7**** **** **** ****\**
** **** **** ****-dset 1 1 ****ED_TM_irf_mean+tlrc**** \**
** **** **** ****-dset 2 1 ****ED_HM_irf_mean+tlrc**** \**
** **** **** ****-dset 3 1 ****ED_TP_irf_mean+tlrc**** \**
** **** **** ****-dset 4 1 ****ED_HP_irf_mean+tlrc**** \**
** **** **** ****-dset 1 2 ****EE_TM_irf_mean+tlrc**** \**
** **** **** ****-dset 2 2 ****EE_HM_irf_mean+tlrc**** \**
** **** **** ****-dset 3 2 ****EE_TP_irf_mean+tlrc**** \**
** **** **** ****-dset 4 2 ****EE_HP_irf_mean+tlrc**** \**
** **** **** ****-dset 1 3 ****EF_TM_irf_mean+tlrc**** \**
** **** **** ****-dset 2 3 ****EF_HM_irf_mean+tlrc**** \**
** **** **** ****-dset 3 3 ****EF_TP_irf_mean+tlrc**** \**
** **** **** ****-dset 4 3 ****EF_HP_irf_mean+tlrc**** \**
** **** **** **
**IV’s A & B are fixed, C is random. See ****3dANOVA3 -help**
## 3dANOVA3 Command - Part 2
-dset 1 1 FH_TM_irf_mean+tlrc \
-dset 2 1 FH_HM_irf_mean+tlrc \
-dset 3 1 FH_TP_irf_mean+tlrc \
-dset 4 1 FH_HP_irf_mean+tlrc \
-dset 1 2 FK_TM_irf_mean+tlrc \
-dset 2 2 FK_HM_irf_mean+tlrc \
-dset 3 2 FK_TP_irf_mean+tlrc \
-dset 4 2 FK_HP_irf_mean+tlrc \
-dset 1 3 FL_TM_irf_mean+tlrc \
-dset 2 3 FL_HM_irf_mean+tlrc \
-dset 3 3 FL_TP_irf_mean+tlrc \
-dset 4 3 FL_HP_irf_mean+tlrc \
-dset 1 3 FN_TM_irf_mean+tlrc \
-dset 2 3 FN_HM_irf_mean+tlrc \
-dset 3 3 FN_TP_irf_mean+tlrc \
-dset 4 3 FN_HP_irf_mean+tlrc \
** **** **** ****-dset 1 1 ****FH_TM_irf_mean+tlrc**** \**
** **** **** ****-dset 2 1 ****FH_HM_irf_mean+tlrc**** \**
** **** **** ****-dset 3 1 ****FH_TP_irf_mean+tlrc**** \**
** **** **** ****-dset 4 1 ****FH_HP_irf_mean+tlrc**** \**
** **** **** ****-dset 1 2 ****FK_TM_irf_mean+tlrc**** \**
** **** **** ****-dset 2 2 ****FK_HM_irf_mean+tlrc**** \**
** **** **** ****-dset 3 2 ****FK_TP_irf_mean+tlrc**** \**
** **** **** ****-dset 4 2 ****FK_HP_irf_mean+tlrc**** \**
** **** **** ****-dset 1 3 ****FL_TM_irf_mean+tlrc**** \**
** **** **** ****-dset 2 3 ****FL_HM_irf_mean+tlrc**** \**
** **** **** ****-dset 3 3 ****FL_TP_irf_mean+tlrc**** \**
** **** **** ****-dset 4 3 ****FL_HP_irf_mean+tlrc**** \**
** **** **** ****-dset 1 3 ****FN_TM_irf_mean+tlrc**** \**
** **** **** ****-dset 2 3 ****FN_HM_irf_mean+tlrc**** \**
** **** **** ****-dset 3 3 ****FN_TP_irf_mean+tlrc**** \**
** **** **** ****-dset 4 3 ****FN_HP_irf_mean+tlrc**** \**
** **** **** **
*Continued on next page...*
**more ****irf**** datasets**
## 3dANOVA3 Command - Part 3
-fa ObjEffect \
-fb AnimEffect \
-adiff 1 2 TvsH \
-bdiff 1 2 MvsP \
-acontr 1 -1 sameas.TvsH \
-bcontr 1 -1 sameas.MvsP \
-aBcontr 1 -1: 1 TMvsHM \
-aBcontr -1 1: 2 HPvsTP \
-Abcontr 1: 1 -1 TMvsTP \
-Abcontr 2: 1 -1 HMvsHP \
-bucket AvgAnova
** **** **** ****-fa ObjEffect**** **** **** ****\**
** **** **** ****-fb AnimEffect**** **** **** ****\**
** **** **** ****-adiff 1 2 TvsH**** **** ****\**
** **** **** ****-bdiff 1 2 MvsP**** **** ****\**
** **** **** ****-acontr 1 -1 sameas.TvsH**** ****\**
** **** **** ****-bcontr 1 -1 sameas.MvsP**** ****\**
** **** **** ****-aBcontr 1 -1: 1 TMvsHM**** ****\**
** **** **** ****-aBcontr -1 1: 2 HPvsTP**** ****\**
** **** **** ****-Abcontr 1: 1 -1 TMvsTP**** ****\**
** **** **** ****-Abcontr 2: 1 -1 HMvsHP**** ****\**
** **** **** ****-bucket AvgAnova**
** **** **** **
*End of ANOVA command*
**Produces main effect for factor ‘a’ (Object type). I.e., which voxels show increases in % signal change that is sig. Different from zero?**
**Main effect for factor ‘b’, (Animation type)**
**All F-tests, t-tests, etc will go into this dataset bucket**
**These are contrasts (t-tests). Explained on pp 38-39**
## -adiff: Performs contrasts between levels of factor ‘a’ (or -bdiff for factor ‘b’, -cdiff for factor ‘c’, etc), with no collapsing across levels of factor ‘a’.
E.g.1, Factor “Object Type” --> 2 levels: (1)Tools, (2)Humans:
-adiff 1 2 TvsH
E.g., 2, Factor “Faces” --> 3 levels: (1)Happy, (2)Sad, (3)Neutral
-adiff 1 2 HvsS
-adiff 2 3 SvsN
-adiff 1 3 HvsN
-acontr: Estimates contrasts among levels of factor ‘a’ (or -bcontr for factor ‘b’, -ccontr for factor ‘c’, etc). Allows for collapsing across levels of factor ‘a’
In our example, since we only have 2 levels for both factors ‘a’ and ‘b’, the -diff and -contr options can be used interchangeably. Their different usages can only be demonstrated with a factor that has 3 or more levels:
E.g.: factor ‘a’ = FACES --> 3 levels :(1) Happy, (2) Sad, (3) Neutral
-acontr 1 -1 -1 HvsSN
-acontr 1 1 -1 HSvsN
-acontr 1 -1 1 HNvsS
- E.g.1, Factor “Object Type” --> 2 levels: (1)Tools, (2)Humans:
- **-adiff 1 2 TvsH**** **
- E.g., 2, Factor “Faces” --> 3 levels: (1)Happy, (2)Sad, (3)Neutral
- **-adiff 1 2 HvsS**
- **-adiff 2 3 SvsN**
- **-adiff 1 3 HvsN**
_**-acontr**_: Estimates contrasts among levels of factor ‘a’ (or -bcontr for factor ‘b’, -ccontr for factor ‘c’, etc). *Allows* for collapsing across levels of factor ‘a’
- In our example, since we only have 2 levels for both factors ‘a’ and ‘b’, the **-diff** and **-contr** options can be used interchangeably. Their different usages can only be demonstrated with a factor that has 3 or more levels:
- E.g.: factor ‘a’ = FACES --> 3 levels :(1) Happy, (2) Sad, (3) Neutral
- **-acontr 1 -1 -1 HvsSN**
** **** ****-acontr 1 1 -1 HSvsN**
** **** ****-acontr 1 -1 1 HNvsS**
**Simple paired t-tests, no collapsing across levels, like Happy vs. Sad/Neutral**
**Happy vs. Sad/Neutral**
**Happy/Sad vs. Neutral**
**Happy/Neutral vs. Sad**
## -aBcontr: 2nd order contrast. Performs comparison between 2 levels of factor ‘a’ at a Fixed level of factor ‘B’
E.g. factor ‘a’ --> Tools(1) vs. Humans(-1),
factor ‘B’ --> Movies(1) vs. Points(2)
We want to compare ‘Tools Movies’ vs. ‘Human Movies’. Ignore ‘Points’
-aBcontr 1 -1 : 1 TMvsHM
We want to compare “Tool Points’ vs. ‘Human Points’. Ignore ‘Movies’
-aBcontr 1 -1 : 2 TPvsHP
-Abcontr: 2nd order contrast. Performs comparison between 2 levels of factor ‘b’ at a Fixed level of factor ‘A’
E.g., E.g. factor ‘b’ --> Movies(1) vs. Points(-1),
factor ‘A’ --> Tools(1) vs. Humans(2)
We want to compare ‘Tools Movies’ vs. ‘Tool Points’. Ignore ‘Humans
-Abcontr 1 : 1 -1 TMvsTP
We want to compare “Human Movies vs. ‘Human Points’. Ignore ‘Tools’
-Abcontr 2 : 1 -1 HMvsHP
- E.g. factor **‘a’** --> Tools(1) vs. Humans(-1),
- factor **‘B’** --> Movies(1) vs. Points(2)
- We want to compare ‘Tools Movies’ vs. ‘Human Movies’. Ignore ‘Points’
- **-aBcontr 1 -1 : 1 TMvsHM**** **
- We want to compare “Tool Points’ vs. ‘Human Points’. Ignore ‘Movies’
- **-aBcontr 1 -1 : 2 TPvsHP**
_**-Abcontr**_: 2nd order contrast. Performs comparison between 2 levels of factor **‘b’** at a *Fixed* level of factor **‘A’**
- E.g., E.g. factor **‘b’** --> Movies(1) vs. Points(-1),
- factor **‘A’** --> Tools(1) vs. Humans(2)
- We want to compare ‘Tools Movies’ vs. ‘Tool Points’. Ignore ‘Humans
- **-Abcontr 1 : 1 -1 TMvsTP**** **
- We want to compare “Human Movies vs. ‘Human Points’. Ignore ‘Tools’
- **-Abcontr 2 : 1 -1 HMvsHP**
## In class -- Let’s run the ANOVA together:
cd AFNI_data2
This directory contains a script called s3.anova.ht05 that will run 3dANOVA3
This script can be viewed with a text editor, like emacs
./s3.anova.ht05
execute the ANOVA script from the command line
cd group_data ; ls
result from ANOVA script is a bucket dataset AvgANOVA+tlrc, stored in the group_data/ directory
afni &
launch AFNI to view the results
**cd AFNI_data2**
- This directory contains a script called s3.anova.ht05 that will run 3dANOVA3
- This script can be viewed with a text editor, like **emacs**
**./s3.anova.ht05**
- execute the ANOVA script from the command line
**cd group_data ; ls**
- result from ANOVA script is a bucket dataset AvgANOVA+tlrc, stored in the group_data/ directory
**afni &**
- launch AFNI to view the results
- The output from **3dANOVA3** is bucket dataset **AvgANOVA+tlrc**, which contains 20 sub-bricks of data:
- i.e., main effect F-tests for factors A and B, 1st order contrasts, and 2nd order contrasts
## -fa: Produces a main effect for factor ‘a’
In this example, -fa determines which voxels show a percent signal change that is significantly different from zero when any level of factor “Object Type” is presented
-fa ObjEffect:
- In this example, -fa determines which voxels show a percent signal change that is significantly different from zero when any level of factor “Object Type” is presented
- **-fa ObjEffect**:
**Activated areas respond to OBJECTS in general (i.e., humans and/or tools)**
**ULay: ****sample_anat+tlrc**
**OLay: ****AvgANOVA+tlrc**
## Brain areas corresponding to “Tools” (reds) vs. “Humans” (blues)
-diff 1 2 TvsH (or -acontr 1 -1 TvsH)
- **-diff 1 2 TvsH **(or **-acontr 1 -1 TvsH**)** **
**Red blobs show statistically significant percent signal changes in response to “**_**Tools**_**.” Blue blobs show significant percent signal changes in response to “**_**Humans**_**” displays**
**ULay: ****sample_anat+tlrc**
**OLay: ****AvgANOVA+tlrc**
## Brain areas corresponding to “Human Movies” (reds) vs. “Humans Points” (blues)
-Abcontr 2: 1 -1 HMvsHP
- **-Abcontr 2: 1 -1 HMvsHP**
**Red blobs show statistically significant percent signal changes in response to “**_**Human Movies**_**.” Blue blobs show significant percent signal changes in response to “**_**Human Points**_**” displays**
**ULay: ****sample_anat+tlrc**
**OLay: ****AvgANOVA+tlrc**
## Many thanks to Mike Beauchamp for donating the data used in this lecture and in the how-to#5
For a full review of the experiment described in this lecture, see
Beauchamp, M.S., Lee, K.E., Haxby, J.V., & Martin, A. (2003). FMRI responses to video and point-light displays of moving humans and manipulable objects. Journal of Cognitive Neuroscience, 15:7, 991-1001.
For more information on AFNI ANOVA programs, visit the web page of Gang Chen, our wise and infinitely patient statistician:
http//afni.nimh.gov/sscc/gangc
- For a full review of the experiment described in this lecture, see
- Beauchamp, M.S., Lee, K.E., Haxby, J.V., & Martin, A. (2003). FMRI responses to video and point-light displays of moving humans and manipulable objects. _Journal of Cognitive Neuroscience_, _15:7_, 991-1001.
- For more information on AFNI ANOVA programs, visit the web page of Gang Chen, our wise and infinitely patient statistician:
- _http//afni.nimh.gov/sscc/gangc_
|
en
|
converted_docs
|
733333
|
> **Meeting Location*:***
>
> Hilton Silver Spring
>
> Capitol Ballroom
>
> 8727 Colesville Rd.
>
> Silver Spring, MD 20910
>
> Tel: (1) 301-589-5200
>
> Fax: (1) 301-588-1841
>
> [**[http://www.hilton.com/en/hi/hotels/index.jhtml?ctyhocn=DCASSHF]{.underline}**](http://www.watertownseattle.com/)
>
> **Meeting Dates and Times:**
>
> Wednesday, 28 June 2006
>
> *8:00 am -- 5:30 pm*
>
> *(SAB Executive Session from 8:00-10:00am)*
>
> Thursday, 29 June 2006
>
> *8:00 am -- 3:00 pm*
>
> **Lodging:**
>
> We have a block of 20 rooms at the Hilton Silver Spring listed at a
> conference rate of \$177.00 +tax. Meeting participants are encouraged
> to make their own hotel reservations before 7 June 2006 by calling
> 1--800-445-8667. You will need to mention "Climate Test Bed" to
> reserve under this room block.
>
> **How to get to the Hilton Silver Spring:**
>
> ***From BWI:***
>
> Distance from hotel: 25 mi.
>
> Drive time: 45 min.
>
> Directions: 95 South to I-495 West, Exit 30B - Colesville Road 2 miles
> South.
>
> Public Transportation:
+---------------------------------+------------------------------------+
| > **Type** | # Typical Charge |
+---------------------------------+------------------------------------+
| > Bus Service | > USD 30.00 |
+---------------------------------+------------------------------------+
| > Limousine | > USD 45.00 |
+---------------------------------+------------------------------------+
| > Taxi | > USD 35.00 |
+---------------------------------+------------------------------------+
> ***From Ronald Reagan National Airport:***
>
> Distance from hotel: 11 mi.
>
> Drive time: 30 min.
>
> Directions: George Washington Parkway to Beltway (I-495) North, Exit
> 30B-Colesville Road South 3 miles.
>
> Public Transportation:
## The metro/rail stop for the hotel is the Silver Spring stop on the red line. This is approximately 3 blocks from the hotel. Please call the hotel directly once you arrive and the can send a shuttle.
http://www.wmata.com/metrorail/systemmap.cfm
+---------------------------------+------------------------------------+
| > **Type** | # Typical Charge |
+---------------------------------+------------------------------------+
| > Metro/Rail | > USD 3.00 |
+---------------------------------+------------------------------------+
| > Limousine | > USD 50.00 |
+---------------------------------+------------------------------------+
| > Taxi | > USD 35.00 |
+---------------------------------+------------------------------------+
> ***From Dulles International:***
>
> Distance from hotel: 25 mi.
>
> Drive time: 45 min.
>
> Directions: Dulles Toll Road to I-495 East to Exit 30B, Colesville
> Road, South 2 Miles.
>
> Public Transportation:
+---------------------------------+------------------------------------+
| > **Type** | # Typical Charge |
+---------------------------------+------------------------------------+
| > Bus Service | > USD 35.00 |
+---------------------------------+------------------------------------+
| > Limousine | > USD 50.00 |
+---------------------------------+------------------------------------+
| > Taxi | > USD 40.00 |
+---------------------------------+------------------------------------+
> **Driving Directions:**
>
> **From Washington DC:** Take 16th St. NW heading North for 6 miles.
> Make a right on to Colesville Road. The hotel is located five blocks
> up on the right at the intersection on Colesville Road and Spring St.
>
> **From the Capitol Beltway (495):** Exit 30B (Route 29 South) - 1 mile
> South as you enter downtown Silver Spring, The hotel is on the left.
>
> **From Bethesda: From Wisconsion Ave., travel South on East West
> Highway towards Silver Spring. Travel approximatley 5 miles. Make a
> left on Colesville Road. Hotel will be 4 blocks up on the right at the
> intersection of Colesville Rd and Spring St. and Colesville Road.**
|
en
|
all-txt-docs
|
087830
|
This text file was formatted by the U.S. General Accounting Office (GAO)
to be accessible to users with visual impairments, as part of a longer term
project to improve GAO products' accessibility. Every attempt has been made
to maintain the structural and data integrity of the original printed product.
Accessibility features, such as alternative text descriptions for graphic
images, are provided but may not exactly duplicate the presentation or format
of the printed version. The portable document format (PDF) file is an exact
electronic replica of the printed version. We welcome your feedback. Please
E-mail your comments regarding the contents or accessibility features of this
document to [email protected].
Strategic Objective: The Education and Protection of the Nation's Children.
Issue: Educating and protecting children are important to the
continued vitality of this democratic society and to its long-term
ability to compete in a global marketplace. To this end, the federal
government invests more than $90 billion per year in programs that
foster the development, education, and protection of children from
childbirth through elementary and secondary school and postsecondary
education. Although federal spending is only about 7 percent of total
spending on education, the federal government's efforts are especially
important in ensuring that all children have the opportunity to meet
high academic standards from kindergarten through high school. The
government's postsecondary efforts provide access to higher education
for all through the use of loans, grants, and other financial tools,
while protecting the financial interests of taxpayers.
According to the most recently available data, the federal government
spent more than $9 billion in fiscal year 1999 on 29 programs that have
early childhood education or care as an objective. These programs,
including Head Start, are geared principally toward disadvantaged
children from infancy to age 5; a developmental period during which
early investment may lead to better performance in school years. Beyond
inherent concerns about fragmentation and overlap among these programs,
there is also concern about their effectiveness. Although the
Department of Health and Human Services (HHS) and the Department of
Education are sponsoring research on some of these programs, little is
known about their ultimate effect, especially on school-readiness and
early literacy skills; two areas at the center of the federal education
focus. Federal investment in child care has been growing, in part to
support low-income mothers who have entered the workforce due to
welfare reform (see fig. 1.2). Policymakers at the federal and state
levels are concerned about the cost, quality, and availability of child
care.
Figure 1.2: Growth of Federal Investment in Child Care, Fiscal Years
1997 through 2000.
Area graph showing dollars in millions with 4 groups and 2 items
per group.
Group 1, 1997, Total value of 2539.
Item 1, TANF value of 14.
Item 2, CCDF value of 2525.
Group 2, 1998, Total value of 3747.
Item 1, TANF value of 259.
Item 2, CCDF value of 3488.
Group 3, 1999, Total value of 5244.
Item 1, TANF value of 604.
Item 2, CCDF value of 4640.
Group 4, 2000, Total value of 6119.
Item 1, TANF value of 1060.
Item 2, CCDF value of 5059.
Note: Child Care and Development Fund (CCDF) amounts include dollars
states transferred from their Temporary Assistance for Needy Families
(TANF) programs to CCDF as allowed under the Personal Responsibility
and Work Opportunity Reconciliation Act of 1996. The amounts shown for
TANF include only those TANF funds expended for child care.
Source: Administration for Children and Families, HHS.
[End of Figure]
Federal elementary and secondary school programs are especially
designed to ensure that children in poor families and children who are
disadvantaged are given the opportunity to meet challenging academic
standards, which will give them the skills to succeed. The United
States places a high priority on educating its children at the
elementary and secondary levels and has increased the federal
investment from over $20 billion in fiscal year 2000 to nearly $30
billion in fiscal year 2002. However, this increased investment is
accompanied by an increased emphasis on accountability for schools to
raise all students to proficient levels in math and reading. With the
reauthorization of the Elementary and Secondary Education Act, the
Congress has placed additional requirements on states, beyond those in
the 1994 act. For example, the Congress required testing in three
additional grades and mandated actions for schools that fail to improve
the performance of their students. All students; including those from
poor families, with limited English proficiency, and with disabilities;
are expected to meet challenging academic standards. However, an
achievement gap exists between different groups of students, for
example between white and African American students and between white
and Hispanic students (see figs. 1.3 and 1.4). Dissatisfied with this
continued achievement gap, policymakers are exploring a variety of
school reform initiatives and strategies to improve school performance,
improve teaching, reduce student dropout rates, and enhance educational
options for the nation's children.
Figure 1.3: Achievement Gaps in Reading at Age 17.
Bar chart with 3 groups with 2 items per group showing score differences.
Group 1, calendar year 1994.
Item 1, Score differences between White and Black students' average scores, 30.
Item 2, Score differences between White and Hispanic students' average scores, 33.
Group 2, calendar year 1996.
Item 1, Score differences between White and Black students' average scores, 29.
Item 2, Score differences between White and Hispanic students' average scores, 30.
Group 3, calendar year 1999.
Item 1, Score differences between White and Black students' average scores, 31.
Item 2, Score differences between White and Hispanic students' average scores, 24.
Source: National Center for Education Statistics, National Assessment
of Educational Progress, 1999 Long-Term Trend Assessment.
[End of Figure]
Figure 1.4: Achievement Gaps in Math at Age 17.
Bar chart with 3 groups with 2 items per group showing score differences.
Group 1, calendar year 1994.
Item 1, Score difference between White and Black students' average scores, 27.
Item 2, Score differences between White and Hispanic students' average scores, 22.
Group 2, calendar year 1996.
Item 1, Score difference between White and Black students' average scores, 27.
Item 2, Score differences between White and Hispanic students' average scores, 21.
Group 3, calendar year 1999.
Item 1, Score difference between White and Black students' average scores, 31.
Item 2, Score differences between White and Hispanic students' average scores, 22.
Source: National Center for Education Statistics, National Assessment
of Educational Progress, 1999 Long-Term Trend Assessment.
[End of Figure]
The nation also needs to be concerned about protecting its children and
ensuring that families have the financial means to provide for their
children's needs. Each year, over 800,000 children are found to be the
victims of abuse and neglect by their parents, relatives, or other
caregivers. Tragically, over 1,000 children die each year from abuse
and neglect. While responsibility for investigating reports of abuse
and neglect and providing services to families falls primarily to state
child protective service agencies, the federal government invests
approximately $6 billion annually to provide care for children who need
placement outside their homes, services to help keep families together
or to reunite them, and training and research activities to improve
child welfare services nationwide. Moreover, nearly 23 million children
live with only one of their parents. To help obtain the financial
support noncustodial parents owe their children and to help single-
parent families achieve or maintain economic self-sufficiency, the
Congress established a joint federal/state child support enforcement
program in 1975 to help locate noncustodial parents, establish
paternity and child support obligations, and enforce child support.
Beyond providing for basic educational needs, a competitive national
economy depends, in part, on effectively preparing workers to compete
in the labor force. To this end, the federal government currently
supports over $50 billion annually to enhance students' access to
postsecondary, vocational, and adult education. In particular, the
government's investment in supporting college students with direct
loans and loan guarantees results in over $30 billion of new loans
annually. This is in addition to over $8 billion yearly for Pell grants
to college students from low-income families. The federal government
also provides higher education subsidies for students or their families
through such benefits as the Hope and lifetime learning tax credits and
the deferral of tax on the earnings of contributions to qualified state
tuition programs. These tax expenditures are just over $12 billion
annually. A major concern with the nation's investment in postsecondary
education is its exposure to significant losses. While student loan
default rates have decreased in recent years, student loan defaults
still cost the federal government billions of dollars each year. For
example, in fiscal year 2000, default costs for the Federal Family
Education Loan Program were about $1.4 billion, while defaults under
the Federal Direct Loan Program exceeded $600 million. The cumulative
principal amount outstanding from defaulted student loans stood at
about $22 billion in fiscal year 2001 (see fig. 1.5).
Figure 1.5: A Growing Balance of Defaulted Loans Is Subject to
Collection, 1993 through 2001.
Line graph with 1 line and 9 points showing billions of dollars.
Point 1, Fiscal year 1993 is 17.067.
Point 2, Fiscal year 1994 is 17.489.
Point 3, Fiscal year 1995 is 17.976.
Point 4, Fiscal year 1996 is 16.737.
Point 5, Fiscal year 1997 is 18.847.
Point 6, Fiscal year 1998 is 20.699.
Point 7, Fiscal year 1999 is 22.636.
Point 8, Fiscal year 2000 is 21.553.
Point 9, Fiscal year 2001 is 21.773.
Note: Balances include defaulted loans under both the Federal Family
Education Loan and Federal Direct Loan Programs. Fiscal year 2000 and
2001 data are from draft financial statements.
Source: Department of Education, Budget Service.
[End of Figure]
Performance Goals: To support efforts by the Congress and the
federal government to address these issues, GAO will:
* analyze the effectiveness and efficiency of early childhood education
and care programs in serving their target populations;
* assess options for federal programs to effectively address the
educational and nutritional needs of elementary and secondary students and their
schools;
* determine the effectiveness and efficiency of child support enforcement
and child welfare programs in serving their target populations; and
* identify opportunities to better manage postsecondary, vocational, and
adult education programs and deliver more effective services.
Education and Protection of Children:
Analyze the Effectiveness and Efficiency of Early Childhood Education
and Care Programs in Serving Their Target Populations.
Key Efforts:
* Evaluate the design, operation, and management of major federal early
education and child care programs,
* Analyze the cost, quality, and availability of child care for low-
income families.
Significance:
According to the most recently available data, the federal government
spent more than $9 billion in fiscal year 1999 on 29 programs geared
toward children from infancy to age 5; a developmental period where
early investment may lead to a child's long-term intellectual and
language growth; with most of this spending focused on children from
low-income or at-risk families. New federal initiatives are emphasizing
the importance of helping all children develop school readiness skills,
including early reading skills. However, the effect of early childhood
programs on helping children prepare to enter school is still being
debated. GAO's work led to a mandated study of Head Start, which,
funded at over $5 billion in fiscal year 2002, is the largest federal
early childhood education program. Early childhood education services
are provided through other programs, such as Title I, whose primary
focus traditionally has not been early childhood. This type of program
has not been evaluated for its effect on a child's readiness for
school. Child care is viewed as both a vital support to working
families for achieving and maintaining self-sufficiency and a vehicle
for helping prepare young children for school. With welfare reform
placing greater emphasis on returning former welfare recipients to
work, the cost and availability of child care has become an even more
important issue than in the past. Because states and localities play
the primary role of ensuring that a basic level of quality of child
care exists and because individual states approach this task
differently, concerns have also arisen about the quality of services
being bought with federal money.
Potential Outcomes that Could Result when GAO's Work Is Used:
More effective use of federal funds aimed at improving the education,
care, and nutrition of low-income young children,
Greater assurance that the federal investment in state and local early
education and child care programs is achieving positive results,
Informed congressional and agency decisions about ways to improve the
management of key early education, child care, and nutrition programs.
Education and Protection of Children:
Assess Options for Federal Programs to Effectively Address the
Educational and Nutritional Needs of Elementary and Secondary Students and Their
Schools.
Key Efforts:
* Analyze the effectiveness and efficiency of federal reform efforts to
improve performance and close achievement gaps for different types of
students, including special education students,
* Analyze the contribution of federal programs to improving school
performance through enhancing the quality and quantity of teachers,
upgrading the school environment (including safety and nutrition), and
assessing options for parents in the education of their children,
* Analyze the contribution of federal education programs to improving the
self-sufficiency and success of teenagers as they make the transition
to adulthood,
* Evaluate the adequacy of management structures, processes, and controls
for federal elementary and secondary education programs for ensuring
program integrity.
Significance:
Americans have placed a high priority on educating their children and
preparing them to become self-sufficient adults and productive workers.
For these reasons, the federal government is investing nearly $30
billion in federal funds in elementary and secondary education in
fiscal year 2002. This investment is coupled with new federal
requirements aimed at improving student and school performance. Meeting
these requirements will be challenging for schools, in part, because of
the growing number of disadvantaged students. These students, such as
those from poor families, with disabilities, or with limited English
proficiency, generally have not performed as well as other groups of
children on tests. With the signing of the Elementary and Secondary
Education Act in 2002, the Congress has instituted requirements to
facilitate the elimination of this achievement gap, and policymakers
are exploring ways to improve teaching and enhance educational options.
In addition, recent threats to the United States underscore the
continuing concern of parents and policymakers with students' school
environment, including school safety and building quality. Because
obesity is a major health issue for children, there are questions about
the nutritional aspects of federally supported school meal programs.
Potential Outcomes that Could Result when GAO's Work Is Used:
More effective services provided to different types of at-risk students
so that they are more likely to improve school performance,
Better congressional understanding of the resources needed for a world-
class education system,
Better congressional understanding of transition issues for teenagers
and the role the federal government can play in their transition to
adulthood,
Administrative and potential legislative actions to improve elementary
and secondary education programs and a reduction in fraud, waste, and
abuse in elementary and secondary education programs.
Education and Protection of Children:
Determine the Effectiveness and Efficiency of Child Support Enforcement
and Child Welfare Programs in Serving Their Target Populations.
Key Efforts:
* Determine whether the federal, state, and local child support
enforcement programs are achieving program goals in an efficient
manner,
* Determine whether the federal, state, and local child welfare programs
are providing appropriate services and achieving program goals,
* Assess federal and state efforts to utilize information management
technology and to safeguard sensitive child welfare and child support
enforcement information.
Significance:
The United States has nearly 3 million children at risk of abuse and
neglect each year. An increasing number of these children will be
removed from their homes and many will not be able to return safely.
Concerns about children's safety and long stays in foster care without
being placed in permanent homes culminated in the passage of the
Adoption and Safe Families Act of 1997. Policymakers are now concerned
about the states' implementation of the act and whether outcomes for
children have improved. Moreover, many families need child support to
help them achieve or maintain economic self-sufficiency. Only 40
percent of custodial parents receive all the child support owed to
them. About 17 million child support cases exist. Provisions in the
1996 welfare reform legislation strengthened and improved state child
support collection activities. Nonetheless, policymakers continue to
have questions about the program's ability to increase collections, the
effectiveness of new enforcement tools, and how new databases are used,
particularly in light of privacy concerns.
Potential Outcomes that Could Result when GAO's Work Is Used:
More effective use of federal funds directed toward increasing child
support collections and improving other child support services,
Enhanced support and coordination among federal, state, and local
entities responsible for child support enforcement,
Greater success in ensuring positive outcomes for abused and neglected
children,
Improved support and coordination among federal, state, and local
entities responsible for child welfare,
Informed congressional and agency decisions regarding 1. sharing/
giving access to sensitive and personal information and 2.
establishing adequate safeguards that minimize the risk of improper
disclosure of sensitive and personal information,
Greater assurance that the federal investment in information systems is
achieving positive results and providing useful information for
congressional decision making.
Education and Protection of Children:
Identify Opportunities to Better Manage Postsecondary, Vocational, and
Adult Education Programs and Deliver More Effective Services.
Key Efforts:
* Assess the efficiency and effectiveness of programs designed to promote
access to and affordability of postsecondary education for students,
* Evaluate the federal role in ensuring quality in the management of
postsecondary (especially student financial aid), vocational, and adult
education programs,
* Assess the extent to which federal postsecondary, vocational, and adult
education programs address the skills needed in the 21st century's
knowledge-based economy,
* Assess implications of heightened homeland security for student visa
programs, educational institutions, and students.
Significance:
The federal government uses several tools to ensure access to
postsecondary education and lifelong learning. The Department of
Education administers federal grant and loan programs that provide over
$50 billion annually to help finance the higher education of millions
of students. While these programs have been successful in providing
students with access to money for postsecondary education, they have
been less successful in protecting the financial interests of U.S.
taxpayers. To improve services and program management while reducing
the costs of delivering aid, thereby improving the protection of
taxpayers' financial interests, Education now delivers its student
financial assistance programs through a performance-based
organization. The federal government also assists those who do not
attend college through a number of programs, including ones aiding the
transition from high school to the workplace, vocational education
after high school, and adult basic education. In addition, the federal
government subsidizes students through tax benefits such as the Hope
scholarship credit and lifetime learning tax credit. The federal
government needs to ensure that these programs and tax expenditures are
efficient and effective tools for providing the skills needed in
today's workplace.
Potential Outcomes that Could Result when GAO's Work Is Used:
Increased participation of disadvantaged students in postsecondary
education via better use of federal resources,
Informed congressional and agency decisions on ways to improve the
management of student financial assistance and other postsecondary,
vocational, and adult education programs,
Increased efficiency and effectiveness of federal postsecondary,
vocational, and adult education programs in addressing current and
future skills needs,
Informed decision making in balancing the need to monitor foreign
students with the benefits of their enrollment in the nation's
institutions of higher education.
|
en
|
converted_docs
|
119636
|
*Substance Abuse Treatment*
ADVISORY
*News for the Treatment Field*
April 2006
Volume 5
Issue 1
U.S. DEPARTMENT OF HEALTH AND HUMAN SERVICES
Substance Abuse and Mental Health Services Administration
Center for Substance Abuse Treatment
www.samhsa.gov
OxyContin^®^:
Prescription Drug Abuse---2006 Revision
From the CSAT Director
by H. Westley Clark, M.D., J.D., M.P.H., CAS, FASAM
The media have issued numerous reports about the apparent increase in
OxyContin® abuse and addiction. Some of these reports include the
following:
- In Madison, Wisconsin, a task force reported a dramatic increase in
OxyContin cases since 2003. Most OxyContin making its way onto the
streets of Madison and nearby communities was believed to have been
stolen from local pharmacies.^1^
- The police chief in Billerica, Massachusetts, reported a "dramatic
increase in OxyContin abuse."^2^
- The distribution of OxyContin in Virginia was reported to be well
above the national average. In the counties of far southwest
Virginia, where the hard physical labor of coal mining and farming
leads to a higher incidence of injuries, OxyContin prescriptions
were generally 500 percent above the national average.^3^
- Sixty-nine percent of police chiefs and sheriffs said they have
witnessed an increase in the abuse of painkillers such as OxyContin.
The areas most affected are eastern Kentucky, New Orleans, southern
Maine, Philadelphia, southwestern Pennsylvania, southwestern
Virginia, Cincinnati, and Phoenix.^4^
These reports may reflect some of your experiences: We know many of you
are treating clients addicted to OxyContin.
OxyContin has been heralded as a miracle drug that allows patients with
chronic pain to resume a normal life. It has also been called
pharmaceutical heroin and is thought to have been responsible for a
number of deaths and robberies in areas where its abuse has been
reported. Patients who legitimately use OxyContin fear that the
continuing controversy will mean tighter restrictions on the medication.
Those who abuse OxyContin reportedly go to great lengths---legal or
illegal---to obtain the powerful drug.
At the Center for Substance Abuse Treatment (CSAT), we are not
interested in fueling the controversy about the use or abuse of
OxyContin. As the Federal Government's focal point for addiction
treatment information, CSAT is instead interested in helping
professionals on the front line of substance abuse treatment by
providing you with the facts about OxyContin, its use and abuse, and how
to treat individuals who present at your treatment facility with
OxyContin concerns. Perhaps these individuals are taking medically
prescribed OxyContin to manage pain and are concerned about their
physical dependence on the medication. Perhaps you are faced with a
young adult who thought that OxyContin was a "safe" recreational drug
because, after all, doctors prescribe it. Possibly changes in the
availability or quality of illicit opioid drugs in your community have
led to abuse of and addiction to OxyContin.
Whatever the reason, OxyContin is being abused, and people are becoming
addicted. And in many instances, these people are young adults unaware
of the dangers of OxyContin. Many of these individuals mix OxyContin
with alcohol and drugs, and the result is all too often tragic.
Abuse of prescription drugs is not a new phenomenon. You have
undoubtedly heard about abuse of Percocet^®^, hydrocodone, and a host of
other medications. What sets OxyContin abuse apart is the potency of the
drug. Treatment providers in affected areas say that they were
unprepared for the speed with which an OxyContin "epidemic" developed in
their communities.
We at CSAT want to make sure that you are prepared if OxyContin abuse
becomes a problem in your community. This revised issue of the original
*Substance Abuse Treatment Advisory* on OxyContin will help prepare you
by
- Answering frequently asked questions about OxyContin
- Providing you with general information about semisynthetic opioids
and their addiction potential
- Summarizing evidence-based protocols for treatment
- Providing you with resources for further information
For more information about OxyContin abuse and treatment, see our
resource boxes and end of this document. Feel free to copy the
information in the *Substance Abuse Treatment Advisory* and share it
with colleagues so that they, too, can have the most current information
about this critically important topic.
OxyContin^®^ Frequently Asked Questions
Q: What is OxyContin?
A: OxyContin is a semisynthetic opioid analgesic prescribed for chronic
or long-lasting pain. The medication's active ingredient is oxycodone,
which is also found in drugs like Percodan^®^ and Tylox^®^. However,
OxyContin contains between 10 and 80 milligrams (mg) of oxycodone in a
timed-release tablet. Painkillers such as Tylox contain 5 mg of
oxycodone and often require repeated doses to bring about pain relief
because they lack the timed-release formulation.
Q: How is OxyContin used?
A: OxyContin, also referred to as "Oxy," "O.C.," and "Oxycotton" on the
street, is legitimately prescribed as a timed-release tablet, providing
as many as 12 hours of relief from chronic pain. It is often prescribed
for cancer patients or those with chronic, long-lasting back pain. The
benefit of the medication to people who suffer from chronic pain is that
they generally need to take the pill only twice a day, whereas a dosage
of another medication would require more frequent use to control the
pain. The goal of chronic pain treatment is to decrease pain and improve
function.
Q: How is OxyContin abused?
A: People who abuse OxyContin either crush the tablet and ingest or
snort it or dilute it in water and inject it. Crushing or diluting the
tablet disarms the timed-release action of the medication and causes a
quick, powerful high. Those who abuse OxyContin have compared this
feeling to the euphoria they experience when taking heroin. In fact, in
some areas, the use of heroin is overshadowed by the abuse of OxyContin.
Purdue Pharma, OxyContin's manufacturer, has taken steps to reduce the
potential for abuse of OxyContin and other pain medications. Its Web
site lists the following initiatives: funding educational programs to
teach healthcare professionals how to assess and treat patients
suffering from pain, providing prescribers with tamper-proof
prescription pads, developing and distributing more than 1 million
brochures to pharmacists and healthcare professionals to help educate
them about medication diversion, working with healthcare and law
enforcement officials to address prescription drug abuse, and endorsing
the development of State and national prescription drug monitoring
programs to detect diversion. In addition, the company is attempting to
research and develop other pain management products that will be more
resistant to abuse and diversion. The company estimates that it will
take significant time for such products to be brought to market. For
more information, visit Purdue Pharma's Web site at www.purduepharma.com
or call the company at 203--588--8069.
Q: How does OxyContin abuse differ from abuse of other pain
prescriptions?
A: Abuse of prescription pain medications is not new. Two primary
factors, however, set OxyContin abuse apart from other prescription drug
abuse. First, OxyContin is a powerful drug that contains a much larger
amount of the active ingredient, oxycodone, than other prescription pain
relievers. By crushing the tablet and either ingesting or snorting it,
or by injecting diluted OxyContin, people who abuse the opioid feel its
powerful effects in a short time, rather than over a 12-hour span.
Second, great profits can be made in the illegal sale of OxyContin. A
40-mg pill costs approximately \$4 by prescription, yet it may sell for
\$20 to \$40 on the street, depending on the area of the country in
which the drug is sold.^5^
OxyContin can be comparatively inexpensive if it is legitimately
prescribed and if its cost is covered by insurance. However, the
National Drug Intelligence Center reports that people who abuse
OxyContin may use heroin if their insurance will no longer pay for their
OxyContin prescription because heroin is less expensive than OxyContin
that is purchased illegally.^6^
Q: Why are so many crimes reportedly associated with OxyContin abuse?
A: Many reports of OxyContin abuse have occurred in rural areas that
have housed labor-intensive industries, such as logging or coal mining.
These industries are often located in economically depressed areas, as
well. Therefore, people for whom the drug may have been legitimately
prescribed may be tempted to sell their prescriptions for profit.
Substance abuse treatment providers say that the addiction is so strong
that people will go to great lengths to get the drug, including robbing
pharmacies and writing false prescriptions.
Q: What is the likelihood that a person for whom OxyContin is prescribed
will become addicted?
A: Most people who take OxyContin as prescribed do not become addicted.
The National Institute on Drug Abuse reports: "Long-term use \[of
opioids\] can lead to physical dependence---the body adapts to the
presence of the substance and withdrawal symptoms occur if use is
reduced abruptly. This can also include tolerance, which means that
higher doses of a medication must be taken to obtain the same initial
effects. . . . Studies have shown that properly managed medical use of
opioid analgesic compounds is safe and rarely causes addiction. Taken
exactly as prescribed, opioids can be used to manage pain
effectively."^7^
One review found, "A multitude of studies indicate that the rate of
opioid addiction in populations of chronic pain sufferers is similar to
the rate of opioid addiction within the general population, falling in
the range of 1 to 2 percent or less."^8^
In short, most individuals who are prescribed OxyContin, or any other
opioid, will not become addicted, although they may become dependent on
the drug and will need to be withdrawn by a qualified physician.
Individuals who are taking the drug as prescribed should continue to do
so, as long as they and their physician agree that taking the drug is a
medically appropriate way for them to manage pain.
Q: How can I determine whether a person who uses OxyContin is dependent
on rather than addicted to OxyContin?
A: When pain patients take an opioid analgesic as directed, or to the
point where their pain is adequately controlled, it is not abuse or
addiction. Abuse occurs when patients take more than is needed for pain
control, especially if they take it to get high. Patients who take their
medication in a manner that grossly differs from a physician's
directions are probably abusing that drug.
If a patient continues to seek excessive pain medication after pain
management is achieved, the patient may be addicted. Addiction is
characterized by the repeated, compulsive use of a substance despite
adverse social, psychological, and/or physical consequences. Addiction
is often (but not always) accompanied by physical dependence, withdrawal
syndrome, and tolerance. Physical dependence is defined as a physiologic
state of adaptation to a substance. The absence of this substance
produces symptoms and signs of withdrawal. Withdrawal syndrome is often
characterized by overactivity of the physiological functions that were
suppressed by the drug and/or depression of the functions that were
stimulated by the drug. Opioids often cause sleepiness, calmness, and
constipation, so opioid withdrawal often includes insomnia, anxiety, and
diarrhea.
Pain patients, however, may sometimes develop a physical dependence
during treatment with opioids. This is not an addiction. A gradual
decrease of the medication dose over time, as the pain is resolving,
brings the former pain patient to a drug-free state without any craving
for repeated doses of the drug. This is the difference between the
patient treated for pain who was formerly dependent and has now been
withdrawn from medication and the patient who is opioid addicted: The
patient addicted to diverted pharmaceutical opioids continues to have a
severe and uncontrollable craving that almost always leads to eventual
relapse in the absence of adequate treatment. This uncontrollable
craving for another "rush" of the drug differentiates the patient who is
"detoxified" but opioid addicted from the former pain patient.
Theoretically, a person who abuses opioids might develop a physical
dependence but obtain treatment in the first few months of abuse, before
becoming addicted. In this case, supervised withdrawal (detoxification)
followed by a few months of abstinence-oriented treatment might be
sufficient for the patient who is not addicted who abuses opioids. If,
however, this patient subsequently relapses to opioid abuse, then that
behavior would support a diagnosis of opioid addiction. If the patient
has several relapses to opioid abuse, he or she will require long-term
treatment for the opioid addiction. (See the section titled Treatment
and Detoxification Protocols to learn more about treatment options.)
Q: I work at a facility that does not use medication-assisted treatment.
What treatment should I provide to individuals addicted to or dependent
on OxyContin?
A: The majority of U.S. treatment facilities do not offer
medication-assisted treatment. However, because of the strength of
OxyContin and its powerful addiction potential, medical complications
may be increased by quickly withdrawing individuals from the drug.
Premature withdrawal may cause individuals to seek heroin, and the
quality of that heroin will not be known. In addition, these
individuals, if injecting heroin, may also expose themselves to HIV and
hepatitis. Most people addicted to OxyContin need medication-assisted
treatment. Even if individuals have been taking OxyContin legitimately
to manage pain, they should not stop taking the drug all at once.
Instead, their dosages should be tapered down until medication is no
longer needed. If you work in a drug-free or abstinence-based treatment
facility, it is important to refer patients to facilities where they can
receive appropriate treatment. (See SAMHSA Resources.)
Treatment and Detoxification Protocols
OxyContin^®^ is a powerful drug that contains a much larger amount of
the active ingredient, oxycodone, than other prescription opioid pain
relievers. Whereas most people who take OxyContin as prescribed do not
become addicted, those who abuse their pain medication or obtain it
illegally may find themselves becoming rapidly dependent on, if not
addicted to, the drug.
Two types of treatment have been documented as most effective for opioid
addiction. One is a long-term, residential, therapeutic community type
of treatment, and the other is long-term, medication-assisted outpatient
treatment. Clinical trials using medications to treat opioid addiction
have generally included subjects addicted to diverted pharmaceutical
opioids as well as to illicit heroin. Therefore, there is no medical
reason to suppose that the patient addicted to diverted pharmaceutical
opioids is any less likely to benefit from medication-assisted treatment
than the patient addicted to heroin.
Some patients who are opioid addicted who have very good social supports
may occasionally be able to benefit from antagonist treatment with
naltrexone. This treatment works best if the patient is highly motivated
to participate in treatment and has undergone adequate detoxification
from the opioid of abuse. Most patients who are opioid addicted in
outpatient therapy, however, do best with medication that is either an
agonist or a partial agonist. Methadone is the agonist medication most
commonly prescribed for opioid addiction treatment in this country.
Buprenorphine is the only partial agonist approved by the Food and Drug
Administration for opioid addiction treatment.
The guidelines for treating OxyContin addiction or dependence are
basically no different than the guidelines the Center for Substance
Abuse Treatment (CSAT) uses for treating addiction to or dependence on
*any* opioid. However, because OxyContin contains higher dose levels of
opioid than are typically found in other oxycodone-containing pain
medications, higher dosages of methadone or buprenorphine may be needed
to appropriately treat patients who abuse OxyContin.
Methadone or buprenorphine may be used for OxyContin addiction treatment
or, for that matter, treatment for addiction to any other opioid,
including the semisynthetic opioids. Medication-assisted treatment for
prescription opioid abuse is not a new treatment approach. For instance,
in 2002, Alaska estimated that 15,000 people abused prescription opioids
in the State and that most patients receiving methadone were not
addicted to heroin. In addition, a significant percentage of patients in
publicly supported methadone programs were not being treated for heroin
addiction but for abuse of semisynthetic opioids (e.g., hydrocodone).
The Substance Abuse and Mental Health Services Administration (SAMHSA)
Drug Abuse Warning Network emergency room data show that both oxycodone
and hydrocodone mentions increased dramatically in the United States
between 1995 and 2002.^9^ And when Arkansas opened its first methadone
maintenance clinic in December 1993, the vast majority of its clients
were not admitted for heroin addiction but for semisynthetic opioid
abuse. These individuals had been traveling to other States for
treatment because methadone treatment was not available near their
homes.
Using the criteria above describing the difference between addiction to
and dependence on OxyContin, you may be able to determine whether a
patient requires treatment for opioid addiction. If this is the case,
methadone or buprenorphine may be used for withdrawal. For certain
patient populations, including those with many treatment failures,
methadone or buprenorphine is the treatment of choice.^10^
"As substance abuse treatment professionals, we have the responsibility
for learning as much as we can about OxyContin and then providing
appropriate treatment for people addicted to it. Appropriate treatment
will nearly always involve prescribing methadone, buprenorphine, or, in
some cases, naltrexone," says H. Westley Clark, M.D., J.D., Director of
CSAT. "Programs that do not offer medication-assisted treatment will
need to refer patients who are addicted to OxyContin to programs that
do," he adds.
It is important to assess an individual's eligibility for
medication-assisted treatment with methadone or buprenorphine to
determine whether he or she is eligible for this type of treatment and
whether it would be appropriate. The assessment may take place in a
hospital emergency department, central intake unit, or similar place.
Final assessment of an individual's eligibility for medication-assisted
treatment must be completed by treatment program staff. The preliminary
assessment should include the following areas:^11^
- Determining the need for emergency care
- Diagnosing the presence and severity of opioid dependence
- Determining the extent of alcohol and drug abuse
- Screening for co-occurring medical and psychiatric conditions
- Evaluating an individual's living situation, family and social
problems, and legal problems
". . . we have the responsibility for learning as much as we can about
OxyContin, and then providing appropriate treatment for people who are
addicted to it."
H. Westley Clark, M.D., J.D., M.P.H., CAS, FASAM
Director, CSAT
Treatment Improvement Protocols (TIPs) and Collateral Products
Addressing Opioid Addiction Treatment
TIP 40 *Clinical Guidelines for the Use of Buprenorphine in the
Treatment of Opioid Addiction* **BKD500**
*Quick Guide for Physicians Based on TIP 40: Clinical Guidelines for the
Use of Buprenorphine in the Treatment of Opioid Addiction* **QGPT40**
*KAP Keys for Physicians Based on TIP 40: Clinical Guidelines for the
Use of Buprenorphine in the Treatment of Opioid Addiction* **KAPT40**
TIP 43 *Medication-Assisted Treatment for Opioid Addiction in Opioid
Treatment Programs* **BKD524**
*Quick Guide for Clinicians Based on TIP 43: Medication-Assisted
Treatment for Opioid Addiction in Opioid Treatment Programs* **QGCT43**
*KAP Keys for Clinicians Based on TIP 43: Medication-Assisted Treatment
for Opioid Addiction in Opioid Treatment Programs* **KAPT43**
SAMHSA Resources
To find a substance abuse treatment facility near you, visit the
Substance Abuse Treatment Facility Locator at
www.findtreatment.samhsa.gov. Call the Substance Abuse and Mental Health
Services Administration Substance Abuse Treatment Hotline at
800--662--HELP for substance abuse treatment referral information.
For More Information About Treatment for Opioid Addiction
Sign up for SAMHSA's Information Mailing System (SIMS) to receive
information about the following topics:
- Grant announcements
- Funding opportunities such as competitive contract announcements
- Prevention materials and publications
- Treatment- and provider-oriented materials and publications
- Research findings and reports
- Announcements of available research data sets
- Policy announcements and materials
To sign up for this free service, use one of the following methods to
contact SIMS:
**Web:** http://sims.health.org
**Mail:** SAMHSA's National Clearinghouse for Alcohol and Drug
Information (NCADI)
Attn: Mailing List Manager
P.O. Box 2345
Rockville, MD 20847--2345
**Phone:** 800--729--6686
**Fax:** 301--468--6433
Attn: Mailing List Manager
Three Ways To Obtain Free Copies of All CSAT Products:
1\. Call SAMHSA's NCADI at 800--729--6686; TDD (hearing impaired)
800--487--4889
2\. Visit NCADI's Web site, www.ncadi.samhsa.gov
3\. Access TIPs on line at www.kap.samhsa.gov
*Substance Abuse Treatment Advisory*
*Substance Abuse Treatment Advisory*---published on an as-needed basis
for treatment providers---was written and produced under contract number
270-04-7049 by the Knowledge Application Program (KAP), a Joint Venture
of JBS International, Inc., and The CDM Group, Inc., for the Center for
Substance Abuse Treatment, Substance Abuse and Mental Health Services
Administration (SAMHSA), U.S. Department of Health and Human Services
(HHS). The content of this publication does not necessarily reflect the
views or policies of SAMHSA or HHS.
**Public Domain Notice:** All material in this report is in the public
domain and may be reproduced or copied without permission; citation of
the source is appreciated. However, this publication may not be
reproduced or distributed for a fee without the specific, written
authorization of the Office of Communications, SAMHSA, HHS.
**Electronic Access and Copies of Publication:** This publication can be
accessed electronically through the Internet at www.kap.samhsa.gov.
Additional free print copies can be ordered from SAMHSA's National
Clearinghouse for Alcohol and Drug Information at 800--729--6686.
**Recommended Citation:** Center for Substance Abuse Treatment.
"OxyContin®: Prescription Drug Abuse---2006 Revision." *Substance Abuse
Treatment Advisory*, Volume 5, Issue 1. Rockville, MD: Substance Abuse
and Mental Health Services Administration, April 2006.
DHHS Publication No. (SMA) 06-4138
Substance Abuse and Mental Health Services Administration
Printed 2006
Notes
1\. WISC-TV. *OxyContin:* *The Good, The Bad, The Deadly*. Broadcast
transcript. Madison, WI: WISC-TV, February 14, 2006.
www.channel3000.com/health/7013912/detail.html \[accessed March 2,
2006\].
2\. Crane, J.P. Drug use by young raises flag. *The Boston Globe*,
February 5, 2006.
www.boston.com/news/local/articles/2006/02/05/drug_use_by_young_raises_flag
\[accessed March 2, 2006\].
3\. Hammack, L. Painkiller prescriptions up significantly in region.
*The Roanoke Times*, March 28, 2004.
www.roanoke.com/roatimes/news/story164817.html \[accessed March 2,
2006\].
4\. Reuters. Powerful painkillers fueling U.S. crime rate. Redmond, WA:
MSNBC.com., March 10, 2005. www.msnbc.msn.com/id/7141313 \[accessed
March 2, 2006\].
5\. National Drug Intelligence Center. *Intelligence Bulletin: OxyContin
Diversion, Availability, and Abuse*. Johnstown, PA: National Drug
Intelligence Center, U.S. Department of Justice, August 2004.
www.usdoj.gov/ndic/pubs10/10550/10550p.pdf \[accessed March 3, 2006\].
6\. National Drug Intelligence Center. Pharmaceuticals. In: *National
Drug Threat Assessment 2004*. Johnstown, PA: National Drug Intelligence
Center, U.S. Department of Justice, April 2004.
www.usdoj.gov/ndic/pubs8/8731/8731p.pdf \[accessed March 3, 2006\].
7\. National Institute on Drug Abuse (NIDA). *NIDA Infofacts:
Prescription Pain and Other Medications*. Washington, DC: NIDA, National
Institutes of Health, 2005. www.drugabuse.gov/infofacts/PainMed.html
\[accessed March 3, 2006\].
8\. Fisher, F.B. Interpretation of "aberrant" drug-related behaviors.
*Journal of American Physicians and Surgeons* 9(1):25--28, 2004.
9\. Substance Abuse and Mental Health Services Administration (SAMHSA).
*Emergency Department Trends From the Drug Abuse Warning Network: Final
Estimates 1995--2002.* DAWN Series D-24. DHHS Publication No. (SMA)
03-3780. Rockville, MD: SAMHSA, 2003.
dawninfo.samhsa.gov/old_dawn/pubs_94_02/edpubs/2002final \[accessed
March 2, 2006\].
10\. Center for Substance Abuse Treatment. *Detoxification and Substance
Abuse Treatment*. Treatment Improvement Protocol (TIP) Series 45. DHHS
Publication No. (SMA) 06-4131. Rockville, MD: Substance Abuse and Mental
Health Services Administration, 2006.
11\. Center for Substance Abuse Treatment. Initial screening, admission
procedures, and assessment techniques. In: *Medication-Assisted
Treatment for Opioid Addiction in Opioid Treatment Programs*. Treatment
Improvement Protocol (TIP) Series 43. DHHS Publication No. (SMA)
05-4048. Rockville, MD: Substance Abuse and Mental Health Services
Administration, 2005, pp. 43--61.
|
en
|
markdown
|
831360
|
# Presentation: 831360
## A COTS system will be used: Fenwal Engineered Fire Suppression System designed for use with 3MTM NovecTM 1230 Fire Protection Fluid.
- FAATC will initiate testing program to evaluate NovecTM 1230 as a possible candidate to replace Halon 1301 in the cargo compartment area.
- Testing will start 2nd Quarter 2006.
- A COTS system will be used: Fenwal Engineered Fire Suppression System designed for use with 3MTM NovecTM 1230 Fire Protection Fluid.
- The latest version (2nd Update, June 2005) of the Minimum Performance Standard for Aircraft Cargo Compartment Fire Suppression Systems will be used during this program.
- Partners: FAA & 3MTM
- FAA POC: John Reinhardt 609-485-5034
## Slide 2
|
en
|
all-txt-docs
|
534722
|
"
'
326
LA POTHERIE
[Vol.
whole length with the heads of birds, flame-colored, and had in the middle a bunch of feathers colored a bright red, which resembled a great fan. As soon as he espied the leader of the Frenchmen, he presented to him the calumet, on the side next to the sun; and uttered words which were apparently addressed to all the spirits whom those peoples adore. The old man held it sometimes toward the east, and sometimes toward the west; then toward the sun; now he would stick the end in the ground, and then he would turn the calumet around him, looking at it as if he were trying to point out the whole earth, with expressions which gave the Frenchman to understand that he had compassion on all men. Then he rubbed with his hands Perot's head, back, legs, and feet, and sometimes his own body. This welcome lasted a long time, during which the old man made a harangue, after the fashion of a prayer, all to assure the Frenchman of the joy which all in the village felt at his arrival.
One of the men spread upon the grass a large painted ox-skin, the hair on which was as soft as silk, on which he and his comrade were made to sit. The old man struck two pieces of wood together, to obtain fire from it; but as it was wet he could not light it. The Frenchman drew forth his own fire-steel, and immediately made fire with tinder. The old man uttered loud exclamations about the iron, which seemed to him a spirit; the calumet was lighted, and each man smoked; then they must eat porridge and dried meat, and suck the juice of the green corn. Again the calumet was filled, and those who smoked blew the tobacco-smoke into the Frenchman's face, as the greatest honor that they could render him; he saw himself smoked [boucaner] like meat, but said not a word. This ceremony ended, a skin was spread for the Frenchman's comrade. The
|
en
|
log-files
|
938057
|
! Started logfile: J0256-2137_S_1997_08_27_yyk_uvs.log on Sun Jan 7 15:57:57 2007
obs J0256-2137_S_1997_08_27_yyk_uva.fits
! Reading UV FITS file: J0256-2137_S_1997_08_27_yyk_uva.fits
! AN table 1: 151 integrations on 45 of 45 possible baselines.
! Apparent sampling: 0.97557 visibilities/baseline/integration-bin.
! Found source: J0256-2137
!
! There are 4 IFs, and a total of 4 channels:
!
! IF Channel Frequency Freq offset Number of Overall IF
! origin at origin per channel channels bandwidth
! ------------------------------------------------------------- (Hz)
! 01 1 2.22447e+09 8e+06 1 8e+06
! 02 2 2.23447e+09 8e+06 1 8e+06
! 03 3 2.29447e+09 8e+06 1 8e+06
! 04 4 2.32447e+09 8e+06 1 8e+06
!
! Polarization(s): RR
!
! Read 702 lines of history.
!
! Reading 26516 visibilities.
select I
! Polarization I is unavailable.
! Selecting polarization: RR, channels: 1..4
! Reading IF 1 channels: 1..1
! Reading IF 2 channels: 2..2
! Reading IF 3 channels: 3..3
! Reading IF 4 channels: 4..4
![@muppet J0256-2137_S_1997_08_27_yyk]
integer clean_niter
clean_niter = 100
float clean_gain
clean_gain = 0.04
float dynam
dynam = 6.0
float amp_soltime1
amp_soltime1 = 10
float amp_soltime2
amp_soltime2 = 1
float phase_soltime1
phase_soltime1=10
float phase_soltime2
phase_soltime2=0.5
float phase_soltime
phase_soltime=phase_soltime1
float ampcor_selflim
ampcor_selflim=1.20
float thresh
thresh = 0.10
float win_mult
win_mult = 1.8
float time_av
time_av = 30
float old_peak
float new_peak
float flux_cutoff
mapsize field_size, field_cell
! Map grid = 512x512 pixels with 0.500x0.500 milli-arcsec cellsize.
phase_soltime=phase_soltime1
print "uvstat(rms)=",uvstat(rms),"Jy"
! uvstat(rms)= 0.417591 Jy
uvw 2,-1
! Uniform weighting binwidth: 2 (pixels).
! Gridding weights will be scaled by errors raised to the power -1.
! Radial weighting is not currently selected.
flux_cutoff = imstat(rms) * dynam
! Inverting map and beam
! Estimated beam: bmin=2.688 mas, bmaj=6.916 mas, bpa=-5.035 degrees
! Estimated noise=2669.21 mJy/beam.
repeat
if (peak(flux) > flux_cutoff) peakwin win_mult
clean clean_niter,clean_gain
flux_cutoff = imstat(rms) * dynam
selfcal false,false,phase_soltime
new_peak = peak(flux)
until(new_peak<=flux_cutoff)
! Added new window around map position (0, 0).
! clean: niter=100 gain=0.04 cutoff=0
! Component: 050 - total flux cleaned = 0.172544 Jy
! Component: 100 - total flux cleaned = 0.211003 Jy
! Total flux subtracted in 100 components = 0.211002 Jy
! Clean residual min=-0.011971 max=0.015998 Jy/beam
! Clean residual mean=0.000116 rms=0.003853 Jy/beam
! Combined flux in latest and established models = 0.211002 Jy
! Performing phase self-cal over 10 minute time intervals
! Adding 17 model components to the UV plane model.
! The established model now contains 17 components and 0.211002 Jy
!
! Correcting IF 1.
! A total of 171 telescope corrections were flagged in sub-array 1.
!
! Correcting IF 2.
! A total of 22 telescope corrections were flagged in sub-array 1.
!
! Correcting IF 3.
! A total of 22 telescope corrections were flagged in sub-array 1.
!
! Correcting IF 4.
! A total of 22 telescope corrections were flagged in sub-array 1.
!
! Fit before self-cal, rms=0.360206Jy sigma=0.001230
! Fit after self-cal, rms=0.360042Jy sigma=0.001230
! Inverting map and beam
! Estimated beam: bmin=2.688 mas, bmaj=6.916 mas, bpa=-5.035 degrees
! Estimated noise=2669.21 mJy/beam.
print "************** FINISHED UNIFORM WEIGHTING CLEAN **************"
! ************** FINISHED UNIFORM WEIGHTING CLEAN **************
!
uvw 0,-2
! Uniform weighting is not currently selected.
! Gridding weights will be scaled by errors raised to the power -2.
! Radial weighting is not currently selected.
win_mult = win_mult * 1.6
clean_niter = clean_niter * 2
dynam = dynam - 0.5
flux_cutoff = imstat(rms) * dynam
! Inverting map and beam
! Estimated beam: bmin=3.495 mas, bmaj=8.796 mas, bpa=-5.747 degrees
! Estimated noise=1172.9 mJy/beam.
repeat
if (peak(flux) > flux_cutoff) peakwin win_mult
clean clean_niter,clean_gain
flux_cutoff = imstat(rms) * dynam
selfcal false,false,phase_soltime
new_peak = peak(flux)
until(new_peak<=flux_cutoff)
! clean: niter=200 gain=0.04 cutoff=0
! Component: 050 - total flux cleaned = 0.0161749 Jy
! Component: 100 - total flux cleaned = 0.0210512 Jy
! Component: 150 - total flux cleaned = 0.021641 Jy
! Component: 200 - total flux cleaned = 0.0217999 Jy
! Total flux subtracted in 200 components = 0.0217999 Jy
! Clean residual min=-0.006811 max=0.007759 Jy/beam
! Clean residual mean=0.000157 rms=0.002007 Jy/beam
! Combined flux in latest and established models = 0.232802 Jy
! Performing phase self-cal over 10 minute time intervals
! Adding 18 model components to the UV plane model.
! The established model now contains 29 components and 0.232802 Jy
!
! Correcting IF 1.
!
! Correcting IF 2.
!
! Correcting IF 3.
!
! Correcting IF 4.
!
! Fit before self-cal, rms=0.359395Jy sigma=0.001228
! Fit after self-cal, rms=0.359364Jy sigma=0.001228
! Inverting map
print "************** FINISHED NATURAL WEIGHTING CLEAN **************"
! ************** FINISHED NATURAL WEIGHTING CLEAN **************
!
restore
! restore: Substituting estimate of restoring beam from last 'invert'.
! Restoring with beam: 3.495 x 8.796 at -5.747 degrees (North through East)
! Clean map min=-0.006556 max=0.20244 Jy/beam
if(peak(flux) < thresh*2)
selflims ampcor_selflim
end if
gscale
! Performing overall amplitude self-cal
!
! Correcting IF 1.
! A total of 3 telescope corrections were flagged in sub-array 1.
! Amplitude normalization factor in sub-array 1: 1.00817
! Telescope amplitude corrections in sub-array 1:
! BR 0.98 FD 1.06 HN 0.92 KP 0.91
! LA 0.98 MK 1.14 NL 1.00* OV 1.12
! PT 0.98 SC 0.84
!
!
! Correcting IF 2.
! A total of 3 telescope corrections were flagged in sub-array 1.
! Amplitude normalization factor in sub-array 1: 0.988523
! Telescope amplitude corrections in sub-array 1:
! BR 1.02 FD 1.16 HN 1.04 KP 0.98
! LA 1.06 MK 1.03 NL 0.92 OV 1.04
! PT 0.95 SC 0.91
!
!
! Correcting IF 3.
! A total of 3 telescope corrections were flagged in sub-array 1.
! Amplitude normalization factor in sub-array 1: 1.05962
! Telescope amplitude corrections in sub-array 1:
! BR 1.00 FD 1.06 HN 0.92 KP 0.90
! LA 0.79 MK 0.85 NL 0.88 OV 0.93
! PT 1.11 SC 1.00
!
!
! Correcting IF 4.
! A total of 3 telescope corrections were flagged in sub-array 1.
! Amplitude normalization factor in sub-array 1: 0.987683
! Telescope amplitude corrections in sub-array 1:
! BR 1.01 FD 1.11 HN 1.10 KP 0.93
! LA 0.88 MK 1.01 NL 1.11 OV 1.00
! PT 0.94 SC 1.03
!
!
! Fit before self-cal, rms=0.359364Jy sigma=0.001228
! Fit after self-cal, rms=0.354682Jy sigma=0.001225
selfcal false, false, phase_soltime
! Performing phase self-cal over 10 minute time intervals
!
! Correcting IF 1.
!
! Correcting IF 2.
!
! Correcting IF 3.
!
! Correcting IF 4.
!
! Fit before self-cal, rms=0.354682Jy sigma=0.001225
! Fit after self-cal, rms=0.354678Jy sigma=0.001225
dynam = dynam - 0.5
flux_cutoff = imstat(rms) * dynam
! Inverting map and beam
! Estimated beam: bmin=3.463 mas, bmaj=8.65 mas, bpa=-4.88 degrees
! Estimated noise=1179.36 mJy/beam.
repeat
if (peak(flux) > flux_cutoff) peakwin win_mult
clean clean_niter,clean_gain
flux_cutoff = imstat(rms) * dynam
selfcal false,false,phase_soltime
new_peak = peak(flux)
until(new_peak<=flux_cutoff)
! clean: niter=200 gain=0.04 cutoff=0
! Component: 050 - total flux cleaned = 0.00440117 Jy
! Component: 100 - total flux cleaned = 0.00463829 Jy
! Component: 150 - total flux cleaned = 0.00457353 Jy
! Component: 200 - total flux cleaned = 0.00457167 Jy
! Total flux subtracted in 200 components = 0.00457167 Jy
! Clean residual min=-0.005132 max=0.006527 Jy/beam
! Clean residual mean=0.000071 rms=0.001401 Jy/beam
! Combined flux in latest and established models = 0.237374 Jy
! Performing phase self-cal over 10 minute time intervals
! Adding 10 model components to the UV plane model.
! The established model now contains 34 components and 0.237374 Jy
!
! Correcting IF 1.
!
! Correcting IF 2.
!
! Correcting IF 3.
!
! Correcting IF 4.
!
! Fit before self-cal, rms=0.354632Jy sigma=0.001224
! Fit after self-cal, rms=0.354621Jy sigma=0.001224
! Inverting map
print "************** FINISHED AMPLITUDE GSCALE SELF-CAL **************"
! ************** FINISHED AMPLITUDE GSCALE SELF-CAL **************
!
phase_soltime=phase_soltime2
selfcal false, false, phase_soltime
! Performing phase self-cal over 0.5 minute time intervals
!
! Correcting IF 1.
!
! Correcting IF 2.
!
! Correcting IF 3.
!
! Correcting IF 4.
!
! Fit before self-cal, rms=0.354621Jy sigma=0.001224
! Fit after self-cal, rms=0.353329Jy sigma=0.001221
dynam = dynam - 0.5
flux_cutoff = imstat(rms) * dynam
! Inverting map
repeat
if (peak(flux) > flux_cutoff) peakwin win_mult
clean clean_niter,clean_gain
flux_cutoff = imstat(rms) * dynam
selfcal false,false,phase_soltime
new_peak = peak(flux)
until(new_peak<=flux_cutoff)
! clean: niter=200 gain=0.04 cutoff=0
! Component: 050 - total flux cleaned = 0.000745341 Jy
! Component: 100 - total flux cleaned = 0.000996477 Jy
! Component: 150 - total flux cleaned = 0.000929116 Jy
! Component: 200 - total flux cleaned = 0.000930472 Jy
! Total flux subtracted in 200 components = 0.000930472 Jy
! Clean residual min=-0.004473 max=0.005604 Jy/beam
! Clean residual mean=0.000077 rms=0.001367 Jy/beam
! Combined flux in latest and established models = 0.238305 Jy
! Performing phase self-cal over 0.5 minute time intervals
! Adding 13 model components to the UV plane model.
! The established model now contains 42 components and 0.238305 Jy
!
! Correcting IF 1.
!
! Correcting IF 2.
!
! Correcting IF 3.
!
! Correcting IF 4.
!
! Fit before self-cal, rms=0.353289Jy sigma=0.001220
! Fit after self-cal, rms=0.353165Jy sigma=0.001220
! Inverting map
print "*** FINISHED NATURAL WEIGHTING CLEAN with shorter phase_soltime ***"
! *** FINISHED NATURAL WEIGHTING CLEAN with shorter phase_soltime ***
!
dynam = dynam - 0.25
restore
! restore: Substituting estimate of restoring beam from last 'invert'.
! Restoring with beam: 3.463 x 8.65 at -4.88 degrees (North through East)
! Clean map min=-0.0042972 max=0.20607 Jy/beam
if(peak(flux) > thresh)
selfcal true, true, amp_soltime1
selfcal false, false, phase_soltime
flux_cutoff = imstat(rms) * dynam
repeat
if (peak(flux) > flux_cutoff) peakwin win_mult
clean clean_niter,clean_gain
flux_cutoff = imstat(rms) * dynam
selfcal false,false,phase_soltime
new_peak = peak(flux)
until(new_peak<=flux_cutoff)
selfcal true, true, amp_soltime2
selfcal false, false, phase_soltime
flux_cutoff = imstat(rms) * dynam
repeat
if (peak(flux) > flux_cutoff) peakwin win_mult
clean clean_niter,clean_gain
flux_cutoff = imstat(rms) * dynam
selfcal false,false,phase_soltime
new_peak = peak(flux)
until(new_peak<=flux_cutoff)
print "************** FINISHED AMPLITUDE SELF-CAL **************"
end if
! Performing amp+phase self-cal over 10 minute time intervals
!
! Correcting IF 1.
!
! Correcting IF 2.
!
! Correcting IF 3.
!
! Correcting IF 4.
!
! Fit before self-cal, rms=0.353165Jy sigma=0.001220
! Fit after self-cal, rms=0.361393Jy sigma=0.001218
! Performing phase self-cal over 0.5 minute time intervals
!
! Correcting IF 1.
!
! Correcting IF 2.
!
! Correcting IF 3.
!
! Correcting IF 4.
!
! Fit before self-cal, rms=0.361393Jy sigma=0.001218
! Fit after self-cal, rms=0.361388Jy sigma=0.001218
! Inverting map and beam
! Estimated beam: bmin=3.421 mas, bmaj=8.521 mas, bpa=-5.268 degrees
! Estimated noise=1172.51 mJy/beam.
! Added new window around map position (51, 57.5).
! clean: niter=200 gain=0.04 cutoff=0
! Component: 050 - total flux cleaned = 0.00619334 Jy
! Component: 100 - total flux cleaned = 0.00734887 Jy
! Component: 150 - total flux cleaned = 0.00763889 Jy
! Component: 200 - total flux cleaned = 0.00771908 Jy
! Total flux subtracted in 200 components = 0.00771908 Jy
! Clean residual min=-0.003951 max=0.004524 Jy/beam
! Clean residual mean=0.000063 rms=0.001124 Jy/beam
! Combined flux in latest and established models = 0.246024 Jy
! Performing phase self-cal over 0.5 minute time intervals
! Adding 24 model components to the UV plane model.
! The established model now contains 64 components and 0.246024 Jy
!
! Correcting IF 1.
!
! Correcting IF 2.
!
! Correcting IF 3.
!
! Correcting IF 4.
!
! Fit before self-cal, rms=0.361287Jy sigma=0.001218
! Fit after self-cal, rms=0.361288Jy sigma=0.001218
! Inverting map
! Performing amp+phase self-cal over 1 minute time intervals
!
! Correcting IF 1.
!
! Correcting IF 2.
!
! Correcting IF 3.
!
! Correcting IF 4.
!
! Fit before self-cal, rms=0.361288Jy sigma=0.001218
! Fit after self-cal, rms=0.363339Jy sigma=0.001217
! Performing phase self-cal over 0.5 minute time intervals
!
! Correcting IF 1.
!
! Correcting IF 2.
!
! Correcting IF 3.
!
! Correcting IF 4.
!
! Fit before self-cal, rms=0.363339Jy sigma=0.001217
! Fit after self-cal, rms=0.363352Jy sigma=0.001217
! Inverting map and beam
! Estimated beam: bmin=3.405 mas, bmaj=8.486 mas, bpa=-5.401 degrees
! Estimated noise=1173.83 mJy/beam.
! clean: niter=200 gain=0.04 cutoff=0
! Component: 050 - total flux cleaned = 0.00298708 Jy
! Component: 100 - total flux cleaned = 0.00339172 Jy
! Component: 150 - total flux cleaned = 0.00345838 Jy
! Component: 200 - total flux cleaned = 0.00352177 Jy
! Total flux subtracted in 200 components = 0.00352177 Jy
! Clean residual min=-0.003815 max=0.004184 Jy/beam
! Clean residual mean=0.000078 rms=0.001086 Jy/beam
! Combined flux in latest and established models = 0.249545 Jy
! Performing phase self-cal over 0.5 minute time intervals
! Adding 19 model components to the UV plane model.
! The established model now contains 70 components and 0.249545 Jy
!
! Correcting IF 1.
!
! Correcting IF 2.
!
! Correcting IF 3.
!
! Correcting IF 4.
!
! Fit before self-cal, rms=0.363322Jy sigma=0.001217
! Fit after self-cal, rms=0.363326Jy sigma=0.001217
! Inverting map
! ************** FINISHED AMPLITUDE SELF-CAL **************
uvtaper 0.3,taper_size
! Gaussian taper: value 0.3 at UV radius = 20 mega-wavelengths.
win_mult = win_mult * 1.4
flux_cutoff = imstat(rms) * dynam
! Inverting map and beam
! Estimated beam: bmin=8.121 mas, bmaj=17.08 mas, bpa=0.118 degrees
! Estimated noise=1475.12 mJy/beam.
repeat
if (peak(flux) > flux_cutoff) peakwin win_mult
clean clean_niter,clean_gain
flux_cutoff = imstat(rms) * dynam
selfcal false,false,phase_soltime
new_peak = peak(flux)
until(new_peak<=flux_cutoff)
! clean: niter=200 gain=0.04 cutoff=0
! Component: 050 - total flux cleaned = 0.000903608 Jy
! Component: 100 - total flux cleaned = 0.000904224 Jy
! Component: 150 - total flux cleaned = 0.000901587 Jy
! Component: 200 - total flux cleaned = 0.00098205 Jy
! Total flux subtracted in 200 components = 0.00098205 Jy
! Clean residual min=-0.003210 max=0.003181 Jy/beam
! Clean residual mean=0.000149 rms=0.001144 Jy/beam
! Combined flux in latest and established models = 0.250527 Jy
! Performing phase self-cal over 0.5 minute time intervals
! Adding 24 model components to the UV plane model.
! The established model now contains 92 components and 0.250527 Jy
!
! Correcting IF 1.
!
! Correcting IF 2.
!
! Correcting IF 3.
!
! Correcting IF 4.
!
! Fit before self-cal, rms=0.363338Jy sigma=0.001217
! Fit after self-cal, rms=0.363334Jy sigma=0.001217
! Inverting map
uvtaper 0
! No UV-taper is currently set.
win_mult = win_mult / 1.4
print "************** FINISHED TAPERING SELF-CAL CLEAN **************"
! ************** FINISHED TAPERING SELF-CAL CLEAN **************
!
print "************** CLEARING MODEL AND STARTING OVER **********"
! ************** CLEARING MODEL AND STARTING OVER **********
clrmod true,true,true
! clrmod: Cleared the established, tentative and continuum models.
uvw 2,-1
! Uniform weighting binwidth: 2 (pixels).
! Gridding weights will be scaled by errors raised to the power -1.
! Radial weighting is not currently selected.
clean clean_niter, clean_gain
! Inverting map and beam
! Estimated beam: bmin=2.656 mas, bmaj=6.823 mas, bpa=-4.849 degrees
! Estimated noise=2637.35 mJy/beam.
! clean: niter=200 gain=0.04 cutoff=0
! Component: 050 - total flux cleaned = 0.175173 Jy
! Component: 100 - total flux cleaned = 0.214041 Jy
! Component: 150 - total flux cleaned = 0.229956 Jy
! Component: 200 - total flux cleaned = 0.239234 Jy
! Total flux subtracted in 200 components = 0.239234 Jy
! Clean residual min=-0.009678 max=0.008839 Jy/beam
! Clean residual mean=0.000045 rms=0.002220 Jy/beam
! Combined flux in latest and established models = 0.239234 Jy
uvw 0,-2
! Uniform weighting is not currently selected.
! Gridding weights will be scaled by errors raised to the power -2.
! Radial weighting is not currently selected.
flux_cutoff = imstat(rms) * dynam
! Adding 28 model components to the UV plane model.
! The established model now contains 28 components and 0.239234 Jy
! Inverting map and beam
! Estimated beam: bmin=3.405 mas, bmaj=8.486 mas, bpa=-5.401 degrees
! Estimated noise=1173.83 mJy/beam.
repeat
if (peak(flux) > flux_cutoff) peakwin win_mult
clean clean_niter,clean_gain
flux_cutoff = imstat(rms) * dynam
keep
new_peak = peak(flux)
until(new_peak<=flux_cutoff)
! Added new window around map position (1.5, -13.5).
! clean: niter=200 gain=0.04 cutoff=0
! Component: 050 - total flux cleaned = 0.0082998 Jy
! Component: 100 - total flux cleaned = 0.0122569 Jy
! Component: 150 - total flux cleaned = 0.0131322 Jy
! Component: 200 - total flux cleaned = 0.0135008 Jy
! Total flux subtracted in 200 components = 0.0135008 Jy
! Clean residual min=-0.003699 max=0.003634 Jy/beam
! Clean residual mean=0.000070 rms=0.001013 Jy/beam
! Combined flux in latest and established models = 0.252734 Jy
! Adding 37 model components to the UV plane model.
! The established model now contains 62 components and 0.252734 Jy
! Inverting map
uvtaper 0.3,taper_size
! Gaussian taper: value 0.3 at UV radius = 20 mega-wavelengths.
flux_cutoff = imstat(rms) * dynam
! Inverting map and beam
! Estimated beam: bmin=8.121 mas, bmaj=17.08 mas, bpa=0.118 degrees
! Estimated noise=1475.12 mJy/beam.
repeat
if (peak(flux) > flux_cutoff) peakwin win_mult
clean clean_niter,clean_gain
flux_cutoff = imstat(rms) * dynam
keep
new_peak = peak(flux)
until(new_peak<=flux_cutoff)
! clean: niter=200 gain=0.04 cutoff=0
! Component: 050 - total flux cleaned = 0.000457736 Jy
! Component: 100 - total flux cleaned = 0.000514878 Jy
! Component: 150 - total flux cleaned = 0.000615515 Jy
! Component: 200 - total flux cleaned = 0.000697436 Jy
! Total flux subtracted in 200 components = 0.000697436 Jy
! Clean residual min=-0.003311 max=0.003392 Jy/beam
! Clean residual mean=0.000136 rms=0.001041 Jy/beam
! Combined flux in latest and established models = 0.253432 Jy
! Adding 31 model components to the UV plane model.
! The established model now contains 91 components and 0.253432 Jy
! Inverting map
uvtaper 0
! No UV-taper is currently set.
clean
! Inverting map and beam
! Estimated beam: bmin=3.405 mas, bmaj=8.486 mas, bpa=-5.401 degrees
! Estimated noise=1173.83 mJy/beam.
! clean: niter=200 gain=0.04 cutoff=0
! Component: 050 - total flux cleaned = -0.000105029 Jy
! Component: 100 - total flux cleaned = -0.000186375 Jy
! Component: 150 - total flux cleaned = -0.000184738 Jy
! Component: 200 - total flux cleaned = -0.000261171 Jy
! Total flux subtracted in 200 components = -0.000261171 Jy
! Clean residual min=-0.003535 max=0.003535 Jy/beam
! Clean residual mean=0.000072 rms=0.000974 Jy/beam
! Combined flux in latest and established models = 0.253171 Jy
selfcal false, false, phase_soltime
! Performing phase self-cal over 0.5 minute time intervals
! Adding 25 model components to the UV plane model.
! The established model now contains 110 components and 0.253171 Jy
!
! Correcting IF 1.
!
! Correcting IF 2.
!
! Correcting IF 3.
!
! Correcting IF 4.
!
! Fit before self-cal, rms=0.363299Jy sigma=0.001217
! Fit after self-cal, rms=0.363292Jy sigma=0.001217
wmodel J0256-2137_S_1997_08_27_yyk\_map.mod
! Writing 110 model components to file: J0256-2137_S_1997_08_27_yyk_map.mod
wobs J0256-2137_S_1997_08_27_yyk\_uvs.fits
! Writing UV FITS file: J0256-2137_S_1997_08_27_yyk_uvs.fits
wwins J0256-2137_S_1997_08_27_yyk\_map.win
! wwins: Wrote 3 windows to J0256-2137_S_1997_08_27_yyk_map.win
x = (field_size-8) * field_cell / 4
addwin -x,x,-x,x
clean (field_size*4),0.01
! Inverting map
! clean: niter=2048 gain=0.01 cutoff=0
! Component: 050 - total flux cleaned = 0.000576527 Jy
! Component: 100 - total flux cleaned = 0.000813798 Jy
! Component: 150 - total flux cleaned = 0.000926509 Jy
! Component: 200 - total flux cleaned = 0.000982313 Jy
! Component: 250 - total flux cleaned = 0.00108886 Jy
! Component: 300 - total flux cleaned = 0.00114092 Jy
! Component: 350 - total flux cleaned = 0.00123861 Jy
! Component: 400 - total flux cleaned = 0.00119059 Jy
! Component: 450 - total flux cleaned = 0.00123752 Jy
! Component: 500 - total flux cleaned = 0.00128317 Jy
! Component: 550 - total flux cleaned = 0.00137337 Jy
! Component: 600 - total flux cleaned = 0.00146034 Jy
! Component: 650 - total flux cleaned = 0.00141752 Jy
! Component: 700 - total flux cleaned = 0.00150151 Jy
! Component: 750 - total flux cleaned = 0.00154298 Jy
! Component: 800 - total flux cleaned = 0.00178753 Jy
! Component: 850 - total flux cleaned = 0.00194663 Jy
! Component: 900 - total flux cleaned = 0.00190639 Jy
! Component: 950 - total flux cleaned = 0.00198397 Jy
! Component: 1000 - total flux cleaned = 0.00198473 Jy
! Component: 1050 - total flux cleaned = 0.0021738 Jy
! Component: 1100 - total flux cleaned = 0.00228502 Jy
! Component: 1150 - total flux cleaned = 0.00239486 Jy
! Component: 1200 - total flux cleaned = 0.00239525 Jy
! Component: 1250 - total flux cleaned = 0.00257425 Jy
! Component: 1300 - total flux cleaned = 0.00257392 Jy
! Component: 1350 - total flux cleaned = 0.00264372 Jy
! Component: 1400 - total flux cleaned = 0.00278151 Jy
! Component: 1450 - total flux cleaned = 0.00284883 Jy
! Component: 1500 - total flux cleaned = 0.00301665 Jy
! Component: 1550 - total flux cleaned = 0.00298401 Jy
! Component: 1600 - total flux cleaned = 0.0031814 Jy
! Component: 1650 - total flux cleaned = 0.00334368 Jy
! Component: 1700 - total flux cleaned = 0.0033117 Jy
! Component: 1750 - total flux cleaned = 0.00347037 Jy
! Component: 1800 - total flux cleaned = 0.00350174 Jy
! Component: 1850 - total flux cleaned = 0.00362624 Jy
! Component: 1900 - total flux cleaned = 0.00368779 Jy
! Component: 1950 - total flux cleaned = 0.00380921 Jy
! Component: 2000 - total flux cleaned = 0.00383928 Jy
! Total flux subtracted in 2048 components = 0.00395811 Jy
! Clean residual min=-0.001950 max=0.001854 Jy/beam
! Clean residual mean=0.000061 rms=0.000598 Jy/beam
! Combined flux in latest and established models = 0.257129 Jy
keep
! Adding 122 model components to the UV plane model.
! The established model now contains 232 components and 0.257129 Jy
![Exited script file: muppet]
wmap "J0256-2137_S_1997_08_27_yyk\_map.fits"
! Inverting map
! restore: Substituting estimate of restoring beam from last 'invert'.
! Restoring with beam: 3.405 x 8.486 at -5.401 degrees (North through East)
! Clean map min=-0.0030374 max=0.20443 Jy/beam
! Writing clean map to FITS file: J0256-2137_S_1997_08_27_yyk_map.fits
float peak_flux
peak_flux = peak(flux,max)
print "The peak flux is",peak_flux
! The peak flux is 0.204429
invert
! Inverting map
float image_rms
image_rms = imstat(rms)
print "The final image rms is",image_rms
! The final image rms is 0.000596691
device "J0256-2137_S_1997_08_27_yyk\_map.eps/VPS"
! Attempting to open device: 'J0256-2137_S_1997_08_27_yyk_map.eps/VPS'
loglevs 100*3*image_rms/peak_flux
! The new contour levels are:
! -0.875644 0.875644 1.75129 3.50258 7.00516 14.0103 28.0206 56.0412
print "clev=",int(3*image_rms*10000)/10000
! clev= 0.0017
print "peak=",int(peak_flux*1000)/1000
! peak= 0.204
mapcolor none
! Mapplot colormap: none, contrast: 1 brightness: 0.5.
mapplot cln
! restore: Substituting estimate of restoring beam from last 'invert'.
! Restoring with beam: 3.405 x 8.486 at -5.401 degrees (North through East)
! Clean map min=-0.0030374 max=0.20443 Jy/beam
mapcolor color, 0.9
! Mapplot colormap: rainbow, contrast: 0.9 brightness: 0.5.
device "J0256-2137_S_1997_08_27_yyk\_map.gif/gif"
! Attempting to open device: 'J0256-2137_S_1997_08_27_yyk_map.gif/gif'
mapplot cln
quit
! Quitting program
! Log file J0256-2137_S_1997_08_27_yyk_uvs.log closed on Sun Jan 7 15:58:05 2007
|
en
|
converted_docs
|
413577
|
Required Report - public distribution
**Date:** 10/14/2005
**GAIN Report Number:** HU5013
HU5013
**Hungary**
**Exporter Guide**
**Annual**
**2005**
**Approved by:**
Sarah Hanson
U.S. Embassy
**Prepared by:**
Dr. Ferenc Nemes
**Report Highlights:**
Hungary is a middle-income country with a developed and export-oriented
food-processing sector. Hungary's GDP growth rose from about 3 percent
in 2003 to roughly 4 percent in 2004. Hungary's accession to the EU in
May 2004 began a new chapter for the country's food trade. Import
tariffs for major U.S. products exported to Hungary decreased, and the
administrative process for distributing products became simpler. The
Hungarian food distribution system has changed drastically in the past
six years with hypermarkets and shopping centers developing quickly.
Hungarian consumers are becoming more quality conscious, and market
segmentation is creating new opportunities for high quality U.S. foods
and beverages. Tourism is a leading industry, and hotels and restaurants
are demanding higher quality foods.
Includes PSD Changes: No
Includes Trade Matrix: No
Unscheduled Report
Vienna \[AU1\]
\[HU\]
**I. MARKET OVERVIEW**
Hungary is a middle-income country with a developed and export-oriented
food-processing sector. Hungary's GDP growth rose from about 3 percent
in 2003 to roughly 4 percent in 2004, spurred by increased investments
in areas such as machinery and construction. While Hungary can still be
regarded as a preferred destination for foreign investments and is a
competitive location for regional service operations, it has fallen
behind Poland and Czech Republic in attractiveness, according to the
OECD. After a marked rise in costs (real wages jumped approximately 12%
in 2002), wage increase slowed down in 2003, coupled with an increase in
productivity. At the same time, Hungary's currency, the forint, has
appreciated significantly since 2001 (approximately 10% against the euro
and 30% against the US dollar, even after the devaluation in June 2003),
which has led to sagging export performance due to manufacturing
relocating to lower cost countries. The state budget deficit grew to 6.4
percent of the GDP in the last two years. The poor budget performance
resulted in limited capability to finance Government of Hungary (GOH)
and EU programs, including agricultural programs. The rate of inflation
was 6.8 percent in 2004.
Since 1990, wave upon wave of foreign companies have come into Hungary
and invested more than \$25 billion in production and service facilities
throughout the country. In the case of U.S. investors, "Fortune 500"
companies like General Electric, Alcoa, IBM, Ford, Dow, Citibank, Ernst
& Young, AES, Coca-Cola, Pepsi-Cola, Proctor & Gamble, Sara Lee, first
arrived in the early 90's. In the late 90's and the new millennium, the
second wave of companies coming to Hungary included subcontractors to
the "Fortune 500." A third wave of suppliers to the subcontractors has
been making its way to Hungary selling products through agents and
distributors. Due to Hungary's geographic location in the center of
Europe, all three waves of companies are looking to do business not only
with Hungary, but also with the rest of the European Union and the
"frontier markets" of Eastern Europe (e.g. Romania, Ukraine and former
Yugoslavia).
The agri-food sector has a slowly declining but fundamental role in the
national economy and in the trade balance. Agricultural output amounted
to 3.0% of GDP and 6.50% percent of total exports in 2003. Agricultural
trade accounted for \$32 billion in exports and \$1.7 billion in imports
in 2003. More than 60 percent of Hungary's agri-food exports went to the
OECD countries; the share going to EU countries was 45 percent. Imports
of bulk agricultural products and intermediary goods (such as protein
meals, coffee, cocoa and spices, meat, livestock genetics, fruit and
nuts) make up to 80 percent of total agricultural imports. Processed
foods and beverages account for about 20 percent of the total, and these
are imported mainly from the countries of the EU.
The agricultural sector has many traditional ties to the United States,
especially in the area of genetics. Some consumer-oriented products also
come from the United States. Purchases of U.S. agricultural and food
items accounted for \$58 million in 2003. Hungarian sales to the United
States were \$33 million in the same period.
**Consumer Food Market**
Food consumption dropped considerably after the political and economic
changes of the late 1980s. The main reasons for the decline were a
decrease in real income and high inflation. However, consumption began
to rebound in 1997/1998 as macroeconomic conditions improved and
inflation cooled.
The gap between the rich and poor in Hungary is widening, and the less
fortunate tend not to shop at large commercial retailers. Also, in
response to high taxes, the black market has taken on an increasing role
in supplying food to lower income families, and subsistence farming and
unregistered farm food sales are on the rise. At the same time,
disposable income for the top strata of society has expanded rapidly and
these consumers are adopting consumption patterns similar those found in
wealthy western European countries.
The last few years have seen interesting changes in consumer
preferences. For example, pork consumption has decreased from 39 kg in
1990 to 28.5 kg at present, but consumption of cheaper meat cuts and low
priced frankfurters has increased. Similarly, demand for poultry has
increased in recent years and currently exceeds pork. Turkey and frozen
oven- ready poultry products have seen the most growth.
Demand for fish and seafood is low in (landlocked) Hungary and stands at
3 kilogram per capita annually. Demand for frozen fish, particularly
breaded products and more expensive restaurant cuts, is on the rise.
Although total consumption of milk products declined in recent years,
sales of yogurt and innovative convenience products have reversed this
trend and consumption now stands at 163.7 kg per capita annually.
Cereal consumption has dropped in recent years except for rice, where a
widening array of brands and products has stimulated consumer interest.
There has been an increase in the consumption of fresh and preserved
vegetables, although sales of these items appear to be highly price
sensitive. Given current consumption trends, canned products will
probably gradually lose market share to frozen foods in the coming year.
At present, there is a small but growing market for health foods. The
emerging Hungarian middle-class is adopting Western attitudes towards
health and well-being, including those towards food. This trend is
particularly evident in the sale and marketing of breakfast cereals and
snacks. Natural products such as granola bars, dried fruits and fruit
mixtures, soybean and wheat-based meat substitutes are also increasingly
popular. Demand for vitamin enhanced products, as well as those for
diabetics (sugar free chocolate bars, light soft drinks, etc.) are
growing.
Currently, food and beverages account for about 29 percent of household
expenditures. The percentage of income spent on food has been decreasing
and is trending toward Western levels. Hungary's population (currently
about 10 million) is gradually decreasing, and the population is aging.
Because of this, there is growing demand for high value specialty
products, convenience foods, and pet food. According to a 2004 survey,
food consumption outside the home accounts for 13 percent of total food
expenditures. This is 8 percent increase over the 2003 year level.
Ninety percent of Hungarian households have a refrigerator with a
freezer compartment. However, because freezing capacity in an average
household is still limited, the unit size of retail frozen food packages
is smaller than in the United States. According to trade estimates, 65
of every hundred households have a microwave oven. In cities this figure
is much higher and increasing rapidly.
----------------------------------- -----------------------------------
Advantages Challenges
After a period of decline there is Domestic food processing is very
room to increase consumption competitive
Western consumption patterns are Competition from European
emerging commodities is increasing with EU
membership
There is growth potential in the Slow increase in real incomes
development of retail sector,
especially in suburban and rural
areas
There are unexplored commodity Appreciation of the national
areas currency (Hungarian Forint)
Consumers still find imported Food safety issues (Hormone beef,
products novel and interesting and biotech)
associate imports with high quality
goods
Domestic industry needs certain Many traders are inexperienced in
ingredients doing business with overseas
companies
Purchases by tourists and transit High transport costs
shoppers are large and growing
EU membership facilitates the entry Multinational retail chains
of new and small volume imports of participate in the increasing trade
U.S. products through other of member countries' processed food
countries' distributors
High number of experienced, Relatively small delivery volumes
multinational retailers
Innovative products and packaging Hungarian consumers are unfamiliar
are appreciated with the value of many U.S.
products
Importers are open to new products Tourism and consumption of tourists
and technologies and have been was weak in the last two years
eager to participate in U.S.
sponsored events (e.g. the Cochran
Fellowship Program and visits to
trade U.S. food shows)
----------------------------------- -----------------------------------
**II. EXPORTER BUSINESS TIPS**
Local Business Customs
The food and beverage wholesale trade is more concentrated than the
retail sector. Eleven 'purchasing partnerships', run by retailers,
handle about 70 percent of total turnover. These purchasing companies
are able to influence the price of domestic and imported foods and
charge different fees to domestic and foreign suppliers. Fees include a
"listing fee" to introduce a new product into the retailer's inventory,
slotting fees to keep a product on the store shelf, and "marketing and
shop network development contributions." Care must be taken to guard
against excessive fees.
Retailers, including the multinational chains, mainly import through
domestic foreign trading companies and wholesalers. U.S. traders
interested in selling in Hungary should offer their products to the
'purchasing partnerships' that serve the big retailers, to the
nation-wide network importer/distributors, or to "independent"
importers. U.S. companies may even consider establishing their own
import company to handle the distribution of their product.
The Hungarian wholesale market is also very price sensitive, and
Hungarian importers will expect American traders to bring samples and
quote prices in the early stages of negotiation.
With EU membership, the entrance of U.S. products to Hungary through
European importers/distributors became easier. See a list of importers
of US products in Europe at the following website:
[www.american-foods.org](http://www.american-foods.org/).
General Consumer Tastes and Preferences
Consumption patterns appear to be dependent on income rather than price.
Major factors in upper income purchasing decisions are quality,
packaging, and brand recognition. To date, foreign suppliers seem to
have been better able to capture this market segment than domestic
suppliers. Because of income stratification, demand for cheap foodstuffs
and expensive luxury items have increased while sales of medium priced
products has declined.
New products are appearing in many categories and packaging designs are
revised frequently. One negative aspect of this trend is that some
popular and affordable products have disappeared and plastic containers
have replaced the environmentally friendlier reusable glass bottles.
In the Hungarian food market, brands have secondary importance.
Consumers do not make a distinction between brand name, company name,
and product name. Brand recognition and brand loyalty have a different
meaning for the average Hungarian customer than they do in more mature
western markets. Sellers cannot rely on brand power for sales and price
premiums to the same extent as in other European countries. Many
consumers mistrust new products, names and packages, especially if their
appearance comes with a price increase. There is also a small movement
against branded, well‑advertised, \"foreign\" products. Conversely,
Hungarian customers buy some branded products primarily for prestige
(e.g., high-end U.S. bourbon or whisky).
Food Standards and Regulations
Until the middle of 2002, all food products, excluding fresh products,
had to be registered and approved by the Hungarian food-testing
institute - OETI. The process was slow and costly, but the testing had
to be completed before the product was allowed on the market.
In July 2002, the GOH terminated the import products registration
system. This created an opportunity for Hungarian traders to respond
faster to good prices or seasonal purchase offers. The required export
administration, quality responsibilities of the Hungarian importer and
the foreign vendor are outlined in the 43/2002 Order of the Minister of
Agriculture, Minister of Health and the Minister of Economy.
The only group of commodities where the mandated registration has been
prolonged is the nutrition supplements for sports, slimming diets, and
other "functional foods".
See the regulations for the entire EU at
<http://www.useu.be/agri/fairs.html> (Food and Agricultural Import
Regulations and Standards).
Labeling
Labeling must be in Hungarian. In instances where retail packages are
imported with labels written in English, the government requires that
Hungarian-language label stickers be added. Labels should include the
following information:
Name of product
Ingredients
Shelf life
Name and address of importer or distributor
OETI number
Tariffs and Tariff Rate Quotas (TRQs)
Hungary used its own tariff system until May 1, 2004. After EU
accession, the EU's common external tariffs are applied. In general,
tariffs for many US agricultural products exported to Hungary decreased.
(See Gain Report HU3002 for a detailed analysis of the effects of tariff
changes for US exports and Gain Report EU4040). You may look for the
actual EU import tariff of individual commodities at the following
website:
<http://europa.eu.int/comm/taxation_customs/dds/cgi-bin/tarchap?Lang=EN>
Taxes
Value added taxes (VAT - also called the 'general turnover tax' in
Hungary) are also charged. The VAT is essentially a tax on consumption
and the normal rate is 25 percent, with a reduced rate of 12 percent
applying to most food and agricultural products. In addition to the VAT,
a consumption tax is levied on certain goods (coffee, some kinds of
wine, jewelry etc.). Excise taxes are also levied on alcohol and tobacco
products. Imports are subject to VAT, with the taxable base calculated
as the sum of the customs value, plus customs duties, fees, and
consumption tax.
III\. MARKET SECTOR STRUCTURE AND TRENDS
Market opportunities in:
a\. Food retail sector
Food retail sales were \$10.1 billion in 2003 and grew to \$12.1 billion
in 2004 (2.8 percent increase at comparable prices).
Concentration in the grocery trade has increased over the last few
years. By 2004, more than 55 percent of the turnover was attributable to
the five biggest companies. Some of the famous retailer chains were
forced to sell their shops and move out of Hungary such as Julius Meinl
and Billa. The total number of food dominated shops decreased (from
35,963 in 2003 to 34,802 in 2004). The number of new hypermarkets is
still growing, although at a smaller rate than in the previous years.
Shops in the small-medium segment (200-400 sq. meter) managed to
stabilize their share in the total turnover. The number of small (under
200 sq. meter) shops dropped the most.
Share of the different types of shops based on turnover of
daily-consumed items (food, beverages, and household chemicals)
----------------------- ----------------------- -----------------------
Type of Shop 2003 2004
\% \%
Hypermarket 21 26
Supermarket 14 15
Large Discount 15 14
C+C 4 4
Convenience Shops 35 33
Market and Street 5 4
Kiosks
Other 6 6
----------------------- ----------------------- -----------------------
Hypermarkets bigger than 10,000 square meters include Cora, Tesco,
Interspar and Auchan, while cash and carry shops (5,000-10,000 square
meters) include Metro, Interfruct C+C and Alfa. Supermarket chains such
as Spar, Match, and CBA are well known in the capital area and in bigger
cities. Their size is typically 1,000-3,500 square meters. Discount food
stores (401-1,000 square meters) are the backbone of the everyday food
shopping (Profi, Penny-Market, Plus, Real)
A traditional consumer cooperative chain, COOP, still has the most shops
in the 200-400 and the 400-1,000 square meters size categories. However,
the 40-400 square meters size shops have been the biggest losers as the
sector consolidates - their share of total turnover has decreased from
22 percent to 13.4 percent during the last four years.
While the number of small convenience shops is relatively stable,
turnover is high. About one third of them close annually and are
replaced by newly opened shops. The position of small shops that are a
member of a purchasing alliance or a franchise system is growing
stronger. In 2002, the share of sales by independent shops out of total
turnover decreased from 25 to 21 percent, while the sales by chain
members increased their share from 10 to 14 percent, according to Gfk
Market Research firm.
Hungary's joining to the EU gave an impetus to the food imports.
Estimates of GfK Hungaria, a reputed market research firm, indicate an
increase of the share of imported goods in the total grocery retail
trade from 10 to 20 percent. The growth of foreign products in shops was
particularly high at dairy products, fresh fruit and vegetable, beer,
juices and sweets. The biggest volume import items are the same:
tropical and out season fruit, roasted coffee, canned fruits and
vegetable, fruit juice, beer and tobacco products.
The competition intensified not only at the shelves of shops but between
producers as well. Hungarian food processors increased the use of raw
materials from imports. Multinational companies revised the allocation
of their processing capacities in the expanded EU. Some of the strong
Hungarian brands are now produced in other EU countries and the product
is "re-exported" to Hungary.
Specialty shops, many of them at recently opened shopping malls, may
provide good business opportunities for imported foodstuffs. Nearly
thirty large shopping centers have been built in Budapest and other
cities in Hungary in the last three years. Supermarkets (typically
2,000-3,500 square meters in size) are an important part of each new
shopping mall.
Gift shops and sweets shops also sell a variety of foreign wine and
spirits, fancy dry fruits and nuts, and sweets. Gift baskets of food are
also commonly for sale in bigger food stores, particularly around
Christmas and Easter. Fancy food and spice shops, specialty beverage
shops, pet shops, etc. are also important distribution channels of
imported commodities.
Most of the more than 900 gas stations in Hungary are also convenience
stores. The size of these convenience shops varies from 200 to 1,300
square feet. According to a recent survey, 35-45 percent of shop sales
are food and beverage items. Most of Hungary's ten major gas station
companies run the shops themselves. Shell Hungary, however, has run its
"Select" stores under a franchise partnership with CBA, a major domestic
grocery chain, for many years.
There are about 150 companies in Hungary that sell their products over
the Internet and a few market leaders take 80% of the sales value.
According to a 2004 GKI - Westel - Sun Microsystems Hungary survey,
Internet sales revenues were forecasted about \$44.6 million in 2004.
This is a 247 percent increase over 2000. Reasons of the increase of the
last two years may be attributed to the technical development at the
Internet access of households, and a GOH supported home computer sales
program ("School-Net" Express program). The most common goods sold
online are books, music, electronics and gifts. There are several
grocery companies in bigger cities running e-commerce web sites for home
delivery of food and grocery items. The majority of non-food B2C
companies use the Hungarian Postal Service to deliver their goods; food
retailers use their contractors or have their own car fleet. In most
cases, payment is collected upon delivery.
b\. Hotel-Restaurant-Food Service
Catering sales were \$2.79 billion in 2004, representing an increase of
3.4% at comparable prices over the previous year. The Hungarian consumer
foodservice market is very fragmented and independent players were
dominant in most sectors. The biggest growth rate within the HRI sector
is in fast food. The significance of chained operators is also highest
in the fast food sector, where about 28 percent of the outlets are part
of a chain. Several well known companies have franchise networks in
Hungary, including McDonalds, Pizza Hut, Kentucky Fried Chicken, and
Subway.
Foreign and "theme" restaurants offering ethnic food and beverages also
appear to be growing faster than the restaurant sector in general. These
restaurants use and sell imported ingredients and niche products, making
them a good place to advertise new products and to educate consumers
about new foods.
Upper-tier hotels can also be good partners for U.S. exporters. Not only
as hosts for promotional events but also as buyers of premium
ingredients and beverages. Most hotel shops sell American products and
hotel and catering trade opportunities are under-utilized. Hotels and
restaurants mainly buy imported products from local distributors, but
their managers and chefs are good sources of information about customer
preferences and quality and price expectations.
c\. The Food Processing sector
Hungary\'s food processing sector is the most modern in Eastern Europe,
and its export revenues are vital to the country\'s trade balance.
Western companies have invested in privatized companies active in
distilling, sugar production, soft drinks, vegetable oil processing,
confectionary products, pet food, snacks, and tobacco. These processors
have received a good deal of foreign investment, have integrated
themselves into a Western-style market system, and are becoming more
concentrated in their ownership structure. In other industries,
privatization took place more slowly and investors have typically
established small‑ to mid‑sized joint ventures with domestic majority
ownership. Examples of this model include investment in the milling,
baking, pasta, and poultry industries.
Within most parts of the food-processing sector, the increase in the
number of companies and new production facilities, in tandem with the
decline of domestic consumption, initially led to excess production
capacity (sometimes over 30 percent above demand). Over capacity in turn
increased the pressure to export. In 2004, 22.1 percent of food industry
output was exported, but the export orientation is much higher for
individual sub-sectors such as canning, meat, poultry, and dairy
industry. Products at least partially produced by foreign‑owned
companies' account for almost two thirds of Hungary\'s exports.
The total food /beverages sector production is 120 % of domestic demand,
indicating a strong [export orientation]{.underline}. The following
table reflects that the share of imports in the supply of processed food
([import penetration]{.underline}) is relative low. Imports are
significant for sweets, confectionary and dairy products (need for a
wide variety products in these sectors), and fruits/vegetable (need for
out season products).
----------------------- ----------------------- -----------------------
Food Processing Export Orientation Import Penetration
Industry Sub-Sector
Meat Industry 33.3 % 5.4 %
Dairy 15.3 % 6.2 %
Poultry Processing 42.9 % 0.9 %
Fruit and Vegetable 52.0 % 12.4 %
Processing
Brewing 0.7 % 3.0 %
Soft Drinks 8.2 % 2.5 %
Tobacco Industry Negligible 2.0 %
Sweets and 17.2 % 22.8 %
Confectionary
Wine 62.0 % 2.7 %
Feed Milling 23 % 52.0 %
Flour Milling 13.5 % 1.5 %
----------------------- ----------------------- -----------------------
For many sub-sectors, the consumer oriented product imports are not
high, but raw material imports may be considerable. Soybean and fishmeal
import (Feed milling), almonds and raisins import (Sweets and
Confectionary), pork and tobacco all fall into this category.
The number of food processing firms, employing more than 20 people, was
902 in 2003 (declining). Bigger companies, employing more than 200,
account for 83 percent of total sector output.
The food processing industry purchases most of its raw materials from
domestic sources, but imports of out season or unavailable agricultural
ingredients, non‑food additives, and packaging materials and
technologies, are vital.
Export sales opportunities for U.S. suppliers have occasionally occurred
in recent years because of temporary shortages on the domestic market
(meat) or the limited availability of a given commodity or quality grade
in Hungary (fruit juice concentrate, rice, tobacco, peanuts, fish,
raisins, tree nuts, dried fruit, etc.)
IV\. BEST HIGH-VALUE PRODUCT PROSPECTS
+-----------+-------+-------+------+--------+-----------+-----------+
| Product | 2003 | 2003 | 5 | Import | Key | Market |
| Category | M | Im | -Yr. | Tariff | C | Attra |
| | arket | ports | Avg. | Rate | onstrains | ctiveness |
| | Size | | An | | Over | for USA |
| | | | nual | | Market | |
| | | | Im | | De | |
| | | | port | | velopment | |
| | | | Gr | | | |
| | | | owth | | | |
+-----------+-------+-------+------+--------+-----------+-----------+
| # Raisins | 2.54 | 2.54 | 2.4% | 2.4% | Co | Developed |
| | (,000 | (,000 | | | mpetition | sweets, |
| | MT) | MT) | | | from | conf |
| | | | | | cheaper | ectionary |
| | | | | | suppliers | and |
| | | | | | from Iran | bakery |
| | | | | | and | in |
| | | | | | Turkey | dustries. |
+-----------+-------+-------+------+--------+-----------+-----------+
| Dried | 2.76 | 1.00 | 17% | 9.6% | Co | Co |
| Fruits | (,000 | (,000 | | | mpetition | nsumption |
| | MT) | MT) | | | from | is |
| | | | | | cheaper | growing. |
| | | | | | suppliers | Good |
| | | | | | from Asia | quality |
| | | | | | | of |
| | | | | | | C |
| | | | | | | alifornia |
| | | | | | | prunes is |
| | | | | | | r |
| | | | | | | ecognized |
| | | | | | | by |
| | | | | | | consumers |
+-----------+-------+-------+------+--------+-----------+-----------+
| Rice | 58.24 | 41.70 | Sta | 63% | Protected | |
| | | (,000 | bile | | EU | |
| | (,000 | MT) | at | | co | |
| | | | this | | mpetitors | |
| | MT) | | l | | and cheap | |
| | | | evel | | Asian | |
| | | | | | suppliers | |
+-----------+-------+-------+------+--------+-----------+-----------+
| Seafood | 8.71 | 8.71 | 2.9% | 2% | Per | |
| | (,000 | (,000 | | | capita | |
| | MT) | MT) | | | co | |
| | | | | | nsumption | |
| | | | | | is still | |
| | | | | | low. | |
| | | | | | Consumers | |
| | | | | | do not | |
| | | | | | know | |
| | | | | | quality | |
| | | | | | di | |
| | | | | | fferences | |
+-----------+-------+-------+------+--------+-----------+-----------+
| Distilled | 14.80 | 1.92 | 5% | Free | | Import |
| Liquors | mi | mi | | | | tariffs |
| | llion | llion | | | | decreased |
| | liter | liter | | | | with EU |
| | (abs | (abs | | | | a |
| | .alc) | .alc) | | | | ccession. |
| | | | | | | Bourbon |
| | | | | | | whiskey |
| | | | | | | is a |
| | | | | | | trendy |
| | | | | | | brand |
+-----------+-------+-------+------+--------+-----------+-----------+
| Wine | 202 | 6.32 | 8% | 11% | High | Wine |
| | mi | mi | | | tariff | co |
| | llion | llion | | (62.9% | until May | nsumption |
| | liter | liter | | before | 2004 | is |
| | | | | EU | hampered | tr |
| | | | | acce | the | aditional |
| | | | | ssion) | int | and HRI |
| | | | | | roduction | needs |
| | | | | | of US | high |
| | | | | | wines | quality |
| | | | | | | wine |
+-----------+-------+-------+------+--------+-----------+-----------+
| Spices & | 37.23 | 4.85 | 22% | 9% | | Hyp |
| C | | | | | | ermarkets |
| ondiments | (,000 | (,000 | | | | and |
| | MT) | MT) | | | | American |
| | | | | | | re |
| | | | | | | staurants |
| | | | | | | introduce |
| | | | | | | new |
| | | | | | | cuisine |
| | | | | | | and |
| | | | | | | spices |
+-----------+-------+-------+------+--------+-----------+-----------+
| Fruit | 1 | 32.39 | 5% | 12% | Hungary | |
| Juice | 37.46 | (,000 | | | is a | |
| Con | (,000 | MT) | | | major | |
| centrates | MT) | | | | producer | |
| | | | | | of | |
| | | | | | temperate | |
| | | | | | fruit | |
| | | | | | juices | |
+-----------+-------+-------+------+--------+-----------+-----------+
| Almonds | 1.66 | 1.00 | 7% | 3.5% | | C |
| | (,000 | (,000 | | | | alifornia |
| | MT) | MT) | | | | almonds |
| | | | | | | is a |
| | | | | | | market |
| | | | | | | leader in |
| | | | | | | the |
| | | | | | | quality |
| | | | | | | segment |
+-----------+-------+-------+------+--------+-----------+-----------+
| Pet Food | 80.14 | 29.03 | Sta | 3.8% | EU | H |
| | (,000 | (,000 | bile | | V | ungarians |
| | MT) | MT) | at | | eterinary | keep a |
| | | | this | | re | lot of |
| | | | l | | gulations | pets, and |
| | | | evel | | may limit | petfood |
| | | | | | imports | sales |
| | | | | | | increase |
| | | | | | | rapidly |
+-----------+-------+-------+------+--------+-----------+-----------+
V. KEY CONTACTS AND FURTHER INFORMATION
[Ministry of Agriculture and Regional Development]{.underline}
H-1055 Budapest
Kossuth Lajos ter 11.
Web Address:
International Affairs
Ms. Mariann Kovacs, Head of Department
Tel: 361 301-4661
Fax: 361 301-4662
Veterinary and Food Hygiene
Dr. Miklos Suth, Head of Department
Tel: 361 332-7986
Fax: 361 301-4669
[National Institute for Food and Nutrition (OETI)]{.underline}
H-1476 Budapest
Gyali ut 3/A. POB 52
Tel: 361 215-4130
Fax: 361 215-1545
[American Chamber of Commerce in Hungary]{.underline}
H-1052 Budapest
Deak Ferenc u. 10.
Mr. Peter Fath, Executive Director
Tel: 361 266-9880
Fax: 361 266-9888
E-mail:
Web Address:
[National Association of Food Processors]{.underline}
H-1012 Budapest
Kuny Domokos u. 13-15.
Mr. Laszlo Piros, General Secretary
Tel: 361 375-4721
Fax: 361 355-5057
E-mail: <[email protected]>
Web Address: [www.efosz.hu](http://www.efosz.hu/)
[Hungarian Franchise Association]{.underline}
H-1024 Budapest
Margit krt. 15-17. IV./3.
Dr. Istvan Kiss, General Secretary
Tel: 361 212-4124
Fax: 361 212-5712
E-mail: <[email protected]>
Web Address: [www.franchise.hu](http://www.franchise.hu/)
[U.S. Embassy, Office of Agricultural Affairs]{.underline}
Dr. Ferenc Nemes
Agricultural Specialist, Foreign Agricultural Service
Bank Center Building
Szabadsag Ter 7
H-1054-Budapest Hungary
Tel: 36-1-475-4162
Fax: 36-1-475-4676
E-Mail: <[email protected]>
Web Address: [www.fas.usda.gov](http://www.fas.usda.gov/)
and <http://www.usembassy.at/en/usda/index.html>
Hungary
---------------------------------------------------- ------ -----------
TABLE A: KEY TRADE & DEMOGRAPHIC INFORMATION YEAR VALUE
Agricultural Imports From All Countries (\$Mil)/U.S. 2004 2,068 / 4%
Market Share (%)
Consumer Food Imports From All Countries 2004 1,129/ 2%
(\$Mil)/U.S. Market Share (%)
Edible Fishery Imports From All Countries 2004 35 / 1%
(\$Mil)/U.S. Market Share (%)
Total Population (Millions)/Annual Growth Rate (%) 2004 10 / -3.5%
Urban Population (Millions)/Annual Growth Rate (%) 2004 5.7 /-1.1%
Number of Major Metropolitan Areas 2004 1
Size of the Middle Class (Millions)/Growth Rate (%) N/a N/a
Per Capita Gross Domestic Product (U.S. Dollars) 2004 \$9,854
Unemployment Rate (%) 2004 7.6%
Per Capita Food Expenditures (incl. 2003 \$917
beverages/tobacco)(U.S. Dollars)
Percent of Female Population Employed 2003 46.9%
Exchange Rate (US\$1 = HUF) 2004 203
---------------------------------------------------- ------ -----------

|
en
|
all-txt-docs
|
237900
|
Benson's memoir. IIJ
the carpet to her piano. We are improved in manners true, and so far to our credit; but is there more of order among us, each one knowing his place ? more of deference to superiors; and superiors more regardful of station ? more of love of country, and less of profession of it 1 more of courage, and less vaunt of it ? more of the spirit of freemen, and so more of disdain of unworthy submission to the will of another f more solicitous for estimation, and so more so* lieitous to merit it ? more of truth, its modes, candor, sincerity, fidelity? Inquire of the Nestors who have lived both ages.
To the largest of the Elizabeth Islands, Block gave the name of the Texel, to Nantucket the name of Vlielandt. Extract from the voyage of Hudson as found in De Laet. " They made the land again in 41 deg. 43 minutes of north latitude, and supposed it to be an island, and gave it the name of Nieuwe Hollandt, New Holland, but afterwards found it was Cape Cod." The Dutch notwithstanding afterwards distinguished it as Staaten Hoeck, State's Point; and also by its French name, Cape Blanc, translated Witte Hoeck, White Point. ,
The Dutch name for our city was Nieuwe Amsterdam; to the tract, the plantations on the North rivef for about four miles, they gave the name of Bloemen'd Dal, syllable for syllable, Blooming Dale. There were two other seats on the island, probably not far distant from the town, and distinguished as Dats DalesVreden-dal, Peace-dale, the property of. Dr. De La Montagne, and Zegen-dal, Blessing-dale, the proprietor not mentioned; hence the conjecture not remote, that Bloemen'd Dal, however at first the name of an individual seat, soon served to denote the whole neighborhood of farms there, collectively.
The creek, the water between the north end of the island and the West-Chester shore, they called Spyt den Duyvel Kill, literally, in spite of the Devil Creek} a ford there before Kingsbridge built, and the spot distinguished as the Fonteyn, the Springs.
The northern chop of the entrance, from the Bay into the Kills, retains its Dutch name Konstabel's Hoeck, Con-stable's Hook; its Indian, Nipnichsen. Communipa, is InT dian; Paulus Hoeck, a person by the name of Paulus Schrick, and of note in the colony, described in a very early grant for lands in this city, as of the " Town of Bergen, in New Jersey;" Pavonia, a name given by the Dutch to the ground, the front or shore of it on the river still passing
|
en
|
all-txt-docs
|
374882
|
*Pages 1--3 from Microsoft Word - 20483.doc*
Federal Communications Commission DA 02- 1953
Before the Federal Communications Commission
Washington, D. C. 20554
) In the Matter of )
) Applications for Consent to the Transfer of ) MB Docket No. 02- 70
Control of Licenses from Comcast Corporation ) and AT& T Corp., Transferors, to )
AT& T Comcast Corporation, Transferee )
ORDER RULING ON JOINT OBJECTIONS
Adopted: August 7, 2002 Released: August 8, 2002
By the Chief, Media Bureau:
1. On March 28, 2002, the Commission adopted a protective order that applies to any confidential information provided by Comcast Corporation and AT& T Corp. ( the Applicants) in
connection with the above- captioned applications. 1 In the Protective Order, the Commission limited disclosure of confidential information to Outside Counsel of Record and In- House Counsel who are
actively engaged in the conduct of this proceeding, provided that, such counsel are not involved in competitive decision- making, i. e., In- House Counsels activities, association, and relationship with a
client are not such as to involve such counsels advice and participation in any or all of the clients business decisions made in light of similar or corresponding information about a competitor. 2
2. On July 18, 2002, the Applicants filed a joint objection to the disclosure of confidential information to John P. Frantz, in- house counsel of Verizon Telephone Companies and Verizon Internet
Solutions d/ b/ a Verizon. net ( Verizon). 3 Mr. Frantz holds the position of Vice President and Counselor to the General Counsel of Verizon, and on July 12, 2002, executed an Acknowledgment of
Confidentiality, seeking to review the confidential documents submitted herein by the Applicants. In their Joint Objection, the Applicants argue that Mr. Frantz is a senior level in- house counsel at Verizon
and therefore appears to be involved in competitive decision- making for Verizon. 4 In support of this assertion, the Applicants argue that [ b] ecause business and legal advice are often inextricably
1 In the Matter of Applications for Consent to the Transfer of Control of Licenses from Comcast Corporation and
AT& T Corp., Transferors, to AT& T Comcast Corporation, Transferee, Order Adopting Protective Order, MB Docket No. 02- 70, DA 02- 734 (rel. Med. Bur. March 29, 2002) ( Protective Order).
2 Protective Order at para. 2 (emphasis in original).
3 Joint Objection of Comcast Corporation and AT& T Corp. to Disclosure of Confidential Information ( Joint
Objection).
4 Joint Objection at 2.
1
Federal Communications Commission DA 02- 1953
interwoven, it is a virtual certainty that Mr. Frantz advises or participates in competitive decision- making in his role as Vice President and Counselor to Mr. Barr. 5
3. On July 22, 2002, Verizon filed an opposition to the Joint Objection of the Applicants. 6 In its Opposition, Verizon asserts that Mr. Frantzs duties involve the conduct of litigation and regulatory
proceedings and the provision of legal advice regarding such proceedings, and that he is not involved in any aspect of competitive decision- making at Verizon. 7 Verizon also asserts that Mr. Frantz is one of
thirty- four Verizon attorneys with the title of Vice President, and that he reports directly to one of seven Senior Vice Presidents and Deputy General Counsels, who, in turn, report to Mr. Barr.
4. In support of Verizons assertions, and attached to its Opposition, is a declaration of Mr. Frantz, 8 who states that he is not involved in any business decisions made at Verizon, and that his
responsibilities involve solely litigation and regulatory matters. 9 Mr. Frantz also states that in other cases, he has signed protective orders excluding in- house counsel engaged in competitive decision- making and,
without objection from the other side, reviewed confidential materials. 10 Also attached to Verizons Opposition is a declaration of William P. Barr, 11 Verizons Executive Vice President and General
Counsel, who states that Mr. Frantz is not involved in competitive decision- making at Verizon, nor does he advise me or any other Verizon officer on competitive decisions. 12
5. On July 25, 2002, the Applicants filed a joint response to Verizons Opposition. 13 In their Joint Response, the Applicants argue that the job responsibilities described by Mr. Frantz in his
declaration are remarkably similar to the job duties of other in- house counsel that the Commission previously has barred from reviewing sensitive information. 14 The cases to which Applicants attempt to
5 Id. at 3 (citation omitted). William P. Barr is Verizons General Counsel.
6 Opposition of Verizon Telephone Companies and Verizon Internet Solutions d/ b/ a Verizon. net to Joint Objection
of Comcast Corporation and AT& T Corp. to Disclosure of Confidential Information ( Opposition).
7 Id. at 2.
8 Declaration of John P. Frantz in Response to Joint Objection of Comcast Corporation and AT& T Corp. to
Disclosure of Confidential Information ( Frantz Declaration).
9 Mr. Frantzs declaration also lists his duties, none of which involve competitive decision- making.
10 Frantz Declaration at 2.
11 Declaration of William P. Barr in Response to Joint Objection of Comcast Corporation and AT& T Corp. to
Disclosure of Confidential Information ( Barr Declaration).
12 Barr Declaration at 1.
13 Joint Response of Comcast Corporation and AT& T Corp. to Opposition of Verizon to Joint Objection of Comcast
and AT& T to Disclosure of Confidential Information ( Joint Response).
14 Id. at 4 citing In the Matter of Application of WorldCom, Inc. and MCI Communications Corporation for Transfer
of Control of MCI Communications Corporation to WorldCom, Inc., Order Ruling on Joint Objections, 13 FCC Rcd 13478 (1998) ( WorldCom- MCI); and In the Matter of GTE Corporation, Transferor and Bell Atlantic
2
2
Federal Communications Commission DA 02- 1953
3
analogize are, however, distinguishable. In WorldCom- MCI, we found that two Bell Atlantic attorneys who were excluded from reviewing confidential documents had submitted cursory affidavits which did
not adequately explain their roles as Senior Vice President for the company. 15 Moreover, one of the senior vice presidents was described on the Bell Atlantic web site as being actively involved in
significant and strategic decisions at Bell Atlantic and as playing an important role in the technical development and management of the company. 16 In Bell Atlantic- GTE, Sprint admitted that it relied
upon the advice of two in- house counsels who subsequently were excluded from reviewing confidential documents to inform business strategies or decisions. 17 Neither in- house counsel submitted a
declaration prior to the Commissions Order to support their request for access.
6. In this case, the Applicants Joint Response provides no evidence that Mr. Frantz is involved in competitive decision- making at Verizon, i. e., that his responsibilities are such as to involve
such counsels advice and participation in any or all of the clients business decisions. 18 In fact, the record contains no evidence to rebut the declarations of Messrs. Frantz and Barr that Mr. Frantz is not
involved in competitive decision- making at Verizon. Therefore, in the absence of any countervailing information, we find that Mr. Frantz is eligible, pursuant to the Protective Order, to review confidential
information submitted by Comcast Corporation and AT& T Corp. in this matter.
7. Accordingly, IT IS ORDERED that, pursuant to sections 4( i), 4( j), 309, and 310 of the Communications Act, as amended, 47 U. S. C. 154( i), 154( j), 309, and 310, the Joint Objection of
Comcast Corporation and AT& T Corp. to Disclosure of Confidential Information, filed herein on July 18, 2002, IS DENIED.
FEDERAL COMMUNICATIONS COMMISSION
W. Kenneth Ferree Chief
Media Bureau
Corporation, Transferee for Consent to Transfer of Control, Order Ruling on Joint Objections, 14 FCC Rcd 3364 (1999) ( Bell Atlantic- GTE).
15 WorldCom- MCI, 13 FCC Rcd at 13479 2.
16 WorldCom- MCI, 13 FCC Rcd at 13479 n. 5. This language was removed from the Bell Atlantic website after it
was cited to the Commission by WorldCom and MCI.
17 Bell Atlantic- GTE, 14 FCC Rcd at 3365 2.
18 Protective Order at para. 2 (emphasis added). See also Matsushita Elec. Indus. Co. v. United States, 929 F. 2d
1577, 1579 (Fed. Cir. 1991).
3
|
en
|
converted_docs
|
280690
|
STATEMENT
Of
D. David Dershaw, M. D.
On Behalf of the Society for Breast Imaging
To the
Senate Committee on Health, Education, Labor and Pensions
RE: Mammography Quality Standards Act Reauthorization
April 8, 2003
Good Morning . My name is David Dershaw. I am Professor of Radiology at
Cornell University Medical College and the director of breast imaging at
Memorial Sloan-Kettering Cancer Center in New York City. I am also the
incoming president of the Society of Breast Imaging, the subspecialty
professional organization of radiologists who do mammography, and I am
testifying on the Society's behalf.
Thank you, Mr. Chairman, for inviting me to testify regarding the
reauthorization of the Mammography Quality Standards Act of 1992. It is
my belief that MQSA has played a significant role in improving the
quality of mammography. This program needs to be reauthorized so that
women can continue to benefit from high quality mammography.
Since enactment of the Mammography Quality Assurance Standards Act
(MQSA) in 1992, women in the U.S. have gained confidence in the
providers of their mammograms through the knowledge that mammography
facilities were being certified in accordance with federal standards. A
continuing decline in breast cancer death rates (almost 1/3 reduction
for invasive cancers in the 1990\'s) and increasing utilization of
mammography screening services (increased from 27% of eligible women in
the two years before 1987 to 66% in the two years before 1997) are
testaments to the success of the collaboration of radiologists,
mammography facility operators, and government regulators. This
consortium was carefully designed into the law. The improved quality of
mammography services has undoubtedly saved many lives and diminished the
anxiety of women in the United States about the quality of their
screening studies. The continued force of MQSA in maintaining this high
level of service is essential. On behalf of the Society of Breast
Imaging I again urge the reenactment of this legislation.
MAMMOGRAPHY INTERPRETIVE SKILLS ASSESMENT
Currently, MQSA requires that physicians interpreting mammograms
participate in 15 hours of Continuing Medical Education (CME) every
three years. CME is offered in a variety of ways such as attending
meetings and lectures. Although valuable in their content, these
meetings are rarely designed for radiologists to assess their skills.
The American College of Radiology has designed and tested over the past
decade the Mammography Interpretive Skills Assessment (MISA) test.
In 1999, this was made available as an interactive computer-based
CD-ROM. This offers radiologists an opportunity to participate in a
mammography self-assessment examination.
The purpose of the MISA is to provide the radiologist with an assessment
of his or her skills and to identify areas in which additional study or
skills improvement is warranted. This is not a pass/fail test or one
that is intended to certify or judge participants. The emphasis is on
self-help.
By providing the physician with seven or eight hours of CME, depending
on which CD the physician uses, physicians would be encouraged to use
the MISA for both continuing education and self-assessment. This might
be useful as a method of determining skills in addition to the data are
presently derived from the end results assessment required under MQSA
regulation.
While self-assessment testing may be of value, it should also be
recognized that there are no data to indicate that such tests provide
feedback that accurately determines competence. There is also no science
to indicate that such tests result in improvement in the quality of
medical care.
I am certain that the Committee recognizes that in order to achieve the
benefits obtained under MQSA those involved in mammography practice have
added time, effort and expense to the delivery of screening and
diagnostic mammography services because of the need to comply with
MQSA=s regulations. Although the mammography community is appreciative
of the higher standard set for its care than that generally required in
radiology or other areas of medical care, these have also imposed a
burden that has discourage some from offering these services. The
possible advantage of mandated self-evaluation, an additional regulation
that would need to be fulfilled and documented by mammography
facilities, should be weighed against the detrimental impact of
increased regulation of mammography facilities and radiologists
interpreting mammograms. Steps that might further discourage
radiologists to incorporate mammography into their careers may
accelerate the developing crisis in availability of mammography services
Radiologists interpreting mammograms are already in short supply due to
poor reimbursement rates and high litigation. It is my belief that
providing plaintiff lawyers with another potential avenue for litigation
will lead many more radiologists to turn away from mammography, thus
exacerbating the already critical access problem many women face in
receiving timely mammography services. If results of self-assessment
activities were to be subjected to discoverability in litigation cases
against physicians, the Society of Breast Imaging would strongly oppose
the incorporation of such testing into MQSA regulation.
The Committee should also recognize that the greatest threat to the
delivery of quality mammography services in the United States is the
impending shortage of radiologists, technologists and imaging facilities
to provide this service. Inadequate reimbursement persists with payments
for service often less than the cost of performing and interpreting
mammography. The most tenuous financial reimbursement is for
hospital-based services. As this is the site where most women on
Medicare and Medicaid receive their health care, the availability of
mammography to these women is the most threatened by inadequate
reimbursement.
Hospitals are also the sites where most of the training of physicians
and technologists occurs. Poor reimbursement, particularly when compared
to reimbursement levels for other radiology services, has left those
deciding what area of radiology to specialize in with an impression of
mammography as a big money loser. Along with high malpractice exposure
and considerable time and effort required to meet federal (and often
local) regulation, this negative impression works to discourage those in
training from selecting mammography as an area of specialization.
As the Committee considers reenactment of MQSA, I would like to make a
few comments about modifications that might be recommended in current
regulations.
As authorized under the original legislation and recommended by the
National Mammography Assurance Advisory Committee, regulation of
mammography services should be expanded to include stereotactic breast
biopsy and equipment used in needle localization procedures.
Furthermore, the current requirement for CME in digital mammography
beyond the initial training required before using digital mammography on
patients does not improve the quality of practice or contribute need
training to improve patient safety. This requirement is often difficult
to meet and the Committee should recommend that it be discontinued.
Thank you for the opportunity to testify. I would be happy to answer any
questions.
|
en
|
converted_docs
|
160153
|
**STATEMENT OF KATHERINE H. STEVENSON, ACTING ASSISTANT DIRECTOR,
BUSINESS SERVICES, NATIONAL PARK SERVICE, U.S. DEPARTMENT OF THE
INTERIOR, BEFORE THE SENATE SUBCOMMITTEE ON NATIONAL PARKS OF THE
COMMITTEE ON ENERGY AND NATURAL RESOURCES, CONCERNING H.R. 1191, TO
AUTHORIZE THE NATIONAL PARK SERVICE TO PAY FOR SERVICES RENDERED BY
SUBCONTRACTORS UNDER A GENERAL SERVICES ADMINISTRATION INDEFINITE
DELIVER/INDEFINITE QUANTITY CONTRACT ISSUED FOR WORK TO BE COMPLETED AT
THE GRAND CANYON NATIONAL PARK.**
**NOVEMBER 8, 2007**
Mr. Chairman, thank you for the opportunity to present the views of the
Department of the Interior on H.R. 1191, a bill that would authorize the
National Park Service to pay for services rendered by subcontractors
under a General Services Administration Indefinite Deliver Indefinite
Quantity Contract issued for work to be completed at the Grand Canyon
National Park.
The Department appreciates the subcommittee's efforts to address this
situation but opposes H.R. 1191. The Department also testified in
opposition to H.R. 3961, a similar bill, in testimony before the House
Subcommittee on National Parks on March 30, 2006.
H.R. 1191 would authorize payment, through the appropriation of such
funds as are necessary, to subcontractors who completed work under task
orders to Pacific General, Incorporated (PGI) for which PGI was paid,
but subcontractors were not. The work was completed under National Park
Service (NPS) task orders issued against PGI's Indefinite Deliver
Indefinite Quantity (IDIQ) contract with the General Services
Administration.
PGI's default has created a financial burden on the affected firms. The
NPS had a contractual relationship with the prime contractor, PGI. The
NPS does not have a contractual relationship with the subcontractors and
NPS does not have the legal authority to pay subcontractors who
completed work under PGI's IDIQ contract for which PGI failed to render
payment.
H.R. 1191 would authorize the Secretary to pay these subcontractors
under certain conditions. The bill would authorize payment if: 1) the
task orders issued to PGI by NPS have been terminated, 2) the amount
owed to the subcontractors is verified, 3) all reasonable legal avenues
or recourse have been exhausted by the subcontractors to recoup amounts
owed directly from PGI, and 4) the subcontractors provide a written
statement that payment of the amount verified represents payment in full
by the United States for all work performed at the park under PGI task
orders issued by NPS between Fiscal Years 2002 and 2003.
Between Fiscal Years 2002 and 2003, the Grand Canyon National Park
(park) issued approximately 40 task orders to PGI under this IDIQ
contract. Those task orders totaled an estimated \$17 million for
various construction projects throughout the park. Invoices sent to the
park indicated that PGI certified payments were being sent to
subcontractors and suppliers. The NPS paid more than \$10 million to
PGI, of which approximately \$1.4 million, based on our most recent
estimates, was owed, but never paid, to subcontractors. PGI has been
indicted by the U.S. District Attorney's Office in Arizona on 26 counts
of fraud involved with these task orders.
In January 2004, the park began receiving complaints from subcontractors
citing lack of payment by PGI. In February 2004, the NPS suspended
further payment to PGI and issued a suspension notice ordering PGI to
cease activity, followed by termination for default of 17 remaining task
orders. PGI has had every reasonable opportunity to resolve the
situation, but has since ceased doing business.
Following PGI's default, the NPS withheld payment to PGI and began
paying subcontractors directly for work completed on PGI task orders,
valued at \$906,335. Contract law generally prohibits payments directly
to subcontractors because of the lack of a direct, contractual
relationship between the parties. However, in this case, NPS consulted
with the Government Accountability Office (GAO) and with their approval,
began paying subcontractors directly for these claims. NPS has used
approximately 92% of the withheld funds to pay 41 claims of an estimated
total of 76 claims submitted.
The impact of PGI's default was compounded by lapses in the contracting
operations at Grand Canyon National Park. An acquisition management
review conducted by the NPS Washington Contracting and Procurement
Office, determined that the park had failed to obtain payment and
performance bonds from PGI required by the IDIQ contract and the Miller
Act (40 U.S.C. § 3131). To prevent future lapses, we have strengthened
internal controls both at the park and regional level. For example, the
park superintendent is now annually evaluated for management of the
park's contracting program. In addition, the NPS Intermountain Region
will be conducting periodic acquisition management reviews of the Grand
Canyon contracting program.
The Department understands the hardships PGI's default and NPS' actions
have placed upon the involved subcontractors. The payment bonds required
of the contractor under the Miller Act are designed to protect
subcontractors who do not have the recourse of placing a lien on the
property at issue, since liens cannot be placed on government property.
The courts have held that, while the contractor has an obligation to
provide such bonds, the Miller Act places no affirmative obligation on
the federal government to ensure the bonds have been obtained. The
Department recognizes that H.R. 1191 is intended to be an equitable
resolution to a difficult situation. However, it singles out one
situation for relief not available to others under the Miller Act and
would effectively have NPS pay for the same services twice.
Although we are sympathetic about the position of the subcontractors,
the Administration is concerned about the precedent that would be set by
requiring the federal government to assume the liability for the
contractor's default, particularly in a situation where no contractual
relationship exists.
Mr. Chairman, this concludes my prepared remarks. I will be happy to
answer any questions you or other members of the subcommittee might
have.
**STATEMENT OF KATHERINE H. STEVENSON, ACTING ASSISTANT DIRECTOR,
BUSINESS SERVICES, NATIONAL PARK SERVICE, DEPARTMENT OF THE INTERIOR,
BEFORE THE SUBCOMMITTEE ON NATIONAL PARKS OF THE SENATE COMMITTEE ON
ENERGY AND NATURAL RESOURCES, CONCERNING S. 1365 TO AMEND THE OMNIBUS
PARKS AND PUBLIC LANDS MANAGEMENT ACT OF 1996 TO AUTHORIZE THE SECRETARY
OF THE INTERIOR TO ENTER INTO COOPERATIVE AGREEMENTS WITH ANY OF THE
MANAGEMENT PARTNERS OF THE BOSTON HARBOR ISLANDS NATIONAL RECREATION
AREA, AND FOR OTHER PURPOSES.**
**NOVEMBER 8, 2007**
Mr. Chairman, thank you for the opportunity to appear before your
committee to present the views of the Department of the Interior on S.
1365, a bill to amend the Omnibus Parks and Public Lands Management Act
of 1996 to authorize the Secretary of the Interior to enter into
cooperative agreements with any of the management partners of the Boston
Harbor Islands National Recreation Area.
The Department has concerns with the bill as written. The Department is
particularly concerned about the use of cooperative agreements for
construction of park facilities by non-Federal partners using
appropriated funds. We would like to follow up with written comments on
how this bill could be modified to address the needs of the park and its
partners while ensuring the appropriate use of Federal funds.
This bill would change the authorizing legislation for the Boston Harbor
Islands National Recreation Area. Section 1029 of Public Law 104-333
authorized the Secretary to enter into cooperative agreements with the
Commonwealth of Massachusetts or its political subdivisions to implement
the management plan for the national recreation area. The law did not
authorize cooperative agreements with the non-profit organizations,
named within the Act, that administer the Boston Harbor Islands in
partnership with the Secretary through the Boston Harbor Islands
Partnership (Partnership) established in section (e) of the Act. S. 1365
would explicitly permit the Secretary to enter into cooperative
management agreements with the three non-profit organizations named in
section (e)(2) of the Act: the Island Alliance, The Trustees of
Reservations, and the Thompson Island Outward Bound Education Center.
This authority would allow the Secretary to contract with these
non-profit organizations for any goods or services needed in the
administration of the recreation area
Authorized in 1996, the Boston Harbor Islands National Recreation Area
includes 30 islands within Boston Harbor, all located within 10 miles or
less of downtown Boston. Unlike most park units, the National Park
Service does not own any of the islands within the boundary of the
recreation area.
The recreation area has proven itself a model of collaborative park
management. The 13 entities named in the original legislation have
endorsed an ambitious management plan and have realized many of its
goals. Together they have spent \$78.5 million to provide visitor
services, rebuild island infrastructure and protect park resources, and
\$76.6 million to develop new parkland and facilities. Their combined
park operating expenditures total \$7.5 million annually. Federal
dollars total less than one-quarter of park expenditures, with the rest
coming from State and local government and private donations as required
in the enabling legislation. We believe that we can find a solution that
will allow us to work constructively with our partners and we intend to
follow up with further suggestions for amending this legislation.
Mr. Chairman, thank you for the opportunity to comment. This concludes
my prepared remarks and I will be happy to answer any questions you or
other committee members might have.
STATEMENT OF KATHERINE H. STEVENSON, ACTING ASSISTANT DIRECTOR, BUSINESS
SERVICES, NATIONAL PARK SERVICE, U.S. DEPARTMENT OF THE INTERIOR, BEFORE
THE SUBCOMMITTEE ON NATIONAL PARKS OF THE SENATE COMMITTEE ON ENERGY AND
NATURAL RESOURCES, CONCERNING S. 1449, TO ESTABLISH THE ROCKY MOUNTAIN
SCIENCE COLLECTIONS CENTER TO ASSIST IN PRESERVING THE ARCHEOLOGICAL,
ANTHROPOLOGICAL, PALEONTOLOGICAL, ZOOLOGICAL, AND GEOLOGICAL ARTIFACTS
AND ARCHIVAL DOCUMENTATION FROM THE ROCKY MOUNTAIN REGION THROUGH THE
CONSTRUCTION OF AN ON-SITE, SECURE COLLECTIONS FACILITY FOR THE DENVER
MUSEUM OF NATURE AND SCIENCE IN DENVER, COLORADO.
# NOVEMBER 8, 2007
Mr. Chairman, thank you for the opportunity to present the views of the
Department of the Interior on S. 1449, a bill to establish the Rocky
Mountain Science Collections Center to assist in preserving the
archeological, anthropological, paleontological, zoological, and
geological artifacts and archival documentation from the Rocky Mountain
region through the construction of an on-site, secure collections
facility for the Denver Museum of Nature and Science in Denver,
Colorado.
The Department opposes S. 1449. Our opposition does not detract from the
significance and importance of the artifacts and documents currently
being housed at the Denver Museum of Nature and Science (museum). The
museum is a place of learning and a keeper of important collections that
showcase many of the unique features of the Rocky Mountain region. We
encourage the museum to continue to seek other funding and solutions for
the preservation and protection of the collections in their care
including working with existing programs managed by all of the federal
agencies with collections stored at the museum.
S. 1449 would authorize the Secretary of the Interior, subject to the
availability of appropriations, to award as much as \$15 million in
grant monies, identified as the federal share, to the museum to pay for
the cost of constructing and furnishing one or more new facilities. The
bill states the museum would, as a condition of receiving this
assistance, match with cash, in-kind donations, or services, any amount
provided to the museum under this Act.
We appreciate the interest the museum has in providing the highest level
of care to the objects in its collection. However, we believe the use of
limited National Park Service (NPS) appropriations to fund the design,
construction, and operation of non-NPS projects of this type is
inappropriate.
Since the mid-1990's, legislation has been passed and signed into law
that authorized several hundreds of millions of dollars in grants to be
passed through the NPS budget for non-Park System projects. Many of
these projects involved support for museums and libraries, similar to
what is proposed in S. 1449. Each time this is done, it reduces the
availability of NPS's limited amount of discretionary funds to address
the needs of our national parks and other important national priorities.
We believe funds are more appropriately directed at this time to
reducing the long list of projects and needs that have been identified
in our national parks.
The museum contains more than 1,000,000 artifacts and documents. Like
many western museums, a large proportion of the collection was recovered
from federal lands managed by the Bureau of Land Management, the Bureau
of Reclamation, the National Park Service, the United States Fish and
Wildlife Service, the U.S. Forest Service, and the U.S. Army Corps of
Engineers. This impressive collection assists researchers and anybody
interested in finding out more about the West, as do many other similar
museums.
However, the financial implications of the bill on national parks and
park programs at a time when all federal agencies must work harder to be
responsible stewards of the resources of American taxpayers causes us to
oppose S. 1449. The Department is willing to work with all of the
involved agencies and the museum to thoroughly assess all possible
alternatives for providing the highest level of care to the objects
currently housed at the museum, including, if necessary, the
transferring of collections to federal repositories.
This completes my formal remarks. I would be happy to answer any
questions you or other members of the Subcommittee may have.
**STATEMENT OF KATHERINE H. STEVENSON, ACTING ASSISTANT DIRECTOR,
BUSINESS SERVICES, NATIONAL PARK SERVICE, DEPARTMENT OF THE INTERIOR,
BEFORE THE SENATE ENERGY AND NATURAL RESOURCES COMMITTEE, CONCERNING S.
1921, TO AMEND THE AMERICAN BATTLEFIELD PROTECTION ACT OF 1996 TO EXTEND
THE AUTHORIZATION FOR THAT ACT, AND FOR OTHER PURPOSES.**
**NOVEMBER 8, 2007**
**\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_**
Mr. Chairman and members of the committee, thank you for the opportunity
to appear before you today to present the views of the Department of the
Interior on S. 1921, a bill to amend the American Battlefield Protection
Act of 1996 and extend the authorization for that act, and other
purposes.
The Department supports enactment of this bill.
S. 1921 would extend the authorization from fiscal years September 30,
2009 through September 30, 2013 for battlefield preservation grants
under the Civil War Battlefield Preservation Act of 2002. The purpose of
this act is to: (1) to protect battlefields and sites associated with
armed conflicts that influenced the course of our history, (2) to
encourage and assist all Americans in planning for the preservation,
management, and interpretation of these sites, and (3) to raise the
importance of preserving battlefields and related sites for future
generations, through the upcoming sesquicentennial commemoration of the
Civil War, 2011-2015.
[American Battlefield Protection Program]{.underline}
The National Park Service's American Battlefield Protection Program
(ABPP) is a small, cost-effective program that promotes the preservation
of battlefields and related sites of all wars on American soil through
"planning and partnerships." The ABPP promotes battlefield preservation
strategies for protecting sites of armed conflict that cannot or should
not be preserved by federal ownership, but must nonetheless be saved in
order for future generations of Americans to understand the importance
of these irreplaceable sites.
In order to achieve these goals, the ABPP provides a range of financial
and technical assistance to Federal, State, and local partners on issues
of battlefield landscape identification, documentation, planning,
interpretation, and economic development. The program encourages states,
communities, non-profit organizations, and individual citizens to become
the stewards of battlefields. By empowering local communities and
private landowners to make the best decisions possible, the ABPP enables
these communities and owners to develop local solutions for balanced
preservation approaches.
The ABPP provides yearly battlefield preservation project grants to
assist communities and organizations striving to save our battlefields.
The project grants have helped States, Tribes, and local communities
identify and document historic battlefield resources, nominate historic
battlefields to the National Register of Historic Places, plan for
resource stewardship and conservation, interpret the battlefields for
the visiting public, and develop heritage tourism programs that
encourage battlefield preservation.
Over the life of the program, ABPP has awarded 329 project grants
totaling over \$7.7 million to organizations in 37 States, the District
of Columbia, and the Republic of Palau.
[Acquisition Grants]{.underline}
In 2002, P.L. 107-359, the Civil War Battlefield Protection Act, amended
the original ABPP authorization to establish the battlefield acquisition
grant program. It directed the Secretary to submit to Congress a report
on updates of the battlefield preservation activities, and authorized
appropriations to the Secretary from the Land and Water Conservation
Fund for each fiscal year 2004-2008. These grants help State and local
governments acquire Civil War battlefield lands outside of the
legislative boundaries of units of the National Park System. In order to
be eligible to receive these grants, Congress established the following
three requirements: (1) the battlefield must be among the 384 identified
by the Civil War Sites Advisory Commission; (2) the land to be acquired
must not be within the exterior boundaries of any unit of the National
Park System; and (3) any land acquired with the assistance of the grant
program may not be subsequently converted to a non-conservation use
without the prior written permission of the Secretary of the Interior.
In addition, the ABPP set two additional requirements: (1) any grant
awarded must be supported by an appraisal of the property's value in
accordance with federal standards for property appraisals; and (2) any
land acquired with the assistance of the grant program must be protected
by a perpetual easement sufficient to protect the significant
above-ground features of the battlefield landscape as well as the
battlefield's archeological resources.
The grant fund has been tremendously successful in allowing local
preservation efforts to permanently preserve Civil War battlefield land
with a minimum of federal assistance. Grants of \$26.3 million from ABPP
have leveraged a total of \$52 million in nonfederal funding. To date,
the grant program has assisted in the permanent protection of 15,705
acres at 72 Civil War battlefields.
Mr. Chairman, this concludes my testimony. I would be happy to answer
any questions you or other committee members may have regarding this
bill.
**STATEMENT OF KATHERINE H. STEVENSON, ACTING ASSISTANT DIRECTOR,
BUSINESS SERVICES, NATIONAL PARK SERVICE, DEPARTMENT OF THE INTERIOR,
BEFORE THE SUBCOMMITTEE ON NATIONAL PARKS OF THE SENATE COMMITTEE ON
ENERGY AND NATURAL RESOURCES, CONCERNING S. 1941, A BILL TO DIRECT THE
SECRETARY OF THE INTERIOR TO STUDY THE SUITABILITY AND FEASIBILITY OF
DESIGNATING THE WOLF HOUSE, LOCATED IN NORFORK, ARKANSAS, AS A UNIT OF
THE NATIONAL PARK SYSTEM**
**November 8, 2007**
Mr. Chairman and members of the subcommittee, thank you for the
opportunity to appear before you today to present the Department of the
Interior's views on S. 1941, a bill to direct the Secretary of the
Interior to study the suitability and feasibility of designating the
Wolf House, located in Norfork, Arkansas, as a unit of the National Park
System.
The Department opposes S. 1941. While the Wolf House is an impressive
historical structure, it is not distinguished beyond that of many other
historical log structures in cities all over the United States. It is
currently operated by the Wolf House Memorial Foundation, Inc.,
(Foundation) with the backing of Baxter County, Arkansas. Even though
the Wolf House has significance for the political history of the state
of Arkansas, we believe it may be more suited for inclusion in the State
Park system, either separately or as part of Bull Shoals-White River
State Park. Finally, we believe that priority should be given to the 35
previously authorized studies for potential units of the National Park
System, potential new National Heritage Areas, and potential additions
to the National Trails System and National Wild and Scenic River System
that have not yet been transmitted to the Congress.
S. 1941 would authorize a study of the Wolf House, a two-story dogtrot
log structure dating back to 1829. It is a relic of the Arkansas
territorial period, the oldest territorial courthouse west of the
Mississippi River, and is located on Highway 5 in Norfork, Arkansas. It
also would study the Wolf House property, several outbuildings, and
portions of several city lots, all located within the city of Norfork.
The study would be conducted in accordance with the criteria contained
in Section 8(c) of Public Law 91-383 (16 U.S.C. 1a-5(c)). A report that
includes the findings, conclusions, and recommendations for future
management of the study area would be required to be transmitted by the
Secretary to Congress no later than one year after enactment of this
legislation. S. 1941 states that the Wolf House is located in the city
of Norfolk; the correct location is the city of Norfork.
The Wolf House became the property of the city of Norfork in the 1930s
and was maintained and opened to the public by interested citizens who
eventually formed the Foundation. The Wolf House was placed on the
National Register of Historic Places on April 13, 1973. In the 1990s,
controversies over management of the property led the Foundation to
approach the Arkansas State Parks to assume responsibility for the
property. They were told that the State Parks could not acquire new
properties at the time. In 1999, the Foundation and the city of Norfork
quit claimed their ownership of the property to Baxter County. At the
same time, the Arkansas Historic Preservation Program acquired a
historic preservation easement on the property.
Mr. Chairman, this concludes my prepared testimony. I would be pleased
to answer any questions you or the subcommittee may have.
STATEMENT OF KATHERINE H. STEVENSON, ACTING ASSISTANT DIRECTOR, BUSINESS
SERVICES, NATIONAL PARK SERVICE, U.S. DEPARTMENT OF THE INTERIOR, BEFORE
THE SUBCOMMITTEE ON NATIONAL PARKS OF THE SENATE COMMITTEE ON ENERGY AND
NATURAL RESOURCES, CONCERNING S. 1961, A BILL TO REVISE THE BOUNDARY OF
THE LITTLE RIVER CANYON NATIONAL PRESERVE IN THE STATE OF ALABAMA, AND
FOR OTHER PURPOSES.
# NOVEMBER 8, 2007
Mr. Chairman and members of the Subcommittee, thank you for the
opportunity to appear before you today to present the views of the
Department of the Interior on S. 1961, a bill to revise the boundary of
the Little River Canyon National Preserve in the State of Alabama, and
for other purposes.
The Department supports S. 1961. S. 1961 would expand the boundaries of
the Little River Canyon National Preserve (Preserve) to add
approximately 1,656 acres that would be acquired by purchase from
willing sellers or through donation. Appraisals have not been completed
on any of the involved properties so the costs associated with the
potential acquisitions are unknown. The Preserve currently includes
13,797 acres, and the NPS roughly estimates acquisition costs to be
between \$9 million and \$12 million. No funding has yet been identified
for any of the acquisitions proposed in this bill. Funding for any of
these acquisitions would be subject to the budget prioritization process
of the National Park Service.
Little River Canyon National Preserve was established as a unit of the
National Park System by Public Law 102-427, to protect and preserve the
natural, scenic, recreational and cultural resources of the area and to
provide for public enjoyment of those resources. The Little River Canyon
is located in northeast Alabama between Gadsden, Alabama and
Chattanooga, Tennessee. Birmingham, Alabama is approximately 100 miles
southwest of the Preserve and Atlanta, Georgia is about 110 miles to the
southeast.
The Preserve contains an outstanding example of an Appalachian Plateau
Province Canyon System and the canyon and the Little River together form
one of the extraordinary natural features of Alabama. The Preserve is
biologically diverse and home to a number of rare plants and animals.
Numerous recreational pursuits are also available within the Preserve
boundaries including a 23-mile canyon rim drive, which provides easy
access to superlative scenic views.
The Preserve also includes important scenic, natural, cultural,
recreational, and scientific resources. Little River Canyon's stream
resources are excellent and the Little River is classified by the State
of Alabama as an Outstanding National Resource Water providing an
opportunity for world-class whitewater boating. Little River is one of a
very few river systems with most of its length atop a mountain, in this
case, Lookout Mountain.
The Preserve lies at the southern limits of the Cumberland Plateau and
Little River Canyon is the deepest canyon in Alabama and one of the
deepest in the eastern United States. As such, the Preserve contains
some of the most rugged scenery in the southeast which contributes to
significant biological diversity including habitat for a unique
assemblage of plants and animals. In addition, the Preserve includes a
wide assortment of archeological resources and historic sites.
The acquisitions proposed in S. 1961 would help the National Park
Service (NPS) meet the requirements established in the Preserve's
enabling legislation, which direct the NPS to protect and preserve the
scenic resources of Little River Canyon. Additionally, in the northeast
portion of the Preserve the current boundary is narrow and many of the
Preserve's recreational trails cross private property in that area.
Expanding the boundary as proposed in S. 1961 would allow the NPS to
purchase lands from willing sellers and enhance recreational resources
for Preserve visitors by ensuring that these trails no longer cross
private property.
The current western boundary of the Preserve meanders back and forth
across state and county roads which make up the Preserve's scenic drive.
The boundary expansion proposed in S. 1961 would relocate the boundary
in this area to the western edge of the state and county rights-of-way.
In addition to including land between the roads and the canyon within
the Preserve boundary, this adjustment would allow the NPS to apply for
federal highway funds in order to improve the roads to help them meet
Federal Highway Administration safety standards. The present condition
of this portion of the scenic drive is characterized by steep hills and
locations where sight distance is limited. As a result, the NPS has had
to install signs warning drivers of motor homes and other large vehicles
to avoid the southern two-thirds of the drive for their own safety.
Including the roads and the lands between them and the current park
boundary within the Preserve would also make it feasible to add
additional scenic overlooks and bicycle lanes.
Mr. Chairman, this concludes my formal remarks. I would be happy to
answer any questions you or any members of the subcommittee might have.
**STATEMENT OF KATHERINE H. STEVENSON, ACTING ASSISTANT DIRECTOR,
BUSINESS SERVICES,** **NATIONAL PARK SERVICE, DEPARTMENT OF THE
INTERIOR, BEFORE THE SUBCOMMITTEE ON NATIONAL PARKS OF THE SENATE
COMMITTEE ON ENERGY AND NATURAL RESOURCES, CONCERNING S. 1991, TO
AUTHORIZE THE SECRETARY OF INTERIOR TO conduct a study to determine the
suitability and feasibility of extending the Lewis and Clark National
Historic Trail to include additional sites associated with the
preparation and return phases of the expedition**
**November 8, 2007**
Mr. Chairman and members of the subcommittee, thank you for the
opportunity to appear before you today to present the Department of the
Interior's views on S. 1991, a bill to authorize the Secretary of the
Interior to conduct a study to determine the suitability and feasibility
of extending the Lewis and Clark National Historic Trail to include
additional sites associated with the preparation and return phases of
the expedition.
While the Department has some concerns about the need for the study, we
do not object to the enactment of S. 1991. However, we believe that
priority should be given to the 35 previously authorized studies for
potential units of the National Park System, potential new National
Heritage Areas, and potential additions to the National Trails System
and National Wild and Scenic River System that have not yet been
transmitted to the Congress.
S. 1991 would authorize a study to determine whether the routes followed
by Meriwether Lewis and William Clark, whether independently or
together, in the preparation phase of the expedition starting at
Monticello, located near Charlottesville, Virginia, and traveling to
Wood River, Illinois, and in the return phase of the expedition from
Saint Louis, Missouri, to Washington, D.C., would meet the suitability
and feasibility criteria for extending the Lewis and Clark National
Historic Trail to include these routes and their associated sites. These
sites and routes are commonly referred to as the "Eastern Legacy." These
routes include designated Lewis and Clark sites in Virginia, the
District of Columbia, Maryland, Delaware, Pennsylvania, West Virginia,
Ohio, Kentucky, Tennessee, Indiana, Missouri, and Illinois. The study
also would analyze the potential impact that the inclusion of the
Eastern Legacy would have on those sites, as well as on the tourist
visitation to the western half of the trail. The bill would require the
Secretary of the Interior to complete the study and provide its
conclusions and recommendations within two years from the date funds are
first made available for that purpose. We estimate the cost to complete
the study would be approximately \$250,000 to \$300,000.
There have been many discussions in recent years between scholars and
interested individuals concerning whether the Eastern Legacy sites and
routes merit inclusion in the Lewis and Clark National Historic Trail.
However, the issue of whether this area is suitable and feasible as an
administrative unit of the National Trails System has not been
addressed. S. 1991 would provide that authority.
Discussions in the past against extending the trail to include the
Eastern Legacy are focused primarily on the common historical
understanding of where the expedition itself began. President
Jefferson's instructions to Captain Meriwether Lewis clearly imply that
the expedition began with the ascent of the Missouri River. The actual
transfer of title to and power over the Louisiana Territory from France
to the United States was not effective until March 10, 1804. Prior to
that date, the Spanish Lt. Governor of Upper Louisiana refused the
expedition's request to proceed up the Missouri; so it is clear that the
journey of exploration could not begin until after that date. The
journals of the expedition by Captains Lewis and Clark are the official
chronicles of the project. On May 14, 1804, the day the expedition left
Camp Wood and began its ascent of the Missouri River, Captain Clark
wrote in his journal "The mouth of the River Dubois is to be considered
as the point of departure." In his journal, Captain Lewis stated that he
had informed President Jefferson, by letter, of the departure; this,
too, would seem to imply that the expedition began that day.
Some believe that important locations in the Eastern Legacy are already
recognized by the trail as certified sites and that they do not need to
be connected to the Lewis and Clark National Historic Trail. There is
also some concern that extending the trail will somehow dilute the
attention to and importance of the existing official trail.
Others point out that the expedition did not simply spring forth from
Wood River, Illinois on May 14, 1804, but involved years of preparation
at other locations. These include the ruminations of westward expansion
and manifest destiny by Thomas Jefferson at Monticello in Virginia, the
acquisition of firearms at Harpers Ferry, West Virginia, Lewis' training
in medicine and scientific observation in Philadelphia, and taking
delivery of the keel boat in Pennsylvania and struggling through low
water to bring the boat down the Ohio River.
Although the field expedition ended in September 1806 with the Corps of
Discovery's return to Saint Louis, there were still important tasks to
undertake such as reporting to the White House to brief the President on
the findings of the expedition. Some say that Lewis' death was
attributable in large part to the expedition and that his grave on the
Natchez Trace should be a part of the trail. As intended by President
Jefferson, the expedition and manifest destiny had far reaching impacts
and ramifications beyond the West to American society as a whole, and he
certainly considered that his dream of a nation from "sea to shining
sea" had been fulfilled, despite the failure to find the mythical
"Northwest Passage."
A suitability and feasibility study would take into account the reasons
for adding the Eastern Legacy by various interested agencies,
organizations, and individuals and evaluate the merits of including the
additional routes and sites in the Lewis and Clark National Historic
Trail.
Mr. Chairman, this concludes my prepared testimony. I would be pleased
to answer any questions you or other members of the subcommittee may
have.
**STATEMENT OF KATHERINE H. STEVENSON, ACTING ASSISTANT DIRECTOR,
BUSINESS SERVICES,** **NATIONAL PARK SERVICE, DEPARTMENT OF THE
INTERIOR, BEFORE THE SUBCOMMITTEE ON NATIONAL PARKS OF THE SENATE
COMMITTEE ON ENERGY AND NATURAL RESOURCES, CONCERNING S. 2098, TO
ESTABLISH THE NORTHERN PLAINS NATIONAL HERITAGE AREA IN THE STATE OF
NORTH DAKOTA**
# November 8, 2007
Mr. Chairman and members of the subcommittee, thank you for the
opportunity to appear before you today to present the Department of the
Interior's views on S. 2098, a bill to establish the Northern Plains
National Heritage Area in the State of North Dakota.
While the Department appreciates the historic, cultural and natural
features of the area, the Department does not support S. 2098. The
feasibility study produced by the Northern Plains Heritage Foundation
did not meet all of the criteria for designation as a national heritage
area. It did not include the existence of significant levels of public
involvement and support and the local commitments necessary for
successful planning and implementation of a heritage area.
Without further dialog with residents in the region and the support of
current living descendents, we are concerned that the Heritage Area
would not be poised for success and a sustainable future. Success of
this grassroots movement depends upon whether or not there is strong
region-wide support, so we respectfully request the Heritage Area
proponents engage more residents and Mandan-Hidatsa descendents in a
dialog.
We remind the committee that our past support of an amendment to S. 1544
in the 109^th^ Congress authorizing a study did not necessarily mean
that the Department would support designation of this National Heritage
Area.
We generally have asked that the subcommittee defer action on new
designations of National Heritage Areas until program legislation is
enacted. Last year, the Administration sent to Congress a legislative
proposal to establish such guidelines and a process for designation.
Bills were introduced in the 109th Congress (S. 243, H.R. 760 and H.R.
6287) that incorporated the majority of the provisions of the
Administration's proposal, and S. 243 passed the Senate. During the
110th Congress, a similar heritage area program bill, S. 278, has been
introduced and reported by the Senate Energy and Natural Resources
Committee.
Requiring evidence of broad public support prior to designation is
consistent with the steps and criteria for the National Heritage Area
program that have been informally implemented for many years. The steps
and criteria have been developed with input from Congress, existing
National Heritage Areas, and other experts and are designed to ensure
that an area has the resources, local interest, and other qualities that
are critical in establishing a successful National Heritage Area.
The four critical steps that need to be completed before Congress
establishes a National Heritage Area are:
1\. completion of a feasibility study;
2\. public involvement in the feasibility study;
3\. demonstration of widespread public support among heritage area
residents for the proposed designation; and
> 4\. commitment to the proposal from the appropriate players which may
> include governments, industry, and private, non-profit organizations,
> in addition to the local citizenry.
S. 2098 would establish the Northern Plains National Heritage Area. The
core area is approximately 80 miles long, anchored at each end by
nationally designated landmarks. Huff Indian Village National Historic
Landmark, an ancient Mandan Indian Village is the southern anchor and
Big Hidatsa Village National Historic Landmark, an ancient Hidatsa
village located within the Knife River Indian Villages National Historic
site at Stanton, North Dakota, is the northern anchor. Huff and Menoken
National Historic Landmarks are also state historic sites preserved and
managed by the State Historical Society of North Dakota. This area
encompasses the ancient homeland of the Mandan and Hidatsa American
Indian nations as well as the Menoken Indian Village, an early Indian
village site just east of Bismarck, North Dakota, which also bears
national historic landmark status.
The bill designates the Northern Plains Heritage Foundation, a
non-profit corporation established under the laws of the State of North
Dakota, as the management entity for the Heritage Area and outlines its
duties. It also authorizes the development of a management plan and
technical assistance to carry out the plan. The bill also requires the
Secretary to conduct an evaluation three years prior to the cessation of
Federal funding under this act.
Long before the Europeans came to the area, Mandan and Hidatsa cultures
flourished along the river in North Dakota. These early people thrived
for centuries in heavily populated agricultural communities along the
fertile floodplains. They also depended on the abundance of fish, game,
and other wildlife throughout the prairies. They were later followed by
pioneers and homesteaders---generations of farmers and ranchers who
continue to cultivate the land and reap the harvest provided by the
abundance of the Northern Plains environment.
The villages of these early settlers served as a central hub in a trade
network that spanned the continent. The Heart River segment of the
Missouri River was the center of the universe for the first people, the
Mandans, who constructed their permanent earthlodge villages along the
Missouri River and its tributaries. The Lewis and Clark Expedition even
benefited from the hospitality and friendship of the Mandan and Hidatsa
when they spent the winter along the Garrison Reach near present-day
Washburn.
Today, the Mandan language is in danger of extinction with only two
conversational speakers able to participate in a preservation project.
Therefore, as part of their preservation initiatives within the Northern
Plains area, the Northern Plains Heritage Foundation's language
initiative is focusing on preserving and archiving language
vocabularies, beginning with the recording of Mandan language materials.
It also is supporting the development of instructional materials for
Mandan, Hidatsa, Arikara, Lakota, French and German language teachers.
Language has always been a key element that characterizes and underpins
the cultural integrity and unique identity of a people or an ethnic
group.
The Department believes that further evaluation and public engagement
would ensure widespread public involvement, and determine local interest
and commitment, thus strengthening the current feasibility study. We
also believe that further examination of the boundaries to include the
current Mandan-Hidatsa homeland and the unique geographical, cultural,
and historical resources of the Northern Plains area would provide other
valuable information as to whether the area qualifies for designation as
a National Heritage Area.
Mr. Chairman, that concludes my statement. I would be pleased to answer
any questions you or other members of the subcommittee may have.
|
en
|
converted_docs
|
530483
|
Demographics
+-------------------------------------+------------+-------------------+
| Client Name: ** ** | # D | |
| | ate: | |
+-------------------------------------+------------+-------------------+
| # Current Address: | # | |
| | Phone #: ( | |
| Street | ) | |
| | - | |
| City, State | | |
| | | |
| Zip Code | | |
+-------------------------------------+------------+-------------------+
| # Date of Birth: | # Mari | |
| | tal/Relati | |
| | onship Sta | |
| | tus: | |
+-------------------------------------+------------+-------------------+
| # Nation/Tribe/Ethnicity: | | |
+-------------------------------------+------------+-------------------+
| **Primary language of client:** | | **Secondary:** |
| | | |
+-------------------------------------+------------+-------------------+
| **Referral Source:** | | **Phone:** |
+-------------------------------------+------------+-------------------+
| **Emergency Contact: ** | | **Phone: ** |
+-------------------------------------+------------+-------------------+
Critical Population (choose all that apply)
+-------------------+---+-----------------------+-----+----------------+
| #### | # | | ### | |
| ## Funding Source | # | | ### | |
| | # | | Le | |
| | # | | gal | |
| | # | | In | |
| | # | | vol | |
| | | | vem | |
| | R | | ent | |
| | e | | | |
| | s | | | |
| | i | | | |
| | d | | | |
| | e | | | |
| | n | | | |
| | t | | | |
| | i | | | |
| | a | | | |
| | l | | | |
+-------------------+---+-----------------------+-----+----------------+
| Food Stamp | H | | P | |
| Recipient | o | | rot | |
| | m | | ect | |
| | e | | ive | |
| | l | | Se | |
| | e | | rvi | |
| | s | | ces | |
| | s | | (AP | |
| | | | S/C | |
| | | | PS) | |
+-------------------+---+-----------------------+-----+----------------+
| TANF Recipient | S | | Co | |
| | h | | urt | |
| | e | | O | |
| | l | | rde | |
| | t | | red | |
| | e | | Se | |
| | r | | rvi | |
| | R | | ces | |
| | e | | | |
| | s | | | |
| | i | | | |
| | d | | | |
| | e | | | |
| | n | | | |
| | t | | | |
+-------------------+---+-----------------------+-----+----------------+
| SSI Recipient | L | | On | |
| | o | | Pro | |
| | n | | bat | |
| | g | | ion | |
| | T | | | |
| | e | | | |
| | r | | | |
| | m | | | |
| | C | | | |
| | a | | | |
| | r | | | |
| | e | | | |
| | E | | | |
| | l | | | |
| | i | | | |
| | g | | | |
| | i | | | |
| | b | | | |
| | i | | | |
| | l | | | |
| | i | | | |
| | t | | | |
| | y | | | |
+-------------------+---+-----------------------+-----+----------------+
| SSDI Recipient | L | | On | |
| | o | | Par | |
| | n | | ole | |
| | g | | | |
| | T | | | |
| | e | | | |
| | r | | | |
| | m | | | |
| | C | | | |
| | a | | | |
| | r | | | |
| | e | | | |
| | R | | | |
| | e | | | |
| | s | | | |
| | i | | | |
| | d | | | |
| | e | | | |
| | n | | | |
| | t | | | |
+-------------------+---+-----------------------+-----+----------------+
| SSA (retirement) | | | On | |
| Recipient | | | Pr | |
| | | | e-R | |
| | | | ele | |
| | | | ase | |
+-------------------+---+-----------------------+-----+----------------+
| Other Retirement | # | | Man | |
| Income | # | | dat | |
| | # | | ory | |
| | # | | M | |
| | # | | oni | |
| | # | | tor | |
| | | | ing | |
| | D | | | |
| | i | | | |
| | s | | | |
| | a | | | |
| | b | | | |
| | i | | | |
| | l | | | |
| | i | | | |
| | t | | | |
| | y | | | |
+-------------------+---+-----------------------+-----+----------------+
| Medicaid | P | | | |
| Recipient | h | | | |
| | y | | | |
| | s | | | |
| | i | | | |
| | c | | | |
| | a | | | |
| | l | | | |
| | D | | | |
| | i | | | |
| | s | | | |
| | a | | | |
| | b | | | |
| | i | | | |
| | l | | | |
| | i | | | |
| | t | | | |
| | y | | | |
+-------------------+---+-----------------------+-----+----------------+
| Medicare | S | | ### | |
| Recipient | e | | ### | |
| | v | | Ot | |
| | e | | her | |
| | r | | | |
| | e | | | |
| | l | | | |
| | y | | | |
| | M | | | |
| | e | | | |
| | n | | | |
| | t | | | |
| | a | | | |
| | l | | | |
| | l | | | |
| | y | | | |
| | I | | | |
| | l | | | |
| | l | | | |
+-------------------+---+-----------------------+-----+----------------+
| General | S | | Cur | |
| Assistance | E | | ren | |
| | D | | tly | |
| | | | pr | |
| | | | egn | |
| | | | ant | |
+-------------------+---+-----------------------+-----+----------------+
| | D | | Wo | |
| | e | | man | |
| | v | | w/d | |
| | e | | epe | |
| | l | | nde | |
| | o | | nts | |
| | p | | | |
| | m | | | |
| | e | | | |
| | n | | | |
| | t | | | |
| | a | | | |
| | l | | | |
| | l | | | |
| | y | | | |
| | D | | | |
| | i | | | |
| | s | | | |
| | a | | | |
| | b | | | |
| | l | | | |
| | e | | | |
| | d | | | |
+-------------------+---+-----------------------+-----+----------------+
| | C | | | |
| | h | | | |
| | r | | | |
| | o | | | |
| | n | | | |
| | i | | | |
| | c | | | |
| | a | | | |
| | l | | | |
| | l | | | |
| | y | | | |
| | M | | | |
| | e | | | |
| | n | | | |
| | t | | | |
| | a | | | |
| | l | | | |
| | l | | | |
| | y | | | |
| | I | | | |
| | l | | | |
| | l | | | |
+-------------------+---+-----------------------+-----+----------------+
| | R | | | |
| | e | | | |
| | g | | | |
| | i | | | |
| | o | | | |
| | n | | | |
| | a | | | |
| | l | | | |
| | B | | | |
| | e | | | |
| | h | | | |
| | a | | | |
| | v | | | |
| | i | | | |
| | o | | | |
| | r | | | |
| | a | | | |
| | l | | | |
| | H | | | |
| | e | | | |
| | a | | | |
| | l | | | |
| | t | | | |
| | h | | | |
| | A | | | |
| | u | | | |
| | t | | | |
| | h | | | |
| | o | | | |
| | r | | | |
| | i | | | |
| | t | | | |
| | y | | | |
+-------------------+---+-----------------------+-----+----------------+
| ###### Co | | | | |
| ntact Information | | | | |
| | | | | |
| **(Secure | | | | |
| consents for | | | | |
| agency contacts, | | | | |
| when possible)** | | | | |
+-------------------+---+-----------------------+-----+----------------+
| # N | | **Agency** | | **Phone |
| ame of Caseworker | | | | number** |
+-------------------+---+-----------------------+-----+----------------+
| | | | | |
+-------------------+---+-----------------------+-----+----------------+
| | | | | |
+-------------------+---+-----------------------+-----+----------------+
| | | | | |
+-------------------+---+-----------------------+-----+----------------+
#
# Vocational/Employment Screening
+------+-----+---+---------+------+-----+------+---------------------+
| ## | | | | | | | |
| #### | | | | | | | |
| Emp | | | | | | | |
| loym | | | | | | | |
| ent: | | | | | | | |
| Cur | | | | | | | |
| rent | | | | | | | |
| ly E | | | | | | | |
| mplo | | | | | | | |
| yed? | | | | | | | |
+------+-----+---+---------+------+-----+------+---------------------+
| ## | ## | | | | | # | |
| #### | ### | | | | | #### | |
| Yes | # E | | | | | # Le | |
| | mpl | | | | | ngth | |
| | oye | | | | | of | |
| | r | | | | | Empl | |
| | | | | | | oyme | |
| | | | | | | nt | |
| | | | | | | | |
+------+-----+---+---------+------+-----+------+---------------------+
| #### | | # | | ## | | | ###### |
| ## S | | # | | #### | | | Co-worker Conflict |
| atis | | # | | Sup | | | |
| fied | | # | | ervi | | | |
| | | # | | sor | | | |
| | | # | | Conf | | | |
| | | | | lict | | | |
| | | D | | | | | |
| | | i | | | | | |
| | | s | | | | | |
| | | s | | | | | |
| | | a | | | | | |
| | | t | | | | | |
| | | i | | | | | |
| | | s | | | | | |
| | | f | | | | | |
| | | i | | | | | |
| | | e | | | | | |
| | | d | | | | | |
+------+-----+---+---------+------+-----+------+---------------------+
| # | ### | | | | | ## | |
| #### | ### | | | | | #### | |
| # No | La | | | | | Rea | |
| | st | | | | | son | |
| | Emp | | | | | for | |
| | loy | | | | | Leav | |
| | er: | | | | | ing: | |
| | | | | | | | |
| | | | | | | | |
| | | | | | | | |
+------+-----+---+---------+------+-----+------+---------------------+
| # | | | # | | ## | | ###### Un |
| #### | | | ##### D | | ### | | stable Work History |
| # Ne | | | isabled | | # S | | |
| ver | | | | | tud | | |
| Empl | | | | | ent | | |
| oyed | | | | | | | |
+------+-----+---+---------+------+-----+------+---------------------+
| #### | | | | | # | | |
| ## | | | | | ### | | |
| Shel | | | | | ## | | |
| tere | | | | | Re | | |
| d Em | | | | | cei | | |
| ploy | | | | | vin | | |
| ment | | | | | g V | | |
| | | | | | oca | | |
| | | | | | tio | | |
| | | | | | nal | | |
| | | | | | Se | | |
| | | | | | rvi | | |
| | | | | | ces | | |
+------+-----+---+---------+------+-----+------+---------------------+
| #### | | | | | | | |
| ## C | | | | | | | |
| omme | | | | | | | |
| nts: | | | | | | | |
| | | | | | | | |
| | | | | | | | |
| | | | | | | | |
+------+-----+---+---------+------+-----+------+---------------------+
Family Relationships
<table style="width:100%;">
<colgroup>
<col style="width: 30%" />
<col style="width: 1%" />
<col style="width: 7%" />
<col style="width: 0%" />
<col style="width: 8%" />
<col style="width: 1%" />
<col style="width: 5%" />
<col style="width: 11%" />
<col style="width: 1%" />
<col style="width: 1%" />
<col style="width: 9%" />
<col style="width: 19%" />
</colgroup>
<tbody>
<tr class="odd">
<td colspan="12"><h1 id="section-1"></h1>
<h1 id="does-the-client-have-any-children">Does the client have any
children?</h1></td>
</tr>
<tr class="even">
<td colspan="2"><h1 id="name">Name</h1></td>
<td colspan="2"><h1 id="age">Age</h1></td>
<td><strong>Date of Birth</strong></td>
<td colspan="2"><h1 id="sex">Sex</h1></td>
<td><h1 id="custody">Custody?</h1>
<h1 id="yn">Y/N</h1></td>
<td colspan="3"><h1 id="lives-with">Lives With?</h1></td>
<td><h1 id="additional-information">Additional Information</h1></td>
</tr>
<tr class="odd">
<td colspan="2"> </td>
<td colspan="2"> </td>
<td> </td>
<td colspan="2"> </td>
<td> </td>
<td colspan="3"> </td>
<td> </td>
</tr>
<tr class="even">
<td colspan="2"> </td>
<td colspan="2"> </td>
<td> </td>
<td colspan="2"> </td>
<td> </td>
<td colspan="3"> </td>
<td> </td>
</tr>
<tr class="odd">
<td colspan="2"> </td>
<td colspan="2"> </td>
<td> </td>
<td colspan="2"> </td>
<td> </td>
<td colspan="3"> </td>
<td> </td>
</tr>
<tr class="even">
<td colspan="2"> </td>
<td colspan="2"> </td>
<td> </td>
<td colspan="2"> </td>
<td> </td>
<td colspan="3"> </td>
<td> </td>
</tr>
<tr class="odd">
<td colspan="12"><h1 id="section-2"></h1></td>
</tr>
<tr class="even">
<td colspan="12"><strong>Who else lives with the client? (Include
spouses, partners, siblings, parents, other relatives,
friends)</strong></td>
</tr>
<tr class="odd">
<td><strong>Name</strong></td>
<td colspan="2"><strong>Age</strong></td>
<td colspan="3"><h1 id="sex-1">Sex</h1></td>
<td colspan="4"><h1 id="relationship">Relationship</h1></td>
<td colspan="2"><h1 id="additional-information-1">Additional
Information</h1></td>
</tr>
<tr class="even">
<td> </td>
<td colspan="2"> </td>
<td colspan="3"> </td>
<td colspan="4"> </td>
<td colspan="2"> </td>
</tr>
<tr class="odd">
<td> </td>
<td colspan="2"> </td>
<td colspan="3"> </td>
<td colspan="4"> </td>
<td colspan="2"> </td>
</tr>
<tr class="even">
<td> </td>
<td colspan="2"> </td>
<td colspan="3"> </td>
<td colspan="4"> </td>
<td colspan="2"> </td>
</tr>
<tr class="odd">
<td> </td>
<td colspan="2"> </td>
<td colspan="3"> </td>
<td colspan="4"> </td>
<td colspan="2"> </td>
</tr>
<tr class="even">
<td> </td>
<td colspan="2"> </td>
<td colspan="3"> </td>
<td colspan="4"> </td>
<td colspan="2"> </td>
</tr>
<tr class="odd">
<td> </td>
<td colspan="2"> </td>
<td colspan="3"> </td>
<td colspan="4"> </td>
<td colspan="2"> </td>
</tr>
<tr class="even">
<td> </td>
<td colspan="2"> </td>
<td colspan="3"> </td>
<td colspan="4"> </td>
<td colspan="2"> </td>
</tr>
<tr class="odd">
<td> </td>
<td colspan="2"> </td>
<td colspan="3"> </td>
<td colspan="4"> </td>
<td colspan="2"> </td>
</tr>
<tr class="even">
<td colspan="9"><strong>Primary language of household/family:
</strong></td>
<td colspan="3"><strong>Secondary: </strong></td>
</tr>
</tbody>
</table>
-----------------------------------------------------------------------
**Client's/Family's Presentation of the Problem:**
**Client's/Family's Expected Outcome:**
-----------------------------------------------------------------------
+----------------------------------------------------+--------+-------+
| Physical | Yes | No |
+----------------------------------------------------+--------+-------+
| Client states that he/she has an exercise program. | | |
| *Optional - Physical Fitness* | | |
+----------------------------------------------------+--------+-------+
| Client reports appropriate interventions taken | | |
| when experiencing illness or injury. | | |
+----------------------------------------------------+--------+-------+
| Client engages in preventive medicine activities | | |
| such as breast or testes self-examination. | | |
+----------------------------------------------------+--------+-------+
| Client receives an adequate amount of sleep. *If | | |
| No, explain below in Comments section* | | |
+----------------------------------------------------+--------+-------+
| Client avoids the use of tobacco products or | | |
| exposure to second-hand smoke. *If NO, complete | | |
| Behavioral Assessment* | | |
+----------------------------------------------------+--------+-------+
| Client consumes no more than two alcoholic drinks | | |
| per day. *If NO, complete Behavioral Assessment* | | |
+----------------------------------------------------+--------+-------+
| Allergies (Medication and Other): | | |
+----------------------------------------------------+--------+-------+
| Additional Information: | | |
| | | |
| | | |
+----------------------------------------------------+--------+-------+
# Nutrition
+----------------------------------------+-----------------------------+
| ###### {#section-3} | |
| | |
| ## | |
| #### Nutritional Status: Current Weigh | |
| t Current Height BMI | |
+----------------------------------------+-----------------------------+
| ###### Appetite: | |
| Good Fair Poor, please explain below | |
+----------------------------------------+-----------------------------+
| ###### R | ###### |
| ecently gained/lost significant weight | Binges/overeats to excess |
+----------------------------------------+-----------------------------+
| ###### Restricts food/Vomi | ## |
| ts/over-exercises to avoid weight gain | #### Special dietary needs |
+----------------------------------------+-----------------------------+
| ###### Hiding/hording food | ###### Food allergies |
+----------------------------------------+-----------------------------+
| ###### Comments | |
| | |
| | |
+----------------------------------------+-----------------------------+
# Pain Questionnaire
+-----------------------------------------------------------------------+
| ###### {#section-4} |
| |
| ###### Pain Management: Is the client in pain now? Yes No |
| |
| If yes, ask client to rate the pain on a scale of 1-10 (with 10 being |
| the severest) and |
| |
| enter score here |
| |
| ###### Is the client receiving care for the pain? Yes No |
| |
| ###### I |
| f no, would the client like a referral for pain management? Yes No |
+-----------------------------------------------------------------------+
Family History
+------------------------+------+-----+------+-----+------+----------+
| ##### | | | | | | |
| # Family History of (s | | | | | | |
| elect all that apply): | | | | | | |
+------------------------+------+-----+------+-----+------+----------+
| ###### {#section-5} | # | # | ### | ## | # | ### |
| | #### | ### | ### | ### | #### | ### Gran |
| | # Mo | ## | Sibl | # A | # Un | dparents |
| | ther | Fat | ings | unt | cle | |
| | | her | | | | |
+------------------------+------+-----+------+-----+------+----------+
| ###### A | #### | ## | #### | ## | # | ##### |
| lcohol/Substance Abuse | ## | ### | ## | ### | #### | # {#sec |
| | {#se | # | {#se | # | # { | tion-11} |
| | ctio | {#s | ctio | {#s | #sec | |
| | n-6} | ect | n-8} | ect | tion | |
| | | ion | | ion | -10} | |
| | | -7} | | -9} | | |
+------------------------+------+-----+------+-----+------+----------+
| ###### Histor | # | ### | # | ### | # | ##### |
| y of Completed Suicide | #### | ### | #### | ### | #### | # {#sec |
| | # { | { | # { | { | # { | tion-17} |
| | #sec | #se | #sec | #se | #sec | |
| | tion | cti | tion | cti | tion | |
| | -12} | on- | -14} | on- | -16} | |
| | | 13} | | 15} | | |
+------------------------+------+-----+------+-----+------+----------+
| ###### | # | ### | # | ### | # | ##### |
| History of Mental Ill | #### | ### | #### | ### | #### | # {#sec |
| ness/Problems such as: | # { | { | # { | { | # { | tion-23} |
| | #sec | #se | #sec | #se | #sec | |
| | tion | cti | tion | cti | tion | |
| | -18} | on- | -20} | on- | -22} | |
| | | 19} | | 21} | | |
+------------------------+------+-----+------+-----+------+----------+
| ###### Depression | # | ### | # | ### | # | ##### |
| | #### | ### | #### | ### | #### | # {#sec |
| | # { | { | # { | { | # { | tion-29} |
| | #sec | #se | #sec | #se | #sec | |
| | tion | cti | tion | cti | tion | |
| | -24} | on- | -26} | on- | -28} | |
| | | 25} | | 27} | | |
+------------------------+------+-----+------+-----+------+----------+
| ###### Schizophrenia | # | ### | # | ### | # | ##### |
| | #### | ### | #### | ### | #### | # {#sec |
| | # { | { | # { | { | # { | tion-35} |
| | #sec | #se | #sec | #se | #sec | |
| | tion | cti | tion | cti | tion | |
| | -30} | on- | -32} | on- | -34} | |
| | | 31} | | 33} | | |
+------------------------+------+-----+------+-----+------+----------+
| ## | # | ### | # | ### | # | ##### |
| #### Bipolar Disorder | #### | ### | #### | ### | #### | # {#sec |
| | # { | { | # { | { | # { | tion-41} |
| | #sec | #se | #sec | #se | #sec | |
| | tion | cti | tion | cti | tion | |
| | -36} | on- | -38} | on- | -40} | |
| | | 37} | | 39} | | |
+------------------------+------+-----+------+-----+------+----------+
| ###### Alzheimer's | # | ### | # | ### | # | ##### |
| | #### | ### | #### | ### | #### | # {#sec |
| | # { | { | # { | { | # { | tion-47} |
| | #sec | #se | #sec | #se | #sec | |
| | tion | cti | tion | cti | tion | |
| | -42} | on- | -44} | on- | -46} | |
| | | 43} | | 45} | | |
+------------------------+------+-----+------+-----+------+----------+
| ###### Anxiety | # | ### | # | ### | # | ##### |
| | #### | ### | #### | ### | #### | # {#sec |
| | # { | { | # { | { | # { | tion-53} |
| | #sec | #se | #sec | #se | #sec | |
| | tion | cti | tion | cti | tion | |
| | -48} | on- | -50} | on- | -52} | |
| | | 49} | | 51} | | |
+------------------------+------+-----+------+-----+------+----------+
| ###### Attention | # | ### | # | ### | # | ##### |
| Deficit/Hyperactivity | #### | ### | #### | ### | #### | # {#sec |
| | # { | { | # { | { | # { | tion-59} |
| | #sec | #se | #sec | #se | #sec | |
| | tion | cti | tion | cti | tion | |
| | -54} | on- | -56} | on- | -58} | |
| | | 55} | | 57} | | |
+------------------------+------+-----+------+-----+------+----------+
| #### | # | ### | # | ### | # | ##### |
| ## Learning Disorders | #### | ### | #### | ### | #### | # {#sec |
| | # { | { | # { | { | # { | tion-65} |
| | #sec | #se | #sec | #se | #sec | |
| | tion | cti | tion | cti | tion | |
| | -60} | on- | -62} | on- | -64} | |
| | | 61} | | 63} | | |
+------------------------+------+-----+------+-----+------+----------+
| ###### Sc | # | ### | # | ### | # | ##### |
| hool Behavior Problems | #### | ### | #### | ### | #### | # {#sec |
| | # { | { | # { | { | # { | tion-71} |
| | #sec | #se | #sec | #se | #sec | |
| | tion | cti | tion | cti | tion | |
| | -66} | on- | -68} | on- | -70} | |
| | | 67} | | 69} | | |
+------------------------+------+-----+------+-----+------+----------+
| ###### Incarceration | # | ### | # | ### | # | ##### |
| | #### | ### | #### | ### | #### | # {#sec |
| | # { | { | # { | { | # { | tion-77} |
| | #sec | #se | #sec | #se | #sec | |
| | tion | cti | tion | cti | tion | |
| | -72} | on- | -74} | on- | -76} | |
| | | 73} | | 75} | | |
+------------------------+------+-----+------+-----+------+----------+
| ##### | # | ### | # | ### | # | ##### |
| # Other\_\_\_\_\_\_\_ | #### | ### | #### | ### | #### | # {#sec |
| \_\_\_\_\_\_\_\_\_\_\_ | # { | { | # { | { | # { | tion-83} |
| | #sec | #se | #sec | #se | #sec | |
| | tion | cti | tion | cti | tion | |
| | -78} | on- | -80} | on- | -82} | |
| | | 79} | | 81} | | |
+------------------------+------+-----+------+-----+------+----------+
| ###### Comments: | | | | | | |
| | | | | | | |
| | | | | | | |
+------------------------+------+-----+------+-----+------+----------+
+-------------------------------------------------------+-------+------+
| # Social | # Yes | # No |
+-------------------------------------------------------+-------+------+
| # Client re | # | # { |
| ports satisfaction with his/her family relationships. | {#s | #sec |
| | ectio | tion |
| | n-84} | -85} |
+-------------------------------------------------------+-------+------+
| # Client reports satisfact | # | # { |
| ion with his/her social relationships and activities. | {#s | #sec |
| | ectio | tion |
| | n-86} | -87} |
+-------------------------------------------------------+-------+------+
| # Client reports satisfaction with the | # | # { |
| entertainment/recreational activities he/she selects. | {#s | #sec |
| | ectio | tion |
| | n-88} | -89} |
+-------------------------------------------------------+-------+------+
| # Client expresses an | # | # { |
| interest in his community and the world, in general. | {#s | #sec |
| | ectio | tion |
| | n-90} | -91} |
+-------------------------------------------------------+-------+------+
| # Client has a history of or current legal inv | # | # { |
| olvement. *If Yes), complete Legal Status Screening.* | {#s | #sec |
| | ectio | tion |
| | n-92} | -93} |
+-------------------------------------------------------+-------+------+
| # Comments: | | |
| | | |
| | | |
+-------------------------------------------------------+-------+------+
# Functional Assessment
+-----------------+---+---+-----------+---+--------+-----+-----+----------+
| ###### Is c | | | | | | | | |
| lient able to c | | | | | | | | |
| are for him/her | | | | | | | | |
| self? Yes No | | | | | | | | |
| | | | | | | | | |
| If No, please | | | | | | | | |
| explain: | | | | | | | | |
+-----------------+---+---+-----------+---+--------+-----+-----+----------+
| ###### Li | | | | | | | | |
| ving Situation: | | | | | | | | |
+-----------------+---+---+-----------+---+--------+-----+-----+----------+
| ###### Ho | | # | | | ## | | | ###### |
| using Adequate | | # | | | #### H | | | Homeless |
| | | # | | | ousing | | | |
| | | # | | | Overc | | | |
| | | # | | | rowded | | | |
| | | # | | | | | | |
| | | | | | | | | |
| | | H | | | | | | |
| | | o | | | | | | |
| | | u | | | | | | |
| | | s | | | | | | |
| | | i | | | | | | |
| | | n | | | | | | |
| | | g | | | | | | |
| | | | | | | | | |
| | | D | | | | | | |
| | | a | | | | | | |
| | | n | | | | | | |
| | | g | | | | | | |
| | | e | | | | | | |
| | | r | | | | | | |
| | | o | | | | | | |
| | | u | | | | | | |
| | | s | | | | | | |
+-----------------+---+---+-----------+---+--------+-----+-----+----------+
| ###### Depend | | # | | | ### | | | |
| ent Upon Others | | # | | | ### Wa | | | |
| | | # | | | rd of | | | |
| | | # | | | State/ | | | |
| | | # | | | Tribal | | | |
| | | # | | | Court | | | |
| | | | | | | | | |
| | | I | | | | | | |
| | | n | | | | | | |
| | | c | | | | | | |
| | | a | | | | | | |
| | | r | | | | | | |
| | | c | | | | | | |
| | | e | | | | | | |
| | | r | | | | | | |
| | | a | | | | | | |
| | | t | | | | | | |
| | | e | | | | | | |
| | | d | | | | | | |
+-----------------+---+---+-----------+---+--------+-----+-----+----------+
| #### | | | | | | | | |
| ## Additional I | | | | | | | | |
| nformation: | | | | | | | | |
| {#additional | | | | | | | | |
| -information-2} | | | | | | | | |
+-----------------+---+---+-----------+---+--------+-----+-----+----------+
| ###### | | | | | | | | |
| {#section-94} | | | | | | | | |
| | | | | | | | | |
| ###### Uses or | | | | | | | | |
| Needs assistive | | | | | | | | |
| or adaptive de | | | | | | | | |
| vices (select a | | | | | | | | |
| ll that apply): | | | | | | | | |
+-----------------+---+---+-----------+---+--------+-----+-----+----------+
| ###### None | # | | | # | | | ## | |
| | # | | | # | | | ### | |
| | # | | | # | | | # B | |
| | # | | | # | | | rai | |
| | # | | | # | | | lle | |
| | # | | | # | | | | |
| | | | | | | | | |
| | G | | | W | | | | |
| | l | | | a | | | | |
| | a | | | l | | | | |
| | s | | | k | | | | |
| | s | | | e | | | | |
| | e | | | r | | | | |
| | s | | | | | | | |
+-----------------+---+---+-----------+---+--------+-----+-----+----------+
| #### | # | | | # | | | ## | |
| ## Hearing Aids | # | | | # | | | ### | |
| | # | | | # | | | # W | |
| | # | | | # | | | hee | |
| | # | | | # | | | lch | |
| | # | | | # | | | air | |
| | | | | | | | | |
| | C | | | C | | | | |
| | a | | | r | | | | |
| | n | | | u | | | | |
| | e | | | t | | | | |
| | | | | c | | | | |
| | | | | h | | | | |
| | | | | e | | | | |
| | | | | s | | | | |
+-----------------+---+---+-----------+---+--------+-----+-----+----------+
| ###### | | | ### | | | # | | |
| Translated Writ | | | ### Trans | | | ### | | |
| ten Information | | | lator for | | | ## | | |
| | | | Speaking | | | Oth | | |
| | | | | | | er: | | |
| | | | | | | | | |
| | | | | | | | | |
+-----------------+---+---+-----------+---+--------+-----+-----+----------+
| ###### Does | | | | | | | | |
| the client hav | | | | | | | | |
| e a history of | | | | | | | | |
| falls? Yes No | | | | | | | | |
| Explain: | | | | | | | | |
+-----------------+---+---+-----------+---+--------+-----+-----+----------+
# Legal Status Screening
+-----------------------+-----------------------+-----------------------+
| # Past or curre | | |
| nt legal problems (se | | |
| lect all that apply)? | | |
+-----------------------+-----------------------+-----------------------+
| None | Gangs | DUI/DWI |
+-----------------------+-----------------------+-----------------------+
| Arrests | Conviction | Detention |
+-----------------------+-----------------------+-----------------------+
| Jail | Probation | Other: |
+-----------------------+-----------------------+-----------------------+
| **If yes to any of | | |
| the above, please | | |
| explain:** | | |
+-----------------------+-----------------------+-----------------------+
| **Any court-ordered | | |
| treatment?** Yes | | |
| (explain below) No | | |
+-----------------------+-----------------------+-----------------------+
| ###### Ordered by | **Offense** | **Length of Time** |
+-----------------------+-----------------------+-----------------------+
| | | |
+-----------------------+-----------------------+-----------------------+
| | | |
+-----------------------+-----------------------+-----------------------+
| | | |
+-----------------------+-----------------------+-----------------------+
# Educational Status Screening
+-----------------------+-----------------------+---+--------------------+
| ###### Educational L | | | ###### Some coll |
| evel (select one): l | | | ege or tech school |
| ess than 12 years -- | | | |
| enter grade completed | | | |
+-----------------------+-----------------------+---+--------------------+
| ###### Unknown | ###### | # | |
| | High School Grad/GED | # | |
| | | # | |
| | | # | |
| | | # | |
| | | # | |
| | | | |
| | | | |
| | | C | |
| | | o | |
| | | l | |
| | | l | |
| | | e | |
| | | g | |
| | | e | |
| | | | |
| | | G | |
| | | r | |
| | | a | |
| | | d | |
| | | u | |
| | | a | |
| | | t | |
| | | e | |
+-----------------------+-----------------------+---+--------------------+
| ###### If st | | | |
| ill attending, curren | | | |
| t School/Grade: | | | |
+-----------------------+-----------------------+---+--------------------+
| ###### Vocational Sch | | | |
| ool/Skill Area: | | | |
+-----------------------+-----------------------+---+--------------------+
| ###### College/Gradu | | | |
| ate School -- Years C | | | |
| ompleted/Major: | | | |
+-----------------------+-----------------------+---+--------------------+
**Leisure & Recreation**
+-----------------------------------+-----------------------------------+
| **Which of the following does the | |
| client do? (Select all that | |
| apply)** | |
+-----------------------------------+-----------------------------------+
| Spend Time with Friends | Sports/Exercise |
+-----------------------------------+-----------------------------------+
| Classes | Dancing |
+-----------------------------------+-----------------------------------+
| Time with Family | Hobbies |
+-----------------------------------+-----------------------------------+
| Work Part-Time | Watch Movies/TV |
+-----------------------------------+-----------------------------------+
| Go "Downtown" | Stay at Home |
+-----------------------------------+-----------------------------------+
| Listen to Music | Spend Time at Clubs/Bars |
+-----------------------------------+-----------------------------------+
| Go to Casinos | Other: |
+-----------------------------------+-----------------------------------+
| # What limits the client's | |
| leisure/recreational activities? | |
| | |
| | |
+-----------------------------------+-----------------------------------+
Family Social History
+-----------------------------------------------------------------------+
| **Describe family relationships & desire for involvement in the |
| treatment process:** |
| |
| |
| |
| **Perceived level of support for treatment? (scale 1-5 with 5 being |
| the most supportive) ** |
+-----------------------------------------------------------------------+
+-----------------------------------------------------+--------+------+
| ### Psychological | ## | ** |
| | ## Yes | No** |
+-----------------------------------------------------+--------+------+
| Client accepts responsibility for creating his/her | | |
| own feelings. | | |
+-----------------------------------------------------+--------+------+
| Client accepts responsibility for his/her own | | |
| actions. | | |
+-----------------------------------------------------+--------+------+
| Client makes decisions with a minimum of stress and | | |
| worry. | | |
+-----------------------------------------------------+--------+------+
| Client is able to express feelings of anger, | | |
| disappointment, frustration, etc. | | |
+-----------------------------------------------------+--------+------+
| Client reports a stable emotional life. | | |
+-----------------------------------------------------+--------+------+
| Client feels enthusiastic about his/her life. | | |
+-----------------------------------------------------+--------+------+
| Client reports adequate energy level. | | |
+-----------------------------------------------------+--------+------+
| Client reports sleep is restful & adequate. | | |
+-----------------------------------------------------+--------+------+
| Client reports he/she feels positive about self. | | |
+-----------------------------------------------------+--------+------+
| **Comments:** | | |
| | | |
| | | |
+-----------------------------------------------------+--------+------+
# {#section-95}
# Bereavement/Loss & Spiritual Awareness
+-----------------------------------------------------------------------+
| ###### Pleas |
| e list significant losses, deaths, abandonments, traumatic incidents: |
| |
| |
+-----------------------------------------------------------------------+
| # {#section-96} |
| |
| # Spiritual/Cultural Awareness & Practice |
+-----------------------------------------------------------------------+
| # |
| Knowledgeable about traditions, spirituality, or religion? Yes No |
| |
| # Comment: |
| |
| |
+-----------------------------------------------------------------------+
| # Practices traditions, spirituality, or religion? Yes No |
| |
| # Comment: |
| |
| |
+-----------------------------------------------------------------------+
| # How does client describe his/her spirituality? |
+-----------------------------------------------------------------------+
| # Does client see a traditional healer? Yes No |
| |
| # Comment: |
| |
| |
| |
| # {#section-97} |
+-----------------------------------------------------------------------+
Behavioral Assessment
<table>
<colgroup>
<col style="width: 23%" />
<col style="width: 1%" />
<col style="width: 8%" />
<col style="width: 0%" />
<col style="width: 3%" />
<col style="width: 12%" />
<col style="width: 0%" />
<col style="width: 4%" />
<col style="width: 11%" />
<col style="width: 8%" />
<col style="width: 9%" />
<col style="width: 15%" />
</colgroup>
<tbody>
<tr class="odd">
<td colspan="12"><h6 id="section-98"></h6>
<h6 id="abuseaddiction-chemical-behavioral">Abuse/Addiction – Chemical
& Behavioral</h6></td>
</tr>
<tr class="even">
<td><h6 id="drug">Drug</h6></td>
<td colspan="4"><h6 id="age-first-used">Age First Used</h6></td>
<td colspan="3"><h6 id="age-heaviest-use">Age Heaviest Use</h6></td>
<td colspan="3"><h6
id="recent-pattern-of-use-frequency-amount-etc">Recent Pattern of Use
(frequency & Amount, etc)</h6></td>
<td><h6 id="date-last-used">Date Last Used</h6></td>
</tr>
<tr class="odd">
<td><h6 id="alcohol">Alcohol</h6></td>
<td colspan="4"><h6 id="section-99"> </h6></td>
<td colspan="3"><h6 id="section-100"> </h6></td>
<td colspan="3"><h6 id="section-101"> </h6></td>
<td><h6 id="section-102"> </h6></td>
</tr>
<tr class="even">
<td><h6 id="cannabis">Cannabis</h6></td>
<td colspan="4"><h6 id="section-103"> </h6></td>
<td colspan="3"><h6 id="section-104"> </h6></td>
<td colspan="3"><h6 id="section-105"> </h6></td>
<td><h6 id="section-106"> </h6></td>
</tr>
<tr class="odd">
<td><h6 id="cocaine">Cocaine</h6></td>
<td colspan="4"><h6 id="section-107"> </h6></td>
<td colspan="3"><h6 id="section-108"> </h6></td>
<td colspan="3"><h6 id="section-109"> </h6></td>
<td><h6 id="section-110"> </h6></td>
</tr>
<tr class="even">
<td><h6 id="stimulants-crystal-speed-amphetamines-etc">Stimulants
(crystal, speed, amphetamines, etc)</h6></td>
<td colspan="4"><h6 id="section-111"> </h6></td>
<td colspan="3"><h6 id="section-112"> </h6></td>
<td colspan="3"><h6 id="section-113"> </h6></td>
<td><h6 id="section-114"> </h6></td>
</tr>
<tr class="odd">
<td><h6 id="methamphetamine">Methamphetamine</h6></td>
<td colspan="4"><h6 id="section-115"> </h6></td>
<td colspan="3"><h6 id="section-116"> </h6></td>
<td colspan="3"><h6 id="section-117"> </h6></td>
<td><h6 id="section-118"> </h6></td>
</tr>
<tr class="even">
<td><h6 id="inhalants-gas-paint-glue-etc">Inhalants (gas, paint, glue,
etc)</h6></td>
<td colspan="4"><h6 id="section-119"> </h6></td>
<td colspan="3"><h6 id="section-120"> </h6></td>
<td colspan="3"><h6 id="section-121"> </h6></td>
<td><h6 id="section-122"> </h6></td>
</tr>
<tr class="odd">
<td><h6 id="hallucinogens-lsd-pcp-mushrooms-etc">Hallucinogens (LSD,
PCP, mushrooms, etc)</h6></td>
<td colspan="4"><h6 id="section-123"> </h6></td>
<td colspan="3"><h6 id="section-124"> </h6></td>
<td colspan="3"><h6 id="section-125"> </h6></td>
<td><h6 id="section-126"> </h6></td>
</tr>
<tr class="even">
<td><h6 id="opioids-heroin-narcotics-methadone-etc">Opioids (heroin,
narcotics, methadone, etc)</h6></td>
<td colspan="4"><h6 id="section-127"> </h6></td>
<td colspan="3"><h6 id="section-128"> </h6></td>
<td colspan="3"><h6 id="section-129"> </h6></td>
<td><h6 id="section-130"> </h6></td>
</tr>
<tr class="odd">
<td><h6 id="sedativehypnotics-valium-phenobarb-etc">Sedative/Hypnotics
(Valium, Phenobarb, etc)</h6></td>
<td colspan="4"><h6 id="section-131"> </h6></td>
<td colspan="3"><h6 id="section-132"> </h6></td>
<td colspan="3"><h6 id="section-133"> </h6></td>
<td><h6 id="section-134"> </h6></td>
</tr>
<tr class="even">
<td><h6
id="designer-drugsother-herbal-steroids-cough-syrup-etc">Designer
Drugs/Other (herbal, Steroids, cough syrup, etc)</h6></td>
<td colspan="4"><h6 id="section-135"> </h6></td>
<td colspan="3"><h6 id="section-136"> </h6></td>
<td colspan="3"><h6 id="section-137"> </h6></td>
<td><h6 id="section-138"> </h6></td>
</tr>
<tr class="odd">
<td><h6 id="tobacco-smoke-chew">Tobacco (smoke, chew)</h6></td>
<td colspan="4"><h6 id="section-139"> </h6></td>
<td colspan="3"><h6 id="section-140"> </h6></td>
<td colspan="3"><h6 id="section-141"> </h6></td>
<td><h6 id="section-142"> </h6></td>
</tr>
<tr class="even">
<td><h6 id="caffeine">Caffeine</h6></td>
<td colspan="4"><h6 id="section-143"> </h6></td>
<td colspan="3"><h6 id="section-144"> </h6></td>
<td colspan="3"><h6 id="section-145"> </h6></td>
<td><h6 id="section-146"> </h6></td>
</tr>
<tr class="odd">
<td colspan="8"><h6 id="ever-injected-drugs-yes-no">Ever injected Drugs?
Yes No</h6></td>
<td colspan="4"><h6 id="if-yes-which-ones">If Yes, Which ones?
</h6></td>
</tr>
<tr class="even">
<td colspan="12"><h6 id="drug-of-choice">Drug of Choice? </h6></td>
</tr>
<tr class="odd">
<td colspan="12"><h6 id="section-147"></h6>
<h6
id="consequences-as-a-result-of-drugalcohol-use-select-all-that-apply">Consequences
as a Result of Drug/Alcohol Use (select all that apply)</h6></td>
</tr>
<tr class="even">
<td colspan="2"><h6 id="hangovers"> Hangovers</h6></td>
<td colspan="4"><h6 id="dtsshakes"> DTs/Shakes</h6></td>
<td colspan="4"><h6 id="blackouts"> Blackouts</h6></td>
<td colspan="2"><h6 id="binges"> Binges</h6></td>
</tr>
<tr class="odd">
<td colspan="2"><h6 id="overdoses"> Overdoses</h6></td>
<td colspan="4"><h6 id="increased-tolerance-need-more-to-get-high">
Increased Tolerance (need more to get high)</h6></td>
<td colspan="4"><h6 id="gi-bleeding"> GI Bleeding</h6></td>
<td colspan="2"><h6 id="liver-disease"> Liver Disease</h6></td>
</tr>
<tr class="even">
<td colspan="2"><h6 id="sleep-problems"> Sleep Problems</h6></td>
<td colspan="4"><h6 id="seizures"> Seizures</h6></td>
<td colspan="4"><h6 id="relationship-problems"> Relationship
Problems</h6></td>
<td colspan="2"><h6 id="left-school"> Left School</h6></td>
</tr>
<tr class="odd">
<td colspan="2"><h6 id="lost-job"> Lost Job</h6></td>
<td colspan="4"><h6 id="duis"> DUIs</h6></td>
<td colspan="4"><h6 id="assaults"> Assaults</h6></td>
<td colspan="2"><h6 id="arrests"> Arrests</h6></td>
</tr>
<tr class="even">
<td colspan="2"><h6 id="incarcerations"> Incarcerations</h6></td>
<td colspan="4"><h6 id="homicide"> Homicide</h6></td>
<td colspan="6"><h6 id="other-2"> Other: </h6></td>
</tr>
<tr class="odd">
<td colspan="6"><h6 id="longest-period-of-sobriety">Longest Period of
Sobriety? </h6></td>
<td colspan="6"><h6 id="how-long-ago">How long ago? </h6></td>
</tr>
<tr class="even">
<td colspan="12"><h6 id="triggers-to-use-list-all-that-apply">Triggers
to use (list all that apply): </h6></td>
</tr>
<tr class="odd">
<td colspan="12"><strong>Has client traded sex for drugs?</strong> No
Yes, explain: </td>
</tr>
<tr class="even">
<td colspan="12"><strong>Has client been tested for HIV?</strong> Yes
No</td>
</tr>
<tr class="odd">
<td colspan="7"><strong>If yes, date of last test:</strong> </td>
<td colspan="5"><strong>Results:</strong> </td>
</tr>
<tr class="even">
<td colspan="12"><strong>Has client had any of the following problem
gambling behaviors?</strong> Select all that apply:</td>
</tr>
<tr class="odd">
<td colspan="4"> Gambled longer than planned</td>
<td colspan="8"> Gambled until last dollar was gone</td>
</tr>
<tr class="even">
<td colspan="4"> Lost sleep thinking of gambling</td>
<td colspan="8"> Used income or savings to gamble while letting bills go
unpaid</td>
</tr>
<tr class="odd">
<td colspan="4"> Borrowed money to gamble</td>
<td colspan="8"> Made repeated, unsuccessful attempts to stop
gambling</td>
</tr>
<tr class="even">
<td colspan="4"> Been remorseful after gambling</td>
<td colspan="8"> Broken the law or considered breaking the law to
finance gambling</td>
</tr>
<tr class="odd">
<td colspan="4"> Other: </td>
<td colspan="8"> Gambled to get money to meet financial obligations</td>
</tr>
<tr class="even">
<td colspan="12"><strong>Risk Taking/Impulsive Behavior (current/past) –
select all that apply:</strong></td>
</tr>
<tr class="odd">
<td colspan="3"><h6 id="unprotected-sex"> Unprotected sex</h6></td>
<td colspan="6"><h6 id="shoplifting"> Shoplifting</h6></td>
<td colspan="3"><h6 id="reckless-driving"> Reckless driving</h6></td>
</tr>
<tr class="even">
<td colspan="3"><h6 id="gang-involvement"> Gang Involvement</h6></td>
<td colspan="6"><h6 id="drug-dealing"> Drug Dealing</h6></td>
<td colspan="3"><h6 id="carryingusing-weapon"> Carrying/using
weapon</h6></td>
</tr>
<tr class="odd">
<td colspan="12"><h6 id="other-3"> Other: </h6></td>
</tr>
</tbody>
</table>
**Abuse/Neglect/Exploitation Assessment**
+-------------------------------+-----------------+--------+----------+
| ###### Hist | | | |
| ory of neglect (emotional, nu | | | |
| tritional, medical, education | | | |
| al) or exploitation? No Yes | | | |
| | | | |
| ###### | | | |
| If yes, please explain: | | | |
+-------------------------------+-----------------+--------+----------+
| ###### Has clie | | | |
| nt been abused at any time in | | | |
| the past or present by famil | | | |
| y, significant others, or any | | | |
| one else?) No Yes, explain: | | | |
+-------------------------------+-----------------+--------+----------+
| ###### Type of Abuse | ###### By Whom | #### | ###### |
| | | ## Cli | Currentl |
| | | ent's | y Occurr |
| | | Age(s) | ing? Y/N |
+-------------------------------+-----------------+--------+----------+
| ###### Verbal Putdowns | ###### | ### | ### |
| | {#section-148} | ### | ### |
| | | {# | {#sect |
| | | sectio | ion-150} |
| | | n-149} | |
+-------------------------------+-----------------+--------+----------+
| ###### Being threatened | ###### | ### | ### |
| | {#section-151} | ### | ### |
| | | {# | {#sect |
| | | sectio | ion-153} |
| | | n-152} | |
+-------------------------------+-----------------+--------+----------+
| ###### Made to feel afraid | ###### | ### | ### |
| | {#section-154} | ### | ### |
| | | {# | {#sect |
| | | sectio | ion-156} |
| | | n-155} | |
+-------------------------------+-----------------+--------+----------+
| ###### Pushed | ###### | ### | ### |
| | {#section-157} | ### | ### |
| | | {# | {#sect |
| | | sectio | ion-159} |
| | | n-158} | |
+-------------------------------+-----------------+--------+----------+
| ###### Shoved | ###### | ### | ### |
| | {#section-160} | ### | ### |
| | | {# | {#sect |
| | | sectio | ion-162} |
| | | n-161} | |
+-------------------------------+-----------------+--------+----------+
| ###### Slapped | ###### | ### | ### |
| | {#section-163} | ### | ### |
| | | {# | {#sect |
| | | sectio | ion-165} |
| | | n-164} | |
+-------------------------------+-----------------+--------+----------+
| ###### Kicked | ###### | ### | ### |
| | {#section-166} | ### | ### |
| | | {# | {#sect |
| | | sectio | ion-168} |
| | | n-167} | |
+-------------------------------+-----------------+--------+----------+
| ###### Strangled | ###### | ### | ### |
| | {#section-169} | ### | ### |
| | | {# | {#sect |
| | | sectio | ion-171} |
| | | n-170} | |
+-------------------------------+-----------------+--------+----------+
| ###### Hit | ###### | ### | ### |
| | {#section-172} | ### | ### |
| | | {# | {#sect |
| | | sectio | ion-174} |
| | | n-173} | |
+-------------------------------+-----------------+--------+----------+
| ###### Forced or | ###### | ### | ### |
| coerced into sexual activity | {#section-175} | ### | ### |
| | | {# | {#sect |
| | | sectio | ion-177} |
| | | n-176} | |
+-------------------------------+-----------------+--------+----------+
| ###### Other {#other-4} | ###### | ### | ### |
| | {#section-178} | ### | ### |
| | | {# | {#sect |
| | | sectio | ion-180} |
| | | n-179} | |
+-------------------------------+-----------------+--------+----------+
| ###### {#section-181} | ###### | | |
| | {#section-182} | | |
| ### | | | |
| ### Was it reported? Yes No | ###### | | |
| | To whom? | | |
+-------------------------------+-----------------+--------+----------+
| ###### Outcome | | | |
| | | | |
| | | | |
+-------------------------------+-----------------+--------+----------+
| ###### Has client e | | | |
| ver witnessed abuse or family | | | |
| violence? No Yes, explain: | | | |
| | | | |
| | | | |
+-------------------------------+-----------------+--------+----------+
+-----------------------------------------------------+--------+------+
| # Strengths/Weaknesses | * | ** |
| | *Yes** | No** |
+-----------------------------------------------------+--------+------+
| Client is able to seek out appropriate resources | | |
| for assistance with identified problems. | | |
+-----------------------------------------------------+--------+------+
| Client is able to identify both his/her strengths | | |
| and weaknesses. | | |
+-----------------------------------------------------+--------+------+
| **Comments:** | | |
+-----------------------------------------------------+--------+------+
| **Strengths/Resources (enter score if present)** 1 | | |
| = Adequate, 2 = Above Average, 3 = Exceptional | | |
| | | |
| ------------------- | | |
| ---------- -------------------- ------------------- | | |
| Family Suppo | | |
| rt Social Support Relationship | | |
| | | |
| Systems Stability | | |
| | | |
| Intellect | | |
| ual/Cognitive Coping Skills & Parenting | | |
| Skills | | |
| Resiliency Skills | | |
| | | |
| Socio-Eco | | |
| nomic Stability Communication Insight & | | |
| | | |
| Skills Sensitivity | | |
| | | |
| Maturity & J | | |
| udgment Motivation for Other: | | |
| | | |
| Skills Help | | |
| ------------------- | | |
| ---------- -------------------- ------------------- | | |
| | | |
| **Comments:** | | |
+-----------------------------------------------------+--------+------+
| **Describe appropriateness & level of need for the | | |
| family's participation:** | | |
+-----------------------------------------------------+--------+------+
Mental Status Exam
<table>
<colgroup>
<col style="width: 16%" />
<col style="width: 8%" />
<col style="width: 8%" />
<col style="width: 3%" />
<col style="width: 0%" />
<col style="width: 2%" />
<col style="width: 4%" />
<col style="width: 0%" />
<col style="width: 5%" />
<col style="width: 7%" />
<col style="width: 0%" />
<col style="width: 1%" />
<col style="width: 6%" />
<col style="width: 5%" />
<col style="width: 2%" />
<col style="width: 3%" />
<col style="width: 0%" />
<col style="width: 0%" />
<col style="width: 20%" />
</colgroup>
<tbody>
<tr class="odd">
<td><h2 id="category"><strong>Category</strong></h2></td>
<td colspan="18"><h3 id="selections">Selections</h3></td>
</tr>
<tr class="even">
<td colspan="19"><strong>GENERAL OBSERVATIONS</strong></td>
</tr>
<tr class="odd">
<td><h2 id="appearance"><strong>Appearance</strong></h2></td>
<td colspan="3"> Well groomed</td>
<td colspan="6"> Unkempt</td>
<td colspan="6"> Disheveled</td>
<td colspan="3"> Malodorous</td>
</tr>
<tr class="even">
<td><strong>Build</strong></td>
<td colspan="3"> Average</td>
<td colspan="6"> Thin</td>
<td colspan="6"> Overweight</td>
<td colspan="3"> Obese</td>
</tr>
<tr class="odd">
<td rowspan="2"><strong>Demeanor</strong></td>
<td colspan="3"> Cooperative</td>
<td colspan="6"> Hostile</td>
<td colspan="6"> Guarded</td>
<td colspan="3"> Withdrawn</td>
</tr>
<tr class="even">
<td colspan="7"> Preoccupied</td>
<td colspan="7"> Demanding</td>
<td colspan="4"> Seductive</td>
</tr>
<tr class="odd">
<td><strong>Eye Contact</strong></td>
<td colspan="7"> Average</td>
<td colspan="7"> Decreased</td>
<td colspan="4"> Increased</td>
</tr>
<tr class="even">
<td><strong>Activity</strong></td>
<td colspan="7"> Average</td>
<td colspan="7"> Decreased</td>
<td colspan="4"> Increased</td>
</tr>
<tr class="odd">
<td rowspan="3"><strong>Speech</strong></td>
<td colspan="3"> Clear</td>
<td colspan="6"> Slurred</td>
<td colspan="6"> Rapid</td>
<td colspan="3"> Slow</td>
</tr>
<tr class="even">
<td colspan="3"> Pressured</td>
<td colspan="6"> Soft</td>
<td colspan="6"> Loud</td>
<td colspan="3"> Monotone</td>
</tr>
<tr class="odd">
<td colspan="18">Describe: </td>
</tr>
<tr class="even">
<td colspan="19"><strong>THOUGHT CONTENT</strong></td>
</tr>
<tr class="odd">
<td><strong>Delusions</strong></td>
<td colspan="4"> None Reported</td>
<td colspan="6"> Grandiose</td>
<td colspan="6"> Persecutory</td>
<td colspan="2"> Somatic</td>
</tr>
<tr class="even">
<td rowspan="2"></td>
<td colspan="6"> Bizarre</td>
<td colspan="7"> Nihilist</td>
<td colspan="5"> Religious</td>
</tr>
<tr class="odd">
<td colspan="18">Describe: </td>
</tr>
<tr class="even">
<td rowspan="4"><strong>Other</strong></td>
<td colspan="4"> None Reported</td>
<td colspan="6"> Poverty of Content</td>
<td colspan="6"> Obsessions</td>
<td colspan="2"> Compulsions</td>
</tr>
<tr class="odd">
<td colspan="4"> Phobias</td>
<td colspan="6"> Guilt</td>
<td colspan="6"> Anhedonia</td>
<td colspan="2">Thought Insertion</td>
</tr>
<tr class="even">
<td colspan="10"> Ideas of Reference</td>
<td colspan="8"> Thought Broadcasting</td>
</tr>
<tr class="odd">
<td colspan="18">Describe: </td>
</tr>
<tr class="even">
<td rowspan="2"><strong>Self Abuse</strong></td>
<td colspan="11"> None Reported</td>
<td colspan="7"> Self Mutilization</td>
</tr>
<tr class="odd">
<td colspan="11"> Suicidal (assess lethality if present)</td>
<td colspan="6"> Intent</td>
<td> Plan</td>
</tr>
<tr class="even">
<td><strong>Aggressive</strong></td>
<td colspan="5"> None Reported</td>
<td colspan="13"> Aggressive (assess lethality of present)</td>
</tr>
<tr class="odd">
<td></td>
<td colspan="11"> Intent</td>
<td colspan="7"> Plan</td>
</tr>
<tr class="even">
<td colspan="19"><strong>PERCEPTION</strong></td>
</tr>
<tr class="odd">
<td rowspan="3"><strong>Hallucinations</strong></td>
<td colspan="6"> None Reported</td>
<td colspan="7"> Auditory</td>
<td colspan="5"> Visual</td>
</tr>
<tr class="even">
<td colspan="6"> Olfactory</td>
<td colspan="7"> Gustatory</td>
<td colspan="5"> Tactile</td>
</tr>
<tr class="odd">
<td colspan="18">Describe: </td>
</tr>
<tr class="even">
<td><strong>Other</strong></td>
<td colspan="4"> None Reported</td>
<td colspan="6"> Illusions</td>
<td colspan="6"> Depersonalization</td>
<td colspan="2"> Derealization</td>
</tr>
<tr class="odd">
<td colspan="19"><strong>THOUGHT PROCESS</strong></td>
</tr>
<tr class="even">
<td colspan="2"> Logical</td>
<td colspan="7"> Goal Oriented</td>
<td colspan="6"> Circumstantial</td>
<td colspan="4"> Tangential</td>
</tr>
<tr class="odd">
<td colspan="2"> Loose</td>
<td colspan="7"> Rapid Thoughts</td>
<td colspan="6"> Incoherent</td>
<td colspan="4"> Concrete</td>
</tr>
<tr class="even">
<td colspan="2"> Blocked</td>
<td colspan="7"> Flight of Ideas</td>
<td colspan="6"> Perserverative</td>
<td colspan="4"> Derailment</td>
</tr>
<tr class="odd">
<td colspan="19">Describe: </td>
</tr>
<tr class="even">
<td colspan="19"><strong>MOOD</strong></td>
</tr>
<tr class="odd">
<td colspan="3"> Euthymic</td>
<td colspan="10"> Depressed</td>
<td colspan="6"> Anxious</td>
</tr>
<tr class="even">
<td colspan="3"> Angry</td>
<td colspan="10"> Euphoric</td>
<td colspan="6"> Irritable</td>
</tr>
<tr class="odd">
<td colspan="19"><strong>AFFECT</strong></td>
</tr>
<tr class="even">
<td colspan="2"> Flat</td>
<td colspan="7"> Inappropriate</td>
<td colspan="6"> Labile</td>
<td colspan="4"> Blunted</td>
</tr>
<tr class="odd">
<td colspan="3"> Congruent with Mood</td>
<td colspan="10"> Full</td>
<td colspan="6"> Constricted</td>
</tr>
<tr class="even">
<td colspan="19"><strong>BEHAVIOR</strong></td>
</tr>
<tr class="odd">
<td colspan="3"> No behavior issues</td>
<td colspan="10"> Assaultive</td>
<td colspan="6"> Resistant</td>
</tr>
<tr class="even">
<td colspan="3"> Aggressive</td>
<td colspan="10"> Agitated</td>
<td colspan="6"> Hyperactive</td>
</tr>
<tr class="odd">
<td colspan="3"> Restless</td>
<td colspan="10"> Sleepy</td>
<td colspan="6"> Intrusive</td>
</tr>
<tr class="even">
<td colspan="19"><strong>MOVEMENT</strong></td>
</tr>
<tr class="odd">
<td colspan="2"> Akasthisia</td>
<td colspan="7"> Dystonia</td>
<td colspan="6"> Tardive Dyskinesia</td>
<td colspan="4"> Tics</td>
</tr>
<tr class="even">
<td colspan="19">Describe: </td>
</tr>
<tr class="odd">
<td colspan="19"><strong>COGNITION</strong></td>
</tr>
<tr class="even">
<td rowspan="3"><strong>Impairment of:</strong></td>
<td colspan="8"> None Reported</td>
<td colspan="6"> Orientation</td>
<td colspan="4"> Memory</td>
</tr>
<tr class="odd">
<td colspan="8"> Attention/Concentration</td>
<td colspan="10"> Ability to Abstract</td>
</tr>
<tr class="even">
<td colspan="18">Describe: </td>
</tr>
<tr class="odd">
<td><strong>Intelligence Estimate</strong></td>
<td colspan="4"> Mental Retardation</td>
<td colspan="6"> Borderline</td>
<td colspan="6"> Average</td>
<td colspan="2"> Above Average</td>
</tr>
<tr class="even">
<td colspan="5"><strong>IMPULSE CONTROL</strong></td>
<td colspan="6"> Good</td>
<td colspan="6"> Poor</td>
<td colspan="2"> Absent</td>
</tr>
<tr class="odd">
<td colspan="5"><strong>INSIGHT</strong></td>
<td colspan="6"> Good</td>
<td colspan="6"> Poor</td>
<td colspan="2"> Absent</td>
</tr>
<tr class="even">
<td colspan="5"><strong>JUDGMENT</strong></td>
<td colspan="6"> Good</td>
<td colspan="6"> Poor</td>
<td colspan="2"> Absent</td>
</tr>
</tbody>
</table>
----------------- -------------- --------- ------------ -------------- --------------
**RISK
ASSESSMENT**
**Risk to Self** Low Medium High Chronic
**Risk to Low Medium High Chronic
Others**
**Serious current
risk of any of
the following:
(Immediate
response
needed)**
**Abuse or Family **Abuse or
Violence** Yes No Family
Violence**
Yes No
**Psychotic or
Severely
Psychologically
Disabled** Yes No
**Is there a **Any other
handgun in the weapons?**
home?** Yes No Yes No
**Plan:**
**Safety Plan
Reviewed** Yes No
----------------- -------------- --------- ------------ -------------- --------------
Diagnoses and Interpretive Summary
+--------+-------------------------------------------------------------+
| #### | |
| ## Bio | |
| psycho | |
| social | |
| formu | |
| lation | |
+--------+-------------------------------------------------------------+
| #### | |
| ## {# | |
| sectio | |
| n-183} | |
| | |
| | |
+--------+-------------------------------------------------------------+
| ## | |
| #### D | |
| SM IV- | |
| TR Pro | |
| vision | |
| al Dia | |
| gnoses | |
+--------+-------------------------------------------------------------+
| **Axis | |
| I** | |
| | |
+--------+-------------------------------------------------------------+
| **Axis | |
| II** | |
| | |
+--------+-------------------------------------------------------------+
| **Axis | |
| III** | |
| | |
+--------+-------------------------------------------------------------+
| **Axis | |
| IV** | |
| | |
+--------+-------------------------------------------------------------+
| **Axis | |
| V** | |
+--------+-------------------------------------------------------------+
+-----------------------------------------------------------------------+
| # Treatment Acceptance/Resistance |
+-----------------------------------------------------------------------+
| **Client accepts problem?** No Yes Comment: |
+-----------------------------------------------------------------------+
| **Client recognizes need for treatment?** No Yes Comment: |
+-----------------------------------------------------------------------+
| **Client minimizes or blames others?** No Yes Comment: |
+-----------------------------------------------------------------------+
| **External motivation is primary?** No Yes Comment: |
+-----------------------------------------------------------------------+
# Preliminary Treatment Plan & Referrals
+-----------------+-----------------+--------+-----+------------------+
| #### | | | | |
| ## Preliminary | | | | |
| Biopsychosocial | | | | |
| Treatment Plan | | | | |
+-----------------+-----------------+--------+-----+------------------+
| **Biological:** | | | | |
| | | | | |
| | | | | |
| **P | | | | |
| sychological:** | | | | |
| | | | | |
| | | | | |
| **Social/E | | | | |
| nvironmental:** | | | | |
| | | | | |
+-----------------+-----------------+--------+-----+------------------+
| # | | | | |
| ##### Referrals | | | | |
+-----------------+-----------------+--------+-----+------------------+
| Psychiatrist | Psychologist | | | Spiritual |
| | | M | | Counselor |
| | | edical | | |
| | | Pr | | |
| | | ovider | | |
+-----------------+-----------------+--------+-----+------------------+
| Benefits | Nutritionist | | | Vocational |
| Coordinator | | Re | | Counselor |
| | | habili | | |
| | | tation | | |
+-----------------+-----------------+--------+-----+------------------+
| Social Worker | Community | | | |
| | Agency: | | Oth | |
| | | | er: | |
| | | | | |
| | | | | |
+-----------------+-----------------+--------+-----+------------------+
Physical Fitness (Optional)
+-----------------------------------------------------------------------+
| ###### {#section-184} |
| |
| ###### Physical Activity (please sel |
| ect one of the following based on activity level for the past month): |
| |
| > Avoids walking or exertion, e.g. always uses elevator, drives |
| > whenever possible instead of |
| > |
| > walking. |
| > |
| > Walks for pleasure, routinely uses stairs, occasionally exercises |
| > sufficiently to cause heavy |
| > |
| > breathing or perspiration. |
| > |
| > Participates regularly in recreation or work requiring **modest |
| > physical activity** such as golf, |
| > |
| > horseback riding, calisthenics, gymnastics, table tennis, bowling, |
| > weight lifting, and yard work. |
| > |
| > 10-60 minutes per week |
| > |
| > More than one hour per week |
| > |
| > Participates regularly in **heavy physical exercise,** such as |
| > running, jogging, swimming, cycling, |
| > |
| > rowing, skipping rope, running in place or engaging in vigorous |
| > aerobic activity such as tennis, |
| > |
| > basketball or handball. |
| > |
| > Runs less than a mile a week or engages in other exercise for less |
| > than 30 minutes |
| > |
| > per week |
| > |
| > Runs 1-5 miles per week or engages in other exercise for 30-60 |
| > minutes per week |
| > |
| > Runs 5-10 miles per week or engages in other exercise for 1-3 hours |
| > per week |
| > |
| > Runs more than 10 miles per week or engages in other exercise for |
| > more than 3 hours |
| > |
| > per week |
+-----------------------------------------------------------------------+
|
en
|
all-txt-docs
|
154017
|
June 8, 1995 LBL 37315.txt
Values and the Quantum Conception of Man
Henry P. Stapp
Lawrence Berkeley Laboratory
University of California
Berkeley, California 94720
ABSTRACT
Classical mechanics is based upon a mechanical picture of nature that is
fundamentally incorrect. It has been replaced at the basic level by a radically
different theory: quantum mechanics. This change entails an enormous shift in
our basic conception of nature, one that can profoundly alter the scientific
image of man himself. Self-image is the foundation of values, and the
replacement of the mechanistic self-image derived from classical mechanics by
one concordant with quantum mechanics may provide the foundation of a moral
order better suited to our times, a self-image that endows human life with
meaning, responsibility, and a deeper linkage to nature as a whole.
Invited contribution to the UNESCO sponsored Symposium
Science and Culture: A Common Path for the Future
Tokyo, September 10-15, 1995
Footnote: This work was supported by the Director, Office of Energy
Research, Office of High Energy and Nuclear Physics, Division of High
Energy Physics of the U.S. Department of Energy under Contract
DE-AC03-76SF00098.}
Footnote: Italics are indicated by *...* .
1. Introduction
Science has enriched our lives in many ways. It has lightened the burden of
dreary tasks and enhanced our creative capacities. It has conquered diseases
and extended our productive years. It has broadened our understanding of the
universe about us and our place within it. Yet, while conferring these
benefits, it has created the problems of crowding, pollution, alienation, and
even the threat of self-extinction. To resolve these problems a moral base is
needed. However, science has also largely destroyed, at least among the
educated, the traditional foundation of morality, namely ancient beliefs about
our link to the power that created both ourselves and the world about us. In
particular, classical mechanics, which for centuries was our basic science,
transformed the impulse that forms and sustains the world into a primordial
burst of energy that set the universe in motion, but then lapsed into total
passivity. Each man became, in this classical conception, a mechanical and
microscopically controlled automata whose every action was preordained before
he was born. Gone, or diminished, is the idea that we bear responsibility for
our actions, for we were taught by science to see ourselves not as agents of a
creative power, free to choose from among options, but rather as mechanical
devices running on automatic, ruled by forces beyond our control. Science,
having thus undermined the traditional foundation of morality, seemed to offer
no adequate replacement.
In its original seventeenth-century form classical mechanics did not wholly
eliminate the capacity of spirit and mind to influence the course of human
actions. Thoughts were allowed to interact with brains and, through them, to
affect the motions of our bodies. But by the beginning of the present century
both thoughts and gods alike had, according to science, been rendered impotent:
they could do no more than passively observe the mechanically generated course
of physical events. The clarity and consistency of this conception of the
universe seemed so perfect, and the power of the idea to produce both beguiling
new products and stable nations seemed so strong, that its survival seemed
assured. Yet these concepts are fundamentally incorrect. They are unable to
account for the detailed behavior of various materials, and by the 1930's this
mechanical conception of nature had been replaced at the fundamental level by
something profoundly different: quantum mechanics.
The enormous conceptual gulf between quantum mechanics and classical mechanics
has blocked the dissemination of this radically new conception of man and
nature into the intellectual community at large. Hence its impact upon moral
philosophy has been virtually nil. Yet one can scarcely imagine that the world
view that had served as the ideological basis of the industrial and early
scientific age can become so thoroughly repudiated without its explosive impact
on our conception of ourselves eventually asserting itself. Indeed, the
greatest remaining gift of science to man may be not a still greater mastery of
our physical environment, but rather an unraveling of the mystery of our own
beingness, and the consequent rise of a rational system of values based on a
more valid self image.
In this contribution to the symposium I shall describe what appears to me to be
the impact upon moral issues of the quantum revolution in science. Because
these questions appeared to have no immediate professional relevance to
scientists, the issues have not yet been widely discussed by those best equipt
to understand them. I shall therefore endeavour to describe the situation in a
way that will be clear to nonscientists, who will need to see beyond the
technicalities, and also to physicist, who will want to see, in some form, the
technical basis.
2. From Atom to Man
Quantum mechanics was originally a theory about atoms and their constituents:
it was about our observations on systems composed of electrons, photons, and
atomic nucleii. However, these are the same elements from which most materials
are made, including the tissues and other components of our brains and bodies.
Consequently, quantum mechanics is not merely a theory about atoms: it is our
fundamental physical theory about the detailed behavior of all material things,
including our own bodies and brains. Yet the relationship of quantum mechanics
to man goes far beyond the fact that our bodies and brains are composed of
atoms. In order to construct a rationally coherent theory of atomic phenomena
Niels Bohr found it necessary to bring human observers into the theory:
classically describable perceptions of human observers became the basic
realities of the theory, and the mathematical formalism was construed not as
the description of the actual form or structure of an externally existing
reality, but rather as a scheme that scientist and engineers could use to make
predictions about the structure of their experiences pertaining to a world that
was given no definite actual form independently of our experience of it. This
radical move was fiercely opposed by Einstein, and many other eminent
physicists of that time. But they could come up with no satisfactory
alternative.
The issue was subsequently re-opened, and logically acceptable alternatives to
the Bohr interpretation are now available. But the fact remains that any theory
that fits the empirical facts must accept as elements either perceptions of
human obervers, or other elements that, like human perceptions, link together
sequences of classically describable states as *alternative* possibilities,
even though the basic quantum mechanical law of motion, the Schroedinger
equation, generates no such *either-or* decomposition.
There is no empirical evidence supporting the notion that there is anything
other than consciousness, or mind, that makes this separation into
*alternative* possibilities, and chooses between them. Moreover, if something
else is brought in to do the job, then it is a `stand in' for consciousness, in
the sense that consciousness is all that is needed; and if something else plays
this role, then a mystery is generated: Why does consciousness exist at all?
For if mind does not effect the choices that are needed to complete the quantum
theoretical conception of nature, then thoughts appear to have no function at
all in nature: they become superfluous.
Bohr adopted a very parsimonious position: he brought in only the minimum
structure needed to fit the empirical facts. He introduced no extra physical
paraphernalia to define the alternatives and choose between them. He let our
perceptions themselves specify what has happened. The introduction of our
perceptions of the physical world into the basic physical theory, though
considered unorthodox during the twenties, can hardly be deemed irrational. For
scientists rarely deny the existence of our perceptions of the world. Bohr
merely introduced into our basic scientific theory something already known to
exist, and, in fact, the very thing whose existence is most certain to us, and
whose structure is precisely thing that our science needs in the end to explain.
Yet Bohr's move seemed retrograde at the time. For the tremendous success of
science was widely perceived to be a vindication of the wisdom of excluding
spirit and mind from our scientific conception of the physical world, along
with religious dogmas and myths.
Bohr proceeded very cautiously with the re-introduction of mind into science.
Keeping the connection to the actual practices of physicists in the fore, he
and his colleagues, principally Heisenberg, Pauli, and Born, formulated quantum
theory as a set of rules that allow scientists to calculate the probabilities
that perceptions conforming to classically describable specifications will
occur under classically describable conditions.
Complications pertaining to the living tissues in the bodies and brains of the
human observers were kept out of the theory by focussing on the classically
describable specifications themselves, without worrying about how we know
whether or not these conditions are actually met in real cases. However, the
pragmatic approach rests squarely upon our being able to decide, in practice,
whether such specifications are met or not.
Bohr could not evade this reference to our perceptions by postulating the
existence of some other classical level of beingness. For to admit the
existence of some other level of reality would contradict his basic claim,
which was that quantum theory, in the form he proposed, was complete. Admitting
the existence of a classical level of physical reality would require a whole
new level of theoretical machinery. This he avoided by allowing our
perceptions, already known to exist, to be the things that were the subject of
his classically describable specifications.
Although this pragmatic Copenhagen approach was efficient and practical in the
domain of atomic physics, it provided no detailed idea of how nature managed to
make the quantum rules work. This lacuna was of no great concern to
practical-minded atomic scientists, but it hindered efforts to extend the scope
of the theory to other domains, such as cosmology and biology. Heisenberg, von
Neumann, and others improved the theory in this respect by providing a theory
for how nature could work in a way that would make the empirically validated
rules come out true.
The key element of this ontology was the concept of `events'. Although there
were differences among various authors regarding fine points, the simplest
formulation of the idea is that the probability wave of the earlier pragmatic
interpretation, which evolves in accordance with a fixed deterministic equation
of motion, the Schroedinger equation, is elevated in status from a subjective
entity that scientists use to compute probabilities pertaining to their
classically describable perceptions of the world, to an objective property of
nature herself. This objective property is tied to the idea of `events': the
probability wave is considered to define an *objective tendency* for an *actual
event* to occur. The occurrence of any such actual event will reduce some of
the uncertainties that had existed in nature prior to the occurrence of this
event, and this reduction in these uncertainties will be reflected in *a new
set* of objective tendencies for the next event, and hence a sudden change in
the probability wave. The fact that the probability wave specifies only
`objective tendencies' for the next event, not definite certainties, means that
the particular event that will occur next is not uniquely determined
beforehand: the choice from among the allowed possibilities is a random event,
with the statistical weights of the various possibilities being specified by
the probability wave.
This model of nature can be set up so as to retreat again from the idea of
bringing mind into physical theory. That was Heisenberg's tack. But this brings
up the same problem as before: it leaves mind with nothing to do. However,
there is no rational reason to exclude from physical theory something that we
know exists, and that seems to do something, and then to bring in, instead,
something else, unknown to us, to do exactly what the known thing seems to do,
merely because in an earlier *and now deposed* theory the known thing could not
do what it seemed to do, namely make real choices between open and available
possibilities.
Von Neumann brought the brains of the observers explicitly into the description
of nature, and stressed the possibility of identifying the `choosing events',
needed by quantum theory, with those brain events that can be considered to be
representations, within quantum mechanically described brains, of mental
events. This approach constitutes, essentially, an ontological version of the
Bohr approach, in that the mental events, which are what specifies what
actually happens, are tied directly to the quantum formalism without the
explicit introduction of any intermediate classical level of reality.
This von Neumann approach is not the only ontological possibility. But it can,
I believe, be rightfully regarded as the most orthodox of the quantum
ontologies, for two reasons. The first is that it is the ontology closest in
spirit to Bohr's approach: no extra classical level intervenes between the
quantum level of description and the classically describable perceptions, and
no profusion of extra unobserved worlds is brought in. The idea that one should
introduce into physics unverifiable classical levels of physical reality is
exactly the idea that Bohr fought so strongly against. The second reason is
that when the other quantum ontologies are considered, their predictions are
considered unorthodox to the extent that the extra structure they introduce
produces a deviation from the predictions obtained without introducing the
extra structure. This von Neumann ontology is the one that leaves out all the
excess structure.
I attribute this ontolgy to von Neumann because his close friend and colleague
Eugene Wigner did so in a later work, in which he extols and further
describes it. Von Neumann (1932) describes this ontology briefly, but his
definite preference for it is not clearly spelled out in his own work. Perhaps
this approach would be better called the von Neumann-Wigner ontology, but
Wigner later rejected it, for reasons I deem insufficient.
Yet what has all this discussion about man and nature to do with values? The
answer lies in the central importance to moral philosophy of our beliefs about
such things.
3. The Importance of Beliefs
If a person truly believes that doing some act will cause him to suffer the
flames of eternal damnation, then he will probably be disinclined to do it. If
he has no such belief, but believes himself to be a rotten worthless being who
acts only to benefit himself, regardless of the consequences to others, then he
will probably act in this way and thereby become what he believes himself to
be. If, on the other hand, he believes himself to be made of finer stuff, and
the product of a worthy lineage of high-minded souls, then he may be inclined
to measure up to lofty ideals, and thereby to extend the lineage. What one
believes about himself, and his connection to the rest of the universe, exerts
a powerful influence on one's behaviour, and it is the whole basis for rational
action.
Science is a principal source of rationally held beliefs. If one believes
himself to be a mechanically generated product of his genetic make-up and a
mechanically pre-determined physical environment then he probably will be far
less able to release his full creative energy than if he believe himself to be
a facet of a universal impulse in nature that exploits the indeterminateness of
the physical world to actualize intentions and generate meaning. Moreover, from
a rationally based perception of a deep-seated wholeness of nature there can
flow both more compassion and less alienation.
4. The Nature of Man.
What is the quantum mechanical conception of the nature of man?
By the quantum mechanical conception I shall mean, for the reasons given above,
the von Neumann conception. I have in my book and elsewhere (Stapp, 1993,
1995a-c) filled in some of the details of this conception in a way that seems
both natural and compatible with the empirical evidence from neuroscience and
psychology. The key point is that each human conscious event is represented in
this conception of nature by a quantum event that actualizes *an extended
structure* in the brain of some human being. This event selects, and brings
into being, one template for action from among many that, according to the
quantum mechanical laws, were all physically possible just prior to that event.
Each such template is a coordinated plan of action for this brain and the body
it controls.
In any physical theory of man a primary job of man's brain must be to form such
templates for action. The essential difference between the classical and
quantum conceptions is that in the classical conception the brain must come
up---quickly in an emergency situation---with exactly *one* template for
action, which will direct the unfolding of some coherent action, whereas in the
quantum case, because of Heisenberg's indeterminacy principle, the evolution in
accordance with the Schroedinger equation will generate a host of alternative
possible templates for action. Thus if a situation calling for action presents
itself to an alert person, his brain will generate *one* template for action,
according to the classical conception of nature, but many alternative possible
templates for action according to the quantum conception. It is this profusion
of possible templates for action, and consequent actions, that is resolved in
the von Neumann ontology by the occurrence of an ``event'', which selects one
of the possibilities and eliminates all the others. This event is a mental
event that is represented in the quantum mechanical conception of the physical
world by a sudden change in the form of the probability wave, namely by a jump
to a form that has all of the probability concentrated on the branch of the
probability wave that represents this chosen course of action, and,
correspondingly, a null probability assigned to all of the alternative possible
branches. The actualized template for action is an extended physical structure
in the brain, and it is supposed to embody all of the structural information
that is contained in the mental event. Thus the mental and physical events can
be considered to be two aspects of the same thing. Each event represents from
the physical perspective provided by quantum mechanics a bona fide free choice
from among open and available options.
5. Chance, Choice, and Meaning
This quantum conception of man breaks the bondage of an iron-handed mechanical
determinism. Man becomes an aspect of the process by which nature uses the
latitude, or freedom, expressed by the Heisenberg indeterminancy principle to
inject form and structure into the universe. In the classical conception of
nature all freedom to choose was concentrated at the moment of the creation of
the universe, and hence none was reserved for later use. But quantum theory
transferes this freedom to later times, and von Neumann's conception shifts
some of it to our thoughts: our minds become endowed with some of the power to
act freely that in classical mechanics was the prerogative of God alone.
Our choices are not reclused from meaning. Each choice is the expression of an
intention. It arises within a context, and it initiates an action designed to
promote certain values. The intention of the action and values it serves are
integral parts of the felt act of choosing.
These qualities of the quantum event can be contrasted with the meaninglessness
of random events that might be imagined to occur at some microscopic level.
There it is impossible to embody in the physical structure actualized by the
event any representation of intention or value that transcends the momentary
situation. But the events of the von Neumann conception, which actualize
extended physical structures that are imbedded in the interpretive mechanism
provided by the brain and body, do embody intention, values, and meaning, all
of which are felt at the mental pole.
A healthy brain is designed and conditioned to produce the actions most likely
to serve the needs and values of the person, as judged from the perspective of
that person. Of course, there are always uncertainties in our assessment of the
physical situation, and fluctuations in the biological computing machinery.
Hence different parallel brain calculations of the best course of action can
come up with different conclusions. In the quantum ontology these parallel
computations are all performed simultaneously, and the various options are all
presented. The statistical weight assigned to each option is essentially the
number of parallel classical computations that lead to that option. The
simultaneous availability of all the options can be regarded as an expression
of the freedom that is represented by the quantum indeterminateness of the
physical situation. This indeterminacy makes the quantum choice a bona fide
free choice, yet a choice that has only the latitude allowed by the underlying
physical indeterminacy. The choice is thus at the same time both a free choice
and yet, statistically speaking, in terms of the entire ensemble of weighted
possible choices, also the unique best choice: this ensemble is roughly the
statistical ensemble of computed best actions, given the indeterminateness of
both the external situation and the internal computational machinery.
These choices are not blind choices, as they would be if they occurred at the
microscopic level. For they are choices between options that project into the
future actions that embody intentions based on our values. The choices
constitute value-laden intentions, and are thus endowed with meaning: they
embody both the mechanically represented personal attributes arising from genes
and education, and a freedom that transcends the mechanical.
This image of man is far more inspiring and liberating than the dreary picture
painted by classical mechanics. Man becomes a partner in the control of his
non-predetermined destiny, and an integral part of nature's process of infusing
structure and meaning into the universe. He is an aspect of the power to freely
create that classical mechanics reserved for God alone.
Beyond its re-instatement of freedom and meaning the quantum conception unveils
a still deeper truth. This arises from an aspect of quantum mechanics not yet
touched upon here, namely the deep-level of connectedness of spatially
separated physical entities. Once two entities have interacted they become
intrinsically intertwined in a way that is not physically apparent, and that
moreover defies comprehension within the way of thinking that underlies
classical mechanics and our common-sense understanding of nature. Yet it is
entailed by quantum mechanics, and has been confirmed by delicate experiments
in simple cases where sufficient control over the experimental conditions can
be maintained. This deep-level connectedness entails that our choices, although
highly personal in terms of their meaning to us, have another aspect that
transcends the individual. A choice made by one person generally has an
`instantaneous effect' on the objective tendencies associated with far-away
entities with whom he has interacted at some time in the past. It is as if the
entire universe is, in some sense, a single organism whose parts are in
instantaneous communication. This means that although each of us participates
in an individually meaningful way in the process that infuses form into the
universe, and can shape this process in accordance with his own personal
values, nevertheless the process is basically one universal activity of which
each of us is a highly integrated part. Quantum theory indicates that we are
all, far more intricately than appearances indicate, facets of one universal
process. Thus, according to the quantum conception of nature, the notion that
any one of us is separate and distinct from the rest of us is an illusion based
on misleading appearances. Recognition of this deep unity of nature makes
rational the belief that to act against another is to act against oneself.
References
Stapp, H.P. (1993) Mind, Matter, and Quantum Mechanics,
Springer-Verlag, Heidelberg Berlin New York London Paris Tokyo Hong Kong
Barcelona Budapest
Stapp, H.P. (1995a) *Why Classical Mechanics Cannot Naturally
Accomodate Consciousness But Quantum Mechanics Can*, PSYCHE 2(6)
ftp:://psyche.cs.monash.edu.au/psyche/v2-1/
psyche-95-2-06-QM_stapp-1-stapp.txt
http:://[email protected]/psyche/public/volume2-1/
psyche-95-2-06-QM_stapp-1-stapp.html
Stapp, H.P. (1995b) *Quantum Mechanical Coherence, Resonance, and Mind*,
in Norbert Wiener Centenary Congress, V. Mandrakar and P.R.Masini, eds.
Amer. Math. Soc. Ser. Proc. Sympos. Appl. Math. (PSAPM);
ftp:://Phil-Preprints.L.Chiba-U.ac.jp/pub/preprints/Phil_of_Mind/
Stapp.Quantum_Mechanical_Coherence_Resonance_and_Mind/
36915.tex
Stapp, H.P. (1995c) *The Hard Problem: A Quantum Approach*, J. Consc. Stud.
ftp:://Phil-Preprints.L.Chiba-U.ac.jp/pub/preprints/Phil_of_Mind/
Stapp.The_Hard_Problem-A_Quantum_Approach/37163.txt
Von Neumann, J. (1932) Mathematical Foundations of Quantum Mechanics,
Princeton University Press, Princeton N.J. 1955 (English edition)
Wigner, E. (1961) *Remarks on the Mind-Body Problem*, in The Scientist
Speculates, I.J. Good, ed. Heineman, London
|
en
|
all-txt-docs
|
253026
|
DEPARTMENT OF THE TREASURY, INTERNAL REVENUE SERVICE, PETITIONER V.
FEDERAL LABOR RELATIONS AUTHORITY AND NATIONAL TREASURY EMPLOYEES
UNION
No. 88-2123
In The Supreme Court Of The United States
October Term, 1989
On Writ Of Certiorari To The United States Court Of Appeals For The
District Of Columbia Circuit
Brief For The Petitioner
TABLE OF CONTENTS
Question Presented
Opinions below
Jurisdiction
Statutory provisions involved
Statement:
A. Background
1. The federal sector labor management
relations scheme
2. OMB Circular No. A-76
3. The EEOC litigation
B. Proceedings in the present case
1. The FLRA decision
2. The Court of Appeals decision
Summary of argument
Argument:
I. The decision below is inconsistent with the
management rights provision of Title VII
A. Circular A-76 is not an "Applicable Law"
under Section 7106
B. A claim that management has failed to comply
with the Circular is not a grievance
1. Subjecting agency contracting-out decisions
under the Circular to arbitral
review would impermissibly "affect"
reserved agency authority
2. Increased delays and uncertainties
would impermissibly "affect" agency
authority
II. The decision below is inconsistent with the
statutory purpose
Conclusion
OPINIONS BELOW
The decision of the Federal Labor Relations Authority (Pet. App.
10a-18a) is reported at 27 F.L.R.A. 976. The decision of the court of
appeals (Pet. App. 1a-9a) is reported at 862 F.2d 880.
JURISDICTION
The judgment of the court of appeals (Pet. App. 19a-20a) was
entered on December 2, 1988. A petition for rehearing was denied on
February 28, 1989 (Pet. App. 21a). On May 22, 1989, the Chief Justice
extended the time within which to file a petition for a writ of
certiorari to and including June 28, 1989. The petition for a writ of
certiorari was filed on that date, and was granted on October 2, 1989.
The jurisdiction of this Court is invoked under 28 U.S.C. 1254(1).
STATUTORY PROVISIONS INVOLVED
5 U.S.C. 7103(a) provides in relevant part:
(9) "grievance" means any complaint --
(A) by any employee concerning any matter relating to the
employment of the employee;
(B) by any labor organization concerning any matter relating
to the employment of any employee; or
(C) by any employee labor organization, or agency concerning
--
(i) the effect or interpretation, or a claim of breach, of a
collective bargaining agreement; or
(ii) any claimed violation, misinterpretation, or
misapplication of any law, rule, or regulation affecting
conditions of employment(.)
5 U.S.C. 7106 provides in relevant part:
(a) Subject to subsection (b) of this section, nothing in
this chapter shall affect the authority of any management
official of any agency --
(1) to determine the mission, budget, organization, number of
employees, and internal security practices of the agency; and
(2) in accordance with applicable laws --
(A) to hire, assign, direct, layoff, and retain employees in
the agency, * * *;
(B) to assign work, to make determinations with respect to
contracting out, and to determine the personnel by which agency
operations shall be conducted;
(C) with respect to filling positions, to make selections for
appointments * * *; or
(D) to take whatever actions may be necessary to carry out
the agency mission during emergencies.
(b) Nothing in this section shall preclude any agency and any
labor organization from negotiating --
(1) at the election of the agency, on the numbers, types, and
grades of employees or positions assigned to any organizational
subdivision, work project, or tour of duty, or on the
technology, methods, and means of performing work;
(2) procedures which management officials of the agency will
observe in exercising any authority under this section; or
(3) appropriate arrangements for employees adversely affected
by the exercise of any authority under this section by such
management officials.
5 U.S.C. 7117(a)(1) provides:
Subject to paragraph (2) of this subsection (relating to
agency-specific regulations), the duty to bargain in good faith
shall, to the extent not inconsistent with any Federal law or
any Government-wide rule or regulation, extend to matters which
are the subject of any rule or regulation only if the rule or
regulation is not a Government-wide rule or regulation.
5 U.S.C. 7121 provides in relevant part:
(a)(1) Except as provided in paragraph (2) of this
subsection, any collective bargaining agreement shall provide
procedures for the settlement of grievances, including questions
of arbitrability. Except as provided in subsections (d) and (e)
of this section, the procedures shall be the exclusive
procedures for resolving grievances which fall within its
coverage.
(2) Any collective bargaining agreement may exclude any
matter from the application of the grievance procedures which
are provided for in the agreement.
(b) Any negotiated grievance procedure referred to in
subsection (a) of this section shall --
(1) be fair and simple,
(2) provide for expeditious processing, and
(3) include procedures that --
(A) assure an exclusive representative the right, in its own
behalf or on behalf of any employee in the unit represented by
the exclusive representative, to present and process grievances;
(B) assure such an employee the right to present a grievance
on the employee's own behalf, and assure the exclusive
representative the right to be present during the grievance
proceeding; and
(C) provide that any grievance not satisfactorily settled
under the negotiated grievance procedure shall be subject to
binding arbitration which may be invoked by either the exclusive
representative or the agency.
QUESTION PRESENTED
Title VII of the Civil Service Reform Act of 1978 governs labor
relations between federal agencies and their employees. The question
presented is whether that statute requires an agency to negotiate over
a union proposal that, if incorporated into the agency's collective
bargaining agreement, would subject to grievance and to arbitration
the claims of agency employees and their unions that the agency's
contracting-out determinations failed to comply with OMB Circular No.
A-76.
STATEMENT
A. Background
1. The Federal Sector Labor Management Relations Scheme
Title VII of the Civil Service Reform Act of 1978, 5 U.S.C. 7101 et
seq., provides a "comprehensive * * * scheme governing labor relations
between federal agencies and their employees." /1/ Bureau of Alcohol,
Tobacco and Firearms v. FLRA, 464 U.S. 89, 91 (1983). /2/ As part of
this scheme, the statute expressly recognizes the right of federal
employees to form and join unions (see, e.g., 5 U.S.C. 7102), and
imposes upon management officials of federal agencies a duty to
bargain with their employees' unions regarding conditions of
employment. See FLRA v. Aberdeen Proving Ground, 108 S. Ct. 1261,
1261 (1988); Bureau of Alcohol, Tobacco and Firearms v. FLRA, 464
U.S. at 92; 5 U.S.C. 7103(a)(12), 7114(a)(4), 7116(a)(5), 7117.
"(C)onditions of employment" include "personnel policies, practices,
and matters * * * affecting working conditions." 5 U.S.C. 7103(a)(14).
"Recognizing 'the special requirements and needs of the
Government,' Section 7101(b), Title VII exempts certain matters from
the duty to negotiate." FLRA v. Aberdeen Proving Ground, 108 S. Ct. at
1261. In particular, 5 U.S.C. 7106 provides that "nothing in this
chapter shall affect the authority of any management official of any
agency" with respect to certain enumerated "management rights." /3/
See H.R. Rep. No. 1403, 95th Cong., 2d Sess. 43 (1978) (Section 7106
"place(s) limits on the number of subjects about which agency
management may bargain with a labor organization"). The reserved
management rights listed in Section 7106 specifically include
management's "authority * * * in accordance with applicable laws * * *
to make determinations with respect to contracting out" (5 U.S.C.
7106(a)(2)(B)). /4/
The statute provides a mechanism for resolving negotiability
disputes. If management officials decline to negotiate over a union's
bargaining proposal, believing "that the duty to bargain in good faith
does not extend to (such) matter" (5 U.S.C. 7117(c)(1)), the union may
file a negotiability appeal with the Federal Labor Relations
Authority. See 5 U.S.C. 7105(a)(2)(E), 7117(c). The FLRA then
decides whether or not the union's proposal is subject to the
bargaining obligation. 5 U.S.C. 7117(c)(6); see Bureau of Alcohol,
Tobacco and Firearms v. FLRA, 464 U.S. at 93. /5/
If the FLRA determines that a union's proposal is subject to the
bargaining obligation, that determination has significant
consequences. The determination does not, in and of itself, result in
the insertion of the proposed provision into the collective bargaining
agreement; it simply requires the parties to bargain in good faith
over whether to include the provision. But if negotiation eventually
reaches an impasse, "either party may request the Federal Service
Impasses Panel to consider the matter." 5 U.S.C. 7119(b)(1). The
Federal Services Impasses Panel is empowered to "take whatever action
is necessary * * * to resolve the impasse" (5 U.S.C.
7119(c)(5)(B)(iii)), including the imposition of contract terms upon
the parties. See, e.g., National Federation of Federal Employees v.
FLRA, 789 F.2d 944, 945 (D.C. Cir. 1986); National Treasury Employees
Union v. FLRA, 712 F.2d 669, 671 n.5 (D.C. Cir. 1983). "Thus, it is
possible that a proposal held negotiable by the FLRA may be imposed on
the parties by the Federal Service Impasses Panel in the event the
agency and the union do not ultimately agree." Indiana Air National
Guard v. FLRA, 712 F.2d 1187, 1189 n.1 (7th Cir. 1983); accord HHS v.
FLRA, 844 F.2d 1087, 1089 (4th Cir. 1988) (en banc). /6/
In addition to setting forth a duty to bargain, the statute
commands that all collective bargaining agreements in the federal
sector "shall provide procedures for the settlement of grievances." 5
U.S.C. 7121(a)(1). With certain exceptions not pertinent here, these
negotiated grievance procedures "shall be the exclusive procedures for
resolving grievances" (ibid.). Collective bargaining agreements must
"provide that any grievance not satisfactorily settled under the
negotiated grievance procedure shall be subject to binding arbitration
which may be invoked by either the (union) or the agency." 5 U.S.C.
7121(b)(3)(C).
"Grievances" are defined in 5 U.S.C. 7103(a)(9) to mean complaints
by employees and unions "concerning any matter relating to the
employment" of an employee (5 U.S.C. 7103(a)(9)(A) and (B)),
complaints concerning the effect, interpretation, or alleged breach of
the collective bargaining agreement (5 U.S.C. 7103(a)(9)(C)(i)), and
"any complaint * * * by any employee labor organization, or agency
concerning * * * any claimed violation, misinterpretation, or
misapplication of any law, rule, or regulation affecting conditions of
employment" (5 U.S.C. 7103(a)(9)(C)(ii)).
2. OMB Circular No. A-76
Office of Management and Budget Circular No. A-76 "establishes
Federal policy regarding * * * whether commercial activities should be
performed under contract with commercial sources or in-house using
Government facilities and personnel." App. A, infra, para. 1. /7/ The
Circular provides that, although (c)ertain functions (which) are
inherently Governmental in nature * * * shall be performed by
Government employees" (App. A, infra, para. 5b), it is "the general
policy of the Government to rely on commercial sources to supply the
products and services the Government needs" (id. para. 4a). But
government performance of a commercial activity /8/ is appropriate,
inter alia, "if a cost comparison prepared in accordance with * * *
the Supplement (see note 7, supra) demonstrates that the Government is
operating or can operate the activity on an ongoing basis at an
estimated lower cost than a qualified commercial source" (App. A,
infra, para. 8d). Accordingly, and subject only to limited
exceptions, "(w)henever commercial sector performance of a Government
operated commercial activity is permissible, in accordance with (the)
Circular and its Supplement, comparison of the cost of contracting and
the cost of in-house performance shall be performed to determine who
will do the work" (id. para. 5a.). /9/ The Supplement directs
Executive Branch agencies to "evaluate all agency activities and
functions to determine which are Governmental functions * * * and
which are commercial activities." Supplement at I-1. With respect to
those activities found to be commercial, the Supplement provides
instructions for conducting a cost comparison to determine whether it
would be cheaper to perform the activity in-house or to contract out
the activity to the private sector. Supplement, Part IV.
In order "to provide an administrative safeguard to ensure that
agency decisions are fair and equitable and in accordance with
(applicable) procedures," the Circular and its Supplement direct each
covered agency to establish an administrative appeals procedure to
resolve complaints by employees, unions, or bidders directly affected
by certain decisions. App. B, infra; see also App. A, infra, paras.
6g, 9d. In particular, the procedure is required to resolve questions
relating to (1) determinations resulting from cost comparisons and (2)
decisions to convert to contract without a cost comparison (App. B,
infra, para. 1). /10/ Complaints must ordinarily be filed within 15
working days of receipt of the agency's decision, /11/ and appeals
must be resolved within 30 calendar days of filing. Id. paras. 3, 6.
"The original appeal decision shall be final unless the agency
procedures provide for further discretionary review within the
agency." Id. para. 3.
The Circular expressly provides that it does not "(e)stablish and
shall not be construed to create any substantive or procedural basis
for anyone to challenge any agency action or inaction on the basis
that such action or inaction was not in accordance with this Circular,
except as specifically set forth in" the Supplement's administrative
appeal procedures. App. A, infra, para. 7c(8). The Supplement
correspondingly states that the required internal appeal procedure
"does not authorize an appeal outside the agency or a judicial review"
(App. B, infra, para. 2), and that "the procedure and the decision
upon appeal may not be subject to negotiation, arbitration, or
agreement" (id. para. 7).
3. The EEOC Litigation
In American Federation of Government Employees, AFL-CIO, National
Council of EEOC Locals and EEOC, 10 F.L.R.A. 3 (1982), the FLRA held
that the following proposal was subject to the statutory bargaining
obligation: "The EMPLOYER agrees to comply with OMB Circular A-76,
and other applicable laws and regulations concerning contracting-out."
The Authority rejected the agency's argument that negotiation over the
union's proposal would improperly impinge upon management's reserved
authority "to make determinations with respect to contracting out" (5
U.S.C. 7106(a)(2)(B)). The Authority reasoned that "(t)he proposal
would require management to exercise its right to make contracting out
determinations in accordance with whatever applicable laws and
regulations exist at the time of such action. Hence, it would
contractually recognize external limitations on management's right but
would not establish, either expressly or by incorporation, any
particular substantive limitations on management." 10 F.L.R.A. at 3.
The Authority stated that "(s)uch a proposal would only require that
when management acts, it does so in accordance with applicable OMB
directives existing at the time." 10 F.L.R.A. at 4.
The EEOC objected that if the union's proposal were to find its way
into the collective bargaining agreement, complaints alleging agency
failure to abide by the terms of OMB Circular No. A-76 would be
subject to the collective bargaining agreement's grievance and
arbitration machinery (see 5 U.S.C. 7103(a)(9)(C)(i)) and would thus
allow arbitrators to decide whether the agency's management officials
were in compliance with the Circular's dictates. The Authority
responded "that the Agency has misinterpreted the legal effect of the
disputed proposal: the proposal would not itself change the scope and
coverage of the parties' grievance procedure." 10 F.L.R.A. at 5.
Relying on the definition of "grievance" as including a claimed
"misapplication of a law, rule or regulation affecting conditions of
employment" (5 U.S.C. 7103(a)(9)(C)(ii)), the Authority concluded that
the union's bargaining proposal was essentially superfluous. It
reasoned that in view of this definition, "even in the absence of the
contract provision proposed by the Union, disputes concerning
conditions of employment arising in connection with the application of
the Circular would be covered by the negotiated grievance procedure"
(10 F.L.R.A. at 5). /12/
A divided panel of the United States Court of Appeals for the D.C.
Circuit essentially adopted the FLRA's analysis and upheld its ruling.
EEOC v. FLRA, 744 F.2d 842 (1984). The EEOC sought review in this
Court of the court of appeals' decision, arguing that the court of
appeals erred in assuming that OMB Circular No. A-76 is an "applicable
law" within the meaning of 5 U.S.C. 7106(a)(2) and a "law, rule, or
regulation" for purposes of the definition of "grievance" in 5 U.S.C.
7103(a)(9)(C)(ii). This Court granted the agency's petition for a
writ of certiorari, but subsequently dismissed the writ as
improvidently granted. EEOC v. FLRA, 476 U.S. 19 (1986). The Court
explained that the agency's arguments that OMB Circular No. A-76 is
neither an "applicable law" within the meaning of 5 U.S.C.
7106(a)(2)(B) nor a "law, rule, or regulation" within the meaning of 5
U.S.C. 7103(a)(9)(C)(ii) had not been raised before or addressed by
either the court of appeals or the FLRA. EEOC v. FLRA, 476 U.S. at
22-24. Thus, since the "central issues" in the case had not been
raised or passed upon below, the Court "decline(d) to consider them."
Id. at 24. /13/
B. Proceedings in the Present Case
1. The FLRA Decision
During negotiations with the agency, respondent National Treasury
Employees Union, representing employees of the Internal Revenue
Service, submitted the following bargaining proposal: "The Internal
Appeals Procedure (for challenging determinations made pursuant to OMB
Circular No. A-76) shall be the parties' grievance and arbitration
provisions of the Master Agreements (i.e., the relevant collective
bargaining agreements)." Pet. App. 10a. The agency declined to
bargain over the proposal, asserting among other things that the
proposal was exempt from the bargaining obligation by virtue of the
management rights provision, 5 U.S.C. 7106. The union brought a
negotiability appeal before the FLRA, which ruled that the proposal
was negotiable. Pet. App. 10a-15a. /14/
Reiterating the conclusion of its EEOC decision, /15/ the FLRA
asserted that the union's proposal was essentially superfluous. The
FLRA stated that the proposal was negotiable, and did not trespass
upon management's reserved authority to make determinations with
respect to contracting out since, under the statute, the agency's
decisions made pursuant to OMB Circular No. A-76 would be subject to
grievance and arbitration "even in the absence" of a negotiated
provision to that effect in the collective bargaining agreement. Pet.
App. 15a. More specifically, the FLRA indicated, a union's complaint
that an agency's contracting-out decision was in violation of the
Circular would constitute a "grievance" as that term is defined in 5
U.S.C. 7103(a)(9)(C)(ii): "any claimed violation, misinterpretation,
or misapplication of any law, rule, or regulation affecting conditions
of employment." See Pet. App. 13a. In the FLRA's view, grievances
alleging a failure to abide by the Circular would not unduly intrude
upon management's reserved rights because "such grievances require
nothing that is not required by section 7106(a)(2) of the Statute
itself, namely, that determinations as to contracting-out must be made
'in accordance with applicable laws.'" Pet. App. 15a (quoting 5 U.S.C.
7106(a)(2)). /16/
2. The Court of Appeals Decision
a. The agency filed a petition for review in the D.C. Circuit,
arguing that the FLRA's decision was contrary to the statute because
negotiation over the union's proposal would violate the management
rights provision. Expressly raising the issues that this Court held
were not timely raised in EEOC, the agency contended that the FLRA's
reasoning was flawed because OMB Circular No. A-76 is neither an
"applicable law" within the meaning of 5 U.S.C. 7106(a)(2) nor a "law,
rule, or regulation" within the meaning of 5 U.S.C. 7103(a)(9)(C)(ii).
Thus, the agency argued, arbitral review of alleged violations of the
Circular would encroach upon management's reserved authority "to make
determinations with respect to contracting out" (5 U.S.C.
7106(a)(2)(B)).
The panel, over a dissent by Judge D.H. Ginsburg, upheld the FLRA's
ruling. Pet. App. 1a-9a. The panel recognized that the agency had
explicitly raised the questions whether OMB Circular No. A-76 is an
"applicable law" or a "law, rule, or regulation" within the meaning of
5 U.S.C. 7106(a)(2) and 7103(a)(9)(C)(ii) respectively. Pet. App. 5a.
The panel did not discuss the merits of these questions, however,
because it "f(ou)nd this case to be governed by" EEOC v. FLRA, 744
F.2d 842 (D.C. Cir. 1984), cert. dismissed, 476 U.S. 19 (1986). Pet.
App. 4a. /17/ Accordingly, the panel regarded itself as powerless to
avoid a conflict with the Fourth and Ninth Circuits, both of which had
disagreed with the D.C. Circuit's decision in EEOC (see HHS v. FLRA,
844 F.2d 1087 (4th Cir. 1988) (en banc); Defense Language Institute
v. FLRA, 767 F.2d 1398 (9th Cir. 1985), cert. dismissed, 476 U.S. 1110
(1986)). Pet. App. 6a. /18/
In dissent, Judge Ginsburg rejected the majority's premise that the
court of appeals' decision in EEOC was controlling, and thus addressed
the merits of the agency's claim. Pet. App. 8a-9a. Citing the Fourth
Circuit's decision in HHS v. FLRA, 844 F.2d 1087 (1988) (en banc), he
concluded "that the Circular is neither an 'applicable law' nor a
'law, rule, or regulation' and that (the union's) proposal to subject
contracting-out decisions to grievance procedures is therefore
non-negotiable." Pet. App. 9a. /19/
b. The court of appeals denied the agency's petition for rehearing
with suggestion for rehearing en banc. Pet. App. 21a-25a. Judge D.H.
Ginsburg, joined by Judges Williams and Sentelle, issued a separate
statement concurring in the denial of rehearing en banc. Judge
Ginsburg stated that although "there (is) a split in the circuits" and
"(b)oth the Fourth and the Ninth Circuits have decided * * * contrary
to our panel," "I think it would be a poor use of our resources to
rehear this matter en banc," since "(i)t is likely that the Supreme
Court will want to resolve this question." Id. at 25a. /20/
SUMMARY OF ARGUMENT
The question presented in this case is whether a federal agency has
a statutory obligation to negotiate over a union proposal that, if
incorporated into the collective bargaining agreement, would subject
to grievance and to arbitration the claims of agency employees and
their unions that the agency's contracting-out determinations failed
to adhere to OMB Circular No. A-76. As both the Fourth Circuit and
the Ninth Circuit have concluded, the answer to that question is no.
1. In enacting Title VII, Congress gave federal employees the
rights to negotiate with their employing agencies over conditions of
employment and to submit grievances to binding arbitration. At the
same time, it was careful to preserve to responsible agency officials
the prerogatives necessary for the effective and efficient conduct of
government business, among which Congress specifically identified the
authority "to make determinations with respect to contracting out" (5
U.S.C. 7106(a)(2)(B)). The means Congress chose to safeguard those
prerogatives was the management rights provision incorporated in 5
U.S.C. 7106, which states in relevant part that "nothing in this
chapter (Title VII) shall affect the authority of any management
official of any agency * * * in accordance with applicable laws" to
make specified decisions concerning the hiring and assignment of
responsibilities to agency personnel, and, specifically, "to make
determinations with respect to contracting out." The management rights
provision is accordingly both broad in its protective effects and
specific in its application to determinations relating to contracting
out.
Respondents nevertheless contend that the provision does not bar
the negotiation of the instant proposal. They argue that Circular
A-76 is an "applicable law" that qualifies management's reserved right
with respect to contracting out, and therefore the union proposal, in
requiring compliance with Circular A-76, does not "affect" that right
in violation of the statute. Respondents also argue that a complaint
alleging a failure to adhere to the Circular constitutes a "grievance"
as that term is defined in 5 U.S.C. 7103(a)(9)(C)(ii): "(a complaint
concerning) any claimed violation, misinterpretation, or
misapplication of any law, rule, or regulation affecting conditions of
employment."
Respondents' theory is wrong, however, because Circular A-76 is not
an "applicable law" within the meaning of 5 U.S.C. 7106. The Circular
is not a law at all; it is instead a management tool -- a statement
of executive branch policy that does not have the force and effect of
law. By its express terms, the Circular makes clear that it is not
intended to give rise to any legally enforceable rights and
obligations. Moreover, its application turns so largely on the
exercise of managerial judgment and managerial discretion that the
courts have consistently recognized that it provides no judicially
enforceable rights.
A complaint by a union or an employee that an agency has failed to
adhere to the Circular in making a contracting-out determination does
not constitute a "grievance" within the meaning of Title VII. Both
the context of the statutory provisions and the policy behind them
demand that if the Circular is not an "applicable law" that qualifies
management's reserved authority under 5 U.S.C. 7106, it is not a "law,
rule, or regulation" within the definition of "grievance" in 5 U.S.C.
7103(a)(9)(C)(ii).
Grievances are ultimately subject to binding arbitration under 5
U.S.C. 7121(b)(3)(C), and binding arbitration regarding management's
adherence to the Circular would improperly intrude upon management's
reserved right. The implementation of Circular A-76 turns so largely
on the exercise of managerial discretion that arbitrators' review of
agencies' A-76 determinations would pose an unacceptable risk of
substituting arbitrators' judgment for that of agency managers, making
arbitrators, instead of agency management officials, the ultimate
authority on contracting-out matters. Moreover, arbitral review of
contracting-out decisions would also "affect" reserved agency
authority in violation of Section 7106 by increasing uncertainties and
delays in implementing contracting-out decisions, thus increasing the
cost of government operations.
The conclusion that complaints concerning the implementation of
Circular A-76 do not constitute grievances under Title VII is
underscored by the unequivocal statement in the statute that "nothing
in this chapter" -- including the statute's grievance and arbitration
provisions -- "shall affect" the authority reserved to management in
the management rights provision. 5 U.S.C. 7106(a).
2. The statutory purpose confirms the plain meaning of the
management rights provision. Congress emphasized in the statute
itself that its terms are to be interpreted in light of "the
requirement of an effective and efficient Government" (5 U.S.C.
7101(b)). As noted above, subjecting determinations regarding
contracting out to grievance and arbitration would impede, rather than
facilitate, efficiency and effectiveness. In addition, respondents'
interpretation of Title VII would impair the President's ability to
manage the use of Executive Branch contracting-out authority through
policy directives from the Office of Management and Budget. Under
that interpretation, the President could not provide agency management
officials with guidelines on how to go about exercising that authority
without by that very action giving agency employees a right to police,
and independent arbitrators the ultimate authority to construe and
apply, those guidelines. There is no justification for such a reading
of a statute that is specifically designed to preserve management
prerogatives necessary for the effective supervision of agency
operations.
ARGUMENT
I. THE DECISION BELOW IS INCONSISTENT WITH THE MANAGEMENT RIGHTS
PROVISION OF TITLE VII
In Title VII, Congress had two objectives: to maintain agency
management's ability to conduct the business of the agency effectively
and at the same time to give federal employees and their unions the
right to bargain over conditions of employment and to submit
grievances to binding arbitration.
The management rights provision, 5 U.S.C. 7106, is crucial to the
reconciliation of these objectives. It provides in relevant part that
"nothing in (Title VII) shall affect the authority of any management
official of any agency * * * to determine the mission, budget (and)
organization * * * of the agency; and, in accordance with applicable
laws * * * (to make specified types of personnel decisions and) to
make determinations with respect to contracting out." As the Fourth
Circuit recognized (HHS v. FLRA, 844 F.2d 1087, 1090 (1988) (en
banc)), "(i)t would have been difficult, if not impossible, for
Congress to choose more emphatic or comprehensive language in drafting
the management rights clause." Indeed, the legislative history of
Title VII confirms that a strong management rights provision was an
"important element" of the overall statutory design (124 Cong. Rec.
29,197 (1978) (remarks of Rep. Ford); cf. id. at 25,601 (remarks of
Rep. Clay)), a design that sought, while recognizing the collective
bargaining rights of federal employees, to "insure() to Federal
agencies the right to manage government operations efficiently and
effectively" (S. Rep. No. 969, 95th Cong., 2d Sess. 12 (1978)). See
Cornelius v. Nutt, 472 U.S. 648, 662 (1985) ("one of the major
purposes of (Title VII) was to 'preserv(e) the ability of federal
managers to maintain "an effective and efficient Government"'"
(citations omitted)).
The management rights provision was intended to "preserve() for
agency managers the right to keep off the bargaining table those
prerogatives which (Congress) believe(d) (to be) essential for them to
manage effectively" (124 Cong. Rec. 24,286 (1978) (remarks of Rep.
Clay)), and one of those "essential" "prerogatives" is the "authority
* * * to make determinations with respect to contracting out." 5
U.S.C. 7106(a)(2)(B). /21/ The management rights provision is thus
not only broad in its protection of the rights identified, but also
specific in its identification of decisions concerning contracting out
as one of the covered management prerogatives. /22/
Despite the clear import of the statute, respondents contend, and
the court below held (in EEOC v. FLRA, 744 F.2d at 848-851), that
agency compliance with Circular A-76 is a proper subject for
negotiation under Title VII. They argue that requiring such
compliance in a collective bargaining agreement is consistent with the
management rights provision because it will not "affect the authority
of (the agency's) management official(s)" to make decisions regarding
contracting out "in accordance with applicable laws." In light of the
"applicable laws" proviso, the argument runs, the statute contemplates
that a dispute over whether the agency has "violat(ed),
misinterpret(ed) or misappli(ed)" Circular A-76 is a "grievance" as
defined in Section 7103(a)(9)(C)(ii), and thus subject to compulsory
arbitration under Section 7121(a)(1). The argument then concludes
that since incorporating a provision requiring compliance with
Circular A-76 in the collective bargaining agreement would give agency
employees and their unions nothing they do not already have under the
statute itself, there is no impermissible "(e)ffect (on) the authority
of (agency) management official(s)," and the agency may be required to
negotiate over such a provision. /23/ For the reasons stated below,
we believe this argument must be rejected because both of its premises
are incorrect.
A. Circular A-76 Is Not An "Applicable Law" Under Section 7106 /24/
Circular A-76 cannot be an "applicable law," since it is not a law
at all; as is typical of OMB Circulars, /25/ it is designed solely as
a management tool -- to establish executive branch policies and to
provide guidelines to agencies for their implementation. The Circular
itself so states, App. A, infra, para. 1; it further emphasizes that
it does not "(e)stablish and shall not be construed to create any
substantive or procedural basis for anyone to challenge any agency
action or inaction on the basis that such action or inaction was not
in accordance with this Circular." Id. para. 7c(8). This limitation
has been recognized by the federal courts. See, e.g., AFGE, Local
2017 v. Brown, 680 F.2d 722, 726 (11th Cir. 1982), cert. denied, 459
U.S. 1104 (1983); HHS v. FLRA, 844 F.2d at 1096; see also S. Rep.
No. 144, 96th Cong., 1st Sess. 4 (1979) (referring to Circular A-76 as
expressing "executive branch policy").
As the D.C. Circuit itself has noted, in determining whether the
"applicable laws" proviso limits a particular authority reserved under
the management rights provision, "(i)t is not enough * * * for the
union to point to (supposed) limitations on management's power * * *.
The union must demonstrate further that the (alleged) limitation was
intended to qualify management authority in favor of union
participation; and that the participation proposed for the union will
not expand any statutory restriction on management." National
Federation of Federal Employees, Local 1745 v. FLRA, 828 F.2d 834, 839
n.30 (1987). Circular A-76, by its terms, is not so intended.
The very nature of Circular A-76 demonstrates that it is not an
"applicable law." Its implementation entails, first and foremost, the
exercise of agency "judgment and discretion" (HHS v. FLRA, 844 F.2d at
1092). The Circular expressly provides, for example, that the
threshold step in the contracting-out analysis -- determining whether
the activity under consideration is "governmental" or "commercial" --
is to be made "us(ing) informed judgment." App. A. infra, Attachment
A, n.1. Similarly, in determining the configuration of government
employees and resources that will lead to the most efficient in-house
performance (Supplement at I-12, III-1, IV-2), management is
specifically directed to use its "own management techniques." Id. at
III-1. As the Ninth Circuit concluded, these and other determinations
called for in the Circular "inevitably involve 'questions of judgment
requiring close analysis and nice choices' which are properly
committed to the informed discretion of management." /26/ Defense
Language Institute v. FLRA, 767 F.2d at 1401 (quoting Panama Canal Co.
v. Grace Line, Inc., 356 U.S. 309, 318 (1958)). See HHS v. FLRA, 844
F.2d at 1092-1094.
This breadth of judgment and discretion also pervades those aspects
of the Circular that are subject to the internal appeals procedure
(see App. B, infra; pp. 9-10, supra) -- aspects that, under the
proposal at issue here, would be subjected to a radically different
process and to external adjudication. Thus an agency's decision to
contract out without a cost comparison may be based on its conclusion
that the in-house operation has no "reasonable expectation" of winning
such a comparison (Supplement at I-11). With respect to cost
comparisons themselves, they must frequently be based on the estimates
of the agency's experts (see Supplement at IV-7 (staffing
requirements), IV-16 (material & supply costs), IV-23 (utilities),
IV-23 (insurance); see generally note 28, infra), and the Supplement
makes clear that management's "informed judgment" is an essential
ingredient of the decision-making process (see Supplement at IV-7).
Thus it is not surprising -- indeed it could hardly be otherwise --
that the appeal procedures required by the Circular are internal to
the agency and its expert personnel. Explicitly prohibited are
"appeal outside the agency or a judicial review" (App. B, infra, para.
2) as well as any action subjecting the procedure and decision on
appeal to "negotiation, arbitration, or agreement" (id. para. 7).
Partly because, as the Fourth Circuit put it, "(r)eliance on agency
judgment is a recurring theme of the Circular and its accompanying
Supplement" (HHS v. FLRA, 844 F.2d at 1092), "(a)ll of the courts
which have considered the issue have held that (contracting-out
decisions) under Circular A-76 are committed to agency discretion and
are not subject to judicial review." AFGE, Local 2017 v. Brown, 680
F.2d 722, 726 (11th Cir. 1982), cert. denied, 459 U.S. 1104 (1983).
See HHS v. FLRA, 844 F.2d at 1096. The courts have concluded that the
Circular "provides no judicially enforceable substantive rights"
(National Maritime Union v. Commander, Military Sealift Command, 632
F. Supp. 409, 417 (D.D.C. 1986), aff'd, 824 F.2d 1228 (D.C. Cir.
1987)), and that, in particular, government employees and their unions
do not possess any legally cognizable interests under the Circular
(National Federation of Federal Employees v. Cheney, 883 F.2d 1038
(D.C. Cir. 1989)). /27/
In short, because Circular A-76 was designed not to be legally
binding, and because it simply provides guidelines for the exercise of
managerial discretion, it does not endow federal employees and their
unions with legally enforceable rights. The Circular therefore places
no legally cognizable or enforceable constraints upon management's
reserved authority for purposes of 5 U.S.C. 7106, and so cannot
reasonably be construed to be one of the "applicable laws" to which
that Section refers.
B. A Claim That Management Has Failed To Comply With The Circular
Is Not A "Grievance"
Because the Circular is not an "applicable law" within the meaning
of 5 U.S.C. 7106(a)(2), a union or an employee complaint alleging that
an agency has failed to comply with the Circular's provisions does not
give rise to a "grievance" as that term is defined in Title VII. That
is so both because of the definition itself -- which refers to a
"claimed violation * * * of any law, rule, or regulation affecting
conditions of employment," but not to claimed violations of mere
policy guidelines -- and for a second, independent reason. If such a
complaint were deemed to be a "grievance," as the respondents argue,
allegations of management's failure to abide by the terms of the
Circular would ultimately be subject to binding arbitration pursuant
to 5 U.S.C. 7121(b)(3)(C). See pp. 7-8, supra. Such binding
arbitration would make an outside arbitrator, rather than the agency,
the final authority on compliance with the Circular and would thus fly
in the face of the clear directive of Section 7106 that "nothing in
(Title VII) shall affect the authority of any * * * agency" to make
decisions (in accordance with applicable laws) regarding contracting
out.
1. Subjecting Agency Contracting-Out Decisions Under The Circular
To Arbitral Review Would Impermissibly "Affect" Reserved Agency
Authority
Congress in the management rights provision carefully preserved
management's authority "to make determinations with respect to
contracting out." It could not at the same time have intended that
labor arbitrators would, in settling grievances, oversee managers'
contracting-out decisions made pursuant to the Executive Branch's
management guidelines.
As both the Fourth Circuit and the Ninth Circuit have concluded
(Defense Language Institute v. FLRA, 767 F.2d at 1401; HHS v. FLRA,
844 F.2d at 1096), external oversight of agency determinations under
Circular A-76 would inevitably lead to improper second-guessing of
legitimate exercises of managerial discretion. Just as compliance
with the Circular is not amenable to judicial oversight, it is also
not amenable to arbitrators' oversight: "(B)ecause the Circular lacks
meaningful standards to guide management's discretion, (an
arbitrator's and) the Authority's review would confront the same
difficulty that has led courts to hold that judicial review of an
agency's contracting-out determination (under A-76) is unavailable."
Defense Language Institute v. FLRA, 767 F.2d at 1401.
To be sure, the FLRA has declared that, in adjudicating grievances
alleging a violation of Circular A-76, arbitrators are not to review
managers' discretionary decisions, and must not substitute their
judgment for that of agency management officials. Headquarters, 97th
Combat Support Group (SAC), Blytheville Air Force Base, Arkansas and
AFGE, AFL-CIO, Local 2840, 22 F.L.R.A. 656, 661 (1986) (Blytheville).
"However, where the entire decisionmaking process is permeated with
discretion, as it is under the Circular, that substitution would be
inevitable." HHS v. FLRA, 844 F.2d at 1092. Indeed, the very question
whether a particular aspect of the Circular is or is not
"discretionary" can itself be a matter of judgment with respect to
which an arbitrator might disagree with agency management officials.
See HHS v. FLRA, 844 F.2d at 1093. /28/ The distinction between those
determinations that are "discretionary" as that term is used in
Blytheville and those that are not is not one that lends itself to a
precise definition, and that case provided none. /29/
This definitional difficulty is exacerbated by the fact that, as
this Court has repeatedly recognized, "the 'specialized competence of
(labor) arbitrators pertains primarily to the law of the shop, not the
law of the land.'" Barrentine v. Arkansas-Best Freight System, Inc.,
450 U.S. 728, 743 (1981) (quoting Alexander v. Gardner-Denver Co., 415
U.S. 36, 57 (1974)). Cf. United Steelworkers of America v. Warrior &
Gulf Navigation Co., 363 U.S. 574, 581-582 (1960). Since the
distinction in any particular case between determinations that are
reviewable under the Blytheville standard and those that are not will
turn at least in part on the "law of the land" -- i.e., "the public
law considerations underlying (5 U.S.C. 7106)" (Barrentine v.
Arkansas-Best Freight System, Inc., 450 U.S. at 743), the constraints
that Blytheville purports to impose upon arbitral review of A-76
decisions are likely to prove ineffective. HHS v. FLRA, 844 F.2d at
1093.
The threat of improper arbitral intrusion into discretionary agency
decisionmaking is heightened by the fact that under Title VII, review
of arbitrators' rulings by the FLRA and by the courts is limited. See
5 U.S.C. 7122, 7123(a)(1). Under those provisions, if an arbitrator
incorrectly disturbs a legitimate managerial decision, it is not clear
that the agency could obtain meaningful review. See United States
Marshals Service v. FLRA, 708 F.2d 1417 (9th Cir. 1983) (construing 5
U.S.C. 7122 and 7123(a)(1) to limit review); see also United States
Department of Justice v. FLRA, 792 F.2d 25 (2d Cir. 1986) (same);
Overseas Education Ass'n v. FLRA, 824 F.2d 61 (D.C. Cir. 1987) (same).
Thus, management can have no assurance that an arbitral decision
setting aside a proper managerial judgment will be corrected. See,
e.g., Defense Language Institute v. FLRA, 767 F.2d at 1401.
2. Increased Delays And Uncertainties Would Impermissibly "Affect"
Agency Authority
Subjecting agencies' A-76 determinations to grievance and
arbitration would also "affect" agency authority to make decisions
concerning contracting out, in violation of the management rights
provision, by injecting an unacceptable element of uncertainty and
delay into the government's contracting-out activity.
As the court of appeals acknowledged in this very case, the process
of grievance and arbitration may take months, or even years, to run
its course. /30/ Pet. App. 7a. Accord, HHS v. FLRA, 844 F.2d at
1094. The FLRA -- in a partial effort to cope with the intrusive
effects of its rulings -- has held that an arbitrator, upon
determining that an agency's decision to contract out is in violation
of the Circular, may not order outright cancellation of a contract;
instead, he may order the agency to "reconstruct" the procurement
action by which outside services were obtained. Blytheville, 22
F.L.R.A. at 661. /31/ Thus, under the scenario contemplated by the
FLRA, long after an agency has decided to contract work out and has
accordingly entered into, and perhaps even completed, a contract with
a private entity, the agency may be told by an arbitrator that the
contracting-out decision is infirm and must be reconsidered under the
conditions that existed when it was made. For a number of reasons,
the prospect that a contracting-out determination may be declared
invalid by an arbitrator long after the fact is not conducive to
effective agency management.
First, the problems inherent in attempting to reconstruct the
earlier conditions might lead prudent agency managers to put off
implementing a contract pending the exhaustion of any grievance and
arbitration proceedings. In order to avoid the disruption that a
reconstruction order would entail, responsible management officials
might determine that the appropriate course of action is to stay a
decision to contract out until grievance and arbitration proceedings
relating to the decision are resolved. /32/ A delay to avoid the
difficulties of reconstruction could itself lead to substantial
inefficiencies, however, since "undue delay in implementing * * * a
contract award * * * may, because of rapidly changing economic
conditions, invalidate the original cost comparison." Ketler, Federal
Employee Challenges to Contracting Out: Is there a Viable Forum?, 111
Mil. L. Rev. 103, 117 (1986). See HHS v. FLRA, 844 F.2d at 1094. The
determination of the relative cost of in-house performance as compared
to the cost of contracting out turns on economic factors that may
rapidly become outdated; thus, where a contracting-out determination
is challenged and goes to arbitration, the cost comparison on which
the determination was initially based may be inaccurate by the time
the arbitrator finally reaches a decision.
There would also be substantial inefficiencies even if the cost
comparison is still valid when the arbitrator renders his decision.
Even in those cases, the agency will have been deterred -- perhaps at
substantial cost to the government -- from implementing an efficient
contracting-out decision during the pendency of the arbitration
proceeding. Moreover, as Judge MacKinnon observed in his dissent in
EEOC v. FLRA (744 F.2d at 860):
Even if the grievance is eventually denied, and that denial
is affirmed (by the FLRA), the prolonged litigation will have
cast a cloud over the agency's contracting-out decision,
subjected the decision to considerable delay, and wasted
valuable agency assets on an essentially frivolous claim. This
extraordinary potential for vexatious litigation will
significantly infringe upon management's specifically designated
right to make contracting-out decisions.
In addition, the uncertainties that would be added to the
contracting-out process might well have an adverse effect on agencies'
negotiations for goods and services. If unions and employees were
able to resort to grievance and outside arbitration to challenge
contracting-out decisions under the Circular, potential bidders
presumably would realize that performance of the contract might not
begin until long after the initial award, and that, if begun,
performance might be interrupted in mid-stream. Bidders could
therefore reasonably be expected to adjust their bids to account for
these possibilities, and some potential bidders might decide, under
the circumstances, not to submit a bid at all. See HHS v. FLRA, 844
F.2d at 1094. /33/ Thus, the cost of contracts to the government is
likely to be increased, and in some cases inflation of bids could even
result in skewing the ultimate contracting-out determination in favor
of comparatively inefficient in-house performance by artificially
boosting the cost of private-sector performance over the in-house
cost. At the very least, introduction of the delays and uncertainties
inherent in the grievance and arbitration process could be expected to
increase the difficulties responsible agency officials would face in
planning and controlling agency budgets.
In sum, Title VII compels the conclusion that agency
contracting-out decisions may not be subjected to grievance and
arbitration because such grievance and arbitration would "affect"
management's reserved authority. The statute says that "nothing in
this chapter (i.e., Title VII) shall affect the authority of any
management official of any agency (to make determinations regarding
contracting out.)" 5 U.S.C. 7106(a). Title VII's grievance and
arbitration provisions are, of course "in this chapter"; the
statutory language thus means that "nothing in" those grievance and
arbitration provisions "shall affect" management's reserved
contracting out authority. /34/ See HHS v. FLRA, 844 F.2d at 1099;
Defense Language Institute v. FLRA, 767 F.2d at 1402. /35/
* * * * *
Contrary to the respondents' suggestions (NTEU Memorandum at 11-12;
FLRA Memorandum at 17), we do not contend that any complaint by an
employee or a union that bears on a reserved management right is, for
that reason alone, exempt from Title VII's grievance and arbitration
provisions. Instead, the conclusion that complaints alleging
violations of the Circular are not subject to grievance and
arbitration flows from the fact that the Circular both involves the
exercise of a reserved management prerogative (contracting out) and is
not an "applicable law" qualifying that prerogative. Accordingly, a
complaint alleging that management has not adhered to the Circular in
making a contracting-out determination does not give rise to a
"grievance" within the meaning of the statute (see 5 U.S.C.
7103(a)(9)).
Moreover, and contrary to the union's apparent belief, /36/ our
position is not that a complaint alleging violation of the Circular is
a "grievance" that is exempt from the statute's grievance and
arbitration provisions. Rather, our position is that a complaint
alleging a violation of the Circular is not a "grievance" at all
within the meaning of the statute. In ruling in this case that a
complaint alleging a violation of the Circular constitutes a
"grievance," the FLRA alluded to 5 U.S.C. 7103(a)(9)(C)(ii), which
defines the term to include "any claimed violation, misinterpretation,
or misapplication of any law, rule, or regulation affecting conditions
of employment." See Pet. App. 12a-13a. Cf. EEOC v. FLRA, 476 U.S. at
22. As we have shown, however, the Circular, which simply guides the
exercise of agency discretion, is quite plainly neither a "law" nor a
"regulation." Cf. Schweiker v. Hansen, 450 U.S. 785, 789 (1981). Nor
is there any reason to conclude that it is a "rule." Giving such an
expansive definition to that undefined term would mean that by its
mere inclusion in the definition of a "grievance," Congress intended
to permit the grievance and arbitration mechanism to override the
explicit mandate of the management rights provision that "nothing in
this chapter" -- including the scope of the term "grievance" -- "shall
affect" management's reserved authority with respect to contracting
out. /37/
II. THE DECISION BELOW IS INCONSISTENT WITH THE STATUTORY PURPOSE
The scope and application of the management rights provision, and
its relation to the other statutory provisions, are confirmed by an
analysis of the statutory purpose. A basic tenet of the federal labor
relations scheme enacted in Title VII is the "paramount public
interest" (FLRA v. Aberdeen Proving Ground, 108 S. Ct. at 1262) in
"preserving the ability of federal managers to maintain 'an effective
and efficient government'" (Bureau of Alcohol, Tobacco and Firearms v.
FLRA, 464 U.S. at 92 (quoting 5 U.S.C. 7101(b))). /38/ As President
Carter emphasized in his message to Congress urging that the Civil
Service Reform Act be passed, "this legislation * * * recogniz(es) the
special requirements of the Federal government and the paramount
public interest in the effective conduct of the public's business."
H.R. Doc. No. 299, 95th Cong., 2d Sess. 4 (1978). Congress in turn
took pains to "insure() to Federal agencies the right to manage
government operations efficiently and effectively" (S. Rep. No. 969,
supra, at 12), /39/ and ultimately admonished in the very terms of the
statute itself that "(t)he provisions of this chapter should be
interpreted in a manner consistent with the requirement of an
effective and efficient Government" (5 U.S.C. 7101(b)). This Court
has recognized that requirement as "one of the major purposes of the
(Civil Service Reform) Act." Cornelius v. Nutt, 472 U.S. 648, 662
(1985).
The decision of the court below disregards that major purpose. As
our discussion shows, the implementation of the union's proposal in
this case would result in delays and uncertainties that would
significantly increase the difficulties in administering the federal
policy regarding contracting out. The interpretation of the court
below that this increase is not only permitted, but indeed mandated,
by Title VII does not promote "efficiency in government"; it
encourages just the opposite. See HHS v. FLRA, 844 F.2d at 1100.
Respondents' interpretation of the statutory scheme is thus
inconsistent with the requirements of government efficiency. The
Circular is, in essence, the method the President /40/ has utilized to
provide agency management officials with guidance on how they should
go about exercising the reserved right to make contracting-out
determinations. As such, it is binding only in the sense that
compliance is directed as a matter of internal Executive Branch
policy. Ultimately, compliance with the Circular is satisfactory only
if and to the extent that the President says it is.
Yet under respondents' reading of Title VII, the promulgation of
this internal policy guidance automatically gives agency employees and
their unions a right to subject interpretation of that guidance to
adjudication by independent arbitrators. As the Fourth Circuit
explained (HHS v. FLRA, 844 F.2d at 1095), "(w)ere the Circular held
to be an 'applicable law' within the meaning of Section 7106 (whose
alleged violation would give rise to an arbitrable grievance), it
would be impossible for the executive branch to formulate policy
directives, and for the President to instruct his subordinates,
without giving rise to third party rights to challenge those policies
and instructions."
The respondents' reading of Title VII, which would have the
perverse effect of "transform(ing) basic tools of management into
occasions for intrusion" (HHS v. FLRA, 844 F.2d at 1100), is thus
contrary to the directive of Section 7101(b). Congress could not have
intended, in enacting Title VII, to present Executive officials "with
the Hobson's choice of surrendering control over the interpretation of
policy directives or attempting to manage without such instructions to
subordinates." HHS v. FLRA, 844 F.2d at 1100. /41/ To the contrary,
the legislative history confirms that the management rights provision
"specifies areas for decision which are reserved to the President and
heads of agencies," in order to "insure() to Federal agencies the
right to manage government operations efficiently and effectively" (S.
Rep. No. 969, supra, at 12-13 (emphasis added)).
We recognize that the FLRA's "reasonable and defensible
constructions of (its) enabling Act" are entitled to deference. FLRA
v. Aberdeen Proving Ground, 108 S. Ct. at 1263. This Court has
admonished, however, that "reviewing courts * * * must not
'rubber-stamp * * * administrative decisions that they deem
inconsistent with a statutory mandate or that frustrate the
congressional policy underlying a statute.'" Ibid.; Bureau of Alcohol,
Tobacco and Firearms v. FLRA, 464 U.S. at 97 (quoting NLRB v. Brown,
380 U.S. 278, 291-292 (1965)). Here, as in those cases, the FLRA's
interpretation is "inconsistent() with the language and purpose of
Title VII" (FLRA v. Aberdeen Proving Ground, 108 S. Ct. at 1263), and
thus the court of appeals erred in failing to set that interpretation
aside.
CONCLUSION
The judgment of the court of appeals should be reversed.
Respectfully submitted.
WILLIAM C. BRYSON
Acting Solicitor General /42/
STUART M. GERSON
Assistant Attorney General
DAVID L. SHAPIRO
Deputy Solicitor General
HARRIET S. SHAPIRO
Assistant to the Solicitor General
WILLIAM KANTER
THOMAS M. BONDY
Attorneys
NOVEMBER 1989
/1/ Title VII of the Civil Service Reform Act is also known as the
Federal Service Labor-Management Relations Statute.
/2/ Title VII does not cover certain federal employees (e.g.,
members of the military and the Foreign Service), or certain federal
agencies (e.g., the Federal Bureau of Investigation and the Central
Intelligence Agency). 5 U.S.C. 7103(a)(2) and (3).
/3/ The authority reserved to management in 5 U.S.C. 7106(a) is
"(s)ubject to subsection (b) of this section." 5 U.S.C. 7106(b)
specifies that the management rights provision does not "preclude any
agency and any labor organization from negotiating" with regard to the
"procedures which management officials of the agency will observe in
exercising any authority under this section" and with regard to
"appropriate arrangements for employees adversely affected by the
exercise of any authority under this section by such management
officials."
/4/ Title VII also precludes an agency from bargaining over
proposals that are "inconsistent with any Federal law or any
Government-wide rule or regulation," and over "matters which are the
subject of * * * a Government-wide rule or regulation" (5 U.S.C.
7117(a)(1)).
/5/ The FLRA's rulings on negotiability are reviewable in the
courts of appeals under 5 U.S.C. 7123. That provision is the
jurisdictional basis for this suit.
/6/ Title VII's collective bargaining regime is in this fundamental
respect quite different from the framework established under the
National Labor Relations Act, which does not provide for an entity
empowered to resolve bargaining impasses by ordering the incorporation
of the contested proposal into the parties' collective bargaining
agreement.
/7/ The Circular was originally issued as a Bureau of the Budget
Bulletin in 1955. The current version, relevant portions of which are
reprinted in Appendix A, infra, was issued in 1983. (Copies of the
complete Circular have been lodged with the Clerk of this Court.) The
Circular, which is signed by the Director of OMB and is addressed to
the heads of Executive Branch agencies, is accompanied by a Supplement
that sets forth the steps to be taken by agency officials to implement
the Circular's general policy. We have lodged copies of the
Supplement with the Clerk of this Court, and have reproduced one
portion of it (Part I, Chapter 2, Section I) in Appendix B, infra.
/8/ A commercial activity is "one which is operated by a Federal
executive agency and which provides a product or service which could
be obtained from a commercial source"; in contrast, a governmental
function is one that is "so intimately related to the public interest
as to mandate performance by Government employees." App. A, infra,
para. 6a and e.
/9/ Cost comparisons are not required when the activity being
considered for contracting out involves ten or fewer work years and
"fair and reasonable prices" can be obtained from qualified commercial
sources, or when effective price competition is available and there is
no reasonable expectation that in-house operation will be less
expensive. Supplement at I-11, I-1 & n.1.
/10/ The Circular provides that the required administrative appeals
procedure shall not apply to questions regarding government management
decisions. App. B, infra, para. 1b.
/11/ When an initial cost comparison decision is announced, any
directly affected employee, union, or bidder is entitled upon request
to receive "(a)ll detailed documentation supporting (that) decision".
App. B, infra, para. 4. The appeal must be filed within 15 working
days after the directly affected party receives the documentation
(ibid.). The 15-working-day appeal period may be extended to 30
working days in cases where the cost data are particularly complex.
Id. para. 6a.
/12/ The FLRA similarly rejected management's claim that
negotiation over the union's proposal was barred because such
negotiation "would conflict with OMB Circular No. A-76, itself." 10
F.L.R.A. at 4. The FLRA stated that the Circular cannot "limit the
statutorily prescribed scope and coverage of the parties' negotiated
grievance procedure." Ibid.
/13/ Justice White and Justice Stevens dissented from the Court's
decision to dismiss the writ of certiorari as improvidently granted.
EEOC v. FLRA, 476 U.S. at 25 (White, J., dissenting); id. at 25-27
(Stevens, J., dissenting). Justice Stevens stated that, on the
merits, he would rule in management's favor (id. at 27):
I am persuaded that Circular A-76 is not one of the
"applicable laws" described in 5 U.S.C. Section 7106(a)(2)(B)
and that requiring compliance with the Circular would intrude on
management's reserved rights. Accordingly, I would reverse the
judgment of the Court of Appeals.
/14/ The FLRA decision simply required the agency to bargain over
the union's proposal to subject to the collective bargaining
agreement's grievance and arbitration provision agency contracting-out
decisions made pursuant to OMB Circular A-76. Title VII provides,
however, that if the union and management ultimately fail to reach
agreement with respect to the proposal, either party may ask the
Federal Service Impasses Panel to resolve the impasse, and the
Impasses Panel may put the union's proposal into effect. See pp. 6-7,
supra. If the union's proposal were to be incorporated into the
collective bargaining agreement, disputes about the propriety of
management's contracting-out decisions under the A-76 Circular would
be subject to the collective bargaining agreement's grievance
mechanism, and, ultimately, to resolution by an independent
arbitrator. See 5 U.S.C. 7103(a)(9)(C)(i), 7121(b)(3)(C); HHS v.
FLRA, 844 F.2d at 1092.
/15/ The FLRA recognized that the Ninth Circuit had since "rejected
the Authority's approach in EEOC," in Defense Language Institute v.
FLRA, 767 F.2d 1398 (9th Cir. 1985), cert. dismissed, 476 U.S. 1110
(1986), but the Authority nevertheless "respectfully adhere(d) to the
view that (its own) position in EEOC is correct." Pet. App. 14a n.1.
In addition to its decision in EEOC, the FLRA also relied
significantly on its decision in American Federation of Government
Employees, AFL-CIO, Local 1923 and Department of Health and Human
Services, Office of the Secretary, Office of the General Counsel,
Baltimore, Maryland, 22 F.L.R.A. 1071 (1986), in which the FLRA held
negotiable a proposal similar to those at issue in EEOC and in the
present case. That decision has since been set aside by the Fourth
Circuit. HHS v. FLRA, 844 F.2d 1087 (1988) (en banc).
/16/ The FLRA also held negotiable a second proposal advanced by
the union. That proposal specified that the agency would not award a
contract "until all grievance procedures, up to and including
arbitration, are exhausted in regard to any provisions (e.g., OMB
Circular A-76, Statute) pertaining to the impact and implementation of
a contracting-out decision." Pet. App. 16a. The FLRA explained
(ibid.), "Proposal 2 provides that the Agency shall wait until all
grievances concerning the impact and implementation of a
contracting-out determination have been exhausted through the
grievance and arbitration procedures before awarding any contract."
The FLRA concluded that Proposal 2 was subject to the bargaining
obligation because it suggested a negotiable "procedure" within the
meaning of 5 U.S.C. 7106(b)(2). Pet. App. 16a-18a.
/17/ The panel recognized that neither the "applicable law" issue
nor the "law, rule, or regulation" issue had been "consider(ed) or
decid(ed)" (Pet. App. 5a) in EEOC; it also recognized (ibid.) that
this Court had dismissed the writ of certiorari as improvidently
granted in EEOC precisely because the "applicable law" and "law, rule,
or regulation" arguments "had never been made before either the FLRA
or (the court of appeals)" in that case. The panel held,
nevertheless, that the court of appeals' prior decision in EEOC was
controlling, since "(w)e do not * * * find an intellectually
legitimate basis to distinguish EEOC from this case." Ibid. Thus, the
panel concluded, "(t)he (agency's) new arguments are merely that" (id.
at 5a-6a), and the outcome of this case was dictated by EEOC.
/18/ The panel stated, however, that it was not "constrained (by
EEOC) with respect to (the union's) second proposal" (Pet. App. 6a),
which would stay execution of the agency's contracting-out
determinations until the exhaustion of grievance and arbitration. See
note 16, supra. The panel set aside the FLRA's ruling that the
union's second proposal was negotiable. Pet. App. 6a-7a. The panel
determined that the second proposal "encroaches entirely too far upon
management's authority to accomplish its agency's mission with
dispatch" (id. at 6a), since "delay alone could compromise the
managerial judgment involved in procuring products or services
necessary to the agency's mission when they are needed" (id. at 7a).
That determination is not challenged in this Court.
/19/ Judge Ginsburg agreed with the other members of the panel that
the union's second proposal was not negotiable. Pet. App. 8a.
/20/ Judge Silberman issued a separate statement, also concurring
in the denial of rehearing en banc. Pet. App. 24a.
/21/ Accordingly, contracting out is one of the "areas of
management authority which may not be subject to collective
bargaining" (H.R. Rep. No. 1403, supra, at 43; accord H.R. Conf. Rep.
No. 1717, 95th Cong., 2d Sess. 154 (1978); 124 Cong. Rec. 24,286
(1978) (remarks of Rep. Clay)).
/22/ The specific and complete statutory exclusion of contracting
out from the scope of mandatory bargaining in Title VII thus stands in
sharp contrast to the rules applicable in the private sector. See
Fibreboard Paper Products Corp. v. NLRB, 379 U.S. 203 (1964); First
National Maintenance Corp. v. NLRB, 452 U.S. 666 (1981).
/23/ If the union agrees with this analysis, it is hard to see why
it made the contested proposal in the first place, since it has no
more to gain by its inclusion in the collective bargaining agreement
than the agency has to lose by that inclusion. See Defense Language
Institute v. FLRA, 767 F.2d at 1402 ("we find it incredible that the
parties would so strenuously dispute a proposal that gives the union
nothing it did not already possess and deprives management of nothing
it had not already lost"); EEOC v. FLRA, 744 F.2d at 852 (MacKinnon,
J., dissenting) (union bargaining proposal would be "a total
nullity"); HHS v. FLRA, 844 F.2d at 1097.
/24/ Significantly, every judge to have discussed the question has
agreed with this assertion. In EEOC v. FLRA, supra, only Justice
Stevens addressed the merits; he concluded that the Circular is not
an "applicable law." 476 U.S. at 27. In HHS v. FLRA, 844 F.2d 1087,
1094-1095, 1096 (4th Cir. 1988) (en banc), the majority squarely held
that the Circular is not an "applicable law"; the dissenters declined
to consider the question -- in their view, it was not properly before
the court (see id. at 1102 (dissenting opinion)). Finally, in the
instant case, Judge Ginsburg in dissent stated expressly that he was
of the view that the Circular is not an "applicable law." Pet. App.
9a. Although the panel majority rejected the agency's contention that
the Circular is not an "applicable law" (Pet. App. 5a-6a), it did so
simply on the ground that it was bound by the prior Circuit decision
in EEOC v. FLRA, 744 F.2d 842 (D.C. Cir. 1984). Cf. National
Federation of Federal Employees v. Cheney, 883 F.2d 1038, 1062-1063
(D.C. Cir. 1989) (Mikva, J., dissenting). As the majority
acknowledged (Pet. App. 5a), and as this Court squarely held in its
opinion dismissing the writ of certiorari as improvidently granted
(476 U.S. at 24), EEOC v. FLRA did not consider the question whether
the Circular is an "applicable law."
/25/ "In carrying out its responsibilities, the Office of
Management and Budget issues policy guidelines to Federal agencies to
promote efficiency and uniformity in Government activities. These
guidelines are normally in the form of circulars." 5 C.F.R. 1310.1.
/26/ The nature of the Circular as a managerial tool, rather than
an enforceable "applicable law," is exemplified by Part III of the
Supplement, denominated "Management Study Guide." "The management
study (that is mandated consists of) a major management analytical
evaluation of (the) organization to determine if the job can be
accomplished in a more economical manner." Supplement at III-2. The
"Management Study Guide" directs responsible management officials, in
order to decide whether the particular activity should be contracted
out, to analyze the activity and define its "essential mission."
Ibid.; see id. at III-7. Management officials are then directed to
make a number of other determinations, including identification of the
activity's "optimum organizational structure" (ibid.), which in turn
requires an assessment of whether "authority and accountability (are)
properly balanced in the organization's (present) hierarchical
structure" (id. at III-8), and whether the activity's present
personnel structure is "the most effective and economical based on
(the) work to be performed" (ibid.). As the functions called for in
the "Management Study Guide" amply illustrate, the Circular prescribes
quintessentially managerial decisionmaking, and its application calls
for the exercise of purely discretionary managerial judgments. See
also Ketler, Federal Employee Challenges to Contracting Out: Is There
A Viable Forum?, 111 Mil. L. Rev. 103, 108 (1986).
/27/ The Circular is by no means unique in this regard; instead,
"it has long been held that the executive branch may promulgate such
instructions without creating rights and obligations enforceable by
third parties" (HHS v. FLRA, 844 F.2d at 1095). For example, the
Social Security Claims Manual considered in Schweiker v. Hansen, 450
U.S. 785, 789 (1981), like Circular A-76, "has no legal force, and it
does not bind the (agency). Rather, it is * * * for internal use by
(agency) employees."
/28/ For example, although the FLRA upheld the arbitrator's
determination in Blytheville itself, concluding that the challenged
agency decision violated non-discretionary provisions of Circular
A-76, the errors identified turned largely on matters of discretion.
The arbitrator faulted the agency for incorrectly estimating in-house
labor costs, including the grade level required for a temporary
employee to perform the work and the extent to which contracting out
would displace existing employees. Compare Blytheville, 22 F.L.R.A.
at 662, with HHS v. FLRA, 844 F.2d at 1092-1093 (criticizing
Blytheville).
/29/ Although the FLRA stated in Blytheville that an arbitrator's
review of contracting-out decisions is limited to determining whether
"the agency violated mandatory provisions * * * (which) contain
sufficiently specific standards to objectively analyze and review the
agency's actions" (22 F.L.R.A. at 661), Blytheville offers little
guidance regarding which provisions of Circular A-76 might, in the
FLRA's view, satisfy that standard. See note 28, supra.
/30/ Compare the expedited internal appeals process contemplated by
the Supplement to the Circular, pursuant to which an appeal ordinarily
must be filed within 15 working days of the agency's initial decision,
and must then be conclusively resolved by the agency within 30
calendar days. App. B, infra, paras. 3, 6a.
/31/ The FLRA explained the reconstruction process as follows (22
F.L.R.A. at 662):
An agency in taking the action required by (a reconstruction)
award must reconstruct the procurement process in accordance
with the provisions which were previously not complied with and
must determine on reconstruction whether the decision to
contract out is now in accordance with law and regulation. If
the decision to contract out can no longer be justified, the
agency must determine whether considerations of cost,
performance, and disruption override cancelling the procurement
action and take whatever action is appropriate on the basis of
that determination.
The agency's reconstruction, and its determination of the
appropriate course in light of that reconstruction, might itself be
subjected to Title VII grievance and arbitration.
/32/ The court of appeals' refusal in this case to require
negotiation about a union proposal to include a specific stay
requirement in the collective bargaining agreement itself (see note
18, supra) does not eliminate the problem. Even in the absence of a
specific provision requiring management to delay, management might
choose to delay rather than to go ahead with a contract only to be
ordered, after the fact, to reconstruct the procurement action.
/33/ A bidder, of course, would not be entitled to participate in
the grievance and arbitration proceeding. In contrast, the appeals
mechanism contemplated by the Circular includes bidders as well as
unions and employees. As the Circular recognizes (App. B, infra,
para. 7), this inclusion would be thwarted by labor arbitration:
Since the appeal procedure is intended to protect the rights
of all directly affected parties -- Federal employees and their
representative organizations, and bidders or offerors on the
instant solicitation -- the procedure and the decision on appeal
may not be subject to negotiation, arbitration or agreement.
/34/ The FLRA itself has explained (American Federation of
Government Employees, AFL-CIO, Local 2782 and Department of Commerce,
Bureau of the Census, Washington, D.C., 6 F.L.R.A. 314, 319-321
(1981)):
Under the plain language of section 7106(a), of course,
"nothing" in the Statute shall "affect the authority" of an
agency to exercise the rights enumerated therein. Hence, no
matter could be grieved under a procedure negotiated pursuant to
section 7121 of the Statute which would deny the authority of an
agency to exercise its statutory rights under section 7106.
/35/ Because "substantive management rights (would) realistically
be() impaired" if the union's bargaining proposal were to be adopted
(National Federation of Federal Employees, Local 615 v. FLRA, 801 F.2d
477, 483 (D.C. Cir. 1986)), it is incorrect to suggest, as did the
court of appeals in EEOC, 744 F.2d at 848 (but not the FLRA in the
instant case), that agency compliance with the Circular is negotiable
under 5 U.S.C. 7106(b) as a procedure used in the exercise of a
reserved management right. As the Fourth Circuit explained in HHS v.
FLRA, supra, while "(t)here can be no doubt that Circular A-76 is, to
some extent, procedural" (844 F.2d at 1097), the effect of subjecting
agency implementation of the Circular to negotiation and arbitration
would extend far beyond procedure, and would directly affect
substantive rights. Cf. Defense Language Institute v. FLRA, 767 F.2d
1398, 1400-1401 & n.3 (9th Cir. 1985) (proposal that would require
correction of data not prepared in accordance with Circular A-76 is
not procedural in nature, and therefore is not negotiable); Pet. App.
6a-7a (holding non-negotiable a union proposal requiring agency to
complete arbitration before contracting out).
In addition, the union proposal would directly affect the
substantive rights of non-governmental parties. Substituting the
collective bargaining agreement's grievance and third-party
arbitration provisions for the Circular's existing internal appeal
mechanisms would give agency employees and their unions enforceable
rights to challenge substantive agency decisions that are expressly
denied to them under the Circular and its Supplement. See App. A,
infra, para. 7c(8); App. B, infra, para. 2. Moreover, the Circular's
appeal mechanisms, but not the collective bargaining agreement
grievance and arbitration procedures, provide for participation by
"bidders or offerors on the (affected) solicitation" (App. A, infra,
para. 6g; App. B, infra, para. 1). Since the union's proposal would
supplant the appeal procedures required by the Circular, it would
diminish the rights of disappointed bidders to protest agency actions
(see note 33, supra).
/36/ See NTEU Memorandum at 5, 14 (citing 5 U.S.C. 712(c)); see
also Pet. App. 14a; EEOC v. FLRA, 744 F.2d at 849-850; HHS v. FLRA,
844 F.2d at 1105-1106 (dissenting opinion)).
/37/ For the foregoing reasons, we contend that Circular A-76 is
neither an "applicable law" under Section 7106 nor a "law, rule, or
regulation" under Section 7103's definition of a "grievance." If this
Court disagrees, and concludes that the Circular is either a law,
rule, or regulation for purposes of these provisions, we believe such
a conclusion would mean that the union's proposal is not negotiable
because of 5 U.S.C. 7117(a)(1), which provides that the duty to
bargain exists only "to the extent not inconsistent with any Federal
law or any Government-wide rule or regulation." Circular A-76, which
"(u)nless otherwise provided by law * * * appl(ies) to all executive
agencies" (App. A, infra, para. 7a), and is designed to "establish()
Federal policy" (id. para. 1), applies "Government-wide." And the
union's proposal to substitute a grievance procedure and outside
arbitration for the Circular's internal appeal mechanism is
fundamentally "inconsistent with" the Circular's exclusion of
arbitration (see App. B, infra, para. 7).
/38/ The D.C. Circuit itself has recognized that a "key policy"
underlying the statutory provisions is the promotion of "efficiency in
government" (National Federation of Federal Employees, Local 1745 v.
FLRA, 828 F.2d 834, 839 n.31 (D.C. Cir. 1987); see also Department of
the Treasury, Bureau of Alcohol, Tobacco and Firearms v. FLRA, 857
F.2d 819, 822 (D.C. Cir. 1988)).
/39/ See also, e.g., H.R. Conf. Rep. No. 1717, supra, at 154.
/40/ OMB is an office within the Executive Office of the President
(31 U.S.C. 501), and serves as "the President's principal arm for the
exercise of his managerial functions" (31 U.S.C. 501 note (Reorg. Plan
No. 2 of 1970)).
/41/ As one commentator has observed (Ketler, supra, 111 Mil. L.
Rev. at 139-140):
If agency contracting officers at the lowest levels were
merely delegated the authority to contract out in their sole
discretion, no "applica(ble) laws" would exist to provide a
basis for employee grievances. It is ludicrous to conclude that
Congress intended by section 7106(a) to preserve the discretion
of first-line managers to determine the factors upon which to
make contracting-out decisions, but to deny senior management
officials that same discretion to determine uniform conditions
for contracting out on an agency-wide basis.
/42/ The Solicitor General is disqualified in this case.
APPENDIX
|
en
|
all-txt-docs
|
351657
|
IN THE UNITED STATES COURT OF APPEALS
FOR THE FIFTH CIRCUIT
Case No. 03-20292
consolidated with 03-20500
EQUAL EMPLOYMENT OPPORTUNITY COMMISSION,
Plaintiff-Appellant,
v.
DUNBAR DIAGNOSTIC SERVICES, INC.; VILLAGE ULTRASOUND
CLINIC, INC.,
Defendants-Appellees.
On Appeal from the United States District Court
for the Southern District of Texas
BRIEF OF THE EQUAL EMPLOYMENT OPPORTUNITY
COMMISSION AS APPELLANT
JAMES L. LEE
Deputy General Counsel
CAROLYN L. WHEELER
Acting Associate General Counsel
VINCENT J. BLACKWOOD
Assistant General Counsel
JOHN F. SUHRE
Attorney
EQUAL EMPLOYMENT
OPPORTUNITY
COMMISSION
1801 L Street N.W., Room 7040
Washington, D.C. 20507
(202) 663-4716
STATEMENT REGARDING ORAL ARGUMENT
The Equal Employment Opportunity Commission respectfully requests that
oral argument be granted in this case. The district court, inter alia, granted
judgment as a matter of law to Dunbar Diagnostic Services, Inc. based on the
court's view that the Commission's witness, Leticia Gonzalez, was not credible.
However, the record contains sufficient evidence to permit a jury to find that
Dunbar Diagnostic discriminated against Gonzales because she was pregnant and
because she filed a charge of discrimination. Because there is a lengthy record in
this case and because the Commission is asking this Court to reassign this case to a
different judge on remand, the Commission requests the opportunity for oral
argument. TABLE OF CONTENTS
STATEMENT OF JURISDICTION .........................................................................1
STATEMENT OF THE ISSUES ..............................................................................2
STATEMENT OF THE CASE .................................................................................3
1. Nature of the Case and Course of Proceedings ...................................................3
2. Statement of the Facts ..........................................................................................4
3. Opinions below ..................................................................................................14
a. Oral opinion granting JMOL ...................................................................14
b. Oral opinion awarding attorneys' fees to DDSI ......................................17
SUMMARY OF ARGUMENT ..............................................................................19
ARGUMENT ..........................................................................................................22
I. THE DISTRICT COURT ERRED IN GRANTING JMOL TO THE
DEFENDANT BECAUSE THE EVIDENCE IS SUFFICIENT TO
SUPPORT A VERDICT FOR THE COMMISSION ON ITS CLAIMS
OF PREGNANCY DISCRIMINATION AND RETALIATION ................22
A. There Is Sufficient Evidence to Support a Finding That DDSI
Denied Health Insurance to Gonzalez Because
She Was Pregnant ...............................................................................23
B. There Is Sufficient Evidence to Support a Finding That DDSI
Fired Gonzalez Because She Filed a Charge of Discrimination
With the EEOC ...................................................................................26
C. The District Court Erred in Awarding JMOL Based on
Its View of Gonzalez's Credibility ....................................................28
TABLE OF CONTENTS cont'd.
II. THE DISTRICT COURT'S DECISION TO AWARD
ATTORNEY'S FEES TO DDSI WAS AN
ABUSE OF DISCRETION ..........................................................................32
III. THIS CASE SHOULD BE ASSIGNED TO A DIFFERENT JUDGE
ON REMAND BECAUSE AN OBJECTIVE OBSERVER WOULD
HAVE CAUSE TO QUESTION JUDGE HUGHES'S
IMPARTIALITY BASED ON HIS CONDUCT AT THE TRIAL .............34
CONCLUSION .......................................................................................................40
TABLE OF AUTHORITIES
Cases Page(s)
Boyle v. Pool Offshore Co., 893 F.2d 713 (5th Cir 1990) . . . . . 29, 36
Brady v. Fort Bend County, 145 F.3d 691 (5th Cir. 1998) . . . . .28
Christiansburg Garment Co. v. EEOC, 434 U.S. 412 (1978) . . . . .32
In Re: Daimler Chrysler Corp., 294 F.3d 697
(5th Cir. 2002) . . . . . . . . . . . . . . . . . . .35, 38
Delano-Pyle v. Victoria County, 302 F.3d 567
(5th Cir. 2002) . . . . . . . . . . . . . . . . . . .23, 28
Dotson v. Clark Equipment Co., 783 F.2d 586 (5th Cir. 1986) . . . . . 28
EEOC v. Olson's Dairy Queens, 989 F.2d 165 (5th Cir. 1993) . . . . . . 32
EEOC v. R.J. Gallagher Co., 181 F.3d 645 (5th Cir. 1999) . . . . . . . 32
Evans v. City of Houston, 246 F.3d 344 (5th Cir. 2001) . . . . . .27
Johnson v. Sawyer, 120 F.3d 1307 (5th Cir. 1997) .34, 35, 38
Little v. Southern Electric Steel Co., 595 F.2d 998
(5th Cir. 1979) . . . . . . . . . . . . . . . . . . . . .33
Medina v. Ramsey Steel Co., 238 F.3d 674 (5th Cir. 2001) . . . . . . . 33
Miss. Chemical Corp. v. Dresser-Rand Co., 287 F.3d 359
(5th Cir. 2002) . . . . . . . . . . . . . . . . . . . . .26
Mitchell v. Maynard, 80 F.3d 1433 (10th Cir. 1996) . . . . . 39
Potashnick v. Port City Const. Co., 609 F.2d 1101
(5th Cir. 1980) . . . . . . . . . . . . . . . . . . . . .34
TABLE OF AUTHORITIES cont'd
Cases Page(s)
Raggs v. Mississippi Power & Light Co. 278 F.3d 463
(5th Cir. 2002) ................................................................................25
Reeves v. Sanderson Plumbing Product, Inc.,
530 U.S. 133 (2000) . . . . . . . . . . . . . . . . . . .25
Rivas v. Brattesani, 94 F.3d 802 (2nd Cir. 1996) . . . . .36
Shackelford v. Deloitte & Touche, LLP, 190 F.3d 398
(5th Cir. 1999) . . . . . . . . . . . . . . . . . . . . .27
Simon v. City of Clute, Tex., 825 F.2d 940 (5th Cir. 1987) . . . . . . 39
St. Mary's Honor Center v. Hicks, 509 U.S. 502 (1993) . . . . . .31
U.S. v. Bell, 678 F.2d 547 (5th Cir. Unit B 1982) ..........................27
U.S v. Columbia Broadcasting System, Inc., 497 F.2d 107
(5th Cir. 1974) ...............................................................................34
U.S. v. Davis, 285 F.3d 378 (5th Cir. 2002) . . . . . . .36
U.S. v. Deville, 278 F.3d 500 (5th Cir. 2002) . . . . . .28
U.S. v. Dotson, 615 F.2d 329 (5th Cir. 1980) . . . . . . .29
TABLE OF AUTHORITIES cont'd
Statutes Page(s)
28 U.S.C. 1291 . . . . . . . . . . . . . . . . . . . . . 2
Title VII of the Civil Rights Act of 1964,
42 U.S.C. 2000e et seq. . . . . . . . . . . . . . . . . 1
42 U.S.C. 2000e-2(a)(1) and 2000e-3(a) . . . . . . 3
42 U.S.C. 2000e-5(k) . . . . . . . . . . . . . . . . . .32
42 U.S.C. 2003-5(f)(1) and (3) . . . . . . . . . . . . . 3
IN THE UNITED STATES COURT OF APPEALS
FOR THE FIFTH CIRCUIT
Case No. 03-20292
consolidated with 03-20500
EQUAL EMPLOYMENT OPPORTUNITY COMMISSION,
Plaintiff-Appellant,
v.
DUNBAR DIAGNOSTIC SERVICES, INC.; VILLAGE ULTRASOUND
CLINIC, INC.,
Defendants-Appellees.
On Appeal from the United States District Court
for the Southern District of Texas
BRIEF OF THE EQUAL EMPLOYMENT OPPORTUNITY
COMMISSION AS APPELLANT
STATEMENT OF JURISDICTION
These are consolidated appeals from a final judgment on the merits and an order awarding
attorneys' fees entered in an action brought under Title VII of the Civil Rights Act
of 1964, 42 U.S.C. 2000e et seq. The district court had jurisdiction over this
action under 42 U.S.C. 2003-5(f)(1) and (3). On April 30, 2002, the district court
dismissed Village Ultrasound Clinic Inc., as a defendant. RE, Tab 2. The district
court granted judgment as a matter of law for Dunbar Diagnostic Services, Inc.
("DDSI") on January 10, 2003. RE, Tab 7 at 748. The Commission filed a timely
notice of appeal on March 10, 2003. RE, Tab 4. The district court awarded
attorneys' fees to DDSI on May 7, 2003. RE, Tab 8. The Commission filed a
timely notice of appeal from that order on May 9, 2003. RE, Tab 6. This court has
jurisdiction under 28 U.S.C. 1291.
STATEMENT OF THE ISSUES
1. Whether the district court erred in granting judgment as a matter of law to DDSI
on the Commission's claim that DDSI denied an employee health benefits because
she was pregnant.
2. Whether the district court erred in granting judgment as a matter of law to DDSI
on the Commission's claim that DDSI fired an employee in retaliation for filing a
charge of discrimination.
3. Whether the district court erred in awarding attorneys' fees to DDSI.
4. Whether this case should be reassigned to a different judge to ensure that the
Commission receives an impartial trial on remand.
5. Whether the district court erred in dismissing Village Ultrasound Clinic, Inc.,
from this action.
STATEMENT OF THE CASE
1. Nature of the Case and Course of Proceedings.
On February 13, 2002, the EEOC filed a complaint alleging that Dunbar Diagnostic
Services, Inc. ("DDSI") and Village Ultrasound Clinic, Inc., violated 703(a)(1)
and 704(a) of Title VII of the Civil Rights Act of 1964, 42 U.S.C. 2000e-2(a)(1)
and 2000e-3(a). RE, Tab 9 at 1. Specifically the complaint alleges that the
defendants denied Letitia Gonzalez health benefits because she was pregnant and
fired her because she filed a charge with the EEOC complaining of defendants'
conduct. Id.
The defendants filed their answer on February 25, 2002. R 5. On April 29, 2002, the district
court entered two orders, one stating, inter alia, that "[t]he parties agree that
Dunbar Diagnostic Services, Inc., is an employer and meets the statutory
requirements," (R 13) and the other stating "[o]n agreement of the parties, Village
Ultrasound Clinic, Inc., is dismissed as a defendant." RE, Tab 2. On August 23,
2002, DDSI moved for summary judgment, (R 24) and on September 6, 2002, the
EEOC moved for partial summary judgment. R 27. On October 16, 2002, the
district court granted in part and denied in part DDSI's motion for summary
judgment. R 35. The district court also denied in part the EEOC's motion for
summary judgment. Id.
A jury trial was held between January 7 and 10, 2003. At the end of the Commission's
presentation of evidence, the district court granted judgment as a matter of law
("JMOL") to DDSI. RE, Tab 3 & Tab 7 at 748. On January 27, 2003, DDSI
moved for attorneys' fees. R 79. On March 10, 2003, the EEOC filed a notice of
appeal. RE, Tab 4. On May 7, 2003, the court awarded DDSI attorneys' fees in
the amount of $114,572.50. RE, Tab 5. On May 9, 2003, the Commission filed a
notice of appeal from the award of attorneys' fees. RE, Tab 6. On May 27, 2003,
this Court consolidated the two appeals in this action.
2. Statement of the Facts.
Leticia Gonzalez (formerly Munoz) began working as a sonographer for DDSI, on January
10, 2000. RE, Tab 14 at p. 000004. Gonzalez was hired by Linda Dunbar, the
president and owner of DDSI and of Village Ultrasound Clinic, Inc. Tr., Vol. 2 at
260, 408-09. Gonzalez was pregnant when she was hired, and there was testimony
that by March or April, her pregnancy was apparent. Tr., Vol. 2 at 409. Jane
Gabriel, who left DDSI at the end of February, 2000, knew that Gonzalez was
pregnant because she observed Gonzalez when she was in the office. Tr., Vol. 1 at
165-66. Yvonne Jumawan testified that she noticed that Gonzalez was pregnant in
April, and Robert Real stated that Gonzalez was "showing" a "couple of months"
after she started work in January. Tr., Vol. 1 at 179 & Vol. 2 at 395-96. Melissa
Barrera, one of Gonzalez's coworkers, testified that, when she learned that
Gonzalez was pregnant, she informed Dunbar. RE, Tab 13 at 689. Kim Wilson,
who helped train and often supervised the sonographers, testified that, at Dunbar's
request, she met with Gonzalez on April 26, 2000, to discuss her pregnancy. RE,
Tab 11 at 386.
Under the terms of her employment agreement, Gonzalez was eligible for medical insurance
and other benefits after a 90-day probationary period, which would have ended on
April 10, 2000. RE, Tab 14 at 000005 3 ("[a]fter the initial 90 day probationary
period Employee is eligible for health insurance"); RE, Tab 11 at 291-92
(agreement with insurance company required DDSI to "offer [employees] the
group insurance benefits," unless they "had other options available and declined
coverage"). It is undisputed that Gonzalez never obtained health insurance
although she worked for DDSI for more than 90 days. Other employees routinely
obtained health insurance at the end of 90 days. Arlissa Jackson, a former
sonographer, stated that she was given insurance benefits three months after she
started. RE, Tab 10. Dunbar acknowledged that Jumawan and Michelle Barreto
got health insurance at the end of 90 days. RE, Tab 11 at 335.
Dunbar testified that she did not provide health insurance to Gonzalez because "[s]he didn't
ask." RE, Tab 11 at 291. However, Gonzalez testified that she asked Dunbar
about medical benefits "several times," but Dunbar never offered them to her. RE,
Tab 12 at 475. Wilson testified that Gonzalez told her two or three times that she
wanted insurance benefits. RE, Tab 11 at 365. Furthermore, Barrera testified that
it was "company policy" that employees were routinely offered benefits after 90
days, and that Dunbar offered her benefits after 90 days even though she had not
asked for them. RE, Tab 13 at 688-89.
Gonzalez's last day of work at DDSI was May 9, 2000. Gonzalez testified that, while she
was at lunch with Jackson and Barrera, she began to have "contractions" in her
abdomen, which she interpreted as symptoms of preterm labor. Tr., Vol. 2 at 417,
& Vol. 3 at 546. Gonzalez returned to the office and called the office of her
physician, Dr. Soto. Tr., Vol. 2 at 417. According to Gonzalez, she told Mimi
Resendez, the doctor's receptionist, that she was having "contractions" and "pain."
Gonzalez testified that, after putting her on hold, Resendez told Gonzalez that Dr.
Soto wanted her to come to his office. Tr., Vol. 3 at 546-47.
Gonzalez told Dunbar that she was having "a lot of pain," and needed to go to the doctor.
Tr., Vol. 2 at 419. Dunbar told her she could not go to the doctor and ordered her
to take a piece of equipment to another technician, Winnie Ogoe, at the
Woodlands, a nursing home. Id.; see also Tr., Vol.2 at 283 (Dunbar acknowledges
that, despite Gonzalez's complaints of pain, she ordered Gonzalez to assist Ogoe).
Gonzalez testified that she again called Dr. Soto's office and that someone faxed a form
from Dr. Soto's office addressed to DDSI on which was written, "Patient instructed
to go to Labor & Delivery now!!" Tr., Vol. 2 at 420-21; Vol. 3 at 548-49;
Plaintiff's Trial Exh. 42. Dr. Soto testified that the signature on the form is not his.
Tr., Vol. 3 at 577. Gonzalez showed the fax to Dunbar, but Dunbar continued to
insist that Gonzalez go to the Woodlands. Tr., Vol. 2 at 421-22; Vol. 3 at 552 &
Tr., Vol. 1 at 173. Gonzalez did not go to the Woodlands; instead, her father took
her to Memorial Hermann Hospital where Dr. Soto had privileges. Tr., Vol. 2 at
423, 426. After examining Gonzalez at the hospital, Dr. Soto wrote a note stating
that Gonzalez was "presenting preterm labor." Plaintiff's Trial Exh. 44. Dr. Soto
recommended bed rest "until further notice," and told Gonzalez to make an
appointment with him for the following Monday, May 15. Plaintiff's Trial Exh. 44
& 45; Tr., Vol. 3 at 585.
Dr. Soto's note was faxed to DDSI. Tr., Vol. 4 at 695. Barrera testified that she placed it
under Dunbar's office door on May 9, and that she and Dunbar discussed it the
next day. Id. at 695-96. After leaving the hospital on May 9, Gonzalez phoned
DDSI and spoke to Barrera and Jackson. Tr., Vol. 2 at 429. She told them that Dr.
Soto told her not to return to work. Id. Barrera testified that Dunbar had left her a
note instructing her to suspend Gonzalez for three days and that, during this phone
conversation, she told Gonzalez about the suspension. Tr., Vol. 4 at 694-95.
Dunbar, however, denies that she suspended Gonzalez. Tr., Vol. at 284.
On May 10, Gonzalez filed a charge with the EEOC alleging that DDSI discriminated
against her based on her pregnancy by denying her health insurance even though
she had completed her 90-day probationary period. RE, Tab 15. Gonzalez stated
that she was prepared to return to work on Monday, May 15, after her appointment
with Dr. Soto but Dr. Soto placed her on bed rest. RE, Tab 11 at 434 & Tab 12 at
588.
Dunbar wrote to Gonzalez on May 15, denying her "request for medical leave" and listing
several purported shortcomings in Gonzalez's performance. Defendant's Trial
Exh. 33. Dunbar stated in the letter that Gonzalez had refused a position she was
offered "in filing and medical records." Id. Dunbar again offered Gonzalez that
job and stated that, if she accepted it, her "probationary period would be extended
an additional 90 days." Id. In the letter Dunbar stated that if Gonzalez was not at
work by 8:00 a.m. on May 16, 2000, "we will consider you terminated." Id. This
letter was sent on May 15, by express courier. Plaintiff's Trial Exh. 55; Tr., Vol. 3
at 464-65. The courier records show, however, that the letter was not delivered
until 8:56 a.m., May 16, after the deadline for Gonzalez to return had passed. Id.
Gonzalez phoned Dunbar on May 16, and, according to Gonzalez, Dunbar stated that she
could not talk to her "because [Gonzalez] had contacted an attorney." RE, Tab 11
at 435 The same day, Dunbar wrote two letters to Gonzalez referring to their
phone conversation. RE, Tab 17 & Tab 19. In one letter, Dunbar wrote that she
understood that Gonzalez is "refusing the position offered and [is] calling an
attorney" and that Gonzalez's "insubordinate behavior consisting of screaming
constantly and threatening a lawsuit resulted in your resignation." RE, Tab 19. In
the other letter, Dunbar again mentioned that Gonzalez is calling an attorney and
stated, "I must assume that you have resigned." RE, Tab 17.
Also on May 16, 2000, Dunbar signed a "Mediation Election Form" which was enclosed
with the notice of Gonzalez's charge sent to DDSI by the EEOC. RE, Tab 16.
Although the form is dated May 16, 2000, Dunbar testified that she wrote the
wrong date on the form. Tr., Vol. 2 at 307-08. On May 17, Dr. Soto's office faxed
a document to Dunbar affirming the doctor's instructions that Gonzalez was to
remain on bed rest and was not to work until May 23, 2000. Plaintiff's Trial Exh.
57. On May 18, Gonzalez amended her charge to include an allegation that
Dunbar discharged her in retaliation for complaining about unlawful employment
practices. RE, Tab 18. Gonzalez never returned to work at DDSI. Dunbar
testified that she did not fire Gonzalez, but that Gonzalez "voluntarily resigned."
RE, Tab 11 at 288.
The Commission brought this action alleging that DDSI failed to offer Gonzalez health
insurance and other employment benefits because she was pregnant and then fired
Gonzalez in retaliation for filing a charge of discrimination. RE, Tab 9 at 1. The
Commission also named as a defendant Village Ultrasound, Inc. Id. The
Commission alleged that DDSI had the requisite number of employees to be an
employer under Title VII and, alternatively, that DDSI and Village Ultrasound are
an integrated enterprise so that employees of both companies should be aggregated
for purposes of Title VII coverage. Id. On April 30, 2002, the district court
dismissed Village Ultrasound as a defendant "on the agreement of the parties" (RE,
Tab 2) and issued an order stating that the parties agree that DDSI "meets the
statutory requirements" to be a Title VII employer. R 13. On October 16, 2002,
the district court denied DDSI's motion for summary judgment, stating that
"[t]here is a genuine issue of material fact whether Dunbar discriminated against
[Gonzalez] because she was pregnant." R 35. A jury trial began on January 7,
2003. At the end of the Commission's case, the court granted JMOL for DDSI.
RE, Tab 7 at 748.
During the trial, Judge Hughes repeatedly expressed the view that Gonzalez was not truthful.
For example, in response to a question by DDSI as to whether she was on
Medicaid in 1998, Gonzalez responded that her "oldest son" was. RE, Tab 12 at
478. DDSI's counsel asked the judge's permission to impeach Gonzalez by
introducing a document from her medical files showing that Gonzalez was on
Medicaid in 1998. RE, Tab 12 at 505-06. The Commission's counsel stated that
he had no objection to DDSI questioning Gonzalez about her Medicaid coverage.
RE, Tab 12 at 567. However, Judge Hughes remarked to Commission's counsel
that Gonzalez had been questioned about Medicaid and "ha[d] lied." Id. Judge
Hughes then instructed the jury that, contrary to Gonzalez's testimony that, as he
characterized it, "the only Medicaid coverage that she had had [sic] was because of
her child or for her child in 1999," Gonzalez had routine Medicaid coverage for her
"medical expenses" that had nothing "to do with any of her children." RE, Tab 12
at 675.
On other occasions during the trial, Judge Hughes stated: that "all of [Gonzalez's]
testimon[y]" about what she wanted, needed and did not have is "not true" (RE,
Tab 12 at 567); that he had "a problem with [Gonzalez] picking and choosing
answers" (RE, Tab 12 at 634); that Gonzalez was giving "different answers to
different people at different times" (RE, Tab 12 at 635); that Gonzalez's statement
on an employment application that she had left DDSI "to have a child," rather than
because she was "fired," was "actively dishonest" (RE, Tab 12 at 643-44); and that
the only evidence that Gonzalez had asked for benefits was her "bald assertion . . .
which is suspect." RE, Tab 12 at 631.
On several occasions, Judge Hughes expressed his view that Gonzalez was not credible in
front of the jury. For example, when DDSI's counsel asked Gonzalez whether she
understood that she was "expected to work 40 hours a week," she answered that
she was "a salaried employee." RE, Tab 12 at 627. Counsel asked Gonzalez if she
recalled her answer to that question at her deposition and she said, yes, that she
"was expected to work 40 hours a week." Id. When counsel asked her if her
deposition and trial testimony were different, Gonzalez said "no." Id. At that
point, Judge Hughes stated in front of the jury, "Yes. They're opposite." RE, Tab
12 at 627-28. EEOC's counsel argued that Gonzalez's testimony reflected what
Dunbar had told her that she was a salaried employee and was expected to work
40 hours per week. RE, Tab 12 at 629-30. Judge Hughes stated that "it doesn't
matter" what Dunbar told Gonzalez. RE, Tab 12 at 633. Rather, the judge insisted
that Gonzalez could not be a salaried employee under federal wage and hour laws
because she was paid "an hourly rate" and was expected to make up hours that she
did not work. RE, Tab 12 at 633-35.
After Gonzalez testified that she put "to have a child" on a job application as the reason for
leaving DDSI because the blank on the form was too small to give the full
explanation, Judge Hughes asked her in front of the jury whether the word
"terminated" is longer than "to have a child." RE, Tab 12 at 469 Similarly, when
Gonzalez testified that she made an "innocent mistake" in completing a post-
discharge application for employment, Judge Hughes asked her in the presence of
the jury whether she "often write[s] 8/99 for 1/00." RE, Tab 12 at 617. When
Gonzalez stated that she was in a hurry to complete the application, the judge
stated, "Excuse me. That excuses not doing it correctly?" Id.
The judge, outside the presence of the jury, referred to the May 9 fax as "faked" and stated
that by offering it as evidence, the Commission was "at the point of proffering
what is manifestly false evidence." RE, Tab 12 at 628-29. Judge Hughes accused
the Commission of taking the position that a complainant can "tell whatever story
she wants" regardless of whether it is consistent with what she has alleged in her
complaint. RE, Tab 12 at 644. Commission's counsel attempted to explain why
the Commission did not agree that Gonzalez had reversed "numerous answers." Id.
However, Judge Hughes cut off counsel, stating that he was not concerned about
"views and positions and contentions and assertions." Id. Judge Hughes then put
EEOC's counsel under oath and asked him whether or not it is inconsistent to say,
"I was only on Medicaid in 99 because of my little boy through him,' when in
fact, in the preceding five years she'd been on Medicaid routinely for herself
directly." RE, Tab 12 at 644-45. The judge also asked counsel to state under oath
whether "saying, I was fired'" is inconsistent with "saying I left to have a child,'"
and whether it is "inconsistent to say, I put "To have a child" in the blank because
"Terminated" wouldn't fit.'" RE, Tab 12 at 645
3. Opinions below.
. . . . . . . . . . . . . . . . . .a. Oral opinion granting JMOL.
The district court did not issue a written opinion. The court's oral explanation for the
decision to grant defendant's motion for JMOL is not entirely clear. However, it
appears that the court's primary reason for granting JMOL was that it concluded
that Gonzalez was untruthful. The district judge repeatedly characterized
Gonzalez's testimony as unbelievable. He stated, for example, that Gonzalez has
made "material representations" that are "contrary to assertions that she's made
under oath" at trial and in "operating documents." RE, Tab 7 at 749-50. The court
also stated that Gonzalez's testimony was inconsistent, not just on "collateral
matters," but on "core operating facts," and that she had "categorically
contradict[ed] herself . . . on direct facts." Id. The judge stated that Gonzalez has
testified to "inconsistent behaviors" and that there was an "absence of independent
evidence of many of her assertions." RE, Tab 7 at 750.
The court opined that a note Gonzalez made in DDSI's computer regarding the hours she
worked on March 31 could be considered either "insubordinate" or "smart aleck"
by a "reasonably disinterested, fully informed person." RE, Tab 7 at 750. The
court also stated that the criticisms of Gonzalez's conduct in Dunbar's letter of
May 15 regarding "insubordination, time and attendance, and technical
qualification, all have substantial evidence and independent corroboration." RE,
Tab 7 at 751. According to the court, certain "anti-pregnancy" comments made by
Dunbar "were not job-related," not made to Gonzalez, and "not current." Id. The
court also stated that "there is not a shred of evidence that Diagnostic's health
insurance would reasonably have been, believed to have been [sic], or have been
[sic], adjusted by reason of a pregnancy in the spring of 2000." Id. The court
stated that neither the insurance nor Dunbar's remarks "are connected to the
pregnancy in the least." RE, Tab 7 at 754.
The court stated that an employer might react with either "displeasure" or "hostility" "when
somebody refuses a chore and then several hours later insists they've
spontaneously got to go to the doctor." RE, Tab 7 at 753. The court stated that it
was "finding" that the "adverse job action" Gonzalez suffered "is not that she was
fired, but [that] she had problems at work," for which she was suspended for three
days. Id. According to the court, there was an "altercation" on May 9, and Dunbar
later wrote Gonzalez a letter about her behavior and "accumulated performance
problems." RE, Tab 7 at 754. The court concluded, in response to the
Commission's argument that there is a lack of "evaluations and write-ups," that
documentation, while it may be a "good business practice," is not a "requirement
of federal law." RE, Tab 7 at 755. The court stated that "the plaintiff's evidence
about discipline was only that other people were disciplined more severely than
[Gonzalez] was up until the end." RE, Tab 7 at 755-56. According to the court,
"that's not evidence of systematic pregnancy prejudicial infliction of discipline
[sic] . . . but it's idiosyncratic and worked to the plaintiff's benefit." RE, Tab 7 at
756.
. . . . . . . . b. Oral opinion awarding attorneys' fees to DDSI.
The district court awarded DDSI $114,572.50 in attorneys' fees. Once again the court did
not issue a written decision. In its oral ruling, the court, in explaining why its
denial of DDSI's motion for summary judgment was not inconsistent with its
ruling that the claims in this case were frivolous, stated that the denial of the
motion was not "a frivolous activity by [DDSI's] counsel, but had a joint
responsibility and the EEOC's offering of known misinformation and the Court's
intellectual limit." RE, Tab 8 at 19. The court stated that, while it did not know
what the Commission knew or reasonably should have known when it brought this
action, the "case was tried after the [Commission] knew [Gonzalez] had testified in
ways that categorically contradicted the legal basis for the claim." Id. The court
stated that the Commission "persisted in proffering testimony that was
categorically, factually, specific in contradiction to earlier testimony and earlier
documents by the complainant." Id.
The court stated that the "Commission's witness said A' and not A' under oath, and
compelling circumstances for veracity." RE, Tab 8 at 20. According to the court,
the Commission persisted with this suit "after a reasonably early opportunity to
discover what actually happened and to some extent the Commission's failure to
collaborate [sic] the claims by the complainant, all made this case extend long
beyond when it should have." Id. The court stated that the Commission could
have "investigated the claim competently and [could] have discovered the
contradictory documentary evidence ranging from medical records to employment
applications of its principal witness," and that, in any event, even if the suit was not
frivolous when initiated, "its continuation after the first 20 percent was manifestly
without merit." Id. The court stated that "[t]he finding is the case should not have
been brought had it been properly prepared under the obligations of the rules." Id.
The court made a "contingent finding" that "80 percent of . . . the cost after the litigation was
initiated was incurred in the defense of a case at which point the Commission could
not reasonably have believed it had in good faith in the public interest, a case
arising under the laws of the United States over which it had jurisdiction." RE,
Tab 8 at 20-21. According to the court, "the Commission's prosecution of this
case was wholly misguided," and "a reasonable, prudent, public entity responsible
[sic] investigation would not have produced the lawsuit." RE, Tab 8 at 23. The
court stated that when a "government agency . . . is gross[ly] inept, it's the
functional equivalent of malice." Id. Lastly, the court stated that the
Commission's continuing to litigate "after [DDSI] brought to its attention the
defects it should have discovered on its own, clearly is bureaucratic thuggery." Id.
SUMMARY OF ARGUMENT
The district court erred in granting JMOL to DDSI because the evidence in the record was
sufficient to support a finding that DDSI denied Gonzalez health insurance because
she was pregnant and fired her because she filed a charge complaining about the
denial of benefits. It is undisputed that, although DDSI's employees are eligible
for health insurance and other benefits at the end of 90 days, DDSI never offered
Gonzalez such benefits at any time despite the fact that Gonzalez worked for DDSI
for more than 90 days. Moreover, there is evidence that Dunbar knew of
Gonzalez's pregnancy at the time she became eligible for benefits. Dunbar's only
explanation for not offering Gonzalez benefits was that she did not ask for them. A
reasonable jury could find that this was not DDSI's real reason for not offering
benefits to Gonzalez, first, because Gonzalez testified that she did ask for benefits
at the end of 90 days and, second, because there was ample uncontradicted
evidence that DDSI routinely provided benefits to employees at the end of 90 days
even without a request from the employee.
There is also sufficient evidence to support a finding that DDSI fired Gonzalez because she
filed a charge with the EEOC. Dunbar sent a letter firing Gonzalez on the same
day that she signed a form from the EEOC accompanying the notice of Gonzalez's
charge of pregnancy discrimination. Moreover, Dunbar's letter alludes to the fact
that Gonzalez was threatening a lawsuit in explaining why her employment at
DDSI was at an end.
In its oral opinion granting JMOL, the district court failed to assess the adequacy of the
evidence to support the EEOC's claims. Instead, the court appeared to base its
decision entirely on the court's view that Gonzalez was not believable. In so
doing, the court erred because the jury has the exclusive authority to assess
Gonzalez's credibility, even assuming that some of her testimony was
contradictory. Moreover, Gonzalez's trial testimony was not inconsistent with her
deposition testimony on any matter relevant to the claims in this case. Rather, the
contradictions pointed out by the court were either not clear inconsistencies or
were not relevant to the claims of discrimination. Even putting aside Gonzalez's
testimony, there is sufficient evidence to support a finding for the Commission on
both of the claims in this case. Accordingly, the district court should have allowed
this case to go to the jury.
If this Court reverses the district court's order granting JMOL, the award of attorneys' fees
also must be reversed because DDSI will no longer be a prevailing party.
However, even if DDSI were the prevailing party, it would not be entitled to
attorneys' fees for several reasons. First, the district court's decision to deny
summary judgment to DDSI on the claims in this action cannot be reconciled with
a finding that the same claims were frivolous or litigated in bad faith. Insofar as
the district court appears to base its fee award on its view of Gonzalez's credibility,
it once again usurps the jury's authority to determine the credibility of a witness.
Moreover, because the Commission's claims are supported by evidence other than
Gonzalez's testimony, those claims are not frivolous, even if some of Gonzalez's
statements at trial were not true. Finally, even if some of Gonzalez's statements at
trial were not true, there is no evidence that the Commission knew that she would
testify falsely when called as a witness.
Because Judge Hughes failed to remain impartial during the trial, this Court should reassign
this case to a different judge on remand. The judge became so convinced that
Gonzalez was lying that he repeatedly contravened proper trial procedures, most
noticeably by usurping the jury's function in deciding Gonzalez's credibility.
Judge Hughes repeatedly stated that statements by Gonzalez were not true, refused
to hear arguments to the contrary, and was unwilling to permit the jury to make its
own decision regarding alleged inconsistencies in Gonzalez's testimony.
Reassignment is appropriate because, given the strength of the judge's view that
Gonzalez was lying, he cannot reasonably be expected to divest himself of that
view on remand. In any event, reassignment would be appropriate because a
reasonably objective observer could question whether a party could receive a fair
trial on remand where the judge has stated that the party's primary witness is a liar
and is closed to any argument that she is not. Moreover, Judge Hughes showed
general skepticism toward the Commission's case, unreasonably criticized
Commission's counsel, and, in awarding attorneys' fees, stated that the
Commission's continuing with this case was "bureaucratic thuggery." It is not
likely that the judge, having expressed such strong views regarding the
Commission's case, will be able to ignore his prior opinions or remove any
concerns that the Commission would be treated impartially on remand.
ARGUMENT
I. THE DISTRICT COURT ERRED IN GRANTING JMOL TO DDSI BECAUSE THE EVIDENCE IS SUFFICIENT TO
SUPPORT A VERDICT FOR THE COMMISSION ON ITS CLAIMS OF PREGNANCY DISCRIMINATION AND
RETALIATION.
After the Commission had presented its evidence at trial, the district court entered JMOL for
DDSI on both of the claims presented by the Commission. A district court should
grant JMOL to a defendant only if, "view[ing] all the evidence in the light and
with all reasonable inferences most favorable to the party opposed to the motion,'"
the evidence is insufficient to support a verdict for the plaintiff. Delano-Pyle v.
Victoria County, 302 F.3d 567, 572 (5th Cir. 2002) (quoting Resolution Trust
Corp. v. Cramer, 6 F.3d 1102, 1109 (5th Cir.1993)). As we demonstrate below,
there is ample evidence to support a finding that DDSI denied Gonzalez health
insurance because she was pregnant and then fired her in retaliation for filing a
charge with the Commission. In granting JMOL, the district court failed to
conduct any review of the evidence on the Commission's claims. Instead the court
based its decision on its view of Gonzalez's credibility. This was wrong for two
reasons: first, it is the function of the jury, not the district court, to assess the
credibility of witnesses (Delano-Pyle, 302 F.3d at 572); and, second, Gonzalez's
testimony is not essential to either of the Commission's claims. Accordingly, the
decision to grant JMOL should be reversed.
A. There Is Sufficient Evidence to Support a Finding That DDSI Denied Health Insurance to Gonzalez
Because She Was Pregnant.
It is undisputed that DDSI employees are eligible for health insurance and other benefits at
the end of 90 days of employment. RE, Tab 14; Tab 11 at 292 & Tab 13 at 688-89
It is also undisputed that DDSI did not offer Gonzalez health insurance or other
benefits at any time although she had worked for DDSI for 90 days as of April 10,
2000. RE, Tab 11 at 291. Furthermore, there is evidence that would support a
finding that Dunbar knew that Gonzalez was pregnant around the time that she
became eligible for benefits. As discussed supra at 4-5, there is no question that
Dunbar saw Gonzalez frequently and there was testimony that by March
Gonzalez's pregnancy, which was then six months along, was apparent.
Furthermore, Barrera testified that she told Dunbar that Gonzalez was pregnant
(RE, Tab 13 at 689), and Wilson testified that Dunbar asked her to speak with
Gonzalez about her pregnancy in April. RE, Tab 11 at 386. This evidence is
sufficient for a jury to find that, because Gonzalez was pregnant, Dunbar failed to
offer her health benefits after Gonzalez was employed for 90 days.
The only explanation DDSI offered for its failure to offer benefits to Gonzalez was Dunbar's
testimony that Gonzalez did not ask for them. RE, Tab 11 at 291. However, there
is ample evidence in the record that would support a finding that this explanation
was not the true reason for DDSI's failure to provide insurance to Gonzalez. First,
there was evidence that Gonzalez did, in fact, ask for benefits. Gonzalez testified
that she asked Dunbar about getting medical benefits shortly before the end of her
90-day probation and several times thereafter. RE, Tab 12 at 475. This evidence is
corroborated by Wilson's testimony that Gonzalez told her several times that she
wanted benefits. RE, Tab 11 at 365. Based on this evidence, a reasonable jury
could find that Dunbar's testimony that Gonzalez did not ask for benefits was false,
and could infer from that that the real reason for Dunbar's failure to offer Gonzalez
benefits was unlawful discrimination. Reeves v. Sanderson Plumbing Prod., Inc.,
530 U.S. 133, 147 (2000) (a jury may "infer the ultimate fact of discrimination
from the falsity of the employer's explanation" particularly where accompanied by
evidence of "mendacity").
However, even if the jury was not convinced that Gonzalez had asked for benefits, it could
still find that DDSI's explanation for denying her benefits was not true, because
there is substantial evidence that employees were routinely provided benefits after
90 days even if they did not request them. There was testimony from witnesses
other than Gonzalez, uncontradicted by DDSI, that the company provided benefits
after 90 days without a request from the employee. See supra at 5-6. A reasonable
jury could infer from this evidence that DDSI's assertion that Gonzalez did not get
benefits because she did not ask for them is unworthy of belief even if it is not
convinced that Gonzalez asked for benefits. Raggs v. Mississippi Power & Light
Co. 278 F.3d 463, 467 (5th Cir. 2002) ("A jury is free to choose among reasonable
constructions of the evidence") (quoting U.S. v. Bell, 678 F.2d 547, 549 (5th Cir.
Unit B 1982) (en banc)).
. . . . . . . B. There Is
Sufficient
Evidence to
Support a
Finding That
DDSI Fired
Gonzalez
Because She
Filed a Charge
of
Discrimination
With the
EEOC.
There is no question that, on May 10, 2000, Gonzalez filed a charge of discrimination
alleging that DDSI had discriminated against her by refusing to offer her health
benefits due to her pregnancy. RE, Tab 15. In her May 15 letter, Dunbar indicated
that Gonzalez still had a job at DDSI "in filing and medical records." Defendant's
Trial Exh. 52. On May 16, however, Dunbar sent Gonzalez two letters indicating
that Gonzalez's employment at DDSI was over. In those letters, Dunbar stated
that, because Gonzalez was "calling an attorney" and had "threaten[ed] a lawsuit,"
Dunbar was treating Gonzalez as if she had resigned. RE, Tab 17 & 19.
Furthermore, there is evidence that, by May 16, Dunbar knew that Gonzalez had
filed her pregnancy discrimination charge. The record contains an EEOC
mediation election form signed by Dunbar and dated May 16, 2000. RE, Tab 16.
A jury reasonably could find, based on the fact that Dunbar sent the letter
terminating Gonzalez on the very day she received notice that Gonzalez had filed a
charge, that Dunbar did so in retaliation for filing a charge of discrimination.
Shackelford v. Deloitte & Touche, LLP, 190 F.3d 398 (5th Cir. 1999) (fact issue
remained as to plaintiff's Title VII retaliation claim where defendant fired plaintiff
on the very day plaintiff was overheard talking to counsel for plaintiffs in class
action against defendant); Evans v. City of Houston, 246 F.3d 344, 354 (5th Cir.
2001) ("Close timing between an employee's protected activity and an adverse
action against [her] may provide the 'causal connection' required to make out a
prima facie case of retaliation.") (emphasis omitted).
Dunbar testified that she did not fire Gonzalez, but that Gonzalez "voluntarily resigned."
RE, Tab 11 at 288. However, there is no evidence that Gonzalez resigned.
Gonzalez testified that she was prepared to return to work on May 15, after her
doctors appointment, but that she could not because Dr. Soto had placed her on bed
rest. RE, Tab 11 at 434 & Tab 12 at 588. Moreover, Gonzalez had Dr. Soto's
instructions placing her on bed rest faxed to DDSI on May 17. A jury could
reasonably infer that Gonzalez would not have done so if she meant to resign.
Based on all of the evidence, a reasonable jury could find that, upon learning that
Gonzalez had filed a charge, Dunbar fired Gonzalez, but characterized the
termination as a resignation.
C. The District Court Erred in Awarding JMOL Based on Its View of Gonzalez's Credibility.
In its oral explanation of the decision to grant JMOL to DDSI, the district court did not
conduct a review of the evidence to determine whether, taken as a whole with all
reasonable inferences drawn in favor of the Commission, it was sufficient to
support a finding for the Commission, as it was required to do. Delano-Pyle, 302
F.3d at 572. Instead the court appeared to base its decision entirely on its opinion
that Gonzalez's testimony was not credible. The court stated that the Commission
could not prevail because Gonzalez gave contradictory testimony on "collateral
matters" as well as "core operating facts," and "categorically contradicted herself
. . . on direct facts." RE, Tab 7 at 749-50.
In basing its decision on its perception that Gonzalez was untruthful, the court violated the
fundamental principle that, in ruling on a motion for JMOL, a court is prohibited
from "assess[ing] the credibility of witnesses." U.S. v. Deville, 278 F.3d 500, 506
(5th Cir. 2002). Whether or not a witness's testimony is truthful is "the purest of
jury issues." Dotson v. Clark Equip. Co., 783 F.2d 586, 588 (5th Cir. 1986); Brady
v. Fort Bend County, 145 F.3d 691, 714 (5th Cir. 1998) ("jury has exclusive
authority to assess credibility of witnesses"). Even where a witness's
"contradictory testimony" might "provoke judicial indignation, case law precedent
and constitutional precepts forbid judicial interference with the jury's duty to
resolve credibility issues." U.S. v. Dotson, 615 F.2d 329, 332 (5th Cir. 1980).
Consequently, even if the court had a basis for believing that Gonzalez gave
contradictory evidence on matters critical to the claims in this case, the court erred
in granting JMOL on this basis. See Boyle v. Pool Offshore Co., 893 F.2d 713,
717 (5th Cir 1990) ("[c]redibility is a question for the jury," therefore a court
cannot "dismiss [plaintiff's] testimony simply because it was impeached to some
extent").
In any event, Gonzalez's testimony at trial did not conflict with her deposition testimony on
any matter relevant to the claims in this case. The conflicts identified by the
district court either were not clear contradictions or were on tangential matters that
were not relevant to either of the claims before the court. For instance, the court
made much of Gonzalez's response to DDSI's question whether she was on
Medicaid in 1998. RE, Tab 7 at 478. The district court stated that Gonzalez "lied"
when she responded that her oldest son was without affirmatively stating that she
was also on Medicaid. RE, Tab 12 at 567. However, even assuming that
Gonzalez's response is inaccurate, it simply is not relevant to either of the claims
in this case that challenge employment decisions made in the spring of the year
2000. Similarly, the court's belief that Gonzalez was dishonest in filling out an
employment application after she left DDSI has no apparent connection to the
issues in this case. In fact, none of the inconsistencies alluded to by the district
court undermine the evidence supporting Gonzalez's claim that DDSI
discriminated against her on the basis of pregnancy and discharged her when she
filed a charge of discrimination. At best, the purported inaccuracies in Gonzalez's
testimony go to her general credibility. But, as discussed previously, it is for the
jury, not the district court, to make credibility determinations at trial.
Further, even disregarding Gonzalez's testimony altogether, there is sufficient evidence to
permit a reasonable jury to find that Dunbar discriminated against Gonzalez on the
basis of pregnancy and in retaliation for filing a charge. Dunbar claimed that she
did not offer Gonzalez benefits because she did not ask for them. However, the
evidence showed that Jackson, Jumawan and Barreto all were given health benefits
at the end of 90 days. Moreover, Barrera, testified that it was "company policy"
that employees were offered benefits after 90 days, and that she received benefits
after 90 days without being required to ask. RE, Tab 13 at 688-89. Accordingly,
without considering any of Gonzalez's testimony, a reasonable jury could find that
Dunbar's explanation for not offering Gonzalez health benefits was not true.
Likewise, a jury could conclude from the statements in Dunbar's letters alone that
she discharged Gonzalez on May 16 after she became aware that Gonzalez had
filed a charge of discrimination with the Commission.
None of the other matters alluded to in the court's opinion support its decision to grant
JMOL to DDSI. The court stated that an entry Gonzalez made in DDSI's
computerized time and attendance program reasonably could be considered as
"insubordinate" and that an employer might react with hostility when an employee
"refuses a chore" and insists hours later that she has to go to the doctor. RE, Tab 7
at 750. While the court did not explain these conclusions, they suggest that the
court believed that DDSI had a nondiscriminatory basis for firing Gonzalez.
However, Dunbar never claimed that she fired Gonzalez because she was
insubordinate or refused Dunbar's order to assist another technician. In fact,
Dunbar testified that she did not fire Gonzalez at all, but that Gonzalez voluntarily
resigned. RE, Tab 11 at 288. Consequently, Gonzalez's purported
insubordination and refusal to perform a chore do not constitute a legitimate,
nondiscriminatory reason for her discharge because they do not explain that
decision. St. Mary's Honor Center v. Hicks, 509 U.S. 502, 507 (1993) (a defendant
must "clearly set forth . . . reasons for its actions which, if believed by the trier of
fact, would support a finding that unlawful discrimination was not the cause of the
employment action").
Accordingly, when the evidence is viewed under the proper standard, it is clear that the
Commission's claims against DDSI should have been decided by the jury, not by
the district court.
II. THE DISTRICT COURT'S DECISION TO AWARD ATTORNEYS' FEES TO DDSI WAS AN ABUSE OF DISCRETION.
If this Court agrees that the district court erred in granting JMOL, then the court's order
awarding attorneys' fees to the defendant must be vacated because the defendant
would no longer be the prevailing party. See 42 U.S.C. 2000e-5(k) (authorizing
award of attorneys' fees to the "prevailing party" in a Title VII action); EEOC v.
R.J. Gallagher Co., 181 F.3d 645, 657 n. 6 (5th Cir. 1999) (court "must vacate the
district court's fee award" because it reversed summary judgment for defendant).
Even if DDSI were the prevailing party, however, it would not be entitled to an
award of attorneys' fees. A prevailing defendant in a Title VII action is entitled to
attorneys' fees only where the plaintiff's complaint was "frivolous, unreasonable,
or groundless, or . . . the plaintiff continued to litigate after it clearly became so."
Christiansburg Garment Co. v. EEOC, 434 U.S. 412, 422 (1978). See also EEOC
v. Olson's Dairy Queens, 989 F.2d 165, 169 (5th Cir. 1993). The district court
abused its discretion in holding that this action met the Christiansburg standard.
See Medina v. Ramsey Steel Co., 238 F.3d 674, 686 (5th Cir. 2001) (award of
attorneys' fees is reviewed for abuse of discretion).
The clearest indication that this action was not frivolous is the district court's decision to
deny DDSI's motion for summary judgment. As this Court has recognized, "it
cannot be said" that claims which survived summary judgment "were frivolous or
. . . litigated in bad faith." Medina, 238 F.3d at 686. The district court, in seeking
to explain how it could deem frivolous claims that it had upheld on summary
judgment, stated that its earlier decision to deny summary judgment was based in
part on "the EEOC's offering of known misinformation" by "persist[ing] in
proffering testimony" from Gonzalez that contradicted her earlier testimony. RE,
Tab 8 at 19. Insofar as this statement indicates that the court's award of fees is
based on the court's view that Gonzalez's testimony was untruthful, it suffers from
the same infirmities as the decision awarding JMOL. The district court was not
entitled to make a finding as to credibility in this jury case, and, without a proper
finding that Gonzalez's testimony was not credible, it was error for the court to
make an award of attorneys' fees on that basis. Cf. Little v. Southern Elec. Steel
Co. 595 F.2d 998, 1005 (5th Cir. 1979) (where district court, as fact finder, did not
make an explicit finding that plaintiff's testimony was false, no award of attorneys'
fees could be based on that ground). Furthermore, because the testimony cited by
the district court was not necessary to the Commission's claims, even if the
testimony were false, that would not support a finding that the Commission's
claims were frivolous. Finally, even if some of Gonzalez's statements at trial were
not true, there is absolutely no basis for the court's implication that the
Commission knew that she would make false statements when it proffered her as a
witness.
III.THIS CASE SHOULD BE ASSIGNED TO A DIFFERENT JUDGE ON
REMAND BECAUSE AN OBJECTIVE OBSERVER WOULD HAVE CAUSE
TO QUESTION JUDGE HUGHES'S IMPARTIALITY BASED ON HIS
CONDUCT AT THE TRIAL.
A judge has an obligation to remain impartial during a trial. Potashnick v. Port City Const.
Co. 609 F.2d 1101, 1111 (5th Cir. 1980) ("the protection of the integrity and dignity
of the judicial process from any hint or appearance of bias is the palladium of our
judicial system") quoting U.S v. Columbia Broadcasting Sys., Inc., 497 F.2d 107,
109 (5th Cir. 1974). Where a judge's impartiality is at issue, a court of appeals has
the authority to reassign a case to a different judge on remand. Johnson v. Sawyer,
120 F.3d 1307, 1333 (5th Cir. 1997). This Court should exercise that authority in
this case.
In deciding whether to reassign a case, this Court considers: (1) whether the original judge
would "reasonably be expected" upon remand to have "substantial difficulty" in
putting out of his mind "previously-expressed views or findings determined to be
erroneous;" (2) whether reassignment would "preserve the appearance of justice;"
(3) whether "an objective observer" might have reasonable cause to "question the
judge's impartiality;" and (4) whether "reassignment would entail waste and
duplication out of proportion to any gain in preserving the appearance of fairness."
See In Re: Daimler Chrysler Corp., 294 F.3d 697, 700-01 (5th Cir. 2002) and
Johnson, 120 F.3d at 1333. All of these factors militate in favor of reassignment in
this case.
It is apparent from his statements and conduct during the trial of this matter that Judge
Hughes has made up his mind that Gonzalez is not a credible witness. This
conviction is so strong that it led Judge Hughes to deviate from appropriate trial
procedures on a number of occasions, most notably, as we have explained, by
improperly usurping the jury's role in making a determination regarding
Gonzalez's credibility. Judge Hughes's firm conviction that Gonzalez is untruthful
manifested itself in numerous other statements and rulings during the trial.
At the trial, Judge Hughes completely abandoned any pretense of impartiality on the
question of Gonzalez's credibility. He repeatedly stated, both in front of the jury
and outside the jury's presence, that various statements by Gonzalez were false.
For example, when DDSI indicated that it wished to impeach Gonzalez's trial
testimony regarding Medicaid coverage in 1998, Judge Hughes preempted the
issue by stating that Gonzalez had already "lied" about the matter and then
instructing the jury that her testimony was "false." RE, Tab 12 at 567, 675. The
proper procedure would have been for Judge Hughes to permit DDSI to question
Gonzalez about this apparent inconsistency and to give the Commission an
opportunity to allow her to explain her answer on redirect. See Boyle v. Pool
Offshore Co., 893 F.2d 713, 716 (5th Cir 1990) (noting that jury was "fully
apprized" of apparent inconsistencies in plaintiff's witness's testimony because
witness was "thoroughly questioned" by defendant's counsel and plaintiff had
opportunity to "de-fuse the effect of his apparently inconsistent statements").
However, Judge Hughes was so convinced that Gonzalez was incredible that he
would not allow the jury to hear her explanation.
Although it is well established that "a judge should not ask questions which indicate his
belief or disbelief of witnesses," U.S. v. Davis 285 F.3d 378, 382 (5th Cir. 2002),
Judge Hughes, on at least two occasions questioned Gonzalez in front of the jury in
a manner which clearly indicated that he did not believe her. For instance, the
judge ridiculed Gonzalez when she explained that she misdated the application
because she was in a hurry, stating, "Excuse me. That excuses not doing it
correctly?" RE, Tab 12 at 617 When Gonzalez denied that her answer at trial
regarding whether she was a salaried employee was different from her answer at
her deposition, Judge Hughes stated that, in fact, her answers were "opposite." RE,
Tab 12 at 627-28.
Moreover on several occasions Judge Hughes indicated that his mind was so set on
Gonzalez's credibility that he was not open to arguments that particular assertions
by Gonzalez were not inconsistent with her previous testimony. For example,
when EEOC's counsel pointed out that Gonzalez's testimony that she was a
salaried employee reflected what Dunbar had told her -- that she was a salaried
employee and was expected to work 40 hours per week. (RE, Tab 12 at 629-30
(see Plaintiff's Trial Exh. 35 and Tr., Vol. 2 at 266), Judge Hughes stated that "it
doesn't matter" what Dunbar told Gonzalez. RE, Tab 12, at 633. On another
occasion when EEOC's counsel attempted to explain why it did not agree that
Gonzalez's testimony was contradictory, Judge Hughes interrupted, stating that he
was not concerned about the Commission's "assertions." Rather than permit
EEOC's counsel to make his arguments, Judge Hughes took the highly improper
step of placing counsel under oath and requiring him to state whether or not a
number of Gonzalez's answers were inconsistent. In effect, Judge Hughes
improperly compelled Commission's counsel to abandon his role as advocate and
to become a witness against Gonzalez. RE, Tab 12 at 644-45.
Because Judge Hughes has expressed such a strong view that Gonzalez was lying, it cannot
"reasonably be expected" that he will be able to divest himself of that view on
remand. In re Daimler Chrysler Corp., 294 F.3d at 700-01; Johnson, 120 F.3d at
1333. In any event, reassignment would be appropriate to "preserve the
appearance of justice" or because "an objective observer" could reasonably
"question the judge's impartiality." Id. It would appear unlikely to an objective
observer that a party would receive an impartial hearing on remand before a judge
who has not only stated that the party's main witness is untruthful, but has
indicated that he is closed to any argument to the contrary.
Judge Hughes also expressed general skepticism about the Commission's case and was
unreasonably critical of Commission's counsel. For example, the judge called the
May 9 fax "faked" and accused the Commission of taking the position that a
complainant can "tell whatever story she wants" regardless of whether it is
consistent with what she has alleged in her complaint. Additionally, at the hearing
on attorneys' fees, Judge Hughes called the Commission's pressing of this action
"bureaucratic thuggery." It is unlikely that Judge Hughes, having expressed such a
belief regarding the Commission's case, "will be able to ignore the opinion he
previously embraced or to erase any apprehensions that the [Commission] would
not be treated fairly on remand." Simon v. City of Clute, Tex. 825 F.2d 940, 944
(5th Cir. 1987) (court of appeals ordered case reassigned on remand). Because of
Judge Hughes' complete failure to maintain even an appearance of impartiality,
reassignment is necessary to preserve the impression of an unbiased, fair judiciary.
Mitchell v. Maynard, 80 F.3d 1433, 1450 (10th Cir. 1996). Reassignment to
another judge would not result in "waste and duplication" of effort "because,
inasmuch as JMOL was incorrectly granted, this case must be retried in any event."
Id.
CONCLUSION
For the foregoing reasons, the district court's order granting judgment as a matter of law,
awarding attorneys' fees, and dismissing Village Ultrasound Clinic, Inc., should be
reversed and this case should be reassigned to a different judge on remand.
Respectfully
submitted,
JAMES L. LEE
Deputy General Counsel
CAROLYN L. WHEELER
Acting Associate General
Counsel
VINCENT J.
BLACKWOO D
Assistant General
Counsel
John F. Suhre
Attorney
EQUAL EMPLOYMENT
OPPORTUNITY COMMISSION
1801 L Street
N.W., Room 7040
Washington, D.C. 20507
(202) 663-4716
Certificate of Compliance with Rule 32(a)
1. This brief complies with the type-volume limitation of Fed. R. App. P.
32(a)(7)(B) because this brief contains 9203 words, excluding the parts of the brief
exempted by Fed. R. App. P. 32(a)(7)(B)(iii)
2. This brief complies with the typeface requirements of Fed. R. App. P. 32(a)(5)
and the type style requirements of Fed. R. App. P. 32(a)(6) because this brief has
been prepared in a proportionally spaced typeface using Wordperfect 9 in size 14
Times New Roman.
Attorney for Equal Employment Opportunity Commission, Plaintiff-Appellant
Dated: CERTIFICATE OF SERVICE
I hereby certify that two paper copies and one electronic copy of the
foregoing brief were mailed, first class, postage prepaid, on this the 8th day of
August, 2003, to the following counsel of record:
Stewart Edmond Hoffer, Esq.
Schmidt & Hoffer
1111 Bagby, Suite 2200
Houston, Texas 77002-2553
John F. Suhre
Attorney
EQUAL EMPLOYMENT
OPPORTUNITY COMMISSION
1801 L Street
N.W., Room 7040
Washington, D.C. 20507
(202) 663-4716
|
en
|
all-txt-docs
|
002958
|
USGS Digital Spectral Library splib05a
Clark et. al. 2003
ASCII Spectral Data file contents:
line 13 title
line 14 history
line 15 to end: 3-columns of data:
wavelength reflectance standard deviation
(standard deviation of 0.000000 means not measured)
(*************** indicates a deleted number)
----------------------------------------------------
Polyhalite NMNH92669-4 W1R1Ba AREF
copy of splib04a r 3935
0.205100*************** 0.005258
0.213100 0.403099 0.001323
0.221100 0.413610 0.001052
0.229100 0.420036 0.000937
0.236100 0.420249 0.000875
0.242100 0.422020 0.000802
0.248100 0.423605 0.000618
0.253600 0.426280 0.000502
0.258600 0.428626 0.000703
0.263600 0.430243 0.000745
0.268600 0.433287 0.000742
0.273100 0.436502 0.000764
0.277100 0.440391 0.000682
0.281100 0.441757 0.000643
0.285100 0.442329 0.000641
0.289100 0.443542 0.000539
0.293100 0.444082 0.000574
0.297100 0.445087 0.000520
0.301100 0.443913 0.000643
0.305100 0.444466 0.000636
0.309100 0.444397 0.000623
0.313100 0.446287 0.000557
0.317100 0.447536 0.000466
0.321100 0.448847 0.000879
0.325100 0.450844 0.000652
0.329100 0.451208 0.000622
0.333100 0.452815 0.000503
0.337100 0.453836 0.000539
0.341100 0.454094 0.000476
0.345100 0.454757 0.000485
0.349100 0.452622 0.000622
0.353100 0.454193 0.000515
0.357100 0.454516 0.000546
0.360600 0.455056 0.000564
0.363600 0.454177 0.000573
0.366600 0.454533 0.000510
0.369600 0.454648 0.000631
0.372600 0.455453 0.000525
0.375600 0.454947 0.000550
0.378600 0.455638 0.000570
0.381100 0.455960 0.000611
0.383100 0.456551 0.000761
0.385100 0.457416 0.000632
0.387100 0.458246 0.000776
0.389100 0.460124 0.000581
0.391100 0.460924 0.000590
0.393100 0.461847 0.000579
0.395100 0.463393 0.000612
0.397100 0.463740 0.000783
0.399100 0.465801 0.000711
0.401100 0.466615 0.000607
0.403100 0.468067 0.000590
0.405100 0.469578 0.000532
0.407100 0.470458 0.000538
0.409100 0.471558 0.000520
0.411100 0.473896 0.000702
0.412800 0.473860 0.000662
0.415800 0.475148 0.000556
0.418800 0.477378 0.000632
0.421800 0.478499 0.000669
0.424800 0.481967 0.000583
0.427800 0.483535 0.000620
0.430800 0.485735 0.000562
0.433800 0.487957 0.000665
0.436800 0.491417 0.000624
0.439800 0.493566 0.000605
0.442800 0.496349 0.000544
0.445800 0.499306 0.000990
0.448800 0.502421 0.000672
0.451300 0.504912 0.000760
0.453300 0.507390 0.000730
0.455300 0.509402 0.000771
0.457300 0.509686 0.000989
0.459300 0.511987 0.000738
0.461300 0.513217 0.000670
0.463300 0.515195 0.000750
0.465300 0.515522 0.000782
0.467300 0.517966 0.000718
0.469300 0.519415 0.000837
0.471300 0.520636 0.000733
0.473300 0.521821 0.000817
0.475300 0.523868 0.000780
0.477300 0.524648 0.000729
0.479300 0.526649 0.000740
0.481300 0.527686 0.000773
0.483300 0.528665 0.000931
0.485300 0.530340 0.000729
0.487300 0.532213 0.000692
0.489300 0.533430 0.000624
0.491300 0.534968 0.000704
0.493300 0.536295 0.000914
0.495300 0.537995 0.000901
0.497300 0.539297 0.000976
0.499300 0.542121 0.000683
0.501300 0.543135 0.000669
0.503300 0.543764 0.000877
0.505300 0.546329 0.000899
0.507300 0.548476 0.000664
0.509300 0.549194 0.000711
0.511300 0.550857 0.000643
0.513300 0.552019 0.000486
0.515300 0.553489 0.000634
0.517300 0.555194 0.000524
0.519300 0.556964 0.000523
0.521300 0.559682 0.000537
0.523300 0.561506 0.000582
0.525300 0.563488 0.000541
0.527300 0.565336 0.000507
0.529300 0.567248 0.000520
0.531300 0.569757 0.000552
0.533300 0.571627 0.000547
0.535300 0.573684 0.000569
0.537300 0.577044 0.000689
0.539300 0.579616 0.000557
0.541300 0.582535 0.000514
0.543300 0.586062 0.000631
0.545300 0.588487 0.000988
0.547300 0.592625 0.000818
0.549300 0.596049 0.000845
0.551300 0.601236 0.000726
0.553300 0.605755 0.000675
0.555300 0.610678 0.000788
0.557300 0.615689 0.000982
0.559300 0.620742 0.000760
0.561300 0.627431 0.000754
0.563300 0.633797 0.000795
0.565300 0.639889 0.000929
0.567300 0.647519 0.000677
0.569300 0.653273 0.000564
0.571300 0.661451 0.000629
0.573300 0.669115 0.000542
0.575300 0.676060 0.000658
0.577300 0.682872 0.000603
0.579300 0.691059 0.000691
0.581300 0.697876 0.000744
0.583300 0.705764 0.000628
0.585300 0.710805 0.000697
0.587300 0.718924 0.000599
0.589300 0.724059 0.000701
0.591300 0.730618 0.000668
0.593300 0.735667 0.000678
0.595300 0.740381 0.000711
0.597300 0.745470 0.000658
0.599300 0.749817 0.000605
0.601100 0.754425 0.000633
0.602700 0.756218 0.000781
0.604300 0.759896 0.000727
0.605900 0.763213 0.000681
0.607500 0.765395 0.000611
0.609100 0.768099 0.000616
0.610700 0.770392 0.000579
0.612300 0.772256 0.000611
0.613900 0.774798 0.000658
0.615500 0.776508 0.000575
0.617100 0.779697 0.000609
0.618700 0.780401 0.000572
0.620300 0.782005 0.000745
0.621900 0.784268 0.000674
0.623500 0.785976 0.000555
0.625100 0.787463 0.000718
0.626700 0.788765 0.000615
0.628300 0.791208 0.000641
0.629900 0.792942 0.000982
0.631700 0.794025 0.000682
0.633700 0.794966 0.000601
0.635700 0.797721 0.000757
0.637700 0.799533 0.000716
0.639700 0.800315 0.000782
0.641700 0.802805 0.000761
0.643700 0.803057 0.000522
0.645700 0.804958 0.000662
0.647700 0.806226 0.000568
0.649700 0.807412 0.000721
0.651700 0.808687 0.000579
0.653700 0.810140 0.000614
0.655700 0.812026 0.000680
0.657700 0.812895 0.000791
0.659700 0.814998 0.000648
0.661700 0.816013 0.000735
0.663700 0.817890 0.000583
0.665700 0.819702 0.000579
0.667700 0.820121 0.000587
0.670200 0.821687 0.000773
0.673200 0.823164 0.000664
0.676200 0.826836 0.000532
0.679200 0.826957 0.000668
0.682200 0.830021 0.000580
0.685200 0.831100 0.000694
0.688200 0.834421 0.000593
0.691200 0.837309 0.000574
0.694200 0.837877 0.000651
0.697200 0.839705 0.000738
0.700200 0.842554 0.000652
0.702000 0.842703 0.000553
0.704000 0.844103 0.000683
0.706000 0.845595 0.000581
0.708000 0.846943 0.000987
0.710000 0.846549 0.000710
0.712000 0.849624 0.000582
0.714000 0.850581 0.000661
0.716000 0.850855 0.000774
0.718000 0.852470 0.000596
0.720000 0.852897 0.000626
0.722000 0.853927 0.000651
0.724000 0.854932 0.000609
0.726000 0.856539 0.000699
0.728000 0.855209 0.000621
0.730000 0.857578 0.000692
0.732000 0.856501 0.000785
0.734000 0.858362 0.000700
0.736000 0.858179 0.000684
0.738000 0.858961 0.000976
0.740000 0.859253 0.000715
0.742000 0.859949 0.000777
0.744000 0.860739 0.000802
0.746000 0.860001 0.000928
0.748000 0.861521 0.000633
0.750500 0.861873 0.000579
0.753500 0.861493 0.000701
0.756500 0.861676 0.000630
0.759500 0.862814 0.000640
0.762500 0.861790 0.000688
0.765500 0.862316 0.000727
0.768500 0.862366 0.000669
0.771500 0.863727 0.000750
0.774500 0.863129 0.000645
0.777500 0.861098 0.000643
0.781000 0.861084 0.000703
0.785000 0.860203 0.000801
0.789000 0.860524 0.000711
0.793000 0.859832 0.000678
0.797000 0.859507 0.000765
0.801500 0.859797 0.000645
0.806500 0.858362 0.000694
0.811500 0.857282 0.000715
0.816500 0.856647 0.000705
0.822000 0.855677 0.000884
0.828000 0.854017 0.000593
0.835000 0.852823 0.000692
0.843000 0.852724 0.000652
0.851000 0.853947 0.001081
0.859000 0.854689 0.001059
0.871000 0.854881 0.001049
0.883000 0.855721 0.001059
0.894000 0.859091 0.001050
0.904000 0.861445 0.001007
0.914000 0.859932 0.001046
0.924000 0.860965 0.001045
0.933000 0.866176 0.000916
0.941000 0.868880 0.000885
0.949000 0.866411 0.000837
0.957000 0.871063 0.001049
0.964000 0.873903 0.000966
0.970000 0.876229 0.000897
0.976000 0.877831 0.000946
0.982000 0.876438 0.000885
0.988000 0.877714 0.001034
0.994000 0.879672 0.000810
1.000000 0.878784 0.000883
1.006000 0.880401 0.000892
1.012000 0.880441 0.001054
1.018000 0.881151 0.001053
1.023500 0.882628 0.001021
1.028500 0.882894 0.000868
1.033500 0.885618 0.000979
1.038500 0.886928 0.000962
1.043500 0.885114 0.000871
1.048500 0.888195 0.000857
1.053500 0.889768 0.000995
1.058500 0.889069 0.000938
1.063500 0.892225 0.001033
1.068500 0.890995 0.000992
1.073500 0.890880 0.000861
1.078500 0.893385 0.000831
1.083500 0.894350 0.000874
1.088500 0.895316 0.000867
1.093500 0.894565 0.001004
1.098500 0.895324 0.000871
1.103500 0.896397 0.000795
1.108500 0.895454 0.000800
1.113500 0.895514 0.000910
1.118500 0.894837 0.000845
1.123500 0.896969 0.000813
1.128500 0.895767 0.000794
1.133500 0.896672 0.000793
1.138500 0.895837 0.000912
1.143500 0.896850 0.000734
1.148500 0.896321 0.000835
1.153500 0.896545 0.000845
1.158500 0.893777 0.000855
1.163500 0.892076 0.000856
1.168500 0.891490 0.000731
1.173500 0.887577 0.000810
1.178500 0.886598 0.000949
1.183500 0.883424 0.000889
1.188500 0.881337 0.001017
1.193500 0.877997 0.000966
1.198500 0.875296 0.000818
1.203500 0.871100 0.000754
1.208500 0.868653 0.000707
1.213500 0.868721 0.000740
1.218500 0.869166 0.000761
1.223500 0.868892 0.000886
1.228500 0.870037 0.000786
1.233500 0.870198 0.000761
1.238500 0.871208 0.000788
1.243500 0.870087 0.000802
1.248500 0.869956 0.000788
1.253500 0.872416 0.000764
1.258500 0.874287 0.000794
1.263500 0.875046 0.000725
1.268500 0.874485 0.000868
1.273500 0.878641 0.000839
1.278500 0.879663 0.000682
1.283500 0.879533 0.000764
1.288500 0.882360 0.000792
1.293500 0.882890 0.000749
1.298500 0.882602 0.000760
1.303500 0.885472 0.000767
1.308500 0.883436 0.000812
1.313500 0.882460 0.000783
1.318500 0.881228 0.000816
1.323500 0.880305 0.000810
1.328500 0.875094 0.000844
1.333500 0.872650 0.000815
1.338500 0.870610 0.000752
1.343500 0.866563 0.000882
1.348500 0.863189 0.000860
1.353500 0.860837 0.000873
1.358500 0.861138 0.000847
1.363500 0.862247 0.000996
1.368500 0.862378 0.001035
1.373500 0.860461 0.000872
1.378500 0.858784 0.000789
1.383500 0.857696 0.001031
1.388500 0.856351 0.001042
1.393500 0.855745 0.000993
1.398500 0.855690 0.001049
1.403500 0.853744 0.001039
1.408500 0.849104 0.000917
1.413500 0.850730 0.000849
1.418500 0.846681 0.000977
1.423500 0.842905 0.000869
1.428500 0.831891 0.001028
1.433500 0.825440 0.000910
1.438500 0.816137 0.001045
1.443500 0.802377 0.000892
1.448500 0.788221 0.000987
1.453500 0.771440 0.000900
1.458500 0.757636 0.000942
1.463500 0.748625 0.000957
1.468500 0.737275 0.000944
1.473500 0.716376 0.000733
1.478500 0.690803 0.000989
1.483500 0.680156 0.000743
1.488500 0.707495 0.001020
1.493500 0.729134 0.000941
1.498500 0.733985 0.000931
1.503500 0.731311 0.001000
1.508500 0.732265 0.001025
1.513500 0.729949 0.001030
1.518500 0.727610 0.001038
1.523500 0.728944 0.001042
1.528500 0.733934 0.001042
1.534000 0.738949 0.000783
1.540000 0.744244 0.000982
1.546000 0.747439 0.001000
1.552000 0.748736 0.000948
1.558000 0.750323 0.001041
1.564000 0.752181 0.000903
1.570500 0.749997 0.000933
1.577500 0.747947 0.000740
1.584500 0.746748 0.000813
1.591500 0.745666 0.000819
1.598500 0.744014 0.000746
1.605500 0.741095 0.000801
1.612500 0.739785 0.000838
1.619500 0.744716 0.000871
1.626500 0.748489 0.000959
1.633500 0.751189 0.000928
1.640500 0.755855 0.001032
1.647500 0.761432 0.000976
1.654500 0.762771 0.001034
1.661500 0.769554 0.001035
1.668500 0.772296 0.001033
1.676000 0.774071 0.000820
1.684000 0.773642 0.001033
1.692000 0.773496 0.001042
1.700000 0.774951 0.001037
1.708000 0.778633 0.001043
1.716000 0.783415 0.001048
1.724000 0.786628 0.001044
1.732000 0.790990 0.001044
1.740000 0.789082 0.001043
1.748000 0.790252 0.001043
1.756000 0.783426 0.001044
1.764000 0.780542 0.001042
1.772000 0.779050 0.001049
1.780000 0.774817 0.001047
1.788000 0.777027 0.001044
1.796000 0.779589 0.001047
1.805000 0.788560 0.000855
1.815000 0.794617 0.000873
1.825000 0.797729 0.001023
1.835000 0.800685 0.001042
1.845000 0.796743 0.001048
1.855000 0.789652 0.001036
1.865000 0.777983 0.001045
1.875000 0.764219 0.001045
1.885000 0.741923 0.001034
1.895000 0.716794 0.001024
1.905000 0.680456 0.001036
1.915000 0.639150 0.001022
1.925000 0.590322 0.001011
1.935000 0.519239 0.001010
1.945000 0.457391 0.000996
1.955000 0.492789 0.001011
1.965000 0.523846 0.001011
1.975000 0.480601 0.001004
1.985000 0.454958 0.001007
1.995000 0.476914 0.001014
2.005000 0.502420 0.001011
2.015000 0.502864 0.001010
2.025000 0.489029 0.001009
2.035000 0.484626 0.001007
2.045000 0.510039 0.001000
2.055000 0.542304 0.001004
2.065000 0.560236 0.001006
2.075000 0.566430 0.001008
2.085000 0.576405 0.001008
2.095000 0.593143 0.001012
2.105000 0.608834 0.001011
2.115000 0.623253 0.001012
2.125000 0.636926 0.001011
2.135000 0.645170 0.001010
2.145000 0.646800 0.001012
2.155000 0.640913 0.001007
2.165000 0.635008 0.001012
2.175000 0.632279 0.001015
2.185000 0.636319 0.001017
2.195000 0.634958 0.001025
2.205000 0.627954 0.001022
2.215000 0.622511 0.001025
2.225000 0.620528 0.001025
2.235000 0.611622 0.001030
2.245000 0.580548 0.001026
2.255000 0.595936 0.001123
2.265000 0.633845 0.001389
2.275000 0.651031 0.001685
2.285000 0.653369 0.002900
2.295000 0.646489 0.003640
2.305000 0.636054 0.003640
2.315000 0.632446 0.002345
2.325000 0.614446 0.001207
2.335000 0.593274 0.001012
2.345000 0.564148 0.001004
2.355000 0.516643 0.001000
2.365000 0.447239 0.000989
2.375000 0.370654 0.000982
2.386000 0.357800 0.000984
2.400000 0.399830 0.000952
2.418000 0.430356 0.000866
2.440000 0.392788 0.000815
2.466000 0.367513 0.000863
2.496000 0.395700 0.000946
2.528000 0.411583 0.000976
2.560000 0.442855 0.000956
2.592000 0.454851 0.000932
2.624000 0.457108 0.000920
2.656000 0.453746 0.001014
2.688000 0.404314 0.002786
2.720000 0.342484 0.006022
2.752000 0.217475 0.007134
2.784000 0.137410 0.005748
2.816000 0.066046 0.005110
2.848000 0.040542 0.004870
2.880000 0.020997 0.007519
2.912000 -0.001377 0.006697
2.944000 0.021320 0.007549
2.976000 0.014973 0.008014
|
eu
|
converted_docs
|
524747
|
+-----------------------------------------------------------------------+
| ####### {width="0.84375in" height="0.8645833333333334in"} |
| |
| ####### LHC Q1 -- Q2 Interconnect Procedure |
+-----------------------------------------------------------------------+
| **Reference Drawings:** |
+-----------------------------------------------------------------------+
| ######### Q1 - Q2 Bus and Splice Assembly |
| |
| **(ME-430179)** |
+-----------------------------------------------------------------------+
| **Q1 - Q2 Piping Connections Installation** |
| |
| **(ME-390866)** |
+-----------------------------------------------------------------------+
| **Q1 - Q2 Main Assembly** |
| |
| **(ME-390867)** |
+-----------------------------------------------------------------------+
| **Q1 - Q2 Bellows Protectors Installation** |
| |
| **(ME-390871)** |
+-----------------------------------------------------------------------+
| **By: Jamie Blowers, Rodger Bossert, Tom Page, Jim Rife Technical |
| Division, Fermilab** |
+-----------------------------------------------------------------------+
+---+---------------------------------+----+--------+----+---+------+
| * | **Description** | * | **Nu | * | * | ** |
| * | | *D | mber** | *R | * | Quan |
| | | wg | | ev | U | tity |
| * | | Si | | ** | n | Re |
| * | | ze | | | i | quir |
| | | ** | | | t | ed** |
| | | | | | * | |
| | | | | | * | |
+---+---------------------------------+----+--------+----+---+------+
| 1 | **KAPTON** | ** | **29 | | | **A |
| . | | MA | 2722** | | | /R** |
| | | ** | | | | |
| | | | | | | |
+---+---------------------------------+----+--------+----+---+------+
| 2 | > **Q2 COLDMASS PREPARATION Q2A | ** | **36 | * | * | * |
| . | > BUS HOUSING-EXTENSION** | ME | 9872** | *B | * | *0** |
| | | ** | | ** | R | |
| | | | | | E | |
| | | | | | F | |
| | | | | | * | |
| | | | | | * | |
+---+---------------------------------+----+--------+----+---+------+
| 3 | > **Q2 COLDMASS PREPARATION Q2A | ** | **36 | * | * | * |
| . | > BUS HSG-EXTENSION-BS** | MC | 9873** | *A | * | *0** |
| | | ** | | ** | R | |
| | | | | | E | |
| | | | | | F | |
| | | | | | * | |
| | | | | | * | |
+---+---------------------------------+----+--------+----+---+------+
| 4 | **SOLDER STRIP 96/4** | ** | **36 | | | **A |
| . | | MA | 9904** | | | /R** |
| | | ** | | | | |
| | | | | | | |
+---+---------------------------------+----+--------+----+---+------+
| 5 | **FLUX -- KESTER 135** | ** | **36 | | | **A |
| . | | MA | 9911** | | | /R** |
| | | ** | | | | |
| | | | | | | |
+---+---------------------------------+----+--------+----+---+------+
| 6 | **DRIFT TUBE ASSEMBLY** | ** | **39 | * | * | * |
| . | | ME | 0190** | *A | * | *1** |
| | | ** | | ** | E | |
| | | | | | A | |
| | | | | | * | |
| | | | | | * | |
+---+---------------------------------+----+--------+----+---+------+
| 7 | > **VACUUM VESSEL LEFT HAND | ** | **39 | * | * | * |
| . | > SLEEVE ASSEMBLY** | ME | 0322** | *A | * | *1** |
| | | ** | | ** | E | |
| | | | | | A | |
| | | | | | * | |
| | | | | | * | |
+---+---------------------------------+----+--------+----+---+------+
| 8 | > **HEAT EXCHANGER / COLD MASS | ** | **39 | * | * | * |
| . | > CONNECTOR** | MD | 0334** | *A | * | *1** |
| | | ** | | ** | E | |
| | | | | | A | |
| | | | | | * | |
| | | | | | * | |
+---+---------------------------------+----+--------+----+---+------+
| 9 | **SHIELD LINE CONNECTOR** | ** | **39 | * | * | * |
| . | | MD | 0343** | *A | * | *2** |
| | | ** | | ** | E | |
| | | | | | A | |
| | | | | | * | |
| | | | | | * | |
+---+---------------------------------+----+--------+----+---+------+
| 1 | # COOLDOWN LINE CONNECTOR | ** | **39 | * | * | * |
| 0 | | MD | 0344** | *A | * | *1** |
| . | | ** | | ** | E | |
| | | | | | A | |
| | | | | | * | |
| | | | | | * | |
+---+---------------------------------+----+--------+----+---+------+
| 1 | **PUMPING LINE CONNECTOR** | ** | **39 | * | * | * |
| 1 | | MD | 0345** | *A | * | *1** |
| . | | ** | | ** | E | |
| | | | | | A | |
| [ | | | | | * | |
| ] | | | | | * | |
| { | | | | | | |
| . | | | | | | |
| m | | | | | | |
| a | | | | | | |
| r | | | | | | |
| k | | | | | | |
| } | | | | | | |
+---+---------------------------------+----+--------+----+---+------+
| 1 | > **COLD MASS INSTRUMENTATION | ** | **39 | * | * | * |
| 2 | > CONNECTOR** | MD | 0346** | *A | * | *1** |
| . | | ** | | ** | E | |
| | | | | | A | |
| [ | | | | | * | |
| ] | | | | | * | |
| { | | | | | | |
| . | | | | | | |
| m | | | | | | |
| a | | | | | | |
| r | | | | | | |
| k | | | | | | |
| } | | | | | | |
+---+---------------------------------+----+--------+----+---+------+
| 1 | # COLD MASS CONNECTOR | ** | **39 | * | * | * |
| 3 | | MD | 0347** | *A | * | *1** |
| . | | ** | | ** | E | |
| | | | | | A | |
| [ | | | | | * | |
| ] | | | | | * | |
| { | | | | | | |
| . | | | | | | |
| m | | | | | | |
| a | | | | | | |
| r | | | | | | |
| k | | | | | | |
| } | | | | | | |
+---+---------------------------------+----+--------+----+---+------+
| 1 | > **SHIELD ASSEMBLY ALUMINUM | ** | **39 | ** | * | ** |
| 4 | > SPACER, 4.6 LONG** | MA | 0373** | \* | * | 32** |
| . | | ** | | ** | E | |
| | | | | | A | |
| | | | | | * | |
| | | | | | * | |
+---+---------------------------------+----+--------+----+---+------+
| 1 | **RETAINING WASHER** | ** | **39 | ** | * | ** |
| 5 | | MA | 0378** | \* | * | 32** |
| . | | ** | | ** | E | |
| | | | | | A | |
| | | | | | * | |
| | | | | | * | |
+---+---------------------------------+----+--------+----+---+------+
| 1 | > **INTERCONNECTION COLD MASS | ** | **39 | * | * | * |
| 6 | > PIPES SUPPORT** | ME | 0450** | *B | * | *1** |
| . | | ** | | ** | E | |
| | | | | | A | |
| | | | | | * | |
| | | | | | * | |
+---+---------------------------------+----+--------+----+---+------+
| 1 | **COLD MASS PIPE SUPPORT | ** | **39 | * | * | * |
| 7 | CLAMP** | MC | 0451** | *A | * | *3** |
| . | | ** | | ** | E | |
| | | | | | A | |
| | | | | | * | |
| | | | | | * | |
+---+---------------------------------+----+--------+----+---+------+
| 1 | > **COLD MASS/Hx PIPE SUPPORT | ** | **39 | ** | * | * |
| 8 | > CLAMP** | MC | 0453** | \* | * | *1** |
| . | | ** | | ** | E | |
| | | | | | A | |
| | | | | | * | |
| | | | | | * | |
+---+---------------------------------+----+--------+----+---+------+
| 1 | **Hx PIPE SUPPORT CLAMP** | ** | **39 | ** | * | * |
| 9 | | MC | 0454** | \* | * | *1** |
| . | | ** | | ** | E | |
| | | | | | A | |
| | | | | | * | |
| | | | | | * | |
+---+---------------------------------+----+--------+----+---+------+
| 2 | **COOLDOWN PIPE SUPPORT CLAMP** | ** | **39 | ** | * | * |
| 0 | | MB | 0455** | \* | * | *1** |
| . | | ** | | ** | E | |
| | | | | | A | |
| | | | | | * | |
| | | | | | * | |
+---+---------------------------------+----+--------+----+---+------+
| 2 | # UPPER PIPE SUPPORT | ** | **39 | * | * | * |
| 1 | | ME | 0456** | *A | * | *1** |
| . | | ** | | ** | E | |
| | | | | | A | |
| | | | | | * | |
| | | | | | * | |
+---+---------------------------------+----+--------+----+---+------+
| 2 | > **THERMAL SHIELD Q1-Q2 LEFT | ** | **39 | * | * | * |
| 2 | > HAND SECTION** | ME | 0505** | *A | * | *2** |
| . | | ** | | ** | E | |
| | | | | | A | |
| | | | | | * | |
| | | | | | * | |
+---+---------------------------------+----+--------+----+---+------+
| 2 | > **THERMAL SHIELD Q1-Q2 LEFT | ** | **39 | * | * | * |
| 3 | > HAND INSTRUMENTATION | ME | 0506** | *A | * | *1** |
| . | > SECTION** | ** | | ** | E | |
| | | | | | A | |
| | | | | | * | |
| | | | | | * | |
+---+---------------------------------+----+--------+----+---+------+
| 2 | > **THERMAL SHIELD Q1-Q2 LEFT | ** | **39 | * | * | * |
| 4 | > HAND VENT SECTION** | ME | 0510** | *A | * | *1** |
| . | | ** | | ** | E | |
| | | | | | A | |
| | | | | | * | |
| | | | | | * | |
+---+---------------------------------+----+--------+----+---+------+
| 2 | **THERMAL SHIELD Q2 CONNECTOR** | ** | **39 | ** | * | * |
| 5 | | ME | 0515** | \* | * | *2** |
| . | | ** | | ** | E | |
| | | | | | A | |
| | | | | | * | |
| | | | | | * | |
+---+---------------------------------+----+--------+----+---+------+
| 2 | > **THERMAL SHIELD - SHIELD | ** | **39 | ** | * | * |
| 6 | > CONNECTOR** | ME | 0516** | \* | * | *2** |
| . | | ** | | ** | E | |
| | | | | | A | |
| | | | | | * | |
| | | | | | * | |
+---+---------------------------------+----+--------+----+---+------+
| 2 | **THERMAL SHIELD DEFLECTOR** | ** | **39 | ** | * | * |
| 7 | | MB | 0517** | \* | * | *1** |
| . | | ** | | ** | E | |
| | | | | | A | |
| | | | | | * | |
| | | | | | * | |
+---+---------------------------------+----+--------+----+---+------+
| 2 | > **THERMAL SHIELD CENTER BAND | ** | **39 | ** | * | * |
| 8 | > CONNECTOR** | MC | 0518** | \* | * | *1** |
| . | | ** | | ** | E | |
| | | | | | A | |
| | | | | | * | |
| | | | | | * | |
+---+---------------------------------+----+--------+----+---+------+
| 2 | **THERMAL SHIELD FILLER** | ** | **39 | ** | * | * |
| 9 | | MB | 0519** | \* | * | *4** |
| . | | ** | | ** | E | |
| | | | | | A | |
| | | | | | * | |
| | | | | | * | |
+---+---------------------------------+----+--------+----+---+------+
| 3 | **THERMAL SHIELD CENTER BAND** | ** | **39 | ** | * | * |
| 0 | | ME | 0520** | \* | * | *2** |
| . | | ** | | ** | E | |
| | | | | | A | |
| | | | | | * | |
| | | | | | * | |
+---+---------------------------------+----+--------+----+---+------+
| 3 | > **SHIELD MLI INSULATION - | ** | **39 | ** | * | * |
| 1 | > INNER BLANKET** | ME | 0546** | \* | * | *1** |
| . | | ** | | ** | E | |
| | | | | | A | |
| | | | | | * | |
| | | | | | * | |
+---+---------------------------------+----+--------+----+---+------+
| 3 | > **SHIELD MLI INSULATION - | ** | **39 | ** | * | * |
| 2 | > OUTER BLANKET** | ME | 0547** | \* | * | *1** |
| . | | ** | | ** | E | |
| | | | | | A | |
| [ | | | | | * | |
| ] | | | | | * | |
| { | | | | | | |
| . | | | | | | |
| m | | | | | | |
| a | | | | | | |
| r | | | | | | |
| k | | | | | | |
| } | | | | | | |
+---+---------------------------------+----+--------+----+---+------+
| 3 | > **THERMAL SHIELD ALUMINUM | ** | **39 | ** | * | * |
| 3 | > SPACER, 12.4 LONG** | MA | 0553** | \* | * | *4** |
| . | | ** | | ** | E | |
| | | | | | A | |
| | | | | | * | |
| | | | | | * | |
+---+---------------------------------+----+--------+----+---+------+
| 3 | **1/4-20 U-BOLT** | ** | **39 | ** | * | * |
| 4 | | MB | 0554** | \* | * | *4** |
| . | | ** | | ** | E | |
| | | | | | A | |
| | | | | | * | |
| | | | | | * | |
+---+---------------------------------+----+--------+----+---+------+
| 3 | > **COOLDOWN / SHIELD LINE | ** | **39 | ** | * | * |
| 5 | > BELLOWS PROTECTOR** | MC | 0578** | \* | * | *6** |
| . | | ** | | ** | E | |
| | | | | | A | |
| | | | | | * | |
| | | | | | * | |
+---+---------------------------------+----+--------+----+---+------+
| 3 | > **Hx OUTER SHELL BELLOWS | ** | **39 | ** | * | * |
| 6 | > PROTECTOR** | ME | 0579** | \* | * | *4** |
| . | | ** | | ** | E | |
| | | | | | A | |
| | | | | | * | |
| | | | | | * | |
+---+---------------------------------+----+--------+----+---+------+
| 3 | > **PUMPING LINE BELLOWS | ** | **39 | ** | * | * |
| 7 | > PROTECTOR** | MD | 0580** | \* | * | *2** |
| . | | ** | | ** | E | |
| | | | | | A | |
| | | | | | * | |
| | | | | | * | |
+---+---------------------------------+----+--------+----+---+------+
| 3 | # PIPING INSULATION MLI BLANKET | ** | **39 | ** | * | * |
| 8 | | ME | 0594** | \* | * | *1** |
| . | | ** | | ** | E | |
| | | | | | A | |
| | | | | | * | |
| | | | | | * | |
+---+---------------------------------+----+--------+----+---+------+
| 3 | > **Hx OUTER TUBE END FLANGE | ** | **39 | ** | * | * |
| 9 | > SPACER RING** | MC | 0600** | \* | * | *2** |
| . | | ** | | ** | E | |
| | | | | | A | |
| | | | | | * | |
| | | | | | * | |
+---+---------------------------------+----+--------+----+---+------+
| 4 | > **COLD MASS SINGLE - BELLOWS | ** | **39 | * | * | * |
| 0 | > OPEN PROTECTOR** | MD | 0603** | *A | * | *4** |
| . | | ** | | ** | E | |
| | | | | | A | |
| | | | | | * | |
| | | | | | * | |
+---+---------------------------------+----+--------+----+---+------+
| 4 | > **COLD MASS DOUBLE - BELLOWS | ** | **39 | ** | * | * |
| 1 | > OPEN PROTECTOR** | ME | 0607** | \* | * | *2** |
| . | | ** | | ** | E | |
| | | | | | A | |
| [ | | | | | * | |
| ] | | | | | * | |
| { | | | | | | |
| . | | | | | | |
| m | | | | | | |
| a | | | | | | |
| r | | | | | | |
| k | | | | | | |
| } | | | | | | |
+---+---------------------------------+----+--------+----+---+------+
| 4 | > **PUMPING LINE & COLD MASS | ** | **39 | ** | * | * |
| 2 | > END FLANGE SPACER RING** | MB | 0617** | \* | * | *5** |
| . | | ** | | ** | E | |
| | | | | | A | |
| | | | | | * | |
| | | | | | * | |
+---+---------------------------------+----+--------+----+---+------+
| 4 | > **COOLDOWN & SHIELD LINE END | ** | **39 | ** | * | * |
| 3 | > FLANGE SPACER RING** | MB | 0618** | \* | * | *6** |
| . | | ** | | ** | E | |
| | | | | | A | |
| | | | | | * | |
| | | | | | * | |
+---+---------------------------------+----+--------+----+---+------+
| 4 | > **BEAMLINE DRIFT TUBE COOLING | ** | **39 | ** | * | * |
| 4 | > JACKET FLEX HOSE** | MA | 0625** | \* | * | *1** |
| . | | ** | | ** | E | |
| | | | | | A | |
| | | | | | * | |
| | | | | | * | |
+---+---------------------------------+----+--------+----+---+------+
| 4 | > **3.5" PIPE PERSISTENT RING** | ** | **39 | | * | * |
| 5 | | MC | 0640** | | * | *1** |
| . | | ** | | | E | |
| | | | | | A | |
| | | | | | * | |
| | | | | | * | |
+---+---------------------------------+----+--------+----+---+------+
| 4 | > **INTERCONNECTION BEAM TUBE | ** | **39 | ** | * | * |
| 6 | > SUPPORT ASSEMBLY** | ME | 0779** | \* | * | *1** |
| . | | ** | | ** | E | |
| | | | | | A | |
| | | | | | * | |
| | | | | | * | |
+---+---------------------------------+----+--------+----+---+------+
| 4 | **4.5K CC SUPPLY FLEX HOSE** | ** | **39 | ** | * | * |
| 7 | | MB | 0806** | \* | * | *1** |
| . | | ** | | ** | E | |
| | | | | | A | |
| | | | | | * | |
| | | | | | * | |
+---+---------------------------------+----+--------+----+---+------+
| 4 | > **4.5K INTERCEPT CC SUPPLY | ** | **39 | ** | * | * |
| 8 | > FLEX HOSE RETAINER PLATE** | MA | 0807** | \* | * | *1** |
| . | | ** | | ** | E | |
| | | | | | A | |
| [ | | | | | * | |
| ] | | | | | * | |
| { | | | | | | |
| . | | | | | | |
| m | | | | | | |
| a | | | | | | |
| r | | | | | | |
| k | | | | | | |
| } | | | | | | |
+---+---------------------------------+----+--------+----+---+------+
| 4 | **4.5K INTERCEPT TUBE BRACE | ** | **39 | ** | * | * |
| 9 | BAR** | MB | 0816** | \* | * | *2** |
| . | | ** | | ** | E | |
| | | | | | A | |
| [ | | | | | * | |
| ] | | | | | * | |
| { | | | | | | |
| . | | | | | | |
| m | | | | | | |
| a | | | | | | |
| r | | | | | | |
| k | | | | | | |
| } | | | | | | |
+---+---------------------------------+----+--------+----+---+------+
| 5 | **BEAM SCREEN COOLING SPOOL** | ** | **39 | ** | * | * |
| 0 | | MD | 0819** | \* | * | *1** |
| . | | ** | | ** | E | |
| | | | | | A | |
| | | | | | * | |
| | | | | | * | |
+---+---------------------------------+----+--------+----+---+------+
| 5 | **3.5" Pipe Coldmass Weld | ** | **39 | | * | * |
| 1 | Ring** | MC | 0875** | | * | *2** |
| . | | ** | | | E | |
| | | | | | A | |
| | | | | | * | |
| | | | | | * | |
+---+---------------------------------+----+--------+----+---+------+
| 5 | **SCREW, M8 x 25** | ** | **39 | ** | * | * |
| 2 | | MA | 3018** | \* | * | *4** |
| . | | ** | | ** | E | |
| | | | | | A | |
| | | | | | * | |
| | | | | | * | |
+---+---------------------------------+----+--------+----+---+------+
| 5 | **M6 LOCK WASHER** | ** | **39 | ** | * | ** |
| 3 | | MA | 3026** | \* | * | 22** |
| . | | ** | | ** | E | |
| | | | | | A | |
| | | | | | * | |
| | | | | | * | |
+---+---------------------------------+----+--------+----+---+------+
| 5 | **M8 LOCK WASHER** | ** | **39 | ** | * | * |
| 4 | | MA | 3027** | \* | * | *4** |
| . | | ** | | ** | E | |
| | | | | | A | |
| | | | | | * | |
| | | | | | * | |
+---+---------------------------------+----+--------+----+---+------+
| 5 | **M5 x 16 CAP SCREW** | ** | **39 | ** | * | **1 |
| 5 | | MA | 3028** | \* | * | 28** |
| . | | ** | | ** | E | |
| | | | | | A | |
| | | | | | * | |
| | | | | | * | |
+---+---------------------------------+----+--------+----+---+------+
| 5 | **SCREW, M6 x 20** | ** | **39 | ** | * | ** |
| 6 | | MA | 3037** | \* | * | 38** |
| . | | ** | | ** | E | |
| | | | | | A | |
| | | | | | * | |
| | | | | | * | |
+---+---------------------------------+----+--------+----+---+------+
| 5 | > **M30 x 3.5 x 2.0m LONG | ** | **39 | ** | * | * |
| 7 | > THREADED ROD** | MA | 3041** | \* | * | *4** |
| . | | ** | | ** | E | |
| | | | | | A | |
| | | | | | * | |
| | | | | | * | |
+---+---------------------------------+----+--------+----+---+------+
| 5 | **M30 SPHERICAL WASHER** | ** | **39 | ** | * | ** |
| 8 | | MA | 3043** | \* | * | 16** |
| . | | ** | | ** | E | |
| | | | | | A | |
| | | | | | * | |
| | | | | | * | |
+---+---------------------------------+----+--------+----+---+------+
| 5 | **M30 HEX NUT** | ** | **39 | ** | * | ** |
| 9 | | MA | 3044** | \* | * | 16** |
| . | | ** | | ** | E | |
| | | | | | A | |
| | | | | | * | |
| | | | | | * | |
+---+---------------------------------+----+--------+----+---+------+
| 6 | **M5 x 25 CAP SCREW** | ** | **39 | ** | * | * |
| 0 | | MA | 3053** | \* | * | *4** |
| . | | ** | | ** | E | |
| | | | | | A | |
| | | | | | * | |
| | | | | | * | |
+---+---------------------------------+----+--------+----+---+------+
| 6 | **1/4-20 HEX NUT** | ** | **39 | ** | * | ** |
| 1 | | MA | 3054** | \* | * | 16** |
| . | | ** | | ** | E | |
| | | | | | A | |
| | | | | | * | |
| | | | | | * | |
+---+---------------------------------+----+--------+----+---+------+
| 6 | **M5 LOCK WASHER** | ** | **39 | ** | * | ** |
| 2 | | MA | 3056** | \* | * | 96** |
| . | | ** | | ** | E | |
| | | | | | A | |
| | | | | | * | |
| | | | | | * | |
+---+---------------------------------+----+--------+----+---+------+
| 6 | **M5 FLAT WASHER** | ** | **39 | ** | * | ** |
| 3 | | MA | 3057** | \* | * | 76** |
| . | | ** | | ** | E | |
| | | | | | A | |
| | | | | | * | |
| | | | | | * | |
+---+---------------------------------+----+--------+----+---+------+
| 6 | **COMMON FASTENERS-#6-32 X .75 | ** | **39 | * | * | ** |
| 4 | LG. (SST)** | MA | 3237** | *A | * | 12** |
| . | | ** | | ** | E | |
| | | | | | A | |
| | | | | | * | |
| | | | | | * | |
+---+---------------------------------+----+--------+----+---+------+
| 6 | > **Q1 CORRECTION COIL SPLICE | ** | **43 | | * | * |
| 5 | > SUPPORT** | MD | 0023** | | * | *1** |
| . | | ** | | | E | |
| | | | | | A | |
| | | | | | * | |
| | | | | | * | |
+---+---------------------------------+----+--------+----+---+------+
| 6 | > **Q2 MOD.ASSY/Q2 BUS SPIDER | ** | **43 | * | * | * |
| 6 | > ASSEMBLY** | MD | 0044** | *C | * | *1** |
| . | | ** | | ** | E | |
| | | | | | A | |
| | | | | | * | |
| | | | | | * | |
+---+---------------------------------+----+--------+----+---+------+
| 6 | **BUS SPLICE SEPARATOR** | ** | **43 | | * | * |
| 7 | | MB | 0084** | | * | *1** |
| . | | ** | | | E | |
| | | | | | A | |
| | | | | | * | |
| | | | | | * | |
+---+---------------------------------+----+--------+----+---+------+
| 6 | **Bus Housing Transition | ** | **43 | ** | * | * |
| 8 | Cover - Q2** | ME | 0153** | \* | * | *1** |
| . | | ** | | ** | E | |
| | | | | | A | |
| | | | | | * | |
| | | | | | * | |
+---+---------------------------------+----+--------+----+---+------+
| 6 | **Bus Housing Transition Base | ** | **43 | | * | * |
| 9 | -- Q2** | ME | 0154** | | * | *1** |
| . | | ** | | | E | |
| | | | | | A | |
| | | | | | * | |
| | | | | | * | |
+---+---------------------------------+----+--------+----+---+------+
| 7 | **GLASS TAPE (item #7 on | | | | | **A |
| 0 | ME-430179)** | | | | | /R** |
| . | | | | | | |
| | | | | | | |
+---+---------------------------------+----+--------+----+---+------+
| 7 | **Hypertronics Tie-Down Link** | ** | **41 | | * | * |
| 1 | | MA | 8109** | | * | *4** |
| . | | ** | | | E | |
| | | | | | A | |
| | | | | | * | |
| | | | | | * | |
+---+---------------------------------+----+--------+----+---+------+
| 7 | **M3 Nut** | ** | **41 | | * | * |
| 2 | | MA | 8111** | | * | *8** |
| . | | ** | | | E | |
| | | | | | A | |
| | | | | | * | |
| | | | | | * | |
+---+---------------------------------+----+--------+----+---+------+
| 7 | **Kevlar string** | ** | **36 | | | **A |
| 3 | | MA | 9912** | | | /R** |
| . | | ** | | | | |
| | | | | | | |
+---+---------------------------------+----+--------+----+---+------+
| 7 | **Kapton sleeves (PROVIDED BY | | | | | * |
| 4 | CERN)** | | | | | *4** |
| . | | | | | | |
| | | | | | | |
+---+---------------------------------+----+--------+----+---+------+
| | > **TOOLING:** | | | | | |
+---+---------------------------------+----+--------+----+---+------+
| 7 | > **Corrector Wire Bus Splice | ** | **43 | | | * |
| 5 | > Soldering Fixture** | MD | 0016** | | | *1** |
| . | | ** | | | | |
| | | | | | | |
+---+---------------------------------+----+--------+----+---+------+
| 7 | > **Bus Cable Splice Fixture** | ** | **43 | | | * |
| 6 | | MC | 0138** | | | *1** |
| . | | ** | | | | |
| | | | | | | |
+---+---------------------------------+----+--------+----+---+------+
| 7 | **Compression Collar** | | **39 | | | ** |
| 7 | | | 0444** | | | 16** |
| . | | | | | | |
| | | | | | | |
+---+---------------------------------+----+--------+----+---+------+
| 7 | **M12 Threaded Rod** | | **39 | | | ** |
| 8 | | | 0449** | | | 24** |
| . | | | | | | |
| | | | | | | |
+---+---------------------------------+----+--------+----+---+------+
| 7 | **M12 Flat Washer** | | **39 | | | ** |
| 9 | | | 3331** | | | 96** |
| . | | | | | | |
| | | | | | | |
+---+---------------------------------+----+--------+----+---+------+
| 8 | **M12 Hex Nut** | | **39 | | | ** |
| 0 | | | 3039** | | | 96** |
| . | | | | | | |
| | | | | | | |
+---+---------------------------------+----+--------+----+---+------+
| 8 | **Collar Screws, M8 X 50mm** | | **39 | | | ** |
| 1 | | | 3020** | | | 16** |
| . | | | | | | |
| | | | | | | |
+---+---------------------------------+----+--------+----+---+------+
| 8 | **Compression Collar** | | **39 | | | ** |
| 2 | | | 0442** | | | 24** |
| . | | | | | | |
| | | | | | | |
+---+---------------------------------+----+--------+----+---+------+
| 8 | **M10 Threaded Rod** | | **39 | | | ** |
| 3 | | | 0448** | | | 48** |
| . | | | | | | |
| | | | | | | |
+---+---------------------------------+----+--------+----+---+------+
| 8 | **M10 Flat Washer** | | **36 | | | **1 |
| 4 | | | 4306** | | | 92** |
| . | | | | | | |
| | | | | | | |
+---+---------------------------------+----+--------+----+---+------+
| 8 | **M10 Hex Nut** | | **39 | | | **1 |
| 5 | | | 3038** | | | 92** |
| . | | | | | | |
| | | | | | | |
+---+---------------------------------+----+--------+----+---+------+
| 8 | **Collar Screws, M6 X 40mm** | | **39 | | | ** |
| 6 | | | 3047** | | | 48** |
| . | | | | | | |
| | | | | | | |
+---+---------------------------------+----+--------+----+---+------+
| 8 | **Compression Collar** | | **39 | | | * |
| 7 | | | 0440** | | | *1** |
| . | | | | | | |
| | | | | | | |
+---+---------------------------------+----+--------+----+---+------+
| 8 | **Splice Fixture Controllers** | | * | | | |
| 8 | | | *N/A** | | | |
| . | | | | | | |
| | | | | | | |
+---+---------------------------------+----+--------+----+---+------+
| 8 | **Bellows Restraints** | ** | **41 | | | **9 |
| 9 | | MB | 8232** | | | per |
| . | | ** | | | | IR |
| | | | | | | s |
| | | | | | | et** |
+---+---------------------------------+----+--------+----+---+------+
| 9 | **Lead position tool** | ** | **43 | | | |
| 0 | | MB | 0191** | | | |
| . | | ** | | | | |
| | | | | | | |
+---+---------------------------------+----+--------+----+---+------+
| | | | | | | |
+---+---------------------------------+----+--------+----+---+------+
| | | | | | | |
+---+---------------------------------+----+--------+----+---+------+
| | | | | | | |
+---+---------------------------------+----+--------+----+---+------+
| | | | | | | |
+---+---------------------------------+----+--------+----+---+------+
| | | | | | | |
+---+---------------------------------+----+--------+----+---+------+
| | | | | | | |
+---+---------------------------------+----+--------+----+---+------+
| | | | | | | |
+---+---------------------------------+----+--------+----+---+------+
| | | | | | | |
+---+---------------------------------+----+--------+----+---+------+
**[GENERAL NOTES:]{.mark}**
- [All screws installed in the vacuum and cryogenic space must have
some form of additional protection from working themselves loose
during thermal cycling. The use of Loctite 242 or 245, or Stycast is
recommended for this purpose.]{.mark}
**(Complete Above Ground)**
1. [Carefully remove all shrink tubing from cable leads.]{.mark}
2. [If cable labels are place where they will interfere with the
splicing operation (e.g. at the end of the leads), then additional
labels should be applied at a position on the cable where they will
not interfere with the splicing operation. In order to apply new
labels, it may be necessary to remove ground wrap which is holding
the wire bundles together. If this is the case, be sure to remove
only what is necessary. The labels at the ends can be removed in the
tunnel, after the length of the lead is correctly
determined.]{.mark}
3. [All leads should be dressed to remove solder/weld excess.]{.mark}
4. [Verify that the bus leads coming out of the IP-end of the Q2 magnet
are correctly wrapped together. You may find them ground-wrapped
separately, instead of together. If this is the case, remove the
individual ground wraps, and then wrap the two together with one
layer 2/3 lapped of Kapton (MA-292722, or equivalent).]{.mark}
5. Install Vacuum Outer Shell Sleeve (ME-390322) and Vacuum Vessel
Bellows Assembly (Provided by CERN) as per Q1 to Q2 Main Assembly
(ME-390867). Position them so that they do not interfere with
subsequent work.
##### Parts list
- **VACUUM OUTER SHELL SLEEVE (ME-390322)**
- **VACUUM VESSEL BELLOWS ASSEMBLY (PROVIDED BY CERN)**
6. Install Bus Housing (Item Numbers called out below refer to Drawing
No. ME-430155) (also refer to ME-430179).
1. Inspect Q1-Q2 bus housing assembly (ME-430155) to ensure all
parts exist.
2. Place bus housing parts items 5 (ME-430153) and 6 (ME-430154)
around lead and correction coil busses.
3. Attach item 5 (ME-430153) to item 2 (MC-369873) with four screws
item 3 (MA-393237) as shown on Bus Housing Assembly drawing
(ME-430155) and Q1-Q2 Bus and Splice Assembly drawing
(ME-430179). [Be sure to apply Loctite (or equivalent) to the
screws.]{.mark}
4. Attach Bus Housing Transition base item 6 (ME-430154) to bus
housing transition cover item 5 (ME-430155) with screws item 3
(MA-393237) as shown on Bus Housing Assembly drawing
(ME-430155). [Be sure to apply Loctite (or equivalent) to the
screws.]{.mark}
5. Attach item 4 Bus Spider Assembly (MD-430044) to bus housing
assembly as shown on Bus Housing Assembly (ME-430155) and Q1-Q2
Bus and Splice Assembly (ME-430179).
6. Slide the 3.5" Pipe Coldmass Weld Ring (MC-390875), and the Cold
Mass Instrumentation Connector (MD-390346) over the Bus Housing
Assembly.
7. Weld the Cold Mass Instrumentation Connector (MD-390346) to Q2.
Refer to the Q1 to Q2 Piping Connections Installation
(ME-390866), View M-M for details. NOTE: instrumentation wires
need to be protected from the weld heat (e.g. pull them tight
enough so that they are not resting on the tube during welding,
apply protection which can be removed after welding, etc.).
##### Parts list
- **#6-32 X .75 LG. (SST) (MA-393237)**
- **Q2 MOD.ASSY/Q2 BUS SPIDER ASSEMBLY (MD-430044)**
- **Bus Housing Transition Cover - Q2 (ME-430153)**
- **Bus Housing Transition Base - Q2 (ME-430154)**
- **3.5" PIPE COLDMASS WELD RING (MC-390875)**
- **COLD MASS INSTRUMENTATION CONNECTOR (MD-390346)**
7. Install Drift Tube
1. Install Drift Tube (ME-390190) on the Q1 magnet as per Q1 to Q2
Piping Connections Installation (ME-390866), View K-K.
##### Parts list
- **DRIFT TUBE (ME-390190)**
8. Install the CERN-supplied Beam Screen and BPMS assemblies per the
CERN drawings listed below.
##### CERN Drawings
- Cold Beam Vacuum Interconnects Type QQ1 (LHCLVI GG0002 - Right side,
IRs 1, 2, 5 and 8)
- Beam Vacuum Interconnects Assembly Type IT 1 IR Right (LHCLVIGG0002)
- Beam Vacuum Interconnects Assembly Type IT 4 IR Right (LHCLVIGG0007)
- Beam Vacuum Interconnects Assembly Type IT 1 IR Left (LHCLVIGG0009)
- Beam Vacuum Interconnects Assembly Type IT 4 IR Left (LHCLVIGG0010)
**(Complete Below Ground)**
9. Perform Lead Splices
1. Install End Flange Spacer Ring (ME-390617) as per Q1 to Q2
Piping Connections Installation (ME-390866).
2. Compress cold mass bellows.
3. Set the Q1 lead longitudinal position using the supplied tool
(MB-430191), [as per Q1-Q2 Bus and Splice Assembly
(ME-430179).]{.mark}
4. Mark position of end of Q1 lead cable at position at end of Q2
lead.
5. Perform main bus splices.
1. Place main bus leads in configuration needed for splicing,
as per Q1-Q2 Bus and Splice Assembly (ME-430179), sections
B-B and D-D, and on Figure 9.5.1-A below, making sure end of
Q1 lead is at mark on Q2 lead from previous step.

**[Figure 9.5.1-A]{.underline}**
2. Clean all leads with Tech spray and Scotch Brite, or equivalent.
Wipe down with Kay-dry or equivalent.
3. Paint flux (Kester 135, MA-369911 or equivalent) on all surfaces to
be soldered.
4. Add solder strips (MA-369904 or equivalent, 0.2 mm thick) to areas
to be spliced, between each main lead.
5. Place solder fixture (MD-430138) around both lead splices.
6. Screw solder fixture together around splices.
7. [If desired, add an additional temperature measuring device (e.g.
handheld thermocouple).]{.mark}
8. Turn on resistive heaters, and wait for the solder to melt, while
monitoring the temperature. [Tighten screws as the solder is
softening, so that the fixture is completely closed when the solder
is completely melted.]{.mark} When the solder has melted, turn off
the heater [controller]{.mark}. The solder typically melts at about
220°C, [but the temperature should be held at 235°C for one
minute.]{.mark} Do not allow the temperature to exceed 240°C.
9. Monitor the temperature during cool-down, [and let splice cool to \~
40°C]{.mark}. [To monitor the temperature, unplug the heating
element, and then turn the controller back on]{.mark}.
10. After cooling [(to \~ 40°C)]{.mark}, remove the splices from the
fixture. **[NOTE: It is easiest to remove the splices while the
fixture is a little warm, so it is best not to let it cool to room
temperature before removing the leads from the fixture.]{.mark}**
11. Clean exterior of splices with Tech spray and Scotch Brite or
equivalent. Wipe down with Kay-dry or equivalent.
```{=html}
<!-- -->
```
6. Using the tool provided (MB-430191), verify that the Q1 lead
longitudinal position is correct.
7. Insulate Main Bus Splices.
1. There are two main bus splices, positioned vertically, as shown
in section B-B of the Q1-Q2 Bus and Splice Assembly (ME-430179).
Wrap each splice separately, using one wrap of 50 um thick by
9.5mm wide Kapton (MA-292722) with 50% overlap as shown in
detail E.
2. Place one G-11 splice separator (MB-430084) between the two
splices as shown in section B-B.
3. Wrap entire splice bundle with one wrap of 50 um thick by 9.5mm
wide Kapton (MA-292722) with 75% overlap surrounded by one layer
of glass tape (item #7 on ME-430179) with 50% overlap as shown
in detail E.
4. Fuse the ends of the glass tape to prevent the tape from
unraveling. Use soldering iron to burn line over the last couple
of wraps.
5. [much as is possible.]{.mark}
**[[Figure 9.7.5-A]{.underline}]{.mark}**
8. Perform Corrector lead splices
1. Cut corrector wires at an appropriate length to provide for a
splice 60mm long as shown in Q1-Q2 Bus and Splice Assembly
(ME-430179).
2. Cut back "spare" corrector (shown on section A-A of ME-430179)
wire 100mm back from center of splice.
3. Using appropriate means, remove the varnish from the corrector
leads only in the areas to be soldered. See figure 9.8.3-A
below.

**[Figure 9.8.3-A]{.underline}**
4. Pre-tin all corrector leads to be spliced with solder made of 96%
tin/4% silver.
5. [Slide Kapton sleeves over each corrector lead on the Q2 magnet
(CERN part \# XXX).]{.mark}
6. Place corrector wires in configuration needed for splicing, as per
Q1-Q2 Bus and Splice Assembly (ME-430179), section B-B and detail D,
and on Figure 9.8.6-A below.

**[Figure 9.8.6-A]{.underline}**
7. Place Solder Fixture (MD-430016) under the four corrector leads at
area to be spliced according to Figure 9.8.3-A above. **NOTE: The
main bus splices should be protected from the heat applied for the
corrector lead soldering. If necessary, place insulation between the
soldering fixture and the main bus.**
8. Paint flux (Kester 135, MA-369911 or equivalent) on all surfaces to
be soldered.
9. Screw solder fixture together.
10. [If desired, add an additional temperature measuring device (e.g.
handheld thermocouple).]{.mark}
11. Turn on resistive heaters, and wait for the solder to melt, while
monitoring the temperature. [Tighten screws as the solder is
softening, so that the fixture is completely closed when the solder
is completely melted.]{.mark} When the solder has melted, turn off
the heater [controller]{.mark}. The solder typically melts at about
220° C, but the [temperature should be held at 235°C for one
minute]{.mark}. Do not allow the temperature to exceed 240°C.
12. Monitor the temperature during cool-down, [and let splice cool to \~
40°C]{.mark}. [To monitor the temperature, unplug the heating
element, and then turn the controller back on.]{.mark}
13. After cooling [(to \~ 40°C)]{.mark}, remove the splices from the
fixture. **[NOTE: It is easiest to remove the splices while the
fixture is a little warm, so it is best not to let it cool to room
temperature before removing the leads from the fixture.]{.mark}**
14. Clean exterior of splices with Tech spray and Scotch Brite or
equivalent. Wipe down with Kay-dry or equivalent.
15. [Slide the Kapton sleeves over the splices.]{.mark}
16. Install corrector bus housing splice support (MD-430023) as shown on
drawing. [Be sure to apply Loctite (or equivalent) to the
screws.]{.mark}
```{=html}
<!-- -->
```
9. Release and connect Cold Mass Bellows.
###### Parts list
- **Glass tape (item #7 on ME-430179)**
- **Kapton (MA-292722)**
- **Bus Splice Separator (MB-430084)**
- **Flux, Kester 135 (MA-369911)**
- **Solder Strip 96/4 (MA-369904) or CERN equivalent**
- **Q1 Correction Coil Splice Support (MD-430023):**
- **Threaded Tray (MC-430001)**
- **Single Cover (MC-430003)**
- **3mm/.5 X 8 Screw (MA-393246)**
```{=html}
<!-- -->
```
- **[Kapton sleeves (provided by CERN)]{.mark}**
###### Tooling
- **Corrector Wire Bus Splice Soldering Fixture (MD-430016)**
- **Bus Cable Splice Soldering Fixture (MC-430138)**
- **Lead position tool (MB-430191)**
10. Install Cold Mass Connector (MD-390347) on the M2 pipe.
1. Slide the 3.5" Pipe Coldmass Weld Ring (MC-390875) over the
wires and connector.
2. [Wrap a welding blanket around the cables. The blanket should
have a cord attached so that it can be pulled out after the
welding operation.]{.mark}
3. Slide the Cold Mass Connector (MD-390347) over instrumentation
wire and Hypertronics connector, [making sure to have the weld
blanket cord coming out of the end of the pipe.]{.mark}
4. Weld per Q1 to Q2 Piping Connections Installation (ME-390866),
View M-M.
5. [Pull out the welding blanket.]{.mark}
##### Parts list
- **COLD MASS CONNECTOR (MD-390347)**
- **3.5" PIPE COLDMASS WELD RING (MC-3906875)**
11. Connect Hypertronics Connectors (Q1 - MB-418119 & Q2 -- MB-418133;
Assembly drawing MD-430182)
1. Compress the M2 pipe Bellows.
2. Install the End Flange Spacer Ring (MB-390617).
3. Connect the connectors.
4. Using the M3 nuts (MA-418111) install the G11 Tie-Down Links
(MA-418109) per MD-430182. The nuts should have Loctite, or
equivalent, applied prior to installation.
5. Release the Bellows.
6. Weld per Q1 to Q2 Piping Connections Installation (ME-390866),
View C--C.
##### Parts list
- **END FLANGE SPACER RING (MB-390617)**
- **HYPERTRONICS TIE-DOWN LINKS (MA-418109)**
- **M3 Nuts (MA-418111)**
> [Tools]{.underline}
- Bellows Tools.
##### Inspection
- Electrical checkout?
12. Install Heat Exchanger / Cold Mass Connector (MD-390334).
1. Compress the Hx Outer Bellows, both sides.
2. Compress the Cold Mass Bellows.
3. Install the End Flange Spacer Rings (MB-390600) for the Hx
bellows.
4. Install the Persistent Ring (MB-390640) for the M4 pipe (Q2
side).
5. Install the End Flange Spacer Ring (MB-390617) for the M4 pipe
(Q1 side).
6. Position Heat Exchanger/Cold Mass Connector Pipe Assembly
(MD-390334).
7. Position the Hx inner Tube (XB on ME-390866).
8. Weld inner Hx Tube (XB on ME-390866) both sides per Q1 to Q2
Piping Connections Installation (ME-390866), View B--B.
9. Release the Hx outer bellows.
10. Weld outer Hx Tube (L on ME-390866) both sides per Q1 to Q2
Piping Connections Installation (ME-390866), View A--A.
11. Weld M4 Line (M4 on ME-390866) both sides per Q1 to Q2 Piping
Connections Installation (ME-390866), View H--H and C--C.
##### Parts list
- **END FLANGE SPACER RINGS (MB-390600)**
- **PERSISTENT RING (MB-390640)**
- **END FLANGE SPACER RINGS (MB-390617)**
- **HEAT EXCHANGER/COLD MASS CONNECTOR (MD-390334)**
##### Weld Details
- View H--H, Upper Cold Mass Q2 side.
- View C--C, Upper Cold Mass Q1 side.
- View A--A, Hx Outer Shell both sides.
- View B--B, Hx Inner Shell both sides.
13. Install the CERN-supplied Plug-in Module per the CERN drawings
listed below.
##### CERN Drawings
- Cold Beam Vacuum Interconnects Type QQ1 (LHCLVI GG0002 - Right side,
IRs 1, 2, 5 and 8)
- Beam Vacuum Interconnects Assembly Type IT 1 IR Right (LHCLVIGG0002)
- Beam Vacuum Interconnects Assembly Type IT 4 IR Right (LHCLVIGG0007)
- Beam Vacuum Interconnects Assembly Type IT 1 IR Left (LHCLVIGG0009)
```{=html}
<!-- -->
```
- Beam Vacuum Interconnects Assembly Type IT 4 IR Left (LHCLVIGG0010)
14. Install Pumping Line Connector (MD-390345).
1. Compress the Bellows.
2. Install the End Flange Spacer Ring (MB-390617).
3. Position the Pumping Line Connector (MD-390345, XBt on
ME-390866).
4. Release the Bellows.
5. Weld Pumping Line Connector (MD-390345, XBt on ME-390866) per Q1
to Q2 Piping Connections Installation (ME-390866), View C--C and
E--E.
##### Parts list
- **PUMPING LINE CONNECTOR (MD-390345)**
- **END FLANGE SPACER RING (MB-390617)**
##### Weld Details
- View C--C
- View E--E
15. Install Cooldown Line Connector (MD-390344).
1. Compress the Bellows.
2. Install the End Flange Spacer Rings (MB-390618).
3. Position the Cooldown Line Connector (MD-390344).
4. Release the Bellows.
5. Weld Cooldown Line Connector (MD-390344) both ends, per Q1 to Q2
Piping Connections Installation (ME-390866), View D--D.
##### Parts list
- **COOLDOWN LINE CONNECTOR (MD-390344)**
- **END FLANGE SPACER RING (MB-390618)**
16. Install Cooling Jacket Flex Hose (MA-390625).
1. Install the Cooling Jacket Flex Hose (MA-390625) between the
port on the Drift Tube (ME-390190) and the port on the M4 pipe,
as per Q1-Q2 Piping Connections Installation (ME-390866).
2. Weld Cooling Jacket Flex Hose (MA-390625) per Q1-Q2 Piping
Connections Installation (ME-390866), View L--L for both welds.
##### Parts list
- **COOLING JACKET FLEX HOSE (MA-390625)**
17. Install Cooling Spool (MD-390819).
1. Install and weld the Cooling Spool (MD-390819) onto the Beam
Screen Assembly, as per Q1 to Q2 Piping Connections Installation
(ME-390866), View J--J.
##### Parts list
- **BEAM SCREEN COOLING SPOOL (MD-390819)**
18. Install 4.5K CC Supply Flex - Hose (MB-390806).
1. Install 4.5K CC Supply Flex - Hose (MB-390806).
2. Position 4.5K CC Supply Flex - Hose (MB-390806).
3. Weld 4.5K CC Supply Flex - Hose (MB-390806) per Q1 to Q2 Piping
Connections Installation (ME-390866), View G--G.
##### Parts list
- **4.5K CC SUPPLY FLEX - HOSE (MB-390806)**
19. Install 4.5K Intercept Tube Brace Bar (MB-390816).
1. Install 4.5K Intercept Tube Brace Bar (MB-390816), if necessary.
##### Parts list
- **4.5K INTERCEPT TUBE BRACE BAR (MB-390816)**
20. Install Cold Mass Pipe Support Assembly (ME-390820).
1. Install Cold Mass Pipe Support Assembly (ME-390820) as per Q1 to
Q2 Bellows Protectors Installation (ME-390871). [Be sure to
apply Loctite (or equivalent) to the screws.]{.mark}
##### Parts list
- **COLDMASS PIPE SUPPORT (MC-390450)**
- **COLDMASS PIPE SUPPORT CLAMP (MC-390451)**
- **Hx PIPE SUPPORT CLAMP (MC-390453)**
- **FLEX HOSE RETAINER PLATE (MA-390807)**
- **SCREW M6 X 20 (MA-393037)**
- **M6 LOCK WASHER (MA-393026)**
21. Install Beam Tube Support Assembly (ME-390779).
1. Using the Flex Hose Retainer Plate (MA-390807), position Flex -
Hose (MB-390806) in Pipe Support Assembly shown in "Opposite
Side View" on Q1 to Q2 Bellows Protectors Installation
(ME-390871).
2. Install Beam Tube Support Assembly (ME-390779) as per Q1 to Q2
Bellows Protectors Installation (ME-390871).
##### Parts list
- **BEAM TUBE SUPPORT ASSEMBLY (ME-390779)**
- **FLEX HOSE RETAINER PLATE (MA-390807)**
22. Install Upper Pipe Support Assembly (ME-390821).
1. Install Upper Pipe Support Assembly (ME-390821) as per Q1 to Q2
Bellows Protectors Installation (ME-390871). [Be sure to apply
Loctite (or equivalent) to the screws.]{.mark}
##### Parts list
- **COLDMASS PIPE SUPPORT CLAMP (MC-390451)**
- **HEAT EXCHANGER PIPE SUPPORT (MC-390454)**
- **COOLDOWN PIPE SUPPORT CLAMP (MB-390455)**
- **HEAT EXCH. COOLDOWN-PUMPING PIPES SUPPORT (ME-390456)**
- **SHCS M8 X 25.0 (MA-393018) \[NOTE: for the first magnet we sent
MA-393040 M8 X 20\]**
- **M6 LOCK WASHER (MA-393026)**
- **M8 LOCK WASHER (MA-393027)**
- **SCREW M6 X 20 (MA-393037)**
23. Install Shield Line Connectors (FF & EE) (MD-390343).
1. Compress the Bellows.
2. Install the End Flange Spacer Rings (MB-390618).
3. Position the Shield Line Connectors (FF & EE) (MD-390343) (See
Q1 to Q2 Piping Connections Installation ME-390866 for pipe
orientation.)
4. Release the Bellows.
5. Weld Shield Line Connectors per Q1 to Q2 Piping Connections
Installation (ME-390866), View D--D for all connections.
##### Parts list
- **SHIELD LINE CONNECTORS (FF & EE) (MD-390343)**
- **END FLANGE SPACER RINGS (MB-390618)**
24. Leak Check
1. When all assemblies have been installed, perform a Leak Check on
the entire Assembly.
25. Install Bellows Protectors.
> [NOTE:]{.mark} [Be sure to apply Loctite (or equivalent) to the
> screws.]{.mark}
1. Install Cold Mass Electrical Bus (M1) Bellows Protectors (ME-390607)
as per Q1 to Q2 Bellows Protectors Installation (ME-390871).
2. Install Cold Mass Instrumentation (M2) Bellows Protectors
(ME-390603) as per Q1 to Q2 Bellows Protectors Installation
(ME-390871).
3. Install Cold Mass Heat Exchanger (M4) Bellows Protectors (ME-390603)
as per Q1 to Q2 Bellows Protectors Installation (ME-390871).
4. Install Heat Exchanger (L) Bellows Protectors (ME-390579) as per Q1
to Q2 Bellows Protectors Installation (ME-390871).
5. Install Pumping Line (XBt) Bellows Protectors (MD-390580) as per Q1
to Q2 Bellows Protectors Installation (ME-390871).
6. Install Cooldown Line (LD1) Bellows Protectors (MC-390578) as per Q1
to Q2 Bellows Protectors Installation (ME-390871).
7. Install Shield Line (FF) Bellows Protectors (MC-390578) as per Q1 to
Q2 Bellows Protectors Installation (ME-390871).
8. Install Shield Line (EE) Bellows Protectors (MC-390578) as per Q1 to
Q2 Bellows Protectors Installation (ME-390871).
##### Parts list
- **COLD MASS ELECTRICAL BUS (M1) BELLOWS PROTECTORS (ME-390607)**
- **COLD MASS INSTRUMENTATION (M2) BELLOWS PROTECTORS (ME-390603)**
- **COLD MASS HEAT EXCHANGER (M4) BELLOWS PROTECTORS (ME-390603)**
- **HEAT EXCHANGER (L) BELLOWS PROTECTORS (ME-390579)**
- **PUMPING LINE (XBT) BELLOWS PROTECTORS (MD-390580)**
- **COOLDOWN LINE (LD1) BELLOWS PROTECTORS (MC-390578)**
- **SHIELD LINE (FF) BELLOWS PROTECTORS (MC-390578)**
- **SHIELD LINE (EE) BELLOWS PROTECTORS (MC-390578)**
- **SCREW, M6 X 20 (MA-393037)**
26. [Install eight BPM steel jacket cables (CERN supplied).]{.mark}
27. Pipe Insulation
1. Wrap piping with MLI blankets as per Q1 to Q2 Main Assembly
(ME-390867).
##### Parts list
- **PIPING INSULATION MLI BLANKET (ME-390594)**
28. Install Thermal Shield (ME-390503)
1. Install parts listed below as per Q1 to Q2 Main Assembly
(ME-390867). [Be sure to apply Loctite (or equivalent) to all
screws.]{.mark}
##### Parts list
- **THERMAL SHIELD Q1-Q2 LEFT HAND SECTION (ME-390505)**
- **THERMAL SHIELD Q1-Q2 LEFT HAND INSTRUMENTATION SECTION
(ME-390506)**
- **THERMAL SHIELD Q1-Q2 LEFT HAND VENT SECTION (ME-390510)**
- **THERMAL SHIELD Q2 CONNECTOR (ME-390515)**
- **THERMAL SHIELD - SHIELD CONNECTOR (ME-390516)**
- **THERMAL SHIELD DEFLECTOR (MB-390517)**
- **THERMAL SHIELD CENTER BAND CONNECTOR (MC-390518)**
- **THERMAL SHIELD FILLER (MB-390519)**
- **THERMAL SHIELD CENTER BAND (ME-390520)**
```{=html}
<!-- -->
```
- **THERMAL SHIELD ALUMINUM SPACER, 12.4 LONG (MA-390553)**
- **SHIELD ASSEMBLY ALUM SPACER (MA-390373)**
- **SHIELD ASSEMBLY RETAINING WASHER (MA-390378)**
- **Q1-Q2 INTERCONNECT SHIELD INNER BLANKET (ME-390546)**
- **Q1-Q2 INTERCONNECT SHIELD OUTER BLANKET (ME-390547)**
- **INTERCONNECT THERMAL SHIELD, U- BOLT (MB-390554)**
- **M5 X 16 CAP SCREW (MA-393028)**
- **M5 X 25 CAP SCREW (MA-393053)**
- **1/4-20 HEX JAM NUT (MA-393054)**
- **M5 LOCK WASHER (MA-393056)**
- **M5 FLAT WASHER (MA-393057)**
29. Shield Insulation
1. Wrap thermal shielding with MLI blankets as per Q1 to Q2 Main
Assembly (ME-390867).
##### Parts list
- **SHIELD MLI INSULATION -- OUTER BLANKET (ME-390547)**
```{=html}
<!-- -->
```
- **SHIELD MLI INSULATION -- INNER BLANKET (ME-390546)**
30. Connect the vacuum shell sleeve and bellows
1. Reposition the outer vacuum shell and vacuum bellows over the
interconnect region, and attach per Q1 to Q2 Main Assembly
(ME-390867).
##### Parts list
- Claw Clamps (MA-393337, **PROVIDED BY CERN**)
31. Install Threaded Rods
1. Install Threaded Rods (Qty. 4) (MA-393041) as per Q1 to Q2 Main
Assembly (ME-390867).
##### Parts list
- **THREADED RODS (MA-393041)**
- **M30 X 3.5 HEX NUT (MA-393044)**
- **M30 SPHERICAL WASHER (MA-393043)**
|
en
|
converted_docs
|
524653
|
BILLING CODE: 4150-04M
DEPARTMENT OF HEALTH AND HUMAN SERVICES
Office of the Secretary
45 CFR Parts 160 through 164
Rin: 0991-AB08
Standards for Privacy of Individually Identifiable Health Information
AGENCY: Office of the Assistant Secretary for Planning and Evaluation,
DHHS.
ACTION: Final rule.
SUMMARY: This rule includes standards to protect the privacy of
individually identifiable health information. The rules below, which
apply to health plans, health care clearinghouses, and certain health
care providers, present standards with respect to the rights of
individuals who are the subjects of this information, procedures for the
exercise of those rights, and the authorized and required uses and
disclosures of this information.
The use of these standards will improve the efficiency and effectiveness
of public and private health programs and health care services by
providing enhanced protections for individually identifiable health
information. These protections will begin to address growing public
concerns that advances in electronic technology and evolution in the
health care industry are resulting, or may result, in a substantial
erosion of the privacy surrounding individually identifiable health
information maintained by health care providers, health plans and their
administrative contractors. This rule implements the privacy
requirements of the Administrative Simplification subtitle of the Health
Insurance Portability and Accountability Act of 1996.
DATES: The final rule is effective on \[INSERT DATE 60 DAYS FOLLOWING
PUBLICATION IN THE FEDERAL REGISTER\].
FOR FURTHER INFORMATION CONTACT: Kimberly Coleman, 1-866-OCR-PRIV
(1-866-627-7748) or TTY 1-866-788-4989.
SUPPLEMENTARY INFORMATION: Availability of copies, and electronic
access.
Copies: To order copies of the [Federal Register]{.underline} containing
this document, send your request to: New Orders, Superintendent of
Documents, P.O. Box 371954, Pittsburgh, PA 15250-7954. Specify the date
of the issue requested and enclose a check or money order payable to the
Superintendent of Documents, or enclose your Visa or Master Card number
and expiration date. Credit card orders can also be placed by calling
the order desk at (202) 512-1800 or by fax to (202) 512-2250. The cost
for each copy is \$8.00. As an alternative, you can view and photocopy
the [Federal Register]{.underline} document at most libraries designated
as Federal Depository Libraries and at many other public and academic
libraries throughout the country that receive the [Federal
Register]{.underline}.
Electronic Access: This document is available electronically at
http://aspe.hhs.gov/admnsimp/ as well as at the web site of the
Government Printing Office at
http://www.access.gpo.gov/su_docs/aces/aces140.html.
**I. BACKGROUND**
**Table of Contents**
§ 160.101 Statutory basis and purpose.
§ 160.102 Applicability.
§ 160.103 Definitions.
§ 160.104 Modifications.
§ 160.201 Applicability
§ 160.202 Definitions.
§ 160.203 General rule and exceptions.
§ 160.204 Process for requesting exception determinations.
§ 160.205 Duration of effectiveness of exception determinations.
§ 160.300 Applicability.
§ 160.302 Definitions.
§ 160.304 Principles for achieving compliance.
\(a\) Cooperation.
\(b\) Assistance.
§ 160.306 Complaints to the Secretary.
\(a\) Right to file a complaint.
\(b\) Requirements for filing complaints.
\(c\) Investigation.
§ 160.308 Compliance reviews.
§ 160.310 Responsibilities of covered entities.
\(a\) Provide records and compliance reports.
\(b\) Cooperate with complaint investigations and compliance reviews.
\(c\) Permit access to information.
§ 160.312 Secretarial action regarding complaints and compliance
reviews.
\(a\) Resolution where noncompliance is indicated.
\(b\) Resolution when no violation is found.
§ 164.102 Statutory basis.
§ 164.104 Applicability.
§ 164.106 Relationship to other parts.
§ 164.500 Applicability.
§ 164.501 Definitions.
§ 164.502 Uses and disclosures of protected health information: general
rules.
\(a\) Standard.
\(b\) Standard: minimum necessary.
\(c\) Standard: uses and disclosures of protected health information
subject to an agreed upon restriction.
\(d\) Standard: uses and disclosures of de-identified protected health
information.
\(e\) Standard: disclosures to business associates.
\(f\) Standard: deceased individuals.
\(g\) Standard: personal representatives.
\(h\) Standard: confidential communications.
\(i\) Standard: uses and disclosures consistent with notice.
\(j\) Standard: disclosures by whistleblowers and workforce member crime
victims.
§ 164.504 Uses and disclosures: organizational requirements.
\(a\) Definitions.
\(b\) Standard: health care component.
\(c\) Implementation specification: application of other provisions.
\(d\) Standard: affiliated covered entities.
\(e\) Standard: business associate contracts.
(f)Standard: requirements for group health plans.
\(g\) Standard: requirements for a covered entity with multiple covered
functions.
§ 164.506 Consent for uses or disclosures to carry out treatment,
payment, or health care operations.
\(a\) Standard: consent requirement.
\(b\) Implementation specifications: general requirements.
\(c\) Implementation specifications: content requirements.
\(d\) Implementation specifications: defective consents.
\(e\) Standard: resolving conflicting consents and authorizations.
\(f\) Standard: joint consents.
§164.508 Uses and disclosures for which an authorization is required.
\(a\) Standard: authorizations for uses and disclosures.
\(b\) Implementation specifications: general requirements.
\(c\) Implementation specifications: core elements and requirements.
\(d\) Implementation specifications: authorizations requested by a
covered entity for its own uses and disclosures.
\(e\) Implementation specifications: authorizations requested by a
covered entity for disclosures by others.
\(f\) Implementation specifications: authorizations for uses and
disclosures of protected health information created for research that
includes treatment of the individual.
§ 164.510 Uses and disclosures requiring an opportunity for the
individual to agree or to object.
\(a\) Standard: use and disclosure for facility directories.
\(b\) Standard: uses and disclosures for involvement in the individual's
care and notification purposes.
§ 164.512 Uses and disclosures for which consent, an authorization, or
opportunity to agree or object is not required.
\(a\) Standard: uses and disclosures required by law.
\(b\) Standard: uses and disclosures for public health activities.
\(c\) Standard: disclosures about victims of abuse, neglect or domestic
violence.
\(d\) Standard: uses and disclosures for health oversight activities.
\(e\) Standard: disclosures for judicial and administrative proceedings.
\(f\) Standard: disclosures for law enforcement purposes.
\(g\) Standard: uses and disclosures about decedents.
\(h\) Standard: uses and disclosures for cadaveric organ, eye or tissue
donation purposes.
\(i\) Standard: uses and disclosures for research purposes.
\(j\) Standard: uses and disclosures to avert a serious threat to health
or safety.
\(k\) Standard: uses and disclosures for specialized government
functions.
\(l\) Standard: disclosures for workers' compensation.
§ 164.514 Other requirements relating to uses and disclosures of
protected health information.
\(a\) Standard: de-identification of protected health information.
\(b\) Implementation specifications: requirements for de-identification
of protected health information.
\(c\) Implementation specifications: re-identification.
\(d\) Standard: minimum necessary requirements.
\(e\) Standard: uses and disclosures of protected health information for
marketing.
\(f\) Standard: uses and disclosures for fundraising.
\(g\) Standard: uses and disclosures for underwriting and related
purposes.
\(h\) Standard: verification requirements
§ 164.520 Notice of privacy practices for protected health information.
\(a\) Standard: notice of privacy practices.
\(b\) Implementation specifications: content of notice.
\(c\) Implementation specifications: provision of notice.
\(d\) Implementation specifications: joint notice by separate covered
entities.
\(e\) Implementation specifications: documentation.
§ 164.522 Rights to request privacy protection for protected health
information.
\(a\) Standard: right of an individual to request restriction of uses
and disclosures.
\(b\) Standard: confidential communications requirements.
§ 164.524 Access of individuals to protected health information.
\(a\) Standard: access to protected health information.
\(b\) Implementation specifications: requests for access and timely
action.
\(c\) Implementation specifications: provision of access.
\(d\) Implementation specifications: denial of access.
\(e\) Implementation specification: documentation.
§ 164.526 Amendment of protected health information.
\(a\) Standard: right to amend.
\(b\) Implementation specifications: requests for amendment and timely
action.
\(c\) Implementation specifications: accepting the amendment.
\(d\) Implementation specifications: denying the amendment.
\(e\) Implementation specification: actions on notices of amendment.
\(f\) Implementation specification: documentation.
§ 164.528 Accounting of disclosures of protected health information.
\(a\) Standard: right to an accounting of disclosures of protected
health information.
\(b\) Implementation specifications: content of the accounting.
\(c\) Implementation specifications: provision of the accounting.
\(d\) Implementation specification: documentation.
§ 164.530 Administrative requirements.
\(a\) Standard: personnel designations.
\(b\) Standard: training.
\(c\) Standard: safeguards.
\(d\) Standard: complaints to the covered entity.
\(e\) Standard: sanctions
\(f\) Standard: mitigation.
\(g\) Standard: refraining from intimidating or retaliatory acts.
\(h\) Standard: waiver of rights.
\(i\) Standard: policies and procedures.
\(j\) Standard: documentation.
\(k\) Standard: group health plans.
§ 164.532 Transition provisions.
\(a\) Standard: effect of prior consents and authorizations.
\(b\) Implementation specification: requirements for retaining
effectiveness of prior consents and authorizations.
§ 164.534 Compliance dates for initial implementation of the privacy
standards.
\(a\) Health care providers.
\(b\) Health plans.
\(c\) Health care clearinghouses.
**Purpose of the Administrative Simplification Regulations**
This regulation has three major purposes: (1) to protect and enhance the
rights of consumers by providing them access to their health information
and controlling the inappropriate use of that information; (2) to
improve the quality of health care in the U.S. by restoring trust in the
health care system among consumers, health care professionals, and the
multitude of organizations and individuals committed to the delivery of
care; and (3) to improve the efficiency and effectiveness of health care
delivery by creating a national framework for health privacy protection
that builds on efforts by states, health systems, and individual
organizations and individuals.
This regulation is the second final regulation to be issued in the
package of rules mandated under Title II Subtitle F Section 261-264 of
the Health Insurance Portability and Accountability Act of 1996 (HIPAA),
Public Law 104-191, titled "Administrative Simplification." Congress
called for steps to improve "the efficiency and effectiveness of the
health care system by encouraging the development of a health
information system through the establishment of standards and
requirements for the electronic transmission of certain health
information." To achieve that end, Congress required the Department to
promulgate a set of interlocking regulations establishing standards and
protections for health information systems. The first regulation in this
set, Standards for Electronic Transactions 65 FR 50312, was published on
August 17, 2000 (the "Transactions Rule"). This regulation establishing
Standards for Privacy of Individually Identifiable Health Information is
the second final rule in the package. A rule establishing a unique
identifier for employers to use in electronic health care transactions,
a rule establishing a unique identifier for providers for such
transactions, and a rule establishing standards for the security of
electronic information systems have been proposed. See 63 FR 25272 and
25320 (May 7, 1998); 63 FR 32784 (June 16, 1998); 63 FR 43242 (August
12, 1998). Still to be proposed are rules establishing a unique
identifier for health plans for electronic transactions, standards for
claims attachments, and standards for transferring among health plans
appropriate standard data elements needed for coordination of benefits.
(See section C, below, for a more detailed explanation of the statutory
mandate for these regulations.)
In enacting HIPAA, Congress recognized the fact that administrative
simplification cannot succeed if we do not also protect the privacy and
confidentiality of personal health information. The provision of
high-quality health care requires the exchange of personal,
often-sensitive information between an individual and a skilled
practitioner. Vital to that interaction is the patient's ability to
trust that the information shared will be protected and kept
confidential. Yet many patients are concerned that their information is
not protected. Among the factors adding to this concern are the growth
of the number of organizations involved in the provision of care and the
processing of claims, the growing use of electronic information
technology, increased efforts to market health care and other products
to consumers, and the increasing ability to collect highly sensitive
information about a person's current and future health status as a
result of advances in scientific research.
Rules requiring the protection of health privacy in the United States
have been enacted primarily by the states. While virtually every state
has enacted one or more laws to safeguard privacy, these laws vary
significantly from state to state and typically apply to only part of
the health care system. Many states have adopted laws that protect the
health information relating to certain health conditions such as mental
illness, communicable diseases, cancer, HIV/AIDS, and other stigmatized
conditions. An examination of state health privacy laws and regulations,
however, found that "state laws, with a few notable exceptions, do not
extend comprehensive protections to people's medical records." Many
state rules fail to provide such basic protections as ensuring a
patient's legal right to see a copy of his or her medical record. See
Health Privacy Project, "The State of Health Privacy: An Uneven
Terrain," Institute for Health Care Research and Policy, Georgetown
University (July 1999) (http://www.healthprivacy.org) (the "Georgetown
Study").
Until now, virtually no federal rules existed to protect the privacy of
health information and guarantee patient access to such information.
This final rule establishes, for the first time, a set of basic national
privacy standards and fair information practices that provides all
Americans with a basic level of protection and peace of mind that is
essential to their full participation in their care. The rule sets a
floor of ground rules for health care providers, health plans, and
health care clearinghouses to follow, in order to protect patients and
encourage them to seek needed care. The rule seeks to balance the needs
of the individual with the needs of the society. It creates a framework
of protection that can be strengthened by both the federal government
and by states as health information systems continue to evolve.
**Need for a National Health Privacy Framework**
***The Importance of Privacy***
Privacy is a fundamental right. As such, it must be viewed differently
than any ordinary economic good. The costs and benefits of a regulation
must, of course, be considered as a means of identifying and weighing
options. At the same time, it is important not to lose sight of the
inherent meaning of privacy: it speaks to our individual and collective
freedom.
A right to privacy in personal information has historically found
expression in American law. All fifty states today recognize in tort law
a common law or statutory right to privacy. Many states specifically
provide a remedy for public revelation of private facts. Some states,
such as California and Tennessee, have a right to privacy as a matter of
state constitutional law. The multiple historical sources for legal
rights to privacy are traced in many places, including Chapter 13 of
Alan Westin\'s *Privacy and Freedom* and in Ellen Alderman & Caroline
Kennedy, *The Right to Privacy* (1995).
Throughout our nation's history, we have placed the rights of the
individual at the forefront of our democracy. In the Declaration of
Independence, we asserted the "unalienable right" to "life, liberty and
the pursuit of happiness." Many of the most basic protections in the
Constitution of the United States are imbued with an attempt to protect
individual privacy while balancing it against the larger social purposes
of the nation.
To take but one example, the Fourth Amendment to the United States
Constitution guarantees that \"the right of the people to be secure in
their persons, houses, papers and effects, against unreasonable searches
and seizures, shall not be violated.\" By referring to the need for
security of \"persons\" as well as \"papers and effects\" the Fourth
Amendment suggests enduring values in American law that relate to
privacy. The need for security of \"persons\" is consistent with
obtaining patient consent before performing invasive medical procedures.
The need for security in \"papers and effects\" underscores the
importance of protecting information about the person, contained in
sources such as personal diaries, medical records, or elsewhere. As is
generally true for the right of privacy in information, the right is not
absolute. The test instead is what constitutes an \"unreasonable\"
search of the papers and effects.
The United States Supreme Court has upheld the constitutional protection
of personal health information. In *Whalen v. Roe*, 429 U.S. 589 (1977),
the Court analyzed a New York statute that created a database of persons
who obtained drugs for which there was both a lawful and unlawful
market. The Court, in upholding the statute, recognized at least two
different kinds of interests within the constitutionally protected
\"zone of privacy.\" \"One is the individual interest in avoiding
disclosure of personal matters,\" such as this regulation principally
addresses. This interest in avoiding disclosure, discussed in *Whalen*
in the context of medical information, was found to be distinct from a
different line of cases concerning \"the interest in independence in
making certain kinds of important decisions.\"
Individuals\' right to privacy in information about themselves is not
absolute. It does not, for instance, prevent reporting of public health
information on communicable diseases or stop law enforcement from
getting information when due process has been observed. But many people
believe that individuals should have some right to control personal and
sensitive information about themselves. Among different sorts of
personal information, health information is among the most sensitive.
Many people believe that details about their physical self should not
generally be put on display for neighbors, employers, and government
officials to see. Informed consent laws place limits on the ability of
other persons to intrude physically on a person\'s body. Similar
concerns apply to intrusions on information about the person.
Moving beyond these facts of physical treatment, there is also
significant intrusion when records reveal details about a person\'s
mental state, such as during treatment for mental health. If, in Justice
Brandeis\' words, the \"right to be let alone\" means anything, then it
likely applies to having outsiders have access to one\'s intimate
thoughts, words, and emotions. In the recent case of *Jaffee v.
Redmond*, 116 S.Ct. 1923 (1996), the Supreme Court held that statements
made to a therapist during a counseling session were protected against
civil discovery under the Federal Rules of Evidence. The Court noted
that all fifty states have adopted some form of the
psychotherapist-patient privilege. In upholding the federal privilege,
the Supreme Court stated that it \"serves the public interest by
facilitating the appropriate treatment for individuals suffering the
effects of a mental or emotional problem. The mental health of our
citizenry, no less than its physical health, is a public good of
transcendent importance.\"
Many writers have urged a philosophical or common-sense right to privacy
in one\'s personal information. Examples include Alan Westin, *Privacy
and Freedom* (1967) and Janna Malamud Smith, *Private Matters: In
Defense of the Personal Life* (1997). These writings emphasize the link
between privacy and freedom and privacy and the \"personal life,\" or
the ability to develop one\'s own personality and self-expression.
Smith, for instance, states:
> The bottom line is clear. If we continually, gratuitously, reveal
> other people\'s privacies, we harm them and ourselves, we undermine
> the richness of the personal life, and we fuel a social atmosphere of
> mutual exploitation. Let me put it another way: Little in life is as
> precious as the freedom to say and do things with people you love that
> you would not say or do if someone else were present. And few
> experiences are as fundamental to liberty and autonomy as maintaining
> control over when, how, to whom, and where you disclose personal
> material. Id. at 240-241.
In 1890, Louis D. Brandeis and Samuel D. Warren defined the right to
privacy as "the right to be let alone." See L. Brandeis, S. Warren, "The
Right To Privacy," 4 Harv.L.Rev. 193. More than a century later, privacy
continues to play an important role in Americans' lives. In their book,
*The Right to Privacy,* (Alfred A. Knopf, New York, 1995) Ellen Alderman
and Caroline Kennedy describe the importance of privacy in this way:
> Privacy covers many things. It protects the solitude necessary for
> creative thought. It allows us the independence that is part of
> raising a family. It protects our right to be secure in our own homes
> and possessions, assured that the government cannot come barging in.
> Privacy also encompasses our right to self-determination and to define
> who we are. Although we live in a world of noisy self-confession,
> privacy allows us to keep certain facts to ourselves if we so choose.
> The right to privacy, it seems, is what makes us civilized.
Or, as Cavoukian and Tapscott observed the right of privacy is: "the
claim of individuals, groups, or institutions to determine for
themselves when, how, and to what extent information about them is
communicated." See A. Cavoukian, D. Tapscott, "Who Knows: Safeguarding
Your Privacy in a Networked World," Random House (1995).
***Increasing Public Concern About Loss of Privacy***
Today, it is virtually impossible for any person to be truly "let
alone." The average American is inundated with requests for information
from potential employers, retail shops, telephone marketing firms,
electronic marketers, banks, insurance companies, hospitals, physicians,
health plans, and others. In a 1998 national survey, 88 percent of
consumers said they were "concerned" by the amount of information being
requested, including 55 percent who said they were "very concerned." See
Privacy and American Business*, 1998 Privacy Concerns & Consumer Choice
Survey* (http://www.pandab.org) These worries are not just theoretical.
Consumers who use the Internet to make purchases or request "free"
information often are asked for personal and financial information.
Companies making such requests routinely promise to protect the
confidentiality of that information. Yet several firms have tried to
sell this information to other companies even after promising not to do
so.
Americans' concern about the privacy of their health information is part
of a broader anxiety about their lack of privacy in an array of areas. A
series of national public opinion polls conducted by Louis Harris &
Associates documents a rising level of public concern about privacy,
growing from 64 percent in 1978 to 82 percent in 1995. Over 80 percent
of persons surveyed in 1999 agreed with the statement that they had
\"lost all control over their personal information.\" See Harris
Equifax, *Health Information Privacy Study* (1993)
(http://www.epic.org/privacy/medical/polls.html). A Wall Street
Journal/ABC poll on September 16, 1999 asked Americans what concerned
them most in the coming century. "Loss of personal privacy" was the
first or second concern of 29 percent of respondents. All other issues,
such a terrorism, world war, and global warming had scores of 23 percent
or less.
This growing concern stems from several trends, including the growing
use of interconnected electronic media for business and personal
activities, our increasing ability to know an individual's genetic
make-up, and, in health care, the increasing complexity of the system.
Each of these trends brings the potential for tremendous benefits to
individuals and society generally. At the same time, each also brings
new potential for invasions of our privacy.
***Increasing Use of Interconnected Electronic Information Systems***
Until recently, health information was recorded and maintained on paper
and stored in the offices of community-based physicians, nurses,
hospitals, and other health care professionals and institutions. In some
ways, this imperfect system of record keeping created a false sense of
privacy among patients, providers, and others. Patients' health
information has never remained completely confidential. Until recently,
however, a breach of confidentiality involved a physical exchange of
paper records or a verbal exchange of information. Today, however, more
and more health care providers, plans, and others are utilizing
electronic means of storing and transmitting health information. In
1996, the health care industry invested an estimated \$10 billion to
\$15 billion on information technology. See National Research Council,
Computer Science and Telecommunications Board, "For the Record:
Protecting Electronic Health Information," (1997). The electronic
information revolution is transforming the recording of health
information so that the disclosure of information may require only a
push of a button. In a matter of seconds, a person's most profoundly
private information can be shared with hundreds, thousands, even
millions of individuals and organizations at a time. While the majority
of medical records still are in paper form, information from those
records is often copied and transmitted through electronic means.
This ease of information collection, organization, retention, and
exchange made possible by the advances in computer and other electronic
technology affords many benefits to individuals and to the health care
industry. Use of electronic information has helped to speed the delivery
of effective care and the processing of billions of dollars worth of
health care claims. Greater use of electronic data has also increased
our ability to identify and treat those who are at risk for disease,
conduct vital research, detect fraud and abuse, and measure and improve
the quality of care delivered in the U.S. The National Research Council
recently reported that "the Internet has great potential to improve
Americans' health by enhancing communications and improving access to
information for care providers, patients, health plan administrators,
public health officials, biomedical researchers, and other health
professionals." See "Networking Health: Prescriptions for the Internet,"
National Academy of Sciences (2000).
At the same time, these advances have reduced or eliminated many of the
financial and logistical obstacles that previously served to protect the
confidentiality of health information and the privacy interests of
individuals. And they have made our information available to many more
people. The shift from paper to electronic records, with the
accompanying greater flows of sensitive health information, thus
strengthens the arguments for giving legal protection to the right to
privacy in health information. In an earlier period where it was far
more expensive to access and use medical records, the risk of harm to
individuals was relatively low. In the potential near future, when
technology makes it almost free to send lifetime medical records over
the Internet, the risks may grow rapidly. It may become cost-effective,
for instance, for companies to offer services that allow purchasers to
obtain details of a person\'s physical and mental treatments. In
addition to legitimate possible uses for such services, malicious or
inquisitive persons may download medical records for purposes ranging
from identity theft to embarrassment to prurient interest in the life of
a celebrity or neighbor. The comments to the proposed privacy rule
indicate that many persons believe that they have a right to live in
society without having these details of their lives laid open to unknown
and possibly hostile eyes. These technological changes, in short, may
provide a reason for institutionalizing privacy protections in
situations where the risk of harm did not previously justify writing
such protections into law.
The growing level of trepidation about privacy in general, noted above,
has tracked the rise in electronic information technology. Americans
have embraced the use of the Internet and other forms of electronic
information as a way to provide greater access to information, save
time, and save money. For example, 60 percent of Americans surveyed in
1999 reported that they have a computer in their home; 82 percent
reported that they have used a computer; 64 percent say they have used
the Internet; and 58 percent have sent an e-mail. Among those who are
under the age of 60, these percentages are even higher. See "National
Survey of Adults on Technology," Henry J. Kaiser Family Foundation
(February, 2000). But 59 percent of Americans reported that they worry
that an unauthorized person will gain access to their information. A
recent survey suggests that 75 percent of consumers seeking health
information on the Internet are concerned or very concerned about the
health sites they visit sharing their personal health information with a
third party without their permission. Ethics Survey of Consumer
Attitudes about Health Web Sites, California Health Care Foundation, at
3 (January, 2000).
Unless public fears are allayed, we will be unable to obtain the full
benefits of electronic technologies. The absence of national standards
for the confidentiality of health information has made the health care
industry and the population in general uncomfortable about this
primarily financially-driven expansion in the use of electronic data.
Many plans, providers, and clearinghouses have taken steps to safeguard
the privacy of individually identifiable health information. Yet they
must currently rely on a patchwork of State laws and regulations that
are incomplete and, at times, inconsistent. States have, to varying
degrees, attempted to enhance confidentiality by establishing laws
governing at least some aspects of medical record privacy. This
approach, though a step in the right direction, is inadequate. These
laws fail to provide a consistent or comprehensive legal foundation of
health information privacy. For example, there is considerable variation
among the states in the type of information protected and the scope of
the protections provided. See Georgetown Study, at Executive Summary;
Lawrence O. Gostin, Zita Lazzarrini, Kathleen M. Flaherty, *Legislative
Survey of State Confidentiality Laws, with Specific Emphasis on HIV and
Immunization*, Report to Centers for Disease Control, Council of State
and Territorial Epidemiologists, and Task Force for Child Survival and
Development, Carter Presidential Center (1996) (Gostin Study).
Moreover, electronic health data is becoming increasingly "national"; as
more information becomes available in electronic form, it can have value
far beyond the immediate community where the patient resides. Neither
private action nor state laws provide a sufficiently comprehensive and
rigorous legal structure to allay public concerns, protect the right to
privacy, and correct the market failures caused by the absence of
privacy protections (see discussion below of market failure under
section V.C). Hence, a national policy with consistent rules is
necessary to encourage the increased and proper use of electronic
information while also protecting the very real needs of patients to
safeguard their privacy.
***Advances in Genetic Sciences***
Recently, scientists completed nearly a decade of work unlocking the
mysteries of the human genome, creating tremendous new opportunities to
identify and prevent many of the leading causes of death and disability
in this country and around the world. Yet the absence of privacy
protections for health information endanger these efforts by creating a
barrier of distrust and suspicion among consumers. A 1995 national poll
found that more than 85 percent of those surveyed were either "very
concerned" or "somewhat concerned" that insurers and employers might
gain access to and use genetic information. See Harris Poll, 1995 #34.
Sixty-three percent of the 1,000 participants in a 1997 national survey
said they would not take genetic tests if insurers and employers could
gain access to the results. See "Genetic Information and the Workplace,"
Department of Labor, Department of Health and Human Services, Equal
Employment Opportunity Commission, January 20, 1998. "In genetic testing
studies at the National Institutes of Health, thirty-two percent of
eligible people who were offered a test for breast cancer risk declined
to take it, citing concerns about loss of privacy and the potential for
discrimination in health insurance." Sen. Leahy's comments for March 10,
1999 Introduction of the Medical Information Privacy and Security Act.
***The Changing Health Care System***
The number of entities who are maintaining and transmitting individually
identifiable health information has increased significantly over the
last 10 years. In addition, the rapid growth of integrated health care
delivery systems requires greater use of integrated health information
systems. The health care industry has been transformed from one that
relied primarily on one-on-one interactions between patients and
clinicians to a system of integrated health care delivery networks and
managed care providers. Such a system requires the processing and
collection of information about patients and plan enrollees (for
example, in claims files or enrollment records), resulting in the
creation of databases that can be easily transmitted. This dramatic
change in the practice of medicine brings with it important prospects
for the improvement of the quality of care and reducing the cost of that
care. It also, however, means that increasing numbers of people have
access to health information. And, as health plan functions are
increasingly outsourced, a growing number of organizations not
affiliated with our physicians or health plans also have access to
health information.
According to the American Health Information Management Association
(AHIMA), an average of 150 people "from nursing staff to x-ray
technicians, to billing clerks" have access to a patient's medical
records during the course of a typical hospitalization. While many of
these individuals have a legitimate need to see all or part of a
patient's records, no laws govern who those people are, what information
they are able to see, and what they are and are not allowed to do with
that information once they have access to it. According to the National
Research Council, individually identifiable health information
frequently is shared with:
· Consulting physicians;
· Managed care organizations;
· Health insurance companies
· Life insurance companies;
· Self-insured employers;
· Pharmacies;
· Pharmacy benefit managers;
· Clinical laboratories;
· Accrediting organizations;
· State and Federal statistical agencies; and
· Medical information bureaus.
Much of this sharing of information is done without the knowledge of the
patient involved. While many of these functions are important for smooth
functioning of the health care system, there are no rules governing how
that information is used by secondary and tertiary users. For example, a
pharmacy benefit manager could receive information to determine whether
an insurance plan or HMO should cover a prescription, but then use the
information to market other products to the same patient. Similarly,
many of us obtain health insurance coverage though our employer and, in
some instances, the employer itself acts as the insurer. In these cases,
the employer will obtain identifiable health information about its
employees as part of the legitimate health insurance functions such as
claims processing, quality improvement, and fraud detection activities.
At the same time, there is no comprehensive protection prohibiting the
employer from using that information to make decisions about promotions
or job retention.
Public concerns reflect these developments. A 1993 Lou Harris poll found
that 75 percent of those surveyed worry that medical information from a
computerized national health information system will be used for many
non-health reasons, and 38 percent are very concerned. This poll, taken
during the health reform efforts of 1993, showed that 85 percent of
respondents believed that protecting the confidentiality of medical
records is "absolutely essential" or "very essential" in health care
reform. An ACLU Poll in 1994 also found that 75 percent of those
surveyed are concerned a "great deal" or a "fair amount"' about
insurance companies putting medical information about them into a
computer information bank to which others have access. Harris Equifax,
Health Information Privacy Study 2,33 (1993)
http://www.epic.org/privacy/medical/poll.html. Another survey found that
35 percent of Fortune 500 companies look at people's medical records
before making hiring and promotion decisions. Starr, Paul. "Health and
the Right to Privacy," American Journal of Law and Medicine, 1999. Vol
25, pp. 193-201.
Concerns about the lack of attention to information privacy in the
health care industry are not merely theoretical. In the absence of a
national legal framework of health privacy protections, consumers are
increasingly vulnerable to the exposure of their personal health
information. Disclosure of individually identifiable information can
occur deliberately or accidentally and can occur within an organization
or be the result of an external breach of security. Examples of recent
privacy breaches include:
· A Michigan-based health system accidentally posted the medical records
of thousands of patients on the Internet (The Ann Arbor News, February
10, 1999).
· A Utah-based pharmaceutical benefits management firm used patient data
to solicit business for its owner, a drug store (Kiplingers, February
2000).
· An employee of the Tampa, Florida, health department took a computer
disk containing the names of 4,000 people who had tested positive for
HIV, the virus that causes AIDS (USA Today, October 10, 1996).
· The health insurance claims forms of thousands of patients blew out of
a truck on its way to a recycling center in East Hartford, Connecticut
(The Hartford Courant, May 14, 1999).
· A patient in a Boston-area hospital discovered that her medical record
had been read by more than 200 of the hospital's employees (The Boston
Globe, August 1, 2000).
· A Nevada woman who purchased a used computer discovered that the
computer still contained the prescription records of the customers of
the pharmacy that had previously owned the computer. The pharmacy data
base included names, addresses, social security numbers, and a list of
all the medicines the customers had purchased. (The New York Times,
April 4, 1997 and April 12, 1997).
· A speculator bid \$4000 for the patient records of a family practice
in South Carolina. Among the businessman's uses of the purchased records
was selling them back to the former patients. (New York Times, August
14, 1991).
· In 1993, the Boston Globe reported that Johnson and Johnson marketed a
list of 5 million names and addresses of elderly incontinent women.
(ACLU Legislative Update, April 1998).
· A few weeks after an Orlando woman had her doctor perform some routine
tests, she received a letter from a drug company promoting a treatment
for her high cholesterol. (Orlando Sentinel, November 30, 1997).
No matter how or why a disclosure of personal information is made, the
harm to the individual is the same. In the face of industry evolution,
the potential benefits of our changing health care system, and the real
risks and occurrences of harm, protection of privacy must be built into
the routine operations of our health care system.
***Privacy is Necessary to Secure Effective, High Quality Health Care***
While privacy is one of the key values on which our society is built, it
is more than an end in itself. It is also necessary for the effective
delivery of health care, both to individuals and to populations. The
market failures caused by the lack of effective privacy protections for
health information are discussed below (see section V.C below). Here, we
discuss how privacy is a necessary foundation for delivery of high
quality health care. In short, the entire health care system is built
upon the willingness of individuals to share the most intimate details
of their lives with their health care providers.
The need for privacy of health information, in particular, has long been
recognized as critical to the delivery of needed medical care. More than
anything else, the relationship between a patient and a clinician is
based on trust. The clinician must trust the patient to give full and
truthful information about their health, symptoms, and medical history.
The patient must trust the clinician to use that information to improve
his or her health and to respect the need to keep such information
private. In order to receive accurate and reliable diagnosis and
treatment, patients must provide health care professionals with
accurate, detailed information about their personal health, behavior,
and other aspects of their lives. The provision of health information
assists in the diagnosis of an illness or condition, in the development
of a treatment plan, and in the evaluation of the effectiveness of that
treatment. In the absence of full and accurate information, there is a
serious risk that the treatment plan will be inappropriate to the
patient's situation.
Patients also benefit from the disclosure of such information to the
health plans that pay for and can help them gain access to needed care.
Health plans and health care clearinghouses rely on the provision of
such information to accurately and promptly process claims for payment
and for other administrative functions that directly affect a patient's
ability to receive needed care, the quality of that care, and the
efficiency with which it is delivered.
Accurate medical records assist communities in identifying troubling
public health trends and in evaluating the effectiveness of various
public health efforts. Accurate information helps public and private
payers make correct payments for care received and lower costs by
identifying fraud. Accurate information provides scientists with data
they need to conduct research. We cannot improve the quality of health
care without information about which treatments work, and which do not.
Individuals cannot be expected to share the most intimate details of
their lives unless they have confidence that such information will not
be used or shared inappropriately. Privacy violations reduce consumers'
trust in the health care system and institutions that serve them. Such a
loss of faith can impede the quality of the health care they receive,
and can harm the financial health of health care institutions.
Patients who are worried about the possible misuse of their information
often take steps to protect their privacy. Recent studies show that a
person who does not believe his privacy will be protected is much less
likely to participate fully in the diagnosis and treatment of his
medical condition. A national survey conducted in January 1999 found
that one in five Americans believe their health information is being
used inappropriately. See California HealthCare Foundation, "National
Survey: Confidentiality of Medical Records"(January, 1999)
(http://www.chcf.org). More troubling is the fact that one in six
Americans reported that they have taken some sort of evasive action to
avoid the inappropriate use of their information by providing inaccurate
information to a health care provider, changing physicians, or avoiding
care altogether. Similarly, in its comments on our proposed rule, the
Association of American Physicians and Surgeons reported 78 percent of
its members reported withholding information from a patient's record due
to privacy concerns and another 87 percent reported having had a patient
request to withhold information from their records. For an example of
this phenomenon in a particular demographic group, see Drs. Bearman,
Ford, and Moody, "Foregone Health Care among Adolescents," *JAMA*, vol.
282, no. 23 (999); Cheng, T.L., et al., "Confidentiality in Health Care:
A Survey of Knowledge, Perceptions, and Attitudes among High School
Students," *JAMA*, vol. 269, no. 11 (1993), at 1404-1407.
The absence of strong national standards for medical privacy has
widespread consequences. Health care professionals who lose the trust of
their patients cannot deliver high-quality care. In 1999, a coalition of
organizations representing various stakeholders including health plans,
physicians, nurses, employers, disability and mental health advocates,
accreditation organizations as well as experts in public health, medical
ethics, information systems, and health policy adopted a set of "best
principles" for health care privacy that are consistent with the
standards we lay out here. (See the Health Privacy Working Group, "Best
Principles for Health Privacy" (July, 1999) (Best Principles Study). The
Best Principles Study states that -
> To protect their privacy and avoid embarrassment, stigma, and
> discrimination, some people withhold information from their health
> care providers, provide inaccurate information, doctor-hop to avoid a
> consolidated medical record, pay out-of-pocket for care that is
> covered by insurance, and - in some cases - avoid care altogether.
Best Principles Study, at 9. In their comments on our proposed rule,
numerous organizations representing health plans, health providers,
employers, and others acknowledged the value of a set of national
privacy standards to the efficient operation of their practices and
businesses.
***Breaches of Health Privacy Harm More than Our Health Status***
A breach of a person's health privacy can have significant implications
well beyond the physical health of that person, including the loss of a
job, alienation of family and friends, the loss of health insurance, and
public humiliation. For example:
· A banker who also sat on a county health board gained access to
patients' records and identified several people with cancer and called
in their mortgages. See the National Law Journal, May 30, 1994.
· A physician was diagnosed with AIDS at the hospital in which he
practiced medicine. His surgical privileges were suspended. See *Estate
of Behringer v. Medical Center at Princeton,* 249 N.J. Super. 597.
· A candidate for Congress nearly saw her campaign derailed when
newspapers published the fact that she had sought psychiatric treatment
after a suicide attempt. See *New York Times*, October 10, 1992, Section
1, page 25.
· A 30-year FBI veteran was put on administrative leave when, without
his permission, his pharmacy released information about his treatment
for depression. (Los Angeles Times, September 1, 1998)
Consumer Reports found that 40 percent of insurers disclose personal
health information to lenders, employers, or marketers without customer
permission. "Who's reading your Medical Records," Consumer Reports,
October 1994, at 628, paraphrasing Sweeny, Latanya, "Weaving Technology
and Policy Together to Maintain Confidentiality," The Journal Of Law
Medicine and Ethics (Summer & Fall 1997) Vol. 25, Numbers 2,3.
The answer to these concerns is not for consumers to withdraw from
society and the health care system, but for society to establish a clear
national legal framework for privacy. By spelling out what is and what
is not an allowable use of a person's identifiable health information,
such standards can help to restore and preserve trust in the health care
system and the individuals and institutions that comprise that system.
As medical historian Paul Starr wrote: "Patients have a strong interest
in preserving the privacy of their personal health information but they
also have an interest in medical research and other efforts by health
care organizations to improve the medical care they receive. As members
of the wider community, they have an interest in public health measures
that require the collection of personal data." (P. Starr, "Health and
the Right to Privacy," American Journal of Law & Medicine, 25, nos. 2&3
(1999) 193-201). The task of society and its government is to create a
balance in which the individual's needs and rights are balanced against
the needs and rights of society as a whole.
National standards for medical privacy must recognize the sometimes
competing goals of improving individual and public health, advancing
scientific knowledge, enforcing the laws of the land, and processing and
paying claims for health care services. This need for balance has been
recognized by many of the experts in this field. Cavoukian and Tapscott
described it this way: "An individual's right to privacy may conflict
with the collective rights of the public. . .We do not suggest that
privacy is an absolute right that reigns supreme over all other rights.
It does not. However, the case for privacy will depend on a number of
factors that can influence the balance -- the level of harm to the
individual involved versus the needs of the public."
***The Federal Response***
There have been numerous federal initiatives aimed at protecting the
privacy of especially sensitive personal information over the past
several years \-- and several decades. While the rules below are likely
the largest single federal initiative to protect privacy, they are by no
means alone in the field. Rather, the rules arrive in the context of
recent legislative activity to grapple with advances in technology, in
addition to an already established body of law granting federal
protections for personal privacy.
In 1965, the House of Representatives created a Special Subcommittee on
Invasion of Privacy. In 1973, this Department's predecessor agency, the
Department of Health, Education and Welfare issued *The Code of Fair
Information Practice Principles* establishing an important baseline for
information privacy in the U.S. These principles formed the basis for
the federal Privacy Act of 1974, which regulates the government's use of
personal information by limiting the disclosure of
personally-identifiable information, allows consumers access to
information about them, requires federal agencies to specify the
purposes for collecting personal information, and provides civil and
criminal penalties for misuse of information.
In the last several years, with the rapid expansion in electronic
technology \-- and accompanying concerns about individual privacy \--
laws, regulations, and legislative proposals have been developed in
areas ranging from financial privacy to genetic privacy to the
safeguarding of children on-line. For example, the Children's Online
Privacy Protection Act was enacted in 1998, providing protection for
children when interacting at web-sites. In February, 2000, President
Clinton signed Executive Order 13145, banning the use of genetic
information in federal hiring and promotion decisions. The landmark
financial modernization bill, signed by the President in November, 1999,
likewise contained financial privacy protections for consumers. There
also has been recent legislative activity on establishing legal
safeguards for the privacy of individuals' Social Security numbers, and
calls for regulation of on-line privacy in general.
These most recent laws, regulations, and legislative proposals come
against the backdrop of decades of privacy-enhancing statutes passed at
the federal level to enact safeguards in fields ranging from government
data files to video rental records. In the 1970s, individual privacy was
paramount in the passage of the Fair Credit Reporting Act (1970), the
Privacy Act (1974), the Family Educational Rights and Privacy Act
(1974), and the Right to Financial Privacy Act (1978). These key laws
were followed in the next decade by another series of statutes,
including the Privacy Protection Act (1980), the Electronic
Communications Privacy Act (1986), the Video Privacy Protection Act
(1988), and the Employee Polygraph Protection Act (1988). In the last
ten years, Congress and the President have passed additional legal
privacy protection through, among others, the Telephone Consumer
Protection Act (1991), the Driver's Privacy Protection Act (1994), the
Telecommunications Act (1996), the Children\'s Online Privacy Protection
Act (1998), the Identity Theft and Assumption Deterrence Act (1998), and
Title V of the Gramm-Leach-Bliley Act (1999) governing financial
privacy.
In 1997, a Presidential advisory commission, the Advisory Commission on
Consumer Protection and Quality in the Health Care Industry, recognized
the need for patient privacy protection in its recommendations for a
Consumer Bill of Rights and Responsibilities (November 1997). In 1997,
Congress enacted the Balanced Budget Act (Public Law 105-34), which
added language to the Social Security Act (18 U.S.C. 1852) to require
Medicare+Choice organizations to establish safeguards for the privacy of
individually identifiable patient information. Similarly, the Veterans
Benefits section of the U.S. Code provides for confidentiality of
medical records in cases involving drug abuse, alcoholism or alcohol
abuse, HIV infection, or sickle cell anemia (38 U.S.C. 7332).
As described in more detail in the next section, Congress recognized the
importance of protecting the privacy of health information by enacting
the Health Insurance Portability and Accountability Act of 1996. The Act
called on Congress to enact a medical privacy statute and asked the
Secretary of Health and Human Services to provide Congress with
recommendations for protecting the confidentiality of health care
information. The Congress further recognized the importance of such
standards by providing the Secretary with authority to promulgate
regulations on health care privacy in the event that lawmakers were
unable to act within the allotted three years.
Finally, it also is important for the U.S. to join the rest of the
developed world in establishing basic medical privacy protections. In
1995, the European Union (EU) adopted a Data Privacy Directive requiring
its 15 member states to adopt consistent privacy laws by October 1998.
The EU urged all other nations to do the same or face the potential loss
of access to information from EU countries.
**Statutory Background**
***History of the Privacy Component of the Administrative Simplification
Provisions***
The Congress addressed the opportunities and challenges presented by the
rapid evolution of health information systems in the Health Insurance
Portability and Accountability Act of 1996 (HIPAA), Public Law 104-191,
which was enacted on August 21, 1996. Sections 261 through 264 of HIPAA
are known as the Administrative Simplification provisions. The major
part of these Administrative Simplification provisions are found at
section 262 of HIPAA, which enacted a new part C of title XI of the
Social Security Act (hereinafter we refer to the Social Security Act as
the "Act" and we refer to all other laws cited in this document by their
names).
In section 262, Congress primarily sought to facilitate the efficiencies
and cost savings for the health care industry that the increasing use of
electronic technology affords. Thus, section 262 directs HHS to issue
standards to facilitate the electronic exchange of information with
respect to financial and administrative transactions carried out by
health plans, health care clearinghouses, and health care providers who
transmit information electronically in connection with such
transactions.
At the same time, Congress recognized the challenges to the
confidentiality of health information presented by the increasing
complexity of the health care industry, and by advances in health
information systems technology and communications. Section 262 thus also
directs HHS to develop standards to protect the security, including the
confidentiality and integrity, of health information.
Congress has long recognized the need for protection of health
information privacy generally, as well as the privacy implications of
electronic data interchange and the increased ease of transmitting and
sharing individually identifiable health information. Congress has been
working on broad health privacy legislation for many years and, as
evidenced by the self-imposed three year deadline included in the HIPAA,
discussed below, believes it can and should enact such legislation. A
significant portion of the first Administrative Simplification section
debated on the floor of the Senate in 1994 (as part of the Health
Security Act) consisted of privacy provisions. In the version of the
HIPAA passed by the House of Representatives in 1996, the requirement
for the issuance of privacy standards was located in the same section of
the bill (section 1173) as the requirements for issuance of the other
HIPAA Administrative Simplification standards. In conference, the
requirement for privacy standards was moved to a separate section in the
same part of HIPAA, section 264, so that Congress could link the Privacy
standards to Congressional action.
Section 264(b) requires the Secretary of HHS to develop and submit to
the Congress recommendations for:
· The rights that an individual who is a subject of individually
identifiable health information should have.
· The procedures that should be established for the exercise of such
rights.
· The uses and disclosures of such information that should be authorized
or required.
The Secretary's Recommendations were submitted to the Congress on
September 11, 1997. Section 264(c)(1) provides that:
> If legislation governing standards with respect to the privacy of
> individually identifiable health information transmitted in connection
> with the transactions described in section 1173(a) of the Social
> Security Act (as added by section 262) is not enacted by \[August 21,
> 1999\], the Secretary of Health and Human Services shall promulgate
> final regulations containing such standards not later than \[February
> 21, 2000\]. Such regulations shall address at least the subjects
> described in subsection (b).
As the Congress did not enact legislation regarding the privacy of
individually identifiable health information prior to August 21, 1999,
HHS published proposed rules setting forth such standards on November 3,
1999, 64 FR 59918, and is now publishing the mandated final regulation.
These privacy standards have been, and continue to be, an integral part
of the suite of Administrative Simplification standards intended to
simplify and improve the efficiency of the administration of our health
care system.
***The Administrative Simplification Provisions, and Regulatory Actions
To Date***
Part C of title XI consists of sections 1171 through 1179 of the Act.
These sections define various terms and impose several requirements on
HHS, health plans, health care clearinghouses, and health care providers
who conduct the identified transactions electronically.
The first section, section 1171 of the Act, establishes definitions for
purposes of part C of title XI for the following terms: code set, health
care clearinghouse, health care provider, health information, health
plan, individually identifiable health information, standard, and
standard setting organization.
Section 1172 of the Act makes the standard adopted under part C
applicable to: (1) health plans, (2) health care clearinghouses, and (3)
health care providers who transmit health information in electronic form
in connection with transactions referred to in section 1173(a)(1) of the
Act (hereinafter referred to as the "covered entities"). Section 1172
also contains procedural requirements concerning the adoption of
standards, including the role of standard setting organizations and
required consultations, summarized in subsection F and section VI,
below.
Section 1173 of the Act requires the Secretary to adopt standards for
transactions, and data elements for such transactions, to enable health
information to be exchanged electronically. Section 1173(a)(1) describes
the transactions to be promulgated, which include the nine transactions
listed in section 1173(a)(2) and other transactions determined
appropriate by the Secretary. The remainder of section 1173 sets out
requirements for the specific standards the Secretary is to adopt:
unique health identifiers, code sets, security standards, electronic
signatures, and transfer of information among health plans. Of
particular relevance to this proposed rule is section 1173(d), the
security standard provision. The security standard authority applies to
both the transmission and the maintenance of health information, and
requires the entities described in section 1172(a) to maintain
reasonable and appropriate safeguards to ensure the integrity and
confidentiality of the information, protect against reasonably
anticipated threats or hazards to the security or integrity of the
information or unauthorized uses or disclosures of the information, and
to ensure compliance with part C by the entity's officers and employees.
In section 1174 of the Act, the Secretary is required to establish
standards for all of the above transactions, except claims attachments,
by February 21, 1998. The statutory deadline for the claims attachment
standard is February 21, 1999.
As noted above, a proposed rule for most of the transactions was
published on May 7, 1998, and the final Transactions Rule was
promulgated on August 17, 2000. The delay was caused by the deliberate
consensus building process, working with industry, and the large number
of comments received (about 17,000). In addition, in a series of Notices
of Proposed Rulemakings, HHS published other proposed standards, as
described above. Each of these steps was taken in concert with the
affected professions and industries, to ensure rapid adoption and
compliance.
Generally, after a standard is established, it may not be changed during
the first year after adoption except for changes that are necessary to
permit compliance with the standard. Modifications to any of these
standards may be made after the first year, but not more frequently than
once every 12 months. The Secretary also must ensure that procedures
exist for the routine maintenance, testing, enhancement, and expansion
of code sets and that there are crosswalks from prior versions.
Section 1175 of the Act prohibits health plans from refusing to process,
or from delaying processing of, a transaction that is presented in
standard format. It also establishes a timetable for compliance: each
person to whom a standard or implementation specification applies is
required to comply with the standard within 24 months (or 36 months for
small health plans) of its adoption. A health plan or other entity may,
of course, comply voluntarily before the effective date. The section
also provides that compliance with modifications to standards or
implementation specifications must be accomplished by a date designated
by the Secretary, which date may not be earlier than 180 days from the
notice of change.
Section 1176 of the Act establishes civil monetary penalties for
violation of the provisions in part C of title XI of the Act, subject to
several limitations. Penalties may not be more than \$100 per person per
violation and not more than \$25,000 per person for violations of a
single standard for a calendar year. The procedural provisions of
section 1128A of the Act apply to actions taken to obtain civil monetary
penalties under this section.
Section 1177 establishes penalties for any person that knowingly uses a
unique health identifier, or obtains or discloses individually
identifiable health information in violation of the part. The penalties
include: (1) a fine of not more than \$50,000 and/or imprisonment of not
more than 1 year; (2) if the offense is "under false pretenses," a fine
of not more than \$100,000 and/or imprisonment of not more than 5 years;
and (3) if the offense is with intent to sell, transfer, or use
individually identifiable health information for commercial advantage,
personal gain, or malicious harm, a fine of not more than \$250,000
and/or imprisonment of not more than 10 years.
Under section 1178 of the Act, the requirements of part C, as well as
any standards or implementation specifications adopted thereunder,
preempt contrary state law. There are three exceptions to this general
rule of preemption: state laws that the Secretary determines are
necessary for certain purposes set forth in the statute; state laws that
the Secretary determines address controlled substances; and state laws
relating to the privacy of individually identifiable health information
that are contrary to and more stringent than the federal requirements.
There also are certain areas of state law (generally relating to public
health and oversight of health plans) that are explicitly carved out of
the general rule of preemption and addressed separately.
Section 1179 of the Act makes the above provisions inapplicable to
financial institutions (as defined by section 1101 of the Right to
Financial Privacy Act of 1978) or anyone acting on behalf of a financial
institution when "authorizing, processing, clearing, settling, billing,
transferring, reconciling, or collecting payments for a financial
institution."
Finally, as explained above, section 264 requires the Secretary to issue
standards with respect to the privacy of individually identifiable
health information. Section 264 also contains a preemption provision
that provides that contrary provisions of state laws that are more
stringent than the federal standards, requirements, or implementation
specifications will not be preempted.
**Our Approach to This Regulation**
***Balance***
A number of facts informed our approach to this regulation. Determining
the best approach to protecting privacy depends on where we start, both
with respect to existing legal expectations and also with respect to the
expectations of individuals, health care providers, payers and other
stakeholders. From the comments we received on the proposed rule, and
from the extensive fact finding in which we engaged, a confused picture
developed. We learned that stakeholders in the system have very
different ideas about the extent and nature of the privacy protections
that exist today, and very different ideas about appropriate uses of
health information. This leads us to seek to balance the views of the
different stakeholders, weighing the varying interests on each
particular issue with a view to creating balance in the regulation as a
whole.
For example, we received hundreds of comments explaining the legitimacy
of various uses and disclosure of health information. We agree that many
uses and disclosures of health information are "legitimate," but that is
not the end of the inquiry. Neither privacy, nor the important social
goals described by the commenters, are absolutes. In this regulation, we
are asking health providers and institutions to add privacy into the
balance, and we are asking individuals to add social goals into the
balance.
The vast difference among regulated entities also informed our approach
in significant ways. This regulation applies to solo practitioners, and
multi-national health plans. It applies to pharmacies and information
clearinghouses. These entities differ not only in the nature and scope
of their businesses, but also in the degree of sophistication of their
information systems and information needs. We therefore designed the
core requirements of this regulation to be flexible and "scalable." This
is reflected throughout the rule, particularly in the implementation
specifications for making the 'minimum necessary' uses and disclosures,
and in the administrative policies and procedures requirements.
We also are informed by the rapid evolution in industry organization and
practice. Our goal is to enhance privacy protections in ways that do not
impede this evolution. For example, we received many comments asking us
to assign a status under this regulation based on a label or title. For
example, many commenters asked whether "disease management" is a "health
care operation," or whether a "pharmacy benefits manager" is a covered
entity. From the comments and our fact-finding, however, we learned that
these terms do not have consistent meanings today; rather, they
encompass diverse activities and information practices. Further, the
statutory definitions of key terms such as 'health care provider' and
'health care clearinghouse' describe functions, not specific types of
persons or entities. To respect both the Congressional approach and
industry evolution, we design the rule to follow activities and
functions, not titles and labels.
Similarly, many comments asked whether a particular person would be a
"business associate" under the rule, based on the nature of the person's
business. Whether a business associate arrangement must exist under the
rule, however, depends on the relationship between the entities and the
services being performed, not on the type of persons or companies
involved.
Our approach is also significantly informed by the limited jurisdiction
conferred by HIPAA. In large part, we have the authority to regulate
those who create and disclose health information, but not many key
stakeholders who receive that health information from a covered entity.
Again, this led us to look to the balance between the burden on covered
entities and need to protect privacy in determining our approach to such
disclosures. In some instances, we approach this dilemma by requiring
covered entities to obtain a representation or documentation of purpose
from the person requesting information. While there would be advantages
to legislation regulating such third persons directly, we cannot justify
abandoning any effort to enhance privacy.
It also became clear from the comments and our fact-finding that we have
expectations as a society that conflict with individuals' views about
the privacy of health information. We expect the health care industry to
develop treatment protocols for the delivery of high quality health
care. We expect insurers and the government to reduce fraud in the
health care system. We expect to be protected from epidemics, and we
expect medical research to produce miracles. We expect the police to
apprehend suspects, and we expect to pay for our care by credit card.
All of these activities involve disclosure of health information to
someone other than our physician.
While most commenters support the concept of health privacy in general,
many go on to describe activities that depend on the disclosure of
health information and urge us to protect those information flows.
Section III, in which we respond to the comments, describes our approach
to balancing these conflicting expectations.
Finally, we note that many commenters were concerned that this
regulation would lessen current privacy protections. It is important to
understand this regulation as a new federal floor of privacy protections
that does not disturb more protective rules or practices. Nor do we
intend this regulation to describe a set of a "best practices." Rather,
this regulation describes a set of basic consumer protections and a
series of regulatory permissions for use and disclosure of health
information. The protections are a mandatory floor, which other
governments and any covered entity may exceed. The permissions are just
that, permissive \-- the only disclosures of health information required
under this rule are to the individual who is the subject of the
information or to the Secretary for enforcement of this rule. We expect
covered entities to rely on their professional ethics and use their own
best judgements in deciding which of these permissions they will use.
***Combining Workability with New Protections***
This rule establishes national minimum standards to protect the privacy
of individually identifiable health information in prescribed settings.
The standards address the many varied uses and disclosures of
individually identifiable health information by health plans, certain
health care providers and health care clearinghouses. The complexity of
the standards reflects the complexity of the health care marketplace to
which they apply and the variety of subjects that must be addressed. The
rule applies not only to the core health care functions relating to
treating patients and reimbursing health care providers, but also to
activities that range from when individually identifiable health
information should be available for research without authorization to
whether a health care provider may release protected health information
about a patient for law enforcement purposes. The number of discrete
provisions, and the number of commenters requesting that the rule
recognize particular activities, is evidence of the significant role
that individually identifiable health information plays in many vital
public and private concerns.
At the same time, the large number of comments from individuals and
groups representing individuals demonstrate the deep public concern
about the need to protect the privacy of individually identifiable
health information. The discussion above is rich with evidence about the
importance of protecting privacy and the potential adverse consequences
to individuals and their health if such protections are not extended.
The need to balance these competing interests -- the necessity of
protecting privacy and the public interest in using identifiable health
information for vital public and private purposes -- in a way that is
also workable for the varied stakeholders causes much of the complexity
in the rule. Achieving workability without sacrificing protection means
some level of complexity, because the rule must track current practices
and current practices are complex. We believe that the complexity
entailed in reflecting those practices is better public policy than a
perhaps simpler rule that disturbed important information flows.
Although the rule taken as a whole is complicated, we believe that the
standards are much less complex as they apply to particular actors. What
a health plan or covered health care provider must do to comply with the
rule is clear, and the two-year delayed implementation provides a
substantial period for trade and professional associations, working with
their members, to assess the effects of the standards and develop
policies and procedures to come into compliance with them. For
individuals, the system may look substantially more complicated because,
for the first time, we are ensuring that individuals will receive
detailed information about how their individually identifiable health
information may be used and disclosed. We also provide individuals with
additional tools to exercise some control over those uses and
disclosures. The additional complexity for individuals is the price of
expanding their understanding and their rights.
The Department will work actively with members of the health care
industry, representatives of individuals and others during the
implementation of this rule. As stated elsewhere, our focus is to
develop broader understanding of how the standards work and to
facilitate compliance. We intend to provide guidance and check lists as
appropriate, particularly to small businesses affected by the rule. We
also will work with trade and professional associations to develop
guidance and provide technical assistance so that they can help their
members understand and comply with these new standards. If this effort
is to succeed, the various public and private participants inside and
outside of the health care system will need to work together to assure
that the competing interests described above remain in balance and that
an ethic that recognizes their importance is established.
***Enforcement***
The Secretary has decided to delegate her responsibility under this
regulation to the Department\'s Office for Civil Rights (OCR). OCR will
be responsible for enforcement of this regulation. Enforcement
activities will include working with covered entities to secure
voluntary compliance through the provision of technical assistance and
other means; responding to questions regarding the regulation and
providing interpretations and guidance; responding to state requests for
exception determinations; investigating complaints and conducting
compliance reviews; and, where voluntary compliance cannot be achieved,
seeking civil monetary penalties and making referrals for criminal
prosecution.
***Consent***
*Current law and practice*
The issue that drew the most comments overall is the question of when
individuals' permission should be obtained prior to use or disclosure of
their health information. We learned that individuals' views and the
legal view of 'consent' for use and disclosure of health information are
different and in many ways incompatible. Comments from individuals
revealed a common belief that, today, people must be asked permission
for each and every release of their health information. Many believe
that they "own" the health records about them. However, current law and
practice do not support this view.
Current privacy protection practices are determined in part by the
standards and practices that the professional associations have adopted
for their members. Professional codes of conduct for ethical behavior
generally can be found as opinions and guidelines developed by
organizations such as the American Medical Association, American Nurses'
Association, the American Hospital Association, the American Psychiatric
Association, and the American Dental Association. These are generally
issued though an organization's governing body. The codes do not have
the force of law, but providers often recognize them as binding rules.
Our review of professional codes of ethics revealed partial, but loose,
support for individuals' expectations of privacy. For example, the
American Medical Association's Code of Ethics recognizes both the right
to privacy and the need to balance it against societal needs. It reads
in part: "conflicts between a patient\'s right to privacy and a third
party\'s need to know should be resolved in favor of the patient, except
where that would result in serious health hazard or harm to the patient
or others." AMA Policy No 140.989. See also, Mass. Med. Society,
*Patient Privacy and Confidentiality* (1996), at 14:
> Patients enter treatment with the expectation that the information
> they share will be used exclusively for their clinical care.
> Protection of our patients' confidences is an integral part of our
> ethical training.
These codes, however, do not apply to many who obtain information from
providers. For example, the National Association of Insurance
Commissioners model code, "Health Information Privacy Model Act"(1998),
applies to insurers but has not been widely adopted. Codes of ethics are
also often written in general terms that do not provide guidance to
providers and plans confronted with specific questions about protecting
health information.
State laws are a crucial means of protecting health information, and
today state laws vary dramatically. Some states defer to the
professional codes of conduct, others provide general guidelines for
privacy protection, and others provide detailed requirements relating to
the protection of information relating to specific diseases or to entire
classes of information. Cf., D.C. Code Ann. §2-3305.14(16) and Haw. Rev.
Stat. 323C, et seq. In general, state statutes and case law addressing
consent to use of health information do not support the public's strong
expectations regarding consent for use and disclosure of health
information. Only about half of the states have a general law that
prohibits disclosure of health information without patient authorization
and some of these are limited to hospital medical records.
Even when a state has a law limiting disclosure of health information,
the law typically exempts many types of disclosure from the
authorization requirement. Georgetown Study, Key Findings; Lisa Dahm,
"50-State Survey on Patient Health Care Record Confidentiality,"
American Health Lawyers Association (1999). One of the most common
exemptions from a consent requirement is disclosure of health
information for treatment and related purposes. See, e.g., Wis.Stat. §
164.82; Cal. Civ. Code 56:10; National Conference of Commissioners on
Uniform State Laws, [Uniform Health-Care Information Act, Minneapolis,
MN, August 9, 1985]{.underline}. Some states include utilization review
and similar activities in the exemption. See, e.g., Ariz. Rev. Stat. §
12-2294. Another common exemption from consent is disclosure of health
information for purposes of obtaining payment. See, e.g., Fla. Stat.
Ann. § 455.667; Tex. Rev. Civ. Stat. Art. 4495, § 5.08(h); 410 Ill.
Comp. Stat. 50/3(d). Other common exemptions include disclosures for
emergency care, and for disclosures to government authorities (such as a
department of public health). See Gostin Study, at 1-2; 48-51. Some
states also exempt disclosure to law enforcement officials (e.g.,
Massachusetts, Ch. 254 of the Acts of 2000), coroners (Wis. Stat. §
146.82), and for such purposes as business operations, oversight,
research, and for directory information. Under these exceptions,
providers can disclose health information without any consent or
authorization from the patient. When states require specific, written
authorization for disclosure of health information, the authorizations
are usually only required for certain types of disclosures or certain
types of information, and one authorization can suffice for multiple
disclosures over time.
The states that do not have laws prohibiting disclosure of health
information impose no specific requirements for consent or authorization
prior to release of health information. There may, however, be other
controls on release of health information. For instance, most health
care professional licensure laws include general prohibitions against
'breaches of confidentiality.' In some states, patients can hold
providers accountable for some unauthorized disclosures of health
information about them under various tort theories, such as invasion of
privacy and breach of a confidential relationship. While these controls
may affect certain disclosure practices, they do not amount to a
requirement that a provider obtain authorization for each and every
disclosure of health information.
Further, patients are typically not given a choice; they must sign the
"consent" in order to receive care. As the Georgetown Study points out,
"In effect, the authorization may function more as a waiver of consent
\-- the patient may not have an opportunity to object to any
disclosures." Georgetown Study, Key Findings.
In the many cases where neither state law nor professional ethical
standards exist, the only privacy protection individuals have is limited
to the policies and procedures that the health care entity adopts.
Corporate privacy policies are often proprietary. While several
professional associations attached their privacy principles to their
comments, health care entities did not. One study we found indicates
that these policies are not adequate to provide appropriate privacy
protections and alleviate public concern. The Committee on Maintaining
Privacy and Security in Health Care Applications of the National
Information Infrastructure made multiple findings highlighting the need
for heightened privacy and security, including:
> Finding 5: The greatest concerns regarding the privacy of health
> information derives from widespread sharing of patient information
> throughout the health care industry and the inadequate federal and
> state regulatory framework for systematic protection of health
> information.
[For the Record: Protecting Electronic Health Information]{.underline},
National Academy Press, Washington DC, 1997.
*Consent under this rule*
In the NPRM, we expressed concern about the coercive nature of consents
currently obtained by providers and plans relating to the use and
disclosure of health information. We also expressed concern about the
lack of information available to the patient during the process, and the
fact that patients often were not even presented with a copy of the
consent that they have signed. These and other concerns led us to
propose that covered entities be permitted to use and disclose protected
health information for treatment, payment and health care operations
without the express consent of the subject individual.
In the final rule, we alter our proposed approach and require, in most
instances, that health care providers who have a direct treatment
relationship with their patients obtain the consent of their patients to
use and disclose protected health information for treatment, payment and
health care operations. While our concern about the coerced nature of
these consents remains, many comments that we received from individuals,
health care professionals, and organizations that represent them
indicated that both patients and practitioners believe that patient
consent is an important part of the current health care system and
should be retained.
Providing and obtaining consent clearly has meaning for patients and
practitioners. Patient advocates argued that the act of signing focuses
the patient's attention on the substance of the transaction and provides
an opportunity for the patient to ask questions about or seek
modifications in the provider's practices. Many health care
practitioners and their representatives argued that seeking a patient's
consent to disclose confidential information is an ethical requirement
that strengthens the physician-patient relationship. Both practitioners
and patients argued that the approach proposed in the NPRM actually
reduced patient protections by eliminating the opportunity for patients
to agree to how their confidential information would be used and
disclosed.
While we believe that the provisions in the NPRM that provided for
detailed notice to the patient and the right to request restrictions
would have provided an opportunity for patients and providers to discuss
and negotiate over information practices, it is clear from the comments
that many practitioners and patients believe the approach proposed in
the NPRM is not an acceptable replacement for the patient providing
consent. To encourage a more informed interaction between the patient
and the provider during the consent process, the final rule requires
that the consent form that is presented to the patient be accompanied by
a notice that contains a detailed discussion of the provider's health
information practices. The consent form must reference the notice and
also must inform the patient that he or she has the right to ask the
health care provider to request certain restrictions as to how the
information of the patient will be used or disclosed. Our goal is to
provide an opportunity for and to encourage more informed discussions
between patients and providers about how protected health information
will be used and disclosed within the health care system.
We considered and rejected other approaches to consent, including those
that involved individuals providing a global consent to uses and
disclosures when they sign up for insurance. While such approaches do
require the patient to provide consent, it is not really an informed one
or a voluntary one. It is also unclear how a consent obtained at the
enrollment stage would be meaningfully communicated to the many
providers who create the health information in the first instance. The
ability to negotiate restrictions or otherwise have a meaningful
discussion with the front-line provider would be independent of, and
potentially in conflict with, the consent obtained at the enrollment
stage. In addition, employers today are moving toward simplified
enrollment forms, using check-off boxes and similar devices. The
opportunity for any meaningful consideration or interaction at that
point is slight. For these and other reasons, we decided that, to the
extent a consent can accomplish the goal sought by individuals and
providers, it must be focused on the direct interaction between an
individual and provider.
The comments and fact-finding indicate that our approach will not
significantly change the administrative aspect of consent as it exists
today. Most direct treatment providers today obtain some type of consent
for some uses and disclosures of health information. Our regulation will
ensure that those consents cover the routine uses and disclosures of
health information, and provide an opportunity for individuals to obtain
further information and have further discussion, should they so desire.
***Administrative Costs***
Section 1172(b) of the Act provides that \"\[a\]ny standard adopted
under this part \[part C of title XI of the Act\] shall be consistent
with the objective of reducing the administrative costs of providing and
paying for health care.\" The privacy and security standards are the
platform on which the remaining standards rest; indeed, the design of
part C of title XI makes clear that the various standards are intended
to function together. Thus, the costs of privacy and security are
properly attributable to the suite of administrative simplification
regulations as a whole, and the cost savings realized should likewise be
calculated on an aggregated basis, as is done below. Because the privacy
standards are an integral and necessary part of the suite of
Administrative Simplification standards, and because that suite of
standards will result in substantial administrative cost savings, the
privacy standards are "consistent with the objective of reducing the
administrative costs of providing and paying for health care.\"
As more fully discussed in the Regulatory Impact and Regulatory
Flexibility analyses below, we recognize that these privacy standards
will entail substantial initial and ongoing administrative costs for
entities subject to the rules. It is also the case that the privacy
standards, like the security standards authorized by section 1173(d) of
the Act, are necessitated by the technological advances in information
exchange that the remaining Administrative Simplification standards
facilitate for the health care industry. The same technological advances
that make possible enormous administrative cost savings for the industry
as a whole have also made it possible to breach the security and privacy
of health information on a scale that was previously inconceivable. The
Congress recognized that adequate protection of the security and privacy
of health information is a [sine qua non]{.underline} of the increased
efficiency of information exchange brought about by the electronic
revolution, by enacting the security and privacy provisions of the law.
Thus, as a matter of policy as well as law, the administrative standards
should be viewed as a whole in determining whether they are \"consistent
with\" the objective of reducing administrative costs.
***Consultations***
The Congress required the Secretary to consult with specified groups in
developing the standards under sections 262 and 264. Section 264(d) of
HIPAA specifically requires the Secretary to consult with the National
Committee on Vital and Health Statistics (NCVHS) and the Attorney
General in carrying out her responsibilities under the section. Section
1172(b)(3) of the Act, which was enacted by section 262, requires that,
in developing a standard under section 1172 for which no standard
setting organization has already developed a standard, the Secretary
must, before adopting the standard, consult with the National Uniform
Billing Committee (NUBC), the National Uniform Claim Committee (NUCC),
the Workgroup for Electronic Data Interchange (WEDI), and the American
Dental Association (ADA). Section 1172(f) also requires the Secretary to
rely on the recommendations of the NCVHS and consult with other
appropriate federal and state agencies and private organizations.
We engaged in the required consultations including the Attorney General,
NUBC, NUCC, WEDI and the ADA. We consulted with the NCVHS in developing
the Recommendations, upon which this proposed rule is based. We
continued to consult with this committee by requesting the committee to
review the proposed rule and provide comments prior to its publication,
and by reviewing transcripts of its public meeting on privacy and
related topics. We consulted with representatives of the National
Congress of American Indians, the National Indian Health Board, and the
self governance tribes. We also met with representatives of the National
Governors' Association, the National Conference of State Legislatures,
the National Association of Public Health Statistics and Information
Systems, and a number of other state organizations to discuss the
framework for the proposed rule, issues of special interests to the
states, and the process for providing comments on the proposed rule.
Many of these groups submitted comments to the proposed rule, and those
were taken into account in developing the final regulation.
In addition to the required consultations, we met with numerous
individuals, entities, and agencies regarding the regulation, with the
goal of making these standards as compatible as possible with current
business practices, while still enhancing privacy protection. During the
open comment period, we met with dozens of groups.
Relevant federal agencies participated in the interagency working groups
that developed the NPRM and the final regulation, with additional
representatives from all operating divisions and many staff offices of
HHS. The following federal agencies and offices were represented on the
interagency working groups: the Department of Justice, the Department of
Commerce, the Social Security Administration, the Department of Defense,
the Department of Veterans Affairs, the Department of Labor, the Office
of Personnel Management, and the Office of Management and Budget.
1. SECTION-BY-SECTION DESCRIPTION OF RULE PROVISIONS
**PART 160 -- SUBPART A -- GENERAL PROVISIONS**
Part 160 applies to all the administrative simplification regulations.
We include the entire regulation text in this rule, not just those
provisions relevant to this Privacy regulation. For example, the term
"trading partner" is defined here, for use in the Health Insurance
Reform: Standards for Electronic Transactions regulation, published at
65 FR 50312, August 17, 2000 (the "Transactions Rule"). It does not
appear in the remainder of this Privacy rule.
Sections 160.101 and 160.104 of Subpart A of part 160 were promulgated
in the Transactions Rule, and we do not change them here. We do,
however, make changes and additions to § 160.103, the definitions
section of Subpart A. The definitions that were promulgated in the
Transactions Rule and that remain unchanged here are: Act, ANSI, covered
entity, compliance date, group health plan, HCFA, HHS, health care
provider, health information, health insurance issuer, health
maintenance organization, modify or modification, Secretary, small
health plan, standard setting organization, and trading partner
agreement. Of these terms, we discuss further in this preamble only
covered entity and health care provider.
**SECTION 160.102 - APPLICABILITY**
The proposed rule stated that the subchapter (Parts 160, 162, and 164)
applies to the entities set out at section 1172(a) of the Act: health
plans, health care clearinghouses, and health care providers who
transmit any health information in electronic form in connection with a
transaction covered by the subchapter. The final rule adds a provision
(§ 160.102(b)) clarifying that to the extent required under section
201(a)(5) of HIPAA, nothing in the subchapter is to be construed to
diminish the authority of any Inspector General. This was done in
response to comment, to clarify that the administrative simplification
rules, including the rules below, do not conflict with the cited
provision of HIPAA.
**SECTION 160.103 - DEFINITIONS**
***Business Associate.***
We proposed to define the term "business partner" to mean, with respect
to a covered entity, a person to whom the covered entity discloses
protected health information so that the person can carry out, assist
with the performance of, or perform on behalf of, a function or activity
for the covered entity. "Business partner" would have included
contractors or other persons who receive protected health information
from the covered entity (or from another business partner of the covered
entity) for the purposes described in the previous sentence, including
lawyers, auditors, consultants, third-party administrators, health care
clearinghouses, data processing firms, billing firms, and other covered
entities. "Business partner" would have excluded persons who are within
the covered entity's workforce, as defined in this section.
This rule reflects the change in the name from "business partner" to
"business associate," included in the Transactions Rule.
In the final rule, we change the definition of "business associate" to
clarify the circumstances in which a person is acting as a business
associate of a covered entity. The changes clarify that the business
association occurs when the right to use or disclose the protected
health information belongs to the covered entity, and another person is
using or disclosing the protected health information (or creating,
obtaining and using the protected health information) to perform a
function or activity on behalf of the covered entity. We also clarify
that providing specified services to a covered entity creates a business
associate relationship if the provision of the service involves the
disclosure of protected health information to the service provider. In
the proposed rule, we had included a list of persons that were
considered to be business partners of the covered entity. However, it is
not always clear whether the provision of certain services to a covered
entity is "for" the covered entity or whether the service provider is
acting "on behalf of" the covered entity. For example, a person
providing management consulting services may need protected health
information to perform those services, but may not be acting "on behalf
of" the covered entity. This we believe led to some general confusion
among the commenters as to whether certain arrangements fell within the
definition of a business partner under the proposed rule. The
construction of the final rule clarifies that the provision of the
specified services gives rise to a business associate relationship if
the performance of the service involves disclosure of protected health
information by the covered entity to the business associate. The
specified services are legal, actuarial, accounting, consulting,
management, administrative accreditation, data aggregation, and
financial services. The list is intended to include the types of
services commonly provided to covered entities where the disclosure of
protected health information is routine to the performance of the
service, but when the person providing the service may not always be
acting "on behalf of" the covered entity.
In the final rule, we reorganize the list of examples of the functions
or activities that may be conducted by business associates. We place a
part of the proposed list in the portion of the definition that
addresses when a person is providing functions or activities for or on
behalf of a covered entity. We place other parts of the list in the
portion of the definition that specifies the services that give rise to
a business associate relationship, as discussed above. We also have
expanded the examples to provide additional guidance and in response to
questions from commenters.
We have added data aggregation to the list of services that give rise to
a business associate relationship. Data aggregation, as discussed below,
is where a business associate in its capacity as the business associate
of one covered entity combines the protected health information of such
covered entity with protected health information received by the
business associate in its capacity as a business associate of another
covered entity in order to permit the creation of data for analyses that
relate to the health care operations of the respective covered entities.
Adding this service to the business associate definition clarifies the
ability of covered entities to contract with business associates to
undertake quality assurance and comparative analyses that involve the
protected health information of more than one contracting covered
entity. For example, a state hospital association could act as a
business associate of its member hospitals and could combine data
provided to it to assist the hospitals in evaluating their relative
performance in areas such as quality, efficiency and other patient care
issues. As discussed below, however, the business associate contracts of
each of the hospitals would have to permit the activity, and the
protected health information of one hospital could not be disclosed to
another hospital unless the disclosure is otherwise permitted by the
rule.
The definition also states that a business associate may be a covered
entity, and that business associate excludes a person who is part of the
covered entity's workforce.
We also clarify in the final rule that a business association arises
with respect to a covered entity when a person performs functions or
activities on behalf of, or provides the specified services to or for,
an organized health care health care arrangement in which the covered
entity participates. This change recognizes that where covered entities
participate in certain joint arrangements for the financing or delivery
of health care, they often contract with persons to perform functions or
to provide services for the joint arrangement. This change is consistent
with changes made in the final rule to the definition of health care
operations, which permits covered entities to use or disclose protected
health information not only for their own health care operations, but
also for the operations of an organized health care arrangement in which
the covered entity participates. By making these changes, we avoid the
confusion that could arise in trying to determine whether a function or
activity is being provided on behalf of (or if a specified service is
being provided to or for) a covered entity or on behalf of or for a
joint enterprise involving the covered entity. The change clarifies that
in either instance the person performing the function or activity (or
providing the specified service) is a business associate.
We also add language to the final rule that clarifies that the mere fact
that two covered entities participate in an organized health care
arrangement does not make either of the covered entities a business
associate of the other covered entity. The fact that the entities
participate in joint health care operations or other joint activities,
or pursue common goals through a joint activity, does not mean that one
party is performing a function or activity on behalf of the other party
(or is providing a specified services to or for the other party).
In general under this provision, actions relating to the protected
health information of an individual undertaken by a business associate
are considered, for the purposes of this rule, to be actions of the
covered entity, although the covered entity is subject to sanctions
under this rule only if it has knowledge of the wrongful activity and
fails to take the required actions to address the wrongdoing. For
example, if a business associate maintains the medical records or
manages the claims system of a covered entity, the covered entity is
considered to have protected health information and the covered entity
must ensure that individuals who are the subject of the information can
have access to it pursuant to § 164.524.
The business associate relationship does not describe all relationships
between covered entities and other persons or organizations. While we
permit uses or disclosures of protected health information for a variety
of purposes, business associate contracts or other arrangements are only
required for those cases in which the covered entity is disclosing
information to someone or some organization that will use the
information on behalf of the covered entity, when the other person will
be creating or obtaining protected health information on behalf of the
covered entity, or when the business associate is providing the
specified services to the covered entity and the provision of those
services involves the disclosure of protected health information by the
covered entity to the business associate. For example, when a health
care provider discloses protected health information to health plans for
payment purposes, no business associate relationship is established.
While the covered provider may have an agreement to accept discounted
fees as reimbursement for services provided to health plan members,
neither entity is acting on behalf of or providing a service to the
other.
Similarly, where a physician or other provider has staff privileges at
an institution, neither party to the relationship is a business
associate based solely on the staff privileges because neither party is
providing functions or activities on behalf of the other. However, if a
party provides services to or for the other, such as where a hospital
provides billing services for physicians with staff privileges, a
business associate relationship may arise with respect to those
services. Likewise, where a group health plan purchases insurance or
coverage from a health insurance issuer or HMO, the provision of
insurance by the health insurance issuer or HMO to the group health plan
does not make the issuer a business associate. In such case, the
activities of the health insurance issuer or HMO are on their own behalf
and not on the behalf of the group health plan. We note that where a
group health plan contracts with a health insurance issuer or HMO to
perform functions or activities or to provide services that are in
addition to or not directly related to the provision of insurance, the
health insurance issuer or HMO may be a business associate with respect
to those additional functions, activities or services. We also note that
covered entities are permitted to disclose protected health information
to oversight agencies that act to provide oversight of federal programs
and the health care system. These oversight agencies are not performing
services for or on behalf of the covered entities and so are not
business associates of the covered entities. Therefore HCFA, the federal
agency that administers Medicare, is not required to enter into a
business associate contract in order to disclose protected health
information to the Department\'s Office of Inspector General.
We do not require a covered entity to enter into a business associate
contract with a person or organization that acts merely as a conduit for
protected health information (e.g., the US Postal Service, certain
private couriers and their electronic equivalents). A conduit transports
information but does not access it other than on a random or infrequent
basis as may be necessary for the performance of the transportation
service, or as required by law. Since no disclosure is intended by the
covered entity and the probability of exposure of any particular
protected health information to a conduit is very small, we do not
consider a conduit to be a business associate of the covered entity.
We do not consider a financial institution to be acting on behalf of a
covered entity, and therefore no business associate contract is
required, when it processes consumer-conducted financial transactions by
debit, credit or other payment card, clears checks, initiates or
processes electronic funds transfers, or conducts any other activity
that directly facilitates or effects the transfer of funds for
compensation for health care. A typical consumer-conducted payment
transaction is when a consumer pays for health care or health insurance
premiums using a check or credit card. In these cases the identity of
the consumer is always included and some health information (e.g.,
diagnosis or procedure) may be implied through the name of the health
care provider or health plan being paid. Covered entities that initiate
such payment activities must meet the minimum necessary disclosure
requirements described in the preamble to § 164.514.
***Covered Entity*.**
We provided this definition in the NPRM for convenience of reference and
proposed it to mean the entities to which part C of title XI of the Act
applies. These are the entities described in section 1172(a)(1): health
plans, health care clearinghouses, and health care providers who
transmit any health information in electronic form in connection with a
transaction referred to in section 1173(a)(1) of the Act (a "standard
transaction").
We note that health care providers who do not submit HIPAA transactions
in standard form become covered by this rule when other entities, such
as a billing service or a hospital, transmit standard electronic
transactions on their behalf. A provider could not circumvent these
requirements by assigning the task to its business associate since the
business associate would be considered to be acting on behalf of the
provider. See the definition of "business associate."
Where a public agency is required or authorized by law to administer a
health plan jointly with another entity, we consider each agency to be a
covered entity with respect to the health plan functions it performs.
Unlike private sector health plans, public plans are often required by
or expressly authorized by law to jointly administer health programs
that meet the definition of "health plan" under this regulation. In some
instances the public entity is required or authorized to administer the
program with another public agency. In other instances, the public
entity is required or authorized to administer the program with a
private entity. In either circumstance, we note that joint
administration does not meet the definition of "business associate" in §
164.501. Examples of joint administration include state and federal
administration of the Medicaid and SCHIP program, or joint
administration of a Medicare+Choice plan by the Health Care Financing
Administration and the issuer offering the plan.
***Health Care*.**
We proposed to define "health care" to mean the provision of care,
services, or supplies to a patient and to include any: (1) preventive,
diagnostic, therapeutic, rehabilitative, maintenance, or palliative
care, counseling, service, or procedure with respect to the physical or
mental condition, or functional status, of a patient or affecting the
structure or function of the body; (2) sale or dispensing of a drug,
device, equipment, or other item pursuant to a prescription; or (3)
procurement or banking of blood, sperm, organs, or any other tissue for
administration to patients.
The final rule revises both the NPRM definition and the definition as
provided in the Transactions Rule, to now mean "care, services, or
supplies related to the health of an individual. *Health care* includes
the following:
\(1\) Preventive, diagnostic, therapeutic, rehabilitative, maintenance,
or palliative care, and counseling, service, assessment, or procedure
with respect to the physical or mental condition, or functional status,
of an individual or that affects the structure or function of the body;
and
\(2\) Sale or dispensing of a drug, device, equipment, or other item in
accordance with a prescription.
We delete the term "providing" from the definition to delineate more
clearly the relationship between "treatment,"as the term is defined in §
164.501, and "health care." Other key revisions include adding the term
"assessment" in subparagraph (1) and deleting proposed subparagraph (3)
from the rule. Therefore the procurement or banking of organs, blood
(including autologous blood), sperm, eyes or any other tissue or human
product is not considered to be health care under this rule and the
organizations that perform such activities would not be considered
health care providers when conducting these functions. As described in §
164.512(h), covered entities are permitted to disclose protected health
information without individual authorization, consent, or agreement (see
below for explanation of authorizations, consents, and agreements) as
necessary to facilitate cadaveric donation.
***Health Care Clearinghouse*.**
In the NPRM, we defined "health care clearinghouse" as a public or
private entity that processes or facilitates the processing of
nonstandard data elements of health information into standard data
elements. The entity receives health care transactions from health care
providers or other entities, translates the data from a given format
into one acceptable to the intended payor or payors, and forwards the
processed transaction to appropriate payors and clearinghouses. Billing
services, repricing companies, community health management information
systems, community health information systems, and "value-added"
networks and switches would have been considered to be health care
clearinghouses for purposes of this part, if they perform the functions
of health care clearinghouses as described in the preceding sentences.
In the final regulation, we modify the definition of health care
clearinghouse to reflect changes in the definition published in the
Transactions Rule. The definition in the final rule is:
Health care clearinghouse means a public or private entity, including
billing services, repricing companies, community health management
information systems or community health information systems, and
"value-added" networks and switches, that does either of the following
functions:
\(1\) Processes or facilitates the processing of health information
received from another entity in a nonstandard format or containing
nonstandard data content into standard data elements or a standard
transaction.
\(2\) Receives a standard transaction from another entity and processes
or facilitates the processing of health information into nonstandard
format or nonstandard data content for the receiving entity.
We note here that the term health care clearinghouse may have other
meanings and connotations in other contexts, but the regulation defines
it specifically, and an entity is considered a health care clearinghouse
only to the extent that it meets the criteria in this definition.
Telecommunications entities that provide connectivity or mechanisms to
convey information, such as telephone companies and Internet Service
Providers, are not health care clearinghouses as defined in the rule
unless they actually carry out the functions outlined in our definition.
Value added networks and switches are not health care clearinghouses
unless they carry out the functions outlined in the definition. The
examples of entities in our proposed definition we continue to consider
to be health care clearinghouses, as well as any other entities that
meet that definition, to the extent that they perform the functions in
the definition.
In order to fall within this definition of clearinghouse, the covered
entity must perform the clearinghouse function on health information
received from some other entity. A department or component of a health
plan or health care provider that transforms nonstandard information
into standard data elements or standard transactions (or vice versa) is
not a clearinghouse for purposes of this rule, unless it also performs
these functions for another entity. As described in more detail in §
164.504(d), we allow affiliates to perform clearinghouse functions for
each other without triggering the definition of "clearinghouse" if the
conditions in § 164.504(d) are met.
***Health Care Provider*.**
We proposed to define health care provider to mean a provider of
services as defined in section 1861(u) of the Act, a provider of medical
or health services as defined in section 1861(s) of the Act, and any
other person or organization who furnishes, bills, or is paid for health
care services or supplies in the normal course of business.
In the final rule, we delete the term "services and supplies," in order
to eliminate redundancy within the definition. The definition also
reflects the addition of the applicable U.S.C. citations (42 U.S.C.
1395x(u) and 42 U.S.C. 1395x(s), respectively) for the referenced
provisions of the Act that were promulgated in the Transactions Rule.
To assist the reader, we also provide here excerpts from the relevant
sections of the Act. (Refer to the U.S.C. sections cited above for
complete definitions in sections 1861(u) and 1861(s).) Section 1861(u)
of the Act defines a "provider of services," to include, for example,
> a hospital, critical access hospital, skilled nursing facility,
> comprehensive outpatient rehabilitation facility, home health agency,
> hospice program, or, for purposes of section 1814(g) \[42 U.S.C.
> 1395f(g)\] and section 1835(e) \[42 U.S.C. 1395n(e)\], a fund."
> Section 1861(s) of the Act defines the term, "medical and other health
> services," and includes a list of covered items or services, as
> illustrated by the following excerpt:
>
> \(s\) Medical and other health services. The term \"medical and other
> health services\" means any of the following items or services:
>
> \(1\) physicians\' services;
>
> \(2\) (A) services and supplies...furnished as an incident to a
> physician\'s professional service, or kinds which are commonly
> furnished in physicians\' offices and are commonly either rendered
> without charge or included in the physicians\' bills;
>
> \(B\) hospital services...incident to physicians\' services rendered
> to outpatients and partial hospitalization services incident to such
> services;
>
> (C)diagnostic services which are--
>
> \(i\) furnished to an individual as an outpatient by a hospital or by
> others under arrangements with them made by a hospital, and
>
> \(ii\) ordinarily furnished by such hospital (or by others under such
> arrangements) to its outpatients for the purpose of diagnostic study;
>
> \(D\) outpatient physical therapy services and outpatient occupational
> therapy services;
>
> \(E\) rural health clinic services and federally qualified health
> center services;
>
> \(F\) home dialysis supplies and equipment, self-care home dialysis
> support services, and institutional dialysis services and supplies;
>
> \(G\) antigens...prepared by a physician...for a particular patient,
> including antigens so prepared which are forwarded to another
> qualified person...for administration to such patient,...by or under
> the supervision of another such physician;
>
> \(H\) (i) services furnished pursuant to a contract under section 1876
> \[42 U.S.C. 1395mm\] to a member of an eligible organization by a
> physician assistant or by a nurse practitioner...and such services and
> supplies furnished as an incident to his service to such a
> member...and
>
> \(ii\) services furnished pursuant to a risk-sharing contract under
> section 1876(g) \[42 U.S.C. 1395mm(g)\] to a member of an eligible
> organization by a clinical psychologist...or by a clinical social
> worker...\[and\] furnished as an incident to such clinical
> psychologist\'s services or clinical social worker\'s services...;
>
> \(I\) blood clotting factors, for hemophilia patients...;
>
> \(J\) prescription drugs used in immunosuppressive therapy furnished,
> to an individual who receives an organ transplant for which payment is
> made under this title \[42 U.S.C. 1395 et seq.\], but only in the case
> of \[certain\] drugs furnished...
>
> \(K\) (i) services which would be physicians\' services if furnished
> by a physician...and which are performed by a physician
> assistant...;and
>
> \(ii\) services which would be physicians\' services if furnished by a
> physician...and which are performed by a nurse...;
>
> \(L\) certified nurse-midwife services;
>
> \(M\) qualified psychologist services;
>
> \(N\) clinical social worker services...;
>
> \(O\) erythropoietin for dialysis patients...;
>
> \(P\) prostate cancer screening tests...;
>
> \(Q\) an oral drug (which is approved by the federal Food and Drug
> Administration) prescribed for use as an anti-cancer chemotherapeutic
> agent for a given indication, and containing an active ingredient (or
> ingredients)...;
>
> \(R\) colorectal cancer screening tests...;
>
> \(S\) diabetes outpatient self-management training services...; and
>
> \(T\) an oral drug (which is approved by the federal Food and Drug
> Administration) prescribed for use as an acute anti-emetic used as
> part of an anti-cancer chemotherapeutic regimen...
>
> \(3\) diagnostic X-ray tests...furnished in a place of residence used
> as the patient\'s home...;
>
> \(4\) X-ray, radium, and radioactive isotope therapy, including
> materials and services of technicians;
>
> \(5\) surgical dressings, and splints, casts, and other devices used
> for reduction of fractures and dislocations;
>
> \(6\) durable medical equipment;
>
> \(7\) ambulance service where the use of other methods of
> transportation is contraindicated by the individual\'s condition...;
>
> \(8\) prosthetic devices (other than dental) which replace all or part
> of an internal body organ (including colostomy bags and supplies
> directly related to colostomy care),...and including one pair of
> conventional eyeglasses or contact lenses furnished subsequent to each
> cataract surgery...\[;\]
>
> \(9\) leg, arm, back, and neck braces, and artificial legs, arms, and
> eyes, including replacements if required...;
>
> \(10\) (A) pneumococcal vaccine and its administration...; and
>
> \(B\) hepatitis B vaccine and its administration..., and
>
> \(11\) services of a certified registered nurse anesthetist...;
>
> \(12\) ...extra-depth shoes with inserts or custom molded shoes with
> inserts for an individual with diabetes, if...;
>
> \(13\) screening mammography...;
>
> \(14\) screening pap smear and screening pelvic exam; and
>
> \(15\) bone mass measurement.... (etc.)
***Health Plan*.**
We proposed to define "health plan" essentially as section 1171(5) of
the Act defines it. Section 1171 of the Act refers to several
definitions in section 2791 of the Public Health Service Act, 42 U.S.C.
300gg-91, as added by Public Law 104-191.
As defined in section 1171(5), a "health plan" is an individual plan or
group health plan that provides, or pays the cost of, medical care. We
proposed that this definition include, but not be limited to the 15
types of plans (e.g., group health plan, health insurance issuer, health
maintenance organization) listed in the statute, as well as any
combination of them. Such term would have included, when applied to
public benefit programs, the component of the government agency that
administers the program. Church plans and government plans would have
been included to the extent that they fall into one or more of the
listed categories.
In the proposed rule, "health plan" included the following, singly or in
combination:
\(1\) A group health plan, defined as an employee welfare benefit plan
(as currently defined in section 3(1) of the Employee Retirement Income
and Security Act of 1974, 29 U.S.C. 1002(1)), including insured and
self-insured plans, to the extent that the plan provides medical care
(as defined in section 2791(a)(2) of the Public Health Service Act, 42
U.S.C. 300gg-91(a)(2)), including items and services paid for as medical
care, to employees or their dependents directly or through insurance or
otherwise, that:
\(i\) Has 50 or more participants; or
\(ii\) Is administered by an entity other than the employer that
established and maintains the plan.
\(2\) A health insurance issuer, defined as an insurance company,
insurance service, or insurance organization that is licensed to engage
in the business of insurance in a state and is subject to state or other
law that regulates insurance.
\(3\) A health maintenance organization, defined as a federally
qualified health maintenance organization, an organization recognized as
a health maintenance organization under state law, or a similar
organization regulated for solvency under state law in the same manner
and to the same extent as such a health maintenance organization.
\(4\) Part A or Part B of the Medicare program under title XVIII of the
Act.
\(5\) The Medicaid program under title XIX of the Act.
\(6\) A Medicare supplemental policy (as defined in section 1882(g)(1)
of the Act, 42 U.S.C. 1395ss).
\(7\) A long-term care policy, including a nursing home fixed-indemnity
policy.
\(8\) An employee welfare benefit plan or any other arrangement that is
established or maintained for the purpose of offering or providing
health benefits to the employees of two or more employers.
\(9\) The health care program for active military personnel under title
10 of the United States Code.
\(10\) The veterans health care program under 38 U.S.C. chapter 17.
\(11\) The Civilian Health and Medical Program of the Uniformed Services
(CHAMPUS), as defined in 10 U.S.C. 1072(4).
\(12\) The Indian Health Service program under the Indian Health Care
Improvement Act (25 U.S.C. 1601, et seq.).
\(13\) The Federal Employees Health Benefits Program under 5 U.S.C.
chapter 89.
\(14\) An approved state child health plan for child health assistance
that meets the requirements of section 2103 of the Act.
\(15\) A Medicare Plus Choice organization as defined in 42 CFR 422.2,
with a contract under 42 CFR part 422, subpart K.
In addition to the 15 specific categories, we proposed that the list
include any other individual plan or group health plan, or combination
thereof, that provides or pays for the cost of medical care. The
Secretary would determine which plans that meet these criteria would to
be considered health plans for the purposes of this rule.
Consistent with the other titles of HIPAA, our proposed definition did
not include certain types of insurance entities, such as workers'
compensation and automobile insurance carriers, other property and
casualty insurers, and certain forms of limited benefits coverage, even
when such arrangements provide coverage for health care services.
In the final rule, we add two provisions to clarify the types of
policies or programs that we do not consider to be a health plan. First,
the rule excepts any policy, plan or program to the extent that it
provides, or pays for the cost of, excepted benefits, as defined in
section 2791(c)(1) of the PHS Act, 42 U.S.C. 300gg-91(c)(1). We note
that, while coverage for on-site medical clinics is excluded from
definition of "health plans," such clinics may meet the definition of
"health care provider" and persons who work in the clinic may also meet
the definition of health care provider." Second, many commenters were
confused by the statutory inclusion as a health plan of any "other
individual or group plan that provides or pays the cost of medical
care;" they questioned how the provision applied to many government
programs. We therefore clarify that while many government programs
(other than the programs specified in the statute) provide or pay the
cost of medical care, we do not consider them to be individual or group
plans and therefore, do not consider them to be health plans. Government
funded programs that do not have as their principal purpose the
provision of, or payment for, the cost of health care but which do
incidentally provide such services are not health plans (for example,
programs such as the Special Supplemental Nutrition Program for Women,
Infants and Children (WIC) and the Food Stamp Program, which provide or
pay for nutritional services, are not considered to be health plans).
Government funded programs that have as their principal purpose the
provision of health care, either directly or by grant, are also not
considered to be health plans. Examples include the Ryan White
Comprehensive AIDS Resources Emergency Act, government funded health
centers and immunization programs. We note that some of these may meet
the rule's definition of health care provider.
We note that in certain instances eligibility for or enrollment in a
health plan that is a government program providing public benefits, such
as Medicaid or SCHIP, is determined by an agency other than the agency
that administers the program, or individually identifiable health
information used to determine enrollment or eligibility in such a health
plan is collected by an agency other than the agency that administers
the health plan. In these cases, we do not consider an agency that is
not otherwise a covered entity, such as a local welfare agency, to be a
covered entity because it determines eligibility or enrollment or
collects enrollment information as authorized by law. We also do not
consider the agency to be a business associate when conducting these
functions, as we describe further in the business associate discussion
above.
The definition in the final rule also reflects the following changes
promulgated in the Transactions Rule:
\(1\) Exclusion of nursing home fixed-indemnity policies;
\(2\) Addition of the word "issuer" to Medicare supplemental policy, and
long-term care policy;
\(3\) Addition or revision of the relevant statutory cites where
appropriate;
\(4\) Deletion of the term "or assisted" when referring to government
programs;
\(5\) Replacement of the word "organization" with "program" when
referring to Medicare + Choice;
\(6\) Deletion of the term "health" when referring to a group plan in
subparagraph (xvi);
\(7\) Extraction of the definitions of "group health plan," "health
insurance issuer," and "health maintenance organization" into Part 160
as distinct definitions;
\(8\) In the definition of "group health plan," deletion of the term
"currently" from the reference to the statutory cite of ERISA, addition
of the relevant statutory cite for the term "participant," and addition
of the term "reimbursement;"
\(9\) In the definition of "health insurance issuer," addition of the
relevant statutory cite, deletion of the term "or other law" after
"state law," addition of health maintenance organizations for
consistency with the statute, and clarification that the term does not
include a group health plan; and
\(10\) In the definition of "health maintenance organization," addition
of the relevant statutory cite.
Finally, we add to this definition a high risk pool that is a mechanism
established under state law to provide health insurance coverage or
comparable coverage to eligible individuals. High risk pools are
designed mainly to provide health insurance coverage for individuals
who, due to health status or pre-existing conditions, cannot obtain
insurance through the individual market or who can do so only at very
high premiums. Some states use their high risk pool as an alternative
mechanism under section 2744 of HIPAA. We do not reference the
definition of "qualified high risk pool" in HIPAA because that
definition includes the requirements for a state to use its risk pool as
its alternative mechanism under HIPAA. Some states may have high risk
pools, but do not use them as their alternative mechanism and therefore
may not meet the definition in HIPAA. We want to make clear that state
high risk pools are covered entities under this rule whether or not they
meet the definition of a qualified high risk pool under section 2744.
High risk pools, as described in this rule, do not include any program
established under state law solely to provide excepted benefits. For
example, a state program established to provide workers' compensation
coverage is not considered to be a high risk pool under the rule.
***Implementation specification***
This definition was adopted in the Transactions Rule and is minimally
revised here. We add the words "requirements or" before the word
"instructions." The word "instructions" is appropriate in the context of
the implementation specifications adopted in the Transactions Rule,
which are generally a series of instructions as to how to use particular
electronic forms. However, that word is not apropos in the context of
the rules below. In the rules below, the implementation specifications
are specific requirements for how to comply with a given standard. The
change to this definition thus ties in to this regulatory framework.
***Standard***
This definition was adopted in the Transactions Rule and we have
modified it to make it clearer. We also add language reflecting section
264 of the statute, to clarify that the standards adopted by this rule
meet this definition.
***State***
We modify the definition of state as adopted in the Transactions Rule to
clarify that this term refers to any of the several states.
***Transaction***
We change the term "exchange" to the term "transmission" in the
definition of Transaction to clarify that these transactions may be
one-way communications.
***Workforce***
We proposed in the NPRM to define workforce to mean employees,
volunteers, trainees, and other persons under the direct control of a
covered entity, including persons providing labor on an unpaid basis.
The definition in the final rule reflects one revision established in
the Transactions Rule, which replaces the term "including persons
providing labor on an unpaid basis" with the term "whether or not they
are paid by the covered entity." In addition, we clarify that if the
assigned work station of persons under contract is on the covered
entity's premises and such persons perform a substantial proportion of
their activities at that location, the covered entity may choose to
treat them either as business associates or as part of the workforce, as
explained in the discussion of the definition of business associate. If
there is no business associate contract, we assume the person is a
member of the covered entity's workforce. We note that independent
contractors may or may not be workforce members. However, for compliance
purposes we will assume that such personnel are members of the workforce
if no business associate contract exists.
**PART 160 -- SUBPART B -- PREEMPTION OF STATE LAWS**
***Statutory Background***
Section 1178 of the Act establishes a "general rule" that state law
provisions that are contrary to the provisions or requirements of part C
of title XI or the standards or implementation specifications adopted or
established thereunder are preempted by the federal requirements. The
statute provides three exceptions to this general rule: (1) in section
1178(a)(2)(A)(i), for state laws that the Secretary determines are
necessary to prevent fraud and abuse, ensure appropriate state
regulation of insurance and health plans, for state reporting on health
care delivery, and other purposes; (2) in section 1178(a)(2)(A)(ii), for
state laws that address controlled substances; and (3) in section
1178(a)(2)(B), for state laws relating to the privacy of individually
identifiable health information that as provided for by the related
provision of section 264(c)(2) of HIPAA, are contrary to and more
stringent than the federal requirements. Section 1178 also carves out,
in sections 1178(b) and 1178(c), certain areas of state authority that
are not limited or invalidated by the provisions of part C of title XI:
these areas relate to public health and state regulation of health
plans.
The NPRM proposed a new Subpart B of the proposed part 160. The new
Subpart B, which would apply to all standards, implementation
specifications, and requirements adopted under HIPAA, would consist of
four sections. Proposed § 160.201 provided that the provisions of
Subpart B applied to exception determinations and advisory opinions
issued by the Secretary under section 1178. Proposed § 160.202 set out
proposed definitions for four terms: (1) "contrary," (2) "more
stringent," (3) "relates to the privacy of individually identifiable
health information," and (4) "state law." The definition of "contrary"
was drawn from case law concerning preemption. A seven-part set of
specific criteria, drawn from fair information principles, was proposed
for the definition of "more stringent." The definition of "relates to
the privacy of individually identifiable health information" was also
based on case law. The definition of "state law" was drawn from the
statutory definition of this term elsewhere in HIPAA. We note that state
action having the force and effect of law may include common law. We
eliminate the term "decision" from the proposed rule because it is
redundant.
Proposed § 160.203 proposed a general rule reflecting the statutory
general rule and exceptions that generally mirrored the statutory
language of the exceptions. The one substantive addition to the
statutory exception language was with respect to the statutory
exception, "for other purposes." The following language was added: "for
other purposes related to improving the Medicare program, the Medicaid
program, or the efficiency and effectiveness of the health care system."
Proposed § 160.204 proposed two processes, one for the making of
exception determinations, relating to determinations under section
1178(a)(2)(A) of the Act, the other for the rendering of advisory
opinions, with respect to section 1178(a)(2)(B) of the Act. The
processes proposed were similar in the following respects: (1) only the
state could request an exception determination or advisory opinion, as
applicable; (2) both required the request to contain the same
information, except that a request for an exception determination also
had to set out the length of time the requested exception would be in
effect, if less than three years; (3) both sets of requirements provided
that requests had to be submitted to the Secretary as required by the
Secretary, and until the Secretary's determination was made, the federal
standard, requirement or implementation specification remained in
effect; (4) both sets of requirements provided that the Secretary's
decision would be effective intrastate only; (5) both sets of
requirements provided that any change to either the federal or state
basis for the Secretary's decision would require a new request, and the
federal standard, implementation specification, or requirement would
remain in effect until the Secretary acted favorably on the new request;
(6) both sets of requirements provided that the Secretary could seek
changes to the federal rules or urge states or other organizations to
seek changes; and (7) both sets of requirements provided for annual
publication of Secretarial decisions. In addition, the process for
exception determinations provided for a maximum effective period of
three years for such determinations.
The following changes have been made to Subpart B in the final rules.
First, § 160.201 now expressly implements section 1178. Second, the
definition of "more stringent" has been changed by eliminating the
criterion relating to penalties and by framing the criterion under
paragraph (1) more generally. Also, we have clarified that the term
"individual" means the person who is the subject of the individually
identifiable health information, since the term "individual" is defined
this way only in Subpart E of Part 164, not in Part 160. Third, the
definition of "state law" has been changed by substituting the words
"statute, constitutional provision" for the word "law," the words
"common law" for the word "decision," and adding the words "force and"
before the word "effect" in the proposed definition. Fourth, in §
160.203, several criteria relating to the statutory grounds for
exception determinations have been further spelled out: (1) the words "
related to the provision of or payment for health care" have been added
to the exception for fraud and abuse; (2) the words " to the extent
expressly authorized by statute or regulation" have been added to the
exception for state regulation of health plans; (3) the words "of
serving a compelling need related to public health, safety, or welfare,
and, where a standard, requirement, or implementation specification
under part 164 of this subchapter is at issue, where the Secretary
determines that the intrusion into privacy is warranted when balanced
against the need to be served" have been added to the general exception
"for other purposes"; and (4) the statutory provision regarding
controlled substances has been elaborated on as follows: "Has as its
principal purpose the regulation of the manufacture, registration,
distribution, dispensing, or other control of any controlled substance,
as defined at 21 U.S.C. 802, or which is deemed a controlled substance
by state law."
The most extensive changes have been made to proposed § 160.204. The
provision for advisory opinions has been eliminated. Section 160.204 now
sets out only a process for requesting exception determinations. In most
respects, this process is the same as proposed. However, the proposed
restriction of the effect of exception determinations to wholly
intrastate transactions has been eliminated. Section 160.204(a) has been
modified to allow any person, not just a state, to submit a request for
an exception determination, and clarifies that requests from states may
be made by the state's chief elected official or his or her designee.
Proposed § 160.204(a)(3) stated that if it is determined that the
federal standard, requirement, or implementation specification in
question meets the exception criteria as well as or better than the
state law for which the exception is requested, the request will be
denied; this language has been deleted. Thus, the criterion for granting
or denying an exception request is whether the applicable exception
criterion or criteria are met.
A new § 160.205 is also adopted, replacing part of what was proposed at
proposed § 160.204. The new § 160.205 sets out the rules relating to the
effectiveness of exception determinations. Exception determinations are
effective until either the underlying federal or state laws change or
the exception is revoked, by the Secretary, based on a determination
that the grounds supporting the exception no longer exist. The proposed
maximum of three years has been eliminated.
***Relationship to Other Federal Laws***
Covered entities subject to these rules are also subject to other
federal statutes and regulations. For example, federal programs must
comply with the statutes and regulations that govern them. Pursuant to
their contracts, Medicare providers must comply with the requirements of
the Privacy Act of 1974. Substance abuse treatment facilities are
subject to the Substance Abuse Confidentiality provisions of the Public
Health Service Act, section 543 and its regulations. And, health care
providers in schools, colleges, and universities may come within the
purview of the Family Educational Rights and Privacy Act. Thus, covered
entities will need to determine how the privacy regulation will affect
their ability to comply with these other federal laws.
Many commenters raised questions about how different federal statutes
and regulations intersect with the privacy regulation. While we address
specific concerns in the response to comments later in the preamble, in
this section, we explore some of the general interaction issues. These
summaries do not identify all possible conflicts or overlaps of the
privacy regulation and other federal laws, but should provide general
guidance for complying with both the privacy regulation and other
federal laws. The summaries also provide examples of how covered
entities can analyze other federal laws when specific questions arise.
HHS may consult with other agencies concerning the interpretation of
other federal laws as necessary.
***Implied Repeal Analysis***
When faced with the need to determine how different federal laws
interact with one another, we turn to the judiciary's approach. Courts
apply the implied repeal analysis to resolve tensions that appear to
exist between two or more statutes. While the implication of a
regulation-on-regulation conflict is unclear, courts agree that
administrative rules and regulations that do not conflict with express
statutory provisions have the force and effect of law. Thus, we believe
courts would apply the standard rules of interpretation that apply to
statutes to address questions of interpretation with regard to
regulatory conflicts.
When faced with two potentially conflicting statutes, courts attempt to
construe them so that both are given effect. If this construction is not
possible, courts will look for express language in the later statute, or
an intent in its legislative history, indicating that Congress intended
the later statute to repeal the earlier one. If there is no expressed
intent to repeal the earlier statute, courts will characterize the
statutes as either general or specific. Ordinarily, later, general
statutes will not repeal the special provisions of an earlier, specific
statute. In some cases, when a later, general statute creates an
irreconcilable conflict or is manifestly inconsistent with the earlier,
specific statute in a manner that indicates a clear and manifest
Congressional intent to repeal the earlier statute, courts will find
that the later statute repeals the earlier statute by implication. In
these cases, the latest legislative action may prevail and repeal the
prior law, but only to the extent of the conflict.
There should be few instances in which conflicts exist between a statute
or regulation and the rules below. For example, if a statute permits a
covered entity to disclose protected health information and the rules
below permit such a disclosure, no conflict arises; the covered entity
could comply with both and choose whether or not to disclose the
information. In instances in which a potential conflict appears, we
would attempt to resolve it so that both laws applied. For example, if a
statute or regulation permits dissemination of protected health
information, but the rules below prohibit the use or disclosure without
an authorization, we believe a covered entity would be able to comply
with both because it could obtain an authorization under § 164.508
before disseminating the information under the other law.
Many apparent conflicts will not be true conflicts. For example, if a
conflict appears to exist because a previous statute or regulation
requires a specific use or disclosure of protected health information
that the rules below appear to prohibit, the use or disclosure pursuant
to that statute or regulation would not be a violation of the privacy
regulation because § 164.512(a) permits covered entities to use or
disclose protected health information as required by law.
If a statute or regulation prohibits dissemination of protected health
information, but the privacy regulation requires that an individual have
access to that information, the earlier, more specific statute would
apply. The interaction between the Clinical Laboratory Improvement
Amendments regulation is an example of this type of conflict. From our
review of several federal laws, it appears that Congress did not intend
for the privacy regulation to overrule existing statutory requirements
in these instances.
***Examples of Interaction***
We have summarized how certain federal laws interact with the privacy
regulation to provide specific guidance in areas deserving special
attention and to serve as examples of the analysis involved. In the
Response to Comment section, we have provided our responses to specific
questions raised during the comment period.
*The Privacy Act.*
The Privacy Act of 1974, 5 U.S.C. 552a, prohibits disclosures of records
contained in a system of records maintained by a federal agency (or its
contractors) without the written request or consent of the individual to
whom the record pertains. This general rule is subject to various
statutory exceptions. In addition to the disclosures explicitly
permitted in the statute, the Privacy Act permits agencies to disclose
information for other purposes compatible with the purpose for which the
information was collected by identifying the disclosure as a "routine
use" and publishing notice of it in the Federal Register. The Act
applies to all federal agencies and certain federal contractors who
operate Privacy Act systems of records on behalf of federal agencies.
Some federal agencies and contractors of federal agencies that are
covered entities under the privacy rules are subject to the Privacy Act.
These entities must comply with all applicable federal statutes and
regulations. For example, if the privacy regulation permits a
disclosure, but the disclosure is not permitted under the Privacy Act,
the federal agency may not make the disclosure. If, however, the Privacy
Act allows a federal agency the discretion to make a routine use
disclosure, but the privacy regulation prohibits the disclosure, the
federal agency will have to apply its discretion in a way that complies
with the regulation. This means not making the particular disclosure.
*The Freedom of Information Act.*
FOIA, 5 U.S.C. 552, provides for public disclosure, upon the request of
any person, of many types of information in the possession of the
federal government, subject to nine exemptions and three exclusions. For
example, Exemption 6 permits federal agencies to withhold "personnel and
medical files and similar files the disclosure of which would constitute
a clearly unwarranted invasion of personal privacy." 5 U.S.C. 552(b)(6).
Uses and disclosures required by FOIA come within § 164.512(a) of the
privacy regulation that permits uses or disclosures required by law if
the uses or disclosures meet the relevant requirements of the law. Thus,
a federal agency must determine whether it may apply an exemption or
exclusion to redact the protected health information when responding to
a FOIA request. When a FOIA request asks for documents that include
protected health information, we believe the agency, when appropriate,
must apply Exemption 6 to preclude the release of medical files or
otherwise redact identifying details before disclosing the remaining
information.
We offer the following analysis for federal agencies and federal
contractors who operate Privacy Act systems of records on behalf of
federal agencies and must comply with FOIA and the privacy regulation.
If presented with a FOIA request that would result in the disclosure of
protected health information, a federal agency must first determine if
FOIA requires the disclosure or if an exemption or exclusion would be
appropriate. We believe that generally a disclosure of protected health
information, when requested under FOIA, would come within FOIA Exemption
6. We recognize, however, that the application of this exemption to
information about deceased individuals requires a different analysis
than that applicable to living individuals because, as a general rule,
under the Privacy Act, privacy rights are extinguished at death.
However, under FOIA, it is entirely appropriate to consider the privacy
interests of a decedent's survivors under Exemption 6. *See* Department
of Justice FOIA Guide 2000, Exemption 6: Privacy Considerations. Covered
entities subject to FOIA must evaluate each disclosure on a case-by-case
basis, as they do now under current FOIA procedures.
*Federal Substance Abuse Confidentiality Requirements.*
The federal confidentiality of substance abuse patient records statute,
section 543 of the Public Health Service Act, 42 U.S.C. 290dd-2, and its
implementing regulation, 42 CFR Part 2, establish confidentiality
requirements for patient records that are maintained in connection with
the performance of any federally-assisted specialized alcohol or drug
abuse program. Substance abuse programs are generally programs or
personnel that provide alcohol or drug abuse treatment, diagnosis, or
referral for treatment. The term \"federally-assisted\" is broadly
defined and includes federally conducted or funded programs, federally
licensed or certified programs, and programs that are tax exempt.
Certain exceptions apply to information held by the Veterans
Administration and the Armed Forces.
There are a number of health care providers that are subject to both
these rules and the substance abuse statute and regulations. In most
cases, a conflict will not exist between these rules. These privacy
rules permit a health care provider to disclose information in a number
of situations that are not permitted under the substance abuse
regulation. For example, disclosures allowed, without patient
authorization, under the privacy rule for law enforcement, judicial and
administrative proceedings, public health, health oversight, directory
assistance, and as required by other laws would generally be prohibited
under the substance abuse statute and regulation. However, because these
disclosures are permissive and not mandatory, there is no conflict. An
entity would not be in violation of the privacy rules for failing to
make these disclosures.
Similarly, provisions in the substance abuse regulation provide for
permissive disclosures in case of medical emergencies, to the FDA, for
research activities, for audit and evaluation activities, and in
response to certain court orders. Because these are permissive
disclosures, programs subject to both the privacy rules and the
substance abuse rule are able to comply with both rules even if the
privacy rules restrict these types of disclosures. In addition, the
privacy rules generally require that an individual be given access to
his or her own health information. Under the substance abuse regulation,
programs may provide such access, so there is no conflict.
The substance abuse regulation requires notice to patients of the
substance abuse confidentiality requirements and provides for written
consent for disclosure. While the privacy rules have requirements that
are somewhat different, the program may use notice and authorization
forms that include all the elements required by both regulations. The
substance abuse rule provides a sample notice and a sample authorization
form and states that the use of these forms would be sufficient. While
these forms do not satisfy all of the requirements of the privacy
regulation, there is no conflict because the substance abuse regulation
does not mandate the use of these forms.
*Employee Retirement Income Security Act of 1974.*
ERISA was enacted in 1974 to regulate pension and welfare employee
benefit plans established by private sector employers, unions, or both,
to provide benefits to their workers and dependents. Under ERISA, plans
that provide \"through the purchase of insurance or otherwise \...
medical, surgical, or hospital care or benefits, or benefits in the
event of sickness, accident, disability, \[or\] death\" are defined as
employee welfare benefit plans. 29 U.S.C. 1002(1). In 1996, HIPAA
amended ERISA to require portability, nondiscrimination, and
renewability of health benefits provided by group health plans and group
health insurance issuers. Numerous, although not all, ERISA plans are
covered under the rules proposed below as "health plans."
Section 514(a) of ERISA, 29 U.S.C. 1144(a), preempts all state laws that
\"relate to\" any employee benefit plan. However, section 514(b) of
ERISA, 29 U.S.C. 1144(b)(2)(A), expressly saves from preemption state
laws that regulate insurance. Section 514(b)(2)(B) of ERISA, 29 U.S.C.
1144(b)(2)(B), provides that an ERISA plan is deemed not to be an
insurer for the purpose of regulating the plan under the state insurance
laws. Thus, under the deemer clause, states may not treat ERISA plans as
insurers subject to direct regulation by state law. Finally, section
514(d) of ERISA, 29 U.S.C. 1144(d), provides that ERISA does not "alter,
amend, modify, invalidate, impair, or supersede any law of the United
States."
We considered whether the preemption provision of section 264(c)(2) of
HIPAA would give effect to state laws that would otherwise be preempted
by section 514(a) of ERISA. As discussed above, our reading of the
statutes together is that the effect of section 264(c)(2) is only to
leave in place state privacy protections that would otherwise apply and
that are more stringent than the federal privacy protections.
Many health plans covered by the privacy regulation are also subject to
ERISA requirements. Our discussions and consultations have not uncovered
any particular ERISA requirements that would conflict with the rules.
*The Family Educational Rights and Privacy Act.*
FERPA, as amended, 20 U.S.C. 1232g, provides parents of students and
eligible students (students who are 18 or older) with privacy
protections and rights for the records of students maintained by
federally funded educational agencies or institutions or persons acting
for these agencies or institutions. We have excluded education records
covered by FERPA, including those education records designated as
education records under Parts B, C, and D of the Individuals with
Disabilities Education Act Amendments of 1997, from the definition of
protected health information. For example, individually identifiable
health information of students under the age of 18 created by a nurse in
a primary or secondary school that receives federal funds and that is
subject to FERPA is an education record, but not protected health
information. Therefore, the privacy regulation does not apply. We
followed this course because Congress specifically addressed how
information in education records should be protected in FERPA.
We have also excluded certain records, those described at 20 U.S.C.
1232g(a)(4)(B)(iv), from the definition of protected health information
because FERPA also provided a specific structure for the maintenance of
these records. These are records (1) of students who are 18 years or
older or are attending post-secondary educational institutions, (2)
maintained by a physician, psychiatrist, psychologist, or recognized
professional or paraprofessional acting or assisting in that capacity,
(3) that are made, maintained, or used only in connection with the
provision of treatment to the student, and (4) that are not available to
anyone, except a physician or appropriate professional reviewing the
record as designated by the student. Because FERPA excludes these
records from its protections only to the extent they are not available
to anyone other than persons providing treatment to students, any use or
disclosure of the record for other purposes, including providing access
to the individual student who is the subject of the information, would
turn the record into an education record. As education records, they
would be subject to the protections of FERPA.
These exclusions are not applicable to all schools, however. If a school
does not receive federal funds, it is not an educational agency or
institution as defined by FERPA. Therefore, its records that contain
individually identifiable health information are not education records.
These records may be protected health information. The educational
institution or agency that employs a school nurse is subject to our
regulation as a health care provider if the school nurse or the school
engages in a HIPAA transaction.
While we strongly believe every individual should have the same level of
privacy protection for his/her individually identifiable health
information, Congress did not provide us with authority to disturb the
scheme it had devised for records maintained by educational institutions
and agencies under FERPA. We do not believe Congress intended to amend
or preempt FERPA when it enacted HIPAA.
With regard to the records described at 20 U.S.C. 1232g(a)(4)(b)(iv), we
considered requiring health care providers engaged in HIPAA transactions
to comply with the privacy regulation up to the point these records were
used or disclosed for purposes other than treatment. At that point, the
records would be converted from protected health information into
education records. This conversion would occur any time a student sought
to exercise his/her access rights. The provider, then, would need to
treat the record in accordance with FERPA's requirements and be relieved
from its obligations under the privacy regulation. We chose not to adopt
this approach because it would be unduly burdensome to require providers
to comply with two different, yet similar, sets of regulations and
inconsistent with the policy in FERPA that these records be exempt from
regulation to the extent the records were used only to treat the
student.
*Gramm-Leach-Bliley.*
In 1999, Congress passed Gramm-Leach-Bliley (GLB), Pub. L. 106-102,
which included provisions, section 501 *et seq.*, that limit the ability
of financial institutions to disclose "nonpublic personal information"
about consumers to non-affiliated third parties and require financial
institutions to provide customers with their privacy policies and
practices with respect to nonpublic personal information. In addition,
Congress required seven agencies with jurisdiction over financial
institutions to promulgate regulations as necessary to implement these
provisions. GLB and its accompanying regulations define "financial
institutions" as including institutions engaged in the financial
activities of bank holding companies, which may include the business of
insuring. *See* 15 U.S.C. 6809(3); 12 U.S.C. 1843(k). However, Congress
did not provide the designated federal agencies with the authority to
regulate health insurers. Instead, it provided states with an incentive
to adopt and have their state insurance authorities enforce these rules.
*See* 15 U.S.C. 6805. If a state were to adopt laws consistent with GLB,
health insurers would have to determine how to comply with both sets of
rules.
Thus, GLB has caused concern and confusion among health plans that are
subject to our privacy regulation. Although Congress remained silent as
to its understanding of the interaction of GLB and HIPAA's privacy
provisions, the Federal Trade Commission and other agencies implementing
the GLB privacy provisions noted in the preamble to their GLB
regulations that they "would consult with HHS to avoid the imposition of
duplicative or inconsistent requirements." 65 Fed. Reg. 33646, 33648
(2000). Additionally, the FTC also noted that "persons engaged in
providing insurance" would be within the enforcement jurisdiction of
state insurance authorities and not within the jurisdiction of the FTC.
*Id.*
Because the FTC has clearly stated that it will not enforce the GLB
privacy provisions against persons engaged in providing insurance,
health plans will not be subject to dual federal agency jurisdiction for
information that is both nonpublic personal information and protected
health information. If states choose to adopt GLB-like laws or
regulations, which may or may not track the federal rules completely,
health plans would need to evaluate these laws under the preemption
analysis described in subpart B of Part 160.
*Federally Funded Health Programs.*
These rules will affect various federal programs, some of which may have
requirements that are, or appear to be, inconsistent with the
requirements of these regulations. These programs include those operated
directly by the federal government (such as health programs for military
personnel and veterans) as well as programs in which health services or
benefits are provided by the private sector or by state or local
governments, but which are governed by various federal laws (such as
Medicare, Medicaid, and ERISA).
Congress explicitly included some of these programs in HIPAA, subjecting
them directly to the privacy regulation. Section 1171 of the Act defines
the term "health plan" to include the following federally conducted,
regulated, or funded programs: group plans under ERISA that either have
50 or more participants or are administered by an entity other than the
employer who established and maintains the plan; federally qualified
health maintenance organizations; Medicare; Medicaid; Medicare
supplemental policies; the health care program for active military
personnel; the health care program for veterans; the Civilian Health and
Medical Program of the Uniformed Services (CHAMPUS); the Indian health
service program under the Indian Health Care Improvement Act, 25 U.S.C.
1601, et seq.; and the Federal Employees Health Benefits Program. There
also are many other federally conducted, regulated, or funded programs
in which individually identifiable health information is created or
maintained, but which do not come within the statutory definition of
"health plan." While these latter types of federally conducted,
regulated, or assisted programs are not explicitly covered by part C of
title XI in the same way that the programs listed in the statutory
definition of "health plan" are covered, the statute may nonetheless
apply to transactions and other activities conducted under such
programs. This is likely to be the case when the federal entity or
federally regulated or funded entity provides health services; the
requirements of part C may apply to such an entity as a "health care
provider." Thus, the issue of how different federal requirements apply
is likely to arise in numerous contexts.
There are a number of authorities under the Public Health Service Act
and other legislation that contain explicit confidentiality
requirements, either in the enabling legislation or in the implementing
regulations. Many of these are so general that there would appear to be
no problem of inconsistency, in that nothing in those laws or
regulations would appear to restrict the provider's ability to comply
with the privacy regulation's requirements.
There may, however, be authorities under which either the requirements
of the enabling legislation or of the program regulations would impose
requirements that differ from these rules.
For example, regulations applicable to the substance abuse block grant
program funded under section 1943(b) of the Public Health Service Act
require compliance with 42 CFR part 2, and, thus, raise the issues
identified above in the substance abuse confidentiality regulations
discussion. There are a number of federal programs which, either by
statute or by regulation, restrict the disclosure of patient information
to, with minor exceptions, disclosures "required by law." See, for
example, the program of projects for prevention and control of sexually
transmitted diseases funded under section 318(e)(5) of the Public Health
Service Act (42 CFR 51b.404); the regulations implementing the community
health center program funded under section 330 of the Public Health
Service Act (42 CFR 51c.110); the regulations implementing the program
of grants for family planning services under title X of the Public
Health Service Act (42 CFR 59.15); the regulations implementing the
program of grants for black lung clinics funded under 30 U.S.C. 437(a)
(42 CFR 55a.104); the regulations implementing the program of maternal
and child health projects funded under section 501 of the Act (42 CFR
51a.6); the regulations implementing the program of medical examinations
of coal miners (42 CFR 37.80(a)). These legal requirements would
restrict the grantees or other entities providing services under the
programs involved from making many of the disclosures that §§ 164.510 or
164.512 would permit. In some cases, permissive disclosures for
treatment, payment, or health care operations would also be limited.
Because §§ 164.510 and 164.512 are merely permissive, there would not be
a conflict between the program requirements, because it would be
possible to comply with both. However, entities subject to both sets of
requirements would not have the total range of discretion that they
would have if they were subject only to this regulation.
*Food, Drug, and Cosmetic Act.*
The Food, Drug, and Cosmetic Act, 21 U.S.C. 301, *et seq.*, and its
accompanying regulations outline the responsibilities of the Food and
Drug Administration with regard to monitoring the safety and
effectiveness of drugs and devices. Part of the agency's responsibility
is to obtain reports about adverse events, track medical devices, and
engage in other types of post marketing surveillance. Because many of
these reports contain protected health information, the information
within them may come within the purview of the privacy rules. Although
some of these reports are required by the Food, Drug, and Cosmetic Act
or its accompanying regulations, other types of reporting are voluntary.
We believe that these reports, while not mandated, play a critical role
in ensuring that individuals receive safe and effective drugs and
devices. Therefore, in § 164.512(b)(1)(iii), we have provided that
covered entities may disclose protected health information to a person
subject to the jurisdiction of the Food and Drug Administration for
specified purposes, such as reporting adverse events, tracking medical
devices, or engaging in other post marketing surveillance. We describe
the scope and conditions of such disclosures in more detail in §
164.512(b).
*Clinical Laboratory Improvement Amendments.*
CLIA, 42 U.S.C. 263a, and the accompanying regulations, 42 CFR part 493,
require clinical laboratories to comply with standards regarding the
testing of human specimens. This law requires clinical laboratories to
disclose test results or reports only to authorized persons, as defined
by state law. If a state does not define the term, the federal law
defines it as the person who orders the test.
We realize that the person ordering the test is most likely a health
care provider and not the individual who is the subject of the protected
health information included within the result or report. Under this
requirement, therefore, a clinical laboratory may be prohibited by law
from providing the individual who is the subject of the test result or
report with access to this information.
Although we believe individuals should be able to have access to their
individually identifiable health information, we recognize that in the
specific area of clinical laboratory testing and reporting, the Health
Care Financing Administration, through regulation, has provided that
access may be more limited. To accommodate this requirement, we have
provided at § 164.524(1)(iii) that covered entities maintaining
protected health information that is subject to the CLIA requirements do
not have to provide individuals with a right of access to or a right to
inspect and obtain a copy of this information if the disclosure of the
information to the individual would be prohibited by CLIA.
Not all clinical laboratories, however, will be exempted from providing
individuals with these rights. If a clinical laboratory operates in a
state in which the term "authorized person" is defined to include the
individual, the clinical laboratory would have to provide the individual
with these rights. Similarly, if the individual was the person who
ordered the test and an authorized person included such a person, the
laboratory would be required to provide the individual with these
rights.
Additionally, CLIA regulations exempt the components or functions of
"research laboratories that test human specimens but do not report
patient specific results for the diagnosis, prevention or treatment of
any disease or impairment of, or the assessment of the health of
individual patients" from the CLIA regulatory scheme. 42 CFR
493.3(a)(2). If subject to the access requirements of this regulation,
such entities would be forced to meet the requirements of CLIA from
which they are currently exempt. To eliminate this additional regulatory
burden, we have also excluded covered entities that are exempt from CLIA
under that rule from the access requirement of this regulation.
Although we are concerned about the lack of immediate access by the
individual, we believe that, in most cases, individuals who receive
clinical tests will be able to receive their test results or reports
through the health care provider who ordered the test for them. The
provider will receive the information from the clinical laboratory.
Assuming that the provider is a covered entity, the individual will have
the right of access and right to inspect and copy this protected health
information through his or her provider.
*Other Mandatory Federal or State Laws.*
Many federal laws require covered entities to provide specific
information to specific entities in specific circumstances. If a federal
law requires a covered entity to disclose a specific type of
information, the covered entity would not need an authorization under §
164.508 to make the disclosure because the final rule permits covered
entities to make disclosures that are required by law under §
164.512(a). Other laws, such as the Social Security Act (including its
Medicare and Medicaid provisions), the Family and Medical Leave Act, the
Public Health Service Act, Department of Transportation regulations, the
Environmental Protection Act and its accompanying regulations, the
National Labor Relations Act, the Federal Aviation Administration, and
the Federal Highway Administration rules, may also contain provisions
that require covered entities or others to use or disclose protected
health information for specific purposes.
When a covered entity is faced with a question as to whether the privacy
regulation would prohibit the disclosure of protected health information
that it seeks to disclose pursuant to a federal law, the covered entity
should determine if the disclosure is required by that law. In other
words, it must determine if the disclosure is mandatory rather than
merely permissible. If it is mandatory, a covered entity may disclose
the protected health information pursuant to § 164.512(a), which permits
covered entities to disclose protected health information without an
authorization when the disclosure is required by law. If the disclosure
is not required (but only permitted) by the federal law, the covered
entity must determine if the disclosure comes within one of the other
permissible disclosures. If the disclosure does not come within one of
the provisions for permissible disclosures, the covered entity must
obtain an authorization from the individual who is the subject of the
information or de-identify the information before disclosing it.
If another federal law prohibits a covered entity from using or
disclosing information that is also protected health information, but
the privacy regulation permits the use or disclosure, a covered entity
will need to comply with the other federal law and not use or disclose
the information.
*Federal Disability Nondiscrimination Laws*.
The federal laws barring discrimination on the basis of disability
protect the confidentiality of certain medical information. The
information protected by these laws falls within the larger definition
of "health information" under this privacy regulation. The two primary
disability nondiscrimination laws are the Americans with Disabilities
Act (ADA), 42 U.S.C. 12101 *et seq.*, and the Rehabilitation Act of
1973, as amended, 29 U.S.C. 701 *et seq.*, although other laws barring
discrimination on the basis of disability (such as the nondiscrimination
provisions of the Workforce Investment Act of 1988, 29 U.S.C. 2938) may
also apply. Federal disability nondiscrimination laws cover two general
categories of entities relevant to this discussion: employers and
entities that receive federal financial assistance.
Employers are not covered entities under the privacy regulation. Many
employers, however, are subject to the federal disability
nondiscrimination laws and, therefore, must protect the confidentiality
of all medical information concerning their applicants and employees.
The employment provisions of the ADA, 42 U.S.C. 12111 *et seq.*,
expressly cover employers of 15 or more employees, employment agencies,
labor organizations, and joint labor-management committees. Since 1992,
employment discrimination complaints arising under sections 501, 503,
and 504 of the Rehabilitation Act also have been subject to the ADA's
employment nondiscrimination standards. *See* "Rehabilitation Act
Amendments," Pub. L. No. 102-569, 106 Stat. 4344. Employers subject to
ADA nondiscrimination standards have confidentiality obligations
regarding applicant and employee medical information. Employers must
treat such medical information, including medical information from
voluntary health or wellness programs and any medical information that
is voluntarily disclosed as a confidential medical record, subject to
limited exceptions.
Transmission of health information by an employer to a covered entity,
such as a group health plan, is governed by the ADA confidentiality
restrictions. The ADA, however, has been interpreted to permit an
employer to use medical information for insurance purposes. *See* 29 CFR
1630 App. at § 1630.14(b) (describing such use with reference to 29 CFR
1630.16(f), which in turn explains that the ADA regulation "is not
intended to disrupt the current regulatory structure for self-insured
employers . . . or current industry practices in sales, underwriting,
pricing, administrative and other services, claims and similar insurance
related activities based on classification of risks as regulated by the
states"). *See also*, "Enforcement Guidance on Disability-Related
Inquiries and Medical Examinations of Employees under the Americans with
Disabilities Act," 4, n.10 (July 26, 2000), \_\_ FEP Manual (BNA) \_\_
("Enforcement Guidance on Employees"). *See generally*, "ADA Enforcement
Guidance on Preemployment Disability-Related Questions and Medical
Examinations" (October 10, 1995), 8 FEP Manual (BNA) 405:7191 (1995)
(also available at [http://www.eeoc.gov).]{.underline} Thus, use of
medical information for insurance purposes may include transmission of
health information to a covered entity.
If an employer-sponsored group health plan is closely linked to an
employer, the group health plan may be subject to ADA confidentiality
restrictions, as well as this privacy regulation. *See* *Carparts
Distribution Center, Inc. v. Automotive Wholesaler's Association of New
England, Inc.*, 37 F.3d 12 (1^st^ Cir. 1994)(setting forth three bases
for ADA Title I jurisdiction over an employer-provided medical
reimbursement plan, in a discrimination challenge to the plan's HIV/AIDS
cap). Transmission of applicant or employee health information by the
employer's management to the group health plan may be permitted under
the ADA standards as the use of medical information for insurance
purposes. Similarly, disclosure of such medical information by the group
health plan, under the limited circumstances permitted by this privacy
regulation, may involve use of the information for insurance purposes as
broadly described in the ADA discussion above.
Entities that receive federal financial assistance, which may also be
covered entities under the privacy regulation, are subject to section
504 of the Rehabilitation Act (29 U.S.C. 794) and its implementing
regulations. Each federal agency has promulgated such regulations that
apply to entities that receive financial assistance from that agency
("recipients"). These regulations may limit the disclosure of medical
information about persons who apply to or participate in a federal
financially assisted program or activity. For example, the Department of
Labor's section 504 regulation (found at 29 CFR part 32), consistent
with the ADA standards, requires recipients that conduct
employment-related programs, including employment training programs, to
maintain confidentiality regarding any information about the medical
condition or history of applicants to or participants in the program or
activity. Such information must be kept separate from other information
about the applicant or participant and may be provided to certain
specified individuals and entities, but only under certain limited
circumstances described in the regulation. *See* 29 CFR 32.15(d). Apart
from those circumstances, the information must be afforded the same
confidential treatment as medical records, *id*. Also, recipients of
federal financial assistance from the Department of Health and Human
Services, such as hospitals, are subject to the ADA's employment
nondiscrimination standards. They must, accordingly, maintain
confidentiality regarding the medical condition or history of applicants
for employment and employees.
The statutes and implementing regulations under which the federal
financial assistance is provided may contain additional provisions
regulating collection and disclosure of medical, health, and
disability-related information. *See, e.g.*, section 188 of the
Workforce Investment Act of 1988 (29 U.S.C. 2938) and 29 CFR 37.3(b).
Thus, covered entities that are subject to this privacy regulation, may
also be subject to the restrictions in these laws as well.
*U.S. Safe Harbor Privacy Principles (European Union Directive on Data
Protection).*
The E.U. Directive became effective in October 1998 and prohibits
European Union Countries from permitting the transfer of personal data
to another country without ensuring that an "adequate level of
protection," as determined by the European Commission, exists in the
other country or pursuant to one of the Directive's derogations of this
rule, such as pursuant to unambiguous consent or to fulfill a contract
with the individual. In July 2000, the European Commission concluded
that the U.S. Safe Harbor Privacy Principles[^1] constituted "adequate
protection." Adherence to the Principles is voluntary. Organizations
wishing to engage in the exchange of personal data with E.U. countries
may assert compliance with the Principles as one means of obtaining data
from E.U. countries.
The Department of Commerce, which negotiated these Principles with the
European Commission, has provided guidance for U.S. organizations
seeking to adhere to the guidelines and comply with U.S. law. We believe
this guidance addresses the concerns covered entities seeking to
transfer personal data from E.U. countries may have. When "U.S. law
imposes a conflicting obligation, U.S. organizations whether in the safe
harbor or not must comply with the law." An organization does not need
to comply with the Principles if a conflicting U.S. law "explicitly
authorizes" the particular conduct. The organization's non-compliance is
"limited to the extent necessary to meet the overriding legitimate
interests further\[ed\] by such authorization." However, if only a
difference exists such that an "option is allowable under the Principles
and/or U.S. law, organizations are expected to opt for the higher
protection where possible." Questions regarding compliance and
interpretation will be decided based on U.S. law. *See* Department of
Commerce, Memorandum on Damages for Breaches of Privacy, Legal
Authorizations and Mergers and Takeovers in U.S. Law 5 (July 17, 2000);
Department of Commerce, Safe Harbor Privacy Principles Issued by the
U.S. Department of Commerce on July 21, 2000, 65 Fed. Reg. 45666 (2000).
The Principles and our privacy regulation are based on common principles
of fair information practices. We believe they are essentially
consistent and that an organization complying with our privacy
regulation can fairly and correctly self-certify that it complies with
the Principles. If a true conflict arises between the privacy regulation
and the Principles, the Department of Commerce's guidance provides that
an entity must comply with the U.S. law.
**PART 160--SUBPART C--COMPLIANCE AND ENFORCEMENT**
Proposed § 164.522 included five paragraphs addressing activities
related to the Secretary's enforcement of the rule. These provisions
were based on procedures and requirements in various civil rights
regulations. Proposed § 164.522(a) provided that the Secretary would, to
the extent practicable, seek the cooperation of covered entities in
obtaining compliance, and could provide technical assistance to covered
entities to help them comply voluntarily. Proposed § 164.522(b) provided
that individuals could file complaints with the Secretary. However,
where the complaint related to the alleged failure of a covered entity
to amend or correct protected health information as proposed in the
rule, the Secretary would not make certain determinations such as
whether protected health information was accurate or complete. This
paragraph also listed the requirements for filing complaints and
indicated that the Secretary may investigate such complaints and what
might be reviewed as part of such investigation.
Under proposed § 164.522(c), the Secretary would be able to conduct
compliance reviews. Proposed § 164.522(d) described the responsibilities
that covered entities keep records and reports as prescribed by the
Secretary, cooperate with compliance reviews, permit the Secretary to
have access to their facilities, books, records, and other sources of
information during normal business hours, and seek records held by other
persons. This paragraph also stated that the Secretary would maintain
the confidentiality of protected health information she collected and
prohibit covered entities from taking retaliatory action against
individuals for filing complaints or for other activities. Proposed §
164.522(e) provided that the Secretary would inform the covered entity
and the individual complainant if an investigation or review indicated a
failure to comply and would seek to resolve the matter informally if
possible. If the matter could not be resolved informally, the Secretary
would be able to issue written findings, be required to inform the
covered entity and the complainant, and be able to pursue civil
enforcement action or make a criminal referral. The Secretary would also
be required to inform the covered entity and the individual complainant
if no violation was found.
We make the following changes and additions to proposed § 164.522 in the
final rule. First, we have moved this section to part 160, as a new
subpart C, "Compliance and Enforcement." Second, we add new sections
that explain the applicability of these provisions and incorporate
certain definitions. Accordingly, we change the proposed references to
violations to "this subpart" to violations of "the applicable
requirements of part 160 and the applicable standards, requirements, and
implementation specifications of subpart E of part 164 of this
subchapter." Third, the final rule at § 160.306(a) provides that any
person, not just an "individual" (the person who is the subject of the
individually identifiable health information) may file a complaint with
the Secretary. Other references in this subpart to an individual have
been changed accordingly. Fourth, we delete the proposed § 164.522(a)
language that indicated that the Secretary would not determine whether
information was accurate or complete, or whether errors or omissions
might have an adverse effect on the individual. While the policy is not
changed in that the Secretary will not make such determinations, we
believe the language is unnecessary and may suggest that we would make
all other types of determinations, such as all determinations in which
the regulation defers to the professional judgment of the covered
entity. Fifth, § 160.306(b)(3) requires that complaints be filed within
180 days of when the complainant knew or should have known that the act
or omission complained of occurred, unless this time limit is waived by
the Secretary for good cause shown. Sixth, § 160.310(b) requires
cooperation with investigations as well as compliance reviews. Seventh,
§ 160.310 (c)(1) provides that the Secretary must be provided access to
a covered entity's facilities, books, records, accounts, and other
sources of information, including protected health information, at any
time and without notice where exigent circumstances exist, such as where
documents might be hidden or destroyed. Eighth, the provision proposed
at § 164.522(d) that would prohibit covered entities from taking
retaliatory action against individuals for filing a complaint with the
Secretary or for certain other actions has been changed and moved to §
164.530. Ninth, § 160. 312(a)(2) deletes the reference in the proposed
rule to using violation findings as a basis for initiating action to
secure penalties. This deletion is not a substantive change. This
language was removed because penalties will be addressed in the
enforcement regulation. As in the NPRM, the Secretary may promulgate
alternative procedures for complaints relating to national security. For
example, to protect classified information, we may promulgate rules that
would allow an intelligence community agency to create a separate body
within that agency to receive complaints.
The Department plans to issue an Enforcement Rule that applies to all of
the regulations that the Department issues under the Administrative
Simplification provisions of HIPAA. This regulation will address the
imposition of civil monetary penalties and the referral of criminal
cases where there has been a violation of this rule. Penalties are
provided for under section 262 of HIPAA. The Enforcement Rule would also
address the topics covered by Subpart C below. It is expected that this
Enforcement Rule would replace Subpart C.
**PART 164 -- SUBPART A -- GENERAL PROVISIONS**
**SECTION 164.102 -- STATUTORY BASIS**
In the NPRM, we provided that the provisions of this part are adopted
pursuant to the Secretary\'s authority to prescribe standards,
requirements, and implementation standards under part C of title XI of
the Act and section 264 of Public Law 104-191. The final rule adopts
this language.
**SECTION 164.104 -- APPLICABILITY**
In the NPRM, we provided that except as otherwise provided, the
provisions of this part apply to covered entities: health plans, health
care clearinghouses, and health care providers who transmit health
information in electronic form in connection with any transaction
referred to in section 1173(a)(1) of the Act. The final rule adopts this
language.
**SECTION 164.106 -- RELATIONSHIP TO OTHER PARTS**
The final rule adds a new provision stating that in complying with the
requirements of this part, covered entities are required to comply with
the applicable provisions of parts 160 and 162 of this subchapter. This
language references Subchapter C in this regulation, Administrative Data
Standards and Related Requirements; Part 160, General Administrative
Requirements; and Part 162, Administrative Requirements. Part 160
includes requirements such as keeping records and submitting compliance
reports to the Secretary and cooperating with the Secretary's complaint
investigations and compliance reviews. Part 162 includes requirements
such as requiring a covered entity that conducts an electronic
transaction, adopted under this part, with another covered entity to
conduct the transaction as a standard transaction as adopted by the
Secretary.
**PART 164 -- SUBPART B-D -- RESERVED**
**PART 164 -- SUBPART E -- PRIVACY**
**SECTION 164.500 -- APPLICABILITY**
The discussion below describes the entities and the information that are
subject to the final regulation.
Many of the provisions of the regulation are presented as "standards."
Generally, the standards indicate what must be accomplished under the
regulation and implementation specifications describe how the standards
must be achieved.
***Covered Entities***
We proposed in the NPRM to apply the standards in the regulation to
health plans, health care clearinghouses, and to any health care
provider who transmits health information in electronic form in
connection with transactions referred to in section 1173(a)(1) of the
Act. The proposal referred to these entities as "covered entities."
We have revised § 164.500 to clarify the applicability of the rule to
health care clearinghouses. As we stated in the preamble to the NPRM, we
believe that in most instances health care clearinghouses will receive
protected health information as a business associate to another covered
entity. This understanding was confirmed by the comments and by our fact
finding. Clearinghouses rarely have direct contact with individuals, and
usually will not be in a position to create protected health information
or to receive it directly from them. Unlike health plans and providers,
clearinghouses usually convey and repackage information and do not add
materially to the substance of protected health information of an
individual.
The revised language provides that clearinghouses are not subject to
certain requirements in the rule when acting as business associates of
other covered entities. As revised, a clearinghouse acting as a business
associate is subject only to the provisions of this section, to the
definitions, to the general rules for uses and disclosures of protected
health information (subject to limitations), to the provision relating
to health care components, to the provisions relating to uses and
disclosures for which consent, individual authorization or an
opportunity to agree or object is not required (subject to limitations),
to the transition requirements and to the compliance date. With respect
to the uses and disclosures authorized under § 164.502 or § 164.512, a
clearinghouse acting as a business associate is not authorized by the
rule to make any use or disclosure not permitted by its business
associate contract. Clearinghouses acting as business associates are not
subject to the other requirements of this rule, which include the
provisions relating to procedural requirements, requirements for
obtaining consent, individual authorization or agreement, provision of a
notice, individual rights to request privacy protection, access and
amend information and receive an accounting of disclosures and the
administrative requirements.
We note that, even as business associates, clearinghouses remain covered
entities.
Clearinghouses, like other covered entities, are responsible under this
regulation for abiding by the terms of business associate contracts. For
example, while the provisions regarding individuals' access to and right
to request corrections to protected health information about them apply
only to health plans and covered health care providers, clearinghouses
may have some responsibility for providing such access under their
business associate contracts. A clearinghouse (or any other covered
entity) that violates the terms of a business associate contract also is
in direct violation of this rule and, as a covered entity, is subject to
compliance and enforcement action.
We clarify that a covered entity is only subject to these rules to the
extent that they possess protected health information. Moreover, these
rules only apply with regard to protected health information. For
example, if a covered entity does not disclose or receive from its
business associate any protected health information and no protected
health information is created or received by its business associate on
behalf of the covered entity, then the business associate requirements
of this rule do not apply.
We clarify that the Department of Defense or any other federal agency
and any non-governmental organization acting on its behalf, is not
subject to this rule when it provides health care in another country to
foreign national beneficiaries. The Secretary believes that this
exemption is warranted because application of the rule could have the
unintended effect of impeding or frustrating the conduct of such
activities, such as interfering with the ability of military command
authorities to obtain protected health information on prisoners of war,
refugees, or detainees for whom they are responsible under international
law. See the preamble to the definition of "individual" for further
discussion.
***Covered Information***
We proposed in the NPRM to apply the requirements of the rule to
individually identifiable health information that is or has been
electronically transmitted or maintained by a covered entity. The
provisions would have applied to the information itself, referred to as
protected health information in the rule, and not to the particular
records in which the information is contained. We proposed that once
information was maintained or transmitted electronically by a covered
entity, the protections would follow the information in whatever form,
including paper records, in which it exists while held by a covered
entity. The proposal would not have applied to information that was
never electronically maintained or transmitted by a covered entity.
In the final rule, we extend the scope of protections to all
individually identifiable health information in any form, electronic or
non-electronic, that is held or transmitted by a covered entity. This
includes individually identifiable health information in paper records
that never has been electronically stored or transmitted. (See §
164.501, definition of "protected health information," for further
discussion.)
**SECTION 164.501---DEFINITIONS**
***Correctional institution.***
The proposed rule did not define the term correctional institution. The
final rule defines correctional institution as any penal or correctional
facility, jail, reformatory, detention center, work farm, halfway house,
or residential community program center operated by, or under contract
to, the United States, a state, a territory, a political subdivision of
a state or territory, or an Indian tribe, for the confinement or
rehabilitation of persons charged with or convicted of a criminal
offense or other persons held in lawful custody. *Other persons held in
lawful custody* includes juvenile offenders adjudicated delinquent,
aliens detained awaiting deportation, persons committed to mental
institutions through the criminal justice system, witnesses, or others
awaiting charges or trial. This language was necessary to explain the
privacy rights and protections of inmates in this regulation.
***Covered functions.***
We add a new term, "covered functions," as a shorthand way of expressing
and referring to the functions that the entities covered by section
1172(a) of the Act perform. Section 1171 defines the terms "health
plan", "health care provider", and "health care clearinghouse" in
functional terms. Thus, a "health plan" is an individual or group plan
"that provides, or pays the cost of, medical care\...", a "health care
provider" "furnish\[es\] health care services or supplies," and a
"health care clearinghouse" is an entity "that processes or facilitates
the processing of \... data elements of health information\...". Covered
functions, therefore, are the activities that any such entity engages in
that are directly related to operating as a health plan, health care
provider, or health care clearinghouse; that is, they are the functions
that make it a health plan, health care provider, or health care
clearinghouse.
The term "covered functions" is not intended to include various support
functions, such as computer support, payroll and other office support,
and similar support functions, although we recognize that these support
functions must occur in order for the entity to carry out its health
care functions. Because such support functions are often also performed
for parts of an organization that are not doing functions directly
related to the health care functions and may involve access to and/or
use of protected health information, the rules below describe
requirements for ensuring that workforce members who perform these
support functions do not impermissibly use or disclose protected health
information. See § 164.504.
***Data aggregation.***
The NPRM did not include a definition of data aggregation. In the final
rule, *data aggregation* is defined, with respect to protected health
information received by a business associate in its capacity as the
business associate of a covered entity, as the combining of such
protected health information by the business associate with protected
health information received by the business associate in its capacity as
a business associate of another covered entity, to permit the creation
of data for analyses that relate to the health care operations of the
respective covered entities. The definition is included in the final
rule to help describe how business associates can assist covered
entities to perform health care operations that involve comparative
analysis of protected health information from otherwise unaffiliated
covered entities. Data aggregation is a service that gives rise to a
business associate relationship if the performance of the service
involves disclosure of protected health information by the covered
entity to the business associate.
***Designated record set.***
In the proposed rule, we defined designated record set as "a group of
records under the control of a covered entity from which information is
retrieved by the name of the individual or by some identifying number,
symbol, or other identifying particular assigned to the individual and
which is used by the covered entity to make decisions about the
individual." We defined a "record" as "any item, collection, or grouping
of protected health information maintained, collected, used, or
disseminated by a covered entity."
In the final rule, we modify the definition of designated record set to
specify certain records maintained by or for a covered entity that are
always part of a covered entity's designated record sets and to include
other records that are used to make decisions about individuals. We do
not use the means of retrieval of a record as a defining criteria.
For health plans, designated record sets include, at a minimum, the
enrollment, payment, claims adjudication, and case or medical management
record systems of the plan. For covered health care providers,
designated record sets include, at a minimum, the medical record and
billing record about individuals maintained by or for the provider. In
addition to these records, designated record sets include any other
group of records that are used, in whole or in part, by or for a covered
entity to make decisions about individuals. We note that records that
otherwise meet the definition of designated record set and which are
held by a business associate of the covered entity are part of the
covered entity's designated record sets. Although we do not specify
particular types of records that are always included in the designated
record sets of clearinghouses when they are not acting as business
associates, this definition includes a group of records that such a
clearinghouse uses, in whole or in part, to make decisions about
individuals.
For the most part we retain, with slight modifications, the definition
of "record," defining it as any item, collection, or grouping of
information that includes protected health information and is
maintained, collected, used, or disseminated.
***Direct treatment relationship.***
This term was not included in the proposed rule. Direct treatment
relationship means a relationship between a health care provider and an
individual that is not an indirect treatment relationship (see
definition of indirect treatment relationship, below). For example,
outpatient pharmacists and Web-based providers generally have direct
treatment relationships with patients. Outpatient pharmacists fill
prescriptions written by other providers, but they furnish the
prescription and advice about the prescription directly to the patient,
not through another treating provider. Web-based providers generally
deliver health care independently, without the orders of another
provider.
A provider may have direct treatment relationships with some patients
and indirect treatment relationships with others. In some provisions of
the final rule, providers with indirect treatment relationships are
excepted from requirements that apply to other providers. See § 164.506
regarding consent for uses and disclosures of protected health
information for treatment, payment, and health care operations, and §
164.520 regarding notice of information practices. These exceptions
apply only with respect to the individuals with whom the provider has an
indirect treatment relationship.
***Disclosure.***
We proposed to define "disclosure" to mean the release, transfer,
provision of access to, or divulging in any other manner of information
outside the entity holding the information. The final rule is unchanged.
We note that the transfer of protected health information from a covered
entity to a business associate is a disclosure for purposes of this
regulation.
***Health care operations.***
The preamble to the proposed rule explained that in order for treatment
and payment to occur, protected health information must be used within
entities and shared with business partners. In the proposed rule we
provided a definition for "health care operations" to clarify the
activities we considered to be "compatible with and directly related to"
treatment and payment and for which protected health information could
be used or disclosed without individual authorization. These activities
included conducting quality assessment and improvement activities,
reviewing the competence or qualifications and accrediting/licensing of
health care professionals and plans, evaluating health care professional
and health plan performance, training future health care professionals,
insurance activities relating to the renewal of a contract for
insurance, conducting or arranging for medical review and auditing
services, and compiling and analyzing information in anticipation of or
for use in a civil or criminal legal proceeding. Recognizing the dynamic
nature of the health care industry, we acknowledged that the specified
categories may need to be modified as the industry evolves.
The preamble discussion of the proposed general rules listed certain
activities that would not be considered health care operations because
they were sufficiently unrelated to treatment and payment to warrant
requiring an individual to authorize such use or disclosure. Those
activities included: marketing of health and non-health items and
services; disclosure of protected health information for sale, rent or
barter; use of protected health information by a non-health related
division of an entity; disclosure of protected health information for
eligibility, enrollment, underwriting, or risk rating determinations
prior to an individuals' enrollment in a health plan; disclosure to an
employer for employment determinations; and fundraising.
In the final rule, we do not change the general approach of defining
health care operations: health care operations are the listed activities
undertaken by the covered entity that maintains the protected health
information (i.e., one covered entity may not disclose protected health
information for the operations of a second covered entity); a covered
entity may use any protected health information it maintains for its
operations (e.g., a plan may use protected health information about
former enrollees as well as current enrollees); we expand the proposed
list to reflect many changes requested by commenters.
We modify the proposal that health care operations represent activities
"in support of" treatment and payment functions. Instead, in the final
rule, health care operations are the enumerated activities to the extent
that the activities are related to the covered entity's functions as a
health care provider, health plan or health care clearinghouse, i.e.,
the entity's "covered functions." We make this change to clarify that
health care operations includes general administrative and business
functions necessary for the covered entity to remain a viable business.
While it is possible to draw a connection between all the enumerated
activities and "treatment and payment," for some general business
activities (e.g., audits for financial disclosure statements) that
connection may be tenuous. The proposed concept also did not include the
operations of those health care clearinghouses that may be covered by
this rule outside their status as business associate to a covered
entity. We expand the definition to include disclosures for the
enumerated activities of organized health care arrangements in which the
covered entity participates. See also the definition of organized health
care arrangements, below.
In addition, we make the following changes and additions to the
enumerated subparagraphs:
\(1\) We add language to clarify that the primary purpose of the studies
encompassed by "quality assessment and improvement activities" must not
be to obtain generalizable knowledge. A study with such a purpose would
meet the rule's definition of research, and use or disclosure of
protected health information would have to meet the requirements of §§
164.508 or 164.512(i). Thus, studies may be conducted as a health care
operation if development of generalizable knowledge is not the primary
goal. However, if the study changes and the covered entity intends the
results to be generalizable, the change should be documented by the
covered entity as proof that, when initiated, the primary purpose was
health care operations.
We add population-based activities related to improving health or
reducing health care costs, protocol development, case management and
care coordination, contacting of health care providers and patients with
information about treatment alternatives, and related functions that do
not entail direct patient care. Many commenters recommended adding the
term "disease management" to health care operations. We were unable,
however, to find a generally accepted definition of the term. Rather
than rely on this label, we include many of the functions often included
in discussions of disease management in this definition or in the
definition of treatment. This topic is discussed further in the comment
responses below.
\(2\) We have deleted "undergraduate and graduate" as a qualifier for
"students," to make the term more general and inclusive. We add the term
"practitioners." We expand the purposes encompassed to include
situations in which health care providers are working to improve their
skills. The rule also adds the training of non-health care
professionals.
\(3\) The rule expands the range of insurance related activities to
include those related to the creation, renewal or replacement of a
contract for health insurance or health benefits, as well as ceding,
securing, or placing a contract for reinsurance of risk relating to
claims for health care (including stop-loss and excess of loss
insurance). For these activities, we also eliminate the proposed
requirement that these uses and disclosures apply only to protected
health information about individuals already enrolled in a health plan.
Under this provision, a group health plan that wants to replace its
insurance carrier may disclose certain protected health information to
insurance issuers in order to obtain bids on new coverage, and an
insurance carrier interested in bidding on new business may use
protected health information obtained from the potential new client to
develop the product and pricing it will offer. For circumstances in
which no new contract is issued, we add a provision in § 164.514(g)
restricting the recipient health plan from using or disclosing protected
health information obtained for this purpose, other than as required by
law. Uses and disclosures in these cases come within the definition of
"health care operations," provided that the requirements of § 164.514(g)
are met, if applicable. See § 164.504(f) for requirements for such
disclosures by group health plans, as well as specific restrictions on
the information that may be disclosed to plan sponsors for such
purposes. We note that a covered health care provider must obtain an
authorization under § 164.508 in order to disclose protected health
information about an individual for purposes of pre-enrollment
underwriting; the underwriting is not an "operation" of the provider and
that disclosure is not otherwise permitted by a provision of this rule.
\(4\) We delete reference to the "compiling and analyzing information in
anticipation of or for use in a civil or criminal legal proceeding" and
replace it with a broader reference to conducting or arranging for
"legal services."
We add two new categories of activities:
\(5\) Business planning and development, such as conducting
cost-management and planning-related analyses related to managing and
operating the entity, including formulary development and
administration, development or improvement of methods of payment or
coverage policies.
\(6\) Business management activities and general administrative
functions, such as management activities relating to implementation of
and compliance with the requirements of this subchapter, fundraising for
the benefit of the covered entity to the extent permitted without
authorization under § 164.514(f), and marketing of certain services to
individuals served by the covered entity, to the extent permitted
without authorization under § 164.514(e) (see discussion in the preamble
to that section, below). For example, under this category we permit uses
or disclosures of protected health information to determine from whom an
authorization should be obtained, for example to generate a mailing list
of individuals who would receive an authorization request.
We add to the definition of health care operations disclosure of
protected health information for due diligence to a covered entity that
is a potential successor in interest. This provision includes
disclosures pursuant to the sale of a covered entity\'s business as a
going concern, mergers, acquisitions, consolidations, and other similar
types of corporate restructuring between covered entities, including a
division of a covered entity, and to an entity that is not a covered
entity but will become a covered entity if the transfer or sale is
completed. Other types of sales of assets, or disclosures to
organizations that are not and would not become covered entities, are
not included in the definition of health care operations and could only
occur if the covered entity obtained valid authorization for such
disclosure in accordance with § 164.508, or if the disclosure is
otherwise permitted under this rule.
We also add to health care operations disclosure of protected health
information for resolution of internal grievances. These uses and
disclosures include disclosure to an employee and/or employee
representative, for example when the employee needs protected health
information to demonstrate that the employer's allegations of improper
conduct are untrue. We note that such employees and employee
representatives are not providing services to or for the covered entity,
and, therefore, no business associate contract is required. Also
included are resolution of disputes from patients or enrollees regarding
the quality of care and similar matters.
We also add use for customer service, including the provision of data
and statistical analyses for policyholders, plan sponsors, or other
customers, as long as the protected health information is not disclosed
to such persons. We recognize that part of the general management of a
covered entity is customer service. We clarify that customer service may
include the use of protected health information to provide data and
statistical analyses. For example, a plan sponsor may want to understand
why its costs are rising faster than average, or why utilization in one
plant location is different than in another location. An association
that sponsors an insurance plan for its members may want information on
the relative costs of its plan in different areas. Some plan sponsors
may want more detailed analyses that attempt to identify health problems
in a work site. We note that when a plan sponsor has several different
group health plans, or when such plans provide insurance or coverage
through more than one health insurance issuer or HMO, the covered
entities may jointly engage in this type of analysis as a health care
operation of the organized health care arrangement.
This activity qualifies as a health care operation only if it does not
result in the disclosure of protected health information to the
customer. The results of the analyses must be presented in a way that
does not disclose protected health information. A disclosure of
protected health information to the customer as a health care operation
under this provision violates this rule. This provision is not intended
to permit covered entities to circumvent other provisions in this rule,
including requirements relating to disclosures of protected health
information to plan sponsors or the requirements relating to research.
See § 164.504(f) and § 164.512(i).
We use the term customer to provide flexibility to covered entities. We
do not intend the term to apply to persons with whom the covered entity
has no other business; this provision is intended to permit covered
entities to provide service to their existing customer base.
We note that this definition, either alone or in conjunction with the
definition of "organized health care arrangement," allows an entity such
as an integrated staff model HMO, whether legally integrated or whether
a group of associated entities, that hold themselves out as an organized
arrangement to share protected health information under § 164.506. In
these cases, the sharing of protected health information will be either
for the operations of the disclosing entity or for the organized health
care arrangement in which the entity is participating.
Whether a disclosure is allowable for health care operations under this
provision is determined separately from whether a business associate
contract is required. These provisions of the rule operate
independently. Disclosures for health care operations may be made to an
entity that is neither a covered entity nor a business associate of the
covered entity. For example, a covered academic medical center may
disclose certain protected health information to community health care
providers who participate in one of its continuing medical education
programs, whether or not such providers are covered health care
providers under this rule. A provider attending a continuing education
program is not thereby performing services for the covered entity
sponsoring the program and, thus, is not a business associate for that
purpose. Similarly, health plans may disclose for due diligence purposes
to another entity that may or may not be a covered entity or a business
associate.
***Health oversight agency.***
The proposed rule would have defined "health oversight agency" as "an
agency, person, or entity, including the employees or agents thereof,
(1) That is: (i) A public agency; or (ii) A person or entity acting
under grant of authority from or contract with a public agency; and (2)
Which performs or oversees the performance of any audit; investigation;
inspection; licensure or discipline; civil, criminal, or administrative
proceeding or action; or other activity necessary for appropriate
oversight of the health care system, of government benefit programs for
which health information is relevant to beneficiary eligibility, or of
government regulatory programs for which health information is necessary
for determining compliance with program standards." The proposed rule
also described the functions of health oversight agencies in the
proposed health oversight section (§ 164.510(c)) by repeating much of
this definition.
In the final rule, we modify the definition of health oversight agency
by eliminating from the definition the language in proposed § 164.510(c)
(now § 164.512(d)). In addition, the final rule clarifies this
definition by specifying that a "health oversight agency" is an agency
or authority of the United States, a state, a territory, a political
subdivision of a state or territory, or an Indian tribe, or a person or
entity acting under a grant of authority from or contract with such
public agency, including the employees or agents of such public agency
or its contractors or grantees, that is authorized by law to oversee the
health care system or government programs in which health information is
necessary to determine eligibility or compliance, or to enforce civil
rights laws for which health information is relevant.
The preamble to the proposed rule listed the following as examples of
health oversight agencies that conduct oversight activities relating to
the health care system: state insurance commissions, state health
professional licensure agencies, Offices of Inspectors General of
federal agencies, the Department of Justice, state Medicaid fraud
control units, Defense Criminal Investigative Services, the Pension and
Welfare Benefit Administration, the HHS Office for Civil Rights, and the
FDA. The proposed rule listed the Social Security Administration and the
Department of Education as examples of health oversight agencies that
conduct oversight of government benefit programs for which health
information is relevant to beneficiary eligibility. The proposed rule
listed the Occupational Health and Safety Administration and the
Environmental Protection Agency as examples of oversight agencies that
conduct oversight of government regulatory programs for which health
information is necessary for determining compliance with program
standards.
In the final rule, we include the following as additional examples of
health oversight activities: (1) The U.S. Department of Justice's civil
rights enforcement activities, and in particular, enforcement of the
Civil Rights of Institutionalized Persons Act (42 U.S.C. 1997-1997j) and
the Americans with Disabilities Act (42 U.S.C. 12101 et seq.), as well
as the EEOC's civil rights enforcement activities under titles I and V
of the ADA; (2) the FDA's oversight of food, drugs, biologics, devices,
and other products pursuant to the Food, Drug, and Cosmetic Act (21
U.S.C. 301 et seq.) and the Public Health Service Act (42 U.S.C. 201 et
seq.); and (3) data analysis -- performed by a public agency or by a
person or entity acting under grant of authority from or under contract
with a public agency -- to detect health care fraud.
"Overseeing the health care system," which is included in the definition
of health oversight, encompasses activities such as: oversight of health
care plans; oversight of health benefit plans; oversight of health care
providers; oversight of health care and health care delivery; oversight
activities that involve resolution of consumer complaints; oversight of
pharmaceuticals, medical products and devices, and dietary supplements;
and a health oversight agency's analysis of trends in health care costs,
quality, health care delivery, access to care, and health insurance
coverage for health oversight purposes.
We recognize that health oversight agencies, such as the U.S. Department
of Labor's Pension and Welfare Benefits Administration, may perform more
than one type of health oversight. For example, agencies may sometimes
perform audits and investigations and at other times conduct general
oversight of health benefit plans. Such entities are considered health
oversight agencies under the rule for any and all of the health
oversight functions that they perform.
The definition of health oversight agency does not include private
organizations, such as private-sector accrediting groups. Accreditation
organizations are performing health care operations functions on behalf
of health plans and covered health care providers. Accordingly, in order
to obtain protected health information without individuals'
authorizations, accrediting groups must enter into business associate
agreements with health plans and covered health care providers for these
purposes. Similarly, private entities, such as coding committees, that
help government agencies that are health plans make coding and payment
decisions are performing health care payment functions on behalf the
government agencies and, therefore, must enter into business associate
agreements in order to receive protected health information from the
covered entity (absent individuals' authorization for such disclosure).
***Indirect treatment relationship.***
This term was not included in the proposed rule. An "indirect treatment
relationship" is a relationship between a health care provider and an
individual in which the provider delivers health care to the individual
based on the orders of another health care provider and the health care
services, products, diagnoses, or results are typically furnished to the
patient through another provider, rather than directly. For example,
radiologists and pathologists generally have indirect treatment
relationships with patients because they deliver diagnostic services
based on the orders of other providers and the results of those services
are furnished to the patient through the direct treating provider. This
definition is necessary to clarify the relationships between providers
and individuals in the regulation. For example, see the consent
discussion at § 164.506.
***Individual.***
We proposed to define "individual" to mean the person who is the subject
of the protected health information. We proposed that the term include,
with respect to the signing of authorizations and other rights (such as
access, copying, and correction), the following types of legal
representatives:
\(1\) With respect to adults and emancipated minors, legal
representatives (such as court-appointed guardians or persons with a
power of attorney), to the extent to which applicable law permits such
legal representatives to exercise the person's rights in such contexts.
\(2\) With respect to unemancipated minors, a parent, guardian, or
person acting *in loco parentis*, provided that when a minor lawfully
obtains a health care service without the consent of or notification to
a parent, guardian, or other person acting *in loco parentis*, the minor
shall have the exclusive right to exercise the rights of an individual
with respect to the protected health information relating to such care.
\(3\) With respect to deceased persons, an executor, administrator, or
other person authorized under applicable law to act on behalf of the
decedent's estate.
In addition, we proposed to exclude from the definition:
\(1\) Foreign military and diplomatic personnel and their dependents who
receive health care provided by or paid for by the Department of Defense
or other federal agency or by an entity acting on its behalf, pursuant
to a country-to-country agreement or federal statute.
\(2\) Overseas foreign national beneficiaries of health care provided by
the Department of Defense or other federal agency or by a
non-governmental organization acting on its behalf.
In the final rule, we eliminate from the definition of "individual" the
provisions designating a legal representative as the "individual" for
purposes of exercising certain rights with regard to protected health
information. Instead, we include in the final rule a separate standard
for "personal representatives." A covered entity must treat a personal
representative of an individual as the individual except under specified
circumstances. See discussion in § 164.502(g) regarding personal
representatives.
In addition, we eliminate from the definition of "individual" the above
exclusions for foreign military and diplomatic personnel and overseas
foreign national beneficiaries. We address the special circumstances for
use and disclosure of protected health information about individuals who
are foreign military personnel in § 164.512(k). We address overseas
foreign national beneficiaries in § 164.500, "Applicability." The
protected health information of individuals who are foreign diplomatic
personnel and their dependents are not subject to special treatment
under the final rule.
Individually identifiable health information about one individual may
exist in the health records of another individual; health information
about one individual may include health information about a second
person. For example, a patient\'s medical record may contain information
about the medical conditions of the patient's parents, children, and
spouse, as well as their names and contact information. For the purpose
of this rule, if information about a second person is included within
the protected health information of an individual, the second person is
not the person who is the subject of the protected health information.
The second person is not the "individual" with regard to that protected
health information, and under this rule thus does not have the
individual\'s rights (e.g., access and amendment) with regard to that
information.
***Individually identifiable health information.***
We proposed to define "individually identifiable health information" to
mean information that is a subset of health information, including
demographic information collected from an individual, and that:
\(1\) Is created by or received from a health care provider, health
plan, employer, or health care clearinghouse; and
\(2\) Relates to the past, present, or future physical or mental health
or condition of an individual, the provision of health care to an
individual, or the past, present, or future payment for the provision of
health care to an individual, and
\(i\) Which identifies the individual, or
\(ii\) With respect to which there is a reasonable basis to believe that
the information can be used to identify the individual.
In the final rule, we change "created by or received from a health care
provider\..." to "created or received by a health care provider\... " in
order to conform to the statute. We otherwise retain the definition of
"individually identifiable health information" without change in the
final rule.
***Inmate.***
The proposed rule did not define the term inmate. In the final rule, it
is defined as a person incarcerated in or otherwise confined to a
correctional institution. The addition of this definition is necessary
to explain the privacy rights and protections of inmates in this
regulation.
***Law enforcement official.***
The proposed rule would have defined a "law enforcement official" as "an
official of an agency or authority of the United States, a state, a
territory, a political subdivision of a state or territory, or an Indian
tribe, who is empowered by law to conduct: (1) an investigation or
official proceeding inquiring into a violation of, or failure to comply
with, any law; or (2) a criminal, civil, or administrative proceeding
arising from a violation of, or failure to comply with, any law."
The final rule modifies this definition slightly. The definition in the
final rule recognizes that law enforcement officials are empowered to
prosecute cases as well as to conduct investigations and civil,
criminal, or administrative proceedings. In addition, the definition in
the final rule reflects the fact that when investigations begin, often
it is not clear that law has been violated. Thus, the final rule
describes law enforcement investigations and official proceedings as
inquiring into a potential violation of law. In addition, it describes
law enforcement-related civil, criminal, or administrative proceedings
as arising from alleged violation of law.
***Marketing.***
The proposed rule did not include a definition of "marketing." The
proposed rule generally required that a covered entity would need an
authorization from an individual to use or disclose protected health
information for marketing.
In the final rule we define marketing as a communication about a product
or service a purpose of which is to encourage recipients of the
communication to purchase or use the product or service. The definition
does not limit the type or means of communication that are considered
marketing.
The definition of marketing contains three exceptions. If a covered
entity receives direct or indirect remuneration from a third party for
making a written communication otherwise described in an exception, then
the communication is not excluded from the definition of marketing. The
activities we except from the definition of marketing are encompassed by
the definitions of treatment, payment, and health care operations.
Covered entities may therefore use and disclose protected health
information for these excepted activities without authorization under §
164.508 and pursuant to any applicable consent obtained under § 164.506.
The first exception applies to communications made by a covered entity
for the purpose of describing the entities participating in a provider
network or health plan network. It also applies to communications made
by a covered entity for the purpose of describing if and the extent to
which a product or service, or payment for a product or service, is
provided by the covered entity or included in a benefit plan. This
exception permits covered entities to use or disclose protected health
information when discussing topics such as the benefits and services
available under a health plan, the payment that may be made for a
product or service, which providers offer a particular product or
service, and whether a provider is part of a network or whether (and
what amount of) payment will be provided with respect to the services of
particular providers. This exception expresses our intent not to
interfere with communications made to individuals about their health
benefits.
The second exception applies to communications tailored to the
circumstances of a particular individual, made by a health care provider
to an individual as part of the treatment of the individual, and for the
purpose of furthering the treatment of that individual. This exception
leaves health care providers free to use or disclose protected health
information as part of a discussion of its products and services, or the
products and services of others, and to prescribe, recommend, or sell
such products or services, as part of the treatment of an individual.
This exception includes activities such as referrals, prescriptions,
recommendations, and other communications that address how a product or
service may relate to the individual\'s health. This exception expresses
our intent not to interfere with communications made to individuals
about their treatment.
The third exception applies to communications tailored to the
circumstances of a particular individual and made by a health care
provider or health plan to an individual in the course of managing the
treatment of that individual or for the purpose of directing or
recommending to that individual alternative treatments, therapies,
providers, or settings of care. As with the previous exception, this
exception permits covered entities to discuss freely their products and
services and the products and services of third parties, in the course
of managing an individual's care or providing or discussing treatment
alternatives with an individual, even when such activities involve the
use or disclose protected health information.
Section 164.514 contains provisions governing use or disclosure of
protected health information in marketing communications, including a
description of certain marketing communications that may use or include
protected health information but that may be made by a covered entity
without individual authorization. The definition of health care
operations includes those marketing communications that may be made
without an authorization pursuant to § 164.514. Covered entities may
therefore use and disclose protected health information for these
activities pursuant to any applicable consent obtained under § 164.506,
or, if they are not required to obtain a consent under § 164.506,
without one.
***Organized Health Care Arrangement.***
This term was not used in the proposed rule. We define the term in order
to describe certain arrangements in which participants need to share
protected health information about their patients to manage and benefit
the common enterprise. To allow uses and disclosures of protected health
information for these arrangements, we also add language to the
definition of "health care operations." See discussion of that term
above.
We include five arrangements within the definition of *organized health
care arrangement*. The arrangements involve clinical or operational
integration among legally separate covered entities in which it is often
necessary to share protected health information for the joint management
and operations of the arrangement. They may range in legal structure,
but a key component of these arrangements is that individuals who obtain
services from them have an expectation that these arrangements are
integrated and that they jointly manage their operations. We include
within the definition a clinically integrated care setting in which
individuals typically receive health care from more than one health care
provider. Perhaps the most common example of this type of organized
health care arrangement is the hospital setting, where a hospital and a
physician with staff privileges at the hospital together provide
treatment to the individual. Participants in such clinically integrated
settings need to be able to share health information freely not only for
treatment purposes, but also to improve their joint operations. For
example, any physician with staff privileges at a hospital must be able
to participate in the hospital's morbidity and mortality reviews, even
when the particular physician's patients are not being discussed. Nurses
and other hospital personnel must also be able to participate. These
activities benefit the common enterprise, even when the benefits to a
particular participant are not evident. While protected health
information may be freely shared among providers for treatment purposes
under other provisions of this rule, some of these joint activities also
support the health care operations of one or more participants in the
joint arrangement. Thus, special rules are needed to ensure that this
rule does not interfere with legitimate information sharing among the
participants in these arrangements.
We also include within the definition an organized system of health care
in which more than one covered entity participates, and in which the
participating covered entities hold themselves out to the public as
participating in a joint arrangement, and in which the joint activities
of the participating covered entities include at least one of the
following: utilization review, in which health care decisions by
participating covered entities are reviewed by other participating
covered entities or by a third party on their behalf; quality assessment
and improvement activities, in which treatment provided by participating
covered entities is assessed by other participating covered entities or
by a third party on their behalf; or payment activities, if the
financial risk for delivering health care is shared in whole or in part
by participating covered entities through the joint arrangement and if
protected health information created or received by a covered entity is
reviewed by other participating covered entities or by a third party on
their behalf for the purpose of administering the sharing of financial
risk. A common example of this type of organized health care arrangement
is an independent practice association formed by a large number of
physicians. They may advertise themselves as a common enterprise (e.g.,
Acme IPA), whether or not they are under common ownership or control,
whether or not they practice together in an integrated clinical setting,
and whether or not they share financial risk.
If such a group engages jointly in one or more of the listed activities,
the participating covered entities will need to share protected health
information to undertake such activities and to improve their joint
operations. In this example, the physician participants in the IPA may
share financial risk through common withhold pools with health plans or
similar arrangements. The IPA participants who manage the financial
arrangements need protected health information about all the
participants' patients in order to manage the arrangement. (The
participants may also hire a third party to manage their financial
arrangements.) If the participants in the IPA engage in joint quality
assurance or utilization review activities, they will need to share
protected health information about their patients much as participants
in an integrated clinical setting would. Many joint activities that
require the sharing of protected health information benefit the common
enterprise, even when the benefits to a particular participant are not
evident.
We include three relationships related to group health plans as
organized health care arrangements. First, we include a group health
plan and an issuer or HMO with respect to the group health plan within
the definition, but only with respect to the protected health
information of the issuer or HMO that relates to individuals who are or
have been participants or beneficiaries in the group health plan. We
recognize that many group health plans are funded partially or fully
through insurance, and that in some cases the group health plan and
issuer or HMO need to coordinate operations to properly serve the
enrollees. Second, we include a group health plan and one or more other
group health plans each of which are maintained by the same plan
sponsor. We recognize that in some instances plan sponsors provide
health benefits through a combination of group health plans, and that
they may need to coordinate the operations of such plans to better serve
the participants and beneficiaries of the plans. Third, we include a
combination of group health plans maintained by the same plan sponsor
and the health insurance issuers and HMOs with respect to such plans,
but again only with respect to the protected health information of such
issuers and HMOs that relates to individuals who are or have been
enrolled in such group health plans. We recognize that is some instances
a plan sponsor may provide benefits through more than one group health
plan, and that such plans may fund the benefits through one or more
issuers or HMOs. Again, coordinating health care operations among these
entities may be necessary to serve the participants and beneficiaries in
the group health plans. We note that the necessary coordination may
necessarily involve the business associates of the covered entities and
may involve the participation of the plan sponsor to the extent that it
is providing plan administration functions and subject to the limits in
§ 164.504.
***Payment.***
We proposed the term payment to mean:
\(1\) The activities undertaken by or on behalf of a covered entity that
is:
\(i\) A health plan, or by a business partner on behalf of a health
plan, to obtain premiums or to determine or fulfill its responsibility
for coverage under the health plan and for provision of benefits under
the health plan; or
\(ii\) A health care provider or health plan, or a business partner on
behalf of such provider or plan, to obtain reimbursement for the
provision of health care.
\(2\) Activities that constitute payment include:
\(i\) Determinations of coverage, adjudication or subrogation of health
benefit claims;
\(ii\) Risk adjusting amounts due based on enrollee health status and
demographic characteristics;
\(iii\) Billing, claims management, and medical data processing;
\(iv\) Review of health care services with respect to medical necessity,
coverage under a health plan, appropriateness of care, or justification
of charges; and
\(v\) Utilization review activities, including precertification and
preauthorization of services.
In the final rule, we maintain the general approach of defining of
payment: payment activities are described generally in the first clause
of the definition, and specific examples are given in the second clause.
Payment activities relate to the covered entity that maintains the
protected health information (i.e., one covered entity may not disclose
protected health information for the payment activities of a second
covered entity). A covered entity may use or disclose only the protected
health information about the individual to whom care was rendered, for
its payment activities (e.g., a provider may disclose protected health
information only about the patient to whom care was rendered in order to
obtain payment for that care, or only the protected health information
about persons enrolled in the particular health plan that seeks to audit
the provider's records). We expand the proposed list to reflect many
changes requested by commenters.
We add eligibility determinations as an activity included in the
definition of payment. We expand coverage determinations to include the
coordination of benefits and the determination of a specific
individual's cost sharing amounts. The rule deletes activities related
to the improvement of methods of paying or coverage policies from this
definition and instead includes them in the definition of health care
operations. We add to the definition "collection activities." We replace
"medical data processing" activities with health care data processing
related to billing, claims management, and collection activities. We add
activities for the purpose of obtaining payment under a contract for
reinsurance (including stop-loss and excess of loss insurance).
Utilization review activities now include concurrent and retrospective
review of services.
In addition, we modify this definition to clarify that the activities
described in section 1179 of the Act are included in the definition of
"payment." We add new subclause (vi) allowing covered entities to
disclose to consumer reporting agencies an individual's name, address,
date of birth, social security number and payment history, account
number, as well as the name and address of the individual's health care
provider and/or health plan, as appropriate. Covered entities may make
disclosure of this protected health information to consumer reporting
agencies for purposes related to collection of premiums or
reimbursement. This allows reporting not just of missed payments and
overdue debt but also of subsequent positive payment experience (e.g.,
to expunge the debt). We consider such positive payment experience to be
"related to" collection of premiums or reimbursement.
The remaining activities described in section 1179 are included in other
language in this definition. For example, "authorizing, processing,
clearing, settling, billing, transferring, reconciling or collecting, a
payment for, or related to, health plan premiums or health care" are
covered by paragraph (2)(iii) of the definition, which allows use and
disclosure of protected health information for "billing, claims
management, collection activities and related health care data
processing." "Claims management" also includes auditing payments,
investigating and resolving payment disputes and responding to customer
inquiries regarding payments. Disclosure of protected health information
for compliance with civil or criminal subpoenas, or with other
applicable laws, are covered under § 164.512 of this regulation. (See
discussion above regarding the interaction between 1179 and this
regulation.)
We modify the proposed regulation text to clarify that payment includes
activities undertaken to reimburse health care providers for treatment
provided to individuals.
Covered entities may disclose protected health information for payment
purposes to any other entity, regardless of whether it is a covered
entity. For example, a health care provider may disclose protected
health information to a financial institution in order to cash a check
or to a health care clearinghouse to initiate electronic transactions.
However, if a covered entity engages another entity, such as a billing
service or a financial institution, to conduct payment activities on its
behalf, the other entity may meet the definition of 'business associate'
under this rule. For example, an entity is acting as a business
associate when it is operating the accounts receivable system on behalf
of a health care provider.
Similarly, payment includes disclosure of protected health information
by a health care provider to an insurer that is not a 'health plan' as
defined in this rule, to obtain payment. For example, protected health
information may be disclosed to obtain reimbursement from a disability
insurance carrier. We do not interpret the definition of "payment" to
include activities that involve the disclosure of protected health
information by a covered entity, including a covered health care
provider, to a plan sponsor for the purpose of obtaining payment under a
group health plan maintained by such plan sponsor, or for the purpose of
obtaining payment from a health insurance issuer or HMO with respect to
a group health plan maintained by such plan sponsor, unless the plan
sponsor is performing plan administration pursuant to § 164.504(f).
The Transactions Rule adopts standards for electronic health care
transactions, including two for processing payments. We adopted the ASC
X12N 835 transaction standard for \"Health Care Payment and Remittance
Advice\" transactions between health plans and health care providers,
and the ASC X12N 820 standard for "Health Plan Premium Payments"
transactions between entities that arrange for the provision of health
care or provide health care coverage payments and health plans. Under
these two transactions, information to effect funds transfer is
transmitted in a part of the transaction separable from the part
containing any individually identifiable health information.
We note that a covered entity may conduct the electronic funds transfer
portion of the two payment standard transactions with a financial
institution without restriction, because it contains no protected health
information. The protected health information contained in the
electronic remittance advice or the premium payment enrollee data
portions of the transactions is not necessary either to conduct the
funds transfer or to forward the transactions. Therefore, a covered
entity may not disclose the protected health information to a financial
institution for these purposes. A covered entity may transmit the
portions of the transactions containing protected health information
through a financial institution if the protected health information is
encrypted so it can be read only by the intended recipient. In such
cases no protected health information is disclosed and the financial
institution is acting solely as a conduit for the individually
identifiable data.
***Plan sponsor.***
In the final rule we add a definition of \"plan sponsor.\" We define
plan sponsor by referencing the definition of the term provided in
(3)(16)(B) of the Employee Retirement Income Security Act (ERISA). The
plan sponsor is the employer or employee organization, or both, that
establishes and maintains an employee benefit plan. In the case of a
plan established by two or more employers, it is the association,
committee, joint board of trustees, or other similar group of
representative of the parties that establish and maintain the employee
benefit plan. This term includes church health plans and government
health plans. Group health plans may disclose protected health
information to plan sponsors who conduct payment and health care
operations activities on behalf of the group health plan if the
requirements for group health plans in § 164.504 are met.
The preamble to the Transactions Rule noted that plan sponsors of group
health plans are not covered entities and, therefore, are not required
to use the standards established in that regulation to perform
electronic transactions, including enrollment and disenrollment
transactions. We do not change that policy through this rule. Plan
sponsors that perform enrollment functions are doing so on behalf of the
participants and beneficiaries of the group health plan and not on
behalf of the group health plan itself. For purposes of this rule, plan
sponsors are not subject to the requirements of § 164.504 regarding
group health plans when conducting enrollment activities.
***Protected health information.***
We proposed to define "protected health information" to mean
individually identifiable health information that is or has been
electronically maintained or electronically transmitted by a covered
entity, as well as such information when it takes any other form. For
purposes of this definition, we proposed to define "electronically
transmitted" as including information exchanged with a computer using
electronic media, such as the movement of information from one location
to another by magnetic or optical media, transmissions over the
Internet, Extranet, leased lines, dial-up lines, private networks,
telephone voice response, and "faxback" systems. We proposed that this
definition not include "paper-to-paper" faxes, or person-to-person
telephone calls, video teleconferencing, or messages left on voice-mail.
Further, "electronically maintained" was proposed to mean information
stored by a computer or on any electronic medium from which the
information may be retrieved by a computer, such as electronic memory
chips, magnetic tape, magnetic disk, or compact disc optical media.
The proposal's definition explicitly excluded:
\(1\) individually identifiable health information that is part of an
"education record" governed by the Family Educational Rights and Privacy
Act (FERPA), 20 U.S.C. 1232g.
\(2\) individually identifiable health information of inmates of
correctional facilities and detainees in detention facilities.
In this final rule we expand the definition of protected health
information to encompasses all individually identifiable health
information transmitted or maintained by a covered entity, regardless of
form. Specifically, we delete the conditions for individually
identifiable health information to be "electronically maintained" or
"electronically transmitted" and the corresponding definitions of those
terms. Instead, the final rule defines protected health information to
be individually identifiable health information that is:
\(1\) transmitted by electronic media;
\(2\) maintained in any medium described in the definition of
*electronic media* at § 162.103 of this subchapter; or
\(3\) transmitted or maintained in any other form or medium.
We refer to *electronic media*, as defined in § 162.103, which means the
mode of electronic transmission. It includes the Internet (wide-open),
Extranet (using Internet technology to link a business with information
only accessible to collaborating parties), leased lines, dial-up lines,
private networks, and those transmissions that are physically moved from
one location to another using magnetic tape, disk, or compact disk
media.
The definition of protected health information is set out in this form
to emphasize the severability of this provision. As discussed below, we
believe we have ample legal authority to cover all individually
identifiable health information transmitted or maintained by covered
entities. We have structured the definition this way so that, if a court
were to disagree with our view of our authority in this area, the rule
would still be operational, albeit with respect to a more limited
universe of information.
Other provisions of the rules below may also be severable, depending on
their scope and operation. For example, if the rule itself provides a
fallback, as it does with respect to the various discretionary uses and
disclosures permitted under § 164.512, the provisions would be severable
under case law.
The definition in the final rule retains the exception relating to
individually identifiable health information in "education records"
governed by FERPA. We also exclude the records described in 20 U.S.C.
1232g(a)(4)(B)(iv). These are records of students held by post-secondary
educational institutions or of students 18 years of age or older, used
exclusively for health care treatment and which have not been disclosed
to anyone other than a health care provider at the student's request.
(See discussion of FERPA above.)
We have removed the exception for individually identifiable health
information of inmates of correctional facilities and detainees in
detention facilities. Individually identifiable health information about
inmates is protected health information under the final rule, and
special rules for use and disclosure of the protected health information
about inmates and their ability to exercise the rights granted in this
rule are described below.
***Psychotherapy notes.***
Section 164.508(a)(3)(iv)(A) of the proposed rule defined psychotherapy
notes as notes recorded (in any medium) by a health care provider who is
a mental health professional documenting or analyzing the contents of
conversation during a private counseling session or a group, joint, or
family counseling session. The proposed definition excluded medication
prescription and monitoring, counseling session start and stop times,
the modalities and frequencies of treatment furnished, results of
clinical tests, and any summary of the following items: diagnosis,
functional status, the treatment plan, symptoms, prognosis and progress.
Furthermore, we stated in the preamble of the proposed rule that
psychotherapy notes would have to be maintained separately from the
medical record.
In this final rule, we retain the definition of psychotherapy notes that
we had proposed, but add to the regulation text the requirement that, to
meet the definition of psychotherapy notes, the information must be
separated from the rest of the individual's medical record.
***Public health authority.***
The proposed rule would have defined "public health authority" as "an
agency or authority of the United States, a state, a territory, or an
Indian tribe that is responsible for public health matters as part of
its official mandate."
The final rule changes this definition slightly to clarify that a
"public health authority" also includes a person or entity acting under
a grant of authority from or contract with a public health agency.
Therefore, the final rule defines this term as an agency or authority of
the United States, a state, a territory, a political subdivision of a
state or territory, or an Indian tribe, or a person or entity acting
under a grant of authority from or contract with such public agency,
including the employees or agents of such public agency or its
contractors or persons or entities to whom it has granted authority,
that is responsible for public health matters as part of its official
mandate.
***Required by law.***
In the preamble to the NPRM, we did not include a definition of
"required by law." We discussed what it meant for an action to be
considered to be "required" or "mandated" by law and included several
examples of activities that would be considered as required by law for
the purposes of the proposed rule, including a valid Inspector General
subpoena, grand jury subpoena, civil investigative demand, or a statute
or regulation requiring production of information justifying a claim
would constitute a disclosure required by law.
In the final rule we include a new definition, move the preamble
clarifications to the regulatory text and add several items to the
illustrative list. For purposes of this regulation, "required by law"
means a mandate contained in law that compels a covered entity to make a
use or disclosure of protected health information and that is
enforceable in a court of law. Among the examples listed in definition
are Medicare conditions of participation with respect to health care
providers participating in that program, court-ordered warrants, and
subpoenas issued by a court. We note that disclosures "required by law"
include disclosures of protected health information required by this
regulation in § 164.502(a)(2). It does not include contracts between
private parties or similar voluntary arrangements. This list is
illustrative only and is not intended in any way to limit the scope of
this paragraph or other paragraphs in § 164.512 that permit uses or
disclosures to the extent required by other laws. We note that nothing
in this rule compels a covered entity to make a use or disclosure
required by the legal demands or prescriptions listed in this
clarification or by any other law or legal process, and a covered entity
remains free to challenge the validity of such laws and processes.
***Research.***
We proposed to define "research" as it is defined in the Federal Policy
for the Protection of Human Subjects, at 45 CFR 46, Subpart A (referred
to elsewhere in this rule as "Common Rule"), and in addition, elaborated
on the meaning of the term "generalizable knowledge." In § 164.504 of
the proposed rule we defined research as "\... a systematic
investigation, including research development, testing and evaluation,
designed to develop or contribute to generalizable knowledge.
'Generalizable knowledge' is knowledge related to health that can be
applied to populations outside of the population served by the covered
entity."
The final rule eliminates the further elaboration of "generalizable
knowledge." Therefore, the rule defines "research" as the term is
defined in the Common Rule: a systematic investigation, including
research development, testing and evaluation, designed to develop or
contribute to generalizable knowledge.
***Research information unrelated to treatment.***
We delete this definition and the associated requirements from the final
rule. Refer to § 164.508(f) for new requirements regarding
authorizations for research that includes treatment of the individual.
***Treatment.***
The proposed rule defined "treatment" as the provision of health care
by, or the coordination of health care (including health care management
of the individual through risk assessment, case management, and disease
management) among, health care providers; the referral of a patient from
one provider to another; or the coordination of health care or other
services among health care providers and third parties authorized by the
health plan or the individual. The preamble noted that the definition
was intended to relate only to services provided to an individual and
not to an entire enrolled population.
In the final rule, we do not change the general approach to defining
treatment: treatment means the listed activities undertaken by any
health care provider, not just a covered health care provider. A plan
can disclose protected health information to any health care provider to
assist the provider's treatment activities; and a health care provider
may use protected health information about an individual to treat
another individual. A health care provider may use any protected health
information it maintains for treatment purposes (e.g., a provider may
use protected health information about former patients as well as
current patients). We modify the proposed list of treatment activities
to reflect changes requested by commenters.
Specifically, we modify the proposed definition of "treatment" to
include the management of health care and related services. Under the
definition, the provision, coordination, or management of health care or
related services may be undertaken by one or more health care providers.
"Treatment" includes coordination or management by a health care
provider with a third party and consultation between health care
providers. The term also includes referral by a health care provider of
a patient to another health care provider.
Treatment refers to activities undertaken on behalf of a single patient,
not a population. Activities are considered treatment only if delivered
by a health care provider or a health care provider working with another
party. Activities of health plans are not considered to be treatment.
Many services, such as a refill reminder communication or nursing
assistance provided through a telephone service, are considered
treatment activities if performed by or on behalf of a health care
provider, such as a pharmacist, but are regarded as health care
operations if done on behalf of a different type of entity, such as a
health plan.
We delete specific reference to risk assessment, case management, and
disease management. Activities often referred to as risk assessment,
disease and case management are treatment activities only to the extent
that they are services provided to a particular patient by a health care
provider; population based analyses or records review for the purposes
of treatment protocol development or modification are health care
operations, not treatment activities. If a covered entity is licensed as
both a health plan and a health care provider, a single activity could
be considered to be both treatment and health care operations; for
compliance purposes we would consider the purpose of the activity. Given
the integration of the health care system we believe that further
classification of activities into either treatment or health care
operations would not be helpful. See the definition of health care
operations for additional discussion.
***Use.***
We proposed to define "use" to mean the employment, application,
utilization, examination, or analysis of information within an entity
that holds the information. In the final rule, we clarify that use
refers to the use of individually identifiable health information. We
replace the term "holds" with the term "maintains." These changes are
for clarity only, and are not intended to effect any substantive change.
**SECTION 164.502 -- GENERAL RULES FOR USES AND DISCLOSURES OF PROTECTED
HEALTH INFORMATION**
**Section 164.502(a) -- Use and Disclosure for Treatment, Payment and
Health Care Operations**
As a general rule, we proposed in the NPRM to prohibit covered entities
from using or disclosing protected health information except as
authorized by the individual who is the subject of such information or
as explicitly permitted by the rule. The proposed rule explicitly would
have permitted covered entities to use or disclose an individual's
protected health information without authorization for treatment,
payment, and health care operations. The proposal would not have
restricted to whom disclosures could be made for the purposes of
treatment, payment, or operations. The proposal would have allowed
disclosure of the protected health information of one individual for the
treatment or payment of another, as appropriate. We also proposed to
prohibit covered entities from seeking individual authorization for uses
and disclosures for treatment, payment, and health care operations
unless required by state or other applicable law.
We proposed two exceptions to this general rule which prohibited covered
entities from using or disclosing research information unrelated to
treatment or psychotherapy notes for treatment, payment, or health care
operations purposes unless a specific authorization was obtained from
the subject of the information. In addition, we proposed that a covered
entity be prohibited from conditioning treatment, enrollment in a health
plan or payment decisions on a requirement that the individual provide a
specific authorization for the disclosure of these two types of
information (see proposed § 164.508(a)(3)(iii)).
We also proposed to permit covered entities to use or disclose an
individual's protected health information for specified public and
public policy-related purposes, including public health, research,
health oversight, law enforcement, and use by coroners. In addition, the
proposal would have permitted covered entities to use and disclose
protected health information when required to do so by other law or
pursuant to an authorization from the individual allowing them to use or
disclose the information for purposes other than treatment, payment or
health care operations.
We proposed to require covered entities to disclose protected health
information for only two purposes: to permit individuals to inspect and
copy protected health information about themselves and for enforcement
of the rule.
We proposed not to require covered entities to vary the level of
protection accorded to protected health information based on the
sensitivity of such information. In addition, we proposed to require
that each affected entity assess its own needs and devise, implement,
and maintain appropriate privacy policies, procedures, and documentation
to address its business requirements.
In the final rule, the general standard remains that covered entities
may use or disclose protected health information only as permitted or
required by this rule. However, we make significant changes to the
conditions under which uses and disclosures are permitted.
We revise the application of the general standard to require covered
health care providers who have a direct treatment relationship with an
individual to obtain a general "consent" from the individual in order to
use or disclose protected health information about the individual for
treatment, payment and health care operations (for details on who must
obtain such consents and the requirements they must meet, see §
164.506). These consents are intended to accommodate both the covered
provider's need to use or disclose protected health information for
treatment, payment, and health care operations, and also the
individual's interest in understanding and acquiescing to such uses and
disclosures. In general, other covered entities are permitted to use and
disclose protected health information to carry out treatment, payment,
or health care operations (as defined in this rule) without obtaining
such consent, as in the proposed rule. Covered entities must, as under
the proposed rule, obtain the individual's "authorization" in order to
use or disclose psychotherapy notes for most purposes: see §
164.508(a)(2) for exceptions to this rule. We delete the proposed
special treatment of "research information unrelated to treatment."
We revise the application of the general standard to require all covered
entities to obtain the individual's verbal "agreement" before using or
disclosing protected health information for facility directories, to
persons assisting in the individual's care, and for other purposes
described in § 164.510. Unlike "consent" and "authorization," verbal
agreement may be informal and implied from the circumstances (for
details on who must obtain such agreements and the requirements they
must meet, see § 164.510). Verbal agreements are intended to accommodate
situations where it is neither appropriate to remove from the individual
the ability to control the protected health information nor appropriate
to require formal, written permission to share such information. For the
most part, these provisions reflect current practices.
As under the proposed rule, we permit covered entities to use or
disclose protected health information without the individual's consent,
authorization or agreement for specified public policy purposes, in
compliance with the requirements in § 164.512.
We permit covered entities to disclose protected health information to
the individual who is the subject of that information without any
condition. We note that this may include disclosures to "personal
representatives" of individuals as provided by § 164.502(g).
We permit a covered entity to use or disclose protected health
information for other lawful purposes if the entity obtains a written
"authorization" from the individual, consistent with the provisions of §
164.508. Unlike "consents," these "authorizations" are specific and
detailed. (For details on who must obtain such authorizations and the
requirements they must meet, see § 164.508.) They are intended to
provide the individuals with concrete information about, and control
over, the uses and disclosures of protected health information about
themselves.
The final rule retains the provision that requires a covered entity to
disclose protected health information only in two instances: when
individuals request access to information about themselves, and when
disclosures are compelled by the Secretary for compliance and
enforcement purposes.
Finally, § 164.502(a)(1) also requires covered entities to use or
disclose protected health information in compliance with the other
provisions of § 164.502, for example, consistent with the minimum
necessary standard, to create de-identified information, or to a
personal representative of an individual. These provisions are described
below.
We note that a covered entity may use or disclose protected health
information as permitted by and in accordance with a provision of this
rule, regardless of whether that use or disclosure fails to meet the
requirements for use or disclosure under another provision of this rule.
**Section 164.502(b) -- Minimum Necessary Uses and Disclosures**
The proposed rule required a covered entity to make all reasonable
efforts not to use or disclose more than the minimum amount of protected
health information necessary to accomplish the intended purpose of the
use or disclosure (proposed § 164.506(b)). This final rule significantly
modifies the proposed requirements for implementing the minimum
necessary standard. In the final rule, § 164.502(b) contains the basic
standard and § 164.514 describes the requirements for implementing the
standard. Therefore we discuss all aspects of the minimum necessary
standard and specific requirements below in the discussion of §
164.514(d).
**Section 164.502(c) -- Uses and Disclosures** **Under a Restriction
Agreement**
The proposed rule would have required that covered health care providers
permit individuals to request restrictions of uses and disclosures of
protected health information and would have prohibited covered providers
from using or disclosing protected health information in violation of
any agreed-to restriction.
The final rule retains an individual's right to request restrictions on
uses or disclosures for treatment, payment or health care operations and
prohibits a covered entity from using or disclosing protected health
information in a way that is inconsistent with an agreed upon
restriction between the covered entity and the individual, but makes
some changes to this right. Most significantly, under the final rule
individuals have the right to request restrictions of all covered
entities. This standard is set forth in § 164.522. Details about the
changes to the standard are explained in the preamble discussion to §
164.522.
**Section 164.502(d) -- Creation of De-identified Information**
In proposed § 164.506(d) of the NPRM, we proposed to permit use of
protected health information for the purpose of creating de-identified
information and we provided detailed mechanisms for doing so.
In § 164.502(d) of the final rule, we permit a covered entity to use
protected health information to create de-identified information,
whether or not the de-identified information is to be used by the
covered entity. We clarify that de-identified information created in
accordance with our procedures (which have been moved to § 164.514(a))
is not subject to the requirements of these privacy rules unless it is
re-identified. Disclosure of a key or mechanism that could be used to
re-identify such information is also defined to be disclosure of
protected health information. See the preamble to § 164.514(a) for
further discussion.
**Section 164.502(e) -- Business Associates**
In the proposed rule, other than for purposes of consultation or
referral for treatment, we would have allowed a covered entity to
disclose protected health information to a business partner only
pursuant to a written contract that would, among other specified
provisions, limit the business partner's uses and disclosures of
protected health information to those permitted by the contract, and
would impose certain security, inspection and reporting requirements on
the business partner. We proposed to define the term "business partner"
to mean, with respect to a covered entity, a person to whom the covered
entity discloses protected health information so that the person can
carry out, assist with the performance of, or perform on behalf of, a
function or activity for the covered entity.
In the final rule, we change the term "business partner" to "business
associate" and in the definition clarify the full range of circumstances
in which a person is acting as a business associate of a covered entity.
(See definition of "business associate" in § 160.103.) These changes
mean that § 164.502(e) requires a business associate contract (or other
arrangement, as applicable) not only when the covered entity discloses
protected health information to a business associate, but also when the
business associate creates or receives protected health information on
behalf of the covered entity.
In the final rule, we modify the proposed standard and implementation
specifications for business associates in a number of significant ways.
These modifications are explained in the preamble discussion of §
164.504(e).
**Section 164.502(f) -- Deceased Individuals**
We proposed to extend privacy protections to the protected health
information of a deceased individual for two years following the date of
death. During the two-year time frame, we proposed in the definition of
"individual" that the right to control the deceased individual's
protected health information would be held by an executor or
administrator, or other person (e.g., next of kin) authorized under
applicable law to act on behalf of the decedent's estate. The only
proposed exception to this standard allowed for uses and disclosures of
a decedent's protected health information for research purposes without
the authorization of a legal representative and without the
Institutional Review Board (IRB) or privacy board approval required (in
proposed § 164.510(j)) for most other uses and disclosures for research.
In the final rule (§ 164.502(f)), we modify the standard to extend
protection of protected health information about deceased individuals
for as long as the covered entity maintains the information. We retain
the exception for uses and disclosures for research purposes, now part
of § 164.512(i), but also require that the covered entity take certain
verification measures prior to release of the decedent's protected
health information for such purposes (see §§ 164.514(h) and
164.512(i)(1)(iii)).
We remove from the definition of "individual" the provision related to
deceased persons. Instead, we create a standard for "personal
representatives" (§ 164.502(g), see discussion below) that requires a
covered entity to treat a personal representative of an individual as
the individual in certain circumstances, i.e., allows the representative
to exercise the rights of the individual. With respect to deceased
individuals, the final rule describes when a covered entity must allow a
person who otherwise is permitted under applicable law to act with
respect to the interest of the decedent or on behalf of the decedent's
estate, to make decisions regarding the decedent's protected health
information.
The final rule also adds a provision to § 164.512(g), that permits
covered entities to disclose protected health information to a funeral
director, consistent with applicable law, as necessary to carry out
their duties with respect to the decedent. Such disclosures are
permitted both after death and in reasonable anticipation of death.
**Section 164.502(g) -- Personal Representatives**
In the proposed rule we defined "individual" to include certain persons
who were authorized to act on behalf of the person who is the subject of
the protected health information. For adults and emancipated minors, the
NPRM provided that "individual" includes a legal representative to the
extent to which applicable law permits such legal representative to
exercise the individual's rights in such contexts. With respect to
unemancipated minors, we proposed that the definition of "individual"
include a parent, guardian, or person acting [in loco
parentis]{.underline}, (hereinafter referred to as "parent") except when
an unemancipated minor obtained health care services without the consent
of, or notification to, a parent. Under the proposed rule, if a minor
obtained health care services under these conditions, the minor would
have had the exclusive rights of an individual with respect to the
protected health information related to such health care services.
In the final rule, the definition of "individual" is limited to the
subject of the protected health information, which includes
unemancipated minors and other individuals who may lack capacity to act
on their own behalf. We remove from the definition of "individual" the
provisions regarding legal representatives. The circumstances in which a
representative must be treated as an individual for purposes of this
rule are addressed in a separate standard titled "personal
representatives." (§ 164.502(g)). The standard regarding personal
representatives incorporates some changes to the proposed provisions
regarding legal representatives. In general, under the final regulation,
the "personal representatives" provisions are directed at the more
formal representatives, while § 164.510(b) addresses situations in which
persons are informally acting on behalf of an individual.
With respect to adults or emancipated minors, we clarify that a covered
entity must treat a person as a personal representative of an individual
if such person is, under applicable law, authorized to act on behalf of
the individual in making decisions related to health care. This includes
a court-appointed guardian and a person with a power of attorney, as set
forth in the NPRM, but may also include other persons. The authority of
a personal representative under this rule is limited: the representative
must be treated as the individual only to the extent that protected
health information is relevant to the matters on which the personal
representative is authorized to represent the individual. For example,
if a person's authority to make health care decisions for an individual
is limited to decisions regarding treatment for cancer, such person is a
personal representative and must be treated as the individual with
respect to protected health information related to the cancer treatment
of the individual. Such a person is not the personal representative of
the individual with respect to all protected health information about
the individual, and therefore, a covered entity may not disclose
protected health information that is not relevant to the cancer
treatment to the person, unless otherwise permitted under the rule. We
intend this provision to apply to persons empowered under state or other
law to make health related decisions for an individual, whether or not
the instrument or law granting such authority specifically addresses
health information.
In addition, we clarify that with respect to an unemancipated minor, if
under applicable law a parent may act on behalf of an unemancipated
minor in making decisions related to health care, a covered entity must
treat such person as a personal representative under this rule with
respect to protected health information relevant to such personal
representation, with three exceptions. Under the general rule, in most
circumstances the minor would not have the capacity to act as the
individual, and the parent would be able to exercise rights and
authorities on behalf of the minor. Under the exceptions to the rule on
personal representatives of unemancipated minors, the minor, and not the
parent, would be treated as the individual and able to exercise the
rights and authorities of an individual under the rule. These exceptions
occur if: (1) the minor consents to a health care service; no other
consent to such health care service is required by law, regardless of
whether the consent of another person has also been obtained; and the
minor has not requested that such person be treated as the personal
representative; (2) the minor may lawfully obtain such health care
service without the consent of a parent, and the minor, a court, or
another person authorized by law consents to such health care service;
or (3) a parent assents to an agreement of confidentiality between a
covered health care provider and the minor with respect to such health
care service. We note that the definition of health care includes
services, but we use "health care service" in this provision to clarify
that the scope of the rights of minors under this rule is limited to the
protected health information related to a particular service.
Under this provision, we do not provide a minor with the authority to
act under the rule unless the state has given them the ability to obtain
health care without consent of a parent, or the parent has assented. In
addition, we defer to state law where the state authorizes or prohibits
disclosure of protected health information to a parent. See part 160,
subpart B, Preemption of State Law. This rule does not affect parental
notification laws that permit or require disclosure of protected health
information to a parent. However, the rights of a minor under this rule
are not otherwise affected by such notification.
In the final rule, the provision regarding personal representatives of
deceased individuals has been changed to clarify the provision. The
policy has not changed substantively from the NPRM.
Finally, we added a provision in the final rule to permit covered
entities to elect not to treat a person as a personal representative in
abusive situations. Under this provision, a covered entity need not
treat a person as a personal representative of an individual if the
covered entity, in the exercise of professional judgment, decides that
it is not in the best interest of the individual to treat the person as
the individual's personal representative and the covered entity has a
reasonable belief that the individual has been or may be subjected to
domestic violence, abuse, or neglect by such person, or that treating
such person as the personal representative could endanger the
individual.
Section 164.502(g) requires a covered entity to treat a person that
meets the requirements of a personal representative as the individual
(with the exceptions described above). We note that disclosure of
protected health information to a personal representative is mandatory
under this rule only if disclosure to the individual is mandatory.
Disclosure to the individual is mandatory only under §§ 164.524 and
164.528. Further, as noted above, the personal representative's rights
are limited by the scope of its authority under other law. Thus, this
provision does not constitute a general grant of authority to personal
representatives.
We make disclosure to personal representatives mandatory to ensure that
an individual's rights under §§ 164.524 and 164.528 are preserved even
when individuals are incapacitated or otherwise unable to act for
themselves to the same degree as other individuals. If the covered
entity were to have the discretion to recognize a personal
representative as the individual, there could be situations in which no
one could invoke an individual's rights under these sections.
We continue to allow covered entities to use their discretion to
disclose certain protected health information to family members,
relatives, close friends, and other persons assisting in the care of an
individual, in accordance with § 164.510(b). We recognize that many
health care decisions take place on an informal basis, and we permit
disclosures in certain circumstance to permit this practice to continue.
Health care providers may continue to use their discretion to address
these informal situations.
**Section 164.502(h) -- Confidential Communications**
In the NPRM, we did not directly address the issue of whether an
individual could request that a covered entity restrict the manner in
which it communicated with the individual. The NPRM did provide
individuals with the right to request that health care providers
restrict uses and disclosures of protected health information for
treatment, payment and health operations, but providers were not
required to agree to such a restriction.
In the final rule, we require covered providers to accommodate
reasonable requests by patients about how the covered provider
communicates with the individual. For example, an individual who does
not want his or her family members to know about a certain treatment may
request that the provider communicate with the individual at his or her
place of employment, or to send communications to a designated address.
Covered providers must accommodate the request unless it is
unreasonable. Similarly, the final rule permits individuals to request
that health plans communicate with them by alternative means, and the
health plan must accommodate such a request if it is reasonable and the
individual states that disclosure of the information could endanger the
individual. The specific provisions relating to confidential
communications are in § 164.522.
**Section 164.502(i) -- Uses and Disclosures Consistent with Notice**
We proposed to prohibit covered entities from using or disclosing
protected health information in a manner inconsistent with their notice
of information practices. We retain this provision in the final rule.
See § 164.520 regarding notice content and distribution requirements.
**Section 164.502(j) -- Disclosures by Whistleblowers and Workforce
Member Crime Victims**
***Disclosures by Whistleblowers***
In § 164.518(c)(4) of the NPRM we addressed the issue of whistleblowers
by proposing that a covered entity not be held in violation of this rule
because a member of its workforce or a person associated with a business
associate of the covered entity used or disclosed protected health
information that such person believed was evidence of a civil or
criminal violation, and any disclosure was: (1) made to relevant
oversight agencies or law enforcement or (2) made to an attorney to
allow the attorney to determine whether a violation of criminal or civil
law had occurred or to assess the remedies or actions at law that may be
available to the person disclosing the information.
We included an extensive discussion on how whistleblower actions can
further the public interest, including reference to the need in some
circumstances to utilize protected health information for this purpose
as well as reference to the qui tam provisions of the Federal False
Claims Act.
In the final rule we retitle the provision and include it in § 164.502
to reflect the fact that these disclosures are not made by the covered
entity and therefore this material does not belong in the section on
safeguarding information against disclosure.
We retain the basic concept in the NPRM of providing protection to a
covered entity for the good faith whistleblower action of a member of
its workforce or a business associate. We clarify that a whistleblower
disclosure by an employee, subcontractor, or other person associated
with a business associate is considered a whistleblower disclosure of
the business associate under this provision. However, in the final rule,
we modify the scope of circumstances under which a covered entity is
protected in whistleblower situations. A covered entity is not in
violation of the requirements of this rule when a member of its
workforce or a business associate of the covered entity discloses
protected health information to: (i) a health oversight agency or public
health authority authorized by law to investigate or otherwise oversee
the relevant conduct or conditions of the covered entity; (ii) an
appropriate health care accreditation organization; or (iii) an
attorney, for the purpose of determining his or her legal options with
respect to whistle blowing. We delete disclosures to a law enforcement
official.
We expand the scope of this section to cover disclosures of protected
health information to an oversight or accreditation organization for the
purpose of reporting breaches of professional standards or problems with
quality of care. The covered entity will not be in violation of this
rule, provided that the disclosing individual believes in good faith
that the covered entity has engaged in conduct which is unlawful or
otherwise violates professional or clinical standards, or that the care,
services or conditions provided by the covered entity potentially
endanger one or more patients, workers or the public. Since these
provisions only relate to whistleblower actions in relation to the
covered entity, disclosure of protected health information to expose
malfeasant conduct by another person, such as knowledge gained during
the course of treatment about an individual's illicit drug use, would
not be protected activity.
We clarify that this section only applies to protection of a covered
entity, based on the whistleblower action of a member of its workforce
or business associates. Since the HIPAA legislation only applies to
covered entities, not their workforces, it is beyond the scope of this
rule to directly regulate the whistleblower actions of members of a
covered entity's workforce.
In the NPRM, we had proposed to require covered entities to apply
sanctions to members of its workforce who improperly disclose protected
health information. In this final rule, we retain this requirement in §
164.530(e)(1) but modify the proposed provision on sanctions to clarify
that the sanctions required under this rule do not apply to workforce
members of a covered entity for whistleblower disclosures.
***Disclosures by Workforce Members Who Are Crime Victims***
The proposed rule did not address disclosures by workforce members who
are victims of a crime. In the final rule, we clarify that a covered
entity is not in violation of the rule when a workforce member of a
covered entity who is the victim of a crime discloses protected health
information to law enforcement officials about the suspected perpetrator
of the crime. We limit the amount of protected health information that
may be disclosed to the limited information for identification and
location described in § 164.512(f)(2).
We note that this provision is similar to the provision in §
164.512(f)(5), which permits a covered entity to disclose protected
health information to law enforcement that the covered entity believes
in good faith constitutes evidence of criminal conduct that occurred on
the premises of the covered entity. This provision differs in that it
permits the disclosure even if the crime occurred somewhere other than
on the premises of the covered entity. For example, if a hospital
employee is the victim of an attack outside of the hospital, but spots
the perpetrator sometime later when the perpetrator seeks medical care
at the hospital, the workforce member who was attacked may notify law
enforcement of the perpetrator's location and other identifying
information. We do not permit, however, the disclosure of protected
health information other than that described in § 164.512(f)(2).
**SECTION 164.504 - USES AND DISCLOSURES - ORGANIZATIONAL REQUIREMENTS -
COMPONENT ENTITIES, AFFILIATED ENTITIES, BUSINESS ASSOCIATES AND GROUP
HEALTH PLANS**
**Section 164.504(a)-(c)---Health Care Component (Component Entities)**
In the preamble to the proposed rule we introduced the concept of a
"component entity" to differentiate the health care unit of a larger
organization from the larger organization. In the proposal we noted that
some organizations that are primarily involved in non-health care
activities do provide health care services or operate health plans or
health care clearinghouses. Examples included a school with an on-site
health clinic and an employer that self administers a sponsored health
plan. In such cases, the proposal said that the health care component of
the entity would be considered the covered entity, and any release of
information from that component to another office or person in the
organization would be a regulated disclosure. We would have required
such entities to create barriers to prevent protected health information
from being used or disclosed for activities not authorized or permitted
under the proposal.
We discuss group health plans and their relationships with plan sponsors
below under "Requirements for Group Health Plans."
In the final rule we address the issue of differentiating health plan,
covered health care provider and health care clearinghouse activities
from other functions carried out by a single legal entity in paragraphs
(a)-(c) of § 164.504. We have created a new term, "hybrid entity", to
describe the situation where a health plan, health care provider, or
health care clearinghouse is part of a larger legal entity; under the
definition, a "hybrid entity" is "a single legal entity that is a
covered entity and whose covered functions are not its primary
functions." The term "covered functions" is discussed above under §
164.501. By "single legal entity" we mean a legal entity, such as a
corporation or partnership, that cannot be further differentiated into
units with their own legal identities. For example, for purposes of this
rule a multinational corporation composed of multiple subsidiary
companies would not be a single legal entity, but a small manufacturing
firm and its health clinic, if not separately incorporated, could be a
single legal entity.
The health care component rules are designed for the situation in which
the health care functions of the legal entity are not its dominant
mission. Because some part of the legal entity meets the definition of a
health plan or other covered entity, the legal entity as a whole could
be required to comply with the rules below. However, in such a
situation, it makes sense not to require the entire entity to comply
with the requirements of the rules below, when most of its activities
may have little or nothing to do with the provision of health care;
rather, as a practical matter, it makes sense for such an entity to
focus its compliance efforts on the component that is actually
performing the health care functions. On the other hand, where most of
what the covered entity does consists of covered functions, it makes
sense to require the entity as a whole to comply with the rules. The
provisions at §§ 164.504(a)-(c) provide that for a hybrid entity, the
rules apply only to the part of the entity that is the health care
component. At the same time, the lack of corporate boundaries increases
the risk that protected health information will be used in a manner that
would not otherwise be permitted by these rules. Thus, we require that
the covered entity erect firewalls to protect against the improper use
or disclosure within or by the organization. See § 164.504(c)(2).
The term "primary functions" in the definition of "hybrid entity" is not
meant to operate with mathematical precision. Rather, we intend that a
more common sense evaluation take place: is most of what the covered
entity does related to its health care functions? If so, then the whole
entity should be covered. Entities with different insurance lines, if
not separately incorporated, present a particular issue with respect to
this analysis. Because the definition of "health plan" excludes many
types of insurance products (in the exclusion under paragraph (2)(i) of
the definition), we would consider an entity that has one or more of
these lines of insurance in addition to its health insurance lines to
come within the definition of "hybrid entity," because the other lines
of business constitute substantial parts of the total business operation
and are required to be separate from the health plan(s) part of the
business.
An issue that arises in the hybrid entity situation is what records are
covered in the case of an office of the hybrid entity that performs
support functions for both the health care component of the entity and
for the rest of the entity. For example, this situation could arise in
the context of a company with an onsite clinic (which we will assume is
a covered health care provider), where the company's business office
maintains both clinic records and the company's personnel records. Under
the definition of the term "health care component," the business office
is part of the health care component (in this hypothetical, the clinic)
"to the extent that" it is performing covered functions on behalf of the
clinic involving the use or disclosure of protected health information
that it receives from, creates or maintains for the clinic. Part of the
business office, therefore, is part of the health care component, and
part of the business office is outside the health care component. This
means that the non-health care component part of the business office is
not covered by the rules below. Under our hypothetical, then, the
business office would not be required to handle its personnel records in
accordance with the rules below. The hybrid entity would be required to
establish firewalls with respect to these record systems, to ensure that
the clinic records were handled in accordance with the rules.
With respect to excepted benefits, the rules below operate as follows.
(Excepted benefits include accident, disability income, liability,
workers' compensation and automobile medical payment insurance.)
Excepted benefit programs are excluded from the health care component
(or components) through the definition of "health plan." If a particular
organizational unit performs both excepted benefits functions and
covered functions, the activities associated with the excepted benefits
program may not be part of the health care component. For example, an
accountant who works for a covered entity with both a health plan and a
life insurer would have his or her accounting functions performed for
the health plan as part of the component, but not the life insurance
accounting function. See § 164.504(c)(2)(iii). We require this
segregation of excepted benefits because HIPAA does not cover such
programs, policies and plans, and we do not permit any use or disclosure
of protected health information for the purposes of operating or
performing the functions of the excepted benefits without authorization
from the individual, except as otherwise permitted in this rule.
In § 164.504(c)(2) we require covered entities with a health care
component to establish safeguard policies and procedures to prevent any
access to protected health information by its other organizational units
that would not be otherwise permitted by this rule. We note that Sec.
1173 (d)(1)(B) of HIPAA requires policies and procedures to isolate the
activities of a health care clearinghouse from a "larger organization"
to prevent unauthorized access by the larger organization. This
safeguard provision is consistent with the statutory requirement and
extends to any covered entity that performs "non-covered entity
functions" or operates or conducts functions of more than one type of
covered entity.
Because, as noted, the covered entity in the hybrid entity situation is
the legal entity itself, we state explicitly what is implicitly the
case, that the covered entity (legal entity) remains responsible for
compliance vis-a-vis subpart C of part 160. See § 164.504(c)(3)(i). We
do this simply to make these responsibilities clear and to avoid
confusion on this point. Also, in the hybrid entity situation the
covered entity/legal entity has control over the entire workforce, not
just the workforce of the health care component. Thus, the covered
entity is in a position to implement policies and procedures to ensure
that the part of its workforce that is doing mixed or non-covered
functions does not impermissibly use or disclose protected health
information. Its responsibility to do so is clarified in §
164.504(c)(3)(ii).
**Section 164.504(d) -- Affiliated Entities**
Some legally distinct covered entities may share common administration
of organizationally differentiated but similar activities (for example,
a hospital chain). In § 164.504(d) we permit legally distinct covered
entities that share common ownership or control to designate themselves,
or their health care components, together to be a single covered entity.
Common control exists if an entity has the power, directly or
indirectly, significantly to influence or direct the actions or policies
of another entity. Common ownership exists if an entity or entities
possess an ownership or equity interest of 5 percent or more in another
entity.
Such organizations may promulgate a single shared notice of information
practices and a consent form. For example, a corporation with hospitals
in twenty states may designate itself as a covered entity and,
therefore, able to merge information for joint marketplace analyses. The
requirements that apply to a covered entity also apply to an affiliated
covered entity. For example, under the minimum necessary provisions, a
hospital in one state could not share protected health information about
a particular patient with another hospital if such a use is not
necessary for treatment, payment or health care operations. The covered
entities that together make up the affiliated covered entity are
separately subject to liability under this rule. The safeguarding
requirements for affiliated covered entities track the requirements that
apply to health care components.
**Section 164.504(e) -- Business Associates**
In the NPRM, we proposed to require a contract between a covered entity
and a business associate, except for disclosures of protected health
information by a covered entity that is a health care provider to
another health care provider for the purposes of consultation or
referral. A covered entity would have been in violation of this rule if
the covered entity knew or reasonably should have known of a material
breach of the contract by a business associate and it failed to take
reasonable steps to cure the breach or terminate the contract. We
proposed in the preamble that when a covered entity acted as a business
associate to another covered entity, the covered entity that was acting
as business associate also would have been responsible for any
violations of the regulation.
We also proposed that covered health care providers receiving protected
health information for consultation or referral purposes would still
have been subject to this rule, and could not have used or disclosed
such protected health information for a purpose other than the purpose
for which it was received (i.e., the consultation or referral). Further,
we noted that providers making disclosures for consultations or
referrals should be careful to inform the receiving provider of any
special limitations or conditions to which the disclosing provider had
agreed to impose (e.g., the disclosing provider had provided notice to
its patients that it would not make disclosures for research).
We proposed that business associates would not have been permitted to
use or disclose protected health information in ways that would not have
been permitted of the covered entity itself under these rules, and
covered entities would have been required to take reasonable steps to
ensure that protected health information disclosed to a business
associate remained protected.
In the NPRM (proposed § 164.506(e)(2)) we would have required that the
contractual agreement between a covered entity and a business associate
be in writing and contain provisions that would:
· Prohibit the business associate from further using or disclosing the
protected health information for any purpose other than the purpose
stated in the contract.
· Prohibit the business associate from further using or disclosing the
protected health information in a manner that would violate the
requirements of this proposed rule if it were done by the covered
entity.
· Require the business associate to maintain safeguards as necessary to
ensure that the protected health information is not used or disclosed
except as provided by the contract.
· Require the business associate to report to the covered entity any use
or disclosure of the protected health information of which the business
associate becomes aware that is not provided for in the contract.
· Require the business associate to ensure that any subcontractors or
agents to whom it provides protected health information received from
the covered entity will agree to the same restrictions and conditions
that apply to the business associate with respect to such information.
· Require the business associate to provide access to non-duplicative
protected health information to the subject of that information, in
accordance with proposed § 164.514(a).
· Require the business associate to make available its internal
practices, books and records relating to the use and disclosure of
protected health information received from the covered entity to the
Secretary for the purposes of enforcing the provisions of this rule.
· Require the business associate, at termination of the contract, to
return or destroy all protected health information received from the
covered entity that the business associate still maintains in any form
to the covered entity and prohibit the business associate from retaining
such protected health information in any form.
· Require the business associate to incorporate any amendments or
corrections to protected health information when notified by the covered
entity that the information is inaccurate or incomplete.
· State that individuals who are the subject of the protected health
information disclosed are intended to be third party beneficiaries of
the contract.
· Authorize the covered entity to terminate the contract, if the covered
entity determines that the business associate has violated a material
term of the contract.
We also stated in the preamble to the NPRM that the contract could have
included any additional arrangements that did not violate the provisions
of this regulation.
We explained in the preamble to the NPRM that a business associate
(including business associates that are covered entities) that had
contracts with more than one covered entity would have had no authority
to combine, aggregate or otherwise use for a single purpose protected
health information obtained from more than one covered entity unless
doing so would have been a lawful use or disclosure for each of the
covered entities that supplied the protected health information that is
being combined, aggregated or used. In addition, the business associate
would have had to have been authorized through the contract or
arrangement with each covered entity that supplied the protected health
information to combine or aggregate the information. A covered entity
would not have been permitted to obtain protected health information
through a business associate that it could not otherwise obtain itself.
In the final rule we retain the overall approach proposed: covered
entities may disclose protected health information to persons that meet
the rule's definition of business associate, or hire such persons to
obtain or create protected health information for them, only if covered
entities obtain specified satisfactory assurances from the business
associate that it will appropriately handle the information; the
regulation specifies the elements of such satisfactory assurances;
covered entities have responsibilities when such specified satisfactory
assurances are violated by the business associate. We retain the
requirement that specified satisfactory assurances must be obtained if a
covered entity's business associate is also a covered entity. We note
that a master business associate contract or MOU that otherwise meets
the requirements regarding specified satisfactory assurances meets the
requirements with respect to all the signatories.
A covered entity may disclose protected health information to a business
associate, consistent with the other requirements of the final rule, as
necessary to permit the business associate to perform functions and
activities for or on behalf of the covered entity, or to provide the
services specified in the business associate definition to or for the
covered entity. As discussed below, a business associate may only use
the protected health information it receives in its capacity as a
business associate to a covered entity as permitted by its contract or
agreement with the covered entity.
We do not attempt to directly regulate business associates, but pursuant
to our authority to regulate covered entities we place restrictions on
the flow of information from covered entities to non-covered entities.
We add a provision to clarify that a violation of a business associate
agreement by a covered entity that is a business associate of another
covered entity constitutes a violation of this rule.
In the final rule, we make significant changes to the requirements
regarding business associates. As explained below in more detail: we
make significant changes to the content of the required contractual
satisfactory assurances; we include exceptions for arrangements that
would otherwise meet the definition of business associate; we make
special provisions for government agencies that by law cannot enter into
contracts with one another or that operate under other legal
requirements incompatible with some aspects of the required contractual
satisfactory assurances; we provide a new mechanism for covered entities
to hire a third party to aggregate data.
The final rule provides several exception to the business associate
requirements, where a business associate relationship would otherwise
exist. We substantially expand the exception for disclosure of protected
health information for treatment. Rather than allowing disclosures
without business associate assurances only for the purpose of
consultation or referral, in the final rule we allow covered entities to
make any disclosure of protected health information for treatment
purposes to a health care provider without a business associate
arrangement. This provision includes all activities that fall under the
definition of treatment.
We do not require a business associate contract for a group health plan
to make disclosures to the plan sponsor, to the extent that the health
plan meets the applicable requirements of § 164.504(f).
We also include an exception for certain jointly administered government
programs providing public benefits. Where a health plan that is a
government program provides public benefits, such as SCHIP and Medicaid,
and where eligibility for, or enrollment in, the health plan is
determined by an agency other than the agency administering the health
plan, or where the protected health information used to determine
enrollment or eligibility in the health plan is collected by an agency
other than the agency administering the health plan, and the joint
activities are authorized by law, no business associate contract is
required with respect to the collection and sharing of individually
identifiable health information for the performance of the authorized
functions by the health plan and the agency other than the agency
administering the health plan. We note that the phrase "government
programs providing public benefits" refers to programs offering benefits
to specified members of the public and not to programs that offer
benefits only to employees or retirees of government agencies.
We note that we do not consider a financial institution to be acting on
behalf of a covered entity, and therefore no business associate contract
is required, when it processes consumer-conducted financial transactions
by debit, credit or other payment card, clears checks, initiates or
processes electronic funds transfers, or conducts any other activity
that directly facilitates or effects the transfer of funds for
compensation for health care. A typical consumer-conducted payment
transaction is when a consumer pays for health care or health insurance
premiums using a check or credit card. In these cases, the identity of
the consumer is always included and some health information (e.g.,
diagnosis or procedure) may be implied through the name of the health
care provider or health plan being paid. Covered entities that initiate
such payment activities must meet the minimum necessary disclosure
requirements described in the preamble to § 164.514.
In the final rule, we reduce the extent to which a covered entity must
monitor the actions of its business associate and we make it easier for
covered entities to identify the circumstances that will require them to
take actions to correct a business associate's material violation of the
contract, in the following ways. We delete the proposed language
requiring covered entities to "take reasonable steps to ensure" that
each business associate complies with the rule's requirements.
Additionally, we now require covered entities to take reasonable steps
to cure a breach or terminate the contract for business associate
behaviors only if they know of a material violation by a business
associate. In implementing this standard, we will view a covered entity
that has substantial and credible evidence of a violation as knowing of
such violation. While this standard relieves the covered entity of the
need to actively monitor its business associates, a covered entity
nonetheless is expected to investigate when they receive complaints or
other information that contain substantial and credible evidence of
violations by a business associate, and it must act upon any knowledge
of such violation that it possesses. We note that a whistleblowing
disclosure by a business associate of a covered entity that meets the
requirements of § 164.502(j)(1) does not put the covered entity in
violation of this rule, and the covered entity has no duty to correct or
cure, or to terminate the relationship.
We also qualify the requirement for terminating contracts with
non-compliant business associates. The final rule still requires that
the business associate contract authorize the covered entity to
terminate the contract, if the covered entity determines that the
business associate has violated a material term of the contract, and it
requires the covered entity to terminate the contract if steps to cure
such a material breach fail. The rule now stipulates, however, that if
the covered entity is unable to cure a material breach of the business
associate's obligation under the contract, it is expected to terminate
the contract, when feasible. This qualification has been added to
accommodate circumstances where terminating the contract would be
unreasonably burdensome on the covered entity, such as when there are no
viable alternatives to continuing a contract with that particular
business associate. It does not mean, for instance, that the covered
entity can choose to continue the contract with a non-compliant business
associate merely because it is more convenient or less costly than
contracts with other potential business associates. We also require that
if a covered entity determines that it is not feasible to terminate a
non-compliant business associate, the covered entity must notify the
Secretary.
We retain all of the requirements for a business associate contract that
were listed in proposed § 164.506(e)(2), with some modifications. See §
164.504(e)(2).
We retain the requirement that the business associate contract must
provide that the business associate will not use or further disclose the
information other than as permitted or required by the contract or as
required by law. We do not mean by this requirement that the business
associate contract must specify each and every use and disclosure of
protected health information permitted to the business associate.
Rather, the contract must state the purposes for which the business
associate may use and disclose protected health information, and must
indicate generally the reasons and types of persons to whom the business
associate may make further disclosures. For example, attorneys often
need to provide information to potential witnesses, opposing counsel,
and others in the course of their representation of a client. The
business associate contract pursuant to which protected health
information is provided to its attorney may include a general statement
permitting the attorney to disclose protected health information to
these types of people, within the scope of its representation of the
covered entity.
We retain the requirement that a business associate contract may not
authorize a business associate to use or further disclose protected
health information in a manner that would violate the requirements of
this subpart if done by the covered entity, but we add two exceptions.
First, we permit a covered entity to authorize a business associate to
use and disclose protected health information it receives in its
capacity as a business associate for its proper management and
administration and to carry out its legal responsibilities. The contract
must limit further disclosures of the protected health information for
these purposes to those that are required by law and to those for which
the business associate obtains reasonable assurances that the protected
health information will be held confidentially and that it will be
notified by the person to whom it discloses the protected health
information of any breaches of confidentiality.
Second, we permit a covered entity to authorize the business associate
to provide data aggregation services to the covered entity. As discussed
above in § 164.501, data aggregation, with respect to protected health
information received by a business associate in its capacity as the
business associate of a covered entity, is the combining of such
protected health information by the business associate with protected
health information received by the business associate in its capacity as
a business associate of another covered entity, to permit the creation
of data for analyses that relate to the health care operations of the
respective covered entities. We added this service to the business
associate definition to clarify the ability of covered entities to
contract with business associates to undertake quality assurance and
comparative analyses that involve the protected health information of
more than one contracting covered entity. We except data aggregation
from the general requirement that a business associate contract may not
authorize a business associate to use or further disclose protected
health information in a manner that would violate the requirements of
this subpart if done by the covered entity in order to permit the
combining or aggregation of protected health information received in its
capacity as a business associate of different covered entities when it
is performing this service. In many cases, the combining of this
information for the respective health care operations of the covered
entities is not something that the covered entities could do -- a
covered entity cannot generally disclose protected health information to
another covered entity for the disclosing covered entity's health care
operations. However, we permit covered entities that enter into business
associate contracts with a business associate for data aggregation to
permit the business associate to combine or aggregate the protected
health information they disclose to the business associate for their
respective health care operations.
We note that there may be other instances in which a business associate
may combine or aggregate protected health information received in its
capacity as a business associate of different covered entities, such as
when it is performing health care operations on behalf of covered
entities that participate in an organized health care arrangement. A
business associate that is performing payment functions on behalf of
different covered entities also may combine protected health information
when it is necessary, such as when the covered entities share financial
risk or otherwise jointly bill for services.
In the final rule we clarify that the business associate contract must
require the business associate to make available protected health
information for amendment and to incorporate such amendments. The
business associate contract must also require the business associate to
make available the information required to provide an accounting of
disclosures. We provide more flexibility to the requirement that all
protected health information be returned by the business associate upon
termination of the contract. The rule now stipulates that if feasible,
the protected health information should be destroyed or returned at the
end of a contract. Accordingly, a contract with a business associate
must state that if there are reasons that the return or destruction of
the information is not feasible and the information must be retained for
specific reasons and uses, such as for future audits, privacy
protections must continue after the contract ends, for as long as the
business associate retains the information. The contract also must state
that the uses of information after termination of the contract must be
limited to the specific set of uses or disclosures that make it
necessary for the business associate to retain the information.
We also remove the requirement that business associate contracts contain
a provision stating that individuals whose protected health information
is disclosed under the contract are intended third-party beneficiaries
of the contract. Third party beneficiary or similar responsibilities may
arise under these business associate arrangements by operation of state
law; we do not intend in this rule to affect the operation of such state
laws.
We modify the requirement that a business associate contract require the
business associate to ensure that agents abide by the provisions of the
business associate contract. We clarify that agents includes
subcontractors, and we note that a business associate contract must make
the business associate responsible for ensuring that any person to whom
it delegates a function, activity or service which is within its
business associate contract with the covered entity agrees to abide by
the restrictions and conditions that apply to the business associate
under the contract. We note that a business associate will need to
consider the purpose for which protected health information is being
disclosed in determining whether the recipient must be bound to the
restrictions and conditions of the business associate contract. When the
disclosure is a delegation of a function, activity or service that the
business associate has agreed to perform for a covered entity, the
recipient who undertakes such a function steps into the shoes of the
business associate and must be bound to the restrictions and conditions.
When the disclosure is to a third party who is not performing business
associate functions, activities or services for on behalf of the covered
entity, but is the type of disclosure that the covered entity itself
could make without giving rise to a business associate relationship, the
business associate is not required to ensure that the restrictions or
conditions of the business associate contract are maintained.
For example, if a business associate acts as the billing agent of a
health care provider, and discloses protected health information on
behalf of the hospital to health plans, the business associate has no
responsibility with respect to further uses or disclosures by the health
plan. In the example above, where a covered entity has a business
associate contract with a lawyer, and the lawyer discloses protected
health information to an expert witness in preparation for litigation,
the lawyer again would have no responsibility under this subpart with
respect to uses or disclosures by the expert witness, because such
witness is not undertaking the functions, activities or services that
the business associate lawyer has agreed to perform. However, if a
covered entity contracts with a third party administrator to provide
claims management, and the administrator delegates management of the
pharmacy benefits to a third party, the business associate third party
administrator must ensure that the pharmacy manager abides by the
restrictions and conditions in the business associate contract between
the covered entity and the third party administrator.
We provide in § 164.504(c)(3) several methods other than a business
associate contract that will satisfy the requirement for satisfactory
assurances under this section. First, when a government agency is a
business associate of another government agency that is a covered
entity, we permit memorandum of understanding between the agencies to
constitute satisfactory assurance for the purposes of this rule, if the
memorandum accomplishes each of the objectives of the business associate
contract. We recognize that the relationships of government agencies are
often organized as a matter of law, and that it is not always feasible
for one agency to contract with another for all of the purposes provided
for in this section. We also recognize that it may be incorrect to view
one government agency as 'acting on behalf of" the other government
agency; under law, each agency may be acting to fulfill a statutory
mission. We note that in some instances, it may not be possible for the
agencies to include the right to terminate the arrangement because the
relationship may be established under law. In such instances, the
covered entity government agency would need to fulfill the requirement
to report known violations of the memorandum to the Secretary.
Where the covered entity is a government agency, we consider the
satisfactory assurances requirement to be satisfied if other law
contains requirements applicable to the business associate that
accomplish each of the objectives of the business associate contract. We
recognize that in some cases, covered entities that are government
agencies may be able to impose the requirements of this section directly
on the persons acting as their business associates. We also recognize
that often one government agency is acting as a business associate of
another government agency, and either party may have the legal authority
to establish the requirements of this section by regulation. We believe
that imposing these requirements directly on business associates
provides greater protection than we can otherwise provide under this
section, and so we recognize such other laws as sufficient to substitute
for a business associate contract.
We also recognize that there may be some circumstances where the
relationship between covered entities and business associates is
otherwise mandated by law. In the final rule, we provide that where a
business associate is required by law to act as a business associate to
a covered entity, the covered entity may disclose protected health
information to the business associate to the extent necessary to comply
with the legal mandate without meeting the requirement to have a
business associate contract (or, in the case of government agencies, a
memorandum of understanding or law pertaining to the business associate)
if it makes a good faith attempt the obtain satisfactory assurances
required by this section and, if unable to do so, documents the attempt
and the reasons that such assurances cannot be obtained. This provision
addresses situations where law requires one party to act as the business
associate of another party. The fact that the parties have contractual
obligations that may be enforceable is not sufficient to meet the
required by law test in this provision.
This provision recognizes that in some instances the law requires that a
government agency act as a business associate of a covered entity. For
example, the United States Department of Justice is required by law to
defend tort suits brought against certain covered entities; in such
circumstances, however, the United States, and not the individual
covered entity, is the client and is potentially liable. In such
situations, covered entities must be able to disclose protected health
information needed to carry out the representation, but the particular
requirements that would otherwise apply to a business associate
relationship may not be possible to obtain. Subsection (iii) makes clear
that, where the relationship is required by law, the covered entity
complies with the rule if it attempts, in good faith, to obtain
satisfactory assurances as are required by this paragraph and, if such
attempt fails, documents the attempts and the reasons that such
assurances cannot be obtained.
The operation of the final rule maintains the construction discussed in
the preamble to the NPRM that a business associate (including a business
associate that is a covered entity) that has business associate
contracts with more than one covered entity generally may not use or
disclose the protected health information that it creates or receives in
its capacity as a business associate of one covered entity for the
purposes of carrying out its responsibilities as a business associate of
another covered entity, unless doing so would be a lawful use or
disclosure for each of the covered entities and the business associate's
contract with each of the covered entities permits the business
associate to undertake the activity. For example, a business associate
performing a function under health care operations on behalf of an
organized health care arrangement would be permitted to combine or
aggregate the protected health information obtained from covered
entities participating in the arrangement to the extent necessary to
carry out the authorized activity and in conformance with its business
associate contracts. As described above, a business associate providing
data aggregation services to different covered entities also could
combine and use the protected health information of the covered entities
to assist with their respective health care operations. A covered entity
that is undertaking payment activities on behalf of different covered
entities also may use or disclose protected health information obtained
as a business associate of one covered entity when undertaking such
activities as a business associate of another covered entity where the
covered entities have authorized the activities and where they are
necessary to secure payment for the entities. For example, when a group
of providers share financial risk and contract with a business associate
to conduct payment activities on their behalf, the business associate
may use the protected health information received from the covered
entities to assist them in managing their shared risk arrangement.
Finally, we note that the requirements imposed by this provision are
intended to extend privacy protection to situations in which a covered
entity discloses substantial amounts of protected health information to
other persons so that those persons can perform functions or activities
on its behalf or deliver specified services to it. A business associate
contract basically requires the business associate to maintain the
confidentiality of the protected health information that it receives and
generally to use and disclose such information for the purposes for
which it was provided. This requirement does not interfere with the
relationship between a covered entity and business associate, or require
the business associate to subordinate its professional judgment to that
of a covered entity. Covered entities may rely on the professional
judgment of their business associates as to the type and amount of
protected health information that is necessary to carry out a permitted
activity. The requirements of this provision are aimed at securing the
continued confidentiality of protected health information disclosed to
third parties that are serving the covered entity's interests.
**Section 164.504(f) -- Group Health Plans**
Covered entities under HIPAA include health care clearinghouses, health
care providers and health plans. Specifically included in the definition
of "health plan" are group health plans (as defined in section 2791(a)
of the Public Health Service Act) with 50 or more participants or those
of any size that are administered by an entity other than the employer
who established and maintains the plan. These group health plans may be
fully insured or self-insured. Neither employers nor other group health
plan sponsors are defined as covered entities. However, employers and
other plan sponsors - particularly those sponsors with self-insured
group health plans - may perform certain functions that are integrally
related to or similar to the functions of group health plans and, in
carrying out these functions, often require access to individual health
information held by the group health plan.
Most group health plans are also regulated under the Employee Retirement
Income Security Act of 1974 (ERISA). Under ERISA, a group health plan
must be a separate legal entity from its plan sponsor. ERISA-covered
group health plans usually do not have a corporate presence, in other
words, they may not have their own employees and sometimes do not have
their own assets (i.e., they may be fully insured or the benefits may be
funded through the general assets of the plan sponsor, rather than
through a trust). Often, the only tangible evidence of the existence of
a group health plan is the contractual agreement that describes the
rights and responsibilities of covered participants, including the
benefits that are offered and the eligible recipients.
ERISA requires the group health plan to identify a "named fiduciary," a
person responsible for ensuring that the plan is operated and
administered properly and with ultimate legal responsibility for the
plan. If the plan documents under which the group health plan was
established and is maintained permit, the named fiduciary may delegate
certain responsibilities to trustees and may hire advisors to assist it
in carrying out its functions. While generally the named fiduciary is an
individual, it may be another entity. The plan sponsor or employees of
the plan sponsor are often the named fiduciaries. These structural and
operational relationships present a problem in our ability to protect
health information from being used inappropriately in employment-related
decisions. On the one hand, the group health plan, and any health
insurance issuer or HMO providing health insurance or health coverage to
the group health plan, are covered entities under the regulation and may
only disclose protected health information as authorized under the
regulation or with individual consent. On the other hand, plan sponsors
may need access to protected health information to carry out
administration functions on behalf of the plan, but under circumstances
in which securing individual consent is impractical. We note that we
sometimes refer in the rule and preamble to health insurance issuers and
HMOs that provide health insurance or health coverage to a group health
plan as health insurance issuers or HMOs with respect to a group health
plan.
The proposed rule used the health care component approach for employers
and other plan sponsors. Under this approach, only the component of an
employer or other plan sponsor would be treated as a covered entity. The
component of the plan sponsor would have been able to use protected
health information for treatment, payment, and health care operations,
but not for other purposes, such as discipline, hiring and firing,
placement and promotions. We have modified the final rule in a number of
ways.
In the final rule, we recognize plan sponsors' legitimate need for
health information in certain situations while, at the same time,
protecting health information from being used for employment-related
functions or for other functions related to other employee benefit plans
or other benefits provided by the plan sponsor. We do not attempt to
directly regulate employers or other plan sponsors, but pursuant to our
authority to regulate health plans, we place restrictions on the flow of
information from covered entities to non-covered entities.
The final rule permits group health plans, and allows them to authorize
health insurance issuers or HMOs with respect to the group health plan,
to disclose protected health information to plan sponsors if the plan
sponsors voluntarily agree to use and disclose the information only as
permitted or required by the regulation. The information may be used
only for plan administration functions performed on behalf of the group
health plan which are specified in plan documents. The group health plan
is not required to have a business associate contract with the plan
sponsor to disclose the protected health information or allow the plan
sponsor to create protected health information on its behalf, if the
conditions of § 164.504(e) are met.
In order for the group health plan to disclose protected health
information to a plan sponsor, the plan documents under which the plan
was established and is maintained must be amended to: (1) describe the
permitted uses and disclosures of protected health information; (2)
specify that disclosure is permitted only upon receipt of a
certification from the plan sponsor that the plan documents have been
amended and the plan sponsor has agreed to certain conditions regarding
the use and disclosure of protected health information; and (3) provide
adequate firewalls to: identify the employees or classes of employees
who will have access to protected health information; restrict access
solely to the employees identified and only for the functions performed
on behalf of the group health plan; and provide a mechanism for
resolving issues of noncompliance.
Any employee of the plan sponsor who receives protected health
information for payment, health care operations or other matters related
to the group health plan must be identified in the plan documents either
by name or function. We assume that since individuals employed by the
plan sponsor may change frequently, the group health plan would likely
describe such individuals in a general manner. Any disclosure to
employees or classes of employees not identified in the plan documents
is not a permissible disclosure. To the extent a group health plan does
have its own employees separate from the plan sponsor's employees, as
the workforce of a covered entity (i.e. the group health plan), they
also are bound by the permitted uses and disclosures of this rule.
The certification that must be given to the group health plan must state
that the plan sponsor agrees to: (1) not use or further disclose
protected health information other than as permitted or required by the
plan documents or as required by law; (2) ensure that any subcontractors
or agents to whom the plan sponsor provides protected health information
agree to the same restrictions; (3) not use or disclose the protected
health information for employment-related actions; (4) report to the
group health plan any use or disclosure that is inconsistent with the
plan documents or this regulation; (5) make the protected health
information accessible to individuals; (6) allow individuals to amend
their information; (7) provide an accounting of its disclosures; (8)
make its practices available to the Secretary for determining
compliance; (9) return and destroy all protected health information when
no longer needed, if feasible; and (10) ensure that the firewalls have
been established.
We have included this certification requirement in part, as a way to
reduce the burden on health insurance issuers and HMOs. Without a
certification, health insurance issuers and HMOs would need to review
the plan documents in order to ensure that the amendments have been made
before they could disclose protected health information to plan
sponsors. The certification, however, is a simple statement that the
amendments have been made and that the plan sponsor has agreed to
certain restrictions on the use and disclosure of protected health
information. The receipt of the certification therefore, is sufficient
basis for the health insurance issuer or HMO to disclose protected
health information to the plan sponsor.
Many activities included in the definitions of health care operations
and payment are commonly referred to as plan administration functions in
the ERISA group health plan context. For purposes of this rule, plan
administration activities are limited to activities that would meet the
definition of payment or health care operations, but do not include
functions to modify, amend, or terminate the plan or solicit bids from
prospective issuers. Plan administration functions include quality
assurance, claims processing, auditing, monitoring, and management of
carve-out plans - such as vision and dental. Under the final rule, "plan
administration" does not include any employment-related functions or
functions in connection with any other benefits or benefit plans, and
group health plans may not disclose information for such purposes absent
an authorization from the individual. For purposes of this rule,
enrollment functions performed by the plan sponsor on behalf of its
employees are not considered plan administration functions.
Plan sponsors have access to protected health information only to the
extent group health plans have access to protected health information
and plan sponsors are permitted to use or disclose protected health
information only as would be permitted by group health plans. That is, a
group health plan may permit a plan sponsor to have access to or to use
protected health information only for purposes allowed by the
regulation.
As explained above, where a group health plan purchases insurance or
coverage from a health insurance issuer or HMO, the provision of
insurance or coverage by the health insurance issuer or HMO to the group
health plan does not make the health insurance issuer or HMO a business
associate. In such case, the activities of the health insurance issuer
or HMO are on their own behalf and not on the behalf of the group health
plan. We note that where a group health plan contracts with a health
insurance issuer or HMO to perform functions or activities or to provide
services that are in addition to or not directly related to the
provision of insurance, the health insurance issuer or HMO may be a
business associate with respect to those additional functions,
activities, or services. In addition, group health plans that provide
health benefits only through an insurance contract and do not create,
maintain, or receive protected health information (except for summary
information described below or information that merely states whether an
individual is enrolled in or has been disenrolled from the plan) do not
have to meet the notice requirements of § 164.520 or the administrative
requirements of § 164.530, except for the documentation requirement in §
164.530(j), because these requirements are satisfied by the issuer or
HMO that is providing benefits under the group health plan. A group
health plan, however, may not permit a health insurance issuer or HMO to
disclose protected health information to a plan sponsor unless the
notice required in 164.520 indicate such disclosure may occur.
The final rule also permits a health plan that is providing insurance to
a group health plan to provide summary information to the plan sponsor
to permit the plan sponsor to solicit premium bids from other health
plans or for the purpose of modifying, amending, or terminating the
plan. The rule provides that summary information is information that
summarizes claims history, claims expenses, or types of claims
experienced by individuals for whom the plan sponsor has provided health
benefits under a group health plan, provided that specified identifiers
are not included. Summary information may be disclosed under this
provision even if it does not meet the definition of de-identified
information. As part of the notice requirements in § 164.520, health
plans must inform individuals that they may disclose protected health
information to plan sponsors. The provision to allow summaries of claims
experience to be disclosed to plan sponsors that purchase insurance will
allow them to shop for replacement coverage, and get meaningful bids
from prospective issuers. It also permits a plan sponsor to get summary
information as part of its consideration of whether or not to change the
benefits that are offered or employees or whether or not to terminate a
group health plan.
We note that a plan sponsor may perform enrollment functions on behalf
of its employees without meeting the conditions above and without using
the standard transactions described in the Transactions Rule.
**Section 164.504(g)---Multiple Covered Function Entities**
Although not addressed in the proposed rule, this final rule also
recognizes that a covered entity may as a single legal entity,
affiliated entity, or other arrangement combine the functions or
operations of health care providers, health plans and health care
clearinghouses (for example, integrated health plans and health care
delivery systems may function as both health plans and health care
providers). The rule permits such covered entities to use or disclose
the protected health information of its patients or members for all
covered entity functions, consistent with the other requirements of this
rule. The health care component must meet the requirements of this rule
that apply to a particular type of covered entity when it is functioning
as that entity; e.g., when a health care component is operating as a
health care provider it must meet the requirements of this rule
applicable to a health care provider. However, such covered entities may
not use or disclose the protected health information of an individual
who is not involved in a particular covered entity function for that
function, and such information must be segregated from any joint
information systems. For example, an HMO may integrate data about health
plan members and clinic services to members, but a health care system
may not share information about a patient in its hospital with its
health plan if the patient is not a member of the health plan.
**SECTION 164.506 - USES AND DISCLOSURES FOR TREATMENT, PAYMENT, AND
HEALTH CARE OPERATIONS**
***Introduction: "Consent" versus "Authorization"***
In the proposed rule, we used the term "authorization" to describe the
individual's written permission for a covered entity to use and disclose
protected health information, regardless of the purpose of the use or
disclosure. Authorization would have been required for all uses and
disclosures that were not otherwise permitted or required under the
NPRM.
We proposed to permit covered entities, subject to limited exceptions
for psychotherapy notes and research information unrelated to treatment,
to use and disclose protected health information to carry out treatment,
payment, and health care operations without authorization. See proposed
§ 164.506(a)(1).
We also proposed to prohibit covered entities from requiring individuals
to sign authorizations for uses and disclosures of protected health
information for treatment, payment, and health care operations, unless
required by other applicable law. See proposed § 164.508(a)(iv). We
instead proposed requiring covered entities to produce a notice
describing their information practices, including practices with respect
to uses and disclosures to carry out treatment, payment, and health care
operations.
In the final rule, we retain the requirement for covered entities to
obtain the individual's written permission (an "authorization") for uses
and disclosures of protected health information that are not otherwise
permitted or required under the rule. However, under the final rule, we
add a second type of written permission for use or disclosure of
protected health information: a "consent" for uses and disclosures to
carry out treatment, payment, and health care operations. In the final
rule, we permit, and in some cases require, covered entities to obtain
the individual's written permission for the covered entity to use or
disclose protected health information other than psychotherapy notes to
carry out treatment, payment, and health care operations. We refer to
this written permission as a "consent."
The "consent" and the "authorization" do not overlap. The requirement to
obtain a "consent" applies in different circumstances than the
requirement to obtain an authorization. In content, a consent and an
authorization differ substantially from one another.
As described in detail below, a "consent" allows use and disclosure of
protected health information only for treatment, payment, and health
care operations. It is written in general terms and refers the
individual to the covered entity's notice for further information about
the covered entity's privacy practices. It allows use and disclosure of
protected health information by the covered entity seeking the consent,
not by other persons. Most persons who obtain a consent will be health
care providers; health plans and health care clearinghouses may also
seek a consent. The consent requirements appear in § 164.506 and are
described in this section of the preamble.
With a few exceptions, an "authorization" allows use and disclosure of
protected health information for purposes other than treatment, payment,
and health care operations. In order to make uses and disclosures that
are not covered by the consent requirements and not otherwise permitted
or required under the final rule, covered entities must obtain the
individual's "authorization." An "authorization" must be written in
specific terms. It may allow use and disclosure of protected health
information by the covered entity seeking the authorization, or by a
third party. In some instances, a covered entity may not refuse to treat
or cover individuals based on the fact that they refuse to sign an
authorization. See § 164.508 and the corresponding preamble discussion
regarding authorization requirements.
**Section 164.506(a) -- Consent Requirements**
We make significant changes in the final rule with respect to uses and
disclosures of protected health information to carry out treatment,
payment, and health care operations. We do not prohibit covered entities
from seeking an individual's written permission for use or disclosure of
protected health information to carry out treatment, payment, or health
care operations.
Except as described below, we instead require covered health care
providers to obtain the individual's consent prior to using or
disclosing protected health information to carry out treatment, payment,
or health care operations. If the covered provider does not obtain the
individual's consent, the provider is prohibited from using or
disclosing protected health information about the individual for
purposes of treating the individual, obtaining payment for health care
delivered to the individual, or for the provider's health care
operations. See § 164.506(a)(1).
We except two types of health care providers from this consent
requirement. First, covered health care providers that have an indirect
treatment relationship with an individual are not required to obtain the
individual's consent prior to using or disclosing protected health
information about the individual to carry out treatment, payment, and
health care operations. An "indirect treatment relationship" is defined
in § 164.501 and described in the corresponding preamble. These
providers may use and disclose protected health information as otherwise
permitted under the rule and consistent with their notice of privacy
practices (see § 164.520 regarding notice requirements and § 164.502(i)
regarding requirements to adhere to the notice). For example, a covered
provider that provides consultation services to another provider without
seeing the patient would have an indirect treatment relationship with
that patient and would not be required to obtain the patient's consent
to use protected health information about the patient for the
consultation. These covered providers are, however, permitted to obtain
consent, as described below.
Second, covered health care providers that create or receive protected
health information in the course of providing health care to inmates of
a correctional institution are not required to obtain the inmate's
consent prior to using or disclosing protected health information about
the inmate to carry out treatment, payment, and health care operations.
See § 164.501 and the corresponding preamble discussion regarding the
definitions of "correctional institution" and "inmate." These providers
may use and disclose protected health information as otherwise permitted
under the rule. These providers are permitted, however, to obtain
consent, as described below.
In addition, we permit covered health care providers to use and disclose
protected health information, without consent, to carry out treatment,
payment, and health care operations, if the protected health information
was created or received in certain treatment situations. In the
treatment situations described in § 164.506(a)(3) and immediately below,
the covered health care provider must attempt to obtain the individual's
consent. If the covered provider is unable to obtain consent, but
documents the attempt and the reason consent was not obtained, the
covered provider may, without consent, use and disclose the protected
health information resulting from the treatment as otherwise permitted
under the rule. All other protected health information about that
individual that the covered health care provider creates or receives,
however, is subject to the consent requirements.
This exception to the consent requirement applies to protected health
information created or received in any of three treatment situations.
First, the exception applies to protected health information created or
received in emergency treatment situations. In these situations, covered
providers must attempt to obtain the consent as soon as reasonably
practicable after the delivery of the emergency treatment. Second, the
exception applies to protected health information created or received in
situations where the covered health care provider is required by law to
treat the individual (for example, certain publicly funded providers)
and the covered health care provider attempts to obtain such consent.
Third, the exception applies to protected health information created or
received in treatment situations where there are substantial barriers to
communicating with the individual and, in the exercise of professional
judgment, the covered provider clearly infers from the circumstances the
individual's consent to receive treatment. For example, there may be
situations in which a mentally incapacitated individual seeks treatment
from a health care provider but is unable to provide informed consent to
undergo such treatment and does not have a personal representative
available to provide such consent on the individual's behalf. If the
covered provider, in her professional judgment, believes she can legally
provide treatment to that individual, we also permit the provider to use
and disclose protected health information resulting from the treatment
without the individual's consent. We intend covered health care
providers that legally provide treatment without the individual's
consent to that treatment to be able to use and disclose protected
health information resulting from that treatment to carry out treatment,
payment, or health care operations without obtaining the individual's
consent for such use or disclosure. We do not intend to impose
unreasonable barriers to individuals' ability to receive, and health
care providers' ability to provide, health care.
Under § 164.506(a)(4), covered health care providers that have an
indirect treatment relationship with an individual, as well as health
plans and health care clearinghouses, may elect to seek consent for
their own uses and disclosures to carry out treatment, payment, and
health care operations. If such a covered entity seeks consent for these
purposes, the consent must meet the minimum requirements described
below.
If a covered health care provider with an indirect treatment
relationship, a health plan, or a health care clearinghouse does not
seek consent, the covered entity may use or disclose protected health
information to carry out treatment, payment, and health care operations
as otherwise permitted under the rule and consistent with its notice of
privacy practices (see § 164.520 regarding notice requirements and §
164.502(i) regarding requirements to adhere to the notice).
If a covered health care provider with an indirect treatment
relationship, a health plan, or a health care clearinghouse does ask an
individual to sign a consent, and the individual does not do so, the
covered entity is prohibited under § 164.502(a)(1) from using or
disclosing protected health information for the purpose(s) included in
the consent. A covered entity that seeks a consent must adhere to the
individual's decision.
In § 164.506(a)(5), we specify that a consent obtained by one covered
entity is not effective to permit another covered entity to use or
disclose protected health information, unless the consent is a joint
consent. See § 164.506(f) and the corresponding preamble discussion
below regarding joint consents. A consent provides the individual's
permission only for the covered entity that obtains the consent to use
or disclose protected health information for treatment, payment, and
health care operations. A consent under this section does not operate to
authorize another covered entity to use or disclose protected health
information, except where the other covered entity is operating as a
business associate. We note that, where a covered entity is acting as a
business associate of another covered entity, the business associate
covered entity is acting for or on behalf of the principal covered
entity, and its actions for or on behalf of the principal covered entity
are authorized by the consent obtained by the principal covered entity.
Thus, under this section, a health plan can obtain a consent that
permits the health plan and its business associates to use and disclose
protected health information that the health plan and its business
associates create or receive. That consent cannot, however, permit
another covered entity (that is not a business associate) to disclose
protected health information to the health plan or to any other person.
If a covered entity wants to obtain the individual's permission for
another covered entity to disclose protected health information to it
for treatment, payment, or health care operations purposes, it must seek
an authorization in accordance with § 164.508(e). For example, when a
covered provider asks the individual for written permission to obtain
the individual's medical record from another provider for treatment
purposes, it must do so with an authorization, not a consent. Since the
permission is for disclosure of protected health information by another
person, a consent may not be used.
**Section 164.506(b) -- Consent General Requirements**
In the final rule, we permit a covered health care provider to condition
the provision of treatment on the receipt of the individual's consent
for the covered provider to use and disclose protected health
information to carry out treatment, payment, and health care operations.
Covered providers may refuse to treat individuals who do not consent to
uses and disclosures for these purposes. See § 164.506(b)(1). We note
that there are exceptions to the consent requirements for covered health
care providers that are required by law to treat individuals. See §
164.506(a)(3), described above.
Similarly, in the final rule, we permit health plans to condition an
individual's enrollment in the health plan on the receipt of the
individual's consent for the health plan to use and disclose protected
health information to carry out treatment, payment, and health care
operations, if the consent is sought in conjunction with the enrollment
process. If the health plan seeks the individual's consent outside of
the enrollment process, the health plan may not condition any services
on obtaining such consent.
Under § 164.520, covered entities must produce a notice of privacy
practices. A consent may not be combined in a single document with the
notice of privacy practices. See § 164.506(b)(3).
Under § 164.506(b)(4), consents for uses and disclosures of protected
health information to carry out treatment, payment, and health care
operations may be combined in a single document covering all three types
of activities and may be combined with other types of legal permission
from the individual. For example, a consent to use or disclose protected
health information under this rule may be combined with an informed
consent to receive treatment, a consent to assign payment of benefits to
a provider, or narrowly tailored consents required under state law for
the use or disclosure of specific types of protected health information
(e.g., state laws requiring specific consent for any sharing of
information related to HIV/AIDS).
Within a single consent document, the consent for use and disclosure of
protected health information required or permitted under this rule must
be visually and organizationally separate from the other consents or
authorizations and must be separately signed by the individual and
dated.
Where research includes treatment of the individual, a consent under
this rule may be combined with the authorization for the use or
disclosure of protected health information created for the research, in
accordance with § 164.508(f). (This is the only case in which an
authorization under § 164.508 of this rule may be combined with a
consent under § 164.506 of this rule. See § 164.508(b)(3).) The covered
entity that is creating protected health information for the research
may elect to combine the consent required under this section with the
research-related authorization required under § 164.508(f). For example,
a covered health care provider that provides health care to an
individual for research purposes and for non-research purposes must
obtain a consent under this section for all of the protected health
information it maintains. In addition, it must obtain an authorization
in accordance with § 164.508(f) which describes how it will use and
disclose the protected health information it creates for the research
for purposes of treatment, payment, and health care operations. Section
164.506(b)(4) permits the covered entity to satisfy these two
requirements with a single document. See § 164.508(f) and the
corresponding preamble discussion for a more detailed description of
research authorization requirements.
Under § 164.506(b)(5), individuals may revoke a consent in writing at
any time, except to the extent that the covered entity has taken action
in reliance on the consent. Upon receipt of the written revocation, the
covered entity must stop processing the information for use or
disclosure, except to the extent that it has taken action in reliance on
the consent. A covered health care provider may refuse, under this rule,
to continue to treat an individual that revokes his or her consent. A
health plan may disenroll an individual that revokes a consent that was
sought in conjunction with the individual's enrollment in the health
plan.
Covered entities must document and retain any signed consent as required
by § 164.530(j).
**Section 164.506(c) -- Consent Content Requirements**
Under § 164.506(c), the consent must be written in plain language. See
the preamble discussion regarding notice of privacy practices for a
description of plain language requirements. We do not provide a model
consent in this rule. We will provide further guidance on drafting
consent documents prior to the compliance date.
Under § 164.506(c)(1), the consent must inform the individual that
protected health information may be used and disclosed by the covered
entity to carry out treatment, payment, or health care operations. The
covered entity must determine which of these elements (use and/or
disclosure; treatment, payment, and/or health care operations) to
include in the consent document, as appropriate for the covered entity's
practices.
For covered health care providers that are required to obtain consent,
the requirement applies only to the extent the covered provider uses or
discloses protected health information. For example, if all of a covered
provider's health care operations are conducted by members of the
covered provider's own workforce, the covered provider may choose to
obtain consent only for uses, not disclosures, of protected health
information to carry out health care operations. If an individual pays
out of pocket for all services received from the covered provider and
the provider will not disclose any information about the patient to a
third party payor, the provider may choose not to obtain the
individual's consent to disclose information for payment purposes. In
order for a covered provider to be able to use and disclose information
for all three purposes, however, all three purposes must be included in
the consent.
Under §§ 164.506(c)(2) and (3), the consent must refer the individual to
the covered entity's notice for additional information about the uses
and disclosures of information described in the consent. The consent
must also indicate that the individual has the right to review the
notice prior to signing the consent. If the covered entity has reserved
the right to change its privacy practices in accordance with §
164.520(b)(1)(v)(C), the consent must indicate that the terms of the
notice may change and must describe how the individual may obtain a
revised notice. See § 164.520 and the corresponding preamble discussion
regarding notice requirements.
Under § 164.506(c)(4), the consent must inform individuals that they
have the right to request restrictions on uses and disclosures of
protected health information for treatment, payment, and health care
operations purposes. It must also state that the covered entity is not
required to agree to an individual's request, but that if the covered
entity does agree to the request, the restriction is binding on the
covered entity. See § 164.522(a) regarding the right to request
restrictions.
Under § 164.506(c)(5), the consent must indicate that the individual has
the right to revoke the consent in writing, except to the extent that
the covered entity has taken action in reliance on the consent.
Under § 164.506(c)(6), the consent must include the individual's
signature and the date of signature. Once we adopt the standards for
electronic signature, another of the required administrative
simplification standards we are required to adopt under HIPAA, an
electronic signature that meets those standards will be sufficient under
this rule. We do not require any verification of the individual's
identity or authentication of the individual's signature. We expect
covered health care providers that are required to obtain consent to
employ the same level of scrutiny to these signatures as they do to the
signature obtained on a document regarding the individual's consent to
undergo treatment by the provider.
**Section 164.506(d) -- Defective Consents**
Under § 164.506(d), there is no "consent" within the meaning of the rule
if the completed document lacks a required element or if the individual
has revoked the consent in accordance with § 164.506(b)(5).
**Section 164.506(e) -- Resolving Conflicting Consents and
Authorizations**
Situations may arise where a covered entity that has obtained the
individual's consent for the covered entity to use or disclose protected
health information to carry out treatment, payment, or health care
operations is asked to disclose protected health information pursuant to
another written legal permission from the individual, such as an
authorization, that was obtained by another person. Under § 164.506(e),
when the terms of a covered entity's consent conflict with the terms of
another written legal permission from the individual to use or disclose
protected health information (such as a consent obtained under state law
by another covered entity or an authorization), the covered entity must
adhere to the more restrictive document. By conflict, we mean that the
consent and authorization contain inconsistencies. In implementing this
section, we note that the consent under this section references the
notice provided to the individual and the individual's right to request
restrictions. In determining whether the covered entity's consent
conflicts with another written legal permission provided by the
individual, the covered entity must consider any limitations on its uses
or disclosures resulting from the notice provided to the individual or
from restrictions to which it has agreed. For example, a covered nursing
home may elect to ask the patient to sign an authorization for the
patient's covered primary care physician to forward the patient's
medical records to the nursing home. The physician may have previously
obtained the individual's consent for disclosure for treatment purposes.
If the authorization obtained by the nursing home grants permission for
the physician to disclose particular types of information, such as
genetic information, but the consent obtained by the physician excludes
such information or the physician has agreed to a restriction on that
type of information, the physician may not disclose that information.
The physician must adhere to the more restrictive written legal
permission from the individual.
When a conflict between a consent and another written legal permission
from the individual exists, as described above, the covered entity may
attempt to resolve the conflict with the individual by either obtaining
a new consent from the individual or by having a discussion or otherwise
communicating with the individual to determine the individual's
preference regarding the use or disclosure. If the individual's
preference is communicated orally, the covered entity must document the
individual's preference and act in accordance with that preference. In
the example described above, the primary care physician could ask the
patient to sign a new consent that would permit the disclosure of the
genetic information. Alternatively, the physician could ask the patient
whether the patient intended for the genetic information to be disclosed
to the nursing home. If the patient confirms that he or she intended for
the genetic information to be shared, the physician can document that
fact (e.g., by making a notation in the medical record) and disclose the
information to the nursing home.
We believe covered entities will rarely be faced with conflicts between
consents and other written legal permission from the individual for uses
and disclosures to carry out treatment, payment, and health care
operations. Under § 164.506(a)(5), we specify that a consent only
permits the covered entity that obtains the consent to use or disclose
protected health information. A consent obtained by one covered entity
is not effective to permit another different covered entity to use or
disclose protected health information. Conflicting consents obtained by
covered entities, therefore, are not possible. We expect authorizations
that permit another covered entity to use and disclose protected health
information for treatment, payment, and health care operations purposes
will rarely be necessary, because we expect covered entities that
maintain protected health information to obtain consents that permit
them to make anticipated uses and disclosures for these purposes.
Nevertheless, covered entities are permitted under § 164.508(e) to
obtain authorization for another covered entity to use or disclose
protected health information to carry out treatment, payment, and health
care operations. We recognize these authorizations may be useful to
demonstrate an individual's intent and relationship to the intended
recipient of the information. For example, these authorizations may be
useful in situations where a health plan wants to obtain information
from one provider in order to determine payment of a claim for services
provided by a different provider (e.g., information from a primary care
physician that is necessary to determine payment of services provided by
a specialist) or where an individual's new physician wants to obtain the
individual's medical records from prior physicians. Other persons not
covered by this rule may also seek authorizations and state law may
require written permission for specific types of information, such as
information related to HIV/AIDS or to mental health. Because an
individual may sign conflicting documents over time, we clarify that the
covered entity maintaining the protected health information to be used
or disclosed must adhere to the more restrictive permission the
individual has granted, unless the covered entity resolves the conflict
with the individual.
**Section 164.506(f) -- Joint Consents**
Covered entities that participate in an organized health care
arrangement and that develop a joint notice under § 164.520(d) may
develop a joint consent in which the individual consents to the uses and
disclosures of protected health information by each of the covered
entities in the arrangement to carry out treatment, payment, and/or
health care operations. The joint consent must identify with reasonable
specificity the covered entities, or class of covered entities, to which
the joint consent applies and must otherwise meet the consent
requirements. If an individual revokes a joint consent, the covered
entity that receives the revocation must inform the other entities
covered by the joint consent of the revocation as soon as practicable.
If any one of the covered entities included in the joint consent obtains
the individual's consent, as required above, the consent requirement is
met for all of the other covered entities to which the consent applies.
For example, a covered hospital and the clinical laboratory and
emergency departments with which it participates in an organized health
care arrangement may produce a joint notice and obtain a joint consent.
If the covered hospital obtains the individual's joint consent upon
admission, and some time later the individual is readmitted through the
associated emergency department, the emergency department's consent
requirement will already have been met. These joint consents are the
only type of consent by which one covered entity can obtain the
individual's permission for another covered entity to use or disclose
protected health information to carry out treatment, payment, or health
care operations.
***Effect of Consent***
These consents, as well as the authorizations described in § 164.508,
should not be construed to waive, directly or indirectly, any privilege
granted under federal, state, or local law or procedure. Consents
obtained under this regulation are not appropriate for the disposition
of more technical and legal proceedings and may not comport with
procedures and standards of federal, state, or local judicial practice.
For example, state courts and other decision-making bodies may choose to
examine more closely the circumstances and propriety of such consent and
may adopt more protective standards for application in their
proceedings. In the judicial setting, as in the legislative and
executive settings, states may provide for greater protection of
privacy. Additionally, both the Congress and the Secretary have
established a general approach to protecting from explicit preemption
state laws that are more protective of privacy than the protections set
forth in this regulation.
**SECTION 164.508 - USES AND DISCLOSURES FOR WHICH AN AUTHORIZATION IS
REQUIRED**
**Section 164.508(a) -- Standard**
We proposed to require covered entities to obtain the individual's
authorization for all uses and disclosures of protected health
information not otherwise permitted or required under the proposed rule.
Uses and disclosures that would have been permitted without individual
authorization included uses and disclosures for national priority
purposes such as public health, law enforcement, and research (see
proposed § 164.510) and uses and disclosures of protected health
information, other than psychotherapy notes and research information
unrelated to treatment, for purposes of treatment, payment, and health
care operations (see proposed § 164.506). We also proposed to require
covered entities to disclose protected health information to the
individual for inspection and copying (see proposed § 164.514) and to
the Secretary as required for enforcement of the rule (see proposed §
164.522). Individual authorization would not have been required for
these uses and disclosures.
We proposed to require covered entities to obtain the individual's
authorization for all other uses and disclosures of protected health
information. Under proposed § 164.508(a), uses and disclosures that
would have required individual authorization included, but were not
limited to, the following:
· use for marketing of health and non-health items and services by the
covered entity;
· disclosure by sale, rental, or barter;
· use and disclosure to non-health related divisions of the covered
entity, e.g., for use in marketing life or casualty insurance or banking
services;
· disclosure, prior to an individual's enrollment in a health plan, to
the health plan or health care provider for making eligibility or
enrollment determinations relating to the individual or for underwriting
or risk rating determinations;
· disclosure to an employer for use in employment determinations; and
· use or disclosure for fundraising.
In the preamble to the proposed rule, we stated that covered entities
would be bound by the terms of authorizations. Uses or disclosures by
the covered entity for purposes inconsistent with the statements made in
the authorization would have constituted a violation of the rule.
In the final rule, under § 164.508(a), as in the proposed rule, covered
entities must have authorization from individuals before using or
disclosing protected health information for any purpose not otherwise
permitted or required by this rule. Specifically, except for
psychotherapy notes (see below), covered entities are not required to
obtain the individual's authorization to use or disclose protected
health information to carry out treatment, payment, and health care
operations. (Covered entities may, however, be required to obtain the
individual's consent for these uses and disclosures. See the preamble
regarding § 164.506 for a discussion of "consent" versus
"authorization".) We also do not require covered entities to obtain the
individual's authorization for uses and disclosures of protected health
information permitted under §§ 164.510 or 164.512, for disclosures to
the individual, or for required disclosures to the Secretary under
subpart C of part 160 of this subchapter for enforcement of this rule.
In the final rule, we clarify that covered entities are bound by the
statements provided on the authorization; use or disclosure by the
covered entity for purposes inconsistent with the statements made in the
authorization constitutes a violation of this rule.
Unlike the proposed rule, we do not include in the regulation examples
of the types of uses and disclosures that require individual
authorization. We eliminated two examples from the proposed list due to
potential confusion as to our intent: disclosure by sale, rental, or
barter and use and disclosure to non-health related divisions of the
covered entity. We recognize that covered entities sometimes make these
types of uses and disclosures for purposes that are permitted under the
rule without authorization. For example, a covered health care provider
may sell its accounts receivable to a collection agency for payment
purposes and a health plan may disclose protected health information to
its life insurance component for payment purposes. We do not intend to
require authorization for uses and disclosures made by sale, rental, or
barter or for disclosures made to non-health related divisions of the
covered entity, if those uses or disclosures could otherwise be made
without authorization under this rule. As with any other use or
disclosure, however, uses and disclosures of protected health
information for these purposes do require authorization if they are not
otherwise permitted under the rule.
We also eliminated the remaining proposed examples from the final rule
due to concern that these examples might be misinterpreted as an
exhaustive list of all of the uses and disclosures that require
individual authorization. We discuss the examples here, however, to
clarify the interaction of the authorization requirements and the
provisions of the rule that permit uses and disclosures without
authorization and/or with consent. Uses and disclosures for which
covered entities must have the individual's authorization include, but
are not limited to, the following activities.
***Marketing***
As in the proposed rule, covered entities must obtain the individual's
authorization before using or disclosing protected health information
for marketing purposes. In the final rule, we add a new definition of
marketing (see § 164.501). For more detail on what activities constitute
marketing, see § 164.501, definition of "marketing," and § 164.514(e).
***Pre-enrollment underwriting***
As in the proposed rule, covered entities must obtain the individual's
authorization to use or disclose protected health information for the
purpose of making eligibility or enrollment determinations relating to
an individual or for underwriting or risk rating determinations, prior
to the individual's enrollment in a health plan (that is, for purposes
of pre-enrollment underwriting). For example, if an individual applies
for new coverage with a health plan in the non-group market and the
health plan wants to review protected health information from the
individual's covered health care providers before extending an offer of
coverage, the individual first must authorize the covered providers to
share the information with the health plan. If the individual applies
for renewal of existing coverage, however, the health plan would not
need to obtain an authorization to review its existing claims records
about that individual, because this activity would come within the
definition of health care operations and be permissible. We also note
that under § 164.504(f), a group health plan and a health insurance
issuer that provides benefits with respect to a group health plan are
permitted in certain circumstances to disclose summary health
information to the plan sponsor for the purpose of obtaining premium
bids. Because these disclosures fall within the definition of health
care operations, they do not require authorization.
***Employment determinations***
As in the proposed rule, covered entities must obtain the individual's
authorization to use or disclose protected health information for
employment determinations. For example, a covered health care provider
must obtain the individual's authorization to disclose the results of a
pre-employment physical to the individual's employer. The final rule
provides that a covered entity may condition the provision of health
care that is solely for the purpose of creating protected health
information for disclosure to a third party on the provision of
authorization for the disclosure of the information to the third party.
***Fundraising***
Under the proposed regulation, we would have required authorization
before a covered entity could have used or disclosed protected health
information for fundraising. In the final rule, we narrow the
circumstances under which covered entities must obtain the individual's
authorization to use or disclose protected health information for
fundraising purposes. As provided in § 164.514(f) and described in
detail in the corresponding preamble, authorization is not required when
a covered entity uses or discloses demographic information and
information about the dates of health care provided to an individual for
the purpose of raising funds for its own benefit, nor when it discloses
such information to an institutionally related foundation to raise funds
for the covered entity.
Any use or disclosure for fundraising purposes that does not meet the
requirements of § 164.514(f) and does not fall within the definition of
health care operations (see § 164.501), requires authorization.
Specifically, covered entities must obtain the individual's
authorization to use or disclose protected health information to raise
funds for any entity other than the covered entity. For example, a
covered entity must have the individual's authorization to use protected
health information about the individual to solicit funds for a
non-profit organization that engages in research, education, and
awareness efforts about a particular disease.
***Psychotherapy Notes***
In the NPRM, we proposed different rules with respect to psychotherapy
notes than we proposed with respect to all other protected health
information. The proposed rule would have required covered entities to
obtain an authorization for any use or disclosure of psychotherapy notes
to carry out treatment, payment, or health care operations, unless the
use was by the person who created the psychotherapy notes. With respect
to all other protected health information, we proposed to prohibit
covered entities from requiring authorization for uses and disclosures
for these purposes.
We significantly revise our approach to psychotherapy notes in the final
rule. With a few exceptions, covered entities must obtain the
individual's authorization to use or disclose psychotherapy notes to
carry out treatment, payment, or health care operations. A covered
entity must obtain the individual's consent, but not an authorization,
for the person who created the psychotherapy notes to use the notes to
carry out treatment and for the covered entity to use or disclose
psychotherapy notes for conducting training programs in which students,
trainees, or practitioners in mental health learn under supervision to
practice or improve their skills in group, joint, family, or individual
counseling. A covered entity may also use psychotherapy notes to defend
a legal action or other proceeding brought by the individual pursuant to
a consent, without a specific authorization. We note that, while this
provision allows disclosure of these records to the covered entity's
attorney to defend against the action or proceeding, disclosure to
others in the course of a judicial or administrative proceeding is
governed by § 164.512(e). This special provision is necessary because
disclosure of protected health information for purposes of legal
representatives may be made under the general consent as part of "health
care operations." Because we require an authorization for disclosure of
psychotherapy notes for "health care operations," an exception is needed
to allow covered entities to use protected health information about an
individual to defend themselves against an action threatened or brought
by that individual without asking that individual for authorization to
do so. Otherwise, a consent under § 164.506 is not sufficient for the
use or disclosure of psychotherapy notes to carry out treatment,
payment, or health care operations. Authorization is required. We
anticipate these authorizations will rarely be necessary, since
psychotherapy notes do not include information that covered entities
typically need for treatment, payment, or other types of health care
operations.
In the NPRM, we proposed to permit covered entities to use and disclose
psychotherapy notes for all other purposes permitted or required under
the rule without authorization. In the final rule, we specify a more
limited set of uses and disclosures of psychotherapy notes that covered
entities are permitted to make without authorization. An authorization
is not required for use or disclosure of psychotherapy notes when
required for enforcement purposes, in accordance with subpart C of part
160 of this subchapter; when mandated by law, in accordance with §
164.512(a); when needed for oversight of the health care provider who
created the psychotherapy notes, in accordance with § 164.512(d); when
needed by a coroner or medical examiner, in accordance with §
164.512(g)(1); or when needed to avert a serious and imminent threat to
health or safety, in accordance with § 164.512(j)(1)(i). We also provide
transition provisions in § 164.532 regarding the effect of express legal
permission obtained from an individual prior to the compliance date of
this rule.
**Section 164.508(b) -- Implementation Specifications for
Authorizations**
***Valid and Defective Authorizations***
We proposed to require a minimum set of elements for authorizations
requested by the individual and an additional set of elements for
authorizations requested by a covered entity. We would have permitted
covered entities to use and disclose protected health information
pursuant to authorizations containing the applicable required elements.
We would have prohibited covered entities from acting on an
authorization if the submitted document had any of the following
defects:
· the expiration date had passed;
· the form had not been filled out completely;
· the covered entity knew the authorization had been revoked;
· the completed form lacked a required element; or
· the covered entity knew the information on the form was false.
In § 164.508(b)(1) of the final rule, we specify that an authorization
containing the applicable required elements (as described below) is a
valid authorization. We clarify that a valid authorization may contain
additional, non-required elements, provided that these elements are not
inconsistent with the required elements. Covered entities are not
required to use or disclose protected health information pursuant to a
valid authorization. Our intent is to clarify that a covered entity that
uses or discloses protected health information pursuant to an
authorization meeting the applicable requirements will be in compliance
with this rule.
We retain the provision prohibiting covered entities from acting on an
authorization if the submitted document had any of the listed defects,
with a few changes. First, in § 164.508(c)(1)(iv) we specify that an
authorization may expire upon a certain event or on a specific date. For
example, a valid authorization may state that it expires upon acceptance
or rejection of an application for insurance or upon the termination of
employment (for example, in an authorization for disclosure of protected
health information for fitness-for-duty purposes) or similar event. The
expiration event must, however, be related to the individual or the
purpose of the use or disclosure. An authorization that purported to
expire on the date when the stock market reached a specified level would
not be valid. Under § 164.508(b)(2)(i), if the expiration event is known
by the covered entity to have occurred, the authorization is defective.
Second, we clarify that certain compound authorizations, as described
below, are defective. We also clarify that authorizations that are not
completely filled out with respect to the required elements are
defective. Finally, we clarify that an authorization with information
that the covered entity knows to be false is defective only if the
information is material.
As under the proposed regulation, an authorization that the covered
entity knows has been revoked is not a valid authorization. We note
that, although an authorization must be revoked in writing, the covered
entity may not always "know" that an authorization has been revoked. The
writing required for an individual to revoke an authorization may not
always trigger the "knowledge" required for a covered entity to consider
an authorization defective. Conversely, a copy of the written revocation
is not required before a provider "knows" that an authorization has been
revoked.
Many authorizations will be obtained by persons other than the covered
entity. If the individual revokes an authorization by writing to that
other person, and neither the individual nor the other person informs
the covered entity of the revocation, the covered entity will not "know"
that the authorization has been revoked. For example, a government
agency may obtain an individual's authorization for "all providers who
have seen the individual in the past year" to disclose protected health
information to the agency for purposes of determining eligibility for
benefits. The individual may revoke the authorization by writing to the
government agency requesting such revocation. We cannot require the
agency to inform all covered entities to whom it has presented the
authorization that the authorization has been revoked. If a covered
entity does not know of the revocation, the covered entity will not
violate this rule by acting pursuant to the authorization. At the same
time, if the individual does inform the covered entity of the
revocation, even orally, the covered entity "knows" that the
authorization has been revoked and can no longer treat the authorization
as valid under this rule. Thus, in this example, if the individual tells
a covered entity that the individual has revoked the authorization, the
covered entity "knows" of the revocation and must consider the
authorization defective under § 164.508(b)(2).
***Compound Authorizations***
Except for authorizations requested in connection with a clinical trial,
we proposed to prohibit covered entities from combining an authorization
for use or disclosure of protected health information for purposes other
than treatment, payment, or health care operations with an authorization
or consent for treatment (e.g., an informed consent to receive care) or
payment (e.g., an assignment of benefits).
We clarify the prohibition on compound authorizations in the final rule.
Other than as described below, § 164.508(b)(3) prohibits a covered
entity from acting on an authorization required under this rule that is
combined with any other document, including any other written legal
permission from the individual. For example, an authorization under this
rule may not be combined with a consent for use or disclosure of
protected health information under § 164.506, with the notice of privacy
practices under § 164.520, with any other form of written legal
permission for the use or disclosure of protected health information,
with an informed consent to participate in research, or with any other
form of consent or authorization for treatment or payment.
There are three exceptions to this prohibition. First, under §
164.508(f) (described in more detail, below), an authorization for the
use or disclosure of protected health information created for research
that includes treatment of the individual may be combined with a consent
for the use or disclosure of that protected health information to carry
out treatment, payment, or health care operations under § 164.506 and
with other documents as provided in § 164.508(f). Second, authorizations
for the use or disclosure of psychotherapy notes for multiple purposes
may be combined in a single document, but may not be combined with
authorizations for the use or disclosure of other protected health
information. Third, authorizations for the use or disclosure of
protected health information other than psychotherapy notes may be
combined, provided that the covered entity has not conditioned the
provision of treatment, payment, enrollment, or eligibility on obtaining
the authorization. If a covered entity conditions any of these services
on obtaining an authorization from the individual, as permitted in §
164.508(b)(4) and described below, the covered entity must not combine
the authorization with any other document.
The following are examples of valid compound authorizations: an
authorization for the disclosure of information created for clinical
research combined with a consent for the use or disclosure of other
protected health information to carry out treatment, payment, and health
care operations, and the informed consent to participate in the clinical
research; an authorization for disclosure of psychotherapy notes for
both treatment and research purposes; and an authorization for the
disclosure of the individual's demographic information for both
marketing and fundraising purposes. Examples of invalid compound
authorizations include: an authorization for the disclosure of protected
health information for treatment, for research, and for determining
payment of a claim for benefits, when the covered entity will refuse to
pay the claim if the individual does not sign the authorization; or an
authorization for the disclosure of psychotherapy notes combined with an
authorization to disclose any other protected health information.
***Prohibition on Conditioning Treatment, Payment, Eligibility, or
Enrollment***
We proposed to prohibit covered entities from conditioning treatment or
payment on the provision by the individual of an authorization, except
when the authorization was requested in connection with a clinical
trial. In the case of authorization for use or disclosure of
psychotherapy notes or research information unrelated to treatment, we
proposed to prohibit covered entities from conditioning treatment,
payment, or enrollment in a health plan on obtaining such an
authorization.
We retain this basic approach but refine its application in the final
rule. In addition to the general prohibition on conditioning treatment
and payment, covered entities are also prohibited (with certain
exceptions described below) from conditioning eligibility for benefits
or enrollment in a health plan on obtaining an authorization. This
prohibition extends to all authorizations, not just authorizations for
use or disclosure of psychotherapy notes. This prohibition is intended
to prevent covered entities from coercing individuals into signing an
authorization for a use or disclosure that is not necessary to carry out
the primary services that the covered entity provides to the individual.
For example, a health care provider could not refuse to treat an
individual because the individual refused to authorize a disclosure to a
pharmaceutical manufacturer for the purpose of marketing a new product.
We clarify the proposed research exception to this prohibition. Covered
entities seeking authorization in accordance with § 164.508(f) to use or
disclose protected health information created for the purpose of
research that includes treatment of the individual, including clinical
trials, may condition the research-related treatment on the individual's
authorization. Permitting use of protected health information is part of
the decision to receive care through a clinical trial, and health care
providers conducting such trials should be able to condition
research-related treatment on the individual's willingness to authorize
the use or disclosure of his or her protected health information for
research associated with the trial.
In addition, we permit health plans to condition eligibility for
benefits and enrollment in the health plan on the individual's
authorization for the use or disclosure of protected health information
for purposes of eligibility or enrollment determinations relating to the
individual or for its underwriting or risk-rating determinations. We
also permit health plans to condition payment of a claim for specified
benefits on the individual's authorization for the disclosure of
information maintained by another covered entity to the health plan, if
the disclosure is necessary to determine payment of the claim. These
exceptions do not apply, however, to authorization for the use or
disclosure of psychotherapy notes. Health plans may not condition
payment, eligibility, or enrollment on the receipt of an authorization
for the use or disclosure of psychotherapy notes, even if the health
plan intends to use the information for underwriting or payment
purposes.
Finally, when a covered entity provides treatment for the sole purpose
of providing information to a third party, the covered entity may
condition the treatment on the receipt of an authorization to use or
disclose protected health information related to that treatment. For
example, a covered health care provider may have a contract with an
employer to provide fitness-for-duty exams to the employer's employees.
The provider may refuse to conduct the exam if an individual refuses to
authorize the provider to disclose the results of the exam to the
employer. Similarly, a covered health care provider may have a contract
with a life insurer to provide pre-enrollment physicals to applicants
for life insurance coverage. The provider may refuse to conduct the
physical if an individual refuses to authorize the provider to disclose
the results of the physical to the life insurer.
***Revocation of Authorizations***
We proposed to allow individuals to revoke an authorization at any time,
except to the extent that the covered entity had taken action in
reliance on the authorization.
We retain this provision, but specify that the individual must revoke
the authorization in writing. When an individual revokes an
authorization, a covered entity that knows of such revocation must stop
making uses and disclosures pursuant to the authorization to the
greatest extent practical. A covered entity may continue to use and
disclose protected health information in accordance with the
authorization only to the extent the covered entity has taken action in
reliance on the authorization. For example, a covered entity is not
required to retrieve information that it has already disclosed in
accordance with the authorization. (See above for discussion of how
written revocation of an authorization and knowledge of that revocation
may differ.)
We also include an additional exception. Under § 164.508(b)(5),
individuals do not have the right to revoke an authorization if the
authorization was obtained as a condition of obtaining insurance
coverage and other applicable law provides the insurer that obtained the
authorization with the right to contest a claim under the policy. We
intend this exception to permit insurers to obtain necessary protected
health information during contestability periods under state law. For
example, an individual may not revoke an authorization for the
disclosure of protected health information to a life insurer for the
purpose of investigating material misrepresentation if the individual's
policy is still subject to the contestability period.
***Documentation***
In the final rule, we clarify that a covered entity must document and
retain any signed authorization as required by § 164.530(j) (see below).
**Section 164.508(c) -- Core Elements and Requirements**
We proposed to require authorizations requested by individuals to
contain a minimum set of elements: a description of the information to
be used or disclosed; the name of the covered entity, or class of
entities or persons, authorized to make the use or disclosure; the name
or types of recipient(s) of the information; an expiration date; the
individual's signature and date of signature; if signed by a
representative, a description of the representative's authority or
relationship to the individual; a statement regarding the individual's
right to revoke the authorization; and a statement that the information
may no longer be protected by the federal privacy law. We proposed a
model authorization form that entities could have used to satisfy the
authorization requirements. If the model form was not used, we proposed
to require covered entities to use authorization forms written in plain
language.
We modify the proposed approach, by eliminating the distinction between
authorizations requested by the individuals and authorizations requested
by others. Instead, we prescribe a minimum set of elements for
authorizations and certain additional elements when the authorization is
requested by a covered entity for its own use or disclosure of protected
health information it maintains or for receipt of protected health
information from another covered entity to carry out treatment, payment,
or health care operations.
The core elements are required for all authorizations, not just
authorizations requested by individuals. Individuals seek disclosure of
protected health information about them to others in many circumstances,
such as when applying for life or disability insurance, when government
agencies conduct suitability investigations, and in seeking certain job
assignments when health status is relevant. Another common instance is
tort litigation, when an individual\'s attorney needs individually
identifiable health information to evaluate an injury claim and asks the
individual to authorize disclosure of records relating to the injury to
the attorney. In each of these situations, the individual may go
directly to the covered entity and ask it to send the relevant
information to the intended recipient. Alternatively, the intended
recipient may ask the individual to complete a form, which the recipient
will submit to the covered entity on the individual's behalf, that
authorizes the covered entity to disclose the information. Whether the
authorization is submitted to the covered entity by the individual or by
another person on the individual's behalf, the covered entity
maintaining protected health information may not use or disclose it
pursuant to an authorization unless the authorization meets the
following requirements.
First, the authorization must include a description of the information
to be used or disclosed, with sufficient specificity to allow the
covered entity to know which information the authorization references.
For example, the authorization may include a description of "laboratory
results from July 1998" or "all laboratory results" or "results of MRI
performed in July 1998." The covered entity can then use or disclose
that information and only that information. If the covered entity does
not understand what information is covered by the authorization, the use
or disclosure is not permitted unless the covered entity clarifies the
request.
There are no limitations on the information that can be authorized for
disclosure. If an individual wishes to authorize a covered entity to
disclose his or her entire medical record, the authorization can so
specify. In order for the covered entity to disclose the entire medical
record, the authorization must be specific enough to ensure that the
individual has a clear understanding that the entire record will be
disclosed. For example, if the Social Security Administration seeks
authorization for release of all health information to facilitate the
processing of benefit applications, then the description on the
authorization form must specify "all health information" or the
equivalent.
In some instances, a covered entity may be reluctant to undertake the
effort to review the record and select portions relevant to the request
(or redact portions not relevant). In such circumstances, covered
entities may provide the entire record to the individual, who may then
redact and release the more limited information to the requestor. This
rule does not require a covered entity to disclose information pursuant
to an individual\'s authorization.
Second, the authorization must include the name or other specific
identification of the person(s) or class of persons that are authorized
to use or disclose the protected health information. If an authorization
permits a class of covered entities to disclose information to an
authorized person, the class must be stated with sufficient specificity
so that a covered entity presented with the authorization will know with
reasonable certainty that the individual intended the covered entity to
release protected health information. For example, a covered licensed
nurse practitioner presented with an authorization for "all physicians"
to disclose protected health information could not know with reasonable
certainty that the individual intended for the practitioner to be
included in the authorization.
Third, the authorization must include the name or other specific
identification of the person(s) or class of persons to whom the covered
entity is authorized to make the use or disclosure. The authorization
must identify these persons with sufficient specificity to reasonably
permit a covered entity responding to the authorization to identify the
authorized user or recipient of the protected health information. Often,
individuals provide authorizations to third parties, who present them to
one or more covered entities. For example, an authorization could be
completed by an individual and given to a government agency, authorizing
the agency to receive medical information from any health care provider
that has treated the individual within a defined period of time. Such an
authorization is permissible (subject to the other requirements of this
part) if it sufficiently identifies the government entity that is
authorized to receive the disclosed protected health information.
Fourth, the authorization must state an expiration date or event. This
expiration date or event must either be a specific date (e.g., January
1, 2001), a specific time period (e.g., one year from the date of
signature), or an event directly relevant to the individual or the
purpose of the use or disclosure (e.g., for the duration of the
individual's enrollment with the health plan that is authorized to make
the use or disclosure). We note that the expiration date or event is
subject to otherwise applicable and more stringent law. For example, the
National Association of Insurance Commissioners' Insurance Information
and Privacy Protection Model Act, adopted in at least fifteen states,
specifies that authorizations signed for the purpose of collecting
information in connection with an application for a life, health, or
disability insurance policy are permitted to remain valid for no longer
than thirty months. In those states, the longest such an authorization
may remain in effect is therefore thirty months, regardless of the
expiration date or event indicated on the form.
Fifth, the authorization must state that the individual has the right to
revoke an authorization in writing, except to the extent that action has
been taken in reliance on the authorization or, if applicable, during a
contestability period. The authorization must include instructions on
how the individual may revoke the authorization. For example, the person
obtaining the authorization from the individual can include an address
where the individual can send a written request for revocation.
Sixth, the authorization must inform the individual that, when the
information is used or disclosed pursuant to the authorization, it may
be subject to re-disclosure by the recipient and may no longer be
protected by this rule.
Seventh, the authorization must include the individual's signature and
the date of the signature. Once we adopt the standards for electronic
signature, another of the required administrative simplification
standards we are required to adopt under HIPAA, an electronic signature
that meets those standards will be sufficient under this rule. We do not
require verification of the individual's identity or authentication of
the individual's signature.
Finally, if the authorization is signed by a personal representative of
the individual, the representative must indicate his or her authority to
act for the individual.
As in the proposed rule, the authorization must be written in plain
language. See the preamble discussion regarding notice of privacy
practices (§ 164.520) for a discussion of the plain language
requirement. We do not provide a model authorization in this rule. We
will provide further guidance on this issue prior to the compliance
date.
**Section 164.508(d) -- Authorizations Requested by a Covered Entity for
Its Own Uses and Disclosures**
We proposed to require covered entities to include additional elements
in authorizations initiated by the covered entity. Before a covered
entity could use or disclose protected health information of an
individual pursuant to a request the covered entity made, we proposed to
require the entity to obtain an authorization containing the minimum
elements described above and the following additional elements: except
for authorizations requested for clinical trials, a statement that the
entity will not condition treatment or payment on the individual's
authorization; a description of the purpose of the requested use or
disclosure; a statement that the individual may inspect or copy the
information to be used or disclosed and may refuse to sign the
authorization; and, if the use or disclosure of the requested
information will result in financial gain to the entity, a statement
that such gain will result.
We additionally proposed to require covered entities, when requesting an
individual's authorization, to request only the minimum amount of
information necessary to accomplish the purpose for which the request
was made. We also proposed to require covered entities to provide the
individual with a copy of the executed authorization.
We retain the proposed approach, but apply these additional requirements
when the covered entity requests the individual's authorization for the
entity's own use or disclosure of protected health information
maintained by the covered entity itself. For example, a health plan may
ask individuals to authorize the plan to disclose protected health
information to a subsidiary to market life insurance to the individual.
A pharmaceutical company may also ask a covered provider to recruit
patients for drug research; if the covered provider asks patients to
sign an authorization for the provider to disclose protected health
information to the pharmaceutical company for this research, this is
also an authorization requested by a covered entity for disclosure of
protected health information maintained by the covered entity. When
covered entities initiate the authorization by asking individuals to
authorize the entity to use or disclose protected health information
that the entity maintains, the authorization must include all of the
elements required above as well as several additional elements.
Authorizations requested by covered entities for the covered entity's
own use or disclosure of protected health information must state, as
applicable under § 164.508(b)(4), that the covered entity will not
condition treatment, payment, enrollment, or eligibility on the
individual's authorization for the use or disclosure. For example, if a
health plan asks an individual to sign an authorization for the health
plan to disclose protected health information to a non-profit advocacy
group for the advocacy group's fundraising purposes, the authorization
must contain a statement that the health plan will not condition
treatment, payment, enrollment in the health plan, or eligibility for
benefits on the individual providing the authorization.
Authorizations requested by covered entities for their own uses and
disclosures of protected health information must also identify each
purpose for which the information is to be used or disclosed. The
required statement of purpose(s) must provide individuals with the facts
they need to make an informed decision whether to allow release of the
information. We prohibit the use of broad or blanket authorizations
requesting the use or disclosure of protected health information for a
wide range of unspecified purposes. Both the information that is to be
used or disclosed and the specific purpose(s) for such uses or
disclosures must be stated in the authorization.
Authorizations requested by covered entities for their own uses and
disclosures must also advise individuals of certain rights available to
them under this rule. The authorization must state that the individual
may inspect or copy the information to be used or disclosed as provided
in § 164.524 regarding access for inspection and copying and that the
individual may refuse to sign the authorization.
We alter the proposed requirements with respect to authorizations for
which the covered entity will receive financial gain. When the covered
entity initiates the authorization and the covered entity will receive
direct or indirect remuneration from a third party (rather than
financial gain, as proposed) in exchange for using or disclosing the
protected health information, the authorization must include a statement
that such remuneration will result. For example, a health plan may wish
to sell or rent its enrollee mailing list or a pharmaceutical company
may offer a covered provider a discount on its products if the provider
obtains authorization to disclose the demographic information of
patients with certain diagnoses so that the company can market new drugs
to them directly. In each case, the covered entity must obtain the
individual's authorization, and the authorization must include a
statement that the covered entity will receive remuneration.
In § 164.508(d)(2), we continue to require a covered entity that
requests an authorization for its own use or disclosure of protected
health information to provide the individual with a copy of the signed
authorization. While we eliminate from this section the provision
requiring covered entities to obtain authorization for use or disclosure
of the minimum necessary protected health information, § 164.514(d)(4)
requires covered entities to request only the minimum necessary
protected health information to accomplish the purpose for which the
request is made. This requirement applies to these authorizations, as
well as other requests.
**Section 164.508(e) -- Authorizations Requested by a Covered Entity for
Disclosures by Others**
In the proposed rule, we would have prohibited all covered entities from
requiring the individual's written legal permission (as proposed, an
"authorization") for the use or disclosure of protected health
information to carry out treatment, payment, or health care operations.
We generally eliminate this prohibition in the final rule, except to
specify that a consent obtained by one covered entity is not effective
to permit another covered entity to use or disclose protected health
information. See § 164.506(a)(5) and the corresponding preamble
discussion.
In the final rule, if a covered entity seeks the individual's written
legal permission to obtain protected health information about the
individual from another covered entity for any purpose, it must obtain
the individual's authorization for the covered entity that maintains the
protected health information to make the disclosure. If the
authorization is for the purpose of obtaining protected health
information for purposes other than treatment, payment, or health care
operations, the authorization need only contain the core elements
required by § 164.508(c) and described above.
If the authorization, however, is for the purpose of obtaining protected
health information to carry out treatment, payment, or health care
operations, the authorization must meet the requirements of §
164.508(e). We expect such authorizations will rarely be necessary,
because we expect covered entities that maintain protected health
information to obtain consents that permit them to make anticipated uses
and disclosures for these purposes. An authorization obtained by another
covered entity that authorizes the covered entity maintaining the
protected health information to make a disclosure for the same purpose,
therefore, would be unnecessary.
We recognize, however, that these authorizations may be useful to
demonstrate an individual's intent and relationship to the intended
recipient of the information when the intent or relationship is not
already clear. For example, a long term care insurer may need
information from an individual's health care providers about the
individual's ability to perform activities of daily living in order to
determine payment of a long term care claim. The providers that hold the
information may not be providing the long term care and may not,
therefore, be aware of the individual's coverage under the policy or
that the individual is receiving long term care services. An
authorization obtained by the long term care insurer will help to
demonstrate these facts to the providers holding the information, which
will make them more confident that the individual intends for the
information to be shared. Similarly, an insurer with subrogation
obligations may need health information from the enrollee's providers to
assess or prosecute the claim. A patient's new physician may also need
medical records from the patient's prior providers in order to treat the
patient. Without an authorization that demonstrates the patient's intent
for the information to be shared, the covered entity that maintains the
protected health information may be reluctant to provide the
information, even if that covered entity's consent permits such
disclosure to occur.
These authorizations may also be useful to accomplish clinical
coordination and integration among covered entities that do not meet the
definitions of affiliated covered entities or organized health care
arrangements. For example, safety-net providers that participate in the
Community Access Program (CAP) may not qualify as organized health care
arrangements but may want to share protected health information with
each other in order to develop and expand integrated systems of care for
uninsured people. An authorization under this section would permit such
providers to receive protected health information from other CAP
participants to engage in such activities.
Because of such concerns, we permit a covered entity to request the
individual's authorization to obtain protected health information from
another covered entity to carry out treatment, payment, and health care
operations. In these situations, the authorization must contain the core
elements described above and must also describe each purpose of the
requested disclosure.
With one exception, the authorization must also indicate that the
authorization is voluntary. It must state that the individual may refuse
to sign the authorization and that the covered entity requesting the
authorization will not condition the provision of treatment, payment,
enrollment in the health plan, or eligibility for benefits on obtaining
the individual's authorization. If the authorization is for a disclosure
of information that is necessary to determine payment of a claim for
specified benefits, however, the health plan requesting the
authorization may condition the payment of the claim on obtaining the
authorization from the individual. See § 164.508(b)(4)(iii). In this
case, the authorization does not have to state that the health plan will
not condition payment on obtaining the authorization.
The covered entity requesting the authorization must provide the
individual with a copy of the signed authorization. We note that the
covered entity requesting the authorization is also subject to the
requirements in § 164.514 to request only the minimum necessary
information needed for the purpose of the authorization.
We additionally note that, when the covered entity that maintains the
protected health information has already obtained a consent for
disclosure of protected health information to carry out treatment,
payment, and/or health care operations under § 164.506, and that consent
conflicts with an authorization obtained by another covered entity under
§ 164.508(e), the covered entity maintaining the protected health
information is bound by the more restrictive document. See § 164.506(e)
and the corresponding preamble discussion for further explanation.
**Section 164.508(f) -- Authorizations for Uses and Disclosures of
Protected Health Information Created for Research that Includes
Treatment of Individuals**
In the proposed rule, we would have required individual authorization
for any use or disclosure of research information unrelated to
treatment. In the final rule, we eliminate the special rules for this
category of information and, instead, require covered entities to obtain
an authorization for the use or disclosure of protected health
information the covered entity creates for the purpose of research that
includes treatment of individuals, except as otherwise permitted by §
164.512(i).
The intent of this provision is to permit covered entities that conduct
research involving treatment to bind themselves to a more limited scope
of uses and disclosures of research information than they would
otherwise be permitted to make with non-research information. Rather
than creating a single definition of "research information," we allow
covered entities the flexibility to define that subset of protected
health information they create during clinical research that is not
necessary for treatment, payment, or health care operations and that the
covered entity will use or disclose under more limited circumstances
than it uses or discloses other protected health information. In
designing their authorizations, we expect covered entities to be mindful
of the often highly sensitive nature of research information and the
impact of individuals' privacy concerns on their willingness to
participate in research.
Covered entities seeking authorization to use or disclose protected
health information they create for the purpose of research that includes
treatment of individuals, including clinical trials, must include in the
authorization (in addition to the applicable elements required above) a
description of the extent to which some or all of the protected health
information created for the research will also be used or disclosed for
purposes of treatment, payment, and health care operations. For example,
if the covered entity intends to seek reimbursement from the
individual's health plan for the routine costs of care associated with
the research protocol, it must explain in the authorization the types of
information that it will provide to the health plan for this purpose.
This information, and the circumstances under which disclosures will be
made for treatment, payment, and health care operations, may be more
limited than the information and circumstances described in the covered
entity's general consent and notice of privacy practices. To the extent
the covered entity limits itself to a subset of uses or disclosures that
are otherwise permissible under the rule and the covered entity's
consent and notice, the covered entity is bound by the statements made
in the research-related authorization. In these circumstances, the
authorization must indicate that the authorization, not the general
consent and notice, controls.
If the covered entity's primary interaction with the individual is
through the research, the covered entity may combine the general consent
for treatment, payment, and health care operations required under §
164.506 with this research authorization and need not obtain an
additional consent under § 164.506. If the entity has already obtained,
or intends to obtain, a separate consent as required under § 164.506,
the research authorization must refer to that consent and state that the
practices described in the research-related authorization are binding on
the covered entity as to the information covered by the research-related
authorization. The research-related authorization may also be combined
in the same document as the informed consent for participation in the
research. This is an exception to the general rule in § 164.508(b)(3)
that an authorization under this section may not be combined with any
other document (see above).
The covered entity must also include in the authorization a description
of the extent to which it will not use or disclose the protected health
information it obtains in connection with the research protocol for
purposes that are permitted without individual authorization under this
rule (under §§ 164.510 and 164.512). To the extent that the entity
limits itself to a subset of uses or disclosures that are otherwise
permissible under the rule and the entity's notice, the entity is bound
by the statements made in the research authorization. In these
circumstances, the authorization must indicate that the authorization,
not the notice, controls. The covered entity may not, however, purport
to preclude itself from making uses or disclosures that are required by
law or that are necessary to avert a serious and imminent threat to
health or safety.
In some instances, the covered entity may wish to make a use or
disclosure of the research information that it did not include in its
general consent or notice or for which authorization is required under
this rule. To the extent the entity includes uses or disclosures in the
research authorization that are otherwise not permissible under the rule
and the entity's consent and notice of information practices, the entity
must include all of the elements required by §§ 164.508(c) and (d) in
the research-related authorization. The covered entity is bound by these
statements.
Research that involves the delivery of treatment to participants
sometimes relies on existing health information, such as to determine
eligibility for the trial. We note that under § 164.508(b)(3)(iii), the
covered entity may combine the research-related authorization required
under § 164.508(f) with any other authorization for the use or
disclosure of protected health information (other than psychotherapy
notes), provided that the covered entity does not condition the
provision of treatment on the individual signing the authorization. For
example, a covered health care provider that had a treatment
relationship with an individual prior to the individual\'s enrollment in
a clinical trial, but that is now providing research-related treatment
to the individual, may elect to request a compound authorization from
the individual: an authorization under § 164.508(d) for the provider to
use the protected health information it created prior to the initiation
of the research that involves treatment, combined with an authorization
under § 164.508(f) regarding use and disclosure of protected health
information the covered provider will create for the purpose of the
clinical trial. This compound authorization would be valid, provided the
covered provider did not condition the research-related treatment on
obtaining the authorization required under § 164.508(f), as permitted in
§ 164.508(b)(4)(i).
However, we anticipate that covered entities will almost always, if not
always, condition the provision of research-related treatment on the
individual signing the authorization under § 164.508(f) for the covered
entity's use or disclosure of protected health information created for
the research. Therefore, we expect that the vast majority of covered
providers who wish to use or disclose protected health information about
an individual that will be created for research that includes treatment
and wish to use existing protected health information about that
individual for the research that includes treatment, will be required to
obtain two authorizations from the individual: (1) an authorization for
the use and disclosure of protected health information to be created for
the research that involves treatment of the individual (as required
under § 164.508(f)), and (2) an authorization for the use of existing
protected health information for the research that includes treatment of
the individual (as required under § 164.508(d)).
***Effect of Authorization***
As noted in the discussion about consents in the preamble to § 164.506,
authorizations under this rule should not be construed to waive,
directly or indirectly, any privilege granted under federal, state, or
local laws or procedures.
**SECTION 164.510---USES AND DISCLOSURES REQUIRING AN OPPORTUNITY FOR
THE INDIVIDUAL TO AGREE OR TO OBJECT**
**Introduction**
Section 164.510 of the NPRM proposed the uses and disclosures of
protected health information that covered entities could make for
purposes other than treatment, payment, or health care operations and
for which an individual authorization would not have been required.
These allowable uses and disclosures were designed to permit and promote
key national health care priorities, and to promote the smooth operation
of the health care system. In each of these areas, the proposal
permitted, but would not have required, covered entities to use or
disclose protected health information.
We proposed to require covered entities to obtain the individual's oral
agreement before making a disclosure to a health care facility's
directory or to the individual's next-of-kin or to another person
involved in the individual's health care. Because there is an
expectation in these two areas that individuals will have some input
into a covered entity's decision to use or disclose protected health
information, we decided to place disclosures to health facility
directories and to persons involved in an individual's care in a
separate section. In the final rule, requirements regarding disclosure
of protected health information for facility directories and to others
involved in an individual's care are included in § 164.510(a) and §
164.510(b), respectively. In the final rule, we include in § 164.510(b)
provisions to address a type of disclosure not addressed in the NPRM:
disclosures to entities providing relief and assistance in disasters
such as floods, fires, and terrorist attacks. Requirements for most of
the remaining categories of disclosures addressed in proposed § 164.510
of the NPRM are included in a new § 164.512 of the final rule, as
discussed below.
Section 164.510 of the final rule addresses situations in which the
interaction between the covered entity and the individual is relatively
informal and agreements are made orally, without written authorizations
for use or disclosure. In general, under the final rule, to disclose or
use protected health information for these purposes, covered entities
must inform individuals in advance and must provide a meaningful
opportunity for the individual to prevent or restrict the disclosure. In
exceptional circumstances, where even this informal discussion cannot
practicably take place, covered entities are permitted to make decisions
regarding disclosure or use based on the exercise of professional
judgment of what is in the individual's best interest.
**Section 164.510(a)---Use and Disclosure for Facility Directories**
The NPRM proposed to allow covered health care providers to disclose
through an inpatient facility's directory a patient's name, location in
the facility, and general health condition, provided that the individual
had agreed to the disclosure. The NPRM would have allowed this agreement
to be oral. Pursuant to the NPRM, when making decisions about
incapacitated individuals, a covered health care provider could have
disclosed such information at the entity's discretion and consistent
with good medical practice and any prior expressions of patient
preference of which the covered entity was aware.
The preamble to the NPRM listed several factors that we encouraged
covered entities to take into account when making decisions about
whether to include an incapacitated patient's information in the
directory. These factors included: (1) whether disclosing that an
individual is in the facility could reasonably cause harm or danger to
the individual (e.g., if it appeared that an unconscious patient had
been abused and disclosing the information could give the attacker
sufficient information to seek out the person and repeat the abuse); (2)
whether disclosing a patient's location within a facility implicitly
would give information about the patient's condition (e.g., whether a
patient's room number revealed that he or she was in a psychiatric
ward); (3) whether it was necessary or appropriate to give information
about patient status to family or friends (e.g., if giving information
to a family member about an unconscious patient could help a physician
administer appropriate medications); and (4) whether an individual had,
prior to becoming incapacitated, expressed a preference not to be
included in the directory. The preamble stated that if a covered entity
learned of such a preference, it would be required to act in accordance
with the preference.
The preamble to the NPRM said that when individuals entered a facility
in an incapacitated state and subsequently gained the ability to make
their own decisions, health facilities should ask them within a
reasonable time period for permission to include their information in
the facility's directory.
In the final rule, we change the NPRM's opt-in authorization requirement
to an opt-out approach for inclusion of patient information in a health
care facility's directory. The final rule allows covered health care
providers -- which in this case are health care facilities -- to include
patient information in their directory only if: (1) they inform incoming
patients of their policies regarding the directory; (2) they give
patients a meaningful opportunity to opt out of the directory listing or
to restrict some or all of the uses and disclosures that can be included
in the directory; and (3) the patient does not object to being included
in the directory. A patient must be allowed, for example, to have his or
her name and condition included in the directory while not having his or
her religious affiliation included. The facility's notice and the
individual's opt-out or restriction may be oral.
Under the final rule, subject to the individual's right to object, or
known prior expressed preferences, a covered health care provider may
disclose the following information to persons who inquire about the
individual by name: (1) the individual's general condition in terms that
do not communicate specific medical information about the individual
(e.g., fair, critical, stable, etc.); and (2) location in the facility.
This approach represents a slight change to the NPRM, which did not
require members of the general public to ask for a patient by name in
order to obtain directory information and which, in fact, would have
allowed covered entities to disclose the individual's name as part of
directory information.
Under the final rule, we also establish provisions for disclosure of
directory information to clergy that are slightly different from those
which apply for disclosure to the general public. Subject to the
individual's right to object or restrict the disclosure, the final rule
permits a covered entity to disclose to a member of the clergy: (1) the
individual's name; (2) the individual's general condition in terms that
do not communicate specific medical information about the individual;
(3) the individual's location in the facility; and (4) the individual's
religious affiliation. A disclosure of directory information may be made
to members of the clergy even if they do not inquire about an individual
by name. We note that the rule in no way requires a covered health care
provider to inquire about the religious affiliation of an individual,
nor must individuals supply that information to the facility.
Individuals are free to determine whether they want their religious
affiliation disclosed to clergy through facility directories.
We believe that allowing clergy to access patient information pursuant
to this section does not violate the Establishment Clause of the First
Amendment, which prohibits laws "respecting an establishment of
religion." Courts traditionally turn to the *Lemon* test when evaluating
laws that might raise Establishment Clause concerns. A law does not
violate the Clause if it has a secular purpose, is not primarily to
advance religion, and does not cause excessive government entanglement
with religion. The privacy regulation passes this test because its
purpose is to protect the privacy of individuals -- regardless of their
religious affiliation -- and it does not cause excessive government
entanglement.
More specifically, although this section provides a special rule for
members of the clergy, it does so as an accommodation to patients who
seek to engage in religious conduct. For example, restricting the
disclosure of an individual's religious affiliation, room number, and
health status to a priest could cause significant delay that would
inhibit the ability of a Catholic patient to obtain sacraments provided
during the last rites. We believe this accommodation does not violate
the Establishment Clause, because it avoids a government-imposed
restriction on the disclosure of information that could
disproportionately affect the practice of religion. In that way, it is
no different from accommodations upheld by the U.S. Supreme Court, such
as exceptions to laws banning the use of alcohol in religious
ceremonies.
The final rule expands the circumstances under which health care
facilities can disclose specified health information to the patient
directory without the patient's agreement. Besides allowing such
disclosures when patients are incapacitated, as the NPRM would have
allowed, the final rule allows such disclosures in emergency treatment
circumstances. For example, when a patient is conscious and capable of
making a decision, but is so seriously injured that asking permission to
include his or her information in the directory would delay treatment
such that the patient's health would be jeopardized, health facilities
can make decisions about including the patient's information in the
directory according to the same rules that apply when the patient is
incapacitated. The final rule modifies the NPRM requirements for cases
in which an incapacitated patient is admitted to a health care facility.
Whereas the NPRM would have allowed health care providers to disclose an
incapacitated patient's information to the facility's directory "at its
discretion and consistent with good medical practice and any prior
expressions of preference of which the covered entity \[was\] aware,"
the final rule states that in these situations (and in other emergency
treatment circumstances), covered health care providers must make the
decision on whether to include the patient's information in the
facility's directory in accordance with professional judgment as to the
patient's best interest. In addition, when making decisions involving
incapacitated patients and patients in emergency situations, covered
health care providers may decide to include some portions of the
patient's information (such as name) but not other information (such as
location in the facility) in order to protect patient interests.
As in the preamble to the NPRM, we encourage covered health care
providers to take into account the four factors listed above when making
decisions about whether to include patient information in a health care
facility's directory when patients are incapacitated or are in an
emergency treatment circumstance. In addition, we retain the requirement
stated in the preamble of the NPRM that if a covered health care
provider learns of an incapacitated patient's prior expression of
preference not to be included in a facility's directory, the facility
must not include the patient's information in the directory. For cases
involving patients admitted to a health care facility in an
incapacitated or emergency treatment circumstance who during the course
of their stay become capable of decisionmaking, the final rule takes an
approach similar to that described in the NPRM. The final rule states
that when an individual who was incapacitated or in an emergency
treatment circumstance upon admission to an inpatient facility and whose
condition stabilizes such that he or she is capable of decisionmaking, a
covered health care provider must, when it becomes practicable, inform
the individual about its policies regarding the facility's directory and
provide the opportunity to object to the use or disclosure of protected
health information about themselves for the directory.
**Section 164.510(b)---Uses and Disclosures for Involvement in the
Individual's Care and Notification Purposes**
In cases involving an individual with the capacity to make health care
decisions, the NPRM would have allowed covered entities to disclose
protected health information about the individual to a next-of-kin, to
other family members, or to close personal friends of the individual if
the individual had agreed orally to such disclosure. If such agreement
could not practicably or reasonably be obtained (e.g., when the
individual was incapacitated), the NPRM would have allowed disclosure of
protected health information that was directly relevant to the person's
involvement in the individual's health care, consistent with good health
professional practices and ethics. The NPRM defined next-of-kin as
defined under state law.
Under the final rule, we specify that covered entities may disclose to a
person involved in the current health care of the individual (such as a
family member, other relative, close personal friend, or any other
person identified by the individual) protected health information
directly related to the person's involvement in the current health care
of an individual or payment related to the individual's health care.
Such persons involved in care and other contact persons might include,
for example: blood relatives; spouses; roommates; boyfriends and
girlfriends; domestic partners; neighbors; and colleagues. Inclusion of
this list is intended to be illustrative only, and it is not intended to
change current practices with respect to: (1) involvement of other
persons in individuals' treatment decisions; (2) informal
information-sharing among individuals involved in a person's care; or
(3) sharing of protected health information to contact persons during a
disaster. The final rule also includes new language stating that covered
entities may use or disclose protected health information to notify or
assist in notification of family members, personal representatives, or
other persons responsible for an individual's care with respect to an
individual's location, condition, or death. These provisions allow, for
example, covered entities to notify a patient's adult child that his
father has suffered a stroke and to tell the person that the father is
in the hospital's intensive care unit.
The final rule includes separate provisions for situations in which the
individual is present and for when the individual is not present at the
time of disclosure. When the individual is present and has the capacity
to make his or her own decisions, a covered entity may disclose
protected health information only if the covered entity: (1) obtains the
individual's agreement to disclose to the third parties involved in
their care; (2) provides the individual with an opportunity to object to
such disclosure and the individual does not express an objection; or (3)
reasonably infers from the circumstances, based on the exercise of
professional judgment, that the individual does not object to the
disclosure. Situations in which covered providers may infer an
individual's agreement to disclose protected health information pursuant
to option (3) include, for example, when a patient brings a spouse into
the doctor's office when treatment is being discussed, and when a
colleague or friend has brought the individual to the emergency room for
treatment.
We proposed that when a covered entity could not practicably obtain oral
agreement to disclose protected health information to next-of-kin,
relatives, or those with a close personal relationship to the
individual, the covered entity could make such disclosures consistent
with good health professional practice and ethics. In such instances, we
proposed that covered entities could disclose only the minimum
information necessary for the friend or relative to provide the
assistance he or she was providing. For example, health care providers
could not disclose to a friend or relative simply driving a patient home
from the hospital extensive information about the patient's surgery or
past medical history when the friend or relative had no need for this
information.
The final rule takes a similar approach. Under the final rule, when an
individual is not present (for example, when a friend of a patient seeks
to pick up the patient's prescription at a pharmacy) or when the
opportunity to agree or object to the use or disclosure cannot
practicably be provided due to the individual's incapacity or an
emergency circumstance, covered entities may, in the exercise of
professional judgment, determine whether the disclosure is in the
individual's best interests and if so, disclose only the protected
health information that is directly relevant to the person's involvement
with the individual's health care. For example, this provision allows
covered entities to inform relatives or others involved in a patient's
care, such as the person who accompanied the individual to the emergency
room, that a patient has suffered a heart attack and to provide updates
on the patient's progress and prognosis when the patient is
incapacitated and unable to make decisions about such disclosures. In
addition, this section allows covered entities to disclose functional
information to individuals assisting in a patient's care; for example,
it allows hospital staff to give information about a person's mobility
limitations to a friend driving the patient home from the hospital. It
also allows covered entities to use professional judgment and experience
with common practice to make reasonable inferences of the individual's
best interest in allowing a person to act on an individual's behalf to
pick up filled prescriptions, medical supplies, X-rays, or other similar
forms of protected health information. Thus, under this provision,
pharmacists may release a prescription to a patient's friend who is
picking up the prescription for him or her. Section 164.510(b) is not
intended to disrupt most covered entities' current practices or state
law with respect to these types of disclosures.
This provision is intended to allow disclosures directly related to a
patient's current condition and should not be construed to allow, for
example, disclosure of extensive information about the patient's medical
history that is not relevant to the patient's current condition and that
could prove embarrassing to the patient. In addition, if a covered
entity suspects that an incapacitated patient is a victim of domestic
violence and that a person seeking information about the patient may
have abused the patient, covered entities should not disclose
information to the suspected abuser if there is reason to believe that
such a disclosure could cause the patient serious harm. In all of these
situations regarding possible disclosures of protected health
information about an patient who is not present or is unable to agree to
such disclosures due to incapacity or other emergency circumstance,
disclosures should be in accordance with the exercise of professional
judgment as to the patient's best interest.
This section is not intended to provide a loophole for avoiding the
rule's other requirements, and it is not intended to allow disclosures
to a broad range of individuals, such as journalists who may be curious
about a celebrity's health status. Rather, it should be construed
narrowly, to allow disclosures to those with the closest relationships
with the patient, such as family members, in circumstances when a
patient is unable to agree to disclosure of his or her protected health
information. Furthermore, when a covered entity cannot practicably
obtain an individual's agreement before disclosing protected health
information to a relative or to a person involved in the individual's
care and is making decisions about such disclosures consistent with the
exercise of professional judgment regarding the individual's best
interest, covered entities must take into account whether such a
disclosure is likely to put the individual at risk of serious harm.
Like the NPRM, the final rule does not require covered entities to
verify the identity of relatives or other individuals involved in the
individual's care. Rather, the individual's act of involving the other
persons in his or her care suffices as verification of their identity.
For example, the fact that a person brings a family member into the
doctor's office when treatment information will be discussed constitutes
verification of the involved person's identity for purposes of this
rule. Likewise, the fact that a friend arrives at a pharmacy and asks to
pick up a specific prescription for an individual effectively verifies
that the friend is involved in the individual's care, and the rule
allows the pharmacist to give the filled prescription to the friend.
We also clarify that the final rule does not allow covered entities to
assume that an individual's agreement at one point in time to disclose
protected health information to a relative or to another person
assisting in the individual's care implies agreement to disclose
protected health information indefinitely in the future. We encourage
the exercise of professional judgment in determining the scope of the
person's involvement in the individual's care and the time period for
which the individual is agreeing to the other person's involvement. For
example, if a friend simply picks up a patient from the hospital but has
played no other role in the individual's care, hospital staff should not
call the friend to disclose lab test results a month after the initial
encounter with the friend. However, if a patient routinely brings a
spouse into the doctor's office when treatment is discussed, a physician
can infer that the spouse is playing a long-term role in the patient's
care, and the rule allows disclosure of protected health information to
the spouse consistent with his or her role in the patient's care, for
example, discussion of treatment options.
The NPRM did not specifically address situations in which disaster
relief organizations may seek to obtain protected health information
from covered entities to help coordinate the individual's care, or to
notify family or friends of an individual's location or general
condition in a disaster situation. In the final rule, we account for
disaster situations in this paragraph. Specifically, we allow covered
entities to use or disclose protected health information without
individual agreement to federal, state, or local government agencies
engaged in disaster relief activities, as well as to private disaster
relief or disaster assistance organizations (such as the Red Cross)
authorized by law or by their charters to assist in disaster relief
efforts, to allow these organizations to carry out their
responsibilities in a specific disaster situation. Covered entities may
make these disclosures to disaster relief organizations, for example, so
that these organizations can help family members, friends, or others
involved in the individual's care to locate individuals affected by a
disaster and to inform them of the individual's general health
condition. This provision also allows disclosure of information to
disaster relief or disaster assistance organizations so that these
organizations can help individuals obtain needed medical care for
injuries or other health conditions caused by a disaster.
We encourage disaster relief organizations to protect the privacy of
individual health information to the extent practicable in a disaster
situation. However, we recognize that the nature of disaster situations
often makes it impossible or impracticable for disaster relief
organizations and covered entities to seek individual agreement or
authorization before disclosing protected health information necessary
for providing disaster relief. Thus, we note that we do not intend to
impede disaster relief organizations in their critical mission to save
lives and reunite loved ones and friends in disaster situations.
**SECTION 164.512---USES AND DISCLOSURES FOR WHICH CONSENT, AN
AUTHORIZATION, OR OPPORTUNITY TO AGREE OR OBJECT IS NOT REQUIRED**
**Introduction**
The final rule's requirements regarding disclosures for directory
information and to family members or others involved in an individual's
care are in a section separate from that covering disclosures allowed
for other national priority purposes. In the final rule, we place most
of the other disclosures for national priority purposes in a new §
164.512.
As in the NPRM, in § 164.512 of the final rule, we allow covered
entities to make these national priority uses and disclosures without
individual authorization. As in the NPRM, these uses and disclosures are
discretionary. Covered entities are free to decide whether or not to use
or disclose protected health information for any or all of the permitted
categories. However, as in the NPRM, nothing in the final rule provides
authority for a covered entity to restrict or refuse to make a use or
disclosure mandated by other law.
The new § 164.512 includes paragraphs on: uses and disclosures required
by law; uses and disclosures for public health activities; disclosures
about victims of abuse, neglect, or domestic violence; uses and
disclosures for health oversight activities; disclosures for judicial
and administrative proceedings; disclosures for law enforcement
purposes; uses and disclosures about decedents; uses and disclosures for
cadaveric donation of organs, eyes, or tissues; uses and disclosures for
research purposes; uses and disclosures to avert a serious threat to
health or safety (which we had called "emergency circumstances" in the
NPRM); uses and disclosures for specialized government functions
(referred to as "specialized classes" in the NPRM); and disclosures to
comply with workers' compensation laws.
Section 164.512(c) in the final rule, which addresses uses and
disclosures regarding adult victims of abuse, neglect and domestic
violence, is new, although it incorporates some provisions from proposed
§ 164.510 of the NPRM. In the final rule we also eliminate proposed §
164.510(g) on government health data systems and proposed § 164.510(i)
on banking and payment processes. These changes are discussed below.
***Approach to Use of Protected Health Information***
Proposed § 164.510 of the NPRM included specific subparagraphs
addressing uses of protected health information by covered entities that
were also public health agencies, health oversight agencies, government
entities conducting judicial or administrative proceedings, or
government heath data systems. Such covered entities could use protected
health information in all instances for which they could disclose the
information for these purposes. In the final rule, as discussed below,
we retain this language in the paragraphs on public health activities
and health oversight. However, we eliminate this clause with respect to
uses of protected health information for judicial and administrative
proceedings, because we no longer believe that there would be any
situations in which a covered entity would also be a judicial or
administrative tribunal. Proposed § 164.510(e) of the NPRM, regarding
disclosure of protected health information to coroners, did not include
such a provision. In the final rule we have added it because we believe
there are situations in which a covered entity, for example, a public
hospital conducting post-mortem investigations, may need to use
protected health information for the same purposes for which it would
have disclosed the information to a coroner.
While the right to request restrictions under § 164.522 and the consents
required under § 164.506 do not apply to the use and disclosure of
protected health information under § 164.512, we do not intend to
preempt any state or other restrictions, or any right to enforce such
agreements or consents under other law.
We note that a covered entity may use or disclose protected health
information as permitted by and in accordance with one of the paragraphs
of § 164.512, regardless of whether that use or disclosure fails to meet
the requirements for use or disclosure under a different paragraph in §
164.512 or elsewhere in the rule.
***Verification for Disclosures under § 164.512***
In § 164.510(a) of the NPRM, we proposed that covered entities verify
the identity and authority of persons to whom they made disclosure under
the section. In the final rule, we generally have retained the proposed
requirements. Verification requirements are discussed in § 164.514 of
the final rule.
**Section 164.512(a)---Uses and Disclosures Required by Law**
In the NPRM we would have allowed covered entities to use or disclose
protected health information without individual authorization where such
use or disclosure was required by other law, as long as the use or
disclosure met all relevant requirements of such law. However, a legally
mandated use or disclosure which fell into one or more of the national
priority purposes expressly identified in proposed § 164.510 of the NPRM
would have been subject to the terms and conditions specified by the
applicable paragraph of proposed § 164.510. Thus, a disclosure required
by law would have been allowed only to the extent it was not otherwise
prohibited or restricted by another provision in proposed § 164.510. For
example, mandatory reporting to law enforcement officials would not have
been allowed unless such disclosures conformed to the requirements of
proposed § 164.510(f) of the NPRM, on uses and disclosures for law
enforcement purposes. As explained in the NPRM, this provision was not
intended to obstruct access to information deemed important enough by
federal, state or other government authorities to require it by law.
In § 164.512(a) of the final rule, we retain the proposed approach, and
we permit covered entities to comply with laws requiring the use or
disclosure of protected health information, provided the use or
disclosure meets and is limited to the relevant requirements of such
other laws. To more clearly address where the substantive and procedural
requirements of other provisions in this section apply, we have deleted
the general sentence from the NPRM which stated that the provision "does
not apply to uses or disclosures that are covered by paragraphs (b)
through (m)" of proposed § 164.510. Instead, in § 164.512 (a)(2) we list
the specific paragraphs that have additional requirements with which
covered entities must comply. They are disclosures about victims of
abuse, neglect or domestic violence (§ 164.512(c)), for judicial and
administrative proceedings (§ 164.512(e)), and for law enforcement
purposes (§ 164.512(f)). We include a new definition of "required by
law." See § 164.501. We clarify that the requirements provided for in §
164.514(h) relating to verification apply to disclosures under this
paragraph. Those provisions require covered entities to verify the
identity and authority of persons to whom they make disclosures. We note
that the minimum necessary requirements of § 164.514(d) do not apply to
disclosures made under this paragraph.
We note that this rule does not affect what is required by other law,
nor does it compel a covered entity to make a use or disclosure of
protected health information required by the legal demands or reporting
requirements listed in the definition of "required by law." Covered
entities will not be sanctioned under this rule for responding in good
faith to such legal process and reporting requirements. However, nothing
in this rule affects, either by expanding or contracting, a covered
entity's right to challenge such process or reporting requirements under
other laws. The only disclosures of protected health information
compelled by this rule are disclosures to an individual (or the personal
representative of an individual) or to the Secretary for the purposes of
enforcing this rule.
Uses and disclosures permitted under this paragraph must be limited to
the protected health information necessary to meet the requirements of
the law that compels the use or disclosure. For example, disclosures
pursuant to an administrative subpoena are limited to the protected
health information authorized to be disclosed on the face of the
subpoena.
**Section 164.512(b)---Uses and Disclosures for Public Health
Activities**
The NPRM would have allowed covered entities to disclose protected
health information without individual authorization to: (1) a public
health authority authorized by law to collect or receive such
information for the purpose of preventing or controlling disease,
injury, or disability, including, but not limited to, the reporting of
disease, injury, vital events such as birth or death, and the conduct of
public health surveillance, public health investigations, and public
health interventions; (2) a public health authority or other appropriate
authority authorized by law to receive reports of child abuse or
neglect; (3) a person or entity other than a governmental authority that
could demonstrate or demonstrated that it was acting to comply with
requirements or direction of a public health authority; or (4) a person
who may have been exposed to a communicable disease or may otherwise be
at risk of contracting or spreading a disease or condition and was
authorized by law to be notified as necessary in the conduct of a public
health intervention or investigation.
In the final rule, we broaden the scope of permissible disclosures
pursuant to item (1) listed above. We narrow the scope of disclosures
permissible under item (3) of this list, and we add language to clarify
the scope of permissible disclosures with respect to item (4) on the
list. We broaden the scope of allowable disclosures regarding item (1)
by allowing covered entities to disclose protected health information
not only to U.S. public health authorities but also, at the direction of
a public health authority, to an official of a foreign government agency
that is acting in collaboration with a public health authority. For
example, we allow covered entities to disclose protected health
information to a foreign government agency that is collaborating with
the Centers for Disease Control and Prevention to limit the spread of
infectious disease.
We narrow the conditions under which covered entities may disclose
protected health information to non-government entities. We allow
covered entities to disclose protected health information to a person
subject to the FDA's jurisdiction, for the following activities: to
report adverse events (or similar reports with respect to food or
dietary supplements), product defects or problems, or biological product
deviations, if the disclosure is made to the person required or directed
to report such information to the FDA; to track products if the
disclosure is made to a person required or directed by the FDA to track
the product; to enable product recalls, repairs, or replacement,
including locating and notifying individuals who have received products
regarding product recalls, withdrawals, or other problems; or to conduct
post-marketing surveillance to comply with requirements or at the
direction of the FDA.
The terms included in § 164.512(b)(iii) are intended to have both their
commonly understood meanings, as well as any specialized meanings,
pursuant to the Food, Drug, and Cosmetic Act (21 U.S.C. 321 et seq.) or
the Public Health Service Act (42 U.S.C. 201 et seq.). For example,
"post-marketing surveillance" is intended to mean activities related to
determining the safety or effectiveness of a product after it has been
approved and is in commercial distribution, as well as certain Phase IV
(post-approval) commitments by pharmaceutical companies. With respect to
devices, "post-marketing surveillance" can be construed to refer to
requirements of section 522 of the Food, Drug, and Cosmetic Act
regarding certain implanted, life-sustaining, or life-supporting
devices. The term "track" includes, for example, tracking devices under
section 519(e) of the Food, Drug, and Cosmetic Act, units of blood or
other blood products, as well as trace-backs of contaminated food.
In § 164.512(b)(iii), the term "required" refers to requirements in
statute, regulation, order, or other legally binding authority exercised
by the FDA. The term "directed," as used in this section, includes other
official agency communications such as guidance documents.
We note that under this provision, a covered entity may disclose
protected health information to a non-governmental organization without
individual authorization for inclusion in a private data base or
registry only if the disclosure is otherwise for one of the purposes
described in this provision (e.g., for tracking products pursuant to FDA
direction or requirements, for post-marketing surveillance to comply
with FDA requirements or direction.)
To make a disclosure that is not for one of these activities, covered
entities must obtain individual authorization or must meet the
requirements of another provision of this rule. For example, covered
entities may disclose protected health information to employers for
inclusion in a workplace surveillance database only: with individual
authorization; if the disclosure is required by law; if the disclosure
meets the requirements of § 164.512(b)(v); or if the disclosure meets
the conditions of another provision of this regulation, such as §
154.512(i) relating to research. Similarly, if a pharmaceutical company
seeks to create a registry containing protected health information about
individuals who had taken a drug that the pharmaceutical company had
developed, covered entities may disclose protected health information
without authorization to the pharmaceutical company pursuant to FDA
requirements or direction. If the pharmaceutical company's registry is
not for any of these purposes, covered entities may disclose protected
health information to it only with patient authorization, if required by
law, or if disclosure meets the conditions of another provision of this
rule.
The final rule continues to permit covered entities to disclose
protected health information without individual authorization directly
to public health authorities, such as the Food and Drug Administration,
the Occupational Safety and Health Administration, the Centers for
Disease Control and Prevention, as well as state and local public health
departments, for public health purposes as specified in the NPRM.
The final rule retains the NPRM provision allowing covered entities to
disclose protected health information to public health authorities or
other appropriate government authorities authorized by law to receive
reports of child abuse or neglect. In addition, we clarify the NPRM's
provision regarding disclosure of protected health information to
persons who may have been exposed to a communicable disease or who may
otherwise be at risk of contracting or spreading a disease or condition.
Under the final rule, covered entities may disclose protected health
information to such individuals when the covered entity or public health
authority is authorized by law to notify these individuals as necessary
in the conduct of a public health intervention or investigation.
In addition, as in the NPRM, under the final rule, a covered entity that
is acting as a public health authority -- for example, a public hospital
conducting infectious disease surveillance in its role as an arm of the
public health department -- may use protected health information in all
cases for which it is allowed to disclose such information for public
health activities as described above.
The proposed rule did not contain a specific provision relating to
disclosures by covered health care providers to employers concerning
work-related injuries or illnesses or workplace medical surveillance.
Under the proposed rule, a covered entity would have been permitted to
disclose protected health information without individual authorization
for public health purposes to private person if the person could
demonstrate that it was acting to comply with requirements or at the
direction of a public health authority.
As discussed above, in the final rule we narrow the scope of this
paragraph as it applies to disclosures to persons other than public
health authorities. To ensure that covered health care providers may
make disclosures of protected health information without individual
authorization to employers when appropriate under federal and state laws
addressing work-related injuries and illnesses or workplace medical
surveillance, we include a new provision in the final rule. The
provision permits covered health care providers who provide health care
as a workforce member of or at the request of an employer to disclose to
that employer protected health information concerning work-related
injuries or illnesses or workplace medical surveillance in situations
where the employer has a duty under the Occupational Safety and Health
Act, the Federal Mine Safety and Health Act, or under a similar state
law, to keep records on or act on such information. For example, OSHA
regulations in 29 CFR Part 1904 require employers to record work-related
injuries and illnesses if medical treatment is necessary; MSHA
regulations at 30 CFR Part 50 require mine operators to report injuries
and illnesses experienced by miners. Similarly, OSHA rules require
employers to monitor employees' exposure to certain substances and to
remove employees from exposure when toxic thresholds have been met. To
obtain the relevant health information necessary to determine whether an
injury or illness should be recorded, or whether an employee must be
medically removed from exposure at work, employers must refer employees
to health care providers for examination and testing.
OSHA and MSHA rules do not impose duties directly upon health care
providers to disclose health information pertaining to recordkeeping and
medical monitoring requirements to employers. Rather, these rules
operate on the presumption that health care providers who provide
services at the request of an employer will be able to disclose to the
employer work-related health information necessary for the employer to
fulfill its compliance obligations. This new provision permits covered
entities to make disclosures necessary for the effective functioning of
OSHA and MSHA requirements, or those of similar state laws, by
permitting a health care provider to make disclosures without the
authorization of the individual concerning work-related injuries or
illnesses or workplace medical surveillance in situations where the
employer has a duty under OSHA and MSHA requirements, or under a similar
state laws, to keep records on or act on such information.
We require health care providers who make disclosures to employers under
this provision to provide notice to individuals that it discloses
protected health information to employers relating to the medical
surveillance of the workplace and work‑related illnesses and injuries.
The notice required under this provision is separate from the notice
required under § 164.520. The notice required under this provision may
be met giving a copy of the notice to the individual at the time it
provides the health care services, or, if the health care services are
provided on the work site of the employer, by posting the notice in a
prominent place at the location where the health care services are
provided.
This provision applies only when a covered health care provider provides
health care services as a workforce member of or at the request of an
employer and for the purposes discussed above. The provision does not
affect the application of this rule to other health care provided to
individuals or to their relationship with health care providers that
they select.
**Section 164.512(c)---Disclosures about Victims of Abuse, Neglect or
Domestic Violence**
The NPRM included two provisions related to disclosures about persons
who are victims of abuse. In the NPRM, we would have allowed covered
entities to report child abuse to a public health authority or other
appropriate authority authorized by law to receive reports of child
abuse or neglect. In addition, under proposed § 164.510(f)(3) of the
NPRM, we would have allowed covered entities to disclose protected
health information about a victim of a crime, abuse or other harm to a
law enforcement official under certain circumstances. The NPRM
recognized that most, if not all, states had laws that mandated
reporting of child abuse or neglect to the appropriate authorities.
Moreover, HIPAA expressly carved out state laws on child abuse and
neglect from preemption or any other interference. The NPRM further
acknowledged that most, but not all, states had laws mandating the
reporting of abuse, neglect or exploitation of the elderly or other
vulnerable adults. We did not intend to impede reporting in compliance
with these laws.
The final rule includes a new paragraph, § 164.512(c), which allows
covered entities to report protected health information to specified
authorities in abuse situations other than those involving child abuse
and neglect. In the final rule, disclosures of protected health
information related to child abuse continues to be addressed in the
paragraph allowing disclosure for public health activities (§
164.512(b)), as described above. Because HIPAA addresses child abuse
specifically in connection with a state's public health activities, we
believe it would not be appropriate to include child abuse-related
disclosures in this separate paragraph on abuse. State laws continue to
apply with respect to child abuse, and the final rule does not in any
way interfere with a covered entity's ability to comply with these laws.
In the final rule, we address disclosures about other victims of abuse,
neglect and domestic violence in § 164.512(c) rather than in the law
enforcement paragraph. Section 164.512(c) establishes conditions for
disclosure of protected health information in cases involving domestic
violence other than child abuse (e.g., spousal abuse), as well as those
involving abuse or neglect (e.g., abuse of nursing home residents or
residents of facilities for the mentally retarded). This paragraph
addresses reports to law enforcement as well as to other authorized
public officials. The provisions of this paragraph supersede the
provisions of § 164.512(a) and § 164.512(f)(1)(i) to the extent that
those provisions address the subject matter of this paragraph.
Under the circumstances described below, the final rule allows covered
entities to disclose protected health information about an individual
whom the covered entity reasonably believes to be a victim of abuse,
neglect, or domestic violence. In this paragraph, references to
"individual" should be construed to mean the individual believed to be
the victim. The rule allows such disclosure to any governmental
authority authorized by law to receive reports of such abuse, neglect,
or domestic violence. These entities may include, for example, adult
protective or social services agencies, state survey and certification
agencies, ombudsmen for the aging or those in long-term care facilities,
and law enforcement or oversight.
The final rule specifies three circumstances in which disclosures of
protected health information is allowed in order to report abuse,
neglect or domestic violence. First, this paragraph allows disclosure of
protected health information related to abuse if required by law and the
disclosure complies with and is limited to the relevant requirements of
such law. As discussed below, the final rule requires covered entities
that make such disclosures pursuant to a state's mandatory reporting law
to inform the individual of the report.
Second, this paragraph allows covered entities to disclose protected
health information related to abuse if the individual has agrees to such
disclosure. When considering the possibility of disclosing protected
health information in an abuse situation pursuant to this section, we
encourage covered entities to seek the individual's agreement whenever
possible.
Third, this paragraph allows covered entities to disclose protected
health information about an individual without the individual's
agreement if the disclosure is expressly authorized by statute or
regulation and either: (1) the covered entity, in the exercise of its
professional judgment, believes that the disclosure is necessary to
prevent serious harm to the individual or to other potential victims; or
(2) if the individual is unable to agree due to incapacity, a law
enforcement or other public official authorized to received the report
represents that the protected health information for which disclosure is
sought is not intended to be used against the individual, and that an
immediate enforcement activity that depends on the disclosure would be
materially and adversely affected by waiting until the individual is
able to agree to the disclosure.
We emphasize that disclosure under this third part of the paragraph also
may be made only if it is expressly authorized by statute or regulation.
We use this formulation, rather than the broader "required by law,"
because of the heightened privacy and safety concerns in these
situations. We believe it appropriate to defer to other public
determinations regarding reporting of this information only where a
legislative or executive body has determined the reporting to be of
sufficient importance to warrant enactment of a law or promulgation of a
regulation. Law and regulations reflect a clear decision to authorize
the particular disclosure of protected health information, and reflect
greater public accountability (e.g., through the required public comment
process or because enacted by elected representatives).
For example, a Wisconsin law (Wis. Stat §46.90(4)) states that any
person may report to a county agency or state official that he or she
believes that abuse or neglect has occurred. Pursuant to §
164.512(c)(1)(iii), a covered entity may make a report only if the
specific type or subject matter of the report (e.g., abuse or neglect of
the elderly) is included in the law authorizing the report, and such a
disclosure may only be made to a public authority specifically
identified in the law authorizing the report. Furthermore, we note that
disclosures under this part of the paragraph are further limited to two
circumstances. In the first case, a covered entity, in the exercise of
professional judgment, must believe that the disclosure is necessary to
prevent serious harm to the individual or to other potential victims.
The second case addresses situations in which an individual who is a
victim of abuse, neglect or domestic violence is unable to agree due to
incapacity and a law enforcement or other public official authorized to
receive the report represents that the protected health information for
which disclosure is sought is not intended to be used against the
individual and that an immediate law enforcement activity that depends
on the disclosure would be materially and adversely affected by waiting
until the individual if able to agree to the disclosure. We note that,
in this second case, a covered entity may exercise discretion,
consistent with professional judgment as to the patient's best interest,
in deciding whether to make the requested disclosure.
The rules governing disclosure in this third set of circumstances are
different from those governing disclosures pursuant to § 164.512(f)(3)
regarding disclosure to law enforcement about victims of crime and other
harm. We believe that in abuse situations -- to a greater extent than in
situations involving crime victims in general -- there is clear
potential for abusers to cause further serious harm to the victim or to
others, such as other family members in a household or other residents
of a nursing home. The provisions allowing reporting of abuse when
authorized by state law, as described above, are consistent with
principles articulated by the AMA's Council on Ethical and Judicial
Affairs, which state that when reporting abuse is voluntary under state
law, it is justified when necessary to prevent serious harm to a
patient. Through the provisions of § 164.512(c), we recognize the unique
circumstances surrounding abuse and domestic violence, and we seek to
provide an appropriate balance between individual privacy interests and
important societal interests such as preventing serious harm to other
individuals. We note that here we are relying on covered entities, in
the exercise of professional judgment, to determine what is in the best
interests of the patient.
Finally, we require covered entities to inform the individual in all of
the situations described above that the covered entity has disclosed
protected health information to report abuse, neglect, or domestic
violence. We allow covered entities to provide this information orally.
We do not require written notification, nor do we encourage it, due to
the sensitivity of abuse situations and the potential for the abuser to
cause further harm to the individual if, for example, a covered entity
sends written notification to the home of the individual and the abuser.
Whenever possible, covered entities should inform the individual at the
same time that they determine abuse has occurred and decide that the
abuse should be reported. In cases involving patient incapacity, we
encourage covered entities to inform the individual of such disclosures
as soon as it is practicable to do so.
The rule provides two exceptions to the requirement to inform the victim
about a report to a government authority, one based on concern for
future harm and one based on past harm. First, a covered entity need not
inform the victim if the covered entity, in the exercise of professional
judgment, believes that informing the individual would place the
individual at risk of serious harm. We believe that this exception is
necessary to address the potential for future harm, either physical or
emotional, that the individual may face from knowing that the report has
been made. Second, a covered entity may choose not to meet the
requirement for informing the victim, if the covered entity actually
would be informing a personal representative (such as a parent of a
minor) and the covered entity reasonably believes that such person is
responsible for the abuse, neglect, or other injury that has already
occurred and that informing that person would not be in the individual's
best interests.
**Section 164.512(d)---Uses and Disclosures for Health Oversight
Activities**
Under § 164.510(c) of the NPRM, we proposed to permit covered entities
to disclose protected health information to health oversight agencies
for oversight activities authorized by law, including audit,
investigation, inspection, civil, criminal, or administrative proceeding
or action, or other activity necessary for appropriate oversight of: (i)
the health care system; (ii) government benefit programs for which
health information is relevant to beneficiary eligibility; or (iii)
government regulatory programs for which health information is necessary
for determining compliance with program standards.
In § 164.512(d) of the final rule, we modify the proposed language to
include civil and criminal investigations. In describing "other
activities necessary for oversight" of particular entities, we add the
phrase "entities subject to civil rights laws for which health
information is necessary for determining compliance." In addition, in
the final rule, we add "licensure or disciplinary actions" to the list
of oversight activities authorized by law for which covered entities may
disclose protected health information to health oversight agencies. The
NPRM's definition of "health oversight agency" (in proposed § 164.504)
included this phrase, but it was inadvertently excluded from the
regulation text at proposed § 164.510(c). We make this change in the
regulation text of the final rule to conform to the NPRM's definition of
health oversight agency and to reflect the full range of activities for
which we intend to allow covered entities to disclose protected health
information to health oversight agencies.
The NPRM would have allowed, but would not have required, covered
entities to disclose protected health information to public oversight
agencies and to private entities acting under grant of authority from or
under contract with oversight agencies for oversight purposes without
individual authorization for health oversight activities authorized by
law. When a covered entity was also an oversight agency, it also would
have been permitted to use protected health information in all cases in
which it would have been allowed to disclose such information for health
oversight purposes. The NPRM would not have established any new
administrative or judicial process prior to disclosure for health
oversight, nor would it have permitted disclosures forbidden by other
law. The proposed rule also would not have created any new right of
access to health records by oversight agencies, and it could not have
been used as authority to obtain records not otherwise legally available
to the oversight agency.
The final rule retains this approach to health oversight. As in the
NPRM, the final rule provides that when a covered entity is also an
oversight agency, it is allowed to use protected health information in
all cases in which it is allowed to disclose such information for health
oversight purposes. For example, if a state insurance department is
acting as a health plan in operating the state's Medicaid managed care
program, the final rule allows the insurance department to use protected
health information in all cases for which the plan can disclose the
protected health information for health oversight purposes. For example,
the state insurance department in its capacity as the state Medicaid
managed care plan can use protected health information in the process of
investigating and disciplining a state Medicaid provider for attempting
to defraud the Medicaid system. As in the NPRM, the final rule does not
establish any new administrative or judicial process prior to disclosure
for health oversight, nor does it prohibit covered entities from making
any disclosures for health oversight that are otherwise required by law.
Like the NPRM, it does not create any new right of access to health
records by oversight agencies and it cannot be used as authority to
obtain records not otherwise legally available to the oversight agency.
***Overlap Between Law Enforcement and Oversight***
Under the NPRM, the proposed definitions of law enforcement and
oversight, and the rules governing disclosures for these purposes
overlapped. Specifically, this overlap occurred because: (1) the NPRM
preamble, but not the NPRM regulation text, indicated that agencies
conducting both oversight and law enforcement activities would be
subject to the oversight requirements when conducting oversight
activities; and (2) the NPRM addressed some disclosures for
investigations of health care fraud in the law enforcement paragraph
(proposed § 164.510(f)(5)(i)), while health care fraud investigations
are central to the purpose of health care oversight agencies (covered
under proposed § 164.510(c)). In the final rule, we make substantial
changes to these provisions, in an attempt to prevent confusion.
In § 164.512(d)(2), we include explicit decision rules indicating when
an investigation is considered law enforcement and when an investigation
is considered oversight under this regulation. An investigation or
activity is not considered health oversight for purposes of this rule
if: (1) the individual is the subject of the investigation or activity;
and (2) the investigation or activity does not arise out of and is not
directly related to: (a) the receipt of health care; (b) a claim for
public benefits related to health; or (c) qualification for, or receipt
of public benefits or services where a patient's health is integral to
the claim for benefits or services. In such cases, where the individual
is the subject of the investigation and the investigation does not
relate to issues (a) through (c), the rules regarding disclosure for law
enforcement purposes (see § 164.512(f)) apply. For the purposes of this
rule, we intend for investigations regarding issues (a) through (c)
above to mean investigations of health care fraud.
Where the individual is not the subject of the activity or
investigation, or where the investigation or activity relates to the
subject matter in (a) through (c) of the preceding sentence, a covered
entity may make a disclosure pursuant to § 164.512(d)(1). For example,
when the U.S. Department of Labor's Pension and Welfare Benefits
Administration (PWBA) needs to analyze protected health information
about health plan enrollees in order to conduct an audit or
investigation of the health plan (i.e., the enrollees are not subjects
of the investigation) to investigate potential fraud by the plan, the
health plan may disclose protected health information to the PWBA under
the health oversight rules. These rules and distinctions are discussed
in greater detail in our responses to comments.
To clarify further that health oversight disclosure rules apply
generally in health care fraud investigations (subject to the exception
described above), in the final rule, we eliminate proposed §
164.510(f)(5)(i), which would have established requirements for
disclosure related to health care fraud for law enforcement purposes.
All disclosures of protected health information that would have been
permitted under proposed § 164.510(f)(5)(i) are permitted under §
164.512(d).
In the final rule, we add new language (§ 164.512(d)(3)) to address
situations in which health oversight activities are conducted in
conjunction with an investigation regarding a claim for public benefits
not related to health (e.g., claims for Food Stamps). In such
situations, for example, when a state Medicaid agency is working with
the Food Stamps program to investigate suspected fraud involving
Medicaid and Food Stamps, covered entities may disclose protected health
information to the entities conducting the joint investigation under the
health oversight provisions of the rule.
In the proposed rule, the definitions of "law enforcement proceeding"
and "oversight activity" both included the phrase "criminal, civil, or
administrative proceeding." For reasons explained below, the final rule
retains this phrase in both definitions. The final rule does not attempt
to distinguish between these activities based on the agency undertaking
them or the applicable enforcement procedures. Rather, as described
above, the final rule carves out certain activities which must always be
considered law enforcement for purposes of disclosure of protected
health information under this rule.
***Additional Considerations***
We note that covered entities are permitted to initiate disclosures that
are permitted under this paragraph. For example, a covered entity could
disclose protected health information in the course of reporting
suspected health care fraud to a health oversight agency.
We delete language in the NPRM that would have allowed disclosure under
this section only to law enforcement officials conducting or supervising
an investigation, official inquiry, or a criminal, civil or
administrative proceeding authorized by law. In some instances, a
disclosure by a covered entity under this section will initiate such an
investigation or proceeding, but it will not already be ongoing at the
time the disclosure is made.
**Section 164.512(e)---Disclosures and Uses for Judicial and
Administrative Proceedings**
Section 164.512(e) addresses when a covered entity is permitted to
disclose protected health information in response to requests for
protected health information that are made in the course of judicial and
administrative proceedings -- for example, when a non-party health care
provider receives a subpoena (under Federal Rule of Civil Procedure Rule
45 or similar provision) for medical records from a party to a law suit.
In the NPRM we would have allowed covered entities to disclose protected
health information in the course of any judicial or administrative
proceeding: (1) in response to an order of a court or administrative
tribunal; or (2) where an individual was a party to the proceeding and
his or her medical condition or history was at issue and the disclosure
was pursuant to lawful process or otherwise authorized by law. Under the
NPRM, if the request for disclosure of protected health information was
accompanied by a court order, a covered entity could have disclosed that
protected health information which the court order authorized to be
disclosed. If the request for disclosure of protected health information
were not accompanied by a court order, covered entities could not have
disclosed the information requested unless a request authorized by law
had been made by the agency requesting the information or by legal
counsel representing a party to litigation, with a written statement
certifying that the protected health information requested concerned a
litigant to the proceeding and that the health condition of the litigant
was at issue at the proceeding.
In § 164.512(e) of the final rule, we permit covered entities to
disclose protected health information in a judicial or administrative
proceeding if the request for such protected health information is made
through or pursuant to an order from a court or administrative tribunal
or in response to a subpoena or discovery request from, or other lawful
process by a party to the proceeding. When a request is made pursuant to
an order from a court or administrative tribunal, a covered entity may
disclose the information requested without additional process. For
example, a subpoena issued by a court constitutes a disclosure which is
required by law as defined in this rule, and nothing in this rule is
intended to interfere with the ability of the covered entity to comply
with such subpoena.
However, absent an order of, or a subpoena issued by, a court or
administrative tribunal, a covered entity may respond to a subpoena or
discovery request from, or other lawful process by, a party to the
proceeding only if the covered entity obtains either: (1) satisfactory
assurances that reasonable efforts have been made to give the individual
whose information has been requested notice of the request; or (2)
satisfactory assurances that the party seeking such information has made
reasonable efforts to secure a protective order that will guard the
confidentiality of the information. In meeting the first test, a covered
entity is considered to have received satisfactory assurances from the
party seeking the information if that party demonstrates that it has
made a good faith effort (such as by sending a notice to the
individual\'s last known address) to provide written notice to the
individual whose information is the subject of the request, that the
written notice included sufficient information about the proceeding to
permit the individual to raise an objection, and that the time for the
individual to raise objections to the court or administrative tribunal
has elapsed and no objections were filed or any objections filed by the
individual have been resolved.
Unless required to do so by other law, the covered entity is not
required to explain the procedures (if any) available for the individual
to object to the disclosure. Under the rule, the individual exercises
the right to object before the court or other body having jurisdiction
over the proceeding, and not to the covered entity. The provisions in
this paragraph are not intended to disrupt current practice whereby an
individual who is a party to a proceeding and has put his or her medical
condition at issue will not prevail without consenting to the production
of his or her protected health information. In such cases, we presume
that parties will have ample notice and an opportunity to object in the
context of the proceeding in which the individual is a party.
As described above, in this paragraph we also permit a covered entity to
disclose protected health information in response to a subpoena,
discovery request, or other lawful process if the covered entity
receives satisfactory assurances that the party seeking the information
has made reasonable efforts to seek a qualified protective order that
would protect the privacy of the information. A "qualified protective
order" means an order of a court or of an administrative tribunal or a
stipulation that: (1) prohibits the parties from using or disclosing the
protected health information for any purpose other than the litigation
or proceeding for which the records are requested; and (2) requires the
return to the covered entity or destruction of the protected health
information (including all copies made) at the end of the litigation or
proceeding. Satisfactory assurances of reasonable efforts to secure a
qualified protective order are a statement and documentation that the
parties to the dispute have agreed to a protective order and that it has
been submitted to the court or administrative tribunal with
jurisdiction, or that the party seeking the protected health information
has requested a qualified protective order from such court or tribunal.
We encourage the development of "model" protective orders that will
facilitate adherence with this subpart.
In the final rule we also permit the covered entity itself to satisfy
the requirement to make reasonable efforts to notify the individual
whose information has been requested or to seek a qualified protective
order. We intend this to be a permissible activity for covered entities:
we do not require covered entities to undertake these efforts in
response to a subpoena, discovery request, or similar process (other
than an order from a court or administrative tribunal). If a covered
entity receives such a request without receiving the satisfactory
assurances described above from the party requesting the information,
the covered entity is free to object to the disclosure and is not
required to undertake the reasonable efforts itself.
We clarify that the provisions of this paragraph do not supersede or
otherwise invalidate other provisions of this rule that permit uses and
disclosures of protected health information. For example, the fact that
protected health information is the subject of a matter before a court
or tribunal does not prevent its disclosure under another provision of
the rule, such as §§ 164.512(b), 164.512(d), or 164.512(f), even if a
public agency's method of requesting the information is pursuant to an
administrative proceeding. For example, where a public agency commences
a disciplinary action against a health professional, and requests
protected health information as part of its investigation, the
disclosure made be made to the agency under paragraph (d) of this
section (relating to health oversight) even if the method of making the
request is through the proceeding. As with any request for disclosure
under this section, the covered entity will need to verify the authority
under which the request is being made, and we expect that public
agencies will identify their authority when making such requests. We
note that covered entities may reasonably rely on assertions of
authority made by government agencies.
***Additional Considerations***
Where a disclosure made pursuant to this paragraph is required by law,
such as in the case of an order from a court or administrative tribunal,
the minimum necessary requirements in § 164.514(d) do not apply to
disclosures made under this paragraph. A covered entity making a
disclosure under this paragraph, however, may of course disclose only
that protected health information that is within the scope of the
permitted disclosure. For instance, in response to an order of a court
or administrative tribunal, the covered entity may disclose only the
protected health information that is expressly authorized by such an
order. Where a disclosure is not considered under this rule to be
required by law, the minimum necessary requirements apply, and the
covered entity must make reasonable efforts to limit the information
disclosed to that which is reasonably necessary to fulfill the request.
A covered entity is not required to second guess the scope or purpose of
the request, or take action to resist the request because they believe
that it is over broad. In complying with the request, however, the
covered entity must make reasonable efforts not to disclose more
information than is requested. For example, a covered entity may not
provide a party free access to its medical records under the theory that
the party can identify the information necessary for the request. In
some instances, it may be appropriate for a covered entity, presented
with a relatively broad discovery request, to permit access to a
relatively large amount of information in order for a party to identify
the relevant information. This is permissible as long as the covered
entity makes reasonable efforts to circumscribe the access as
appropriate.
The NPRM indicated that when a covered entity was itself a government
agency, the covered entity could use protected health information in all
cases in which it would have been allowed to disclose such information
in the course of any judicial or administrative proceeding. As explained
above, the final rule does not include this provision.
**Section 164.512(f)---Disclosure for Law Enforcement Purposes**
***Disclosures Pursuant to Process and as Otherwise Required by Law***
In the NPRM we would have allowed covered entities to disclose protected
health information without individual authorization as required by other
law. However, as explained above, if a legally mandated use or
disclosure fell into one or more of the national priority purposes
expressly identified in other paragraphs of proposed § 164.510, the
disclosure would have been subject to the terms and conditions specified
by the applicable paragraph of proposed § 164.510. For example,
mandatory reporting to law enforcement officials would not have been
allowed unless such disclosures conformed to the requirements of
proposed § 164.510(f) of the NPRM. Proposed § 164.510(f) did not
explicitly recognize disclosures required by other laws, and it would
not have permitted covered entities to comply with some state and other
mandatory reporting laws that require covered entities to disclose
protected health information to law enforcement officials, such as the
reporting of gun shot wounds, stab wounds, and/or burn injuries.
We did not intend to preempt generally state and other mandatory
reporting laws, and in § 164.512(f)(1)(i) of the final rule, we
explicitly permit covered entities to disclose protected health
information for law enforcement purposes as required by other law. This
provision permits covered entities to comply with these state and other
laws. Under this provision, to the extent that a mandatory reporting law
falls under the provisions of § 164.512(c)(1)(i) regarding reporting of
abuse, neglect, or domestic violence, the requirements of those
provisions supersede.
In the final rule, we specify that covered entities may disclose
protected health information pursuant to this provision in compliance
with and as limited by the relevant requirements of legal process or
other law. In the NPRM, for the purposes of this portion of the law
enforcement paragraph, we proposed to define "law enforcement inquiry or
proceeding" as an investigation or official proceeding inquiring into a
violation of or failure to comply with law; or a criminal, civil or
administrative proceeding arising from a violation of or failure to
comply with law. In the final rule, we do not include this definition in
§ 164.512(f), because it is redundant with the definition of "law
enforcement official" in § 164.501.
Proposed § 164.510(f)(1) of the NPRM would have authorized disclosure of
protected health information to a law enforcement official conducting or
supervising a law enforcement inquiry or proceeding authorized by law
pursuant to process, under three circumstances.
First, we proposed to permit such disclosures pursuant to a warrant,
subpoena, or other order issued by a judicial officer that documented a
finding by the officer. The NPRM did not specify requirements for the
nature of the finding. In the final rule, we eliminate the requirement
for a "finding," and we make changes to the list of orders in response
to which covered entities may disclose under this provision. Under the
final rule, covered entities may disclose protected health information
in compliance with and as limited by relevant requirements of: a court
order or court-ordered warrant, or a subpoena or summons issued by a
judicial officer. We made this change to the list to conform to the
definition of "required by law" in § 164.501.
Second, we proposed to permit such disclosures pursuant to a state or
federal grand jury subpoena. In the final rule, we leave this provision
of the NPRM unchanged.
Third, we proposed to permit such disclosures pursuant to an
administrative request, including an administrative subpoena or summons,
a civil investigative demand, or similar process, under somewhat
stricter standards than exist today for such disclosures. We proposed to
permit a covered entity to disclose protected health information
pursuant to an administrative request only if the request met three
conditions, as follows: (i) the information sought was relevant and
material to a legitimate law enforcement inquiry; (ii) the request was
as specific and narrowly drawn as reasonably practicable; and (iii)
de-identified information could not reasonably have been used to meet
the purpose of the request.
The final rules generally adopts this provision of the NPRM. In the
final rule, we modify the list of orders in response to which covered
entities may disclose protected health information, to include
administrative subpoenas or summons, civil or authorized investigative
demands, or similar process authorized by law. We made this change to
the list to conform with the definition of "required by law" in §
164.501. In addition, we slightly modify the second of the three
conditions under which covered entities may respond to such requests, to
allow disclosure if the request is specific and is limited in scope to
the extent reasonably practicable in light of the purpose for which the
information is sought.
***Limited Information for Identification and Location Purposes***
The NPRM would have allowed covered entities to disclose \"limited
identifying information\" for purposes of identifying a suspect,
fugitive, material witness, or missing person, in response to a law
enforcement request. We proposed to define "limited identifying
information" as (i) name; (ii) address; (iii) Social Security number;
(iv) date of birth; (v) place of birth; (vi) type of injury or other
distinguishing characteristic; and (vii) date and time of treatment.
The final rules generally adopts this provision of the NPRM with a few
modifications. In the final rule, we expand the circumstances under
which limited information about suspects, fugitives, material witnesses,
and missing persons may be disclosed, to include not only cases in which
law enforcement officials are seeking to identify such individuals, but
also cases in which law enforcement officials are seeking to locate such
individuals. In addition, the final rule modifies the list of data
elements that may be disclosed under this provision, in several ways. We
expand the list of elements that may be disclosed under these
circumstances, to include ABO blood type and Rh factor, as well as date
and time of death, if applicable. We remove "other distinguishing
characteristic" from the list of items that may be disclosed for the
location and identification purposes described in this paragraph, and
instead allow covered entities to disclose only a description of
distinguishing physical characteristics, such as scars and tattoos,
height, weight, gender, race, hair and eye color, and the presence or
absence of facial hair such as a beard or moustache. In addition, in the
final rule, protected health information associated with the following
cannot be disclosed pursuant to § 164.512(f)(2): DNA data and analyses;
dental records; or typing, samples or analyses of tissues or bodily
fluids other than blood (e.g., saliva). If a covered entity discloses
additional information under this provision, the covered entity will be
out of compliance and subject to sanction.
We clarify our intent not to allow covered entities to initiate
disclosures of limited identifying information to law enforcement in the
absence of a law enforcement request; a covered entity may disclose
protected health information under this provision only in response to a
request from law enforcement. We allow a " law enforcement official's
request" to be made orally or in writing, and we intend for it to
include requests by a person acting on behalf of law enforcement, for
example, requests by a media organization making a television or radio
announcement seeking the public's assistance in identifying a suspect.
Such a request also may include a "Wanted" poster and similar postings.
***Disclosure about a Victim of Crime***
The NPRM would have allowed covered entities to disclose protected
health information about a victim of a crime, abuse or other harm to a
law enforcement official, if the law enforcement official represented
that: (i) the information was needed to determine whether a violation of
law by a person other than the victim had occurred; and (ii) immediate
law enforcement activity that depended on obtaining the information may
have been necessary.
The final rule modifies the conditions under which covered entities can
disclose protected health information about victims. In addition, as
discussed above, the final rule includes a new § 164.512(c), which
establishes conditions for disclosure of protected health information
about victims of abuse, neglect or domestic violence. In addition, as
discussed above, we have added § 164.512(f)(1)(i) to this paragraph to
explicitly recognize that in some cases, covered entities' disclosure of
protected health information is mandated by state or other law. The
rule's requirements for disclosure in situations not covered under
mandatory reporting laws are different from the rule's provisions
regarding disclosure pursuant to a mandatory reporting law.
The final rule requires covered entities to obtain individual agreement
as a condition of disclosing the protected health information about
victims to law enforcement, unless the disclosure is permitted under §
164.512(b) or (c) or § 164.512(f)(1) above. The required agreement may
be obtained orally, and does not need to meet the requirements of §
164.508 of this rule (regarding authorizations). The rule waives the
requirement for individual agreement if the victim is unable to agree
due to incapacity or other emergency circumstance and: (1) the law
enforcement official represents that the protected health information is
needed to determine whether a violation of law by a person other than
the victim has occurred and the information is not intended to be used
against the victim; (2) the law enforcement official represents that
immediate law enforcement activity that depends on such disclosure would
be materially and adversely affected by waiting until the individual is
able to agree to the disclosure; and (3) the covered entity, in the
exercise of professional judgment, determines that the disclosure is in
the individual's best interests. We intend that assessing the
individual's best interests includes taking into account any further
risk of harm to the individual. This provision does not allow covered
entities to initiate disclosures of protected health information to law
enforcement; the disclosure must be in response to a request from law
enforcement.
We do not intend to create a new legal duty on the part of covered
entities with respect to the safety of their patients. Rather, we intend
to ensure that covered entities can continue to exercise their
professional judgment in these circumstances, on a case-by-case basis,
as they do today.
In some cases, a victim may also be a fugitive or suspect. For example,
an individual may receive a gunshot wound during a robbery and seek
treatment in a hospital emergency room. In such cases, when law
enforcement officials are requesting protected health information
because the individual is a suspect (and thus the information may be
used against the individual), covered entities may disclose the
protected health information pursuant to § 164.512(f)(2) regarding
suspects and not pursuant to § 164.512(f)(3) regarding victims. Thus, in
these situations, covered entities may disclose only the limited
identifying information listed in § 164.512(f)(2) -- not all of the
protected health information that may be disclosed under §
164.512(f)(3).
The proposed rule did not address whether a covered entity could
disclose protected health information to a law enforcement official to
alert the official of the individual's death.
***Disclosures About Decedents***
In the final rule, we add a new provision § 164.512(f)(4) in which we
permit covered entities to disclose protected health information about
an individual who has died to a law enforcement official for the purpose
of alerting law enforcement of the death if the covered entity has a
suspicion that such death may have resulted from criminal conduct. In
such circumstances consent of the individual is not available and it may
be difficult to determine the identity of a personal representative and
gain consent for disclosure of protected health information. Permitting
disclosures in this circumstance will permit law enforcement officials
to begin their investigation into the death more rapidly, increasingly
the likelihood of success.
***Intelligence and National Security Activities***
Section 164.510(f)(4) of the NPRM would have allowed covered entities to
disclose protected health information to a law enforcement official
without individual authorization for the conduct of lawful intelligence
activities conducted pursuant to the National Security Act of 1947 (50
U.S.C. 401 et seq.) or in connection with providing protective services
to the President or other individuals pursuant to section 3056 of Title
18, United States Code. In the final rule, we move provisions regarding
disclosures of protected health information for intelligence and
protective services activities to § 164.512(k) regarding uses and
disclosures for specialized government functions.
***Criminal Conduct on the Premises of a Covered Entity***
The NPRM would have allowed covered entities on their own initiative to
disclose to law enforcement officials protected health information that
the covered entity believed in good faith constituted evidence of
criminal conduct that arose out of and was directly related to: (A) the
receipt of health care or payment for health care, including a
fraudulent claim for health care; (B) qualification for or receipt of
benefits, payments, or services based on a fraudulent statement or
material misrepresentation of the health of the individual; that
occurred on the covered entity's premises or was witnessed by a member
of the covered entity's workforce.
In the final rule, we modify this provision substantially, by
eliminating language allowing disclosures already permitted in other
sections of the regulation. The proposed provision overlapped with other
sections of the NPRM, in particular proposed § 164.510(c) regarding
disclosure for health oversight activities. In the final regulation, we
clarify that this provision applies only to disclosures to law
enforcement officials of protected health information that the covered
entity believes in good faith constitutes evidence of a crime committed
on the premises. We eliminate proposed § 164.510(f)(5)(i) regarding
health care fraud from the law enforcement section, because all
disclosures that would have been allowed under that provision are
allowed under § 164.512(d) of the final rule (health oversight).
Similarly, in the final rule, we eliminate proposed § 164.510(f)(5)(iii)
on disclosure of protected health information to law enforcement
officials regarding criminal activity witnessed by a member of a health
plan workforce. All disclosures that would have been permitted by that
provision are included in § 164.512(f)(5), which allows disclosure of
information to report a crime committed on the covered entity's
premises, and by § 164.502, which provides that a covered entity is not
in violation of the rule when a member of its workforce or person
working for a business associate uses or discloses protected health
information while acting as a "whistle blower." Thus, § 164.512(f)(5)
allows covered entities to disclose health information only on the good
faith belief that it constitutes evidence of a crime on their premises.
The preamble to the NPRM said that if the covered entity disclosed
protected health information in good faith but was wrong in its belief
that the information was evidence of a violation of law, the covered
entity would not be subject to sanction under this regulation. The final
rule retains this approach.
***Reporting Crime in Emergencies***
The proposed rule did not address disclosures by emergency medical
personnel to a law enforcement official intended to alert law
enforcement about the commission of a crime. Because the provisions of
proposed rule were limited to individually identifiable health
information that was reduced to electronic form, many communications
that occur between emergency medical personnel and law enforcement
officials at the scene of a crime would not have been covered by the
proposed provisions.
In the final rule we include a new provision § 164.512(f)(6) that
addresses "911" calls for emergency medical technicians as well as other
emergency health care in response to a medical emergency. The final rule
permits a covered health care provider providing emergency health care
in response to a medical emergency, other than such emergency on the
premises of the covered health care provider, to disclose protected
health information to a law enforcement official if such disclosure
appears necessary to alert law enforcement to (1) the commission and
nature of a crime, (2) the location of such crime or of the victim(s) of
such crime, and (3) the identity, description, and location of the
perpetrator of such crime. A disclosure is not permitted under this
section if health care provider believes that the medical emergency is
the result of abuse, neglect, or domestic violence of the individual in
need of emergency health care. In such cases, disclosures to law
enforcement would be governed by paragraph (c) of this section.
This added provision recognizes the special role of emergency medical
technicians and other providers who respond to medical emergencies. In
emergencies, emergency medical personnel often arrive on the scene
before or at the same time as police officers, firefighters, and other
emergency response personnel. In these cases, providers may be in the
best position, and sometimes be the only ones in the position, to alert
law enforcement about criminal activity. For instance, providers may be
the first persons aware that an individual has been the victim of a
battery or an attempted murder. They may also be in the position to
report in real time, through use of radio or other mechanism,
information that may immediately contribute to the apprehension of a
perpetrator of a crime.
We note that disclosure under this provision is at the discretion of the
health care provider. Disclosures in some instances may be governed more
strictly, such as by applicable ethical standards and state and local
laws.
Finally, the NPRM also included a proposed § 164.510(f)(5), which
duplicated proposed § 164.510(f)(3). The final rule does not include
this duplicate provision.
***Additional Considerations***
As stated in the NPRM, this paragraph is not intended to limit or
preclude a covered entity from asserting any lawful defense or otherwise
contesting the nature or scope of the process when the procedural rules
governing the proceeding so allow. At the same time, it is not intended
to create a basis for appealing to federal court concerning a request by
state law enforcement officials. Each covered entity will continue to
have available legal procedures applicable in the appropriate
jurisdiction to contest such requests where warranted.
As was the case with the NPRM, this rule does not create any new
affirmative requirement for disclosure of protected health information.
Similarly, this section is not intended to limit a covered entity from
disclosing protected health information to law enforcement officials
where other sections of the rule permit such disclosure, e.g., as
permitted by § 164.512(j) to avert an imminent threat to health or
safety, for health oversight activities, to coroners or medical
examiners, and in other circumstances permitted by the rule. For
additional provisions permitting covered entities to disclose protected
health information to law enforcement officials, see § 164.512(j)(1)(i)
and (ii).
Under the NPRM and under the final rule, to obtain protected health
information, law enforcement officials must comply with whatever other
law is applicable. In certain circumstances, while this provision could
authorize a covered entity to disclose protected health information to
law enforcement officials, there could be additional applicable statutes
or rules that further govern the specific disclosure. If the preemption
provisions of this regulation do not apply, the covered entity must
comply with the requirements or limitations established by such other
law, regulation or judicial precedent. See §§ 160.201 through 160.205.
For example, if state law permits disclosure only after compulsory
process with court review, a provider or payor is not allowed to
disclose information to state law enforcement officials unless the
officials have complied with that requirement. Similarly, disclosure of
substance abuse patient records subject to, 42 U.S.C. 290dd-2, and the
implementing regulations, 42 CFR part 2, continue to be governed by
those provisions.
In some instances, disclosure of protected health information to law
enforcement officials will be compelled by other law, for example, by
compulsory judicial process or compulsory reporting laws (such as laws
requiring reporting of wounds from violent crimes, suspected child
abuse, or suspected theft of controlled substances). As discussed above,
disclosure of protected health information under such other mandatory
law is permitted under § 164.512(a).
In the responses to comments we clarify that items such as cells and
tissues are not protected health information, but that analyses of them
is. The same treatment would be given other physical items, such as
clothing, weapons, or a bloody knife. We note, however, that while these
items are not protected health information and may be disclosed, some
communications that could accompany the disclosure will be protected
health information under the rule. For example, if a person provides
cells to a researcher, and tells the researcher that these are an
identified individual's cancer cells, that accompanying statement is
protected health information about that individual. Similarly, if a
person provides a bullet to law enforcement, and tells law enforcement
that the bullet was extracted from an identified individual, the person
has disclosed the fact that the individual was treated for a wound, and
the additional statement is a disclosure of protected health
information.
To be able to make the additional statement accompanying the provision
of the bullet, a covered entity must look to the rule to find a
provision under which a disclosure may be made to law enforcement.
Section 164.512(f) of the rule addresses disclosures for law enforcement
purposes. Under § 164.512(f)(1), the additional statement may be
disclosed to a law enforcement official if required by law or with
appropriate process. Under § 164.512(f)(2), we permit covered entities
to disclose limited identifying information without legal process in
response to a request from a law enforcement official for the purpose of
identifying or locating a suspect, fugitive, material witness, or
missing person. Thus, in the case of bullet described above, the covered
entity may, in response to a law enforcement request, provide the
extracted bullet and such additional limited identifying information as
is permitted under § 164.512(f)(2).
**Section 164.512(g)---Uses and Disclosures About Decedents**
In the NPRM we proposed to allow covered entities to disclose protected
health information without individual authorization to coroners and
medical examiners, consistent with applicable law, for identification of
a deceased person or to determine cause of death.
In § 164.512(g) of the final rule, we permit covered entities to
disclose protected health information to coroners, medical examiners,
and funeral directors as part of a new paragraph on disclosures related
to death. The final rule retains the NPRM approach regarding disclosure
of protected health information to coroners and medical examiners, and
it allows the information disclosed to coroners and medical examiners to
include identifying information about other persons that may be included
in the individual's medical record. Redaction of such names is not
required prior to disclosing the individual's record to coroners or
medical examiners. Since covered entities may also perform duties of a
coroner or medical examiner, where a covered entity is itself a coroner
or medical examiner, the final rule permits the covered entity to use
protected health information in all cases in which it is permitted to
disclose such information for its duties as a coroner or medical
examiner.
Section 164.512(g) allows covered entities to disclose protected health
information to funeral directors, consistent with applicable law, as
necessary to carry out their duties with respect to a decedent. For
example, the rule allows hospitals to disclose to funeral directors the
fact that an individual has donated an organ or tissue, because this
information has implications for funeral home staff duties associated
with embalming. When necessary for funeral directors to carry out their
duties, covered entities may disclose protected health information prior
to and in reasonable anticipation of the individual's death.
Whereas the NPRM did not address the issue of disclosure of
psychotherapy notes without individual authorization to coroners and
medical examiners, the final rule allows such disclosures.
The NPRM did not include in proposed § 164.510(e) language stating that
where a covered entity was itself a coroner or medical examiner, it
could use protected health information for the purposes of engaging in a
coroner's or a medical examiner's activities. The final rule includes
such language to address situations such as where a public hospital
performs medical examiner functions. In such cases, the hospital's
on-staff coroners can use protected health information while conducting
post-mortem investigations, and other hospital staff can analyze any
information associated with these investigations, for example, as part
of the process of determining the cause of the individual's death.
**Section 164.512(h)---Uses and Disclosures for Cadaveric Donation of
Organs, Eyes, or Tissues**
In the NPRM we proposed to include the procurement or banking of blood,
sperm, organs, or any other tissue for administration to patients in the
definition of "health care" (described in proposed § 160.103). The
NPRM's proposed approach did not differentiate between situations in
which the donor was competent to consent to the donation -- for example,
when an individual is donating blood, sperm, a kidney, or a liver or
lung lobe -- and situations in which the donor was deceased, for
example, when cadaveric organs and tissues were being donated. We also
proposed to allow use and disclosure of protected health information for
treatment without consent.
In the final rule, we take a different approach. In § 164.512(h), we
permit covered entities to disclose protected health information without
individual authorization to organ procurement organizations or other
entities engaged in the procurement, banking, or transplantation of
cadaveric organs, eyes, or tissue for donation and transplantation. This
provision is intended to address situations in which an individual has
not previously indicated whether he or she seeks to donate organs, eyes,
or tissues (and therefore authorized release of protected health
information for this purpose). In such situations, this provision is
intended to allow covered entities to initiate contact with organ and
tissue donation and transplantation organizations to facilitate
transplantation of cadaveric organs, eyes, and tissues.
**Disclosures and Uses for Government Health Data Systems**
In the NPRM we proposed to permit covered entities to disclose protected
health information to a government agency, or to a private entity acting
on behalf of a government agency, for inclusion in a government health
data system collecting health data for analysis in support of policy,
planning, regulatory, or management functions authorized by law. The
NPRM stated that when a covered entity was itself a government agency
collecting health data for these functions, it could use protected
health information in all cases for which it was permitted to disclose
such information to government health data systems.
In the final rule, we eliminate the provision that would have allowed
covered entities to disclose protected health information to government
health data systems without authorization. Thus, under the final rule,
covered entities cannot disclose protected health information without
authorization to government health data systems -- or to private health
data systems -- unless the disclosure is permissible under another
provision of the rule.
**Disclosures for Payment Processes**
In the NPRM we proposed to permit covered entities to disclose, in
connection with routine banking activities or payment by debit, credit,
or other payment card, or other payment means, the minimum amount of
protected health information necessary to complete a banking or payment
activity to financial institutions or to entities acting on behalf of
financial institutions to authorize, process, clear, settle, bill,
transfer, reconcile, or collect payments for financial institutions.
The preamble to the NPRM clarified the proposed rule's intent regarding
disclosure of diagnostic and treatment information along with payment
information to financial institutions. The preamble to the proposed rule
said that diagnostic and treatment information never was necessary to
process a payment transaction. The preamble said we believed that in
most cases, the permitted disclosure would include only: (1) the name
and address of the account holder; (2) the name and address of the payor
or provider; (3) the amount of the charge for health services; (4) the
date on which health services were rendered; (5) the expiration date for
the payment mechanism, if applicable; and (6) the individual's
signature. The preamble noted that the proposed regulation text did not
include an exclusive list of information that could lawfully be
disclosed to process payments, and it solicited comments on whether more
elements would be needed for banking and payment transactions and on
whether including a specific list of protected health information that
could be disclosed was an appropriate approach.
The preamble also noted that under section 1179 of HIPAA, certain
activities of financial institutions were exempt from this rule, to the
extent that these activities constituted authorizing, processing,
clearing, settling, billing, transferring, reconciling, or collecting
payments for health care or health plan premiums.
In the final rule, we eliminate the NPRM's provision on "banking and
payment processes." All disclosures that would have been allowed
pursuant to proposed § 164.510(i) are allowed under § 164.502(a) of the
final rule, regarding disclosure for payment purposes.
**Section 164.512(i)---Uses and Disclosures for Research Purposes**
The NPRM would have permitted covered entities to use and disclose
protected health information for research--regardless of funding
source--without individual authorization, provided that the covered
entity obtained documentation of the following:
\(1\) a waiver, in whole or in part, of authorization for the use or
disclosure of protected health information was approved by an
Institutional Review Board (IRB) or a privacy board that was composed as
stipulated in the proposed rule;
\(2\) the date of approval of the waiver, in whole or in part, of
authorization by an IRB or privacy board;
\(3\) the IRB or privacy board had determined that the waiver, in whole
or in part satisfied the following criteria:
\(i\) the use or disclosure of protected health information involves no
more than minimal risk to the subjects;
\(ii\) the waiver will not adversely affect the rights and welfare of
the subjects;
\(iii\) the research could not practicably be conducted without the
waiver;
\(iv\) whenever appropriate, the subjects will be provided with
additional pertinent information after participation;
\(v\) the research could not practicably be conducted without access to
and use of the protected health information;
\(vi\) the research is of sufficient importance so as to outweigh the
intrusion of the privacy of the individual whose information is subject
to the disclosure;
\(vii\) there is an adequate plan to protect the identifiers from
improper use and disclosure; and
\(viii\) there is an adequate plan to destroy the identifiers at the
earliest opportunity consistent with the conduct of the research, unless
there is a health or research justification for retaining the
identifiers; and
\(4\) the written documentation was signed by the chair of, as
applicable, the IRB or the privacy board.
The NPRM also proposed that IRBs and privacy boards be permitted to
adopt procedures for "expedited review" similar to those provided in the
Common Rule (Common Rule § \_\_\_\_.110) for records research that
involved no more than minimal risk. However, this provision for
expedited review was not included in the proposed regulation text.
The board that would determine whether the research protocol met the
eight specified criteria for waiving the patient authorization
requirements (described above), could have been an IRB constituted as
required by the Common Rule, or a privacy board, whose proposed
composition is described below. The NPRM proposed no requirements for
the location or sponsorship of the IRB or privacy board. Under the NPRM,
the covered entity could have created such a board and could have relied
on it to review research proposals for uses and disclosures of protected
health information for research. A covered entity also could have relied
on the necessary documentation from an outside researcher's own
university IRB or privacy board. In addition, a covered entity could
have engaged the services of an outside IRB or privacy board to obtain
the necessary documentation.
Absent documentation that the requirements described above had been met,
the NPRM would have required individuals' authorization for the use or
disclosure of protected health information for research, pursuant to the
authorization requirements in proposed § 164.508. For research conducted
with patient authorization, documentation of IRB or privacy board
approval would not have been required.
The final rule retains the NPRM's proposed framework for permitting uses
and disclosures of protected health information for research purposes,
although we are making several important changes for the final rule.
These changes are discussed below:
***Documentation Requirements of IRB or Privacy Board Approval of
Waiver***
The final rule retains these documentation requirements, but modifies
some of them and includes two additional documentation requirements. The
final rule's modifications to the NPRM's proposed documentation
requirements are described first, followed by a description of the three
documentation requirements added in the final rule.
The final rule makes the following modifications to the NPRM's proposed
documentation requirements for the waiver of individual authorization:
1\. *IRB and privacy board membership*. The NPRM stipulated that to meet
the requirements of proposed § 164.510(j), the documentation would need
to indicate that the IRB had been composed as required by the Common
Rule (§ \_\_\_.107), and the privacy board had been composed as follows:
"(A) Has members with varying backgrounds and appropriate professional
competency as necessary to review the research protocol; (B) Includes at
least one member who is not affiliated with the entity conducting the
research, or related to a person who is affiliated with such entity; and
(C) Does not have any member participating in a review of any project in
which the member has a conflict of interest" (§ 164.510(j)(1)(ii)).
The final rule modifies the first of the requirements for the
composition of a privacy board to focus on the effect of the research
protocol on the individual's privacy rights and related interests.
Therefore, under the final rule, the required documentation must
indicate that the privacy board has members with varying backgrounds and
appropriate professional competency as necessary to review the effect of
the research protocol on the individual's privacy rights and related
interests.
In addition, the final rule further restricts the NPRM's proposed
requirement that the privacy board include at least one member who was
not affiliated with the entity conducting the research, or related to a
person who is affiliated with such entity. Under the final rule, the
board must include at least one member who is not affiliated with the
covered entity, not affiliated with any entity conducting or sponsoring
the research, and not related to any person who is affiliated with such
entities.
The other documentation requirements for the composition of an IRB and
privacy board remain the same.
2\. *Waiver of authorization criteria*. The NPRM proposed to prohibit
the use or disclosure of protected health information for research
without individual authorization as stipulated in proposed § 164.508
unless the covered entity had documentation indicating that an IRB or
privacy board had determined that the following waiver criteria had been
met:
\(i\) the use or disclosure of protected health information involves no
more than minimal risk to the subjects;
\(ii\) the waiver will not adversely affect the rights and welfare of
the subjects;
\(iii\) the research could not practicably be conducted without the
waiver;
\(iv\) whenever appropriate, the subjects will be provided with
additional pertinent information after participation;
\(v\) the research could not be practicably be conducted without access
to and use of the protected health information;
\(vi\) the research is of sufficient importance so as to outweigh the
intrusion of the privacy of the individual whose information is subject
to the disclosure;
\(vii\) there is an adequate plan to protect the identifiers from
improper use and disclosure; and
\(viii\) there is an adequate plan to destroy the identifiers at the
earliest opportunity consistent with the conduct of the research, unless
there is a health or research justification for retaining the
identifiers.
The final rule continues to permit the documentation of IRB or privacy
board approval of a waiver of an authorization as required by § 164.508,
to indicate that only some or all of the § 164.508 authorization
requirements have been waived. In addition, the final rule clarifies
that the documentation of IRB or privacy board approval may indicate
that the authorization requirements have been altered. Also, for all of
the proposed waiver of authorization criteria that used the term
"subject," we replace this term with the term "individual" in the final
rule.
In addition, the final rule (1) eliminates proposed waiver criterion iv,
(2) modifies proposed waiver criteria ii, iii, vi, and viii, and (3)
adds a waiver criterion.
Proposed waiver criterion ii (waiver criterion § 164.512(i)(2)(ii)(B) in
the final rule) is revised as follows to focus more narrowly on the
privacy interests of individuals, and to clarify that it also pertains
to alterations of individual authorization: "the alteration or waiver
will not adversely affect the privacy rights and the welfare of the
individuals." Under criterion § 164.512(i)(2)(ii)(B), the question is
whether the alteration or waiver of individual authorization would
adversely affect the privacy rights and the welfare of individuals, not
whether the research project itself would adversely affect the privacy
rights or the welfare of individuals.
Proposed waiver criterion iii (waiver criterion § 164.512(i)(2)(ii)(C)
in the final rule) is revised as follows to clarify that it also
pertains to alterations of individual authorization: "the research could
not practicably be conducted without the alteration or waiver."
Proposed waiver criterion vi (waiver criterion § 164.512(i)(2)(ii)(E) in
the final rule) is revised as follows to be more consistent with one of
the Common Rule's requirements for the approval of human subjects
research (Common Rule, § \_\_\_.111(a)(2)): "the privacy risks to
individuals whose protected health information is to be used or
disclosed are reasonable in relation to anticipated benefits if any to
individuals, and the importance of the knowledge that may reasonably be
expected to result from the research." Under criterion §
164.512(i)(2)(ii)(E), the question is whether the risks to an
individual's privacy from participating in the research are reasonable
in relation to the anticipated benefits from the research. This
criterion is unlike waiver criterion § 164.512(i)(2)(ii)(B) in that it
focuses on the privacy risks and benefits of the research project more
broadly, not on the waiver of individual authorization.
Proposed waiver criterion viii (waiver criterion § 164.512(i)(2)(ii)(G)
in the final rule) is revised as follows: "there is an adequate plan to
destroy the identifiers at the earliest opportunity consistent with the
conduct of the research, unless there is a health or research
justification for retaining the identifiers, or such retention is
otherwise required by law."
In addition, the final rule includes another waiver criterion: waiver
criterion § 164.512(i)(2)(ii)(H). The NPRM proposed no restriction on a
researchers' further use or disclosure of protected health information
that had been received under proposed § 164.510(j). The final rule
requires that the covered entity obtain written agreement from the
person or entity receiving protected health information under §
164.512(i) not to re-use or disclose protected health information to any
other person or entity, except: (1) as required by law, (2) for
authorized oversight of the research project, or (3) for other research
for which the use or disclosure of protected health information would be
permitted by this subpart. For instance, in assessing whether this
criterion has been met, we encourage IRBs and privacy boards to obtain
adequate assurances that the protected health information will not be
disclosed to an individual's employer for employment decisions without
the individual's authorization.
3\. *Required signature.* The rule broadens the types of individuals who
are permitted to sign the required documentation of IRB or privacy board
approval. The final rule requires the documentation of the alteration or
waiver of authorization to be signed by (1) the chair of, as applicable,
the IRB or the privacy board, or (2) a member of the IRB or privacy
board, as applicable, who is designated by the chair to sign the
documentation.
Furthermore, the final rule makes the following three additions to the
proposed documentation requirements for the alteration or waiver of
authorization:
1\. *Identification of the IRB or privacy board.* The NPRM did not
propose that the documentation of waiver include a statement identifying
the IRB or privacy board that approved the waiver of authorization. In
the final rule we require that such a statement be included in the
documentation of alteration or waiver of individual authorization. By
this requirement we mean that the name of the IRB or privacy board must
be included in such documentation, not the names of individual members
of the board.
2\. *Description of protected health information approved for use or
disclosure*. The NPRM did not propose that the documentation of waiver
include a description of the protected health information that the IRB
or privacy board had approved for use or disclosure without individual
authorization. In considering waiver of authorization criterion §
164.512(i)(2)(ii)(D), we expect the IRB or privacy board to consider the
amount of information that is minimally needed for the study. The final
rule requires that the documentation of IRB or privacy board approval of
the alteration or waiver of authorization describe the protected health
information for which use or access has been determined to be necessary
for the research by the IRB or privacy board. For example, if the IRB or
privacy board approves only the use or disclosure of certain information
from patients' medical records, and not patients' entire medical record,
this must be stated on the document certifying IRB or privacy board
approval.
3\. *Review and approval procedures.* The NPRM would not have required
documentation of IRBs' or privacy boards' review and approval
procedures. In the final rule, the documentation of the alteration or
waiver of authorization must state that the alteration or waiver has
been reviewed and approved by: (1) an IRB that has followed the voting
requirements stipulated in the Common Rule (§ \_\_\_.108(b)), or the
expedited review procedures as stipulated in § \_\_\_.110(b); or (2) a
privacy board that has reviewed the proposed research at convened
meetings at which a majority of the privacy board members are present,
including at least one member who is not affiliated with the covered
entity, not affiliated with any entity conducting or sponsoring the
research, and not related to any person who is affiliated with any such
entities, and the alteration or waiver of authorization is approved by
the majority of privacy board members present at the meeting, unless an
expedited review procedure is used.
For documentation of IRB approval that used an expedited review
procedure, the covered entity must ensure that the documentation
indicates that the IRB followed the expedited review requirements of the
Common Rule (§ \_\_\_.110). For documentation of privacy board approval
that used an expedited review procedure, the covered entity must ensure
that the documentation indicates that the privacy board met the
expedited review requirements of the privacy rule. In the final rule, a
privacy board may use an expedited review procedure if the research
involves no more than minimal risk to the privacy of the individuals who
are the subject of the protected health information for which disclosure
is being sought. If a privacy board elects to use an expedited review
procedure, the review and approval of the alteration or waiver of
authorization may be carried out by the chair of the privacy board, or
by one or more members of the privacy board as designated by the chair.
Use of the expedited review mechanism permits review by a single member
of the IRB or privacy board, but continues to require that the covered
entity obtain documentation that all of the specified waiver criteria
have been met.
***Reviews Preparatory to Research***
Under the NPRM, if a covered entity used or disclosed protected health
information for research, but the researcher did not record the
protected health information in a manner that persons could be
identified, such an activity would have constituted a research use or
disclosure that would have been subject to either the individual
authorization requirements of proposed § 164.508 or the documentation of
the waiver of authorization requirements of proposed § 164.510(j).
The final rule permits the use and disclosure of protected health
information for research without requiring authorization or
documentation of the alteration or waiver of authorization, if the
research is conducted in such a manner that only de-identified protected
health information is recorded by the researchers and the protected
health information is not removed from the premises of the covered
entity. For such uses and disclosures of protected health information,
the final rule requires that the covered entity obtain from the
researcher representations that use or disclosure is sought solely to
review protected health information as necessary to prepare a research
protocol or for similar purposes preparatory to research, no protected
health information is to be removed from the covered entity by the
researcher in the course of the review, and the protected health
information for which use or access is sought is necessary for the
research purposes. The intent of this provision is to permit covered
entities to use and disclose protected health information to assist in
the development of a research hypothesis and aid in the recruitment of
research participants. We understand that researchers sometimes require
access to protected health information to develop a research protocol,
and to determine whether a specific covered entity has protected health
information of prospective research participants that would meet the
eligibility criteria for enrollment into a research study. Therefore,
this provision permits covered entities to use and disclose protected
health information for these preliminary research activities without
individual authorization and without documentation that an IRB or
privacy board has altered or waived individual authorization.
***Research on Protected Health Information of the Deceased***
The NPRM would have permitted the use and disclosure of protected health
information of deceased persons for research without the authorization
of a legal representative, and without the requirement for written
documentation of IRB or privacy board approval in proposed § 164.510(j).
In the final rule, we retain the exception for uses and disclosures for
research purposes but in addition require that the covered entity take
certain protective measures prior to release of the decedent's protected
health information for such purposes. Specifically, the final rule
requires that the covered entity obtain representation that the use or
disclosure is sought solely for research on the protected health
information of decedent, and representation that the protected health
information for which use or disclosure is sought is necessary for the
research purposes. In addition, the final rule allows covered entities
to request from the researcher documentation of the death of the
individuals about whom protected health information is being sought.
***Good Faith Reliance***
The final rule clarifies that covered entities are allowed to rely on
the IRB's or privacy board's representation that the research proposal
meets the documentation requirements of § 164.512(i)(1)(i) and the
minimum necessary requirements of § 164.514.
In addition, when using or disclosing protected health information for
reviews preparatory to research (§ 164.512(i)(1)(ii)) or for research
solely on the protected health information of decedents (§
164.512)(1)(iii)), the final rule clarifies that the covered entity may
rely on the requesting researcher's representation that the purpose of
the request is for one of these two purpose, and that the request meets
the minimum necessary requirements of § 164.514. Therefore, the covered
entity has not violated the rule if the requesting researcher
misrepresents his or her intended use of the protected health
information to the covered entity.
***Additional Research Provisions***
*Research Including Treatment*
To the extent that a researcher provided treatment to persons as part of
a research study, the NPRM would have covered such researchers as health
care providers for purposes of that treatment, and required that the
researcher comply with all of the provisions of the rule that would be
applicable to health care providers. The final rule retains this
requirement.
*Individual Access to Research Information*
Under proposed § 164.514, the NPRM would have applied the proposed
provision regarding individuals' access to records to research that
includes the delivery of treatment. The NPRM proposed an exception to
individuals' right to access protected health information for clinical
trials, where (1) protected health information was obtained by a covered
entity in the course of clinical trial, (2) the individual agreed to the
denial of access when consenting to participate in the trial (if the
individual's consent to participate was obtained), and (3) the trial was
still in progress.
Section 164.524 of the final rule retains this exception to access for
research that includes treatment. In addition, the final rule requires
that participants in such research be informed that their right of
access to protected health information about them will be reinstated
once the research is complete.
*Obtaining the Individual's Authorization for Research*
The NPRM would have required covered entities obtaining individuals'
authorization for the use or disclosure of information for research to
comply with the requirements applicable to individual authorization for
the release of protected health information (proposed § 164.508(a)(2)).
If an individual had initiated the use or disclosure of his/her
protected health information for research, or any other purpose, the
covered entity would have been required to obtain a completed
authorization for the use or disclosure of protected health information
as proposed in § 164.508(c).
The final rule retains these requirements for research conducted with
authorization, as required by § 164.508. In addition, for the use and
disclosure of protected health information created by a covered entity
for the purpose, in whole or in part, of research that includes
treatment of the individual, the covered entity must meet the
requirements of § 164.508(f).
*Interaction with the Common Rule*
The NPRM stated that the proposed rule would not override the Common
Rule. Where both the NPRM and the Common Rule would have applied to
research conducted by the covered entity--either with or without
individuals' authorization--both sets of regulations would have needed
to be followed. This statement remains true in the final rule. In
addition, we clarify that FDA's human subjects regulations must also be
followed if applicable.
**Section 164.512(j)---Uses and Disclosures to Avert a Serious Threat to
Health or Safety**
In the NPRM we proposed to allow covered entities to use or disclose
protected health information without individual authorization --
consistent with applicable law and ethics standards -- based on a
reasonable belief that use or disclosure of the protected health
information was necessary to prevent or lessen a serious and imminent
threat to health or safety of an individual or of the public. Pursuant
to the NPRM, covered entities could have used or disclosed protected
health information in these emergency circumstances to a person or
persons reasonably able to prevent or lessen the threat, including the
target of the threat. The NPRM stated that covered entities that made
disclosures in these circumstances were presumed to have acted under a
reasonable belief if the disclosure was made in good faith, based on
credible representation by a person with apparent knowledge or
authority. The NPRM did not include verification requirements specific
to this paragraph.
In § 164.512(j) of the final rule, we retain the NPRM's approach to uses
and disclosures made to prevent or lessen serious and imminent threats
to health or safety, as well as its language regarding the presumption
of good faith. We also clarify that: (1) rules governing these
situations, which the NPRM referred to as "emergency circumstances," are
not intended to apply to emergency care treatment, such as health care
delivery in a hospital emergency room; and (2) the "presumption of good
faith belief" is intended to apply only to this provision and not to all
disclosures permitted without individual authorization. The final rule
allows covered entities to use or disclose protected health information
without an authorization on their own initiative in these circumstances,
when necessary to prevent or lessen a serious and imminent threat,
consistent with other applicable ethical or legal standards.
The rule's approach is consistent with the "duty to warn" third persons
at risk, which has been established through case law. In *Tarasoff v.
Regents of the University of California* (17 Cal. 3d 425 (1976)), the
Supreme Court of California found that when a therapist's patient had
made credible threats against the physical safety of a specific person,
the therapist had an obligation to use reasonable care to protect the
intended victim of his patient against danger, including warning the
victim of the danger. Many states have adopted, through either statutory
or case law, versions of the *Tarasoff* duty to warn. The rule is not
intended to create a duty to warn or disclose. Rather, it permits
disclosure to avert a serious and imminent threat to health or safety
consistent with other applicable legal or ethical standards. If
disclosure in these circumstances is prohibited by state law, this rule
would not allow the disclosure.
As indicated above, in some situations (for example, when a person is
both a fugitive and a victim and thus covered entities could disclose
protected health information pursuant either to § 164.512(f)(2)
regarding fugitives or to § 164.512(f)(3) establishing conditions for
disclosure about victims), more than one section of this rule
potentially could apply with respect to a covered entity's potential
disclosure of protected health information. Similarly, in situations
involving a serious and imminent threat to public health or safety, law
enforcement officials may be seeking protected health information from
covered entities to locate a fugitive. In the final rule, we clarify
that if a situation fits one section of the rule (for example, §
164.512(j) on serious and imminent threats to health or safety), covered
entities may disclose protected health information pursuant to that
section, regardless of whether the disclosure also could be made
pursuant to another section (e.g., § 164.512(f)), regarding disclosure
to law enforcement officials).
The proposed rule did not address situations in which covered entities
could make disclosures to law enforcement officials about oral
statements admitting participation in violent conduct or about escapees.
In the final rule we permit, but do not require, covered entities to use
or disclose protected health information, consistent with applicable law
and standards of ethical conduct, in specific situations in which the
covered entity, in good faith, believes the use or disclosure is
necessary to permit law enforcement authorities to identify or apprehend
an individual. Under paragraph (j)(1)(ii)(A) of this section, a covered
entity may take such action because of a statement by an individual
admitting participation in a violent crime that the covered entity
reasonably believes may have resulted in serious physical harm to the
victim. The protected health information that is disclosed in this case
is limited to the statement and to the protected health information
included under the limited identifying and location information in §
164.512(f)(2), such as name, address, and type of injury. Under
paragraph (j)(1)(ii)(B) of this section, a covered entity may take such
action where it appears from all the circumstances that the individual
has escaped from a correctional institution or from lawful custody.
A disclosure may not be made under paragraph (j)(1)(ii)(A) for a
statement admitting participation in a violent crime if the covered
entity learns the information in the course of counseling or therapy.
Similarly, such a disclosure is not permitted if the covered entity
learns the information in the course of treatment to affect the
propensity to commit the violent crimes that are described in the
individual\'s statements. We do not intend to discourage individuals
from speaking accurately in the course of counseling or therapy
sessions, or to discourage other treatment that specifically seeks to
reduce the likelihood that someone who has acted violently in the past
will do so again in the future. This prohibition on disclosure is
triggered once an individual has made a request to initiate or be
referred to such treatment, therapy, or counseling.
The provision permitting use and disclosure has been added in light of
the broadened definition in the final rule of protected health
information. Under the NPRM, protected health information meant
individually identifiable health information that is or has been
electronically transmitted or electronically maintained by a covered
entity. Under the final rule, protected health information includes
information transmitted by electronic media as well as such information
transmitted or maintained in any other form or medium. The new
definition includes oral statements to covered entities as well as
individually identifiable health information transmitted \"in any other
form.\"
The definition of protected health information, for instance, would now
apply to a statement by a patient that is overheard by a hospital
security guard in a waiting room. Such a statement would have been
outside the scope of the proposed rule (unless it was memorialized in an
electronic record), but is within the scope of the final rule. For the
example with the hospital guard, the new provision permitting disclosure
of a statement by an individual admitting participation in a violent
crime would have the same effect as the proposed rule \-- the statement
could be disclosed to law enforcement, so long as the other aspects of
the regulation are followed. Similarly, where it appears from all the
circumstances that the individual has escaped from prison, the expanded
definition of protected health information should not prevent the
covered entity from deciding to report this information to law
enforcement.
The disclosures that covered entities may elect to make under this
paragraph are entirely at their discretion. These disclosures to law
enforcement are in addition to other disclosure provisions in the rule.
For example, under paragraph § 164.512(f)(2) of this section, a covered
entity may disclose limited categories of protected health information
in response to a request from a law enforcement official for the purpose
of identifying or locating a suspect, fugitive, material witness, or
missing person. Paragraph § 164.512(f)(1) of this section permits a
covered entity to make disclosures that are required by other laws, such
as state mandatory reporting laws, or are required by legal process such
as court orders or grand jury subpoena.
**Section 164.512(k)---Uses and Disclosures for Specialized Government
Functions**
***Application to Military Services***
In the NPRM we would have permitted a covered entity providing health
care to Armed Forces personnel to use and disclose protected health
information for activities deemed necessary by appropriate military
command authorities to assure the proper execution of the military
mission, where the appropriate military authority had published by
notice in the *Federal Register* (In the NPRM, we proposed that the
Department of Defense would publish this *Federal Register* notice in
the future.) The final rule takes a similar approach while making some
modifications to the NPRM. One modification concerns the information
that will be required in the *Federal Register* notice. The NPRM would
have required a listing of (i) appropriate military command authorities;
(ii) the circumstances for which use or disclosure without individual
authorization would be required; and (iii) activities for which such use
or disclosure would occur in order to assure proper execution of the
military mission. In the final rule, we eliminate the third category and
also slightly modify language in the second category to read: "the
purposes for which the protected health information may be used or
disclosed."
An additional modification concerns the rule's application to foreign
military and diplomatic personnel. The NPRM would have excluded foreign
diplomatic and military personnel, as well as their dependents, from the
proposed definition of "individual," thereby excluding any protected
health information created about these personnel from the NPRM's privacy
protections. Foreign military and diplomatic personnel affected by this
provision include, for example, allied military personnel who are in the
United States for training. The final rule applies a more limited
exemption to foreign military personnel only (Foreign diplomatic
personnel will have the same protections granted to all other
individuals under the rule). Under the final rule, foreign military
personnel are not excluded from the definition of "individual." Covered
entities will be able to use and disclose protected health information
of foreign military personnel to their appropriate foreign military
authority for the same purposes for which uses and disclosures are
permitted for U.S. Armed Forces personnel under the notice to be
published in the *Federal Register*. Foreign military personnel do have
the same rights of access, notice, right to request privacy protection,
copying, amendment, and accounting as do other individuals pursuant to
§§ 164.520-164.526 (sections on access, notice, right to request privacy
protection for protected health information, amendment, inspection,
copying) of the rule.
The NPRM likewise would have exempted overseas foreign national
beneficiaries from the proposed rule's requirements by excluding them
from the definition of "individual." Under the final rule, these
beneficiaries no longer are exempt from the definition of "individual."
However, the rule's provisions do not apply to the individually
identifiable health information of overseas foreign nationals who
receive care provided by the Department of Defense, other federal
agencies, or by non-governmental organizations incident to U.S.
sponsored missions or operations.
The final rule includes a new provision to address separation or
discharge from military service. The preamble to the NPRM noted that
upon completion of individuals' military service, DOD and the Department
of Transportation routinely transfer entire military service records,
including protected health information to the Department of Veterans
Affairs so that the file can be retrieved quickly if the individuals or
their dependents apply for veterans benefits. The NPRM would have
required consent for such transfers. The final rule no longer requires
consent in such situations. Thus, under the final rule, a covered entity
that is a component of DOD or the Department of Transportation may
disclose to DVA the protected health information of an Armed Forces
member upon separation or discharge from military service for the
purpose of a determination by DVA of the individual's eligibility for or
entitlement to benefits under laws administered by the Secretary of
Veterans Affairs.
*Department of Veterans Affairs*
Under the NPRM, a covered entity that is a component of the Department
of Veterans Affairs could have used and disclosed protected health
information to other components of the Department that determine
eligibility for, or entitlement to, or that provide benefits under the
laws administered by the Secretary of Veterans Affairs. In the final
rule, we retain this approach.
*Application to Intelligence Community*
The NPRM would have provided an exemption from its proposed requirements
to the intelligence community. As defined in section 4 of the National
Security Act, 50 U.S.C. 401a, the intelligence community includes: the
Office of the Director of Central Intelligence Agency; the Office of the
Deputy Director of Central Intelligence; the National Intelligence
Council and other such offices as the Director may designate; the
Central Intelligence Agency; the National Security Agency; the Defense
Intelligence Agency; the National Imagery and Mapping Agency ; the
National Reconnaissance Office; other offices within the DOD for the
collection of specialized national intelligence through reconnaissance
programs; the intelligence elements of the Army, the Navy, the Air
Force, the Marine Corps, the Federal Bureau of Investigation, the
Department of the Treasury, and the Department of Energy; the Bureau of
Intelligence and Research of the Department of State; and such other
elements of any other department or agency as may be designated by the
President, or designated jointly by the Director of Central Intelligence
and the head of the department or agency concerned, as an element of the
intelligence community. It would have allowed a covered entity to use
without individual authorization protected health information of
employees of the intelligence community, and of their dependents, if
such dependents were being considered for posting abroad. The final rule
does not include such an exemption. Rather, the final rule does not
except intelligence community employees and their dependents from the
general rule requiring an authorization in order for protected health
information to be used and disclosed.
***National Security and Intelligence Activities***
The NPRM included a provision, in § 164.510(f) -- Disclosure for Law
Enforcement Purposes -- that would allow covered entities to disclose
protected health information without consent for the conduct of lawful
intelligence activities under the National Security Act, and in
connection with providing protective services to the President or to
foreign heads of state pursuant to 18 U.S.C. 3056 and 22 U.S.C.
2709(a)(3) respectively. The final rule preserves these exemptions, with
slight modifications, but moves them from proposed § 164.510(f) to §
164.512(k). It also divides this area into two paragraphs -- one called
\"National Security and Intelligence Activities\" and the second called
\"Protective services for the President and Others.\"
The final rule, with modifications, allows a covered entity to disclose
protected health information to an authorized federal official for the
conduct of lawful intelligence, counter-intelligence, and other national
security activities authorized by the National Security Act and
implementing authority (e.g., Executive Order 1233). The references to
"counter-intelligence and other national security activities" are new to
the final rule. The reference to "implementing authority (e.g. Executive
Order 12333)" is also new. The final rule also adds specificity to the
provision on protective services. It states that a covered entity may
disclose protected health information to authorized federal officials
for the provision of protective services to the President or other
persons as authorized by 18 U.S.C. 3056, or to foreign heads of state or
other persons as authorized by 22 U.S.C. 2709(a)(3), or for the conduct
of investigations authorized by 18 U.S.C. 871 and 879.
***Application to the State Department***
The final rule creates a narrower exemption for Department of State for
uses and disclosures of protected health information (1) for purposes of
a required security clearance conducted pursuant to Executive Orders
10450 and 12698; (2) as necessary to meet the requirements of
determining worldwide availability or availability for mandatory service
abroad under Sections 101(a)(4) and 504 of the Foreign Service Act; and
(3) for a family member to accompany a Foreign Service Officer abroad,
consistent with Section 101(b)(5) and 904 of the Foreign Service Act.
Regarding security clearances, nothing prevents any employer from
requiring that individuals provide authorization for the purpose of
obtaining a security clearance. For the Department of the State,
however, the final rule provides a limited exemption that allows a
component of the Department of State without an authorization to (1) use
protected health information to make medical suitability determinations
and (2) to disclose whether or not the individual was determined to be
medically suitable to authorized officials in the Department of State
for the purpose of a security clearance investigation conducted pursuant
to Executive Order 10450 and 12698.
Sections 101(a)(4) and 504 of the Foreign Service Act require that
Foreign Service members be available to serve in assignments throughout
the world. The final rule permits disclosures to officials who need
protected health information to determine availability for duty
worldwide.
Section 101(b)(5) of the Foreign Service Act requires the Department of
State to mitigate the impact of hardships, disruptions, and other
unusual conditions on families of Foreign Service Officers. Section 904
requires the Department to establish a health care program to promote
and maintain the physical and mental health of Foreign Service member
family members. The final rule permits disclosure of protected health
information to officials who need protected health information for a
family member to accompany a Foreign Service member abroad.
This exemption does not permit the disclosure of specific medical
conditions, diagnoses, or other specific medical information. It permits
only the disclosure of the limited information needed to determine
whether the individual should be granted a security clearance or whether
the Foreign Service member of his or her family members should be posted
to a certain overseas assignment.
***Application to Correctional Facilities***
The NPRM would have excluded the individually identifiable health
information of correctional facility inmates and detention facility
detainees from the definition of protected health information. Thus,
none of the NPRM's proposed privacy protections would have applied to
correctional facility inmates or to detention facility detainees while
they were in these facilities or after they had been released.
The final rule takes a different approach. First, to clarify that we are
referring to individuals who are incarcerated in correctional facilities
that are part of the criminal justice system or in the lawful custody of
a law enforcement official -- and not to individuals who are "detained"
for non-criminal reasons, for example, in psychiatric institutions -- §
164.512(k) covers disclosure of protected health information to
correctional institutions or law enforcement officials having such
lawful custody. In addition, where a covered health care provider is
also a health care component of a correctional institution, the final
rule permits the covered entity to use protected health information in
all cases in which it is permitted to disclose such information.
We define correctional institution as defined pursuant to 42 U.S.C.
13725(b)(1), as a "prison, jail, reformatory, work farm, detention
center, or halfway house, or any other similar institution designed for
the confinement or rehabilitation of criminal offenders." The rules
regarding disclosure and use of protected health information specified
in § 164.512(k) cover individuals who are in transitional homes, and
other facilities in which they are required by law to remain for
correctional reasons and from which they are not allowed to leave. This
section also covers individuals who are confined to psychiatric
institutions for correctional reasons and who are not allowed to leave;
however, it does not apply to disclosure of information about
individuals in psychiatric institutions for treatment purposes only, who
are not there due to a crime or under a mandate from the criminal
justice system. The disclosure rules described in this section do not
cover release of protected health information about individuals in
pretrial release, probation, or on parole, such persons are not
considered to be incarcerated in a correctional facility.
As described in § 164.512(k), correctional facility inmates'
individually identifiable health information is not excluded from the
definition of protected health information. When individuals are
released from correctional facilities, they will have the same privacy
rights that apply to all other individuals under this rule.
Section 164.512(k) of the final rule states that while individuals are
in a correctional facility or in the lawful custody of a law enforcement
official, covered entities (for example, the prison's clinic) can use or
disclose protected health information about these individuals without
authorization to the correctional facility or the law enforcement
official having custody as necessary for: (1) the provision of health
care to such individuals; (2) the health and safety of such individual
or other inmates; (3) the health and safety of the officers of employees
of or others at the correctional institution; and (4) the health and
safety of such individuals and officers or other persons responsible for
the transporting of inmates or their transfer from one institution or
facility to another; (5) law enforcement on the premises of the
correctional institution; and (6) the administration and maintenance of
the safety, security, and good order of the correctional institution.
This section is intended to allow, for example, a prison's doctor to
disclose to a van driver transporting a criminal that the individual is
a diabetic and frequently has seizures, as well as information about the
appropriate action to take if the individual has a seizure while he or
she is being transported.
We permit covered entities to disclose protected health information
about these individuals if the correctional institution or law
enforcement official represents that the protected health information is
necessary for these purposes. Under 164.514(h), a covered entity may
reasonably rely on the representation of such public officials.
***Application to Public Benefits Programs Required to Share Eligibility
Information***
We create a new provision for covered entities that are a government
program providing public benefits. This provision allows the following
disclosures of protected health information.
First, where other law requires or expressly authorizes information
relating to the eligibility for, or enrollment in more than one public
program to be shared among such public programs and/or maintained in a
single or combined data system, a public agency that is administering a
health plan may maintain such a data base and may disclose information
relating to such eligibility or enrollment in the health plan to the
extent authorized by such other law.
Where another public entity has determined that the appropriate balance
between the need for efficient administration of public programs and
public funds and individuals' privacy interests is to allow information
sharing for these limited purposes, we do not upset that determination.
For example, section 1137 of the Social Security Act requires a variety
of public programs, including the Social Security program, state
medicaid programs, the food stamp program, certain unemployment
compensation programs, and others, to participate in a joint income and
eligibility verification system. Similarly, section 222 of the Social
Security Act requires the Social Security Administration to provide
information to certain state vocational rehabilitation programs for
eligibility purposes. In some instances, it is a covered entity that
first collects or creates the information that is then disclosed for
these systems. We do not prohibit those disclosures.
This does not authorize these entities to share information for claims
determinations or ongoing administration of these public programs. This
provision is limited to the agencies and activities described above.
Second, § 164.512(k)(6) permits a covered entity that is a government
agency administering a government program providing public benefits to
disclose protected health information relating to the program to another
covered entity that is a government agency administering a government
program providing public benefits if the programs serve the same or
similar populations and the disclosure of protected health information
is necessary to coordinate the covered functions of such programs.
The second provision permits covered entities that are government
program providing public benefits that serve the same or similar
populations to share protected health information for the purposes of
coordinating covered functions of the programs and for general
management and administration relating to the covered functions of the
programs. Often, similar government health programs are administered by
different government agencies. For example, in some states, the Medicaid
program and the State Children's Health Insurance Program are
administered by different agencies, although they serve similar
populations. Many states coordinate eligibility for these two programs,
and sometimes offer services through the same delivery systems and
contracts. This provision would permit the covered entities
administering these programs to share protected health information of
program participants to coordinate enrollment and services and to
generally improve the health care operations of the programs. We note
that this provision does not authorize the agencies to use or disclose
the protected health information that is shared for purposes other than
as provided for in this paragraph.
**Section 164.512(l)---Disclosures For Workers' Compensation**
The NPRM did not contain special provisions permitting covered entities
to disclose protected health information for the purpose of complying
with workers' compensation and similar laws. Under HIPAA, workers'
compensation and certain other forms of insurance (such as automobile or
disability insurance) are "excepted benefits." Insurance carriers that
provide this coverage are not covered entities even though they provide
coverage for health care services. To carry out their insurance
functions, these non-covered insurers typically seek individually
identifiable health information from covered health care providers and
group health plans. In drafting the proposed rule, the Secretary was
faced with the challenge of trying to carry out the statutory mandate of
safeguarding the privacy of individually identifiable health information
by regulating the flow of such information from covered entities while
at the same time respecting the Congressional intent to shield workers'
compensation carriers and other excepted benefit plans from regulation
as covered entities.
In the proposed rule we allowed covered entities to disclose protected
health information without individual consent for purposes of treatment,
payment or health care operations - even when the disclosure was to a
non-covered entity such as a workers' compensation carrier. In addition,
we allowed protected health information to be disclosed if required by
state law for purposes of determining eligibility for coverage or
fitness for duty. The proposed rule also required that whenever a
covered entity disclosed protected health information to a non-covered
entity, even though authorized under the rule, the individual who was
the subject of the information must be informed that the protected
health information was no longer subject to privacy protections.
Like other disclosures under the proposed rule, the information provided
to workers' compensation carriers for treatment, payment or health care
operations was subject to the minimum necessary standard. However, to
the extent that protected health information was disclosed to the
carrier because it was required by law, it was not subject to the
minimum necessary standard. In addition, individuals were entitled to an
accounting when protected health information was disclosed for purposes
other than treatment, payment or health care operations.
In the final rule, we include a new provision in this section that
clarifies the ability of covered entities to disclose protected health
information without authorization to comply with workers' compensation
and similar programs established by law that provide benefits for
work-related illnesses or injuries without regard to fault. Although
most disclosures for workers' compensation would be permissible under
other provisions of this rule, particularly the provisions that permit
disclosures for payment and as required by law, we are aware of the
significant variability among workers' compensation and similar laws,
and include this provision to ensure that existing workers' compensation
systems are not disrupted by this rule. We note that the minimum
necessary standard applies to disclosures under this paragraph.
Under this provision, a covered entity may disclose protected health
information regarding an individual to a party responsible for payment
of workers' compensation benefits to the individual, and to an agency
responsible for administering and /or adjudicating the individual's
claim for workers' compensation benefits. For purposes of this
paragraph, workers' compensation benefits include benefits under
programs such as the Black Lung Benefits Act, the federal Employees'
Compensation Act, the Longshore and Harbor Workers' Compensation Act,
and the Energy Employees' Occupational Illness Compensation Program Act.
***Additional Considerations***
We have included a general authorization for disclosures under workers'
compensation systems to be consistent with the intent of Congress, which
defined workers' compensation carriers as excepted benefits under HIPAA.
We recognize that there are significant privacy issues raised by how
individually identifiable health information is used and disclosed in
workers' compensation systems, and believe that states or the federal
government should enact standards that address those concerns.
**SECTION 164.514---OTHER PROCEDURAL REQUIREMENTS RELATING TO USES AND
DISCLOSURES OF PROTECTED HEALTH INFORMATION**
**Section 164.514(a)-(c)---De-identification**
In § 164.506(d) of the NPRM, we proposed that the privacy standards
would apply to "individually identifiable health information," and not
to information that does not identify the subject individual. The
statute defines individually identifiable health information as certain
health information:
\(i\) Which identifies the individual, or
> \(ii\) With respect to which there is a reasonable basis to believe
> that the information can be used to identify the individual.
As we pointed out in the NPRM, difficulties arise because, even after
removing obvious identifiers (e.g., name, social security number,
address), there is always some probability or risk that any information
about an individual can be attributed to that individual.
The NPRM proposed two alternative methods for determining when
sufficient identifying information has been removed from a record to
render the information de-identified and thus not subject to the rule.
First, the NPRM proposed the establishment of a "safe harbor": if all of
a list of 19 specified items of information had been removed, and the
covered entity had no reason to believe that the remaining information
could be used to identify the subject of the information (alone or in
combination with other information), the covered entity would have been
presumed to have created de-identified information. Second, the NPRM
proposed an alternative method so that covered entities with sufficient
statistical experience and expertise could remove or encrypt a
combination of information different from the enumerated list, using
commonly accepted scientific and statistical standards for disclosure
avoidance. Such covered entities would have been able to include
information from the enumerated list of 19 items if they (1) believed
that the probability of re-identification was very low, and (2) removed
additional information if they had a reasonable basis to believe that
the resulting information could be used to re-identify someone.
We proposed that covered entities and their business partners be
permitted to use protected health information to create de-identified
health information using either of these two methods. Covered entities
would have been permitted to further use and disclose such de-identified
information in any way, provided that they did not disclose the key or
other mechanism that would have enabled the information to be
re-identified, and provided that they reasonably believed that such use
or disclosure of de-identified information would not have resulted in
the use or disclosure of protected health information.
A number of examples were provided of how valuable such de-identified
information would be for various purposes. We expressed the hope that
covered entities, their business partners, and others would make greater
use of de-identified health information than they do today, when it is
sufficient for the purpose, and that such practice would reduce the
burden and the confidentiality concerns that result from the use of
individually identifiable health information for some of these purposes.
In §§ 164.514(a)-(c) of this final rule, we make several modifications
to the provisions for de-identification. First, we explicitly adopt the
statutory standard as the basic regulatory standard for whether health
information is individually identifiable health information under this
rule. Information is not individually identifiable under this rule if it
does not identify the individual, or if the covered entity has no
reasonable basis to believe it can be used to identify the individual.
Second, in the implementation specifications we reformulate the two ways
in which a covered entity can demonstrate that it has met the standard.
One way a covered entity may demonstrate that it has met the standard is
if a person with appropriate knowledge and experience applying generally
accepted statistical and scientific principles and methods for rendering
information not individually identifiable makes a determination that the
risk is very small that the information could be used, either by itself
or in combination with other available information, by anticipated
recipients to identify a subject of the information. The covered entity
must also document the analysis and results that justify the
determination. We provide guidance regarding this standard in our
responses to the comments we received on this provision.
We also include an alternate, safe harbor, method by which covered
entities can demonstrate compliance with the standard. Under the safe
harbor, a covered entity is considered to have met the standard if it
has removed all of a list of enumerated identifiers, and if the covered
entity has no actual knowledge that the information could be used alone
or in combination to identify a subject of the information. We note that
in the NPRM, we had proposed that to meet the safe harbor, a covered
entity must have "no reason to believe" that the information remained
identifiable after the enumerated identifiers were removed. In the final
rule, we have changed the standard to one of actual knowledge in order
to provide greater certainty to covered entities using the safe harbor
approach.
In the safe harbor, we explicitly allow age and some geographic location
information to be included in the de-identified information, but all
dates directly related to the subject of the information must be removed
or limited to the year, and zip codes must be removed or aggregated (in
the form of most 3-digit zip codes) to include at least 20,000 people.
Extreme ages of 90 and over must be aggregated to a category of 90+ to
avoid identification of very old individuals. Other demographic
information, such as gender, race, ethnicity, and marital status are not
included in the list of identifiers that must be removed.
The intent of the safe harbor is to provide a means to produce some
de-identified information that could be used for many purposes with a
very small risk of privacy violation. The safe harbor is intended to
involve a minimum of burden and convey a maximum of certainty that the
rules have been met by interpreting the statutory \"reasonable basis to
believe that the information can be used to identify the individual\" to
produce an easily followed, cook book approach.
Covered entities may use codes and similar means of marking records so
that they may be linked or later re-identified, if the code does not
contain information about the subject of the information (for example,
the code may not be a derivative of the individual's social security
number), and if the covered entity does not use or disclose the code for
any other purpose. The covered entity is also prohibited from disclosing
the mechanism for re-identification, such as tables, algorithms, or
other tools that could be used to link the code with the subject of the
information.
Language to clarify that covered entities may contract with business
associates to perform the de-identification has been added to the
section on business associates.
**Section 164.514(d)---Minimum Necessary**
The proposed rule required a covered entity to make all reasonable
efforts not to use or disclose more than the minimum amount of protected
health information necessary to accomplish the intended purpose of the
use or disclosure (proposed § 164.506(b)).
The proposed minimum necessary standard did not apply to uses or
disclosures that were made by covered entities at the request of the
individual, either to allow the individual access to protected health
information about him or her or pursuant to an authorization initiated
by the individual. The requirement also did not apply to uses and
disclosures made: pursuant to the compliance and enforcement provisions
of the rule; as required by law and permitted by the regulation without
individual authorization; by a covered health care provider to a health
plan, when the information was requested for audit and related purposes.
Finally, the standard did not apply to the HIPAA administrative
simplification transactions.
The proposed implementation specifications would have required a covered
entity to have procedures to: (i) identify appropriate persons within
the entity to determine what information should be used or disclosed
consistent with the minimum necessary standard; (ii) ensure that those
persons make the minimum necessary determinations, when required; and
(iii) within the limits of the entity's technological capabilities,
provide for the making of such determinations individually. The proposal
allowed a covered entity, when making disclosures to public officials
that were permitted without individual authorization but not required by
other law, to reasonably rely on the representations of such officials
that the information requested was the minimum necessary for the stated
purpose(s).
The preamble provided further guidance. The preamble explained that
covered entities could not have general policies of approving all
requests (or all requests of a particular type) without carefully
considering certain criteria (see "Criteria," below) as well as other
information specific to the request. The minimum necessary determination
would have needed to be consistent with and directly related to the
purpose of the use or disclosure. Where there was ambiguity regarding
the information to be used or disclosed, the preamble directed covered
entities to interpret the "minimum necessary" standard to "require" the
covered entity to make some effort to limit the amount of protected
health information used/disclosed.
The proposal would have required the minimum necessary determination to
take into consideration the ability of a covered entity to delimit the
amount of information used or disclosed. The preamble noted that these
determinations would have to be made under a reasonableness standard:
covered entities would be required to make reasonable efforts and to
incur reasonable expense to limit the use or disclosure. The
"reasonableness" of limiting particular uses or disclosures was to be
determined based on the following factors (which were not included in
the regulatory text):
a\. The extent to which the use or disclosure would extend the number of
persons with access to the protected health information.
b\. The likelihood that further uses or disclosures of the protected
health information could occur.
c\. The amount of protected health information that would be used or
disclosed.
d\. The importance of the use or disclosure.
e\. The potential to achieve substantially the same purpose with
de‑identified information. For disclosures, each covered entity would
have been required to have policies for determining when protected
health information must be stripped of identifiers.
f\. The technology available to limit the amount of protected health
information used/disclosed.
g\. The cost of limiting the use/disclosure.
h\. Any other factors that the covered entity believed were relevant to
the determination.
The proposal shifted the "minimum necessary" burden off of covered
providers when they were being audited by a health plan. The preamble
explained that the duty would have been shifted to the payor to request
the minimum necessary information for the audit purpose, although the
regulatory text did not include such a requirement. Outside of the audit
context, the preamble stated that a health plan would be required, when
requesting a disclosure, to limit its requests to the information
required to achieve the purpose of the request; the regulation text did
not include this requirement.
The preamble stated that disclosure of an entire medical record, in
response to a request for something other than the entire medical
record, would presumptively violate the minimum necessary standard.
This final rule significantly modifies the proposed requirements for
implementing the minimum necessary standard. For all uses and many
disclosures and requests for disclosures from other covered entities, we
require covered entities to implement policies and procedures for
"minimum necessary" uses and disclosures. Implementation of such
policies and procedures is required in lieu of making the "minimum
necessary" determination for each separate use or disclosure as
discussed in the proposal. Disclosures to or requests by a health care
provider for treatment purposes are not subject to the standard (see §
164.502).
Specifically (and as further described below), the proposed requirement
for individual review of all uses of protected health information is
replaced with a requirement for covered entities to implement policies
and procedures that restrict access and uses based on the specific roles
of members of the covered entity's workforce. Routine disclosures also
are not subject to individual review; instead, covered entities must
implement policies and procedures to limit the protected health
information in routine disclosures to the minimum necessary to achieve
the purpose of that type of disclosure. The proposed exclusion of
disclosures to health plans for audit purposes is deleted and replaced
with a general requirement that covered entities must limit requests to
other covered entities for individually identifiable health information
to what is reasonably necessary for the use or disclosure intended. The
other exclusions from the standard are unchanged from the proposed rule
(e.g., for individuals' access to information about themselves, pursuant
to an authorization initiated by the individual, for enforcement of this
rule, as required by law).
The language of the basic "standard" itself is largely unchanged;
covered entities must make reasonable efforts to use or disclose or to
request from another covered entity, only the minimum amount of
protected health information required to achieve the purpose of a
particular use or disclosure. We delete the word "all" from the
"reasonable efforts" that covered entities must take in making a
"minimum necessary" determination. The implementation specifications are
significantly modified, and differ based on whether the activity is a
use or disclosure.
Similarly, a "minimum necessary" disclosure for oversight purposes in
accordance with § 164.512(d) could include large numbers of records to
allow oversight agencies to perform statistical analyses to identify
deviations in payment or billing patterns, and other data analyses.
***Uses of Protected Health Information***
A covered entity must implement policies and procedures to identify the
persons or classes of persons in the entity's workforce who need access
to protected health information to carry out their duties, the category
or categories of protected health information to which such persons or
classes need access, and the conditions, as appropriate, that would
apply to such access. Covered entities must also implement policies and
procedures to limit access to only the identified persons, and only to
the identified protected health information. The policies and procedures
must be based on reasonable determinations regarding the persons or
classes of persons who require protected health information, and the
nature of the health information they require, consistent with their job
responsibilities.
For example, a hospital could implement a policy that permitted nurses
access to all protected health information of patients in their ward
while they are on duty. A health plan could permit its underwriting
analysts unrestricted access to aggregate claims information for rate
setting purposes, but require documented approval from its department
manager to obtain specific identifiable claims records of a member for
the purpose of determining the cause of unexpected claims that could
influence renewal premium rate setting.
The "minimum necessary"standard is intended to reflect and be consistent
with, not override, professional judgment and standards. For example, we
expect that covered entities will implement policies that allow persons
involved in treatment to have access to the entire record, as needed.
***Disclosures of Protected Health Information***
For any type of disclosure that is made on a routine, recurring basis, a
covered entity must implement policies and procedures (which may be
standard protocols) that permit only the disclosure of the minimum
protected health information reasonably necessary to achieve the purpose
of the disclosure. Individual review of each disclosure is not required.
Instead, under § 164.514(d)(3), these policies and procedures must
identify the types of protected health information to be disclosed, the
types of persons who would receive the protected health information, and
the conditions that would apply for such access. We recognize that
specific disclosures within a type may vary, and require that the
policies address what is the norm for the type of disclosure involved.
For example, a covered entity may decide to participate in research
studies and therefore establish a protocol to minimize the information
released for such purposes, e.g., by requiring researchers requesting
disclosure of data contained in paper-based records to review the paper
records on-site and to abstract only the information relevant to the
research. Covered entities must develop policies and procedures (which
may be standard protocols) to apply to disclosures to routinely hired
types of business associates. For instance, a standard protocol could
describe the subset of information that may be disclosed to medical
transcription services.
For non-routine disclosures, a covered entity must develop reasonable
criteria for determining, and limiting disclosure to, only the minimum
amount of protected health information necessary to accomplish the
purpose of the disclosure. They also must establish and implement
procedures for reviewing such requests for disclosures on an individual
basis in accordance with these criteria.
Disclosures to health care providers for treatment purposes are not
subject to these requirements.
Covered entities' policies and procedures must provide that disclosure
of an entire medical record will not be made except pursuant to policies
which specifically justify why the entire medical record is needed. For
instance, disclosure of all protected health information to an
accreditation group would not necessarily violate the regulation,
because the entire record may be the "minimum necessary" for its
purpose; covered entities may establish policies allowing for and
justifying such a disclosure. Disclosure of the entire medical record
absent such documented justification is a presumptive violation of this
rule.
***Requests for Protected Health Information***
For requests for protected health information from other covered
entities made on a routine, recurring basis, the requesting covered
entities' policies and procedures may establish standard protocols
describing what information is reasonably necessary for the purposes and
limiting their requests to only that information, in lieu of making this
determination individually for each request. For all other requests, the
policies and procedures must provide for review of the requests on an
individualized basis. A request by a covered entity may be made in order
to obtain information that will subsequently be disclosed to a third
party, for example, to obtain information that will then be disclosed to
a business associate for quality assessment purposes; such requests are
subject to this requirement.
Covered entities' policies and procedures must provide that requests for
an entire medical record will not be made except pursuant to policies
which specifically justify why the entire medical record is needed. For
instance, a health plan's request for all protected health information
from an applicant for insurance would not necessarily violate the
regulation, because the entire record may be the "minimum necessary" for
its purpose. Covered entities may establish policies allowing for and
justifying such a request. A request for the entire medical record
absent such documented justification is a presumptive violation of this
rule.
***Reasonable Reliance***
A covered entity may reasonably rely on the assertion of a requesting
covered entity that it is requesting the minimum protected health
information necessary for the stated purpose. A covered entity may also
rely on the assertions of a professional (such as attorneys and
accountants) who is a member of its workforce or its business associate
regarding what protected health information he or she needs in order to
provide professional services to the covered entity when such person
represents that the information requested is the minimum necessary. As
we proposed in the NPRM, covered entities making disclosures to public
officials that are permitted under § 164.512 may rely on the
representation of a public official that the information requested is
the minimum necessary.
***Uses and Disclosures for Research***
In making a minimum necessary determination regarding the use or
disclosure of protected health information for research purposes, a
covered entity may reasonably rely on documentation from an IRB or
privacy board describing the protected health information needed for
research and consistent with the requirements of § 164.512(i), "Uses and
Disclosures for Research Purposes." A covered entity may also reasonably
rely on a representation made by the requestor that the information is
necessary to prepare a research protocol or for research on decedents.
The covered entity must ensure that the representation or documentation
of IRB or privacy board approval it obtains from a researcher describes
with sufficient specificity the protected health information necessary
for the research. Covered entities must use or disclose such protected
health information in a manner that minimizes the scope of the use or
disclosure.
***Standards for Electronic Transactions***
We clarify that under § 164.502(b)(2)(v), covered entities are not
required to apply the minimum necessary standard to the required or
situational data elements specified in the implementation guides for
HIPAA administrative simplification standard transactions in the
Transactions Rule. The standard does apply for uses or disclosures in
standard transactions that are made at the option of the covered entity.
**Section 164.514(e)---Marketing**
In the proposed rule, we would have required covered entities to obtain
the individual's authorization in order to use or disclose protected
health information to market health and non-health items and services.
We have made a number of changes in the final rule that relate to
marketing. In the final rule, we retain the general rule that covered
entities must obtain the individual's authorization before making uses
or disclosures of protected health information for marketing. However,
we add a new definition of "marketing" that clarifies that certain
activities, such as communications made by a covered entity for the
purpose of describing the products and services it provides, are not
marketing. See § 164.501 and the associated preamble regarding the
definition of marketing. In the final rule we also permit covered
entities to use and disclose protected health information for certain
marketing activities without individual authorization, subject to
conditions enumerated at § 164.514(e).
First, § 164.514(e) permits a covered entity to use or disclose
protected health information without individual authorization to make a
marketing communication if the communication occurs in a face-to-face
encounter with the individual. This provision would permit a covered
entity to discuss any services and products, including those of a
third-party, without restriction during a face-to-face communication. A
covered entity also could give the individual sample products or other
information in this setting.
Second, we permit a covered entity to use or disclose protected health
information without individual authorization to make marketing
communications involving products or services of only nominal value.
This provision ensures that covered entities do not violate the rule
when they distribute calendars, pens and other merchandise that
generally promotes the covered entity.
Third, we permit a covered entity to use or disclose protected health
information without individual authorization to make marketing
communications about the health-related products or services of the
covered entity or of a third party if the communication: (1) identifies
the covered entity as the party making the communication; (2) to the
extent that the covered entity receives direct or indirect remuneration
from a third-party for making the communication, prominently states that
fact; (3) except in the case of a general communication (such as a
newsletter), contains instructions describing how the individual may
opt-out of receiving future communications about health-related products
and services; and (4) where protected health information is used to
target the communication about a product or service to individuals based
on their health status or health condition, explains why the individual
has been targeted and how the product or service relates to the health
of the individual. The final rule also requires a covered entity to make
a determination, prior to using or disclosing protected health
information to target a communication to individuals based on their
health status or condition, that the product or service may be
beneficial to the health of the type or class of individual targeted to
receive the communication.
This third provision accommodates the needs of health care entities to
be able to discuss their own health-related products and services, or
those of third parties, as part of their everyday business and as part
of promoting the health of their patients and enrollees. The provision
is restricted to uses by covered entities or disclosures to their
business associates pursuant to a contract that requires
confidentiality, ensuring that protected health information is not
distributed to third parties. To provide individuals with a better
understanding of how their protected health information is being used
for marketing, the provision requires that the communication identify
that the covered entity is the source of the communication; a covered
entity may not send out information about the product of a third party
without disclosing to the individual where the communication originated.
We also require covered entities to disclose any direct or indirect
remuneration from third parties. This requirement permits individuals to
better understand why they are receiving a communication, and to weigh
the extent to which their information is being used to promote their
health or to enrich the covered entity. Covered entities also are
required to include in their communication (unless it is a general
newsletter or similar device) how the individual may prevent further
communications about health-related products and services. This
provision enhances individuals' control over how their information is
being used. Finally, where a covered entity targets communications to
individuals on the basis of their health status or condition, we require
that the entity make a determination that the product or service being
communicated may be beneficial to the health of the type of individuals
targeted, and that the communication to the targeted individuals explain
why they have been targeted and how the product or service relates to
their health. This final provision balances the advantages that accrue
from health care entities informing their patients and enrollees of new
or valuable health products with individuals' expectations that their
protected health information will be used to promote their health.
**Section 164.514(f)---Fundraising**
We proposed in the NPRM to require covered entities to obtain
authorization from an individual in order to use the individual's
protected health information for fundraising activities.
As noted in § 164.501, in the final rule we define fundraising on behalf
of a covered entity to be a health care operation. In § 164.514, we
permit a covered entity to use protected health information without
individual authorization for fundraising on behalf of itself, provided
that it limits the information that it uses to demographic information
about the individual and the dates that it has provided service to the
individual (see the § 164.501 discussion of "health care operations").
In addition, we require fundraising materials to explain how the
individual may opt out of any further fundraising communications, and
covered entities are required to honor such requests. We permit a
covered entity to disclose the limited protected health information to a
business associate for fundraising on its own behalf. We also permit a
covered entity to disclose the information to an institutionally related
foundation.
By "institutionally related foundation," we mean a foundation that
qualifies as a nonprofit charitable foundation under sec. 501(c)(3) of
the Internal Revenue Code and that has in its charter statement of
charitable purposes an explicit linkage to the covered entity. An
institutionally related foundation may, as explicitly stated in its
charter, support the covered entity as well as other covered entities or
health care providers in its community. For example, a covered hospital
may disclose for fundraising on its own behalf the specified protected
health information to a nonprofit foundation established for the
specific purpose of raising funds for the hospital or to a foundation
that has as its mission the support of the members of a particular
hospital chain that includes the covered hospital. The term does not
include an organization with a general charitable purpose, such as to
support research about or to provide treatment for certain diseases,
that may give money to a covered entity, because its charitable purpose
is not specific to the covered entity.
**Section 164.514(g)---Underwriting**
As described under the definition of "health care operations" (§
164.501), protected health information may be used or disclosed for
underwriting and other activities relating to the creation, renewal, or
replacement of a contract of health insurance or health benefits. This
final rule includes a requirement, not included in the NPRM, that health
plans receiving such information for these purposes may not use or
disclose it for any other purpose, except as may be required by law, if
the insurance or benefits contract is not placed with the health plan.
**Section 164.514(h)---Verification of Identity and Authority of Persons
Requesting Protected Health Information**
***Disclosure of Protected Health Information***
We reorganize the provision regarding verification of identity of
individuals requesting protected health information to improve clarity,
but we retain the substance of requirements proposed in the NPRM in §
164.518(c), as follows.
The covered entity must establish and use written policies and
procedures (which may be standard protocols) that are reasonably
designed to verify the identity and authority of the requestor where the
covered entity does not know the person requesting the protected health
information. The knowledge of the person may take the form of a known
place of business, address, phone or fax number, as well a known human
being. Where documentation, statements or representations, whether oral
or written, from the person requesting the protected health information
is a condition of disclosure under this rule or other law, this
verification must involve obtaining such documentation statement, or
representation. In such a case, additional verification is only required
where this regulation (or other law) requires additional proof of
authority and identity.
The NPRM proposed that covered entities would be permitted to rely on
the required documentation of IRB or privacy board approval to
constitute sufficient verification that the person making the request
was a researcher and that the research is authorized. The final rule
retains this provision.
For most disclosures, verifying the authority for the request means
taking reasonable steps to verify that the request is lawful under this
regulation. Additional proof is required by other provisions of this
regulation where the request is made pursuant to § 164.512 for national
priority purposes. Where the person requesting the protected health
information is a public official, covered entities must verify the
identity of the requester by examination of reasonable evidence, such as
a written statement of identity on agency letterhead, an identification
badge, or similar proof of official status. Similarly, covered entities
are required to verify the legal authority supporting the request by
examination of reasonable evidence, such as a written request provided
on agency letterhead that describes the legal authority for requesting
the release. Where § 164.512 explicitly requires written evidence of
legal process or other authority before a disclosure may be made, a
public official\'s proof of identity and the official\'s oral statement
that the request is authorized by law are not sufficient to constitute
the required reasonable evidence of legal authority; under these
provisions, only the required written evidence will suffice.
In some circumstances, a person or entity acting on behalf of a
government agency may make a request for disclosure of protected health
information under these subsections. For example, public health agencies
may contract with a nonprofit agency to collect and analyze certain
data. In such cases, the covered entity is required to verify the
requestor\'s identity and authority through examination of reasonable
documentation that the requestor is acting on behalf of the government
agency. Reasonable evidence includes a written request provided on
agency letterhead that describes the legal authority for requesting the
release and states that the person or entity is acting under the
agency\'s authority, or other documentation, including a contract, a
memorandum of understanding, or purchase order that confirms that the
requestor is acting on behalf of the government agency.
In some circumstances, identity or authority will be verified as part of
meeting the underlying requirements for disclosure. For example, a
disclosure under § 164.512(j)(1)(i) to avert an imminent threat to
safety is lawful only if made in the good faith belief that the
disclosure is necessary to prevent or lessen a serious and imminent
threat to the health or safety of a person or the public, and to a
person reasonably able to prevent or lessen the threat. If these
conditions are met, no further verification is needed. In such
emergencies, the covered entity is not required to demand written proof
that the person requesting the protected health information is legally
authorized. Reasonable reliance on verbal representations are
appropriate in such situations.
Similarly, disclosures permitted under § 164.510(a) for facility
directories may be made to the general public; the covered entity's
policies and procedures do not need to address verifying the identity
and authority for these disclosures. In § 164.510(b) we do not require
verification of identity for persons assisting in an individual\'s care
or for notification purposes. For disclosures when the individual is not
present, such as when a friend is picking up a prescription, we allow
the covered entity to use professional judgment and experience with
common practice to make reasonable inferences.
Under § 164.524, a covered entity is required to give individuals access
to protected health information about them (under most circumstances).
Under the general verification requirements of § 164.514(h), the covered
entity is required to take reasonable steps to verify the identity of
the individual making the request. We do not mandate particular
identification requirements (e.g., drivers licence, photo ID), but
rather leave this to the discretion of the covered entity. The covered
entity must also establish and document procedures for verification of
identity and authority of personal representatives, if not known to the
entity. For example, a health care provider can require a copy of a
power of attorney, or can ask questions to determine that an adult
acting for a young child has the requisite relationship to the child.
In Subpart C of Part 160, we require disclosure to the Secretary for
purposes of enforcing this regulation. When a covered entity is asked by
the Secretary to disclose protected health information for compliance
purposes, the covered entity must verify the same information that it is
required to verify for any other law enforcement or oversight request
for disclosure.
***Use of Protected Health Information***
The proposed rule's verification requirements applied to any person
requesting protected health information, whether for a use or a
disclosure. In the final regulation, the verification provisions apply
only to disclosures of protected health information. The requirements in
§ 164.514(d), for implementation of policies and procedures for 'minimum
necessary' uses of protected health information, are sufficient to
ensure that only appropriate persons within a covered entity will have
access to protected health information.
**SECTION 164.520---NOTICE OF PRIVACY PRACTICES FOR PROTECTED HEALTH
INFORMATION**
**Section 164.520(a)---Right to Notice**
We proposed to establish a right for individuals to receive adequate
notice of how covered health care providers and health plans use and
disclose protected health information, and of the individual's rights
with respect to that information.
In the final regulation, we retain the general right for individuals to
receive and the requirement for covered entities to produce a notice of
privacy practices, with significant modifications to the content and
distribution requirements.
We also modify the requirements with respect to certain covered
entities. First, in § 164.500(b)(2), we clarify that a health care
clearinghouse that creates or receives protected health information
other than as a business associate of a covered entity must produce a
notice. If a health care clearinghouse creates or receives protected
health information only as a business associate of other covered
entities, it is not required to produce a notice.
Second, in § 164.520(a)(2), we clarify the notice requirements with
respect to group health plans. Individuals who receive health benefits
under a group health plan other than through insurance are entitled to a
notice from the group health plan; self-insured group health plans must
maintain a notice that meets the requirements of this section and must
provide the notice in accordance with the requirements of § 164.520(c).
At a minimum, the self-insured group health plan's notice must describe
the group health plan's privacy practices with respect to the protected
health information it creates or receives through its self-insured
arrangements. For example, if a group health plan maintains both
fully-insured and self-insured arrangements, the group health plan must,
at a minimum, maintain and provide a notice that describes its privacy
practices with respect to protected health information it creates or
receives through the self-insured arrangements. This notice would be
distributed to all participants in the self-insured arrangements (in
accordance with § 164.520(c)(1)) and would also be available on request
to other persons, including participants in the fully-insured
arrangements.
Individuals who receive health benefits under a group health plan
through an insurance contract (i.e., a fully-insured group health plan)
are entitled to a notice from the issuer or HMO through which they
receive their health benefits. The health insurance issuer or HMO must
maintain and provide the notice in accordance with § 164.520(c)(1). In
addition, some fully-insured group health plans are required to maintain
and provide a notice of the group health plan's privacy practices. If a
group health plan provides health benefits solely through an insurance
contract with a health insurance issuer or HMO, and the group health
plan creates or receives protected health information in addition to
summary information (as defined in § 164.504(a)) and information about
individuals' enrollment in or disenrollment from a health insurance
issuer or HMO offered by the group health plan, the group health plan
must maintain a notice that meets the requirements of this section and
must provide the notice upon request of any person. The group health
plan is not required to meet the other distribution requirements of §
164.520(c)(1). Individuals enrolled in such group health plans have the
right to notice of the health insurance issuer or HMO's privacy
practices and, on request, to notice of the group health plan's privacy
practices. If the group health plan, however, provides health benefits
solely through an insurance contract with a health insurance issuer or
HMO, and the only protected health information the group health plan
creates or receives is summary information (as defined in § 164.504(a))
and information about individuals' enrollment in or disenrollment from a
health insurance issuer or HMO offered by the group health plan, the
group health plan is not required to maintain or provide a notice under
this section. In this case, the individuals enrolled in the group health
plan would receive notice of the health insurance issuer or HMO's
privacy practices, but would not be entitled to notice of the group
health plan's privacy practices.
Third, in § 164.520(a)(3), we clarify that inmates do not have a right
to notice under this section and a correctional institution that is a
covered entity is not required to produce a notice. No person, including
a current or former inmate, has the right to notice of such a covered
entity's privacy practices.
**Section 164.520(b)---Content of Notice**
We proposed to require the notice to be written in plain language and
contain each of the following elements: a description of the uses and
disclosures expected to be made without individual authorization;
statements that other uses and disclosures would be made only with the
individual's authorization and that the individual could revoke such
authorization; descriptions of the rights to request restrictions,
inspect and copy protected health information, amend or correct
protected health information, and receive an accounting of disclosures
of protected health information; statements about the entity's legal
requirements to protect privacy, provide notice, and adhere to the
notice; a statement about how individuals would be informed of changes
to the entity's policies and procedures; instructions on how to make
complaints with the entity or Secretary; the name and telephone number
of a contact person or office; and the date the notice was produced. We
provided a model notice of information policies and procedures for
covered health care providers.
In § 164.520(b), and immediately below in this preamble, we describe the
notice content requirements for the final rule. As described in detail,
below, we make substantial changes to the uses and disclosures of
protected health information that must be described in the notice.
Unlike the proposed rule, we do not include a model notice. We intend to
develop further guidance on notice requirements prior to the compliance
date of this rule. In this section of the final rule, we also refer to
the covered entity's privacy "practices," rather than its "policies and
procedures." The purpose of this change in vocabulary is to clarify that
a covered entity's "policies and procedures" is a detailed documentation
of all of the entity's privacy practices as required under this rule,
not just those described in the notice. For example, we require covered
entities to have policies and procedures implementing the requirements
for "minimum necessary" uses and disclosures of protected health
information, but these policies and procedures need not be reflected in
the entity's notice. Similarly, we require covered entities to have
policies and procedures for assuring individuals access to protected
health information about them. While such policies and procedures will
need to include documentation of the designated record sets subject to
access, who is authorized to determine when information will be withheld
from an individual, and similar details, the notice need only explain
generally that individuals have the right to inspect and copy
information about them, and tell individuals how to exercise that right.
A covered entity that adopts and follows the notice content and
distribution requirements described below will have provided adequate
notice. However, the requirements for the content of the notice are not
intended to be exclusive. As with the rest of the rule, we specify
minimum requirements, not best practices. Covered entities may want to
include more detail. We note that all federal agencies must still comply
with the Privacy Act of 1974. This means that federal agencies that are
covered entities or have covered health care components must comply with
the notice requirements of the Privacy Act as well as those included in
this rule.
In addition, covered entities may want or be required to produce more
than one notice in order to satisfy the notice content requirements
under this rule. For example, a covered entity that conducts business in
multiple states with different laws regarding the uses and disclosures
that the covered entity is permitted to make without authorization may
be required to produce a different notice for each state. A covered
entity that conducts business both as part of an organized health care
arrangement or affiliated covered entity and as an independent
enterprise (e.g., a physician who sees patients through an on-call
arrangement with a hospital and through an independent private practice)
may want to adopt different privacy practices with respect to each line
of business; such a covered entity would be required to produce a
different notice describing the practices for each line of business.
Covered entities must produce notices that accurately describe the
privacy practices that are relevant to the individuals receiving the
notice.
***Required Elements***
*Plain Language*
As in the proposed rule, we require the notice to be written in plain
language. A covered entity can satisfy the plain language requirement if
it makes a reasonable effort to: organize material to serve the needs of
the reader; write short sentences in the active voice, using "you" and
other pronouns; use common, everyday words in sentences; and divide
material into short sections.
We do not require particular formatting specifications, such as
easy‑to‑read design features (e.g., lists, tables, graphics, contrasting
colors, and white space), type face, and font size. However, the purpose
of the notice is to inform the recipients about their rights and how
protected health information collected about them may be used or
disclosed. Recipients who cannot understand the covered entity's notice
will miss important information about their rights under this rule and
about how the covered entity is protecting health information about
them. One of the goals of this rule is to create an environment of open
communication and transparency with respect to the use and disclosure of
protected health information. A lack of clarity in the notice could
undermine this goal and create misunderstandings. Covered entities have
an incentive to make their notice statements clear and concise. We
believe that the more understandable the notice is, the more confidence
the public will have in the covered entity's commitment to protecting
the privacy of health information.
It is important that the content of the notice be communicated to all
recipients and therefore we encourage the covered entity to consider
alternative means of communicating with certain populations. We note
that any covered entity that is a recipient of federal financial
assistance is generally obligated under Title VI of the Civil Rights Act
of 1964 to provide material ordinarily distributed to the public in the
primary languages of persons with limited English proficiency in the
recipients' service areas. Specifically, this Title VI obligation
provides that, where a significant number or proportion of the
population eligible to be served or likely to be directly affected by a
federally assisted program needs service or information in a language
other than English in order to be effectively informed of or participate
in the program, the recipient shall take reasonable steps, considering
the scope of the program and the size and concentration of such
population, to provide information in languages appropriate to such
persons. For covered entities not subject to Title VI, the Title VI
standards provide helpful guidance for effectively communicating the
content of their notices to non‑English speaking populations.
We also encourage covered entities to be attentive to the needs of
individuals who cannot read. For example, an employee of the covered
entity could read the notice to individuals upon request or the notice
could be incorporated into a video presentation that is played in the
waiting area.
*Header*
Unlike the proposed rule, covered entities must include prominent and
specific language in the notice that indicates the importance of the
notice. This is the only specific language we require covered entities
to include in the notice. The header must read, "THIS NOTICE DESCRIBES
HOW MEDICAL INFORMATION ABOUT YOU MAY BE USED AND DISCLOSED AND HOW YOU
CAN GET ACCESS TO THIS INFORMATION. PLEASE REVIEW IT CAREFULLY."
*Uses and Disclosures*
We proposed to require covered entities to describe in plain language
the uses and disclosures of protected health information, and the
covered entity's policies and procedures with respect to such uses and
disclosures, that the health plan or covered provider expected to make
without individual authorization. The covered provider or health plan
would have had to distinguish between those uses and disclosures
required by law and those permitted but not required by law.
We also proposed to require covered health care providers and health
plans to state in the notice that all other uses and disclosures would
be made only with the individual's authorization and that such
authorization could be revoked. The notice would also have been required
to state that the individual could request restrictions on certain uses
and disclosures and that the covered entity would not be required to
agree to such a request.
We significantly modify these requirements in the final rule. Covered
entities must describe all uses and disclosures of protected health
information that they are permitted or required to make under this rule
without authorization, including those uses and disclosures subject to
the consent requirements under § 164.506. If other applicable law
prohibits or materially limits the covered entity's ability to make any
uses or disclosures that would otherwise be permitted under the rule,
the covered entity must describe only the uses and disclosures permitted
under the more stringent law.
Covered entities must separately describe each purpose for which they
are permitted to use or disclose protected health information under this
rule without authorization, and must do so in sufficient detail to place
the individual on notice of those uses and disclosures. With respect to
uses and disclosures to carry out treatment, payment, and health care
operations, the description must include at least one example of the
types of uses and disclosures that the covered entity is permitted to
make. This requirement is intended to inform individuals of all the uses
and disclosures that the covered entity is legally required or permitted
to make under applicable law, even if the covered entity does not
anticipate actually making such uses and disclosures. We do not require
covered entities to distinguish in their notices between those uses and
disclosures required by law and those permitted but not required by law.
Unlike the proposed rule, we additionally require covered entities that
wish to contact individuals for any of the following activities to list
these activities in the notice: providing appointment reminders,
describing or recommending treatment alternatives, providing information
about health-related benefits and services that may be of interest to
the individual, or soliciting funds to benefit the covered entity. If
the covered entity does not include these statements in its notice, it
is prohibited from using or disclosing protected health information for
these activities without authorization. See § 164.502(i).
In addition, if a group health plan, or a health insurance issuer or HMO
with respect to a group health plan, wants the option to disclose
protected health information to a group health plan sponsor without
authorization as permitted under § 164.504(f), the group health plan,
health insurance issuer or HMO must describe that practice in its
notice.
As in the proposed rule, the notice must state that all other uses and
disclosures will be made only with the individual's authorization and
that the individual has the right to revoke such authorization.
We anticipate this requirement will lead to significant standardization
of the notice. This language could be the same for every covered entity
of a particular type within a state, territory, or other locale. We
encourage states, state professional associations, and other
organizations to develop model language to assist covered entities in
preparing their notices.
*Individual Rights*
As in the proposed rule, covered entities must describe individuals'
rights under the rule and how individuals may exercise those rights with
respect to the covered entity. Covered entities must describe each of
the following rights, as provided under the rule: the right to request
restrictions on certain uses and disclosures, including a statement that
the covered entity is not required to agree to a requested restriction
(§ 164.522(a)); the right to receive confidential communications of
protected health information (§ 164.522(b)); the right to inspect and
copy protected health information (§ 164.524); the right to amend
protected health information (§ 164.526); and the right to an accounting
of disclosures of protected health information (§ 164.528). We
additionally require the notice to describe the right of an individual,
including an individual that has agreed to receive the notice
electronically, to obtain a paper copy of the notice upon request.
*Covered Entity's Duties*
As in the proposed rule, covered entities must state in the notice that
they are required by law to maintain the privacy of protected health
information, to provide a notice of their legal duties and privacy
practices, and to abide by the terms of the notice currently in effect.
In the final rule, we additionally require the covered entity, if it
wishes to reserve the right to change its privacy practices and apply
the revised practices to protected health information previously created
or received, to make a statement to that effect and describe how it will
provide individuals with a revised notice. (See below for a more
detailed discussion of a covered entity's responsibilities when it
changes its privacy practices.)
*Complaints*
As in the proposed rule, a covered entity's notice must inform
individuals about how they can lodge complaints with the covered entity
if they believe their privacy rights have been violated. See §
164.530(d) and the corresponding preamble discussion for the
requirements on covered entities for receiving complaints. The notice
must also state that individuals may file complaints with the Secretary.
In the final rule, we additionally require the notice to include a
statement that the individual will not suffer retaliation for filing a
complaint.
*Contact*
As in the proposed rule, the notice must identify a point of contact
where the individual can obtain additional information about any of the
matters identified in the notice.
*Effective Date*
The notice must include the date the notice went into effect, rather
than the proposed requirement to include the date the notice was
produced. The effective date cannot be earlier than the date on which
the notice was first printed or otherwise published. Covered entities
may wish to highlight or otherwise emphasize any material modifications
that it has made, in order to help the individual recognize such
changes.
***Optional Elements***
As described above, we proposed to require covered entities to describe
the uses and disclosures of protected health information that the
covered entity in fact expected to make without the individual's
authorization. We did not specify any optional elements.
While the final rule requires covered entities to describe all of the
types of uses and disclosures permitted or required by law (not just
those that the covered entity intends to make), we also permit and
encourage covered entities to include optional elements that describe
the actual, more limited, uses and disclosures they intend to make
without authorization. We anticipate that some covered entities will
want to distinguish themselves on the basis of their more stringent
privacy practices. For example, covered health care providers who
routinely treat patients with particularly sensitive conditions may wish
to assure their patients that, even though the law permits them to
disclose information for a wide array of purposes, the covered health
care provider will only disclose information in very specific
circumstances, as required by law, and to avert a serious and imminent
threat to health or safety. A covered entity may not include statements
in the notice that purport to limit the entity's ability to make uses or
disclosures that are required by law or necessary to avert a serious and
imminent threat to health or safety.
As described above, if the covered entity wishes to reserve the right to
change its privacy practices with respect to the more limited uses and
disclosures and apply the revised practices to protected health
information previously created or received, it must make a statement to
that effect and describe how it will provide individuals with a revised
notice. (See below for a more detailed discussion of a covered entity's
responsibilities when it changes its privacy practices.)
***Revisions to the Notice***
We proposed to require a covered entity to adhere to the terms of its
notice, and would have permitted it to change its information policies
and procedures at any time. We would have required covered health care
providers and health plans to update the notice to reflect material
changes to the information policies and procedures described in the
notice. Changes to the notice would have applied to all protected health
information held by the covered entity, including information collected
under prior notices. That is, we would not have require covered entities
to segregate their records according to the notice in effect at the time
the record was created. We proposed to prohibit covered entities from
implementing a change to an information policy or procedure described in
the notice until the notice was updated to reflect the change, unless a
compelling reason existed to make a use or disclosure or take other
action that the notice would not have permitted. In these situations, we
proposed to require covered entities to document the compelling reason
and, within 30 days of the use, disclosure, or other action, change its
notice to permit the action.
As in the proposed rule, covered entities are required to adhere to the
terms of the notice currently in effect. See § 164.502(i). When a
covered entity materially changes any of the uses or disclosures, the
individual's rights, the covered entity's legal duties, or other privacy
practices described in its notice, it must promptly revise its notice
accordingly. See § 164.520(b)(3). (Pursuant to § 164.530(i), it must
also revise its policies and procedures.) Except when required by law, a
material change to any term in the notice may not be implemented prior
to the effective date of the notice in which such material change is
reflected. In the final rule, however, we revise the circumstances under
and extent to which the covered entity may revise the practices stated
in the notice and apply the new practices to protected health
information it created or received under prior notice.
Under § 164.530(i), a covered entity that wishes to change its practices
over time without segregating its records according to the notice in
effect at the time the records were created must reserve the right to do
so in its notice. For example, a covered hospital that states in its
notice that it will only make public health disclosures required by law,
and that does not reserve the right to change this practice, is
prohibited from making any discretionary public health disclosures of
protected health information created or received during the effective
period of that notice. If the covered hospital wishes at some point in
the future to make discretionary disclosures for public health purposes,
it must revise its notice to so state, and must segregate its records so
that protected health information created or received under the prior
notice is not disclosed for discretionary public health purposes. This
hospital may then make discretionary public health disclosures of
protected health information created or received after the effective
date of the revised notice.
If a second covered hospital states in its notice that it will only make
public health disclosures required by law, but does reserve the right to
change its practices, it is prohibited from making any discretionary
public health disclosures of protected health information created or
received during the effective period of that notice. If this hospital
wishes at some point in the future to make discretionary disclosures for
public health purposes, it must revise its notice to so state, but need
not segregate its records. As of the effective date of the revised
notice, it may disclose any protected health information, including
information created or received under the prior notice, for
discretionary public health purposes.
Section 164.530(i) and the corresponding discussion in this preamble
describes requirements for revision of a covered entity's privacy
policies and procedures, including the privacy practices reflected in
its notice.
**Section 164.520(c)---Provision of Notice**
As in the proposed rule, all covered entities that are required to
produce a notice must provide the notice upon request of any person. The
requestor does not have to be a current patient or enrollee. We intend
the notice to be a public document that people can use in choosing
between covered entities.
For health plans, we proposed to require health plans to distribute the
notice to individuals covered by the health plan as of the compliance
date; after the compliance date, at enrollment in the health plan; after
enrollment, within 60 days of a material revision to the content of the
notice; and no less frequently than once every three years.
As in the proposed rule, under the final rule health plans must provide
the notice to all health plan enrollees as of the compliance date. After
the compliance date, health plans must provide the notice to all new
enrollees at the time of enrollment and to all enrollees within 60 days
of a material revision to the notice. Of course, the term "enrollees"
includes participants and beneficiaries in group health plans.
Unlike the proposed rule, we do not require health plans to distribute
the notice every three years. Instead, health plans must notify
enrollees no less than once every three years about the availability of
the notice and how to obtain a copy.
We also clarify that, in each of these circumstances, if a named insured
and one or more dependents are covered by the same policy, the health
plan can satisfy the distribution requirement with respect to the
dependents by sending a single copy of the notice to the named insured.
For example, if an employee of a firm and her three dependents are all
covered under a single health plan policy, that health plan can satisfy
the initial distribution requirement by sending a single copy of the
notice to the employee rather than sending four copies, each addressed
to a different member of the family.
We further clarify that if a health plan has more than one notice, it
satisfies its distribution requirement by providing the notice that is
relevant to the individual or other person requesting the notice. For
example, a health insurance issuer may have contracts with two different
group health plans. One contract specifies that the issuer may use and
disclose protected health information about the participants in the
group health plan for research purposes without authorization (subject
to the requirements of this rule) and one contract specifies that the
issuer must always obtain authorizations for these uses and disclosures.
The issuer accordingly develops two notices reflecting these different
practices and satisfies its distribution requirements by providing the
relevant notice to the relevant group health plan participants.
We proposed to require covered health care providers with face-to-face
contact with individuals to provide the notice to all such individuals
at the first service delivery to the individual during the one year
period after the compliance date. After this one year period, covered
providers with face-to-face contact with individuals would have been
required to distribute the notice to all new patients at the first
service delivery. Covered providers without face-to-face contact with
individuals would have been required to provide the notice in a
reasonable period of time following first service delivery.
We proposed to require all covered providers to post the notice in a
clear and prominent location where it would be reasonable to expect
individuals seeking services from the covered provider to be able to
read the notice. We would have required revisions to be posted promptly.
In the final rule, we vary the distribution requirements according to
whether the covered health care provider has a direct treatment
relationship with an individual, rather than whether the covered health
care provider has face-to-face contact with an individual. See § 164.501
and the corresponding discussion in this preamble regarding the
definition of indirect treatment relationship.
Covered health care providers that have direct treatment relationships
with individuals must provide the notice to such individuals as of the
first service delivery after the compliance date. This requirement
applies whether the first service is delivered electronically or in
person. Covered providers may satisfy this requirement by sending the
notice to all of their patients at once, by giving the notice to each
patient as he or she comes into the provider's office or facility or
contacts the provider electronically, or by some combination of these
approaches. Covered providers that maintain a physical service delivery
site must prominently post the notice where it is reasonable to expect
individuals seeking service from the provider to be able to read the
notice. The notice must also be available on site for individuals to
take on request. In the event of a revision to the notice, the covered
provider must promptly post the revision and make it available on site.
Covered health care providers that have indirect treatment relationships
with individuals are only required to produce the notice upon request,
as described above.
The proposed rule was silent regarding electronic distribution of the
notice. Under the final rule, a covered entity that maintains a web site
describing the services and benefits it offers must make its privacy
notice prominently available through the site.
A covered entity may satisfy the applicable distribution requirements
described above by providing the notice to the individual
electronically, if the individual agrees to receiving materials from the
covered entity electronically and the individual has not withdrawn his
or her agreement. If the covered entity knows that the electronic
transmission has failed, the covered entity must provide a paper copy of
the notice to the individual.
If an individual's first service delivery from a covered provider occurs
electronically, the covered provider must provide electronic notice
automatically and contemporaneously in response to the individual's
first request for service. For example, the first time an individual
requests to fill a prescription through a covered internet pharmacy, the
pharmacy must automatically and contemporaneously provide the individual
with the pharmacy's notice of privacy practices. An individual that
receives a covered entity's notice electronically retains the right to
request a paper copy of the notice as described above. This right must
be described in the notice.
We note that the Electronic Signatures in Global and National Commerce
Act (Pub. L. 106-229) may apply to documents required under this rule to
be provided in writing. We do not intend to affect the application of
that law to documents required under this rule.
**Section 164.520(d)---Joint Notice by Separate Covered Entities**
The proposed rule was silent regarding the ability of legally separate
covered entities to produce a single notice.
In the final rule, we allow covered entities that participate in an
organized health care arrangement to comply with this section by
producing a single notice that describes their combined privacy
practices. See § 164.501 and the corresponding preamble discussion
regarding the definition of organized health care arrangement. (We note
that, under § 164.504(d), covered entities that are under common
ownership or control may designate themselves as a single affiliated
covered entity. Joint notice requirements do not apply to such entities.
Single affiliated covered entities must produce a single notice,
consistent with the requirements described above for any other covered
entity. Covered entities under common ownership or control that elect
not to designate themselves as a single affiliated covered entity,
however, may elect to produce a joint notice if they meet the definition
of an organized health care arrangement.)
The joint notice must meet all of the requirements described above. The
covered entities must agree to abide by the terms of the notice with
respect to protected health information created or received by the
covered entities as part of their participation in the organized health
care arrangement. In addition, the joint notice must reasonably identify
the covered entities, or class of covered entities, to which the joint
notice applies and the service delivery sites, or classes of service
delivery sites, to which the joint notice applies. If the covered
entities participating in the organized health care arrangement will
share protected health information with each other as necessary to carry
out treatment, payment, or health care operations relating to the
arrangement, that fact must be stated in the notice.
Typical examples where this policy may be useful are health care
facilities where physicians and other providers who have offices
elsewhere also provide services at the facility (e.g. hospital staff
privileges, physicians visiting their patients at a residential
facility). In these cases, a single notice may cover both the physician
and the facility, if the above conditions are met. The physician is
required to have a separate notice covering the privacy practices at the
physician's office if those practices are different than the practices
described in the joint notice.
If any one of the covered entities included in the joint notice
distributes the notice to an individual, as required above, the
distribution requirement is met for all of the covered entities included
in the joint notice.
**Section 164.520(e)---Documentation**
As in the proposed rule, we establish documentation requirements for
covered entities subject to this provision. In the final rule, we
specify that covered entities must retain copies of the notice(s) they
issue in accordance with § 164.530(j). See § 164.530(j) and the
corresponding preamble discussion for further description of the
documentation requirements.
**SECTION 164.522---RIGHTS TO REQUEST PRIVACY PROTECTION FOR PROTECTED
HEALTH INFORMATION**
**Section 164.522(a)---Right of An Individual to Request Restriction of
Uses and Disclosures**
We proposed that individuals have the right to request that a covered
health care provider restrict the use or disclosure of protected health
information for treatment, payment, or health care operations. Providers
would not have been required to agree to requested restrictions.
However, a covered provider that agreed to a restriction could not use
or disclose protected health information inconsistent with the
restriction. The requirement would not have applied to permissible uses
or disclosures under proposed § 164.510, including uses and disclosures
in emergency circumstances under proposed § 164.510(k); when the health
care services provided were emergency services; or to required
disclosures to the Secretary under proposed § 164.522. We would have
required covered providers to have procedures for individuals to request
restrictions, for agreed-upon restrictions to be documented, for the
provider to honor such restrictions, and for notification of the
existence of a restriction to others to whom such protected health
information is disclosed.
In the final rule, we retain the general right of an individual to
request that uses and disclosures of protected health information be
restricted and the requirement for covered entities to adhere to
restrictions to which they have agreed. However, we include some
significant changes and clarifications.
Under the final rule, we extend the right to request restrictions to
health plans and to health care clearinghouses that create or receive
protected health information other than as a business associate of
another covered entity. All covered entities must permit individuals to
request that uses and disclosures of protected health information to
carry out treatment, payment, and health care operations be restricted
and must adhere to restrictions to which they have agreed. A covered
entity is not required to agree to a restriction. We note that
restrictions between an individual and a covered entity for these or
other purposes may be otherwise enforceable under other law.
Under § 164.522(a)(1)(i)(B), the right to request restrictions applies
to disclosures to persons assisting in the individual's care under §
164.510(b). An individual may request that a covered entity agree not to
disclose protected health information to persons assisting with the
individual's care, even if such disclosure is permissible in accordance
with § 164.510(b). For example, if an individual requests that a covered
entity never disclose protected health information to a particular
family member, and the covered entity agrees to that restriction, the
covered entity is prohibited from disclosing protected health
information to that family member, even if the disclosure would
otherwise be permissible under § 164.510(b). We note that individuals
additionally have the opportunity to agree or object to disclosures to
persons assisting in the individual's care under § 164.510(b)(2). The
individual retains the right to agree or object to such disclosures
under § 164.510(b)(2), in accordance with the standards of that
provision, regardless of whether the individual has requested a
restriction under § 164.522(a). See § 164.510(b) and the corresponding
preamble discussion regarding the individual's right to agree or object
to disclosures to persons assisting in the individual's care.
In §§ 164.522(a)(1)(iii) and (iv) we clarify the requirements with
respect to emergency treatment situations. In emergency treatment
situations, a covered entity that has agreed to a restriction may use,
or disclose to a health care provider, restricted protected health
information that is necessary to provide the emergency treatment. If the
covered entity discloses restricted protected health information to a
health care provider for emergency treatment purposes, it must request
that the provider not further use or disclose the information. We expect
covered entities to consider the need for access to protected health
information for treatment purposes when considering a request for a
restriction, to discuss this need with the individual making the request
for restriction, and to agree to restrictions that will not foreseeably
impede the individual's treatment. Therefore, we expect covered entities
will rarely need to use or disclose restricted protected health
information in emergency treatment situations. We do not intend,
however, to adversely impact the delivery of health care. We therefore
provide a means for the use and disclosure of restricted protected
health information in emergency treatment situations, where an
unexpected need for the information could arise and there is
insufficient time to secure the individual's permission to use or
disclose the restricted information.
In § 164.522(a)(1)(v) we clarify that restrictions are not effective
under this rule to prevent uses and disclosures required by §
164.502(a)(2)(ii) or permitted under § 164.510(a) (regarding facility
directories) or § 164.512 (regarding uses and disclosures for which
consent, individual authorization, or opportunity to agree or object is
not required). Covered entities are permitted to agree to such
restrictions, but if they do so, the restrictions are not enforceable
under this rule. For example, a provider who makes a disclosure under §
164.512(j)(1)(i) relating to serious and imminent threats will not be in
violation of this rule even if the disclosure is contrary to a
restriction agreed to under this paragraph.
In § 164.522(a)(2) we clarify a covered entity's ability to terminate a
restriction to which it has agreed. A covered entity may terminate a
restriction with the individual's written or oral agreement. If the
individual's agreement is obtained orally, the covered entity must
document that agreement. A note in the medical record or similar
notation is sufficient documentation. If the individual agrees to
terminate the restriction, the covered entity may use and disclose
protected health information as otherwise permitted under the rule. If
the covered entity wants to terminate the restriction without the
individual's agreement, it may only terminate the restriction with
respect to protected health information it creates or receives after it
informs the individual of the termination. The restriction continues to
apply to protected health information created or received prior to
informing the individual of the termination. That is, any protected
health information that had been collected before the termination may
not be used or disclosed in a way that is inconsistent with the
restriction, but any information that is collected after informing the
individual of the termination of the restriction may be used or
disclosed as otherwise permitted under the rule.
In § 164.522(a)(3), we clarify that a covered entity must document a
restriction to which it has agreed. We do not require a specific form of
documentation; a note in the medical record or similar notation is
sufficient. The documentation must be retained for six years from the
date it was created or the date it was last in effect, whichever is
later, in accordance with § 164.530(j).
We eliminate the requirement from the NPRM for covered entities to
inform persons to whom they disclose protected health information of the
existence of any restriction on that information. A restriction is only
binding on the covered entity that agreed to the restriction. We
encourage covered entities to inform others of the existence of a
restriction when it is appropriate to do so. We note, however, that
disclosure of the existence of a restriction often amounts to a *de
facto* disclosure of the restricted information itself. If a restriction
does not permit a covered entity to disclose protected health
information to a particular person, the covered entity must carefully
consider whether disclosing the existence of the restriction to that
person would also violate the restriction.
**Section 164.522(b)---Confidential Communications Requirements**
In the NPRM, we did not directly address the issue of whether an
individual could request that a covered entity restrict the manner in
which it communicated with the individual. As described above, the NPRM
would have provided individuals with the right to request that health
care providers restrict uses and disclosures of protected health
information for treatment, payment and health care operations, but would
not have required providers to agree to such a restriction.
In the final rule, we require covered entities to permit individuals to
request that the covered entity provide confidential communications of
protected health information about the individual. The requirement
applies to communications from the covered entity to the individual, and
also communications from the covered entity that would otherwise be sent
to the named insured of an insurance policy that covers the individual
as a dependent of the named insured. Individuals may request that the
covered entity send such communications by alternative means or at
alternative locations. For example, an individual who does not want his
or her family members to know about a certain treatment may request that
the provider communicate with the individual about that treatment at the
individual's place of employment, by mail to a designated address, or by
phone to a designated phone number. Similarly, an individual may request
that the provider send communications in a closed envelope rather than a
post card, as an "alternative means." Covered health care providers must
accommodate all reasonable requests. Health plans must accommodate all
reasonable requests, if the individual clearly states that the
disclosure of all or part of the protected health information could
endanger the individual. For example, if an individual requests that a
health plan send explanations of benefits about particular services to
the individual's work rather than home address because the individual is
concerned that a member of the individual's household (e.g., the named
insured) might read the explanation of benefits and become abusive
towards the individual, the health plan must accommodate the request.
The reasonableness of a request made under this paragraph must be
determined by a covered entity solely on the basis of the administrative
difficulty of complying with the request and as otherwise provided in
this section. A covered health care provider or health plan cannot
refuse to accommodate a request based on its perception of the merits of
the individual's reason for making the request. A covered health care
provider may not require the individual to provide a reason for the
request as a condition of accommodating the request. As discussed above,
a health plan is not required to accommodate a request unless the
individual indicates that the disclosure could endanger the individual.
If the individual indicates such endangerment, however, the covered
entity cannot further consider the individual's reason for making the
request in determining whether it must accommodate the request.
A covered health care provider or health plan may refuse to accommodate
a request, however, if the individual has not provided information as to
how payment, if applicable, will be handled, or if the individual has
not specified an alternative address or method of contact.
**SECTION 164.524---ACCESS OF INDIVIDUALS TO PROTECTED HEALTH
INFORMATION**
**Section 164.524(a)---Right of Access**
In the NPRM, we proposed to establish a right for individuals to access
(i.e., inspect and obtain a copy of) protected health information about
them maintained by a covered provider or health plan, or its business
partners, in a designated record set.
As in the proposed rule, in the final rule we provide that individuals
have a right of access to protected health information that is
maintained in a designated record set. This right applies to health
plans, covered health care providers, and health care clearinghouses
that create or receive protected health information other than as a
business associate of another covered entity (see § 164.500(b)). In the
final rule, however, we modify the definition of designated record set.
For a discussion of the significant changes made to the definition of
designated record set, see § 164.501 and the corresponding preamble.
Under the revised definition, individuals have a right of access to any
protected health information that is used, in whole or in part, to make
decisions about individuals. This information includes, for example,
information used to make health care decisions or information used to
determine whether an insurance claim will be paid. Covered entities
often incorporate the same protected health information into a variety
of different data systems, not all of which will be utilized to make
decisions about individuals. For example, information systems that are
used for quality control or peer review analyses may not be used to make
decisions about individuals. In that case, the information systems would
not fall within the definition of designated record set. We do not
require entities to grant an individual access to protected health
information maintained in these types of information systems.
***Duration of the Right of Access***
As in the proposed rule, covered entities must provide access to
individuals for as long as the protected health information is
maintained in a designated record set.
***Exceptions to the Right of Access***
In the NPRM, we proposed to establish a right for individuals to access
any protected health information maintained in a designated record set.
Though we proposed to permit covered entities to deny access in certain
situations relating to the particular individual requesting access, we
did not specifically exclude any protected health information from the
right of access.
In the final rule, we specify three types of information to which
individuals do not have a right of access, even if the information is
maintained in a designated record set. They are psychotherapy notes,
information compiled in reasonable anticipation of, or for use in, a
civil, criminal, or administrative action or proceeding, and certain
protected health information maintained by a covered entity that is
subject to or exempted from the Clinical Laboratory Improvements
Amendments of 1988 (CLIA). Covered entities may, but are not required
to, provide access to this information.
First, unlike the proposed rule, we specify that individuals do not have
a right of access to psychotherapy notes.
Second, individuals do not have a right of access to information
compiled in reasonable anticipation of, or for use in, a civil,
criminal, or administrative action or proceeding. In the NPRM, we would
have permitted covered entities to deny a request for access to
protected health information complied in reasonable anticipation of, or
for use in, a legal proceeding. We change the language in the final rule
to clarify that a legal proceeding includes civil, criminal, and
administrative actions and proceedings. In the final rule, we clarify
that an individual does not have a right to this information by
including it in the list of exceptions rather than stating that a
covered entity may deny access to this information. Under this
exception, the covered entity may deny access to any information that
relates specifically to legal preparations but may not deny access to
the individual's underlying health information. We do not intend to
require covered entities to provide access to documents protected by
attorney work-product privilege nor do we intend to alter rules of
discovery.
Third, unlike the proposed rule, individuals do not have a right of
access to protected health information held by clinical laboratories if
CLIA prohibits such access. CLIA states that clinical laboratories may
provide clinical laboratory test records and reports only to "authorized
persons," as defined primarily by state law. The individual who is the
subject of the information is not always included in this set of
authorized persons. When an individual is not an authorized person, this
restriction effectively prohibits the clinical laboratory from providing
an individual access to this information. We do not intend to preempt
CLIA and, therefore, do not require covered clinical laboratories to
provide an individual access to this information if CLIA prohibits them
from doing so. We note, however, that individuals have the right of
access to this information if it is maintained by a covered health care
provider, clearinghouse, or health plan that is not subject to CLIA.
Finally, unlike the proposed rule, individuals do not have access to
protected health information held by certain research laboratories that
are exempt from the CLIA regulations. The CLIA regulations specifically
exempt the components or functions of "research laboratories that test
human specimens but do not report patient specific results for the
diagnosis, prevention or treatment of any disease or impairment of, or
the assessment of the health of individual patients." 42 CFR
493.3(a)(2). If subject to the access requirements, these laboratories,
or the applicable components of them, would be forced to comply with the
CLIA regulations once they provided an individual with the access under
this privacy rule. Therefore, to alleviate this additional regulatory
burden, we have exempted these laboratories, or the relevant components
of them, from the access requirements of this regulation.
***Grounds for Denial of Access***
In the NPRM we proposed to permit covered health care providers and
health plans to deny an individual access to inspect and copy protected
health information about them for five reasons: 1) a licensed health
care professional determined the inspection and copying was reasonably
likely to endanger the life or physical safety of the individual or
another person; 2) the information was about another person (other than
a health care provider) and a licensed health care professional
determined the inspection and copying was reasonably likely to cause
substantial harm to that other person; 3) the information was obtained
under a promise of confidentiality from someone other than a health care
provider and the inspection and copying was likely to reveal the source
of the information; 4) the information was obtained by a covered
provider in the course of a clinical trial, the individual agreed to the
denial of access in consenting to participate in the trial, and the
trial was in progress; and 5) the information was compiled in reasonable
anticipation of, or for use in, a legal proceeding. In the NPRM, covered
entities would not have been permitted to use these grounds to deny
individuals access to protected health information that was also subject
to the Privacy Act.
In the final rule, we retain all of these grounds for denial, with some
modifications. One of the proposed grounds for denial (regarding legal
proceedings) is retained as an exception to the right of access. (See
discussion above.) We also include additional grounds for denial and
create a right for individuals to request review of certain denials.
There are five types of denials covered entities may make without
providing the individual with a right to have the denial reviewed.
First, a covered entity may deny an individual access to any information
that is excepted from the right of access under § 164.524(a)(1). (See
discussion above.)
Second, we add a new provision that permits a covered entity that is a
correctional institution or covered health care provider acting under
the direction of a correctional institution to deny an inmate's request
to obtain a copy of protected health information if obtaining a copy
would jeopardize the health, safety, security, custody, or
rehabilitation of the individual or other inmates or the safety of any
officer, employee or other person at the correctional institution or
responsible for the transporting of the inmate. This ground for denial
is restricted to an inmate's request to obtain a copy of protected
health information. If an inmate requests inspection of protected health
information, the request must be granted unless one of the other grounds
for denial applies. The purpose for this exception, and the reason that
the exception is limited to denying an inmate a copy and not to denying
a right to inspect, is to give correctional institutions the ability to
maintain order in these facilities and among inmates without denying an
inmate the right to review his or her protected health information.
Third, as in the proposed rule, a covered entity may deny an individual
access to protected health information obtained by a covered provider in
the course of research that includes treatment of the research
participants, while such research is in progress. For this exception to
apply, the individual must have agreed to the denial of access in
conjunction with the individual's consent to participate in the research
and the covered provider must have informed the individual that the
right of access will be reinstated upon completion of the research. If
either of these conditions is not met, the individual has the right to
inspect and copy the information (subject to the other exceptions we
provide here). In all cases, the individual has the right to inspect and
copy the information after the research is complete.
As with all the grounds for denial, covered entities are not required to
deny access under the research exception. We expect all researchers to
maintain a high level of ethical consideration for the welfare of
research participants and provide access in appropriate circumstances.
For example, if a participant has a severe adverse reaction, disclosure
of information during the course of the research may be necessary to
give the participant adequate information for proper treatment
decisions.
Fourth, we clarify the ability of a covered entity to deny individuals
access to protected health information that is also subject to the
Privacy Act. In the final rule, we specify that a covered entity may
deny an individual access to protected health information that is
contained in records that are subject to the Privacy Act if such denial
is permitted under the Privacy Act. This ground for denial exists in
addition to the other grounds for denial available under this rule. If
an individual requests access to protected health information that is
also subject to the Privacy Act, a covered entity may deny access to
that information for any of the reasons permitted under the Privacy Act
and for any of the reasons permitted under this rule.
Fifth, as in the proposed rule, a covered entity may deny an individual
access to protected health information if the covered entity obtained
the requested information from someone other than a health care provider
under a promise of confidentiality and such access would be reasonably
likely to reveal the source of the information. This provision is
intended to preserve a covered entity's ability to maintain an implicit
or explicit promise of confidentiality. A covered entity may not,
however, deny access to protected health information when the
information has been obtained from a health care provider. An individual
is entitled to have access to all information about him or her generated
by the health care system (apart from the other exceptions we provide
here). Confidentiality promises to health care providers should not
interfere with that access.
As in the proposed rule, a covered entity may deny access to protected
health information under certain circumstances in which the access may
harm the individual or others. In the final rule, we specify that a
covered entity may only deny access for these reasons if the covered
entity provides the individual with a right to have the denial reviewed.
(See below for a discussion of the right to review.)
There are three types of denials for which covered entities must provide
the individual with a right to review. A denial under these provisions
requires a determination by a licensed health care professional (such as
a physician, physician's assistant, or nurse) based on an assessment of
the particular circumstances and current professional medical standards
of harm. Therefore, when the request is made to a health plan or
clearinghouse, the covered entity will need to consult with a licensed
health care professional before denying access under this provision.
First, as in the proposed rule, covered entities may deny individuals
access to protected health information about them if a licensed health
care professional has determined, in the exercise of professional
judgment, that the access requested is reasonably likely to endanger the
life or physical safety of the individual or another person. The most
commonly cited example is when an individual exhibits suicidal or
homicidal tendencies. If a licensed health care professional determines
that an individual exhibits such tendencies and that permitting
inspection or copying of some of the individual's protected health
information is reasonably likely to result in the individual committing
suicide, murder, or other physical violence, then the health care
professional may deny the individual access to that information. Under
this reason for denial, covered entities may not deny access on the
basis of the sensitivity of the health information or the potential for
causing emotional or psychological harm.
Second, as in the proposed rule, covered entities may deny an individual
access to protected health information if the information requested
makes reference to someone other than the individual (and other than a
health care provider) and a licensed health care professional has
determined, in the exercise of professional judgment, that the access
requested is reasonably likely to cause serious harm to that other
person. On some occasions when health information about one person is
relevant to the care of another, a physician may incorporate it into the
latter\'s record, such as information from group therapy sessions and
information about illnesses with a genetic component. This provision
permits a covered entity to withhold information in such cases if the
release of such information is reasonably likely to cause substantial
physical, emotional, or psychological harm.
Third, we add a new provision regarding denial of access requested by
personal representatives. Under § 164.502(g), a person that is a
personal representative of an individual may exercise the rights of the
individual, including the right to inspect and copy protected health
information about the individual that is relevant to such person's
representation. The provision permits covered entities to refuse to
treat a personal representative as the individual, generally, if the
covered entity has a reasonable belief that the individual has been or
will be subjected to domestic violence, abuse or neglect by the personal
representative, or that treating the personal representative as the
individual may endanger the individual and, in its professional
judgment, the covered entity decides that it is not in the best interest
of the individual to treat such person as the personal representative.
In addition to that provision, we add a new provision at §
164.524(a)(3)(iii) to clarify that a covered entity may deny a request
to inspect or copy protected health information if the information is
requested by a personal representative of the individual and a licensed
health care professional has determined that, in the exercise of
professional judgment, such access is reasonably likely to cause
substantial harm to the individual who is the subject of the information
or to another person. The health care professional need not have a
reasonable belief that the personal representative has abused or
neglected the individuals and the harm that is likely to result need not
be limited to the individual who is the subject of the requested
protected health information. Therefore, a covered entity can recognize
a person as a personal representative but deny such person access to
protected health information as a personal representative.
We do not intend these provisions to create a legal duty for the covered
entity to review all of the relevant protected health information before
releasing it. Rather, we are preserving the flexibility and judgment of
covered entities to deny access under appropriate circumstances. Denials
are not mandatory; covered entities may always elect to provide
requested health information to the individual. For each request by an
individual, the covered entity may provide all of the information
requested or evaluate the requested information, consider the
circumstances surrounding the individual's request, and make a
determination as to whether that request should be granted or denied, in
whole or in part, in accordance with one of the reasons for denial under
this rule. We intend to create narrow exceptions to the right of access
and we expect covered entities to employ these exceptions rarely, if at
all. Covered entities may only deny access for the reasons specifically
provided in the rule.
***Review of a Denial of Access***
In the NPRM, we proposed to require covered entities, when denying an
individual's request for access, to inform the individual of how to make
a complaint to the covered entity and the Secretary.
We retain in the final rule the proposed approach (see below). In
addition, if the covered entity denies the request on the basis of one
of the reviewable grounds for denial described above, the individual has
the right to have the denial reviewed by a licensed health care
professional who is designated by the covered entity to act as a
reviewing official and who did not participate in the original decision
to deny access. The covered entity must provide access in accordance
with the reviewing official's determination. ( See below for further
description of the covered entity's requirements under § 164.524(d)(4)
if the individual requests a review of denial of access.)
**Section 164.524(b)---Requests for Access and Timely Action**
In the NPRM, we proposed to require covered health care providers and
health plans to provide a means for individuals to request access to
protected health information about them. We proposed to require covered
health care providers and health plans to take action on a request for
access as soon as possible, but not later than 30 days following the
request.
As in the proposed rule, the final rule requires covered entities to
permit an individual to request access to inspect or to obtain a copy of
the protected health information about the individual that is maintained
in a designated record set. We additionally permit covered entities to
require individuals to make requests for access in writing, if the
individual is informed of this requirement.
In the final rule, we eliminate the requirement for the covered entity
to act on a request as soon as possible. We recognize that circumstances
may arise in which an individual will request access on an expedited
basis. We encourage covered entities to have procedures in place for
handling such requests. The time limitation is intended to be an outside
deadline, rather than an expectation.
In the final rule, covered entities must act on a request for access
within 30 days of receiving the request if the information is maintained
or accessible on-site. Covered entities must act on a request for access
within 60 days of receiving the request if the information is not
maintained or accessible on-site. If the covered entity is unable to act
on a request within the applicable deadline, it may extend the deadline
by no more than 30 days by providing the individual with a written
statement of the reasons for the delay and the date by which the covered
entity will complete its action on the request. This written statement
describing the extension must be provided within the standard deadline.
A covered entity may only extend the deadline once per request for
access. This provision permits a covered entity to take a total of up to
60 days to act on a request for access to information maintained on-site
and up to 90 days to act on a request for access to information
maintained off-site.
The requirements for a covered entity to comply with or deny a request
for access, in whole or in part, are described below.
**Section 164.524(c)---Provision of Access**
In the NPRM, we proposed to require covered health care providers and
health plans, upon accepting a request for access, to notify the
individual of the decision and of any steps necessary to fulfill the
request; to provide the information requested in the form or format
requested, if readily producible in such form or format; and to
facilitate the process of inspection and copying.
We generally retain the proposed approach in the final rule. If a
covered entity accepts a request, in whole or in part, it must notify
the individual of the decision and provide the access requested.
Individuals have the right both to inspect and to copy protected health
information in a designated record set. The individual may choose
whether to inspect the information, to copy the information, or to do
both.
In the final rule, we clarify that if the same protected health
information is maintained in more than one designated record set or at
more than one location, the covered entity is required to produce the
information only once per request for access. We intend this provision
to reduce covered entities' burden in complying with requests without
reducing individuals' access to protected health information. We note
that summary information and reports are not the same as the underlying
information on which the summary or report was based. Individuals have
the right to obtain access both to summaries and to the underlying
information. An individual retains the right of access to the underlying
information even if the individual requests access to, or production of,
a summary. (See below regarding requests for summaries.)
The covered entity must provide the information requested in the form or
format requested if it is readily producible in such form or format. For
example, if the covered entity maintains health information
electronically and the individual requests an electronic copy, the
covered entity must accommodate such request, if possible. Additionally,
we specify that if the information is not available in the form or
format requested, the covered entity must produce a readily readable
hard copy of the information or another form or format to which the
individual and covered entity can agree. If the individual agrees,
including agreeing to any associated fees (see below), the covered
entity may provide access to a summary of information rather than all
protected health information in designated record sets. Similarly, a
covered entity may provide an explanation in addition to the protected
health information, if the individual agrees in advance to the
explanation and any associated fees.
The covered entity must provide the access requested in a timely manner,
as described above, and arrange for a mutually convenient time and place
for the individual to inspect the protected health information or obtain
a copy. If the individual requests that the covered entity mail a copy
of the information, the covered entity must do so, and may charge
certain fees for copying and mailing. For requests to inspect
information that is maintained electronically, the covered entity may
print a copy of the information and allow the individual to view the
print-out on-site. Covered entities may discuss the request with the
individual as necessary to facilitate the timely provision of access.
For example, if the individual requested a copy of the information by
mail, but the covered entity is able to provide the information faster
by providing it electronically, the covered entity may discuss this
option with the individual.
We proposed in the NPRM to permit the covered entity to charge a
reasonable, cost-based fee for copying the information.
We clarify this provision in the final rule. If the individual requests
a copy of protected health information, a covered entity may charge a
reasonable, cost‑based fee for the copying, including the labor and
supply costs of copying. If hard copies are made, this would include the
cost of paper. If electronic copies are made to a computer disk, this
would include the cost of the computer disk. Covered entities may not
charge any fees for retrieving or handling the information or for
processing the request. If the individual requests the information to be
mailed, the fee may include the cost of postage. Fees for copying and
postage provided under state law, but not for other costs excluded under
this rule, are presumed reasonable. If such per page costs include the
cost of retrieving or handling the information, such costs are not
acceptable under this rule.
If the individual requests an explanation or summary of the information
provided, and agrees in advance to any associated fees, the covered
entity may charge for preparing the explanation or summary as well.
The inclusion of a fee for copying is not intended to impede the ability
of individuals to copy their records. Rather, it is intended to reduce
the burden on covered entities. If the cost is excessively high, some
individuals will not be able to obtain a copy. We encourage covered
entities to limit the fee for copying so that it is within reach of all
individuals.
We do not intend to affect the fees that covered entities charge for
providing protected health information to anyone other than the
individual. For example, we do not intend to affect current practices
with respect to the fees one health care provider charges for forwarding
records to another health care provider for treatment purposes.
**Section 164.524(d)---Denial of Access**
We proposed in the NPRM to require a covered health care provider or
health plan that elects to deny a request for inspection or copying to
make any other protected health information requested available to the
individual to the extent possible, consistent with the denial.
In the final rule, we clarify the proposed approach. A covered entity
that denies access, in whole or in part, must, to the extent possible,
give the individual access to any other protected health information
requested after excluding the protected health information to which the
covered entity has a ground to deny access. We intend covered entities
to redact or otherwise exclude only the information that falls within
one or more of the denial criteria described above and to permit
inspection and copying of all remaining information, to the extent it is
possible to do so.
We also proposed to require covered providers and health plans, upon
denying a request for access in whole or in part, to provide the
individual with a written statement in plain language of the basis for
the denial and how the individual could make a complaint to the covered
entity or the Secretary.
We retain the proposed approach. A covered entity that denies access, in
whole or in part, must provide the individual with a written denial in
plain language that explains the basis for the denial. The written
denial could include a direct reference to the section of the regulation
relied upon for the denial, but the regulatory citation alone does not
sufficiently explain the reason for the denial. The written denial must
also describe how the individual can complain to the covered entity and
the Secretary and must include the name or title and the telephone
number of the covered entity's contact person or office that is
responsible for receiving complaints.
In the final rule, we impose two additional requirements when the
covered entity denies access, in whole or in part. First, if a covered
entity denies a request on the basis of one of the reviewable grounds
for denial, the written denial must describe the individual's right to a
review of the denial and how the individual may exercise this right.
Second, if the covered entity denies the request because it does not
maintain the requested information, and the covered entity knows where
the requested information is maintained, the covered entity must inform
the individual where to direct the request for access.
Finally, we specify a covered entity's responsibilities when an
individual requests a review of a denial. If the individual requests a
review of a denial made under § 164.524(a)(3), the covered entity must
designate a licensed health care professional to act as the reviewing
official. This reviewing official must not have been involved in the
original decision to deny access. The covered entity must promptly refer
a request for review to the designated reviewing official. The reviewing
official must determine, within a reasonable period of time, whether or
not to deny the access requested based on the standards in §
164.524(a)(3). The covered entity must promptly provide the individual
with written notice of the reviewing official's decision and otherwise
carry out the decision in accordance with the requirements of this
section.
**Section 164.524(e)---Policies, Procedures, and Documentation**
As in the proposed rule, we establish documentation requirements for
covered entities that are subject to this provision. In accordance with
§ 164.530(j), the covered entity must retain documentation of the
designated record sets that are subject to access by individuals and the
titles of the persons or offices responsible for receiving and
processing requests for access by individuals.
**SECTION 164.526---AMENDMENT OF PROTECTED HEALTH INFORMATION**
**Section 164.526(a)---Right to Amend**
In proposed § 164.516, we proposed to establish the individual's right
to request a covered health care provider or health plan to amend or
correct protected health information about the individual for as long as
the covered entity maintains the information.
In § 164.526 of the final rule, we retain the general proposed approach,
but establish an individual's right to have the covered entity amend,
rather than amend or correct, protected health information. This right
applies to protected health information and records in a designated
record set for as long as the information is maintained in the
designated record set. In the final rule, covered health care providers,
health plans, and health care clearinghouses that create or receive
protected health information other than as a business associate must
comply with these requirements.
***Denial of Amendment***
We proposed to permit a covered health care provider or health plan to
deny a request for amendment if it determined that the protected health
information that was the subject of the request was not created by the
covered provider or health plan, would not be available for inspection
and copying under proposed § 164.514, or was accurate and complete. A
covered entity would have been permitted, but not required, to deny a
request if any of these conditions were met.
As in the proposed rule, the final rule permits a covered entity to deny
a request for amendment if the covered entity did not create the
protected health information or record that is the subject of the
request for amendment. We add one exception to this provision: if the
individual provides a reasonable basis to believe that the originator of
the protected health information is no longer available to act on the
requested amendment, the covered entity must address the request for
amendment as though the covered entity had created the information.
As in the proposed rule, a covered entity also may deny a request for
amendment if the protected health information that is the subject of the
request for amendment is not part of a designated record set or would
not otherwise be available for inspection under § 164.524. We eliminate
the ability to deny a request for amendment if the information or record
that is the subject of the request would not be available for copying
under the rule. Under § 164.524(a)(2)(ii), an inmate may be denied a
copy of protected health information about the inmate. We intend to
preserve an inmate's ability to request amendments to information, even
if a copy of the information would not be available to the inmate,
subject to the other exceptions provided in this section.
Finally, as in the proposed rule, a covered entity may deny a request
for amendment if the covered entity determines that the information in
dispute is accurate and complete. We draw this concept from the Privacy
Act of 1974, governing records held by federal agencies, which permits
an individual to request correction or amendment of a record \"which the
individual believes is not accurate, relevant, timely, or complete.\" (5
U.S.C. 552a(d)(2)). We adopt the standards of "accuracy" and
"completeness" and draw on the clarification and analysis of these terms
that have emerged in administrative and judicial interpretations of the
Privacy Act during the last 25 years. We note that for federal agencies
that are also covered entities, this rule does not diminish their
present obligations under the Privacy Act of 1974.
This right is not intended to interfere with medical practice or to
modify standard business record keeping practices. Perfect records are
not required. Instead, a standard of reasonable accuracy and
completeness should be used. In addition, this right is not intended to
provide a procedure for substantive review of decisions such as coverage
determinations by payors. It is intended only to affect the content of
records, not the underlying truth or correctness of materials recounted
therein. Attempts under the Privacy Act of 1974 to use this mechanism as
a basis for collateral attack on agency determinations have generally
been rejected by the courts. The same results are intended here.
**Section 164.526(b)---Requests for Amendment and Timely Action**
We proposed to require covered health care providers and health plans to
provide a means for individuals to request amendment of protected health
information about them. Under the NPRM, we would have required covered
health care providers and health plans to take action on a request for
amendment or correction within 60 days of the request.
As in the proposed rule, covered entities must permit individuals to
request that the covered entity amend protected health information about
them. We also permit certain specifications for the form and content of
the request. If a covered entity informs individuals of such
requirements in advance, a covered entity may require individuals to
make requests for amendment in writing and to provide a reason to
support a requested amendment. If the covered entity imposes such a
requirement and informs individuals of the requirement in advance, the
covered entity is not required to act on an individual's request that
does not meet the requirements.
We retain the requirement for covered entities to act on a request for
amendment within 60 days of receipt of the request. In the final rule,
we specify the nature of the action the covered entity must take within
the time frame. The covered entity must inform the individual, as
described below, that the request has been either accepted or denied, in
whole or in part. It must also take certain actions pursuant to its
decision to accept or deny the request, as described below. If the
covered entity is unable to meet the deadline, the covered entity may
extend the deadline by no more than 30 days. The covered entity must
inform the individual in writing, within the initial 60-day period, of
the reason for the delay and the date by which the covered entity will
complete its action on the request. A covered entity may only extend the
deadline one time per request for amendment.
**Section 164.526(c)---Accepting the Amendment**
If a covered health care provider or health plan accepted a request for
amendment, in whole or in part, we proposed to require the covered
entity to make the appropriate change. The covered entity would have had
to identify the challenged entries as amended or corrected and indicate
the location of the amended or corrected information.
We also proposed to require the covered provider or health plan to make
reasonable efforts to notify certain entities of the amendment: 1)
entities the individual identified as needing to be notified and 2)
entities the covered provider or health plan knew had received the
erroneous or incomplete information and who may have relied, or could
foreseeably rely, on such information to the detriment of the
individual.
The covered provider or health plan would also have been required to
notify the individual of the decision to amend the information.
As in the proposed rule, if a covered entity accepts an individual's
request for amendment or correction, it must make the appropriate
amendment. In the final rule, we clarify that, at a minimum, the covered
entity must identify the records in the designated record set that are
affected by the amendment and must append or otherwise provide a link to
the location of the amendment. We do not require covered entities to
expunge any protected health information. Covered entities may expunge
information if doing so is consistent with other applicable law and the
covered entity's record keeping practices.
We alter some of the required procedures for informing the individual
and others of the accepted amendment. As in the proposed rule, the
covered entity must inform individuals about accepted amendments. In the
final rule, the covered entity must obtain the individual's agreement to
have the amended information shared with certain persons. If the
individual agrees, the covered entity must make reasonable efforts to
provide a copy of the amendment within a reasonable time to: 1) persons
the individual identifies as having received protected health
information about the individual and needing the amendment; and 2)
persons, including business associates, that the covered entity knows
have the unamended information and who may have relied, or could
foreseeably rely, on the information to the detriment of the individual.
For example, a covered entity must make reasonable efforts to inform a
business associate that uses protected health information to make
decisions about individuals about amendments to protected health
information used for such decisions.
**Section 164.526(d)---Denying the Amendment**
If a covered health care provider or health plan denied a request for
amendment, in whole or in part, we proposed to require the covered
entity to provide the individual with a written statement in plain
language of the basis for the denial, a description of how the
individual could submit a written statement of disagreement with the
denial, and a description of how the individual could make a complaint
with the covered entity and the Secretary.
We proposed to require covered health care providers and health plans to
have procedures to permit the individual to file a written statement of
disagreement with the denial and to include the covered entity's
statement of denial and the individual's statement of disagreement with
any subsequent disclosure of the disputed information. Covered entities
would have been permitted to establish a limit to the length of the
individual's statement of disagreement and to summarize the statement if
necessary. We also proposed to permit covered entities to provide a
rebuttal to the individual's statement with future disclosures.
As in the proposed rule, if a covered entity denies a request for
amendment, it must provide the individual with a statement of denial
written in plain language. The written denial must include the basis for
the denial, how the individual may file a written statement disagreeing
with the denial, and how the individual may make a complaint to the
covered entity and the Secretary.
In the final rule, we additionally require the covered entity to inform
individuals of their options with respect to future disclosures of the
disputed information in order to ensure that an individual is aware of
his or her rights. The written denial must state that if the individual
chooses not to file a statement of disagreement, the individual may
request that the covered entity include the individual's request for
amendment and the covered entity's denial of the request with any future
disclosures of the protected health information that is the subject of
the requested amendment.
As in the proposed rule, the covered entity must permit the individual
to submit a written statement disagreeing with the denial and the basis
of such disagreement. The covered entity may reasonably limit the length
of a statement of disagreement and may prepare a written rebuttal to the
individual's statement of disagreement. If the covered entity prepares a
rebuttal, it must provide a copy to the individual.
The covered entity must identify the record or protected health
information that is the subject of the disputed amendment and append or
otherwise link the following information to the designated record set:
the individual's request for amendment, the covered entity's denial of
the request, the individual's statement of disagreement (if any), and
the covered entity's rebuttal (if any). If the individual submits a
written statement of disagreement, all of the appended or linked
information, or an accurate summary of it, must be included with any
subsequent disclosure of the protected health information to which the
disagreement relates. If the individual does not submit a written
statement of disagreement, the covered entity must include the appended
or linked information only if the individual requests that the covered
entity do so.
In the final rule, we clarify that when a subsequent disclosure is a
standard transaction adopted under the Transactions Rule that cannot
accommodate the additional materials described above, the covered entity
may separately disclose the additional material to the recipient of the
transaction.
**Section 164.526(e)---Actions on Notices of Amendment**
We proposed to require any covered entity that received a notification
of amendment to have procedures in place to make the amendment in any of
its designated record sets and to notify its business associates, if
appropriate, of amendments.
We retain the proposed approach in the final rule. If a covered entity
receives a notification of amended protected health information from
another covered entity as described above, the covered entity must make
the necessary amendment to protected health information in designated
record sets it maintains. In addition, covered entities must require
their business associates who receive such notifications to incorporate
any necessary amendments to designated record sets maintained on the
covered entity's behalf. (See § 164.504 regarding business associate
requirements.)
**Section 164.526(f)---Policies, Procedures, and Documentation**
As in the proposed rule, we establish documentation requirements for
covered entities subject to this provision. In accordance with §
164.530(j), the covered entity must document the titles of the persons
or offices responsible for receiving and processing requests for
amendment.
**§ 164.528 - ACCOUNTING OF DISCLOSURES OF PROTECTED HEALTH
INFORMATION**
***Right to an Accounting of Disclosures***
We proposed in the NPRM to grant individuals a right to receive an
accounting of all disclosures of protected health information about them
by a covered entity for purposes other than treatment, payment, and
health care operations. We proposed this right to exist for as long as
the covered entity maintained the protected health information.
We also proposed that individuals would not have a right to an
accounting of disclosures to health oversight or law enforcement
agencies if the agency provided a written request for exclusion for a
specified time period and the request stated that access by the
individual during that time period would be reasonably likely to impede
the agency's activities.
We generally retain the proposed approach in the final rule. As in the
proposed rule, individuals have a right to receive an accounting of
disclosures made by a covered entity, including disclosures by or to a
business associate of the covered entity, for purposes other than
treatment, payment, and health care operations, subject to certain
exceptions as discussed below.
We revise the duration of this right under the final rule. Individuals
have a right to an accounting of the applicable disclosures that have
been made in the 6 year period prior to the date of a request for an
accounting. We additionally clarify in § 164.528(b)(1) that an
individual may request, and a covered entity may then provide, an
accounting of disclosures for a period of time less than 6 years from
the date of the request. For example, an individual could request an
accounting only of disclosures that occurred during the year prior to
the request.
In the final rule, we exclude several additional types of disclosures
from the accounting requirement. Covered entities are not required to
include in the accounting disclosures to the individual as provided in §
164.502; disclosures for facility directories, disclosures to persons
involved in the individual's care, or other disclosures for notification
purposes as provided in § 164.510; disclosures for national security or
intelligence purposes as provided in § 164.512(k)(2); disclosures to
correctional institutions or law enforcement officials as provided in §
164.512(k)(5); or any disclosures that were made by the covered entity
prior to the compliance date of the rule for that covered entity.
We retain the time-limited exclusion for disclosures to health oversight
and law enforcement agencies, but require rather than permit the
exclusion for the specified time period. Covered entities must exclude
disclosures to a health oversight agency or law enforcement official
from the accounting for the time period specified by the applicable
agency or official if the agency or official provides the covered entity
with a statement that inclusion of the disclosure(s) in the accounting
to the individual during that time period would be reasonably likely to
impede the agency or official's activities. The agency or official's
statement must specifically state how long the information must be
excluded. At the expiration of that period, the covered entity is
required to include the disclosure(s) in an accounting for the
individual. If the agency or official's statement is made orally, the
covered entity must document the identity of the agency or official who
made the statement and must exclude the disclosure(s) for no longer than
30 days from the date of the oral statement, unless a written statement
is provided during that time. If the agency or official provides a
written statement, the covered entity must exclude the disclosure(s) for
the time period specified in the written statement.
***Content of the Accounting***
We proposed in the NPRM to require the accounting to include all
disclosures as described above, including disclosures authorized by the
individual. The accounting would have been required to contain the date
of each disclosure; the name and address of the organization or person
who received the protected health information; a brief description of
the information disclosed; and copies of all requests for disclosures.
For disclosures other than those made at the request of the individual,
the accounting would have also included the purpose for which the
information was disclosed.
We generally retain the proposed approach in the final rule, but do not
require covered entities to make copies of authorizations or other
requests for disclosures available with the accounting. Instead, we
require the accounting to contain a brief statement of the purpose of
the disclosure. The statement must reasonably inform the individual of
the basis for the disclosure. In lieu of the statement of purpose, a
covered entity may include a copy of the individual's authorization
under § 164.508 or a copy of a written request for disclosure, if any,
under § 164.502(a)(2)(ii) or § 164.512. We also clarify that covered
entities are only required to include the address of the recipient of
the disclosed protected health information if the covered entity knows
the address.
We add a provision allowing for a summary accounting of recurrent
disclosures. For multiple disclosures to the same recipient pursuant to
a single authorization under § 164.508 or for a single purpose under §§
164.502(a)(2)(ii) or 164.512, the covered entity may provide a summary
accounting addressing the series of disclosures rather than a detailed
accounting of each disclosure in the series. In this circumstance, a
covered entity may limit the accounting of the series of disclosures to
the following information: the information otherwise required above for
the first disclosure in the series during the accounting period; the
frequency, periodicity, or number of disclosures made during the
accounting period; and the date of the most recent disclosure in the
series. For example, if under § 164.512(b), a covered entity discloses
the same protected health information to a public health authority for
the same purpose every month, it can account for those disclosures by
including in the accounting the date of the first disclosure, the public
health authority to whom the disclosures were made and the public health
authority's address, a brief description of the information disclosed, a
brief description of the purpose of the disclosures, the fact that the
disclosures were made every month during the accounting period, and the
date of the most recent disclosure.
***Provision of the Accounting***
We proposed in the NPRM to require covered entities to provide
individuals with an accounting of disclosures as soon as possible, but
not later than 30 days following receipt of the request for the
accounting.
In the final rule, we eliminate the requirement for the covered entity
to act as soon as possible. We recognize that circumstances may arise in
which an individual will request an accounting on an expedited basis. We
encourage covered entities to implement procedures for handling such
requests. The time limitation is intended to be an outside deadline,
rather than an expectation. We expect covered entities always to be
attentive to the circumstances surrounding each request and to respond
in an appropriate time frame.
In the final rule, covered entities must provide a requested accounting
no later than 60 days after receipt of the request. If the covered
entity is unable to meet the deadline, the covered entity may extend the
deadline by no more than 30 days. The covered entity must inform the
individual in writing, within the standard 60-day deadline, of the
reason for the delay and the date by which the covered entity will
provide the request. A covered entity may only extend the deadline one
time per request for accounting.
The NPRM did not address whether a covered entity could charge a fee for
the accounting of disclosures.
In the final rule, we provide that individuals have a right to receive
one free accounting per 12 month period. For each additional request by
an individual within the 12 month period, the covered entity may charge
a reasonable, cost-based fee. If it imposes such a fee, the covered
entity must inform the individual of the fee in advance and provide the
individual with an opportunity to withdraw or modify the request in
order to avoid or reduce the fee.
***Procedures and Documentation***
As in the proposed rule, we establish documentation requirements for
covered entities subject to this provision. In accordance with §
164.530(j), for disclosures that are subject to the accounting
requirement, the covered entity must retain documentation of the
information required to be included in the accounting. The covered
entity must also retain a copy of any accounting provided and must
document the titles of the persons or offices responsible for receiving
and processing requests for an accounting.
**SECTION 164.530---ADMINISTRATIVE REQUIREMENTS**
***Designation of a Privacy Official and Contact Person***
In § 164.518(a) of the NPRM, we proposed that covered entities be
required to designate an individual as the covered entity's privacy
official, responsible for the implementation and development of the
entity's privacy policies and procedures. We also proposed that covered
entities be required to designate a contact person to receive complaints
about privacy and provide information about the matters covered by the
entity's notice. We indicated that the contact person could be, but was
not required to be, the person designated as the privacy official. We
proposed to leave implementation details to the discretion of the
covered entity. We expected implementation to vary widely depending on
the size and nature of the covered entity, with small offices assigning
this as an additional duty to an existing staff person, and large
organizations creating a full-time privacy official. In proposed §
164.512, we also proposed to require the covered plan or provider\'s
privacy notice to include the name of a contact person for privacy
matters.
The final regulation retains the requirements for a privacy official and
contact person as specified in the NPRM. These designations must be
documented. The designation of privacy official and contact person
positions within affiliated entities will depend on how the covered
entity chooses to designate the covered entity(ies) under § 164.504(b).
If a subsidiary is defined as a covered entity under this regulation,
then a separate privacy official and contact person is required for that
covered entity. If several subsidiaries are designated as a single
covered entity, pursuant to § 164.504(b), then together they need have
only a single privacy officer and contact person. If several covered
entities share a notice for services provided on the same premises,
pursuant to § 164.520(d), that notice need designate only one privacy
official and contact person for the information collected under that
notice.
These requirements are consistent with the approach recommended by the
Joint Commission on Accreditation of Healthcare Organizations, and the
National Committee for Quality Assurance, in its paper "Protecting
Personal Health Information; A framework for Meeting the Challenges in a
Managed Care Environment." This paper notes that "accountability is
enhanced by having focal points who are responsible for assessing
compliance with policies and procedures\..." (p. 29)
***Training***
In § 164.518(b) of the NPRM we proposed to require that covered entities
provide training on the entities' policies and procedures to all members
of the workforce likely to have access to protected health information.
Each entity would be required to provide initial training by the date on
which this rule became applicable. After that date, each covered entity
would have to provide training to new members of the workforce within a
reasonable time after joining the entity. In addition, we proposed that
when a covered entity made material changes in its privacy policies or
procedures, it would be required to retrain those members of the
workforce whose duties were related to the change within a reasonable
time of making the change.
The NPRM would have required that, upon completion of the training, the
trainee would be required to sign a statement certifying that he or she
received the privacy training and would honor all of the entity\'s
privacy policies and procedures. Entities would determine the most
effective means of achieving this training requirement for their
workforce. We also proposed that, at least every three years after the
initial training, covered entities would be required to have each member
of the workforce sign a new statement certifying that he or she would
honor all of the entity\'s privacy policies and procedures. The covered
entity would have been required to document its policies and procedures
for complying with the training requirements.
The final regulation requires covered entities to train all members of
their workforce on the policies and procedures with respect to protected
health information required by this rule, as necessary and appropriate
for the members of the workforce to carry out their functions within the
covered entity. We do not change the proposed time lines for training
existing and new members of the workforce, or for training due to
material changes in the covered entity's policies and procedures. We
eliminate both the requirement for employees to sign a certification
following training and the triennial re-certification requirement.
Covered entities are responsible for implementing policies and
procedures to meet these requirements and for documenting that training
has been provided.
***Safeguards***
In § 164.518(c) of the NPRM, we proposed to require covered entities to
put in place administrative, technical, and physical safeguards to
protect the privacy of protected health information. We made reference
in the preamble to similar requirements proposed for certain electronic
information in the Notice of Proposed Rulemaking entitled the Security
and Electronic Signature Standards (HCFA‑0049‑P). We stated that we were
proposing parallel and consistent requirements for safeguarding the
privacy of protected health information. In § 164.518(c)(3) of the NPRM,
we required covered entities to have safeguards to ensure that
information was not used in violation of the requirements of this
subpart or by people who did not have proper authorization to access the
information.
We do not change the basic proposed requirements that covered entities
have administrative, technical and physical safeguards to protect the
privacy of protected health information. We combine the proposed
requirements into a single standard that requires covered entities to
safeguard protected health information from accidental or intentional
use or disclosure that is a violation of the requirements of this rule
and to protect against the inadvertent disclosure of protected health
information to persons other than the intended recipient. Limitations on
access to protected health information by the covered entities workforce
will also be covered by the policies and procedures for"minimum
necessary" use of protected health information, pursuant to §
164.514(d). We expect these provisions to work in tandem.
We do not prescribe the particular measures that covered entities must
take to meet this standard, because the nature of the required policies
and procedures will vary with the size of the covered entity and the
type of activities that the covered entity undertakes. (That is, as with
other provisions of this rule, this requirement is "scalable.") Examples
of appropriate safeguards include requiring that documents containing
protected health information be shredded prior to disposal, and
requiring that doors to medical records departments (or to file cabinets
housing such records) remain locked and limiting which personnel are
authorized to have the key or pass-code. We intend this to be a common
sense, scalable, standard. We do not require covered entities to
guarantee the safety of protected health information against all
assaults. Theft of protected health information may or may not signal a
violation of this rule, depending on the circumstances and whether the
covered entity had reasonable policies to protect against theft.
Organizations such as the Association for Testing and Materials (ASTM)
and the American Health Information Management Association (AHIMA) have
developed a body of recommended practices for handling of protected
health information that covered entities may find useful.
We note that the proposed HIPAA Security Standards would require covered
entities to safeguard the privacy and integrity of health information.
For electronic information, compliance with both regulations will be
required.
In § 164.518(c)(2) of the NPRM we proposed requirements for verification
procedures to establish identity and authority for permitted disclosures
of protected health information.
In the final rule, this material has been moved to § 164.514(h).
***Use or Disclosure of Protected Health Information by
Whistleblowers***
In § 164.518(c)(4) of the NPRM, this provision was entitled
"Implementation Specification: Disclosures by whistleblowers." It is now
retitled "Disclosures by whistleblowers," with certain changes, and
moved to § 164.502(j)(1).
***Complaints to the Covered Entity***
In § 164.518(d) of the NPRM, we proposed to require covered entities to
have a mechanism for receiving complaints from individuals regarding the
health plan\'s or provider\'s compliance with the requirements of this
proposed rule. We did not require that the health plan or provider
develop a formal appeals mechanism, nor that \"due process\" or any
similar standard be applied. Additionally, there was no requirement to
respond in any particular manner or time frame.
We proposed two basic requirements for the complaint process. First, the
covered health plan or health care provider would be required to
identify in the notice of information practices a contact person or
office for receiving complaints. Second, the health plan or provider
would be required to maintain a record of the complaints that are filed
and a brief explanation of their resolution, if any.
In the final rule, we retain the requirement for an internal complaint
process for compliance with this rule, including the two basic
requirements of identifying a contact person and documenting complaints
received and their dispositions, if any. We expand the scope of
complaints that covered entities must have a means of receiving to
include complaints concerning violations of the covered entity's privacy
practices, not just violations of the rule. For example, a covered
entity must have a mechanism for receiving a complaint that patient
information is used at a nursing station in a way that it can also be
viewed by visitors to the hospital, regardless of whether the practices
at the nursing stations might constitute a violation of this rule.
***Sanctions***
In § 164.518(e) of the NPRM, we proposed to require all covered entities
to develop, and apply when appropriate, sanctions against members of its
workforce who failed to comply with privacy policies or procedures of
the covered entity or with the requirements of the rule. Covered
entities would be required to develop and impose sanctions appropriate
to the nature of the violation. The preamble stated that the type of
sanction applied would vary depending on factors such as the severity of
the violation, whether the violation was intentional or unintentional,
and whether the violation indicated a pattern or practice of improper
use or disclosure of protected health information. Sanctions could range
from a warning to termination. The NPRM preamble language also stated
that covered entities would be required to apply sanctions against
business associates that violated the proposed rule.
In the final rule, we retain the requirement for sanctions against
members of a covered entity's workforce. We also require a covered
entity to have written policies and procedures for the application of
appropriate sanctions for violations of this subpart and to document
those sanctions. These sanctions do not apply to whistleblower
activities that meet the provisions of § 164.502(j) or complaints,
investigations, or opposition that meet the provisions of §
164.530(g)(2). We eliminate language regarding business associates from
this section. Requirements with respect to business associates are
stated in § 164.504.
***Duty To Mitigate***
In proposed § 164.518(f), we would have required covered entities to
have policies and procedures for mitigating, to the extent practicable,
any deleterious effect of a use or disclosure of protected health
information in violation of the requirements of this subpart. The NPRM
preamble also included specific language applying this requirement to
harm caused by members of the covered entity's workforce and business
associates.
With respect to business associates, the NPRM preamble but not the NPRM
rule text, stated that covered entities would have a duty to take
reasonable steps in response to breaches of contract terms. Covered
entities generally would not be required to monitor the activities of
their business associates, but would be required to take steps to
address problems of which they become aware, and, where the breach was
serious or repeated, would also be required to monitor the business
associate\'s performance to ensure that the wrongful behavior had been
remedied. Termination of the arrangement would be required only if it
became clear that a business associate could not be relied upon to
maintain the privacy of protected health information provided to it.
In the final rule, we clarify this requirement by imposing a duty for
covered entities to mitigate any harmful effect of a use or disclosure
of protected health information that is known to the covered entity. We
apply the duty to mitigate to a violation of the covered entity's
policies and procedures, not just a violation of the requirements of the
subpart. We resolve the ambiguities in the NPRM by imposing this duty on
covered entities for harm caused by either members of their workforce or
by their business associates.
We eliminate the language regarding potential breaches of business
associate contracts from this section. All other requirements with
respect to business associates are stated in § 164.504.
***Refraining from Intimidating or Retaliatory Acts***
In § 164.522(d)(4) of the NPRM, in the Compliance and Enforcement
section, we proposed that one of the responsibilities of a covered
entity would be to refrain from intimidating or retaliatory acts.
Specifically, the rule provided that "\[a\] covered entity may not
intimidate, threaten, coerce, discriminate against, or take other
retaliatory action against any individual for the filing of a complaint
under this section, for testifying, assisting, participating in any
manner in an investigation, compliance review, proceeding or hearing
under this Act, or opposing any act or practice made unlawful by this
subpart."
In the final rule, we continue to require that entities refrain from
intimidating or retaliatory acts; however, the provisions have been
moved to the Administrative Requirements provisions in § 164.530. This
change is not just clerical; in making this change, we apply this
provision to the privacy rule alone rather than to all the HIPAA
administrative simplification rules. (The compliance and enforcement
provisions that were in § 164 are now in Part 160, Subpart C.)
We continue to prohibit retaliation against individuals for filing a
complaint with the Secretary, but also prohibit retaliation against any
other person who files such a complaint. This is the case because the
term "individual" is generally limited to the person who is the subject
of the information. The final rule prohibits retaliation against
persons, not just individuals, for testifying, assisting, or
participating in an investigation, compliance review, proceeding or
hearing under Part C of Title XI. The proposed regulation referenced the
"Act," which is defined in Part 160 as the Social Security Act. Because
we only intend to protect activities such as participation in
investigations and hearings under the Administrative Simplification
provisions of HIPAA, the final rule references Part C of Title XI of the
Social Security Act.
The proposed rule would have prohibited retaliatory actions against
individuals for opposing any act or practice made unlawful by this
subpart. The final rule retains this provision, but applies it to any
person, only if the person "has a good faith belief that the practice
opposed is unlawful, the manner of the opposition is reasonable and does
not involve a disclosure of protected health information in violation of
this subpart." The final rule provides additional protections, which had
been included in the preamble to the proposed rule. Specifically, we
prohibit retaliatory actions against individuals who exercise any right,
or participate in any process established by the privacy rule (Part 164
Subpart E), and include as an example the filing of a complaint with the
covered entity.
***Waiver of Rights***
In the final regulation, but not in the proposed regulation, we provide
that a covered entity may not require individuals to waive their rights
to file a complaint with the Secretary or their other rights under this
rule as a condition of the provision of treatment, payment, enrollment
in a health plan or eligibility for benefits. This provision ensures
that covered entities do not take away the rights that individuals have
been provided in Parts 160 and 164.
***Requirements for Policies and Procedures, and Documentation
requirements***
In § 164.520 of the NPRM, we proposed to require covered entities to
develop and document their policies and procedures for implementing the
requirements of the rule. In the final regulation we retain this
approach, but specify which standards must be documented in each of the
relevant sections. In this section, we state the general administrative
requirements applicable to all policies and procedures required
throughout the regulation.
In § 164.530(i), (j), and (k) of the final rule, we amend the NPRM
language in several respects. In § 164.530(i) we require that the
policies and procedures be reasonably designed to comply with the
standards, implementation specifications, and other requirements of the
relevant part of the regulation, taking into account the size of the
covered entity and the nature of the activities undertaken by the
covered entity that relate to protected health information. However, we
clarify that the requirements that policies and procedures be reasonably
designed may not be interpreted to permit or excuse any action that
violates the privacy regulation. Where the covered entity has stated in
its notice that it reserves the right to change information practices,
we allow the new practice to apply to information created or collected
prior to the effective date of the new practice and establish
requirements for making this change. We also establish the conditions
for making changes if the covered entity has not reserved the right to
change its practices.
We require covered entities to modify in a prompt manner their policies
and procedures to comply with changes in relevant law and, where the
change also affects the practices stated in the notice, to change the
notice. We make clear that nothing in our requirements regarding changes
to policies and procedures or changes to the notice may be used by a
covered entity to excuse a failure to comply with applicable law.
In § 164.530(j), we require that the policies and procedures required
throughout the regulation be maintained in writing, and that any other
communication, action, activity, or designation that must be documented
under this regulation be documented in writing. We note that "writing"
includes electronic storage; paper records are not required. We also
note that, if a covered entity is required to document the title of a
person, we mean the job title or similar description of the relevant
position or office.
We require covered entities to retain any documentation required under
this rule for at least six years (the statute of limitations period for
the civil penalties) from the date of the creation of the documentation,
or the date when the document was last in effect, which ever is later.
This generalizes the NPRM provision to cover all documentation required
under the rule. The language on "last was in effect" is a change from
the NPRM which was worded "unless a longer period applies under this
subpart."
This approach is consistent with the approach recommended by the Joint
Commission on Accreditation of Healthcare Organizations, and the
National Committee for Quality Assurance, in its paper "Protecting
Personal Health Information; A framework for Meeting the Challenges in a
Managed Care Environment." This paper notes that "MCOs \[Managed Care
Organizations\] should have clearly defined policies and procedures for
dealing with confidentiality issues." (p. 29).
***Standards for Certain Group Health Plans***
We add a new provision (§ 164.530(k)) to clarify the administrative
responsibilities of group health plans that offer benefits through
issuers and HMOs. Specifically, a group health plan that provides
benefits solely through an issuer or HMO, and that does not create,
receive or maintain protected health information other than summary
health information or information regarding enrollment and
disenrollment, is not subject to the requirements of this section
regarding designation of a privacy official and contact person,
workforce training, safeguards, complaints, mitigation, or policies and
procedures. Such a group health plan is only subject to the requirements
of this section regarding documentation with respect to its plan
documents. Issuers and HMOs are covered entities under this rule, and
thus have independent obligations to comply with this section with
respect to the protected health information they maintain about the
enrollees in such group health plans. The group health plans subject to
this provision will have only limited protected health information.
Therefore, imposing these requirements on the group health plan would
impose burdens not outweighed by a corresponding enhancement in privacy
protections.
**SECTION 164.532 -- TRANSITION PROVISIONS**
In the NPRM, we did not address the effect of the regulation on consents
and authorizations covered entities obtained prior to the compliance
date of the regulation.
In the final rule, we clarify that, in certain circumstances, a covered
entity may continue to rely upon consents, authorizations, or other
express legal permissions obtained prior to the compliance date of this
regulation to use or disclose protected health information even if these
consents, authorizations, or permissions do not meet the requirements
set forth in §§ 164.506 or 164.508.
We realize that a covered entity may wish to rely upon a consent,
authorization, or other express legal permission obtained from an
individual prior to the compliance date of this regulation which permits
the use or disclosure of individually identifiable health information
for activities that come within treatment, payment, or health care
operations (as defined in § 164.501), but that do not meet the
requirements for consents set forth in § 164.506. In the final rule, we
permit a covered entity to rely upon such consent, authorization, or
permission to use or disclose protected health information that it
created or received before the applicable compliance date of the
regulation to carry out the treatment, payment, or health care
operations as long as it meets two requirements. First, the covered
entity may not make any use or disclosure that is expressly excluded
from the consent, authorization, or permission. Second, the covered
entity must comply with all limitations expressed in the consent,
authorization, or permission. Thus, we do not require a covered entity
to obtain a consent that meets the requirements of § 164.506 to use or
disclose this previously obtained protected health information as long
as the use or disclosure is consistent with the requirements of this
section. However, a covered entity will need to obtain a consent that
meets the requirements of § 164.506 to the extent that it is required to
obtain a consent under § 164.506 from an individual before it may use or
disclose any protected health information it creates or receives after
the date by which it must comply with this rule.
Similarly, we recognize that a covered entity may wish to rely upon a
consent, authorization, or other express legal permission obtained from
an individual prior to the applicable compliance date of this regulation
that specifically permits the covered entity to use or disclose
individually identifiable health information for activities other than
to carry out treatment, payment, or health care operations. In the final
rule, we permit a covered entity to rely upon such a consent,
authorization, or permission to use or disclose protected health
information that it created or received before the applicable compliance
date of the regulation for the specific activities described in the
consent, authorization, or permission as long as the covered entity
complies with two requirements. First, the covered entity may not make
any use or disclosure that is expressly excluded from the consent,
authorization, or permission. Second, the covered entity must comply
with all limitations expressed in the consent, authorization, or
permission. Thus, we do not required a covered entity to obtain an
authorization that meets the requirements of § 164.508 to use or
disclose this previously obtained protected health information so long
as the use or disclosure is consistent with the requirements of this
section. However, a covered entity will need to obtain an authorization
that meets the requirements of § 164.508, to the extent that it is
required to obtain an authorization under this rule, from an individual
before it may use or disclose any protected health information it
creates or receives after the date by which it must comply with this
rule.
Additionally, the final rule acknowledges that covered entities may wish
to rely upon consents, authorizations, or other express legal permission
obtained from an individual prior to the applicable compliance date for
a specific research project that includes the treatment of individuals,
such as clinical trials. These consents, authorizations, or permissions
may specifically permit a use or disclosure of individually identifiable
health information for purposes of the project. Alternatively, they may
be general consents to participate in the project. A covered entity may
use or disclose protected health information it created or received
before or after to the applicable compliance date of this rule for
purposes of the project provided that the covered entity complies with
all limitations expressed in the consent, authorization, or permission.
If, pursuant to this section, a covered entity relies upon a previously
obtained consent, authorization, or other express legal permission and
agrees to a request for a restriction by an individual under §
164.522(a), any subsequent use or disclosure under that consent,
authorization, or permission must comply with the agreed upon
restriction as well.
We believe it is necessary to grandfather in previously obtained
consents, authorizations, or other express legal permissions in these
circumstances to ensure that important functions of the health care
system are not impeded. We link the effectiveness of such consents,
authorizations, or permissions in these circumstances to the applicable
compliance date to give covered entities sufficient notice of the
requirements set forth in §§ 164.506 and 164.508.
The rule does not change the past effectiveness of consents,
authorizations, or other express legal permissions that do not come
within this section. This means that uses or disclosures of individually
identifiable health information made prior to the compliance date of
this regulation are not subject to sanctions, even if they were made
pursuant to documents or permissions that do not meet the requirements
of this rule or were made without permission. This rule alters only the
future effectiveness of the previously obtained consents,
authorizations, or permissions. Covered entities are not required to
rely upon these consents, authorizations, or permissions and may obtain
new consents or authorizations that meet the applicable requirements of
§§ 164.506 and 164.508.
When reaching this decision, we considered requiring all covered
entities to obtain new consents or authorizations consistent with the
requirements of §§ 164.506 and 164.508 before they would be able to use
or disclose protected health information obtained after the compliance
date of these rules. We rejected this option because we recognize that
covered entities may not always be able to obtain new consents or
authorizations consistent with the requirements of §§ 164.506 and
164.508 from all individuals upon whose information they rely. We also
refrained from impeding the rights of covered entities to exercise their
interests in the records they have created. We do not require covered
entities with existing records or databases to destroy or remove the
protected health information for which they do not have valid consents
or authorizations that meet the requirements of §§ 164.506 and 164.508.
Covered entities may rely upon the consents, authorizations, or
permissions they obtained from individuals prior to the applicable
compliance date of this regulation consistent with the constraints of
those documents and the requirements discussed above.
We note that if a covered entity obtains before the applicable
compliance date of this regulation a consent that meets the requirements
of § 164.506, an authorization that meets the requirements of § 164.508,
or an IRB or privacy board waiver of authorization that meets the
requirements of § 164.512(i), the consent, authorization, or waiver is
effective for uses or disclosures that occur after the compliance date
and that are consistent with the terms of the consent, authorization, or
waiver.
**SECTION 164.534 -- COMPLIANCE DATES FOR INITIAL IMPLEMENTATION OF THE
PRIVACY STANDARDS**
In the NPRM, we provided that a covered entity must be in compliance
with this subpart not later than 24 months following the effective date
of this rule, except that a covered entity that is a small health plan
must be in compliance with this subpart not later than 36 months
following the effective date of the rule.
The final rule did not make any substantive changes. The format is
changed so as to more clearly present the various compliance dates. The
final rule lists the types of covered entities and then the various
dates that would apply to each of these entities.
**III. SECTION-BY-SECTION DISCUSSION OF COMMENTS**
The following describes the provisions in the final regulation, and the
changes we make to the proposed provisions section-by-section. Following
each section are our responses to the comments to that section. This
section of the preamble is organized to follow the corresponding section
of the final rule, not the NPRM.
**GENERAL COMMENTS**
We received many comments on the rule overall, not to a particular
provision. We respond to those comments here. Similar comments, but
directed to a specific provision in the proposed rule, are answered
below in the corresponding section of this preamble.
***Comments on the Need for Privacy Standards, and Effects of this
Regulation on Current Protections***
*Comment:* Many commenters expressed the opinion that federal
legislation is necessary to protect the privacy of individuals' health
information. One comment advocated Congressional efforts to provide a
comprehensive federal health privacy law that would integrate the
substance abuse regulations with the privacy regulation.
*Response:* We agree that comprehensive privacy legislation is urgently
needed. This administration has urged the Congress to pass such
legislation. While this regulation will improve the privacy of
individuals' health information, only legislation can provide the full
array of privacy protection that individuals need and deserve.
*Comment:* Many commenters noted that they do not go to a physician, or
do not completely share health information with their physician, because
they are concerned about who will have access to that information. Many
physicians commented on their patients' reluctance to share information
because of fear that their information will later be used against them.
*Response:* We agree that strong federal privacy protections are
necessary to enhance patients' trust in the health care system.
*Comment:* Many commenters expressed concerns that this regulation will
allow access to health information by those who today do not have such
access, or would allow their physician to disclose information which may
not lawfully be disclosed today. Many of these commenters stated that
today, they consent to every disclosure of health information about
them, and that absent their consent the privacy of their health
information is "absolute." Others stated that, today, health information
is disclosed only pursuant to a judicial order. Several commenters were
concerned that this regulation would override stronger state privacy
protection.
*Response:* This regulation does not, and cannot, reduce current privacy
protections. The statutory language of the HIPAA specifically mandates
that this regulation does not preempt state laws that are more
protective of privacy.
As discussed in more detail in later this preamble, while many people
believe that they must be asked permission prior to any release of
health information about them, current laws generally do not impose such
a requirement. Similarly, as discussed in more detail later in this
preamble, judicial review is required today only for a small proportion
of releases of health information.
*Comment:* Many commenters asserted that today, medical records "belong"
to patients. Others asserted that patients own their medical information
and health care providers and insurance companies who maintain health
records should be viewed as custodians of the patients' property.
*Response:* We do not intend to change current law regarding ownership
of or responsibility for medical records. In developing this rule we
reviewed current law on this and related issues, and built on that
foundation.
Under state laws, medical records are often the property of the health
care provider or medical facility that created them. Some state laws
also provide patients with access to medical records or an ownership
interest in the health information in medical records. However, these
laws do not divest the health care provider or the medical facility of
its ownership interest in medical records. These statutes typically
provide a patient the right to inspect or copy health information from
the medical record, but not the right to take the provider's original
copy of an item in the medical record. If a particular state law
provides greater ownership rights, this regulation leaves such rights in
place.
*Comment:* Some commenters argued that the use and disclosure of
sensitive personal information must be strictly regulated, and violation
of such regulations should subject an entity to significant penalties
and sanctions.
*Response:* We agree, and share the commenters' concern that the
penalties in the HIPAA statute are not sufficient to fully protect
individuals' privacy interests. The need for stronger penalties is among
the reasons we believe Congress should pass comprehensive privacy
legislation.
*Comment:* Many commenters expressed the opinion that the proposed ruled
should provide stricter privacy protections.
*Response:* We received nearly 52,000 comments on the proposed
regulation, and make substantial changes to the proposal in response to
those comments. Many of these changes will strengthen the protections
that were proposed in the NPRM.
*Comment:* Many comments express concerns that their health information
will be given to their employers.
*Response:* We agree that employer access to health information is a
particular concern. In this final regulation, we make significant
changes to the NPRM that clarify and provide additional safeguards
governing when and how the health plans covered by this regulation may
disclose health information to employers.
*Comment:* Several commenters argued that individuals should be able to
sue for breach of privacy.
*Response:* We agree, but do not have the legislative authority to grant
a private right of action to sue under this statute. Only Congress can
grant that right.
***Objections to government access to protected health information***
*Comment:* Many commenters urged the Department not to create a
government database of health information, or a tracking system that
would enable the government to track individuals health information.
*Response:* This regulation does not create such a database or tracking
system, nor does it enable future creation of such a database. This
regulation describes the ways in which health plans, health care
clearinghouses, and certain health care providers may use and disclose
identifiable health information with and without the individual's
consent.
*Comment:* Many commenters objected to government access to or control
over their health information, which they believe the proposed
regulation would provide.
*Response:* This regulation does not increase current government access
to health information. This rule sets minimum privacy standards. It does
not require disclosure of health information, other than to the subject
of the records or for enforcement of this rule. Health plans and health
care providers are free to use their own professional ethics and
judgement to adopt stricter policies for disclosing health information.
*Comment:* Some commenters viewed the NPRM as creating fewer hurdles for
government access to protected health information than for access to
protected health information by private organizations. Some health care
providers commented that the NPRM would impose substantial new
restrictions on private sector use and disclosure of protected health
information, but would make government access to protected health
information easy. One consumer advocacy group made the same observation.
*Response:* We acknowledge that many of the national priority purposes
for which we allow disclosure of protected health information without
consent or authorization are for government functions, and that many of
the governmental recipients of such information are not governed by this
rule. It is the role of government to undertake functions in the broader
public interest, such as public health activities, law enforcement,
identification of deceased individuals through coroners' offices, and
military activities. It is these public purposes which can sometimes
outweigh an individual's privacy interest. In this rule, we specify the
circumstances in which that balance is tipped toward the public interest
with respect to health information. We discuss the rationale behind each
of these permitted disclosures in the relevant preamble sections below.
***Miscellaneous Comments***
*Comment:* Many commenters objected to the establishment of a unique
identifier for health care or other purposes.
*Response:* This regulation does not create an identifier. We assume
these comments refer to the unique health identifier that Congress
directed the Secretary to promulgate under section1173(b) of the Social
Security Act, added by section 262 of the HIPAA. Because of the public
concerns about such an identifier, in the summer of 1998 Vice President
Gore announced that the Administration would not promulgate such a
regulation until comprehensive medical privacy protections were in
place. In the fall of that year, Congress prohibited the Department from
promulgating such an identifier, and that prohibition remains in place.
The Department has no plans to promulgate a unique health identifier.
*Comment:* Many commenters asked that we withdraw the proposed
regulation and not publish a final rule.
*Response:* Under section 264 of the HIPAA, the Secretary is required by
Congress to promulgate a regulation establishing standards for health
information privacy. Further, for the reasons explained throughout this
preamble above, we believe that the need to protect health information
privacy is urgent and that this regulation is in the public's interest.
*Comment:* Many commenters express the opinion that their consent should
be required for all disclosure of their health information.
*Response:* We agree that consent should be required prior to release of
health information for many purposes, and impose such a requirement in
this regulation. Requiring consent prior to all release of health
information, however, would unduly jeopardize public safety and make
many operations of the health care system impossible. For example,
requiring consent prior to release of health information to a public
health official who is attempting to track the source of an outbreak or
epidemic could endanger thousands of lives. Similarly, requiring consent
before an oversight official could audit a health plan would make
detection of health care fraud all but impossible; it could take health
plans months or years to locate and obtain the consent of all current
and past enrollees, and the health plan would not have a strong
incentive to do so. These uses of medical information are clearly in the
public interest.
In this regulation, we must balance individuals' privacy interests
against the legitimate public interests in certain uses of health
information. Where there is an important public interest, this
regulation imposes procedural safeguards that must be met prior to
release of health information, in lieu of a requirement for consent. In
some instances the procedural safeguards consists of limits on the
circumstances in which information may be disclosed, in others the
safeguards consist of limits on what information may be disclosed, and
in other cases we require some form of legal process (e.g., a warrant or
subpoena) prior to release of health information. We also allow
disclosure of health information without consent where other law
mandates the disclosures. Where such other law exists, another public
entity has made the determination that the public interests outweigh the
individual's privacy interests, and we do not upset that determination
in this regulation. In short, we tailor the safeguards to match the
specific nature of the public purpose. The specific safeguards are
explained in each section of this regulation below.
*Comment:* Many comments address matters not relevant to this
regulation, such as alternative fuels, hospital reimbursement, and gulf
war syndrome.
*Response:* These and similar matters are not relevant to this
regulation and will not be addressed further.
*Comment:* A few commenters questioned why this level of detail is
needed in response to the HIPAA Congressional mandate.
*Response:* This level of detail is necessary to ensure that
individuals' rights with respect to their health information are clear,
while also ensuring that information necessary for important public
functions, such as protecting public health, promoting biomedical
research, fighting health care fraud, and notifying family members in
disaster situations, will not be impaired by this regulation. We
designed this rule to reflect current practices and change some of them.
The comments and our fact finding revealed the complexity of current
health information practices, and we believe that the complexity
entailed in reflecting those practices is better public policy than a
perhaps simpler rule that disturbed important information flows.
*Comment:* A few comments stated that the goal of administrative
simplification should never override the privacy of individuals.
*Response:* We believe that privacy is a necessary component of
administrative simplification, not a competing interest.
*Comment:* At least one commenter said that the goal of administrative
simplification is not well served by the proposed rule.
*Response:* Congress recognized that privacy is a necessary component of
administrative simplification. The standardization of electronic health
information mandated by the HIPAA that make it easier to share that
information for legitimate purposes also make the inappropriate sharing
of that information easier. For this reason, Congress included a mandate
for privacy standards in this section of the HIPAA. Without appropriate
privacy protections, public fear and instances of abuse would make it
impossible for us to take full advantage of the administrative and costs
benefits inherent in the administrative simplification standards.
*Comment:* At least one commenter asked us to require psychotherapists
to assert any applicable legal privilege on patients' behalf when
protected health information is requested.
*Response:* Whether and when to assert a claim of privilege on a
patient's behalf is a matter for other law and for the ethics of the
individual health care provider. This is not a decision that can or
should be made by the federal government.
*Comment:* One commenter called for HHS to consider the privacy
regulation in conjunction with the other HIPAA standards. In particular,
this comment focused on the belief that the Security Standards should be
compatible with the existing and emerging health care and information
technology industry standards.
*Response:* We agree that both this regulation and the final Security
Regulation should be compatible with existing and emerging technology
industry standards. This regulation is "technology neutral." We do not
mandate the use of any particular technologies, but rather set standards
which can be met through a variety of means.
*Comment*: Several commenters claimed that the statutory authority given
under HIPAA cannot provide meaningful privacy protections because many
entities with access to protected health information, such as employers,
worker's compensation carriers, and life insurance companies, are not
covered entities. These commenters expressed support for comprehensive
legislation to close many of the existing loopholes.
*Response*: We agree with the commenters that comprehensive legislation
is necessary to provide full privacy protection and have called for
members of Congress to pass such legislation to prevent unauthorized and
potentially harmful uses and disclosures of information.
**PART 160 -- SUBPART A -- GENERAL PROVISIONS**
**SECTION 160.103 -- DEFINITIONS**
***Business Associate*.**
The response to comments on the definition of "business partner,"
renamed in this rule as "business associate," is included in the
response to comments on the requirements for business associates in the
preamble discussion of § 164.504.
***Covered Entity*.**
*Comment:* A number of commenters urged the Department to expand or
clarify the definition of "covered entity" to include certain entities
other than health care clearinghouses, health plans, and health care
providers who conduct standard transactions. For example, several
commenters asked that the Department generally expand the scope of the
rule to cover all entities that receive or maintain individually
identifiable health information; others specifically urged the
Department to cover employers, marketing firms, and legal entities that
have access to individually identifiable health information. Some
commenters asked that life insurance and casualty insurance carriers be
considered covered entities for purposes of this rule. One commenter
recommended that Pharmacy Benefit Management (PBM) companies be
considered covered entities so that they may use and disclose protected
health information without authorization.
In addition, a few commenters asked the Department to clarify that the
definition includes providers who do not directly conduct electronic
transactions if another entity, such as a billing service or hospital,
does so on their behalf.
*Response:* We understand that many entities may use and disclose
individually identifiable health information. However, our jurisdiction
under the statute is limited to health plans, health care
clearinghouses, and health care providers who transmit any health
information electronically in connection with any of the standard
financial or administrative transactions in section 1173(a) of the Act.
These are the entities referred to in section 1173(a)(1) of the Act and
thus listed in § 160.103 of the final rule. Consequently, once protected
health information leaves the purview of one of these covered entities,
their business associates, or other related entities (such as plan
sponsors), the information is no longer afforded protection under this
rule. We again highlight the need for comprehensive federal legislation
to eliminate such gaps in privacy protection.
We also provide the following clarifications with regard to specific
entities.
We clarify that employers and marketing firms are not covered entities.
However, employers may be plan sponsors of a group health plan that is a
covered entity under the rule. In such a case, specific requirements
apply to the group health plan. See the preamble on § 164.504 for a
discussion of specific "firewall" and other organizational requirements
for group health plans and their employer sponsors. The final rule also
contains provisions addressing when an insurance issuer providing
benefits under a group health plan may disclose summary health
information to a plan sponsor.
With regard to life and casualty insurers, we understand that such
benefit providers may use and disclose individually identifiable health
information. However, Congress did not include life insurers and
casualty insurance carriers as "health plans" for the purposes of this
rule and therefore they are not covered entities. See the discussion
regarding the definition of "health plan" and excepted benefits.
In addition, we clarify that a PBM is a covered entity only to the
extent that it meets the definition of one or more of the entities
listed in § 160.102. When providing services to patients through managed
care networks, it is likely that a PBM is acting as a business associate
of a health plan, and may thus use and disclose protected health
information pursuant to the relevant provisions of this rule. PBMs may
also be business associates of health care providers. See the preamble
sections on §§ 164.502, 164.504, and 164.506 for discussions of the
specific requirements related to business associates and consent.
Lastly, we clarify that health care providers who do not submit HIPAA
transactions in standard form become covered by this rule when other
entities, such as a billing service or a hospital, transmit standard
electronic transactions on their behalf. The provider could not
circumvent these requirements by assigning the task to a contractor.
*Comment:* Many commenters urged the Department to restrict or clarify
the definition of "covered entity" to exclude certain entities, such as
department-operated hospitals (public hospitals); state Crime Victim
Compensation Programs; employers; and certain lines of insurers, such as
workers' compensation insurers, property and casualty insurers,
reinsurers, and stop-loss insurers. One commenter expressed concern that
clergy, religious practitioners, and other faith-based service providers
would have to abide by the rule and asked that the Department exempt
prayer healing and non-medical health care.
*Response:* The Secretary provides the following clarifications in
response to these comments. To the extent that a "department-operated
hospital" meets the definition of a "health care provider" and conducts
any of the standard transactions, it is a covered entity for the
purposes of this rule. We agree that a state Crime Victim Compensation
Program is not a covered entity if it is not a health care provider that
conducts standard transactions, health plan, or health care
clearinghouse. Further, as described above, employers are not covered
entities.
In addition, we agree that workers' compensation insurers, property and
casualty insurers, reinsurers, and stop-loss insurers are not covered
entities, as they do not meet the statutory definition of "health plan."
See further discussion in the preamble on § 160.103 regarding the
definition of "health plan." However, activities related to ceding,
securing, or placing a contract for reinsurance, including stop-loss
insurance, are health care operations in the final rule. As such,
reinsurers and stop-loss insurers may obtain protected health
information from covered entities.
Also, in response to the comment regarding religious practitioners, the
Department clarifies that "health care" as defined under the rule does
not include methods of healing that are solely spiritual. Therefore,
clergy or other religious practitioners that provide solely religious
healing services are not health care providers within the meaning of
this rule, and consequently not covered entities for the purposes of
this rule.
*Comment:* A few commenters expressed general uncertainty and requested
clarification as to whether certain entities were covered entities for
the purposes of this rule. One commenter was uncertain as to whether the
rule applies to certain social service entities, in addition to clinical
social workers that the commenter believes are providers. Other
commenters asked whether researchers or non-governmental entities that
collect and analyze patient data to monitor and evaluate quality of care
are covered entities. Another commenter requested clarification
regarding the definition's application to public health agencies that
also are health care providers as well as how the rule affects public
health agencies in their data collection from covered entities.
*Response:* Whether the professionals described in these comments are
covered by this rule depends on the activities they undertake, not on
their profession or degree. The definitions in this rule are based on
activities and functions, not titles. For example, a social service
worker whose activities meet this rule's definition of health care will
be a health care provider. If that social service worker also transmits
information in a standard HIPAA transaction, he or she will be a covered
health entity under this rule. Another social service worker may provide
services that do not meet the rule's definition of health care, or may
not transmit information in a standard transaction. Such a social
service worker is not a covered entity under this rule. Similarly,
researchers in and of themselves are not covered entities. However,
researchers may also be health care providers if they provide health
care. In such cases, the persons, or entities in their role as health
care providers may be covered entities if they conduct standard
transactions.
With regard to public health agencies that are also health care
providers, the health care provider "component" of the agency is the
covered entity if that component conducts standard transactions. See
discussion of "health care components" below. As to the data collection
activities of a public health agency, the final rule in § 164.512(b)
permits a covered entity to disclose protected health information to
public health authorities under specified circumstances, and permits
public health agencies that are also covered entities to use protected
health information for these purposes. See § 164.512(b) for further
details.
*Comment:* A few commenters requested that the Department clarify that
device manufacturers are not covered entities. They stated that the
proposal did not provide enough guidance in cases where the
"manufacturer supplier" has only one part of its business that acts as
the "supplier," and additional detail is needed about the relationship
of the "supplier component" of the company to the rest of the business.
Similarly, another commenter asserted that drug, biologics, and device
manufacturers should not be covered entities simply by virtue of their
manufacturing activities.
*Response:* We clarify that if a supplier manufacturer is a Medicare
supplier, then it is a health care provider, and it is a covered entity
if it conducts standard transactions. Further, we clarify that a
manufacturer of supplies related to the health of a particular
individual, e.g., prosthetic devices, is a health care provider because
the manufacturer is providing "health care" as defined in the rule.
However, that manufacturer is a covered entity only if it conducts
standard transactions. We do not intend that a manufacturer of supplies
that are generic and not customized or otherwise specifically designed
for particular individuals, e.g., ace bandages for a hospital, is a
health care provider. Such a manufacturer is not providing "health care"
as defined in the rule and is therefore not a covered entity. We note
that, even if such a manufacturer is a covered entity, it may be an
'indirect treatment provider' under this rule, and thus not subject to
all of the rule's requirements.
With regard to a "supplier component," the final rule addresses the
status of the unit or unit(s) of a larger entity that constitute a
"health care component." See further discussion under § 164.504 of this
preamble.
Finally, we clarify that drug, biologics, and device manufacturers are
not health care providers simply by virtue of their manufacturing
activities. The manufacturer must be providing health care consistent
with the final rule's definition in order to be considered a health care
provider.
*Comment:* A few commenters asked that the Department clarify that
pharmaceutical manufacturers are not covered entities. It was explained
that pharmaceutical manufacturers provide support and guidance to
doctors and patients with respect to the proper use of their products,
provide free products for doctors to distribute to patients, and operate
charitable programs that provide pharmaceutical drugs to patients who
cannot afford to buy the drugs they need.
*Response:* A pharmaceutical manufacturer is only a covered entity if
the manufacturer provides "health care" according to the rule's
definition and conducts standard transactions. In the above case, a
pharmaceutical manufacturer that provides support and guidance to
doctors and patients regarding the proper use of their products is
providing "health care" for the purposes of this rule, and therefore, is
a health care provider to the extent that it provides such services. The
pharmaceutical manufacturer that is a health care provider is only a
covered entity, however, if it conducts standard transactions. We note
that this rule permits a covered entity to disclose protected health
information to any person for treatment purposes, without specific
authorization from the individual. Therefore, a covered health care
provider is permitted to disclose protected health information to a
pharmaceutical manufacturer for treatment purposes. Providing free
samples to a health care provider does not in itself constitute health
care. For further analysis of pharmacy assistance programs, see response
to comment on § 164.501, definition of "payment."
*Comment*: Several commenters asked about the definition of "covered
entity" and its application to health care entities within larger
organizations.
*Response*: A detailed discussion of the final rule's organizational
requirements and firewall restrictions for "health care components" of
larger entities, as well as for affiliated, and other entities is found
at the discussion of § 164.504 of this preamble. The following responses
to comments provide additional information with respect to particular
"component entity" circumstances.
*Comment*: Several commenters asked that we clarify the definition of
covered entity to state that with respect to persons or organizations
that provide health care or have created health plans but are primarily
engaged in other unrelated businesses, the term "covered entity"
encompasses only the health care components of the entity. Similarly,
others recommended that only the component of a government agency that
is a provider, health plan, or clearinghouse should be considered a
covered entity.
Other commenters requested that we revise proposed § 160.102 to apply
only to the component of an entity that engages in the transactions
specified in the rule. Commenters stated that companies should remain
free to employ licensed health care providers and to enter into
corporate relationships with provider institutions without fear of being
considered to be a covered entity. Another commenter suggested that the
regulation not apply to the provider-employee or employer when neither
the provider nor the company are a covered entity.
Some commenters specifically argued that the definition of "covered
entity" did not contemplate an integrated health care system and one
commenter stated that the proposal would disrupt the multi-disciplinary,
collaborative approach that many take to health care today by treating
all components as separate entities. Commenters, therefore, recommended
that the rule treat the integrated entity, not its constituent parts, as
the covered entity.
A few commenters asked that the Department further clarify the
definition with respect to the unique organizational models and
relationships of academic medical centers and their parent universities
and the rules that govern information exchange within the institution.
One commenter asked whether faculty physicians who are paid by a medical
school or faculty practice plan and who are on the medical staff of, but
not paid directly by, a hospital are included within the covered entity.
Another commenter stated that it appears that only the health center at
an academic institution is the covered entity. Uncertainty was also
expressed as to whether other components of the institution that might
create protected health information only incidentally through the
conduct of research would also be covered.
*Response:* The Department understands that in today's health care
industry, the relationships among health care entities and non-health
care organizations are highly complex and varied. Accordingly, the final
rule gives covered entities some flexibility to segregate or aggregate
its operations for purposes of the application of this rule. The new
component entity provision can be found at §§ 164.504(b)-(c). In
response to the request for clarification on whether the rule would
apply to a research component of the covered entity, we point out that
if the research activities fall outside of the health care component
they would not be subject to the rule. One organization may have one or
several "health care component(s)" that each perform one or more of the
health care functions of a covered entity, i.e., health care provider,
health plan, health care clearinghouse. In addition, the final rule
permits covered entities that are affiliated, i.e., share common
ownership or control, to designate themselves, or their health care
components, together to be a single covered entity for purposes of the
rule.
It appears from the comments that there is not a common understanding of
the meaning of "integrated delivery system." Arrangements that apply
this label to themselves operate and share information many different
ways, and may or may not be financially or clinically integrated. In
some cases, multiple entities hold themselves out as one enterprise and
engage together in clinical or financial activities. In others, separate
entities share information but do not provide treatment together or
share financial risk. Many health care providers participate in more
than one such arrangement.
Therefore, we do not include a separate category of 'covered entity'
under this rule for "integrated delivery systems" but instead
accommodate the operations of these varied arrangements through the
functional provisions of the rule. For example, covered entities that
operate as 'organized health care arrangements' as defined in this rule
may share protected health information for the operation of such
arrangement without becoming business associates of one another.
Similarly, the regulation does not require a business associate
arrangement when protected health information is shared for purposes of
providing treatment. The application of this rule to any particular
'integrated system' will depend on the nature of the common activities
the participants in the system perform. When the participants in such an
arrangement are 'affiliated' as defined in this rule, they may consider
themselves a single covered entity (see § 164. 504).
The arrangements between academic health centers, faculty practice
plans, universities, and hospitals are similarly diverse. We cannot
describe a blanket rule that covers all such arrangements. The
application of this rule will depend on the purposes for which the
participants in such arrangements share protected health information,
whether some or all participants are under common ownership or control,
and similar matters. We note that physicians who have staff privileges
at a covered hospital do not become part of that hospital covered entity
by virtue of having such privileges.
We reject the recommendation to apply the rule only to components of an
entity that engage in the transactions. This would omit as covered
entities, for example, the health plan components that do not directly
engage in the transactions, including components that engage in
important health plan functions such as coverage determinations and
quality review. Indeed, we do not believe that the statute permits this
result with respect to health plans or health care clearinghouses as a
matter of negative implication from section 1172(a)(3). We clarify that
only a health care provider must conduct transactions to be a covered
entity for purposes of this rule.
We also clarify that health care providers (such as doctors or nurses)
who work for a larger organization and do not conduct transactions on
their own behalf are workforce members of the covered entity, not
covered entities themselves.
*Comment:* A few commenters asked the Department to clarify the
definition to provide that a multi-line insurer that sells insurance
coverages, some of which do and others which do not meet the definition
of "health plan," is not a covered entity with respect to actions taken
in connection with coverages that are not "health plans."
*Response:* The final rule clarifies that the requirements below apply
only to the organizational unit or units of the organization that are
the "health care component" of a covered entity, where the "covered
functions" are not the primary functions of the entity. Therefore, for a
multi-line insurer, the "health care component" is the insurance line(s)
that conduct, or support the conduct of, the health care function of the
covered entity. Also, it should be noted that excepted benefits, such as
life insurance, are not included in the definition of "health plan."
(See preamble discussion of § 164.504).
*Comment*: A commenter questioned whether the Health Care Financing
Administration (HCFA) is a covered entity and how HCFA will share data
with Medicare managed care organizations. The commenter also questioned
why the regulation must apply to Medicaid since the existing Medicaid
statute requires that states have privacy standards in place. It was
also requested that the Department provide a definition of "health plan"
to clarify that state Medicaid Programs are considered as such.
*Response:* HCFA is a covered entity because it administers Medicare and
Medicaid, which are both listed in the statute as health plans. Medicare
managed care organizations are also covered entities under this
regulation. As noted elsewhere in this preamble, covered entities that
jointly administer a health plan, such as Medicare + Choice, are both
covered entities, and are not business associates of each other by
virtue of such joint administration.
We do not exclude state Medicaid programs. Congress explicitly included
the Medicaid program as a covered health plan in the HIPAA statute.
*Comment:* A commenter asked the Department to provide detailed guidance
as to when providers, plans, and clearinghouses become covered entities.
The commenter provided the following example: if a provider submits
claims only in paper form, and a coordination of benefits (COB)
transaction is created due to other insurance coverage, will the
original provider need to be notified that the claim is now in
electronic form, and that it has become a covered entity? Another
commenter voiced concern as to whether physicians who do not conduct
electronic transactions would become covered entities if another entity
using its records downstream transmits information in connection with a
standard transaction on their behalf.
*Response:* We clarify that health care providers who submit the
transactions in standard electronic form, health plans, and health care
clearinghouses are covered entities if they meet the respective
definitions. Health care providers become subject to the rule if they
conduct standard transactions. In the above example, the health care
provider would not be a covered entity if the coordination of benefits
transaction was generated by a payor.
We also clarify that health care providers who do not submit
transactions in standard form become covered by this rule when other
entities, such as a billing service or a hospital, transmit standard
electronic transactions on the providers' behalf. However, where the
downstream transaction is not conducted on behalf of the health care
provider, the provider does not become a covered entity due to the
downstream transaction.
*Comment:* Several commenters discussed the relationship between section
1179 of the Act and the privacy regulations. One commenter suggested
that HHS retain the statement that a covered entity means "the entities
to which part C of title XI of the Act applies." In particular, the
commenter observed that section 1179 of the Act provides that part C of
title XI of the Act does not apply to financial institutions or to
entities acting on behalf of such institutions that are covered by the
section 1179 exemption. Thus, under the definition of covered entity,
they comment that financial institutions and other entities that come
within the scope of the section 1179 exemption are appropriately not
covered entities.
Other commenters maintained that section 1179 of the Act means that the
Act's privacy requirements do not apply to the request for, or the use
or disclosure of, information by a covered entity with respect to
payment: (a) for transferring receivables; (b) for auditing; (c) in
connection with - (i) a customer dispute; or (ii) an inquiry from or to
a customer; (d) in a communication to a customer of the entity regarding
the customer's transactions payment card, account, check, or electronic
funds transfer; (e) for reporting to consumer reporting agencies; or (f)
for complying with: (i) a civil or criminal subpoena; or (ii) a federal
or state law regulating the entity. These companies expressed concern
that the proposed rule did not include the full text of section 1179
when discussing the list of activities that were exempt from the rule's
requirements. Accordingly, they recommended including in the final rule
either a full listing of or a reference to section 1179\'s full list of
exemptions. Furthermore, these firms opposed applying the proposed
rule's minimum necessary standard for disclosure of protected health
information to financial institutions because of section 1179.
These commenters suggest that in light of section 1179, HHS lacks the
authority to impose restrictions on financial institutions and other
entities when they engage in activities described in that section. One
commenter expressed concern that even though proposed § 164.510(i) would
have permitted covered entities to disclose certain information to
financial institutions for banking and payment processes, it did not
state clearly that financial institutions and other entities described
in section 1179 are exempt from the rule's requirements.
*Response:* We interpret section 1179 of the Act to mean that entities
engaged in the activities of a financial institution, and those acting
on behalf of a financial institution, are not subject to this regulation
when they are engaged in authorizing, processing, clearing, settling,
billing, transferring, reconciling, or collecting payments for a
financial institution. The statutory reference to 12 U.S.C. 3401
indicates that Congress chose to adopt the definition of financial
institutions found in the Right to Financial Privacy Act, which defines
financial institutions as any office of a bank, savings bank, card
issuer, industrial loan company, trust company, savings association,
building and loan, homestead association, cooperative bank, credit
union, or consumer finance institution located in the United States or
one of its Territories. Thus, when we use the term "financial
institution" in this regulation, we turn to the definition with which
Congress provided us. We interpret this provision to mean that when a
financial institution, or its agent on behalf of the financial
institution, conducts the activities described in section 1179, the
privacy regulation will not govern the activity.
If, however, these activities are performed by a covered entity or by
another entity, including a financial institution, on behalf of a
covered entity, the activities are subject to this rule. For example, if
a bank operates the accounts payable system or other "back office"
functions for a covered health care provider, that activity is not
described in section 1179. In such instances, because the bank would
meet the rule's definition of "business associate," the provider must
enter into a business associate contract with the bank before disclosing
protected health information pursuant to this relationship. However, if
the same provider maintains an account through which he/she cashes
checks from patients, no business associate contract would be necessary
because the bank's activities are not undertaken for or on behalf of the
covered entity, and fall within the scope of section 1179. In part to
give effect to section 1179, in this rule we do not consider a financial
institution to be acting on behalf of a covered entity when it processes
consumer-conducted financial transactions by debit, credit or other
payment card, clears checks, initiates or processes electronic funds
transfers, or conducts any other activity that directly facilitates or
effects the transfer of funds for compensation for health care.
We do not agree with the comment that section 1179 of the Act means that
the privacy regulation's requirements cannot apply to the activities
listed in that section; rather, it means that the entities expressly
mentioned, financial institutions (as defined in the Right to Financial
Privacy Act), and their agents that engage in the listed activities for
the financial institution are not within the scope of the regulation.
Nor do we interpret section 1179 to support an exemption for disclosures
to financial institutions from the minimum necessary provisions of this
regulation.
*Comment:* One commenter recommended that HHS include a definition of
"entity" in the final rule because HIPAA did not define it. The
commenter explained that in a modern health care environment, the
organization acting as the health plan or health care provider may
involve many interrelated corporate entities and that this could lead to
difficulties in determining what "entities" are actually subject to the
regulation.
*Response:* We reject the commenter's suggestion. We believe it is clear
in the final rule that the entities subject to the regulation are those
listed at § 160.102. However, we acknowledge that how the rule applies
to integrated or other complex health systems needs to be addressed; we
have done so in § 164.504 and in other provisions, such as those
addressing organized health care arrangements.
*Comment*: The preamble should clarify that self-insured group health
and workmen's compensation plans are not covered entities or business
partners.
*Response*: In the preamble to the proposed rule we stated that certain
types of insurance entities, such as workers\' compensation, would not
be covered entities under the rule. We do not change this position in
this final rule. The statutory definition of health plan does not
include workers' compensation products, and the regulatory definition of
the term specifically excludes them. However, HIPAA specifically
includes most group health plans within the definition of "health plan."
*Comment:* A health insurance issuer asserted that health insurers and
third party administrators are usually required by employers to submit
reports describing the volume, amount, payee, basis for services
rendered, types of claims paid and services for which payment was
requested on behalf of it covered employees. They recommended that the
rule permit the disclosure of protected health information for such
purposes.
*Response*: We agree that health plans should be able to disclose
protected health information to employers sponsoring health plans under
certain circumstances. Section 164.504(f) explains the conditions under
which protected health information may be disclosed to plan sponsors. We
believe that this provision gives sponsors access to the information
they need, but protects individual's information to the extent possible
under our legislative authority.
***Group Health Plan*.**
For response to comments relating to "group health plan," see the
response to comments on "health plan" below and the response to comments
on § 164.504.
***Health Care*.**
*Comment*: A number of commenters asked that we include disease
management activities and other similar health improvement programs,
such as preventive medicine, health education services and maintenance,
health and case management, and risk assessment, in the definition of
"health care." Commenters maintained that the rule should avoid limiting
technological advances and new health care trends intended to improve
patient "health care."
*Response*: Review of these and other comments, and our fact-finding,
indicate that there are multiple, different, understandings of the
definition of these terms. Therefore, rather than create a blanket rule
that includes such terms in or excludes such terms from the definition
of "health care," we define health care based on the underlying
activities that constitute health care. The activities described by
these commenters are considered 'health care' under this rule to the
extent that they meet this functional definition. Listing activities by
label or title would create the risk that important activities would be
left out and, given the lack of consensus on what these terms mean,
could also create confusion.
*Comment*: Several commenters urged that the Department clarify that the
activities necessary to procure and distribute eyes and eye tissue will
not be hampered by the rule. Some of these commenters explicitly
requested that we include "eyes and eye tissue" in the list of
procurement biologicals as well as "eye procurement" in the definition
of "health care." In addition, it was argued that "administration to
patients" be excluded in the absence of a clear definition. Also,
commenters recommended that the definition include other activities
associated with the transplantation of organs, such as processing,
screening, and distribution.
*Response*: We delete from the definition of "health care" activities
related to the procurement or banking of blood, sperm, organs, or any
other tissue for administration to patients. We do so because persons
who make such donations are not seeking to be treated, diagnosed, or
assessed or otherwise seeking health care for themselves, but are
seeking to contribute to the health care of others. In addition, the
nature of these activities entails a unique kind of information sharing
and tracking necessary to safeguard the nation's organ and blood supply,
and those seeking to donate are aware that this information sharing will
occur. Consequently, such procurement or banking activities are not
considered health care and the organizations that perform such
activities are not considered health care providers for purposes of this
rule.
With respect to disclosure of protected health information by covered
entities to facilitate cadaveric organ and tissue donation, the final
rule explicitly permits a covered entity to disclose protected health
information without authorization, consent, or agreement to organ
procurement organizations or other entities engaged in the procurement,
banking, or transplantation of cadaveric organs, eyes, or tissue for the
purpose of facilitating donation and transplantation. See § 164.512(h).
We do not include blood or sperm banking in this provision because, for
those activities, there is direct contact with the donor, and thus
opportunity to obtain the individual's authorization.
*Comment*: A large number of commenters urged that the term "assessment"
be included in the list of services in the definition, as "assessment"
is used to determine the baseline health status of an individual. It was
explained that assessments are conducted in the initial step of
diagnosis and treatment of a patient. If assessment is not included in
the list of services, they pointed out that the services provided by
occupational health nurses and employee health information may not be
covered.
*Response:* We agree and have added the term "assessment" to the
definition to clarify that this activity is considered "health care" for
the purposes of the rule.
*Comment:* One commenter asked that we revise the definition to
explicitly exclude plasmapheresis from paragraph (3) of the definition.
It was explained that plasmapheresis centers do not have direct access
to health care recipients or their health information, and that the
limited health information collected about plasma donors is not used to
provide health care services as indicated by the definition of health
care.
*Response:* We address the commenters' concerns by removing the
provision related to procurement and banking of human products from the
definition.
***Health Care Clearinghouse*.**
*Comment:* The largest set of comments relating to health care
clearinghouses focused on our proposal to exempt health care
clearinghouses from the patient notice and access rights provisions of
the regulation. In our NPRM, we proposed to exempt health care
clearinghouses from certain provisions of the regulation that deal with
the covered entities' notice of information practices and consumers'
rights to inspect, copy, and amend their records. The rationale for this
exemption was based on our belief that health care clearinghouses engage
primarily in business-to-business transactions and do not initiate or
maintain direct relationships with individuals. We proposed this
position with the caveat that the exemptions would be void for any
health care clearinghouse that had direct contact with individuals in a
capacity other than that of a business partner. In addition, we
indicated that, in most instances, clearinghouses also would be
considered business partners under this rule and would be bound by their
contracts with covered plans and providers. They also would be subject
to the notice of information practices developed by the plans and
providers with whom they contract.
Commenters stated that, although health care clearinghouses do not have
direct contact with individuals, they do have individually identifiable
health information that may be subject to misuse or inappropriate
disclosure. They expressed concern that we were proposing to exempt
health care clearinghouses from all or many aspects of the regulation.
These commenters suggested that we either delete the exemption or make
it very narrow, specific and explicit in the final regulatory text.
Clearinghouse commenters, on the other hand, were in agreement with our
proposal, including the exemption provision and the provision that the
exemption is voided when the entity does have direct contact with
individuals. They also stated that a health care clearinghouse that has
a direct contact with individuals is no longer a health care
clearinghouse as defined and should be subject to all requirements of
the regulation.
*Response:* In the final rule, where a clearinghouse creates or receives
protected health information as a business associate of another covered
entity, we maintain the exemption for health care clearinghouses from
certain provisions of the regulation dealing with the notice of
information practices and patient's direct access rights to inspect,
copy and amend records (§§ 164.524 and 164.526), on the grounds that a
health care clearinghouse is engaged in business-to-business operations,
and is not dealing directly with individuals. Moreover, as business
associates of plans and providers, health care clearinghouses are bound
by the notices of information practices of the covered entities with
whom they contract.
Where a health care clearinghouse creates or receives protected health
information other than as a business associate, however, it must comply
with all the standards, requirements, and implementation specifications
of the rule. We describe and delimit the exact nature of the exemption
in the regulatory text. See § 164.500(b). We will monitor developments
in this sector should the basic business-to-business relationship
change.
*Comment:* A number of comments relate to the proposed definition of
health care clearinghouse. Many commenters suggested that we expand the
definition. They suggested that additional types of entities be included
in the definition of health care clearinghouse, specifically medical
transcription services, billing services, coding services, and
\"intermediaries.\" One commenter suggested that the definition be
expanded to add entities that receive standard transactions, process
them and clean them up, and then send them on, without converting them
to any standard format. Another commenter suggested that the health care
clearinghouse definition be expanded to include entities that do not
perform translation but may receive protected health information in a
standard format and have access to that information. Another commenter
stated that the list of covered entities should include any organization
that receives or maintains individually identifiable health information.
One organization recommended that we expand the health care
clearinghouse definition to include the concept of a research data
clearinghouse, which would collect individually identifiable health
information from other covered entities to generate research data files
for release as de-identified data or with appropriate confidentiality
safeguards. One commenter stated that HHS had gone beyond Congressional
intent by including billing services in the definition.
*Response:* We cannot expand the definition of "health care
clearinghouse" to cover entities not covered by the definition of this
term in the statute. In the final regulation, we make a number of
changes to address public comments relating to definition. We modify the
definition of health care clearinghouse to conform to the definition
published in the Transactions Rule (with the addition of a few words, as
noted above). We clarify in the preamble that, while the term "health
care clearinghouse" may have other meanings and connotations in other
contexts, for purposes of this regulation an entity is considered a
health care clearinghouse only to the extent that it actually meets the
criteria in our definition. Entities performing other functions but not
meeting the criteria for a health care clearinghouse are not
clearinghouses, although they may be business associates. Billing
services are included in the regulatory definition of "health care
clearinghouse," if they perform the specified clearinghouse functions.
Although we have not added or deleted any entities from our original
definition, we will monitor industry practices and may add other
entities in the future as changes occur in the health system.
*Comment:* Several commenters suggested that we clarify that an entity
acting solely as a conduit through which individually identifiable
health information is transmitted or through which protected health
information flows but is not stored is not a covered entity, e.g., a
telephone company or Internet Service Provider. Other commenters
indicated that once a transaction leaves a provider or plan
electronically, it may flow through several entities before reaching a
clearinghouse. They asked that the regulation protect the information in
that interim stage, just as the security NPRM established a chain of
trust arrangement for such a network. Others noted that these
\"conduit\" entities are likely to be business partners of the provider,
clearinghouse or plan, and we should clarify that they are subject to
business partner obligations as in the proposed Security Rule.
*Response:* We clarify that entities acting as simple and routine
communications conduits and carriers of information, such as telephone
companies and Internet Service Providers, are not clearinghouses as
defined in the rule unless they carry out the functions outlined in our
definition. Similarly, we clarify that value added networks and switches
are not health care clearinghouses unless they carry out the functions
outlined in the definition, and clarify that such entities may be
business associates if they meet the definition in the regulation.
*Comment:* Several commenters, including the large clearinghouses and
their trade associations, suggested that we not treat health care
clearinghouses as playing a dual role as covered entity and business
partner in the final rule because such a dual role causes confusion as
to which rules actually apply to clearinghouses. In their view, the
definition of health care clearinghouse is sufficiently clear to stand
alone and identify a health care clearinghouse as a covered entity, and
allows health care clearinghouses to operate under one consistent set of
rules. *Response:* For reasons explained in § 164.504 of this preamble,
we do not create an exception to the business associate requirements
when the business associate is also a covered entity. We retain the
concept that a health care clearinghouse may be a covered entity and a
business associate of a covered entity under the regulation. As business
associates, they would be bound by their contracts with covered plans
and providers.
***Health Care Provider*.**
*Comment:* One commenter pointed out that the preamble referred to the
obligations of providers and did not use the term, "covered entity," and
thus created ambiguity about the obligations of health care providers
who may be employed by persons other than covered entities, e.g.,
pharmaceutical companies. It was suggested that a better reading of the
statute and rule is that where neither the provider nor the company is a
covered entity, the rule does not impose an obligation on either the
provider-employee or the employer.
*Response:* We agree. We use the term "covered entity" whenever possible
in the final rule, except for the instances where the final rule treats
the entities differently, or where use of the term "health care
provider" is necessary for purposes of illustrating an example.
*Comment:* Several commenters stated that the proposal's definition was
broad, unclear, and/or confusing. Further, we received many comments
requesting clarification as to whether specific entities or persons were
"health care providers" for the purposes of our rule. One commenter
questioned whether affiliated members of a health care group (even
though separate legal entities) would be considered as one primary
health care provider.
*Response:* We permit legally distinct covered entities that share
common ownership or control to designate themselves together to be a
single covered entity. Such organizations may promulgate a single shared
notice of information practices and a consent form. For more detailed
information, see the preamble discussion of § 164.504(d).
We understand the need for additional guidance on whether specific
entities or persons are health care providers under the final rule. We
provide guidance below and will provide additional guidance as the rule
is implemented.
*Comment:* One commenter observed that sections 1171(3), 1861(s) and
1861(u) of the Act do not include pharmacists in the definition of
health care provider or pharmacist services in the definition of
"medical or other health services," and questioned whether pharmacists
were covered by the rule.
*Response:* The statutory definition of "health care provider" at
section 1171(3) includes "any other person or organization who
furnishes, bills, or is paid for health care in the normal course of
business." Pharmacists' services are clearly within this statutory
definition of "health care." There is no basis for excluding pharmacists
who meet these statutory criteria from this regulation .
*Comment:* Some commenters recommended that the scope of the definition
be broadened or clarified to cover additional persons or organizations.
Several commenters argued for expanding the reach of the health care
provider definition to cover entities such as state and local public
health agencies, maternity support services (provided by nutritionists,
social workers, and public health nurses and the Special Supplemental
Nutrition Program for Women, Infants and Children), and those companies
that conduct cost-effectiveness reviews, risk management, and
benchmarking studies. One commenter queried whether auxiliary providers
such as child play therapists, and speech and language therapists are
considered to be health care providers. Other commenters questioned
whether "alternative" or "complementary" providers, such as naturopathic
physicians and acupuncturists would be considered health care providers
covered by the rule.
*Response:* As with other aspects of this rule, we do not define "health
care provider" based on the title or label of the professional. The
professional activities of these kinds of providers vary; a person is a
"health care provider" if those activities are consistent with the
rule's definition of "health care provider." Thus, health care providers
include persons, such as those noted by the commenters, to the extent
that they meet the definition. We note that health care providers are
only subject to this rule if they conduct certain transactions. See the
definition of "covered entity."
However companies that conduct cost-effectiveness reviews, risk
management, and benchmarking studies are not health care providers for
the purposes of this rule unless they perform other functions that meet
the definition. These entities would be business associates if they
perform such activities on behalf of a covered entity.
*Comment:* Another commenter recommended that the Secretary expand the
definition of health care provider to cover health care providers who
transmit or "or receive" any health care information in electronic form.
*Response:* We do not accept this suggestion. Section 1172(a)(3) states
that providers that "transmit" health information in connection with one
of the HIPAA transactions are covered, but does not use the term
"receive" or a similar term.
*Comment:* Some comments related to online companies as health care
providers and covered entities. One commenter argued that there was no
reason "why an Internet pharmacy should not also be covered" by the rule
as a health care provider. Another commenter stated that online health
care service and content companies, including online medical record
companies, should be covered by the definition of health care provider.
Another commenter pointed out that the definitions of covered entities
cover "Internet providers who 'bill' or are 'paid' for health care
services or supplies, but not those who finance those services in other
ways, such as through sale of identifiable health information or
advertising." It was pointed out that thousands of Internet sites use
information provided by individuals who access the sites for marketing
or other purposes.
*Response:* We agree that online companies are covered entities under
the rule if they otherwise meet the definition of health care provider
or health plan and satisfy the other requirements of the rule, i.e.,
providers must also transmit health information in electronic form in
connection with a HIPAA transaction. We restate here the language in the
preamble to the proposed rule that "An individual or organization that
bills and/or is paid for health care services or supplies in the normal
course of business, such as\...an 'online' pharmacy accessible on the
Internet, is also a health care provider for purposes of this statute"
(64 FR 59930).
*Comment:* We received many comments related to the reference to "health
clinic or licensed health care professional located at a school or
business in the preamble's discussion of "health care provider." It was
stated that including "licensed health care professionals located at a
school or business" highlights the need for these individuals to
understand they have the authority to disclose information to the Social
Security Administration (SSA) without authorization.
However, several commenters urged HHS to create an exception for or
delete that reference in the preamble discussion to primary and
secondary schools because of employer or business partner relationships.
One federal agency suggested that the reference "licensed health care
professionals located at a \[school\]" be deleted from the preamble
because the definition of health care provider does not include a
reference to schools. The commenter also suggested that the Secretary
consider: adding language to the preamble to clarify that the rules do
not apply to clinics or school health care providers that only maintain
records that have been excepted from the definition of protected health
information, adding an exception to the definition of covered entities
for those schools, and limiting paperwork requirements for these
schools. Another commenter argued for deleting references to schools
because the proposed rule appeared to supersede or create ambiguity as
to the Family Educational Rights and Privacy Act (FERPA), which gives
parents the right to access "education" and health records of their
unemancipated minor children. However, in contrast, one commenter
supported the inclusion of health care professionals who provide
services at schools or businesses.
*Response:* We realize that our discussion of schools in the NPRM may
have been confusing. Therefore, we address these concerns and set forth
our policy regarding protected health information in educational
agencies and institutions in the "Relationship to Other Federal Laws"
discussion of FERPA, above.
*Comment:* Many commenters urged that direct contact with the patient be
necessary for an entity to be considered a health care provider.
Commenters suggested that persons and organizations that are remote to
the patient and have no direct contact should not be considered health
care providers. Several commenters argued that the definition of health
care provider covers a person that provides health care services or
supplies only when the provider furnishes to or bills the patient
directly. It was stated that the Secretary did not intend that
manufacturers, such as pharmaceutical, biologics, and device
manufacturers, health care suppliers, medical-surgical supply
distributors, health care vendors that offer medical record
documentation templates and that typically do not deal directly with the
patient, be considered health care providers and thus covered entities.
However, in contrast, one commenter argued that, as an in vitro
diagnostics manufacturer, it should be covered as a health care
provider.
*Response:* We disagree with the comments that urged that direct
dealings with an individual be a prerequisite to meeting the definition
of health care provider. Many providers included in the statutory
definition of provider, such as clinical labs, do not have direct
contact with patients. Further, the use and disclosure of protected
health information by indirect treatment providers can have a
significant effect on individuals' privacy. We acknowledge, however,
that providers who treat patients only indirectly need not have the full
array of responsibilities as direct treatment providers, and modify the
NPRM to make this distinction with respect to several provisions (see,
for example § 164.506 regarding consent). We also clarify that
manufacturers and health care suppliers who are considered providers by
Medicare are providers under this rule.
*Comment:* Some commenters suggested that blood centers and plasma donor
centers that collect and distribute source plasma not be considered
covered health care providers because the centers do not provide "health
care services" and the blood donors are not "patients" seeking health
care. Similarly, commenters expressed concern that organ procurement
organizations might be considered health care providers.
*Response:* We agree and have deleted from the definition of "health
care" the term "procurement or banking of blood, sperm, organs, or any
other tissue for administration to patients." See prior discussion under
"health care."
*Comment:* Several commenters proposed to restrict coverage to only
those providers who furnished and were paid for services and supplies.
It was argued that a salaried employee of a covered entity, such as a
hospital-based provider, should not be covered by the rule because that
provider would be subject both directly to the rule as a covered entity
and indirectly as an employee of a covered entity.
*Response:* The "dual" direct and indirect situation described in these
comments can arise only when a health care provider conducts standard
HIPAA transactions both for itself and for its employer. For example,
when the services of a provider such as a hospital-based physician are
billed through a standard HIPAA transaction conducted for the employer,
in this example the hospital, the physician does not become a covered
provider. Only when the provider uses a standard transaction on its own
behalf does he or she become a covered health care provider. Thus, the
result is typically as suggested by this commenter. When a
hospital-based provider is not paid directly, that is, when the standard
HIPAA transaction is not on its behalf, it will not become a covered
provider.
*Comment:* Other commenters argued that an employer who provides health
care services to its employees for whom it neither bills the employee
nor pays for the health care should not be considered health care
providers covered by the proposed rule.
*Response:* We clarify that the employer may be a health care provider
under the rule, and may be covered by the rule if it conducts standard
transactions. The provisions of § 164.504 may also apply.
*Comment:* Some commenters were confused about the preamble statement:
"in order to implement the principles in the Secretary\'s
Recommendations, we must impose any protections on the health care
providers that use and disclose the information, rather than on the
researcher seeking the information," with respect to the rule's policy
that a researcher who provides care to subjects in a trial will be
considered a health care provider. Some commenters were also unclear
about whether the individual researcher providing health care to
subjects in a trial would be considered a health care provider or
whether the researcher's home institution would be considered a health
care provider and thus subject to the rule.
*Response:* We clarify that, in general, a researcher is also a health
care provider if the researcher provides health care to subjects in a
clinical research study and otherwise meets the definition of "health
care provider" under the rule. However, a health care provider is only a
covered entity and subject to the rule if that provider conducts
standard transactions. With respect to the above preamble statement, we
meant that our jurisdiction under the statute is limited to covered
entities. Therefore, we cannot apply any restrictions or requirements on
a researcher in that person's role as a researcher. However, if a
researcher is also a health care provider that conducts standard
transactions, that researcher/provider is subject to the rule with
regard to its provider activities.
As to applicability to a researcher/provider versus the researcher's
home institution, we provide the following guidance. The rule applies to
the researcher as a covered entity if the researcher is a health care
provider who conducts standard transactions for services on his or her
own behalf, regardless of whether he or she is part of a larger
organization. However, if the services and transactions are conducted on
behalf of the home institution, then the home institution is the covered
entity for purposes of the rule and the researcher/provider is a
workforce member, not a covered entity.
*Comment:* One commenter expressed confusion about those instances when
a health care provider was a covered entity one day, and one who "works
under a contract" for a manufacturer the next day.
*Response:* If persons are covered under the rule in one role, they are
not necessarily covered entities when they participate in other
activities in another role. For example, that person could be a covered
health care provider in a hospital one day but the next day read
research records for a different employer. In its role as researcher,
the person is not covered, and protections do not apply to those
research records.
*Comment:* One commenter suggested that the Secretary modify proposed §
160.102, to add the following clause at the end (after (c)) (regarding
health care provider), "With respect to any entity whose *primary*
business is not that of a health plan or health care provider licensed
under the applicable laws of any state, the standards, requirements, and
implementation specifications of this subchapter shall apply solely to
the component of the entity that engages in the transactions specified
in \[§\] 160.103." (Emphasis added.) Another commenter also suggested
that the definition of "covered entity" be revised to mean entities that
are "primarily or exclusively engaged in health care-related activities
as a health plan, health care provider, or health care clearinghouse."
*Response:* The Secretary rejects these suggestions because they will
impermissibly limit the entities covered by the rule. An entity that is
a health plan, health care provider, or health care clearinghouse meets
the statutory definition of covered entity regardless of how much time
is devoted to carrying out health care-related functions, or regardless
of what percentage of their total business applies to health
care-related functions.
*Comment:* Several commenters sought to distinguish a health care
provider from a business partner as proposed in the NPRM. For example, a
number of commenters argued that disease managers that provide services
"on behalf of" health plans and health care providers, and case managers
(a variation of a disease management service) are business partners and
not "health care providers." Another commenter argued that a disease
manager should be recognized (presumably as a covered entity) because of
its involvement from the physician-patient level through complex
interactions with health care providers.
*Response:* To the extent that a disease or case manager provides
services on behalf of or to a covered entity as described in the rule's
definition of business associate, the disease or case manager is a
business associate for purposes of this rule. However, if services
provided by the disease or case manager meet the definition of treatment
and the person otherwise meets the definition of "health care provider,"
such a person is a health care provider for purposes of this rule.
*Comment:* One commenter argued that pharmacy employees who assist
pharmacists, such as technicians and cashiers, are not business
partners.
*Response:* We agree. Employees of a pharmacy that is a covered entity
are workforce members of that covered entity for purposes of this rule.
*Comment:* A number of commenters requested that we clarify the
definition of health care provider ("\...who furnishes, bills, or is
paid for health care services or supplies in the normal course of
business") by defining the various terms "furnish", "supply", and "in
the normal course of business." For instance, it was stated that this
would help employers recognize when services such as an employee
assistance program constituted health care covered by the rule.
*Response:* Although we understand the concern expressed by the
commenters, we decline to follow their suggestion to define terms at
this level of specificity. These terms are in common use today, and an
attempt at specific definition would risk the inadvertent creations of
conflict with industry practices. There is a significant variation in
the way employers structure their employee assistance programs (EAPs)
and the type of services that they provide. If the EAP provides direct
treatment to individuals, it may be a health care provider.
***Health Information*.**
The response to comments on health information is included in the
response to comments on individually identifiable health information, in
the preamble discussion of § 164.501.
***Health Plan*.**
*Comment:* One commenter suggested that to eliminate any ambiguity, the
Secretary should clarify that the catch-all category under the
definition of health plan includes "24-hour coverage plans" (whether
insured or self-insured) that integrate traditional employee health
benefits coverage and workers' compensation coverage for the treatment
of on-the-job injuries and illnesses under one program. It was stated
that this clarification was essential if the Secretary persisted in
excluding workers' compensation from the final rule.
*Response:* We understand concerns that such plans may use and disclose
individually identifiable health information. We therefore clarify that
to the extent that 24-hour coverage plans have a health care component
that meets the definition of "health plan" in the final rule, such
components must abide by the provisions of the final rule. In the final
rule, we have added a new provision to § 164.512 that permits covered
entities to disclose information under workers' compensation and similar
laws. A health plan that is a 24-hour plan is permitted to make
disclosures as necessary to comply with such laws.
*Comment:* A number of commenters urged that certain types of insurance
entities, such as workers' compensation and automobile insurance
carriers, property and casualty insurance health plans, and certain
forms of limited benefits coverage, be included in the definition of
"health plan." It was argued that consumers deserve the same protection
with respect to their health information, regardless of the entity using
it, and that it would be inequitable to subject health insurance
carriers to more stringent standards than other types of insurers that
use individually identifiable health information.
*Response:* The Congress did not include these programs in the
definition of a "health plan" under section 1171 of the Act. Further,
HIPAA's legislative history shows that the House Report's (H. Rep.
104-496) definition of "health plan" originally included certain benefit
programs, such as workers' compensation and liability insurance, but was
later amended to clarify the definition and remove these programs. Thus,
since the statutory definition of a health plan both on its face and
through legislative history evidence Congress' intention to exclude such
programs, we do not have the authority to require that these programs
comply with the standards. We have added explicit language to the final
rule which excludes the excepted benefit programs, as defined in section
2971(c)(1) of the PHS Act, 42 U.S.C. 300gg-91(c)(1).
*Comment:* Some commenters urged HHS to include entities such as stop
loss insurers and reinsurers in the definition of "health plan." It was
observed that such entities have come to play important roles in managed
care delivery systems. They asserted that increasingly, capitated health
plans and providers contract with their reinsurers and stop loss
carriers to medically manage their high cost outlier cases such as organ
and bone marrow transplants, and therefore should be specifically cited
as subject to the regulations.
*Response:* Stop-loss and reinsurers do not meet the statutory
definition of health plan. They do not provide or pay for the costs of
medical care, as described in the statute, but rather insure health
plans and providers against unexpected losses. Therefore, we cannot
include them as health plans in the regulation.
*Comment:* A commenter asserted that there is a significant discrepancy
between the effect of the definition of "group health plan" as proposed
in § 160.103, and the anticipated impact in the cost estimates of the
proposed rule at 64 FR 60014. Paragraph (1) of the proposed definition
of "health plan" defined a "group health plan" as an ERISA-defined
employee welfare benefit plan that provides medical care and that: "(i)
Has 50 or more participants, [or]{.underline} (ii) Is administered by an
entity other than the employer that established and maintains the
plan\[.\]" (emphasis added) According to this commenter, under this
definition, the only insured or self-insured ERISA plans that would not
be regulated "health plans" would be those that have less than 50
participants [and]{.underline} are self administered.
The commenter presumed that the we had intended to exclude from the
definition of "health plan" (and from coverage under the proposed rule)
all ERISA plans that are small (less than 50 participants)
[or]{.underline} are administered by a third party, whether large or
small, based on the statement at 64 FR 60014, note 18. That footnote
stated that the Department had "not included the 3.9 million 'other'
employer-health plans listed in HCFA's administrative simplification
regulations because these plans are administered by a third party. The
proposed regulation will not regulate the employer plans but will
regulate the third party administrators of the plan." The commenter
urged us not to repeat the statutory definition, and to adopt the policy
implied in the footnote.
*Response:* We agree with the commenter's observation that footnote 18
(64 FR 60014) was inconsistent with the proposed definition. We erred in
drafting that note. The definition of "group health plan" is adopted
from the statutory definition at section 1171(5)(A), and excludes from
the rule as "health plans" only the few insured or self-insured ERISA
plans that have less than 50 participants [and]{.underline} are self
administered. We reject the commenter's proposed change to the
definition as inconsistent with the statute.
*Comment:* A number of insurance companies asked that long term care
insurance policies be excluded from the definition of "health plan." It
was argued that such policies do not provide sufficiently comprehensive
coverage of the cost of medical care, and are limited benefit plans that
provide or pay for the cost of custodial and other related services in
connection with a long term, chronic illness or disability.
These commenters asserted that HIPAA recognizes this nature of long term
care insurance, observing that, with respect to HIPAA's portability
requirements, Congress enacted a series of exclusions for certain
defined types of health plan arrangements that do not typically provide
comprehensive coverage. They maintained that Congress recognized that
long term care insurance is excluded, so long as it is not a part of a
group health plan. Where a long term care policy is offered separately
from a group health plan it is considered an excepted benefit and is not
subject to the portability and guarantee issue requirements of HIPAA.
Although this exception does not appear in the Administrative
Simplification provisions of HIPAA, it was asserted that it is guidance
with respect to the treatment of long term care insurance as a limited
benefit coverage and not as coverage that is so "sufficiently
comprehensive" that it is to be treated in the same manner as a typical,
comprehensive major medical health plan arrangement.
Another commenter offered a different perspective observing that there
are some long-term care policies that do not pay for medical care and
therefore are not "health plans." It was noted that most long-term care
policies are reimbursement policies--that is, they reimburse the
policyholder for the actual expenses that the insured incurs for
long-term care services. To the extent that these constitute "medical
care," this commenter presumed that these policies would be considered
"health plans." Other long-term care policies, they pointed out, simply
pay a fixed dollar amount when the insured becomes chronically ill,
without regard to the actual cost of any long-term care services
received, and thus are similar to fixed indemnity critical illness
policies. The commenter suggested that while there was an important
distinction between indemnity based long-term care policies and expenses
based long-term care policies, it may be wise to exclude *all* long-term
care policies from the scope of the rule to achieve consistency with
HIPAA.
*Response:* We disagree. The statutory language regarding long-term care
policies in the portability title of HIPAA is different from the
statutory language regarding long-term care policies in the
Administrative Simplification title of HIPAA. Section 1171(5)(G) of the
Act means that issuers of long-term care policies are considered health
plans for purposes of administrative simplification. We also interpret
the statute as authorizing the Secretary to exclude nursing home
fixed-indemnity policies, not all long-term care policies, from the
definition of "health plan," if she determines that these policies do
not provide "sufficiently comprehensive coverage of a benefit" to be
treated as a health plan (see section 1171 of the Act). We interpret the
term "comprehensive" to refer to the breadth or scope of coverage of a
policy. "Comprehensive" policies are those that cover a range of
possible service options. Since nursing home fixed indemnity policies
are, by their own terms, limited to payments made solely for nursing
facility care, we have determined that they should not be included as
health plans for the purposes of the HIPAA regulations. The Secretary,
therefore, explicitly excluded nursing home fixed-indemnity policies
from the definition of "health plan" in the Transactions Rule, and this
exclusion is thus reflected in this final rule. Issuers of other
long-term care policies are considered to be health plans under this
rule and the Transactions Rule.
*Comment:* One commenter was concerned about the potential impact of the
proposed regulations on "unfunded health plans," which the commenter
described as programs used by smaller companies to provide their
associates with special employee discounts or other membership
incentives so that they can obtain health care, including prescription
drugs, at reduced prices. The commenter asserted that if these discount
and membership incentive programs were covered by the regulation, many
smaller employers might discontinue offering them to their employees,
rather than deal with the administrative burdens and costs of complying
with the rule.
*Response:* Only those special employee discounts or membership
incentives that are "employee welfare benefit plans" as defined in
section 3(1) of the Employee Retirement Income Security Act of 1974, 29
U.S.C. 1002(1), and provide "medical care" (as defined in section
2791(a)(2) of the Public Health Service Act, 42 U.S.C. 300gg-91(a)(2)),
are health plans for the purposes of this rule. Discount or membership
incentive programs that are not group health plans are not covered by
the rule.
*Comment:* Several commenters agreed with the proposal to exclude
"excepted benefits" such as disability income insurance policies, fixed
indemnity critical illness policies, and per diem long-term care
policies from the definition of "health plan," but were concerned that
the language of the proposed rule did not fully reflect this intent.
They asserted that clarification was necessary in order to avoid
confusion and costs to both consumers and insurers.
One commenter stated that, while HHS did not intend for the rule to
apply to every type of insurance coverage that paid for medical care,
the language of the proposed rule did not bear this out. The problem, it
was asserted, is that under the proposed rule any insurance policy that
pays for "medical care" would technically be a "health plan." It was
argued that despite the statements in the narrative, there are no
provisions that would exempt any of the "excepted benefits" from the
definition of "health care." It was stated that:
> Although (with the exception of long-term care insurance), the
> proposed rule does not include the 'excepted benefits' in its list of
> sixteen examples of a health plan (proposed 45 CFR 160.104), it does
> not explicitly exclude them either. Because these types of policies in
> some instances pay benefits that could be construed as payments for
> medical care, we are concerned by the fact that they are not
> explicitly excluded from the definition of 'health plan' or the
> requirements of the proposed rule."
Several commenters proposed that HHS adopt the same list of "excepted
benefits" contained in 29 U.S.C. 1191b, suggesting that they could be
adopted either as exceptions to the definition of "health plan" or as
exceptions to the requirements imposed on "health plans." They asserted
that this would promote consistency in the federal regulatory structure
for health plans.
It was suggested that HHS clarify whether the definition of health plan,
particularly the "group health plan" and "health insurance issuer"
components, includes a disability plan or disability insurer. It was
noted that a disability plan or disability insurer may cover only income
lost from disability and, as mentioned above, some rehabilitation
services, or a combination of lost income, rehabilitation services and
medical care. The commenter suggested that in addressing this coverage
issue, it may be useful to refer to the definitions of group health
plan, health insurance issuer and medical care set forth in Part I of
HIPAA, which the statutory provisions of the Administrative
Simplification subtitle expressly reference. See 42 U.S.C. 1320d(5)(A)
and(B).
*Response:* We agree that the NPRM may have been ambiguous regarding the
types of plans the rule covers. To remedy this confusion, we have added
language that specifically excludes from the definition any policy,
plan, or program providing or paying the cost of the excepted benefits,
as defined in section 2971(c)(1) of the PHS Act, 42 U.S.C.
300gg-91(c)(1). As defined in the statute, this includes but is not
limited to benefits under one or more (or any combination thereof) of
the following: coverage only for accident, or disability income
insurance, or any combination thereof; liability insurance, including
general liability insurance and automobile liability insurance; and
workers' compensation or similar insurance.
However, the other excepted benefits as defined in section 2971(c)(2) of
the PHS Act, 42 U.S.C. 300gg-91(c)(2), such as limited scope dental or
vision benefits, not explicitly excepted from the regulation could be
considered "health plans" under paragraph (1)(xvii) of the definition of
"health plan" in the final rule if and to the extent that they meet the
criteria for the definition of "health plan." Such plans, unlike the
programs and plans listed at section 2971(c)(1), directly and
exclusively provide health insurance, even if limited in scope.
*Comment:* One commenter recommended that the Secretary clarify that
"health plan" does not include property and casualty benefit providers.
The commenter stated that the clarifying language is needed given the
"catchall" category of entities defined as "any other individual plan or
group health plan, or combination thereof, that provides or pays for the
cost of medical care," and asserted that absent clarification there
could be serious confusion as to whether property and casualty benefit
providers are "health plans" under the rule.
*Response:* We agree and as described above have added language to the
final rule to clarify that the "excepted benefits" as defined under 42
U.S.C. 300gg-91(c)(1), which includes liability programs such as
property and casualty benefit providers, are not health plans for the
purposes of this rule.
*Comment:* Some commenters recommended that the Secretary replace the
term "medical care" with "health care." It was observed that "health
care" was defined in the proposal, and that this definition was used to
define what a health care provider does. However, they observed that the
definition of "health plan" refers to the provision of or payment for
"medical care," which is not defined. Another commenter recommended that
HHS add the parenthetical phrase "as such term is defined in section
2791 of the Public Health Service Act" after the phrase "medical care."
*Response:* We disagree with the first recommendation. We understand
that the term "medical care" can be easily confused with the term
"health care." However, the two terms are not synonymous. The term
"medical care" is a statutorily defined term and its use is critical in
making a determination as to whether a health plan is considered a
"health plan" for purposes of administrative simplification. In
addition, since the term "medical care" is used in the regulation only
in the context of the definition of "health plan" and we believe that
its inclusion in the regulatory text may cause confusion, we did not add
a definition of "medical care" in the final rule. However, consistent
with the second recommendation above, the statutory cite for "medical
care" was added to the definition of "health plan" in the Transactions
Rule, and thus is reflected in this final rule.
*Comment:* A number of commenters urged that the Secretary define more
narrowly what characteristics would make a government program that pays
for specific health care services a "health plan." Commenters argued
that there are many "payment" programs that should not be included, as
discussed below, and that if no distinctions were made, "health plan"
would mean the same as "purchaser" or even "payor."
Commenters asserted that there are a number of state programs that pay
for "health care" (as defined in the rule) but that are not health
plans. They said that examples include the WIC program (Special
Supplemental Nutrition Program for Women, Infants, and Children) which
pays for nutritional assessment and counseling, among other services;
the AIDS Client Services Program (including AIDS prescription drug
payment) under the federal Ryan White Care Act and state law; the
distribution of federal family planning funds under Title X of the
Public Health Services Act; and the breast and cervical health program
which pays for cancer screening in targeted populations. Commenters
argued that these are not insurance plans and do not fall within the
"health plan" definition's list of examples, all of which are either
insurance or broad-scope programs of care under a contract or statutory
entitlement. However, paragraph (16) in that list opens the door to
broader interpretation through the catchall phrase, "any other
individual or group plan that provides or pays for the cost of medical
care." Commenters assert that clarification is needed.
A few commenters stated that other state agencies often work in
partnership with the state Medicaid program to implement certain
Medicaid benefits, such as maternity support services and prenatal
genetics screening. They concluded that while this probably makes parts
of the agency the "business partner" of a covered entity, they were
uncertain whether it also makes the same agency parts a "health plan" as
well.
*Response:* We agree with the commenters that clarification is needed as
to the rule's application to government programs that pay for health
care services. Accordingly, in the final rule we have excepted from the
definition of "health plan" a government funded program which does not
have as its principal purpose the provision of, or payment for, the cost
of health care or which has as its principal purpose the provision,
either directly or by grant, of health care. For example, the principal
purpose of the WIC program is not to provide or pay for the cost of
health care, and thus, the WIC program is not a health plan for purposes
of this rule. The program of health care services for individuals
detained by the INS provides health care directly, and so is not a
health plan. Similarly, the family planning program authorized by Title
X of the Public Health Service Act pays for care exclusively through
grants, and so is not a health plan under this rule. These programs (the
grantees under the Title X program) may be or include health care
providers and may be covered entities if they conduct standard
transactions.
We further clarify that, where a public program meets the definition of
"health plan," the government agency that administers the program is the
covered entity. Where two agencies administer a program jointly, they
are both a health plan. For example, both the Health Care Financing
Administration and the insurers that offers a Medicare+Choice plan are
"health plans" with respect to Medicare beneficiaries. An agency that
does not administer a program but which provides services for such a
program is not a covered entity by virtue of providing such services.
Whether an agency providing services is a business associate of the
covered entity depends on whether its functions for the covered entity
meet the definition of business associate in § 164.501 and, in the
example described by this comment, in particular on whether the
arrangement falls into the exception in § 164.504(e)(1)(ii)(C) for
government agencies that collect eligibility or enrollment information
for covered government programs.
*Comment:* Some commenters expressed support for retaining the category
in paragraph (16) of the proposal's definition: "Any other individual or
group health plan, or combination thereof, that provides or pays for the
cost of medical care." Others asked that the Secretary clarify this
category. One commenter urged that the final rule clearly define which
plans would meet the criteria for this category.
*Response:* As described in the proposed rule, this category implements
the language at the beginning of the statutory definition of the term
"health plan": "The term 'health plan' means an individual or group plan
that provides, or pays the cost of, medical care\... Such term includes
the following, and any combination thereof\..." This statutory language
is general, not specific, and as such, we are leaving it general in the
final rule. However, as described above, we add explicit language which
excludes certain "excepted benefits" from the definition of "health
plan" in an effort to clarify which plans are not health plans for the
purposes of this rule. Therefore, to the extent that a certain benefits
plan or program otherwise meets the definition of "health plan" and is
not explicitly excepted, that program or plan is considered a "health
plan" under paragraph (1)(xvii) of the final rule.
*Comment:* A commenter explained that HIPAA defines a group health plan
by expressly cross-referencing the statutory sections in the PHS Act and
the Employee Retirement Income Security Act of 1974 (ERISA), 29 U.S.C.
1001, et seq., which define the terms \"group health plan,\" \"employee
welfare benefit plan\" and \"participant.\" See 29 U.S.C. 1002(l)
(definition of \"employee welfare benefit plan,\" which is the core of
the definition of group health plan under both ERISA and the PHS Act);
29 U.S.C. 100217) (definition of participant); 29 U.S.C. 1193(a)
(definition of \"group health plan,\" which is identical to that in
section 2791(a) of the PHS Act).
It was pointed out that the preamble and the text of the proposed rule
both limit the definition of all three terms to their current
definitions. The commenter reasoned that since the ERISA definitions may
change over time through statutory amendment, Department of Labor
regulations or judicial interpretation, it would not be clear what point
in time is to be considered current. Therefore, they suggested deleting
references to \"current\" or \"currently\" in the preamble and in the
regulation with respect to these three ERISA definitions.
In addition, the commenter stated that as the preamble to the NPRM
correctly reflected, HIPAA expressly cross-references ERISA\'s
definition of \"participant\" in section 3(7) of ERISA, 29 U.S.C.
1002(7). 42 U.S.C. 1320d(5)(A). The text of the privacy regulation,
however, omits this cross-reference. It was suggested that the reference
to section 3(7) of ERISA, defining "participant," be included in the
regulation.
Finally, HIPAA incorporates the definition of a group health plan as set
forth in section 2791(a) of the PHS Act, 42 U.S.C. 300gg-91(a)(l). That
definition refers to the provision of medical care \"directly or through
insurance, reimbursement, or otherwise.\" The word \"reimbursement\" is
omitted in both the preamble and the text of the regulation; the
commenter suggested restoring it to both.
*Response:* We agree. These changes were made to the definition of
"health plan" as promulgated in the Transactions Rule, and are reflected
in this final rule.
***Small Health Plan*.**
*Comment:* One commenter recommended that we delete the reference to \$5
million in the definition and instead define a "small health plan" as a
health plan with fewer than 50 participants. It was stated that using a
dollar limitation to define a "small health plan" is not meaningful for
self-insured plans and some other types of health plan coverage
arrangements. A commenter pointed out that the general definition of a
health plan refers to "50 or more participants," and that using a dollar
factor to define a "small health plan" would be inconsistent with this
definition.
*Response:* We disagree. The Small Business Administration (SBA)
promulgates size standards that indicate the maximum number of employees
or annual receipts allowed for a concern (13 CFR 121.105) and its
affiliates to be considered "small." The size standards themselves are
expressed either in number of employees or annual receipts (13 CFR
121.201). The size standards for compliance with programs of other
agencies are those for SBA programs which are most comparable to the
programs of such other agencies, unless otherwise agreed by the agency
and the SBA (13 CFR 121.902). With respect to the insurance industry,
the SBA has specified that annual receipts of \$5 million is the maximum
allowed for a concern and its affiliates to be considered small (13 CFR
121.201). Consequently, we retain the proposal's definition in the final
rule to be consistent with SBA requirements.
We understand there may be some confusion as to the meaning of "annual
receipts" when applied to a health plan. For our purposes, therefore, we
consider "pure premiums" to be equivalent to "annual receipts."
***Workforce*.**
*Comment:* Some commenters requested that we exclude "volunteers" from
the definition of workforce. They stated that volunteers are important
contributors within many covered entities, and in particular hospitals.
They argued that it was unfair to ask that these people donate their
time and at the same time subject them to the penalties placed upon the
paid employees by these regulations, and that it would discourage people
from volunteering in the health care setting.
*Response*: We disagree. We believe that differentiating those persons
under the direct control of a covered entity who are paid from those who
are not is irrelevant for the purposes of protecting the privacy of
health information, and for a covered entity's management of its
workforce. In either case, the person is working for the covered entity.
With regard to implications for the individual, persons in a covered
entity's workforce are not held personally liable for violating the
standards or requirements of the final rule. Rather, the Secretary has
the authority to impose civil monetary penalties and in some cases
criminal penalties for such violations on only the covered entity.
*Comment*: One commenter asked that the rule clarify that employees
administering a group health or other employee welfare benefit plan on
their employers' behalf are considered part of the covered entity's
workforce.
*Response:* As long as the employees have been identified by the group
health plan in plan documents as performing functions related to the
group health plan (consistent with the requirements of § 164.504(f)),
those employees may have access to protected health information.
However, they are not permitted to use or disclose protected health
information for employment-related purposes or in connection with any
other employee benefit plan or employee benefit of the plan sponsor.
**PART 160 -- SUBPART B -- PREEMPTION OF STATE LAW**
We summarize and respond below to comments received in the Transactions
rulemaking on the issue of preemption, as well as those received on this
topic in the Privacy rulemaking. Because no process was proposed in the
Transactions rulemaking for granting exceptions under section
1178(a)(2)(A), a process for making exception determinations was not
adopted in the Transactions Rule. Instead, since a process for making
exception determinations was proposed in the Privacy rulemaking, we
decided that the comments received in the Transactions rulemaking should
be considered and addressed in conjunction with the comments received on
the process proposed in the Privacy rulemaking. See 65 FR 50318 for a
fuller discussion. Accordingly, we discuss the preemption comments
received in the Transactions rulemaking where relevant below.
*Comment:* The majority of comments on preemption addressed the subject
in general terms. Numerous comments, particularly from plans and
providers, argued that the proposed preemption provisions were
burdensome, ineffective, or insufficient, and that complete federal
preemption of the "patchwork" of state privacy laws is needed. They also
argued that the proposed preemption provisions are likely to invite
litigation. Various practical arguments in support of this position were
made. Some of these comments recognized that the Secretary's authority
under section 1178 of the Act is limited and acknowledged that the
Secretary's proposals were within her statutory authority. One commenter
suggested that the exception determination process would result in a
very costly and laborious and sometimes inconsistent analysis of the
occasions in which state law would survive federal preemption, and thus
suggested the final privacy regulations preempt state law with only
limited exceptions, such as reporting child abuse. Many other comments,
however, recommended changing the proposed preemption provisions to
preempt state privacy laws on as blanket a basis as possible.
One comment argued that the assumption that more stringent privacy laws
are better is not necessarily true, citing a 1999 GAO report finding
evidence that the stringent state confidentiality laws of Minnesota
halted the collection of comparative information on health care quality.
Several comments in this vein were also received in the Transactions
rulemaking. The majority of these comments took the position that
exceptions to the federal standards should either be prohibited or
discouraged. It was argued that granting exceptions to the standards,
particularly the transactions standards, would be inconsistent with the
statute's objective of promoting administrative simplification through
the use of uniform transactions.
Many other commenters, however, endorsed the "federal floor" approach of
the proposed rules. (These comments were made in the context of the
proposed privacy regulations.) These comments argued that this approach
was preferable because it would not impair the effectiveness of state
privacy laws that are more protective of privacy, while raising the
protection afforded medical information in states that do not enact laws
that are as protective as the rules below. Some comments argued,
however, that the rules should give even more deference to state law,
questioning in particular the definitions and the proposed addition to
the "other purposes" criterion for exception determinations in this
regard.
*Response:* With respect to the exception process provided for by
section 1178(a)(2)(A), the contention that the HIPAA standards should
uniformly control is an argument that should be addressed to the
Congress, not this agency. Section 1178 of the Act expressly gives the
Secretary authority to grant exceptions to the general rule that the
HIPAA standards preempt contrary state law in the circumstances she
determines come within the provisions at section 1178(a)(2)(A). We agree
that the underlying statutory goal of standardizing financial and
administrative health care transactions dictates that exceptions should
be granted only on narrow grounds. Nonetheless, Congress clearly
intended to accommodate some state laws in these areas, and the
Department is not free to disregard this Congressional choice. As is
more fully explained below, we have interpreted the statutory criteria
for exceptions under section 1178(a)(2)(A) to balance the need for
relative uniformity with respect to the HIPAA standards with state needs
to set certain policies in the statutorily defined areas.
The situation is different with respect to state laws relating to the
privacy of protected health information. Many of the comments arguing
for uniform standards were particularly concerned with discrepancies
between the federal privacy standards and various state privacy
requirements. Unlike the situation with respect to the transactions
standards, where states have generally not entered the field, all states
regulate the privacy of some medical information to a greater or lesser
extent. Thus, we understand the private sector's concern at having to
reconcile differing state and federal privacy requirements.
This is, however, likewise an area where the policy choice has been made
by Congress. Under section 1178(a)(2)(B) of the Act and section
264(c)(2) of HIPAA, provisions of state privacy laws that are contrary
to and more stringent than the corresponding federal standard,
requirement, or implementation specification are not preempted. The
effect of these provisions is to let the law that is most protective of
privacy control (the "federal floor" approach referred to by many
commenters), and this policy choice is one with which we agree. Thus,
the statute makes it impossible for the Secretary to accommodate the
requests to establish uniformly controlling federal privacy standards,
even if doing so were viewed as desirable.
*Comment:* Numerous comments stated support for the proposal at proposed
Subpart B to issue advisory opinions with respect to the preemption of
state laws relating to the privacy of individually identifiable health
information. A number of these comments appeared to assume that the
Secretary's advisory opinions would be dispositive of the issue of
whether or not a state law was preempted. Many of these commenters
suggested what they saw as improvements to the proposed process, but
supported the proposal to have the Department undertake this function.
*Response:* Despite the general support for the advisory opinion
proposal, we decided not to provide specifically for the issuance of
such opinions. The following considerations led to this decision. First,
the assumption by commenters that an advisory opinion would establish
what law applied in a given situation and thereby simplify the task of
ascertaining what legal requirements apply to a covered entity or
entities is incorrect. Any such opinion would be advisory only. Although
an advisory opinion issued by the Department would indicate to covered
entities how the Department would resolve the legal conflict in question
and would apply the law in determining compliance, it would not bind the
courts. While we assume that most courts would give such opinions
deference, the outcome could not be guaranteed.
Second, the thousands of questions raised in the public comment about
the interpretation, implications, and consequences of all of the
proposed regulatory provisions have led us to conclude that significant
advice and technical assistance about all of the regulatory requirements
will have to be provided on an ongoing basis. We recognize that the
preemption concerns that would have been addressed by the proposed
advisory opinions were likely to be substantial. However, there is no
reason to assume that they will be the most substantial or urgent of the
questions that will most likely need to be addressed. It is our intent
to provide as much technical advice and assistance to the regulated
community as we can with the resources available. Our concern is that
setting up an advisory opinion process for just one of the many types of
issues that will have to be addressed will lead to a non-optimal
allocation of those resources. Upon careful consideration, therefore, we
have decided that we will be better able to prioritize our workload and
be better able to be responsive to the most urgent and substantial
questions raised to the Department, if we do not provide for a formal
advisory opinion process on preemption as proposed.
*Comment:* A few commenters argued that the Privacy Rule should preempt
state laws that would impose more stringent privacy requirements for the
conduct of clinical trials. One commenter asserted that the existing
federal regulations and guidelines for patient informed consent,
together with the proposed rule, would adequately protect patient
privacy.
*Response*: The Department does not have the statutory authority under
HIPAA to preempt state laws that would impose more stringent privacy
requirements on covered entities. HIPAA provides that the rule
promulgated by the Secretary may not preempt state laws that are in
conflict with the regulatory requirements and that provide greater
privacy protections.
**SECTION 160.201 -- APPLICABILITY**
*Comment:* Several commenters indicated that the guidance provided by
the definitions at proposed § 160.202 would be of substantial benefit
both to regulated entities and to the public. However, these commenters
argued that the applicability of such definitions would be too limited
as drafted, since proposed § 160.201 provided that the definitions
applied only to "determinations and advisory opinions issued by the
Secretary pursuant to 42 U.S.C. 1320d-7." The commenters stated that it
would be far more helpful to make the definitions in proposed § 160.202
more broadly applicable, to provide general guidance on the issue of
preemption.
*Response:* We agree with the comments on this issue, and have revised
the applicability provision of subpart B below accordingly. Section
160.201 below sets out that Subpart B implements section 1178. This
means, in our view, that the definitions of the statutory terms at §
160.202 are legislative rules that apply when those statutory terms are
employed, whether by HHS, covered entities, or the courts.
**SECTION 160.202 -- DEFINITIONS**
***Contrary***
*Comment:* Some commenters asserted that term "contrary" as defined at §
160.202 was overly broad and that its application would be
time-consuming and confusing for states. These commenters argued that,
under the proposed definition, a state would be required to examine all
of its laws relating to health information privacy in order to determine
whether or not its law were contrary to the requirements proposed. It
was also suggested that the definition contain examples of how it would
work in practical terms.
A few commenters, however, argued that the definition of "contrary" as
proposed was too narrow. One commenter argued that the Secretary erred
in her assessment of the case law analyzing what is known as "conflict
preemption" and which is set forth in shorthand in the tests set out at
§ 160.202.
*Response:* We believe that the definition proposed represents a policy
that is as clear as is feasible and which can be applied nationally and
uniformly. As was noted in the preamble to the proposed rules (at 64 FR
59997), the tests in the proposed definition of "contrary" are adopted
from the jurisprudence of "conflict preemption." Since preemption is a
judicially developed doctrine, it is reasonable to interpret this term
as indicating that the statutory analysis should tie in to the
analytical formulations employed by the courts. Also, while the
court-developed tests may not be as clear as commenters would like, they
represent a long-term, thoughtful consideration of the problem of
defining when a state/federal conflict exists. They will also, we
assume, generally be employed by the courts when conflict issues arise
under the rules below. We thus see no practical alternative to the
proposed definition and have retained it unchanged. With respect to
various suggestions for shorthand versions of the proposed tests, such
as the arguably broader term "inconsistent with," we see no operational
advantages to such terms.
*Comment:* One comment asked that the Department clarify that if state
law is not preempted, then the federal law would not also apply.
*Response:* This comment raises two issues, both of which deserve
discussion. First, a state law may not be preempted because there is no
conflict with the analogous federal requirement; in such a situation,
both laws can, and must, be complied with. We thus do not accept this
suggestion, to the extent that it suggests that the federal law would
give way in this situation. Second, a state law may also not be
preempted because it comes within section 1178(a)(2)(B), section
1178(b), or section 1178(c); in this situation, a contrary federal law
would give way.
*Comment:* One comment urged the Department to take the position that
where state law exists and no analogous federal requirement exists, the
state requirement would not be "contrary to" the federal requirement and
would therefore not trigger preemption.
*Response:* We agree with this comment.
*Comment:* One commenter criticized the definition as unhelpful in the
multi-state transaction context. For example, it was asked whether the
issue of whether a state law was "contrary to" should be determined by
the law of the state where the treatment is provided, where the claim
processor is located, where the payment is issued, or the data
maintained, assuming all are in different states.
*Response:* This is a choice of law issue, and, as is discussed more
fully below, is a determination that is routinely made today in
connection with multi-state transactions. See discussion below under
Exception Determinations (Criteria for Exception Determinations).
***State Law***
*Comment:* Comments noted that the definition of "state law" does not
explicitly include common law and recommended that it be revised to do
so or to clarify that the term includes evidentiary privileges
recognized at state law. Guidance concerning the impact of state
privileges was also requested.
*Response:* As requested, we clarify that the definition of "state law"
includes common law by including the term "common law." In our view,
this phrase encompasses evidentiary privileges recognized at state law
(which may also, we note, be embodied in state statutes).
*Comment:* One comment criticized this definition as unwieldy, in that
locating state laws pertaining to privacy is likely to be difficult. It
was noted that Florida, for example, has more than 60 statutes that
address health privacy.
*Response:* To the extent that state laws currently apply to covered
entities, they have presumably determined what those laws require in
order to comply with them. Thus, while determining which laws are
"contrary" to the federal requirements will require additional work in
terms of comparing state law with the federal requirements, entities
should already have acquired the knowledge of state law needed for this
task in the ordinary course of doing business.
*Comment:* The New York City Department of Health noted that in many
cases, provisions of New York State law are inapplicable within New York
City, because the state legislature has recognized that the local code
is tailored to the particular needs of the City. It urged that the New
York City Code be treated as state law, for preemption purposes.
*Response:* We agree that, to the extent a state treats local law as
substituting for state law it could be considered to be "state law" for
purposes of this definition. If, however, a local law is local in scope
and effect, and a tier of state law exists over the same subject matter,
we do not think that the local law could or should be treated as "state
law" for preemption purposes. We do not have sufficient information to
assess the situation raised by this comment with respect to this
principle, and so express no opinion thereon.
***More Stringent***
*Comment:* Many commenters supported the policy in the proposed
definition of "individual" at proposed § 164.502, which would have
permitted unemancipated minors to exercise, on their own behalf, rights
granted to individuals in cases where they consented to the underlying
health care. Commenters stated, however, that the proposed preemption
provision would leave in place state laws authorizing or prohibiting
disclosure to parents of the protected health information of their minor
children and would negate the proposed policy for the treatment of
minors under the rule. The comments stated that such state laws should
be treated like other state laws, and preempted to the extent that they
are less protective of the privacy of minors.
Other commenters supported the proposed preemption provision\--not to
preempt a state law to the extent it authorizes or prohibits disclosure
of protected health information regarding a minor to a parent.
*Response:* Laws regarding access to health care for minors and
confidentiality of their medical records vary widely; this regulation
recognizes and respects the current diversity of state law in this area.
Where states have considered the balance involved in protecting the
confidentiality of minors' health information and have explicitly acted,
for example, to authorize disclosure, defer the decision to disclose to
the discretion of the health care provider, or prohibit disclosure of
minor's protected health information to a parent, the rule defers to
these decisions to the extent that they regulate such disclosures.
*Comment:* The proposed definition of "more stringent"was criticized as
affording too much latitude to for granting exceptions for state laws
that are not protective of privacy. It was suggested that the test
should be "most protective of the individual's privacy."
*Response:* We considered adopting this test. However, for the reasons
set out at 64 FR 59997, we concluded that this test would not provide
sufficient guidance. The comments did not address the concerns we raised
in this regard in the preamble to the proposed rules, and we continue to
believe that they are valid.
*Comment:* A drug company expressed concern with what it saw as the
expansive definition of this term, arguing that state governments may
have less experience with the special needs of researchers than federal
agencies and may unknowingly adopt laws that have a deleterious effect
on research. A provider group expressed concern that allowing stronger
state laws to prevail could result in diminished ability to get enough
patients to complete high quality clinical trials.
*Response:* These concerns are fundamentally addressed to the "federal
floor" approach of the statute, not to the definition proposed: even if
the definition of "more stringent" were narrowed, these concerns would
still exist. As discussed above, since the "federal floor" approach is
statutory, it is not within the Secretary's authority to change the
dynamics that are of concern.
*Comment:* One comment stated that the proposed rule seemed to indicate
that the "more stringent" and "contrary to" definitions implied that
these standards would apply to ERISA plans as well as to non-ERISA
plans.
*Response:* The concern underlying this comment is that ERISA plans,
which are not now subject to certain state laws because of the "field"
preemption provision of ERISA but which are subject to the rules below,
will become subject to state privacy laws that are "more stringent" than
the federal requirements, due to the operation of section 1178(a)(2)(B),
together with section 264(c)(2). We disagree that this is the case.
While the courts will have the final say on these questions, it is our
view that these sections simply leave in place more stringent state laws
that would otherwise apply; to the extent that such state laws do not
apply to ERISA plans because they are preempted by ERISA, we do not
think that section 264(c)(2) overcomes the preemption effected by
section 514(a) of ERISA. For more discussion of this point, see 64 FR
60001.
*Comment:* The Lieutenant Governor's Office of the State of Hawaii
requested a blanket exemption for Hawaii from the federal rules, on the
ground that its recently enacted comprehensive health privacy law is, as
a whole, more stringent than the proposed federal standards. It was
suggested that, for example, special weight should be given to the
severity of Hawaii's penalties. It was suggested that a new definition
("comprehensive") be added, and that "more stringent" be defined in that
context as whether the state act or code as a whole provides greater
protection.
An advocacy group in Vermont argued that the Vermont legislature was
poised to enact stronger and more comprehensive privacy laws and stated
that the group would resent a federal prohibition on that.
*Response:* The premise of these comments appears to be that the
provision-by-provision approach of Subpart B, which is expressed in the
definition of the term "contrary", is wrong. As we explained in the
preamble to the proposed rules (at 64 FR 59995), however, the statute
dictates a provision-by- provision comparison of state and federal
requirements, not the overall comparison suggested by these comments. We
also note that the approach suggested would be practically and
analytically problematic, in that it would be extremely difficult, if
not impossible, to determine what is a legitimate stopping point for the
provisions to be weighed on either the state side or the federal side of
the scale in determining which set of laws was the "more stringent." We
accordingly do not accept the approach suggested by these comments.
With respect to the comment of the Vermont group, nothing in the rules
below prohibits or places any limits on states enacting stronger or more
comprehensive privacy laws. To the extent that states enact privacy laws
that are stronger or more comprehensive than contrary federal
requirements, they will presumably not be preempted under section
1178(a)(2)(B). To the extent that such state laws are not contrary to
the federal requirements, they will act as an overlay on the federal
requirements and will have effect.
*Comment:* One comment raised the issue of whether a private right of
action is a greater penalty, since the proposed federal rule has no
comparable remedy.
*Response:* We have reconsidered the proposed "penalty" provision of the
proposed definition of "more stringent" and have eliminated it. The
HIPAA statute provides for only two types of penalties: fines and
imprisonment. Both types of penalties could be imposed in addition to
the same type of penalty imposed by a state law, and should not
interfere with the imposition of other types of penalties that may be
available under state law. Thus, we think it is unlikely that there
would be a conflict between state and federal law in this respect, so
that the proposed criterion is unnecessary and confusing. In addition,
the fact that a state law allows an individual to file a lawsuit to
protect privacy does not conflict with the HIPAA penalty provisions.
***Relates to the Privacy of Individually Identifiable Health
Information***
*Comment:* One comment criticized the definition of this term as too
narrow in scope and too uncertain. The commenter argued that determining
the specific purpose of a state law may be difficult and speculative,
because many state laws have incomplete, inaccessible, or non-existent
legislative histories. It was suggested that the definition be revised
by deleting the word "specific" before the word "purpose." Another
commenter argued that the definition of this term should be narrowed to
minimize reverse preemption by more stringent state laws. One commenter
generally supported the proposed definition of this term.
*Response:* We are not accepting the first comment. The purpose of a
given state enactment should be ascertainable, if not from legislative
history or a purpose statement, then from the statute viewed as a whole.
The same should be true of state regulations or rulings. In any event,
it seems appropriate to restrict the field of state laws that may
potentially trump the federal standards to those that are clearly
intended to establish state public policy and operate in the same area
as the federal standards. To the extent that the definition in the rules
below does this, we have accommodated the second comment. We note,
however, that we do not agree that the definition should be further
restricted to minimize "reverse preemption," as suggested by this
comment, as we believe that state laws that are more protective of
privacy than contrary federal standards should remain, in order to
ensure that the privacy of individuals' health information receives the
maximum legal protection available.
**SECTIONS 160.203 and 160.204 -- EXCEPTION DETERMINATIONS AND ADVISORY
OPINIONS**
Most of the comments received on proposed Subpart B lumped together the
proposed process for exception determinations under section
1178(a)(2)(A) with the proposed process for issuing advisory opinions
under section 1178(a)(2)(B), either because the substance of the comment
applied to both processes or because the commenters did not draw a
distinction between the two processes. We address these general comments
in this section.
*Comment:* Numerous commenters, particularly providers and provider
groups, recommended that exception determinations and advisory opinions
[not]{.underline} be limited to states and advocated allowing all
covered entities (including individuals, providers and insurers), or
private sector organizations, to request determinations and opinions
with respect to preemption of state laws. Several commenters argued that
limiting requests to states would deny third party stakeholders, such as
life and disability income insurers, any means of resolving complex
questions as to what rule they are subject to. One commenter noted that
because it is an insurer who will be liable if it incorrectly analyzes
the interplay between laws and reaches an incorrect conclusion, there
would be little incentive for the states to request clarification. It
would also cause large administrative burdens which, it was stated,
would be costly and confusing. It was also suggested that the request
for the exception be made to the applicable state's attorney general or
chief legal officer, as well as the Secretary. Various changes to the
language were suggested, such as adding that "a covered entity, or any
other entity impacted by this rule" be allowed to submit the written
request.
*Response:* We agree, and have changed § 164.204(a) below accordingly.
The decision to eliminate advisory opinions makes this issue moot with
respect to those opinions.
*Comment:* Several commenters noted that it was unclear under the
proposed rule which state officials would be authorized to request a
determination.
*Response:* We agree that the proposed rule was unclear in this respect.
The final rule clarifies who may make the request for a state, with
respect to exception determinations. See, § 160.204(a). The language
adopted should ensure that the Secretary receives an authoritative
statement from the state. At the same time, this language provides
states with flexibility, in that the governor or other chief elected
official may choose to designate other state officials to make such
requests.
*Comment:* Many commenters recommended that a process be established
whereby HHS performs an initial state-by-state critical analysis to
provide guidance on which state laws will not be preempted; most
suggested that such an analysis (alternatively referred to as a database
or clearinghouse) should be completed before providers would be required
to come into compliance. Many of these comments argued that the
Secretary should bear the cost for the analyses of state law,
disagreeing with the premise stated in the preamble to the proposed
rules that it is more efficient for the private market to complete the
state-by-state review. Several comments also requested that HHS continue
to maintain and monitor the exception determination process, and update
the database over time in order to provide guidance and certainty on the
interaction of the federal rules with newly enacted or amended state
laws that are produced after the final rule. Some comments recommended
that each state be required to certify agreement with the HHS analyses.
In contrast, one hospital association noted concerns that the Secretary
would conduct a nationwide analysis of state laws. The comment stated
that implementation would be difficult since much of the law is a
product of common law, and such state-specific research should only be
attempted by experienced health care attorneys in each jurisdiction.
*Response:* These comments seem to be principally concerned with
potential conflicts between state privacy laws and the privacy
standards, because, as is more fully explained below, preemption of
contrary state laws not relating to privacy is automatic unless the
Secretary affirmatively acts under section 1178(a)(2)(A) to grant an
exception. We recognize that the provisions of sections 1178(b) (state
public health laws), and 1178(c) (state regulation of health plans)
similarly preserve state laws in those areas, but very little of the
public comment appeared to be concerned with these latter statutory
provisions. Accordingly, we respond below to what we see as the
commenters' main concern.
The Department will not do the kind of global analysis requested by many
of these comments. What these comments are in effect seeking is a global
advisory opinion as to when the federal privacy standards will control
and when they will not. We understand the desire for certainty
underlying these comments. Nonetheless, the reasons set out above as the
basis for our decision not to establish a formal advisory opinion
process apply equally to these requests. We also do not agree that the
task of evaluating the requirements below in light of existing state law
is unduly burdensome or unreasonable. Rather, it is common for new
federal requirements to necessitate an examination by the regulated
entities of the interaction between existing state law and the federal
requirements incident to coming into compliance.
We agree, however, that the case is different where the Secretary has
affirmatively acted, either through granting an exception under section
1178(a)(2)(A) or by making a specific determination about the effect of
a particular state privacy law in, for example, the course of
determining an entity's compliance with the privacy standards. As is
discussed below, the Department intends to make notice of exception
determinations that it makes routinely available.
We do not agree with the comments suggesting that compliance by covered
entities be delayed pending completion of an analysis by the Secretary
and that states be required to certify agreement with the Secretary's
analysis, as we are not institutionalizing the advisory opinion/analysis
process upon which these comments are predicated. Furthermore, with
respect to the suggestion regarding delaying the compliance date,
Congress provided in section 1175(b) of the Act for a delay in when
compliance is required to accommodate the needs of covered entities to
address implementation issues such as those raised by these comments.
With respect to the suggestion regarding requiring states to certify
their agreement with the Secretary's analysis, we have no authority to
do this.
*Comment:* Several commenters criticized the proposed provision for
annual publication of determinations and advisory opinions in the
[Federal Register]{.underline} as inadequate. They suggested that more
frequent notices should be made and the regulation be changed
accordingly, to provide for publication either quarterly or within a few
days of a determination. A few commenters suggested that any
determinations made, or opinions issued, by the Secretary be published
on the Department's website within 10 days or a few days of the
determination or opinion.
*Response:* We agree that the proposed provision for annual publication
was inadequate and have accordingly deleted it. Subpart B contains no
express requirement for publication, as the Department is free to
publish its determinations absent such a requirement. It is our
intention to publish notice of exception determinations on a periodic
basis in the [Federal Register]{.underline}. We will also consider other
avenues of making such decisions publicly available as we move into the
implementation process.
*Comment:* A few commenters argued that the process for obtaining an
exception determination or an advisory opinion from the Secretary will
result in a period of time in which there is confusion as to whether
state or federal law applies. The proposed regulations say that the
federal provisions will remain effective until the Secretary makes a
determination concerning the preemption issue. This means that, for
example, a state law that was enacted and enforced for many years will
be preempted by federal law for the period of time during which it takes
the Secretary to make a determination. Then if the Secretary determines
that the state law is not preempted, the state law will again become
effective. Such situations will result in confusion and unintended
violations of the law. One of the commenters suggested that requests for
exceptions be required only when a challenge is brought against a
particular state law, and that a presumption of validity should lie with
state laws. Another commenter, however, urged that "instead of the
presumption of preemption, the state laws in question would be presumed
to be subject to the exception unless or until the Secretary makes a
determination to the contrary."
*Response:* It is true that the effect of section 1178(a)(2)(A) is that
the federal standards will preempt contrary state law and that such
preemption will not be removed unless and until the Secretary acts to
grant an exception under that section (assuming, of course, that another
provision of section 1178 does not apply). We do not agree, however,
that confusion should result, where the issue is whether a given state
law has been preempted under section 1178(a)(2)(A). Because preemption
is automatic with respect to state laws that do not come within the
other provisions of section 1178 (i.e., sections 1178(a)(2)(B), 1178(b),
and 1178(c)), such state laws are preempted until the Secretary
affirmatively acts to preserve them from preemption by granting an
exception under section 1178(a)(2)(A).
We cannot accept the suggestion that a presumption of validity attach to
state laws, and that states not be required to request exceptions except
in very narrow circumstances. The statutory scheme is the opposite: the
statute effects preemption in the section 1178(a)(2)(A) context unless
the Secretary affirmatively acts to except the contrary state law in
question.
With respect to preemption under sections 1178(b) and 1178(c) (the
carve-outs for state public health laws and state regulation of health
plans), we do not agree that preemption is likely to be a major cause of
uncertainty. We have deferred to Congressional intent by crafting the
permissible releases for public health, abuse, and oversight broadly.
See, §§ 164.512(b) - (d) below. Since there must first be a conflict
between a state law and a federal requirement in order for an issue of
preemption to even arise, we think that, as a practical matter, few
preemption questions should arise with respect to sections 1178(b) and
1178(c).
With respect to preemption of state privacy laws under section
1178(a)(2)(B), however, we agree that the situation may be more
difficult to ascertain, because the Secretary does not determine the
preemption status of a state law under that section, unlike the
situation with respect to section 1178(a)(2)(A). We have tried to define
the term "more stringent" to identify and particularize the factors to
be considered by courts to those relevant to privacy interests. The more
specific (than the statute) definition of this term at § 160.202 below
should provide some guidance in making the determination as to which law
prevails. Ambiguity in the state of the law might also be a factor to be
taken into account in determining whether a penalty should be applied.
*Comment:* Several comments recommended that exception determinations or
advisory opinions encompass a state act or code in its entirety (in lieu
of a provision-specific evaluation) if it is considered more stringent
as a whole than the regulation. It was argued that since the provisions
of a given law are typically interconnected and related, adopting or
overriding them on a provision-by-provision basis would result in
distortions and/or unintended consequences or loopholes. For example,
when a state law includes authorization provisions, some of which are
consistent with the federal requirements and some which are not, the
cleanest approach is to view the state law as inconsistent with the
federal requirements and thus preempted in its entirety. Similarly,
another comment suggested that state confidentiality laws written to
address the specific needs of individuals served within a discreet
system of care be considered as a whole in assessing whether they are as
stringent or more stringent than the federal requirements. Another
comment requested explicit clarification that state laws with a broader
scope than the regulation will be viewed as more stringent and be
allowed to stand.
*Response:* We have not adopted the approach suggested by these
comments. As discussed above with respect to the definition of the term
"more stringent," it is our view that the statute precludes the approach
suggested. We also suggest that this approach ignores the fact that each
separate provision of law usually represents a nuanced policy choice to,
for example, permit this use or prohibit that disclosure; the aggregated
approach proposed would fail to recognize and weigh such policy choices.
*Comment:* One comment recommended that the final rule: permit requests
for exception determinations and advisory opinions as of the date of
publication of the final rule, require the Secretary to notify the
requestor within a specified short period of time of all additional
information needed, and prohibit enforcement action until the Secretary
issues a response.
*Response:* With respect to the first recommendation, we clarify that
requests for exception determinations may be made at any time; since the
process for issuing advisory opinions has not been adopted, this
recommendation is moot as it pertains to advisory opinions. With respect
to the second recommendation, we will undertake to process exception
requests as expeditiously as possible, but, for the reasons discussed
below in connection with the comments relating to setting deadlines for
those determinations, we cannot commit at this time to a "specified
short period of time" within which the Secretary may request additional
information. We see no reason to agree to the third recommendation.
Because contrary state laws for which an exception is available only
under section 1178(a)(2)(A) will be preempted by operation of law unless
and until the Secretary acts to grant an exception, there will be an
ascertainable compliance standard for compliance purposes, and
enforcement action would be appropriate where such compliance did not
occur.
**Sections 160.203(a) and 160.204(a) -- Exception Determinations**
***Section 160.203(a) -- Criteria for Exception Determinations***
*Comment:* Numerous comments criticized the proposed criteria for their
substance or lack thereof. A number of commenters argued that the
effectiveness language that was added to the third statutory criterion
made the exception so massive that it would swallow the rule. These
comments generally expressed concern that laws that were less protective
of privacy would be granted exceptions under this language. Other
commenters criticized the criteria generally as creating a large
loophole that would let state laws that do not protect privacy trump the
federal privacy standards.
*Response:* We agree with these comments. The scope of the statutory
criteria is ambiguous, but they could be read so broadly as to largely
swallow the federal protections. We do not think that this was
Congress's intent. Accordingly, we have added language to most of the
statutory criteria clarifying their scope. With respect to the criteria
at 1178(a)(2)(A)(i), this clarifying language generally ties the
criteria more specifically to the concern with protecting and making
more efficient the health care delivery and payment system that
underlies the Administrative Simplification provisions of HIPAA, but,
with respect to the catch-all provision at section 1178(a)(2)(A)(i)(IV),
also requires that privacy interests be balanced with such concerns, to
the extent relevant. We require that exceptions for rules to ensure
appropriate state regulation of insurance and health plans be stated in
a statute or regulation, so that such exceptions will be clearly tied to
statements of priorities made by publicly accountable bodies (e.g.,
through the public comment process for regulations, and by elected
officials through statutes). With respect to the criterion at section
1178(a)(2)(A)(ii), we have further delineated what "addresses controlled
substances" means. The language provided, which builds on concepts at 21
U.S.C. 821 and the Medicare regulations at 42 CFR 1001.2, delineates the
area within which the government traditionally regulates controlled
substances, both civilly and criminally; it is our view that HIPAA was
not intended to displace such regulation.
*Comment:* Several commenters urged that the request for determination
by the Secretary under proposed § 160.204(a) be limited to cases where
an exception is absolutely necessary, and that in making such a
determination, the Secretary should be required to make a determination
that the benefits of granting an exception outweigh the potential harm
and risk of disclosure in violation of the regulation.
*Response:* We have not further defined the statutory term "necessary",
as requested. We believe that the determination of what is "necessary"
will be fact-specific and context dependent, and should not be further
circumscribed absent such specifics. The state will need to make its
case that the state law in question is sufficiently "necessary" to
accomplish the particular statutory ground for exception that it should
trump the contrary federal standard, requirement, or implementation
specification.
*Comment:* One commenter noted that a state should be required to
explain whether it has taken any action to correct any less stringent
state law for which an exception has been requested. This commenter
recommended that a section be added to proposed § 160.204(a) stating
that "a state must specify what, if any, action has been taken to amend
the state law to comply with the federal regulations." Another comment,
received in the Transactions rulemaking, took the position that
exception determinations should be granted only if the state standards
in question exceeded the national standards.
*Response:* The first and last comments appear to confuse the "more
stringent" criterion that applies under section 1178(a)(2)(B) of the Act
with the criteria that apply to exceptions under section 1178(a)(2)(A).
We are also not adopting the language suggested by the first comment,
because we do not agree that states should necessarily have to try to
amend their state laws as a precondition to requesting exceptions under
section 1178(a)(2)(A). Rather, the question should be whether the state
has made a convincing case that the state law in question is
sufficiently necessary for one of the statutory purposes that it should
trump the contrary federal policy.
*Comment:* One commenter stated that exceptions for state laws that are
contrary to the federal standards should not be preempted where the
state and federal standards are found to be equal.
*Response:* This suggestion has not been adopted, as it is not
consistent with the statute. With respect to the administrative
simplification standards in general, it is clear that the intent of
Congress was to preempt contrary state laws except in the limited areas
specified as exceptions or carve-outs. See, section 1178. This statutory
approach is consistent with the underlying goal of simplifying health
care transactions through the adoption of uniform national standards.
Even with respect to state laws relating to the privacy of medical
information, the statute shields such state laws from preemption by the
federal standards only if they are "more" stringent than the related
federal standard or implementation specification.
*Comment:* One commenter noted that determinations would apply only to
transactions that are wholly intrastate. Thus, any element of a health
care transaction that would implicate more than one state's law would
automatically preclude the Secretary's evaluation as to whether the laws
were more or less stringent than the federal requirement. Other
commenters expressed confusion about this proposed requirement, noting
that providers and plans operate now in a multi-state environment.
*Response:* We agree with the commenters and have dropped the proposed
requirement. As noted by the commenters, health care entities now
typically operate in a multi-state environment, so already make the
choice of law judgements that are necessary in multi-state transactions.
It is the result of that calculus that will have to be weighed against
the federal standards, requirements, and implementation specifications
in the preemption analysis.
*Comment:* One comment received in the Transactions rulemaking suggested
that the Department should allow exceptions to the standard transactions
to accommodate abbreviated transactions between state agencies, such as
claims between a public health department and the state Medicaid agency.
Another comment requested an exception for Home and Community Based
Waiver Services from the transactions standards.
*Response:* The concerns raised by these comments would seem to be more
properly addressed through the process established for maintaining and
modifying the transactions standards. If the concerns underlying these
comments cannot be addressed in this manner, however, there is nothing
in the rules below to preclude states from requesting exceptions in such
cases. They will then have to make the case that one or more grounds for
exception applies.
§ 160.204(a) - Process for Exception Determinations - Comments and
Responses
*Comment:* Several comments received in the Transactions rulemaking
stated that the process for applying for and granting exception
determinations (referred to as "waivers" by some) needed to be spelled
out in the final rule.
*Response:* We agree with these comments. As noted above, since no
process was proposed in the Transactions rulemaking, a process for
making exception determinations was not adopted in those final rules.
Subpart B below adopts a process for making exception determinations,
which responds to these comments.
*Comment:* Comments stated that the exception process would be
burdensome, unwieldy, and time-consuming for state agencies as well as
the Department. One comment took the position that states should not be
required to submit exception requests to the Department under proposed §
160.203(a), but could provide documentation that the state law meets one
of the conditions articulated in proposed § 160.203.
*Response:* We disagree that the process adopted at § 164.204 below will
be burdensome, unwieldy, or time-consuming. The only thing the
regulation describes is the showings that a requestor must make as part
of its submission, and all are relevant to the issue to be determined by
the Secretary. How much information is submitted is, generally speaking,
in the requestor's control, and the regulation places no restrictions on
how the requestor obtains it, whether by acting directly, by working
with providers and/or plans, or by working with others. With respect to
the suggestion that states not be required to submit exception requests,
we disagree that this suggestion is either statutorily authorized or
advisable. We read this comment as implicitly suggesting that the
Secretary must proactively identify instances of conflict and evaluate
them. This suggestion is, thus, at bottom the same as the many
suggestions that we create a database or compendium of controlling law,
and it is rejected for the same reasons.
*Comment:* Several comments urged that all state requests for
non-preemption include a process for public participation. These
comments believe that members of the public and other interested
stakeholders should be allowed to submit comments on a state's request
for exception, and that these comments should be reviewed and considered
by the Secretary in determining whether the exception should be granted.
One comment suggested that the Secretary at least give notice to the
citizens of the state prior to granting an exception.
*Response:* The revision to § 160.204(a), to permit requests for
exception determinations by any person, responds to these comments.
*Comment:* Many commenters noted that the lack of a clear and reasonable
time line for the Secretary to issue an exception determination would
not provide sufficient assurance that the questions regarding what rules
apply will be resolved in a time frame that will allow business to be
conducted properly, and argued that this would increase confusion and
uncertainty about which statutes and regulations should be followed.
Timeframes of 60 or 90 days were suggested. One group suggested that, if
a state does not receive a response from HHS within 60 days, the waiver
should be deemed approved.
*Response:* The workload prioritization and management considerations
discussed above with respect to advisory opinions are also relevant here
and make us reluctant to agree to a deadline for making exception
determinations. This is particularly true at the outset, since we have
no experience with such requests. We therefore have no basis for
determining how long processing such requests will take, how many
requests we will need to process, or what resources will be available
for such processing. We agree that states and other requesters should
receive timely responses and will make every effort to make
determinations as expeditiously as possible, but we cannot commit to
firm deadlines in this initial rule. Once we have experience in handling
exception requests, we will consult with states and others in regard to
their experiences and concerns and their suggestions for improving the
Secretary's expeditious handling of such requests.
We are not accepting the suggestion that requests for exception be
deemed approved if not acted upon in some defined time period. Section
1178(a)(2)(A) requires a specific determination by the Secretary. The
suggested policy would not be consistent with this statutory
requirement. It is also inadvisable from a policy standpoint, in that it
would tend to maximize exceptions. This would be contrary to the
underlying statutory policy in favor of uniform federal standards.
*Comment:* One commenter took exception to the requirement for states to
seek a determination from the Department that a provision of state law
is necessary to prevent fraud and abuse or to ensure appropriate state
regulation of insurance plans, contending that this mandate could
interfere with the Insurance Commissioners' ability to do their jobs.
Another commenter suggested that the regulation specifically recognize
the broad scope of state insurance department activities, such as market
conduct examinations, enforcement investigations, and consumer complaint
handling.
*Response:* The first comment raises an issue that lies outside our
legal authority to address, as section 1178(a)(2)(A) clearly mandates
that the Secretary make a determination in these areas. With respect to
the second comment, to the extent these concerns pertain to health
plans, we believe that the provisions at § 164.512 relating to oversight
and disclosures required by law should address the concerns underlying
this comment.
***Section 160.204(a)(4) - Period of Effectiveness of Exception
Determinations***
*Comment:* Numerous commenters stated that the proposed three year
limitation on the effectiveness of exception determinations would pose
significant problems and should be limited to one year, since a one year
limitation would provide more frequent review of the necessity for
exceptions. The commenters expressed concern that state laws which
provide less privacy protection than the federal regulation would be
given exceptions by the Secretary and thus argued that the exceptions
should be more limited in duration or that the Secretary should require
that each request, regardless of duration, include a description of the
length of time such an exception would be needed.
One state government commenter, however, argued that the 3 year limit
should be eliminated entirely, on the ground that requiring a
redetermination every three years would be burdensome for the states and
be a waste of time and resources for all parties. Other commenters,
including two state agencies, suggested that the exemption should remain
effective until either the state law or the federal regulation is
changed. Another commenter suggested that the three year sunset be
deleted and that the final rule provide for automatic review to
determine if changes in circumstance or law would necessitate amendment
or deletion of the opinion. Other recommendations included deeming the
state law as continuing in effect upon the submission of a state
application for an exemption rather than waiting for a determination by
the Secretary that may not occur for a substantial period of time.
*Response:* We are persuaded that the proposed 3 year limit on exception
determinations does not make sense where neither law providing the basis
for the exception has changed in the interim. We also agree that where
either law has changed, a previously granted exception should not
continue. Section 160.205(a) below addresses these concerns.
**Sections 160.203(b) and 160.204(b) -- Advisory Opinions**
***Section 160.203(b) -- Effect of Advisory Opinions***
*Comment:* Several commenters questioned whether or not DHHS has
standing to issue binding advisory opinions and recommended that the
Department clarify this issue before implementation of this regulation.
One respondent suggested that the Department clarify in the final rule
the legal issues on which it will opine in advisory opinion requests,
and state that in responding to requests for advisory opinions the
Department will not opine on the preemptive force of ERISA with respect
to state laws governing the privacy of individually identifiable health
information, since interpretations as to the scope and extent of ERISA's
preemption provisions are outside of the Department's jurisdictional
authority.
One commenter asked whether a state could enforce a state law which the
Secretary had indicated through an advisory opinion is preempted by
federal law. This commenter also asked whether the state would be
subject to penalties if it chose to continue to enforce its own laws.
*Response:* As discussed above, in part for reasons raised by these
comments, the Department has decided not to have a formal process for
issuing advisory opinions, as proposed.
Several of these concerns, however, raise issues of broader concern that
need to be addressed. First, we disagree that the Secretary lacks legal
authority to opine on whether or not state privacy laws are preempted.
The Secretary is charged by law with determining compliance, and where
state law and the federal requirements conflict, a determination of
which law controls will have to be made in order to determine whether
the federal standard, requirement, or implementation specification at
issue has been violated. Thus, the Secretary cannot carry out her
enforcement functions without making such determinations. It is further
reasonable that, if the Secretary makes such determinations, she can
make those determinations known, for whatever persuasive effect they may
have.
The questions as to whether a state could enforce, or would be subject
to penalties if it chose to continue to enforce, its own laws following
a denial by the Secretary of an exception request under § 160.203 or a
holding by a court of competent jurisdiction that a state privacy law
had been preempted by a contrary federal privacy standard raise several
issues. First, a state law is preempted under the Act only to the extent
that it applies to covered entities; thus, a state is free to continue
to enforce a "preempted" state law against non-covered entities to which
the state law applies. If there is a question of coverage, states may
wish to establish processes to ascertain which entities within their
borders are covered entities within the meaning of these rules. Second,
with respect to covered entities, if a state were to try to enforce a
preempted state law against such entities, it would presumably be acting
without legal authority in so doing. We cannot speak to what remedies
might be available to covered entities to protect themselves against
such wrongful state action, but we assume that covered entities could
seek judicial relief, if all else failed. With respect to the issue of
imposing penalties on states, we do not see this as likely. The only
situation that we can envision in which penalties might be imposed on a
state would be if a state agency were itself a covered entity and
followed a preempted state law, thereby violating the contrary federal
standard, requirement, or implementation specification.
***Section 160.204(b) - Process for Advisory Opinions***
*Comment:* Several commenters stated that it was unclear whether a state
would be required to submit a request for an advisory opinion in order
for the law to be considered more stringent and thus not preempted. The
Department should clarify whether a state law could be non-preempted
even without such an advisory opinion. Another commenter requested that
the final rule explicitly state that the stricter rule always applies,
whether it be state or federal, and regardless of whether there is any
conflict between state and federal law.
*Response:* The elimination of the proposed process for advisory
opinions renders moot the first question. Also, the preceding response
clarifies that which law preempts in the privacy context (assuming that
the state law and federal requirement are "contrary") is a matter of
which one is the "more stringent." This is not a matter which the
Secretary will ultimately determine; rather, this is a question about
which the courts will ultimately make the final determination. With
respect to the second comment, we believe that § 160.203(b) below
responds to this issue, but we would note that the statute already
provides for this.
*Comment:* Several commenters supported the decision to limit the
parties who may request advisory opinions to the state. These commenters
did not believe that insurers should be allowed to request an advisory
opinion and open every state law up to challenge and review.
Several commenters requested that guidance on advisory opinions be
provided in [all]{.underline} circumstances, not only at the Secretary's
discretion. It was suggested that proposed § 160.204(b)(2)(iv) be
revised to read as follows: "A state may submit a written request to the
Secretary for an advisory opinion under this paragraph. The request must
include the following information: the reasons why the state law
[should]{.underline} or [should not be]{.underline} preempted by the
federal standard, requirement, or implementation specification,
including how the state law meets the criteria at § 160.203(b)."
*Response:* The decision not to have a formal process for issuing
advisory opinions renders these issues moot.
**Sections 160.203(c) and 160.203(d) -- Statutory Carve-Outs**
*Comment:* Several commenters asked that the Department provide more
specific examples itemizing activities traditionally regulated by the
state that could constitute "carve-out" exceptions. These commenters
also requested that the Department include language in the regulation
stating that if a state law falls within several different exceptions,
the state chooses which determination exception shall apply.
*Response:* We are concerned that itemizing examples in this way could
leave out important state laws or create inadvertent negative
implications that laws not listed are not included. However, as
explained above, we have designed the types of activities that are
permissive disclosures for public health under § 164.512(b) below in
part to come within the carve-out effected by section 1178(b); while the
state regulatory activities covered by section 1178(c) will generally
come within § 164.512(d) below. With respect to the comments asking that
a state get to "choose" which exception it comes under, we have in
effect provided for this with respect to exceptions under section
1178(a)(2)(A), by giving the state the right to request an exception
under that section. With respect to exceptions under section
1178(a)(2)(B), those exceptions occur by operation of law, and it is not
within the Secretary's power to "let" the state choose whether an
exception occurs under that section.
*Comment:* Several commenters took the position that the Secretary
should not limit the procedural requirements in proposed § 160.204(a) to
only those applications under proposed § 160.203(a). They urged that the
requirements of proposed § 160.204(a) should also apply to preemption
under sections 1178(a)(2)(B), 1178(b) and 1178(c). It was suggested that
the rules should provide for exception determinations with respect to
the matters covered by these provisions of the statute; such additional
provisions would provide clear procedures for states to follow and
ensure that requests for exceptions are adequately documented.
A slightly different approach was taken by several commenters, who
recommended that proposed § 160.204(b) be amended to clarify that the
Secretary will also issue advisory opinions as to whether a state law
constitutes an exception under proposed §§ 160.203(c) and 160.203(d).
This change would, they argued, give states the same opportunity for
guidance that they have under § 160.203(a) and (b), and as such, avoid
costly lawsuits to preserve state laws.
*Response:* We are not taking either of the recommended courses of
action. With respect to the recommendation that we expand the exception
determination process to encompass exceptions under sections
1178(a)(2)(B), 1178(b), and 1178(c), we do not have the authority to
grant exceptions under these sections. Under section 1178, the Secretary
has authority to make exception determinations only with respect to the
matters covered by section 1178(a)(2)(A); contrary state laws coming
within section 1178(a)(2)(B) are preempted if not more stringent, while
if a contrary state law comes within section 1178(b) or section 1178(c),
it is not preempted. These latter statutory provisions operate by their
own terms. Thus, it is not within the Secretary's authority to establish
the determination process which these comments seek.
With respect to the request seeking advisory opinions in the section
1178(b) and 1178(c) situations, we agree that we have the authority to
issue such opinions. However, the considerations described above that
have led us not to adopt a formal process for issuing advisory opinions
in the privacy context apply with equal force and effect here.
*Comment:* One commenter argued that it would be unnecessarily
burdensome for state health data agencies (whose focus is on the cost of
healthcare or improving Medicare, Medicaid, or the healthcare system) to
obtain a specific determination from the Department for an exception
under proposed § 160.203(c). States should be required only to notify
the Secretary of their own determination that such collection is
necessary. It was also argued that cases where the statutory carve-outs
apply should not require a Secretarial determination.
*Response:* We clarify that no Secretarial determination is required for
activities that fall into one of the statutory carve-outs. With respect
to data collections for state health data agencies, we note that
provision has been made for many of these activities in several
provisions of the rules below, such as the provisions relating to
disclosures required by law (§ 164.512(a)), disclosures for oversight (§
164.512(d)), and disclosures for public health (§ 164.512(b)). Some
disclosures for Medicare and Medicaid purposes may also come within the
definition of health care operations. A fuller discussion of this issue
appears in connection with § 164.512 below.
**Constitutional Comments and Responses**
*Comment:* Several commenters suggested that as a general matter the
rule is unconstitutional.
*Response:* We disagree that the rule is unconstitutional. The
particular grounds for this conclusion are set out with respect to
particular constitutional issues in the responses below. With respect to
the comments that simply made this general assertion, the lack of detail
of the comments makes a substantive response impossible.
***Article II***
*Comment:* One commenter contended that the Secretary improperly
delegated authority to private entities by requiring covered entities to
enter into contracts with, monitor, and take action for violations of
the contract against their business partners. These comments assert that
the selection of these entities to "enforce" the regulations violates
the Executive Powers Clause and the Appointments and Take Care Clauses.
*Response:* We reject the assertion that the business associate
provisions constitute an improper delegation of executive power to
private entities. HIPAA provides HHS with authority to enforce the
regulation against covered entities. The rules below regulate only the
conduct of the covered entity; to the extent a covered entity chooses to
conduct its funding through a business associate, those functions are
still functions of the covered entity. Thus, no improper delegation has
occurred because what is being regulated are the actions of the covered
entity, not the actions of the business associate in its independent
capacity.
We also reject the suggestion that the business associates provisions
constitute an improper appointment of covered entities to enforce the
regulation and violate the Take Care Clause. Because the Secretary has
not delegated authority to covered entities, the inference that she has
appointed covered entities to exercise such authority misses the mark.
***Commerce Clause***
*Comment:* A few commenters suggested that the privacy regulation
regulates activities that are not in interstate commerce and which are,
therefore, beyond the powers the U.S. Constitution gives the federal
government.
*Response:* We disagree. Health care providers, health plans, and health
care clearinghouses are engaged in economic and commercial activities,
including the exchange of individually identifiable health information
electronically across state lines. These activities constitute
interstate commerce. Therefore, they come within the scope of Congress'
power to regulate interstate commerce.
***Nondelegation Doctrine***
*Comment:* Some commenters objected to the manner by which Congress
provided the Secretary authority to promulgate this regulation. These
comments asserted that Congress violated the nondelegation doctrine by
(1) not providing an "intelligible principle" to guide the agency, (2)
not establishing "ascertainable standards," and (3) improperly
permitting the Secretary to make social policy decisions.
*Response:* We disagree. HIPAA clearly delineates Congress' general
policy to establish strict privacy protections for individually
identifiable health information to encourage electronic transactions.
Congress also established boundaries limiting the Secretary's authority.
Congress established these limitations in several ways, including by
calling for privacy standards for "individually identifiable health
information"; specifying that privacy standards must address
individuals' rights regarding their individually identifiable health
information, the procedures for exercising those rights, and the
particular uses and disclosures to be authorized or required;
restricting the direct application of the privacy standards to "covered
entities," which Congress defined; requiring consultation with the
National Committee on Vital and Health Statistics and the Attorney
General; specifying the circumstances under which the federal
requirements would supersede state laws; and specifying the civil and
criminal penalties the Secretary could impose for violations of the
regulation. These limitations also serve as "ascertainable standards"
upon which reviewing courts can rely to determine the validity of the
exercise of authority.
Although Congress could have chosen to impose expressly an exhaustive
list of specifications that must be met in order to achieve the
protective purposes of the HIPAA, it was entirely permissible for
Congress to entrust to the Secretary the task of providing these
specifications based on her experience and expertise in dealing with
these complex and technical matters.
We disagree with the comments that Congress improperly delegated
Congressional policy choices to her. Congress clearly decided to create
federal standards protecting the privacy of "individually identifiable
health information" and not to preempt state laws that are more
stringent. Congress also determined over whom the Secretary would have
authority, the type of information protected, and the minimum level of
regulation.
***Separation of Powers***
*Comment:* Some commenters asserted that the federal government may not
preempt state laws that are not as strict as the privacy regulation
because to do so would violate the separation of powers in the U.S.
Constitution. One comment suggested that the rules raised a substantial
constitutional issue because, as proposed, they permitted the Secretary
to make determinations on preemption, which is a role reserved for the
judiciary.
*Response:* We disagree. We note that this comment only pertains to
determinations under section 1178(a)(2)(A); as discussed above, the
rules below provide for no Secretarial determinations with respect to
state privacy laws coming within section 1178(a)(2)(B). With respect to
determinations under section 1178(a)(2)(A), however, the final rules,
like the proposed rules, provide that at a state's request the Secretary
may make certain determinations regarding the preemptive effect of the
rules on a particular state law. As usually the case with any
administrative decisions, these are subject to judicial review pursuant
to the Administrative Procedure Act.
***First Amendment***
*Comment:* Some comments suggested that the rules violated the First
Amendment. They asserted that if the rule included Christian Science
practitioners as covered entities it would violate the separation of
church and state doctrine.
*Response:* We disagree. The First Amendment does not always prohibit
the federal government from regulating secular activities of religious
organizations. However, we address concerns relating to Christian
Science practitioners more fully in the response to comments discussion
of the definition of "covered entity" in § 160.103.
***Fourth Amendment***
*Comment:* Many comments expressed Fourth Amendment concerns about
various proposed provisions. These comments fall into two
categories--general concerns about warrantless searches and specific
concerns about administrative searches. Several comments argued that the
proposed regulations permit law enforcement and government officials
access to protected health information without first requiring a
judicial search warrant or an individual's consent. These comments
rejected the applicability of any of the existing exceptions permitting
warrantless searches in this context. Another comment argued that
federal and state police should be able to obtain personal medical
records only with the informed consent of an individual. Many of these
comments also expressed concern that protected health information could
be provided to government or private agencies for inclusion in a
governmental health data system.
*Response:* We disagree that the provisions of these rules that permit
disclosures for law enforcement purposes and governmental health data
systems generally violate the Fourth Amendment. The privacy regulation
does not create new access rights for law enforcement. Rather, it
refrains from placing a significant barrier in front of access rights
that law enforcement currently has under existing legal authority. While
the regulation may *permit* a covered entity to make disclosures in
specified instances, it does not *require* the covered entity make the
disclosure. Thus, because we are not modifying existing law regarding
disclosures to law enforcement officials, except to strengthen the
requirements related to requests already authorized under law, and are
not requiring any such disclosures, the privacy regulation does not
infringe upon individual's Fourth Amendment rights. We discuss the
rationale underlying the permissible disclosures to law enforcement
officials more fully in the preamble discussion relating to §
164.512(f).
We note that the proposed provision relating to disclosures to
government health data systems has been eliminated in the final rule.
However, to the extent that the comments can be seen as raising concern
over disclosure of protected health information to government agencies
for public health, health oversight, or other purposes permitted by the
final rule, the reasoning in the previous paragraph applies.
*Comment:* One commenter suggested that the rules violate the Fourth
Amendment by requiring covered entities to provide access to the
Secretary to their books, records, accounts, and facilities to ensure
compliance with these rules. The commenter also suggested that the
requirement that covered entities enter into agreements with their
business partners to make their records available to the Secretary for
inspection as well also violates the warrant requirement of the Fourth
Amendment.
*Response:* We disagree. These requirements are consistent with U.S.
Supreme Court cases holding that warrantless administrative searches of
commercial property are not per se violations of the Fourth Amendment.
The provisions requiring that covered entities provide access to certain
material to determine compliance with the regulation come within the
well-settled exception regarding closely regulated businesses and
industries to the warrant requirement. From state and local licensure
laws to the federal fraud and abuse statutes and regulations, the health
care industry is one of the most tightly regulated businesses in the
country. Because the industry has such an extensive history of
government oversight and involvement, those operating within it have no
reasonable expectation of privacy from the government such that a
warrant would be required to determine compliance with the rules.
In addition, the cases cited by the commenters concern unannounced
searches of the premises and facilities of particular entities. Because
our enforcement provisions only provide for the review of books,
records, and other information and only during normal business hours
with notice, except for exceptional situations, this case law does not
apply.
As for business associates, they voluntarily enter into their agreements
with covered entities. This agreement, therefore, functions as knowing
and voluntary consents to the search (even assuming it could be
understood to be a search) and obviates the need for a warrant.
***Fifth Amendment***
*Comment:* Several comments asserted that the proposed rules violated
the Fifth Amendment because in the commenters' views they authorized the
taking of privacy property without just compensation or due process of
law.
*Response:* We disagree. The rules set forth below do not address the
issue of who owns an individual's medical record. Instead, they address
what uses and disclosures of protected health information may be made by
covered entities with or without a consent or authorization. As
described in response to a similar comment, medical records have been
the property of the health care provider or medical facility that
created them, historically. In some states, statutes directly provide
these entities with ownership. These laws are limited by laws that
provide patients or their representatives with access to the records or
that provide the patient with an ownership interest in the information
within the records. As we discuss, the final rule is consistent with
current state law that provides patients access to protected health
information, but not ownership of medical records. State laws that
provide patients with greater access would remain in effect. Therefore,
because patients do not own their records, no taking can occur. As for
their interest in the information, the final rule retains their rights.
As for covered entities, the final rule does not take away their
ownership rights or make their ownership interest in the protected
health information worthless. Therefore, no taking has occurred in these
situations either.
***Ninth and Tenth Amendments***
*Comment:* Several comments asserted that the proposed rules violated
the Ninth and Tenth Amendments. One commenter suggested that the Ninth
Amendment prohibits long and complicated regulations. Other commenters
suggested that the proposed rules authorized the compelled disclosure of
individually identifiable health information in violation of State
constitutional provisions, such as those in California and Florida.
Similarly, a couple of commenters asserted that the privacy rules
violate the Tenth Amendment.
*Response:* We disagree. The Ninth and Tenth Amendments address the
rights retained by the people and acknowledge that the States or the
people are reserved the powers not delegated to the federal government
and not otherwise prohibited by the Constitution. Because HHS is
regulating under a delegation of authority from Congress in an area that
affects interstate commerce, we are within the powers provided to
Congress in the Constitution. Nothing in the Ninth Amendment, or any
other provision of the Constitution, restricts the length or complexity
of any law. Additionally, we do not believe the rules below
impermissibly authorize behavior that violates State constitutions. This
rule requires disclosure only to the individual or to the Secretary to
enforce this rule. As noted in the preamble discussion of "Preemption,"
these rules do not preempt State laws, including constitutional
provisions, that are contrary to and more stringent, as defined at §
160.502, than these rules. See the discussion of "Preemption" for
further clarification. Therefore, if these State constitutions are
contrary to the rule below and provide greater protection, they remain
in full force; if they do not, they are preempted, in accordance with
the Supremacy Clause of the Constitution.
***Right to Privacy***
*Comment:* Several comments suggested that the proposed regulation would
violate the right to privacy guaranteed by the First, Fourth, Fifth, and
Ninth Amendments because it would permit covered entities to disclose
protected health information without the consent of the individual.
*Response:* These comments did not provide specific facts or legal basis
for the claims. We are, thus, unable to provide a substantive response
to these particular comments. However, we note that the rule requires
disclosures only to the individual or to the Secretary to determine
compliance with this rule. Other uses or disclosures under this rule are
permissive, not required. Therefore, if a particular use or disclosure
under this rule is viewed as interfering with a right that prohibited
the use or disclosure, the rule itself is not what requires the use or
disclosure.
***Void for Vagueness***
*Comment:* One comment suggested that the Secretary's use of a
"reasonableness" standard is unconstitutionally vague. Specifically,
this comment objected to the requirement that covered entities use
"reasonable" efforts to use or disclose the minimum amount of protected
health information, to ensure that business partners comply with the
privacy provisions of their contracts, to notify business partners of
any amendments or corrections to protected health information, and to
verify the identity of individuals requesting information, as well as
charge only a "reasonable" fee for inspecting and copying health
information. This comment asserted that the Secretary provided
"inadequate guidance" as to what qualifies as "reasonable."
*Response:* We disagree with the comment's suggestion that by applying a
"reasonableness" standard, the regulation has failed to provide for
"fair warning" or "fair enforcement." The "reasonableness" standard is
well-established in law; for example, it is the foundation of the common
law of torts. Courts also have consistently held as constitutional
statutes that rely upon a "reasonableness" standard. Our reliance upon a
"reasonableness" standard, thus, provides covered entities with
constitutionally sufficient guidance.
***Criminal Intent***
*Comment:* One comment argued that the regulation's reliance upon a
"reasonableness" standard criminalizes "unreasonable efforts" without
requiring criminal intent or *mens rea*.
*Response:* We reject this suggestion because HIPAA clearly provides the
criminal intent requirement. Specifically, HIPPA provides that a "person
who *knowingly* and in violation of this part -- (1) uses or causes to
be used a unique health identifier; (2) obtains individually
identifiable health information relating to an individual; or (3)
discloses individually identifiable health information to another
person, shall be punished as provided in subsection (b)." HIPAA section
1177 (emphasis added). Subsection (b) also relies on a knowledge
standard in outlining the three levels of criminal sanctions. Thus,
Congress, not the Secretary, established the *mens rea* by including the
term "knowingly" in the criminal penalty provisions of HIPAA.
***Data Collection***
*Comment:* One commenter suggested that the U.S. Constitution authorized
the collection of data on individuals only for the purpose of the
census.
*Response:* While it might be true that the U.S. Constitution expressly
discusses the national census, it does not forbid federal agencies from
collecting data for other purposes. The ability of agencies to collect
non-census data has been upheld by the courts.
**Relationship to Other Federal Laws**
*Comment*: We received several comments that sought clarification of the
interaction of various federal laws and the privacy regulation. Many of
these comments simply listed federal laws and regulations with which the
commenter currently must comply. For example, commenters noted that they
must comply with regulations relating to safety, public health, and
civil rights, including Medicare and Medicaid, the Americans with
Disabilities Act, the Family and Medical Leave Act, the Federal Aviation
Administration regulations, the Department of Transportation
regulations, the Federal Highway Administration regulations, the
Occupational Safety and Health Administration regulations, and the
Environmental Protection Agency regulations, and alcohol and drug free
workplace rules. These commenters suggested that the regulation state
clearly and unequivocally that uses or disclosures of protected health
information for these purposes were permissible. Some suggested
modifying the definition of health care operations to include these uses
specifically. Another suggestion was to add a section that permitted the
transmission of protected health information to employers when
reasonably necessary to comply with federal, state, or municipal laws
and regulations, or when necessary for public or employee safety and
health.
*Response:* Although we sympathize with entities' needs to evaluate the
existing laws with which they must comply in light of the requirements
of the final regulation, we are unable to respond substantially to
comments that do no pose specific questions. We offer, however, the
following guidance: if an covered entity is required to disclose
protected health information pursuant to a specific statutory or
regulatory scheme, the covered entity generally will be permitted under
§ 164.512(a) to make these disclosures without a consent or
authorization; if, however, a statute or regulation merely suggests a
disclosure, the covered entity will need to determine if the disclosure
comes within another category of permissible disclosure under §§ 164.510
or 164.512 or, alternatively, if the disclosure would otherwise come
within § 164.502. If not, the entity will need to obtain a consent or
authorization for the disclosure.
*Comment:* One commenter sought clarification as to when a disclosure is
considered to be "required" by another law versus "permitted" by that
law.
*Responses:* We use these terms according to their common usage. By
"required by law," we mean that a covered entity has a legal obligation
to disclose the information. For example, if a statute states that a
covered entity must report the names of all individuals presenting with
gun shot wounds to the emergency room or else be fined \$500 for each
violation, a covered entity would be required by law to disclose the
protected health information necessary to comply with this mandate. The
privacy regulation permits this type of disclosure, but does not require
it. Therefore, if a covered entity chose not to comply with the
reporting statute it would violate only the reporting statute and not
the privacy regulation.
On the other hand, if a statute stated that a covered entity may or is
permitted to report the names of all individuals presenting with gun
shot wounds to the emergency room and, in turn, would receive \$500 for
each month it made these reports, a covered entity would not be
permitted by § 164.512(a) to disclose the protected health information.
Of course, if another permissible provision applied to these facts, the
covered entity could make the disclosure under that provision, but it
would not be considered to be a disclosure. See discussion under §
164.512(a) below.
*Comment:* Several commenters suggested that the proposed rule was
unnecessarily duplicative of existing regulations for federal programs,
such as Medicare, Medicaid, and the Federal Employee Health Benefit
Program.
*Response:* Congress specifically subjected certain federal programs,
including Medicare, Medicaid, and the Federal Employee Health Benefit
Program to the privacy regulation by including them within the
definition of "health plan." Therefore, covered entities subject to
requirements of existing federal programs will also have to comply with
the privacy regulation. *Comment:* One comment asserts that the
regulation would not affect current federal requirements if the current
requirements are weaker than the requirements of the privacy regulation.
This same commenter suggested that current federal requirements will
trump both state law and the proposed regulation, even if Medicaid
transactions remain wholly intrastate.
*Response:* We disagree. As noted in our discussion of "Relationship to
Other Federal Laws," each law or regulation will need to be evaluated
individually. We similarly disagree with the second assertion made by
the commenter. The final rule will preempt state laws only in specific
instances. For a more detailed analysis, see the preamble discussion of
"Preemption."
***Administrative Subpoenas***
*Comment:* One comment stated that the final rule should not impose new
standards on administrative subpoenas that would conflict with existing
laws or administrative or judicial rules that establish standards for
issuing subpoenas. Nor should the final rule conflict with established
standards for the conduct of administrative, civil, or criminal
proceedings, including the rules regarding the discovery of evidence.
Other comments sought further restrictions on access to protected health
information in this context.
*Response:* Section 164.512(e) below addresses disclosures for judicial
and administrative proceedings. The final rules generally do not
interfere with these existing processes to the extent an individual
served with a subpoena, court order, or other similar process is able to
raise objections already available. See the discussion below under §
164.512(e) for a fuller response.
***Americans with Disabilities Act***
*Comment:* Several comments discussed the intersection between the
proposed Privacy Rule and the Americans with Disabilities Act ("ADA")
and sections 503 and 504 of the Rehabilitation Act of 1973. One comment
suggested that the final rule explicitly allows disclosures authorized
by the Americans with Disabilities Act without an individual's
authorization, because this law, in the commenter's view, provides more
than adequate protection for the confidentiality of medical records in
the employment context. The comment noted that under these laws
employers may receive information related to fitness for duty,
pre-employment physicals, routine examinations, return to work
examinations, examinations following other types of absences,
examinations triggered by specific events, changes in circumstances,
requests for reasonable accommodations, leave requests, employee
wellness programs, and medical monitoring.
Other commenters suggested that the ADA requires the disclosure of
protected health information to employers so that the employee may take
advantage of the protections of these laws. They suggested that the
final rules clarify that employment may be conditioned on obtaining an
authorization for disclosure of protected health information for lawful
purposes and provide guidance concerning the interaction of the ADA with
the final regulation's requirements. Several commenters wanted
clarification that the privacy regulation would not permit employers to
request or use protected health information in violation of the ADA.
*Response:* We disagree with the comment that the final rule should
allow disclosures of protected health information authorized by the ADA
without the individual's authorization. We learned from the comments
that access to and use of protected health information by employers is
of particular concern to many people. With regard to employers, we do
not have statutory authority to regulate them. Therefore, it is beyond
the scope of this regulation to prohibit employers from requesting or
obtaining protected health information. Covered entities may disclose
protected health information about individuals who are members of an
employer's workforce with an authorization. Nothing in the privacy
regulation prohibits employers from obtaining that authorization as a
condition of employment. We note, however, that employers must comply
with other laws that govern them, such as nondiscrimination laws. For
example, if an employer receives a request for a reasonable
accommodation, the employer may require reasonable documentation about
the employee's disability and the functional limitations that require
the reasonable accommodation, if the disability and the limitations are
not obvious. If the individual provides insufficient documentation and
does not provide the missing information in a timely manner after the
employer's subsequent request, the employer may require the individual
to go to an appropriate health professional of the employer's choice. In
this situation, the employee does not authorize the disclosure of
information to substantiate the disability and the need for reasonable
accommodation, the employer need not provide the accommodation.
We agree that this rule does not permit employers to request or use
protected health information in violation of the ADA or other
antidiscrimination laws.
***Appropriations Laws***
*Comment:* One comment suggested that the penalty provisions of HIPAA,
if extended to the privacy regulation, would require the Secretary to
violate "Appropriations Laws" because the Secretary could be in the
position of assessing penalties against her own and other federal
agencies in their roles as covered entities. Enforcing penalties on
these entities would require the transfer of agency funds to the General
Fund.
*Response:* We disagree. Although we anticipate achieving voluntary
compliance and resolving any disputes prior to the actual assessment of
penalties, the Department of Justice's Office of Legal Counsel has
determined in similar situations that federal agencies have authority to
assess penalties against other federal agencies and that doing so is not
in violation of the Anti-Deficiency Act, 31 U.S.C. 1341.
***Balanced Budget Act of 1997***
*Comment:* One comment expressed concern that the regulation would place
tremendous burdens on providers already struggling with the effects of
the Balanced Budget Act of 1997.
*Response:* We appreciate the costs covered entities face when complying
with other statutory and regulatory requirements, such as the Balanced
Budget Act of 1997. However, HHS cannot address the impact of the
Balanced Budget Act or other statutes in the context of this regulation.
*Comment:* Another comment stated that the regulation is in direct
conflict with the Balanced Budget Act of 1997 ("BBA"). The comment
asserts that the regulation's compliance date conflicts with the BBA, as
well as Generally Acceptable Accounting Principles. According to the
comment, covered entities that made capital acquisitions to ensure
compliance with the year 2000 ("Y2K") problem would not be able to
account for the full depreciation of these systems until 2005. Because
HIPAA requires compliance before that time, the regulation would force
premature obsolescence of this equipment because while it is Y2K
compliant, it may be HIPAA non-compliant.
*Response:* This comment raises two distinct issues--(1) the investment
in new equipment and (2) the compliance date. With regard to the first
issue, we reject the comment's assertion that the regulation requires
covered entities to purchase new information systems or information
technology equipment, but realize that some covered entities may need to
update their equipment. We have tried to minimize the costs, while
responding appropriately to Congress' mandate for privacy rules. We have
dealt with the cost issues in detail in the "Regulatory Impact Analysis"
section of this Preamble. With regard to the second issue, Congress, not
the Secretary, established the compliance data at section 1175(b) of the
Act.
***Civil Rights of Institutionalized Persons Act***
*Comment:* A few comments expressed concern that the privacy regulation
would inadvertently hinder the Department of Justice Civil Rights
Divisions' investigations under the Civil Rights of Institutionalized
Persons Act ("CRIPA"). These comments suggested clearly including civil
rights enforcement activities as health care oversight.
*Response:* We agree with this comment. We do not intend for the privacy
rules to hinder CRIPA investigations. Thus, the final rule includes
agencies that are authorized by law to "enforce civil rights laws for
which health information is relevant" in the definition of "health
oversight agency" at § 164.501. Covered entities are permitted to
disclose protected health information to health oversight agencies under
§ 164.512(d) without an authorization. Therefore, we do not believe the
final rule should hinder the Department of Justice's ability to conduct
investigations pursuant to its authority in CRIPA.
***Clinical Laboratory Improvement Amendments***
*Comment:* One comment expressed concern that the proposed definition of
health care operations did not include activities related to the quality
control clinical studies performed by laboratories to demonstrate the
quality of patient test results. Because the Clinical Laboratory
Improvement Amendments of 1988 ("CLIA") requires these studies that the
comment asserted require the use of protected health information, the
comment suggested including this specific activity in the definition of
"health care operations."
*Response:* We do not intend for the privacy regulation to impede the
ability of laboratories to comply with the requirements of CLIA. Quality
control activities come within the definition of "health care
operations" in § 164.501 because they come within the meaning of the
term "quality assurance activities." To the extent they would not come
within health care operations, but are required by CLIA, the privacy
regulation permits clinical laboratories that are regulated by CLIA to
comply with mandatory uses and disclosures of protected health
information pursuant to § 164.512(a).
*Comment:* One comment stated that the proposed regulation's right of
access for inspection and copying provisions were contrary to CLIA in
that CLIA permits laboratories to disclose lab test results only to
"authorized persons." This comment suggested that the final rule include
language adopting this restriction to ensure that patients not obtain
laboratory test results before the appropriate health care provider has
reviewed and explained those results to the patients.
A similar comment stated that the lack of preemption of state laws could
create problems for clinical laboratories under CLIA. Specifically, this
comment noted that CLIA permits clinical laboratories to perform tests
only upon the written or electronic request of, and to provide the
results to, an "authorized person." State laws define who is an
"authorized person." The comment expressed concern as to whether the
regulation would preempt state laws that only permit physicians to
receive test results.
*Response:* We agree that CLIA controls in these cases. Therefore, we
have amended the right of access, § 164.524(a), so that a covered entity
that is subject to CLIA does not have to provide access to the
individual to the extent such access would be prohibited by law. Because
of this change, we believe the preemption concern is moot.
***Controlled Substance Act***
*Comment:* One comment expressed concern that the privacy regulation as
proposed would restrict the Drug Enforcement Agency's ("the DEA")
enforcement of the Controlled Substances Act ("CSA"). The comment
suggested including enforcement activities in the definition of "health
oversight agency."
*Response:* In our view, the privacy regulation should not impede the
DEA's ability to enforce the CSA. First, to the extent the CSA requires
disclosures to the DEA, these disclosures would be permissible under §
164.512(a). Second, some of the DEA's CSA activities come within the
exception for health oversight agencies which permits disclosures to
health oversight agencies for:
> activities authorized by law, including audits; civil, administrative,
> or criminal investigations; inspections . . . civil, administrative,
> or criminal proceedings or actions; and other activity necessary for
> appropriate oversight of the health care system.
Therefore, to the extent the DEA is enforcing the CSA, disclosures to it
in its capacity as a health oversight agency are permissible under §
164.512(d). Alternatively, CSA required disclosures to the DEA for law
enforcement purposes are permitted under § 164.512(f). When acting as a
law enforcement agency under the CSA, the DEA may obtain the information
pursuant to § 164.512(f). Thus, we do not agree that the privacy
regulation will impede the DEA's enforcement of the CSA. See the
preamble discussion of § 164.512 for further explanation.
*Comment:* One commenter suggested clarifying the provisions allowing
disclosures that are "required by law" to ensure that the mandatory
reporting requirements the CSA imposes on covered entities, including
making available reports, inventories, and records of transactions, are
not preempted by the regulation.
*Response:* We agree that the privacy regulation does not alter covered
entities' obligations under the CSA. Because the CSA requires covered
entities manufacturing, distributing, and/or dispensing controlled
substances to maintain and provide to the DEA specific records and
reports, the privacy regulation permits these disclosures under §
164.512(a). In addition, when the DEA seeks documents to determine an
entity's compliance with the CSA, such disclosures are permitted under §
164.512(d).
*Comment:* The same commenter expressed concern that the proposed
privacy regulation inappropriately limits voluntary reporting and would
prevent or deter employees of covered entities from providing the DEA
with information about violations of the CSA.
*Response:* We agree with the general concerns expressed in this
comment. We do not believe the privacy rules will limit voluntary
reporting of violations of the CSA. The CSA requires certain entities to
maintain several types of records that may include protected health
information. Although reports that included protected health information
may be restricted under these rules, reporting the fact that an entity
is not maintaining proper reports is not. If it were necessary to obtain
protected health information during the investigatory stages following
such a voluntary report, the DEA would be able to obtain the information
in other ways, such as by following the administrative procedures
outlined in § 164.512(e).
We also agree that employees of covered entities who report violations
of the CSA should not be subjected to retaliation by their employers.
Under § 164.502(j), we specifically state that a covered entity is not
considered to have violated the regulation if a workforce member or
business associate in good faith reports violations of laws or
professional standards by covered entities to appropriate authorities.
*See* discussion of § 164.502(j) below.
***Department of Transportation***
*Comment:* Several commenters stated that the Secretary should recognize
in the preamble that it is permissible for employers to condition
employment on an individual's delivering a consent to certain medical
tests and/or examinations, such as drug-free workplace programs and
Department of Transportation ("DOT")-required physical examinations.
These comments also suggested that employers should be able to receive
certain information, such as pass/fail test and examination results,
fitness-to-work assessments, and other legally required or permissible
physical assessments without obtaining an authorization. To achieve this
goal, these comments suggested defining "health information" to exclude
information such as information about how much weight a specific
employee can lift.
*Response:* We reject the suggestion to define "health information,"
which Congress defined in HIPAA, so that it excludes individually
identifiable health information that may be relevant to employers for
these types of examinations and programs. We do not regulate employers.
Nothing in the rules prohibit employers from conditioning employment on
an individual signing the appropriate consent or authorization. By the
same token, however, the rules below do not relieve employers from their
obligations under the ADA and other laws that restrict the disclosure of
individually identifiable health information.
*Comment:* One commenter asserted that the proposed regulation conflicts
with the DOT guidelines regarding positive alcohol and drug tests that
require the employer be notified in writing of the results. This
document contains protected health information. In addition, the
treatment center records must be provided to the Substance Abuse
Professional ("SAP") and the employer must receive a report from SAP
with random drug testing recommendations.
*Response:* It is our understanding that DOT requires drug testing of
all applicants for employment in safety-sensitive positions or
individuals being transferred to such positions. Employers, pursuant to
DOT regulations, may condition an employee's employment or position upon
first obtaining an authorization for the disclosure of results of these
tests to the employer. Therefore, we do not believe the final rules
conflict with the DOT requirements, which do not prohibit obtaining
authorizations before such information is disclosed to employers.
***Developmental Disabilities Act***
*Comment:* One commenter urged HHS to ensure that the regulation would
not impede access to individually identifiable health information to
entities that are part of the Protection and Advocacy System to
investigate abuse and neglect as authorized by the Developmental
Disabilities Bill of Rights Act.
*Response:* The Developmental Disabilities Assistance and Bill of Rights
Act of 2000 ("DD Act") mandates specific disclosures of individually
identifiable health information to Protection and Advocacy systems
designated by the chief elected official of the states and Territories.
Therefore, covered entities may make these disclosures under §
164.512(a) without first obtaining an individual's authorization, except
in those circumstances in which the DD Act requires the individual's
authorization. Therefore, the rules below will not impede the
functioning of the existing Protection and Advocacy System.
***Employee Retirement Income Security Act of 1974***
*Comment:* Several commenters objected to the fact that the NPRM did not
clarify the scope of preemption of state laws under the Employee
Retirement Income Security Act of 1974 (ERISA). These commenters
asserted that the final rule must state that ERISA preempts all state
laws (including those relating to the privacy of individually
identifiable health information) so that multistate employers could
continue to administer their group health plans using a single set of
rules. In contrast, other commenters criticized the Department for its
analysis of the current principles governing ERISA preemption of state
law, pointing out that the Department has no authority to interpret
ERISA.
*Response:* This Department has no authority to issue regulations under
ERISA as requested by some of these commenters, so the rule below does
not contain the statement requested. See the discussion of this point
under "Preemption" above.
*Comment:* One commenter requested that the final rule clarify that
section 264(c)(2) of HIPAA does not save state laws that would otherwise
be preempted by the Federal Employees Health Benefits Program. The
commenter noted that in the NPRM this statement was made with respect to
Medicare and ERISA, but not the law governing the FEHBP.
*Response:* We agree with this comment. The preemption analysis set out
above with respect to ERISA applies equally to the Federal Employees
Health Benefit Program.
*Comment:* One commenter noted that the final rule should clarify the
interplay between state law, the preemption standards in Subtitle A of
Title I of HIPAA (Health Care Access, Portability and Renewability), and
the preemption standards in the privacy requirements in Subtitle F of
Title II of HIPAA (Administrative Simplification).
*Response:* The NPRM described only the preemption standards that apply
with respect to the statutory provisions of HIPAA that were implemented
by the proposed rule. We agree that the preemption standards in Subtitle
A of Title I of HIPAA are different. Congress expressly provided that
the preemption provisions of Title I apply only to Part 7, which
addresses portability, access, and renewability requirements for Group
Health Plans. To the extent state laws contain provisions regarding
portability, access, or renewability, as well as privacy requirements, a
covered entity will need to evaluate the privacy provisions under the
Title II preemption provisions, as explained in the preemption
provisions of the rules, and the other provisions under the Title I
preemption requirements.
***European Union Privacy Directive and U.S. Safe Harbors***
*Comment:* Several comments stated that the privacy regulation should be
consistent with the European Union's Directive on Data Protection.
Others sought guidance as to how to comply with both the E.U. Directive
on Data Protection and the U.S. Safe Harbor Privacy Principles.
*Response:* We appreciate the need for covered entities obtaining
personal data from the European Union to understand how the privacy
regulation intersects with the Data Protection Directive. We have
provided guidance as to this interaction in the "Other Federal Laws"
provisions of the preamble.
*Comment:* A few comments expressed concern that the proposed definition
of "individual" excluded foreign military and diplomatic personnel and
their dependents, as well as overseas foreign national beneficiaries.
They noted that the distinctions are based on nationality and are
inconsistent with the stance of the E.U. Directive on Data Protection
and the Department of Commerce's assurances to the European Commission.
*Response:* We agree with the general principle that privacy protections
should protect every person, regardless of nationality. As noted in the
discussion of the definition of "individual," the final regulation's
definition does not exclude foreign military and diplomatic personnel,
their dependents, or overseas foreign national beneficiaries from the
definition of individual. As described in the discussion of § 164.512
below, the final rule applies to foreign diplomatic personnel and their
dependents like all other individuals. Foreign military personnel
receive the same treatment under the final rule as U.S. military
personnel do, as discussed with regard to § 164.512 below. Overseas
foreign national beneficiaries to the extent they receive care for the
Department of Defense or a source acting on behalf of the Department of
Defense remain generally excluded from the final rules protections. For
a more detailed explanation, see § 164.500.
***Fair Credit Reporting Act***
*Comment:* A few commenters requested that we exclude information
maintained, used, or disclosed pursuant to the Fair Credit Reporting Act
("FCRA") from the requirements of the privacy regulation. These
commenters noted that the protection in the privacy regulation duplicate
those in the FCRA.
*Response*: Although we realize that some overlap between FCRA and the
privacy rules may exist, we have chosen not to remove information that
may come within the purview of FCRA from the scope of our rules because
FCRA's focus is not the same as our Congressional mandate to protect
individually identifiable health information.
To the extent a covered entity seeks to engage in collection activities
or other payment-related activities, it may do so pursuant to the
requirements of this rule related to payment. See discussion of §§
164.501 and 164.502 below.
We understand that some covered entities may be part of, or contain
components that are, entities which meet the definition of "consumer
reporting agencies." As such, these entities are subject to the FCRA. As
described in the preamble to § 164.504, covered entities must designate
what parts of their organizations will be treated as covered entities
for the purpose of these privacy rules. The covered entity component
will need to comply with these rules, while the components that are
consumer reporting agencies will need to comply with FCRA.
*Comment:* One comment suggested that the privacy regulation would
conflict with the FCRA if the regulation's requirement applied to
information disclosed to consumer reporting agencies.
*Response:* To the extent a covered entity is required to disclose
protected health information to a consumer reporting agency, it may do
so under § 164.512(a). *See also* discussion under the definition of
"payment" below.
***Fair Debt Collection and Practices Act***
*Comment:* Several comments expressed concern that health plans and
health care providers be able to continue using debt collectors in
compliance with the Fair Debt Collections Practices Act and related
laws.
*Response:* In our view, health plans and health care providers will be
able to continue using debt collectors. Using the services of a debt
collector to obtain payment for the provision of health care comes
within the definition of "payment" and is permitted under the
regulation. Thus, so long as the use of debt collectors is consistent
with the regulatory requirements (such as, providers obtain the proper
consents, the disclosure is of the minimum amount of information
necessary to collect the debt, the provider or health plan enter into a
business associate agreement with the debt collector, etc.), relying
upon debt collectors to obtain reimbursement for the provision of health
care would not be prohibited by the regulation.
***Family Medical Leave Act***
*Comment:* One comment suggested that the proposed regulation adversely
affects the ability of an employer to determine an employee's
entitlement to leave under the Family Medical Leave Act ("FMLA") by
affecting the employer's right to receive medical certification of the
need for leave, additional certifications, and fitness for duty
certification at the end of the leave. The commenter sought
clarification as to whether a provider could disclose information to an
employer without first obtaining an individual's consent or
authorization. Another commenter suggested that the final rule
explicitly exclude from the rule disclosures authorized by the FMLA,
because, in the commenter's view, it provides more than adequate
protection for the confidentiality of medical records in the employment
context.
*Response:* We disagree that the FMLA provides adequate privacy
protections for individually identifiable health information. As we
understand the FMLA, the need for employers to obtain protected health
information under the statute is analogous to the employer's need for
protected health information under the ADA. In both situations,
employers may need protected health information to fulfill their
obligations under these statutes, but neither statute requires covered
entities to provide the information directly to the employer. Thus,
covered entities in these circumstances will need an individual's
authorizations before the disclosure is made to the employer.
***Federal Common Law***
*Comment:* One commenter did not want the privacy rules to interfere
with the federal common law governing collective bargaining agreements
permitting employers to insist on the cooperation of employees with
medical fitness evaluations.
*Response:* We do not seek to interfere with legal medical fitness
evaluations. These rules require a covered entity to have an
individual's authorization before the information resulting from such
evaluations is disclosed to the employer unless another provision of the
rule applies. We do not prohibit employers from conditioning employment,
accommodations, or other benefits, when legally permitted to do so, upon
the individual/employee providing an authorization that would permit the
disclosure of protected health information to employers by covered
entities. *See* § 164.508(b)(4) below.
***Federal Educational Rights and Privacy Act***
*Comment:* A few commenters supported the exclusion of "education
records" from the definition of "protected health information." However,
one commenter requested that "treatment records" of students who are 18
years or older attending post-secondary education institutions be
excluded from the definition of "protected health information" as well
to avoid confusion.
*Response:* We agree with these commenters. See "Relationship to Other
Federal Laws" for a description of our exclusion of FERPA "education
records" and records defined at 20 U.S.C. 1232g(a)(4)(B)(iv), commonly
referred to as "treatment records," from the definition of "protected
health information."
*Comment:* One comment suggested that the regulation should not apply to
any health information that is part of an "education record" in any
educational agency or institution, regardless of its FERPA status.
*Response:* We disagree. As noted in our discussion of "Relationship of
Other Federal Laws," we exclude education records from the definition of
protected health information because Congress expressly provided privacy
protections for these records and explained how these records should be
treated in FERPA.
*Comment:* One commenter suggested eliminating the preamble language
that describes school nurses and on-site clinics as acting as providers
and subject to the privacy regulation, noting that this language is
confusing and inconsistent with the statements provided in the preamble
explicitly stating that HIPAA does not preempt FERPA.
*Response:* We agree that this language may have been confusing. We have
provided a clearer expression of when schools may be required to comply
with the privacy regulation in the "Relationship to Other Federal Laws"
section of the preamble.
*Comment:* One commenter suggested adding a discussion of FERPA to the
"Relationship to Other Federal Laws" section of the preamble.
*Response:* We agree and have added FERPA to the list of federal laws
discussed in "Relationship to Other Federal Laws" section of the
preamble.
*Comment:* One commenter stated that school clinics should not have to
comply with the "ancillary" administrative requirements, such as
designating a privacy official, maintaining documentation of their
policies and procedures, and providing the Secretary of HHS with access.
*Response:* We disagree. Because we have excluded education records and
records described at 20 U.S.C. 1232g(a)(4)(B)(iv) held by educational
agencies and institutions subject to FERPA from the definition of
protected health information, only non-FERPA schools would be subject to
the administrative requirements. Most of these school clinics will also
not be covered entities because they are not engaged in HIPAA
transactions and these administrative requirements will not apply to
them. However, to the extent a school clinic is within the definition of
a health care provider, as Congress defined the term, and the school
clinic is engaged in HIPAA transactions, it will be a covered entity and
must comply with the rules below.
*Comment:* Several commenters expressed concern that the privacy
regulation would eliminate the parents' ability to have access to
information in their children's school health records. Because the
proposed regulation suggests that school-based clinics keep health
records separate from other educational files, these comments argued
that the regulation is contrary to the spirit of FERPA, which provides
parents with access rights to their children's educational files.
*Response:* As noted in the "Relationship to Other Federal Laws"
provision of the preamble, to the extent information in school-based
clinics is not protected health information because it is an education
record, the FERPA access requirements apply and this regulation does
not. For more detail regarding the rule's application to unemancipated
minors, see the preamble discussion about "Personal Represenatives."
***Federal Employees Compensation Act***
*Comment:* One comment noted that the Federal Employees Compensation Act
("FECA") requires claimants to sign a release form when they file a
claim. This commenter suggested that the privacy regulation should not
place additional restrictions on this type of release form.
*Response:* We agree. In the final rule, we have added a new provision,
§ 164.512(l), that permits covered entities to make disclosures
authorized under workers' compensation and similar laws. This provision
would permit covered entities to make disclosures authorized under FECA
and not require a different release form.
***Federal Employees Health Benefits Program***
*Comment:* A few comments expressed concern about the preemption effect
on FEHBP and wanted clarification that the privacy regulation does not
alter the existing preemptive scope of the program.
*Response:* We do not intend to affect the preemptive scope of the
FEHBP. The Federal Employee Health Benefit Act of 1998 preempts any
state law that "relates to" health insurance or plans. 5 U.S.C. 8902(m).
The final rule does not attempt to alter the preemptive scope Congress
has provided to the FEHBP.
*Comment:* One comment suggested that in the context of FEHBP HHS should
place the enforcement responsibilities of the privacy regulation with
Office of Personnel Management, as the agency responsible for
administering the program.
*Response:* We disagree. Congress placed enforcement with the Secretary.
*See* section 1176 of the Act.
***Federal Rules of Civil Procedure***
*Comment:* A few comments suggested revising proposed § 164.510(d) so
that it is consistent with the existing discovery procedure under the
Federal Rules of Civil Procedure or local rules.
*Response:* We disagree that the rules regarding disclosures and uses of
protected health information for judicial and administrative procedures
should provide only those protections that exist under existing
discovery rules. Although the current process may be appropriate for
other documents and information requested during the discovery process,
the current system, as exemplified by the Federal Rules of Civil
Procedure, does not provide sufficient protection for protected health
information. Under current discovery rules, private attorneys,
government officials, and others who develop such requests make the
initial determinations as to what information or documentation should be
disclosed. Independent third-party review, such as that by a court, only
becomes necessary if a person of whom the request is made refuses to
provide the information. If this happens, the person seeking discovery
must obtain a court order or move to compel discovery. In our view this
system does not provide sufficient protections to ensure that
unnecessary and unwarranted disclosures of protected health information
does not occur. For a related discuss, see the preamble regarding
"Disclosures for Judicial and Administrative Proceedings" under §
164.512(e).
***Federal Rules of Evidence***
*Comment:* Many comments requested clarification that the privacy
regulation does not conflict or interfere with the federal or state
privileges. In particular, one of these comments suggested that the
final regulation provide that disclosures for a purpose recognized by
the regulation not constitute a waiver of federal or state privileges.
*Response:* We do not intend for the privacy regulation to interfere
with federal or state rules of evidence that create privileges.
Consistent with The Uniform Health-Care Information Act drafted by the
National Conference of Commissioners on Uniform State Laws, we do not
view a consent or an authorization to function as a waiver of federal or
state privileges. For further discussion of the effect of consent or
authorization on federal or state privileges, see preamble discussions
in §§ 164.506 and 164.508.
*Comment:* Other comments applauded the Secretary's references to
*Jaffee v. Redman*, 518 U.S. 1 (1996), which recognized a
psychotherapist-patient privilege, and asked the Secretary to
incorporate expressly this privilege into the final regulation.
*Response:* We agree that the psychotherapist-patient relationship is an
important one that deserves protection. However, it is beyond the scope
our mandate to create specific evidentiary privileges. It is also
unnecessary because the United States Supreme Court has adopted this
privilege.
*Comment:* A few comments discussed whether one remedy for violating the
privacy regulation should be to exclude or suppress evidence obtained in
violation of the regulation. One comment supported using this penalty,
while another opposed it.
*Response:* We do not have the authority to mandate that courts apply or
not apply the exclusionary rule to evidence obtained in violation of the
regulation. This issue is in the purview of the courts.
***Federal Tort Claims Act***
*Comment:* One comment contended that the proposed regulation's
requirement mandating covered entities to name the subjects of protected
health information disclosed under a business partner contract as third
party intended beneficiaries under the contract would have created an
impermissible right of action against the government under the Federal
Tort Claims Act ("FTCA").
*Response:* Because we have deleted the third party beneficiary
provisions from the final rules, this comment is moot.
*Comment:* Another comment suggested the regulation would hamper the
ability of federal agencies to disclose protected health information to
their attorneys, the Department of Justice, during the initial stages of
the claims brought under the FTCA.
*Response:* We disagree. The regulation applies only to federal agencies
that are covered entities. To the extent an agency is not a covered
entity, it is not subject to the regulation; to the extent an agency is
a covered entity, it must comply with the regulation. A covered entity
that is a federal agency may disclose relevant information to its
attorneys, who are business associates, for purposes of health care
operations, which includes uses or disclosures for legal functions.
*See* § 164.501 (definitions of "business associate" and "health care
operations"). The final rule provides specific provisions describing how
federal agencies may provide adequate assurances for these types of
disclosures of protected health information. See § 164.504(e)(3).
***Food and Drug Administration***
*Comment:* A few comments expressed concerns about the use of protected
health information for reporting activities to the Food and Drug
Administration ("FDA"). Their concern focused on the ability to obtain
or disclose protected health information for pre- and post-marketing
adverse event reports, device tracking, and post-marketing safety and
efficacy evaluation.
*Response:* We agree with this comment and have provided that covered
entities may disclose protected health information to persons subject to
the jurisdiction of the FDA, to comply with the requirements of, or at
the direction of, the FDA with regard to reporting adverse events (or
similar reports with respect to dietary supplements), the tracking of
medical devices, other post-marketing surveillance, or other similar
requirements described at § 164.512(b).
***Foreign Standards***
*Comment:* One comment asked how the regulation could be enforced
against foreign countries (or presumably entities in foreign countries)
that solicit medical records from entities in the United States.
*Response:* We do not regulate solicitations of information. To the
extent a covered entity wants to comply with a request for disclosure of
protected health information to foreign countries or entities within
foreign countries, it will need to comply with the privacy rules before
making the disclosure. If the covered entity fails to comply with the
rules, it will be subject to enforcement proceedings.
***Freedom of Information Act***
*Comment:* One comment asserted that the proposed privacy regulation
conflicts with the Freedom of Information Act ("FOIA"). The comment
argued that the proposed restriction on disclosures by agencies would
not come within one of the permissible exemptions to the FOIA. In
addition, the comment noted that only in exceptional circumstances would
the protected health information of deceased individuals come within an
exemption because, for the most part, death extinguishes an individual's
right to privacy.
*Response:* Section 164.512(a) below permits covered entities to
disclose protected health information when such disclosures are required
by other laws as long as they follow the requirements of those laws.
Therefore, the privacy regulation will not interfere with the ability of
federal agencies to comply with FOIA, when it requires the disclosure.
We disagree, however, that most protected health information will not
come within Exemption 6 of FOIA. See the discussion above under
"Relationship to Other Federal Laws" for our review of FOIA. Moreover,
we disagree with the comment's assertion that the protected health
information of deceased individuals does not come within Exemption 6.
Courts have recognized that a deceased individual's surviving relatives
may have a privacy interest that federal agencies may consider when
balancing privacy interests against the public interest in disclosure of
the requested information. Federal agencies will need to consider not
only the privacy interests of the subject of the protected health
information in the record requested, but also, when appropriate, those
of a deceased individual's family consistent with judicial rulings.
If an agency receives a FOIA request for the disclosure of protected
health information of a deceased individual, it will need to determine
whether or not the disclosure comes within Exemption 6. This evaluation
must be consistent with the court's rulings in this area. If the
exemption applies, the federal agency will not have to release the
information. If the federal agency determines that the exemption does
not apply, may release it under § 164.512(a) of this regulation.
*Comment:* One commenter expressed concern that our proposal to protect
the individually identifiable health information about the deceased for
two years following death would impede public interest reporting and
would be at odds with many state Freedom of Information laws that make
death records and autopsy reports public information. The commenter
suggested permitting medical information to be available upon the death
of an individual or, at the very least, that an appeals process be
permitted so that health information trustees would be allowed to
balance the interests in privacy and in public disclosure and release or
not release the information accordingly.
*Response*: These rules permit covered entities to make disclosures that
are required by state Freedom of Information Act (FOIA) laws under
164.512(a). Thus, if a state FOIA law designates death records and
autopsy reports as public information that must be disclosed, a covered
entity may disclose it without an authorization under the rule. To the
extent that such information is required to be disclosed by FOIA or
other law, such disclosures are permitted under the final rule. In
addition, to the extent that death records and autopsy reports are
obtainable from non-covered entities, such as state legal authorities,
access to this information is not impeded by this rule.
If another law does not require the disclosure of death records and
autopsy reports generated and maintained by a covered entity, which are
protected health information, covered entities are not allowed to
disclose such information except as permitted or required by the final
rule, even if another entity discloses them.
*Comment:* One comment sought clarification of the relationship between
the Freedom of Information Act, the Privacy Act, and the privacy rules.
*Response:* We have provided this analysis in the "Relationship to Other
Federal Laws" section of the preamble in our discussion of the Freedom
of Information Act.
***Gramm-Leach-Bliley***
*Comments:* One commenter noted that the Financial Services
Modernization Act, also known as Gramm-Leach-Bliley ("GLB"), requires
financial institutions to provide detailed privacy notices to
individuals. The commenter suggested that the privacy regulation should
not require financial institutions to provide additional notice.
*Response:* We disagree. To the extent a covered entity is required to
comply with the notice requirements of GLB and those of our rules, the
covered entity must comply with both. We will work with the FTC and
other agencies implementing GLB to avoid unnecessary duplication. For a
more detailed discussion of GLB and the privacy rules, see the
"Relationship to Other Federal Laws" section of the preamble.
*Comment:* A few commenters asked that the Department clarify that
financial institutions, such as banks, that serve as payors are covered
entities. The comments explained that with the enactment of the
Gramm-Leach-Bliley Act, banks are able to form holding companies that
will include insurance companies (that may be covered entities). They
recommended that banks be held to the rule's requirements and be
required to obtain authorization to conduct non-payment activities, such
as for the marketing of health and non-health items and services or the
use and disclosure to non-health related divisions of the covered
entity.
*Response:* These comments did not provide specific facts that would
permit us to provide a substantive response. An organization will need
to determine whether it comes within the definition of "covered entity."
An organization may also need to consider whether or not it contains a
health care component. Organizations that are uncertain about the
application of the regulation to them will need to evaluate their
specific facts in light of this rule.
***Inspector General Act***
*Comment:* One comment requested the Secretary to clarify in the
preamble that the privacy regulation does not preempt the Inspector
General Act.
*Response:* We agree that to the extent the Inspector General Act
requires uses or disclosures of protected health information, the
privacy regulation does not preempt it. The final rule provides that to
the extent required under section 201(a)(5) of the Act, nothing in this
subchapter should be construed to diminish the authority of any
Inspector General, including the authority provided in the Inspector
General Act of 1978. See discussion of § 160.102 above.
***Medicare and Medicaid***
*Comment:* One comment suggested possible inconsistencies between the
regulation and Medicare/Medicaid requirements, such as those under the
Quality Improvement System for Managed Care. This commenter asked that
HHS expand the definition of health care operations to include health
promotion activities and avoid potential conflicts.
*Response:* We disagree that the privacy regulation would prohibit
managed care plans operating in the Medicare or Medicaid programs from
fulfilling their statutory obligations. To the extent a covered entity
is required by law to use or disclose protected health information in a
particular manner, the covered entity may make such a use or disclosure
under § 164.512(a). Additionally, quality assessment and improvement
activities come within the definition of "health care operations."
Therefore, the specific example provided by the commenter would seem to
be a permissible use or disclosure under § 164.502, even if it were not
a use or disclosure "required by law."
*Comment:* One commenter stated that Medicare should not be able to
require the disclosure of psychotherapy notes because it would destroy a
practitioner's ability to treat patients effectively.
*Response:* If the Title XVIII of the Social Security Act requires the
disclosure of psychotherapy notes, the final rule permits, but does not
require, a covered entity to make such a disclosure under § 164.512(a).
If, however, the Social Security Act does not require such disclosures,
Medicare does not have the discretion to require the disclosure of
psychotherapy notes as a public policy matter because the final rule
provides that covered entities, with limited exceptions, must obtain an
individual's authorization before disclosing psychotherapy notes. *See*
§ 164.508(a)(2).
***National Labor Relations Act***
*Comment:* A few comments expressed concern that the regulation did not
address the obligation of covered entities to disclose protected health
information to collective bargaining representatives under the National
Labor Relations Act.
*Response:* The final rule does not prohibit disclosures that covered
entities must make pursuant to other laws. To the extent a covered
entity is required by law to disclose protected health information to
collective bargaining representatives under the NLRA, it may to so
without an authorization. Also, the definition of "health care
operations" at § 164.501 permits disclosures to employee representatives
for purposes of grievance resolution.
***Organ Donation***
*Comment:* One commenter expressed concern about the potential impact of
the regulation on the organ donation program under 42 CFR Part 482.
*Response:* In the final rule, we add provisions allowing the use or
disclosure of protected health information to organ procurement
organizations or other entities engaged in the procurement, banking, or
transplantation of cadaveric organs, eyes, or tissue for the purpose of
facilitating donation and transplantation. See § 164.512(h).
***Privacy Act Comments***
*Comment:* One comment suggested that the final rule unambiguously
permit the continued operation of the statutorily established or
authorized discretionary routine uses permitted under the Privacy Act
for both law enforcement and health oversight.
*Response:* We disagree. See the discussion of the Privacy Act in
"Relationship to Other Federal Laws" above.
***Public Health Services Act***
*Comment:* One comment suggested that the Public Health Service Act
places more stringent rules regarding the disclosure of information on
Federally Qualified Health Centers than the proposed privacy regulation
suggested. Therefore, the commenter suggested that the final rule exempt
Federally Qualified Health Centers from the rules requirements
*Response:* We disagree. Congress expressly included Federally Qualified
Health Centers, a provider of medical or other health services under the
Social Security Act section 1861(s), within of its definition health
care provider in section 1171 of the Act; therefore, we cannot exclude
them from the regulation.
*Comment:* One commenter noted that no conflicts existed between the
proposed rule and the Public Health Services Act.
*Response:* As we discuss in the "Relationship to Other Federal Laws"
section of the preamble, the Public Health Service Act contains explicit
confidentiality requirements that are so general as not to create
problems of inconsistency. We recognized, however, that in some cases,
that law or its accompanying regulations may contain greater
restrictions. In those situations, a covered entity's ability to make
what are permissive disclosures under this privacy regulation would be
limited by those laws.
***Reporting Requirement***
*Comment:* One comment noted that federal agencies must provide
information to certain entities pursuant to various federal statutes.
For example, federal agencies must not withhold information from a
Congressional oversight committee or the General Accounting Office.
Similarly, some federal agencies must provide the Bureau of the Census
and the National Archives and Records Administration with certain
information. This comment expressed concern that the privacy regulation
would conflict with these requirements. Additionally, the commenter
asked whether the privacy notice would need to contain these uses and
disclosures and recommended that a general statement that these federal
agencies would disclose protected health information when required by
law be considered sufficient to meet the privacy notice requirements.
*Response:* To the extent a federal agency acting as a covered entity is
required by federal statute to disclose protected health information,
the regulation permits the disclosure as required by law under §
164.512(a). The notice provisions at § 164.520(b)(1)(ii)(B) require
covered entities to provide a brief description of the purposes for
which the covered entity is permitted or required by the rules to use or
disclose protected health information without an individual's written
authorization. If these statutes require the disclosures, covered
entities subject to the requirement may make the disclosure pursuant to
§ 164.512(a). Thus, their notice must include a description of the
category of these disclosures. For example, a general statement such as
the covered entity "will disclose your protected health information to
comply with legal requirements" should suffice.
*Comment:* One comment stressed that the final rule should not
inadvertently preempt mandatory reporting laws duly enacted by federal,
state, or local legislative bodies. This commenter also suggested that
the final rule not prevent the reporting of violations to law
enforcement agencies.
*Response:* We agree. Like the proposed rule, the final rule permits
covered entities to disclose protected health information when required
by law under § 164.512(a). To the extent a covered entity is required by
law to make a report to law enforcement agencies or is otherwise
permitted to make a disclosure to a law enforcement agency as described
in § 164.512(f), it may do so without an authorization. Alternatively, a
covered entity may always request that individuals authorize these
disclosures.
***Security Standards***
*Comment:* One comment called for HHS to consider the privacy regulation
in conjunction with the other HIPAA standards. In particular, this
comment focused on the belief that the security standards should be
compatible with the existing and emerging health care and information
technology industry standards.
*Response:* We agree that the security standards and the privacy rules
should be compatible with one another and are working to ensure that the
final rules in both areas function together. Because we are addressing
comments regarding the privacy rules in this preamble, we will consider
the comment about the security standard as we finalize that set of
rules.
***Substance Abuse Confidentiality Statute and Regulations***
*Comment:* Several commenters noted that many health care providers are
bound by the federal restrictions governing alcohol and drug abuse
records. One commenter noted that the NPRM differed substantially from
the substance abuse regulations and would have caused a host of
practical problems for covered entities. Another commenter, however,
supported the NPRM's analysis that stated that more stringent provisions
of the substance abuse provisions would apply. This commenter suggested
an even stronger approach of including in the text a provision that
would preserve existing federal law. Yet, one comment suggested that the
regulation as proposed would confuse providers by making it difficult to
determine when they may disclose information to law enforcement because
the privacy regulation would permit disclosures that the substance abuse
regulations would not.
*Response:* We appreciate the need of some covered entities to evaluate
the privacy rules in light of federal requirements regarding alcohol and
drug abuse records. Therefore, we provide a more detailed analysis in
the "Relationship to Other Federal Laws" section of the preamble.
*Comment:* Some of these commenters also noted that state laws contain
strict confidentiality requirements. A few commenters suggested that HHS
reassess the regulations to avoid inconsistencies with state privacy
requirements, implying that problems exist because of conflicts between
the federal and state laws regarding the confidentiality of substance
abuse information.
*Response:* As noted in the preamble section discussing preemption, the
final rules do not preempt state laws that provide more privacy
protections. For a more detailed analysis of the relationship between
state law and the privacy rules, see the "Preemption" provisions of the
preamble.
***Tribal Law***
*Comments*: One commenter suggested that the consultation process with
tribal governments described in the NPRM was inadequate under Executive
Order No. 13084. In addition, the commenter expressed concern that the
disclosures for research purposes as permitted by the NPRM would
conflict with a number of tribal laws that offer individuals greater
privacy rights with respect to research and reflects cultural
appropriateness. In particular, the commenter referenced the Health
Research Code for the Navajo Nation which creates a entity with broader
authority over research conducted on the Navajo Nation than the local
IRB and requires informed consent by study participants. Other laws
mentioned by the commenter included the Navajo Nation Privacy and Access
to Information Act and a similar policy applicable to all health care
providers within the Navajo Nation. The commenter expressed concern that
the proposed regulation research provisions would override these tribal
laws.
*Response*: We disagree with the comment that the consultation with
tribal governments undertaken prior to the proposed regulation is
inadequate under Executive Order No. 13084. As stated in the proposed
regulation, the Department consulted with representatives of the
National Congress of American Indians and the National Indian Health
Board, as well as others, about the proposals and the application of
HIPAA to the Tribes, and the potential variations based on the
relationship of each Tribe with the IHS for the purpose of providing
health services. In addition, Indian and tribal governments had the
opportunity to, and did, submit substantive comments on the proposed
rules.
Additionally, disclosures permitted by this regulation do not conflict
with the policies as described by this commenter. Disclosures for
research purposes under the final rule, as in the proposed regulation,
are permissive disclosures only. The rule describes the outer boundaries
of permissible disclosures. A covered health care provider that is
subject to the tribal laws of the Navajo Nation must continue to comply
with those tribal laws. If the tribal laws impose more stringent privacy
standards on disclosures for research, such as requiring informed
consent in all cases, nothing in the final rule would preclude
compliance with those more stringent privacy standards. The final rule
does not interfere with the internal governance of the Navajo Nation or
otherwise adversely affect the policy choices of the tribal government
with respect to the cultural appropriateness of research conducted in
the Navajo Nation.
***TRICARE***
*Comment:* One comment expressed concern regarding the application of
the "minimum necessary" standard to investigations of health care
providers under the TRICARE (formerly the CHAMPUS) program. The comment
also expressed concern that health care providers would be able to avoid
providing their records to such investigators because the proposed §
164.510 exceptions were not mandatory disclosures.
*Response:* In our view, neither the minimum necessary standard nor the
final §§ 164.510 and 164.512 permissive disclosures will impede such
investigations. The regulation requires covered entities to make all
reasonable efforts not to disclose more than the minimum amount of
protected health information necessary to accomplish the intended
purpose of the use or disclosure. This requirement, however, does not
apply to uses or disclosures that are required by law. *See* §
164.502(b)(2)(iv). Thus, if the disclosure to the investigators is
required by law, the minimum necessary standard will not apply.
Additionally, the final rule provides that covered entities rely, if
such reliance is reasonable, on assertions from public officials about
what information is reasonably necessary for the purpose for which it is
being sought. See § 164.514(d)(3)(iii).
We disagree with the assertion that providers will be able to avoid
providing their records to investigators. Nothing in this rule permits
covered entities to avoid disclosures required by other laws.
***Veterans Affairs***
*Comment:* One comment sought clarification about how disclosures of
protected health information would occur within the Veterans Affairs
programs for veterans and their dependents. *Response:* We appreciate
the commenter's request for clarification as to how the rules will
affect disclosures of protected health information in the specific
context of Veteran's Affairs programs. Veterans health care programs
under 38 U.S.C. chapter 17 are defined as "health plans." Without
sufficient details as to the particular aspects of the Veterans Affairs
programs that this comment views as problematic, we cannot comment
substantively on this concern.
*Comment:* One comment suggested that the final regulation clarify that
the analysis applied to the substance abuse regulations apply to laws
governing Veteran's Affairs health records.
*Response:* Although we realize some difference may exist between the
laws, we believe the discussion of federal substance abuse
confidentiality regulations in the "Relationship to Other Federal Laws"
preamble provides guidance that may be applied to the laws governing
Veteran's Affairs ("VA") health records. In most cases, a conflict will
not exist between these privacy rules and the VA programs. For example,
some disclosures allowed without patient consent or authorization under
the privacy regulation may not be within the VA statutory list of
permissible disclosures without a written consent. In such
circumstances, the covered entity would have to abide by the VA statute,
and no conflict exists. If the disclosures permitted by the VA statute
come within the permissible disclosures of our rules, no conflict
exists. In some cases, our rules may demand additional requirements,
such as obtaining the approval of a privacy board or Institutional
Review Board if a covered entity seeks to disclose protected health
information for research purposes without the individual's
authorization. A covered entity subject to the VA statute will need to
ensure that it meets the requirements of both that statute and the
regulation below. If a conflict arises, the covered entity should
evaluate the specific potential conflicting provisions under the implied
repeal analysis set forth in the "Relationship to Other Federal Laws"
discussion in the preamble.
***WIC***
*Comment:* One comment called on other federal agencies to examine their
regulations and policies regarding the use and disclosure of protected
health information. The comment suggested that other agencies revise
their regulations and policies to avoid duplicative, contradictory, or
more stringent requirements. The comment noted that the U.S. Department
of Agriculture's Special Supplemental Nutrition Program for Women,
Infants, and Children ("WIC") does not release WIC data. Because the
commenter believed the regulation would not prohibit the disclosure of
WIC data, the comment stated that the Department of Agriculture should
now release such information.
*Response:* We support other federal agencies to whom the rules apply in
their efforts to review existing regulations and policies regarding
protected health information. However, we do not agree with the
suggestion that other federal agencies that are not covered entities
must reduce the protections or access-related rights they provide for
individually identifiable health information they hold.
**PART 160, SUBPART C - COMPLIANCE AND ENFORCEMENT**
**Section 160.306(a) -- Who Can File Complaints with the Secretary**
*Comment:* The proposed rule limited those who could file a complaint
with the Secretary to individuals. A number of commenters suggested that
other persons with knowledge of a possible violation should also be able
to file complaints. Examples that were provided included a mental health
care provider with first hand knowledge of a health plan improperly
requiring disclosure of psychotherapy notes and an occupational health
nurse with knowledge that her human resources manager is improperly
reviewing medical records. A few comments raised the concern that
permitting any person to file a complaint lends itself to abuse and is
not necessary to ensure privacy rights and that the complainant should
be a person for whom there is a duty to protect health information.
*Response:* As discussed below, the rule defines "individual" as the
person who is the subject of the individually identifiable health
information. However, the covered entity may allow other persons, such
as personal representatives, to exercise the rights of the individual
under certain circumstances, e.g., for a deceased individual. We agree
with the commenters that any person may become aware of conduct by a
covered entity that is in violation of the rule. Such persons could
include the covered entity's employees, business associates, patients,
or accrediting, health oversight, or advocacy agencies or organizations.
Many persons, such as the covered entity's employees, may, in fact, be
in a better position than the "individual" to know that a violation has
occurred. Another example is a state Protection and Advocacy group that
may represent persons with developmental disabilities. We have decided
to allow complaints from any person. The term "person" is not restricted
here to human beings or natural persons, but also includes any type of
association, group, or organization.
Allowing such persons to file complaints may be the only way the
Secretary may learn of certain possible violations. Moreover,
individuals who are the subject of the information may not be willing to
file a complaint because of fear of embarrassment or retaliation. Based
on our experience with various civil rights laws, such as Title VI of
the Civil Rights Act of 1964 and Title II of the Americans with
Disabilities Act, that allow any person to file a complaint with the
Secretary, we do not believe that this practice will result in abuse.
Finally, upholding privacy protections benefits all persons who have or
may be served by the covered entity as well as the general public, and
not only the subject of the information.
If a complaint is received from someone who is not the subject of
protected health information, the person who is the subject of this
information may be concerned with the Secretary's investigation of this
complaint. While we did not receive comments on this issue, we want to
protect the privacy rights of this individual. This might involve the
Secretary seeking to contact the individual to provide information as to
how the Secretary will address individual's privacy concerns while
resolving the complaint. Contacting all individuals may not be
practicable in the case of allegations of systemic violations (e.g.,
where the allegation is that hundreds of medical records were wrongfully
disclosed).
***Requiring That a Complainant Exhaust the Covered Entity's Internal
Complaint Process Prior to Filing a Complaint with the Secretary***
*Comment:* A number of commenters, primarily health plans, suggested
that individuals should not be permitted to file a complaint with the
Secretary until they exhaust the covered entity's own complaint process.
Commenters stated that covered entities should have a certain period of
time, such as ninety days, to correct the violation. Some commenters
asserted that providing for filing a complaint with the Secretary will
be very expensive for both the public and private sectors of the health
care industry to implement. Other commenters suggested requiring the
Secretary to inform the covered entity of any complaint it has received
and not initiate an investigation or "take enforcement action" before
the covered entity has time to address the complaint.
*Response:* We have decided, for a number of reasons, to retain the
approach as presented in the proposed rule. First, we are concerned that
requiring that complainants first notify the covered entity would have a
chilling effect on complaints. In the course of investigating individual
complaints, the Secretary will often need to reveal the identity of the
complainant to the covered entity. However, in the investigation of
cases of systemic violations and some individual violations, individual
names may not need to be identified. Under the approach suggested by
these commenters, the covered entity would learn the names of all
persons who file complaints with the Secretary. Some individuals might
feel uncomfortable or fear embarrassment or retaliation revealing their
identity to the covered entity they believe has violated the regulation.
Individuals may also feel they are being forced to enter into
negotiations with this entity before they can file a complaint with the
Secretary.
Second, because some potential complainants would not bring complaints
to the covered entity, possible violations might not become known to the
Secretary and might continue. Third, the delay in the complaint coming
to the attention of the Secretary because of the time allowed for the
covered entity to resolve the complaint may mean that significant
violations are not addressed expeditiously. Finally, the process
proposed by these commenters is arguably unnecessary because an
individual who believes that an agreement can be reached with the
covered entity, can, through the entity's internal complaint process or
other means, seek resolution before filing a complaint with the
Secretary.
Our approach is consistent with other laws and regulations protecting
individual rights. None of the civil rights laws enforced by the
Secretary require a complainant to provide any notification to the
entity that is alleged to have engaged in discrimination (e.g.,
Americans with Disabilities Act, section 504 of the Rehabilitation Act,
Title VI of the Civil Rights Act, and the Age Discrimination Act). The
concept of "exhaustion" is used in laws that require individuals to
pursue administrative remedies, such as that provided by a governmental
agency, before bringing a court action. Under HIPAA, individuals do not
have a right to court action.
Some commenters seemed to believe that the Secretary would pursue
enforcement action without notifying the covered entity. It has been the
Secretary's practice in investigating cases under other laws, such as
various civil rights laws, to inform entities that we have received a
complaint against them and to seek early resolution if possible. In
enforcing the privacy rule, the Secretary will generally inform the
covered entity of the nature of any complaints it has received against
the entity. (There may be situations where information is withheld to
protect the privacy interests of the complainant or others or where
revealing information would impede the investigation of the covered
entity.) The Secretary will also generally afford the entity an
opportunity to share information with the Secretary that may result in
an early resolution. Our approach will be to seek informal resolution of
complaints whenever possible, which includes allowing covered entities a
reasonable amount of time to work with the Secretary to come into
compliance before initiating action to seek civil monetary penalties.
**Section 160.306(b)(3) - Requiring that Complaints be Filed with the
Secretary Within a Certain Period of Time**
*Comment:* A number of commenters, primarily privacy and disability
advocacy organizations, suggested that the regulation require that
complaints be filed with the Secretary by a certain time. These
commenters generally recommended that the time period for filing a
complaint should commence to run from the time when the individual knew
or had reason to know of the violation or omission. Another comment
suggested that a requirement to file a complaint with the Secretary
within 180 days of the alleged noncompliance is a problem because a
patient may, because of his or her medical condition, be unable to
access his or her records within that time frame.
*Response:* We agree with the commenters that complainants should
generally be required to submit complaints in a timely fashion. Federal
regulations implementing Title VI of the Civil Rights Act of 1964
provide that "\[a\] complaint must be filed not later than '180 days
from the date of the alleged discrimination' unless the time for filing
is extended by the responsible Department official or his designee." 45
CFR 80.7(b). Other civil rights laws, such as the Age Discrimination
Act, section 504 of the Rehabilitation Act, and Title II of the
Americans with Disabilities Act (ADA) (state and local government
services), also use this approach. Under civil rights laws administered
by the EEOC, individuals have 180 days of the alleged discriminatory act
to file a charge with EEOC (or 300 days if there is a state or local
fair employment practices agency involved).
Therefore, in the final rule we require that complaints be filed within
180 days of when the complainant knew or should have known that the act
or omission complained of occurred unless this time limit is waived by
the Secretary for good cause shown. We believe that an investigation of
a complaint is likely to be most effective if persons can be interviewed
and documents reviewed as close to the time of the alleged violation as
possible. Requiring that complaints generally be filed within a certain
period of time increases the likelihood that the Secretary will have
necessary and reliable information. Moreover, we are taking this
approach in order to encourage complainants to file complaints as soon
as possible. By receiving complaints in a timely fashion, we can, if
such complaints prove valid, reduce the harm caused by the violation.
**Section 160.308 -- Basis for Conducting Compliance Reviews**
*Comment:* A number of comments expressed concern that the Secretary
would conduct compliance reviews without having received a complaint or
having reason to believe there is noncompliance. A number of these
commenters appeared to believe that the Secretary would engage in
"routine visits." Some commenters suggested that the Secretary should
only be able to conduct compliance reviews if the Secretary has
initiated an investigation of a complaint regarding the covered entity
in the preceding twelve months. Some commenters suggested that there
should only be compliance reviews based on established criteria for
reviews (e.g., finding of "reckless disregard"). Many of these
commenters stated that cooperating with compliance reviews is
potentially burdensome and expensive.
One commenter asked whether the Secretary will have a process for
reviewing all covered entities to determine how they are complying with
requirements. This commenter questioned whether covered entities will be
required to submit plans and wait for Departmental approval.
Another commenter suggested that the Secretary specify a time limit for
the completion of a compliance review.
*Response:* We disagree with the commenters that the final rule should
restrict the Secretary's ability to conduct compliance reviews. The
Secretary needs to maintain the flexibility to conduct whatever reviews
are necessary to ensure compliance with the rule.
**Section 160.310(a) and (c) - The Secretary's Access to Information in
Determining Compliance**
*Comment:* Some commenters raised objections to provisions in the
proposed rule which required that covered entities maintain records and
submit compliance reports as the Secretary determines is necessary to
determine compliance and required that covered entities permit access by
the Secretary during normal business hours to its books, records,
accounts, and other sources of information, including protected health
information, and its facilities, that are pertinent to ascertaining
compliance with this subpart. One commenter stated that the Secretary's
access to private health information without appropriate patient consent
is contrary to the intent of HIPAA. Another commenter expressed the view
that, because covered entities face criminal penalties for violations,
these provisions violate the Fifth Amendment protections against forced
self incrimination. Other commenters stated that covered entities should
be given the reason the Secretary needs to have access to its books and
records. Another commenter stated that there should be a limit to the
frequency or extent of intrusion by the federal government into the
business practices of a covered entity and that these provisions violate
the Fourth Amendment of the Constitution.
Finally, a coalition of church plans suggested that the Secretary
provide church plans with additional procedural safeguards to reduce
unnecessary intrusion into internal church operations. These suggested
safeguards included permitting HHS to obtain records and other documents
only if they are relevant and necessary to compliance and enforcement
activities related to church plans, requiring a senior official to
determine the appropriateness of compliance-related activities for
church plans, and providing church plans with a self-correcting period
similar to that Congress expressly provided in Title I of HIPAA under
the tax code.
*Response:* The final rule retains the proposed language in these two
provisions with one change. The rule adds a provision indicating that
the Secretary's access to information held by the covered entity may be
at any time and without notice where exigent circumstances exist, such
as where time is of the essence because documents might be hidden or
destroyed. Thus, covered entities will generally receive notice before
the Secretary seeks to access the entity's books or records.
Other than the exigent circumstances language, the language in these two
provisions is virtually the same as the language in this Department's
regulation implementing Title VI of the Civil Rights Act of 1964. 45 CFR
80.6(b) and (c). The Title VI regulation is incorporated by reference in
other Department regulations prohibiting discrimination of the basis of
disability. 45 CFR 84.61. Similar provisions allowing this Department
access to recipient information is found in the Secretary's regulation
implementing the Age Discrimination Act. 45 CFR 91.34. These provisions
have not proved to be burdensome to entities that are subject to these
civil rights regulations (i.e., all recipients of Department funds).
We do not interpret Constitutional case law as supporting the view that
a federal agency's review of information pursuant to statutory mandate
violates the Fifth Amendment protections against forced self
incrimination. Nor would such a review of this information raise Fourth
Amendment problems. See discussion above regarding Constitutional
comments and responses.
We appreciate the concern that the Secretary not involve herself
unnecessarily into the internal operations of church plans. However, by
providing health insurance or care to their employees, church plans are
engaging in a secular activity. Under the regulation, church plans are
subject to the same compliance and enforcement requirements with which
other covered entities must comply. Because Congress did not carve out
specific exceptions or require stricter standards for investigations
related to church plans, incorporating such measures into the regulation
would be inappropriate.
Additionally, there is no indication that the regulation will directly
interfere with the religious practices of church plans. Also, the
regulation as written appropriately limits the ability of investigators
to obtain information from covered entities. The regulation provides
that the Secretary may obtain access only to information that is
pertinent to ascertain compliance with the regulation. We do not
anticipate asking for information that is not necessary to assess
compliance with the regulation. The purpose of obtaining records and
similar materials is to determine compliance, not to engage in any sort
of review or evaluation of religious activities or beliefs. Therefore,
we believe the regulation appropriately balances the need to access
information to determine compliance with the desire of covered entities
to avoid opening every record in their possession to the government.
***Provision of Technical Assistance***
*Comment:* A number of commenters inquired as to how a covered entity
can request technical assistance from the Secretary to come into
compliance. A number of commenters suggested that the Secretary provide
interpretive guidance to assist with compliance. Others recommended that
the Secretary have a contact person or privacy official, available by
telephone or email, to provide guidance on the appropriateness of a
disclosure or a denial of access. One commenter suggested that there be
a formal process for a covered entity to submit compliance activities to
the Secretary for prior approval and clarification. This commenter
suggested that clarifications be published on a contemporaneous basis in
the Federal Register to help correct any ambiguities and confusion in
implementation. It was also suggested that the Secretary undertake an
assessment of "best practices" of covered entities and document and
promote the findings to serve as a convenient "road map" for other
covered entities. Another commenter suggested that we work with
providers to create implementation guidelines modeled after the
interpretative guidelines that HCFA creates for surveyors on the
conditions of participation for Medicare and Medicaid contractors.
*Response:* While we have not in the final rule committed the Secretary
to any specific model of providing guidance or assistance, we do state
our intent, subject to budget and staffing constraints, to develop a
technical assistance program that will include the provision of written
material when appropriate to assist covered entities in achieving
compliance. We will consider other models including HCFA's Medicare and
Medicaid interpretative guidelines. Further information regarding the
Secretary's technical assistance program may be provided in the Federal
Register and on the HHS Office for Civil Rights (OCR) Web Site. While
OCR plans to have fully trained staff available to respond to questions,
its ability to provide individualized advice in regard to such matters
as the appropriateness of a particular disclosure or the sufficiency of
compliance activities will be based on staff resources and demands. The
idea of looking at "best practices" and sharing information with all
covered entities is a good one and we will explore how best to do this.
We note that a covered entity is not excused from compliance with the
regulation because of any failure to receive technical assistance or
guidance.
***Basis for Violation Findings and Enforcement***
*Comment:* A number of commenters asked that covered entities not be
liable for violations of the rule if they have acted in good faith. One
commenter indicated that enforcement actions should not be pursued
against covered entities that make legitimate business decisions about
how to comply with the privacy standards.
*Response:* The commenters seemed to argue that even if a covered entity
does not comply with a requirement of the rule, the covered entity
should not be liable if there was an honest and sincere intention or
attempt to fulfill its obligations. The final rule, however, does not
take this approach but instead draws careful distinctions between what a
covered entity must do unconditionally, and what a covered entity must
make certain reasonable efforts to do. In addition, the final rule is
clear as to the specific provisions where "good faith" is a
consideration. For example, a covered entity is permitted to use and
disclose protected health information without authorization based on
criteria that includes a good faith belief that such use or disclosure
is necessary to avert an imminent threat to health or safety (§
164.512(j)(1)(i)). Therefore, covered entities need to pay careful
attention to the specific language in each requirement. However, we note
that many of these provisions can be implemented in a variety of ways;
e.g, covered entities can exercise business judgement regarding how to
conduct staff training.
As to enforcement, a covered entity will not necessarily suffer a
penalty solely because an act or omission violates the rule. As we
discuss elsewhere, the Department will exercise discretion to consider
not only the harm done, but the willingness of the covered entity to
achieve voluntary compliance. Further, the Administrative Simplification
provisions of HIPAA provide that whether a violation was known or not is
relevant in determining whether civil or criminal penalties apply. In
addition, if a civil penalty applies, HIPAA allows the Secretary, where
the failure to comply was due to reasonable cause and not to willful
neglect, to delay the imposition of the penalty to allow the covered
entity to comply. The Department will develop and release for public
comment an enforcement regulation applicable to all the administrative
simplification regulations that will address these issues.
*Comment:* One commenter asked whether hospitals will be vicariously
liable for the violations of their employees and expressed concern that
hospitals and other providers will be the ones paying large fines.
*Response:* The enforcement regulation will address this issue. However,
we note that section 1128A(1) of the Social Security Act, which applies
to the imposition of civil monetary penalties under HIPAA, provides that
a principal is liable for penalties for the actions of its agent acting
within the scope of the agency. Therefore, a covered entity will
generally be responsible for the actions of its employees such as where
the employee discloses protected health information in violation of the
regulation.
*Comment:* A commenter expressed the concern that if a covered entity
acquires a non-compliant health plan, it would be liable for financial
penalties. This commenter suggested that, at a minimum, the covered
entity be given a grace period of at least a year, but not less than six
months to bring any acquisition up to standard. The commenter stated
that the Secretary should encourage, not discourage, compliant companies
to acquire non-compliant ones. Another commenter expressed a general
concern about resolution of enforcement if an entity faced with a HIPAA
complaint acquires or merges with an entity not covered by HIPAA.
*Response:* As discussed above, the Secretary will encourage voluntary
efforts to cure violations of the rule, and will consider that fact in
determining whether to bring a compliance action. We do not agree,
however, that we should limit our authority to pursue violations of the
rule if the situation warrants it.
*Comment:* One commenter was concerned about the "undue risk" of
liability on originators of information, stemming from the fact that
"the number of covered entities is limited and they are unable to
restrict how a recipient of information may use or re-disclose
information\..."
*Response:* Under this rule, we do not hold covered entities responsible
for the actions of recipients of protected health information, unless
the recipient is a business associate of the covered entity. We agree
that it is not fair to hold covered entities responsible for the actions
of persons with whom they have no on-going relationship, but believe it
is fair to expect covered entities to hold their business associates to
appropriate standards of behavior with respect to health information.
***Other Compliance and Enforcement Comments***
*Comment:* A number of comments raised questions regarding the
Secretary's priorities for enforcement. A few commenters stated that
they supported deferring enforcement until there is experience using the
proposed standards. One organization asked that we clarify that the
regulation does not replace or otherwise modify the
self-regulatory/consumer empowerment approach to consumer privacy in the
online environment.
*Response:* We have not made any decisions regarding enforcement
priorities. It appears that some commenters believe that no enforcement
action will be taken against a given covered entity until that entity
has had some time to comply. Covered entities have two years to come
into compliance with the regulation (three years in the case of small
health plans). Some covered entities will have had experience using the
standards prior to the compliance date. We do not agree that we should
defer enforcement where violations of the rule occur. It would be wrong
for covered entities to believe that enforcement action is based on
their not having much experience in using a particular standard or
meeting another requirement.
We support a self-regulation approach in that we recognize that most
compliance will be achieved by the voluntary activities of covered
entities rather than by our enforcement activities. Our emphasis will be
on education, technical assistance, and voluntary compliance and not on
finding violations and imposing penalties. We also support a consumer
empowerment approach. A knowledgeable consumer is key to the
effectiveness of this rule. A consumer familiar with the requirements of
this rule will be equipped to make choices regarding which covered
entity will best serve their privacy interests and will know their
rights under the rule and how they can seek redress for violations of
this rule. Privacy-minded consumers will seek to protect the privacy
rights of others by bringing concerns to the attention of covered
entities, the public, and the Secretary. However, we do not agree that
we should defer enforcement where violations of the rule occur.
*Comment:* One commenter expressed concern that by filing a complaint an
individual would be required to reveal sensitive information to the
public. Another commenter suggested that complaints regarding
noncompliance in regard to psychotherapy notes should be made to a panel
of mental health professionals designated by the Secretary. This
commenter also proposed that all patient information be maintained as
privileged, not be revealed to the public, and be kept under seal after
the case is reviewed and closed.
*Response:* We appreciate this concern and will seek to ensure that
individually identifiable health information and other personal
information contained in complaints will not be available to the public.
The privacy regulation provides, at § 160.310(c)(3), that protected
health information obtained by the Secretary in connection with an
investigation or compliance review will not be disclosed except if
necessary for ascertaining or enforcing compliance with the regulation
or if required by law. In addition, this Department generally seeks to
protect the privacy of individuals to the fullest extent possible, while
permitting the exchange of records required to fulfill its
administrative and program responsibilities. The Freedom of Information
Act, 5 U.S.C. 552, and the HHS implementing regulation, 45 CFR Part 5,
provide substantial protection for records about individuals where
disclosure would constitute an unwarranted invasion of their personal
privacy. In implementing the privacy regulation, OCR plans to continue
its current practice of protecting its complaint files from disclosure.
OCR treats these files as investigatory records compiled for law
enforcement purposes. Moreover, OCR maintains that disclosing protected
health information in these files generally constitutes an unwarranted
invasion of personal privacy.
It is not clear in regarding the use of mental health professionals,
whether the commenter believes that such professionals should be
involved because they would be best able to keep psychotherapy notes
confidential or because such professionals can best understand the
meaning or relevance of such notes. OCR anticipates that it will not
have to obtain a copy or review psychotherapy notes in investigating
most complaints regarding noncompliance in regard to such notes. There
may be some cases where a review of the notes may be needed such as
where we need to identify that the information a covered entity
disclosed was in fact psychotherapy notes. If we need to obtain a copy
of psychotherapy notes, we will keep these notes confidential and
secure. OCR investigative staff will be trained to ensure that they
fully respect the confidentiality of personal information. In addition,
while the specific contents of these notes is generally not relevant to
violations under this rule, if such notes are relevant, we will secure
the expertise of mental health professionals if needed in reviewing
psychotherapy notes.
*Comment:* A member of Congress and a number of privacy and consumer
groups expressed concern with whether OCR has adequate funding to carry
out the major responsibility of enforcing the complaint process
established by this rule. The Senator stated that \"\[d\]ue to the
limited enforcement ability allowed for in this rule by HIPAA, it is
essential that OCR have the capacity to enforce the regulations. Now is
the time for OCR to begin building the necessary infrastructure to
enforce the regulation effectively.\"
*Response*: We agree and are committed to an effective enforcement
program. We are working with Congress to ensure that the Secretary has
the necessary funds to secure voluntary compliance through education and
technical assistance, to investigate complaints and conduct compliance
reviews, to provide states with exception determinations, and to use
civil and criminal penalties when necessary. We will continue to work
with Congress and within the new Administration in this regard.
***Coordination with Reviewing Authorities***
*Comment:* A number of commenters referenced other entities that already
consider the privacy of health information. One commenter indicated
opposition to the delegation of inspections to third party
organizations, such as the Joint Commission on the Accreditation of
Healthcare Organizations (JCAHO). A few commenters indicated that state
agencies are already authorized to investigate violations of state
privacy standards and that we should rely on those agencies to
investigate alleged violations of the privacy rules or delegate its
complaint process to states that wish to carry out this responsibility
or to those states that have a complaint process in place. Another
commenter argued that individuals should be required to exhaust any
state processes before filing a complaint with the Secretary. Others
referenced the fact that state medical licensing boards investigate
complaints against physicians for violating patient confidentiality. One
group asked that the federal government streamline all of these
activities so physicians can have a single entity to whom they must be
responsive. Another group suggested that OMB should be given
responsibility for ensuring that FEHB Plans operate in compliance with
the privacy standards and for enforcement.
A few commenters stated that the regulation might be used as a basis for
violation findings and subsequent penalties under other Department
authorities, such as under Medicare's Conditions of Participation
related to patient privacy and right to confidentiality of medical
records. One commenter wanted some assurance that this regulation will
not be used as grounds for sanctions under Medicare. Another commenter
indicated support for making compliance with the privacy regulation a
Condition of Participation under Medicare.
*Response:* HIPAA does not give the Secretary the authority to delegate
her responsibilities to other private or public agencies such as JCAHO
or state agencies. However, we plan to explore ways that we may benefit
from current activities that also serve to protect the privacy of
individually identifiable health information. For example, if we conduct
an investigation or review of a covered entity, that entity may want to
share information regarding findings of other bodies that conducted
similar reviews. We would welcome such information. In developing its
enforcement program, we may explore ways it can coordinate with other
regulatory or oversight bodies so that we can efficiently and
effectively pursue our joint interests in protecting privacy.
We do not accept the suggestion that individuals be required to exhaust
their remedies under state law before filing a complaint with the
Secretary. Our rationale is similar to that discussed above in regard to
the suggestion that covered entities be required to exhaust a covered
entity's internal complaint process before filing a complaint with the
Secretary. Congress provided for federal privacy protection and we want
to allow individuals the right to this protection without barriers or
delay. Covered entities may in their privacy notice inform individuals
of any rights they have under state law including any right to file
privacy complaints. We do not have the authority to interfere with state
processes and HIPAA explicitly provides that we cannot preempt state
laws that provide greater privacy protection.
We have not yet addressed the issue as to whether this regulation might
be used as a basis for violation findings or penalties under other
Department authorities. We note that Medicare conditions of
participation require participating providers to have procedures for
ensuring the confidentiality of patient records, as well as afford
patients with the right to the confidentiality of their clinical
records.
***Penalties***
*Comment:* Many commenters considered the statutory penalties
insufficient to protect privacy, stating that the civil penalties are
too weak to have the impact needed to reduce the risk of inappropriate
disclosure. Some commenters took the opposing view and stated that large
fines and prison sentences for violations would discourage physicians
from transmitting any sort of health care information to any other
agency, regardless of the medical necessity. Another comment expressed
the concern that doctors will be at risk of going to jail for protecting
the privacy of individuals (by not disclosing information the government
believes should be released).
*Response:* The enforcement regulation will address the application of
the civil monetary and criminal penalties under HIPAA. The regulation
will be published in the Federal Register as a proposed regulation and
the public will have an opportunity to comment. We do not believe that
our rule, and the penalties available under it, will discourage
physicians and other providers from using or disclosing necessary
information. We believe that the rule permits physicians to make the
disclosures that they need to make under the health care system without
exposing themselves to jeopardy under the rule. We believe that the
penalties under the statute are woefully inadequate. We support
legislation that would increase the amount of these penalties.
*Comment:* A number of commenters stated that the regulations should
permit individuals to sue for damages caused by breaches of privacy
under these regulations. Some of these commenters specified that
damages, equitable relief, attorneys fees, and punitive damages should
be available. Conversely, one comment stated that strong penalties are
necessary and would preclude the need for a private right of action.
Another commenter stated that he does not believe that the statute
intended to give individuals the equivalent of a right to sue, which
results from making individuals third party beneficiaries to contracts
between business partners.
*Response:* We do not have the authority to provide a private right of
action by regulation. As discussed below, the final rule deletes the
third party beneficiary provision that was in the proposed rule.
However, we believe that, in addition to strong civil monetary
penalties, federal law should allow any individual whose rights have
been violated to bring an action for actual damages and equitable
relief. The Secretary's Recommendations, which were submitted to
Congress on September 11, 1997, called for a private right of action to
permit individuals to enforce their privacy rights.
*Comment:* One comment stated that, in calculating civil monetary
penalties, the criteria should include aggravating or mitigating
circumstances and whether the violation is a minor or first time
violation. Several comments stated that penalties should be tiered so
that those that commit the most egregious violations face stricter civil
monetary penalties.
*Response:* As mentioned above, issues regarding civil fines and
criminal penalties will be addressed in the enforcement regulation.
*Comment:* One comment stated that the regulation should clarify whether
a single disclosure that involved the health information of multiple
parties would constitute a single or multiple infractions, for the
purpose of calculating the penalty amount.
*Response:* The enforcement regulation will address the calculation of
penalties. However, we note that section 1176 subjects persons to civil
monetary penalties of not more than \$100 for each violation of a
requirement or prohibition and not more than \$25,000 in a calendar year
for all violations of an identical requirement or prohibition. For
example, if a covered entity fails to permit amendment of protected
health information for 10 patients in one calendar year, the entity may
be fined up to \$1000 (\$100 times 10 violations equals \$1000).
**PART 164 -- SUBPART A -- GENERAL REQUIREMENTS**
**PART 164 -- SUBPART B-D -- RESERVED**
**PART 164 -- SUBPART E -- PRIVACY**
**SECTION 164.500 -- APPLICABILITY**
***Covered Entities***
The response to comments on covered entities is included in the response
to comments on the definition of "covered entity" in the preamble
discussion of § 160.103.
***Covered Information***
The response to comments on covered information is included in the
response to comments on the definition of "protected health information"
in the preamble discussion of § 164.501.
**SECTION 164.501---DEFINITIONS**
***Designated record set*.**
*Comment*: Many commenters generally supported our proposed definition
of designated record set. Commenters suggested different methods for
narrowing the information accessible to individuals, such as excluding
information obtained without face-to-face interaction (e.g., phone
consultations). Other commenters recommended broadening the information
accessible to individuals, such as allowing access to "the entire
medical record," not just a designated record set. Some commenters
advocated for access to all information about individuals. A few
commenters generally supported the provision but recommended that
consultation and interpretative assistance be provided when the
disclosure may cause harm or misunderstanding.
*Response*: We believe individuals should have a right to access any
protected health information that may be used to make decisions about
them and modify the final rule to accomplish this result. This approach
facilitates an open and cooperative relationship between individuals and
covered health care providers and health plans and allows individuals
fair opportunities to know what health information may be used to make
decisions about them. We list certain records that are always part of
the designated record set. For covered providers these are the medical
record and billing record. For health plans these are the enrollment,
payment, claims adjudication, and case or medical management records.
The purpose of these specified records is management of the accounts and
health care of individuals. In addition, we include in the designated
record set to which individuals have access any record used, in whole or
in part, by or for the covered entity to make decisions about
individuals. Only protected health information that is in a designated
record set is covered. Therefore, if a covered provider has a phone
conversation, information obtained during that conversation is subject
to access only to the extent that it is recorded in the designated
record set.
We do not require a covered entity to provide access to all individually
identifiable health information, because the benefits of access to
information not used to make decisions about individuals is limited and
is outweighed by the burdens on covered entities of locating,
retrieving, and providing access to such information. Such information
may be found in many types of records that include significant
information not relevant to the individual as well as information about
other persons. For example, a hospital's peer review files that include
protected health information about many patients but are used only to
improve patient care at the hospital, and not to make decisions about
individuals, are not part of that hospital's designated record sets.
We encourage but do not require covered entities to provide interpretive
assistance to individuals accessing their information, because such a
requirement could impose administrative burdens that outweigh the
benefits likely to accrue.
The importance to individuals of having the right to inspect and copy
information about them is supported by a variety of industry groups and
is recognized in current state and federal law. The July 1977 Report of
the Privacy Protection Study Commission recommended that individuals
have access to medical records and medical record information.[^2] The
Privacy Act (5 U.S.C. 552a) requires government agencies to permit
individuals to review records and have a copy made in a form
comprehensible to the individual. In its report "Best Principles for
Health Privacy," the Health Privacy Working Group recommended that
individuals should have the right to access information about them.[^3]
The National Association of Insurance Commissioners' Health Information
Privacy Model Act establishes the right of an individual to examine or
receive a copy of protected health information in the possession of the
carrier or a person acting on behalf of the carrier.
Many states also establish a right for individuals to access health
information about them. For example, Alaska law (AK Code 18.23.005)
entitles patients "to inspect and copy any records developed or
maintained by a health care provider or other person pertaining to the
health care rendered to the patient." Hawaii law (HRS section 323C-11)
requires health care providers and health plans, among others, to permit
individuals to inspect and copy protected health information about them.
Many other states have similar provisions.
Industry and standard-setting organizations also have developed policies
to enable individual access to health information. The National
Committee for Quality Assurance and the Joint Commission on
Accreditation of Healthcare Organizations issued recommendations
stating, "Patients' confidence in the protection of their information
requires that they have the means to know what is contained in their
records. The opportunity for patients to review their records will
enable them to correct any errors and may provide them with a better
understanding of their health status and treatment."[^4] Standards of
the American Society for Testing and Materials state, "The patient or
his or her designated personal representative has access rights to the
data and information in his or her health record and other health
information databases except as restricted by law. An individual should
be able to inspect or see his or her health information or request a
copy of all or part of the health information, or both."[^5] We build on
this well-established principle in this final rule.
*Comment*: Several commenters advocated for access to not only
information that has already been used to make decisions, but also
information that may be used to make decisions. Other commenters
believed accessible information should be more limited; for example,
some commenters argued that accessible information should be restricted
to only information used to make health care decisions.
*Response*: We agree that it is desirable that individuals have access
to information reasonably likely to be used to make decisions about
them. On the other hand, it is desirable that the category of records
covered be readily ascertainable by the covered entity. We therefore
define "designated record set" to include certain categories of records
(a provider's medical record and billing record, the enrollment records,
and certain other records maintained by a health plan) that are normally
used, and are reasonably likely to be used, to make decisions about
individuals. We also add a category of other records that are, in fact,
used, in whole or in part, to make decisions about individuals. This
category includes records that are used to make decisions about any
individuals, whether or not the records have been used to make a
decision about the particular individual requesting access.
We disagree that accessible information should be restricted to
information used to make health care decisions, because other decisions
by covered entities can also affect individuals' interests. For example,
covered entities make financial decisions about individuals, such as
whether an individual's deductible has been met. Because such decisions
can significantly affect individuals' interests, we believe they should
have access to any protected health information included in such
records.
*Comment*: Some commenters believed the rule should use the term
"retrievable" instead of "retrieved" to describe information accessible
to individuals. Other commenters suggested that the rule follow the
Privacy Act's principle of allowing access only when entities retrieve
records by individual identifiers. Some commenters requested
clarification that covered entities are not required to maintain
information by name or other patient identifier.
*Response*: We have modified the proposed definition of the designated
record set to focus on how information is used, not how it is retrieved.
Information may be retrieved or retrievable by name, but if it is never
used to make decisions about any individuals, the burdens of requiring a
covered entity to find it and to redact information about other
individuals outweigh any benefits to the individual of having access to
the information. When the information might be used to affect the
individual's interests, however, that balance changes and the benefits
outweigh the burdens. We confirm that this regulation does not require
covered entities to maintain any particular record set by name or
identifier.
*Comment*: A few commenters recommended denial of access for information
relating to investigations of claims, fraud, and misrepresentations.
Many commenters suggested that sensitive, proprietary, and legal
documents that are "typical state law privileges" be excluded from the
right to access. Specific suggestions for exclusion, either from the
right of access or from the definition of designated record set, include
quality assurance activities, information related to medical appeals,
peer review and credentialing, attorney-client information, and
compliance committee activities. Some commenters suggested excluding
information already supplied to individuals on previous requests and
information related to health care operations. However, some commenters
felt that such information was already excluded from the definition of
designated record set. Other commenters requested clarification that
this provision will not prevent patients from getting information
related to medical malpractice.
*Response*: We do not agree that records in these categories are never
used to affect the interests of individuals. For example, while
protected health information used for peer review and quality assurance
activities typically would not be used to make decisions about
individuals, and, thus, typically would not be part of a designated
record set, we cannot say that this is true in all cases. We design this
provision to be sufficiently flexible to work with the varying practices
of covered entities.
The rule addresses several of these comments by excepting from the
access provisions (§ 164.524) information compiled in reasonable
anticipation of, or for use in, a civil, criminal, or administrative
action or proceeding. Similarly, nothing in this rule requires a covered
entity to divulge information covered by physician-patient or similar
privilege. Under the access provisions, a covered entity may redact
information in a record about other persons or information obtained
under a promise of confidentiality, prior to releasing the information
to the individual. We clarify that nothing in this provision would
prevent access to information needed to prosecute or defend a medical
malpractice action; the rules of the relevant court determine such
access.
We found no persuasive evidence to support excluding information already
supplied to individuals on previous requests. The burdens of tracking
requests and the information provided pursuant to requests outweigh the
burdens of providing the access requested. A covered entity may,
however, discuss the scope of the request for access with the individual
to facilitate the timely provision of access. For example, if the
individual agrees, the covered entity could supply only the information
created or received since the date access was last granted.
***Disclosure*.**
*Comment*: A number of commenters asked that the definition of
"disclosure" be modified so that it is clear that it does not include
the release, transfer, provision of access to, or divulging in any other
manner of protected health information to the individual who is the
subject of that information. It was suggested that we revise the
definition in this way to clarify that a health care provider may
release protected health information to the subject of the information
without first requiring that the patient complete an authorization form.
*Response:* We agree with the commenters' concern, but accomplish this
result through a different provision in the regulation. In § 164.502 of
this final rule, we specify that disclosures of protected health
information to the individual are not subject to the limitations on
disclosure of protected health information otherwise imposed by this
rule.
*Comment:* A number of commenters stated that the regulation should not
apply to disclosures occurring within or among different subsidiaries or
components of the same entity. One commenter interpreted "disclosure" to
mean outside the agency or, in the case of a state Department of Health,
outside sister agencies and offices that directly assist the Secretary
in performing Medicaid functions and are listed in the state plan as
entitled to receive Medicaid data.
*Response:* We agree that there are circumstances under which related
organizations may be treated as a single covered entity for purposes of
protecting the privacy of health information, and modify the rule to
accommodate such circumstances. In § 164.504 of the final rule, we
specify the conditions under which affiliated companies may combine into
a single covered entity and similarly describe which components of a
larger organization must comply with the requirements of this rule. For
example, transfers of information within the designated component or
affiliated entity are uses while transfers of information outside the
designated component or affiliated entity are disclosures. See the
discussion of § 164.504 for further information and rationale. It is not
clear from these comments whether the particular organizational
arrangements described could constitute a single covered entity.
*Comment:* A commenter noted that the definition of "disclosure" should
reflect that health plan correspondence containing protected health
information, such as Explanation of Benefits (EOBs), is frequently sent
to the policyholder. Therefore, it was suggested that the words
"provision of access to" be deleted from the definition and that a
"disclosure" be clarified to include the conveyance of protected health
information to a third party.
*Response:* The definition is, on its face, broad enough to cover the
transfers of information described and so is not changed. We agree that
health plans must be able to send EOBs to policyholders. Sending EOB
correspondence to a policyholder by a covered entity is a disclosure for
purposes of this rule, but it is a disclosure for purposes of payment.
Therefore, subject to the provisions of § 164.522(b) regarding
Confidential Communications, it is permitted even if it discloses to the
policyholder protected health information about another individual (see
below).
***Health care operations*.**
*Comment:* Several commenters stated that the list of activities within
the definition of health care operations was too broad and should be
narrowed. They asserted that the definition should be limited to exclude
activities that have little or no connection to the care of a particular
patient or to only include emergency treatment situations or situations
constituting a clear and present danger to oneself or others.
*Response:* We disagree. We believe that narrowing the definition in the
manner requested will place serious burdens on covered entities and
impair their ability to conduct legitimate business and management
functions.
*Comment*: Many commenters, including physician groups, consumer groups,
and privacy advocates, argued that we should limit the information that
can be used for health care operations to de-identified data. They
argued that if an activity could be done with de-identified data, it
should not be incorporated in the definition of health care operations.
*Response:* We disagree. We believe that many activities necessary for
the business and administrative operations of health plans and health
care providers are not possible with de-identified information or are
possible only under unduly burdensome circumstances. For example,
identified information may be used or disclosed during an audit of
claims, for a plan to contact a provider about alternative treatments
for specific patients, and in reviewing the competence of health care
professionals. Further, not all covered entities have the same ability
to de-identify protected health information. Covered entities with
highly automated information systems will be able to use de-identified
data for many purposes. Other covered entities maintain most of their
records on paper, so a requirement to de-identify information would
place too great a burden on the legitimate and routine business
functions included in the definition of health care operations. Small
business, which are most likely to have largely paper records, would
find such a blanket requirement particularly burdensome.
Protected health information that is de-identified pursuant to §
164.514(a) is not subject to this rule. We hope this provides covered
entities capable of de-identifying information with the incentive to do
so.
*Comment:* Some commenters requested that we permit the use of
demographic data (geographic, location, age, gender, and race) separate
from all other data for health care operations. They argued that
demographic data was needed to establish provider networks and monitor
providers to ensure that the needs of ethnic and minority populations
were being addressed.
*Response*: The use of demographic data for the stated purposes is
within the definition of health care operations; a special rule is not
necessary.
*Comment*: Some commenters pointed out that the definition of health
care operations is similar to, and at times overlaps with, the
definition of research. In addition, a number of commenters questioned
whether or not research conducted by the covered entity or its business
partner must only be applicable to and used within the covered entity to
be considered health care operations. Others questioned whether such
studies or research performed internal to a covered entity are "health
care operations" even if generalizable results may be produced.
*Response*: We agree that some health care operations have many of the
characteristics of research studies and in the NPRM asked for comments
on how to make this distinction. While a clear answer was not suggested
in any of the comments, the comments generally together with our fact
finding lead to the provisions in the final rule. The distinction
between health care operations and research rests on whether the primary
purpose of the study is to produce "generalizable knowledge." We have
modified the definition of health care operations to include "quality
assessment and improvement activities, including outcomes evaluation and
development of clinical guidelines, *provided that the obtaining of
generalizable knowledge is not the primary purpose of any studies
resulting from such activities*." If the primary purpose of the activity
is to produce generalizable knowledge, the activity fits within this
rule's definition of "research" and the covered entity must comply with
§§ 164.508 or 164.512, including obtaining an authorization or the
approval of an institutional review board or privacy board. If not and
the activity otherwise meets the definition of health care operations,
the activity is not research and may be conducted under the health care
operations provisions of this rule.
In some instances, the primary purpose of the activity may change as
preliminary results are analyzed. An activity that was initiated as an
internal outcomes evaluation may produce information that the covered
entity wants to generalize. If the purpose of a study changes and the
covered entity does intend to generalize the results, the covered entity
should document the change in status of the activity to establish that
they did not violate the requirements of this rule. (See definition of
"research," below, for further information on the distinction between
"research" and "health care operations.")
We note that the difficulty in determining when an activity is for the
internal operations of an entity and when it is a research activity is a
long-standing issue in the industry. The variation among commenters'
views is one of many indications that, today, there is not consensus on
how to draw this line. We do not resolve the larger issue here, but
instead provide requirements specific to the information covered by this
rule.
*Comment*: Several commenters asked that disease management and
disability management activities be explicitly included in the
definition of health care operations. Many health plans asserted that
they would not be able to provide disease management, wellness, and
health promotion activities if the activity were solely captured in the
rule's definition of "treatment." They also expressed concern that
"treatment" usually applies to an individual, not to a population, as is
the practice for disease management.
*Response*: We were unable to find generally accepted definitions of the
terms 'disease management' and 'disability management.' Rather than rely
on this label, we include many of the functions often included in
discussions of disease management in this definition or in the
definition of treatment, and modify both definitions to address the
commenters' concerns. For example, we have revised the definition of
health care operations to include population-based activities related to
improving health or reducing health care costs. This topic is discussed
further in the comment responses regarding the definition of
'treatment,' below.
*Comment:* Several commenters urged that the definition of health care
operations be illustrative and flexible, rather than structured in the
form of a list as in the proposed rule. They believed it would be
impossible to identify all the activities that constitute health care
operations. Commenters representing health plans were concerned that the
"static" nature of the definition would stifle innovation and could not
reflect the new functions that health plans may develop in the future
that benefit consumers, improve quality, and reduce costs. Other
commenters, expressed support for the approach taken in the proposed
rule, but felt the list was too broad.
*Response:* In the final rule, we revise the proposed definition of
health care operations to broaden the list of activities included, but
we do not agree with the comments asking for an illustrative definition
rather than an inclusive list. Instead, we describe the activities that
constitute health care operations in broad terms and categories, such as
"quality assessment" and "business planning and development." We believe
the use of broadly stated categories will allow industry innovation, but
without the privacy risks entailed in an illustrative approach.
*Comment*: Several commenters noted that utilization review and internal
quality review should be included in the definition. They pointed out
that both of these activities were discussed in the preamble to the
proposed rule but were not incorporated into the regulation text.
*Response*: We agree and have modified the regulation text to
incorporate quality assessment and improvement activities, including the
development of clinical guidelines and protocol development.
*Comment:* Several commenters stated that the proposal did not provide
sufficient guidance regarding compiling and analyzing information in
anticipation of or for use in legal proceedings. In particular, they
raised concerns about the lack of specificity as to when "anticipation"
would be triggered.
*Response:* We agree that this provision was confusing and have replaced
it with a broader reference to conducting or arranging for legal
services generally.
*Comment*: Hospital representatives pointed out the pressure on health
care facilities to improve cost efficiencies, make cost-effectiveness
studies, and benchmark essential health care operations. They emphasized
that such activities often use identifiable patient information,
although the products of the analyses usually do not contain
identifiable health information. Commenters representing state hospital
associations pointed out that they routinely receive protected health
information from hospitals for analyses that are used by member
hospitals for such things as quality of care benchmark comparisons,
market share analysis, determining physician utilization of hospital
resources, and charge comparisons.
*Response:* We have expanded the definition of health care operations to
include use and disclosure of protected health information for the
important functions noted by these commenters. We also allow a covered
entity to engage a business associate to provide data aggregation
services. See § 164.504(e).
*Comment*: Several commenters argued that many activities that are
integral to the day-to-day operations of a health plan have not been
included in the definition. Examples provided by the commenters include:
issuing plan identification cards, customer service, computer
maintenance, storage and back-up of radiologic images, and the
installation and servicing of medical equipment or computer systems.
*Response*: We agree with the commenters that there are activities not
directly part of treatment or payment that are more closely associated
with the administrative or clerical functions of the plan or provider
that need to be included in the definition. To include such activities
in the definition of health care operations, we eliminate the
requirement that health care operations be directly related to treatment
and payment, and we add to this definition the new categories of
business management (including general administrative activities) and
business planning activities.
*Comment*: One commenter asked for clarification on whether cost-related
analyses could also be done by providers as well as health plans.
*Response*: Health care operations, including business management
functions, are not limited to health plans. Any covered entity can
perform health care operations.
*Comment:* One commenter stated that the proposed rule did not address
what happens to records when a covered entity is sold or merged with
another entity.
*Response:* We agree and add to the definition of health care operations
disclosures of protected health information for due diligence to a
covered entity that is a potential successor in interest. This provision
includes disclosures pursuant to the sale of a covered entity\'s
business as a going concern, mergers, acquisitions, consolidations, and
other similar types of corporate restructuring between covered entities,
including a division of a covered entity, and to an entity that is not a
covered entity but will become a covered entity if the reorganization or
sale is completed. Other types of sales of assets, or disclosures to
organizations that are not and would not become covered entities, are
not included in the definition of health care operations and could only
occur if the covered entity obtained valid authorization for such
disclosure in accordance with § 164.508 or if the disclosure is
otherwise permitted under this rule.
Once a covered entity is sold or merged with another covered entity, the
successor in interest becomes responsible for complying with this
regulation with respect to the transferred information.
*Comment*: Several commenters expressed concern that the definition of
health care operations failed to include the use of protected health
information for the underwriting of new health care policies and took
issue with the exclusion of uses and disclosures of protected health
information of prospective enrollees. They expressed the concern that
limiting health care operations to the underwriting and rating of
existing members places a health plan in the position of not being able
to evaluate prudently and underwrite a consumer's health care risk.
*Response*: We agree that covered entities should be able to use the
protected health information of prospective enrollees to underwrite and
rate new business and change the definition of health care operations
accordingly. The definition of health care operations below includes
underwriting, premium rating, and other activities related to the
creation of a contract of health insurance.
*Comment*: Several commenters stated that group health plans needed to
be able to use and disclose protected health information for purposes of
soliciting a contract with a new carrier and rate setting.
*Response*: We agree and add "activities relating to the \...
replacement of a contract of insurance" to cover such disclosures. See §
164.504 for the rules for plan sponsors of group health plans to obtain
such information.
*Comment*: Commenters from the business community supported our
recognition of the importance of financial risk transfer mechanisms in
the health care marketplace by including "reinsurance" in the definition
of health care operations. However, they stated that the term
"reinsurance" alone was not adequate to capture "stop-loss insurance"
(also referred to as excess of loss insurance), another type of risk
transfer insurance.
*Response*: We agree with the commenters that stop-loss and excess of
loss insurance are functionally equivalent to reinsurance and add these
to the definition of health care operations.
*Comment*: Commenters from the employer community explained that there
is a trend among employers to contract with a single insurer for all
their insurance needs (health, disability, workers' compensation). They
stated that in these integrated systems, employee health information is
shared among the various programs in the system. The commenters believed
the existing definition poses obstacles for those employers utilizing an
integrated health system because of the need to obtain authorizations
before being permitted to use protected health information from the
health plan to administer or audit their disability or workers'
compensation plan.
Other commenters representing employers stated that some employers
wanted to combine health information from different insurers and health
plans providing employee benefits to their workforces, including its
group health plan, workers' compensation insurers, and disability
insurers, so that they could have more information in order to better
manage the occurrences of disability and illness among their workforces.
They expressed concern that the proposed rule would not permit such
sharing of information.
*Response:* While we agree that integrating health information from
different benefit programs may produce efficiencies as well as benefits
for individuals, the integration also raises significant privacy
concerns, particularly if there are no safeguards on uses and
disclosures from the integrated data. Under HIPAA, we do not have
jurisdiction over many types of insurers that use health information,
such as workers' compensation insurers or insurers providing disability
income benefits, and we cannot address the extent to which they provide
individually identifiable health information to a health plan, nor do we
prohibit a health plan from receiving such information. Once a health
plan receives identifiable health information, however, the information
becomes protected and may only be used and disclosed as otherwise
permitted by this rule.
We clarify, however, that a covered entity may provide data and
statistical analyses for its customers as a health care operation,
provided that it does not disclose protected health information in a way
that would otherwise violate this rule. A group health plan or health
insurance issuer or HMO, or their business associate on their behalf,
may perform such analyses for an employer customer and provide the
results in de-identified form to the customer, using integrated data
received from other insurers, as long as protected health information is
not disclosed in violation of this rule. See the definition of "health
care operations," § 164.501. If the employer sponsors more than one
group health plan, or if its group health plan provides coverage through
more than one health insurance issuer or HMO, the different covered
entities may be an organized health care arrangement and be able to
jointly participate in such an analysis as part of the health care
operations of such organized health care arrangement. See the
definitions of "health care operations" and "organized health care
arrangement," § 164.501. We further clarify that a plan sponsor
providing plan administration to a group health plan may participate in
such an analysis, provided that the requirements of § 164.504(f) and
other parts of this rule are met.
The results described above are the same whether the health information
that is being combined is from separate insurers or from one entity that
has a health component and also provides excepted benefits. See the
discussion relating to health care components, § 164.504.
We note that under the arrangements described above, the final rule
provides substantial flexibility to covered entities to provide general
data and statistical analyses, resulting in the disclosure of
de-identified information, to employers and other customers. An employer
also may receive protected health information from a covered entity for
any purpose, including those described in comment above, with the
authorization of the individual. See § 164.508.
*Comment*: A number of commenters asserted that the proposed definition
appeared to limit training and educational activities to that of health
care professionals, students, and trainees. They asked that we expand
the definition to include other education-related activities, such as
continuing education for providers and training of non-health care
professionals as needed for supporting treatment or payment.
*Response*: We agree with the commenters that the definition of health
care operations was unnecessarily limiting with respect to educational
activities and expand the definition of health care operations to
include "conducting training programs in which students, trainees, or
practitioners in areas of health care learn under supervision to
practice or improve their skills as health care providers." We clarify
that medical rounds are considered treatment, not health care
operations.
*Comment*: A few commenters outlined the need to include the training of
non-health care professionals, such as health data analysts,
administrators, and computer programmers within the definition of health
care operations. It was argued that, in many cases, these professionals
perform functions which support treatment and payment and will need
access to protected health information in order to carry out their
responsibilities.
*Response*: We agree and expand the definition of health care operations
to include training of non-health care professionals.
*Comment*: One commenter stated that the definition did not explicitly
include physician credentialing and peer review.
*Response*: We have revised the definition to specifically include
"licensing or credentialing activities." In addition, peer review
activities are captured in the definition as reviewing the competence or
qualifications of health care professionals and evaluating practitioner
and provider performance.
***Health oversight agency*.**
*Comment:* Some commenters sought to have specific organizations defined
as health oversight agencies. For example, some commenters asked that
the regulation text, rather than the preamble, explicitly list state
insurance departments as an example of health oversight agencies.
Medical device manufacturers recommended expanding the definition to
include government contractors such as coding committees, which provide
data to HCFA to help the agency make reimbursement decisions.
One federal agency sought clarification that several of its sub-agencies
were oversight agencies; it was concerned about its status in part
because the agency fits into more than one of the categories of health
oversight agency listed in the proposed rule.
Other commenters recommended expanding the definition of oversight
agency to include private-sector accreditation organizations. One
commenter recommended stating in the final rule that private companies
providing information to insurers and employers are not included in the
definition of health oversight agency.
*Response:* Because the range of health oversight agencies is so broad,
we do not include specific examples in the definition. We include many
examples in the preamble above and provide further clarity here.
As under the NPRM, state insurance departments are an example of a
health oversight agency. A commenter concerned about state trauma
registries did not describe the registries' activities or legal
charters, so we cannot clarify whether such registries may be health
oversight agencies. Government contractors such as coding committees,
which provide data to HCFA to support payment processes, are not thereby
health oversight agencies under this rule. We clarify that public
agencies may fit into more than one category of health oversight agency.
The definition of health oversight agency does not include
private-sector accreditation organizations. While their work can promote
quality in the health care delivery system, private accreditation
organizations are not authorized by law to oversee the health care
system or government programs in which health information is necessary
to determine eligibility or compliance, or to enforce civil rights laws
for which health information is relevant. Under the final rule, we
consider private accrediting groups to be performing a health care
operations function for covered entities. Thus, disclosures to private
accrediting organizations are disclosures for health care operations,
not for oversight purposes.
When they are performing accreditation activities for a covered entity,
private accrediting organizations will meet the definition of business
associate, and the covered entity must enter into a business associate
contract with the accrediting organization in order to disclose
protected health information. This is consistent with current practice;
today, accrediting organizations perform their work pursuant to
contracts with the accredited entity. This approach is also consistent
with the recommendation by the Joint Commission on Accreditation of
Healthcare Organizations and the National Committee for Quality
Assurance, which stated in their report titled [Protecting Personal
Health Information: A Framework for Meeting the Challenges in a Managed
Care Environment]{.underline} (1998) that "Oversight organizations,
including accrediting bodies, states, and federal agencies, should
include in their contracts terms that describe their responsibility to
maintain the confidentiality of any personally identifiable health
information that they review."
We agree with the commenter who believed that private companies
providing information to insurers and employers are not performing an
oversight function; the definition of health oversight agency does not
include such companies.
In developing and clarifying the definition of health oversight in the
final rule, we seek to achieve a balance in accounting for the full
range of activities that public agencies may undertake to perform their
health oversight functions while establishing clear and appropriate
boundaries on the definition so that it does not become a catch-all
category that public and private agencies could use to justify any
request for information.
***Individual*.**
*Comment:* A few commenters stated that foreign military and diplomatic
personnel, and their dependents, and overseas foreign national
beneficiaries, should not be excluded from the definition of
"individual."
*Response:* We agree with concerns stated by commenters and eliminate
these exclusions from the definition of "individual" in the final rule.
Special rules for use and disclosure of protected health information
about foreign military personnel are stated in § 164.512(k). Under the
final rule, protected health information about diplomatic personnel is
not accorded special treatment. While the exclusion of overseas foreign
national beneficiaries has been deleted from the definition of
"individual," we have revised § 164.500 to indicate that the rule does
not apply to the Department of Defense or other federal agencies or
non-governmental organizations acting on its behalf when providing
health care to overseas foreign national beneficiaries. This means that
the rule will not cover any health information created incident to the
provision of health care to foreign nationals overseas by U.S. sponsored
missions or operations. (See § 164.500 and its corresponding preamble
for details and the rationale for this policy.)
*Comment:* Several commenters expressed concern about the
interrelationship of the definition of "individual" and the two year
privacy protection for deceased persons.
*Response:* In the final rule, we eliminate the two year limit on
privacy protection for protected health information about deceased
individuals and require covered entities to comply with the requirements
of the rule with respect to the protected health information of deceased
individuals as long as they hold such information. See discussion under
§ 164.502.
***Individually identifiable health information*.**
*Comment:* A number of commenters suggested that HHS revise the
definitions of health information and individually identifiable health
information to include consistent language in paragraph (1) of each
respective definition. They observed that paragraph (1) of the
definition of health information reads: "(1) Is created or received *by*
a health care provider, health plan, *public health authority,*
employer*, life insurer, school or university,* or health care
clearinghouse\...;" in contrast to paragraph (1) of the definition of
individually identifiable health information, which reads: "(1) Is
created by or received *from* a health care provider, health plan,
employer, or health care clearinghouse\..." \[Emphasis added.\]
Another commenter asked that we delete from the definition of health
information, the words "health or" to make the definition more
consistent with the definition of "health care," as well as the words
"whether oral or."
*Response:* We define these terms in the final rule as they are defined
by Congress in sections 1171(4) and 1171(6) of the Act, respectively. We
have, however, changed the word "from" in the definition of
"individually identifiable health information" to conform to the
statute.
*Comment:* Several commenters urged that the definition of individually
identifiable health information include information created or received
by a researcher. They reasoned that it is important to ensure that
researchers using personally identifiable health information are subject
to federal privacy standards. They also stated that if information
created by a school regarding the health status of its students could be
labeled "health information," then information compiled by a clinical
researcher regarding an individual also should be considered health
information.
*Response:* We are restricted to the statutory limits of the terms. The
Congress did not include information created or received by a researcher
in either definition, and, consequently, we do not include such language
in the rule's definitions.
*Comment:* Several commenters suggested modifying the definition of
individually identifiable health information to state as a condition
that the information provide a direct means of identifying the
individual. They commented that the rule should support the need of
those (e.g., researchers) who need "ready access to health
information\... that remains linkable to specific individuals."
*Response:* The Congress included in the statutory definition of
individually identifiable health information the modifier "reasonable
basis" when describing the condition for determining whether information
can be used to identify the individual. Congress thus intended to go
beyond "direct" identification and to encompass circumstances in which a
reasonable likelihood of identification exists. Even after removing
"direct" or "obvious" identifiers of information, a risk or probability
of identification of the subject of the information may remain; in some
instances, the risk will not be inconsequential. Thus, we agree with the
Congress that "reasonable basis" is the appropriate standard to
adequately protect the privacy of individuals' health information.
*Comment:* A number of commenters suggested that the Secretary eliminate
the distinction between protected health information and individually
identifiable health information. One commenter asserted that all
individually identifiable health information should be protected. One
commenter observed that the terms individually identifiable health
information and protected health information are defined differently in
the rule and requested clarification as to the precise scope of coverage
of the standards. Another commenter stated that the definition of
individually identifiable health information includes "employer,"
whereas protected health information pertains only to covered entities
for which employers are not included. The commenter argued that this was
an "incongruity" between the definitions of individually identifiable
health information and protected health information and recommended that
we remove "employer" from the definition of individually identifiable
health information.
*Response:* We define individually identifiable health information in
the final rule generally as it is defined by Congress in section 1171(6)
of the Act. Because "employer" is included in the statutory definition,
we cannot accept the comment to remove the word "employer" from the
regulatory definition.
We use the phrase 'protected health information' to distinguish between
the individually identifiable health information that is used or
disclosed by the entities that are subject to this rule and the entire
universe of individually identifiable health information. 'Individually
identifiable health information' as defined in the statute is not
limited to health information used or disclosed by covered entities, so
the qualifying phrase 'protected health information' is necessary to
define that individually identifiable health information to which this
rule applies.
*Comment:* One commenter noted that the definition of individually
identifiable health information in the NPRM appeared to be the same
definition used in the other HIPAA proposed rule, Security and
Electronic Signature Standards (63 FR 43242). However, the commenter
stated that the additional condition in the privacy NPRM, that protected
health information is or has been electronically transmitted or
electronically maintained by a covered entity and includes such
information in any other form, appears to create potential disparity
between the requirements of the two rules. The commenter questioned
whether the provisions in proposed § 164.518(c) were an attempt to
install similar security safeguards for such situations.
*Response:* The statutory definition of individually identifiable health
information applies to the entire Administrative Simplification subtitle
of HIPAA and, thus, was included in the proposed Security Standards. At
this time, however, the final Security Standards have not been
published, so the definition of protected health information is relevant
only to HIPAA's privacy standards and is, therefore, included in Subpart
E of Part 164 only. We clarify that the requirements in the proposed
Security Standards are distinct and separate from the privacy safeguards
promulgated in this final rule.
*Comment:* Several commenters expressed confusion and requested
clarification as to what is considered health information or
individually identifiable health information for purposes of the rule.
For example, one commenter was concerned that information exists in
collection agencies, credit bureaus, etc., which could be included under
the proposed regulation but may or may not have been originally obtained
by a covered entity. The commenter noted that generally this information
is not clinical, but it could be inferred from the data that a health
care provider provided a person or member of person's family with health
care services. The commenter urged the Secretary to define more clearly
what and when information is covered.
One commenter queried how a non-medical record keeper could tell when
personal information is health information within the meaning of rule,
e.g., when a worker asks for a low salt meal in a company cafeteria,
when a travel voucher of an employee indicates that the traveler
returned from an area that had an outbreak of fever, or when an airline
passenger requests a wheel chair. It was suggested that the rule cover
health information in the hands of schools, employers, and life insurers
only when they receive individually identifiable health information from
a covered entity or when they create it while providing treatment or
making payment.
*Response:* This rule applies only to individually identifiable health
information that is held by a covered entity. Credit bureaus, airlines,
schools, and life insurers are not covered entities, so the information
described in the above comments is not protected health information.
Similarly, employers are not covered entities under the rule. Covered
entities must comply with this regulation in their health care capacity,
not in their capacity as employers. For example, information in hospital
personnel files about a nurses' sick leave is not protected health
information under this rule.
*Comment:* One commenter recommended that the privacy of health
information should relate to actual medical records. The commenter
expressed concern about the definition's broadness and contended that
applying prescriptive rules to information that health plans hold will
not only delay processing of claims and coverage decisions, but
ultimately affect the quality and cost of care for health care
consumers.
*Response:* We disagree. Health information about individuals exists in
many types of records, not just the formal medical record about the
individual. Limiting the rule's protections to individually identifiable
health information contained in medical records, rather than
individually identifiable health information in any form, would omit a
significant amount of individually identifiable health information,
including much information in covered transactions.
*Comment:* One commenter voiced a need for a single standard for
individually identifiable health information and disability and workers'
compensation information; each category of information is located in
their one electronic data base, but would be subjected to a different
set of use and transmission rules.
*Response:* We agree that a uniform, comprehensive privacy standard is
desirable. However, our authority under the HIPAA is limited to
individually identifiable health information as it is defined in the
statute. The legislative history of HIPAA makes clear that workers'
compensation and disability benefits programs were not intended to be
covered by the rule. Entities are of course free to apply the
protections required by this rule to all health information they hold,
including the excepted benefits information, if they wish to do so (for
example, in order to reduce administrative burden).
*Comment:* Commenters recommended that the definition of individually
identifiable health information not include demographic information that
does not have any additional health, treatment, or payment information
with it. Another commenter recommended that protected health information
should not include demographic information at all.
*Response*: Congress explicitly included demographic information in the
statutory definition of this term, so we include such language in our
regulatory definition of it.
*Comments:* A number of commenters expressed concern about whether
references to personal information about individuals, such as "John Doe
is fit to work as a pipe fitter \..." or "Jane Roe can stand no more
than 2 hours \...", would be considered individually identifiable health
information. They argued that such "fitness-to-work" and "fitness for
duty" statements are not health care because they do not reveal the type
of information (such as the diagnosis) that is detrimental to an
individual's privacy interest in the work environment.
*Response:* References to personal information such as those suggested
by the commenters could be individually identifiable health information
if the references were created or received by a health care provider,
health plan, employer, or health care clearinghouse and they related to
the past, present, or future physical or mental health or condition, the
provision of health care to an individual, or the past, present, or
future payment for the provision of health care to an individual.
Although these fitness for duty statements may not reveal a diagnosis,
they do relate to a present physical or mental condition of an
individual because they describe the individual's capacity to perform
the physical and mental requirements of a particular job at the time the
statement is made (even though there may be other non-health-based
qualifications for the job). If these statements were created or
received by one of more of the entities described above, they would be
individually identifiable health information.
***Law enforcement official*.**
*Comment:* Some commenters, particularly those representing health care
providers, expressed concern that the proposed definition of "law
enforcement official" could have allowed many government officials
without health care oversight duties to obtain access to protected
health information without patient consent.
*Response:* We do not intend for the definition of "law enforcement
official" to be limited to officials with responsibilities directly
related to health care. Law enforcement officials may need protected
health information for investigations or prosecutions unrelated to
health care, such as investigations of violent crime, criminal fraud, or
crimes committed on the premises of health care providers. For these
reasons, we believe it is not appropriate to limit the definition of
"law enforcement official" to persons with responsibilities oversight of
the health care system.
*Comment:* A few commenters expressed concern that the proposed
definition could include any county or municipal official, even those
without traditional law enforcement training. *Response:* We do not
believe that determining training requirements for law enforcement
officials is appropriately within the purview of this regulation;
therefore, we do not make the changes that these commenters requested.
*Comment:* Some commenters, particularly those from the district
attorney community, expressed general concern that the proposed
definition of "law enforcement official" was too narrow to account for
the variation in state interpretations of law enforcement officials'
power. One group noted specifically that the proposed definition could
have prevented prosecutors from gaining access to needed protected
health information.
*Response:* We agree that protected health information may be needed by
law enforcement officials for both investigations and prosecutions. We
did not intend to exclude the prosecutorial function from the definition
of "law enforcement official ," and accordingly we modify the definition
of law enforcement official to reflect their involvement in prosecuting
cases. Specifically, in the final rule, we define law enforcement
official as an official of any agency or authority of the United States,
a state, a territory, a political subdivision of a state or territory,
or an Indian tribe, who is empowered by law to: (1) investigate or
conduct an inquiry into a potential violation of law; or (2) prosecute
or otherwise conduct a criminal, civil, or administrative proceeding
arising from an alleged violation of law.
*Comment:* One commenter recommended making the definition of law
enforcement official broad enough to encompass Medicaid program
auditors, because some matters requiring civil or criminal law
enforcement action are first identified through the audit process.
*Response:* We disagree. Program auditors may obtain protected health
information necessary for their audit functions under the oversight
provision of this regulation (§ 164.512(d)).
*Comment:* One commenter suggested that the proposed definition of "law
enforcement official" could be construed as limited to circumstances in
which an official "knows" that law has been violated. This commenter was
concerned that, because individuals are presumed innocent and because
many investigations, such as random audits, are opened without an agency
knowing that there is a violation, the definition would not have allowed
disclosure of protected health information for these purposes. The
commenter recommended modifying the definition to include investigations
into "whether" the law has been violated.
*Response:* We do not intend for lawful disclosures of protected health
information for law enforcement purposes to be limited to those in which
a law enforcement official knows that law has been violated.
Accordingly, we revise the definition of "law enforcement official " to
include investigations of \"potential\" violations of law.
***Marketing*.**
Comments related to "marketing" are addressed in the responses to
comments regarding § 164.514(e).
***Payment*.**
*Comment:* One commenter urged that the Department not permit protected
health information to be disclosed to a collection agency for collecting
payment on a balance due on patient accounts. The commenter noted that,
at best, such a disclosure would only require the patient's and/or
insured's address and phone number.
*Response:* We disagree. A collection agency may require additional
protected health information to investigate and assess payment disputes
for the covered entity. For example, the collection agency may need to
know what services the covered entity rendered in order to resolve
disputes about amounts due. The information necessary may vary,
depending on the nature of the dispute. Therefore we do not specify the
information that may be used or disclosed for collection activities. The
commenter's concern may be addressed by the minimum necessary
requirements in § 164.514. Under those provisions, when a covered entity
determines that a collection agency only requires limited information
for its activities, it must make reasonable efforts to limit disclosure
to that information.
*Comment:* A number of commenters supported retaining the expansive
definition in the proposed rule so that current methods of administering
the claims payment process would not be hindered by blocking access to
protected health information.
*Response:* We agree and retain the proposed overall approach to the
definition.
*Comment:* Some commenters argued that the definition of "payment'
should be narrowly interpreted as applying only to the individual who is
the subject of the information.
*Response:* We agree with the commenter and modify the definition to
clarify that payment activities relate to the individual to whom health
care is provided.
*Comment:* Another group of commenters asserted that the doctor-patient
relationship was already being interfered with by the current practices
of managed care. For example, it was argued that the definition expanded
the power of government and other third party "payors," turning them
into controllers along with managed care companies. Others stated that
activities provided for under the definition occur primarily to fulfill
the administrative function of managed health plans and that an
individual's privacy is lost when his or her individually identifiable
health information is shared for administrative purposes.
*Response:* Activities we include in the definition of payment reflect
core functions through which health care and health insurance services
are funded. It would not be appropriate for a rule about health
information privacy to hinder mechanisms by which health care is
delivered and financed. We do not through this rule require any health
care provider to disclose protected health information to governmental
or other third party payors for the activities listed in the payment
definition. Rather, we allow these activities to occur, subject to and
consistent with the requirements of this rule.
*Comment*: Several commenters requested that we expand the definition to
include "coordination of benefits" as a permissible activity.
*Response:* We agree and modify the definition accordingly.
*Comment:* A few commenters raised concerns that the use of "medical
data processing" was too restrictive. It was suggested that a broader
reference such as "health related" data processing would be more
appropriate.
*Response:* We agree and modify the definition accordingly.
*Comment:* Some commenters suggested that the final rule needed to
clarify that drug formulary administration activities are payment
related activities.
*Response:* While we agree that uses and disclosures of protected health
information for drug formulary administration and development are common
and important activities, we believe these activities are better
described as health care operations and that these activities come
within that definition.
*Comment:* Commenters asked that the definition include calculation of
prescription drug costs, drug discounts, and maximum allowable costs and
copayments.
*Response:* Calculations of drug costs, discounts, or copayments are
payment activities if performed with respect to a specific individual
and are health care operations if performed in the aggregate for a group
of individuals.
*Comment*: We were urged to specifically exclude "therapeutic
substitution" from the definition.
*Response:* We reject this suggestion. While we understand that there
are policy concerns regarding therapeutic substitution, those policy
concerns are not primarily about privacy and thus are not appropriately
addressed in this regulation.
*Comment:* A few commenters asked that patient assistance programs
(PAPS) should be excluded from the definition of payment. Such programs
are run by or on behalf of manufacturers and provide free or discounted
medications to individuals who could not afford to purchase them.
Commenters were concerned that including such activities in the
definition of payment could harm these programs.
For example, a university school of pharmacy may operate an outreach
program and serve as a clearinghouse for information on various
pharmaceutical manufacturer PAPS. Under the program state residents can
submit a simple application to the program (including medication regimen
and financial information), which is reviewed by program pharmacists who
study the eligibility criteria and/or directly call the manufacturer's
program personnel to help evaluate eligibility for particular PAPS. The
program provides written guidance to the prescribing physicians that
includes a suggested approach for helping their indigent patients obtain
the medications that they need and enrollment information for particular
PAPS.
*Response:* We note that the concerns presented are not affected by
definition of "payment." The application of this rule to patient
assistance programs activities will depend on how the individual
programs operate and are affected primarily by the definition of
treatment. Each of these programs function differently, so it is not
possible to state a blanket rule for whether and how the rule affects
such programs.
Under the example provided, the physician who contacts the program on
behalf of a patient is managing the patient's care. If the provider is
also a covered entity, he or she would be permitted to make such a
"treatment" disclosure of protected health information if a general
consent had been obtained from the patient. Depending on the particular
facts, the manufacturer, by providing the prescription drugs for an
individual, could also be providing health care under this rule. Even
so, however, the manufacturer may or may not be a covered entity,
depending on whether or not it engages in any of the standard electronic
transactions (See the definition of a covered entity). It also may be an
indirect treatment provider, since it may be providing the product
through another provider, not directly to the patient. In this example,
the relevant disclosures of protected health information by any covered
health care provider with a direct treatment relationship with the
patient would be permitted subject to the general consent requirements
of § 164.506.
Whether and how this rule affects the school of pharmacy is equally
dependent on the specific facts. For example, if the school merely
provides a patient or a physician with the name of a manufacturer and a
contact phone number, it would not be functioning as a health care
provider and would not be subject to the rule. However, if the school is
more involved in the care of the individual, its activities could come
in within the definition of "health care provider" under this rule.
*Comment*: Commenters pointed out that drugs may or may not be "covered"
under a plan. Individuals, on the other hand, may or may not be
"eligible" for benefits under a plan. The definition should incorporate
both terms to clarify that determinations of both coverage and
eligibility are payment activities.
*Response*: We agree and modify the rule to include "eligibility".
*Comment*: Several commenters urged that "concurrent and retrospective
review" were significant utilization review activities and should be
incorporated.
*Response*: We agree and modify the definition accordingly.
*Comment*: Commenters noted that the proposed rule was not clear as to
whether protected health information could be used to resolve disputes
over coverage, including appeals or complaints regarding quality of
care.
*Response*: We modify the definition of payment to include resolution of
payment and coverage disputes; the final definition of payment includes
"the adjudication \... of health benefit claims." The other examples
provided by commenters, such as arranging, conducting, or assistance
with primary and appellate level review of enrollee coverage appeals,
also fall within the scope of adjudication of health benefits claims.
Uses and disclosures of protected health information to resolve disputes
over quality of care may be made under the definition of "health care
operations" (see above).
*Comment*: Some commenters suggested that if an activity falls within
the scope of payment it should not be considered marketing. Commenters
supported an approach that would bar such an activity from being
construed as "marketing" even if performing that activity would result
in financial gain to the covered entity.
*Response:* We agree that the proposed rule did not clearly define
'marketing,' leaving commenters to be concerned about whether payment
activities that result in financial gain might be considered marketing.
In the final rule we add a definition of marketing and clarify when
certain activities that would otherwise fall within that definition can
be accomplished without authorization. We believe that these changes
will clarify the distinction between marketing and payment and address
the concerns raised by commenters.
*Comment*: Commenters asserted that HHS should not include long-term
care insurance within the definition of "health plan". If they are
included, the commenters argued that the definition of payment must be
modified to reflect the activities necessary to support the payment of
long-term care insurance claims. As proposed, commenters argued that the
definition of payment would not permit long term care insurers to use
and disclose protected health information without authorization to
perform functions that are "compatible with and directly relate
to\...payment" of claims submitted under long term care policies.
*Response*: Long‑term care policies, except for nursing home
fixed‑indemnity policies, are defined as health plans by the statute
(see definition of "health plan," above). We disagree with the assertion
that the definition of payment does not permit long term care insurers
to undertake these necessary activities. Processing of premium payments,
claims administration, and other activities suggested for inclusion by
the commenters are covered by the definition. The rule permits protected
health information to be used or disclosed by a health plan to determine
or fulfill its responsibility for provision of benefits under the health
plan.
*Comment*: Some commenters argued that the definition needs to be
expanded to include the functions of obtaining stop-loss and ceding
reinsurance.
*Response*: We agree that use and disclosure of protected health
information for these activities should be permitted without
authorization, but have included them under health care operation rather
than payment.
*Comment*: Commenters asked that the definition be modified to include
collection of accounts receivable or outstanding accounts. Commenters
raised concern that the proposed rule, without changes, might
unintentionally prevent the flow of information between medical
providers and debt collectors.
*Response*: We agree that the proposed definition of payment did not
explicitly provide for "collection activities" and that this oversight
might have impeded a covered entity's debt collection efforts. We modify
the regulatory text to add "collection activities."
*Comment*: The preamble should clarify that self-insured group health
and workers' compensation plans are not covered entities or business
partners.
*Response*: The statutory definition of health plan does not include
workers' compensation products. See the discussion of "health plan"
under § 160.103 above.
*Comment:* Certain commenters explained that third party administrators
usually communicate with employees through Explanation of Benefit (EOB)
reports on behalf of their dependents (including those who might not be
minor children). Thus, the employee might be apprized of the medical
encounters of his or her dependents but not of medical diagnoses unless
there is an over-riding reason, such as a child suspected of drug abuse
due to multiple prescriptions. The commenters urged that the current
claim processing procedures be allowed to continue.
*Response:* We agree. We interpret the definition of payment and, in
particular the term 'claims management,' to include such disclosures of
protected health information.
*Comment:* One private company noted that pursuant to the proposed
Transactions Rule standard for payment and remittance advice, the ASC
X12N 835 can be used to make a payment, send a remittance advice, or
make a payment and send remittance advice by a health care payor and a
health care provider, either directly or through a designated financial
institution. Because a remittance advice includes diagnostic or
treatment information, several private companies and a few public
agencies believed that the proposed Transactions Rule conflicted with
the proposed privacy rule. Two health plans requested guidance as to
whether, pursuant to the ASC X12N 835 implementation guide, remittance
advice information is considered "required" or "situational." They
sought guidance on whether covered entities could include benefits
information in payment of claims and transfer of remittance information.
One commenter asserted that if the transmission of certain protected
health information were prohibited, health plans may be required to
strip remittance advice information from the ASC X12N 835 when making
health care payments. It recommended modifying the proposed rule to
allow covered entities to provide banks or financial institutions with
the data specified in any transaction set mandated under the
Transactions Rule for health care claims payment.
Similarly, a private company and a state health data organization
recommended broadening the scope of permissible disclosures pursuant to
the banking section to include integrated claims processing information,
as contained in the ASC X12N 835 and proposed for adoption in the
proposed Transactions Rule; this transaction standard includes
diagnostic and treatment information. The company argued that inclusion
of diagnostic and treatment information in the data transmitted in
claims processing was necessary for comprehensive and efficient
integration in the provider's patient accounting system of data
corresponding with payment that financial institutions credit to the
provider's account.
A state health data organization recommended applying these rules to
financial institutions that process electronic remittance advice
pursuant to the Transactions Rule.
*Response:* The Transactions Rule was published August 17, 2000, after
the issuance of the privacy proposed rule. As noted by the commenters,
the ASC X12N 835 we adopted as the "Health Care Payment and Remittance
Advice" standard in the Transactions Rule has two parts. They are the
electronic funds transfer (EFT) and the electronic remittance advice
(ERA). The EFT part is optional and is the mechanism that payors use to
electronically instruct one financial institution to move money from one
account to another at the same or at another financial institution. The
EFT includes information about the payor, the payee, the amount, the
payment method, and a reassociation trace number. Since the EFT is used
to initiate the transfer of funds between the accounts of two
organizations, typically a payor to a provider, it includes no
individually identifiable health information, not even the names of the
patients whose claims are being paid. The funds transfer information may
also be transmitted manually (by check) or by a variety of other
electronic means, including various formats of electronic transactions
sent through a payment network, such as the Automated Clearing House
(ACH) Network.
The ERA, on the other hand, contains specific information about the
patients and the medical procedures for which the money is being paid
and is used to update the accounts receivable system of the provider.
This information is always needed to complete a standard Health Care
Payment and Remittance Advice transaction, but is never needed for the
funds transfer activity of the financial institution. The only
information the two parts of this transaction have in common is the
reassociation trace number.
Under the ASC X12N 835 standard, the ERA may be transmitted alone,
directly from the health plan to the health care provider and the
reassociation trace number is used by the provider to match the ERA
information with a specific payment conducted in some other way (e.g.,
EFT or paper check). The standard also allows the EFT to be transmitted
alone, directly to the financial institution that will initiate the
payment. It also allows both parts to be transmitted together, even
though the intended recipients of the two parts are different (the
financial institution and the provider). For example, this would be done
when the parties agree to use the ACH system to carry the ERA through
the provider\'s bank to the provider when it is more efficient than
sending the ERA separately through a different electronic medium.
Similarly, the ASC X12N 820 standard for premium payments has two parts,
an EFT part (identical to that of the 835) and a premium data part
containing identity and health information about the individuals for
whom health insurance premiums are being paid.
The transmission of both parts of the standards are payment activities
under this rule, and permitted subject to certain restrictions. Because
a financial institution does not require the remittance advice or
premium data parts to conduct funds transfers, disclosure of those parts
by a covered entity to it (absent a business associate arrangement to
use the information to conduct other activities) would be a violation of
this rule.
We note that additional requirements may be imposed by the final
Security Rule. Under the proposed Security Rule, the ACH system and
similar systems would have been considered \"open networks\" because
transmissions flow unpredictably through and become available to member
institutions who are not party to any business associate agreements (in
a way similar to the internet). The proposed Security Rule would require
any protected health information transferred through the ACH or similar
system to be encrypted.
*Comment:* A few commenters noted the Gramm-Leach-Bliley (GLB) Act
(Pub.L. 106-102) allows financial holding companies to engage in a
variety of business activities, such as insurance and securities, beyond
traditional banking activities. Because the term "banking" may take on
broader meaning in light of these changes, the commenter recommended
modifying the proposed rule to state that disclosure of diagnostic and
treatment information to banks along with payment information would
constitute a violation of the rule. Specifically, the organization
recommended clarifying in the final rule that the provisions included in
the proposed section on banking and payment processes (proposed §
164.510(i)) govern payment processes only and that all activities of
financial institutions that did not relate directly to payment processes
must be conducted through business partner contracts. Furthermore, this
group recommended clarifying that if financial institutions act as
payors, they will be covered entities under the rule.
*Response:* We recognize that implementation of the GLB Act will expand
significantly the scope of activities in which financial holding
companies engage. However, unless a financial institution also meets the
definition of a "covered entity," it cannot be a covered entity under
this rule.
We agree with the commenters that disclosure of diagnostic and specific
treatment information to financial institutions for many banking and
funds processing purposes may not be consistent with the minimum
necessary requirements of this final rule. We also agree with the
commenters that financial institutions are business associates if they
receive protected health information when they engage in activities
other than funds processing for covered entities. For example, if a
health care provider contracts with a financial institution to conduct
"back office" billing and accounts receivable activities, we require the
provider to enter into a business associate contract with the
institution.
*Comment:* Two commenters expressed support for the proposed rule's
approach to disclosure for banking and payment processes. On the other
hand, many other commenters were opposed to disclosure of protected
health information without authorization to banks. One commenter said
that no financial institution should have individually identifiable
health information for any reason, and it said there were technological
means for separating identity from information necessary for financial
transactions. Some commenters believed that implementation of the
proposed rule's banking provisions could lead banks to deny loans on the
basis of individuals' health information.
*Response:* We seek to achieve a balance between protecting patient
privacy and facilitating the efficient operation of the health care
system. While we agree that financial institutions should not have
access to extensive information about individuals' health, we recognize
that even the minimal information required for processing of payments
may effectively reveal a patient's health condition; for example, the
fact that a person has written a check to a provider suggests that
services were rendered to the person or a family member. Requiring
authorization for disclosure of protected health information to a
financial institution in order to process every payment transaction in
the health care system would make it difficult, if not impossible, for
the health care system to operate effectively. See also discussion of
section 1179 of the Act above.
*Comment:* Under the proposed rule, covered entities could have
disclosed the following information without consent to financial
institutions for the purpose of processing payments: (1) the account
holder's name and address; (2) the payor or provider's name and address;
(3) the amount of the charge for health services; (4) the date on which
services were rendered; (5) the expiration date for the payment
mechanism, if applicable (e.g., credit card expiration date); and (6)
the individual's signature. The proposed rule solicited comments on
whether additional data elements would be necessary to process payment
transactions from patients to covered entities.
One commenter believed that it was unnecessary to include this list in
the final rule, because information that could have been disclosed under
the proposed minimum necessary rule would have been sufficient to
process banking and payment information. Another private company said
that its extensive payment systems experience indicated that we should
avoid attempts to enumerate a list of information allowed to be
disclosed for banking and payment processing. Furthermore, the commenter
said, the proposed rule's list of information allowed to be disclosed
was not sufficient to perform the range of activities necessary for the
operation of modern electronic payment systems. Finally, the commenter
said, inclusion of specific data elements allowed to be disclosed for
banking and payment processes rule would stifle innovation in
continually evolving payment systems. Thus, the commenter recommended
that in the final rule, we eliminate the minimum necessary requirement
for banking and payment processing and that we do not include a list of
specific types of information allowed to be disclosed for banking and
payment processes.
On the other hand, several other commenters supported applying the
minimum necessary standard to covered entities' disclosures to financial
institutions for payment processing. In addition, these groups said that
because financial institutions are not covered entities under the
proposed rule, they urged Congress to enact comprehensive privacy
legislation to limit financial institutions' use and re-disclosure of
the minimally necessary protected health information they could receive
under the proposed rule. Several of these commenters said that, in light
of the increased ability to manipulate data electronically, they were
concerned that financial institutions could use the minimal protected
health information they received for making financial decisions. For
example, one of these commenters said that a financial institution could
identify an individual who had paid for treatment of domestic violence
injuries and subsequently could deny the individual a mortgage based on
that information.
*Response:* We agree with the commenters who were concerned that a
finite list of information could hamper systems innovation, and we
eliminate the proposed list of data items.
However, we disagree with the commenters who argued that the requirement
for minimum necessary disclosures not apply to disclosures to financial
institution or for payment activities. They presented no persuasive
reasons why these disclosures differ from others to which the standard
applies, nor did they suggest alternative means of protecting
individuals' privacy. Further, with elimination of the proposed list of
items that may be disclosed, it will be necessary to rely on the minimum
necessary disclosure requirement to ensure that disclosures for payment
purposes do not include information unnecessary for that purposes. In
practice, the following is the information that generally will be
needed: the name and address of the individual; the name and address of
the payor or provider; the amount of the charge for health services; the
date on which health services were rendered; the expiration date for the
payment mechanism, if applicable (i.e., credit card expiration date);
the individual's signature; and relevant identification and account
numbers.
*Comment:* One commenter said that the minimum necessary standard would
be impossible to implement with respect to information provided on its
standard payment claim, which, it said, was used by pharmacies for
concurrent drug utilization review and that was expected to be adopted
by HHS as the national pharmacy payment claim.
Two other commenters also recommended clarifying in the final rule that
pharmacy benefit cards are not considered a type of "other payment card"
pursuant to the rule's provisions governing payment processes. These
commenters were concerned that if pharmacy benefit cards were covered by
the rule's payment processing provisions, their payment claim, which
they said was expected to be adopted by HHS as the national pharmacy
payment claim, may have to be modified to comply with the minimum
necessary standard that would have been required pursuant to proposed §
164.510(i) on banking and payment processes. One of these commenters
noted that its payment claim facilitates concurrent drug utilization
review, which was mandated by Congress pursuant to the Omnibus Budget
Reconciliation Act of 1990 and which creates the real-time ability for
pharmacies to gain access to information that may be necessary to meet
requirements of this and similar state laws. The commenter said that
information on its standard payment claim may include information that
could be used to provide professional pharmacy services, such as
compliance, disease management, and outcomes programs. The commenter
opposed restricting such information by applying the minimum necessary
standard.
*Response:* We make an exception to the minium necessary disclosure
provision of this rule for the required and situational data elements of
the standard transactions adopted in the Transactions Rule, because
those elements were agreed to through the ANSI-accredited consensus
development process. The minimum necessary requirements do apply to
optional elements in such standard transactions, because industry
consensus has not resulted in precise and unambiguous situation specific
language to describe their usage. This is particularly relevant to the
NCPDP standards for retail pharmacy transactions referenced by these
commenters, in which the current standard leaves most fields optional.
For this reason, we do not accept this suggestion.
The term \'payment card\' was intended to apply to a debit or credit
card used to initiate payment transactions with a financial institution.
We clarify that pharmacy benefit cards, as well as other health benefit
cards, are used for identification of individual, plan, and benefits and
do not qualify as \"other payment cards.\"
*Comment:* Two commenters asked the following questions regarding the
banking provisions of the proposed rule: (1) Does the proposed
regulation stipulate that disclosures to banks and financial
institutions can occur only once a patient has presented a check or
credit card to the provider, or pursuant to a standing authorization?;
and (2) Does the proposed rule ban disclosure of diagnostic or other
related detailed payment information to financial institutions?
*Response:* We do not ban disclosure of diagnostic information to
financial institutions, because some such information may be evident
simply from the name of the payee (e.g., when payment is made to a
substance abuse clinic). This type of disclosure, however, is permitted
only when reasonably necessary for the transaction (see requirements for
minimum necessary disclosure of protected health information, in §
164.502 and § 164.514).
Similarly, we do not stipulate that such disclosure may be made only
once a patient has presented a check or credit card, because some
covered entities hire financial institutions to perform services such as
management of accounts receivables and other back office functions. In
providing such services to covered entities, the financial institution
will need access to protected health information. (In this situation,
the disclosure will typically be made under a business associate
arrangement that includes provisions for protection of the information.)
*Comment:* One commenter was concerned that the proposed rule's section
on financial institutions, when considered in conjunction with the
proposed definition of "protected health information," could have been
construed as making covered entities' disclosures of consumer payment
history information to consumer reporting agencies subject to the rule.
It noted that covered entities' reporting of payment history information
to consumer reporting agencies was not explicitly covered by the
proposed rule's provisions regarding disclosure of protected health
information without authorization. It was also concerned that the
proposed rule's minimum necessary standard could have been interpreted
to prevent covered entities and their business partners from disclosing
appropriate and complete information to consumer reporting agencies. As
a result, it said, consumer reporting agencies might not be able to
compile complete consumer reports, thus potentially creating an
inaccurate picture of a consumer's credit history that could be used to
make future credit decisions about the individual.
Furthermore, this commenter said, the proposed rule could have been
interpreted to apply to any information disclosed to consumer reporting
agencies, thus creating the possibility for conflicts between the rule's
requirements and those of the Fair Credit Reporting Act. They indicated
that areas of potential overlap included: limits on subsequent
disclosures; individual access rights; safeguards; and notice
requirements.
*Response:* We have added to the definition of "payment" disclosure of
certain information to consumer reporting agencies. With respect to the
remaining concerns, this rule does not apply to consumer reporting
agencies if they are not covered entities.
*Comment:* Several commenters recommended prohibiting disclosure of
psychotherapy notes under this provision and under all of the sections
governing disclosure without consent for national priority purposes.
*Response:* We agree that psychotherapy notes should not be disclosed
without authorization for payment purposes, and the final rule does not
allow such disclosure. See the discussion under § 164.508.
***Protected health information*.**
*Comment*: An overwhelmingly large number of commenters urged the
Secretary to expand privacy protection to all individually identifiable
health information, regardless of form, held or transmitted by a covered
entity. Commenters provided many arguments in support of their position.
They asserted that expanding the scope of covered information under the
rule would increase patient confidence in their health care providers
and the health care system in general. Commenters stated that patients
may not seek care or honestly discuss their health conditions with
providers if they do not believe that all of their health information is
confidential. In particular, many suggested that this fear would be
particularly strong with certain classes of patients, such as persons
with disabilities, who may be concerned about potential discrimination,
embarrassment or stigmatization, or domestic violence victims, who may
hide the real cause of their injuries.
In addition, commenters felt that a more uniform standard that covered
all records would reduce the complexity, burden, cost, and enforcement
problems that would result from the NPRM's proposal to treat electronic
and non-electronic records differently. Specifically, they suggested
that such a standard would eliminate any confusion regarding how to
treat mixed records (paper records that include information that has
been stored or transmitted electronically) and would eliminate the need
for health care providers to keep track of which portions of a paper
record have been (or will be) stored or transmitted electronically, and
which are not. Many of these commenters argued that limiting the
definition to information that is or has at one time been electronic
would result in different protections for electronic and paper records,
which they believe would be unwarranted and give consumers a false sense
of security. Other comments argued that the proposed definition would
cause confusion for providers and patients and would likely cause
difficulties in claims processing. Many others complained about the
difficulty of determining whether information has been maintained or
transmitted electronically. Some asked us to explicitly list the
electronic functions that are intended to be excluded, such as voice
mail, fax, etc. It was also recommended that the definitions of
'electronic transmission' and 'electronic maintenance' be deleted. It
was stated that the rule may apply to many medical devices that are
regulated by the FDA. A commenter also asserted that the proposal's
definition was technically flawed in that computers are also involved in
analog electronic transmissions such as faxes, telephone, etc., which is
not the intent of the language. Many commenters argued that limiting the
definition to information that has been electronic would create a
significant administrative burden, because covered entities would have
to figure out how to apply the rule to some but not all information.
Others argued that covering all individually identifiable health
information would eliminate any disincentives for covered entities to
convert from paper to computerized record systems. These commenters
asserted that under the proposed limited coverage, contrary to the
intent of HIPAA's administrative simplification standards, providers
would avoid converting paper records into computerized systems in order
to bypass the provisions of the regulation. They argued that treating
all records the same is consistent with the goal of increasing the
efficiency of the administration of health care services.
Lastly, in the NPRM, we explained that while we chose not to extend our
regulatory coverage to all records, we did have the authority to do so.
Several commenters agreed with our interpretation of the statute and our
authority and reiterated such statements in arguing that we should
expand the scope of the rule in this regard.
*Response:* We find these commenters' arguments persuasive and extend
protections to individually identifiable health information transmitted
or maintained by a covered entity in any form (subject to the exception
for "education records" governed by FERPA and records described at 20
U.S.C. 1232g(a)(4)(B)(iv)). We do so for the reasons described by the
commenters and in our NPRM, as well as because we believe that the
approach in the final rule creates a logical, consistent system of
protections that recognizes the dynamic nature of health information use
and disclosure in a continually shifting health care environment. Rules
that are specific to certain formats or media, such as "electronic" or
"paper," cannot address the privacy threats resulting from evolving
forms of data capture and transmission or from the transfer of the
information from one form to another. This approach avoids the somewhat
artificial boundary issues that stem from defining what is and is not
electronic.
In addition, we have reevaluated our reasons for not extending privacy
protections to all paper records in the NPRM and after review of
comments believe such justifications to be less compelling than we
originally thought. For example, in the NPRM, we explained that we chose
not to cover all paper records in order to focus on the public concerns
about health information confidentiality in electronic communications,
and out of concern that the potential additional burden of covering all
records may not be justified because of the lower privacy risks
presented by records that are in paper form only. As discussed above
however, a great many commenters asserted that dealing with a mixture of
protected and non-protected records is more burdensome, and that public
concerns over health information confidentiality are not at all limited
to electronic communications.
We note that medical devices in and of themselves, for example,
pacemakers, are not protected health information for purposes of this
regulation. However, information in or from the device may be protected
health information to the extent that it otherwise meets the definition.
*Comment:* Numerous commenters argued that the proposed coverage of any
information other than that which is transmitted electronically and/or
in a HIPAA transaction exceeds the Secretary's authority under section
264(c)(1) of HIPAA. The principal argument was that the initial language
in section 264(c)(1) ("If language governing standards with respect to
the privacy of individually identifiable health information transmitted
in connection with the transactions described in section 1173(a) of the
Social Security Act \... is not enacted by \[August 21, 1999\], the
Secretary \... shall promulgate final regulations containing such
standards\...") limits the privacy standards to "information transmitted
in connection with the \[HIPAA\] transactions." The precise argument
made by some commenters was that the grant of authority is contained in
the words "such standards," and that the referent of that phrase was
"standards with respect to the privacy of individually identifiable
health information transmitted in connection with the transactions
described in section 1173(a)\...".
Commenters also argued that this limitation on the Secretary's authority
is discernible from the statutory purpose statement at section 261 of
HIPAA, from the title to section 1173(a) ("Standards to Enable
Electronic Exchange"), and from various statements in the legislative
history, such as the statement in the Conference Report that the
"Secretary would be required to establish standards and modifications to
such standards regarding the privacy of individually identifiable health
information that is in the health information network." H. Rep. No.
104-736,104^th^ Cong., 2d Sess., at 265. It was also argued that
extension of coverage beyond the HIPAA transactions would be
inconsistent with the underlying statutory trade-off between
facilitating accessibility of information in the electronic transactions
for which standards are adopted under section 1173(a) and protecting
that information through the privacy standards.
Other commenters argued more generally that the Secretary's authority
was limited to information in electronic form only, not information in
any other form. These comments tended to focus on the statutory concern
with regulating transactions in electronic form and argued that there
was no need to have the privacy standards apply to information in paper
form, because there is significantly less risk of breach of privacy with
respect to such information.
The primary justifications provided by commenters for restricting the
scope of covered individually identifiable health information under the
regulation were that such an approach would reduce the complexity,
burden, cost, and enforcement problems that would result from a rule
that treats electronic and non-electronic records differently; would
appropriately limit the rule's focus to the security risks that are
inherent in electronic transmission or maintenance of individually
identifiable health information; and would conform these provisions of
the rule more closely with their interpretation of the HIPAA statutory
language.
*Response*: We disagree with these commenters. We believe that
restricting the scope of covered information under the rule consistent
with any of the comments described above would generate a number of
policy concerns. Any restriction in the application of privacy
protections based on the media used to maintain or transmit the
information is by definition arbitrary, unrelated to the potential use
or disclosure of the information itself and therefore not responsive to
actual privacy risks. For example, information contained in a paper
record may be scanned and transmitted worldwide almost as easily as the
same information contained in an electronic claims transaction, but
would potentially not be protected.
In addition, application of the rule to only the standard transactions
would leave large gaps in the amount of health information covered. This
limitation would be particularly harmful for information used and
disclosed by health care providers, who are likely to maintain a great
deal of information never contained in a transaction.
We disagree with the arguments that the Secretary lacks legal authority
to cover all individually identifiable health information transmitted or
maintained by covered entities. The arguments raised by these comments
have two component parts: (1) that the Secretary's authority is limited
by form, to individually identifiable health information in electronic
form only; and (2) that the Secretary's authority is limited by content,
to individually identifiable health information that is contained in
what commenters generally termed the "HIPAA transactions," i.e.,
information contained in a transaction for which a standard has been
adopted under section 1173(a) of the Act.
With respect to the issue of form, the statutory definition of "health
information" at section 1171(4) of the Act defines such information as
"any information, [whether oral or recorded in any form or
medium]{.underline}" (emphasis added) which is created or received by
certain entities and relates to the health condition of an individual or
the provision of health care to an individual (emphasis added).
"Individually identifiable health information", as defined at section
1171(6) of the Act, is information that is created or received by a
subset of the entities listed in the definition of "health information",
relates to the same subjects as "health information," and is, in
addition, individually identifiable. Thus, "individually identifiable
health information" is, as the term itself implies, a subset of "health
information." As "health information," "individually identifiable health
information" means, among other things, information that is "oral or
recorded in any form or medium." Therefore, the statute does not limit
"individually identifiable health information" to information that is in
electronic form only.
With respect to the issue of content, the limitation of the Secretary's
authority to information in HIPAA transactions under section 264(c)(1)
is more apparent than real. While the first sentence of section
264(c)(1) may be read as limiting the regulations to standards with
respect to the privacy of individually identifiable health information
"transmitted in connection with the \[HIPAA\] transactions," what that
sentence in fact states is that the privacy regulations must "contain"
such standards, not be limited to such standards. The first sentence
thus sets a statutory minimum, first for Congress, then for the
Secretary. The second sentence of section 264(c)(1) directs that the
regulations "address at least the subjects in subsection (b) \[of
section 264\]." Section 264(b), in turn, refers only to "individually
identifiable health information", with no qualifying language, and
refers back to subsection (a) of section 264, which is not limited to
HIPAA transactions. Thus, the first and second sentences of section
264(c)(1) can be read as consistent with each other, in which case they
direct the issuance of privacy standards with respect to individually
identifiable health information. Alternatively, they can be read as
ambiguous, in which case one must turn to the legislative history.
The legislative history of section 264 does not reflect the content
limitation of the first sentence of section 264(c)(1). Rather, the
Conference Report summarizes this section as follows: "If Congress fails
to enact privacy legislation, the Secretary is required to develop
standards with respect to privacy of individually identifiable health
information not later than 42 months from the date of enactment."
[Id.]{.underline}, at 270. This language indicates that the overriding
purpose of section 264(c)(1) was to postpone the Secretary's duty to
issue privacy standards (which otherwise would have been controlled by
the time limits at section 1174(a)), in order to give Congress more time
to pass privacy legislation. A corollary inference, which is also
supported by other textual evidence in section 264 and Part C of title
XI, is that if Congress failed to act within the time provided, the
original statutory scheme was to kick in. Under that scheme, which is
set out in section 1173(e) of the House bill, the standards to be
adopted were "standards with respect to the privacy of individually
identifiable health information." Thus, the legislative history of
section 264 supports the statutory interpretation underlying the rules
below.
*Comment*: Many commenters were opposed to the rule covering specific
forms of communication or records that could potentially be considered
covered information, i.e., faxes, voice mail messages, etc. A subset of
these commenters took issue particularly with the inclusion of oral
communications within the scope of covered information. The commenters
argued that covering information when it takes oral form (e.g., verbal
discussions of a submitted claim) makes the regulation extremely costly
and burdensome, and even impossible to administer. Another commenter
also offered that it would make it nearly impossible to discuss health
information over the phone, as the covered entity cannot verify that the
person on the other end is in fact who he or she claims to be.
*Response*: We disagree. Covering oral communications is an important
part of keeping individually identifiable health information private. If
the final rule were not to cover oral communication, a conversation
about a person's protected health information could be shared with
anyone. Therefore, the same protections afforded to paper and
electronically based information must apply to verbal communication as
well. Moreover, the Congress explicitly included "oral" information in
the statutory definition of health information.
*Comment*: A few commenters supported, without any change, the approach
proposed in the NPRM to limit the scope of covered information to
individually identifiable health information in any form once the
information is transmitted or maintained electronically. These
commenters asserted that our statutory authority limited us accordingly.
Therefore, they believed we had proposed protections to the extent
possible within the bounds of our statutory authority and could not
expand the scope of such protections without new legislative authority.
*Response*: We disagree with these commenters regarding the limitations
under our statutory authority. As explained above, we have the authority
to extend the scope of the regulation as we have done in the final rule.
We also note here that most of these commenters who supported the NPRM's
proposed approach, voiced strong support for extending the scope of
coverage to all individually identifiable health information in any
form, but concluded that we had done what we could within the authority
provided.
*Comment*: One commenter argued that the term "transaction" is generally
understood to denote a business matter, and that the NPRM applied the
term too broadly by including hospital directory information,
communication with a patient's family, researchers' use of data and many
other non-business activities.
*Response*: This comment reflects a misunderstanding of our use of the
term "transaction." The uses and disclosures described in the comment
are not "transactions" as defined in § 160.103. The authority to
regulate the types of uses and disclosures described is provided under
section 264 of Pub. L. 104-191. The conduct of the activities noted by
the commenters are not related to the determination of whether a health
care provider is a covered entity. We explain in the preamble that a
health care provider is a covered entity if it transmits health
information in electronic form in connection with transactions referred
to in section 1173(a)(1) of the Act.
*Comment*: A few commenters asserted that the Secretary has no authority
to regulate "use" of protected health information. They stated that
although section 264(b) mentions that the Secretary should address "uses
and disclosures," no other section of HIPAA employs the term "use."
*Response*: We disagree with these commenters. As they themselves note,
the authority to regulate use is given in section 264(b) and is
sufficient.
*Comment*: Some commenters requested clarification as to how certain
types of health information, such as photographs, faxes, X-Rays,
CT-scans, and others would be classified as protected or not under the
rule.
*Response*: All types of individually identifiable health information in
any form, including those described, when maintained or transmitted by a
covered entity are covered in the final rule.
*Comment*: A few commenters requested clarification with regard to the
differences between the definitions of individually identifiable health
information and protected health information.
*Response*: In expanding the scope of covered information in the final
rule, we have simplified the distinction between the two definitions. In
the final rule, protected health information is the subset of
individually identifiable health information that is maintained or
transmitted by covered entity, and thereby protected by this rule. For
additional discussion of protected health information and individually
identifiable health information, see the descriptive summary of §
164.501.
*Comment*: A few commenters remarked that the federal government has no
right to access or control any medical records and that HHS must get
consent in order to store or use any individually identifiable health
information.
*Response*: We understand the commenters' concern. It is not our intent,
nor do we through this rule create any government right of access to
medical records, except as needed to investigate possible violations of
the rule. Some government programs, such as Medicare, are authorized
under other law to gain access to certain beneficiary records for
administrative purposes. However, these programs are covered by the rule
and its privacy protections apply.
*Comment*: Some commenters asked us to clarify how schools would be
treated by the rule. Some of these commenters worried that privacy would
be compromised if schools were exempted from the provisions of the final
rule. Other commenters thought that school medical records were included
in the provisions of the NPRM.
*Response*: We agree with the request for clarification and provide
guidance regarding the treatment of medical records in schools in the
\"Relationship to Other Federal Laws\" preamble discussion of FERPA,
which governs the privacy of education records.
*Comment*: One commenter was concerned that only some information from a
medical chart would be included as covered information. The commenter
was especially concerned that transcribed material might not be
considered covered information.
*Response*: As stated above, all individually identifiable health
information in any form, including transcribed or oral information,
maintained or transmitted by a covered entity is covered under the
provisions of the final rule.
*Comment:* In response to our solicitation of comments on the scope of
the definition of protected health information, many commenters asked us
to narrow the scope of the proposed definition to include only
information in electronic form. Others asked us to include only
information from the HIPAA standard transactions.
*Response:* For the reasons stated by the commenters who asked us to
expand the proposed definition, we reject these comments. We reject
these approaches for additional reasons, as well. Limiting the
protections to electronic information would, in essence, protect
information only as long as it remained in a computer or other
electronic media; the protections in the rule could be avoided simply by
printing out the information. This approach would thus result in the
illusion, but not the reality, of privacy protections. Limiting
protection to information in HIPAA transactions has many of the problems
in the proposed approach: it would fail to protect significant amounts
of health information, would force covered entities to figure out which
information had and had not been in such a transaction, and could cause
the administrative burdens the commenters feared would result from
protecting some but not all information.
*Comment:* A few commenters asserted that the definition of protected
health information should explicitly include "genetic" information. It
was argued that improper disclosure and use of such information could
have a profound impact on individuals and families.
*Response:* We agree that the definition of protected health information
includes genetic information that otherwise meets the statutory
definition. But we believe that singling out specific types of protected
health information for special mention in the regulation text could
wrongly imply that other types are not included.
*Comment:* One commenter recommended that the definition of protected
health information be modified to clarify that an entity does not become
a 'covered entity' by providing a device to an individual on which
protected health information may be stored, provided that the company
itself does not store the individual's health information."
*Response:* We agree with the commenter's analysis, but believe the
definition is sufficiently clear without a specific amendment to this
effect.
*Comment:* One commenter recommended that the definition be amended to
explicitly exclude individually identifiable health information
maintained, used, or disclosed pursuant to the Fair Credit Reporting
Act, as amended, 15 U.S.C. 1681. It was stated that a disclosure of
payment history to a consumer reporting agency by a covered entity
should not be considered protected health information. Another commenter
recommended that health information, billing information, and a
consumer's credit history be exempted from the definition because this
flow of information is regulated by both the Fair Credit Reporting Act
(FCRA) and the Fair Debt Collection Practices Act (FDCPA).
*Response:* We disagree. To the extent that such information meets the
definition of protected health information, it is covered by this rule.
These statutes are designed to protect financial, not health,
information. Further, these statutes primarily regulate entities that
are not covered by this rule, minimizing the potential for overlap or
conflict. The protections in this rule are more appropriate for
protecting health information. However, we add provisions to the
definition of payment which should address these concerns. See the
definition of 'payment' in § 164.501.
*Comment:* An insurance company recommended that the rule require that
medical records containing protected health information include a
notation on a cover sheet on such records.
*Response:* Since we have expanded the scope of protected health
information, there is no need for covered entities to distinguish among
their records, and such a notation is not needed. This uniform coverage
eliminates the mixed record problem and resultant potential for
confusion.
*Comment:* A government agency requested clarification of the definition
to address the status of information that flows through dictation
services.
*Response:* A covered entity may disclose protected health information
for transcription of dictation under the definition of health care
operations, which allows disclosure for "general administrative"
functions. We view transcription and clerical services generally as part
of a covered entity's general administrative functions. An entity
transcribing dictation on behalf of a covered entity meets this rule's
definition of business associate and may receive protected health
information under a business associate contract with the covered entity
and subject to the other requirements of the rule.
*Comment:* A commenter recommended that information transmitted for
employee drug testing be exempted from the definition.
*Response:* We disagree that is necessary to specifically exclude such
information from the definition of protected health information. If a
covered entity is involved, triggering this rule, the employer may
obtain authorization from the individuals to be tested. Nothing in this
rule prohibits an employer from requiring an employee to provide such an
authorization as a condition of employment.
*Comment:* A few commenters addressed our proposal to exclude
individually identifiable health information in education records
covered by FERPA. Some expressed support for the exclusion. One
commenter recommended adding another exclusion to the definition for the
treatment records of students who attend institutions of post secondary
education or who are 18 years old or older to avoid confusion with rules
under FERPA. Another commenter suggested that the definition exclude
health information of participants in "Job Corps programs" as it has for
educational records and inmates of correctional facilities.
*Response:* We agree with the commenter on the potential for confusion
regarding records of students who attend post-secondary schools or who
are over 18, and therefore in the final rule we exclude records defined
at 20 U.S.C. 1232g(a)(4)(B)(iv) from the definition of protected health
information. For a detailed discussion of this change, refer to the
"Relationship to Other Federal Laws" section of the preamble. We find no
similar reason to exclude "Job Corps programs" from the requirements of
this regulation.
*Comment*: Some commenters voiced support for the exclusion of the
records of inmates from the definition of protected health information,
maintaining that correctional agencies have a legitimate need to share
some health information internally without authorization between health
service units in various facilities and for purposes of custody and
security. Other commenters suggested that the proposed exclusion be
extended to individually identifiable health information: created by
covered entities providing services to inmates or detainees under
contract to such facilities; of "former" inmates; and of persons who are
in the custody of law enforcement officials, such as the United States
Marshals Service and local police agencies. They stated that corrections
and detention facilities must be able to share information with law
enforcement agencies such as the United States Marshals Service, the
Immigration and Naturalization Services, county jails, and U.S.
Probation Offices.
Another commenter said that there is a need to have access to records of
individuals in community custody and explained that these individuals
are still under the control of the state or local government and the
need for immediate access to records for inspections and/or drug testing
is necessary.
A number of commenters were opposed to the proposed exclusion to the
definition of protected health information, arguing that the proposal
was too sweeping. Commenters stated that while access without consent is
acceptable for some purposes, it is not acceptable in all circumstances.
Some of these commenters concurred with the sharing of health care
information with other medical facilities when the inmate is transferred
for treatment. These commenters recommended that we delete the exception
for jails and prisons and substitute specific language about what
information could be disclosed and the limited circumstances or purposes
for which such disclosures could occur.
Others recommended omission of the proposed exclusion entirely, arguing
that excluding this information from protection sends the message that,
with respect to this population, abuses do not matter. Commenters argued
that inmates and detainees have a right to privacy of medical records
and that individually identifiable health information obtained in these
settings can be misused, e.g., when communicated indiscriminately,
health information can trigger assaults on individuals with stigmatized
conditions by fellow inmates or detainees. It can also lead to the
denial of privileges, or inappropriately influence the deliberations of
bodies such as parole boards.
A number of commenters explicitly took issue with the exclusion relative
to individuals, and in particular youths, with serious mental illness,
seizure disorders, and emotional or substance abuse disorders. They
argued that these individuals come in contact with criminal justice
authorities as a result of behaviors stemming directly from their
illness and assert that these provisions will cause serious problems.
They argue that disclosing the fact that an individual was treated for
mental illness while incarcerated could seriously impair the
individual's reintegration into the community. Commenters stated that
such disclosures could put the individual or family members at risk of
discrimination by employers and in the community at large.
Some commenters asserted that the rule should be amended to prohibit
jails and prisons from disclosing private medical information of
individuals who have been discharged from these facilities. They argued
that such disclosures may seriously impair individuals' rehabilitation
into society and subject them to discrimination as they attempt to
re-establish acceptance in the community.
*Response:* We find commenters' arguments against a blanket exemption
from privacy protection for inmates persuasive. We agree health
information in these settings may be misused, which consequently poses
many risks to the inmate or detainee and in some cases, their families
as described above by the commenters. Accordingly, we delete this
exception from the definition of "protected health information" in the
final rule. The final rule considers individually identifiable health
information of individuals who are prisoners and detainees to be
protected health information to the extent that it meets the definition
and is maintained or transmitted by a covered entity.
At the same time, we agree with those commenters who explained that
correctional facilities have legitimate needs for use and sharing of
individually identifiable health information inmates without
authorization. Therefore, we add a new provision (§ 164.512(k)(5)) that
permits a covered entity to disclose protected health information about
inmates without individual consent, authorization, or agreement to
correctional institutions for specified health care and other custodial
purposes. For example, covered entities are permitted to disclose for
the purposes of providing health care to the individual who is the
inmate, or for the health and safety of other inmates or officials and
employees of the facility. In addition, a covered entity may disclose
protected health information as necessary for the administration and
maintenance of the safety, security, and good order of the institution.
See the preamble discussion of the specific requirements at §
164.512(k)(5), as well as discussion of certain limitations on the
rights of individuals who are inmates with regard to their protected
health information at §§ 164.506, 164.520, 164.524, and 164.528.
We also provide the following clarifications. Covered entities that
provide services to inmates under contract to correctional institutions
must treat protected health information about inmates in accordance with
this rule and are permitted to use and disclose such information to
correctional institutions as allowed under § 164.512(k)(5).
As to former inmates, the final rule considers such persons who are
released on parole, probation, supervised release, or are otherwise no
longer in custody, to be individuals who are not inmates. Therefore, the
permissible disclosure provision at § 164.512(k)(5) does not apply in
such cases. Instead, a covered entity must apply privacy protections to
the protected health information about former inmates in the same manner
and to the same extent that it protects the protected health information
of other individuals. In addition, individuals who are former inmates
hold the same rights as all other individuals under the rule.
As to individuals in community custody, the final rule considers inmates
to be those individuals who are incarcerated in or otherwise confined to
a correctional institution. Thus, to the extent that community custody
confines an individual to a particular facility, § 164.512(k)(5) is
applicable.
***Psychotherapy notes*.**
*Comment:* Some commenters thought the definition of psychotherapy notes
was contrary to standard practice. They claimed that reports of
psychotherapy are typically part of the medical record and that
psychologists are advised, for ethical reasons and liability risk
management purposes, not to keep two separate sets of notes. Others
acknowledged that therapists may maintain separate notations of therapy
sessions for their own purpose. These commenters asked that we make
clear that psychotherapy notes, at least in summary form, should be
included in the medical record. Many plans and providers expressed
concern that the proposed definition would encourage the creation of
"shadow" records which may be dangerous to the patient and may increase
liability for the health care providers. Some commenters claimed that
psychotherapy notes contain information that is often essential to
treatment.
*Response:* We conducted fact‑finding with providers and other
knowledgeable parties to determine the standard practice of
psychotherapists and determined that only some psychotherapists keep
separate files with notes pertaining to psychotherapy sessions. These
notes are often referred to as "process notes," distinguishable from
"progress notes," \"the medical record,\" or "official records." These
process notes capture the therapist's impressions about the patient,
contain details of the psychotherapy conversation considered to be
inappropriate for the medical record, and are used by the provider for
future sessions. We were told that process notes are often kept separate
to limit access, even in an electronic record system, because they
contain sensitive information relevant to no one other than the treating
provider. These separate \"process notes\" are what we are calling
\"psychotherapy notes.\" Summary information, such as the current state
of the patient, symptoms, summary of the theme of the psychotherapy
session, diagnoses, medications prescribed, side effects, and any other
information necessary for treatment or payment, is always placed in the
patient\'s medical record. Information from the medical record is
routinely sent to insurers for payment.
*Comment:* Various associations and their constituents asked that the
exceptions for psychotherapy notes be extended to health care
information from other health care providers. These commenters argued
that psychotherapists are not the only providers or even the most likely
providers to discuss sensitive and potentially embarrassing issues, as
treatment and counseling for mental health conditions, drug abuse,
HIV/AIDS, and sexual problems are often provided outside of the
traditional psychiatric settings. One writer stated, "A prudent health
care provider will always assess the past and present psychiatric
medical history and symptoms of a patient."
Many commenters believed that the psychotherapy notes should include
frequencies of treatment, results of clinical tests, and summary of
diagnosis, functional status, the treatment plan, symptoms, prognosis
and progress to date. They claimed that this information is highly
sensitive and should not be released without the individual's written
consent, except in cases of emergency. One commenter suggested listing
the types of mental health information that can be requested by third
party payors to make payment determinations and defining the meaning of
each term.
*Response:* As discussed above and in the NPRM, the rationale for
providing special protection for psychotherapy notes is not only that
they contain particularly sensitive information, but also that they are
the personal notes of the therapist, intended to help him or her recall
the therapy discussion and are of little or no use to others not
involved in the therapy. Information in these notes is not intended to
communicate to, or even be seen by, persons other than the therapist.
Although all psychotherapy information may be considered sensitive, we
have limited the definition of psychotherapy notes to only that
information that is kept separate by the provider for his or her own
purposes. It does not refer to the medical record and other sources of
information that would normally be disclosed for treatment, payment, and
health care operations.
*Comment:* One commenter was particularly concerned that the use of the
term "counseling" in the definition of psychotherapy notes would lead to
confusion because counseling and psychotherapy are different
disciplines.
*Response:* In the final rule, we continue to use the term
\"counseling\" in the definition of "psychotherapy." During our
fact‑finding, we learned that "counseling" had no commonly agreed upon
definition, but seemed to be widely understood in practice. We do not
intend to limit the practice of psychotherapy to any specific
professional disciplines.
*Comment:* One commenter noted that the public mental health system is
increasingly being called upon to integrate and coordinate services
among other providers of mental health services and they have developed
an integrated electronic medical record system for state-operated
hospitals, part of which includes psychotherapy notes, and which cannot
be easily modified to provide different levels of confidentiality.
Another commenter recommended allowing use or disclosure of
psychotherapy notes by members of an integrated health care facility as
well as the originator.
*Response:* The final rule makes it clear that any notes that are
routinely shared with others, whether as part of the medical record or
otherwise, are, by definition, not psychotherapy notes, as we have
defined them. To qualify for the definition and the increased
protection, the notes must be created and maintained for the use of the
provider who created them i.e., the originator, and must not be the only
source of any information that would be critical for the treatment of
the patient or for getting payment for the treatment. The types of notes
described in the comment would not meet our definition for psychotherapy
notes.
*Comment:* Many providers expressed concern that if psychotherapy notes
were maintained separately from other protected health information,
other health providers involved in the individual's care would be unable
to treat the patient properly. Some recommended that if the patient does
not consent to sharing of psychotherapy notes for treatment purposes,
the treating provider should be allowed to decline to treat the patient,
providing a referral to another provider.
*Response:* The final rule retains the policy that psychotherapy notes
be separated from the remainder of the medical record in order to
receive additional protection. We based this decision on conversations
with mental health providers who have told us that information that is
critical to the treatment of individuals is normally maintained in the
medical record and that psychotherapy notes are used by the provider who
created them and rarely for other purposes. A strong part of the
rationale for the special treatment of psychotherapy notes is that they
are the personal notes of the treating provider and are of little or no
use to others who were not present at the session to which the notes
refer.
*Comment*: Several commenters requested that we clarify that the
information contained in psychotherapy notes is being protected under
the rule and not the notes themselves. They were concerned that the
protection for psychotherapy notes would not be meaningful if health
plans could demand the same information in a different format.
*Response:* This rule provides special protection for the information in
psychotherapy notes, but it does not extend that protection to the same
information that may be found in other locations. We do not require the
notes to be in a particular format, such as hand-written. They may be
typed into a word processor, for example. Copying the notes into a
different format, per se, would not allow the information to be accessed
by a health plan. However, the requirement that psychotherapy notes be
kept separate from the medical record and solely for the use of the
provider who created them means that the special protection does not
apply to the same information in another location.
***Public health authority*.**
*Comment:* A number of the comments called for the elimination of all
permissible disclosures without authorization, and some specifically
cited the public health section and its liberal definition of public
health authority as an inappropriately broad loophole that would allow
unfettered access to private medical information by various government
authorities.
Other commenters generally supported the provision allowing disclosure
to public health authorities and to non-governmental entities authorized
by law to carry out public health activities. They further supported the
broad definition of public health authority and the reliance on broad
legal or regulatory authority by public health entities although
explicit authorities were preferable and better informed the public.
*Response:* In response to comments arguing that the provision is too
broad, we note that section 1178(b) of the Act, as explained in the
NPRM, explicitly carves out protection for state public health laws.
This provision states that: "\[N\]othing in this part shall be construed
to invalidate or limit the authority, power, or procedures established
under any law providing for the reporting of disease or injury, child
abuse, birth or death, public health surveillance, or public health
investigation or intervention." In light of this broad Congressional
mandate not to interfere with current public health practices, we
believe the broad definition of "public health authority is appropriate
to achieve that end.
*Comment:* Some commenters said that they performed public health
activities in analyzing data and information. These comments suggested
that activities conducted by provider and health plan organizations that
compile and compare data for benchmarking performance, monitoring,
utilization, and determining the health needs of a given market should
be included as part of the public health exemption. One commenter
recommended amending the regulation to permit covered entities to
disclose protected health information to private organizations for
public health reasons.
*Response:* We disagree that such a change should be made. In the
absence of some nexus to a government public health authority or other
underlying legal authority, covered entities would have no basis for
determining which data collections are "legitimate" and how the
confidentiality of the information will be protected. In addition, the
public health functions carved out for special protection by Congress
are explicitly limited to those established by law.
*Comment:* Two commenters asked for additional clarification as to
whether the Occupational Safety and Health Administration (OSHA) and the
Mine Safety and Health Administration (MSHA) would be considered public
health authorities as indicated in the preamble. They suggested specific
language for the final rule. Commenters also suggested that we specify
that states operating OSHA-approved programs also are considered public
health authorities. One comment applauded the Secretary's recognition of
OSHA as both a health oversight agency and public health authority. It
suggested adding OSHA-approved programs that operate in states to the
list of entities included in these categories. In addition, the comment
requested the final regulation specifically mention these entities in
the text of the regulation as well.
*Response:* We agree that OSHA, MSHA and their state equivalents are
public health authorities when carrying out their activities related to
the health and safety of workers. We do not specifically reference any
agencies in the regulatory definition, because the definition of public
health authority and this preamble sufficiently address this issue. As
defined in the final rule, the definition of "public health authority"
at § 164.501 continues to include OSHA as a public health authority.
State agencies or authorities responsible for public health matters as
part of their official mandate, such as OSHA-approved programs, also
come within this definition. *See* discussion of § 164.512(b) below. We
have refrained, however, from listing specific agencies and have
retained a general descriptive definition.
*Comments:* Several commenters recommended expanding the definition of
public health authority to encompass other governmental entities that
may collect and hold health data as part of their official duties. One
recommended changing the definition of public health authority to read
as follows: *public health authority means an agency or authority\...
that is responsible for public health matters or the collection of
health data as part of its official mandate*.
*Response*: We do not adopt this recommendation. The public health
provision is not intended to cover agencies that are not responsible for
public health matters but that may in the course of their
responsibilities collect health-related information. Disclosures to such
authorities may be permissible under other provision of this rule.
*Comment:* Many commenters asked us to include a formal definition of
"required by law" incorporating the material noted in this preamble and
additional suggested disclosures.
*Response:* We agree generally and modify the definition accordingly.
See discussion above.
***Research.***
*Comment:* We received many comments from supporting the proposed
definition of "research." These commenters agreed that the definition of
"research" should be the same as the definition in the Common Rule.
These commenters argued that it was important that the definition of
"research" be consistent with the Common Rule's definition to ensure the
coherent oversight of medical research. In addition, some of these
commenters also supported this definition because they believed it was
already well-understood by researchers and provided reasonably clear
guidance needed to distinguish between research and health care
operations.
Some commenters, believed that the NPRM's definition was too narrow.
Several of these commenters agreed that the Common Rule's definition
should be adopted in the final rule, but argued that the proposed
definition of "generalizable knowledge" within the definition of
"research," which limited generalizable knowledge to knowledge that is
"related to health," was too narrow. For example, one commenter stated
that gun shot wound, spousal abuse, and other kinds of information from
emergency room statistics are often used to conduct research with
ramifications for social policy, but may not be "related to health."
Several of these commenters recommended that the definition of research
be revised to delete the words "related to health." Additional
commenters who argued that the definition was too narrow raised the
following concerns: the difference between "research" and "health care
operations" is irrelevant from the patients' perspective, and therefore,
the proposed rule should have required documentation of approval by an
IRB or privacy board before protected health information could be used
or disclosed for either of these purposes, and the proposed definition
was too limited because it did not capture research conducted by
non-profit entities to ensure public health goals, such as
disease-specific registries.
Commenters who argued that the definition was too broad recommended that
certain activities should be explicitly excluded from the definition. In
general, these commenters were concerned that if certain activities were
considered to be "research" the rule's research requirements would
represent a problematic level of regulation on industry initiatives.
Some activities that these commenters recommended be explicitly excluded
from the definition of "research" included: marketing research, health
and productivity management, quality assessment and improvement
activities, and internal research conducted to improve health.
*Response:* We agree that the final rule's definition of "research"
should be consistent with the Common Rule's definition of this term. We
also agree that our proposal to limit "generalizable knowledge" to
knowledge that is "related to health," and "knowledge that could be
applied to populations outside of the population served by the covered
entity," was too narrow. Therefore, in the final rule, we retain the
Common Rule's definition of "research"and eliminate the further
elaboration of "generalizable knowledge." We understand knowledge to be
generalizable when it can be applied to either a population inside or
outside of the population served by the covered entity. Therefore,
knowledge may be "generalizable" even if a research study uses only the
protected health information held within a covered entity, and the
results are generalizable only to the population served by the covered
entity. For example, generalizable knowledge could be generated from a
study conducted by the HCFA, using only Medicare data held by HCFA, even
if the knowledge gained from the research study is applicable only to
Medicare beneficiaries.
We rejected the other arguments claiming that the definition of
"research"was either too narrow or too broad. While we agree that it is
sometimes difficult to distinguish between "research" and "health care
operations," we disagree that the difference between these activities is
irrelevant from the patients' perspective. We believe, based on many of
the comments, that individuals expect that individually identifiable
health information about themselves will be used for health care
operations such as reviewing the competence or qualifications of health
care professionals, evaluating provider and plan performance, and
improving the quality of care. A large number of commenters, however,
indicated that they did not expect that individually identifiable health
information about themselves would be used for research purposes without
their authorization. Therefore, we retain more stringent protections for
research disclosures without patient authorization.
We also disagree with the commenters who were concerned that the
proposed definition was too limited because it did not capture research
conducted by non-profit entities to ensure public health goals, such as
disease-specific registries. Such activities conducted by either
non-profit or for-profit entities could meet the rule's definition of
research, and therefore are not necessarily excluded from this
definition.
We also disagree with many of the commenters who argued that certain
activities should be explicitly excluded from the definition of
research. We found no persuasive evidence that, when particular
activities are also systematic investigations designed to contribute to
generalizable knowledge, they should be treated any different from other
such activities.
We are aware that the National Bioethics Advisory Commission (NBAC) is
currently assessing the Common Rule's definition of "research" as part
of a report they are developing on the implementation and adequacy of
the Common Rule. Since we agree that a consistent definition is
important to the conduct and oversight of research, if the Common Rule's
definition of "research" is modified in the future, the Department of
Health and Human Services will consider whether the definition should
also be modified for this subpart.
*Comment:* Some commenters urged the Department to establish precise
definitions for "health care operations" and "research" to provide clear
guidance to covered entities and adequate privacy protections for the
subjects of the information whose information is disclosed for these
purposes. One commenter supported the definition of "research" proposed
in the NPRM, but was concerned about the "crossover" from data analyses
that begin as health care operations but later become "research" because
the analytical results are of such importance that they should be shared
through publication, thereby contributing to generalizable knowledge. To
distinguish between the definitions of "health care operations" and
"research," a few commenters recommended that the rule make this
distinction based upon whether the activity is a "use" or a
"disclosure." These commenters recommend that the "use" of protected
health information for research without patient authorization should be
exempt from the proposed research provisions provided that protected
health information was not disclosed in the final analysis, report, or
publication.
*Response:* We agree with commenters that at times it may be difficult
to distinguish projects that are health operations and projects that are
research. We note that this ambiguity exists today, and disagree that we
can address this issue with more precise definitions of research and
health care operations. Today, the issue is largely one of intent. Under
the Common Rule, the ethical and regulatory obligations of the
researcher stem from the intent of the activity. We follow that approach
here. If such a project is a systematic investigation that designed to
develop or contribute to generalizable knowledge, it is considered to be
"research," not "health care operations."
In some instances, the primary purpose of the activity may change as
preliminary results are analyzed. An activity that was initiated as an
internal outcomes evaluation may produce information that could be
generalized. If the purpose of a study changes and the covered entity
does intend to generalize the results, the covered entity should
document the fact as evidence that the activity was not subject to §
164.512(i) of this rule.
We understand that for research that is subject to the Common Rule, this
is not the case. The Office for Human Research Protection interprets 45
CFR 46 to require IRB review as soon as an activity meets the definition
of research, regardless of whether the activity began as "health care
operations" or "public health," for example. The final rule does not
affect the Office of Human Research Protection's interpretation of the
Common Rule.
We were not persuaded that an individual's privacy interest is of less
concern when covered entities use protected health information for
research purposes than when covered entities disclose protected health
information for research purposes. We do not agree generally that
internal activities of covered entities do not potentially compromise
the privacy interests of individuals. Many persons within a covered
entity may have access to protected health information. When the
activity is a systematic investigation, the number of persons who may be
involved in the records review and analysis may be substantial. We
believe that IRB or privacy board approval of the waiver of
authorization will provide important privacy protections to individuals
about whom protected health information is used or disclosed for
research. If a covered entity wishes to use protected health information
about its enrollees for research purposes, documentation of an IRBs' or
privacy board's assessment of the privacy impact of such a use is as
important as if the same research study required the disclosure of
protected health information. This conclusion is consistent with the
Common Rule's requirement for IRB review of all human subjects research.
***Treatment.***
*Comment:* Some commenters advocated for a narrow interpretation of
treatment that applies only to the individual who is the subject of the
information. Other commenters asserted that treatment should be broadly
defined when activities are conducted by health care providers to
improve or maintain the health of the patient. A broad interpretation
may raise concerns about potential misuse of information, but too
limited an interpretation will limit beneficial activities and further
contribute to problems in patient compliance and medical errors.
*Response:* We find the commenters' arguments for a broad definition of
treatment persuasive. Today, health care providers consult with one
another, share information about their experience with particular
therapies, seek advise about how to handle unique or challenging cases,
and engage in a variety of other discussions that help them maintain and
improve the quality of care they provide. Quality of care improves when
providers exchange information about treatment successes and failures.
These activities require sharing of protected health information. We do
not intend this rule to interfere with these important activities. We
therefore define treatment broadly and allow use and disclosure of
protected health information about one individual for the treatment of
another individual.
Under this definition, only health care providers or a health care
provider working with a third party can perform treatment activities. In
this way, we temper the breadth of the definition by limiting the scope
of information sharing. The various codes of professional ethics also
help assure that information sharing among providers for treatment
purposes will be appropriate.
We note that poison control centers are health care providers for
purposes of this rule. We consider the counseling and follow-up
consultations provided by poison control centers with individual
providers regarding patient outcomes to be treatment. Therefore, poison
control centers and other health care providers can share protected
health information about the treatment of an individual without a
business associate contract.
*Comment:* Many commenters suggested that "treatment" activities should
include services provided to both a specific individual and larger
patient populations and therefore urged that the definition of treatment
specifically allow for such activities, sometimes referred to as
"disease management" activities. Some argued that an analysis of an
overall population is integral to determining which individuals would
benefit from disease management services. Thus, an analysis of health
care claims for enrolled populations enables proactive contact with
those identified individuals to notify them of the availability of
services. Certain commenters noted that "disease management" services
provided to their patient populations, such as reminders about
recommended tests based on nationally accepted clinical guidelines, are
integral components of quality health care.
*Response:* We do not agree that population based services should be
considered treatment activities. The definition of "treatment" is
closely linked to the § 160.103 definition of "health care," which
describes care, services and procedures related to the health of an
individual. The activities described by "treatment," therefore, all
involve health care providers supplying health care to a particular
patient. While many activities beneficial to patients are offered to
entire populations or involve examining health information about entire
populations, treatment involves health services provided by a health
care provider and tailored to the specific needs of an individual
patient. Although a population-wide analysis or intervention may prompt
a health care provider to offer specific treatment to an individual, we
consider the population-based analyses to improve health care or reduce
health care costs to be health care operations (see definition of
"health care operations," above).
*Comment:* A number of commenters requested clarification about whether
prescription drug compliance management programs would be considered
"treatment." One commenter urged HHS to clarify that provision by a
pharmacy to a patient of customized prescription drug information about
the risks, benefits, and conditions of use of a prescription drug being
dispensed is considered a treatment activity. Others asked that the
final rule expressly recognize that prescription drug advice provided by
a dispensing pharmacist, such as a customized pharmacy letter, is within
the scope of treatment.
*Response:* The activities that are part of prescription drug compliance
management programs were not fully described by these commenters, so we
cannot state a general rule regarding whether such activities constitute
treatment. We agree that pharmacists' provision of
customized prescription drug information and advice about the
prescription drug being dispensed is a treatment activity. Pharmacists'
provisions of information and counseling about pharmaceuticals to their
customers constitute treatment, and we exclude certain communications
made in the treatment context from the definition of marketing. (See
discussion above.)
*Comment:* Some commenters noted the issues and recommendations raised
in the Institutes of Medicine report 'To Err Is Human' and the critical
need to share information about adverse drug and other medical events,
evaluation of the information, and its use to prevent future medical
errors. They noted that privacy rules should not be so stringent as to
prohibit the sharing of patient data needed to reduce errors and
optimize health care outcomes. To bolster the notion that other programs
associated with the practice of pharmacy must be considered as integral
to the definition of health care and treatment, they reference OBRA '90
(42 U.S.C. 1396r-8) and the minimum required activities for dispensing
drugs; they also note that virtually every state Board of Pharmacy
adopted regulations imposing OBRA'90 requirements on pharmacies for all
patients and not just Medicaid recipients.
*Response:* We agree that reducing medical errors is critical, and do
not believe that this regulation impairs efforts to reduce medical
errors. We define treatment broadly and include quality assessment and
improvement activities in the definition of health care operations.
Covered pharmacies may conduct such activities, as well as treatment
activities appropriate to improve quality and reduce errors. We believe
that respect for the privacy rights of individuals and appropriate
protection of the confidentiality of their health information are
compatible with the goal of reducing medical errors.
*Comment:* Some commenters urged us to clarify that health plans do not
perform "treatment" activities; some of these were concerned that a
different approach in this regulation could cause conflict with state
corporate practice of medicine restrictions. Some commenters believed
that the proposed definition of treatment crossed into the area of cost
containment, which would seem to pertain more directly to payment. They
supported a narrower definition that would eliminate any references to
third party payors. One commenter argued that the permissible disclosure
of protected health information to carry out treatment is too broad for
health plans and that health plans that have no responsibility for
treatment or care coordination should have no authority to release
health information without authorization for treatment purposes.
*Response:* We do not consider the activities of third party payors,
including health plans, to be "treatment." Only health care providers,
not health plans, conduct "treatment" for purposes of this rule. A
health plan may, however, disclose protected health information without
consent or authorization for treatment purposes if that disclosure is
made to a provider. Health plans may have information the provider
needs, for example information from other providers or information about
the patient's treatment history, to develop an appropriate plan of care.
*Comment:* We received many comments relating to "disease management"
programs and whether activities described as disease management should
be included in the definition of treatment. One group of commenters
supported the proposed definition of treatment that includes disease
management. One commenter offered the position that disease management
services are more closely aligned with treatment because they involve
the coordination of treatment whereas health care operations are more
akin to financial and ministerial functions of plans.
Some recommended that the definition of treatment be limited to direct
treatment of individual patients and not allow for sharing of
information for administrative or other programmatic reasons. They
believed that allowing disclosures for disease management opens a
loophole for certain uses and disclosures, such as marketing, that
should only be permitted with authorization. Others recommended that the
definition of disease management be restricted to prevent unauthorized
use of individual health records to target individuals in a health plan
or occupational health program. Many asked that the definition of
disease management be clarified to identify those functions that,
although some might consider them to be subsumed by the term, are not
permitted under this regulation without authorization, such as marketing
and disclosures of protected health information to employers. They
suggested that disease management may describe desirable activities, but
is subject to abuse and therefore should be restricted and controlled.
One commenter recommends that we adopt a portion of the definition
adopted by the Disease Management Association of America in October
1999.
On the other hand, many comments urged that disease management be part
of the "treatment" definition or the "health care operations" definition
and asked that specific activities be included in a description of the
term. They viewed disease management as important element of
comprehensive health care services and cost management efforts. They
recommended that the definition of disease management include services
directed at an entire population and not just individual care, in order
to identify individuals who would benefit from services based on
accepted clinical guidelines. They recommended that disease management
be included under health care operations and include population level
services. A commenter asserted that limiting disease management programs
to the definition of treatment ignores that these programs extend beyond
providers, especially since NCQA accreditation standards strongly
encourage plans and insurers to provide these services.
*Response:* Disease management appeared to represent different
activities to different commenters. Our review of the literature,
industry materials, state and federal statutes,[^6]and discussions with
physician groups, health plan groups and disease management associations
confirm that a consensus definition from the field has not yet evolved,
although efforts are underway. Therefore, rather than rely on this
label, we delete "disease management" from the treatment definition and
instead include the functions often discussed as disease management
activities in this definition or in the definition of health care
operations and modify both definitions to address the commenters'
concerns.
We add population-based activities to improve health care or reduce
health care costs to the definition of health care operations. Outreach
programs as described by the commenter may be considered either health
care operations or treatment, depending on whether population-wide or
patient-specific activities occur, and if patient-specific, whether the
individualized communication with a patient occurs on behalf of health
care provider or a health plan. For example, a call placed by a nurse in
a doctor's office to a patient to discuss follow-up care is a treatment
activity. The same activity performed by a nurse working for a health
plan would be a health care operation. In both cases, the database
analysis that created a list of patients that would benefit from the
intervention would be a health care operation. Use or disclosure of
protected health information to provide education materials to patients
may similarly be either treatment or operations, depending on the
circumstances and on who is sending the materials. We cannot say in the
abstract whether any such activities constitute marketing under this
rule. See §§ 164.501 and 164.514 for details on what communications are
marketing and when the authorization of the individual may be required.
*Comment:* Many commenters were concerned that the definition of
treatment would not permit Third Party Administrators (TPAs) to be
involved with disease management programs without obtaining
authorization. They asserted that while the proposed definition of
treatment included disease management conducted by health care providers
it did not recognize the role of employers and TPAs in the current
disease management process.
*Response:*. Covered entities disclose protected health information to
other persons, including TPAs, that they hire to perform services for
them or on their behalf. If a covered entity hires a TPA to perform the
disease management activities included in the rule's definitions of
treatment and health care operations that disclosure will not require
authorization. The relationship between the covered entity and the TPA
may be subject to the business associate requirements of §§ 164.502 and
164.504. Disclosures by covered entities to plan sponsors, including
employers, for the purpose of plan administration are addressed in §
164.504.
*Comment:* Commenters suggested that as disease management is defined
only as an element of treatment, it could only be carried out by health
care providers, and not health plans. They opposed this approach because
health plans also conduct such programs, and are indeed required to do
it by accreditation standards and HCFA Managed Care Organization
standards.
*Response:* We agree that the placement of disease management in the
proposed definition of treatment suggested that health plans could not
conduct such programs. We revise the final rule to clarify that health
plans may conduct population based care management programs as a health
care operation activity.
*Comment:* Some commenters stated that the rule should require that
disease management only be done with the approval of the treating
physician or at least with the knowledge of the physician.
*Response:* We disagree with this comment because we do not believe that
this privacy rule is an appropriate venue for setting policies regarding
the management of health care costs or treatment.
*Comment:* Some industry groups stated that if an activity involves
selling products, it is not disease management. They asked for a
definition that differentiates use of information for the best interests
of patient from uses undertaken for \"ulterior purposes\" such as
advertising, marketing, or promoting separate products.
*Response:* We eliminate the definition of 'disease management' from the
rule. Often however, treatment decisions involve discussing the relevant
advantages and disadvantages if products and services. Health plans, as
part of payment and operations, sometimes communicate with individuals
about particular products and services. We address these distinctions in
the definitions of marketing and "health care operations" in § 164.501,
and in the requirements for use and disclosure of protected health
information for marketing in § 164.514.
*Comment:* Some health care providers noted that there is a danger that
employers will \"force\" individual employees with targeted conditions
into self-care or compliance programs in ways that violate both the
employee\'s privacy interest and his or her right to control own medical
care.
*Response:* Employers are not covered entities under HIPAA, so we cannot
prohibit them under this rule from undertaking these or other activities
with respect to health information. In § 164.504 we limit disclosure of
health information from group health plans to the employers sponsoring
the plans. However, other federal and/or state laws, such as disability
nondiscrimination laws, may govern the rights of employees under such
circumstances.
*Comment:* Many commenters urged that disease management only be allowed
with the written consent of the individual. Others also desired consent
but suggested that an opt-out would be sufficient. Other commenters
complained that the absence of a definition for disease management
created uncertainty in view of the proposed rule's requirement to get
authorization for marketing. They were concerned that the effect would
be to require patient consent for many activities that are desirable,
not practicably done if authorization is required, and otherwise
classifiable as treatment, payment, or health care operations. Examples
provided include reminders for appointments, reminders to get preventive
services like mammograms, and information about home management of
chronic illnesses.
*Response:* We agree with the commenters who stated that the requirement
for specific authorization for certain activities considered part of
disease management could impede the ability of health plans and covered
providers to implement effective health care management and cost
containment programs. In addition, this approach would require us to
distinguish activities undertaken as part of a formal disease management
program from the same activities undertaken outside the context of
disease management program. For example, we see no clear benefit to
privacy in requiring written authorization before a physician may call a
patient to discuss treatment options in all cases, nor do we see a sound
basis for requiring it only when the physician was following a formal
protocol as part of a population based intervention. We also are not
persuaded that the risk to privacy for these activities warrants a
higher degree of protection than do other payment, health care
operations or treatment activities for which specific authorization was
not suggested by commenters.
*Comment:* A few commenters asked that we clarify that disclosure of
protected health information about a prospective patient to a health
care provider (e.g., a possible admission to an assisted living facility
from a nursing facility) is a treatment activity that does not require
authorization.
*Response:* We agree that the described activity is "treatment," because
it constitutes referral and coordination of health care.
*Comment:* Comments called for the removal of "other services" from the
definition.
*Response:* We disagree with the concept that only health care services
are appropriately included in the treatment definition. We have modified
this definition to instead include "the provision, coordination, or
management of health care and related services." This definition allows
health care providers to offer or coordinate social, rehabilitative, or
other services that are associated with the provision of health care.
Our use of the term "related" prevents "treatment" from applying to the
provision of services unrelated to health care.
*Comment:* Several commenters stated that the definition of treatment
should include organ and tissue recovery activities. They asserted that
the information exchanged and collected to request consent, evaluate
medical information about a potential donor and perform organ recoveries
relates to treatment and are not administrative activities. When
hospitals place a patient on the UNOS list it is transferring
individually identifiable health information. Also, when an organ
procurement organization registers a donor with UNOS it could be
disclosing protected health information. Commenters questioned whether
these activities would be administrative or constitute treatment.
*Response:* In the proposed rule we included in the definition of
"health care" activities related to the procurement or organs, blood,
eyes and other tissues. This final rule deletes those activities from
the definition of "health care." We do so because, while organ and
tissue procurement organizations are integral components of the health
care system, we do not believe that the testing, procurement, and other
procedures they undertake describe "health care" offered to the donors
of the tissues or organs themselves. See the discussion under the
definition of "health care" in § 160.103.
*Comment:* Some commenters recommended including health promotion
activities in the definition of health care.
*Response:* We consider health promotion activities to be preventive
care, and thus within the definition of health care. In addition, such
activities that are population based are included in the definition of
health care operations.
*Comment:* We received a range of comments regarding the proper
placement of case and disease management in the definitions and the
perceived overlap between health care operations and treatment. Some
consider that these activities are a function of improving quality and
controlling costs. Thus, they recommend that the Secretary move risk
assessment, case and disease management to the definition of health care
operations.
*Response:* In response to these comments, we remove these terms from
the definition of treatment and add case management to the definition of
health care operations. We explain our treatment of disease management
in responses to comments above. Whether an activity described as disease
or case management falls under treatment or health care operations would
depend in part on whether the activity is focused on a particular
individual or a population. A single program described as a "case
management" effort may include both health care operations activities
(e.g., records analysis, protocol development, general risk assessment)
and treatment activities (e.g., particular services provided to or
coordinated for an individual, even if applying a standardized treatment
protocol).
*Comment:* We received comments that argued for the inclusion of
"disability management" in the treatment definition. They explained that
through disability management, health care providers refer and
coordinate medical management and they require contemporaneous exchange
of an employee's specific medical data for the provider to properly
manage.
*Response:* To the extent that a covered provider is coordinating health
care services, the provider is providing treatment. We do not include
the term "disability management" because the scope of the activities
covered by that term is not clear. In addition, the commenters did not
provide enough information for us to make a fact-based determination of
how this rule applies to the uses and disclosures of protected health
information that are made in a particular "disability management"
program.
***Use*.**
*Comment*: One commenter asserted that the scope of the proposal had
gone beyond the intent of Congress in addressing uses of information
within the covered entity, as opposed to transactions and disclosures
outside the covered entity. This commenter argued that, although HIPAA
mentions use, it is unclear that the word "use" in the proposed rule is
what Congress intended. The commenter pointed to the legislative history
to argue that "use" is related to an information exchange outside of the
entity.
*Response*: We disagree with the commenter regarding the Congress'
intent. Section 264 of HIPAA requires that the Secretary develop and
send to Congress recommendations on standards with respect to the
privacy of individually identifiable health information (which she did
on September 11, 1997) and prescribes that the recommendations address
among other items "the uses and disclosures of such information that
should be authorized or required." Section 264 explicitly requires the
Secretary to promulgate standards that address at least the subjects
described in these recommendations. It is therefore our interpretation
that Congress intended to cover "uses" as well as disclosures of
individually identifiable health information. We find nothing in the
legislative history to indicate that Congress intended to deviate from
the common meaning of the term "use."
*Comment*: One commenter observed that the definition could encompass
the processing of data by computers to execute queries. It was argued
that this would be highly problematic because computers are routinely
used to identify subsets of data sets. It was explained that in
performing this function, computers examine each record in the data set
and return only those records in the data set that meet specific
criteria. Consequently, a human being will see only the subset of data
that the computer returns. Thus, the commenter stated that it is only
this subset that could be used or disclosed.
*Response*: We interpret "use" to mean only the uses of the product of
the computer processing, not the internal computer processing that
generates the product.
*Comments:* Some commenters asked that the Department clarify that
individualized medical information obtained through a fitness for duty
examination is not subject to the privacy protections under the
regulation.
*Response:* As discussed above, we have clarified that the definition of
"treatment" to include assessments of an individual. If the assessment
is performed by a covered health care provider, the health information
resulting from the assessment is protected health information. We note
that a covered entity is permitted to condition the provision of health
care when the sole purpose is to create protected health information for
the benefit of a third person. See § 164.508(b). For example, a covered
health care provider may condition the provision of a fitness for duty
examination to an individual on obtaining an authorization from the
individual for disclosure to the employer who has requested the
examination.
**SECTION 164.502 - USES AND DISCLOSURES OF PROTECTED HEALTH
INFORMATION: GENERAL RULES**
**Section 164.502(a) -- General Standard**
*Comment:* A few commenters requested an exemption from the rule for the
Social Security and Supplemental Security Income Disability Programs so
that disability claimants can be served in a fair and timely manner. The
commenters were concerned that the proposal would be narrowly
interpreted, thereby impeding the release of medical records for the
purposes of Social Security disability programs.
Another commenter similarly asked that a special provision be added to
the proposal's general rule for uses and disclosures without
authorization for treatment, payment, and health care operations
purposes to authorize disclosure of all medical information from all
sources to the Social Security Administration, including their
contracted state agencies handling disability determinations.
*Response:* A complete exemption for disclosures for these programs is
not necessary. Under current practice, the Social Security
Administration obtains authorization from applicants for providers to
release an individual's records to SSA for disability and other
determinations. Thus, there is no reason to believe that an exemption
from the authorization required by this rule is needed to allow these
programs to function effectively. Further, such an exemption would
reduce privacy protections from current levels. When this rule goes into
effect, those authorizations will need to meet the requirements for
authorization under § 164.508 of this rule.
We do, however, modify other provisions of the proposed rule to
accommodate the special requirements of these programs. In particular,
Social Security Disability and other federal programs, and public
benefits programs run by the states, are authorized by law to share
information for eligibility purposes. Where another public body has
determined that the appropriate balance between need for efficient
administration of public programs and public funds and individuals'
privacy interests is to allow information sharing for these limited
purposes, we do not upset that determination. Where the sharing of
enrollment and eligibility information is required or expressly
authorized by law, this rule permits such sharing of information for
eligibility and enrollment purposes (see § 164.512(k)(6)(i)), and also
excepts these arrangements from the requirements for business associate
agreements (see § 164.502(e)(1)).
*Comment:* A few commenters asked that the rule be revised to authorize
disclosures to clergy, for directory purposes, to organ and tissue
procurement organizations, and to the American Red Cross without patient
authorization.
*Response:* We agree and revise the final rule accordingly. The new
policies and the rationale for these policies are found in §§ 164.510
and 164.512, and the corresponding preamble.
*Comment*: One commenter recommended that the rule apply only to the
"disclosure" of protected health information by covered entities, rather
than to both "use" and "disclosure." The commenter stated that the
application of the regulation to a covered entity's use of individually
identifiable health information offers little benefit in terms of
protecting protected health information, yet imposes costs and may
hamper many legitimate activities, that fall outside the definition of
treatment, payment or health care operations.
Another commenter similarly urged that the final regulation draw
substantive distinctions between restrictions on the "use" of
individually identifiable health information and on the "disclosure" of
such information, with broader latitude for "uses" of such information.
The commenter believed that internal "uses" of such information
generally do not raise the same issues and concerns that a disclosure of
that information might raise. It was argued that any concerns about the
potential breadth of use of this information could be addressed through
application of the "minimum necessary" standard. The commenter also
argued that Congressional intent was that a "disclosure" of individually
identifiable health information is potentially much more significant
than a "use" of that information.
*Response*: We do not accept the commenter's broad recommendation to
apply the regulation only to the "disclosure" of protected health
information and not to "use" of such information. Section 264 charges
the Secretary with promulgating standards that address, among other
things, "the uses and disclosures" of individually identifiable health
information. We also do not agree that applying the regulation to "use"
offers little benefit to protecting protected health information. The
potential exists for misuse of protected health information within
entities. This potential is even greater when the covered entity also
provides services or products outside its role as a health care
provider, health plan, or health care clearinghouse for which "use" of
protected health information offers economic benefit to the entity. For
example, if this rule did not limit "uses" generally to treatment,
payment and health care operations, a covered entity that also offered
financial services could be able to use protected health information
without authorization to market or make coverage or rate decisions for
its financial services products. Without the minimum necessary standard
for uses, a hospital would not be constrained from allowing their
appointment scheduling clerks free access to medical records.
We agree, however, that it is appropriate to apply somewhat different
requirements to uses and disclosures of protected health information
permitted by this rule. We therefore modify the application of the
minimum necessary standard to accomplish this. See the preamble to §
164.514 for a discussion of these changes.
*Comment:* A commenter argued that the development, implementation, and
use of integrated computer-based patient medical record systems, which
requires efficient information sharing, will likely be impeded by
regulatory restrictions on the "use" of protected health information and
by the minimum necessary standard.
*Response:* We have modified the proposed approach to regulating "uses"
of protected health information within an entity, and believe our policy
is compatible with the development and implementation of computer-based
medical record systems. In fact, we drew part of the revised policy on
"minimum necessary" use of protected health information from the
role-based access approach used in several computer-based records
systems today. These policies are described further in § 164.514.
*Comment:* One commenter asked that the general rules for uses and
disclosures be amended to permit covered entities to disclose protected
health information for purposes relating to property and casualty
benefits. The commenter argued that the proposal could affect its
ability to obtain protected health information from covered entities,
thereby constricting the flow of medical information needed to
administer property and casualty benefits, particularly in the workers'
compensation context. It was stated that this could seriously impede
property and casualty benefit providers' ability to conduct business in
accordance with state law.
*Response:* We disagree that the rule should be expanded to permit all
uses and disclosures that relate to property and casualty benefits. Such
a broad provision is not in keeping with protecting the privacy of
individuals. Although we generally lack the authority under HIPAA to
regulate the practices of this industry, the final rule addresses when
covered entities may disclose protected health information to property
and casualty insures. We believe that the final rule permits property
and casualty insurers to obtain the protected health information that
they need to maintain their promises to their policyholders. For
example, the rule permits a covered entity to use or disclose protected
health information relating to an individual when authorized by the
individual. Property and casualty insurers are free to obtain
authorizations from individuals for release by covered entities of the
health information that the insurers need to administer claims, and this
rule does not affect their ability to condition payment on obtaining
such an authorization from insured individuals. Property and casualty
insurers providing payment on a third-party basis have an opportunity to
obtain authorization from the individual and to condition payment on
obtaining such authorization. The final rule also permits covered
entities to make disclosures to obtain payment, whether from a health
plan or from another person such as a property and casualty insurer. For
example, where an automobile insurer is paying for medical benefits on a
first-party basis, a health care provider may disclose protected health
information to the insurer as part of a request for payment. We also
include in the final rule a new provision that permits covered entities
to use or disclose protected health information as authorized by
workers' compensation or similar programs established by law addressing
work-related injuries or illness. See § 164.512(l). These statutory
programs establish channels of information sharing that are necessary to
permit compensation of injured workers.
*Comment*: A few commenters suggested that the Department specify
"prohibited" uses and disclosures rather than "permitted" uses and
disclosures.
*Response:* We reject these commenters' because we believe that the best
privacy protection in most instances is to require the individual's
authorization for use or disclosure of information, and that the role of
this rule is to specify those uses and disclosures for which the balance
between the individuals' privacy interest and the public's interests
dictates a different approach. The opposite approach would require us to
anticipate the much larger set of all possible uses of information that
do not implicate the public's interest, rather than to specify the
public interests that merit regulatory protection.
*Comment:* A commenter recommended that the rule be revised to more
strongly discourage the use of individually identifiable health
information where de-identified information could be used.
*Response:* We agree that the use of de-identified information wherever
possible is good privacy practice. We believe that by requiring covered
entities to implement these privacy restrictions only with respect to
individually identifiable health information, the final rule strongly
encourages covered entities to use de-identified information as much as
practicable.
*Comment:* One commenter recommended that when information from health
records is provided to authorized external users, this information
should be accompanied by a statement prohibiting use of the information
for other than the stated purpose; prohibiting disclosure by the
recipient to any other party without written authorization from the
patient, or the patient\'s legal representative, unless such information
is urgently needed for the patient\'s continuing care or otherwise
required by law; and requiring destruction of the information after the
stated need has been fulfilled.
*Response:* We agree that restricting other uses or re-disclosure of
protected health information by a third party that may receive the
information for treatment, payment, and health care operations purposes
or other purposes permitted by rule would be ideal with regard to
privacy protection. However, as described elsewhere in this preamble,
once protected health information leaves a covered entity the Department
no longer has jurisdiction under the statute to apply protections to the
information. Since we would have no enforcement authority, the costs and
burdens of requiring covered entities to produce and distribute such a
statement to all recipients of protected heath information, including
those with whom the covered entity has no on-going relationship, would
outweigh any benefits to be gained from such a policy. Similarly, where
protected health information is disclosed for routine treatment, payment
and operations purposes, the sheer volume of these disclosures makes the
burden of providing such a statement unacceptable. Appropriate
protection for these disclosures requires law or regulation directly
applicable to the recipient of the information, not further burden on
the disclosing entity. Where, however, the recipient of protected health
information is providing a service to or on behalf of the covered entity
this balance changes. It is consistent with long-standing legal
principles to hold the covered entity to a higher degree of
responsibility for the actions of its agents and contractors. See §
164.504 for a discussion of the responsibilities of covered entities for
the actions of their business associates with respect to protected
health information.
**Section 164.502(b) -- Minimum Necessary**
Comments on the minimum necessary standard are addressed in the preamble
to § 164.514(d).
**Section 164.502(c) -- Uses or Disclosures of Protected Health
Information Subject to an Agreed Upon Restriction**
Comments on the agreed upon restriction standard are addressed in the
preamble to § 164.522(a).
**Section 164.502(d) -- Uses and Disclosures of De-Identified Protected
Health Information**
Comments on the requirements for de-identifying information are
addressed in the preamble to § 164.514(a)-(c).
**Section 164.502(e) -- Business Associates**
Comments on business associates are addressed in the preamble to §
164.504(e).
**Section 164.502(f) -- Deceased Individuals**
*Comment:* Most commenters on this topic generally did not approve of
the Secretary's proposal with regard to protected health information
about deceased individuals. The majority of these commenters argued that
our proposal was not sufficiently protective of such information.
Commenters agreed with the statements made in the preamble to the
proposed rule that the privacy concerns addressed by this policy are not
limited to the confidential protection of the deceased individual but
instead also affects the decedent's family, as genetic information and
information pertinent to hereditary diseases and risk factors for
surviving relatives and direct family members may be disclosed through
the disclosure of the deceased individual's confidential data. It was
argued that the proposal would be inadequate to protect the survivors
who could be negatively affected and in most cases will outlive the
two-year period of protection. A number of medical associations asserted
that individuals may avoid genetic testing, diagnoses, and treatment and
suppress information important to their health care if they fear family
members will suffer discrimination from the release of their medical
information after their death. One commenter pointed out that ethically
little distinction can be made between protecting an individual's health
information during life and protecting it post-mortem. Further, it was
argued that the privacy of the deceased individual and his or her family
is far more important than allowing genetic information to be abstracted
by an institutional or commercial collector of information. A few
commenters asked that we provide indefinite protection on the protected
health information about a deceased person contained in psychotherapy
notes. One commenter asked that we extend protections on records of
children who have died of cancer for the lifetime of a deceased child's
siblings and parents.
The majority of commenters who supported increased protections on the
protected health information about the deceased asked that we extend
protections on such information indefinitely or for as long as the
covered entity maintains the information. It was also argued that the
administrative burden of perpetual protection would be no more
burdensome than it is now as current practice is that the
confidentiality of identifiable patient information continues after
death. A number of others pointed out that there was no reason to set a
different privacy standard for deceased individuals than we had for
living individuals and that it has been standard practice to release the
information of deceased individuals with a valid consent of the
executor, next of kin, or specific court order. In addition, commenters
referenced Hawaii's health care information privacy law (see Haw. Rev.
Stat. section 323C-43) as at least one example of a state law where the
privacy and access provisions of the law continue to apply to the
protected health information of a deceased individual following the
death of that individual.
*Response:* We find the arguments raised by these commenters persuasive.
We have reconsidered our position and believe these arguments for
maintaining privacy on protected health information without temporal
limitations outweigh any administrative burdens associated with
maintaining such protections. As such, in the final rule we revise our
policy to extend protections on the protected health information about a
deceased individual to remain in effect for as long as the covered
entity maintains the information.
For purposes of this regulation, this means that, except for uses and
disclosures for research purposes (see § 164.512(i)), covered entities
must under this rule protect the protected health information about a
deceased individual in the same manner and to the same extent as
required for the protected health information of living individuals.
This policy alleviates the burden on the covered entity from having to
determine whether or not the person has died and if so, how long ago,
when determining whether or not the information can be released.
*Comment:* One commenter asked us to delete our standard for deceased
individuals, asserting that the deceased have no constitutional right to
privacy and state laws are sufficient to maintain protections for
protected health information about deceased individuals.
*Response:* We understand that traditional privacy law has historically
stripped privacy protection on information at the time the subject of
the information dies. However, as we pointed out in the preamble to the
proposed rule, the dramatic proliferation of electronic-based
interchanges and maintenance of information has enabled easier and more
ready access to information that once may have been *de facto* protected
for most people because of the difficulty of its collection and
aggregation. It is also our understanding that current state laws vary
widely with regard to the privacy protection of a deceased individual's
individually identifiable health information. Some are less protective
than others and may not take into account the implications of disclosure
of genetic and hereditary information on living individuals. For these
reasons, a regulatory standard is needed here in order to adequately
protect the privacy interests of those who are living.
*Comment:* Another commenter expressed concern over the administrative
problems that the proposed standard would impose, particularly in the
field of retrospective health research.
*Response:* For certain research purposes, we permit a covered entity to
use and disclose the protected health information of a deceased
individual without authorization by a personal representative and absent
review by an IRB or privacy board. The verification standard (§
164.514(h)) requires that covered entities obtain an oral or written
representation that the protected health information sought will be used
or disclosed solely for research, and § 164.512(i)(1)(iii) requires the
covered entity to obtain from the researcher documentation of the death
of the individual. We believe the burden on the covered entity will be
small, because it can reasonably rely on the representation of purpose
and documentation of death presented by the researcher.
*Comment:* A few commenters argued that the standard in the proposed
rule would cause significant administrative burdens on their record
retention and storage policies. Commenters explained that they have
internal policy record-retention guidelines which do not envision the
retention of records beyond a few years. Some commenters complained
about the burden of having to track dates of death, as the commenters
are not routinely notified when an individual has died.
*Response:* The final rule does not dictate any record retention
requirements for the records of deceased individuals. Since we have
modified the NPRM to cover protected health information about deceased
individuals for as long as the covered entity maintains the information,
there will be no need for the covered entity to track dates of death.
*Comment:* A few commenters voiced support for the approach proposed in
the proposal to maintain protections for a period of two years.
*Response:* After consideration of public comments, we chose not to
retain this approach because the two-year period would be both
inadequate and arbitrary. As discussed above, we agree with commenter
arguments in support of providing indefinite protection.
*Comment:* A few commenters expressed concern that the regulations may
be interpreted as providing a right of access to a deceased's records
only for a two-year period after death. They asked the Department to
clarify that the right of access of an individual, including the
representatives of a deceased individual, exists for the entire period
the information is held by a covered entity.
*Response:* We agree with these comments, given the change in policy
discussed above.
*Comment:* A few commenters suggested that privacy protections on
protected health information about deceased individuals remain in effect
for a specified time period longer than 2 years, arguing that two years
was not long enough to protect the privacy rights of living individuals.
These commenters, however, were not in agreement as to what other period
of protection should be imposed, suggesting various durations from 5 to
20 years.
*Response:* We chose not to extend protections in this way because
specifying another time period would raise many of the same concerns
voiced by the commenters regarding our proposed two year period and
would not reduce the administrative burden of having to track or learn
dates of death. We believe that the policy in this final rule extending
protections for as long as the covered entity maintains the information
addresses commenter concerns regarding the need for increased
protections on the protected health information about the deceased.
*Comment:* Some commenters asserted that information on the decedent
from the death certificate is important for assessment and research
purposes and requested that the Department clarify accordingly that
death certificate data be allowed for use in traditional public health
assessment activities.
*Response:* Nothing in the final rule impedes reporting of death by
covered entities as required or authorized by other laws, or access to
death certificate data to the extent that such data is available
publicly from non-covered entities. Death certificate data maintained by
a covered entity is protected health information and must only be used
or disclosed by a covered entity in accordance with the requirements of
this regulation. However, the final rule permits a covered entity to
disclose protected health information about a deceased individual for
research purposes without authorization and absent IRB or privacy board
approval.
*Comment:* A few commenters asked that we include in the regulation a
mechanism to provide for notification of date of death. These commenters
questioned how a covered entity or business partner would be notified of
a death and subsequently be able to determine whether the two-year
period of protection had expired and if they were permitted to use or
disclose the protected health information about the deceased. One
commenter further stated that absent such a mechanism, a covered entity
would continue to protect the information as if the individual were
still living. This commenter recommended that the burden for providing
notification and confirmation of death be placed on any authorized
entity requesting information from the covered entity beyond the
two-year period.
*Response:* In general, such notification is no longer necessary as,
except for uses and disclosures for research purposes, the final rule
protects the protected health information about a deceased individual
for as long as the covered entity holds the record. With regard to uses
and disclosures for research, the researcher must provide covered
entities with appropriate documentation of proof of death, the burden is
not on the covered entity.
*Comment:* A few commenters pointed to the sensitivity of genetic and
hereditary information and its potential impact on the privacy of living
relatives as a reason for extending protections on the information about
deceased individuals for as long as the covered entity maintains the
information. However, a few commenters recommended additional
protections for genetic and hereditary information. For example, one
commenter suggested that researchers should be able to use sensitive
information of the deceased but then be required to publish findings in
de-identified form. Another commenter recommended that protected health
information about a deceased individual be protected as long as it
implicates health problems that could be developed by living relatives.
*Response:* We agree with many of the commenters regarding the
sensitivity of genetic or hereditary information and, in part for this
reason, extended protections on the protected health information of
deceased individuals. Our reasons for retaining the exception for
research are explained above.
We agree with and support the practice of publishing research findings
in de-identified form. However, we cannot regulate researchers who are
not otherwise covered entities in this regulation.
*Comment:* One commenter asked that the final rule allow for disclosure
of protected health information to funeral directors as necessary for
facilitating funeral and disposition arrangements. The commenter
believed that our proposal could seriously disrupt a family's ability to
make funeral arrangements as hospitals, hospices, and other health care
providers would not be allowed to disclose the time of death and other
similar information critical to funeral directors for funeral
preparation. The commenter also noted that funeral directors are already
precluded by state licensing regulations and ethical standards from
inappropriately disclosing confidential information about the deceased.
Further, the commenter stated that funeral directors have legitimate
needs for protected health information of the deceased or of an
individual when death is anticipated. For example, often funeral
directors are contacted when death is foreseen in order to begin the
process of planning funeral arrangements and prevent unnecessary delays.
In addition, the embalming of the body is affected by the medical
condition of the body.
In addition, it was noted that funeral directors need to be aware of the
presence of a contagious or infectious disease in order to properly
advise family members of funeral and disposition options and how they
may be affected by state law. For example, certain states may prohibit
cremation of remains for a certain period unless the death was caused by
a contagious or infectious disease, or prohibit family members from
assisting in preparing the body for disposition if there is a risk of
transmitting a communicable disease from the corpse.
*Response:* We agree that disclosures to funeral directors for the above
purposes should be allowed. Accordingly, the final rule at §
164.512(g)(2) permits covered entities to disclose protected health
information to funeral directors, consistent with applicable law, as
necessary to carry out their duties with respect to the decedent. Such
disclosures are also permitted prior to, and in reasonable anticipation
of, the individual's death.
*Comment:* Several commenters urged that the proposed standard for
deceased individuals be clarified to allow access by a family member who
has demonstrated a legitimate health-related reason for seeking the
information when there is no executor, administrator, or other person
authorized under applicable law to exercise the right of access of the
individual.
Another commenter asked that the rule differentiate between blood
relatives and family members and address their different access
concerns, such as with genetic information versus information about
transmittable diseases. They also recommended that the regulation allow
access to protected health information by blood-related relatives prior
to the end of the two-year period and provide them with the authority to
extend the proposed two-year period of protection if they see fit.
Lastly, the commenter suggested that the regulation address the concept
of when the next-of-kin may not be appropriate to control a deceased
person's health information.
*Response:* We agree that family members may need access to the
protected health information of a deceased individual, and this
regulation permits such disclosure in two ways. First, a family member
may qualify as a "personal representative" of the individual (see §
164.502(g)). Personal representatives include anyone who has authority
to act on behalf of a deceased individual or such individual's estate,
not just legally-appointed executors. We also allow disclosure of
protected health information to health care providers for purposes of
treatment, including treatment of persons other than the individual.
Thus, where protected health information about a deceased person is
relevant to the treatment of a family member, the family member's
physician may obtain that information. Because we limit these
disclosures to disclosures for treatment purposes, there is no need to
distinguish between disclosure of information about communicable
diseases and disclosure of genetic information.
With regard to fitness to control information, we defer to existing
state and other laws that address this matter.
**Section 164.502(g) -- Personal Representative**
*Comment:* It was observed that under the proposed regulation, legal
representatives with "power of attorney" for matters unrelated to health
care would have unauthorized access to confidential medical records.
Commenters recommended that access to a person's protected health
information be limited to those representatives with a "power of
attorney" for health care matters only. Related comments asked that the
rule limit the definition of "power of attorney" to include only those
instruments granting specific power to deal with health care functions
and health care records.
*Response:* We have deleted the reference to "power of attorney." Under
the final rule, a person is a personal representative of a living
individual if, under applicable law, such person has authority to act on
behalf of an individual in making decisions related to health care.
"Decisions relating to health care" is broader than consenting to
treatment on behalf of an individual; for example, it would include
decisions relating to payment for health care. We clarify that the
rights and authorities of a personal representative under this rule are
limited to protected health information relevant to the rights of the
person to make decisions about an individual under other law. For
example, if a husband has the authority only to make health care
decisions about his wife in an emergency, he would have the right to
access protected health information related to that emergency, but he
may not have the right to access information about treatment that she
had received ten years ago.
We note that the rule for deceased individuals differs from that of
living individuals. A person may be a personal representative of a
deceased individual if they have the authority to act on behalf of such
individual or such individual's estate for any decision, not only
decisions related to health care. We create a broader scope for a person
who is a personal representative of a deceased individual because the
deceased individual can not request that information be disclosed
pursuant to an authorization, whereas a living individual can do so.
*Comment:* Some commenters asked that the NPRM provision allowing
informal decision-makers access to the protected health information of
an incapacitated individual should be maintained in the final rule.
*Response:* We agree with the commenters, and retain permission for
covered entities to share protected health information with informal
decision makers, under conditions specified in § 164.510(b). A person
need not be a personal representative for such disclosure of protected
health information to be made to an informal decision-maker.
*Comment:* Commenters urged that individuals with mental retardation,
who can provide verbal agreement or authorization, should have control
over dissemination of their protected health information, in order to
increase the privacy rights of such individuals.
*Response*: Individuals with mental retardation have control over
dissemination of their protected health information under this rule to
the extent that state law provides such individuals with the capacity to
act on their own behalf. We note that a covered entity need not disclose
information pursuant to a consent or authorization. Therefore, even if
state law determines that an individual with mental retardation is not
competent to act and a personal representative provides authorization
for a disclosure, a covered entity may choose not to disclose such
information if the individual who lacks capacity to act expresses his or
her desire that such information not be disclosed.
*Comment:* A commenter suggested that the final rule should provide
health plans with a set of criteria for formally identifying an
incapacitated individual's decision-maker. Such criteria would give
guidance to health plans that would help in not releasing information to
the wrong person.
*Response*: The determination about who is a personal representative
under this rule is based on state or other applicable law. We require
that a covered entity verify the authority of a personal representative,
in accordance with § 164.514(h) in order to disclose information to such
person.
*Comment:* Commenters were troubled by the inclusion of minors in the
definition of "individual" and believed that the presumption should be
that parents have the right to care for their children.
*Response:* We agree that a parent should have access to the protected
health information about their unemancipated minor children, except in
limited circumstances based on state law. The approach in the final rule
helps clarify this policy. The definition of "individual" is simplified
in the final rule to "the person who is the subject of protected health
information." (§ 164.501). We created a new section (§ 164.502(g)) to
address "personal representatives," which includes parents and guardians
of unemancipated minors. Generally, we provide that if under applicable
law a parent has authority to act on behalf of an unemancipated minor in
making decisions relating to health care about the minor, a covered
entity must treat the parent as the personal representative with respect
to protected health information relevant to such personal
representation. The regulation provides only three limited exceptions to
this rule based upon current state law and physician practice.
*Comment:* Many commenters agreed with our approach in the NPRM to give
minors who may lawfully access health care the rights to control the
protected health information related to such health care.
Several commenters disagreed with this approach and recommended that
where states allow minors too much independence from parents, the rule
should not defer to state law. One commenter suggested that we give an
individual the right to control protected health information only when
the individual reaches the age of majority.
*Response:* In the final rule, the parent, as the personal
representative of a minor child, controls the protected health
information about the minor, except that the parent does not act as a
personal representative of the minor under the rule in three limited
circumstances based on state consent law and physician practice. The
final rule defers to consent laws of each state and does not attempt to
evaluate the amount of control a state gives to a parent or minor. If a
state provides an alternative means for a minor to obtain health care,
other than with the consent of a parent, this rule preserves the system
put in place by the state.
The first two exceptions, whereby a parent is not the personal
representative for the minor and the minor can act for himself or
herself under the rule, occur if the minor consents to a health care
service, and no other consent to such health care service is required by
law, or when the minor may lawfully obtain a health care service without
the consent of a parent, and the minor, a court, or another person
authorized by law consents to such service. The third exception is based
on guidelines of the American Pediatric Association, current practice,
and agreement by parents. If a parent assents to an agreement of
confidentiality between a covered provider and a minor with respect to a
health care service, the parent is not the personal representative of
the minor with respect to the protected health information created or
received subject to that confidentiality agreement. In such
circumstances, the minor would have the authority to act as an
individual, with respect to such protected health information.
*Comment:* Some commenters requested that we permit minors to exercise
the rights of an individual when applicable law requires parental
notification as opposed to parental consent.
*Response:* We adopt this policy in the final rule. If the minor
consents to a health care service, and no other consent to such health
care service is required by law, regardless of whether the consent of
another person has also been obtained or notification to another person
has been given, only the minor may be treated as the individual with
respect to the protected health information relating to such health care
service. The rule does not affect state law that authorizes or requires
notification to a parent of a minor's decision to obtain a health care
service to the extent authorized or required by such law. In addition,
state parental notification laws do not affect the rights of minors
under this regulation.
*Comment:* Some commenters requested clarification that when a minor may
obtain a health care service without parental consent and voluntarily
chooses to involve a parent, the minor retains the rights, authorities
and confidentiality protections established in this rule.
*Response:* We agree that minors should be encouraged to voluntarily
involve a parent or other responsible adult in their health care
decisions. The rule is not intended to require that minors choose
between involving a parent and maintaining confidentiality protections.
We have added language in § 164.502(g)(3)(i) to clarify that when a
minor consents to a health care service and no other consent is required
by law, if the minor voluntarily chooses to involve a parent or other
adult, the minor nonetheless maintains the exclusive ability to exercise
their rights under the rule. This is true even if a parent or other
person also has consented to the health care service for which the minor
lawfully consented. Under the rule, a minor may involve a parent and
still preserve the confidentiality of their protected health
information. In addition, a minor may choose to have a parent act as his
or her personal representative even if the minor could act on his or her
own behalf under the rule. If the minor requests that a covered entity
treat a parent as his or her personal representative, the covered entity
must treat such person as the minor's personal representative even if
the minor consents to a health care service and no other consent to such
health care service is required by law.
*Comment:* Some commenters requested that the rule provide for the
preservation of patient confidences if a health care provider and a
minor patient enter into an agreement of confidentiality and a parent
assents to this arrangement.
*Response:* We have addressed this concern in the final rule by adding a
provision that ensures that a minor maintains the confidentiality
protections provided by the rule for information that is created or
received pursuant to a confidential communication between a provider and
a minor when the minor's parent assents to an agreement of
confidentiality between the provider and the minor. (§
164.502(g)(3)(ii))*.* The American Academy of Pediatrics *Guidelines for
Health Supervision III*, which are meant to serve as "a framework to
help clinicians focus on important issues at developmentally appropriate
time intervals," recommends that physicians interview children alone
beginning at the age of twelve (or as early as the age of ten if it is
comfortable for the child). This recommendation is based on the fact
that adolescents tend to underutilize existing health care resources, in
part, because of a concern for confidentiality.[^7] The recommended
interview technique in the *Guidelines* states that the provider discuss
the rules of confidentiality with the adolescent and the parent and that
the adolescent's confidentiality should be respected. We do not intend
to interfere with these established protocols or current practices.
Covered entities will need to establish procedures to separate protected
health information over which the minor maintains control from protected
health information with respect to which the minor's parent has rights
as a personal representative of the minor.
A covered provider may disclose protected health information to a
parent, regardless of a confidentiality agreement, if there is an
imminent threat to the minor or another person, in accordance with §
164.512(j)(1)(i).
*Comment:* Several commenters suggested that we add a provision in the
final rule to provide minors and parents with concurrent rights under
certain circumstances, particularly when the minor reaches 16 years of
age or when a parent authorizes his or her minor child to exercise these
rights concurrently.
*Response:* We do not add such provision in the final rule. We believe
that establishing concurrent rights through this rule could result in
problems that effect the quality of health care if the minor and the
parent were to disagree on the exercise of their rights. The rule would
not prevent a parent from allowing a minor child to make decisions about
his or her protected health information and acting consistently with the
minor's decision. In all cases, either the parent has the right to act
for the individual with respect to protected health information, or the
minor has the right to act for himself or herself. The rule does not
establish concurrent rights for parents and minors.
*Comment:* Commenters requested clarification about the rights of an
adult or emancipated minor with respect to protected health information
concerning health care services rendered while the person was an
unemancipated minor.
*Response:* Once a minor becomes emancipated or attains the age of
majority, as determined by applicable state law, the parent is no longer
the personal representative under § 164.502(g)(3) of such individual,
unless the parent has the authority to act on behalf of the individual
for some reason other than their authority as a parent. An adult or
emancipated minor has rights under the rule with respect to all
protected health information about them, including information obtained
while the individual was an unemancipated minor.
*Comment:* One commenter pointed out that language in the definition of
individual in the NPRM that grants a minor the rights of an individual
when he or she "lawfully receives care without the consent of, or
notification to, a parent . . ." would have the effect of granting
rights to an infant minor who receives emergency care when the parent is
not available.
*Response:* This result was not our intent. We have changed the language
in § 164.502(g)(3)(i) of the final rule to provide a minor the right to
act as an individual when the minor can obtain care without the consent
of a parent and the minor consents to such care. Because an infant
treated in an emergency situation would not be able to consent to care,
the infant's parent would be treated as the personal representative of
the infant. Section 164.502(g)(3)(ii) provides that the parent is not
the personal representative of the minor under the rule if the minor may
obtain health care without the consent of a parent and the minor, a
court, or another person authorized by law consents to such service. If
an infant obtains emergency care without the consent of a parent, a
health care provider may provide such care without consent to treatment.
This situation would fall outside the second exception, and the parent
would remain the personal representative of the minor.
*Comment:* Commenters were concerned about the interaction of this rule
with FERPA with respect to parents' right to access the medical records
of their children.
*Response:* We direct the commenters to a discussion of the interaction
between our rule and FERPA in the \"Relationship to Other Federal Laws\"
section of the preamble.
**Section 164.502(h) -- Confidential Communications**
Comments on confidential communications are addressed in the preamble to
§ 164.522(b).
**Section 164.502(i) -- Uses and Disclosures Consistent with Notice**
Comments on the notice requirements are addressed in the preamble to §
164.520.
**Section 164.502(j) -- Uses and Disclosures by Whistleblowers and
Workforce Crime Victims**
*Comments:* Some commenters wanted to see more limitations put on the
ability to whistleblow in the final rule. These commenters were
concerned about how disclosed protected health information would be used
during and subsequent to the whistleblowing event and felt that adding
additional limitations to the ability to whistleblow would help to
alleviate these concerns. Some of these commenters were concerned that
there was no protection against information later being leaked to the
public or re-released after the initial whistleblowing event, and that
this could put covered entities in violation of the law. Many commenters
wanted to see the whistleblower provision deleted entirely. According to
a number of health care associations who commented on this topic,
current practices already include adequate mechanisms for informing law
enforcement, oversight and legal counsel of possible violations without
the need for patient identifiable information; thus, the provision
allowing whistleblowers to share protected health information is
unnecessary. Additionally, some commenters felt that the covered entity
needs to be allowed to prohibit disclosures outside of legitimate
processes. Some commenters were concerned about not having any recourse
if the whistleblower's suspicions were unfounded.
*Response:* In this rule, we do not regulate the activities of
whistleblowers. Rather, we regulate the activities of covered entities,
and determine when they may be held responsible under this rule for
whistleblowing activities of their workforce or business associates when
that whistleblowing involves the disclosure of protected health
information. Similarly, we regulate when covered entities must and need
not sanction their workforce who disclose protected health information
in violation of the covered entity's policies and procedures, when that
disclosure is for whistleblowing purposes. See § 164.530(e). This rule
does not address a covered entity's recourse against a whistleblower
under other applicable law.
We do not hold covered entities responsible under this rule for
whistleblowing disclosures of protected health information under the
circumstances described in § 164.502(j). Our purpose in including this
provision is to make clear that we are not erecting a new barrier to
whistleblowing, and that covered entities may not use this rule as a
mechanism for sanctioning workforce members or business associates for
whistleblowing activity. We do not find convincing commenters' arguments
for narrowing or eliminating the scope of the whistleblowing which
triggers this protection.
Congress, as well as several states, have recognized the importance of
whistleblower activity to help identify fraud and mismanagement and
protect the public's health and safety. Whistleblowers, by their unique
insider position, have access to critical information not otherwise
easily attainable by oversight and enforcement organizations.
While we recognize that in many instances, de-identified or anonymous
information can be used to accomplish whistleblower objectives, there
are instances, especially involving patient care and billing, where this
may not be feasible. Oversight investigative agencies such as the
Department of Justice rely on identifiable information in order to issue
subpoenas that are enforceable. Relevant court standards require the
government agency issuing the subpoena to explain why the specific
records requested are relevant to the subject of the investigation, and
without such an explanation the subpoena will be quashed. Issuing a
subpoena for large quantities of individual records to find a few
records involving fraud is cost prohibitive as well as likely being
unenforceable.
We note that any subsequent inappropriate disclosure by a recipient of
whistleblower information would not put the covered entity in violation
of this rule, since the subsequent disclosure is not covered by this
regulation.
*Comments:* A few commenters felt that the whistleblower should be held
to a "reasonableness standard" rather than a "belief" that a violation
has taken place before engaging in whistleblower activities. The
commenters felt that a belief standard is too subjective. By holding the
whistleblower to this higher standard, this would serve to protect
protected health information from being arbitrarily released. Some
commenters saw the whistleblower provision as a loophole that gives too
much power to disgruntled employees to inappropriately release
information in order cause problems for the employer.
On the other hand, some commenters felt that all suspicious activities
should be reported. This would ease potential whistleblowers concerns
over whether or not they had a legitimate concern by leaving this
decision up to someone else. A number of commenters felt that employees
should be encouraged to report violations of professional or clinical
standards, or when a patient, employee, or the public would be put at
risk. A small number of commenters felt that the whistleblower should
raise the issue within the covered entity before going to the attorney,
oversight agency, or law enforcement entity.
*Response:* We do not attempt to regulate the conduct of whistleblowers
in this rule. We address uses and disclosures of protected health
information by covered entities, and when a covered entity will violate
this rule due to the actions of a workforce member or business
associate. In the final rule, we provide that a covered entity is not in
violation of the rule when a workforce member or business associate has
a good faith belief that the conduct being reported is unlawful or
otherwise violates professional or clinical standards, or potentially
endangers patients, employees or the public. We concur that the NPRM
language requiring only a "belief" was insufficient. Consequently, we
have strengthened the standard to require a good faith belief that an
inappropriate behavior has occurred.
*Comment:* A number of commenters believe that employees should be
encouraged to report violations of professional or clinical standards,
or report situations where patients, employees, or the public would be
put at risk. Their contention is that employees, especially health care
employees, may not know whether the problem they have encountered meets
a legal threshold of wrongdoing, putting them at jeopardy of sanction if
they are incorrect, even if the behavior did reflect violation of
professional and clinical standards or put patients, employees, or the
public at risk.
*Response:* We agree that covered entities should be protected when
their employees and others engage in the conduct described by these
commenters. We therefore modify the proposal to protect covered entities
when the whistleblowing relates to violations of professional or
clinical standards, or situations where the public may be at risk, and
eliminate the reference to "evidence."
*Comments:* A significant number of those commenting on the
whistleblower provision felt that this provision was contrary to the
rest of the rule. Whistleblowers could very easily release protected
health information under this provision despite the fact that the rest
of this rule works very hard to ensure privacy of protected health
information in all other contexts. To this end, some commenters felt
that whistleblowers should not be exempt from the minimum necessary
requirement.
*Response:* As stated above, we do not regulate the conduct of
whistleblowers. We discuss above the importance of whistleblowing, and
our intention not to erect a new barrier to such activity. The minimum
necessary standard applies to covered entities, not to whistleblowers.
*Comments:* Some commenters felt that disclosures of suspected
violations should only be made to a law enforcement official or
oversight agency. Other commenters said that whistleblowers should be
able to disclose their concerns to long-term care ombudsmen or health
care accreditation organizations, particularly because certain protected
health information may contain evidence of abuse. Some commenters felt
that whistleblowers should not be allowed to freely disclose information
to attorneys. They felt that this may cause more lawsuits within the
health care industry and be costly to providers. Furthermore, allowing
whistleblowers to go to attorneys increases the number of people who
have protected health information without any jurisdiction for the
Secretary to do anything to protect this information.
*Response:* We agree with the commenters who suggested that we recognize
other appropriate entities to which workforce members and business
associates might reasonably make a whistleblowing disclosure. In the
final rule we expand the provision to protect covered entities for
disclosures of protected health information made to accreditation
organizations by whistleblowers. We agree with the commenters that
whistleblowers may see these organizations as appropriate recipients of
health information, and do not believe that covered entities should be
penalized for such conduct.
We also agree that covered entities should be protected when
whistleblowers disclose protected health information to any health
oversight agency authorized by law to investigate or oversee the
conditions of the covered entity, including state Long-Term Care
Ombudsmen appointed in accordance with the Older Americans Act. Among
their mandated responsibilities is their duty to identify, investigate
and resolve complaints that are made by, or on behalf of, residents
related to their health, safety, welfare, or rights. Nursing home staff
often bring complaints regarding substandard care or abuse to ombudsmen.
Ombudsmen provide a potentially more attractive outlet for
whistleblowers since resolution of problems may be handled short of
legal action or formal investigation by an oversight agency.
We disagree with commenters that the provision permitting disclosures to
attorneys is too broad. Workforce members or business associates may not
understand their legal options or their legal exposure when they come
into possession of information about unlawful or other inappropriate or
dangerous conduct. Permitting potential whistleblowers to consult an
attorney provides them with a better understanding of their legal
options. We rephrase the provision to improve its clarity.
*Comment:* One commenter suggested that a notice of information
practices that omits disclosure for voluntary reporting of fraud will
chill internal whistleblowers who will be led to believe -- falsely --
that they would violate federal privacy law, and be lawfully subject to
sanction by their employer, if they reported fraud to health oversight
agencies.
*Response:* The notice of information practices describes a covered
entity's information practices. A covered entity does not make
whistleblower disclosures of protected health information, nor can it be
expected to anticipate any such disclosures by its workforce.
*Comment:* One commenter suggested that the whistleblower provisions
could allow covered entities to make illegal disclosures to police
through the back door by having an employee who believes there is a
violation of law do the disclosing. Any law could have been violated and
the violator could be anyone (a patient, a member of the patient's
family, etc.)
*Response:* We have eliminated whistleblower disclosures for law
enforcement purposes from the list of circumstances in which the covered
entity will be protected under this rule. This provision is intended to
protect the covered entity when a member of its workforce or a business
associate discloses protect health information to whistleblow on the
covered entity (or its business associates); it is not intended for
disclosures of conduct by the individual who is the subject of the
information or third parties.
**SECTION 164.504 - USES AND DISCLOSURES - ORGANIZATIONAL REQUIREMENTS -
COMPONENT ENTITIES, AFFILIATED ENTITIES, BUSINESS ASSOCIATES AND GROUP
HEALTH PLANS**
**Section 164.504(a)-(c)---Health Care Component (Component Entities)
and Section 164.504(d)---Affiliated Entities**
*Comment:* A few commenters asked that the concept of "use" be modified
to allow uses within an integrated healthcare delivery system.
Commenters argued that the rule needs to ensure that the full spectrum
of treatment is protected from the need for authorizations at the points
where treatment overlaps entities. It was explained that, for example,
treatment for a patient often includes services provided by various
entities, such as by a clinic and hospital, or that treatment may also
necessitate referrals from one provider entity to another unrelated
entity. Further, the commenter argued that the rule needs to ensure that
the necessary payment and health care operations can be carried out
across entities without authorizations.
*Response*: The Department understands that in today's health care
industry, the organization of and relationships among health care
entities are highly complex and varied. We modify the proposed rule
significantly to allow affiliated entities to designate themselves as a
single covered entity. A complex organization, depending on how it
self-designates, may have one or several "health care component(s)" that
are each a covered entity. Aggregation into a single covered entity will
allow the entities to use a single notice of information practices and
will allow providers that must obtain consent for uses and disclosures
for treatment, payment, and operations to obtain a single consent.
We do not allow this type of aggregation for unrelated entities, as
suggested by some commenters, because unrelated entities' information
practices will be too disparate to be accurately reflected on a single
consent or notice form. Our policies on when consent and authorization
are required for sharing information among unrelated entities, and the
rationale for these policies, is described in §§ 164.506 and 164.508 and
corresponding preamble.
As discussed above, in the final rule we have added a definition of
*organized health care arrangement* and permit covered entities
participating in such arrangements to disclose protected health
information to support the health care operations of the arrangement.
See the preamble discussion of the definitions of *organized health care
arrangement* and *health care operations,* § 164.501.
*Comment:* Some commenters expressed concern that the requirement to
obtain authorization for the disclosure of information to a non-health
related division of the covered entity would impede covered entities\'
ability to engage in otherwise-permissible activities such as health
care operations. Some of these commenters requested clarification that
covered entities are only required to obtain authorization for
disclosures to non-health related divisions if the disclosure is for
marketing purposes.
*Response:* In the final rule, we remove the example of use and
disclosure to non-health related divisions of the covered entity from
the list of examples of uses and disclosures requiring authorization in
§ 164.508. We determined that the example could lead covered entities to
the mistaken conclusion that some uses or disclosures that would
otherwise be permitted under the rule without authorization would
require authorization when made to a non-health related division of the
covered entity. In the final rule, we clarify that disclosure to a
non-health related division does not require authorization if the use or
disclosure is otherwise permitted or required under the rule. For
example, in § 164.501 we define health care operations to include
conducting or arranging for legal and auditing services. A covered
entity that is the health care component of a larger entity is permitted
under the final rule to include the legal department of the larger
entity as part of the health care component. The covered entity may not,
however, generally permit the disclosure of protected health information
from the health care component to non-health related divisions unless
they support the functions of the health care component and there are
policies and procedures in place to restrict the further use to the
support of the health related functions.
*Comment*: Many commenters, especially those who employed providers,
supported our position in the proposed rule to consider only the health
care component of an entity to be the covered entity. They stated that
this was a balanced approach that would allow them to continue
conducting business. Some commenters felt that there was ambiguity in
the regulation text of the proposed rule and requested that the final
rule explicitly clarify that only the health care component is
considered the covered entity, not the entity itself. Similarly, another
commenter requested that we clarify that having a health care component
alone did not make the larger entity a covered entity under the rule.
*Response*: We appreciate the support of the commenters on the health
care component approach and we agree that there was some ambiguity in
the proposed rule. The final rule creates a new § 164.504(b) for health
care components. Under § 164.504(b), for a covered entity that is a
single legal entity which predominantly performs functions other than
the functions performed by a health plan, provider, or clearinghouse,
the privacy rules apply only to the entity's health care component. A
policy, plan, or program that is an "excepted benefit" under section
2791(c)(1) of HIPAA cannot be part of a health care component because it
is expressly excluded from the definition of "health plan" for the
reasons discussed above. The health care component is prohibited from
sharing protected health information outside of the component, except as
otherwise permitted or required by the regulation.
At a minimum, the health care component includes the organizational
units of the covered entity that operate as or perform the functions of
the health plan, health care provider, or clearinghouse and does not
include any unit or function of the excepted benefits plan, policy, or
program. While the covered entity remains responsible for compliance
with this rule because it is responsible for the actions of its
workforce, we otherwise limit the responsibility to comply to the health
care component of the covered entity. The requirements of this rule
apply only to the uses and disclosures of the protected health
information by the component entity. See § 164.504(b).
*Comment*: Some commenters stated that the requirement to erect
firewalls between different components would unnecessarily delay
treatment, payment, and health care operations and thereby increase
costs. Other commenters stressed that it is necessary to create
firewalls between the health care component and the larger entity to
prevent unauthorized disclosures of protected health information.
*Response*: We believe that the requirement to implement firewalls or
safeguards is necessary to provide meaningful privacy protections,
particularly because the health care component is part of a larger legal
organization that performs functions other than those covered under this
rule. Without the safeguard requirement we cannot ensure that the
component will not share protected health information with the larger
entity. While we do not specifically identify the safeguards that are
required, the covered entity must implement policies and procedures to
ensure that: the health care component's use and disclose of protected
health information complies with the regulation; members of the health
care component who perform duties for the larger entity do not use and
disclose protected health information obtained through the health care
component while performing non-component functions unless otherwise
permitted or required by the regulation; and when a covered entity
conducts multiple functions regulated under this rule, the health care
component adheres to the appropriate requirements (e.g. when acting as a
health plan, adheres to the health plan requirements) and uses or
discloses protected health information of individuals who receive
limited functions from the component only for the appropriate functions.
See §§ 164.504(c)(2) and 164.504(g). For example, a covered entity that
includes both a hospital and a health plan may not use protected health
information obtained from an individual's hospitalization for the health
plan, unless the individual is also enrolled in the health plan. We note
that covered entities are permitted to make a disclosure to a health
care provider for treatment of an individual without restrictions.
*Comment*: One commenter stated that multiple health care components of
a single organization should be able to be treated as a single component
entity for the purposes of this rule. Under this approach, they argued,
one set of policies and procedures would govern the entire component and
protected health information could be shared among components without
authorization. Similarly, other commenters stated that corporate
subsidiaries and affiliated entities should not be treated as separate
covered entities.
*Response*: We agree that some efficiencies may result from designating
multiple component entities as a single covered entity. In the final
rule we allow legally distinct covered entities that share common
ownership or control to designate themselves or their health care
components as a single covered entity. See § 164.504(d). Common
ownership is defined as an ownership or equity interest of five percent
or more. Common control exists if an entity has the power - directly or
indirectly - to significantly influence or direct the actions or
policies of another entity. If the affiliated entity contains health
care components, it must implement safeguards to prevent the larger
entity from using protected health information maintained by the
component entity. As stated above, organizations that perform multiple
functions may designate a single component entity as long as it does not
include the functions of an excepted benefit plan that is not covered
under the rule. In addition, it must adhere to the appropriate
requirements when performing its functions (e.g. when acting as a health
plan, adhere to the health plan requirements) and uses or discloses
protected health information of individuals who receive limited
functions from the component only for the appropriate functions. At the
same time, a component that is outside of the health care component may
perform activities that otherwise are not permitted by a covered entity,
as long as it does not use or disclose protected health information
created or received by or on behalf of the health care component in ways
that violate this rule.
*Comment*: Some commenters asked whether or not workers' compensation
carriers could be a part of the health care component as described in
the proposed rule. They argued that this would allow for sharing of
information between the group health plan and workers' compensation
insurers.
*Response*: Under HIPAA, workers' compensation is an excepted benefit
program and is excluded from the definition of "health plan." As such, a
component of a covered entity that provides such excepted benefits may
not be part of a health care component that performs the functions of a
health plan. If workforce members of the larger entity perform functions
for both the health care component and the non-covered component, they
may not use protected health information created or received by or on
behalf of the health care component for the purposes of the non-covered
component, unless otherwise permitted by the rule. For example,
information may be shared between the components for coordination of
benefits purposes.
*Comment*: Several commenters requested specific guidance on identifying
the health care component entity. They argued that we underestimated the
difficulty in determining the component and that many organizations have
multiple functions with the same people performing duties for both the
component and the larger entity.
*Response*: With the diversity of organizational structures, it is
impossible to provide a single specific guidance for identifying health
care components that will meet the needs of all organizations. Covered
entities must designate their health care components consistent with the
definition at § 164.504(a). We have tried to frame this definition to
delineate what comes within a health care component and what falls
outside the component.
*Comment*: A commenter representing a government agency recommended that
only the component of the agency that runs the program be considered a
covered entity, not the agency itself. In addition, this commenter
stated that often subsets of other government agencies work in
partnership with the agency that runs the program to provide certain
services. For example, one state agency may provide maternity support
services to the Medicaid program which is run by a separate agency. The
commenter read the rule to mean that the agency providing the maternity
support services would be a business associate of the Medicaid agency,
but was unclear as to whether it would also constitute a health care
component within its own agency.
*Response*: We generally agree. We expect that in most cases, government
agencies that run health plans or provide health care services would
typically meet the definition of a "hybrid entity" under § 164.504(a),
so that such an agency would be required to designate the health care
component or components that run the program or programs in question
under § 164.504(c)(3), and the rules would not apply to the remainder of
the agency's operations, under § 164.504(b). In addition, we have
created an exception to the business associate contract requirement for
government agencies who perform functions on behalf of other government
agencies. Government agencies can enter into a memorandum of
understanding with another government entity or adopt a regulation that
applies to the other government entity in lieu of a business associate
contract, as long as the memorandum or regulation contains certain
terms. See § 164.504(e).
*Comment*: One commenter representing an insurance company stated that
different product lines should be treated separately under the rule. For
example, the commenter argued, because an insurance company offers both
life insurance and health insurance, it does not mean that the insurance
company itself is a covered entity, rather only the health insurance
component is a covered entity. Another commenter requested clarification
of the use of the term "product line" in the proposed rule. This
commenter stated that product line should differentiate between
different lines of coverage such as life vs. health insurance, not
different variations of the same coverage, such as HMO vs. PPO. Finally,
one commenter stated that any distinction among product lines is
unworkable because insurance companies need to share information across
product lines for coordinating benefits. This sharing of information,
the commenter urged, should be able to take place whether or not all
product lines are covered under the rule.
*Response*: We agree that many forms of insurance do not and should not
come within the definition of "health plan," and we have excepted them
from the definition of this term in § 160.103 applies. This point is
more fully discussed in connection with that definition. Although we do
not agree that the covered entity is only the specific product line, as
this comment suggests, the hybrid entity rules in § 164.504 address the
substance of this concern. Under § 164.504(c)(3), an entity may create a
health plan component which would include all its health insurance lines
of business or separate health care components for each health plan
product line. Finally, the sharing of protected health information
across lines of business is allowed if it meets the permissive or
required disclosures under the rule. The commenter's example of
coordination of benefits would be allowed under the rule as payment.
*Comment*: Several commenters representing occupational health care
providers supported our use of the component approach to prohibit
unauthorized disclosures of protected health information. They requested
that the regulation specifically authorize them to deny requests for
disclosures outside of the component entity when the disclosure was not
otherwise permitted or required by the regulation.
*Response*: We appreciate the commenters' support of the health care
component approach. As members of a health care component, occupational
health providers are prohibited from sharing protected health
information with the larger entity (i.e., the employer), unless
otherwise permitted or required by the regulation.
*Comment*: One commenter asked how the regulation affects employers who
carry out research. The commenter questioned whether the employees
carrying out the research would be component entities under the rule.
*Response*: If the employer is gathering its own information rather than
obtaining it from an entity regulated by this rule, the information does
not constitute protected health information since the employer is not a
covered entity. If the employer is obtaining protected health
information from a covered entity, the disclosure by the covered entity
must meet the requirements of § 164.512(i) regarding disclosures for
research.
*Comment*: One commenter stated that the proposed rule did not clearly
articulate whether employees who are health care providers are
considered covered entities when they collect and use individually
identifiable health information acting on behalf of an employer.
Examples provided include, administering mandatory drug testing, making
fitness-for-duty and return-to-work determinations, testing for exposure
to environmental hazards, and making short and long term disability
determinations. This commenter argued that if disclosing information
gained through these activities requires authorization, many of the
activities are meaningless. For example, an employee who fails a drug
test is unlikely to give authorization to the provider to share the
information with the employer.
*Response*: Health care providers are covered entities under this rule
if they conduct standard transactions. A health care provider who is an
employee and is administering drug testing on behalf of the employer,
but does not conduct standard transactions, is not a covered entity. If
the health care provider is a covered entity, then we require
authorization for the provider to disclose protected health information
to an employer. Nothing in this rule, however, prohibits the employer
from conditioning an individual's employment on agreeing to the drug
testing and requiring the individual to sign an authorization allowing
his or her drug test results to be disclosed to the employer.
*Comment*: One commenter stated its belief that only a health center at
an academic institution would be a covered entity under the component
approach. This commenter believed it was less clear whether or not other
components that may create protected health information "incidentally"
through conducting research would also become covered entities.
*Response*: While a covered entity must designate as a health care
component the functions that make it a health care provider, the covered
entity remains responsible for the actions of its workforce. Components
that create protected health information through research would be
covered entities to the extent they performed one of the required
transactions described in § 164.500; however, it is possible that the
research program would not be part of the health care component,
depending on whether the research program performed or supported covered
functions.
*Comment:* Several commenters stated that employers need access to
protected health information in order to provide employee assistance
programs, wellness programs, and on-site medical testing to their
employees.
*Response:* This rule does not affect disclosure of health information
by employees to the employer if the information is not obtained from a
covered entity. The employer's access to information from an EAP,
wellness program, or on-site medical clinic will depend on whether the
program or clinic is a covered entity.
*Comment:* One commenter stated that access to workplace medical records
by the occupational medical physicians is fundamental to workplace and
community health and safety. Access is necessary whether it is a single
location or multiple sites of the same company, such as production
facilities of a national company located throughout the country.
*Response:* Health information collected by the employer directly from
providers who are not covered entities is outside the scope of this
regulation. We note that the disclosures which this comment concerns
should be covered by § 164.512(b).
**Section 164.504(e) -- Business Associates**
*Comment:* Many commenters generally opposed the business partner
standard and questioned the Secretary's legal authority under section
1172(a) of HIPAA to require business partner contracts. Others stated
that the proposed rule imposed too great a burden on covered entities
with regard to monitoring their business partners' actions. Commenters
stated that they did not have the expertise to adequately supervise
their business partners' activities -- including billing, accounting,
and legal activities -- to ensure that protected health information is
not inappropriately disclosed. Commenters argued that business partners
are not "under the control" of health care providers, and that the rule
would significantly increase the cost of medical care. Many commenters
stated that the business partner provisions would be very time consuming
and expensive to implement, noting that it is not unusual for a health
plan or hospital to have hundreds of business partners, especially if
independent physicians and local pharmacies are considered business
partners. Many physician groups pointed out that their business partners
are large providers, hospitals, national drug supplier and medical
equipment companies, and asserted that it would be impossible, or very
expensive, for a small physician group to attempt to monitor the
activity of large national companies. Commenters stated that complex
contract terms and new obligations would necessitate the investment of
significant time and resources by medical and legal personnel, resulting
in substantial expenses. Many commenters proposed that the duty to
monitor be reduced to a duty to terminate the contractual arrangement
upon discovery of a failure to comply with the privacy requirements.
In addition, many commenters argued that covered entities should have
less responsibility for business partners' actions regarding the use and
disclosure of protected health information. The proposed rule would have
held covered entities responsible for the actions of their business
partners when they "knew or reasonably should have known" of improper
use of protected health information and failed to take reasonable steps
to cure a breach of the business partner contract or terminate the
contract. Many commenters urged that the term "knew or should have
known" be clearly defined, with examples. Some commenters stated that
covered entities should be liable only when they have actual knowledge
of the material breach of the privacy rules by the business partner.
Others recommended creation of a process by which a business partner
could seek advice to determine if a particular disclosure would be
appropriate. Some commenters stated that, in order to create an
environment that would encourage covered entities to report misuses of
protected health information, a covered entity should not be punished if
it discovered an inappropriate disclosure.
*Response:* With regard to our authority to require business associate
contracts, we clarify that Congress gave the Department explicit
authority to regulate what uses and disclosures of protected health
information by covered entities are "authorized." If covered entities
were able to circumvent the requirements of these rules by the simple
expedient of contracting out the performance of various functions, these
rules would afford no protection to individually identifiable health
information and be rendered meaningless. It is thus reasonable to place
restrictions on disclosures to business associates that are designed to
ensure that the personal medical information disclosed to them continues
to be protected and used and further disclosed only for appropriate
(i.e., permitted or required) purposes.
We do not agree that business associate contracts would necessarily have
complex terms or result in significant time and resource burdens. The
implementation specifications for business associate contracts set forth
in § 164.504 are straightforward and clear. Nothing prohibits covered
entities from having standard contract forms which could require little
or no modification for many business associates.
In response to comments that the "knew or should have known" standard in
the proposed rule was too vague or difficult to apply, and concerns that
we were asking too much of small entities in monitoring the activities
of much larger business associates, we have changed the rule. Under the
final rule, we put responsibility on the covered entity to take action
when it "knew of a pattern of activity or practice of the business
associate that constituted, respectively, a material breach or violation
of the business associate's obligation under the contract\..." This will
preclude confusion about what a covered entity 'should have known.' We
interpret the term "knew" to include the situation where the covered
entity has credible evidence of a violation. Covered entities cannot
avoid responsibility by intentionally ignoring problems with their
contractors. In addition, we have eliminated the requirement that a
covered entity actively monitor and ensure protection by its business
associates. However, a covered entity must investigate credible evidence
of a violation by a business associate and act upon any such knowledge.
In response to the concern that the covered entity should not be
punished if it discovers an inappropriate disclosure by its business
associate, § 164.504(e) provides that the covered entity is not in
compliance with the rule if it fails to take reasonable steps to cure
the breach or end the violation, while § 164.530(f) requires the covered
entity to mitigate, to the extent practicable, any resultant harm. The
breach itself does not cause a violation of this rule.
*Comment:* Some commenters voiced support for the concept of business
partners. Moreover, some commenters urged that the rule apply directly
to those entities that act as business partners, by restricting
disclosures of protected health information after a covered entity has
disclosed it to a business partner.
*Response:* We are pleased that commenters supported the business
associate standard and we agree that there are advantages to legislation
that directly regulates most entities that use or disclose protected
health information. However, we reiterate that our jurisdiction under
the statute limits us to regulate only those covered entities listed in
§ 160.102.
*Comment:* Many commenters strongly opposed the provision in the
proposed rule requiring business partner contracts to state that
individuals whose protected health information is disclosed under the
contract are intended third party beneficiaries of the contract. Many
noted that HIPAA did not create a private right of action for
individuals to enforce a right to privacy of medical information, and
questioned the Secretary's authority to create such a right through
regulation. Others questioned whether the creation of such a right was
appropriate in light of the inability of Congress to reach consensus on
the question, and perceived the provision as a "back door" attempt to
create a right that Congress did not provide. Some commenters noted that
third party beneficiary law varies from state to state, and that a third
party beneficiary provision may be unenforceable in some states. These
commenters suggested that the complexity and variation of state third
party beneficiary law would increase cost and confusion with limited
privacy benefits.
Commenters predicted that the provision would result in a dramatic
increase in frivolous litigation, increased costs throughout the health
care system, and a chilling effect on the willingness of entities to
make authorized disclosures of protected information. Many commenters
predicted that fear of lawsuits by individuals would impede the flow of
communications necessary for the smooth operation of the health care
system, ultimately affecting quality of care. For example, some
predicted that the provision would inhibit providers from making
authorized disclosures that would improve care and reduce medical
errors. Others predicted that it would limit vendors' willingness to
support information systems requirements. One large employer stated that
the provision would create a substantial disincentive for employers to
sponsor group health plans. Another commenter noted that the provision
creates an anomaly in that individuals may have greater recourse against
business partners and covered entities that contract with them than
against covered entities acting alone.
However, some commenters strongly supported the concept of providing
individuals with a mechanism to enforce the provisions of the rule, and
considered the provision among the most important privacy protections in
the proposed rule.
*Response:* We eliminate the requirement that business associate
contracts contain a provision stating that individuals whose protected
health information is disclosed under the contract are intended
third-party beneficiaries of the contract.
We do not intend this change to affect existing laws regarding when
individuals may be third party beneficiaries of contracts. If existing
law allows individuals to claim third party beneficiary rights, or
prohibits them from doing so, we do not intend to affect those rules.
Rather, we intend to leave this matter to such other law.
*Comment:* Some commenters objected to the proposed rule's requirement
that the business partner must return or destroy all protected health
information received from the covered entity at the termination of the
business partner contract. Commenters argued that business partners will
need to maintain business records for legal and/or financial auditing
purposes, which would preclude the return or destruction of the
information. Moreover, they argued that computer back-up files may
contain protected health information, but business partners cannot be
expected to destroy entire electronic back-up files just because part of
the information that they contain is from a client for whom they have
completed work.
*Response:* We modify the proposed requirement that the business
associate must return or destroy all protected health information
received from the covered entity when the business associate contract is
terminated. Under the final rule, a business associate must return or
destroy all protected health information when the contract is terminated
if feasible and lawful. The business partner contract must state that
privacy protections continue after the contract ends, if there is a need
for the business associate to retain any of the protected health
information and for as long as the information is retained. In addition,
the permissible uses of information after termination of the contract
must be limited to those activities that make return or destruction of
the information not feasible.
*Comment:* Many commenters recommended that providers and plans be
excluded from the definition of "business partner" if they are already
governed by the rule as covered entities. Providers expressed particular
concern about the inclusion of physicians with hospital privileges as
business partners of the hospital, as each hospital would be required to
have written contracts with and monitor the privacy practices of each
physician with privileges, and each physician would be required to do
the same for the hospital. Another commenter argued that consultations
between covered entities for treatment or referral purposes should not
be subject to the business partner contracting requirement.
*Response:* The final rule retains the general requirement that, subject
to the exceptions below, a covered entity must enter into a business
associate contract with another covered entity when one is providing
services to or acting on behalf of the other. We retain this requirement
because we believe that a covered entity that is a business associate
should be restricted from using or disclosing the protected health
information it creates or receives through its business associate
function for any purposes other than those that are explicitly detailed
in its contract.
However, the final rule expands the proposed exception for disclosures
of protected health information by a covered health care provider to
another health care provider. The final rule allows such disclosures
without a business associate contract for any activities that fall under
the definition of "treatment." We agree with the commenter that the
administrative burdens of requiring contracts in staff privileges
arrangements would not be outweighed by any potential privacy
enhancements from such a requirement. Although the exception for
disclosure of protected health information for treatment could be
sufficient to relieve physicians and hospitals of the contract
requirement, we also believe that this arrangement does not meet the
true meaning of "business associate," because both the hospital and
physician are providing services to the patient, not to each other. We
therefore also add an exception to § 164.502(e)(1) that explicitly
states that a contract is not required when the association involves a
health care facility and another health care provider with privileges at
that facility, if the purpose is providing health care to the
individual. We have also added other exceptions in § 164.502(e)(1)(ii)
to the requirement to obtain "satisfactory assurances" under §
164.502(e)(1)(i). We do not require a business associate arrangement
between group health plans and their plan sponsors because other, albeit
analogous, requirements apply under § 164.504(f) that are more tailored
to the specifics of that legal relationship. We do not require business
associate arrangements between government health plans providing public
benefits and other agencies conducting certain functions for the health
plan, because these arrangements are typically very constrained by other
law.
*Comment:* Many commenters expressed concern that required contracts for
federal agencies would adversely affect oversight activities, including
investigations and audits. Some health plan commenters were concerned
that if HMOs are business partners of an employer then the employer
would have a right to all personal health information collected by the
HMO. A commenter wanted to be sure that authorization would not be
required for accreditation agencies to access information. A large
manufacturing company wanted to make sure that business associate
contracts were not required between affiliates and a parent corporation
that provides administrative services for a sponsored health plan.
Attorney commenters asserted that a business partner contract would
undermine the attorney/client relationship, interfere with
attorney/client privilege, and was not necessary to protect client
confidences. A software vendor wanted to be excluded because the
requirements for contracts were burdensome and government oversight
intrusive. Some argued that because the primary purpose of medical
device manufacturers is supplying devices, not patient care, they should
be excluded.
*Response:* We clarify in the above discussion of the definition of
"business associate" that a health insurance issuer or an HMO providing
health insurance or health coverage to a group health plan does not
become a business associate simply by providing health insurance or
health coverage. The health insurance issuer or HMO may perform
additional functions or activities or provide additional services,
however, that would give rise to a business associate relationship.
However, even when an health insurance issuer or HMO acts as a business
associate of a group health plan, the group health plan has no right of
access to the other protected health information maintained by the
health insurance issuer or HMO. The business associate contract must
constrain the uses and disclosures of protected health information
obtained by the business associate through the relationship, but does
not give the covered entity any right to request the business associate
to disclose protected health information that it maintains outside of
the business associate relationship to the group health plan. Under
HIPAA, employers are not covered entities, so a health insurance issuer
or HMO cannot act as a business associate of an employer. See §
164.504(f) with respect to disclosures to plan sponsors from a group
health plan or health insurance issuer or HMO with respect to a group
health plan.
With respect to attorneys generally, the reasons the commenters put
forward to exempt attorneys from this requirement were not persuasive.
The business associate requirements will not prevent attorneys from
disclosing protected health information as necessary to find and prepare
witness, nor from doing their work generally, because the business
associate contract can allow disclosures for these purposes. We do not
require business associate contracts to identify each disclosure to be
made by the business associate; these disclosures can be identified by
type or purpose. We believe covered entities and their attorneys can
craft agreements that will allow for uses and disclosures of protected
health information as necessary for these activities. The requirement
for a business associate contract does not interfere with the
attorney-client relationship, nor does it override professional
judgement of business associates regarding the protected health
information they need to discharge their responsibilities. We do not
require covered entities to second guess their professional business
associates' reasonable requests to use or disclose protected health
information in the course of the relationship.
The attorney-client privilege covers only a small portion of information
provided to attorneys and so is not a substitute for this requirement.
More important, attorney-client privilege belongs to the client, in this
case the covered entity, and not to the individual who is the subject of
the information. The business associate requirements are intended to
protect the subject of the information.
With regard to government attorneys and other government agencies, we
recognize that federal and other law often does not allow standard legal
contracts among governmental entities, but instead requires agreements
to be made through the Economy Act or other mechanisms; these are
generally reflected in a memorandum of understanding (MOU). We therefore
modify the proposed requirements to allow government agencies to meet
the required "satisfactory assurance" through such MOUs that contain the
same provisions required of business associate contracts. As discussed
elsewhere, we believe that direct regulation of entities receiving
protected health information can be as or more effective in protecting
health information as contracts. We therefore also allow government
agencies to meet the required "satisfactory assurances" if law or
regulations impose requirements on business associates consistent with
the requirements specified for business associate contracts.
We do not believe that the requirement to have a business associate
contract with agencies that are performing the specified services for
the covered entity or undertaking functions or activities on its behalf
undermines the government functions being performed. A business
associate arrangement requires the business associate to maintain the
confidentiality of the protected health information and generally to use
and disclose the information only for the purposes for which it was
provided. This does not undermine government functions. We have exempted
from the business associate requirement certain situations in which the
law has created joint uses or custody over health information, such as
when law requires another government agency to determine the eligibility
for enrollment in a covered health plan. In such cases, information is
generally shared across a number of government programs to determine
eligibility, and often is jointly maintained. We also clarify that
health oversight activities do not give rise to a business associate
relationship, and that protected health information may be disclosed by
a covered entity to a health oversight agency pursuant to § 164.512(d).
We clarify for purposes of the final rule that accreditation agencies
are business associates of a covered entity and are explicitly included
within the definition. During accreditation, covered entities disclose
substantial amounts of protected health information to other private
persons. A business associate contract basically requires the business
associate to maintain the confidentiality of the protected health
information that it receives and generally to use and disclose such
information for the purposes for which it was provided. As with
attorneys, we believe that requiring a business associate contract in
this instance provides substantial additional privacy protection without
interfering with the functions that are being provided by the business
associate.
With regard to affiliates, § 164.504(d) permits affiliates to designate
themselves as a single covered entity for purposes of this rule. (See §
164.504(d) for specific organizational requirements.) Affiliates that
choose to designate themselves as a single covered entity for purposes
of this rule will not need business associate contracts to share
protected health information. Absent such designation, affiliates are
business associates of the covered entity if they perform a function or
service for the covered entity that necessitates the use or disclosure
of protected health information.
Software vendors are business associates if they perform functions or
activities on behalf of, or provide specified services to, a covered
entity. The mere provision of software to a covered entity would not
appear to give rise to a business associate relationship, although if
the vendor needs access to the protected health information of the
covered entity to assist with data management or to perform functions or
activities on the covered entity's behalf, the vendor would be a
business associate. We note that when an employee of a contractor, like
a software or IT vendor, has his or her primary duty station on-site at
a covered entity, the covered entity may choose to treat the employee of
the vendor as a member of the covered entity's workforce, rather than as
a business associate. See the preamble discussion to the definition of
*workforce*, § 160.103.
With regard to medical device manufacturers, we clarify that a device
manufacturer that provides "health care" consistent with the rule's
definition, including being a "supplier" under the Medicare program, is
a health care provider under the final rule. We do not require a
business associate contract when protected health information is shared
among health care providers for treatment purposes. However, a device
manufacturer that does not provide "health care" must be a business
associate of a covered entity if that manufacturer receives or creates
protected health information in the performance of functions or
activities on behalf of, or the provision of specified services to, a
covered entity.
As to financial institutions, they are business associates under this
rule when they conduct activities that cause them to meet the definition
of business associate. See the preamble discussion of the definition of
"payment" in § 164.501, for an explanation of activities of a financial
institution that do not require it to have a business associated
contract.
Disease managers may be health care providers or health plans, if they
otherwise meet the respective definitions and perform disease management
activities on their own behalf. However, such persons may also be
business associates if they perform disease management functions or
services for a covered entity.
*Comment:* Other commenters recommended that certain entities be
included within the definition of "business partner," such as
transcription services; employee representatives; in vitro diagnostic
manufacturers; private state and comparative health data organizations;
state hospital associations; warehouses; "whistleblowers," credit card
companies that deal with health billing; and patients.
*Response*: We do not list all the types of entities that are business
associates, because whether an entity is a business associate depends on
what the entity does, not what the entity is. That is, this is a
definition based on function; any entity performing the function
described in the definition is a business associate. Using one of the
commenters' examples, a state hospital association may be a business
associate if it performs a service for a covered entity for which
protected health information is required. It is not a business associate
by virtue of the fact that it is a hospital association, but by virtue
of the service it is performing.
*Comment:* A few commenters urged that certain entities, i.e.,
collection agencies and case managers, be business partners rather than
covered entities for purposes of this rule.
*Response:* Collection agencies and case managers are business
associates to the extent that they provide specified services to or
perform functions or activities on behalf of a covered entity. A
collection agency is not a covered entity for purposes of this rule.
However, a case manager may be a covered entity because, depending on
the case manager's activities, the person may meet the definition of
either a health care provider or a health plan. See definitions of
"health care provider" and "health plan" in § 164.501.
*Comment:* Several commenters complained that the proposed HIPAA
security regulation and privacy regulation were inconsistent with regard
to business partners.
*Response:* We will conform these policies in the final Security Rule.
*Comment:* One commenter expressed concern that the proposal appeared to
give covered entities the power to limit by contract the ability of
their business partners to disclose protected health information
obtained from the covered entity regardless of whether the disclosure
was permitted under proposed § 164.510, "Uses and disclosures for which
individual authorization is not required" (§ 164.512 in the final rule).
Therefore, the commenter argued that the covered entity could prevent
the business partner from disclosing protected health information to
oversight agencies or law enforcement by omitting them from the
authorized disclosures in the contract.
In addition, the commenter expressed concern that the proposal did not
authorize business partners and their employees to engage in
whistleblowing. The commenter concluded that this omission was
unintended since the proposal's provision at proposed § 164.518(c)(4)
relieved the covered entity, covered entity's employees, business
partner, and the business partner's employees from liability for
disclosing protected health information to law enforcement and to health
oversight agencies when reporting improper activities, but failed to
specifically authorize business partners and their employees to engage
in whistleblowing in proposed § 164.510(f), "Disclosures for law
enforcement."
*Response:* Under our statutory authority, we cannot directly regulate
entities that are not covered entities; thus, we cannot regulate most
business associates, or 'authorize' them to use or disclose protected
health information. We agree with the result sought by the commenter,
and accomplish it by ensuring that such whistle blowing disclosures by
business associates and others do not constitute a violation of this
rule on the part of the covered entity.
*Comment:* Some commenters suggested that the need to terminate
contracts that had been breached would be particularly problematic when
the contracts were with single-source business partners used by health
care providers. For example, one commenter explained that when the
Department awards single-source contracts, such as to a Medicare carrier
acting as a fiscal intermediary that then becomes a business partner of
a health care provider, the physician is left with no viable alternative
if required to terminate the contract.
*Response:* In most cases, we expect that there will be other entities
that could be retained by the covered entity as a business associate to
carry out those functions on its behalf or provide the necessary
services. We agree that under certain circumstances, however, it may not
be possible for a covered entity to terminate a contract with a business
associate. Accordingly, although the rule still generally requires a
covered entity to terminate a contract if steps to cure such a material
breach fail, it also allows an exception to this to accommodate those
infrequent circumstances where there simply are no viable alternatives
to continuing a contract with that particular business associate. It
does not mean, however, that the covered entity can choose to continue
the contract with a non-compliant business associate merely because it
is more convenient or less costly than doing business with other
potential business associates. We also require that if a covered entity
determines that it is not feasible to terminate a non-compliant business
associate, the covered entity must notify the Secretary.
*Comment:* Another commenter argued that having to renegotiate every
existing contract within the 2-year implementation window so a covered
entity can attest to "satisfactory assurance" that its business partner
will appropriately safeguard protected health information is not
practical.
*Response:* The 2-year implementation period is statutorily required
under section 1175(b) of the Act. Further, we believe that two years
provides adequate time to come into compliance with the regulation.
*Comment:* A commenter recommended that the business partner contract
specifically address the issue of data mining because of its increasing
prevalence within and outside the health care industry.
*Response:* We agree that protected health information should only be
used by business associates for the purposes identified in the business
associate contract. We address the issue of data mining by requiring
that the business associate contract explicitly identify the uses or
disclosures that the business associate is permitted to make with the
protected health information. Aside from disclosures for data
aggregation and business associate management, the business associate
contract cannot authorize any uses or disclosures that the covered
entity itself cannot make. Therefore, data mining by the business
associate for any purpose not specified in the contract is a violation
of the contract and grounds for termination of the contract by the
covered entity.
*Comment:* One commenter stated that the rule needs to provide the
ability to contract with persons and organizations to complete clinical
studies, provide clinical expertise, and increase access to experts and
quality of care.
*Response:* We agree, and do not prohibit covered entities from sharing
protected health information under a business associate contract for
these purposes.
*Comment:* A commenter requested clarification as to whether sister
agencies are considered business partners when working together.
*Response:* It is unclear from the comment whether the "sister agencies"
are components of a larger entity, are affiliated entities, or are
otherwise linked. Requirements regarding sharing protected health
information among affiliates and components are found in § 164.504.
*Comment:* One commenter stated that some union contracts specify that
the employer and employees jointly conduct patient quality of care
reviews. The commenter requested clarification as to whether this
arrangement made the employee a business partner.
*Response:* An employee organization that agrees to perform quality
assurance for a group health plan meets the definition of a business
associate. We note that the employee representatives acting on behalf of
the employee organization would be performing the functions of the
organization, and the employee organization would be responsible under
the business associate contract to ensure that the representatives
abided by the restrictions and conditions of the contract. If the
employee organization is a plan sponsor of the group health plan, the
similar provisions of § 164.504(f) would apply instead of the business
associate requirements. See § 164.502(e)(1).
*Comment*: Some commenters supported regulating employers as business
partners of the health plan. These commenters believed that this
approach provided flexibility by giving employers access to information
when necessary while still holding employers accountable for improper
use of the information. Many commenters, however, stressed that this
approach would turn the relationship between employers, employees and
other agents "on its head" by making the employer subordinate to its
agents. In addition, several commenters objected to the business partner
approach because they alleged it would place employers at risk for
greater liability.
*Response*: We do not require a business associate contract for
disclosure of protected health information from group health plans to
employers. We do, however, put other conditions on the disclosure of
protected health information from group health plans to employers who
sponsor the plan. See further discussion in § 164.504 on disclosure of
protected health information to employers.
*Comment:* One commenter expressed concern that the regulation would
discourage organizations from participating with Planned Parenthood
since pro bono and volunteer services may have no contract signed.
*Response:* We design the rule's requirements with respect to volunteers
and pro bono services to allow flexibility to the covered entity so as
not to disturb these arrangements. Specifically, when such volunteers
work on the premises of the covered entity, the covered entity may
choose to treat them as members of the covered entity's workforce or as
business associates. See the definitions of business associate and
workforce in § 160.103. If the volunteer performs its work off-site and
needs protected health information, a business associate arrangement
will be required. In this instance, where protected health information
leaves the premises of the covered entity, privacy concerns are
heightened and it is reasonable to require an agreement to protect the
information. We believe that pro bono contractors will easily develop
standard contracts to allow those activities to continue smoothly while
protecting the health information that is shared.
**Section 164.504(f) -- Group Health Plans**
*Comment*: Several commenters interpreted the preamble in the proposed
rule to mean that only self-insured group health plans were covered
entities. Another commenter suggested there was an error in the
definition of group health plans because it only included plans with
more than 50 participants [or]{.underline} plans administered by an
entity other than the employer (emphasis added by commenter). This
commenter believed the "or" should be an "and" because almost all plans
under 50 are administered by another entity and therefore this
definition does not exclude most small plans.
*Response*: We did not intend to imply that only self-insured group
health plans are covered health plans. We clarify that all group health
plans, both self-insured and fully-funded, with 50 or more participants
are covered entities, and that group health plans with fewer than 50
participants are covered health plans if they are administered by
another entity. While we agree with the commenter that few group health
plans with fewer than 50 participants are self-administered, the "or" is
dictated by the statute. Therefore, the statute only exempts group
health plans with fewer than 50 participants that are not administered
by an entity other than the employer.
*Comment*: Several commenters stated that the proposed rule
mis-characterized the relationship between the employer and the group
health plan. The commenters stated that under ERISA and the Internal
Revenue Code group health plans are separate legal entities from their
employer sponsors. The group health plan itself, however, generally does
not have any employees. Most operations of the group health plan are
contracted out to other entities or are carried out by employees of the
employer who sponsors the plan. The commenters stressed that while group
health plans are clearly covered entities, the Department does not have
the statutory authority to cover employers or other entities that
sponsor group health plans. In contrast, many commenters stated that
without covering employers, meaningful privacy protection is
unattainable.
*Response*: We agree that group health plans are separate legal entities
from their plan sponsors and that the group health plan itself may be
operated by employees of the plan sponsor. We make significant
modification to the proposed rule to better reflect this reality. We
design the requirements in the final regulation to use the existing
regulatory tools provided by ERISA, such as the plan documents required
by that law and the constellation of plan administration functions
defined by that law that established and maintain the group health plan.
We recognize plan sponsors' legitimate need for health information in
certain situations while, at the same time, protecting health
information from being used for employment-related functions or for
other functions related to other employee benefit plans or other
benefits provided by the plan sponsor. We do not attempt to directly
regulate plan sponsors, but pursuant to our authority to regulate health
plans, we place restrictions on the flow of information from covered
entities to non-covered entities. The final rule permits group health
plans to disclose protected health information to plan sponsors, and
allows them to authorize health insurance issuers or HMOs to disclose
protected health information to plan sponsors, if the plan sponsors
agree to use and disclose the information only as permitted or required
by the regulation. The information may be used only for plan
administration functions performed on behalf of the group health plan
and specified in the plan documents. Hereafter, any reference to
employer in a response to a comment uses the term "plan sponsor," since
employers can only receive protected health information in their role as
plan sponsors, except as otherwise permitted under this rule, such as
with an authorization.
Specifically, in order for a plan sponsor to obtain without
authorization protected health information from a group health plan,
health insurance issuer, or HMO, the documents under which the group
health plan was established and is maintained must be amended to: (1)
describe the permitted uses and disclosures of protected health
information by the plan sponsor (see above for further explanation); (2)
specify that disclosure is permitted only upon receipt of a written
certification that the plan documents have been amended; and (3) provide
adequate firewalls. The firewalls must identify the employees or classes
of employees or other persons under the plan sponsor's control who will
have access to protected health information; restrict access to only the
employees identified and only for the administrative functions performed
on behalf of the group health plan; and provide a mechanism for
resolving issues of noncompliance by the employees identified. Any
employee of the plan sponsor who receives protected health information
in connection with the group health plan must be included in the
amendment to the plan documents. As required by ERISA, the named
fiduciary is responsible for ensuring the accuracy of amendments to the
plan documents.
Group health plans, and health insurance issuers or HMOs with respect to
the group health plan, that disclose protected health information to
plan sponsors are bound by the minimum necessary standard as described
in § 164.514.
Group health plans, to the extent they provide health benefits only
through an insurance contract with a health insurance issuer or HMO and
do not create, receive, or maintain protected health information (except
for summary information or enrollment and disenrollment information),
are not required to comply with the requirements of §§ 164.520 or
164.530, except for the documentation requirements of § 164.530(j). In
addition, because the group health plan does not have access to
protected health information, the requirements of §§ 164.524, 164.526,
and 164.528 are not applicable. Individuals enrolled in a group health
plan that provides benefits only through an insurance contract with a
health insurance issuer or HMO would have access to all rights provided
by this regulation through the health insurance issuer or HMO, because
they are covered entities in their own right.
*Comment*: We received several comments from self-insured plans who
stated that the proposed rule did not fully appreciate the dual nature
of an employer as a plan sponsor and as a insurer. These commenters
stated that the regulation should have an exception for employers who
are also insurers.
*Response*: We believe the approach we have taken in the final rule
recognizes the special relationship between plan sponsors and group
health plans, including group health plans that provide benefits through
a self-insured arrangement. The final rule allows plan sponsors and
employees of plan sponsors access to protected health information for
purposes of plan administration. The group health plan is bound by the
permitted uses and disclosures of the regulation, but may disclose
protected health information to plan sponsors under certain
circumstances. To the extent that group health plans do not provide
health benefits through an insurance contract, they are required to
establish a privacy officer and provide training to employees who have
access to protected health information, as well as meet the other
applicable requirements of the regulation.
*Comment*: Some commenters supported our position not to require
individual consent for employers to have access to protected health
information for purposes of treatment, payment, and health care
operations. For employer sponsored insurance to continue to exist as it
does today, the commenters stressed, this policy is essential. Other
commenters encouraged the Department to amend the regulation to require
authorization for disclosure of information to employers. These
commenters stressed that because the employer was not a covered entity,
individual consent is the only way to prohibit potential abuses of
information.
*Response*: In the final regulation, we maintain the position in the
proposed rule that a health plan, including a group health plan, need
not obtain individual consent for use and disclosure of protected health
information for treatment, payment and or health care operations
purposes. However, we impose conditions (described above) for making
such disclosures to the plan sponsor. Because employees of the plan
sponsor often perform health care operations and payment (e.g. plan
administration) functions, such as claims payment, quality review, and
auditing, they may have legitimate need for such information. Requiring
authorization from every participant in the plan could make such
fundamental plan administration activities impossible. We therefore
impose regulatory restrictions, rather than a consent requirement, to
prevent abuses. For example, the plan sponsor must certify that any
protected health information obtained by its employees through such plan
administration activities will not be used for employment-related
decisions.
*Comment*: Several commenters stressed that the regulation must require
the establishment of firewalls between group health plans and employers.
These commenters stated that firewalls were necessary to prevent the
employer from accessing information improperly and using it in making
job placements, promotions, and firing decisions. In addition, one
commenter stated that employees with access to protected health
information must be empowered through this regulation to deny
unauthorized access to protected health information to corporate
managers and executives.
*Response*: We agree with the commenters that firewalls are necessary to
prevent unauthorized use and disclosure of protected health information.
Among the conditions for group health plans to disclose information to
plan sponsors, the plan sponsor must establish firewalls to prevent
unauthorized uses and disclosures of information. The firewalls include:
describing the employees or classes of employees with access to
protected health information; restricting access to and use of the
protected health information to the plan administration functions
performed on behalf of the group health plan and described in plan
documents; and providing an effective mechanism for resolving issues of
noncompliance.
*Comment:* Several commenters supported our proposal to cover the health
care component of an employer in its capacity as an administrator of the
group health plan. These commenters felt the component approach was
necessary to prevent the disclosure of protected health information to
other parts of the employer where it might be used or disclosed
improperly. Other commenters believed the component approach was
unworkable and that distinguishing who was in the covered entity would
not be as easy as assumed in the proposed rule. One commenter stated it
was unreasonable for an employer to go through its workforce division by
division and employee by employee designating who is included in the
component and who is not. In addition, some commenters argued that we
did not have the statutory authority to regulate employers at all,
including their health care components.
One commenter requested more guidance with respect to identifying the
health care component as proposed under the proposed rule. In
particular, the commenter requested that the regulation clearly define
how to identify such persons and what activities and functional areas
may be included. The commenter alleged that identification of persons
needing access to protected health information will be administratively
burdensome. Another commenter requested clarification on distinguishing
the component entity from non-component entities within an organization
and how to administer such relationships. The commenter stated that
individuals included in the covered entity could change on a daily basis
and advocated for a simpler set of rules governing intra-organizational
relationships as opposed to inter-organizational relationships.
*Response*: While we have not adopted the component approach for plan
sponsors in the final rule, plan sponsors who want protected health
information must still identify who in the organization will have access
to the information. Several of the changes we make to the NPRM will make
this designation easier. First, we move from "component" to a more
familiar functional approach. We limit the employees of the plan sponsor
who may receive protected health information to those employees
performing plan administration functions, as that term is understood
with respect to ERISA compliance, and as limited by this rule's
definitions of payment and health care operation. We also allow
designation of a class of employees (e.g., all employees assigned to a
particular department) or individual employees.
Although some commenters have asked for guidance, we have intentionally
left the process flexible to accommodate different organizational
structures. Plan sponsors may identify who will have access to protected
health information in whatever way best reflects their business needs as
long as participants can reasonably identify who will have access. For
example, persons may be identified by naming individuals, job titles
(e.g. Director of Human Resources), functions (e.g. employees with
oversight responsibility for the outside third party claims
administrator), divisions of the company (e.g. Employee Benefits) or
other entities related to the plan sponsor. We believe this flexibility
will also ease any administrative burden that may result from the
identification process. Identification in terms such as "individuals who
from time to time may need access to protected health information" or in
other broad or generic ways, however, would not be sufficient.
*Comment*: In addition to the comments on the component approach itself,
several commenters pointed out that many employees wear two hats in the
organization, one for the group health plan and one for the employer.
The commenters stressed that these employees should not be regulated
when they are performing group health plan functions. This arrangement
is necessary, particularly in small employers where the plan fiduciary
may also be in charge of other human resources functions. The commenter
recommended that employees be allowed access to information when
necessary to perform health plan functions while prohibiting them from
using the information for non-health plan functions.
*Response*: We agree with the commenters that many employees perform
multiple functions in an organization and we design these provisions
specifically to accommodate this way of conducting business. Under the
approach taken in the final regulation, employees who perform multiple
functions (i.e. group health plan and employment-related functions) may
receive protected health information from group health plans, but among
other things, the plan documents must certify that these employees will
not use the information for activities not otherwise permitted by this
rule including for employment-related activities.
*Comment*: Several commenters pointed out that the amount of access
needed to protected health information varies greatly from employer to
employer. Some employers may perform many plan administration functions
themselves which are not possible without access to protected health
information. Other employers may simply offer health insurance by paying
a premium to a health insurance issuer rather than provide or administer
health benefits themselves. Some commenters argued that fully insured
plans should not be covered under the rule. Similarly, some commenters
argued that the regulation was overly burdensome on small employers,
most of whom fully insure their group health plans. Other commenters
pointed out that health insurance issuers - even in fully insured
arrangements - are often asked for identifiable health information,
sometimes for legitimate purposes such as auditing or quality assurance,
but sometimes not. One commenter, representing an insurer, gave several
examples of employer requests, including claims reports for employees,
individual and aggregate amounts paid for employees, identity of
employees using certain drugs, and the identity, diagnosis and
anticipated future costs for "high cost" employees. This same commenter
requested guidance in what types of information can be released to
employers to help them determine the organization's responsibilities and
liabilities.
*Response*: In the final regulation we recognize the diversity in plan
sponsors' need for protected health information. Many plan sponsors need
access to protected health information to perform plan administration
functions, including eligibility and enrollment functions, quality
assurance, claims processing, auditing, monitoring, trend analysis, and
management of carve-out plans (such as vision and dental plans). In the
final regulation we allow group health plans to disclose protected
health information to plan sponsors if the plan sponsor voluntarily
agrees to use the information only in accordance with the purposes
stated in the plan documents and as permitted by the regulation. We
clarify, however, that plan administration does not include any
employment-related decisions, including fitness for duty determinations,
or duties related to other employee benefits or plans. Plan documents
may only permit health insurance issuers to disclose protected health
information to a plan sponsor as is otherwise permitted under this rule
and consistent with the minimum necessary standard.
Some plan sponsors, including those with a fully insured group health
plan, do not perform plan administration functions on behalf of group
health plans, but still may require health information for other
purposes, such as modifying, amending or terminating the plan or
soliciting bids from prospective issuers or HMOs. In the ERISA context
actions undertaken to modify, amend or terminate a group health plan may
be known as "settlor" functions (see [Lockheed Corp. v.
Spink]{.underline}, 517 U.S. 882 (1996)). For example, a plan sponsor
may require access to information to evaluate whether to adopt a
three-tiered drug formulary. Additionally, a prospective health
insurance issuer may need claims information from a plan sponsor in
order to provide rating information. The final rule permits plan
sponsors to receive summary health information with identifiers removed
in order to carry out such functions. Summary health information is
information that summarizes the claims history, expenses, or types of
claims by individuals enrolled in the group health plan. In addition,
the identifiers listed in § 164.514(b)(2)(i) must be removed prior to
disclosing the information to a plan sponsor for purposes of modifying,
amending, or terminating the plan. See § 164.504(a). This information
does not constitute de-identified information because there may be a
reasonable basis to believe the information is identifiable to the plan
sponsor, especially if the number of participants in the group health
plan is small. A group health plan, however, may not permit an issuer or
HMO to disclose protected health information to a plan sponsor unless
the requirement in § 164.520 states that this disclosure may occur.
*Comment*: Several commenters stated that health insurance issuers
cannot be held responsible for employers' use of protected health
information. They stated that the issuer is the agent of the employer
and it should not be required to monitor the employer's use and
disclosure of information.
*Response*: Under this regulation, health insurance issuers are covered
entities and responsible for their own uses and disclosures of protected
health information. A group health plan must require a health insurance
issuer or HMO providing coverage to the group health plan to disclose
information to the plan sponsor only as provided in the plan documents.
*Comment*: Several commenters urged us to require de-identified
information to be used to the greatest extent possible when information
is being shared with employers.
*Response*: De-identified information is not sufficient for many
functions plan sponsors perform on behalf of their group health plans.
We have created a process to allow plan sponsors and their employees
access to protected health information when necessary to administer the
plan. We note that all uses and disclosures of protected health
information by the group health plan are bound by the minimum necessary
standard.
*Comment*: One commenter representing church plans argued that the
regulation should treat such plans differently from other group health
plans. The commenter was concerned about the level of access to
information the Secretary would have in performing compliance reviews
and suggested that a higher degree of sensitivity is need for
information related to church plans than information related to other
group health plans. This sensitivity is needed, the commenter alleged,
to reduce unnecessary intrusion into church operations. The commenter
also advocated that church plans found to be out of compliance should be
able to self-correct within a stated time frame (270 days) and avoid
paying penalty taxes as allowed in the Internal Revenue Code.
*Response*: We do not believe there is sufficient reason to treat church
plans differently than other covered entities. The intent of the
compliance reviews is to determine whether or not the plan is abiding by
the regulation, not to gather information on the general operations of
the church. As required by § 160.310(c), the covered entity must provide
access only to information that is pertinent to ascertaining compliance
with part 160 or subpart E of 164.
*Comment*: Several commenters stated that employers often advocate on
behalf of their employees in benefit disputes and appeals, answer
questions with regard to the health plan, and generally help them
navigate their health benefits. These commenters questioned whether this
type of assistance would be allowed under the regulation, whether
individual consent was required, and whether this intervention would
make them a covered entity.
*Response*: The final rule does nothing to hinder or prohibit plan
sponsors from advocating on behalf of group health plan participants or
providing assistance in understanding their health plan. Under the
privacy rule, however, the plan sponsor could not obtain any information
from the group health plan or a covered provider unless authorization
was given. We do not believe obtaining authorization when advocating or
providing assistance will be impractical or burdensome since the
individual is requesting assistance and therefore should be willing to
provide authorization. Advocating on behalf of participants or providing
other assistance does not make the plan sponsor a covered entity.
**SECTION 164.506 - CONSENT FOR TREATMENT, PAYMENT, AND HEALTH CARE
OPERATIONS**
*Comment:* Many commenters supported regulatory authorization for
treatment, payment, and health care operations. In particular, health
plans, employers, and institutional providers supported the use of
regulatory authorization for treatment, payment, and health care
operations.
In contrast, a large number of commenters, particularly health care
professionals, patients, and patient advocates, suggested that consent
for treatment, payment, and health care operations should be required.
Many commenters supported the use of consent for treatment, payment, and
health care operations, considering this a requirement for maintaining
the integrity of the health care system. Some commenters made a
distinction between requiring and permitting providers to obtain
consent.
Commenters nearly uniformly agreed that covered health care providers,
health plans, and clearinghouses should not be prohibited from seeking
authorization for treatment, payment, and health care operations. Some
commenters stated that the prohibition against obtaining an
authorization goes against professional ethics, undermines the
patient-provider relationship, and is contrary to current industry
practice.
Some commenters specifically noted the primacy of the doctor-patient
relationship regarding consent. In general, commenters recommended that
individually identifiable health information not be released by doctors
without patient consent. A few commenters stated that prohibiting health
care providers from obtaining consent could cause the patient to become
suspicious and distrustful of the health care provider. Other commenters
believed that clinicians have the responsibility for making sure that
patients are fully informed about the consequences of releasing
information. A few commented that the process of obtaining consent
provided an opportunity for the patient and provider to negotiate the
use and disclosure of patient information.
Commenters discussed how, when, and by whom consent should be sought.
For example, some commenters viewed a visit between a health care
provider and patient as the appropriate place for consent to be
discussed and obtained. While others did not necessarily dispute the
appropriateness of health care providers obtaining consent for uses and
disclosures of protected health information from individuals, some said
that it was appropriate for health plans to be permitted to obtain
consent.
*Response:* In the NPRM we stated our concern that the blanket consents
that individuals sign today provide these individuals with neither
notice nor control over how their information is to be used. While we
retain those concerns, we also understand that for many who participate
in the health care system, the acts of providing and obtaining consent
represent important values that these parties wish to retain. Many
individuals argued that providing consent enhances their control; many
advocates argued that the act of consent focuses patient attention on
the transaction; and many health care providers argued that obtaining
consent is part of ethical behavior.
The final rule amends our proposed approach and requires most covered
health care providers to obtain a consent from their patients to use or
disclose protected health information for treatment, payment, and health
care operations. Providers who have an indirect treatment relationship
with the patient, as defined in § 164.501, cannot be expected to have an
opportunity to obtain consent and may continue to rely on regulatory
authorization for their uses and disclosures for these purposes.
As described in the comments, it is the relationship between the health
care provider and the patient that is the basis for many decisions about
uses and disclosures of protected health information. Much of the
individually identifiable health information that is the subject of this
rule is created when a patient interacts with a health care provider. By
requiring covered providers to obtain consent for treatment, payment,
and health care operations, the individual will have appropriate
opportunity to consider the appropriate uses and disclosures of his or
her protected health information. We also require that the consent
contain a reference to the provider's notice, which contains a more
detailed description of the provider's practices relating to uses and
disclosures of protected health information. This combination provides
the basis for an individual to have an informed conversation with his or
her provider and to request restrictions.
It is our understanding that it is common practice for providers to
obtain consent for this type of information-sharing today. Many
providers and provider organizations stated that they are ethically
obligated to obtain the patient's consent and that it is their practice
to do so. A 1998 study by Merz, et al, published in the Journal of Law,
Medicine and Ethics examined hospital consent forms regarding disclosure
of medical information.[^8] They found that 97% of all hospitals seek
consent for the release of information for payment purposes; 45% seek
consent for disclosure for utilization review, peer review, quality
assurance, and/or prospective review; and 50% seek consent for
disclosure to providers, other health care facilities, or others for
continuity of care purposes. All of these activities fall within our
definitions of treatment, payment, or health care operations.
In the final rule we have not required that health plans or health care
clearinghouses obtain consent for their uses and disclosures of
protected health information for treatment, payment, or health care
operations. The rationale underlying the consent requirements for uses
and disclosures by health care providers do not pertain to health plans
and health care clearinghouses. First, current practice is varied, and
there is little history of health plans obtaining consent relating to
their own information practices unless required to do so by some other
law. This is reflected in the public comments, in which most health
plans supported the regulatory authorization approach proposed in the
NPRM. Further, unlike many health care providers, health plans did not
maintain that they were ethically obligated to seek the consent of their
patients for their use and disclosure activities. Finally, it is the
unique relationship between an individual and his or her health care
provider that provides the foundation for a meaningful consent process.
Requiring that consent process between an individual and a health plan
or clearinghouse, when no such unique relationship exists, we believe is
not necessary.
Unlike their relationship with health care providers, individuals in
most instances do not have a direct opportunity to engage in a
discussion with a health plan or clearinghouse at the time that they
enter into a relationship with those entities. Most individuals choose a
health plan through their employer and often sign up through their
employer without any direct contact with the health plan. We concluded
that providing for a signed consent in such a circumstance would add
little to the proposed approach, which would have required health plans
to provide a detailed notice to their enrollees. In the final rule, we
also clarify that an individual can request a restriction from a health
plan or health care clearinghouse. Since individuals rarely if ever have
any direct contact with clearinghouses, we concluded that requiring a
signed consent would have virtually no effect beyond the provision of
the notice and the opportunity to request restrictions.
We agree with the comments we received objecting to the provision
prohibiting covered entities from obtaining consent from individuals. As
discussed above, in the final rule we require covered health care
providers with direct treatment relationships to obtain consent to use
or disclose protected health information for treatment, payment, and
health care operations. In addition, we have eliminated the provision
prohibiting other covered entities from obtaining such consents. We note
that the consents that covered entities are permitted to obtain relate
to their own uses and disclosures of protected health information for
treatment, payment, and health care operations and not to the practices
of others. If a covered entity wants to obtain the individual's
permission to receive protected health information from another covered
entity, it must do so using an authorization under § 164.508.
***"Consent" versus "Authorization"***
*Comment:* In general, commenters did not distinguish between "consent"
and "authorization". Commenters used both terms to refer to the
individual's giving permission for the use and disclosure of protected
health information by any entity.
*Response:* In the final rule we have made an important distinction
between consent and authorization. Under the final rule, we refer to the
process by which a covered entity seeks agreement from an individual
regarding how it will use and disclose the individual's protected health
information for treatment, payment, and health care operations as
"consent." The provisions in the final rule relating to consent are
largely contained in § 164.506. The process by which a covered entity
seeks agreement from an individual to use or disclose protected health
information for other purposes, or to authorize another covered entity
to disclose protected health information to the requesting covered
entity, are termed "authorizations" and the provisions relating to them
are found in § 164.508.
***Consent Requirements***
*Comment:* Many commenters believed that consent might be problematic in
that it could allow covered entities to refuse enrollment or services if
the individual does not grant the consent. Some commenters proposed that
covered entities be allowed to condition treatment, payment, or health
care operations on whether or not an individual granted consent. Other
commenters said that consent should be voluntary and not coerced.
*Response:* In the final rule (§ 164.506(b)(1)), we permit covered
health care providers to condition treatment on the individual's consent
to the covered provider's use or disclosure of protected health
information to carry out treatment, payment, and health care operations.
We recognize that it would be difficult, if not impossible, for health
care providers to treat their patients and run their businesses without
being able to use or disclose protected health information for these
purposes. For example, a health care provider could not be reimbursed by
a health plan unless the provider could share protected health
information about the individual with the health plan. Under the final
rule, if the individual refuses to grant consent for this disclosure,
the health care provider may refuse to treat the individual. We
encourage health care providers to exhaust other options, such as making
alternative payment arrangements with the individual, before refusing to
treat the individual on these grounds.
We also permit health plans to condition enrollment in the health plan
on the individual's consent for the health plan to use and disclose
protected health information to carry out treatment, payment, and health
care operations (see § 164.506(b)(2)). The health plan must seek the
consent in conjunction with the individual's enrollment in the plan for
this provision to apply. For example, a health plan's application for
enrollment may include a consent for the health plan to use or disclose
protected health information to carry out treatment, payment, and/or
health care operations. If the individual does not sign this consent,
the health plan, under § 164.502(a)(1)(iii), is prohibited from using or
disclosing protected health information about the individual for the
purposes stated in the consent form. Because the health plan may not be
able adequately to provide services to the individual without these uses
and disclosures, we permit the health plan to refuse to enroll the
individual if the consent is not signed.
*Comment:* Some commenters were concerned that the NPRM conflicted with
state law regarding when covered entities would be required to obtain
consent for uses and disclosures of protected health information.
*Response:* We have modified the provisions in the final rule to require
certain health care providers to obtain consent for uses and disclosures
for treatment, payment, and health care operations and to permit other
covered entities to do so. A consent under this rule may be combined
with other types of written legal permission from the individual, such
as state-required consents for uses and disclosures of certain types of
health information (e.g., information relating to HIV/AIDS or mental
health). We also permit covered entities to seek authorization from the
individual for another covered entity's use or disclosure of protected
health information for these purposes, including if the covered entity
is required to do so by other law. Though we do not believe any states
currently require such authorizations, we wanted to avoid future
conflicts. These changes should resolve the concerns raised by
commenters regarding conflicts with state laws that require consent,
authorization, or other types of written legal permission for uses and
disclosures of protected health information.
*Comment:* Some commenters noted that there would be circumstances when
consent is impossible or impractical. A few commenters suggested that in
such situations patient information be de-identified or reviewed by an
objective third party to determine if consent is necessary.
*Response:* Covered health care providers with direct treatment
relationships are required to obtain consent to use or disclose
protected health information to carry out treatment, payment, and health
care operations. In certain treatment situations where the provider is
permitted or required to treat an individual without the individual's
written consent to receive health care, the provider may use and
disclose protected health information created or obtained in the course
of that treatment without the individual's consent under this rule (see
§ 164.506(a)(3)). In these situations, the provider must attempt to
obtain the individual's consent and, if the provider is unable to obtain
consent, the provider must document the attempt and the reason consent
could not be obtained. Together with the uses and disclosures permitted
under §§ 164.510 and 164.512, the concerns raised regarding situations
in which it is impossible or impractical for covered entities to obtain
the individual's permission to use or disclose protected health
information about the individual have been addressed.
*Comment:* An agency that provides care to individuals with mental
retardation and developmental disabilities expressed concern that many
of their consumers lack capacity to consent to the release of their
records and may not have a surrogate readily available to provide
consent on their behalf.
*Response:* Under § 164.506(a)(3), we provide exceptions to the consent
requirement for certain treatment situations in which consent is
difficult to obtain. In these situations, the covered provider must
attempt to obtain consent and must document the reason why consent was
not obtained. If these conditions are met, the provider may use and
disclose the protected health information created or obtained during the
treatment for treatment, payment, or health care operations purposes,
without consent.
*Comment:* Many commenters were concerned that covered entities working
together in an integrated health care system would each separately be
required to obtain consent for use and disclosure of protected health
information for treatment, payment, and health care operations. These
commenters recommend that the rule permit covered entities that are part
of the same integrated health care system to obtain a single consent
allowing each of the covered entities to use and disclose protected
health information in accordance with that consent form. Some commenters
said that it would be confusing to patients and administratively
burdensome to require separate consents for health care systems that
include multiple covered entities.
*Response:* We agree with commenters' concerns. In § 164.506(f) of the
final rule we permit covered entities that participate in an organized
health care arrangement to obtain a single consent on behalf of the
arrangement. See § 164.501 and the corresponding preamble discussion
regarding organized health care arrangements. To obtain a joint consent,
the covered entities must have a joint notice and must refer to the
joint notice in the joint consent. See § 164.520(d) and the
corresponding preamble discussion regarding joint notice. The joint
consent must also identify the covered entities to which it applies so
that individuals will know who is permitted to use and disclose
information about them.
*Comment:* Many commenters stated that individuals own their medical
records and, therefore, should have absolute control over them,
including knowing by whom and for what purpose protected health
information is used, disclosed, and maintained. Some commenters asserted
that, according to existing law, a patient owns the medical records of
which he is the subject.
*Response:* We disagree. In order to assert an ownership interest in a
medical record, a patient must demonstrate some legitimate claim of
entitlement to it under a state law that establishes property rights or
under state contract law. Historically, medical records have been the
property of the health care provider or medical facility that created
them, and some state statutes directly provide that medical records are
the property of a health care provider or a health care facility. The
final rule is consistent with current state law that provides patients
access to protected health information but not ownership of medical
records. Furthermore, state laws that are more stringent than the rule,
that is, state laws that provide a patient with greater access to
protected health information, remain in effect. See discussion of
"Preemption" above.
***Electronically Stored Data***
*Comment*: Some commenters stated that privacy concerns would be
significantly reduced if patient information is not stored
electronically. One commenter suggested that consent should be given for
patient information to be stored electronically. One commenter believed
that information stored in data systems should not be individually
identifiable.
*Response:* We agree that storing and transmitting health information
electronically creates concerns about the privacy of health information.
We do not agree, however, that covered entities should be expected to
maintain health information outside of an electronic system,
particularly as health care providers and health plans extend their
reliance on electronic transactions. We do not believe that it would be
feasible to permit individuals to opt out of electronic transactions by
withholding their consent. We note that individuals can ask providers
and health plans whether or not they store information electronically,
and can choose only providers who do not do so or who agree not to do
so. We also do not believe that it is practical or efficient to require
that electronic data bases contain only de-identified information.
Electronic transactions have achieved tremendous savings in the health
care system and electronic records have enabled significant improvements
in the quality and coordination of health care. These improvements would
not be possible with de-identified information.
**SECTION 164.508 - USES AND DISCLOSURES FOR WHICH AUTHORIZATION IS
REQUIRED**
***Uses and Disclosures Requiring Authorization***
*Comment:* We received many comments in general support of requiring
authorization for the use or disclosure of protected health information.
Some comments suggested, however, that we should define those uses and
disclosures for which authorization is required and permit covered
entities to make all other uses and disclosures without authorization.
*Response:* We retain the requirement for covered entities to obtain
authorization for all uses and disclosures of protected health
information that are not otherwise permitted or required under the rule
without authorization. We define exceptions to the general rule
requiring authorization for the use or disclosure of protected health
information, rather than defining narrow circumstances in which
authorization is required.
We believe this approach is consistent with well-established privacy
principles, with other law, and with industry standards and ethical
guidelines. The July 1977 Report of the Privacy Protection Study
Commission recommended that "each medical-care provider be considered to
owe a duty of confidentiality to any individual who is the subject of a
medical record it maintains, and that, therefore, no medical care
provider should disclose, or be required to disclose, in individually
identifiable form, any information about any such individual without the
individual's explicit authorization, unless the disclosures would be"
for specifically enumerated purposes such as treatment, audit or
evaluation, research, public health, and law enforcement.[^9] The
Commission made similar recommendations with respect to insurance
institutions.[^10] The Privacy Act (5 U.S.C. 552a) prohibits government
agencies from disclosing records except pursuant to the written request
of or pursuant to a written consent of the individual to whom the record
pertains, unless the disclosure is for certain specified purposes. The
National Association of Insurance Commissioners' Health Information
Privacy Model Act states, "A carrier shall not collect, use or disclose
protected health information without a valid authorization from the
subject of the protected health information, except as permitted by\...
this Act or as permitted or required by law or court order.
Authorization for the disclosure of protected health information may be
obtained for any purpose, provided that the authorization meets the
requirements of this section." In its report "Best Principles for Health
Privacy," the Health Privacy Working Group stated, "Personally
identifiable health information should not be disclosed without patient
authorization, except in limited circumstances" such as when required by
law, for oversight, and for research.[^11] The American Medical
Association's Council on Ethical and Judicial Affairs has issued an
opinion stating, "The physician should not reveal confidential
communications or information without the express consent of the
patient, unless required to do so by law \[and\] subject to certain
exceptions which are ethically and legally justified because of
overriding social considerations."[^12] We build on these standards in
this final rule.
*Comment:* Some comments suggested that, under the proposed rule, a
covered entity could not use protected health information to solicit
authorizations from individuals. For example, a covered entity could not
use protected health information to generate a mailing list for sending
an authorization for marketing purposes.
*Response:* We agree with this concern and clarify that covered entities
are permitted to use protected health information in this manner without
authorization as part of the management activities relating to
implementation of and compliance with the requirements of this rule. See
§ 164.501 and the corresponding preamble regarding the definition of
health care operations.
*Comment:* We received several comments suggesting that we not require
written authorizations for disclosures to the individual or for
disclosures initiated by the individual or the individual's legal
representative.
*Response:* We agree with this concern and in the final rule we clarify
that disclosures of protected health information to the individual who
is the subject of the information do not require the individual's
authorization. See § 164.502(a)(1). We do not intend to impose barriers
between individuals and disclosures of protected health information to
them.
When an individual requests that the covered entity disclose protected
health information to a third party, however, the covered entity must
obtain the individual's authorization, unless the third party is a
personal representative of the individual with respect to such protected
health information. See § 164.502(g). If under applicable law a person
has authority to act on behalf of an individual in making decisions
related to health care, except under limited circumstances, that person
must be treated as the personal representative under this rule with
respect to protected health information related to such representation.
A legal representative is a personal representative under this rule if,
under applicable law, such person is able to act on behalf of an
individual in making decisions related to health care, with respect to
the protected health information related to such decisions. For example,
an attorney of an individual may or may not be a personal representative
under the rule depending on the attorney's authority to act on behalf of
the individual in decisions related to health care. If the attorney is
the personal representative under the rule, he may obtain a copy of the
protected health information relevant to such personal representation
under the individual's right to access. If the attorney is not the
personal representative under the rule, or if the attorney wants a copy
of more protected health information than that which is relevant to his
personal representation, the individual would have to authorize such
disclosure.
*Comment:* Commenters expressed concern about whether a covered entity
can rely on authorizations made by parents on behalf of their minor
children once the child has reached the age of majority and recommended
that covered entities be able to rely on the most recent, valid
authorization, whether it was authorized by the parent or the minor.
*Response:* We agree. If an authorization is signed by a parent, who is
the personal representative of the minor child at the time the
authorization is signed, the covered entity may rely on the
authorization for as long as it is a valid authorization, in accordance
with § 164.508(b). A valid authorization remains valid until it expires
or is revoked. This protects a covered entity's reasonable reliance on
such authorization. The expiration date of the authorization may be the
date the minor will reach the age of majority. In that case, the covered
entity would be required to have the individual sign a new authorization
form in order to use or disclose information covered in the expired
authorization form.
*Comment:* Some commenters were concerned that covered entities working
together in an integrated system would each be required to obtain
authorization separately. These commenters suggested the rule should
allow covered entities that are part of the same system to obtain a
single authorization allowing each of the covered entities to use and
disclose protected health information in accordance with that
authorization.
*Response:* If the rule does not permit or require a covered entity to
use or disclose protected health information without the individual's
authorization, the covered entity must obtain the individual's
authorization to make the use or disclosure. Multiple covered entities
working together as an integrated delivery system or otherwise may
satisfy this requirement in at least three ways. First, each covered
entity may separately obtain an authorization directly from the
individual who is the subject of the protected health information to be
used or disclosed. Second, one covered entity may obtain a compound
authorization in accordance with § 164.508(b)(3) that authorizes
multiple covered entities to use and disclose protected health
information. In accordance with § 164.508(c)(1)(ii), each covered
entity, or class of covered entities, that is authorized to make the use
or disclosure must be clearly identified. Third, if the requirements in
§ 164.504(d) are met, the integrated delivery system may elect to
designate itself as a single affiliated covered entity. A valid
authorization obtained by that single affiliated covered entity would
satisfy the authorization requirements for each covered entity within
the affiliated covered entity. Whichever option is used, because these
authorizations are being requested by a covered entity for its own use
or disclosure, the authorization must contain both the core elements in
§ 164.508(c) and the additional elements in § 164.508(d).
***Sale, Rental, or Barter***
*Comment:* Proposed § 164.508 listed examples of activities that would
have required authorization, which included disclosure by sale, rental,
or barter. Some commenters requested clarification that this provision
is not intended to affect mergers, sale, or similar transactions dealing
with entire companies or their individual divisions. A few commenters
stated that covered entities should be allowed to sell protected health
information, including claims data, as an asset of the covered entity.
*Response:* We clarify in the definition of health care operations that
a covered entity may sell or transfer its assets, including protected
health information, to a successor in interest that is or will become a
covered entity. See § 164.501 and the corresponding preamble discussion
regarding this change. We believe this change meets commenters' business
needs without compromising individuals' privacy interests.
*Comment:* Some commenters supported the requirement for covered
entities to obtain authorization for the sale, rental, or barter of
protected health information. Some commenters argued that protected
health information should never be bought or sold by anyone, even with
the individual's authorization.
*Response:* We removed the reference to sale, rental, or barter in the
final rule because we determined that the term was overly broad. For
example, if a researcher reimbursed a provider for the cost of
configuring health data to be disclosed under the research provisions at
§ 164.512(i), there may have been ambiguity that this was a sale and,
therefore, required authorizations from the individuals who were the
subjects of the information. We clarify in the final rule that if the
use or disclosure is otherwise permitted or required under the rule
without authorization, such authorization is not required simply because
the disclosure is made by sale, rental, or barter.
*Comment:* Many commenters expressed concerns that their health
information will be sold to pharmaceutical companies.
*Response:* Although we have removed the reference to sale, rental or
barter, the final rule generally would not permit the sale of protected
health information to a pharmaceutical company without the authorization
of individuals who are the subjects of the information. In some cases, a
covered entity could disclose protected health information to a
pharmaceutical company for research purposes if the disclosure met the
requirements of § 164.512(i).
*Psychotherapy Notes*
*Comment:* Public response to the concept of providing additional
protections for psychotherapy notes was divided. Many individuals and
most providers, particularly mental health practitioners, advocated
requiring consent for use or disclosure of all or most protected health
information, but particularly sensitive information such as mental
health information, not necessarily limited to psychotherapy notes.
Others thought there should be special protections for psychotherapy
information based on the federal psychotherapist-patient privilege
created by the U.S. Supreme Court in *Jaffee v. Redmond* and the need
for an atmosphere of trust between therapist and patient that is
required for effective psychotherapy. Several consumer groups
recommended prohibiting disclosure of psychotherapy notes for payment
purposes.
Some commenters, however, saw no need for special protections for
psychotherapy communications and thought that the rules should apply the
same protections for all individually identifiable information. Other
commenters who advocated for no special protections based their
opposition on the difficulty in drawing a distinction between physical
and mental health and that special protections should be left to the
states. Many health plans and employers did not support additional
protections for psychotherapy notes because they stated they need access
to this information to assess the adequacy of treatment, the severity of
a patient's condition, the extent of a disability, or the ability to
monitor the effectiveness of an individual's mental health care and
eligibility for benefits. Other commenters, many from insurance
companies, cited the need to have psychotherapy notes to detect fraud.
A few commenters said that it was not necessary to provide additional
protections to psychotherapy notes because the "minimum necessary"
provisions of the NPRM provide sufficient protections.
*Response*: In the final rule, a covered entity generally must obtain an
authorization for disclosure of psychotherapy notes, or for use by a
person other than the person who created the psychotherapy notes. This
authorization is specific to psychotherapy notes and is in addition to
the consent an individual may have given for the use or disclosure of
other protected health information to carry out treatment, payment, and
health care operations. This additional level of individual control
provides greater protection than a general application of the \"minimum
necessary\" rule. Nothing in this regulation weakens existing rules
applicable to mental health information that provide more stringent
protections. We do not intend to alter the holding in *Jaffee v.
Redmond*.
Generally, we have not treated sensitive information differently from
other protected health information; however, we have provided additional
protections for psychotherapy notes because of *Jaffee v. Redmond* and
the unique role of this type of information. There are few reasons why
other health care entities should need access to psychotherapy notes,
and in those cases, the individual is in the best position to determine
if the notes should be disclosed. As we have defined them, psychotherapy
notes are primarily of use to the mental health professional who wrote
them, maintained separately from the medical record, and not involved in
the documentation necessary to carry out treatment, payment, or health
care operations. Since psychotherapy notes have been defined to exclude
information that health plans would typically need to process a claim
for benefits, special authorization for payment purposes should be rare.
Unlike information shared with other health care providers for the
purposes of treatment, psychotherapy notes are more detailed and
subjective and are today subject to unique privacy and record retention
practices. In fact, it is this separate existence and isolated use that
allows us to grant the extra protection without causing an undue burden
on the health care system.
*Comment:* Many commenters suggested we prohibit disclosure of
psychotherapy notes without authorization for uses and disclosures under
proposed § 164.510 of the NPRM, or that protections should be extended
to particular uses and disclosures, such as disclosures for public
health, law enforcement, health oversight, and judicial and
administrative proceedings. One of these commenters stated that the only
purpose for which psychotherapy notes should be disclosed without
authorization is for preventing or lessening a serious or imminent
threat to health or safety (proposed §154.510(k)). Another commenter
stated that the rule should allow disclosure of psychotherapy notes
without authorization for this purpose, or as required by law in cases
of abuse or neglect.
Other commenters did not want these protections to be extended to
certain national priority activities. They claimed that information
relative to psychotherapy is essential to states\' activities to protect
the public from dangerous mentally ill offenders and abusers, to deliver
services to individuals who are unable to authorize release of health
care information, and for public health assessments. One commenter
requested clarification of when psychotherapy notes could be released in
emergency circumstances. Several commenters stated that psychotherapy
notes should not be disclosed for public health purposes.
*Response:* We agree with the commenters who suggested extending
protections of psychotherapy notes and have limited the purposes for
which psychotherapy notes may be disclosed without authorization for
purposes other than treatment, payment, or health care operations. The
final rule requires covered entities to obtain authorization to use or
disclose psychotherapy notes for purposes listed in § 164.512, with the
following exceptions: An authorization is not required for use or
disclosure of psychotherapy notes when the use or disclosure is required
for enforcement of this rule, in accordance with § 164.502(a)(2)(ii);
when required by law, in accordance with § 164.512(a); when needed for
oversight of the covered health care provider who created the
psychotherapy notes, in accordance with § 164.512(d); when needed by a
coroner or medical examiner, in accordance with § 164.512(g)(1); or when
needed to avert a serious and imminent threat to health or safety, in
accordance with § 164.512(j)(1)(i).
*Comment:* A commenter suggested that we follow the federal regulations
governing confidentiality of alcohol and substance abuse records as a
model for limited disclosure of psychotherapy notes for audits or
evaluations. Under these regulations, a third party payor or a party
providing financial assistance may access confidential records for
auditing purposes if the party agrees in writing to keep the records
secure and destroy any identifying information upon completion of the
audit. (42 CFR Part 2)
*Response:* We agree that the federal regulations concerning alcohol and
drug abuse provide a good model for protection of information. However,
according to our fact-finding discussions, audit or evaluation should
not require access to psychotherapy notes. Protected health information
kept in the medical record about an individual should be sufficient for
these purposes. The final rule does not require authorization for use or
disclosure of psychotherapy notes when needed for oversight of the
covered health care provider who created the psychotherapy notes.
*Comment:* A provider organization urged that the disclosure of
psychotherapy notes be strictly prohibited except to the extent needed
in litigation brought by the client against the mental health
professional on the grounds of professional malpractice or disclosure in
violation of this section.
*Response:* We agree that psychotherapy notes should be available for
the defense of the provider who created the notes when the individual
who is the subject of the notes puts the contents of the notes at issue
in a legal case. In the final rule, we allow the provider to disclose
the notes to his or her lawyer for the purpose of preparing a defense.
Any other disclosure related to judicial and administrative proceedings
is governed by § 164.512(e).
*Comment:* One commenter requested that we prohibit mental health
information that has been disclosed from being re-disclosed without
patient authorization.
*Response:* Psychotherapy notes may only be disclosed pursuant to an
authorization, except under limited circumstances. Covered entities must
adhere to the terms of authorization and not disclose psychotherapy
notes to persons other than those identified as intended recipients or
for other purposes. A covered entity that receives psychotherapy notes
must adhere to the terms of this rule - including obtaining an
authorization for any further use or disclosure. We do not have the
authority, however, to prohibit non-covered entities from re-disclosing
psychotherapy notes or any other protected health information.
*Comment:* A provider organization argued for inclusion of language in
the final rule that specifies that real or perceived "ownership" of the
mental health record does not negate the requirement that patients must
specifically authorize the disclosure of their psychotherapy notes. They
cited a July 1999 National Mental Health Association survey, which found
that for purposes of utilization review, every managed care plan policy
reviewed "maintains the right to access the full medical record
(including detailed psychotherapy notes) of any consumer covered under
its benefit plan at its whim." At least one of the major managed health
plans surveyed considered the patient record to be the property of the
health plan and governed by the health plan's policies.
*Response:* Although a covered entity may own a mental health record,
the ability to use or disclose an individual\'s information is limited
by state law and this rule. Under this rule, a mental health plan would
not have access to psychotherapy notes created by a covered provider
unless the individual who is the subject of the notes authorized
disclosure to the health plan.
*Comment:* Some commenters expressed concern regarding the burden
created by having to obtain multiple authorizations and requested
clarification as to whether separate authorization for use and
disclosure of psychotherapy notes is required.
*Response:* For the reasons explained above, we retain in the final rule
a requirement that a separate authorization must be obtained for most
uses or disclosures of psychotherapy notes, including those for
treatment, payment, and health care operations. The burden of such a
requirement is extremely low, however, because under our definition of
psychotherapy notes, the need for such authorization will be very rare.
*Comment:* One commenter stated that Medicare should not be able to
require the disclosure of psychotherapy notes because it would destroy a
practitioner's ability to treat patients effectively.
*Response:* We agree. As in the proposed rule, covered entities may not
disclose psychotherapy notes for payment purposes without an
authorization. If a specific provision of law requires the disclosure of
these notes, a covered entity may make the disclosure under §
164.512(a). The final rule, however, does not require the disclosure of
these notes to Medicare.
*Comment:* One commenter expressed concern that by filing a complaint an
individual would be required to reveal sensitive information to the
public. Another commenter suggested that complaints regarding
noncompliance in regard to psychotherapy notes should be made to a panel
of mental health professionals designated by the Secretary. This
commenter also proposed that all patient information would be maintained
as privileged, would not be revealed to the public, and would be kept
under seal after the case is reviewed and closed.
*Response:* We appreciate this concern and the Secretary will ensure
that individually identifiable health information and other personal
information contained in complaints will not be available to the public.
This Department seeks to protect the privacy of individuals to the
fullest extent possible, while permitting the exchange of records
required to fulfill its administrative and program responsibilities. The
Freedom of Information Act, 5 U.S.C. 552, and the HHS implementing
regulation, 45 CFR Part 5, protect records about individuals if the
disclosure would constitute an unwarranted invasion of their personal
privacy, as does the Privacy Act, 5 U.S.C. 552a. See the discussion of
FOIA and the Privacy Act in the "Relationship to Other Federal Laws"
section of the preamble. Information that the Secretary routinely
withholds from the public in its current enforcement activities include
individual names, addresses, and medical information. Additionally, the
Secretary attempts to guard against the release of information that
might involve a violation of personal privacy by someone being able to
"read between the lines" and piece together items that would constitute
information that normally would be protected from release to the public.
In implementing the privacy rule, the Secretary will continue this
practice of protecting personal information.
It is not clear whether the commenter with regard to the use of mental
health professionals believes that such professionals should be involved
because they would be best able to keep psychotherapy notes confidential
or because such professionals can best understand the meaning or
relevance of such notes. We anticipate that we would not have to obtain
a copy or review psychotherapy notes in investigating most complaints
regarding noncompliance in regard to such notes. There may be some cases
in which a quick review of the notes may be needed, such as when we need
to identify that the information a covered entity disclosed was in fact
psychotherapy notes. If we need to obtain a copy of psychotherapy notes,
we will keep these notes confidential and secure. Investigative staff
will be trained in privacy to ensure that they fully respect the
confidentiality of personal information. In addition, while the content
of these notes is generally not relevant to violations under this rule,
we will secure the expertise of mental health professionals if needed in
reviewing psychotherapy notes.
*Comment:* A mental health organization recommended prohibiting health
plans and covered health care providers from disclosing psychotherapy
notes to coroners or medical examiners.
*Response:* In general, we have severely limited disclosures of
psychotherapy notes without the individual\'s authorization. One case
where the information may prove invaluable, but authorization by the
individual is impossible and authorization by a surrogate is potentially
contraindicated, is in the investigation of the death of the individual.
The final rule allows for disclosures to coroners or medical examiners
in this limited case.
*Comment:* One commenter recommended prohibiting disclosure without
authorization of psychotherapy notes to government health data systems.
*Response:* The decision to eliminate the general provision permitting
disclosures to government health data systems addresses this comment.
*Comment:* Several commenters were concerned that in practice, a
treatment team in a mental health facility shares information about a
patient in order to care for the patient and that the provision
requiring authorization for use and disclosure of psychotherapy notes
would expose almost all privileged information to disclosure. They
requested that we add a provision that any authorization or disclosure
under that statute shall not constitute a waiver of the
psychotherapist-patient privilege.
*Response:* Because of the restricted definition we have adopted for
psychotherapy notes, we do not expect that members of a team will share
such information. Information shared in order to care for the patient
is, by definition, not protected as psychotherapy notes. With respect to
waiving privilege, however, we believe that the consents and
authorizations described in §§ 164.506 and 164.508 should not be
construed as waivers of a patient\'s evidentiary privilege. See the
discussions under § 164.506 and "Relationship to Other Laws," above.
***Research Information Unrelated to Treatment***
*Definition of Research Information Unrelated to Treatment*
*Comment:* The majority of commenters, including many researchers and
health care providers, objected to the proposed definition of research
information unrelated to treatment, asserting that the privacy rule
should not distinguish research information unrelated to treatment from
other forms of protected health information. Even those who supported
the proposed distinction between research information related and
unrelated to treatment suggested alternative definitions for research
information unrelated to treatment.
A large number of commenters were concerned that the definition of
research information unrelated to treatment was vague and unclear and,
therefore, would be difficult or impossible to apply. These commenters
asserted that in many instances it would not be feasible to ascertain
whether research information bore some relation to treatment. In
addition, several commenters asserted that the need for distinguishing
research information unrelated to treatment from other forms of
protected health information was not necessary because the proposed
rule's general restrictions for the use and disclosure of protected
health information and the existing protections for research information
were sufficiently strong.
Of the commenters who supported the proposed distinction between
research information related and unrelated to treatment, very few
supported the proposed definition of research unrelated to treatment. A
few commenters recommended that the definition incorporate a good faith
provision and apply only to health care providers, because they thought
it was unlikely that a health plan or health care clearinghouse would be
conducting research. One commenter recommended defining research
information unrelated to treatment as information which does not
directly affect the treatment of the individual patient. As a means of
clarifying and standardizing the application of this definition, one
commenter also asserted that the definition should be based on whether
the research information was for publication. In addition, one commenter
specifically objected to the provision of the proposed definition that
would have required that research information unrelated to treatment be
information "with respect to which the covered entity has not requested
payment from a third party payor." This commenter asserted that patient
protection should not be dependent on whether a health plan will pay for
certain care.
*Response:* We agree with the commenters who found the proposed
definition of research information unrelated to treatment to be
impractical and infeasible to apply and have eliminated this definition
and its related provisions in the final rule. Although we share concerns
raised by some commenters that research information generated from
research studies that involve the delivery of treatment to individual
subjects may need additional privacy protection, we agree with the
commenters who asserted that there is not always a clear distinction
between research information that is related to treatment and research
information that is not. We found that the alternative definitions
proposed by commenters did not alleviate the serious concerns raised by
the majority of comments received on this definition.
Instead, in the final rule, we require covered entities that create
protected health information for the purpose, in whole or in part, of
research that includes treatment of individuals to include additional
elements in authorizations they request for the use or disclosure of
that protected health information. As discussed in § 164.508(f), these
research-related authorizations must include a description of the extent
to which some or all of the protected health information created for the
research will also be used or disclosed for purposes of treatment,
payment, and health care operations. For example, if the covered entity
intends to seek reimbursement from the individual's health plan for the
routine costs of care associated with the research protocol, it must
explain in the authorization the types of information that it will
provide to the health plan for this purpose. This information, and the
circumstances under which disclosures will be made for treatment,
payment, and health care operations, may be more limited than the
information and circumstances described in the covered entity's general
notice of information practices and are binding on the covered entity.
Under this approach, the covered entity that creates protected health
information for research has discretion to determine whether there is a
subset of research information that will have fewer allowable
disclosures without authorization, and prospective research subjects
will be informed about how research information about them would be used
and disclosed should they agree to participate in the research study. We
believe this provision in the final rule provides covered entities that
participate in research necessary flexibility to enhance privacy
protections for research information and provides prospective research
subjects with needed information to determine whether their privacy
interests would be adequately protected before agreeing to participate
in a research study that involves the delivery of health care.
The intent of this provision is to permit covered entities that
participate in research to bind themselves to a more limited scope of
uses and disclosures for all or identified subsets of
research information generated from research that involves the delivery
of treatment than it may apply to other protected health information. In
designing their authorizations, we expect covered entities to be mindful
of the often highly sensitive nature of research information and the
impact of individuals' privacy concerns on their willingness to
participate in research. For example, a covered entity conducting a
study which involves the evaluation of a new drug, as well as an
assessment of a new un-validated genetic marker of a particular disease,
could choose to stipulate in the research authorization that the genetic
information generated from this study will not be disclosed without
authorization for some of the public policy purposes that would
otherwise be permitted by the rule under §§ 164.510 and 164.512 and by
the covered entity's notice. A covered entity may not, however, include
a limitation affecting its right to make a use or disclosure that is
either required by law or is necessary to avert a serious and imminent
threat to health or safety.
The final rule also permits the covered entity to combine the research
authorization under § 164.508(f) with the consent to participate in
research, such as the informed consent document as stipulated under the
Common Rule or the Food and Drug Administration's human subjects
regulations.
*Enhance privacy protections for research information*
*Comment:* A number of commenters argued that research information
unrelated to treatment should have fewer allowable disclosures without
authorization than those that would have been permitted by the proposed
rule. The commenters who made this argument included those commenters
who recommended that the privacy rule not cover the information we
proposed to constitute research information unrelated to treatment, as
well as those who asserted that the rule should cover such information.
These commenters agreed with the concern expressed in the proposed rule
that patients would be reluctant to participate in research if they
feared that research information could be disclosed without their
permission or used against them. They argued that fewer allowable
disclosures should be permitted for research information because the
clinical utility of the research information is most often unknown, and
thus, it is unsuitable for use in clinical decision making. Others also
argued that it is critical to the conduct of clinical research that
researchers be able to provide individual research subjects, and the
public at large, the greatest possible assurance that their privacy and
the confidentiality of any individually identifiable research
information will be protected from disclosure.
Several commenters further recommended that only the following uses and
disclosures be permitted for research information unrelated to treatment
without authorization: (1) for the oversight of the researcher or the
research study; (2) for safety and efficacy reporting required by FDA;
(3) for public health; (4) for emergency circumstances; or (5) for
another research study. Other commenters recommended that the final rule
explicitly prohibit law enforcement officials from gaining access to
research records.
In addition, several commenters asserted that the rule should be revised
to ensure that once protected health information was classified as
research information unrelated to treatment, it could not be
re-classified as something else at a later date. These commenters
believed that if this additional protection were not added, this
information would be vulnerable to disclosure in the future, if the
information were later to gain scientific validity. They argued that
individuals may rely on this higher degree of confidentiality when
consenting to the collection of the information in the first instance,
and that confidentiality should not be betrayed in the future just
because the utility of the information has changed.
*Response:* We agree with commenters who argued that special protections
may be appropriate for research information in order to provide research
subjects with assurances that their decision to participate in research
will not result in harm stemming from the misuse of the research
information. We are aware that some researchers currently retain
separate research records and medical records as a means of providing
more stringent privacy protections for the research record. The final
rule permits covered entities that participate in research to continue
to provide more stringent privacy protections for the research record,
and the Secretary strongly encourages this practice to protect research
participants from being harmed by the misuse of their research
information.
As discussed above, in the final rule, we eliminate the special rules
for this proposed definition of research information unrelated to
treatment and its related provisions, so the comments regarding its
application are moot.
*Comment:* Some commenters recommended that the final rule prohibit a
covered entity from conditioning treatment, enrollment in a health plan,
or payment on a requirement that the individual authorize the use or
disclosure of information we proposed to constitute research information
unrelated to treatment.
*Response:* Our decision to eliminate the definition of research
information unrelated to treatment and its related provisions in the
final rule renders this comment moot.
*Comment:* A few commenters opposed distinguishing between research
information related to treatment and research information unrelated to
treatment, arguing that such a distinction could actually weaken the
protection afforded to clinically-related health information that is
collected in clinical trials. These commenters asserted that
Certificates of Confidentiality shield researchers from being compelled
to disclose individually identifiable health information relating to
biomedical or behavioral research information that an investigator
considers sensitive.
*Response:* Our decision to eliminate the definition of research
information unrelated to treatment and its related provisions in the
final rule renders this comment moot. We would note that nothing in the
final rule overrides Certificates of Confidentiality, which protect
against the compelled disclosure of identifying information about
subjects of biomedical, behavioral, clinical, and other research as
provided by the Public Health Service Act section 301(d), 42 U.S.C.
241(d).
*Privacy protections for research information too stringent*
*Comment:* Many of the commenters who opposed the proposed definition of
research information unrelated to treatment and its related provisions
believed that the proposed rule would have required authorization before
research information unrelated to treatment could have been used or
disclosed for any of the public policy purposes outlined in proposed §
164.510, and that this restriction would have significantly hindered
many important activities. Many of these commenters specifically opposed
this provision, arguing that the distinction would undermine and impede
research by requiring patient authorization before research information
unrelated to treatment could be used or disclosed for research.
Furthermore, some commenters recommended that the disclosure of research
information should be governed by an informed consent agreement already
in place as part of a clinical protocol, or its disclosure should be
considered by an institutional review board or privacy board.
*Response:* Our decision to eliminate the definition of research
information unrelated to treatment and its related provisions in the
final rule renders the first two comments moot.
We disagree with the comment that suggests that existing provisions
under the Common Rule are sufficient to protect the privacy interests of
individuals who are subjects in research that involves the delivery of
treatment. As discussed in the NPRM, not all research is subject to the
Common Rule. In addition, we are not convinced that existing procedures
adequately inform individuals about how their information will be used
as part of the informed consent process. In the final rule, we provide
for additional disclosure to subjects of research that involves the
delivery of treatment as part of the research authorization under §
164.508(f). We also clarify that the research authorization could be
combined with the consent to participate in research, such as the
informed consent document as stipulated under the Common Rule or the
Food and Drug Administration's human subjects regulations. The Common
Rule (§\_\_.116(a)(5)) requires that "informed consent" include "a
statement describing the extent, if any, to which confidentiality of
records identifying the subject will be maintained." We believe that the
research authorization requirements of § 164.508(f) complement the
Common Rule's requirement for informed consent.
*The Secretary's Authority*
*Comment:* Several commenters, many from the research community,
asserted that the coverage of \"research information unrelated to
treatment\" was beyond the Department\'s legal authority since HIPAA did
not give the Secretary authority to regulate researchers. These
commenters argued that the research records held by researchers who are
performing clinical trials and who keep separate research records should
not be subject to the final rule. These commenters strongly disagreed
that a health provider-researcher cannot carry out two distinct
functions while performing research and providing clinical care to
research subjects and, thus, asserted that research information
unrelated to treatment that is kept separate from the medical record,
would not be covered by the privacy rule.
*Response:* We do not agree the Secretary lacks the authority to adopt
standards relating to research information, including research
information unrelated to treatment. HIPAA provides authority for the
Secretary to set standards for the use and disclosure of individually
identifiable health information created or received by covered entities.
For the reasons commenters identified for why it was not practical or
feasible to divide research information into two categories--research
information related to treatment and research information unrelated to
treatment--we also determined that for a single research study that
includes the treatment of research subjects, it is not practical or
feasible to divide a researcher into two categories--a researcher who
provides treatment and a researcher who does not provide treatment to
research subjects. When a researcher is interacting with research
subjects for a research study that involves the delivery of health care
to subjects, it is not always clear to either the researcher or the
research subject whether a particular research activity will generate
research information that will be pertinent to the health care of the
research subject. Therefore, we clarify that a researcher may also be a
health care provider if that researcher provides health care, e.g.,
provides treatment to subjects in a research study, and otherwise meets
the definition of a health care provider, regardless of whether there is
a component of the research study that is unrelated to the health care
of the research subjects. This researcher/health care provider is then a
covered entity with regard to her provider activities if she conducts
standard transactions.
***Valid Authorizations***
*Comment:* In proposed § 164.508(b)(1), we specified that an
authorization containing the applicable required elements "must be
accepted by the covered entity." A few comments requested clarification
of this requirement.
*Response:* We agree with the commenters that the proposed provision was
ambiguous and we remove it from the final rule. We note that nothing in
the rule requires covered entities to act on authorizations that they
receive, even if those authorizations are valid. A covered entity
presented with an authorization is permitted to make the disclosure
authorized, but is not required to do so.
We want to be clear, however, that covered entities will be in
compliance with this rule if they use or disclose protected health
information pursuant to an authorization that meets the requirements of
§ 164.508. We have made changes in § 164.508(b)(1) to clarify this
point. First, we specify that an authorization containing the applicable
required elements is a valid authorization. A covered entity may not
reject as invalid an authorization containing such elements. Second, we
clarify that a valid authorization may contain elements or information
in addition to the required elements, as long as the additional elements
are not inconsistent with the required elements.
*Comment:* A few comments requested that we provide a model
authorization or examples of wording meeting the "plain language"
requirement. One commenter requested changes to the language in the
model authorization to avoid confusion when used in conjunction with an
insurer's authorization form for application for life or disability
income insurance. Many other comments, however, found fault with the
proposed model authorization form.
*Response:* Because of the myriad of types of forms that could meet
these requirements and the desire to encourage covered entities to
develop forms that meet their specific needs, we do not include a model
authorization form in the final rule. We intend to issue additional
guidance about authorization forms prior to the compliance date. We also
encourage standard-setting organizations to develop model forms meeting
the requirements of this rule.
***Defective Authorizations***
*Comment:* Some commenters suggested we insert a "good-faith reliance"
or "substantial compliance" standard into the authorization
requirements. Commenters suggested that covered entities should be
permitted to rely on an authorization as long as the individual has
signed and dated the document. They stated that individuals may not fill
out portions of a form that they feel are irrelevant or for which they
do not have an answer. They argued that requiring covered entities to
follow up with each individual to complete the form will cause
unwarranted delays. In addition, commenters were concerned that large
covered entities might act in good faith on a completed authorization,
only to find out that a component of the entity "knew" some of the
information on the form to be false or that the authorization had been
revoked. These commenters did not feel that covered entities should be
held in violation of the rule in such situations.
*Response:* We retain the provision as proposed and include one
additional element: the authorization is invalid if it is combined with
other documents in violation of the standards for compound
authorizations. We also clarify that an authorization is invalid if
material information on the form is known to be false. The elements we
require to be included in the authorization are intended to ensure that
individuals knowingly and willingly authorize the use or disclosure of
protected health information about them. If these elements are missing
or incomplete, the covered entity cannot know which protected health
information to use or disclose to whom and cannot be confident that the
individual intends for the use or disclosure to occur.
We have attempted to make the standards for defective authorizations as
unambiguous as possible. In most cases, the covered entity will know
whether the authorization is defective by looking at the form itself.
Otherwise, the covered entity must know that the authorization has been
revoked, that material information on the form is false, or that the
expiration date or event has occurred. If the covered entity does not
know these things and the authorization is otherwise satisfactory on its
face, the covered entity is permitted to make the use or disclosure in
compliance with this rule.
We have added two provisions to make it easier for covered entities to
"know" when an authorization has been revoked. First, under §
164.508(b)(5), the revocation must be made in writing. Second, under §
164.508(c)(1)(v), authorizations must include instructions for how the
individual may revoke the authorization. Written revocations submitted
in the manner appropriate for the covered entity should ease covered
entities' compliance burden.
***Compound Authorizations***
*Comment:* Many commenters raised concerns about the specificity of the
authorization requirement. Some comments recommended that we permit
covered entities to include multiple uses and disclosures in a single
authorization and allow individuals to authorize or not authorize
specific uses and disclosures in the authorization. Other commenters
asked whether a single authorization is sufficient for multiple uses or
disclosures for the same purpose, for multiple uses and disclosures for
related purposes, and for uses and disclosures of different types of
information for the same purpose. Some comments from health care
providers noted that specific authorizations would aid their compliance
with requests.
*Response:* As a general rule, we prohibit covered entities from
combining an authorization for the use or disclosure of protected health
information with any other document. For example, an authorization may
not be combined with a consent to receive treatment or a consent to
assign payment of benefits to a provider. We intend the authorizations
required under this rule to be voluntary for individuals, and,
therefore, they need to be separate from other forms of consent that may
be a condition of treatment or payment or that may otherwise be coerced.
We do, however, permit covered entities to combine authorizations for
uses and disclosures for multiple purposes into a single authorization.
The only limitations are that an authorization for the use or disclosure
of psychotherapy notes may not be combined with an authorization for the
use or disclosure of other types of protected health information and
that an authorization that is a condition of treatment, payment,
enrollment, or eligibility may not be combined with any other
authorization.
In § 164.508(b)(3), we also permit covered entities to combine an
authorization for the use or disclosure of protected health information
created for purposes of research including treatment of individuals with
certain other documents.
We note that covered entities may only make uses or disclosures pursuant
to an authorization that are consistent with the terms of the
authorization. Therefore, if an individual agrees to one of the
disclosures described in the compound authorization but not another, the
covered entity must comply with the individual's decision. For example,
if a covered entity asks an individual to sign an authorization to
disclose protected health information for both marketing and fundraising
purposes, but the individual only agrees to the fundraising disclosure,
the covered entity is not permitted to make the marketing disclosure.
***Prohibition on Conditioning Treatment, Payment, Eligibility, or
Enrollment***
*Comment:* Many commenters supported the NPRM's prohibition of covered
entities from conditioning treatment or payment on the individual's
authorization of uses and disclosures. Some commenters requested
clarification that employment can be conditioned on an authorization.
Some commenters recommended that we eliminate the requirement for
covered entities to state on the authorization form that the
authorization is not a condition of treatment or payment. Some
commenters suggested that we prohibit the provision of anything of
value, including employment, from being conditioned on receipt of an
authorization.
In addition, many commenters argued that patients should not be coerced
into signing authorizations for a wide variety of purposes as a
condition of obtaining insurance coverage. Some health plans, however,
requested clarification that health plan enrollment and eligibility can
be conditioned on an authorization.
*Response:* We proposed to prohibit covered entities from conditioning
treatment, payment, or enrollment in a health plan on an authorization
for the use or disclosure of psychotherapy notes (see proposed §
164.508(a)(3)(iii)). We proposed to prohibit covered entities from
conditioning treatment or payment on authorization for the use or
disclosure of any other protected health information (see proposed §
164.508(a)(2)(iii)).
We resolve this inconsistency by clarifying in § 164.508(b)(4) that,
with certain exceptions, a covered entity may not condition the
provision of treatment, payment, enrollment in a health plan, or
eligibility for benefits on an authorization for the use or disclosure
of any protected health information, including psychotherapy notes. We
intend to minimize the potential for covered entities to coerce
individuals into signing authorizations for the use or disclosure of
protected health information when such information is not essential to
carrying out the relationship between the individual and the covered
entity.
Pursuant to that goal, we have created limited exceptions to the
prohibition. First, a covered health care provider may condition
research-related treatment of an individual on obtaining the
individual's authorization to use or disclose protected health
information created for the research. Second, except with respect to
psychotherapy notes, a health plan may condition the individual's
enrollment or eligibility in the health plan on obtaining an
authorization for the use or disclosure of protected health information
for making enrollment or eligibility determinations relating to the
individual or for its underwriting or risk rating determinations. Third,
a health plan may condition payment of a claim for specified benefits on
obtaining an authorization under § 164.508(e) for disclosure to the plan
of protected health information necessary to determine payment of the
claim. Fourth, a covered entity may condition the provision of health
care that is solely for the purpose of creating protected health
information for disclosure to a third party (such as fitness-for-duty
exams and physicals necessary to obtain life insurance coverage) on
obtaining an authorization for the disclosure of the protected health
information. We recognize that covered entities need protected health
information in order to carry out these functions and provide services
to the individual; therefore, we allow authorization for the disclosure
of the protected health information to be a condition of obtaining the
services.
We believe that we have prohibited covered entities from conditioning
the services they provide to individuals on obtaining an authorization
for uses and disclosures that are not essential to those services. Due
to our limited authority, however, we cannot entirely prevent
individuals from being coerced into signing these forms. We do not, for
example, have the authority to prohibit an employer from requiring its
employees to sign an authorization as a condition of employment.
Similarly, a program such as the Job Corps may make such an
authorization a condition of enrollment in the Job Corps program. While
the Job Corps may include a health care component, the non-covered
component of the Job Corps may require as a condition of enrollment that
the individual authorize the health care component to disclose protected
health information to the non-covered component. See § 164.504(b).
However, we note that other nondiscrimination laws may limit the ability
to condition these authorizations as well.
*Comment:* A Medicaid fraud control association stated that many states
require or permit state Medicaid agencies to obtain an authorization for
the use and disclosure of protected health information for payment
purposes as a condition of enrolling an individual as a Medicaid
recipient. The commenter, therefore, urged an exception to the
prohibition on conditioning enrollment on obtaining an authorization.
*Response:* As explained above, under § 164.506(a)(4), health plans and
other covered entities may seek the individual's consent for the covered
entity's use and disclosure of protected health information to carry out
treatment, payment, or health care operations. If the consent is sought
in conjunction with enrollment, the health plan may condition enrollment
in the plan on obtaining the individual's consent.
Under § 164.506(a)(5), we specify that a consent obtained by one covered
entity is not effective to permit another covered entity to use or
disclose protected health information for payment purposes. If state law
requires a Medicaid agency to obtain the individual's authorization for
providers to disclose protected health information to the Medicaid
agency for payment purposes, the agency may do so under § 164.508(e).
This authorization must not be a condition of enrollment or eligibility,
but may be a condition of payment of a claim for specified benefits if
the disclosure is necessary to determine payment of the claim.
***Revocation of Authorizations***
*Comment:* Many commenters supported the right to revoke an
authorization. Some comments, however, suggested that we require
authorizations to remain valid for a minimum period of time, such as one
year or the duration of the individual's enrollment in a health plan.
*Response:* We retain the right for individuals to revoke an
authorization at any time, with certain exceptions. We believe this
right is essential to ensuring that the authorization is voluntary. If
an individual determines that an authorized use or disclosure is no
longer in her best interest, she should be able to withdraw the
authorization and prevent any further uses or disclosures.
*Comment:* Several commenters suggested that we not permit individuals
to revoke an authorization if the revocation would prevent an
investigation of material misrepresentation or fraud. Other commenters
similarly suggested that we not permit individuals to revoke an
authorization prior to a claim for benefits if the insurance was issued
in reliance on the authorization.
*Response:* To address this concern, we include an additional exception
to the right to revoke an authorization. Individuals do not have the
right to revoke an authorization that was obtained as a condition of
insurance coverage during any contestability period under other law. For
example, if a life insurer obtains the individual's authorization for
the use or disclosure of protected health information to determine
eligibility or premiums under the policy, the individual does not have
the right to revoke the authorization during any period of time in which
the life insurer can contest a claim for benefits under the policy in
accordance with state law. If an individual were able to revoke the
authorization after enrollment but prior to making a claim, the insurer
would be forced to pay claims without having the necessary information
to determine whether the benefit is due. We believe the existing
exception for covered entities that have acted in reliance on the
authorization is insufficient to address this concern because it is
another person, not the covered entity, that has acted in reliance on
the authorization. In the life insurance example, it is the life insurer
that has taken action (i.e., issued the policy) in reliance on the
authorization. The life insurer is not a covered entity, therefore the
covered entity exception is inapplicable.
*Comment:* Some comments suggested that a covered entity that had
compiled, but not yet disclosed, protected health information would have
already taken action in reliance on the authorization and could
therefore disclose the information even if the individual revoked the
authorization.
*Response:* We intend for covered entities to refrain from further using
or disclosing protected health information to the maximum extent
possible once an authorization is revoked. The exception exists only to
the extent the covered entity has taken action in reliance on the
authorization. If the covered entity has not yet used or disclosed the
protected health information, it must refrain from doing so, pursuant to
the revocation. If, however, the covered entity has already disclosed
the information, it is not required to retrieve the information.
*Comment:* One comment suggested that the rule allow protected health
information to be only rented, not sold, because there can be no right
to revoke authorization for disclosure of protected health information
that has been sold.
*Response:* We believe this limitation would be an unwarranted
abrogation of covered entities' business practices and outside the scope
of our authority. We believe individuals should have the right to
authorize any uses or disclosures they feel are appropriate. We have
attempted to create authorization requirements that make the
individual's decisions as clear and voluntary as possible.
*Comment:* One commenter expressed concern as to whether the proposed
rule's standard to protect the protected health information about a
deceased individual for two years would interfere with the payment of
death benefit claims. The commenter asked that the regulation permit the
beneficiary or payee under a life insurance policy to authorize
disclosure of protected health information pertaining to the cause of
death of a decedent or policyholder. Specifically, the commenter
explained that when substantiating a claim a beneficiary, such as a
fiancee or friend, may be unable to obtain the authorization required to
release information to the insurer, particularly if, for example, the
decedent's estate does not require probate or if the beneficiary is not
on good terms with the decedent's next of kin. Further, the commenter
stated that particularly in cases where the policyholder dies within two
years of the policy's issuance (within the policy's contestable period)
and the cause of death is uncertain, the insurer's inability to access
relevant protected health information would significantly interfere with
claim payments and increase administrative costs.
*Response:* We do not believe this will be a problem under the final
regulation, because we create an exception to the right to revoke an
authorization if the authorization was obtained as a condition of
obtaining insurance coverage and other applicable law provides the
insurer that obtained the authorization with the right to contest a
claim under the policy. Thus, if a policyholder dies within the two year
contestability period, the authorization the insurer obtained from the
policyholder prior to death could not be revoked during the
contestability period.
***Core Elements and Requirements***
*Comment:* Many commenters raised concerns about the required elements
for a valid authorization. They argued that the requirements were overly
burdensome and that covered entities should have greater flexibility to
craft authorizations that meet their business needs. Other commenters
supported the required elements as proposed because the elements help to
ensure that individuals make meaningful, informed choices about the use
and disclosure of protected health information about them.
*Response:* As in the proposed rule, we define specific elements that
must be included in any authorization. We draw on established laws and
guidelines for these requirements. For example, the July 1977 Report of
the Privacy Protection Study Commission recommended that authorizations
obtained by insurance institutions include plain language, the date of
authorization, and identification of the entities authorized to disclose
information, the nature of the information to be disclosed, the entities
authorized to receive information, the purpose(s) for which the
information may be used by the recipients, and an expiration date.[^13]
The Commission made similar recommendations concerning the content of
authorizations obtained by health care providers.[^14] The National
Association of Insurance Commissioners' Health Information Privacy Model
Act requires authorizations to be in writing and include a description
of the types of protected health information to be used or disclosed,
the name and address of the person to whom the information is to be
disclosed, the purpose of the authorization, the signature of the
individual or the individual's representative, and a statement that the
individual may revoke the authorization at any time, subject to the
rights of any person that acted in reliance on the authorization prior
to revocation and provided the revocation is in writing, dated, and
signed. Standards of the American Society for Testing and Materials
recommend that authorizations identify the subject of the protected
health information to be disclosed; the name of the person or
institution that is to release the information; the name of each
individual or institution that is to receive the information; the
purpose or need for the information; the information to be disclosed;
the specific date, event, or condition upon which the authorization will
expire, unless revoked earlier; and the signature and date signed. They
also recommend the authorization include a statement that the
authorization can be revoked or amended, but not retroactive to a
release made in reliance on the authorization.[^15]
*Comment:* Some commenters requested clarification that authorizations
"initiated by the individual" include authorizations initiated by the
individual's representative.
*Response:* In the final rule, we do not classify authorizations as
those initiated by the individual versus those initiated by a covered
entity. Instead, we establish a core set of elements and requirements
that apply to all authorizations and require certain additional elements
for particular types of authorizations initiated by covered entities.
*Comment:* Some commenters urged us to permit authorizations that
designate a class of entities, rather than specifically named entities,
that are authorized to use or disclose protected health information.
Commenters made similar recommendations with respect to the authorized
recipients. Commenters suggested these changes to prevent covered
entities from having to seek, and individuals from having to sign,
multiple authorizations for the same purpose.
*Response:* We agree. Under § 164.508(c)(1), we require authorizations
to identify both the person(s) authorized to use or disclose the
protected health information and the person(s) authorized to receive
protected health information. In both cases, we permit the authorization
to identify either a specific person a class of persons.
*Comment:* Many commenters requested clarification that covered entities
may rely on electronic authorizations, including electronic signatures.
*Response:* All authorizations must be in writing and signed. We intend
e-mail and electronic documents to qualify as written documents.
Electronic signatures are sufficient, provided they meet standards to be
adopted under HIPAA. In addition, we do not intend to interfere with the
application of the Electronic Signature in Global and National Commerce
Act.
*Comment:* Some commenters requested that we permit covered entities to
use and disclose protected health information pursuant to verbal
authorizations.
*Response:* To ensure compliance and mutual understanding between
covered entities and individuals, we require all authorizations to be in
writing.
*Comment:* Some commenters asked whether covered entities can rely on
copies of authorizations rather than the original. Other comments asked
whether covered entities can rely on the assurances of a third party,
such as a government entity, that a valid authorization has been
obtained to use or disclose protected health information. These
commenters suggested that such procedures would promote the timely
provision of benefits for programs that require the collection of
protected health information from multiple sources, such as
determinations of eligibility for disability benefits.
*Response:* Covered entities must obtain the individual's authorization
to use or disclose protected health information for any purpose not
otherwise permitted or required under this rule. They may obtain this
authorization directly from the individual or from a third party, such
as a government agency, on the individual's behalf. In accordance with
the requirements of § 164.530(j), the covered entity must retain a
written record of authorization forms signed by the individual. Covered
entities must, therefore, obtain the authorization in writing. They may
not rely on assurances from others that a proper authorization exists.
They may, however, rely on copies of authorizations if doing so is
consistent with other law.
*Comment:* We requested comments on reasonable steps that a covered
entity could take to be assured that the individual who requests the
disclosure is whom she or he purports to be. Some commenters stated that
it would be extremely difficult to verify the identity of the person
signing the authorization, particularly when the authorization is not
obtained in person. Other comments recommended requiring authorizations
to be notarized.
*Response:* To reduce burden on covered entities, we are not requiring
verification of the identities of individuals signing authorization
forms or notarization of the forms.
*Comment:* A few commenters asked for clarification regarding the
circumstances in which a covered entity may consider a non-response as
an authorization.
*Response:* Non-responses to requests for authorizations cannot be
considered authorizations. Authorizations must be signed and have the
other elements of a valid authorization described above.
*Comment:* Most commenters generally supported the requirement for an
expiration date on the authorization. Commenters recommended expiration
dates from 6 months to 3 years and/or proposed that the expiration be
tied to an event such as duration of enrollment or when an individual
changes health plans. Others requested no expiration requirement for
some or all authorizations.
*Response:* We have clarified that an authorization may include an
expiration date in the form of a specific date, a specific time period,
or an event directly related to the individual or the purpose of the
authorization. For example, a valid authorization could expire upon the
individual's disenrollment from a health plan or upon termination of a
research project. We prohibit an authorization from having an
indeterminate expiration date.
These changes were intended to address situations in which a specific
date for the termination of the purpose for the authorization is
difficult to determine. An example may be a research study where it may
be difficult to predetermine the length of the project.
*Comment:* A few commenters requested that the named insured be
permitted to sign an authorization on behalf of dependents.
*Response:* We disagree with the commenter that a named insured should
always be able to authorize uses and disclosures for other individuals
in the family. Many dependents under group health plans have their own
rights under this rule, and we do not assume that one member of a family
has the authority to authorize uses or disclosures of the protected
health information of other family members.
A named insured may sign a valid authorization for an individual if the
named insured is a personal representative for the individual in
accordance with § 164.502(g). The determination of whether an individual
is a personal representative under this rule is based on other
applicable law that determines when a person can act on behalf of an
individual in making decisions related to health care. This rule limits
a person's rights and authorities as a personal representative to only
the protected health information relevant to the matter for which he or
she is a personal representative under other law. For example, a parent
may be a personal representative of a child for most health care
treatment and payment decisions under state law. In that case, a parent,
who is a named insured for her minor child, would be able to provide
authorization with respect to most protected health information about
her dependent child. However, a wife who is the named insured for her
husband who is a dependent under a health insurance policy may not be a
personal representative for her husband under other law or may be a
personal representative only for limited purposes, such as for making
decisions regarding payment of disputed claims. In this case, she may
have limited authority to access protected health information related to
the payment of disputed claims, but would not have the authority to
authorize that her husband's information be used for marketing purposes,
absent any other authority to act for her husband. See § 164.502(g) for
more information regarding personal representatives.
*Comment:* One commenter suggested that authorizations should be dated
on the day they are signed.
*Response:* We agree and have retained this requirement in the final
rule.
***Additional Elements and Requirements for Authorizations Requested by
the Covered Entity for Its Own Uses and Disclosures***
*Comment:* Some commenters suggested that we should not require
different elements in authorizations initiated by the covered entity
versus authorizations initiated by the individual. The commenters argued
the standards were unnecessary, confusing, and burdensome.
*Response:* The proposed authorization requirements are intended to
ensure that an individual's authorization is truly voluntary. The
additional elements required for authorizations initiated by the covered
entity for its own uses and disclosures or for receipt of protected
health information from other covered entities to carry out treatment,
payment, or health care operations address concerns that are unique to
these forms of authorization. (See above regarding requirements for
research authorizations under § 164.508(f).)
First, when applicable, these authorizations must state that the covered
entity will not condition treatment, payment, eligibility, or enrollment
on the individual's providing authorization for the requested use or
disclosure. This statement is not appropriate for authorizations
initiated by the individual or another person who does not have the
ability to withhold services if the individual does not authorize the
use or disclosure.
Second, the authorization must state that the individual may refuse to
sign the authorization. This statement is intended to signal to the
individual that the authorization is voluntary and may not be accurate
if the authorization is obtained by a person other than a covered
entity.
Third, these authorizations must describe the purpose of the use or
disclosure. We do not include this element in the core requirements
because we understand there may be times when the individual does not
want the covered entity maintaining the protected health information to
know the purpose for the use or disclosure. For example, an individual
contemplating litigation may not want the covered entity to know that
litigation is the purpose of the disclosure. If the covered entity is
initiating the authorization for its own use or disclosure, however, the
individual and the covered entity maintaining the protected health
information should have a mutual understanding of the purpose of the use
or disclosure. Similarly, when a covered entity is requesting
authorization for a disclosure by another covered entity that may have
already obtained the individual's consent for the disclosure, the
individual and covered entity that maintains the protected health
information should be aware of this potential conflict.
There are two additional requirements for authorizations requested by a
covered entity for its own use or disclosure of protected health
information it maintains. First, we require the covered entity to
describe the individual's right to inspect or copy the protected health
information to be used or disclosed. Individuals may want to review the
information to be used or disclosed before signing the authorization and
should be reminded of their ability to do so. This requirement is not
appropriate for authorizations for a covered entity to receive protected
health information from another covered entity, however, because the
covered entity requesting the authorization is not the covered entity
that maintains the protected health information and cannot, therefore,
grant or describe the individual's right to access the information.
If applicable, we also require a covered entity that requests an
authorization for its own use or disclosure to state that the use or
disclosure of the protected health information will result in direct or
indirect remuneration to the entity. Individuals should be aware of any
conflicts of interest or financial incentives on the part of the covered
entity requesting the use or disclosure. These statements are not
appropriate, however, in relation to uses and disclosures to carry out
treatment, payment, and health care operations. Uses and disclosures for
these purposes will often involve remuneration by the nature of the use
or disclosure, not due to any conflict of interest on the part of either
covered entity.
We note that authorizations requested by a covered entity include
authorizations requested by the covered entity's business associate on
the covered entity's behalf. Authorizations requested by a business
associate on the covered entity's behalf and that authorize the use or
disclosure of protected health information by the covered entity or the
business associate must meet the requirements in § 164.508(d).
Similarly, authorizations requested by a business associate on behalf of
a covered entity to accomplish the disclosure of protected health
information to that business associate or covered entity as described in
§ 164.508(e) must meet the requirements of that provision.
We disagree that these elements are unnecessary, confusing, or
burdensome. We require them to ensure that the individual has a complete
understanding of what he or she is agreeing to permit.
*Comment:* Many commenters suggested we include in the regulation text a
provision stated in the preamble that entities and their business
partners must limit their uses and disclosures to the purpose(s)
specified by the individual in the authorization.
*Response*: We agree. In accordance with § 164.508(a)(1), covered
entities may only use or disclose protected health information
consistent with the authorization. In accordance with § 164.504(e)(2), a
business associate may not make any uses or disclosures that the covered
entity couldn't make.
*Comment:* Some comments suggested that authorizations should identify
the source and amount of financial gain, if any, resulting from the
proposed disclosure. Others suggested that the proposed financial gain
requirements were too burdensome and would decrease trust between
patients and providers. Commenters recommended that the requirement
either should be eliminated or should only require covered entities,
when applicable, to state that direct and foreseeable financial gain to
the covered entity will result. Others requested clarification of how
the requirement for covered entities to disclose financial gain relates
to the criminal penalties that accrue for offenses committed with intent
to sell, transfer, or use individually identifiable health information
for commercial advantage, personal gain, or malicious harm. Some
commenters advocated use of the term "financial compensation" rather
than "financial gain" to avoid confusion with in-kind compensation
rules. Some comments additionally suggested excluding marketing uses and
disclosures from the requirements regarding financial gain.
*Response:* We agree that clarification is warranted. In §
164.508(d)(1)(iv) of the final rule, we require a covered entity that
asks an individual to sign an authorization for the covered entity's use
or disclosure of protected health information and that will receive
direct or indirect remuneration from a third party for the use or
disclosure, to state that fact in the authorization. Remuneration from a
third party includes payments such as a fixed price per disclosure,
compensation for the costs of compiling and sending the information to
be disclosed, and, with respect to marketing communications, a
percentage of any sales generated by the marketing communication. For
example, a device manufacturer may offer to pay a fixed price per name
and address of individuals with a particular diagnosis, so that the
device manufacturer can market its new device to people with the
diagnosis. The device manufacturer may also offer the covered entity a
percentage of the profits from any sales generated by the marketing
materials sent. If a covered entity seeks an authorization to make such
a disclosure, the authorization must state that the remuneration will
occur. We believe individuals should have the opportunity to weigh the
covered entity's potential conflict of interest when deciding to
authorize the covered entity's use or disclosure of protected health
information. We believe that the term "remuneration from a third party"
clarifies our intent to describe a direct, tangible exchange, rather
than the mere fact that parties intend to profit from their enterprises.
*Comment:* One commenter suggested we require covered entities to
request authorizations in a manner that does not in itself disclose
sensitive information.
*Response:* We agree that covered entities should make reasonable
efforts to avoid unintentional disclosures. In § 164.530(c)(2), we
require covered entities to have in place appropriate administrative,
technical, and physical safeguards to protect the privacy of protected
health information.
*Comment:* Some commenters requested clarification that covered entities
are permitted to seek authorization at the time of enrollment or when
individuals otherwise first interact with covered entities. Similarly,
commenters requested clarification that covered entities may disclose
protected health information created after the date the authorization
was signed but prior to the expiration date of the authorization. These
commenters were concerned that otherwise multiple authorizations would
be required to accomplish a single purpose. Other comments suggested
that we prohibit prospective authorizations (i.e., authorizations
requested prior to the creation of the protected health information to
be disclosed under the authorization) because it is not possible for
individuals to make informed decisions about these authorizations.
*Response:* We confirm that covered entities may act on authorizations
signed in advance of the creation of the protected health information to
be released. We note, however, that all of the required elements must be
completed, including a description of the protected health information
to be used or disclosed pursuant to the authorization. This description
must identify the information in a specific and meaningful fashion so
that the individual can make an informed decision as to whether to sign
the authorization.
*Comment:* Some commenters suggested that the final rule prohibit
financial incentives, such as premium discounts, designed to encourage
individuals to sign authorizations.
*Response:* We do not prohibit or require financial incentives for
authorizations. We have attempted to ensure that authorizations are
entered into voluntary. If a covered entity chooses to offer a financial
incentive for the individual to sign the authorization, and the
individual chooses to accept it, they are free to do so.
**SECTION 164.510---USES AND DISCLOSURES REQUIRING AN OPPORTUNITY FOR
THE INDIVIDUAL TO AGREE OR TO OBJECT**
**Section 164.510(a)---Use and Disclosure for Facility Directories**
*Comment:* Many hospital organizations opposed the NPRM's proposed
opt-in approach to disclosure of directory information. These groups
noted the preamble's statement that most patients welcomed the
convenience of having their name, location, and general condition
included in the patient directory. They said that requiring hospitals to
obtain authorization before including patient information in the
directory would cause harm to many patients' needs in an effort to serve
the needs of the small number of patients who may not want their
information to be included. Specifically, they argued that the proposed
approach ultimately could have the effect of making it difficult or
impossible for clergy, family members, and florists to locate patients
for legitimate purposes. In making this argument, commenters pointed to
problems that occurred after enactment of privacy legislation in the
State of Maine in 1999. The legislation, which never was officially
implemented, was interpreted by hospitals to prohibit disclosure of
patient information to directories without written consent. As a result,
when hospitals began complying with the law based on their
interpretation, family members and clergy had difficulty locating
patients in the hospital.
*Response:* We share commenters' concern about the need to ensure that
family members and clergy who have a legitimate need to locate patients
are not prevented from doing so by excessively stringent restrictions on
disclosure of protected health information to health care facilities'
directories. Accordingly, the final rule takes an opt-out approach,
stating that health care institutions may include the name, general
condition, religious affiliation, and location of a patient within the
facility in the facility's directory unless the patient explicitly
objects to the use or disclosure of protected health information for
directory purposes. To ensure that this opt-out can be exercised, the
final rule requires facilities to notify individuals of their right not
to be included in the directory and to give them the opportunity to opt
out. The final rule indicates that the notice and opt-out may be oral.
The final rule that allows health care facilities to disclose to clergy
the four types of protected health information specified above without
requiring the clergy to ask for the individual by name will allow the
clergy to identify the members of his or her faith who are in the
facility, thus ensuring that this rule will not significantly interfere
with the exercise of religion, including the clergy\'s traditional
religious mission to provide services to individuals.
*Comment:* A small number of commenters recommended requiring written
authorization for all disclosures of protected health information for
directory purposes. These commenters believed that the NPRM's proposed
provision allowing oral agreement would not provide sufficient privacy
protection; that it did not sufficiently hold providers accountable for
complying with patient wishes; and that it could create liability issues
for providers.
*Response*: The final rule does not require written authorization for
disclosure of protected health information for directory purposes. We
believe that requiring written authorization in these cases would
increase substantially the administrative burdens and costs for covered
health care providers and could lead to significant inconvenience for
families and others attempting to locate individuals in health care
institutions. Experience from the State of Maine suggests that requiring
written authorization before patient information may be included in
facility directories can be disruptive for providers, families, clergy,
and others.
*Comment:* Domestic violence organizations raised concerns that
including information about domestic violence victims in health care
facilities' directories could result in further harm to victims. The
NPRM addressed the issue of potential danger to patients by stating that
when patients were incapacitated, covered health care providers could
exercise discretion -- consistent with good medical practice and prior
expression of patient preference -- regarding whether to disclose
protected health information for directory purposes. Several commenters
recommended prohibiting providers from including information in a health
care facility's directory about incapacitated individuals when the
provider reasonably believed that the injuries to the individual could
have been caused by domestic violence. These groups believed that such a
prohibition was necessary to prevent abusers from locating and causing
further harm to domestic violence patients.
*Response:* We share commenters' concerns about protecting victims of
domestic violence from further abuse. We are also concerned, however,
that imposing an affirmative duty on institutions not to disclose
information any time injuries to the individual *could have been* the
result of domestic violence would place too high a burden on health care
facilities, essentially requiring them to rule out domestic violence as
a potential cause of the injuries before disclosing to family members
that an incapacitated person is in the institution.
We do believe, however, that it is appropriate to require covered health
care providers to consider whether including the individual's name and
location in the directory could lead to serious harm. As in the preamble
to the NPRM, in the preamble to the final rule, we encourage covered
health care providers to consider several factors when deciding whether
to include an incapacitated patient's information in a health care
facility's directory. One of these factors is whether disclosing an
individual's presence in the facility could reasonably cause harm or
danger to the individual (for example, if it appeared that an
unconscious patient had been abused and disclosing that the individual
is in the facility could give the attacker sufficient information to
seek out the person and repeat the abuse). Under the final rule, when
the opportunity to object to uses and disclosures for a facility's
directory cannot practicably be provided due to an individual's
incapacity or an emergency treatment circumstance, covered health care
providers may use or disclose some or all of the protected health
information that the rule allows to be included in the directory, if the
disclosure is: (1) consistent with the individual's prior expressed
preference, if known to the covered health care provider; and (2) in the
individual's best interest, as determined by the covered health care
provider in the exercise of professional judgement. The rule allows
covered health care providers making decisions about incapacitated
patients to include some portions of the patient's information (such as
name) but not other information (such as location in the facility) to
protect patient interests.
**Section 164.510(b)---Uses and Disclosures for Involvement in the
Individual's Care and Notification Purposes**
*Comment:* A number of comments supported the NPRM's proposed approach,
which would have allowed covered entities to disclose protected health
information to the individual's next of kin, family members, or other
close personal friends when the individual verbally agreed to the
disclosure. These commenters agreed that the presumption should favor
disclosures to the next of kin, and they believed that health care
providers should encourage individuals to share genetic information and
information about transmittable diseases with family members at risk.
Others agreed with the general approach but suggested the individual's
agreement be noted in the medical record. These commenters also
supported the NPRM's proposed reliance on good professional practices
and ethics to determine when disclosures should be made to the next of
kin when the individual's agreement could not practicably be obtained.
A few commenters recommended that the individual's agreement be in
writing for the protection of the covered entity and to facilitate the
monitoring of compliance with the individual's wishes. These commenters
were concerned that, absent the individual's written agreement, the
covered entity would become embroiled in intra-family disputes
concerning the disclosures. Others argued that the individual's
authorization should be obtained for all disclosures, even to the next
of kin.
One commenter favored disclosures to family members and others unless
the individual actively objected, as long as the disclosure was
consistent with sound professional practice. Others believed that no
agreement by the individual was necessary unless sensitive medical
information would be disclosed or unless the health care provider was
aware of the individual's prior objection. These commenters recommended
that good professional practice and ethics determine when disclosures
were appropriate and that disclosure should relate only to the
individual's current treatment. A health care provider organization said
that the ethical and legal obligations of the medical professional alone
should control in this area, although it believed the proposed rule was
generally consistent with these obligations.
*Response:* The diversity of comments regarding the proposal on
disclosures to family members, next of kin, and other persons, reflects
a wide range of current practice and individual expectations. We believe
that the NPRM struck the proper balance between the competing interests
of individual privacy and the need that covered health care providers
may have, in some cases, to have routine, informal conversations with an
individual's family and friends regarding the individual's treatment.
We do not agree with the comments stating that all such disclosures
should be made only with consent or with the individual's written
authorization. The rule does not prohibit obtaining the agreement of the
individual in writing; however, we believe that imposing a requirement
for consent or written authorization in all cases for disclosures to
individuals involved in a person's care would be unduly burdensome for
all parties. In the final rule, we clarify the circumstances in which
such disclosures are permissible. The rule allows covered entities to
disclose to family members, other relatives, close personal friends of
the individual, or any other person identified by the individual, the
protected health information directly relevant to such person's
involvement with the individual's care or payment related to the
individual's health care. In addition, the final rule allows covered
entities to use or disclose protected health information to notify, or
assist in the notification of (including identifying or locating) a
family member, a personal representative of the individual, or another
person responsible for the care of the individual, of the individual's
location, general condition, or death. The final rule includes separate
provisions for situations in which the individual is present and for
when the individual is not present at the time of disclosure. When the
individual is present and can make his or her own decisions, a covered
entity may disclose protected health information only if the covered
entity: (1) obtains the individual's agreement to disclose to the third
parties involved in the individual's care; (2) provides the individual
with the opportunity to object to the disclosure, and the individual
does not express an objection; or (3) reasonably infers from the
circumstances, based on the exercise of professional judgement, that the
individual does not object to the disclosure. The final rule continues
to permit disclosures in circumstances when the individual is not
present or when the opportunity to agree or object to the use or
disclosure cannot practicably be provided due to the individual's
incapacity or an emergency circumstance. In such instances, covered
entities may, in the exercise of professional judgement, determine
whether the disclosure is in the individual's best interests and if so,
disclose only the protected health information that is directly relevant
to the person's involvement with the individual's health care.
As discussed in the preamble for this section, we do not intend to
disrupt most covered entities' current practices with respect to
informing family members and others with whom a patient has a close
personal relationship about a patient's specific health condition when a
patient is incapacitated due to a medical emergency and the family
member or close personal friend comes to the covered entity to ask about
the patient's condition. To the extent that disclosures to family
members and others in these situations currently are allowed under state
law and covered entities' own rules, § 164.510(b) allows covered
entities to continue making them in these situations, consistent with
the exercise of professional judgement as to the patient's best
interest. As indicated in the preamble above, this section is not
intended to provide a loophole for avoiding the rule's other
requirements, and it is not intended to allow disclosures to a broad
range of individuals, such as journalists who may be curious about a
celebrity's health status.
*Comments*: A few comments supported the NPRM approach because it
permitted the current practice of allowing someone other than the
patient to pick up prescriptions at pharmacies. One commenter noted that
this practice occurs with respect to 25-40% of the prescriptions
dispensed by community retail pharmacies. These commenters strongly
supported the proposal's reliance on the professional judgement of
pharmacists in allowing others to pick up prescriptions for bedridden or
otherwise incapacitated patients, noting that in most cases it would be
impracticable to verify that the person was acting with the individual's
permission. Two commenters requested that the rule specifically allow
this practice. One comment opposed the practice of giving prescriptions
to another person without the individual's authorization, because a
prescription implicitly could disclose medical information about the
individual.
*Response*: As stated in the NPRM, we intended for this provision to
authorize pharmacies to dispense prescriptions to family or friends who
are sent by the individual to the pharmacy to pick up the prescription.
We believe that stringent consent or verification requirements would
place an unreasonable burden on numerous transactions. In addition, such
requirements would be contrary to the expectations and preferences of
all parties to these transactions. Although prescriptions are protected
health information under the rule, we believe that the risk to
individual privacy in allowing this practice to continue is minimal. We
agree with the suggestion that the final rule should state explicitly
that pharmacies have the authority to operate in this manner. Therefore,
we have added a sentence to § 164.510(b)(3) allowing covered entities to
use professional judgement and experience with common practice to make
reasonable inferences of an individual's best interest in allowing a
person to act on the individual's behalf to pick up filled
prescriptions, medical supplies, X-rays, or other similar forms of
protected health information. In such situations, as when making
disclosures of protected health information about an individual who is
not present or is unable to agree to such disclosures, covered entities
should disclose only information which directly relates to the person's
involvement in the individual's current health care. Thus, when
dispensing a prescription to a friend who is picking it up on the
patient's behalf, the pharmacist should not disclose unrelated health
information about medications that the patient has taken in the past
which could prove embarrassing to the patient.
*Comment:* We received a few comments that misunderstood the provision
as addressing disclosures related to deceased individuals.
*Response:* We understand that use of the term next of kin in this
section may cause confusion. To promote clarity in the final rule, we
eliminate the term "next of kin," as well as the term's proposed
definition. In the final rule, we address comments on next of kin and
the deceased in the section on disclosure of protected health
information about deceased individuals in § 164.512(g).
*Comments*: A number of commenters expressed concern for the interaction
of the proposed section with state laws. Some of these comments
interpreted the NPRM's use of the term next of kin as referring to
individuals with health care power of attorney and thus they believed
that the proposed rule's approach to next of kin was inappropriately
informal and in conflict with state law. Others noted that some state
laws did not allow health care information to be disclosed to family or
friends without consent or other authorization. One commenter said that
case law may be evolving toward imposing a more affirmative duty on
health care practitioners to inform next of kin in a variety of
circumstances. One commenter noted that state laws may not define
clearly who is considered to be the next of kin.
*Response*: The intent of this provision was not to interfere with or
change current practice regarding health care powers of attorney or the
designation of other personal representatives. Such designations are
formal, legal actions which give others the ability to exercise the
rights of or make treatment decisions related to individuals. While
persons with health care powers of attorney could have access to
protected health information under the personal representatives
provision (§ 164.502(g)), and covered entities may disclose to such
persons under this provision, such disclosures do not give these
individuals substantive authority to act for or on behalf of the
individual with respect to health care decisions. State law requirements
regarding health care powers of attorney continue to apply.
The comments suggesting that state laws may not allow the disclosures
otherwise permitted by this provision or, conversely, that they may
impose a more affirmative duty, did not provide any specifics with which
to judge the affect of such laws. In general, however, state laws that
are more protective of an individual's privacy interests than the rule
by prohibiting a disclosure of protected health information continue to
apply. The rule's provisions regarding disclosure of protected health
information to family or friends of the individual are permissive only,
enabling covered entities to abide by more stringent state laws without
violating our rules. Furthermore, if the state law creates an
affirmative and binding legal obligation on the covered entity to make
disclosures to family or other persons under specific circumstances, the
final rule allows covered entities to comply with these legal
obligations. See § 164.512(a).
*Comments*: A number of commenters supported the proposal to limit
disclosures to family or friends to the protected health information
that is directly relevant to that person's involvement in the
individual's health care. Some comments suggested that this standard
apply to all disclosures to family or friends, even when the individual
has agreed to or not objected to the disclosure. One commenter objected
to the proposal, stating that it would be too difficult to administer.
According to this comment, it is accepted practice for health care
providers to communicate with family and friends about an individual's
condition, regardless of whether the person is responsible for or
otherwise involved in the individual's care.
Other comments expressed concern for disclosures related to particular
types of information. For example, two commenters recommended that
psychotherapy notes not be disclosed without patient authorization. One
commenter suggested that certain sensitive medical information
associated with social stigma not be disclosed to family members or
others without patient consent.
*Response*: We agree with commenters who advocated limiting permissible
disclosures to relatives and close personal friends to information
consistent with a person's involvement in the individual's care. Under
the final rule, we clarify the NPRM provision to state that covered
entities may disclose protected health information to family members,
relatives, or close personal friends of an individual or any other
person identified by the individual, to the extent that the information
directly relates to the person's involvement in the individual's current
health care. It is not intended to allow disclosure of past medical
history that is not relevant to the individual's current condition. In
addition, as discussed above, we do not intend to disrupt covered
entities' current practices with respect to disclosing specific
information about a patient's condition to family members or others when
the individual is incapacitated due to a medical emergency and the
family member or other individual comes to the covered entity seeking
specific information about the patient's condition. For example, this
section allows a hospital to disclose to a family member the fact that a
patient had a heart attack, and to provide updated information to the
family member about the patient's progress and prognosis during his or
her period of incapacity.
We agree with the recommendation to require written authorization for a
disclosure of psychotherapy notes to family, close personal friends, or
others involved in the individual's care. As discussed below, the final
rule allows disclosure of psychotherapy notes without authorization in a
few limited circumstances; disclosure to individuals involved in a
person's care is not among those circumstances. See § 164.508 for a
further discussion of the final rule's provisions regarding disclosure
of psychotherapy notes.
We do not agree, however, with the suggestion to treat some medical
information as more sensitive than others. In most cases, individuals
will have the opportunity to prohibit or limit such disclosures. For
situations in which an individual is unable to do so, covered entities
may, in the exercise of professional judgement, determine whether the
disclosure is in the individual's best interests and, if so, disclose
only the protected health information that is directly relevant to the
person's involvement with the individual's health care.
*Comment*: One commenter suggested that this provision should allow
disclosure of protected health information to the clergy and to the Red
Cross. The commenter noted that clergy have ethical obligations to
ensure confidentiality and that the Red Cross often notifies the next of
kin regarding an individual's condition in certain circumstances.
Another commenter recommended allowing disclosures to law enforcement
for the purpose of contacting the next of kin of individuals who have
been injured or killed. One commenter sought clarification that "close
personal friend" was intended to include domestic partners and same-sex
couples in committed relationships.
*Response:* As discussed above, § 164.510(a) allows covered health care
providers to disclose to clergy protected health information from a
health care facility's directory. Under § 164.510(b), an individual may
identify any person, including clergy, as involved in his or her care.
This approach provides more flexibility than the proposed rule would
have provided.
As discussed in the preamble of the final rule, this provision allows
disclosures to domestic partners and others in same-sex relationships
when such individuals are involved in an individual's care or are the
point of contact for notification in a disaster. We do not intend to
change current practices with respect to involvement of others in an
individual's treatment decisions; informal information-sharing among
persons involved; or the sharing of protected health information during
a disaster. As noted above, a power of attorney or other legal
relationship to an individual is not necessary for these informal
discussions about the individual for the purpose of assisting in or
providing a service related to the individual's care.
We agree with the comments noting that the Red Cross and other
organizations may play an important role in locating and communicating
with the family about individuals injured or killed in an accident or
disaster situation. Therefore, the final rule includes new language, in
§ 164.510(b)(4), which allows covered entities to use or disclose
protected health information to a public or private entity authorized by
law or its charter to assist in disaster relief efforts, for the purpose
of coordinating with such entities to notify, or assist in the
notification of (including identifying or locating) a family member, an
individual's personal representative, or another person responsible for
the individual's care regarding the individual's location, general
condition, or death. The Red Cross is an example of a private entity
that may obtain protected health information pursuant to these
provisions. We recognize the role of the Red Cross and similar
organizations in disaster relief efforts, and we encourage cooperation
with these entities in notification efforts and other means of
assistance.
*Comment*: One commenter recommended stating that individuals who are
mentally retarded and unable to agree to disclosures under this
provision do not, thereby, lose their access to further medical
treatment. This commenter also proposed stating that mentally retarded
individuals who are able to provide agreement have the right to control
the disclosure of their protected health information. The commenter
expressed concern that the parent, relative, or other person acting *in
loco parentis* may not have the individual's best interest in mind in
seeking or authorizing for the individual the disclosure of protected
health information.
*Response*: The final rule regulates only uses and disclosures of
protected health information, not the delivery of health care. Under the
final rule's section on personal representatives (§ 164.502(g)), a
person with authority to make decisions about the health care of an
individual, under applicable law, may make decisions about the protected
health information of that individual, to the extent that the protected
health information is relevant to such person\'s representation.
In the final rule, § 164.510(b) may apply to permit disclosures to a
person other than a personal representative. Under § 164.510(b), when an
individual is present and has the capacity to make his or her own
decisions, a covered entity may disclose protected health information
only if the covered entity: (1) obtains the individual's agreement to
disclose protected health information to the third parties involved in
the individual's care; (2) provides the individual with an opportunity
to object to such disclosure, and the individual does not express an
objection; or (3) reasonably infers from the circumstances, based on the
exercise of professional judgment, that the individual does not object
to the disclosure. These conditions apply to disclosure of protected
health information about individuals with mental retardation as well as
to disclosures about all other individuals. Thus we do not believe it is
necessary to include in this section of the final rule any language
specifically on persons with mental retardation.
*Comments*: A few commenters recommended that disclosures made in good
faith to the family or friends of the individual not be subject to
sanctions by the Secretary, even if the covered entity had not fully
complied with the requirements of this provision. One commenter believed
that a fear of sanction would make covered entities overly cautious,
such that they would not disclose protected health information to
domestic partners or others not recognized by law as next of kin.
Another commenter recommended that sanctions not be imposed if the
covered entity has proper policies in place and has trained its staff
appropriately. According to this commenter, the lack of documentation of
disclosures in a particular case or medical record should not subject
the entity to sanctions if the information was disclosed in good faith.
*Response:* We generally agree with commenters regarding disclosure in
good faith pursuant to this provision. As discussed above, the final
rule expands the scope of individuals to whom covered entities may
disclose protected health information pursuant to this section. In
addition, we delete the term next of kin, to avoid the appearance of
requiring any legal determination of a person's relationship in
situations involving informal disclosures. Similarly, consistent with
the informal nature of disclosures pursuant to this section, we do not
require covered entities to document such disclosures. If a covered
entity imposes its own documentation requirements and a particular
covered health care provider does not follow the entity's documentation
requirements, the disclosure is not a violation of this rule.
*Comments*: The majority of comments on this provision were from
individuals and organizations concerned about domestic violence. Most of
these commenters wanted assurance that domestic violence would be a
consideration in any disclosure to the spouse or relatives of an
individual whom the covered entity suspected to be a victim of domestic
violence or abuse. In particular, these commenters recommended that
disclosures not be made to family members suspected of being the abuser
if to do so would further endanger the individual. Commenters believed
that this limitation was particularly important when the individual was
unconscious or otherwise unable to object to the disclosures.
*Response:* We agree with the comments that victims of domestic violence
and other forms of abuse need special consideration in order to avoid
further harm, and we provide for discretion of a covered entity to
determine that protected health information not be disclosed pursuant to
§ 164.510(b). Section 164.510(b) of the final rule, disclosures to
family or friends involved in the individual's care, states that when an
individual is unable to agree or object to the disclosure due to
incapacity or another emergency situation, a covered entity must
determine based on the exercise of professional judgment whether it is
in the individual's best interest to disclose the information. As stated
in the preamble, we intend for this exercise of professional judgment in
the individual's best interest to account for the potential for harm to
the individual in cases involving domestic violence. These circumstances
are unique and are best decided by a covered entity, in the exercise of
professional judgment, in each situation rather than by a blanket rule.
**SECTION 164.512---USES AND DISCLOSURES FOR WHICH CONSENT,
Authorization, OR OPPORTUNITY TO AGREE OR OBJECT IS NOT REQUIRED**
**Section 164.512(a)---Uses and Disclosures Required by Law**
*Comment:* Numerous commenters addressed directly or by implication the
question of whether the provision permitting uses and disclosures of
protected health information if required by other law was necessary.
Other commenters generally endorsed the need for such a provision. One
such commenter approved of the provision as a needed fail-safe mechanism
should the enumeration of permissible uses and disclosures of protected
health information in the NPRM prove to be incomplete. Other commenters
cited specific statutes which required access to protected health
information, arguing that such a provision was necessary to ensure that
these legally mandated disclosures would continue to be permitted. For
example, some commenters argued for continued access to protected health
information to investigate and remedy abuse and neglect as currently
required by the Developmental Disabilities Assistance and Bill of
Rights, 42 U.S.C. 6042, and the Protection and Advocacy for Mentally Ill
Individuals Act, 42 U.S.C. 10801.
Some comments urged deletion of the provision for uses and disclosures
required by other law. This concern appeared to be based on a
generalized concern that the provision fostered government intrusion
into individual medical information.
Finally, a number of commenters also urged that the required by law
provision be deleted. These commenters argued that the proposed
provision would have undermined the intent of the statute to preempt
state laws which were less protective of individual privacy. As stated
in these comments, the provision for uses and disclosures required by
other law was "broadly written and could apply to a variety of state
laws that are contrary to the proposed rule and less protective of
privacy. (Indeed, a law [requiring]{.underline} disclosure is the least
protective of privacy since it allows for no discretion.) The breadth of
this provision greatly exceeds the exceptions to preemption contained in
HIPAA."
*Response:* We agree with the comments that proposed § 164.510(n) was
necessary to harmonize the rule with existing state and federal laws
mandating uses and disclosures of protected health information.
Therefore, in the final rule, the provision permitting uses and
disclosures as required by other law is retained. To accommodate other
reorganization of the final rule, this provision has been designated as
§ 164.512(a).
We do not agree with the comments expressing concern for increased
governmental intrusion into individual privacy under this provision. The
final rule does not create any new duty or obligation to disclose
protected health information. Rather, it permits covered entities to use
or disclose protected health information when they are required by law
to do so.
We likewise disagree with the characterization of the proposed provision
as inconsistent with or contrary to the preemption standards in the
statute or Part 160 of the rule. As described in the NPRM, we intend
this provision to preserve access to information considered important
enough by state or federal authorities to require its disclosure by law.
The importance of these required uses or disclosures is evidenced by the
legislative or other public process necessary for the government to
create a legally binding obligation on a covered entity. Furthermore,
such required uses and disclosures arise in a myriad of other areas of
law, ranging from topics addressing national security (uses and
disclosures to obtain security clearances), to public health (reporting
of communicable diseases), to law enforcement (disclosures of gun shot
wounds). Required uses and disclosures also may address broad national
concerns or particular regional or state concerns. It is not possible,
or appropriate, for HHS to reassess the legitimacy of or the need for
each of these mandates in each of their specialized contexts. In some
cases where particular concerns have been raised by legal mandates in
other laws, we allow disclosure as required by law, and we establish
additional requirements to protect privacy (for example, informing the
individual as required in § 164.512(c)) when covered entities make a
legally mandated disclosure.
We also disagree with commenters who suggest that the approach in the
final rule is contrary to the preemption provisions in HIPAA. HIPAA
provides HHS with broad discretion in fashioning privacy protections.
Recognizing the legitimacy of existing legal requirements is certainly
within the Secretary's discretion. Additionally, given the variety of
these laws, the varied contexts in which they arise, and their
significance in ensuring that important public policies are achieved, we
do not believe that Congress intended to preempt each such law unless
HHS specifically recognized the law or purpose in the regulation.
*Comment:* A number of commenters urged that the provision permitting
uses and disclosures required by other law be amended by deleting the
last sentence which stated: "This paragraph does not apply to uses or
disclosures that are covered by paragraphs (b) through (m) of this
section." Some commenters sought deletion of this sentence to avoid any
inadvertent preemption of mandatory reporting laws, and requested
clarification of the effect on specific statutes.
The majority of the commenters focused their concerns on the potential
conflict between mandatory reporting laws to law enforcement and the
limitations imposed by proposed § 164.510(f), on uses and disclosures to
law enforcement. For example, the comments raised concerns that
mandatory reporting to law enforcement of injuries resulting from
violent acts and abuse require the health care provider to initiate such
reports to local law enforcement or other state agencies, while the NPRM
would have allowed such reporting on victims of crimes only in response
to specific law enforcement requests for information. Similarly,
mandatory reports of violence-related injuries may implicate suspected
perpetrators, as well as victims, and compliance with such laws could be
blocked by the proposed requirement that disclosures about suspects was
similarly limited to a response to law enforcement inquiries for the
specific purpose of identifying the suspect. The NPRM also would have
limited the type of protected health information that could have been
disclosed about a suspect or fugitive.
In general, commenters sought to resolve this overlap by removing the
condition that the required-by-other-law provision applied only when no
other national priority purpose addressed the particular use or
disclosure. The suggested change would permit the covered entity to
comply with legally mandated uses and disclosures as long as the
relevant requirements of that law were met. Alternatively, other
commenters suggested that the restrictions on disclosures to law
enforcement be lifted to permit full compliance with laws requiring
reporting for these purposes.
Finally, some comments sought clarification of when a use or disclosure
was "covered by paragraphs (b) through (m)." These commenters were
confused as to whether a particular use or disclosure had to be
specifically addressed by another provision of the rule or simply within
the scope of the one of the national priority purposes specified by
proposed paragraphs (b) through (m).
*Response:* We agree with the commenters that the provision as proposed
would have inadvertently interfered with many state and federal laws
mandating the reporting to law enforcement or others of protected health
information.
In response to these comments, we have modified the final rule to
clarify how this section interacts with the other provisions in the
rule.
*Comment:* A number of commenters sought expanded authority to use and
disclosure protected health information when permitted by other law, not
just when required by law. These comments specified a number of
significant duties or potential societal benefits from disclosures
currently permitted or authorized by law, and they expressed concern
should these beneficial uses and disclosures no longer be allowed if not
specifically recognized by the rule. For example, one commenter listed
25 disclosures of health records that are currently permitted, but not
required, by state law. This commenter was concerned that many of these
authorized uses and disclosures would not be covered by any of the
national priority purposes specified in the NPRM, and, therefore, would
not be a permissible use or disclosure under the rule. To preserve these
important uses and disclosures, the comments recommended that provision
be made for any use or disclosure which is authorized or permitted by
other law.
*Response:* We do not agree with the comments that seek general
authority to use and disclose protected health information as permitted,
but not required, by other law. The uses and disclosures permitted in
the final rule reflect those purposes and circumstances which we believe
are of sufficient national importance or relevance to the needs of the
health care system to warrant the use or disclosure of protected health
information in the absence of either the individual's express
authorization or a legal duty to make such use or disclosure. In
permitting specific uses and disclosures that are not required by law,
we have considered the individual privacy interests at stake in each
area and crafted conditions or limitations in each identified area as
appropriate to balance the competing public purposes and individual
privacy needs. A general rule authorizing any use or disclosure that is
permitted, but not required, by other law would undermine the careful
balancing in the final rule.
In making this judgment, we have distinguished between laws that mandate
uses or disclosures and laws that merely permit them. In the former
case, jurisdictions have determined that public policy purposes cannot
be achieved absent the use of certain protected health information, and
we have chosen in general not to disturb their judgments. On the other
hand, where jurisdictions have determined that certain protected health
information is not necessary to achieve a public policy purpose, and
only have permitted its use or disclosure, we do not believe that those
judgments reflect an interest in use or disclosure strong enough to
override the Congressional goal of protecting privacy rights.
Moreover, the comments failed to present any compelling circumstance to
warrant such a general provision. Despite commenters' concerns to the
contrary, most of the beneficial uses and disclosures that the
commenters referenced to support a general provision were, in fact, uses
or disclosures already permissible under the rule. For example, the
general statutory authorities relied on by one state health agency to
investigate disease outbreaks or to comply with health data-gathering
guidelines for reporting to certain federal agencies are permissible
disclosures to public health agencies.
Finally, in the final rule, we add new provisions to § 164.512 to
address three examples raised by commenters of uses and disclosures that
are authorized or permitted by law, but may not be required by law.
First, commenters expressed concern for the states that provide for
voluntary reporting to law enforcement or state protective services of
domestic violence or of abuse, neglect or exploitation of the elderly or
other vulnerable adults. As discussed below, a new section, §
164.512(c), has been added to the final rule to specifically address
uses and disclosures of protected health information in cases of abuse,
neglect, or domestic violence. Second, commenters were concerned about
state or federal laws that permitted coordination and cooperation with
organizations or entities involved in cadaveric organ, eye, or tissue
donation and transplantation. In the final rule, we add a new section, §
164.512(h), to permit disclosures to facilitate such donation and
transplantation functions. Third, a number of commenters expressed
concern for uses and disclosure permitted by law in certain custodial
settings, such as those involving correctional or detention facilities.
In the final rule, we add a new subsection to the section on uses and
disclosures for specialized government functions (§ 164.512(k), to
identify custodial settings in which special rules are necessary and to
specify the additional uses and disclosures of the protected health
information of inmates or detainees which are necessary in such
facilities.
*Comment:* A number of commenters asked for clarification of the term
"law" and the phrase "required by law" for purposes of the provision
permitting uses or disclosures that are required by law. Some of the
commenters noted that "state law" was a defined term in Part 160 of the
NPRM and that the terms should be used consistently. Other commenters
were concerned about differentiating between laws that required a use or
disclosure and those that merely authorize or permit a use or
disclosure. A number of commenters recommended that the final rule
include a definitive list of the laws that mandate a use or disclosure
of protected health information.
*Response:* In the final rule, we clarify that, consistent with the
"state law" definition in § 160.202, "law" is intended to be read
broadly to include the full array of binding legal authority, such as
constitutions, statutes, rules, regulations, common law, or other
governmental actions having the effect of law. However, for the purposes
of § 164.512(a), law is not limited to state action; rather, it
encompasses federal, state or local actions with legally binding effect,
as well as those by territorial and tribal governments.
For more detail on the meaning of "required by law," see § 164.501. Only
where the law imposes a duty on the health care professional to report
would the disclosure be considered to be required by law.
The final rule does not include a definitive list of the laws that
contain legal mandates for disclosures of protected health information.
In light of the breadth of the term "law" and number of federal, state,
local, and territorial or tribal authorities that may engage in the
promulgation of binding legal authority, it would be impossible to
compile and maintain such a list. Covered entities have an independent
duty to be aware of their legal obligations to federal, state, local and
territorial or tribal authorities. The rule's approach is simply
intended to avoid any obstruction to the health plan or covered health
care provider's ability to comply with its existing legal obligations.
*Comment:* A number of commenters recommended that the rule compel
covered entities to use or disclose protected health information as
required by law. They expressed concern that covered entities could
refuse or delay compliance with legally mandated disclosures by
misplaced reliance on a rule that permits, but does not require, a use
or disclosure required by other law.
*Response:* We do not agree that the final rule should require covered
entities to comply with uses or disclosures of protected health
information mandated by law. The purpose of this rule is to protect
privacy, and to allow those disclosures consistent with sound public
policy. Consistent with this purpose, we mandate disclosure only to the
individual who is the subject of the information, and for purposes of
enforcing the rule. Where a law imposes a legal duty on the covered
entity to use or disclose protected health information, it is sufficient
that the privacy rule permit the covered entity to comply with such law.
The enforcement of that legal duty, however, is a matter for that other
law.
**Section 164.512(b)---Uses and Disclosures for Public Health
Activities**
*Comment:* Several non-profit entities commented that medical records
research by nonprofit entities to ensure public health goals, such as
disease-specific registries, would not have been covered by this
provision. These organizations collect information without relying on a
government agency or law. Commenters asserted that such activities are
essential and must continue. They generally supported the provisions
allowing the collection of individually identifiable health information
without authorization for registries. One stated that both governmental
and non-governmental cancer registries should be exempt from the
regulation. They stated that "such entities, by their very nature,
collect health information for legitimate public health and research
purposes." Another, however, addressed its comments only to "disclosure
to non-government entities operating such system as required or
authorized by law."
*Response:* We acknowledge that such entities may be engaged in
disease-specific or other data collection activities that provide a
benefit to their members and others affected by a particular malady and
that they contribute to the public health and scientific database on low
incidence or little known conditions. However, in the absence of some
nexus to a government public health authority or other underlying legal
authority, it is unclear upon what basis covered entities can determine
which registries or collections are "legitimate" and how the
confidentiality of the registry information will be protected.
Commenters did not suggest methods for "validating" these private
registry programs, and no such methods currently exist at the federal
level. It is unknown whether any states have such a program. Broadening
the exemption could provide a loophole for private data collections for
inappropriate purposes or uses under a "public health" mask.
In this rule, we do not seek to make judgments as to the legitimacy of
private entities' disease-specific registries or of private data
collection endeavors. Rather, we establish the general terms and
conditions for disclosure and use of protected health information. Under
the final rule, covered entities may obtain authorization to disclose
protected health information to private entities seeking to establish
registries or other databases; they may disclose protected health
information as required by law; or they may disclose protected health
information to such entities if they meet the conditions of one of the
provisions of §§ 164.510 or 164.512. We believe that the circumstances
under which covered entities may disclose protected health information
to private entities should be limited to specified national priority
purposes, as reflected through the FDA requirements or directives listed
in § 164.512(b)(iii), and to enable recalls, repairs, or replacements of
products regulated by the FDA. Disclosures by covered health care
providers who are workforce members of an employer or are conducting
evaluations relating to work-related injuries or illnesses or workplace
surveillance also may disclose protected health information to employers
of findings of such evaluations that are necessary for the employer to
comply with requirements under OSHA and related laws.
*Comment:* Several commenters said that the NPRM did not indicate how to
distinguish between public health data collections and government health
data systems. They suggested eliminating proposed § 164.510(g) on
disclosures and uses for government health data systems, because they
believed that such disclosures and uses were adequately covered by
proposed § 164.510(b) on public health.
*Response:* As discussed below, we agree with the commenters who
suggested that the proposed provision that would have permitted
disclosures to government health data bases was overly broad, and we
remove it from the final rule. We reviewed the important purposes for
which some commenters said government agencies needed protected health
information, and we believe that most of those needs can be met through
the other categories of permitted uses and disclosures without
authorization allowed under the final rule, including provisions
permitting covered entities to disclose information (subject to certain
limitations) to government agencies for public health, health oversight,
law enforcement, and otherwise as required by law. For example, the
final rule continues to allow collection of protected health information
without authorization to monitor trends in the spread of infectious
disease, morbidity and mortality.
*Comment:* Several commenters recommended expanding the scope of
disclosures permissible under proposed § 164.510(b)(1)(iii), which would
have allowed covered entities to disclose protected health information
to private entities that could demonstrate that they were acting to
comply with requirements, or at the direction, of a public health
authority. These commenters said that they needed to collect
individually identifiable health information in the process of drug and
device development, approval, and post-market surveillance -- activities
that are related to, and necessary for, the FDA regulatory process.
However, they noted that the specific data collections involved were not
required by FDA regulations. Some commenters said that they often
devised their own data collection methods, and that health care
providers disclosed information to companies voluntarily for activities
such as post-marketing surveillance and efficacy surveys. Commenters
said they used this information to comply with FDA requirements such as
reporting adverse events, filing other reports, or recordkeeping.
Commenters indicated that the FDA encouraged but did not require them to
establish other data collection mechanisms, such as pregnancy registries
that track maternal exposure to drugs and the outcomes.
Accordingly, several commenters recommended modifying proposed §
164.510(b) to allow covered entities to disclose protected health
information without authorization to manufacturers registered with the
FDA to manufacture, distribute, or sell a prescription drug, device, or
biological product, in connection with post-marketing safety and
efficacy surveillance or for the entity to obtain information about the
drug, device, or product or its use. One commenter suggested including
in the regulation an illustrative list of examples of FDA-related
requirements, and stating in the preamble that all activities taken in
furtherance of compliance with FDA regulations are "public health
activities."
*Response:* We recognize that the FDA conducts or oversees many
activities that are critical to help ensure the safety or effectiveness
of the many products it regulates. These activities include, for
example, reporting of adverse events, product defects and problems;
product tracking; and post-marketing surveillance. In addition, we
believe that removing defective or harmful products from the market is a
critical national priority and is an important tool in FDA efforts to
promote the safety and efficacy of the products it regulates. We
understand that in most cases, the FDA lacks statutory authority to
require product recalls. We also recognize that the FDA typically does
not conduct recalls, repairs, or product replacement surveillance
directly, but rather, that it relies on the private entities it
regulates to collect data, notify patients when applicable, repair and
replace products, and undertake other activities to promote the safety
and effectiveness of FDA-regulated products.
We believe, however, that modifying the NPRM to allow disclosure of
protected health information to private entities as part of any
data-gathering activity related to a drug, device, or biological product
or its use, or for any activity that is consistent with, or that appears
to promote objectives specified, in FDA regulation would represent an
inappropriately broad exception to the general requirement to obtain
authorization prior to disclosure. Such a change could allow, for
example, drug companies to collect protected health information without
authorization to use for the purpose of marketing pharmaceuticals. We do
not agree that all activities taken to promote compliance with FDA
regulations represent public health activities as that term is defined
in this rule. In addition, we believe it would not be appropriate to
include in the regulation text an "illustrative list" of requirements
"related to" the FDA. The regulation text and preamble list the
FDA-related activities for which we believe disclosure of protected
health information to private entities without authorization is
warranted.
We believe it is appropriate to allow disclosure of protected health
information without authorization to private entities only: for purposes
that the FDA has, in effect, identified as national priorities by
issuing regulations or express directions requiring such disclosure; or
if such disclosure is necessary for a product recall. For example, we
believe it is appropriate to allow covered health care providers to
disclose to a medical device manufacturer recalling defective heart
valves the names and last known addresses of patients in whom the
provider implanted the valves. Thus, in the final rule, we allow covered
entities to disclose protected health information to entities subject to
FDA jurisdiction for the following activities: to report adverse events
(or similar reports with respect to food or dietary supplements),
product defects or problems (including problems with the use or labeling
of a product), or biological product deviations, if the disclosure is
made to the person required or directed to report such information to
the FDA; to track products if the disclosure is made to a person
required or directed by the FDA to track the product; to enable product
recalls, repairs, or replacement (including locating and notifying
individuals who have received products of product recalls, withdrawals,
or other problems); or to conduct post-marketing surveillance to comply
with requirements or at the direction of the FDA. The preamble above
provides further detail on the meaning of some of the terms in this
list. Covered entities may disclose protected health information to
entities for activities other than those described above only as
required by law; with authorization; or if permissible under another
section of this rule.
We understand that many private registries, such as pregnancy
registries, currently obtain patient authorization for data collection.
We believe the approach of § 164.512(b) strikes an appropriate balance
between the objective of promoting patient privacy and control over
their health information and the objective of allowing private entities
to collect data that ultimately may have important public health
benefits.
*Comment:* One commenter remarked that our proposal may impede
fetal/infant mortality and child fatality reviews.
*Response:* The final rule permits a covered entity to disclose
protected health information to a public health authority authorized by
law to conduct public health activities, including the collection of
data relevant to death or disease, in accordance with § 164.512(b). Such
activities may also meet the definition of "health care operations." We
therefore do not believe this rule impedes these activities.
*Comment:* Several comments requested that the final regulation clarify
that employers be permitted to use and/or disclose protected health
information pursuant to the requirements of the Occupational Safety and
Health Act and its accompanying regulations ("OSHA"). A few comments
asserted that the regulation should not only permit employers to use and
disclose protected health information without first obtaining an
authorization consistent with OSHA requirements, but also permit them to
use and disclose protected health information if the use or disclosure
is consistent with the spirit of OSHA. One commenter supported the
permissibility of these types of uses and disclosures, but warned that
the regulation should not grant employers unfettered access to the
entire medical record of employees for the purpose of meeting OSHA
requirements. Other commenters noted that OSHA not only requires
disclosures to the Occupational Safety and Health Administration, but
also to third parties, such as employers and employee representatives.
Thus, this comment asked HHS to clarify that disclosures to third
parties required by OSHA are also permissible under the regulation.
*Response:* Employers as such are not covered entities under HIPAA and
we generally do not have authority over their actions. When an employer
has a health care component, such as an on-site medical clinic, and the
components meets the requirements of a covered health care provider,
health plan or health care clearinghouse, the uses and disclosures of
protected health information by the health care component, including
disclosures to the larger employer entity, are covered by this rule and
must comply with its provisions.
A covered entity, including a covered health care provider, may disclose
protected health information to OSHA under § 164.512(a), if the
disclosure is required by law, or if the disclosure is a discretionary
one for public health activities, under § 164.512(b). Employers may also
request employees to provide authorization for the employer to obtain
protected health information from covered entities to conduct analyses
of work-related health issues. See § 164.508.
We also permit covered health care providers who provide health care as
a workforce member of an employer or at the request of an employer to
disclose protected health information to the employer concerning
work-related injuries or illnesses or workplace medical surveillance in
situations where the employer has a duty to keep records on or act on
such information under the OSHA or similar laws. We added this provision
to ensure that employers are able to obtain the information that they
need to meet federal and state laws designed to promote safer and
healthier workplaces. These laws are vital to protecting the health and
safety of workers and we permit specified covered health care providers
to disclose protected health information as necessary to carry out these
purposes.
*Comment:* A few comments suggested that the final regulation clarify
how it would interact with existing and pending OSHA requirements. One
of these comments requested that the Secretary delay the effective date
of the regulation until reviews of existing requirements are complete.
*Response:* As noted in the "Relationship to Other Federal Laws" section
of the preamble, we are not undertaking a complete review of all
existing laws with which covered entities might have to comply. Instead
we have described a general framework under which such laws may be
evaluated. We believe that adopting national standards to protect the
privacy of individually identifiable health information is an urgent
national priority. We do not believe that it is appropriate to delay the
effective date of this regulation.
*Comment:* One commenter asserted that the proposed regulation
conflicted with the OSHA regulation requirement that when a designated
representative (to whom the employee has already provided a written
authorization to obtain access) requests a release form for access to
employee medical records, the form must include the purpose for which
the disclosure is sought, which the proposed privacy regulation does not
require.
*Response:* We do not agree that this difference creates a conflict for
covered entities. If an employer seeks to obtain a valid authorization
under § 164.508, it may add a purpose statement to the authorization so
that it complies with OSHA's requirements and is a valid authorization
under § 164.508 upon which a covered entity may rely to make a
disclosure of protected health information to the employer.
*Comment:* One commenter stated that access to workplace medical records
by the occupational medical physicians is fundamental to workplace and
community health and safety. Access is necessary whether it is a single
location or multiple sites of the same company, such as production
facilities of a national company located throughout the country.
*Response:* We permit covered health care providers who provide health
care as a workforce member of an employer or at the request of an
employer to disclose protected health information to the employer
concerning work-related injuries or illnesses or workplace medical
surveillance, as described in this paragraph. Information obtained by an
employer under this paragraph would be available for it to use,
consistent with other laws and regulations, as it chooses and throughout
the national company. We do not regulate uses or disclosures of
individually identifiable health information by employers acting as
employers.
**Section 164.512(c)---Disclosures about Victims of Abuse, Neglect, or
Domestic Violence**
The NPRM did not include a paragraph specifically addressing covered
entities' disclosures of protected health information regarding victims
of abuse, neglect, or domestic violence. Rather, the NPRM addressed
disclosures about child abuse pursuant to proposed § 164.510(b), which
would have allowed covered entities to report child abuse to a public
health authority or to another appropriate authority authorized by law
to receive reports of child abuse or neglect. We respond to comments
regarding victims of domestic violence or abuse throughout the final
rule where relevant. (See responses to comments on §§ 164.502(g),
164.510(b), 164.512(f)(3), 164.522, and 164.524.)
*Comment:* Several commenters urged us to require that victims of
domestic violence be notified about requests for or disclosures of
protected health information about them, so that victims could take
safety precautions.
*Response:* We agree that, in balancing the burdens on covered entities
from such a notification requirement against the benefits to be gained,
victims of domestic abuse merit heightened concern. For this reason, we
generally require covered entities to inform the individual when they
disclose protected health information to authorized government
authorities. As the Family Violence Prevention Fund has noted in its
[Health Privacy Principles for Protecting Victims of Domestic
Violence]{.underline} (October 2000), victims of domestic violence and
abuse sometimes are subject to retaliatory violence. By informing a
victim of abuse or domestic violence of a disclosure to law enforcement
or other authorities, covered entities give victims the opportunity to
take appropriate safety precautions. See the above preamble discussion
of § 164.512(c) for more detail about the requirements for disclosing
protected health information about victims of domestic violence.
*Comment:* Some commenters argued that a consent requirement should
apply at a minimum to disclosures involving victims of crime or victims
of domestic violence.
*Response:* We agree, and we modify the proposed rule to require covered
entities to obtain an individual's agreement prior to disclosing
protected health information in most instances involving victims of a
crime or of abuse, neglect, or domestic violence. See the above preamble
discussions of § 164.512(c), on disclosures about victims of abuse,
neglect, or domestic violence, and § 164.512(f)(3), on disclosures to
law enforcement about crime victims.
**Section 164.512(d)---Uses and Disclosures for Health Oversight
Activities**
*Comment:* A couple of commenters supported the NPRM's approach to
health oversight. Several other commenters generally supported the
NPRM's approach to disclosure of protected health information for
national priority purposes, and they recommended some clarification
regarding disclosure for health oversight. Two commenters recommended
clarifying in the final rule that disclosure is allowed to all federal,
state, and local agencies that use protected health information to carry
out legally mandated responsibilities.
*Response:* The final rule permits disclosures to public agencies that
meet the definition of a health oversight agency and for oversight of
the particular areas described in the statute. Section 164.512(a) of the
final rule permits disclosures that are required by law. As discussed in
the responses to comments of § 164.512(a), we do not in the final rule
permit disclosures merely authorized by other laws that do not fit
within the other public policy purposes recognized by the rule.
*Comment*: One commenter recommended clarifying in the final rule that
covered entities are not required to establish business partner
contracts with health oversight agencies or public health authorities to
release individually identifiable information to them for purposes
exempt from HIPAA and sanctioned by state law.
*Response:* The final rule does not require covered entities to
establish business associate contracts with health oversight agencies
when they disclose protected health information to these agencies for
oversight purposes.
*Comment:* Two commenters recommended clarifying in the regulation text
that the health oversight section does not create a new right of access
to protected health information.
*Response:* We agree and include such a statement in the preamble of §
164.512(d) of the final rule.
*Comment:* Several commenters were concerned that the proposed oversight
section allowed but did not require disclosure of protected health
information to health oversight agencies for oversight activities.
*Response:* This rule's purpose is to protect the privacy of
individually identifiable health information. Except to enforce the rule
and to establish individuals' right to access their own protected health
information (see § 164.502(a)(2)), we do not require disclosure of
protected health information to any person or entity. We allow such
disclosure for situations in which other laws require disclosure.
*Comment:* Some commenters were concerned that the NPRM would have
allowed health oversight agencies to re-use and redisclose protected
health information to other entities, and they were particularly
concerned about re-disclosure to and re-use by law enforcement agencies.
One commenter believed that government agencies would use the label of
health oversight to gain access to protected health information from
covered entities -- thereby avoiding the procedural requirements of the
law enforcement section (proposed § 164.510(f)) and subsequently would
turn over information to law enforcement officials. Thus, these groups
were concerned that the potential for oversight access to protected
health information under the rule to become the "back door" to law
enforcement access to such information.
Based on their concerns, these commenters recommended establishing a
general prohibition on the re-use and re-disclosure of protected health
information obtained by health oversight agencies in actions against
individuals. One health plan expressed general concern about
re-disclosure among all of the public agencies covered in the proposed §
164.510. It recommended building safeguards into the rule to prevent
information gathered for one purpose (for example, public health) from
being used for another purpose (such as health oversight).
Many of the commenters concerned about re-disclosure of protected health
information obtained for oversight purposes said that if the Secretary
lacked statutory authority to regulate oversight agencies' re-disclosure
of protected health information and the re-use of this information by
other agencies covered in proposed § 164.510, the President should issue
an Executive Order barring such re-disclosure and re-use. One of these
groups specified that the Executive Order should bar re-use and
re-disclosure of protected health information in actions against
individuals.
In contrast, some commenters advocated information-sharing between law
enforcement and oversight agencies. Most of these commenters recognized
that the NPRM would have allowed re-use and re-disclosure of protected
health information from oversight to law enforcement agencies, and they
supported this approach.
*Response:* We believe that the language we have added to the rule, at §
164.512(d)(2) and the corresponding explanation in the preamble, to
clarify the boundary between disclosures for health oversight and for
law enforcement purposes should partially address the concern expressed
by some that oversight agencies will be the back door for access by law
enforcement. In situations when the individual is the subject of an
investigation or activity and the investigation or activity is not
related to health care fraud, the requirements for disclosure to law
enforcement must be met, and an oversight agency cannot request the
information under its more general oversight authority.
We acknowledge, however, that there will be instances under the rule
when a health oversight agency (or a law enforcement agency in its
oversight capacity) that has obtained protected health information
appropriately will be able to redisclose the information to a law
enforcement agency for law enforcement purposes. Under HIPAA, we have
the authority to restrict re-disclosure of protected health information
only by covered entities. Re-disclosures by public agencies such as
oversight agencies are not within the purview of this rule. We support
the enactment of comprehensive privacy legislation that would govern
such public agencies' re-use and re-disclosure of this information.
Furthermore, in an effort to prevent health oversight provisions from
becoming the back door to law enforcement access to protected health
information, the President is issuing an Executive Order that places
strict limitations on the use of protected health information gathered
in the course of an oversight investigation for law enforcement
activities. For example, such use will be subject to review by the
Deputy Attorney General.
*Comment:* Several commenters recommended modifying the proposed
oversight section to require health oversight officials to justify and
document their need for identifiable information.
*Response:* We encourage covered entities to work with health oversight
agencies to determine the scope of information needed for health
oversight inquiries. However, we believe that requiring covered entities
to obtain extensive documentation of health oversight information needs
could compromise health oversight agencies' ability to complete
investigations, particularly when an oversight agency is investigating
the covered entity from which it is seeking information.
*Comment:* Several commenters believed that health oversight activities
could be conducted without access to individually identifiable health
information. Some of these groups recommended requiring information
provided to health oversight agencies to be de-identified to the extent
possible.
*Response:* We encourage health oversight agencies to use de-identified
information whenever possible to complete their investigations. We
recognize, however, that in some cases, health oversight agencies need
identifiable information to complete their investigations. For example,
as noted in the preamble to the NPRM, to determine whether a hospital
has engaged in fraudulent billing practices, it may be necessary to
examine billing records for a set of individual cases. Similarly, to
determine whether a health plan is complying with federal or state
health care quality standards, it may be necessary to examine
individually identifiable health information in comparison with such
standards. Thus, to allow health oversight agencies to conduct the
activities that are central to their mission, the final rule does not
require covered entities to de-identify protected health information
before disclosing it to health oversight organizations.
*Comment:* One commenter recommended requiring whistleblowers, pursuant
to proposed § 164.518(a)(4) of the NPRM, to raise the issue of a
possible violation of law with the affected covered entity before
disclosing such information to an oversight agency, attorney, or law
enforcement official.
*Response:* We believe that such a requirement would be inappropriate,
because it would create the potential for covered entities that are the
subject of whistleblowing to take action to evade law enforcement and
oversight action.
*Comment:* One commenter recommended providing an exemption from the
proposed rule's requirements for accounting for disclosures when such
disclosures were for health oversight purposes.
*Response:* We recognize that in some cases, informing individuals that
their protected health information has been disclosed to a law
enforcement official or to a health oversight agency could compromise
the ability of law enforcement and oversight officials to perform their
duties appropriately. Therefore, in the final rule, we retain the
approach of proposed § 164.515 of the NPRM. Section 164.528(a)(2) of the
final rule states that an individual's right to receive an accounting of
disclosures to a health oversight agency, law enforcement official, or
for national security or intelligence purposes may be temporarily
suspended for the time specified by the agency or official. As described
in § 164.528(a)(2), for such a suspension to occur, the agency or
official must provide the affected covered entity with a written request
stating that an accounting to the individual would be reasonably likely
to impede the agency's activity. The request must specify the time for
which the suspension is required. We believe that providing a permanent
exemption to the right to accounting for disclosures for health
oversight purposes would fail to ensure that individuals are
sufficiently informed about the extent of disclosures of their protected
health information.
*Comment:* One commenter recommended making disclosures to health
oversight agencies subject to a modified version of the NPRM's proposed
three-part test governing disclosure of protected health information to
law enforcement pursuant to an administrative request (as described in
proposed § 164.510(f)(1)).
*Response:* We disagree that it would be appropriate to apply the
procedural requirements for law enforcement to health oversight. We
apply more extensive procedural requirements to law enforcement
disclosures than to disclosures for health oversight because we believe
that law enforcement investigations more often involve situations in
which the individual is the subject of the investigation (and thus could
suffer adverse consequences), and we believe that it is appropriate to
provide greater protection to individuals in such cases. Health
oversight involves investigations of institutions that use health
information as part of business functions, or of individuals whose
health information has been used to obtain a public benefit. These
circumstances justify broader access to information.
***Overlap Between Law Enforcement and Oversight***
*Comment:* Some commenters expressed concern that the NPRM's provisions
permitting disclosures for health oversight and disclosures for law
enforcement overlapped, and that the overlap could create confusion
among covered entities, members of the public, and government agencies.
The commenters identified particular factors that could lead to
confusion, including that (1) the phrase "criminal, civil, or
administrative proceeding" appeared in the definitions of both law
enforcement and oversight; (2) the examples of oversight agencies listed
in the preamble included a number of organizations that also conduct law
enforcement activities; (3) the NPRM addressed the issue of disclosures
to investigate health care fraud in the law enforcement section (§
164.510(f)(5)), yet health care fraud investigations are central to the
mission of some health care oversight agencies; (4) the NPRM established
more stringent rules for disclosure of protected health information
pursuant to an administrative subpoena issued for law enforcement than
for disclosure pursuant to an oversight agency's administrative
subpoena; and (5) the preamble, but not the NPRM regulation text,
indicated that agencies conducting both oversight and law enforcement
activities would be subject to the oversight requirements when
conducting oversight activities.
Some commenters said that covered entities would be confused by the
overlap between law enforcement and oversight and that this concern
would lead to litigation over which rules should apply when an entity
engaged in more than one of the activities listed under the exceptions
in proposed § 164.510. Other commenters believed that covered entities
could manipulate the NPRM's ambiguities in their favor, claim that the
more stringent law enforcement disclosure rules always should apply, and
thereby delay investigations. A few comments suggested that the
confusion could be clarified by making the regulation text consistent
with the preamble, by stating that when agencies conducting both law
enforcement and oversight seek protected health information as part of
their oversight activities, the oversight rules would apply.
*Response:* We agree that the boundary between disclosures for health
oversight and disclosures for law enforcement proposed in the NPRM could
have been more clear. Because many investigations, particularly
investigations involving public benefit programs, have both health
oversight and law enforcement aspects to them, and because the same
agencies often perform both functions, drawing any distinction between
the two functions is necessarily difficult. For example, traditional law
enforcement agencies, such as the Federal Bureau of Investigation, have
a significant role in health oversight. At the same time, traditional
health oversight agencies, such as federal Offices of Inspectors
General, often participate in criminal investigations.
To clarify the boundary between law enforcement and oversight for
purposes of complying with this rule, we add new language in the final
rule, at § 164.512(d)(2). This section indicates that health oversight
activities do not include an investigation or activity in which the
individual is the subject of the investigation or activity and the
investigation or activity does not arise out of and is not directly
related to health care fraud. In this rule, we describe investigations
involving suspected health care fraud as investigations related to: (1)
the receipt of health care; (2) a claim for public benefits related to
health; or (3) qualification for, or receipt of public benefits or
services where a patient's health is integral to the claim for public
benefits or services. In such cases, where the individual is the subject
of the investigation and the investigation does not relate to health
care fraud, identified as investigations regarding issues (a) through
(c), the rules regarding disclosure for law enforcement purposes (see §
164.512(f)) apply.
Where the individual is not the subject of the activity or
investigation, or where the investigation or activity relates to health
care fraud, a covered entity may make a disclosure pursuant to §
164.512(d)(1), allowing uses and disclosures for health oversight
activities. For example, when the U.S. Department of Labor's Pension and
Welfare Benefits Administration (PWBA) needs to analyze protected health
information about health plan enrollees in order to conduct an audit or
investigation of the health plan (i.e., the enrollees are not subjects
of the investigation) to investigate potential fraud by the health plan,
the health plan may disclose protected health information to the PWBA
under the health oversight rules.
To clarify further that health oversight disclosure rules apply
generally in health care fraud investigations (subject to the exception
described above), in the final rule, we eliminate proposed §
164.510(f)(5)(i), which would have established requirements for
disclosure related to health fraud for law enforcement purposes. All
disclosures of protected health information that would have been
permitted under proposed § 164.510(f)(5)(i) are permitted under §
164.512(d).
We also recognize that sections 201 and 202 of HIPAA, which established
a federal Fraud and Abuse Control Program and the Medicare Integrity
Program, identified health care fraud-fighting as a critical national
priority. Accordingly, under the final rule, in joint law
enforcement/oversight investigations involving suspected health care
fraud, the health oversight disclosures apply, even if the individual
also is the subject of the investigation.
We also recognize that in some cases, health oversight agencies may
conduct joint investigations with other oversight agencies involved in
investigating claims for benefits unrelated to health. For example, in
some cases, a state Medicaid agency may be working with officials of the
Food Stamps program to investigate suspected fraud involving Medicaid
and Food Stamps. While this issue was not raised specifically in the
comments, we add new language (§ 164.512(d)(3)) to provide guidance to
covered entities in such situations. Specifically, we clarify that if a
health oversight investigation is conducted in conjunction with an
oversight activity related to a claim for benefits unrelated to health,
the joint activity or investigation is considered health oversight for
purposes of the rule, and the covered entities may disclose protected
health information pursuant to the health oversight provisions.
*Comment:* An individual commenter recommended requiring authorization
for disclosure of patient records in fraud investigations, unless the
individual was the subject or target of the investigation. This
commenter recommended requiring a search warrant for cases in which the
individual was the subject and stating that fraud investigators should
have access to the minimum necessary patient information.
*Response:* As described above, we recognize that in some cases,
activities include elements of both law enforcement and health
oversight. Because we consider both of these activities to be critical
national priorities, we do not require covered entities to obtain
authorization for disclosure of protected health information to law
enforcement or health oversight agencies -- including those oversight
activities related to health care fraud. We believe that investigations
involving health care fraud represent health oversight rather than law
enforcement. Accordingly, as indicated above, we remove proposed §
164.510(f)(5)(i) from the law enforcement section of the proposed rule
and clarify that all disclosures of protected health information for
health oversight are permissible without authorization. As discussed in
greater detail in § 164.514, the final rule's minimum necessary standard
applies to disclosures under § 164.512 unless the disclosure is required
by law under § 164.512(a).
*Comment:* A large number of commenters expressed concern about the
potential for health oversight agencies to become, in effect, the "back
door" for law enforcement access to such information. The commenters
suggested that health oversight agencies could use their relatively
unencumbered access to protected health information to circumvent the
more stringent process requirements that otherwise would apply to
disclosures for law enforcement purposes. These commenters urged us to
prohibit health oversight agencies from re-disclosing protected health
information to law enforcement.
*Response:* As indicated above, we do not intend for the rule's
permissive approach to health oversight or the absence of specific
documentation to permit the government to gather large amounts of
protected health information for purposes unrelated to health oversight
as defined in the rule, and we do not intend for these oversight
provisions to serve as a "back door" for law enforcement access to
protected health information. While we do not have the statutory
authority to regulate law enforcement and oversight agencies' re-use and
re-disclosure of protected health information, we strongly support
enactment of comprehensive privacy legislation that would govern public
agencies' re-use and re-disclosure of this information. Furthermore, in
an effort to prevent health oversight provisions from becoming the back
door to law enforcement access to protected health information, the
President is issuing an Executive Order that places strict limitations
on the use of protected health information gathered in the course of an
oversight investigation for law enforcement activities.
*Comment:* One commenter asked us to allow the requesting agency to
decide whether a particular request for protected health information was
for law enforcement or oversight purposes.
*Response:* As described above, we clarify the overlap between law
enforcement disclosures and health oversight disclosures based on the
privacy and liberty interests of the individual (whether the individual
also is the subject of the official inquiry) and the nature of the
public interest (whether the inquiry relates to health care fraud or to
another potential violation of law). We believe it is more appropriate
to establish these criteria than to leave the decision to the discretion
of an agency that has a stake in the outcome of the investigation.
**Section 164.512(e)---Disclosures for Judicial and Administrative
Proceedings**
*Comment:* A few commenters suggested that the final rule not permit
disclosures without an authorization for judicial and administrative
proceedings.
*Response:* We disagree. Protected health information is necessary for a
variety of reasons in judicial and administrative proceedings. Often it
may be critical evidence that may or may not be about a party. Requiring
an authorization for all such disclosures would severely impede the
review of legal and administrative claims. Thus, we have tried to
balance the need for the information with the individual's privacy. We
believe the approach described above provides individuals with the
opportunity to object to disclosures and provides a mechanism through
which their privacy interests are taken into account.
*Comment:* A few commenters sought clarification about the interaction
between permissible disclosures for judicial and administrative
proceedings, law enforcement, and health oversight.
*Response:* In the final rule, we state that the provision permitting
disclosures without an authorization for judicial and administrative
proceedings does not supersede other provisions in § 164.512 that would
otherwise permit or restrict the use or disclosure of protected health
information. Additionally, in the descriptive preamble of § 164.512, we
provide further explanation of how these provisions relate to one
another.
*Comments*: Many commenters urged the Secretary to revise the rule to
state that it does not preempt or supersede existing rules and statutes
governing judicial proceedings, including rules of evidence, procedure,
and discovery. One commenter asserted that dishonest health care
providers and others should not be able to withhold their records by
arguing that state subpoena and criminal discovery statutes compelling
disclosure are preempted by the privacy regulation. Other commenters
maintained that there is no need to replace providers' current practice,
which typically requires either a signed authorization from the patient
or a subpoena to release medical information.
*Response:* These comments are similar to many of the more general
preemption comments we received. For a full discussion of the
Secretary's response on preemption issues, see Part 160 - Subpart B.
*Comment:* One commenter stated that the proposed rule creates a
conflict with existing rules and statutes governing judicial
proceedings, including rules of evidence and discovery. This commenter
stated that the rule runs afoul of state judicial procedures for
enforcement of subpoenas that require judicial involvement only when a
party seeks to enforce a subpoena.
*Response:* We disagree with this comment. The final rule permits
covered entities to disclose protected health information for any
judicial or administrative procedure in response to a subpoena,
discovery request, or other lawful process if the covered entity has
received satisfactory assurances that the party seeking the disclosure
has made reasonable efforts to ensure that the individual has been given
notice of the request or has made reasonable efforts to secure a
qualified protective order from a court or administrative tribunal. A
covered entity may disclose protected health information in response to
a subpoena, discovery request, or other lawful process without a
satisfactory assurance if it has made reasonable efforts to provide the
individual with such notice or to seek a qualified protected order
itself. These rules do not require covered entities or parties seeking
the disclosure of protected health information to involve the judiciary;
they may choose the notification option rather than seeking a qualified
protective order.
Many states have already enacted laws that incorporate these concepts.
In California, for instance, an individual must be given ten days notice
that his or her medical records are being subpoenaed from a health care
provider and state law requires that the party seeking the records
furnishes the health care provider with proof that the notice was given
to the individual. In Montana, a party seeking discovery or compulsory
process of medical records must give notice to the individual at least
ten days in advance of serving the request on a health care provider,
Service of the request must be accompanied by written certification that
the procedure has been followed. In Rhode Island, an individual must be
given notice that his or her medical records are being subpoenaed and
notice of his or her right to object. The party serving the subpoena on
the health care provider must provide written certification to the
provider that: (1) this procedure has been followed, (2) twenty days
have passed from the date of service, and (3) no challenge has been made
to the disclosure or the court has ordered disclosure after resolution
of a legal court challenge. In Washington, an individual must be given
at least fourteen days from the date of service of notice that his or
her health information is the subject of a discovery request or
compulsory process to obtain a protective order. The notice must
identify the health care provider from whom the information is sought,
specify the health care information that is sought, and the date by
which a protective order must be obtained in order to prevent the
provider from disclosing the information.
*Comment:* A few commenters expressed concern that the rule would place
unnecessary additional burdens on health care providers because when
they receive a request for disclosure in connection with an
administrative or judicial procedure, they would have to determine
whether the litigant's health was at issue before they made the
disclosure. A number of commenters complained that this requirement
would make it too easy for litigants to obtain protected health
information. One commenter argued that litigants should not be able to
circumvent state evidentiary rules that would otherwise govern
disclosure of protected health information simply upon counsel's
statement that the other party's medical condition or history is at
issue.
Other commenters, however, urged that disclosure without authorization
should be permitted whenever a patient places his or her medical
condition or history at issue and recommended requiring the request for
information to include a certification to this effect. Only if another
party to litigation has raised a medical question, do these commenters
believe a court order should be required. Similarly, one commenter
supported a general requirement that disclosure without authorization be
permitted only with a court order unless the patient has placed his or
her physical or mental condition at issue.
*Response:* We agree with the concerns expressed by several commenters
about this provision and has eliminated this requirement from the final
rule.
*Comment*: A number of commenters stated that the proposed rule should
be modified to permit disclosure without authorization pursuant to a
lawful subpoena. One commenter argued that the provision would limit the
scope of the Inspector General's subpoena power for judicial and
administrative proceedings to information concerning a litigant whose
health condition or history is at issue, and would impose a requirement
that the Inspector General provide a written certification to that
effect. Other commenters stated that the proposed rule would seriously
impair the ability of state agencies to conduct administrative hearings
on physician licensing and disciplinary matters. These commenters stated
that current practice is to obtain information using subpoenas.
Other commenters argued that disclosure of protected health information
for judicial and administrative proceedings should require a court order
and/or judicial review unless the subject of the information consents to
disclosure. These commenters believed that an attorney's certification
should not be considered sufficient authority to override an
individual's privacy, and that the proposed rule made it too easy for a
party to litigation to obtain information about the other party.
*Response*: As a general matter, we agree with these comments. As noted,
the final rule deletes the provision that would permit a covered entity
to disclose protected health information pursuant to an attorney's
certification that the individual is a party to the litigation and has
put his or her medical condition at issue. Under the final rule, covered
entities may disclose protected health information in response to a
court or administrative order, provided that only the protected health
information expressly authorized by the order is disclosed. Covered
entities may also disclose protected health information in response to a
subpoena, discovery request, or other lawful process without a court
order, but only if the covered entity receives satisfactory assurances
that the party seeking disclosure has made reasonable efforts to ensure
that the individual has been notified of the request or that reasonable
efforts have been made by the party seeking the information to secure a
qualified protective order. Additionally, a covered entity may disclose
protected health information in response to a subpoena, discovery
request, or other lawful process without a satisfactory assurance if it
makes reasonable efforts to provide the individual with such notice or
to seek a qualified protected order itself.
We also note that the final rule specifically provides that nothing in
Subchapter C should be construed to diminish the authority of any
Inspector General, including authority provided in the Inspector General
Act of 1978.
*Comment:* A number of commenters expressed concern that the proposed
rule would not permit covered entities to introduce material evidence in
proceedings in which, for example, the provisions of an insurance
contract are at issue, or when a billing or payment issue is presented.
They noted that although the litigant may be the owner of an insurance
policy, he or she may not be the insured individual to whom the health
information pertains. In addition, they stated that the medical
condition or history of a deceased person may be at issue when the
deceased person is not a party.
*Response:* We disagree. Under the final rule, a covered entity may
disclose protected health information without an authorization pursuant
to a court or administrative order. It may also disclose protected
health information with an authorization for judicial or administrative
proceedings in response to a subpoena, discovery request, or other
lawful process without a court order, if the party seeking the
disclosure provides the covered entity with satisfactory assurances that
it has make reasonable efforts to ensure that the individual has been
notified of the request or to seek a qualified protective order.
Additionally, a covered entity may disclose protected health information
in response to a subpoena, discovery request, or other lawful process
without a satisfactory assurance if it makes reasonable efforts to
provide the individual with such notice or to seek a qualified protected
order itself. Therefore, a party may obtain the information even if the
subject of the information is not a party to the litigation or deceased.
*Comment:* A few commenters argued that disclosure of protected health
information should be limited only to those cases in which the
individual has consented or a court order has been issued compelling
disclosure.
*Response:* The Secretary believes that such an approach would impose an
unreasonable burden on covered entities and the judicial system and that
greater flexibility is necessary to assure that the judicial and
administrative systems function smoothly. We understand that even those
states that have enacted specific statutes to protect the privacy of
health information have not imposed requirements as strict as these
commenters would suggest.
*Comment:* Many commenters asked that the final rule require the
notification of the disclosure be provided to the individual whose
health information is subject to disclosure prior to the disclosure as
part of a judicial or administrative proceeding. Most of these
commenters also asked that the rule require that the individual who is
the subject of a disclosure be given an opportunity to object to the
disclosure. A few commenters suggested that patients be given ten days
to object before requested information may be disclosed and recommend
that the rule require the requester to provide a certification that
notice has been provided and that ten days have passed with no objection
from the subject of the information. Some commenters suggested that if a
subpoena for disclosure is not accompanied by a court order, the covered
entities be prohibited from disclosing protected health information
unless the individual has been given notice and an opportunity to
object. Another commenter recommended requiring, in most circumstances,
notice and an opportunity to object before a court order is issued and
requiring the requestor of information to provide a signed document
attesting the date of notification and forbid disclosure until ten days
after notice is given.
*Response:* We agree that in some cases the provision of notice with an
opportunity to object to the disclosure is appropriate. Thus, in the
final rule we provide that a covered entity may disclose protected
health information in response to a subpoena, discovery request or other
lawful process that is not accompanied by a court order if it receives
satisfactory assurance from the party seeking the request that the
requesting party has made a good faith attempt to provide written notice
to the individual that includes sufficient information about the
litigation or proceeding to permit the individual to raise an objection
to the court or administrative tribunal and that the time for the
individual to raise objections has elapsed (and that none were filed or
all have been resolved). Covered entities may make reasonable efforts to
provide such notice as well.
In certain instances, however, the final rule permits covered entities
to disclose protected health information for judicial and administrative
proceedings without notice to the individual if the party seeking the
request has made reasonable efforts to seek a qualified protective
order, as described in the rule. A covered entity may also make
reasonable efforts to seek a qualified protective order in order to make
the disclosure. Additionally, a covered entity may disclose protected
health information for judicial and administrative proceedings in
response to an order of a court or administrative tribunal provided that
the disclosure is limited to only that information that is expressly
authorized by the order. The Secretary believes notice is not necessary
in these instances because a court or administrative tribunal is in the
best position to evaluate the merits of the arguments of the party
seeking disclosure and the party who seeks to block it before it issues
the order and that imposing further procedural obstacles before a
covered entity may honor that disclosure request is unnecessary.
*Comment:* Many commenters urged the Secretary to require specific
criteria for court and administrative orders. Many of these commenters
proposed that a provision be added to the rule that would require court
and administrative orders to safeguard the disclosure and use of
protected health information. These commenters urged that the
information sought must be relevant and material, as specific and
narrowly drawn as reasonably practicable, and only disclosed if
de-identified information could not reasonably be used.
*Response:* The Secretary's authority is limited to covered entities.
Therefore, we do not impose requirements on courts and administrative
tribunals. However, we note that the final rule limits the permitted
disclosures by covered entities in court or administrative proceedings
to only that information which is specified in the order from a court or
an administrative body should provide a degree of protection for
individuals from unnecessary disclosure.
*Comment:* Several commenters asked that the "minimum necessary"
standard not apply to disclosures made pursuant to a court order because
individuals could then use the rule to contest the scope of discovery
requests. However, many other commenters recommended that the rule
permit disclosure only of information "reasonably necessary" to respond
to a subpoena. These commenters raised concerns with applying the
"minimum necessary" standard in judicial and administrative proceedings,
but did not believe the holder of protected health information should
have blanket authority to disclose all protected health information.
Some of the commenters urged that disclosure of any information about
third parties that may be included in the medical records of another
person -- for example, the HIV status of a partner - be prohibited.
Finally, some commenters disagreed with the proposed rule because it did
not require covered entities to evaluate the validity of subpoenas and
discovery requests to determine whether these requests ask for the
"minimum necessary" or "reasonably necessary" amount of information.
*Response*: Under the final rule, if the disclosure is pursuant to an
order of a court or administrative tribunal, covered entities may
disclose only the protected health information expressly authorized by
the order. In these instances, a covered entity is not required to make
a determination whether or not the order might otherwise meet the
minimum necessary requirement.
If the disclosure is pursuant to a satisfactory assurance from the party
seeking the disclosure, at least a good faith attempt has been made to
notify the individual in writing of the disclosure before it is made or
a the parties have sought a qualified protective order that prohibits
them from using or disclosing the protected health information for any
purpose of than the litigation or proceeding for which the information
was requested and that the information will be returned to the covered
entity or destroyed at the end of the litigation or the proceeding.
Alternatively, the covered entity may seek such notice or qualified
protective order itself. This approach provides the individual with
protections and places the burden on the parties to resolve their
differences about the appropriateness and scope of disclosure as part of
the judicial or administrative procedure itself before the order is
issued, rather than requiring the covered entity to get involved in
evaluating the merits of the dispute in order to determine whether or
not the particular request is appropriate or too broad. In these cases,
the covered entity must disclose only the protected health information
that is the minimum amount necessary to achieve the purpose for which
the information is sought.
We share the concern of the commenters that covered entities should
redact any information about third parties before disclosing an
individual's protected health information. During the fact-finding stage
of our consideration of revisions to the proposed rule, we discussed
this issue with representatives of covered entities. Currently,
information about third parties is sometimes redacted by medical records
personnel responding to requests for information. In particular,
information regarding HIV status is treated with special sensitivity by
these professionals. Although we considered including a special
provision in the final rule prohibiting such disclosure, we decided that
the revisions made to the proposed rule would provide sufficient
protection. By restricting disclosure of protected health information to
only that information specified in a court or administrative order or
released pursuant to other types of lawful process only if the
individual had notice and an opportunity to object or if the information
was subject to a protective order, individuals who are concerned about
disclosure of information concerning third parties will have the
opportunity to raise that issue prior to the request for disclosure
being presented to the covered entity. We are reluctant to put the
covered entity in the position of having to resolve disputes concerning
the type of information that may be disclosed when that dispute should
more appropriately be settled through the judicial or administrative
procedure itself.
*Comment:* One commenter asked that the final regulation clarify that a
court order is not required when disclosure would otherwise be permitted
under the rule. This commenter noted that the preamble states that the
requirement for a court order would not apply if the disclosure would
otherwise be permitted under the rule. For example, disclosures of
protected health information pursuant to administrative, civil, and
criminal proceedings relating to "health oversight" are permitted, even
if no court or administrative orders have been issued. However, the
commenter was concerned that this principle only appeared in the
preamble and not in the rule itself.
*Response:* Section 164.512(e)(4) of the final regulation contains this
clarification.
*Comment:* One commenter was concerned that the rule is unclear as to
whether governmental entities are given a special right to "use"
protected health information that private parties do not have under the
proposed regulation or whether governmental entities that seek or use
protected health information are treated the same as private parties in
their use of such information. This commenter urged that we clarify our
intent regarding the use of protected health information by governmental
entities.
*Response:* Generally governmental entities are treated the same as
private entities under the rule. In a few clearly defined cases, a
special rule applies. For instance, under § 164.504(e)(3), when a
covered entity and its business associate are both governmental
entities, they may enter into a memorandum of understanding or adopt a
regulation with the force and effect of law that incorporates the
requirements of a business associate contract, rather than having to
negotiate a business associate contract itself.
*Comment:* One commenter recommended that final rule state that
information developed as part of a quality improvement or medical error
reduction program may not be disclosed under this provision. The
commenter explained that peer review information developed to identify
and correct systemic problems in delivery of care must be protected from
disclosure to allow a full discussion of the root causes of such events
so they may be identified and addressed. According to the commenter,
this is consistent with peer review protections afforded this
information by the states.
*Response*: The question of whether or not such information should be
protected is currently the subject of debate in Congress and in the
states. It would be premature for us to adopt a position on this issue
until a clear consensus emerges. Under the final rule, no special
protection against disclosure is provided for peer review information of
the type the commenter describes. However, unless the request for
disclosure fits within one of the categories of permitted or required
disclosures under the regulation, it may not be disclosed. For instance,
if disclosure of peer review information is required by another law
(such as Medicare or a state law), covered entities subject to that law
may disclose protected health information consistent with the law.
*Comment*: One commenter stated that the requirements of this section
are in conflict with Medicare contractor current practices, as defined
by the HCFA Office of General Counsel and suggested that the final rule
include more specific guidelines.
*Response:* Because the commenter failed to indicate the nature of these
conflicts, we are unable to respond.
*Comment*: One commenter stated that the rule should require rather than
permit disclosure pursuant to court orders.
*Response:* Under the statutory framework adopted by Congress in HIPAA,
a presumption is established that the data contained in an individual's
medical record belongs to the individual and must be protected from
disclosure to third parties. The only instance in which covered entities
holding that information [must]{.underline} disclose it is if the
individual requests access to the information himself or herself. In the
final rule (as in the proposed rule), covered entities [may]{.underline}
use or disclose protected health information under certain enumerated
circumstances, but are not required to do so. We do not believe that
this basic principle should be compromised merely because a court order
has been issued. Consistent with this principle, we provide covered
entities with the flexibility to deal with circumstances in which the
covered entity may have valid reasons for declining to release the
protected health information without violating this regulation.
*Comment:* One commenter noted that in some states, public health
records are not subject to discovery, and that the proposed rule would
not permit disclosure of protected health information pursuant to court
order or subpoena if the disclosure is not allowed by state law. The
commenter requested clarification as to whether a subpoena in a federal
civil action would require disclosure if a state law prohibiting the
release of public health records existed.
*Response:* As explained above, the final rule permits, but does not
require, disclosure of protected health information pursuant to a court
order. Under the applicable preemption provisions of HIPAA, state laws
relating to the privacy of medical information that are more stringent
than the federal rules are not preempted. To the extent that an
applicable state law precludes disclosure of protected health
information that would otherwise be permitted under the final rule,
state law governs.
*Comment:* A number of commenters expressed concern that the proposed
rule would negatively impact state and federal benefits programs,
particularly social security and workers' compensation. One commenter
requested that the final rule remove any possible ambiguity about
application of the rule to the Social Security Administration's (SSA)
evidence requests by permitting disclosure to all administrative level
of benefit programs. In addition, several commenters stated that
requiring SSA or states to provide the covered entity holding the
protected health information with an individual's consent before it
could disclose the information would create a huge administrative and
paperwork burden with no added value to the individual. In addition,
several other commenters indicated that states that make disability
determinations for SSA also support special accommodation for SSA's
determination process. They expressed concern that providers will
narrowly interpret the HIPAA requirements, resulting in significant
increases in processing time and program costs for obtaining medical
evidence (especially purchased consultative examinations when evidence
of record cannot be obtained). A few commenters were especially
concerned about the impact on states and SSA if the final rule were to
eliminate the NPRM's provision for a broad consent for "all evidence
from all sources."
Some commenters also note that it would be inappropriate for a provider
to make a minimum necessary determination in response to a request from
SSA because the provider usually will not know the legal parameters of
SSA's programs, or have access to the individual's other sources of
evidence. In addition, one commenter urged the Secretary to be sensitive
to these concerns about delay and other negative impacts on the timely
determination of disability by SSA for mentally impaired individuals.
*Response:* Under the final rule, covered entities may disclose
protected health information pursuant to an administrative order so the
flow of protected health information from covered entities to SSA and
the states should not be disrupted.
Although some commenters urged that special rules should be included for
state and federal agencies that need protected health information, the
Secretary rejects that suggestion because, wherever possible, the public
and the private sectors should operate under the same rules regarding
the disclosure of health information. To the extent the activities of
SSA constitute an actual administrative tribunal, covered entities must
follow the requirements of § 164.512(e), if they wish to disclose
protected health information to SSA in those circumstances. Not all
administrative inquiries are administrative tribunals, however. If SSA's
request for protected health information comes within another category
of permissible exemptions, a covered entity, following the requirements
of the applicable section, may disclose the information to SSA. For
example, if SSA seeks information for purposes of health oversight, a
covered entity that wishes to disclose the information to SSA may do so
under § 164.512(d) and not § 164.512(e). If the disclosure does not come
within one of the other permissible disclosures would a covered entity
need to meet the requirements of § 164.512(e). If the SSA request does
not come within another permissible disclosure, the agency will be
treated like anyone else under the rules.
The Secretary recognizes that even under current circumstances,
professional medical records personnel do not always respond
unquestioningly to an agency's request for health information. During
the fact finding process, professionals charged with managing provider
response to requests for protected health information indicated to us
that when an agency's request for protected health information is over
broad, the medical records professional will contact the agency and
negotiate a more limited request. In balancing the interests of
individuals against the need of governmental entities to receive
protected health information, we think that applying the minimum
necessary standard is appropriate and that covered entities should be
responsible for ensuring that they disclose only that protected health
information that is necessary to achieve the purpose for which the
information is sought.
*Comment:* In a similar vein, one commenter expressed concern that the
proposed rule would adversely affect the informal administrative process
usually followed in processing workers' compensation claims. Using
formal discovery is not always possible, because some programs do not
permit it. The commenter urged that the final rule must permit
administrative agencies, employers, and workers' compensation carriers
to use less formal means to obtain relevant medical evidence while the
matter is pending before the agency. This commenter asked that the rule
be revised to permit covered entities to disclose protected health
information without authorization for purposes of federal or state
benefits determinations at all levels of processing, from the initial
application through continuing disability reviews.
*Response:* If the disclosure is required by a law relating to workers'
compensation, a covered entity may disclose protected health information
as authorized by and to the extent necessary to comply with that law
under § 164.512(l). If the request for protected health information in
connection with a workers' compensation claim is part of an
administrative proceeding, a covered entity must meet the requirements
set forth in § 164.512(e), and discussed above, before disclosing the
information. As noted, one permissible manner by which a covered entity
may disclose protected health information under § 164.512(e) is if the
party seeking the disclosure makes reasonable efforts to provide notice
to the individual as required by this provision. Under this method, the
less formal process noted by the commenter would not be disturbed.
Covered entity may disclose protected health information in response to
other types of requests only as permitted by this regulation.
**Section 164.512(f)---Disclosures for Law Enforcement Purposes**
***General Comments on Proposed § 164.510(f)***
*Comment:* Some commenters argued that current law enforcement use of
protected health information was legitimate and important. These
commenters cited examples of investigations and prosecutions for which
protected health information is needed, from white collar insurance
fraud to violent assault, to provide incriminating evidence or to
exonerate a suspect, to determine what charges are warranted and for
bail decisions. For example, one commenter argued that disclosure of
protected health information for law enforcement purposes should be
exempt from the rule, because the proposed regulation would hamper Drug
Enforcement Administration investigations. A few commenters argued that
effective law enforcement requires early access to as much information
as possible, to rule out suspects, assess severity of criminal acts, and
for other purposes. A few commenters noted the difficulties criminal
investigators and prosecutors face when fighting complex criminal
schemes. In general, these commenters argued that all disclosures of
protected health information to law enforcement should be allowed, or
for elimination of the process requirements proposed in § 164.510(f)(1).
*Response:* The importance and legitimacy of law enforcement activities
are beyond question, and they are not at issue in this regulation. We
permit disclosure of protected health information to law enforcement
officials without authorization in some situations precisely because of
the importance of these activities to public safety. At the same time,
individuals' privacy interests also are important and legitimate. As
with all the other disclosures of protected health information permitted
under this regulation, the rules we impose attempt to balance competing
and legitimate interests.
*Comment:* Law enforcement representatives stated that law enforcement
agencies had a good track record of protecting patient privacy and that
additional restrictions on their access and use of information were not
warranted. Some commenters argued that no new limitations on law
enforcement access to protected health information were necessary,
because sufficient safeguards exist in state and federal laws to prevent
inappropriate disclosure of protected health information by law
enforcement.
*Response:* Disclosure of protected health information by law
enforcement is not at issue in this regulation. Law enforcement access
to protected health information in the first instance, absent any
re-disclosure by law enforcement, impinges on individuals' privacy
interests and must therefore be justified by a public purpose that
outweighs individuals' privacy interests.
We do not agree that sufficient safeguards already exist in this area.
We are not aware of, and the comments did not provide, evidence of a
minimum set of protections for individuals relating to access by law
enforcement to their protected health information. Federal and state
laws in this area vary considerably, as they do for other areas
addressed in this final rule. The need for standards in this area is no
less critical than in the other areas addressed by this rule.
*Comment:* Many commenters argued that no disclosures of protected
health information should be made to law enforcement (absent
authorization) without a warrant issued by a judicial officer after a
finding of probable cause. Others argued that a warrant or subpoena
should be required prior to disclosure of protected health information
unless the disclosure is for the purposes of identifying a suspect,
fugitive, material witness, or missing persons, as described in proposed
§ 164.510(f)(2). Some commenters argued that judicial review prior to
release of protected health information to law enforcement should be
required absent the exigent and urgent circumstances identified in the
NPRM in § 164.510(f)(3) and (5), or absent "a compelling need" or
similar circumstances.
*Response:* In the final rule, we attempt to match the level of
procedural protection for privacy required by this rule with the nature
of the law enforcement need for access, the existence of other
procedural protections, and individuals' privacy interests. Where other
rules already impose procedural protections, this rule generally relies
on those protections rather than imposing new ones. Thus, where access
to protected health information is granted after review by an
independent judicial officer (such as a court order or court-ordered
warrant, or a subpoena or summons issued by a judicial officer), no
further requirements are necessary. Similarly, because information
disclosed to a grand jury is vital to law enforcement purposes and is
covered by secrecy protection, this rule allows disclosure with no
further process.
We set somewhat stricter standards for disclosure of protected health
information pursuant to administrative process, such as administrative
subpoenas, summonses, and civil or authorized investigative demands. In
these cases, the level of existing procedural protections is lower than
for judicially-approved or grand jury disclosures. We therefore require
a greater showing, specifically, the three-part test described in §
164.512(f)(1)(ii), before the covered entity is permitted to release
protected health information. Where the information to be disclosed is
about the victim of a crime, privacy interests are heightened and we
require the victim's agreement prior to disclosure in most instances.
In the limited circumstances where law enforcement interests are
heightened, we allow disclosure of protected health information without
prior legal process or agreement, but we impose procedural protections
such as limits on the information that may lawfully be disclosed, limits
on the circumstances in which the information may be disclosed, and
requirements for verifying the identity and authority of the person
requesting the disclosures. For example, in some cases law enforcement
officials may seek limited but focused information needed to obtain a
warrant. A witness to a shooting may know the time of the incident and
the fact that the perpetrator was shot in the left arm, but not the
identity of the perpetrator. Law enforcement would then have a
legitimate need to ask local emergency rooms whether anyone had
presented with a bullet wound to the left arm near the time of the
incident. Law enforcement may not have sufficient information to obtain
a warrant, but instead would be seeking such information. In such cases,
when only limited identifying information is disclosed and the purpose
is solely to ascertain the identity of a person, the invasion of privacy
would be outweighed by the public interest. For such circumstances, we
allow disclosure of protected health information in response to a law
enforcement inquiry where law enforcement is seeking to identify a
suspect, fugitive, material witness, or missing person, but allow only
disclosure of a limited list of information.
Similarly, it is in the public interest to allow covered entities to
take appropriate steps to protect the integrity and safety of their
operations. Therefore, we permit covered entities on their own
initiative to disclose to law enforcement officials protected health
information for this purpose. However, we limit such disclosures to
protected health information that the covered entity believes in good
faith constitutes evidence of criminal conduct that occurred on the
premises of the covered entity.
We shape the rule's provisions with respect to law enforcement according
to the limited scope of our regulatory authority under HIPAA, which
applies only to the covered entities and not to law enforcement
officials. We believe the rule sets the correct standards for when an
exception to the rule of non-disclosure is appropriate for law
enforcement purposes. There may be advantages, however, to legislation
that applies the appropriate standards directly to judicial officers,
prosecutors in grand juries, and to those making administrative or other
requests for protected health information, rather than to covered
entities. These advantages could include measures to hold officials
accountable if they seek or receive protected health information
contrary to the legal standard. In Congressional consideration of law
enforcement access, there have also been useful discussions of other
topics, such as limits on re-use of protected health information
gathered in the course of health oversight activities. The limitations
on our regulatory authority provide additional reason to support
comprehensive medical privacy legislation.
*Comment:* A few commenters cited existing sanctions for law enforcement
officials who violate the rights of individuals in obtaining evidence,
ranging from suppression of that evidence to monetary penalties, and
argued that such sanctions are sufficient to protect patients' privacy
interests.
*Response:* After-the-fact sanctions are important, but they are
effective only when coupled with laws that establish the ground rules
for appropriate behavior. That is, a sanction applies only where some
other rule has been violated. This regulation sets such basic ground
rules. Further, under the HIPAA statutory authority, we cannot impose
sanctions on law enforcement officials or require suppression of
evidence. We must therefore rely on rules that regulate disclosure of
protected health information by covered entities in the first instance.
*Comment:* Several commenters argued that disclosure of protected health
information under § 164.510(f) should be mandatory, not just permitted.
Others argued that we should mandate disclosure of protected health
information in response to Inspector General subpoenas. A few commenters
argued that we should require all covered entities to include disclosure
of protected health information to law enforcement in their required
notice of privacy practices.
*Response:* The purpose of this regulation is to protect individuals'
privacy interests, consistent with other important public activities.
Other laws set the rules governing those public activities, including
when health information is necessary for their effective operation. See
discussion of § 164.512(a).
*Comment:* Some commenters questioned whether the Secretary had
statutory authority to directly or indirectly impose new procedural or
substantive requirements on otherwise lawful legal process issued under
existing federal and state rules. They argued that, while the provisions
are imposed on \"covered entities,\" the rule would result in law
enforcement officials being compelled to modify current practices to
harmonize them with the requirements this rule imposes on covered
entities. A number of state law enforcement agencies argued that the
rule would place new burdens on state administrative subpoenas and
requests that are intrusive in state functions. At least one commenter
argued that the requirement for prior process places unreasonable
restrictions on the right of the states to regulate law enforcement
activities.
*Response:* This rule regulates the ability of health care
clearinghouses, health plans, and covered health care providers to use
and disclose health information. It does not regulate the behavior of
law enforcement officials or the courts, nor does it prevent states from
regulating law enforcement officials. All regulations have some effects
on entities that are not directly regulated. We have considered those
effects in this instance and have determined that the provisions of the
rule are necessary to protect the privacy of individuals.
*Comment:* One commenter argued that state licensing boards should be
exempt from restrictions placed on law enforcement officials, because
state licensing and law enforcement are different activities.
*Response:* Each state's law determines what authorities are granted to
state licensing boards. Because state laws differ in this regard, we
cannot make a blanket determination that state licensing officials are
or are not law enforcement officials under this regulation. We note,
however, that the oversight of licensed providers generally is included
as a health oversight activity at § 164.512(d).
*Relationship to Existing Rules and Practices*
*Comment:* Many commenters expressed concern that the proposed rule
would have expanded current law enforcement access to protected health
information. Many commenters said that the NPRM would have weakened
their current privacy practices with respect to law enforcement access
to health records. For example, some of the commenters arguing that a
warrant or subpoena should be required prior to disclosure of protected
health information unless the disclosure is for the purposes of
identifying a suspect, fugitive, material witness, or missing persons,
did so because they believed that such a rule would be consistent with
current state law practices.
*Response:* This regulation does not expand current law enforcement
access to protected health information. We do not mandate any
disclosures of protected health information to law enforcement
officials, nor do we make lawful any disclosures of protected health
information which are unlawful under other rules and regulations.
Similarly, this regulation does not describe a set of "best practices."
Nothing in this regulation should cause a covered entity to change
practices that are more protective of privacy than the floor of
protections provided in this regulation.
This regulation sets forth the minimum practices which a covered entity
must undertake in order to avoid sanctions under the HIPAA. We expect
and encourage covered entities to exercise their judgment and
professional ethics in using and disclosing health information, and to
continue any current practices that provide privacy protections greater
than those mandated in this regulation.
*Comment:* Many commenters asserted that, today, consent or judicial
review always is required prior to release of protected health
information to law enforcement; therefore, they said that the proposed
rule would have lessened existing privacy protections.
*Response:* In many situations today, law enforcement officials lawfully
obtain health information absent any prior legal process and absent
exigent circumstances. The comments we received on the NPRM, both from
law enforcement and consumer advocacy groups, describe many such
situations. Moreover, this rule sets forth minimum privacy protections
and does not preempt more stringent, pre-existing standards.
*Comment:* Some commenters argued that health records should be entitled
to at least as much protection as cable subscription records and video
rental records.
*Response:* We agree. The Secretary, in presenting her initial
recommendations on the protection of health information to the Congress
in 1997, stated that, "When Congress looked at the privacy threats to
our credit records, our video records, and our motor vehicle records, it
acted quickly to protect them. It is time to do the same with our health
care records" (Testimony of Donna E. Shalala, Secretary, U. S.
Department of Health and Human Services, before the Senate Committee on
Labor & Human Resources, September 11, 1997). However, the limited
jurisdiction conferred on us by the HIPAA does not allow us to impose
such restrictions on law enforcement officials or the courts.
*Comment:* At least one commenter argued that the regulation should
allow current routine uses for law enforcement under the Privacy Act.
*Response:* This issue is discussed in the \"Relationship to Other
Federal Laws\" preamble discussion of the Privacy Act.
*Comment:* A few commenters expressed concern that people will be less
likely to provide protected health information for public health
purposes if they fear the information could be used for law enforcement
purposes.
*Response:* This regulation does not affect law enforcement access to
records held by public health authorities, nor does it expand current
law enforcement access to records held by covered entities. These
agencies are for the most part not covered entities under HIPAA.
Therefore, this regulation should not reduce current cooperation with
public health efforts.
*Relationship to Other Provisions of This Regulation*
*Comment:* Several commenters pointed out an unintended interaction
between proposed §§ 164.510(f) and 164.510(n). Because proposed §
164.510(n), allowing disclosures mandated by other laws, applied only if
the disclosure would not fall into one of the categories of disclosures
provided for in § 164.510 (b) - (m), disclosures of protected health
information mandated for law enforcement purposes by other law would
have been preempted.
*Response:* We agree, and in the final rule we address this unintended
interaction. It is not our intent to preempt these laws. To clarify the
interaction between these provisions, in the final rule we have
specifically added language to the paragraph addressing disclosures for
law enforcement that permits covered entities to comply with legal
mandates, and have included a specific cross reference in the provision
of the final rule that permits covered entities to make other
disclosures required by law. See § 164.512(a).
*Comment:* Several commenters argued that, when a victim of abuse or of
a crime has requested restrictions on disclosure, the restrictions
should be communicated to any law enforcement officials who receive that
protected health information.
*Response:* We do not have the authority to regulate law enforcement use
and disclosure of protected health information, and therefore we could
not enforce any such restrictions communicated to law enforcement
officials. For this reason, we determined that the benefits to be gained
from requiring communication of restrictions would not outweigh the
burdens such a requirement would place on covered entities. We expect
that professional ethics will guide health care providers'
communications to law enforcement officials about the welfare of victims
of abuse or other crime.
*Comment:* Some commenters argued against imposing the "minimum
necessary" requirement on disclosure of protected health information to
law enforcement officials. Some law enforcement commenters expressed
concern that the "minimum necessary" test could be "manipulated" by a
covered entity that wished to withhold relevant evidence. A number of
covered entities complained that they were ill-equipped to substitute
their judgment for that of law enforcement for what was the minimum
amount necessary, and they also argued that the burden of determining
the "minimum necessary"information should be transferred to law
enforcement agencies. Some commenters argued that imposing such
\"uninformed\" discretion on covered entities would delay or thwart
legitimate investigations, and would result in withholding information
that might exculpate an individual or might be necessary to present a
defendant's case. One comment suggested that covered entities have
"immunity" for providing too much information to law enforcement.
*Response:* The "minimum necessary" standard is discussed at § 164.514.
*Comment:* A few commenters asked us to clarify when a disclosure is for
a "Judicial or Administrative Proceeding" and when it is for "Law
Enforcement" purposes.
*Response:* In the final rule we have clarified that § 164.512(e)
relating to disclosures for judicial or administrative proceedings does
not supersede the authority of a covered entity to make disclosures
under other provisions of the rule.
*Use of Protected Health Information after Disclosure to Law
Enforcement*
*Comment:* Many commenters recommended that we restrict law enforcement
officials' re-use and re-disclosure of protected health information.
Some commenters asked us to impose such restrictions, while other
commenters noted that the need for such restrictions underscores the
need for legislation. Another argued for judicial review prior to
release of protected health information to law enforcement because this
regulation cannot limit further uses or disclosures of protected health
information once it is in the hands of law enforcement agencies.
*Response:* We agree that there are advantages to legislation that
imposes appropriate restrictions directly on the re-use and
re-disclosure of protected health information by many persons who may
lawfully receive protected health information under this regulation, but
whom we cannot regulate under the HIPAA legislative authority, including
law enforcement agencies.
*Comment:* A few commenters expressed concern that protected health
information about persons who are not suspects may be used in court and
thereby become public knowledge. These commenters urged us to take steps
to minimize or prevent such protected health information from becoming
part of the public record.
*Response:* We agree that individuals should be protected from
unnecessary public disclosure of health information about them. However,
we do not have the statutory authority in this regulation to require
courts to impose protective orders. To the extent possible within the
HIPAA statutory authority, we address this problem in § 164.512(e),
Judicial and Administrative Proceedings.
*Comment:* Some commenters argued that evidence obtained in violation of
the regulation should be inadmissible at trial.
*Response:* In this regulation, we do not have the authority to regulate
the courts. We can neither require nor prohibit courts from excluding
evidence obtain in violation of this regulation.
***Comments Regarding Proposed § 164.510(f)(1), Disclosures to Law
Enforcement Pursuant to Process***
*Comments Supporting or Opposing a Requirement of Consent or Court
Order*
*Comment:* Some commenters argued that a rule that required a court
order for every instance that law enforcement sought protected health
information would impose substantial financial and administrative
burdens on federal and state law enforcement and courts. Other
commenters argued that imposing a new requirement of prior judicial
process would compromise the time-sensitive nature of many
investigations.
*Response:* We do not impose such a requirement in this regulation.
*Comment:* Many commenters argued that proposed § 164.510(f)(1) would
have given law enforcement officials the choice of obtaining records
with or without a court order, and that law enforcement "will choose the
least restrictive means of obtaining records, those that do not require
review by a judge or a prosecutor." Several commenters argued that this
provision would have provided the illusion of barriers \-- but no real
barriers \-- to law enforcement access to protected health information.
A few argued that this provision would have allowed law enforcement to
regulate itself.
*Response:* We agree with commenters that, in some cases, a law
enforcement official may have discretion to seek health information
under more than one legal avenue. Allowing a choice in these
circumstances does not mean an absence of real limits. Where law
enforcement officials choose to obtain protected health information
through administrative process, they must meet the three-part test
required by this regulation.
*Comment:* At least one commenter argued for judicial review prior to
disclosure of health information because the rule will become the "*de
facto*" standard for release of protected health information.
*Response:* We do not intend for this regulation to become the "*de
facto*" standard for release of protected health information. Nothing in
this regulation limits the ability of states and other governmental
authorities to impose stricter requirements on law enforcement access to
protected health information. Similarly, we do not limit the ability of
covered entities to adopt stricter policies for disclosure of protected
health information not mandated by other laws.
*Comment*: A few commenters expressed concern that proposed §
164.510(f)(1) would have overburdened the judicial system.
*Response:* The comments did not provide any factual basis for
evaluating this concern.
*Comment:* Some commenters argued that, while a court order should be
required, the standard of proof should be something other than "probable
cause." For example, one commenter argued that the court should apply
the three-part test proposed in § 164.510(f)(1)(C). Another commenter
suggested a three-part test: the information is necessary, the need
cannot be met with non-identifiable information, and the need of law
enforcement outweighs the privacy interest of the patient. Some
commenters suggested that we impose a \"clear and convincing\" standard.
Another suggested that we require clear and convincing evidence that:
(1) the information sought is relevant and material to a legitimate
criminal investigation; (2) the request is as specific and narrow as is
reasonably practicable; (3) de-identified information, for example coded
records, could not reasonably be used; (4) on balance, the need for the
information outweighs the potential harm to the individuals and to
patient care generally; and (5) safeguards appropriate to the situation
have been considered and imposed. This comment also suggested the
following as such appropriate safeguard: granting only the right to
inspect and take notes; allowing copying of only certain portions of
records; prohibiting removing records from the premises; placing limits
on subsequent use and disclosure; and requiring return or destruction of
the information at the earliest possible time.) Others said the court
order should impose a "minimum necessary" standard.
*Response:* We have not revised the regulation in response to comments
suggesting that we impose additional standards relating to disclosures
to comply with court orders. Unlike administrative subpoenas, where
there is no independent review of the order, court orders are issued by
an independent judicial officer, and we believe that covered entities
should be permitted under this rule to comply with them. Court orders
are issued in a wide variety of cases, and we do not know what hardships
might arise by imposing standards that would require judicial officers
to make specific findings related to privacy.
*Comment:* At least one commenter argued that the proposed rule would
have placed too much burden on covered entities to evaluate whether to
release information in response to a court order. This comment suggested
that the regulation allow disclosure to attorneys for assessment of what
the covered entity should release in response to a court order.
*Response:* This regulation does not change current requirements on or
rights of covered entities with respect to court orders for the release
of health information. Where such disclosures are required today, they
continue to be required under this rule. Where other law allows a
covered entity to challenge a court order today, this rule will not
reduce the ability of a covered entity to mount such a challenge. Under
§ 164.514, a covered entity will be permitted to rely on the face of a
court order to meet this rule's requirements for verification of the
legal authority of the request for information. A covered entity may
disclose protected health information to its attorneys as needed, to
perform health care operations, including to assess the covered entity's
appropriate response to court orders. See definition of "health care
operations" under § 164.501.
*Comment:* Many commenters argued that the regulation should prohibit
disclosures of protected health information to law enforcement absent
patient consent.
*Response:* We disagree with the comment. Requiring consent prior to any
release of protected health information to a law enforcement official
would unduly jeopardize public safety. Law enforcement officials need
protected health information for their investigations in a variety of
circumstances. The medical condition of a defendant could be relevant to
whether a crime was committed, or to the seriousness of a crime. The
medical condition of a witness could be relevant to the reliability of
that witness. Health information may be needed from emergency rooms to
locate a fleeing prison escapee or criminal suspect who was injured and
is believed to have stopped to seek medical care.
These and other uses of medical information are in the public interest.
Requiring the authorization of the subject prior to disclosure could
make apprehension or conviction of some criminals difficult or
impossible. In many instances, it would not be possible to obtain such
consent, for example because the subject of the information could not be
located in time (or at all). In other instances, the covered entity may
not wish to undertake the burden of obtaining the consent. Rather than
an across-the-board consent requirement, to protect individuals' privacy
interests while also promoting public safety, we impose a set of
procedural safeguards (described in more detail elsewhere in this
regulation) that covered entities must ensure are met before disclosing
protected health information to law enforcement officials.
In most instances, such procedural safeguards consist of some prior
legal process, such as a warrant, grand jury subpoena, or an
administrative subpoena that meets a three-part test for protecting
privacy interests. When the information to be disclosed is about the
victim of a crime, privacy interests are heightened and we require the
victim's agreement prior to disclosure in most instances. In the limited
circumstances where law enforcement interests are heightened and we
allow disclosure of protected health information without prior legal
process or agreement, the procedural protections include limits on the
information that may lawfully be disclosed, the circumstances in which
the information may be disclosed, and requirements for verifying the
identity and authority of the person requesting the disclosures.
We also allow disclosure of protected health information to law
enforcement officials without consent when other law mandates the
disclosures. When such other law exists, another public entity has made
the determination that law enforcement interests outweigh the
individual's privacy interests in the situations described in that other
law, and we do not upset that determination in this regulation.
*Comment:* Several commenters recommended requiring that individuals
receive notice and opportunity to contest the validity of legal process
under which their protected health information will be disclosed, prior
to disclosure of their records to law enforcement. Some of these
commenters recommended adding this requirement to provisions proposed in
the NPRM, while others recommended establishing this requirement as part
of a new requirement for a judicial warrant prior to all disclosures of
protected health information to law enforcement. At least one of these
commenters proposed an exception to such a notice requirement where
notice might lead to destruction of the records.
*Response:* Above we discuss the reasons why we believe it is
inappropriate to require consent or a judicial order prior to any
release of protected health information to law enforcement. Many of
those reasons apply here, and they lead us not to impose such a notice
requirement.
*Comment:* A few commenters believed that the proposed requirements in §
164.510(f)(1) would hinder investigations under the Civil Rights for
Institutionalized Persons Act (CRIPA).
*Response:* We did not intend that provision to apply to investigations
under CRIPA, and we clarify in the final rule that covered entities may
disclose protected health information for such investigations under the
health oversight provisions of this regulation (see § 164.512(d) for
further detail).
*Comments Suggesting Changes to the Proposed Three-Part Test*
*Comment:* Many commenters argued for changes to the proposed three-part
test that would make the test more difficult to meet. Many of these
urged greater, but unspecified, restrictions. Others argued that the
proposed test was too stringent, and that it would have hampered
criminal investigations and prosecutions. Some argued that it was too
difficult for law enforcement to be specific at the beginning of an
investigation. Some argued that there was no need to change current
practices, and they asked for elimination of the three-part test because
it was "more stringent" than current practices and would make protected
health information more difficult to obtain for law enforcement
purposes. These commenters urged elimination of the three-part test so
that administrative bodies could continue current practices without
additional restrictions. Some of these argued for elimination of the
three-part test for all administrative subpoenas; others argued for
elimination of the three-part test for administrative subpoenas from
various Inspectors General offices. A few commenters argued that the
provisions in proposed § 164.510(f)(1) should be eliminated because they
would have burdened criminal investigations and prosecutions but would
have served "no useful public purpose."
*Response:* We designed the proposed three-part test to require proof
that the government's interest in the health information was
sufficiently important and sufficiently focused to overcome the
individual's privacy interest. If the test were weakened or eliminated,
the individual's privacy interest would be insufficiently protected. At
the same time, if the test were significantly more difficult to meet,
law enforcement's ability to protect the public interest could be unduly
compromised.
*Comment:* At least one comment argued that, in the absence of a
judicial order, protected health information should be released only
pursuant to specific statutory authority.
*Response:* It is impossible to predict all the facts and circumstances,
for today and into the future, in which law enforcement's interest in
health information outweigh individuals' privacy interests. Recognizing
this, states and other governments have not acted to list all the
instances in which health information should be available to law
enforcement officials. Rather, they specify some such instances, and
rely on statutory, constitutional, and other limitations to place
boundaries on the activities of law enforcement officials. Since the
statutory authority to which the commenter refers does not often exist,
many uses of protected health information that are in the public
interest (described above in more detail) would not be possible under
such an approach.
*Comment:* At least one commenter, an administrative agency, expressed
concern that the proposed rule would have required its subpoenas to be
approved by a judicial officer.
*Response:* This rule does not require judicial approval of
administrative subpoenas. Administrative agencies can avoid the need for
judicial review under this regulation by issuing subpoenas for protected
health information only where the three-part test has been met.
*Comment:* Some commenters suggested alternative requirements for law
enforcement access to protected health information. A few suggested
replacing the three-part test with a requirement that the request for
protected health information from law enforcement be in writing and
signed by a supervisory official, and/or that the request "provide
enough information about their needs to allow application of the minimum
purpose rule."
*Response:* A rule requiring only that the request for information be in
writing and signed fails to impose appropriate substantive standards for
release of health information. A rule requiring only sufficient
information for the covered entity to make a "minimum necessary"
determination would leave these decisions entirely to covered entities'
discretion. We believe that protection of individuals' privacy interests
must start with a minimum floor of protections applicable to all. We
believe that while covered entities may be free to provide additional
protections (within the limits of the law), they should not have the
ability to allow unjustified access to health information.
*Comment:* Some commenters argued that the requirement for an
unspecified \"finding\" for a court order should be removed from the
proposed rule, because it would have been confusing and would have
provided no guidance to a court as to what finding would be sufficient.
*Response:* We agree that the requirement would have been confusing, and
we delete this language from the final regulation.
*Comment:* A few commenters argued that the proposed three-part test
should not be applied where existing federal or state law established a
standard for issuing administrative process.
*Response:* It is the content of such a standard, not its mere
existence, that determines whether the standard strikes an appropriate
balance between individuals' privacy interests and the public interest
in effective law enforcement activities. We assume that current
authorities to issue administrative subpoena are all subject to some
standards. When an existing standard provides at least as much
protection as the three-part test imposed by this regulation, the
existing standard is not disturbed by this rule. When, however, an
existing standard for issuing administrative process provides less
protection, this rule imposes new requirements.
*Comment:* Some covered entities said that they should not have been
asked to determine whether the proposed three-part test has been met.
Some argued that they were ill-equipped to make a judgment on whether an
administrative subpoena actually met the three-part test, or that it was
unfair to place the burden of making such determinations on covered
entities. Some argued that the burden should have been on law
enforcement, and that it was inappropriate to shift the burden to
covered entities. Other commenters argued that the proposal would have
given too much discretion to the record holders to withhold evidence
without having sufficient expertise or information on which to make such
judgments. At least one comment said that this aspect of the proposal
would have caused delay and expense in the detection and prevention of
health care fraud. The commenter believed that this delay and expense
could be prevented by shifting to law enforcement and health care
oversight the responsibility to determine whether standards have been
met.
At least one commenter recommended eliminating the three-part test for
disclosures of protected health information by small providers.
Some commenters argued that allowing covered entities to rely on law
enforcement representation that the three-part test has been met would
render the test meaningless.
*Response:* Because the statute does not bring law enforcement officials
within the scope of this regulation, the rule must rely on covered
entities to implement standards that protect individuals' privacy
interests, including the three-part test for disclosure pursuant to
administrative subpoenas. To reduce the burden on covered entities, we
do not require a covered entity to second-guess representations by law
enforcement officials that the three part test has been met. Rather, we
allow covered entities to disclose protected health information to law
enforcement when the subpoena or other administrative request indicates
on its face that the three-part test has been met, or where a separate
document so indicates. Because we allow such reliance, we do not believe
that it is necessary or appropriate to reduce privacy protections for
individuals who obtain care from small health care providers.
*Comment:* Some commenters ask for modification of the three-part test
to include a balancing of the interests of law enforcement and the
privacy of the individual, pointing to such provisions in the
Leahy-Kennedy bill.
*Response:* We agree with the comment that the balancing of these
interests is important in this circumstance. We designed the
regulation's three-part test to accomplish that result.
*Comment:* At least one commenter recommended that "relevant and
material" be changed to "relevant," because "relevant" is a term at the
core of civil discovery rules and is thus well understood, and because
it would be difficult to determine whether information is "material"
prior to seeing the documents. As an alternative, this commenter
suggested explaining what we meant by "material."
*Response:* Like the term "relevant," the term "material" is commonly
used in legal standards and well understood.
*Comment:* At least one commenter suggested deleting the phrase
"reasonably practical" from the second prong of the test, because, the
commenter believed, it was not clear who would decide what is
"reasonably practical" if the law enforcement agency and covered entity
disagreed.
*Response:* We allow covered entities to rely on a representation on the
face of the subpoena that the three-part test, including the "reasonably
practical" criteria, is met. If a covered entity believes that a
subpoena is not valid, it may challenge that subpoena in court just as
it may challenge any subpoena that today it believes is not lawfully
issued. This is true regardless of the specific test that a subpoena
must meet, and is not a function of the "reasonably practical" criteria.
*Comment:* Some commenters requested elimination of the third prong of
the test. One of these commenters suggested that the regulation should
specify when de-identified information could not be used. Another
recommended deleting the phrase "could not reasonably be used" from the
third prong of the test, because the commenter believed it was not clear
who would determine whether de-identified information "could reasonably
be used" if the law enforcement agency and covered entity disagreed.
*Response:* We cannot anticipate in regulation all the facts and
circumstances surrounding every law enforcement activity today, or in
the future as technologies change. Such a rigid approach could not
account for the variety of situations faced by covered entities and law
enforcement officials, and would become obsolete over time. Thus, we
believe it would not be appropriate to specify when de-identified
information can or cannot be used to meet legitimate law enforcement
needs.
In the final rule, we allow the covered entity to rely on a
representation on the face of the subpoena (or similar document) that
the three-part test, including the "could not reasonably be used"
criteria, is met. If a covered entity believes that a subpoena is not
valid, it may challenge that subpoena in court just as it may challenge
today any subpoena that it believes is not lawfully issued. This is true
regardless of the specific test that a subpoena must meet, and it is not
a function of the "could not reasonably be used" criteria.
***Comments Regarding Proposed § 164.510(f)(2), Limited Information for
Identifying Purposes***
*Comment:* A number of commenters recommended deletion of this
provision. These commenters argued that the legal process requirements
in proposed § 164.510(f)(1) should apply when protected health
information is disclosed for identification purposes. At least one
privacy group recommended that if the provision were not eliminated in
its entirety, "suspects" should be removed from the list of individuals
whose protected health information may be disclosed for identifying
purposes. Many commenters expressed concern that this provision would
allow
compilation of large data bases of health information that could be use
for purposes beyond those specified in this provision.
*Response:* We retain this provision in the final rule. We continue to
believe that identifying fugitives, material witnesses, missing persons,
and suspects is an important national priority and that allowing
disclosure of limited identifying information for this purpose is in the
public interest. Eliminating this provision -- or eliminating suspects
from the list of types of individuals about whom disclosure of protected
health information to law enforcement is allowed -- would impede law
enforcement agencies' ability to apprehend fugitives and suspects and to
identify material witnesses and missing persons. As a result, criminals
could remain at large for longer periods of time, thereby posing a
threat to public safety, and missing persons could be more difficult to
locate and thus endangered.
However, as described above and in the following paragraphs, we make
significant changes to this provision, to narrow the information that
may be disclosed and make clear the limited purpose of the provision.
For example, the proposed rule did not state explicitly whether covered
entities would have been allowed to initiate -- in the absence of a
request from law enforcement -- disclosure of protected health
information to law enforcement officials for the purpose of identifying
a suspect, fugitive, material witness or missing person. In the final
rule, we clarify that covered entities may disclose protected health
information for identifying purposes only in response to a request by a
law enforcement official or agency. A "request by a law enforcement
official or agency" is not limited to direct requests, but also includes
oral or written requests by individuals acting on behalf of a law
enforcement agency, such as a media organization broadcasting a request
for the public's assistance in identifying a suspect on the evening
news. It includes "Wanted" posters, public announcements, and similar
requests to the general public for assistance in locating suspects or
fugitives.
*Comment:* A few commenters recommended additional restrictions on
disclosure of protected health information for identification purposes.
For example, one commenter recommended that the provision should either
(1) require that the information to be disclosed for identifying
purposes be relevant and material to a legitimate law enforcement
inquiry and that the request be as specific and narrowly drawn as
possible; or (2) limit disclosures to circumstances in which (a) a crime
of violence has occurred and the perpetrator is at large, (b) the
perpetrator received an injury during the commission of the crime, (c)
the inquiry states with specificity the type of injury received and the
time period during which treatment would have been provided, and (d)
"probable cause" exists to believe the perpetrator received treatment
from the provider.
*Response:* We do not agree that these additional restrictions are
appropriate for disclosures of limited identifying information for
purposes of locating or identifying suspects, fugitives, material
witnesses or missing persons. The purpose of this provision is to permit
law enforcement to obtain limited time-sensitive information without the
process requirements applicable to disclosures for other purposes. Only
limited information may be disclosed under this provision, and
disclosure is permitted only in limited circumstances. We believe that
these safeguards are sufficient, and that creating additional
restrictions would undermine the purpose of the provision and that it
would hinder law enforcement's ability to obtain essential,
time-sensitive information.
*Comment:* A number of law enforcement agencies recommended that the
provision in the proposed rule be broadened to permit disclosure to law
enforcement officials for the purpose of "locating" as well as
"identifying" a suspect, fugitive, material witness or missing person.
*Response:* We agree with the comment and have changed the provision in
the final rule. We believe that locating suspects, fugitives, material
witnesses and missing persons is an important public policy priority,
and that it can be critical to identifying these individuals. Further,
efforts to locate suspects, fugitives, material witnesses, and missing
persons can be at least as time-sensitive as identifying such
individuals.
*Comment:* Several law enforcement agencies requested that the provision
be broadened to permit disclosure of additional pieces of identifying
information, such as ABO blood type and Rh factor, DNA information,
dental records, fingerprints, and/or body fluid and tissue typing,
samples and analysis. These commenters stated that additional
identifying information may be necessary to permit identification of
suspects, fugitives, material witnesses or missing persons. On the other
hand, privacy and consumer advocates, as well as many individuals, were
concerned that this section would allow all computerized medical records
to be stored in a large law enforcement data base that could be scanned
for matches of blood, DNA, or other individually identifiable
information.
*Response:* The final rule seeks to strike a balance in protecting
privacy and facilitating legitimate law enforcement inquiries.
Specifically, we have broadened the NPRM's list of data elements that
may be disclosed pursuant to this section, to include disclosure of ABO
blood type and rh factor for the purpose of identifying or locating
suspects, fugitives, material witnesses or missing persons. We agree
with the commenters that these pieces of information are important to
law enforcement investigations and are no more invasive of privacy than
the other pieces of protected health information that may be disclosed
under this provision.
However, as explained below, protected health information associated
with DNA and DNA analysis; dental records; or typing, samples or
analyses of tissues and bodily fluids other than blood (e.g., saliva)
cannot be disclosed for the location and identification purposes
described in this section. Allowing disclosure of this information is
not necessary to accomplish the purpose of this provision, and would be
substantially more intrusive into individuals' privacy. In addition, we
understand commenters' concern about the potential for such information
to be compiled in law enforcement data bases. Allowing disclosure of
such information could make individuals reluctant to seek care out of
fear that health information about them could be compiled in such a data
base.
*Comment:* Many commenters argued that proposed § 164.510(f)(2) should
be deleted because it would permit law enforcement to engage in "fishing
expeditions" or to create large data bases that could be searched for
suspects and others.
*Response:* Some of this fear may have stemmed from the inclusion of the
phrase "other distinguishing characteristic" -- which could be construed
broadly -- in the list of items that could have been disclosed pursuant
to this section. In the final rule, we delete the phrase "other
distinguishing characteristic" from the list of items that can be
disclosed pursuant to § 164.512(f)(2). In its place, we allow disclosure
of a description of distinguishing physical characteristics, such as
scars, tattoos, height, weight, gender, race, hair and eye color, and
the presence or absence of facial hair such as a beard or moustache. We
believe that such a change, in addition to the changes described in the
paragraph above, responds to commenters' concern that the NPRM would
have allowed creation of a government data base of personal identifying
information. Further, this modification provides additional guidance to
covered entities regarding the type of information that may be disclosed
under this provision.
*Comment:* At least one commenter recommended removing social security
numbers (SSNs) from the list of items that may be disclosed pursuant to
proposed § 164.510(f)(2). The commenter was concerned that including
SSNs in the (f)(2) list would cause law enforcement agencies to demand
that providers collect SSNs. In addition, the commenter was concerned
that allowing disclosure of SSNs could lead to theft of identity by
unscrupulous persons in policy departments and health care
organizations.
*Response:* We disagree. We believe that on balance, the potential
benefits from use of SSNs for this purpose outweigh the potential
privacy intrusion from such use of SSNs. For example, SSNs can help law
enforcement officials identify suspects are using aliases.
***Comments Regarding Proposed § 164.510(f)(3), Information About a
Victim of Crime or Abuse***
*Comment:* Some law enforcement organizations expressed concern that
proposed § 164.510(f)(3) could inhibit compliance with state mandatory
reporting laws.
*Response:* We recognize that the NPRM could have preempted such state
mandatory reporting laws, due to the combined impact of proposed §§
164.510(m) and 164.510(f). As explained in detail in § 164.512(a) above,
we did not intend that result, and we modify the final rule to make
clear that this rule does not preempt state mandatory reporting laws.
*Comment:* Many commenters, including consumer and provider groups,
expressed concern that allowing covered entities to disclose protected
health information without authorization to law enforcement regarding
victims of crime, abuse, and other harm could endanger victims,
particularly victims of domestic violence, who could suffer further
abuse if their abuser learned that the information had been reported.
Provider groups also expressed concern about undermining
provider-patient relationships. Some law enforcement representatives
noted that in many cases, health care providers' voluntary reports of
abuse or harm can be critical for the successful prosecution of violent
crime. They argued, that by precluding providers from voluntarily
reporting to law enforcement evidence of potential abuse, the proposed
rule could make it more difficult to apprehend and prosecute criminals.
*Response:* We recognize the need for heightened sensitivity to the
danger facing victims of crime in general, and victims of domestic abuse
or neglect in particular. As discussed above, the final rule includes a
new section (§ 164.512(c)) establishing strict conditions for disclosure
of protected health information about victims of abuse, neglect, and
domestic violence.
Victims of crime other than abuse, neglect, or domestic violence can
also be placed in further danger by disclosure of protected health
information relating to the crime. In § 164.512(f)(3) of the final rule,
we establish conditions for disclosure of protected health information
in these circumstances, and we make significant modifications to the
proposed rule's provision for such disclosures. Under the final rule,
unless a state or other government authority has enacted a law requiring
disclosure of protected health information about a victim to law
enforcement officials, in most instances, covered entities must obtain
the victim's agreement before disclosing such information to law
enforcement officials. This requirement gives victims control over
decision making about their health information where their safety could
be at issue, helps promote trust between patients and providers, and is
consistent with health care providers' ethical obligation to seek
patient authorization whenever possible before disclosing protected
health information.
At the same time, the rule strikes a balance between protecting victims
and providing law enforcement access to information about potential
crimes that cause harm to individuals, by waiving the requirement for
agreement in two situations. In allowing covered entities to disclose
protected health information about a crime victim pursuant to a state or
other mandatory reporting law, we defer to other governmental bodies'
judgments on when certain public policy objectives are important enough
to warrant mandatory disclosure of protected health information to law
enforcement. While some mandatory reporting laws are written more
broadly than others, we believe that it is neither appropriate nor
practicable to distinguish in federal regulations between what we
consider overly broad and sufficiently focused mandatory reporting laws.
The final rule waives the requirement for agreement if the covered
entity is unable to obtain the individual's agreement due to incapacity
or other emergency circumstance, and (1) the law enforcement official
represents that the information is needed to determine whether a
violation of law by a person other than the victim has occurred and the
information is not intended to be used against the victim; (2) the law
enforcement official represents that immediate law enforcement activity
that depends on the disclosure would be materially and adversely
affected by waiting until the individual is able to agree to the
disclosure; and (3) the covered entity determines, in the exercise of
professional judgment, that the disclosure is in the individual's best
interests. By allowing covered entities, in the exercise of professional
judgment, to determine whether such disclosures are in the individual's
best interests, the final rule recognizes the importance of the
provider-patient relationship.
In addition, the final rule allows covered entities to initiate
disclosures of protected health information about victims without the
victim's permission to law enforcement officials only if such disclosure
is required under a state mandatory reporting law. In other
circumstances, plans and providers may disclose protected health
information only in response to a request from a law enforcement
official. We believe that such an approach recognizes the importance of
promoting trust between victims and their health care providers. If
providers could initiate reports of victim information to law
enforcement officials absent a legal reporting mandate, victims may
avoid give their providers health information that could facilitate
their treatment, or they may avoid seeking treatment completely.
*Comment:* Many commenters believed that access to medical records
pursuant to this provision should occur only after judicial review.
Others believed that it should occur only with patient consent or after
notifying the patient of the disclosure to law enforcement. Similarly,
some commenters said that the minimum necessary standard should apply to
this provision, and they recommended restrictions on law enforcement
agencies' re-use of the information.
*Response:* As discussed above, the final rule generally requires
individual agreement as a condition for disclosure of a victim's health
information; this requirement provides greater privacy protection and
individual control than would a requirement for judicial review. We also
discuss above the situations in which this requirement for agreement may
be waived, and why that is appropriate. The requirement that covered
entities disclose the minimum necessary protected health information
consistent with the purpose of the disclosure applies to disclosures of
protected health information about victims to law enforcement, unless
the disclosure is required by law. (See § 164.514 for more detail on the
requirements for minimum necessary use and disclosure of protected
health information.) As described above, HIPAA does not provide
statutory authority for HHS to regulate law enforcement agencies' re-use
of protected health information that they obtain pursuant to this rule.
*Comment:* A few commenters expressed concern that the NPRM would not
have required law enforcement agencies' requests for protected health
information about victims to be in writing. They believed that written
requests could promote clarity in law enforcement requests, as well as
greater accountability among law enforcement officials seeking
information.
*Response:* We do not impose this requirement in the final rule. We
believe that such a requirement would not provide significant new
protection for victims and would unduly impede the completion of
legitimate law enforcement investigations.
*Comment:* A provider group was concerned that it would be difficult for
covered entities to evaluate law enforcement officials' claims that
information is needed and that law enforcement activity may be
necessary. Some comments from providers and individuals expressed
concern that the proposed rule would have provided open-ended access by
law enforcement to victims' medical records because of this difficulty
in evaluating law enforcement claims of their need for the information.
*Response:* We modify the NPRM in several ways that reduce covered
entities' decisionmaking burdens. The final rule clarifies that covered
entities may disclose protected health information about a victim of
crime where a report is required by state or other law, and it requires
the victim's agreement for disclosure in most other instances. The
covered entity must make the decision whether to disclose only in
limited circumstances: when there is no mandatory reporting law; or when
the victim is unable to provide agreement and the law enforcement
official represents that: the protected health information is needed to
determine whether a violation of law by a person other than the victim
has occurred, that the information will not be used against the victim,
and that immediate law enforcement activity that depends on such
information would be materially and adversely affected by waiting until
the individual is able to agree to the disclosure. In these
circumstances, we believe it is appropriate to rely on the covered
entity, in the exercise of professional judgment, to determine whether
the disclosure is in the individual's best interests. Other sections of
this rule allow covered entities to reasonably rely on certain
representations by law enforcement officials (see § 164.514, regarding
verification,) and require disclosure of the minimum necessary protected
health information for this purpose. Together, these provisions do not
allow open-ended access or place undue responsibility on providers.
***Comments Regarding Proposed § 164.510(f)(4), Intelligence and
National Security Activities***
In the final rule, we recognize that disclosures for intelligence and
national security activities do not always involve law enforcement.
Therefore, we delete the provisions of proposed § 164.510(f)(4), and we
address disclosures for intelligence and national security activities in
§ 164.512(k), on uses and disclosures for specialized government
functions. Comments and responses on these issues are included below, in
the comments for that section.
***Comments Regarding Proposed § 164.510(f)(5), Health Care Fraud,
Crimes on the Premises, and Crimes Witnessed by the Covered Entity's
Workforce***
*Comment:* Many commenters noted that proposed § 164.510(f)(5)(i), which
covered disclosures for investigations and prosecutions of health care
fraud, overlapped with proposed § 164.510(c) which covered disclosures
for health oversight activities.
*Response:* As discussed more fully in § 164.512(d) of this preamble,
above, we agree that proposed § 164.510(f)(5)(i) created confusion
because all disclosures covered by that provision were already permitted
under proposed § 164.510(c) without prior process. In the final rule,
therefore, we delete proposed § 164.510(f)(5)(i).
*Comment:* One commenter was concerned the proposed provision would not
have allowed an emergency room physician to report evidence of abuse
when the suspected abuse had not been committed on the covered entity's
premises.
*Response:* Crimes on the premises are only one type of crime that
providers may report to law enforcement officials. The rules for
reporting evidence of abuse to law enforcement officials are described
in § 164.512(c) of the rule, and described in detail in § 164.512(c) of
the preamble. An emergency room physician may report evidence of abuse
if the conditions in § 164.512(c) are met, regardless of where the abuse
occurred.
*Comment:* One commenter argued that covered entities should be
permitted to disclose information that "indicates the potential
existence" of evidence, not just information that "constitutes evidence"
of crimes on the premises or crimes witnessed by a member of the covered
entity's workforce.
*Response:* We agree that covered entities should not be required to
guess correctly whether information will be admitted to court as
evidence. For this reason, we include a good-faith standard in this
provision. Covered entities may disclose information that it believes in
good faith constitutes evidence of a crime on the premises. If the
covered entity discloses protected health information in good faith but
is wrong in its belief that the information is evidence of a violation
of law, the covered entity will not be subject to sanction under this
regulation.
**Section 164.512(g)---Uses and Disclosures about Decedents**
***Coroners and Medical Examiners***
*Comment:* We received several comments, for example, from state and
county health departments, a private foundation, and a provider
organization, in support of the NPRM provision allowing disclosure
without authorization to coroners and medical examiners.
*Response:* The final rule retains the NPRM's basic approach to
disclosure of coroners and medical examiners. It allows covered entities
to disclose protected health information without authorization to
coroners and medical examiners, for identification of a deceased person,
determining cause of death, or other duties authorized by law.
*Comment:* In the preamble to the NPRM, we said we had considered but
rejected the option of requiring covered entities to redact from
individuals' medical records any information identifying other persons
before disclosing the record to a coroner or medical examiner. We
solicited comment on whether health care providers routinely identify
other persons specifically in an individual's medical record and if so,
whether in the final rule we should require health care providers to
redact information about the other person before providing it to a
coroner or medical examiner.
A few commenters said that medical records typically do not include
information about persons other than the patient. One commenter said
that patient medical records occasionally reference others such as
relatives or employers. These commenters recommended requiring redaction
of such information in any report sent to a coroner or medical examiner.
On the other hand, other commenters said that redaction should not be
required. These commenters generally based their recommendation on the
burden and delay associated with redaction. In addition to citing the
complexity and time involved in redaction of medical records provided to
coroners, one commenter said that health plans and covered health care
providers were not trained to determine the identifiable information
necessary for coroners and medical examiners to do thorough
investigations. Another commenter said that redaction should not be
required because coroners and medical examiners needed some additional
family information to determine what would be done with the deceased
after their post-mortem investigation is completed.
*Response:* We recognize the burden associated with redacting medical
records to remove the names of persons other than the patient. In
addition, as stated in the preamble to the NPRM, we recognize that there
is a limited time period after death within which an autopsy must be
conducted. We believe that the delay associated with this burden could
make it impossible to conduct a post-mortem investigation within the
required time frame. In addition, we agree that health plans and covered
health care providers may lack the training necessary to determine the
identifiable information necessary for coroners and medical examiners to
do thorough investigations. Thus, in the final rule, we do not require
health plans or covered providers to redact information about persons
other than the patient who may be identified in a patient's medical
record before disclosing the record to a coroner or medical examiner.
*Comment:* One commenter said that medical records sent to coroners and
medical examiners were considered their work product and thus were not
released from their offices to anyone else. The commenter recommended
that HHS establish regulations on how to dispose of medical records and
that we create a "no re-release" statement to ensure that individual
privacy is maintained without compromising coroners' or medical
examiners' access to protected health information. The organization said
that such a policy should apply regardless of whether the investigation
was civil or criminal.
*Response:* HIPAA does not provide HHS with statutory authority to
regulate coroners' or medical examiners' re-use or re-disclosure of
protected health information unless the coroner or medical examiner is
also a covered entity. However, we consistently have supported
comprehensive privacy legislation to regulate disclosure and use of
individually identifiable health information by all entities that have
access to it.
***Funeral Directors***
*Comment:* One commenter recommended modifying the proposed rule to
allow disclosure without authorization to funeral directors. To
accomplish this change, the commenter suggested either: (1) adding
another subsection to proposed § 164.510 of the NPRM, to allow
disclosure without authorization to funeral directors as needed to make
arrangements for funeral services and for disposition of a deceased
person's remains; or (2) revising proposed § 164.510(e) to allow
disclosure of protected health information to both coroners and funeral
directors. According to this commenter, funeral directors often need
certain protected health information for the embalming process, because
a person's medical condition may affect the way in which embalming is
performed. For example, the commenter noted, funeral directors
increasingly receive bodies after organ and tissue donation, which has
implications for funeral home staff duties associated with embalming.
*Response:* We agree with the commenter. In the final rule, we permit
covered entities to disclose protected health information to funeral
directors, consistent with applicable law, as necessary to carry out
their duties with respect to a decedent. When necessary for funeral
directors to carry out their duties, covered entities may disclose
protected health information prior to and in reasonable anticipation of
the individual's death.
*Comment:* One commenter recommended clarifying in the final rule that
it does not restrict law enforcement agencies' release of medical
information that many state records laws require to be reported, for
example, as part of autopsy reports. The commenter recommended stating
that law enforcement officials may independently gather medical
information, that such information would not be covered by these rules,
and that it would continue to be covered under applicable state and
federal access laws.
*Response:* HIPAA does not give HHS statutory authority to regulate law
enforcement officials' use or disclosure of protected health
information. As stated elsewhere, we continue to support enactment of
comprehensive privacy legislation to cover disclosure and use of all
individually identifiable health information.
*Comment:* One commenter recommended prohibiting health plans and
covered health care providers from disclosing psychotherapy notes to
coroners or medical examiners.
*Response:* We disagree with the commenter who asserted that
psychotherapy notes should only be used by or disclosed to coroners and
medical examiners with authorization. Psychotherapy notes are sometimes
needed by coroners and medical examiners to determine cause of death,
such as in cases where suicide is suspected as the cause of death. We
understand that several states require the disclosure of protected
health information, including psychotherapy notes, to medical examiners
and coroners. However, in the absence of a state law requiring such
disclosure, we do not intend to prohibit coroners or medical examiners
from obtaining the protected health information necessary to determine
an individual's cause of death.
**Section 164.512(h)---Uses and Disclosures for Organ Donation and
Transplantation Purposes**
*Comment:* Commenters noted that under the organ donation system,
information about a patient is disclosed before seeking consent for
donation from families. These commenters offered suggestions for
ensuring that the system could continue to operate without consent for
information sharing with organ procurement organizations and tissue
banks. Commenters suggested that organ and tissue procurement
organizations should be "covered entities" or that the procurement of
organs and tissues be included in the definition of health care
operations or treatment, or in the definition of emergency
circumstances.
*Response:* We agree that organ and tissue donation is a special
situation due to the need to protect potential donors' families from the
stress of considering whether their loved one should be a donor before a
determination has been made that donation would be medically suitable.
Rather than list the entities that are "covered entities" or modify the
definitions of health care operations and treatment or emergency
circumstances to explicitly include organ procurement organizations and
tissue banks, we have modified § 164.512 to permit covered entities to
use or disclose protected health information to organ procurement
organizations or other entities engaged in the procurement, banking, or
transplantation of cadaveric organs, eyes, or tissues.
*Comment:* Commenters asked that the rule clarify that organ procurement
organizations are health care providers but not business partners of the
hospitals.
*Response:* We agree that organ procurement organizations and tissue
banks are generally not business associates of hospitals.
**Disclosures and Uses for Government Health Data Systems**
*Comment:* We received a number of comments supporting the exception for
disclosure of protected health information to government health data
systems. Some supporters stated a general belief that the uses of such
information were important to improve and protect the health of the
public. Commenters said that state agencies used the information from
government health data systems to contribute to the improvement of the
health care system by helping prevent fraud and abuse and helping
improve health care quality, efficiency, and cost-effectiveness.
Commenters asserted that state agencies take action to ensure that data
they release based on these data systems do not identify individuals
We also received a large volume of comments opposed to the exception for
use and disclosure of protected health information for government health
data systems. Many commenters expressed general concern that the
provision threatened their privacy, and many believed that their health
information would be subject to abuse by government employees.
Commenters expressed concern that the provision would facilitate
collection of protected health information in one large, centralized
government health database that could threaten privacy. Others argued
that the proposed rule would facilitate law enforcement access to
protected health information and could, in fact, become a database for
law enforcement use.
Many commenters asserted that this provision would make individuals
concerned about confiding in their health care providers. Some
commenters argued that the government should not be allowed to collect
individually identifiable health information without patient consent,
and that the government could use de-identified data to perform the
public policy analyses. Many individual commenters said that HHS lacked
statutory and Constitutional authority to give the government access and
control of their medical records without consent.
Many commenters believed that the NPRM language on government health
data systems was too broad and would allow virtually any government
collection of data to be covered. They argued that the government health
data system exception was unnecessary because there were other
provisions in the proposed rules providing sufficient authority for
government agencies to obtain the information they need.
Some commenters were concerned that the NPRM's government health data
system provisions would allow disclosure of protected health information
for purposes unrelated to health care. These commenters recommended
narrowing the provision to allow disclosure of protected health
information without consent to government health data systems in support
of health care-related policy, planning, regulatory, or management
functions. Others recommended narrowing the exception to allow use and
disclosure of protected health information for government health
databases only when a specific statute or regulation has authorized
collection of protected health information for a specific purpose.
*Response:* We agree with the commenters who suggested that the proposed
provision that would have permitted disclosures to government health
data bases was overly broad, and we remove it from the final rule.
We reviewed the important purposes identified in the comments for
government access to protected health information, and believe that the
disclosures of protected health information that should appropriately be
made without individuals' authorization can be achieved through the
other disclosures provided for in the final rule, including provisions
permitting covered entities to disclose information (subject to certain
limitations) to government agencies for public health, research, health
oversight, law enforcement, and otherwise as required by law. For
example, the final rule continues to allow a covered entity to disclose
protected health information without authorization to a public health
authority to monitor trends in the spread of infectious disease,
morbidity, and mortality. Under the rule's health oversight provision,
covered entities can continue to disclose protected health information
to public agencies for purposes such as analyzing the cost and quality
of services provided by covered entities; evaluating the effectiveness
of federal, state, and local public programs; examining trends in health
insurance coverage of the population; and analyzing variations in access
to health coverage among various segments of the population. We believe
that it is better to remove the proposed provision for government health
data systems generally and to rely on other, more narrowly tailored
provisions in the rule to authorize appropriate disclosures to
government agencies.
*Comment:* Some provider groups, private companies, and industry
organizations recommended expanding the exception for government health
data systems to include data collected by private entities. These
commenters said that such an expansion would be justified, because
private entities often perform the same functions as public agencies
collecting health data.
*Response:* We eliminate the exception for government health data
systems because it was over broad and the uses and disclosures we were
trying to permit are permitted by other provisions. We note that private
organizations may use or disclose protected health information pursuant
to multiple provisions of the rule.
*Comment:* One commenter recommended clarifying in the final rule that
the government health data system provisions apply to: (1) manufacturers
providing data to HCFA and its contractors to help the agency make
reimbursement and related decisions; and to (2) third- party payors that
must provide data collected by device manufacturers to HCFA to help the
agency make reimbursement and related decisions.
*Response:* The decision to eliminate the general provision permitting
disclosures to government health data systems makes this issue moot with
respect to such disclosures. We note that the information used by
manufacturers to support coverage determinations often is gathered
pursuant to patient authorization (as part of informed consent for
research) or as an approved research project. There also are many cases
in which information can be de-identified before it is disclosed. Where
HCFA hires a contractor to collect such protected health information,
the contractor may do so under HCFA's authority, subject to the business
associate provisions of this rule.
*Comment:* One commenter recommended stating in the final rule that
de-identified information from government health data systems can be
disclosed to other entities.
*Response:* HHS does not have the authority to regulate re-use or
re-disclosure of information by agencies or institutions that are not
covered entities under the rule. However, we support the policies and
procedures that public agencies already have implemented to de-identify
any information that they redisclose, and we encourage the continuation
of these activities.
**Disclosures for Payment Processes**
Proposed § 164.510(j) of the NPRM would have allowed disclosure of
protected health information without authorization for banking and
payment processes. In the final rule, we eliminate this provision.
Disclosures that would have been allowed under it, as well as comments
received on proposed § 164.510(j), are addressed under § 164.501 of the
final rule, under the definition of "payment."
**Section 164.512(i)---Uses and Disclosures for Research Purposes**
***Documentation Requirements of IRB or Privacy Board Approval of
Waiver***
*Comment:* A number of commenters argued that the proposed research
requirements of § 164.510(j) exceeded the Secretary's authority under
section 246(c) of HIPAA. In particular, several commenters argued that
the Department was proposing to extend the Common Rule and the use of
the IRB or privacy boards beyond federally-funded research projects,
without the necessary authority under HIPAA to do so. One commenter
stated that, "Section 246(c) of HIPAA requires the Secretary to issue a
regulation setting privacy standards for individually identifiable
health information transmitted in connection with the transactions
described in section 1173(a)," and thus concluded that the disclosure of
health information to researchers is not covered. Some of these
commenters also argued that the documentation requirements of proposed §
164.510(j), did not shield the NPRM from having the effect of regulating
research by placing the onus on covered health care providers to seek
documentation that certain standards had been satisfied before providing
protected health information to researchers. These commenters argued
that the proposed rule had the clear and intended effect of directly
regulating researchers who wish to obtain protected health information
from a covered entity.
*Response:* As discussed above, we do not agree with commenters that the
Secretary's authority is limited to individually identifiable health
information transmitted in connection with the transactions described in
section 1173(a) of HIPAA. We also disagree that the proposed research
documentation requirements would have constituted the unauthorized
regulation of researchers. The proposed requirements established
conditions for the use of protected health information by covered
entities for research and the disclosure of protected health information
by covered entities to researchers. HIPAA authorizes the Secretary to
regulate such uses and disclosures, and the final rule retains
documentation requirements similar to those proposed.
*Comment*: Several commenters believed that the NPRM was proposing
either directly or indirectly to modify the Common Rule and, therefore,
stated that such modification was beyond the Secretary's authority under
HIPAA. Many of these commenters arrived at this conclusion because the
waiver of authorization criteria proposed in § 164.510(j) differed from
the Common Rule's criteria for the waiver of informed consent (Common
Rule, § \_\_\_.116(d)).
*Response:* We do not agree that the proposed provision relating to
research would have modified the Common Rule. The provisions that we
proposed and provisions that we include in the final rule place
conditions that must be met before a covered entity may use or disclose
protected health information. Those conditions are in addition to any
conditions required of research entities under the Common Rule. Covered
entities will certainly be subject to laws and regulations in addition
to the rule, but the rule does not require compliance with these other
laws or regulations. For covered health care providers and health plans
that are subject to both the final rule and the Common Rule, both sets
of regulations will need to be followed.
*Comment:* A few commenters suggested that the Common Rule should be
extended to all research, regardless of funding source.
*Response:* We generally agree with the commenters on the need to
provide protections to all human subjects research, regardless of
funding source. HIPAA, however, did not provide the Department with
authority to extend the Common Rule beyond its current purview. For
research that relies on the use or disclosure of protected health
information by covered entities without authorization, the final rule
applies the Common Rule's principles for protecting research subjects
by, in most instances, requiring documentation of independent board
review, and a finding that specified criteria designed to protect the
privacy of prospective research subjects have been met.
*Comment*: A large number of commenters agreed that the research use and
disclosure of protected health information should not require
authorization. Of these commenters, many supported the proposed rule's
approach to research uses and disclosures without authorization,
including many from health care provider organizations, the mental
health community, and members of Congress. Others, while they agreed
that the research use and disclosure should not require authorization
disagreed with the NPRM's approach and proposed alternative models.
The commenters who supported the NPRM's approach to permitting
researchers access to protected health information without authorization
argued that it was appropriate to apply "Common Rule-like" provisions to
privately funded research. In addition, several commenters explicitly
argued that the option to use a privacy board, in lieu of an IRB, must
be maintained because requiring IRB review to include all aspects of
patient privacy could diffuse focus and significantly compromise an
IRB's ability to execute its primary patient protection role.
Furthermore, several commenters believed that privacy board review
should be permitted, but wanted equal oversight and accountability for
privacy boards and IRBs.
Many other commenters agreed that the research use and disclosure should
not require authorization, but disagreed with the proposed rule's
approach and proposed alternative models. Several of these commenters
argued that the final rule should eliminate the option for privacy board
review and that all research to be subject to IRB review. These
commenters stated that having separate and unequal systems to approve
research based on its funding source would complicate compliance and go
against the spirit of the regulations. Several of these commenters, many
from patient and provider organizations, opposed the permitted use of
privacy boards to review research studies and instead argued that IRB
review should be required for all studies involving the use or
disclosure of protected health information. These commenters argued that
although privacy board requirements would be similar, they are not
equitable; for example, only three of the Common Rule's six requirements
for the membership of IRBs were proposed to be required for the
membership on privacy boards, and there was no proposed requirement for
annual review of ongoing research studies that used protected health
information. Several commenters were concerned that the proposed option
to obtain documentation of privacy board review, in lieu of IRB review,
would perpetuate the divide in the oversight of federally-funded versus
publically-funded research, rather than eliminate the differential
oversight of publically- and privately-funded research, with the former
still being held to a stricter standard. Some of these commenters argued
that these unequal protections would be especially apparent for the
disclosure of research with authorization, since under the Common Rule,
IRB review of human subjects studies is required, regardless of the
subject's consent, before the study may be conducted.
*Response:* Although we share the concern raised by commenters that the
option for the documentation of privacy board approval for an alteration
or waiver of authorization may perpetuate the unequal mechanisms of
protecting the privacy of human research subjects for federally-funded
versus publically-funded research, the final rule is limited by HIPAA to
addressing only the use and disclosure of protected health information
by covered entities, not the protection of human research subjects more
generally. Therefore, the rule cannot standardize human subjects
protections throughout the country. Given the limited scope of the final
rule with regard to research, the Department believes that the option to
obtain documentation of privacy board approval for an alteration or
waiver of authorization in lieu of IRB approval provides covered
entities with needed flexibility. Therefore, in the final rule we have
retained the option for covered entities to rely on documentation of
privacy board approval that specified criteria have been met.
We disagree with the rationale suggested by commenters who argued that
the option for privacy board review must be maintained because requiring
IRB review to include all aspects of patient privacy could diffuse focus
and significantly compromise an IRB's ability to execute its primary
patient protection role. For research that involves the use of
individually identifiable health information, assessing the risk to the
privacy of research subjects is currently one of the key risks that must
be assessed and addressed by IRBs. In fact, we expect that it will be
appropriate for many research organizations that have existing IRBs to
rely on these IRBs to meet the documentation requirements of §
164.512(i).
*Comment:* One health care provider organization recommended that the
IRB or privacy board mechanism of review should be applied to
non-research uses and disclosures.
*Response:* We disagree. Imposing documentation of privacy board
approval for other public policy uses and disclosures permitted by §
164.512 would result in undue delays in the use or disclosure of
protected health information that could harm individuals and the public.
For example, requiring that covered health care providers obtain
third-party review before permitting them to alert a public health
authority that an individual was infected with a serious communicable
disease could cause delay appropriate intervention by a public health
authority and could present a serious threat to the health of many
individuals.
*Comment*: A number of commenters, including several members of
Congress, argued that since the research provisions in proposed §
164.510(j) were modeled on the existing system of human subjects
protections, they were inadequate and would shatter public trust if
implemented. Similarly, some commenters, asserted that IRBs are not
accustomed to reviewing and approving utilization reviews, outcomes
research, or disease management programs and, therefore, IRB review may
not be an effective tool for protecting patient privacy in connection
with these activities. Some of these commenters noted that proposed §
164.510(j) would exacerbate the problems inherent in the current federal
human subjects protection system especially in light of the recent GAO
reports that indicate the IRB system is already over-extended.
Furthermore, a few commenters argued that the Common Rule's requirements
may be suited for interventional research involving human subjects, but
is ill suited to the archival and health services research typically
performed using medical records without authorization. Therefore, these
commenters concluded that extending "Common Rule-like" provisions to the
private sector would be inadequate to protect human subjects and would
result in significant and unnecessary cost increases.
*Response:* While the vast majority of government-supported and
regulated research adheres to strict protocols and the highest ethical
standards, we agree that the federal system of human subjects
protections can and must be strengthened. To work toward this goal, on
May 23, the Secretary announced several additional initiatives to
enhance the safety of subjects in clinical trials, strengthen government
oversight of medical research, and reinforce clinical researchers'
responsibility to follow federal guidelines. As part of this initiative,
the National Institutes of Health have undertaken an aggressive effort
to ensure IRB members and IRB staff receive appropriate training in
bioethics and other issues related to research involving human subjects,
including research that involves the use of individually identifiable
health information. With these added improvements, we believe that the
federal system of human subjects protections continues to be a good
model to protect the privacy of individually identifiable health
information that is used for research purposes. This model of privacy
protection is also consistent with the recent recommendations of both
the Institute of Medicine in their report entitled, "Protecting Data
Privacy in Health Services Research," and the Joint Commission on
Accreditation of Healthcare Organizations and the National Committee for
Quality Assurance in their report entitled, "Protecting Personal Health
Information: A Framework for Meeting the Challenges in a Managed Care
Environment." Both of these reports similarly concluded that health
services research that involves the use of individually identifiable
health information should undergo IRB review or review by another board
with sufficient expertise in privacy and confidentiality protection.
Furthermore, it is important to recognize that the Common Rule applies
not only to interventional research, but also to research that uses
individually identifiable health information, including archival
research and health services research. The National Bioethics Advisory
Commission (NBAC) is currently developing a report on the federal
oversight of human subjects research, which is expected to address the
unique issues raised by non-interventional human subjects research. The
Department looks forward to receiving NBAC's report, and carefully
considering the Commission's recommendations. This final rule is the
first step in enhancing patients' privacy and we will propose
modifications to the rule if changes are warranted by the Commission's
findings and recommendations.
*Comment:* Many commenters argued that the proposed research provision
would have a chilling affect on the willingness of health plans and
covered providers to participate in research because of the criminal and
civil penalties that could be imposed for failing to meet the
requirements that would have been required by proposed § 164.510(j).
Some of these commenters cautioned, that over time, research could be
severely hindered if covered entities choose not to disclose protected
health information to researchers. In addition, one commenter
recommended that a more reasonable approach would be to require IRB or
privacy board approval only if the results of the research were to be
broadly published. Another commenter expressed concern that the privacy
rule could influence IRBs or privacy boards to refuse to recognize the
validity of decisions by other IRBs or privacy boards and specifically
recommended that the privacy rule include a preamble statement that: (1)
the "risk" balancing consider only the risk to the patient, not the risk
to the institution, and (2) add a phrase that the decision by the
initial IRB or privacy board to approve the research shall be given
deference by other IRBs or privacy boards. This commenter also
recommended that to determine whether IRBs or privacy boards were giving
such deference to prior IRB or privacy board review, HHS should monitor
the disapproval rate by IRB or privacy boards conducting secondary
reviews.
*Response:* As the largest federal sponsor of medical research, we
understand the important role of research in improving our Nation's
health. However, the benefits of research must be balanced against the
risks, including the privacy risks, for those who participate in
research. An individual's rights and welfare must never be sacrificed
for scientific or medical progress. We believe that the requirements for
the use and disclosure of protected health information for research
without authorization provides an appropriate balance. We understand
that some covered health care providers and health plans may conclude
that the rule's documentation requirements for research uses and
disclosures are too burdensome.
We rejected the recommendation that documentation of IRB or privacy
board approval of the waiver of authorization should only be required if
the research were to be "broadly published." Research findings that are
published in de-identified form have little influence on the privacy
interests of individuals. We believe that it is the use or disclosure of
individually identifiable health information to a researcher that poses
the greater risk to individuals' privacy, not publication of
de-identified information.
We agree with the commenters that IRB or privacy board review should
address the privacy interests of individuals and not institutions. This
provision is intended to protect individuals from unnecessary uses and
disclosures of their health information and does not address
institutional privacy.
We disagree with the comment that documentation of IRB or privacy board
approval of the waiver of authorization should be given deference by
other IRBs or privacy boards conducting secondary reviews. We do not
believe that it is appropriate to restrict the deliberations or
judgments of privacy boards, nor do we have the authority under this
rule to instruct IRBs on this issue. Instead, we reiterate that all
disclosures for research purposes under § 164.512(i) are voluntary, and
that institutions may choose to impose more stringent requirements for
any use and disclosure permitted under § 164.512.
*Comment:* Some commenters were concerned about the implications of
proposed § 164.510(j) on multi-center research. These commenters argued
that for multi-center research, researchers may require protected health
information from multiple covered entities, each of whom may have
different requirements for the documentation of IRB or privacy board
review. Therefore, there was concern that documentation that may suffice
for one covered entity, may not for another, thereby hindering
multi-center research.
*Response:* Since § 164.512(i) establishes minimum documentation
standards for covered health care providers and health plans using or
disclosing protected health information for research purposes, we
understand that some covered providers and health plans may choose to
require additional documentation requirements for researchers. We note,
however, that nothing in the final rule would preclude a covered health
care provider or health plan from developing the consistent
documentation requirements provided they meet the requirements of §
164.512(i).
*Comment:* One commenter who was also concerned that the minimum
necessary requirements of proposed § 164.506(b) would negatively affect
multi-center research because covered entities participating in
multi-site research studies would no longer be permitted to rely upon
the consent form approved by a central IRB, and nor would participating
entities be permitted to report data to the researcher using the case
report form approved by the central IRB to guide what data points to
include. This commenter noted that the requirement that each site would
need to undertake a separate minimum necessary review for each
disclosure would erect significant barriers to the conduct of research
and may compromise the integrity and validity of data combined from
multiple sites. This commenter recommended that the Secretary absolve a
covered entity of the responsibility to make its own individual minimum
necessary determinations if the entity is disclosing information
pursuant to an IRB or privacy board-approved protocol.
*Response:* The minimum necessary requirements in the final rule have
been revised to permit covered entities to rely on the documentation of
IRB or privacy board approval as meeting the minimum necessary
requirements of § 164.514. However, we anticipate that much multi-site
research, such as multi-site clinical trials, will be conducted with
patients' informed consent as required by the Common Rule and FDA's
protection of human subjects regulations, and that patients'
authorization will also be sought for the use or disclosure of protected
health information for such studies. Therefore, it should be noted that
the minimum necessary requirements do not apply for uses or disclosures
made with an authorization. In addition, the final rule allows a covered
health care provider or health plan to use or disclose protected health
information pursuant to an authorization that was approved by a single
IRB or privacy board, provided the authorization met the requirements of
§ 164.508. The final rule does not, however, require IRB or privacy
board review for the use or disclosure of protected health information
for research conducted with individuals' authorization.
*Comment:* Some commenters believed that proposed § 164.510(j) would
have required documentation of both IRB and privacy board review before
a covered entity would be permitted to disclose protected health
information for research purposes without an individual's authorization.
*Response:* This is incorrect. Section 164.512(i)(1)(i) of the final
rule requires documentation of alteration or waiver approval by either
an IRB or a privacy board.
*Comment:* Some commenters believed that the proposed rule would have
required that patients be notified whenever protected health information
about themselves was disclosed for research purposes.
*Response:* This is incorrect. Covered entities are not required to
inform individuals that protected health information about themselves
has been disclosed for research purposes. However, as required in §
164.520 of the final rule, the covered entity must include research
disclosures in their notice of information practices. In addition, as
required by § 164.528 of the rule, covered health care providers and
health plans must provide individuals, upon request, with an accounting
of disclosures made of protected health information about the
individual.
*Comment:* One commenter recommended that IRB and privacy boards also be
required to be accredited.
*Response:* While we agree that the issue of accrediting IRBs and
privacy boards deserves further consideration, we believe it is
premature to require covered entities to ensure that the IRB or privacy
board that approves an alteration or waiver of authorization is
accredited. Currently, there are no accepted accreditation standards for
IRBs or privacy boards, nor a designated accreditation body. Recognizing
the need for and value of greater uniformity and public accountability
in the review and approval process, HHS, with support from the Office of
Human Research Protection, National Institutes of Health, Food and Drug
Administration, Centers for Disease Control and Prevention, and Agency
for Health Care Research and Quality, has engaged the Institute of
Medicine to recommend uniform performance resource-based standards for
private, voluntary accreditation of IRBs. This effort will draw upon
work already undertaken by major national organizations to develop and
test these standards by the spring of 2001, followed by initiation of a
formal accreditation process before the end of next year. Once the
Department has received the Institute of Medicine's recommended
accreditation standards and process for IRBs, we plan to consider
whether this accreditation model would also be applicable to privacy
boards.
*Comment:* A few commenters also noted that if both an IRB and a privacy
board reviewed a research study and came to conflicting decisions,
proposed § 164.510(j) was unclear about which board's decision would
prevail.
*Response:* The final rule does not stipulate which board's decision
would prevail if an IRB and a privacy board came to conflicting
decisions. The final rule requires covered entities to obtain
documentation that one IRB or privacy board has approved of the
alteration or waiver of authorization. The covered entity, however, has
discretion to request information about the findings of all IRBs and/or
privacy boards that have reviewed a research proposal. We strongly
encourage researchers to notify IRBs and privacy boards of any prior IRB
or privacy board review of a research protocol.
*Comment:* Many commenters noted that the NPRM included no guidance on
how the privacy board should approve or deny researchers' requests. Some
of these commenters recommended that the regulation stipulate that
privacy boards be required to follow the same voting rules as required
under the Common Rule.
*Response:* We agree that the Common Rule (§ \_\_\_.108(b)) provides a
good model of voting procedures for privacy boards and incorporate such
procedures to the extent they are relevant. In the final rule, we
require that the documentation of alteration or waiver of authorization
state that the alteration or waiver has been reviewed and approved by
either (1) an IRB that has followed the voting requirements of the
Common Rule (§ \_\_\_.108(b)), or the expedited review procedures of the
Common Rule (§ \_\_\_.110); or (2) unless an expedited review procedure
is used, a privacy board that has reviewed the proposed research at a
convened meeting at which a majority of the privacy board members are
present, including at least one member who is not affiliated with the
covered entity, not affiliated with any entity conducting or sponsoring
the research, and not related to any person who is affiliated with any
such entities, and the alteration or waiver of authorization is approved
by the majority of privacy board members present at the meeting.
*Comment:* A few commenters were concerned that the research provisions
would be especially onerous for small non-governmental entities,
furthering the federal monopoly on research.
*Response:* We understand that the documentation requirements of §
164.512(i), as well as other provisions in the final rule, may be more
onerous for small entities than for larger entities. We believe,
however, that when protected health information is to be used or
disclosed for research without an individual's authorization, the
additional privacy protections in § 164.512(i) are essential to reduce
the risk of harm to the individual.
*Comment:* One commenter believed that it was paradoxical that, under
the proposed rule, the disclosure of protected health information for
research conducted with an authorization would have been more heavily
burdened than research that was conducted without authorization, which
they reasoned was far less likely to bring personal benefit to the
research subjects.
*Response:* It was not our intent to impose more requirements on covered
entities using or disclosing protected health information for research
conducted with authorization than for research conducted without
authorization. In fact, the proposed rule would have required only
authorization as stipulated in proposed § 164.508 for research
disclosures made with authorization, and would have been exempt from the
documentation requirements in proposed § 164.510(j). We retain this
treatment in the final rule. We disagree with the commenter who asserted
that the requirements for research conducted with authorization are more
burdensome for covered health care providers and plans than the
documentation provisions of this paragraph.
*Comment:* A number of comments, mostly from the pharmaceutical
industry, recommended that the final rule state that privacy boards be
permitted to waive authorization only with respect to research uses of
medical information collected in the course of treatment or health care
operations, and not with respect to clinical research. Similarly, one
commenter recommended that IRBs and privacy boards be authorized to
review privacy issues only, not the entire research project. These
commenters were concerned that by granting waiver authority to privacy
boards and IRBs, and by incorporating the Common Rule waiver criteria
into the waiver criteria included in the proposed rule, the Secretary
has set the stage for privacy boards to review and approve waivers in
circumstances that involve interventional research that is not subject
to the Common Rule.
*Response:* We agree with the commenters who recommended that the final
rule clarify that the documentation of IRB or privacy board approval of
the waiver of authorization would be based only on an assessment of the
privacy risks associated with a research study, not an assessment of all
relevant risks to participants. In the final rule, we have amended the
language in the waiver criteria to make clear that these criteria relate
only to the privacy interests of the individual. We anticipate, however,
that the vast majority of uses and disclosures of protected health
information for interventional research will be made with individuals'
authorization. Therefore, we expect it will be rare that a researcher
will seek IRB or privacy board approval for the alteration or waiver of
authorization, but seek informed consent for participation for the
interventional component of the research study. Furthermore, we believe
that interventional research, such as most clinical trials, could not
meet the waiver criteria in the final rule (§ 164.512(i)(2)(ii)(C)),
which states "the research could not practicably be conducted without
the alteration or waiver." If a researcher is to have direct contact
with research subjects, the researcher should in virtually all cases be
able to seek and obtain patients' authorization for the use and
disclosure of protected health information about themselves for the
research study.
*Comment:* A few commenters recommended that the rule explicitly state
that covered entities would be permitted to rely upon an IRB or privacy
boards' representation that the research proposal meets the requirements
of proposed § 164.510(j).
*Response:* We agree with this comment. The final rule clarifies that
covered health care providers and health plans are allowed to rely on an
IRB's or privacy board's representation that the research proposal meets
the requirements of § 164.512(i).
*Comment:* One commenter recommended that IRBs be required to maintain
web sites with information on proposed and approved projects.
*Response:* We agree that it could be useful for IRBs and privacy boards
to maintain web sites with information on proposed and approved
projects. However, requiring this of IRBs and privacy boards is beyond
the scope of our authority under HIPAA. In addition, this recommendation
raises concerns that would need to be addressed, including concerns
about protecting the confidentiality of research participants and
propriety information that may be contained in research proposals. For
these reasons, we decided not to incorporate this requirement into the
final rule.
*Comment:* One commenter recommended that HHS collect data on
research-related breaches of confidentiality and investigate existing
anecdotal reports of such breaches.
*Response:* This recommendation is beyond HHS' legal authority, since
HIPAA did not give us the authority to regulate researchers. Therefore,
this recommendation was not included in the final rule.
*Comment:* A number of commenters were concerned that HIPAA did not give
the Secretary the authority to protect information once it was disclosed
to researchers who were not covered entities.
*Response:* The Secretary shares these commenters' concerns about the
Department's limited authority under HIPAA. We strongly support the
enactment of additional federal legislation to fill these crucial gaps
in the Secretary's authority.
*Comment:* One commenter recommended that covered entities should be
required to retain the IRB's or privacy board's documentation of
approval of the waiver of individuals' authorization for at least six
years from when the waiver was obtained.
*Response:* We agree with this comment and have included such a
requirement in the final rule. See § 164.530(j).
*Comment:* One commenter recommended that whenever health information is
used for research or administrative purposes, a plan is in place to
evaluate whether to and how to feed patient-specific information back
into the health system to benefit an individual or group of patients
from whom the health information was derived.
*Response:* While we agree that this recommendation is consistent with
the responsible conduct of research, HIPAA did not give us the authority
to regulate research. Therefore, this recommendation was not included in
the final rule.
*Comment:* A few commenters recommended that contracts between covered
entities and researcher be pursued. Comments received in favor of
requiring contractual agreements argued that such a contract would be
enforceable under law, and should prohibit secondary disclosures by
researchers. Some of these commenters recommended that contracts between
covered entities and researchers should be the same as, or modeled on,
the proposed requirements for business partners. In addition, some
commenters argued that contracts between covered entities and
researchers should be required as a means of placing equal
responsibility on the researcher for protecting protected health
information and for not improperly re-identifying information.
*Response:* In the final rule, we have added an additional waiver
criteria to require that there are adequate written assurances from the
researcher that protected health information will not be re-used or
disclosed to any other person or entity, except as required by law, for
authorized oversight of the research project, or for other research for
which the use or disclosure of protected health information would be
permitted by this subpart. We believe that this additional waiver
criteria provides additional assurance that protected health information
will not be misused by researchers, while not imposing the additional
burdens of a contractual requirement on covered health care providers
and health plans. We were not persuaded by the comments received that
contractual requirements would provide necessary additional protections,
that would not also be provided by the less burdensome waiver criteria
for adequate written assurance that the researcher will not re-use or
disclose protected health information, with few exceptions. Our intent
was to strengthen and extend existing privacy safeguards for protected
health information that is used or disclosed for research, while not
creating unnecessary disincentives to covered health care providers and
health plans who choose to use or disclose protected health information
for research purposes.
*Comment:* Some commenters explicitly opposed requiring contracts
between covered entities and researchers as a condition of permitting
the use or disclosure of protected health information for research
purposes. This commenters argued that such a contractual requirement
would be too onerous for covered entities and researchers and would
hinder or halt important research.
*Response:* We agree with the arguments raised by these commenters, and
thus, the final rule does not require contracts between covered entities
and researchers as a condition of using or disclosing protected health
information for research purposes without authorization.
*Comment:* A large number of commenters strongly supported requiring
patient consent before protected health information could be used or
disclosed, including but not limited to use and disclosure for research
purposes. These commenters argued that the unconsented-to use of their
medical records abridged their autonomy right to decide whether or not
to participate in research. A few referenced the Nuremberg Code in
support of their view, noting that the Nuremberg Code required
individual consent for participation in research.
*Response:* We agree that it is of foremost importance that individuals'
privacy rights and welfare be safeguarded when protected health
information about themselves is used or disclosed for research studies.
We also strongly believe that continued improvements in the nation's
health requires that researchers be permitted access to protected health
information without authorization in certain circumstances. Additional
privacy protections are needed, however, and we have included several in
the final rule. If covered entities plan to disclose protected health
without individuals' authorization for research purposes, individuals
must be informed of this through the covered entity's notice to patients
of their information practices. In addition, before covered health care
providers or health plans may use or disclose protected health
information for research without authorization, they must obtain
documentation that an IRB or privacy board has found that specified
waiver criteria have been met, unless the research will include
protected health information about deceased individuals only, or is
solely for reviews that are preparatory to research.
While it is true that the first provision of the Nuremberg Code states
that "the voluntary consent of the human subject is absolutely
essential," it is important to understand the context of this important
document in the history of protecting human subjects research from harm.
The Nuremberg Code was developed for the Nuremberg Military Tribunal as
standards by which to judge the human experimentation conducted by the
Nazis, and was one of the first documents setting forth principles for
the ethical conduct of human subjects research. The acts of atrocious
cruelty that the Nuremberg Code was developed to address, focused on
preventing the violations to human rights and dignity that occurred in
the name of "medical advancement." The Code, however, did not directly
address the ethical conduct of non-interventional research, such as
medical records research, where the risk of harm to participants can be
unlike those associated with clinical research.
We believe that the our proposed requirements for the use or disclosure
of protected health information for research are consistent with the
ethical principles of "respect for persons," "beneficence," and
"justice," which were established by the Belmont Report in 1978, and are
now accepted as the quintessential requirements for the ethical conduct
of research involving human subjects, including research using
individually identifiable health information. These ethical principles
formed the foundation for the requirements in the Common Rule, on which
our proposed requirements for research uses and disclosures were
modeled.
*Comment:* Many commenters recommended that the privacy rule permit
individuals to opt out of having their records used for the identified
"important" public policy purposes in § 164.510, including for research
purposes. These commenters asserted that permitting the use and
disclosure of their protected health information without their consent,
or without an opportunity to "opt out" of having their information used
or disclosed, abridged individuals' right to decide who should be
permitted access to their medical records. In addition, one commenter
argued that although the research community has been sharply critical of
a Minnesota law that limits access to health records (Minnesota Statute
Section 144.335 (1998)), researchers have cited a lack of response to
mailed consent forms as the primary factor behind a decrease in the
percentage of medical records available for research. This commenter
argued that an opt-out provision would not be subject to this
"nonresponder" problem.
*Response:* We believe that a meaningful right to "opt out" of a
research study requires that individuals be contacted and informed about
the study for which protected health information about themselves is
being requested by a researcher. We concluded, therefore, that an "opt
out" provision of this nature may suffer from the same decliner bias
that has been experienced by researchers who are subject to laws that
require patient consent for medical records research. Furthermore,
evidence on the effect of a mandatory "opt out" provision for medical
records research is only fragmentary at this time, but at least one
study has preliminarily suggested that those who refuse to consent for
research access to their medical records may differ in statistically
significant ways from those who consent with respect to variables such
as age and disease category (SJ Jacobsen et al. "Potential Effect of
Authorization Bias on Medical Records Research." Mayo Clin Proc 74:
(1999) 330-338). For these reasons, we disagree with the commenters who
recommended that an "opt out" provision be included in the final rule.
In the final rule, we do require covered entities to include research
disclosures in their notice of information practices. Therefore,
individuals who do not wish for protected health information about
themselves to be disclosed for research purposes without their
authorization could select a health care provider or health plan on this
basis. In addition, the final rule also permits covered health care
providers or health plans to agree not to disclose protected health
information for research purposes, even if research disclosures would
otherwise be permitted under their notice of information practices. Such
an agreement between a covered health care provider or health plan and
an individual would not be enforceable under the final rule, but might
be enforceable under applicable state law.
*Comment:* Some commenters explicitly recommended that there should be
no provision permitting individuals to opt out of having their
information used for research purposes.
*Response:* We agree with these commenters for the reasons discussed
above.
*IRB and Privacy Board Review*
*Comments:* The NPRM imposed no requirements for the location or
sponsorship of the IRB or privacy board. One commenter supported the
proposed approach to permit covered entities to rely on documentation of
a waiver by a IRB or privacy board that was convened by the covered
entity, the researcher, or another entity.
In contrast, a few commenters recommended that the NPRM require that the
IRB or privacy board be outside of the entity conducting the research,
although the rationale for these recommendations was not provided.
Several industry and consumer groups alternatively recommended that the
regulation require that privacy boards be based at the covered entity.
These comments argued that "if the privacy board is to be based at the
entity receiving data, and that entity is not a covered entity, there
will be little ability to enforce the regulation or study the
effectiveness of the standards."
*Response:* We agree with the comment supporting the proposed rule's
provision to impose no requirements for the location or sponsorship of
the IRB or privacy board that was convened to review a research proposal
for the alteration or waiver of authorization criteria. In the absence
of a rationale, we were not persuaded by the comments asserting that the
IRB or privacy board should be convened outside of the covered entity.
In addition, while we agree with the comments that asserted HHS would
have a greater ability to enforce the rule if a privacy board was
established at the covered entity rather than an uncovered entity, we
concluded that the additional burden that such a requirement would place
on covered entities was unwarranted. Furthermore, under the Common Rule
and FDA's protection of human subjects regulations, IRB review often
occurs at the site of the recipient researchers' institution, and it was
not our intent to change this practice. Therefore, in the final rule, we
continue to impose no requirements for the location or sponsorship of
the IRB or privacy board.
*Privacy Board Membership*
*Comment:* Some commenters were concerned that the proposed composition
of the privacy board did not adequately address potential conflicts of
interest of the board members, particularly since the proposed rule
would have permitted the board's "unaffiliated" member to be affiliated
with the entity disclosing the protected health information for research
purposes. To address this concern, some commenters recommended that the
required composition of privacy boards be modified to require "\...at
least one member who is not affiliated with the entity receiving or
disclosing protected health information." These commenters believed that
this addition would be more sound and more consistent with the Common
Rule's requirements for the composition of IRBs. Furthermore, it was
argued that this requirement would prohibit covered entities from
creating a privacy board comprised entirely of its own employees.
*Response:* We agree with these comments. In the final rule we have
revised the proposed membership for privacy board to reduce potential
conflict of interest among board members. The final rule requires that
documentation of alteration or waiver from a privacy board, is only
valid under § 164.512(i) if the privacy board includes at least one
member who is not affiliated with the covered entity, not affiliated
with any entity conducting or sponsoring the research, and not related
to a person who is affiliated which such entities.
*Comment:* One commenter recommended that privacy boards be required to
include more than one unaffiliated member to address concerns about
conflict of interest among members.
*Response:* We disagree that privacy boards should be required to
include more than one unaffiliated member. We believe that the revised
membership criterion for the unaffiliated member of the privacy board,
and the criterion that requires that the board have no member
participating in a review of any project in which the member has a
conflict of interest, are sufficient to ensure that no member of the
board has a conflict of interest in a research proposal under their
review.
*Comment:* Many commenters also recommended that the membership of
privacy boards be required to be more similar to that of IRBs. These
commenters were concerned that privacy boards, as described in the
proposed rule, would not have the needed expertise to adequately review
and oversee research involving the use of protected health information.
A few of these commenters also recommended that IRBs be required to have
at least one member trained in privacy or security matters.
*Response:* We disagree with the comments asserting that the membership
of privacy boards should be required be more similar to IRBs. Unlike
IRBs, privacy boards only have responsibility for reviewing research
proposals that involve the use or disclosure of protected health
information without authorization. We agree, however, that the proposed
rule may not have ensured that the a privacy board had the necessary
expertise to protect adequately individuals' privacy rights and
interests. Therefore, in the final rule, we have modified one of the
membership criteria for privacy board to require that the board has
members with varying backgrounds and appropriate professional competency
as necessary to review the effect of the research protocol on the
individual's privacy rights and related interests.
*Comment:* Two commenters recommended that IRBs and privacy boards be
required to include patient advocates.
*Response:* The Secretary's legal authority under HIPAA does not permit
HHS to modify the membership of IRBs. Moreover, we disagree with the
comments recommending that IRBs and privacy board should be required to
include patient advocates. We were not persuaded that patient advocates
are the only persons with the needed expertise to protect patients'
privacy rights and interests. Therefore, in the final rule, we do not
require that patient advocates be included as members of a privacy
board. However, under the final rule, IRBs and privacy board members
could include patient advocates provided they met the required
membership criteria in § 164.512(i).
*Comment:* A few commenters requested clarification of the term
"conflict of interest" as it pertained to the proposed rule's criteria
for IRB and privacy board membership. In particular, some commenters
recommended that the final rule clarify what degree of involvement in a
research project by a privacy board member would constitute a conflict,
thereby precluding that individual's participation in a review. One
commenter specifically requested clarification about whether employment
by the covered entity constituted a conflict of interest, particularly
if the covered entity is receiving a financial gain from the conduct of
the research.
*Response:* We understand that determining what constitutes conflict of
interest can be complex. We do not believe that employees of covered
entities or employees of the research institution requesting protected
health information for research purposes are *necessarily* conflicted,
even if those employees may benefit financially from the research.
However, there are many factors that should be considered in assessing
whether a member of an IRB has a conflict of interest, including
financial and intellectual conflicts.
As part of a separate, but related effort to the final rule, during the
summer of 2000, HHS held a conference on human subject protection and
financial conflicts of interest. In addition, HHS solicited comments
from the public about financial conflicts of interest associated with
human subjects research for researchers, IRB members and staff, and
research sponsors. The findings from the conference and the public
comments received are forming the basis for guidance that HHS is now
developing on financial conflicts of interest.
*Privacy Training for IRB and Privacy Boards*
*Comment:* A few commenters expressed support for training IRB members
and chairs about privacy issues, recommending that such training either
be required or that it be encouraged in the final rule.
*Response:* We agree with these comments and thus encourage institutions
that administer IRBs and privacy boards to ensure that the members of
these boards are adequately trained to protect the privacy rights and
welfare of individuals about whom protected health information is used
for research purposes. In the final rule, we require that privacy board
members have varying backgrounds and appropriate professional competency
as necessary to review the effect of the research protocol on the
individual's privacy rights and related interests. We believe that this
criterion for privacy board membership requires that members already
have the necessary knowledge or that they be trained to address privacy
issues that arise in the conduct of research that involves the use of
protected health information. In addition, we note that the Common Rule
(§ \_\_\_.107(a)) already imposes a general requirement that IRB members
posses adequate training and experience to adequately evaluate the
research which it reviews. IRBs are also authorized to obtain the
services of consultants (§ \_\_\_.107(f)) to provide expertise not
available on the IRB. We believe that these existing requirements in the
Common Rule already require that an IRB have the necessary privacy
expertise.
*Waiver Criteria*
*Comment:* A large number of comments supported the proposed rule's
criteria for the waiver of authorization by an IRB or privacy board.
*Response:* While we agree that several of the waiver criteria should be
retained in the final rule, we have made changes to the waiver criteria
to address some of the comments we received on specific criteria. These
reason for these changes are discussed in the response to comments
below.
*Comment:* In addition to the proposed waiver criteria, several
commenters recommended that the final rule also instruct IRBs and
privacy boards to consider the type of protected health information and
the sensitivity of the information to be disclosed in determining
whether to grant a waiver, in whole or in part, of the authorization
requirements.
*Response:* We agree with these comments, but believe that the
requirement to consider the type and sensitivity of protected health
information was already encompassed by the proposed waiver criteria. We
encourage and expect that IRBs and privacy boards will take into
consideration the type and sensitivity of protected health information,
as appropriate, in considering the waiver criteria included in the final
rule.
*Comment:* Many commenters were concerned that the criteria were not
appropriate in the context of privacy risks and recommended that the
waiver criteria be rewritten to more precisely focus on the protection
of patient privacy. In addition, some commenters argued that the
proposed waiver criteria were redundant with the Common Rule and were
confusing because they mix elements of the Common Rule's waiver
criteria---some of which they argued were relevant only to
interventional research. In particular, a number of commenters raised
these concerns about proposed criterion (ii). Some of these commenters
suggested that the word "privacy" be inserted before "rights."
*Response:* We agree with these comments. To focus all of the criterion
on individuals' privacy interests, in the final rule, we have modified
one of the proposed waiver criteria, eliminated one proposed criterion,
and added an additional criterion : (1) the proposed criterion which
stated, "the waiver will not adversely affect the rights and welfare of
the subjects," has been revised in the final rule as follows: "the
alteration or waiver will not adversely affect the privacy rights and
the welfare of the individuals;" (2) the proposed criterion which
stated, "whenever appropriate, the subjects will be provided with
additional pertinent information after participation," has been
eliminated; and (3) a criterion has been added in the final rule which
states, "there are adequate written assurances that the protected health
information will not be re-used or disclosed to any other person or
entity, except as required by law, for authorized oversight of the
research project, or for other research for which the use or disclosure
of protected health information would be permitted by this subpart." In
addressing these criteria, we expect that IRBs and privacy boards will
not only consider the immediate privacy interests of the individual that
would arise from the proposed research study, but also the possible
implications from a loss of privacy, such as the loss of employment,
loss or change in cost of health insurance, and social stigma.
*Comment:* A number of commenters were concerned about the interaction
between the proposed rule and the Common Rule. One commenter opposed the
four proposed waiver criteria which differed from the Common Rule's
criteria for the waiver of informed consent (§ \_\_\_.116(d)) on the
grounds that the four criteria proposed in addition to the Common Rule's
waiver criteria would apply only to the research use and disclosure of
protected health information by covered entities. This commenter argued
that this would lead to different standards for the protection of other
kinds of individually identifiable health information used in research
that will fall outside of the scope of the final rule. This commenter
concluded that this inconsistency would be difficult for IRBs to
administer, difficult for IRB members to distinguish, and would be
ethically questionable. For these reasons, many commenters recommended
that the final rule should permit the waiver criteria of the Common
Rule, to be used in lieu of the waiver criteria identified in the
proposed rule.
*Response:* We disagree with the comments recommending that the waiver
criteria of the Common Rule should be permitted to be used in lieu of
the waiver criteria identified in the proposed rule. The Common Rule's
waiver criteria were designed to protect research subjects from all
harms associated with research, not specifically to protect individuals'
privacy interests. We understand that the waiver criteria in the final
rule may initially cause confusion for IRBs and researchers that must
attend to both the final rule and the Common Rule, but we believe that
the additional waiver criteria adopted in the final rule are essential
to ensure that individuals' privacy rights and welfare are adequately
safeguarded when protected health information about themselves is used
for research without their authorization. We agree that ensuring that
the privacy rights and welfare of all human subjects---involved in all
forms of research---is ethically required, and the new Office of Human
Research Protection will immediately initiate plans to review the
confidentiality provisions of the Common Rule.
In addition, at the request of the President, the National Bioethics
Advisory Commission has begun an examination of the current federal
human system for the protection of human subjects in research. The
current scope of the federal regulatory protections for protecting human
subjects in research is just one of the issues that will be addressed in
the by the Commission's report, and the Department looks forward to
receiving the Commission's recommendations.
CONCERNS ABOUT SPECIFIC WAIVER CRITERIA
*Comment:* One commenter argued that the term "welfare" was vague and
recommended that it be deleted from the proposed waiver of authorization
criterion which stated, "the waiver will not adversely affect the rights
and welfare of the subjects."
*Response:* We disagree with the comment recommending that the final
rule eliminate the term "welfare" from this waiver criterion. As
discussed in the National Bioethics Advisory Commission's 1999 report
entitled, "Research Involving Human Biological Materials: Ethical Issues
and Policy Guidance," "Failure to obtain consent may adversely affect
the rights and welfare of subjects in two basic ways. First, the subject
may be improperly denied the opportunity to choose whether to assume the
risks that the research presents, and second, the subject may be harmed
or wronged as a result of his or her involvement in research to which he
or she has not consented\....Subjects' interest in controlling
information about themselves is tied to their interest in, for example,
not being stigmatized and not being discriminated against in employment
and insurance." Although this statement by the Commission was made in
the context of research involving human biological materials, we believe
research that involves the use of protected health information similarly
requires that social and psychological harms be considered when
assessing whether an alteration or waiver will adversely affect the
privacy rights and welfare of individuals. We believe it would be
insufficient to attend only to individuals' privacy "rights" since some
of the harms that could result from a breach of privacy, such as
stigmatization, and discrimination in employment or insurance, may not
be tied directly to an individuals' "rights," but would have a
significant impact on their welfare. Therefore, in the final rule, we
have retained the term "welfare" in this criterion for the alteration or
waiver of authorization but modified the criterion as follows to focus
more specifically on privacy concerns and to clarify that it pertains to
alterations of authorization: "the alteration or waiver will not
adversely affect the privacy rights and the welfare of the individual."
*Comment:* A few commenters recommended that the proposed waiver
criteria that stated, "the research could not practicably be conducted
without the waiver," be modified to eliminate the term "practicably."
These commenters believed that determining "practicably" was subjective
and that its elimination would facilitate IRBs' and privacy boards'
implementation of this criterion. In addition, one commenter was
concerned that this term could be construed to require authorization if
enough weight is given to a privacy interest, and little weight is given
to cost or administrative burden. This commenter recommended that the
criterion be changed to allow a waiver if the "disclosure is necessary
to accomplish the research or statistical purpose for which the
disclosure is to be made."
*Response:* We disagree with the comments recommending that the term
"practicability" be deleted from this waiver criterion. We believe that
an assessment of practicability is necessary to account for research
that may be *possible* to conduct with authorization but that would be
impracticable if authorization were required. For example, in research
study that involves thousands of records, it may be possible to track
down all potential subjects, but doing so may entail costs that would
make the research impracticable. In addition, IRBs have experience
implementing this criterion since it is nearly identical to a waiver
criterion in the Common Rule (§ \_\_\_.116(d)(3)).
We also disagree with the recommendation to change the criterion to
state, "disclosure is necessary to accomplish the research or
statistical purpose for which the disclosure is to be made." We believe
it is essential that consideration be given as to whether it would be
practicable for research to be conducted with authorization in
determining whether a waiver of authorization is justified. If the
research could practicably be conducted with authorization, then
authorization must be sought. Authorization must not be waived simply
for convenience.
Therefore, in the final rule, we have retained this criterion and
clarified that it also applies to alterations of authorization. This
waiver criterion in the final rule states, "the research could not
practicably be conducted without the alteration or waiver."
*Comment:* Some commenters argued that the criterion which stated,
"whenever appropriate, the subjects will be provided with additional
pertinent information after participation," should be deleted. Some
comments recommended that the criterion should be deleted for privacy
reasons, arguing that it would be inappropriate to create a reason for
the researcher to contact the individual whose data were analyzed,
without IRB review of the proposed contact as a patient intervention.
Other commenters argued for the deletion of the criterion on grounds
that requiring researchers to contact patients whose records were used
for archival research would be unduly burdensome, while adding little to
the patient's base of information. Several commenters also argued that
the criterion was not pertinent to non-interventional retrospective
research requiring access to archived protected health information.
In addition, one commenter asserted that this criterion was inconsistent
with the Secretary's rationale for prohibiting disclosures of "research
information unrelated to treatment" for purposes other than research.
This commenter argued that the privacy regulations should not mandate
that a covered entity provide information with unknown validity or
utility directly to patients. This commenter recommended that a
patient's physician, not the researcher, should be the one to contact a
patient to discuss the significance of new research findings for that
individual patient's care.
*Response:* Although we disagree with the arguments made by commenters
recommending that this criterion be eliminated in the final rule, we
concluded that the criterion was not directly related to ensuring the
privacy rights and welfare of individuals. Therefore, we eliminated this
criterion in the final rule.
*Comment:* A few commenters recommended that the criterion, which
required that "the research would be impracticable to conduct without
access to and use of the protected health information," be deleted
because it would be too subjective to be meaningful.
*Response:* We disagree with comments asserting that this proposed
criterion would be too subjective. We believe that researchers should be
required to demonstrate to an IRB or privacy board why protected health
information is necessary for their research proposal. If a researcher
could practicably use de-identified health information for a research
study, protected health information should not be used or disclosed for
the study without individuals' authorization. Therefore, we retain this
criterion in the final rule. In considering this criterion, we expect
IRBs and privacy boards to consider the amount of information that is
needed for the study. To ensure the covered health care provider or
health plan is informed of what information the IRB or privacy board has
determined may be used or disclosed without authorization, the final
rule also requires that the documentation of IRB or privacy board
approval of the alteration or waiver describe the protected health
information for which use or access has been determined to be necessary.
*Comment:* A large number of comments objected to the proposed waiver
criterion, which stated that, "the research is of sufficient importance
so as to outweigh the intrusion of the privacy of the individual whose
information is subject to the disclosure." The majority of these
commenters argued that the criterion was overly subjective, and that due
to its subjectivity, IRBs and privacy boards would inevitably apply it
inconsistently. Several commenters asserted that this criterion was
unsound in that it would impose on reviewing bodies the explicit
requirement to form and debate conflicting value judgments about the
relative weights of the research proposal versus an individual's right
to privacy. Furthermore these commenters argued that this criterion was
also unnecessary because the Common Rule already has a requirement that
deals with this issue more appropriately. In addition, one commenter
argued that the rule eliminate this criterion because common purposes
should not override individual rights in a democratic society. Based on
these arguments, these commenters recommended that this criterion be
deleted.
*Response:* We disagree that it is inappropriate to ask IRBs and privacy
boards to ensure that there is a just balance between the expected
benefits and risks to individual participants from the research. As
noted by several commenters, IRBs currently conduct such a balancing of
risks and benefits because the Common Rule contains a similar criterion
for the approval of human subjects research (§ \_\_\_.111(a)(2)).
However, we disagree with the comments asserting that the proposed
criterion was unnecessary because the Common Rule already contains a
similar criterion. The Common Rule does not explicitly address the
privacy interests of research participants and does not apply to all
research that involves the use or disclosure of protected health
information. However, we agree that the relevant Common Rule criterion
for the approval of human subjects research provides better guidance to
IRBs and privacy boards for assessing the privacy risks and benefits of
a research proposal. Therefore, in the final rule, we modeled the
criterion on the relevant Common Rule requirement for the approval of
human subjects research, and revised the proposed criterion to state:
"the privacy risks to individuals whose protected health information is
to be used or disclosed are reasonable in relation to the anticipated
benefits if any to the individuals, and the importance of the knowledge
that may reasonably be expected to result from the research."
*Comment:* One commenter asserted that as long as the research
organization has adequate privacy protections in place to keep the
information from being further disclosed, it is unnecessary for the IRB
or privacy board to make a judgment on whether the value of the research
outweighs the privacy intrusion.
*Response:* The Department disagrees with the assertion that adequate
safeguards of protected health information are sufficient to ensure that
the privacy rights and welfare of individuals are adequately protected.
We believe it is imperative that there be an assessment of the privacy
risks and anticipated benefits of a research study that proposes to use
protected health information without authorization. For example, if a
research study was so scientifically flawed that it would provide no
useful knowledge, any risk to patient privacy that might result from the
use or disclosure of protected health information without individuals'
authorization would be too great.
*Comment:* A few commenters asserted that the proposed criterion
requiring "an adequate plan to destroy the identifiers at the earliest
opportunity consistent with the conduct of the research, unless there is
a health or research justification for retaining identifiers,"
conflicted with the regulations of the FDA on clinical record keeping
(21 CFR 812.140(d)) and the International Standard Organization on
control of quality records (ISO 13483, 4.16), which require that
relevant data be kept for the life of a device.
In addition, one commenter asserted that this criterion could prevent
follow up care. Similarly, other commenters argued that the new waiver
criteria would be likely to confuse IRBs and may impair researchers'
ability to go back to IRBs to request extensions of time for which
samples or data can be stored if researchers are unable to anticipate
future uses of the data
*Response:* We do not agree with the comment that there is a conflict
between either the FDA or the ISO regulations and the proposed waiver
criteria in the rule. We believe that compliance with such recordkeeping
requirements would be "consistent with the conduct of research" which is
subject to such requirements. Nonetheless, to avoid any confusion, in
the final rule we have added the phrase "or such retention is otherwise
required by law" to this waiver criterion.
We also disagree with the comments that this criterion would prevent
follow up care to individuals or unduly impair researchers from
retaining identifiers on data for future research. We believe that
patient care would qualify as a "health\...justification for retaining
identifiers." In addition, we understand that researchers may not always
be able to anticipate that the protected health information they receive
from a covered health care provider or health plan for one research
project may be useful for the conduct of future research studies.
However, we believe that the concomitant risk to patient privacy of
permitting researchers to retain identifiers they obtained without
authorization would undermine patient trust, unless researchers could
identify a health or research justification for retaining the
identifiers. In the final rule, an IRB or privacy board is not required
to establish a time limit on a researcher's retention of identifiers.
ADDITIONAL WAIVER CRITERIA
*Comment:* A few comments recommended that there be a additional waiver
criterion to safeguard or limit subsequent use or disclosure of
protected health information by the researcher.
*Response:* We agree with these comments. In the final rule, we include
a waiver criterion requiring "there are adequate written assurances that
the protected health information will not be re-used or disclosed to any
other person or entity, except as required by law, for authorized
oversight of the research project, or for other research for which the
use or disclosure of protected health information would be permitted by
this subpart."
*Waiving Authorization, in Whole or in Part*
*Comment:* A few commenters requested that the final rule clarify what
"in whole or in part" means if authorization is waived or altered.
*Response:* In the proposed rule, it was HHS' intent to permit IRBs and
privacy boards to either waive *all* of the elements for authorization,
or alternatively, waive only *some* of the elements of authorization.
Furthermore, we also intended to permit IRBs and privacy boards to alter
the authorization requirements. Therefore, in the final rule, we clarify
that the alteration to and waiver of authorization, in whole or in part,
are permitted as stipulated in § 164.512(i).
*Expedited Review*
*Comment:* One commenter asserted that the proposed rule would prohibit
expedited review as permitted under the Common Rule. Many commenters
supported the proposal in the rule to incorporate the Common Rule's
provision for expedited review, and strongly recommended that this
provision be retained in the final rule. Several of these commenters
argued that the expedited review mechanism provides IRBs with the
much-needed flexibility to focus volunteer-IRB members' limited
resources.
*Response:* We agree that expedited review should be available, and
included a provision permitting expedited review under specified
conditions. We understand that the National Bioethics Advisory
Commission is currently developing a report on the federal oversight of
human subjects research, which is expected to address the Common Rule's
requirements for expedited review. HHS looks forward to receiving the
National Bioethics Advisory Commission's report, and will modify the
provisions for expedited review in the privacy rule if changes are
warranted by the Commission's findings and recommendations.
*Required Signature*
*Comment:* A few commenters asserted that the proposed requirement that
the written documentation of IRB or privacy board approval be signed by
the chair of the IRB or the privacy board was too restrictive. Some
commenters recommended that the final rule permit the documentation of
IRB or privacy board approval to be signed by persons other than the IRB
or privacy board chair, including: (1) any person authorized to exercise
executive authority under IRB's or privacy board's written procedures;
(2) the IRB's or privacy board's acting chair or vice chair in the
absence of the chair, if permitted by IRB procedures; and (3) the
covered entity's privacy official.
*Response:* We agree with the commenters who argued that the final rule
should permit the documentation of IRB or privacy board approval to be
signed by someone other than the chair of the board. In the final rule,
we permit the documentation of alteration or waiver of authorization to
be signed by the chair or other member, as designated by the chair of
the IRB or privacy board, as applicable.
***Research Use and Disclosure with Authorization***
*Comment:* Some commenters, including several industry and consumer
groups, argued that the proposed rule would establish a two-tiered
system for public and private research. Privately funded research
conducted with an authorization for the use or disclosure of protected
health information would not require IRB or privacy board review, while
publically funded research conducted with authorization would require
IRB review as required by the Common Rule. Many of these commenters
argued that authorization is insufficient to protect patients involved
in research studies and recommended that IRB or privacy board review
should be required for all research regardless of sponsor. These
commenters asserted that it is not sufficient to obtain authorization,
and that IRBs and privacy boards should review the authorization
document, and assess the risks and benefits to individuals posed by the
research.
*Response:* For the reasons we rejected the recommendation that we
eliminate the option for privacy board review and require IRB review for
the waiver of authorization, we also decided against requiring
documentation of IRB or privacy board approval for research conducted
with authorization. HHS strongly agrees that IRB review is essential for
the adequate protection of human subjects involved in research,
regardless of whether informed consent and/or individuals' authorization
is obtained. In fact, IRB review may be even more important for research
conducted with subjects' informed consent and authorization since such
research may present greater than minimal risk to participants. However,
HHS' authority under HIPAA is limited to safeguarding the privacy of
protected health information, and does not extend to protecting human
subjects more broadly. Therefore, in the final rule we have not required
documentation of IRB or privacy board review for the research use or
disclosure of protected health information conducted with individuals'
authorization. As mentioned above, HHS looks forward to receiving the
recommendations of the National Bioethics Advisory Commission, which is
currently examining the current scope of federal regulatory protections
for protecting human subjects in research as part of its overarching
report on the federal oversight of human subjects protections.
*Comment:* Due to concern about several of the elements of
authorization, many commenters recommended that the final rule stipulate
that "informed consent" obtained pursuant to the Common Rule be deemed
to meet the requirements for "authorization." These commenters argued
that the NPRM's additional authorization requirements offered no
additional protection to research participants but would be a
substantive impediment to research.
*Response:* We disagree with the comments asserting that the proposed
requirements for authorization for the use or disclosure of protected
health information would have offered research subjects no additional
privacy protection. Because the purposes of authorization and informed
consent differ, the proposed rule's requirements for authorization
pursuant to a request from a researcher (§ 164.508) and the Common
Rule's requirements for informed consent (Common Rule, § \_\_\_.116)
contain important differences. For example, unlike the Common Rule, the
proposed rule would have required that the authorization include a
description of the information to be used or disclosed that identifies
the information in a specific and meaningful way, an expiration date,
and where, use of disclosure of the requested information will result in
financial gain to the entity, a statement that such gain will result. We
believe that the authorization requirements provide individuals with
information necessary to determine whether to authorize a specific use
or disclosure of protected health information about themselves, that are
not required by the Common Rule.
Therefore, in the final rule, we retain the requirement for
authorization for all uses and disclosures of protected health
information not otherwise permitted without authorization by the rule.
Some of the proposed requirements for authorization were modified in the
final rule as discussed in the preamble on § 164.508. The comments
received on specific proposed elements of authorization as they would
have pertained to research are addressed below.
*Comment:* A number of commenters, including several from industry and
consumer groups, recommended that the final rule require patients'
informed consent as stipulated in the Common Rule. These commenters
asserted that the proposed authorization document was inadequate for
research uses and disclosures of protected health information since it
included fewer elements than required for informed consent under the
Common Rule, including for example, the Common Rule's requirement that
the informed consent document include: (1) a description of any
reasonably foreseeable risks or discomforts to the subject; (2) a
description of any benefits to the subject or to others which may
reasonably be expected from the research (Common Rule, § \_\_\_.116(a)).
*Response:* While we agree that the ethical conduct of research requires
the voluntary informed consent of research subjects, as stipulated in
the Common Rule, as we have stated elsewhere, the privacy rule is
limited to protecting the confidentiality of individually identifiable
health information, and not protecting human subjects more broadly.
Therefore, we believe it would not be within the scope of the final rule
to require informed consent as stipulated by the Common Rule for
research uses and disclosures of protected health information.
*Comment:* Several commenters specifically objected to the authorization
requirement for a "expiration date." To remedy this concern, many of
these commenters proposed that the rule exempt research from the
requirement for an expiration date if an IRB has reviewed and approved
the research study. In particular, some commenters asserted that the
requirement for an expiration date would be impracticable in the context
of clinical trials, where the duration of the study depends on several
different factors that cannot be predicted in advance. These commenters
argued that determining an exact date would be impossible due to the
legal requirements that manufactures and the Food and Drug
Administration be able to retrospectively audit the source documents
when patient data are used in clinical trials. In addition, some
commenters asserted that a requirement for an expiration date would
force researchers to designate specific expiration dates so far into the
future as to render them meaningless.
*Response:* We agree with commenters that an expiration date is not
always possible or meaningful. In the final rule, we continue to require
an identifiable expiration, but permit it to be a specific date or an
event directly relevant to the individual or the purpose of the
authorization (e.g., for the duration of a specific research study) in
which the individual is a participant.
*Comment:* A number of commenters, including those from the
pharmaceutical industry, were concerned about the authorization
requirement that gave patients the right to revoke consent for
participation in clinical research. These commenters argued that such a
right to revoke authorization for the use of their protected health
information would require complete elimination of the information from
the record. Some stated that in the conduct of clinical trials, the
retrieval of individually identifiable health information that has
already been blinded and anonymized, is not only burdensome, but should
this become a widespread practice, would render the trial invalid. One
commenter suggested that the Secretary modify the proposed regulation to
allow IRBs or privacy boards to determine the duration of authorizations
and the circumstances under which a research participant should be
permitted to retroactively revoke his or her authorization to use data
already collected by the researcher.
*Response:* We agree with these concerns. In the final rule we have
clarified that an individual cannot revoke an authorization to the
extent that action has been taken in reliance on the authorization.
Therefore, if a covered entity has already used or disclosed protected
health information for a research study pursuant to an authorization
obtained as required by § 164.508, the covered entity is not required
under the rule, unless it agreed otherwise, to destroy protected health
information that was collected, nor retrieve protected health
information that was disclosed under such an authorization. However,
once an individual has revoked an authorization, no additional protected
health information may be used or disclosed unless otherwise permitted
by this rule.
*Comment:* Some commenters were concerned that the authorization
requirement to disclose "financial gain" would be problematic as it
would pertain to research. These commenters asserted that this
requirement could mislead patients and would make it more difficult to
attract volunteers to participate in research. One commenter recommended
that the statement be revised to state "that the clinical investigator
will be compensated for the value of his/her services in administrating
this clinical trial." Another commenter recommended that the
authorization requirement for disclosure of financial gain be defined in
accordance with FDA's financial disclosure rules.
*Response:* We strongly believe that a requirement for the disclosure of
financial gain is imperative to ensure that individuals are informed
about how and why protected health information about themselves will be
used or disclosed. We agree, however that the language of the proposed
requirement could cause confusion, because most activities involve some
type of financial gain. Therefore, in the final rule, we have modified
the language to provide that when the covered entity initiates the
authorization and the covered entity will receive direct or indirect
remuneration (rather than financial gain) from a third party in exchange
for using or disclosing the health information, the authorization must
include a statement that such remuneration will result.
*Comment:* A few commenters asserted that the requirement to include a
statement in which the patient acknowledged that information used or
disclosed to any entity other than a health plan or health care provider
may no longer be protected by federal privacy law would be inconsistent
with existing protections implemented by IRBs under the Common Rule. In
particular they stated that this inconsistency exists because IRBs are
required to consider the protections in place to protect patients'
confidential information and that IRBs are charged with ensuring that
researchers comply with the confidentiality provisions of the informed
consent document.
*Response:* We disagree that this proposed requirement would pose a
conflict with the Common Rule since the requirement was for a statement
that the "information may no longer be protected by the federal privacy
law." This statement does not pertain to the protections provided under
the Common Rule. In addition, while we anticipate that IRBs and privacy
boards will most often waive all or none of the authorization
requirements, we clarify an IRB or privacy board could alter this
requirement, among others, if the documentation requirements of §
164.512(i) have been met.
***Reviews Preparatory to Research***
*Comment:* Some industry groups expressed concern that the research
provision would prohibit physicians from using patient information to
recruit subjects into clinical trials. These commenters recommended that
researchers continue to have access to hospitals' and clinics' patient
information in order to recruit patients for studies.
*Response:* Under the proposed rule, even if the researcher only viewed
the medical record at the site of the covered entity and did not record
the protected health information in a manner that patients could be
identified, such an activity would have constituted a use or disclosure
that would have been subject to proposed § 164.508 or proposed §
164.510. Based on the comments received and the fact finding we
conducted with the research community, we concluded that documentation
of IRB or privacy board approval could halt the development of research
hypotheses that require access to protected health information before a
formal protocol can be developed and brought to an IRB or privacy board
for approval. To avoid this unintended result, the final rule permits
covered health care providers and health plans to use or disclose
protected health information for research if the covered entity obtains
from the researcher representations that: (1) use or disclosure is
sought solely to review protected health information as necessary to
prepare a research protocol or for similar purposes preparatory to
research; (2) no protected health information is to be removed from the
covered entity by the researcher in the course of the review; and (3)
the protected health information for which use or access is sought is
necessary for the research purposes.
*Comment:* A few commenters asserted that the final rule should
eliminate the possibility that research requiring access to protected
health information could be determined to be "exempt" from IRB review,
as provided by the Common Rule (§ \_\_\_.101(b)(4)).
*Response:* The rule did not propose nor intend to modify any aspect of
the Common Rule, including the provision that exempts from coverage,
"research involving the collection or study of existing data, documents,
records, pathological specimens, or diagnostic specimens, if these
sources are publically available, or if the information is recorded by
the investigator in such a manner that subjects cannot be identified,
directly or indirectly through identifiers linked to the subjects" (§
\_\_\_.101(b)(4)). For the reasons discussed above, we have included a
provision in the final rule for reviews preparatory to research that was
modeled on this exemption to the Common Rule.
***Deceased Persons Exception for Research***
*Comment:* A few commenters expressed support for the proposal to allow
use and disclosure of protected health information about decedents for
research purposes without the protections afforded to the protected
health information of living individuals. One commenter, for example,
explained that it extensively uses such information in its research, and
any restrictions were likely to impede its efforts. Alternately, a
number of commenters provided arguments for eliminating the research
exception for deceased persons. They commented that the same concerns
regarding use and disclosure of genetic and hereditary information for
other purposes apply in the research context. They believed that in many
cases the risk of identification was greater in the research context
because researchers may attempt to identify genetic and hereditary
conditions of the deceased. Finally, they argued that while information
of the deceased does not necessarily identify living relatives by name,
living relatives could be identified and suffer the same harm as if
their own medical records were used or disclosed for research purposes.
Another commenter stated that the exception was unnecessary, and that
existing research could and should proceed under the requirements in
proposed § 164.510 that dictated the IRB/privacy board approval process
or be conducted using de-identified information. This commenter further
stated that in this way, at least there would be some degree of
assurance that all reasonable steps are taken to protect deceased
persons' and their families' confidentiality.
*Response:* Although we understand the concerns raised by commenters, we
believe those concerns are outweighed by the need to keep the
research-related policies in this rule as consistent as possible with
standard research practice under the Common Rule, which does not
consider deceased persons to be "human subjects." Thus, we retain the
exception in the final rule. With regard to the protected health
information about a deceased individual, therefore, a covered entity is
permitted to use or disclose such information for research purposes
without obtaining authorization from a personal representative and
absent approval by an IRB or privacy board as governed by § 164.512(i).
We note that the National Bioethics Advisory Committee (NBAC) is
currently considering revising the Common Rule's definition of "human
subject" with regard to coverage of the deceased. However, at this time,
NBAC's deliberations on this issue are not yet completed and any
reliance on such discussions would be premature.
The final rule requires at § 164.512(i)(1)(iii) that covered entities
obtain from the researcher (1) representation that the use or disclosure
is sought solely for research on the protected health information of
decedents; (2) documentation, at the request of the covered entity, of
the death of such individuals; and (3) representation that the protected
health information for which use or disclosure is sought is necessary
for the research purposes. It is our intention with this change to
reduce the burden and ambiguity on the part of the covered entity to
determine whether or not the request is for protected health information
of a deceased individual.
*Comment:* Some commenters, in their support of the research exception,
requested that HHS clarify in the final rule that protected health
information obtained during the donation process of eyes and eye tissue
could continue to be used or disclosed to or by eye banks for research
purposes without an authorization and without IRB approval. They
expressed concern over the impediments to this type of research these
approvals would impose, such as added administrative burden and
vulnerabilities to the time sensitive nature of the process.
Another commenter similarly expressed the position that, with regard to
uses and disclosures of protected health information for tissue, fluid,
or organ donation, the regulation should not present an obstacle to the
transfer of donations unsuitable for transplant to the research
community. However, they believed that consent can be obtained for such
purposes since the donor or donor's family must generally consent to any
transplant purposes, it would seem to be a minimal additional obligation
to seek consent for research purposes at the same time, should the
material be unsuitable for transplant.
*Response:* Protected health information about a deceased individual,
including information related to eyes and eye tissue, can be used or
disclosed further for research purposes by a covered entity in
accordance with § 164.512(i)(1)(iii) without authorization or IRB or
privacy board approval. This rule does not address whether organs
unsuitable for transplant may be transferred to researchers with or
without consent.
***Modification of the Common Rule***
*Comment*: We received a number of comments that interpreted the
proposed rule as having unnecessarily and inappropriately amended the
Common Rule. Assuming that the Common Rule was being modified, these
comments argued that the rule was legally deficient under the
Administrative Procedures Act, the Regulatory Flexibility Act, and other
controlling Executive orders or laws.
In addition, one research organization expressed concern that, by
involving IRBs in the process of approving a waiver of authorization for
disclosure purposes and establishing new criteria for such waiver
approvals, the proposed rule would have subjected covered entities whose
IRBs failed to comply with the requirements for reviewing and approving
research to potential sanctions under HIPAA. The comment recommended
that the rule be changed to eliminate such a punitive result.
Specifically, the comment recommended that the existing Common Rule
structure be preserved for IRB‑approved research, and that the waiver of
authorization criteria for privacy purposes be kept separate from the
other the functions of the IRB.
*Response:* We disagree with the comments asserting the proposed rule
attempted to change the Common Rule. It was not our intent to modify or
amend the Common Rule or to regulate the activities of the IRBs with
respect to the underlying research. We therefore reject the comments
about legal deficiencies in the rule which are based on the mistaken
perception that the Common Rule was being amended. The proposed rule
established new requirements for covered entities before they could use
or disclose protected health information for research without
authorization. The proposed rule provided that one method by which a
covered entity could obtain the necessary documentation was to receive
it from an IRB. We did not mandate IRBs to perform such reviews, and we
expressly provided for means other than through IRBs for covered
entities to obtain the required documentation.
In the final rule, we also have clarified our intent not to interfere
with existing requirements for IRBs by amending the language in the
waiver criteria to make clear that these criteria relate to the privacy
interests of the individual and are separate from the criteria that
would be applied by an IRB to any evaluation of the underlying research.
Moreover, we have restructured the final rule to also make clear that we
are regulating only the content and conditions of the documentation upon
which a covered entity may rely in making a disclosure of protected
health information for research purposes.
We cannot and do not purport to regulate IRBs or modify the Common Rule
through this regulation. We cannot under this rule penalize an IRB for
failure to comply with the Common Rule, nor can we sanction an IRB based
on the documentation requirements in the rule. Health plans and covered
health care providers may rely on documentation from an IRB or privacy
board concerning the alteration or waiver of authorization for the
disclosure of protected health information for research purposes,
provided the documentation, on its face, meets the requirements in the
rule. Health plans and covered health care providers will not be
penalized for relying on facially adequate documentation from an IRB.
Health plans and covered health providers will only be penalized for
their own errors or omissions in following the requirements of the rule,
and not those of the IRB.
***Use Versus Disclosure***
*Comment:* Many of the comments supported the proposed rule's provision
that would have imposed the same requirements for both research uses and
research disclosures of protected health information.
*Response:* We agree with these comments. In the final rule we retain
identical use and disclosure requirements for research uses and
disclosures of protected health information by covered entities.
*Comment:* In contrast, a few commenters recommended that there be fewer
requirements on covered entities for internal research uses of protected
health information.
*Response:* For the reasons discussed above in § 164.501 on the
definition of "research," we disagree that an individual's privacy
interest is of less concern when covered entities use protected health
information for research purposes than when covered entities disclose
protected health information for research purposes. Therefore, in the
final rule, the research-related requirements of § 164.512(i) apply to
both uses and disclosures of protected health information for research
purposes without authorization.
***Additional Resources for IRBs***
*Comment:* A few commenters recommended that HHS work to provide
additional resources to IRBs to assist them in meeting their new
responsibilities.
*Response:* This recommendation is beyond our statutory authority under
HIPAA, and therefore, cannot be addressed by the final rule. However, we
fully agree that steps should be taken to moderate the workload of IRBs
and to ensure adequate resources for their activities. Through the
Office for Human Research Protections, the Department is committed to
working with institutions and IRBs to identify efficient ways to
optimize utilization of resources, and is committed to developing
guidelines for appropriate staffing and workload levels for IRBs.
***Additional Suggested Requirements***
*Comment:* One commenter recommended that the documentation of IRB or
privacy board approval also be required to state that, "the health
researcher has fully disclosed which of the protected health information
to be collected or created would be linked to other protected health
information, and that appropriate safeguards be employed to protect
information against re-identification or subsequent unauthorized
linkages."
*Response:* The proposed provision for the use or disclosure of
protected health information for research purposes without authorization
only pertained to individually identifiable health information.
Therefore, since the information to be obtained would be individually
identifiable, we concluded that it was illogical to require IRBs and
privacy boards document that the researcher had "fully disclosed
that\...appropriate safeguards be employed to protect information
against re-identification or subsequent unauthorized linkages."
Therefore, we did not incorporate this recommendation into the final
rule.
**Section 164.512(j)---Uses and Disclosures to Avert a Serious Threat to
Health or Safety**
*Comment:* Several commenters generally stated support for proposed §
164.510(k), which was titled "Uses and Disclosures in Emergency
Circumstances." One commenter said that "narrow exceptions to
confidentiality should be permitted for emergency situations such as
duty to warn, duty to protect, and urgent law enforcement needs."
Another commented that the standard "\...based on a reasonable belief
that the disclosures are necessary to prevent or lessen a serious and
imminent threat to the health or safety of an individual" would apply in
only narrow treatment circumstances. Some commenters suggested that the
provision be further narrowed, for example, with language specifically
identifying "imminent threats" and a "chain-of-command clearance
process," or by limiting permissible disclosures under this provision to
"public health emergencies," or "national emergencies." Others proposed
procedural requirements, such as specifying that such determinations may
only be made by the patient's treating physician, a licensed mental
health care professional, or as validated by three physicians. One
commenter recommended stating that the rule is not intended to create a
duty to warn or to disclose protected health information but rather
permits such disclosure in emergency circumstances, consistent with
other applicable legal or ethical standards.
*Response:* We agree with the commenters who noted that the proposed
provision would apply in rare circumstances. We clarify, however, that
we did not intend for the proposed provision to apply to emergency
*treatment* scenarios as discussed below. In the final rule, to avoid
confusion over the circumstances in which we intend this section to
apply, we retitle it "Uses and Disclosures to Avert a Serious Threat to
Health or Safety."
We do not believe it would be appropriate to narrow further the scope of
permissible disclosures under this section to respond to specifically
identified "imminent threats," a "public health emergency," or a
"national emergency." We believe it would be impossible to enumerate all
of the scenarios that may warrant disclosure of protected health
information pursuant to this section. Such cases may involve a small
number of people and may not necessarily involve a public health
emergency or a national emergency.
Furthermore, in response to comments arguing that the proposed provision
was too broad, we note that under both the NPRM and the final rule, we
allow but do not require disclosures in situations involving serious and
imminent threats to health or safety. Health plans and covered health
care providers may make the disclosures allowed under § 164.512(j)
consistent with applicable law and standards of ethical conduct.
As indicated in the preamble to the NPRM, the proposed approach is
consistent with statutory and case law addressing this issue. The most
well-known case on the topic is *Tarasoff v. Regents of the University
of California,* 17 Cal. 3d 425 (1976), which established a duty to warn
those at risk of harm when a therapist's patient made credible threats
against the physical safety of a specific person. The Supreme Court of
California found that the therapist involved in the case had an
obligation to use reasonable care to protect the intended victim of his
patient against danger, including warning the victim of the peril. Many
states have adopted, in statute or through case law, versions of the
*Tarasoff* duty to warn or protect. Although *Tarasoff* involved a
psychiatrist, this provision is not limited to disclosures by
psychiatrists or other mental health professionals. As stated in the
preamble of the NPRM, we clarify that § 164.512(j) is not intended to
create a duty to warn or disclose protected health information.
*Comment:* Several comments addressed the portion of proposed §
164.510(k) that would have provided a presumption of reasonable belief
to covered entities that disclosed protected health information pursuant
to this provision, when such disclosures were made in good faith, based
on credible representation by a person with apparent knowledge or
authority. Some commenters recommended that this standard be applied to
all permissible disclosures without consent or to such disclosures to
law enforcement officials.
Alternatively, a group representing health care provider management
firms believed that the proposed presumption of reasonable belief would
not have provided covered entities with sufficient protection from
liability exposure associated with improper uses or disclosures. This
commenter recommended that a general good-faith standard apply to
covered entities' decisions to disclose protected health information to
law enforcement officials. A health plan said that HHS should consider
applying the standard of reasonable belief to all uses and disclosures
that would have been allowed under proposed § 164.510. Another commenter
questioned how the good-faith presumption would apply if the information
came from a confidential informant or from a person rather than a
doctor, law enforcement official, or government official. (The NPRM
listed doctors, law enforcement officials, and other government
officials as examples of persons who may make credible representations
pursuant to this section.)
*Response:* As discussed above, this provision is intended to apply in
rare circumstances---circumstances that occur much less frequently than
those described in other parts of the rule. Due to the importance of
averting serious and imminent threats to health and safety, we believe
it is appropriate to apply a presumption of good faith to covered
entities disclosing protected health information under this section. We
believe that the extremely time-sensitive and urgent conditions
surrounding the need to avert a serious and imminent threat to the
health or safety are fundamentally different from those involved in
disclosures that may be made pursuant to other sections of the rule.
Therefore, we do not believe it would be appropriate to apply to other
sections of the rule the presumption of good faith that applies in §
164.512(j). We clarify that we intend for the presumption of good faith
to apply if the disclosure is made in good faith based upon a credible
representation by *any* person with apparent knowledge or
authority---not just by doctors, law enforcement or other government
officials. Our listing of these persons in the NPRM was illustrative
only, and it was not intended to limit the types of persons who could
make such a credible representation to a covered entity.
*Comment:* One commenter questioned under what circumstances proposed §
164.510(k) would apply instead of proposed § 164.510(f)(5), "Urgent
Circumstances," which permitted covered entities to disclose protected
health information to law enforcement officials about individuals who
are or are suspected to be victims of a crime, abuse, or other harm, if
the law enforcement official represents that the information is needed
to determine whether a violation of law by a person other than the
victim has occurred and immediate law enforcement activity that depends
upon obtaining such information may be necessary.
*Response*: First, we note that inclusion of this provision as §
164.510(f)(5)(5) was a drafting error which subsequently was clarified
in technical corrections to the NPRM. In fact, proposed § 164.510(f)(3)
addressed the identical circumstances, which in this subsection were
titled "Information about a Victim of Crime or Abuse." The scenarios
described under § 164.510(f)(3) may or may not involve serious and
imminent threats to health or safety.
Second, as discussed in the main section of the preamble to §
164.512(j), we recognize that in some situations, more than one section
of this rule potentially could apply with respect to a covered entity's
potential disclosure of protected health information. We clarify that if
a situation fits one section of the rule (e.g., § 164.512(j) on serious
and imminent threats to health or safety), health plans and covered
health care providers may disclose protected health information pursuant
to that section, regardless of whether the disclosure also could be made
pursuant to another section (e.g., §§ 164.512(f)(2) or 164.512(f)(3),
regarding disclosure of protected health information about suspects or
victims to law enforcement officials), except as otherwise stated in the
rule.
*Comment:* A state health department indicated that the disclosures
permitted under this section may be seen as conflicting with existing
law in many states.
*Response:* As indicated in the regulation text for § 164.512(j), this
section allows disclosure consistent with applicable law and standards
of ethical conduct. We do not preempt any state law that would prohibit
disclosure of protected health information in the circumstances to which
this section applies. (See Part 160, Subpart B.)
*Comment:* Many commenters stated that the rule should require that any
disclosures should not modify "duty to warn" case law or statutes.
*Response:* The rule does not affect case law or statutes regarding
"duty to warn." In § 164.512(j), we specifically permit covered entities
to disclose protected health information without authorization for the
purpose of protecting individuals from imminent threats to health and
safety, consistent with state laws and ethical obligations.
**Section 164.512(k)---Uses and Disclosures for Specialized Government
Functions**
***Military Purposes***
*Armed Forces Personnel and Veterans*
*Comment:* A few comments opposed the proposed rule's provisions on the
military, believing that they were too broad. Although acknowledging
that the Armed Forces may have legitimate needs for access to protected
health data, the commenters believed that the rule failed to provide
adequate procedural protections to individuals. A few comments said
that, except in limited circumstances or emergencies, covered entities
should be required to obtain authorization before using or disclosing
protected health information. A few comments also expressed concern over
the proposed rule's lack of specific safeguards to protect the health
information of victims of domestic violence and abuse. While the
commenters said they understood why the military needed access to health
information, they did not believe the rule would impede such access by
providing safeguards for victims of domestic violence or abuse.
*Response:* We note that the military comprises a unique society and
that members of the Armed Forces do not have the same freedoms as do
civilians. The Supreme Court held in *Goldman v. Weinberger*, 475 US 503
(1986), that the military must be able to command its members to
sacrifice a great many freedoms enjoyed by civilians and to endure
certain limits on the freedoms they do enjoy. The Supreme Court also
held in *Parker v. Levy*, 417 US 733 (1974), that the different
character of the military community and its mission required a different
application of Constitutional protections. What is permissible in the
civilian world may be impermissible in the military. We also note that
individuals entering military service are aware that they will not have,
and enjoy, the same rights as others.
The proposed rule would have authorized covered entities to use and
disclose protected health information about armed forces personnel only
for activities considered necessary by appropriate military command
authorities to assure the proper execution of the military mission. In
order for the military mission to be achieved and maintained, military
command authorities need protected health information to make
determinations regarding individuals' medical fitness to perform
assigned military duties.
The proposed rule required the Department of Defense (DoD) to publish a
notice in the *Federal Register* identifying its intended uses and
disclosures of protected health information, and we have retained this
approach in the final rule. This notice will serve to limit command
authorities' access to protected health information to circumstances in
which disclosure of protected health information is necessary to assure
proper execution of the military mission.
With respect to comments regarding the lack of procedural safeguards for
individuals, including those who are victims of domestic violence and
abuse, we note that the rule does not provide new authority for covered
entities providing health care to individuals who are Armed Forces
personnel to use and disclose protected health information. Rather, the
rule allows the Armed Forces to use and disclose such information only
for those military mission purposes which will be published separately
in the *Federal Register*. In addition, we note that the Privacy Act of
1974, as implemented by the DoD, provides numerous protections to
individuals.
We modify the proposal to publish privacy rules for the military in the
*Federal Register*. The NPRM would have required this notice to include
information on the activities for which use or disclosure of protected
health information would occur in order to assure proper execution of
the military mission. We believe that this proposed portion of the
notice is redundant and thus unnecessary in light the rule's application
to military services. In the final rule, we eliminate this proposed
section of the notice, and we state that health plans and covered health
care providers may use and disclose protected health information of
Armed Forces personnel for activities considered necessary by
appropriate military command authorities to assure the proper execution
of a military mission, where the appropriate military authority has
published a *Federal Register* notice identifying: (1) the appropriate
military command authorities; and (2) the purposes for which protected
health information may be used or disclosed.
*Comment:* A few commenters, members of the affected beneficiary class,
which numbers approximately 2.6 million (active duty and reserve
military personnel), opposed proposed § 164.510(m) because it would have
allowed a non-governmental covered entity to provide protected health
information without authorization to the military. These commenters were
concerned that military officials could use the information as the basis
for taking action against individuals.
*Response:* The Secretary does not have the authority under HIPAA to
regulate the military's re-use or re-disclosure of protected health
information obtained from health plans and covered health care
providers. This provision's primary intent is to ensure that proper
military command authorities can obtain needed medical information held
by covered entities so that they can make appropriate determinations
regarding the individual\'s medical fitness or suitability for military
service. Determination that an individual is not medically qualified for
military service would lead to his or her discharge from or rejection
for service in the military. Such actions are necessary in order for the
Armed Forces to have medically qualified personnel, ready to perform
assigned duties. Medically unqualified personnel not only jeopardize the
possible success of a mission, but also pose an unacceptable risk or
danger to others. We have allowed such uses and disclosures for military
activities because it is in the Nation's interest.
*Separation or Discharge from Military Service*
*Comment:* The preamble to the NPRM solicited comments on the proposal
to permit the DoD to transfer, without authorization, a service
member\'s military medical record to the Department of Veterans Affairs
(DVA) when the individual completed his or her term of military service.
A few commenters opposed the proposal, believing that authorization
should be obtained. Both the DoD and the DVA supported the proposal,
noting that transfer allows the DVA to make timely determinations as to
whether a veteran is eligible for benefits under programs administered
by the DVA.
*Response:* We note that the transfer program was established based on
recommendations by Congress, veterans groups, and veterans; that it has
existed for many years; and that there has been no objection to, or
problems associated with, the program. We also note that the Department
of Transportation (DoT) and the Department of Veterans Affairs operate
an analogous transfer program with respect to United States Coast Guard
personnel, who comprise part of the U.S. Armed Forces. The protected
health information involved the DoD/DVA transfer program is being
disclosed and used for a limited purpose that directly benefits the
individual. This information is covered by, and thus subject to the
protections of, the Privacy Act. For these reasons, the final rule
retains the DoD/DVA transfer program proposed in the NPRM. In addition,
we expand the NPRM's proposed provisions regarding the Department of
Veterans Affairs to include the DoT/DVA program, to authorize the
continued transfer of these records.
*Comment:* The Department of Veterans Affairs supported the NPRM's
proposal to allow it to use and disclose protected health information
among components of the Department so that it could make determinations
on whether an individual was entitled to benefits under laws
administered by the Department. Some commenters said that the
permissible disclosure pursuant to this section appeared to be
sufficiently narrow in scope, to respond to an apparent need. Some
commenters also said that the DVA's ability to make benefit
determinations would be hampered if an individual declined to authorize
release of his or her protected health information. A few commenters,
however, questioned whether such an exchange of information currently
occurs between the components. A few commenters also believed the
proposed rule should be expanded to permit sharing of information with
other agencies that administer benefit programs.
*Response:* The final rule retains the NPRM's approach regarding use and
disclosure of protected health information without authorization among
components of the DVA for the purpose of making eligibility
determinations based on commenters' assessment that the provision was
narrow in scope and that an alternative approach could negatively affect
benefit determinations for veterans. We modify the NPRM language
slightly, to clarify that it refers to a health plan or covered health
care provider that is a component of the DVA. These component entities
may use or disclose protected health information without authorization
among various components of the Department to determine eligibility for
or entitlement to veterans' benefits. The final rule does not expand the
scope of permissible disclosures under this provision to allow the DVA
to share such information with other agencies. Other agencies may obtain
this information only with authorization, subject to the requirements of
§ 164.508.
*Foreign Military Personnel*
*Comments:* A few comments opposed the exclusion of foreign diplomatic
and military personnel from coverage under the rule. These commenters
said that the mechanisms that would be necessary to identify these
personnel for the purpose of exempting them from the rule's standards
would create significant administrative difficulties. In addition, they
believed that this provision would have prohibited covered entities from
making disclosures allowed under the rule. Some commenters were
concerned that implementation of the proposed provision would result in
disparate treatment of foreign military and diplomatic personnel with
regard to other laws, and that it would allow exploitation of these
individuals' health information. These commenters believed that the
proposed rule's exclusion of foreign military and diplomatic personnel
was unnecessarily broad and that it should be narrowed to meet a
perceived need. Finally, they noted that the proposed exclusion could be
affected by the European Union\'s Data Protection Directive.
*Response:* We agree with the commenters' statement that the NPRM's
exclusion of foreign military and diplomatic personnel from the rule's
provisions was overly broad. Thus, the final rule's protections apply to
these personnel. The rule covers foreign military personnel under the
same provisions that apply to all other members of the U.S. Armed
Forces, as described above. Foreign military authorities need access to
protected health information for the same reason as must United States
military authorities: to ensure that members of the armed services are
medically qualified to perform their assigned duties. Under the final
rule, foreign diplomatic personnel have the same protections as other
individuals.
*Intelligence Community*
*Comments:* A few commenters opposed the NPRM's provisions regarding
protected health information of intelligence community employees and
their dependents being considered for postings overseas, on the grounds
that the scope of permissible disclosure without authorization was too
broad. While acknowledging that the intelligence community may have
legitimate needs for its employees' protected health information, the
commenters believed that the NPRM failed to provide adequate procedural
protections for the employees' information. A few comments also said
that the intelligence community should be able to obtain their
employees' health information only with authorization. In addition,
commenters said that the intelligence community should make disclosure
of protected health information a condition of employment.
*Response:* Again, we agree that the NPRM's provision allowing
disclosure of the protected health information of intelligence community
employees without authorization was overly broad. Thus we eliminate it
in the final rule. The intelligence community can obtain this
information with authorization (pursuant to § 164.508), for example,
when employees or their family members are being considered for an
oversees assignment and when individuals are applying for employment
with or seeking a contract from an intelligence community agency.
***National Security and Intelligence Activities and Protective Services
for the President and Others***
*Comment:* A number of comments opposed the proposed \"intelligence and
national security activities\" provision of the law enforcement section
(§ 164.510(f)(4)), suggesting that it was overly broad. These commenters
were concerned that the provision lacked sufficient procedural
safeguards to prevent abuse of protected health information. The Central
Intelligence Agency (CIA) and the Department of Defense (DoD) also
expressed concern over the provision's scope. The agencies said that if
implemented as written, the provision would have failed to accomplish
fully its intended purpose of allowing the disclosure of protected
health information to officials carrying out intelligence and national
security activities other than law enforcement activities. The CIA and
DoD believed that the provision should be moved to another section of
the rule, possibly to proposed § 164.510(m) on specialized classes, so
that authorized intelligence and national security officials could
obtain individuals' protected health information without authorization
when lawfully engaged in intelligence and national security activities.
*Response:* In the final rule, we clarify that this provision does not
provide new authority for intelligence and national security officials
to acquire health information that they otherwise would not be able to
obtain. Furthermore, the rule does not confer new authority for
intelligence, national security, or Presidential protective service
activities. Rather, the activities permissible under this section are
limited to those authorized under current law and regulation (e.g., for
intelligence activities, 50 U.S.C. 401, *et seq.*, Executive Order
12333, and agency implementing regulatory authorities). For example, the
provision regarding national security activities pertains only to
foreign persons that are the subjects of legitimate and lawful
intelligence, counterintelligence, or other national security
activities. In addition, the provision regarding protective services
pertains only to those persons who are the subjects of legitimate
investigations for threatening or otherwise exhibiting an inappropriate
direction of interest toward U.S. Secret Service protectees pursuant to
18 U.S.C. 871, 879, and 3056. Finally, the rule leaves intact the
existing State Department regulations that strictly limit the disclosure
of health information pertaining to employees (e.g., Privacy Issuances
at State-24 Medical Records).
We believe that because intelligence/national security activities and
Presidential/other protective service activities are discrete functions
serving different purposes, they should be treated consistently but
separately under the rule. For example, medical information is used as a
complement to other investigative data that are pertinent to conducting
comprehensive threat assessment and risk prevention activities pursuant
to 18 U.S.C. 3056. In addition, information on the health of world
leaders is important for the provision of protective services and other
functions. Thus, § 164.512(k) of the final rule includes separate
subsections for national security/intelligence activities and for
disclosures related to protective services to the President and others.
We note that the rule does not require or compel a health plan or
covered health care provider to disclose protected health information.
Rather, two subsections of § 164.512(k) allow covered entities to
disclose information for intelligence and national security activities
and for protective services to the President and others only to
authorized federal officials conducting these activities, when such
officials are performing functions authorized by law.
We agree with DoD and CIA that the NPRM, by including these provisions
in the law enforcement section (proposed § 164.510(f)), would have
allowed covered entities to disclose protected health information for
national security, intelligence, and Presidential protective activities
only to law enforcement officials. We recognize that many officials
authorized by law to carry out intelligence, national security, and
Presidential protective functions are not law enforcement officials.
Therefore, the final rule allows covered entities to disclose protected
health information pursuant to this provision not only to law
enforcement officials, but to all federal officials authorized by law to
carry out the relevant activities. In addition, we remove this provision
from the law enforcement section and include it in § 164.512(k) on uses
and disclosures for specialized government functions
***Medical Suitability Determinations***
*Comment:* A few comments opposed the NPRM's provision allowing the
Department of State to use protected health information for medical
clearance determinations. These commenters believed that the scope of
permissible disclosures under the proposed provision was too broad.
While acknowledging that the Department may have legitimate needs for
access to protected health data, the commenters believed that
implementation of the proposed provision would not have provided
adequate procedural safeguards for the affected State Department
employees. A few comments said that the State Department should be able
to obtain protected health information for medical clearance
determinations only with authorization. A few comments also said that
the Department should be able to disclose such information only when
required for national security purposes. Some commenters believed that
the State Department should be subject to the *Federal Register* notice
requirement that the NPRM would have applied to the Department of
Defense. A few comments also opposed the proposed provision on the basis
that it would conflict with the Rehabilitation Act of 1973 or that it
appeared to represent an invitation to discriminate against individuals
with mental disorders.
*Response*: We agree with commenters who believed that the NPRM's
provision regarding the State Department's use of protected health
information without authorization was unnecessarily broad. Therefore, in
the final rule, we restrict significantly the scope of protected health
information that the State Department may use and disclose without
authorization. First, we allow health plans and covered health care
providers that are a component of the State Department to use and
disclose protected health information without authorization when making
medical suitability determinations for security clearance purposes. For
the purposes of a security investigation, these components may disclose
to authorized State Department officials whether or not the individual
was determined to be medically suitable. Furthermore, we note that the
rule does not confer authority on the Department to disclose such
information that it did not previously possess. The Department remains
subject to applicable law regarding such disclosures, including the
Rehabilitation Act of 1973.
The preamble to the NPRM solicited comment on whether there was a need
to add national security determinations under Executive Order 10450 to
the rule's provision on State Department uses and disclosures of
protected health information for security determinations. While we did
not receive comment on this issue, we believe that a limited addition is
warranted and appropriate. Executive Orders 10450 and 12968 direct
Executive branch agencies to make certain determinations regarding
whether their employees' access to classified information is consistent
with the national security interests of the United States. Specifically,
the Executive Orders state that access to classified information shall
be granted only to those individuals whose personal and professional
history affirmatively indicates, *inter alia*, strength of character,
trustworthiness, reliability, and sound judgment. In reviewing the
personal history of an individual, Executive branch agencies may
investigate and consider any matter, including a mental health issue or
other medical condition, that relates directly to any of the enumerated
factors.
In the vast majority of cases, Executive agencies require their security
clearance investigators to obtain the individual's express consent in
the form of a medical release, pursuant to which the agency can conduct
its background investigation and obtain any necessary health
information. This rule does not interfere with agencies' ability to
require medical releases for purposes of security clearances under these
Executive Orders.
In the case of the Department of State, however, it may be impracticable
or infeasible to obtain an employee's authorization when exigent
circumstances arise overseas. For example, when a Foreign Service
Officer is serving at an overseas post and he or she develops a critical
medical problem which may or may not require a medical evacuation or
other equally severe response, the Department's medical staff have
access to the employee's medical records for the purpose of making a
medical suitability determination under Executive Orders 10450 and
12968. To restrict the Department's access to information at such a
crucial time due to a lack of employee authorization leaves the
Department no option but to suspend the employee's security clearance.
This action automatically would result in an immediate forced departure
from post, which negatively would affect both the Department, due to the
unexpected loss of personnel, and the individual, due to the fact that a
forced departure can have a long-term impact on his or her career in the
Foreign Service.
For this reason, the rule contains a limited security clearance
exemption for the Department of State. The exemption allows the
Department's own medical staff to continue to have access to an
employee's medical file for the purpose of making a medical suitability
determination for security purposes. The medical staff can convey a
simple "yes" or "no" response to those individuals conducting the
security investigation within the Department. In this way, the
Department is able to make security determinations in exigent
circumstances without disclosing any specific medical information to any
employees other than the medical personnel who otherwise have routine
access to these same medical records in an everyday non-security
context.
Second, and similarly, the final rule establishes a similar system for
disclosures of protected health information necessary to determine
worldwide availability or availability for mandatory service abroad
under Sections 101(a)(4) and 504 of the Foreign Service Act. The Act
requires that Foreign Service members be suitable for posting throughout
the world and for certain specific assignments. For this reason, we
permit a limited exemption to serve the purposes of the statute. Again,
the medical staff can convey availability determinations to State
Department officials who need to know if certain Foreign Service members
are available to serve at post.
Third, and finally, the final rule recognizes the special statutory
obligations that the State Department has regarding family members of
Foreign Service members under Sections 101(b)(5) and 904 of the Foreign
Service Act. Section 101(b)(5) of the Foreign Service Act requires the
Department of State to mitigate the impact of hardships, disruptions,
and other unusual conditions on families of Foreign Service Officers.
Section 904 requires the Department to establish a health care program
to promote and maintain the physical and mental health of Foreign
Service member family members. The final rule permits disclosure of
protected health information to officials who need protected health
information to determine whether a family member can accompany a Foreign
Service member abroad.
Given the limited applicability of the rule, we believe it is not
necessary for the State Department to publish a notice in the *Federal
Register* to identify the purposes for which the information may be used
or disclosed. The final rule identifies these purposes, as described
above.
***Correctional Institutions***
Comments about the rule's application to correctional institutions are
addressed in § 164.501, under the definition of "individual."
**Section 164.512(l)---Disclosures for Workers' Compensation**
*Comment*: Several commenters stated that workers' compensation carriers
are excepted under the HIPAA definition of group health plan and
therefore we have no authority to regulate them in this rule. These
commenters suggested clarifying that the provisions of the proposed rule
did not apply to certain types of insurance entities, such as workers'
compensation carriers, and that such non-covered entities should have
full access to protected health information without meeting the
requirements of the rule. Other commenters argued that a complete
exemption for workers' compensation carriers was inappropriate.
*Response*: We agree with commenters that the proposed rule did not
intend to regulate workers' compensation carriers. In the final rule we
have incorporated a provision that clarifies that the term "health plan"
excludes "any policy, plan, or program to the extent that it provides,
or pays for the cost of, excepted benefits as defined in section
2791(c)(1) of the PHS Act." See discussion above under the definition of
"health plan" in § 164.501.
*Comment*: Some commenters argued that the privacy rule should defer to
other laws that regulate the disclosure of information to employers and
workers' compensation carriers. They commented that many states have
laws that require sharing of information - without consent - between
providers and employers or workers' compensation carriers.
*Response*: We agree that the privacy rule should permit disclosures
necessary for the administration of state and other workers'
compensation systems. To assure that workers' compensations systems are
not disrupted, we have added a new provisions to the final rule. The new
§ 164.512(l) permits covered entities to disclose protected health
information as authorized by and to the extent necessary to comply with
workers' compensation or other similar programs established by law that
provide benefits for work-related injuries or illnesses without regard
to fault. We also note that where a state or other law requires a use or
disclosure of protected health information under a workers' compensation
or similar scheme, the disclosure would be permitted under § 164.512(a).
*Comment*: Several commenters stated that if workers' compensation
carriers are to receive protected health information, they should only
receive the minimum necessary as required in § 164.514. The commenters
argued that employers and workers' compensation carriers should not have
access to the entire medical history or portions of the medical history
that have nothing to do with the injury in question. Further, the
covered provider and not the employer or carrier should determine
minimum necessary since the provider is a covered entity and only
covered entities are subject to sanctions for violations of the rule.
These commenters stated that the rule should clearly indicate the
ability of covered entities to refuse to disclose protected health
information if it went beyond the scope of the injury. Workers'
compensation carriers, on the other hand, argued that permitting
providers to determine the minimum necessary was inappropriate because
determining eligibility for benefits is an insurance function, not a
medical function. They stated that workers' compensation carriers need
access to the full range of information regarding treatment for the
injury underlying the claim, the claimants' current condition, and any
preexisting conditions that can either mitigate the claim or aggravate
the impact of the injury.
*Response*: Under the final rule, covered entities must comply with the
minimum necessary provisions unless the disclosure is required by law.
Our review of state workers' compensation laws suggests that many of
these laws address the issue of the scope of information that is
available to carriers and employers. The rule permits a provider to
disclose information that is authorized by such a law to the extent
necessary to comply with such law. Where the law is silent, the workers'
compensation carrier and covered health care provider will need to
discuss what information is necessary for the carrier to administer the
claim, and the health care provider may disclose that information. We
note that if the workers' compensation insurer has secured an
authorization from the individual for the release of protected health
information, the covered entity may release the protected health
information described in the authorization.
**SECTION 164.514 REQUIREMENTS FOR USES AND DISCLOSURES**
**Section 164.514(a)-(c)---De-identification**
***General Approach***
*Comments:* The comments on this topic almost unanimously supported the
concept of de-identification and efforts to expand its use. Although a
few comments suggested deleting one of the proposed methods or the
other, most appeared to support the two method approach for entities
with differing levels of statistical expertise.
Many of the comments argued that the standard for creation of
de-identified information should be whether there is a \"reasonable
basis to believe\" that the information has been de-identified. Others
suggested that the "reasonable basis" standard was too vague.
A few commenters suggested that we consider information to be
de-identified if all personal identifiers that directly reveal the
identity of the individual or provide a direct means of identifying
individuals have been removed, encrypted or replaced with a code.
Essentially, this recommendation would require only removal of "direct"
identifiers (e.g., name, address, and ID numbers) and allow retention of
all \"indirect\" identifiers (e.g., zip code and birth date) in
"de-identified" information. These comments did not suggest a list or
further definition of what identifiers should be considered \"direct\"
identifiers.
Some commenters suggested that the standard be modified to reflect a
single standard that applies to all covered entities in the interest of
reducing uncertainty and complexity. According to these comments, the
standard for covered entities to meet for de-identification of protected
health information should be generally accepted standards in the
scientific and statistical community, rather than focusing on a
specified list of identifiers that must be removed.
A few commenters believed that no record of information about an
individual can be truly de-identified and that all such information
should be treated and protected as identifiable because more and more
information about individuals is being made available to the public,
such as voter registration lists and motor vehicle and driver\'s license
lists, that would enable someone to match (and identify) records that
otherwise appear to be not identifiable.
*Response:* In the final rule, we reformulate the method for
de-identification to more explicitly use the statutory standard of \"a
reasonable basis to believe that the information can be used to identify
the individual\"-- just as information is "individually identifiable" if
there is a reasonable basis to believe that it can be used to identify
the individual, it is "de-identified" if there is no reasonable basis to
believe it can be so used. We also define more precisely how the
standard should be applied.
We did not accept comments that suggested that we allow only one method
of de-identifying information. We find support for both methods in the
comments but find no compelling logic for how the competing interests
could be met cost-effectively with only one method.
We also disagree with the comments that advocated using a standard which
required removing only the direct identifiers. Although such an approach
may be more convenient for covered entities, we judged that the
resulting information would often remain identifiable, and its
dissemination could result in significant violations of privacy. While
we encourage covered entities to remove direct identifiers whenever
possible as a method of enhancing privacy, we do not believe that the
resulting information is sufficiently blinded as to permit its general
dissemination without the protections provided by this rule.
We agree with the comments that said that records of information about
individuals cannot be truly de-identified, if that means that the
probability of attribution to an individual must be absolutely zero.
However, the statutory standard does not allow us to take such a
position, but envisions a reasonable balance between risk of
identification and usefulness of the information.
We disagree with those comments that advocated releasing only truly
anonymous information (which has been changed sufficiently so that it no
longer represents actual information about real individuals) and those
that supported using only sophisticated statistical analysis before
allowing uncontrolled disclosures. Although these approaches would
provide a marginally higher level of privacy protection, they would
preclude many of the laudable and valuable uses discussed in the NPRM
(in § 164.506(d)) and would impose too great a burden on less
sophisticated covered entities to be justified by the small decrease in
an already small risk of identification.
We conclude that compared to the alternatives advanced by the comments,
the approach
proposed in the NPRM, as refined and modified below in response to the
comments, most closely meets the intent of the statute.
*Comments:* A few comments complained that the proposed standards were
so strict that they would expose covered entities to liability because
arguably no information could ever be de-identified.
*Response:* In the final rule we have modified the mechanisms by which a
covered entity may demonstrate that it has complied with the standard in
ways that provide greater certainty. In the standard method for
de-identification, we have clarified the professional standard to be
used, and anticipate issuing further guidance for covered entities to
use in applying the standard. In the safe harbor method, we reduced the
amount of judgment that a covered entity must apply. We believe that
these mechanisms for de-identification are sufficiently well-defined to
protect covered entities that follow them from undue liability.
*Comments:* Several comments suggested that the rule prohibit any
linking of de-identified data, regardless of the probability of
identification.
*Response:* Since our methods of de-identification include consideration
of how the information might be used in combination with other
information, we believe that linking de-identified information does not
pose a significantly increased risk of privacy violations. In addition,
since our authority extends only to the regulation of individually
identifiable health information, we cannot regulate de-identified
information because it no longer meets the definition of individually
identifiable health information. We also have no authority to regulate
entities that might receive and desire to link such information yet that
are not covered entities; thus such a prohibition would have little
protective effect.
*Comments:* Several commenters suggested that we create incentives for
covered entities to use de-identified information. One commenter
suggested that we mandate an assessment to see if de-identified
information could be used before the use or disclosure of identified
information would be allowed.
*Response*: We believe that this final rule establishes a reasonable
mechanism for the creation of de-identified information and the fact
that this de-identified information can be used without having to follow
the policies, procedures, and documentation required to use individually
identifiable health information should provide an incentive to encourage
its use where appropriate. We disagree with the comment suggesting that
we require an assessment of whether de-identified information could be
used for each use or disclosure. We believe that such a requirement
would be too burdensome on covered entities, particularly with respect
to internal uses, where entire records are often used by medical and
other personnel. For disclosures, we believe that such an assessment
would add little to the protection provided by the minimum necessary
requirements in this final rule.
*Comments:* One commenter asked if de-identification was equivalent to
destruction of the protected health information (as required under
several of the provisions of this final rule).
*Response*: The process of de-identification creates a new dataset in
addition to the source dataset containing the protected health
information. This process does not substitute for actual destruction of
the source data.
***Modifications to the Proposed Standard for De-identification***
*Comments:* Several commenters called for clarification of proposed
language in the NPRM that would have permitted a covered entity to treat
information as de-identified, even if specified identifiers were
retained, as long as the probability of identifying subject individuals
would be very low. Commenters expressed concern that the "very low"
standard was vague. These comments expressed concern that covered
entities would not have a clear and easy way to know when information
meets this part of the standard.
*Response*: We agree with the comments that covered entities may need
additional guidance on the types of analyses that they should perform in
determining when the probability of re-identification of information is
very low. We note that in the final rule, we reformulate the standard
somewhat to require that a person with appropriate knowledge and
experience apply generally accepted statistical and scientific methods
relevant to the task to make a determination that the risk of
re-identification is very small. In this context, we do not view the
difference between a very low probability and a very small risk to be
substantive. After consulting representatives of the federal agencies
that routinely de-identify and anonymize information for public
release[^16], we attempt here to provide some guidance for the method of
de-identification.
As requested by some commenters, we include in the final rule a
requirement that covered entities (not following the safe harbor
approach) apply generally accepted statistical and scientific principles
and methods for rendering information not individually identifiable when
determining if information is de-identified. Although such guidance will
change over time to keep up with technology and the current availability
of public information from other sources, as a starting point the
Secretary approves the use of the following as guidance to such
generally accepted statistical and scientific principles and methods:
\(1\) *Statistical Policy Working Paper 22 ‑ Report on Statistical
Disclosure Limitation Methodology*
([http://www.fcsm.gov/working‑papers/wp22.html]{.underline}) (prepared
by the Subcommittee on Disclosure Limitation Methodology, Federal
Committee on Statistical Methodology, Office of Management and Budget)
and
\(2\) the *Checklist on Disclosure Potential of Proposed Data Releases*
([http://www.fcsm.gov/docs/checklist_799.doc]{.underline}) (prepared by
the Confidentiality and Data Access Committee, Federal Committee on
Statistical Methodology, Office of Management and Budget).
We agree with commenters that such guidance will need to be updated over
time and we will provide such guidance in the future.
According to the *Statistical Policy Working Paper 22*, the two main
sources of disclosure risk for de-identified records about individuals
are the existence of records with very unique characteristics (e.g.,
unusual occupation or very high salary or age) and the existence of
external sources of records with matching data elements which can be
used to link with the de-identified information and identify individuals
(e.g., voter registration records or driver\'s license records). The
risk of disclosure increases as the number of variables common to both
types of records increases, as the accuracy or resolution of the data
increases, and as the number of external sources increases. As outlined
in *Statistical Policy Working Paper 22*, an expert disclosure analysis
would also consider the probability that an individual who is the target
of an attempt at re-identification is represented on both files, the
probability that the matching variables are recorded identically on the
two types of records, the probability that the target individual is
unique in the population for the matching variables, and the degree of
confidence that a match would correctly identify a unique person.
*Statistical Policy Working Paper 22* also describes many techniques
that can be used to reduce the risk of disclosure that should be
considered by an expert when de-identifying health information. In
addition to removing all direct identifiers, these include the obvious
choices based on the above causes of the risk; namely, reducing the
number of variables on which a match might be made and limiting the
distribution of the records through a \"data use agreement\" or
\"restricted access agreement\" in which the recipient agrees to limits
on who can use/receive the data. The techniques also include more
sophisticated manipulations: recoding variables into fewer categories to
provide less precise detail (including rounding of continuous
variables); setting top-codes and bottom-codes to limit details for
extreme values; disturbing the data by adding noise by swapping certain
variables between records, replacing some variables in random records
with mathematically imputed values or averages across small random
groups of records, or randomly deleting or duplicating a small sample of
records; and replacing actual records with synthetic records that
preserve certain statistical properties of the original data.
***Modifications to the "Safe Harbor"***
*Comments:* Many commenters argued that stripping all 19 identifiers is
unnecessary for purposes of de-identification. They felt that such items
as zip code, city (or county), and birth date, for example, do not
identify the individual and only such identifiers as name, street
address, phone numbers, fax numbers, email, Social Security number,
driver's license number, voter registration number, motor vehicle
registration, identifiable photographs, finger prints, voice prints, web
universal resource locator, and Internet protocol address number need to
be removed to reasonably believe that data has been de-identified.
Other commenters felt that removing the full list of identifiers would
significantly reduce the usefulness of the data. Many of these comments
focused on research and, to a lesser extent, marketing and undefined
"statistical analysis." Commenters who represented various industries
and research institutions expressed concern that they would not be able
to continue current activities such as development of service provider
networks, conducting "analysis" on behalf of the plan, studying use of
medication and medical devices, community studies, marketing and
strategic planning, childhood immunization initiatives, patient
satisfaction surveys, and solicitation of contributions. The
requirements in the NPRM to strip off zip code and date of birth were of
particular concern. These commenters stated that their ability to do
research and quality analysis with this data would be compromised
without access to some level of information about patient age and/or
geographic location.
*Response:* While we understand that removing the specified identifiers
may reduce the usefulness of the resulting data to third parties, we
remain convinced by the evidence found in the MIT study that we referred
to in the preamble to the proposed rule[^17] and the analyses discussed
below that there remains a significant risk of identification of the
subjects of health information from the inclusion of indirect
identifiers such as birth date and zip code and that in many cases there
will be a reasonable basis to believe that such information remains
identifiable. We note that a covered entity not relying on the safe
harbor may determine that information from which sufficient other
identifiers have been removed but which retains birth date or zip code
is not reasonably identifiable. As discussed above, such a determination
must be made by a person with appropriate knowledge and expertise
applying generally accepted statistical and scientific methods for
rendering information not identifiable.
Although we have determined that all of the specified identifiers must
be removed before a covered entity meets the safe harbor requirements,
we made modifications in the final rule to the specified identifiers on
the list to permit some information about age and geographic area to be
retained in de-identified information.
For age, we specify that, in most cases, year of birth may be retained,
which can be combined with the age of the subject to provide sufficient
information about age for most uses. After considering current and
evolving practices and consulting with federal experts on this topic,
including members of the Confidentiality and Data Access Committee of
the Federal Committee on Statistical Methodology, Office of Management
and Budget, we concluded that in general, age is sufficiently broad to
be allowed in de-identified information, although all dates that might
be directly related to the subject of the information must be removed or
aggregated to the level of year to prevent deduction of birth dates.
Extreme ages \-- 90 and over \-- must be aggregated further (to a
category of 90+, for example) to avoid identification of very old
individuals (because they are relatively rare). This reflects the
minimum requirement of the current recommendations of the Bureau of the
Census.[^18] For research or other studies relating to young children or
infants, we note that the rule would not prohibit age of an individual
from being expressed as an age in months, days, or hours.
For geographic area, we specify that the initial three digits of zip
codes may be retained for any three-digit zip code that contains more
than 20,000 people as determined by the Bureau of the Census. As
discussed more below, there are currently only 18 three-digit zip codes
containing fewer than 20,000 people. We note that this number may change
when information from the 2000 Decennial Census is analyzed.
In response to concerns expressed in the comments about the need for
information on geographic area, we investigated the potential of
allowing 5-digit zip codes or 3-digit zip codes to remain in the
de-identified information. According to 1990 Census data, the
populations in geographical areas delineated by 3-digit zip codes vary a
great deal, from a low of 394 to a high of 3,006,997, with an average
size of 282,304. There are two 3-digit zip codes containing fewer than
500 people and six 3-digit zip codes containing fewer than 10,000 people
each.[^19] Of the total of 881 3-digit zip codes, there are 18 with
fewer than 20,000 people, 71 with fewer than 50,000 people, and 215
containing fewer than 100,000 population. We also looked at two-digit
zip codes (the first 2 digits of the 5-digit zip code) and found that
the smallest of the 98 2-digit zip codes contains 188,638 people.
We also investigated the practices of several other federal agencies
which are mandated by Congress to release data from national surveys
while preserving confidentiality and which have been dealing with these
issues for decades. The problems and solutions being used by these
agencies are laid out in detail in the *Statistical Policy Working Paper
22* cited earlier.
To protect the privacy of individuals providing information to the
Bureau of Census, the Bureau has determined that a geographical region
must contain at least 100,000 people.[^20] This standard has been used
by the Bureau of the Census for many years and is supported by
simulation studies using Census data.[^21] These studies showed that
after a certain point, increasing the size of a geographic area does not
significantly decrease the percentage of unique records (i.e., those
that could be identified if sampled), but that the point of diminishing
returns is dependent on the number and type of demographic variables on
which matching might occur. For a small number of demographic variables
(6), this point was quite low (about 20,000 population), but it rose
quickly to about 50,000 for 10 variables and to about 80,000 for 15
variables. The Bureau of the Census releases sets of data to the public
that it considers safe from re-identification because it limits
geographical areas to those containing at least 100,000 people and
limits the number and detail of the demographic variables in the data.
At the point of approximately 100,000 population, 7.3% of records were
unique (and therefore potentially identifiable) on 6 demographic
variables from the 1990 Census Short Form: age in years (90 categories),
race (up to 180 categories), sex (2 categories), relationship to
householder (14 categories), Hispanic (2 categories), and tenure (owner
vs. renter in 5 categories). Using 6 variables derived from the Long
Form data, age (10 categories), race (6 categories), sex (2 categories),
marital status (5 categories), occupation (54 categories), and personal
income (10 categories), raised the percentage to 9.8%.
We also examined the results of an NCHS simulation study using national
survey data[^22] to see if some scientific support could be found for a
compromise. The study took random samples from populations of different
sizes and then compared the samples to the whole population to see how
many records were identifiable, that is, matched uniquely to a unique
person in the whole population on the basis of 9 demographic variables:
age (85 categories), race (4 categories), gender (2 categories),
ethnicity (2 categories), marital status (3 categories), income (3
categories), employment status (2 categories), working class (4
categories), and occupation (42 categories). Even when some of the
variables are aggregated or coded, from the perspective of a large
statistical agency desiring to release data to the public, the study
concluded that a population size of 500,000 was not sufficient to
provide a reasonable guarantee that certain individuals could not be
identified. About 2.5 % of the sample from the population of 500,000 was
uniquely identifiable, regardless of sample size. This percentage rose
as the size of the population decreased, to about 14% for a population
of 100,000 and to about 25% for a population of 25,000. Eliminating the
occupation variable (which is less likely to be found in health data)
reduced this percentage significantly to about 0.4 %, 3%, and 10%
respectively. These percentages of unique records (and thus the
potentials for re-identification) are highly dependent on the number of
variables (which must also be available in other databases which are
identified to be considered in a disclosure risk analysis), the
categorical breakdowns of those variables, and the level of geographic
detail included.
With respect to how we might clarify the requirement to achieve a \"low
probability\" that information could be identified, the *Statistical
Policy Working Paper 22* referenced above discusses the attempts of
several researchers to define mathematical measures of disclosure risk
only to conclude that \"more research into defining a computable measure
of risk is necessary.\" When we considered whether we could specify a
maximum level of risk of disclosure with some precision (such as a
probability or risk of identification of \< 0.01), we concluded that it
is premature to assign mathematical precision to the \"art\" of
de-identification.
After evaluating current practices and recognizing the expressed need
for some geographic indicators in otherwise de-identified databases, we
concluded that permitting geographic identifiers that define populations
of greater than 20,000 individuals is an appropriate standard that
balances privacy interests against desirable uses of de-identified data.
In making this determination, we focused on the studies by the Bureau of
Census cited above which seemed to indicate that a population size of
20,000 was an appropriate cut off if there were relatively few (6)
demographic variables in the database. Our belief is that, after
removing the required identifiers to meet the safe harbor standards, the
number of demographic variables retained in the databases will be
relatively small, so that it is appropriate to accept a relatively low
number as a minimum geographic size.
In applying this provision, covered entities must replace the (currently
18) forbidden 3-digit zip codes with zeros and thus treat them as a
single geographic area (with \> 20,000 population). The list of the
forbidden 3-digit zip codes will be maintained as part of the updated
Secretarial guidance referred to above. Currently, they are: 022, 036,
059, 102, 203, 555, 556, 692, 821, 823, 830, 831, 878, 879, 884, 893,
987, and 994. This will result in an average 3-digit zip code area
population of 287,858 which should result in an average of about 4%
unique records using the 6 variables described above from the Census
Short Form. Although this level of unique records will be much higher in
the smaller geographic areas, the actual risk of identification will be
much lower because of the limited availability of comparable data in
publically available, identified databases, and will be further reduced
by the low probability that someone will expend the resources to try to
identify records when the chance of success is so small and uncertain.
We think this compromise will meet the current need for an easy method
to identify geographic area while providing adequate protection from
re-identification. If a greater level of geographical detail is required
for a particular use, the information will have to be obtained through
another permitted mechanism or be subjected to a specific
de-identification determination as described above. We will monitor the
availability of identified public data and the concomitant
re-identification risks, both theoretical and actual, and adjust this
safe harbor in the future as necessary.
As we stated above, we understand that many commenters would prefer a
looser standard for determining when information is de-identified, both
generally and with respect to the standards for identifying geographic
area. However, because public databases (such as voter records or
driver's license records) that include demographic information about a
geographically defined population are available, a surprisingly large
percentage of records of health information that contain similar
demographic information can be identified. Although the number of these
databases seems to be increasing, the number of demographic variables
within them still appears to be fairly limited. The number of cases of
privacy violation from health records which have been identified in this
way is small to date. However, the risk of identification increases with
decreasing population size, with increasing amounts of demographic
information (both in level of detail and number of variables), and with
the uniqueness of the combination of such information in the population.
That is, an 18 year old single white male student is not at risk of
identification in a database from a large city such as New York.
However, if the database were about a small town where most of the
inhabitants were older, retired people of a specific minority race or
ethnic group, that same person might be unique in that community and
easily identified. We believe that the policy that we have articulated
reaches the appropriate balance between reasonably protecting privacy
and providing a sufficient level of information to make de-identified
databases useful.
*Comments:* Some comments noted that identifiers that accompany
photographic images are often needed to interpret the image and that it
would be difficult to use the image alone to identify the individual.
*Response:* We agree that our proposed requirement to remove all
photographic images was more than necessary. Many photographs of
lesions, for example, which cannot usually be used alone to identify an
individual, are included in health records . In this final rule, the
only absolute requirement is the removal of full-face photographs, and
we depend on the "catch-all" of "any other unique \... characteristic
\..." to pick up the unusual case where another type of photographic
image might be used to identify an individual.
*Comments:* A number of commenters felt that the proposed bar for
removal had been set too high; that the removal of these 19 identifiers
created a difficult standard, since some identifiers may be buried in
lengthy text fields.
*Response:* We understand that some of the identifiers on our list for
removal may be buried in text fields, but we see no alternative that
protects privacy. In addition, we believe that such unstructured text
fields have little or no value in a de-identified information set and
would be removed in any case. With time, we expect that such identifiers
will be kept out of places where they are hard to locate and expunge.
*Comments:* Some commenters asserted that this requirement creates a
disincentive for covered entities to de-identify data and would
compromise the Secretary's desire to see de-identified data used for a
multitude of purposes. Others stated that the 'no reason to believe'
test creates an unreasonable burden on covered entities, and would
actually chill the release of de-identified information, and set an
impossible standard.
*Response:* We recognize that the proposed standards might have imposed
a burden that could have prevented the widespread use of de-identified
information. We believe that our modifications to the final rule
discussed above will make the process less burdensome and remove some of
the disincentive. However, we could not loosen the standards as far as
many commenters wanted without seriously jeopardizing the privacy of the
subjects of the information. As discussed above, we modify the "no
reason to know" standard that was part of the safe harbor provision and
replace it in the final rule with an "actual knowledge" standard. We
believe that this change provides additional certainty to covered
entities using the safe harbor and should eliminate any chilling effect.
*Comments:* Although most commenters wanted to see data elements taken
off the list, there were a small number of commenters that wanted to see
data items added to the list. They believed that it is also necessary to
remove clinical trial record numbers, device model serial numbers, and
all proper nouns from the records.
*Response:* In response to these requests, we have slightly revised the
list of identifiers that must be removed under the safe harbor
provision. Clinical trial record numbers are included in the general
category of \"any other unique identifying number, characteristic, or
code.\" These record numbers cannot be included with de-identified
information because, although the availability of clinical trial numbers
may be limited, they are used for other purposes besides
de-identification/re-identification, such as identifying clinical trial
records, and may be disclosed under certain circumstances. Thus, they do
not meet the criteria in the rule for use as a unique record identifier
for de-identified records. Device model serial numbers are included in
\"any device identifier or serial number\" and must be removed. We
considered the request to remove all proper nouns to be very burdensome
to implement for very little increase in privacy and likely to be
arbitrary in operation, and so it is not included in the final rule.
***Re-identification***
*Comments:* One commenter wanted to know if the rule requires that
covered entities retain the ability to re-identify de-identified
information.
*Response:* The rule does not require covered entities to retain the
ability to re-identify de-identified information, but it does allow them
to retain this ability.
*Comments:* A few commenters asked us to prohibit anyone from
re-identifying de-identified health information.
*Response:* We do not have the authority to regulate persons other than
covered entities, so we cannot affect attempts by entities outside of
this rule to re-identify information. Under the rule, we permit the
covered entity that created the de-identified information to re-identify
it. However, we include a requirement that, when a unique record
identifier is included in the de-identified information, such identifier
must not be such that someone other than the covered entity could use it
to identify the individual (such as when a derivative of the
individual's name is used as the unique record identifier).
**Section 164.514(d)---Minimum Necessary**
*Comment:* A large number of commenters objected to the application of
the proposed "minimum necessary" standard for uses and disclosures of
protected health information to uses and disclosures for treatment
purposes. Some suggested that the final regulation should establish a
good faith exception or safe harbor for disclosures made for treatment.
The overwhelming majority of commenters, generally from the medical
community, argued that application of the proposed standard would be
contrary to sound medical practice, increase medical errors, and lead to
an increase in liability. Some likened the standard to a 'gag clause' in
that it limited the exchange of information critical for quality patient
care. They found the standard unworkable in daily treatment situations.
They argued that this standard would be potentially dangerous in that it
could cause practitioners to withhold information that could be
essential for later care. Commenters asserted that caregivers need to be
able to give and receive a complete picture of the patient\'s health to
make a diagnosis and develop a treatment plan.
Other commenters noted that the complexity of medicine is such that it
is unreasonable to think that anyone will know the exact parameters of
the information another caregiver will need for proper diagnosis and
treatment or that a plan will need to support quality assurance and
improvement activities. They therefore suggested that the minimum
necessary standard be applied instead as an administrative requirement.
Providers also emphasized that they already have an ethical duty to
limit the sharing of unnecessary medical information, and most already
have well-developed guidelines and practice standards in place. Concerns
were also voiced that attempts to provide the minimum necessary
information in the treatment setting would lead to multiple editions of
a record or creation of summaries that turn out to omit crucial
information resulting in confusion and error.
*Response:* In response to these concerns, we substantially revise the
minimum necessary requirements. As suggested by certain commenters, we
provide, in § 164.502(b), that disclosures of protected health
information to or requests by health care providers for treatment are
not subject to the minimum necessary standard. We also modify the
requirements for uses of protected health information. This final rule
requires covered entities to make determinations of minimum necessary
use, including use for treatment purposes, based on the role of the
person or class of workforce members rather than at the level of
specific uses. A covered entity must establish policies and procedures
that identify the types of persons who are to have access to designated
categories of information and the conditions, if any, of that access. We
establish no requirements specific to a particular use of information.
Covered entities are responsible for establishing and documenting these
policies and procedures. This approach is consistent with the argument
of many commenters that guidelines and practice standards are
appropriate means for protecting the privacy of patient information.
*Comment:* Some commenters argued that the standard should be retained
in the treatment setting for uses and disclosures pertaining to mental
health information. Some of these commenters asserted that other
providers do not need to know the mental status of a patient for
treatment purposes.
*Response:* We agree that the standard should be retained for uses of
mental health information in the treatment setting. However, we believe
that the arguments for excepting disclosures of protected health
information for treatment purposes from application of the minimum
necessary standard are also persuasive with respect to mental health
information. An individual's mental health can interact with proper
treatment for other conditions in many ways. Psychoactive medications
may have harmful interactions with drugs routinely prescribed for other
purposes; an individual's mental health history may help another health
care provider understand the individual's ability to abide by a
complicated treatment regimen. For these reasons, it is also not
reasonable to presume that, in every case, a health care provider will
not need to know an individual's mental health status to provide
appropriate treatment.
Providers' comments noted existing ethical duties to limit the sharing
of unnecessary medical information, and well-developed guidelines and
practice standards for this purpose. Under this rule, providers may use
these tools to guide their discretion in disclosing health information
for treatment.
*Comment:* Several commenters urged that covered entities should be
required to conspicuously label records to show that they are not
complete. They argued that absent such labeling, patient care could be
compromised.
*Response:* We believe that the final policy to except disclosures of
protected health information for treatment purposes from application of
the minimum necessary standard addresses these commenters' concerns.
*Comment:* Some commenters argued that the audit exception to the
minimum necessary requirements needs to be clarified or expanded,
because "audit" and "payment" are essentially the same thing.
*Response:* We eliminate this exception. The proposed exclusion of
disclosures to health plans for audit purposes is replaced with a
general requirement that covered entities must limit requests to other
covered entities for individually identifiable health information to
what is reasonably necessary for the purpose intended.
*Comment:* Many commenters argued that the proposed standard was
unworkable as applied to \"uses\" by a covered entity\'s employees,
because the proposal appeared not to allow providers to create general
policy as to the types of records that particular employees may have
access to but instead required that each decision be made
\"individually,\" which providers interpret as "case-by-case."
Commenters argued that the standard with regard to \"uses\" would be
impossible to implement and prohibitively expensive, requiring both
medical and legal input to each disclosure decision.
Some commenters recommended deletion of the minimum necessary standard
with regard to "uses." Other commenters specifically recommended
deletion of the requirement that the standard be applied on an
individual, case-by-case basis. Rather, they suggested that the covered
entity be allowed to establish general policies to meet the requirement.
Another commenter similarly urged that the standard not apply to
internal disclosures or for internal health care operations such as
quality improvement/assurance activities. The commenter recommended that
medical groups be allowed to develop their own standards to ensure that
these activities are carried out in a manner that best helps the group
and its patients.
Other commenters expressed confusion and requested clarification as to
how the standard as proposed would actually work in day-to-day
operations within an entity.
*Response:* Commenters' arguments regarding the workability of this
standard as proposed were persuasive, and we therefore make significant
modification to address these comments and improve the workability of
the standard. For all uses and many disclosures, we require covered
entities to include in their policies and procedures (see § 164.530),
which may be standard protocols, for 'minimum necessary' uses and
disclosures. We require implementation of such policies in lieu of
making the 'minimum necessary' determination for each separate use and
disclosure.
For uses, covered entities must implement policies and procedures that
restrict access to and use of protected health information based on the
specific professional roles of members of the covered entity's
workforce. The policies and procedures must identify the persons or
classes of persons in the entity's workforce who need access to
protected health information to carry out their duties and the category
or categories of protected health information to which such persons or
classes need access. These role-based access rules must also identify
the conditions, as appropriate, that would apply to such access. For
example, an institutional health care provider could allow physicians
access to all records under the condition that the viewing of medical
records of patients not under their care is recorded and reviewed. Other
health professionals' access could be limited to time periods when they
are on duty. Information available to staff who are responsible for
scheduling surgical procedures could be limited to certain data. In many
instances, use of order forms or selective copying of relevant portions
of a record may be appropriate policies to meet this requirement.
Routine disclosures also are not subject to individual review; instead,
covered entities must implement policies and procedures (which may be
standard protocols) to limit the protected health information in routine
disclosures to the minimum information reasonably necessary to achieve
the purpose of that type of disclosure. For non-routine disclosures, a
covered entity must develop reasonable criteria to limit the protected
health information disclosed to the minimum necessary to accomplish the
purpose for which disclosure is sought, and to implement procedures for
review of disclosures on an individual basis.
We modify the proposed standard to require the covered entity to make
"reasonable efforts" to meet the minimum necessary standard (not
"all"reasonable efforts, as proposed). What is reasonable will vary with
the circumstances. When it is practical to use order forms or selective
copying of relevant portions of the record, the covered entity is
required to do so. Similarly, this flexibility in the standard takes
into account the ability of the covered entity to configure its record
system to allow selective access to only certain fields, and the
practicality of organizing systems to allow this capacity. It might be
reasonable for a covered entity with a highly computerized information
system to implement a system under which employees with certain
functions have access to only limited fields in a patient records, while
other employees have access to the complete records. Such a system might
not be reasonable for a covered entity with a largely paper records
system.
Covered entities' policies and procedures must provide that disclosure
of an entire medical record will not be made except pursuant to policies
which specifically justify why the entire medical record is needed.
We believe that these modifications significantly improve the
workability of this standard. At the same time, we believe that asking
covered entities to assess their practices and establish rules for
themselves will lead to significant improvements in the privacy of
health information. See the preamble for § 164.514 for a more detailed
discussion.
*Comment:* The minimum necessary standard should not be applied to uses
and disclosures for payment or health care operations.
*Response:* Commenter's arguments for exempting these uses and
disclosures from the minimum necessary standard were not compelling. We
believe that our modifications to application of the minimum necessary
standard to internal uses of protected health information, and to
routine disclosures, address many of the concerns raised, particularly
the concerns about administrative burdens and the concerns about having
the information necessary for day-to-day operations. We do not eliminate
this standard in part because we also remain concerned that covered
entities may be tempted to disclose an entire medical record when only a
few items of information are necessary, to avoid the administrative step
of extracting the necessary information (or redacting the unnecessary
information). We also believe this standard will cause covered entities
to assess their privacy practices, give the privacy interests of their
patients and enrollees greater attention, and make improvements that
might otherwise not have been made. For this reason, the privacy
benefits of retaining the minimum necessary standard for these purposes
outweigh the burdens involved. We note that the minimum necessary
standard is tied to the purpose of the disclosure; thus, providers may
disclose protected health information as necessary to obtain payment.
*Comment*: Other commenters urged us to apply a "good faith" provision
to all disclosures subject to the minimum necessary standard. Commenters
presented a range of options to modify the proposed provisions which, in
their view, would have mitigated their liability if they failed to
comply with minimum necessary standard.
*Response:* We believe that the modifications to this standard,
described above, substantially address these commenters' concerns. In
addition to allowing the covered entity to use standard protocols for
routine disclosures, we modify the standard to require a covered entity
to make "reasonable efforts," not "all" reasonable efforts as proposed,
in making the "minimum necessary" disclosure.
*Comments:* Some commenters complained that language in the proposed
rule was vague and provided little guidance, and should be abandoned.
*Response:* In the preamble for § 164.504 and these responses to
comments, we provide further guidance on how a covered entity can
develop its policies for the minimum necessary use and disclosure of
protected health information. We do not abandon this standard for the
reasons described above. We remain concerned about the number of persons
who have access to identifiable health information, and believe that
causing covered entities to examine their practices will have
significant privacy benefits.
*Comment:* Some commenters asked that the minimum necessary standard
should not be applied to disclosures to business partners. Many of these
commenters articulated the burdens they would bear if every disclosure
to a business partner was required to meet the minimum necessary
standard.
*Response:* We do not agree. In this final rule, we minimize the burden
on covered entities in the following ways: in circumstances where
disclosures are made on a routine, recurring basis, such as in on-going
relationships between covered entities and their business associates,
individual review of each routine disclosure has been eliminated;
covered entities are required only to develop standard protocols to
apply to such routine disclosures made to business associates (or types
of business associates). In addition, we allow covered entities to rely
on the representation of a professional hired to provide professional
services as to what information is the minimum necessary for that
purpose.
*Comment:* Some commenters were concerned that applying the standard in
research settings will result in providers declining to participate in
research protocols.
*Response:* We have modified the proposal to reduce the burden on
covered entities that wish to disclose protected health information for
research purposes. The final rule requires covered entities to obtain
documentation or statements from persons requesting protected health
information for research that, among other things, describe the
information necessary for the research. We allow covered entities to
reasonably rely on the documentation or statements as describing the
minimum necessary disclosure.
*Comment:* Some commenters argued that government requests should not be
subject to the minimum necessary standard, whether or not they are
"authorized by law."
*Response:* We found no compelling reason to exempt government requests
from this standard, other than when a disclosure is required by law.
(See preamble to § 164.512(a) for the rationale behind this policy).
When a disclosure is required by law, the minimum necessary standard
does not apply, whether the recipient of the information is a government
official or a private individual.
At the same time, we understand that when certain government officials
make requests for protected health information, some covered entities
might feel pressure to comply that might not be present when the request
is from a private individuals. For this reason, we allow (but do not
require) covered entities to reasonably rely on the representations of
public officials as to the minimum necessary information for the
purpose.
*Comment:* Some commenters argued that requests under proposed § 164.510
should not be subject to the minimum necessary standard, whether or not
they are "authorized by law." Others argued that for disclosures made
for administrative proceedings pursuant to proposed § 164.510, the
minimum necessary standard should apply unless they are subject to a
court order.
*Response:* We found no compelling reason to exempt disclosures for
purposes listed in the regulation from this standard, other than for
disclosures required by law. When there is no such legal mandate, the
disclosure is voluntary on the part of the covered entity, and it is
therefore reasonable to expect the covered entity to make some effort to
protect privacy before making such a disclosure. If the covered entity
finds that redacting unnecessary information, or extracting the
requested information, prior to making the disclosure, is too
burdensome, it need not make the disclosure. Where there is ambiguity
regarding what information is needed, some effort on the part of the
covered entity can be expected in these circumstances.
We also found no compelling reason to limit the exemption for
disclosures "required by law" to those made pursuant to a court order.
The judgment of a state legislature or regulatory body that a disclosure
is required is entitled to no less deference than the same decision made
by a court. For further rationale for this policy, see the preamble to §
164.512(a).
*Comment:* Some commenters argued that, in cases where a request for
disclosure is not required by law, covered entities should be permitted
to rely on the representations by public officials, that they have
requested no more than the minimum amount necessary.
*Response:* We agree, and retain the proposed provision which allows
reasonable reliance on the representations of public officials.
*Comment*: Some commenters argued that it is inappropriate to require
covered entities to distinguish between disclosures that are "required
by law" and those that are merely "authorized by law," for the purposes
of determining when the standard applies.
*Response:* We do not agree. Covered entities have an independent duty
to be aware of their legal obligations to federal, state, local and
territorial or tribal authorities. In addition, § 164.514(h) allows
covered entities to reasonably rely on the oral or written
representation of public officials that a disclosure is required by law.
*Comment:* The minimum necessary standard should not be applied to
pharmacists, or to emergency services.
*Response:* We believe that the final rule's exemption of disclosures of
protected health information to health care providers for treatment
purposes from the minimum necessary standard addresses these commenters
concerns about emergency services. Together with the other changes we
make to the proposed standard, we believe we have also addressed most of
the commenters' concerns about pharmacists. With respect to pharmacists,
the comments offered no persuasive reasons to treat pharmacists
differently from other health care providers. Our reasons for retaining
this standard for other uses and disclosures of protected health
information are explained above.
*Comment*: A number of commenters argued that the standard should not
apply to disclosures to attorneys, because it would interfere with the
professional duties and judgment of attorneys in their representation of
covered entities. Commenters stated that if a layperson within a covered
entity makes an improper decision as to what the minimum necessary
information is in regard to a request by the entity\'s attorney, the
attorney may end up lacking information that is vital to representation.
These commenters stated that attorneys are usually going to be in a
better position to determine what information is truly the minimum
necessary for effective counsel and representation of the client.
*Response:* We found no compelling reason to treat attorneys differently
from other business associates. However, to ensure that this rule does
not inadvertently cause covered entities to second-guess the
professional judgment of the attorneys and other professionals they
hire, we modify the proposed policies to explicitly allow covered
entities to rely on the representation of a professional hired to
provide professional services as to what information is the minimum
necessary for that purpose.
*Comment:* Commenters from the law enforcement community expressed
concern that providers may attempt to misuse the minimum necessary
standard as a means to restrict access to information, particularly with
regard to disclosures for health oversight or to law enforcement
officials.
*Response:* The minimum necessary standard does not apply to disclosures
required by law. Since the disclosures to law enforcement officials to
which this standard applies are all voluntary, there would be no need
for a covered entity to "manipulate" the standard; it could decline to
make the disclosure.
*Comment:* Some commenters argued that the only exception to the
application of the standard should be when an individual requests access
to his or her own information. Many of these commenters expressed
specific concerns about victims of domestic violence and other forms of
abuse.
*Response:* We do not agree with the general assertion that disclosure
to the individual is the only appropriate exception to the minimum
necessary standard. There are other, limited, circumstances in which
application of the minimum necessary standard could cause significant
harm. For reasons described above, disclosures of protected health
information for treatment purposes are not subject to this standard.
Similarly, as described in detail in the preamble to § 164.512(a), where
another public body has mandated the disclosure of health information,
upsetting that judgment in this regulation would not be appropriate.
The more specific concerns expressed about victims of domestic violence
and other forms of abuse are addressed in a new provision regarding
disclosure of protected health information related to domestic violence
and abuse (see § 164.512(c)), and in new limitations on disclosures to
persons involved in the individual's care (see § 164.510(b)). We believe
that the limitations we place on disclosure of health information in
those circumstances address the concerns of these commenters.
*Comment:* Some commenters argued that disclosures to next of kin should
be restricted to minimum necessary protected health information, and to
protected health information about only the current medical condition.
*Response:* In the final regulation, we change the proposed provision
regarding "next of kin" to more clearly focus on the disclosures we
intended to target: disclosures to persons involved in the individual's
care. We allow such disclosure only with the agreement of the
individual, or where the covered entity has offered the individual the
opportunity to object to the disclosure and the individual did not
object. If the opportunity to object cannot practicably be provided
because of the incapacity of the individual or other emergency, we
require covered entities to exercise professional judgment in the best
interest of the patient in deciding whether to disclose information. In
such cases, we permit disclosure only of that information directly
relevant to the person's involvement with the individual's health care.
(This provision also includes limited disclosure to certain persons
seeking to identify or locate an individual.) See § 164.510(b).
Some additional concerns expressed about victims of domestic violence
and other forms of abuse are also addressed in a new section on
disclosure of protected health information related to domestic violence
and abuse. See § 164.512(c). We believe that the limitations we place on
disclosure of health information in these provisions address the
concerns of these commenters.
*Comment:* Some commenters argued that covered entities should be
required to determine whether de-identified information could be used
before disclosing information under the minimum necessary standard.
*Response:* We believe that requiring covered entities' policies and
procedures for minimum necessary disclosures to address whether
de-identified information could be used in all instances would impose
burdens on some covered entities that could outweigh the benefits of
such a requirement. There is significant variation in the sophistication
of covered entities' information systems. Some covered entities can
reasonably implement policies and procedures that make significant use
of de-identified information; other covered entities would find such a
requirement excessively burdensome. For this reason, we chose instead to
require "reasonable efforts," which can vary according to the situation
of each covered entity.
In addition, we believe that the fact that we allow de-identified
information to be disclosed without regard to the policies, procedures,
and documentation required for disclosure of identifiable health
information will provide an incentive to encourage its use where
appropriate.
*Comment:* Several commenters argued that standard transactions should
not be subject to the standard.
*Response:* We agree that data elements that are required or
situationally required in the standard transactions should not be, and
are not, subject to this standard. However, in many cases, covered
entities have significant discretion as to the information included in
these transactions. Therefore, this standard does apply to those
optional data elements.
*Comment*: Some commenters asked for clarification to understand how the
minimum necessary standard is intended to interact with the security
NPRM.
*Response:* The proposed Security Rule included requirements for
electronic health information systems to include access management
controls. Under this regulation, the covered entity's privacy policies
will determine who has access to what protected health information. We
will make every effort to ensure consistency prior to publishing the
final Security Rule.
*Comment*: Many commenters, representing health care providers, argued
that if the request was being made by a health plan, the health plan
should be required to request only the minimum protected health
information necessary. Some of these commenters stated that the
requestor is in a better position to know the minimum amount of
information needed for their purposes. Some of these commenters argued
that the minimum necessary standard should be imposed only on the
requesting entity. A few of these commenters argued that both the
disclosing and the requesting entity should be subject to the minimum
necessary standard, to create "internal tension" to assure the standard
is honored.
*Response:* We agree, and in the final rule we require that a request
for protected health information made by one covered entity to another
covered entity must be limited to the minimum amount necessary for the
purpose. As with uses and disclosures of protected health information,
covered entities may have standard protocols for routine requests.
Similarly, this requirement does not apply to requests made to health
care providers for treatment purposes. We modify the rule to balance
this provision; that is, it now applies both to disclosure of and
requests for protected health information. We also allow, but do not
require, the covered entity releasing the information to reasonably rely
on the assertion of a requesting covered entity that it is requesting
only the minimum protected health information necessary.
*Comment*: A few commenters suggested that there should be a process for
resolving disputes between covered entities over what constitutes the
'minimum necessary' information.
*Response:* We do not intend that this rule change the way covered
entities currently handle their differences regarding the disclosure of
health information. We understand that the scope of information
requested from providers by health plans is a source of tension in the
industry today, and we believe it would not be appropriate to use this
regulation to affect that debate. As discussed above, we require both
the requesting and the disclosing covered entity to take privacy
concerns into account, but do not inject additional tension into the
on-going discussions.
**Section 164.514(e)---Marketing**
*Comment*: Many commenters requested clarification of the boundaries
between treatment, payment, health care operations, and marketing. Some
of these commenters requested clarification of the apparent
inconsistency between language in proposed § 164.506(a)(1)(i) (a covered
entity is permitted to use or disclose protected health information
without authorization "to carry out" treatment, payment, or health care
operations) and proposed § 164.508(a)(2)(A) (a covered entity must
obtain an authorization for all uses and disclosures that are not
"compatible with or directly related to" treatment, payment, and health
care operations). They suggested retaining the language in proposed §
164.508(a)(2)(A), which would permit a broader range of uses and
disclosures without authorization, in order to engage in health
promotion activities that might otherwise be considered marketing.
*Response:* In the final rule, we make several changes to the
definitions of treatment, payment, and health care operations that are
intended to clarify the uses and disclosures of protected health
information that may be made for each purpose. See § 164.501 and the
corresponding preamble discussion regarding the definitions of these
terms. We also have added a definition of the term "marketing" to help
establish the boundary between marketing and treatment, payment, and
health care operations. See § 164.501. We also clarify the conditions
under which authorization is or is not required for uses and disclosures
of protected health information for marketing purposes. See §
164.514(e). Due to these changes, we believe it is appropriate to retain
the wording from proposed § 164.506(a)(1)(i).
*Comment:* We received a wide variety of suggestions with respect to
authorization for uses and disclosures of protected health information
for marketing purposes. Some commenters supported requiring
authorization for all such uses and disclosures. Other commenters
suggested permitting all such uses and disclosures without
authorization.
Some commenters suggested we distinguish between marketing to benefit
the covered entity and marketing to benefit a third party. For example,
a few commenters suggested we should prohibit covered entities from
seeking authorization for any use or disclosure for marketing purposes
that benefit a third party. These commenters argued that the third
parties should be required to obtain the individual's authorization
directly from the individual, not through a covered entity, due to the
potential for conflicts of interest.
While a few commenters suggested that we require covered entities to
obtain authorization to use or disclose protected health information for
the purpose of marketing its own products and services, the majority
argued these types of marketing activities are vital to covered entities
and their customers and should therefore be permitted to occur without
authorization. For example, commenters suggested covered entities should
be able to use and disclose protected health information without
authorization in order to provide appointment reminders, newsletters,
information about new initiatives, and program bulletins.
Finally, many commenters argued we should not require authorization for
the use or disclosure of protected health information to market any
health-related goods and services, even if those goods and services are
offered by a third party. Some of these commenters suggested that
individuals should have an opportunity to opt out of these types of
marketing activities rather than requiring authorization.
*Response:* We have modified the final rule in ways that address a
number of the issues raised in the comments. First, the final rule
defines the term marketing, and excepts certain communications from the
definition. See § 164.501. These exceptions include communications made
by covered entities for the purpose of describing network providers or
other available products, services, or benefits and communications made
by covered entities for certain treatment-related purposes. These
exceptions only apply to oral communications or to written
communications for which the covered entity receives no third-party
remuneration. The exceptions to the definition of marketing fall within
the definitions of treatment and/or health care operations, and
therefore uses, or disclosures to a business associate, of protected
health information for these purposes are permissible under the rule
without authorization.
The final rule also permits covered entities to use protected health
information to market health-related products and services, whether they
are the products and services of the covered entity or of a third party,
subject to a number of limitations. See § 164.514(e). We permit these
uses to allow entities in the health sector to inform their patients and
enrollees about products that may benefit them. The final rule contains
significant restrictions, including requirements that the covered entity
disclose itself as the source of a marketing communication, that it
disclose any direct or indirect remuneration from third parties for
making the disclosure, and that, except in the cases of general
communications such as a newsletter, the communication disclose how the
individual can opt-out of receiving additional marketing communications.
Additional requirements are imposed if the communication is targeted
based on the health status or condition of the proposed recipients.
We believe that these modifications address many of the issues raised by
commenters and provide a substantial amount of flexibility as to when a
covered entity may communicate about a health-related product or service
to a patient or enrollee. These communications may include appointment
reminders, newsletters, and information about new health products. These
changes, however, do not permit a covered entity to disclose protected
health information to third parties for marketing (other than to a
business associate to make a marketing communication on behalf of the
covered entity) without authorization under § 164.508.
*Comment:* A few commenters suggested we prohibit health care
clearinghouses from seeking authorization for the use or disclosure of
protected health information for marketing purposes.
*Response:* We do not prohibit clearinghouses from seeking
authorizations for these purposes. We believe, however, that health care
clearinghouses will almost always create or obtain protected health
information in a business associate capacity. Business associates may
only engage in activities involving the use or disclosure of protected
health information, including seeking or acting on an authorization, to
the extent their contracts allow them to do so. When a clearinghouse
creates or receives protected health information other than as a
business associate of a covered entity, it is permitted and required to
obtain authorizations to the same extent as any other covered entity.
*Comment:* A few commenters suggested we require covered entities to
publicly disclose, on the covered entity's website or upon request, all
of their marketing arrangements.
*Response:* While we agree that such a requirement would provide
individuals with additional information about how their information
would be used, we do not feel that such a significant intrusion into the
business practices of the covered entity is warranted.
*Comment*: Some commenters argued that if an activity falls within the
scope of payment, it should not be considered marketing. Commenters
strongly supported an approach which would bar an activity from being
construed as "marketing" even if performing that activity would result
in financial gain to the covered entity. In a similar vein, we were
urged to adopt the position that if an activity was considered payment,
treatment or health care operations, it could not be further evaluated
to determine whether it should be excluded as marketing.
*Response:* We considered the approach offered by commenters but decided
against it. Some activities, such as the marketing of a covered entity's
own health-related products or services, are now included in the
definition of health care operations, provided certain requirements are
met. Other types of activities, such as the sale of a patient list to a
marketing firm, would not be permitted under this rule without
authorization from the individual. We do not believe that we can
envision every possible disclosure of health information that would
violate the privacy of an individual, so any list would be incomplete.
Therefore, whether or not a particular activity is considered marketing,
payment, treatment or health care operations will be a fact-based
determination based on the activity's congruence with the particular
definition.
*Comment:* Some industry groups stated that if an activity involves
selling products, it is not disease management. They suggested we adopt
a definition of disease management that differentiates use of
information for the best interests of patient from uses undertaken for
\"ulterior purposes\" such as advertising, marketing, or promoting
separate products.
*Response:* We agree in general that the sale of unrelated products to
individuals is not a population-based activity that supports treatment
and payment. However, in certain circumstances marketing activities are
permitted as a health care operation; see the definition of "health care
operations" in § 164.501 and the related marketing requirements of §
164.514.
*Comment:* Some commenters complained that the absence of a definition
for disease management created uncertainty, in view of the proposed
rule's requirement to get authorization for marketing. They expressed
concern that the effect would be to require patient consent for many
activities that are desirable, not practicably done if authorization is
required, and otherwise classifiable as treatment, payment, or health
care operations. Examples provided include reminders for appointments,
reminders to get preventive services like mammograms, and information
about home management of chronic illnesses. They also stated that the
proposed rule would prevent many disease management and preventive
health activities.
*Response:* We agree that the distinction in the NPRM between disease
management and marketing was unclear. Rather than provide a definition
of disease management, this final rule defines marketing. We note that
overlap between disease management and marketing exists today in
practice and they cannot be distinguished easily with a definitional
label. However, for purposes of this rule, the revised language makes
clear for what activities an authorization is required. We note that
under this rule many of the activities mentioned by commenters will not
require authorizations under most circumstances. See the discussion of
disease management under the definition of "treatment" in § 164.501.
**Section 164.514(f)---Fundraising**
*Comment*: Many comments objected to the requirement that an
authorization from the individual be obtained for use and disclosure of
protected health information for fundraising purposes. They argued that,
in the case of not-for-profit health care providers, having to obtain
authorization would be time consuming and costly, and that such a
requirement would lead to a decrease in charitable giving. The
commenters also urged that fundraising be included within the definition
of health care operations. Numerous commenters suggested that they did
not need unfettered access to patient information in order to carry out
their fundraising campaigns. They stated that a limited data set
restricted to name, address, and telephone number would be sufficient to
meet their needs. Several commenters suggested that we create a
voluntary opt-out provision so people can avoid solicitations.
*Response:* We agree with commenters that our proposal could have
adversely effected charitable giving, and accordingly make several
modifications to the proposal. First, the final rule allows a covered
entity to use or disclose to a business associate protected health
information without authorization to identify individuals for
fundraising for its own benefit. Permissible fundraising activities
include appeals for money, sponsorship of events, etc. They do not
include royalties or remittances for the sale of products of third
parties (except auctions, rummage sales, etc).
Second, the final rule allows a covered entity to disclose protected
health information without authorization to an institutionally related
foundation that has as its mission to benefit the covered entity. This
special provision is necessary to accommodate tax code provisions which
may not allow such foundations to be business associates of their
associated covered entity.
We also agree that broad access to protected health information is
unnecessary for fundraising and unnecessarily intrudes on individual
privacy. The final rule limits protected health information to be used
or disclosed for fundraising to demographic information and the date
that treatment occurred. Demographic information is not defined in the
rule, but will generally include in this context name, address and other
contact information, age, gender, and insurance status. The term does
not include any information about the illness or treatment.
We also agree that a voluntary opt-out is an appropriate protection, and
require in § 164.520 that covered entities provide information on their
fundraising activities in their "Notice of Information Practices." As
part of the notice and in any fundraising materials, covered entities
must provide information explaining how individuals may opt out of
fundraising communications.
*Comment:* Some commenters stated that use and disclosure of protected
health information for fundraising, without authorization should be
limited to not-for-profit entities. They suggested that not-for-profit
entities were in greater need of charitable contributions and as such,
they should be exempt from the authorization requirement while
for-profit organizations should have to comply with the requirement.
*Response:* We do not agree that the profit status of a covered entity
should determine its allowable use of protected health information for
fundraising. Many for-profit entities provide the same services and have
similar missions to not-for-profit entities. Therefore, the final rule
does not make this distinction.
*Comment:* Several commenters suggested that the final rule should allow
the internal use of protected health information for fundraising,
without authorization, but not disclosure for fundraising. These
commenters suggested that by limiting access of protected health
information to only internal development offices concerns about misuse
would be reduced.
*Response:* We do not agree. A number of commenters noted that they have
related charitable foundations that raise funds for the covered entity,
and we permit disclosures to such foundations to ensure that this rule
does not interfere with charitable giving.
*Comment*: Several commenters asked us to address the content of
fundraising letters. They pointed out that disease or condition-specific
letters requesting contributions, if opened by the wrong person, could
reveal personal information about the intended recipient.
*Response*: We agree that such communications raise privacy concerns. In
the final rule, we limit the information that can be used or disclosed
for fundraising, and exclude information about diagnosis, nature of
services, or treatment.
**Section 164.514(g)---Verification**
*Comment:* A few commenters suggested that verification guidelines may
need to be different as they apply to emergency clinical situations as
opposed to routine data collection where delays do not threaten health.
*Response:* We agree, and make special provisions in §§ 164.510 and
164.512 for disclosures of protected health information by a covered
entity without authorization where the individual is unable to agree or
object to disclosure due to incapacity or other emergency circumstance.
For example, a health care provider may need to make disclosures to
family members, close personal friends, and others involved in the
individual's care in emergency situations. Similarly, a health care
provider may need to respond to a request from a hospital seeking
protected health information in a circumstance described as an
emergency. In each case, we require only that the covered entity
exercise professional judgment, in the best interest of the patient, in
deciding whether to make a disclosure. Based on the comments and our
fact finding, this reflects current practice.
*Comment:* A few commenters stated the rules should include provisions
for electronic verification of identity (such as Public Key
Infrastructure (PKI)) as established in the regulations on Security and
Electronic Signatures. One commenter suggested that some kind of PKI
credentialing certificate should be required.
*Response:* This regulation does not address specific technical
protocols utilized to meet the verification requirements. If the
requirements of the rule are otherwise met, the mechanism for meeting
them can be determined by the covered entity.
*Comment:* A few commenters wanted more clarification on the
verification procedures. One commenter wanted to know if contract number
is enough for verification. A few commenters wanted to know if a
callback or authorization on a letterhead is acceptable. A few
commenters wanted to know if plans are considered to "routinely do
business" with all of their members.
*Response:* In the final rule, we modify the proposed provision and
require covered entities to have policies and procedures reasonably
designed to verify the identify and authority of persons requesting
protected health information. Whether knowledge of a contract number is
reasonable evidence of authority and identity will depend on the
circumstances. Call-backs and letterhead are typically used today for
verification, and are acceptable under this rule if reasonable under the
circumstances. For communications with health plan members, the covered
entity will already have information about each individual, collected
during enrollment, that can be used to establish identity, especially
for verbal or electronic inquiries. For example, today many health plans
ask for the social security or policy number of individuals seeking
information or assistance by telephone. How this verification is done is
left up to the covered entity.
*Comment:* One commenter expressed the need for consistency on
verification requirements between this rule and the Security regulation.
*Response:* We will make every effort to ensure consistency prior to
publishing the final Security Rule.
*Comment:* One commenter stated that the verification language in
proposed § 164.518(c)(2)(ii)(B)(1) would have created a presumption that
"a request for disclosure made by official legal process issued by
a\[n\] administrative body" is reasonable legal authority to disclose
the protected health information. The commenter was concerned that this
provision could be interpreted to permit a state agency to demand the
disclosure of protected health information merely on the basis of a
letter signed by an agency representative. The commenter believed that
the rule specifically should defer to state or federal law on the
disclosure of protected health information pursuant to legal process.
*Response:* The verification provisions in this rule are minimum
requirements that covered entities must meet before disclosing protected
health information under this regulation. They do not mandate
disclosure, nor do they preempt state laws which impose additional
restrictions on disclosure. Where state law regarding disclosures is
more stringent, the covered entity must adhere to state law.
*Comment:* A few commenters wanted the verification requirements to
apply to disclosures of protected health information for treatment,
payment and operations purposes.
*Response:* We agree. This verification requirement applies to all
disclosures of protected health information permitted by this rule,
including for treatment, payment and operations, where the identity of
the recipient is not known to the covered entity. Routine communications
between providers, where existing relationships have been established,
do not require special verification procedures.
*Comment*: A few commenters were concerned that a verbal inquiry for
next of kin verification is not consistent with the verification
guidelines of this verification subsection and that verbal inquiry would
create problems because anyone who purports to be a next of kin could
easily obtain information under false pretenses.
*Response:* In the final rule in § 164.514, we require the covered
entity to verify the identity and authority of persons requesting
protected health information, where the identity and authority of such
person is not known to the covered entity. This applies to next of kin
situations. Procedures for disclosures to next of kin, other family
members and persons assisting in an individual's care are also discussed
in § 164.510(b), which allows the covered entity to exercise
professional judgment as to whether the disclosure is in the
individual's best interest when the individual is not available to agree
to the disclosure or is incapacitated. Requiring written proof of
identity in many of these situations, such as when a family member is
seeking to locate a relative in an emergency or disaster situation,
would create enormous burden without a corresponding enhancement of
privacy, and could cause unnecessary delays in these situations. We
therefore believe that reliance on professional judgment provides a
better framework for balancing the need for privacy with the need to
locate and identify individuals.
*Comment:* A few commenters stated that the verification requirements
will provide great uncertainty to providers who receive authorizations
from life, disability income and long-term care insurers in the course
of underwriting and claims investigation. They are unaware of any
breaches of confidentiality associated with these circumstances and
believe the rule creates a solution to a non-existent problem. Another
commenter stated that it is too burdensome for health care providers to
verify requests that are normally received verbally or via fax.
*Response:* This rule requires covered health care providers to adhere
to current best practices for verification. That is, when the requester
is not known to the covered provider, the provider makes a reasonable
effort to determine that the protected health information is being sent
to the entity authorized to receive it. Our fact finding reveals that
this is often done by sending the information to a recognizable
organizational address or if being transmitted by fax or phone by
calling the requester back through the main organization switchboard
rather than through a direct phone number. We agree that these
procedures seem to work reasonably well in current practice and are
sufficient to meet the relevant requirements in the final rule.
*Comments:* One comment suggested requiring a form of photo
identification such as a driver\'s license or certain personal
information such as date of birth to verify the identity of the
individual.
*Response:* These are exactly the types of standard procedures for
verifying the identity of individuals that are envisioned by the final
rule. Most health care entities already conduct such procedures
successfully. However, it is unwise to prescribe specific means of
verification for all situations. Instead, we require policies and
procedures reasonably designed for purposes of verification.
*Comment:* One professional association said that the example procedure
described in the NPRM for asking questions to verify that an adult
acting for a young child had the requisite relationship to the child
would be quite complex and difficult in practice. The comment asked for
specific guidance as to what questions would constitute an adequate
attempt to verify such a relationship.
*Response:* The final rule requires the covered entity to implement
policies and procedures that are reasonably designed to comply with the
verification requirement in § 164.514. It would not be possible to
create the requested specific guidance which could deal with the
infinite variety of situations that providers must face, especially the
complex ones such as that described by the commenter. As with many of
the requirements of this final rule, health care providers are given
latitude and expected to make decisions regarding disclosures, based on
their professional judgment and experience with common practice, in the
best interest of the individual.
*Comment:* One commenter asserted that ascertaining whether a requestor
has the appropriate legal authority is beyond the scope of the training
or expertise of most employees in a physician's office. They believe
that health care providers must be able to reasonably rely on the
authority of the requestor.
*Response:* In the final regulation we require covered entities to have
policies and procedures reasonably designed to verify the identify and
authority of persons requesting health information. Where the requester
is a public official and legal authority is at issue, we provide
detailed descriptions of the acceptable methods for such verification in
the final rule. For others, the covered entity must implement policies
and procedures that are reasonably designed to comply with the
requirement to verify the identity and authority of a requestor, but
only if the requestor is unknown to the covered entity. As described
above, we expect these policies and procedures to document currently
used best practices and reliance on professional judgment in the best
interest of the individual.
*Comment:* One commenter expressed concern that the
verification/identification procedures may eliminate or significantly
reduce their ability to utilize medical records copy services. As
written, they believe the NPRM provides the latitude to set up copy
service arrangements, but any change that would add restrictions would
adversely affect their ability to process an individual's disability
claim.
*Response:* The covered entity can establish reasonable policies and
procedures to address verification in routine disclosures under business
associate agreements, with, for example, medical records copy services.
Nothing in the verification provisions would preclude those activities,
nor have we significantly modified the NPRM provision on this issue.
**SECTION 164.520---NOTICE OF PRIVACY PRACTICES FOR PROTECTED HEALTH
INFORMATION**
*Comment*: Many commenters supported the proposal to require covered
entities to produce a notice of information practices. They stated that
such notice would improve individuals' understanding of how their
information may be used and disclosed and would help to build trust
between individuals and covered entities. A few comments, however,
argued that the notice requirement would be administratively burdensome
and expensive without providing significant benefit to individuals.
*Response:* We retain the requirement for covered health care providers
and health plans to produce a notice of information practices. We
additionally require health care clearinghouses that create or receive
protected health information other than as a business associate of
another covered entity to produce a notice. We believe the notice will
provide individuals with a clearer understanding of how their
information may be used and disclosed and is essential to inform
individuals of their privacy rights. The notice will focus individuals
on privacy issues, and prompt individuals to have discussions about
privacy issues with their health plans, health care providers, and other
persons.
The importance of providing individuals with notice of the uses and
disclosures of their information and of their rights with respect to
that information is well supported by industry groups, and is recognized
in current state and federal law. The July 1977 Report of the Privacy
Protection Study Commission recommended that "each medical-care provider
be required to notify an individual on whom it maintains a medical
record of the disclosures that may be made of information in the record
without the individual's express authorization."[^23] The Commission
also recommended that "an insurance institution\... notify \[an
applicant or principal insured\] as to: \... the types of parties to
whom and circumstances under which information about the individual may
be disclosed without his authorization, and the types of information
that may be disclosed; \[and\] \... the procedures whereby the
individual may correct, amend, delete, or dispute any resulting record
about himself."[^24] The Privacy Act (5 U.S.C. 552a) requires government
agencies to provide notice of the routine uses of information the agency
collects and the rights individuals have with respect to that
information. In its report "Best Principles for Health Privacy," the
Health Privacy Working Group stated, "Individuals should be given notice
about the use and disclosure of their health information and their
rights with regard to that information."[^25] The National Association
of Insurance Commissioners' Health Information Privacy Model Act
requires carriers to provide a written notice of health information
policies, standards, and procedures, including a description of the uses
and disclosures prohibited and permitted by the Act, the procedures for
authorizing and limiting disclosures and for revoking authorizations,
and the procedures for accessing and amending protected health
information.
Some states require additional notice. For example, Hawaii requires
health care providers and health plans, among others, to produce a
notice of confidentiality practices, including a description of the
individual's privacy rights and a description of the uses and
disclosures of protected health information permitted under state law
without the individual's authorization. (HRS section 323C-13)
Today, health plan hand books and evidences of coverage include some of
what is required to be in the notice. Industry and standard-setting
organizations have also developed notice requirements. The National
Committee for Quality Assurance accreditation guidelines state that an
accredited managed care organization "communicates to prospective
members its policies and practices regarding the collection, use, and
disclosure of medical information \[and\]\... informs members\... of its
policies and procedures on\... allowing members access to their medical
records."[^26] Standards of the American Society for Testing and
Materials state, "Organizations and individuals who collect, process,
handle, or maintain health information should provide individuals and
the public with a notice of information practices." They recommend that
the notice include, among other elements, "a description of the rights
of individuals, including the right to inspect and copy information and
the right to seek amendments \[and\] a description of the types of uses
and disclosures that are permitted or required by law without the
individual's authorization."[^27] We build on this well-established
principle in this final rule.
*Comment*: We received many comments on the model notice provided in the
proposed rule. Some commenters argued that patients seeing similar
documents would be less likely to become disoriented when examining a
new notice. Other commenters, however, opposed the inclusion of a model
notice or expressed concern about particular language included in the
model. They maintained that a uniform model notice would never capture
the varying practices of covered entities. Many commenters opposed
requirements for a particular format or specific language in the notice.
They stated that covered entities should be afforded maximum flexibility
in fashioning their notices. Other commenters requested inclusion of
specific language as a header to indicate the importance of the notice.
A few commenters recommended specific formatting requirements, such as
font size or type.
*Response:* On the whole, we found commenters' arguments for flexibility
in the regulation more persuasive than those arguing for more
standardization. We agree that a uniform notice would not capture the
wide variation in information practices across covered entities. We
therefore do not include a model notice in the final rule, and do not
require inclusion of specific language in the notice (except for a
standard header). We also do not require particular formatting. We do,
however, require the notice to be written in plain language. (See above
for guidance on writing documents in plain language.) We also agree with
commenters that the notice should contain a standard header to draw the
individual's attention to the notice and facilitate the individual's
ability to recognize the notice across covered entities.
We believe that post-publication guidance will be a more effective
mechanism for helping covered entities design their notices than the
regulation itself. After the rule is published, we can provide guidance
on notice content and format tailored to different types of health plans
and providers. We believe such specially designed guidance will be more
useful that a one-size-fits-all model notice we might publish with this
regulation.
*Comment:* Commenters suggested that the rule should require that the
notice regarding privacy practices include specific provisions related
to health information of unemancipated minors.
*Response:* Although we agree that minors and their parents should be
made aware of practices related to confidentiality of protected health
information of unemancipated minors, we do not require covered entities
that treat minors or use their protected health information to include
provisions in their notice that are not required of other covered
entities. In general, the content of notice requirements in § 164.520(b)
do not vary based on the status of the individual being served. We have
decided to maintain consistency by declining to prescribe specific
notice requirements for minors. The rule does permit a covered entity to
provide individuals with notice of its policies and procedures with
respect to anticipated uses and disclosures of protected health
information (§ 164.520(b)(2)), and providers are encouraged to do so.
*Comment:* Some commenters argued that covered entities should not be
required to distinguish between those uses and disclosures that are
required by law and those that are permitted by law without
authorization, because these distinctions may not always be clear and
will vary across jurisdictions. Some commenters maintained that simply
stating that the covered entity would make all disclosures required by
law would be sufficient. Other comments suggested that covered entities
should be able to produce very broadly stated notices so that repeated
revisions and mailings of those revisions would not be necessary.
*Response*: While we believe that covered entities have an independent
duty to understand the laws to which they are subject, we also recognize
that it could be difficult to convey such legal distinctions clearly and
concisely in a notice. We therefore eliminate the proposed requirement
for covered entities to distinguish between those uses and disclosures
that are required by and those that are permitted by law. We instead
require that covered entities describe each purpose for which they are
permitted or required to use or disclose protected health information
under this rule and other applicable law without individual consent or
authorization. Specifically, covered entities must describe the types of
uses and disclosures they are permitted to make for treatment, payment,
and health care operations. They must also describe each of the purposes
for which the covered entity is permitted or required by this subpart to
use or disclose protected health information without the individual's
written consent or authorization (even if they do not plan to make a
permissive use or disclosure). We believe this requirement provides
individuals with sufficient information to understand how information
about them can be used and disclosed and to prompt them to ask for
additional information to obtain a clearer understanding, while
minimizing covered entities' burden.
A notice that stated only that the covered entity would make all
disclosures required by law, as suggested by some of these commenters,
would fail to inform individuals of the uses and disclosures of
information about them that are permitted, but not required, by law. We
clarify that each and every disclosure required by law need not be
listed on the notice. Rather, the covered entity can include a general
statement that disclosures required by law will be made.
*Comment:* Some comments argued that the covered entity should not have
to provide notice about uses and disclosures that are permitted under
the rule without authorization. Other comments suggested that the notice
should inform individuals about all of the uses and disclosures that may
be made, with or without the individual's authorization.
*Response:* When the individual's permission is not required for uses
and disclosures of information, we believe providing the required notice
is the most effective means of ensuring that individuals are aware of
how information about them may be shared. The notice need not describe
uses and disclosures for which the individual's permission is required,
because the individual will be informed of these at the time permission
to use or disclose the information is requested.
We additionally require covered entities, even those required to obtain
the individual's consent for use and disclosure of protected health
information for treatment, payment, and health care operations, to
describe those uses and disclosures in their notice. (See § 164.506 and
the corresponding preamble discussion regarding consent requirements.)
We require these uses and disclosures to be described in the notice in
part in order to reduce the administrative burden on covered providers
that are required to obtain consent. Rather than obtaining a new consent
each time the covered provider's information policies and procedures are
materially revised, covered providers may revise and redistribute their
notice. We also expect that the description of how information may be
used to carry out treatment, payment, and health care operations in the
notice will be more detailed than in the more general consent document.
*Comment:* Some commenters argued that covered entities should not be
required to provide notice of the right to request restrictions, because
doing so would be burdensome to the covered entity and distracting to
the individual; because individuals have the right whether they are
informed of such right or not; and because the requirement would be
unlikely to improve patient care.
*Response:* We disagree. We believe that the ability of an individual to
request restrictions is an important privacy right and that informing
people of their rights improves their ability to exercise those rights.
We do not believe that adding a sentence to the notice is burdensome to
covered entities.
*Comment:* We received comments supporting inclusion of a contact point
in the notice, so that individuals will not be forced to make multiple
calls to find someone who can assist them with the issues in the notice.
*Response:* We retain the requirement, but clarify that the title of the
contact person is sufficient. A person's name is not required.
C*omment:* Some commenters argued that we could facilitate compliance by
requiring the notice to include the proposed requirement that covered
entities use and disclose only the minimum necessary protected health
information.
*Response:* We do not agree that adding such a requirement would
strengthen the notice. The purpose of the notice is to inform
individuals of their privacy rights, and of the purposes for which
protected health information about them may be used or disclosed.
Informing individuals that covered entities may use and disclose only
the minimum necessary protected health information for a purpose would
not increase individuals' understanding of their rights or the purposes
for which information may be used or disclosed.
*Comment:* A few commenters supported allowing covered entities to apply
changes in their information practices to protected health information
obtained prior to the change. They argued that requiring different
protections for information obtained at different times would be
inefficient and extremely difficult to administer. Some comments
supported requiring covered entities to state in the notice that the
information policies and procedures are subject to change.
*Response:* We agree. In the final rule, we provide a mechanism by which
covered entities may revise their privacy practices and apply those
revisions to protected health information they already maintain. We
permit, but do not require, covered entities to reserve the right to
change their practices and apply the revised practices to information
previously created or obtained. If a covered entity wishes to reserve
this right, it must make a statement to that effect in its notice. If it
does not make such a statement, the covered entity may still revise its
privacy practices, but it may apply the revised practices only to
protected health information created or obtained after the effective
date of the notice in which the revised practices are reflected. See §
164.530(i) and the corresponding preamble discussion of requirements
regarding changes to information policies and procedures.
*Comment:* Some commenters requested clarification of the term "material
changes" so that entities will be comfortable that they act properly
after making changes to their information practices. Some comments
stated that entities should notify individuals whenever a new category
of disclosures to be made without authorization is created.
*Response:* The concept of "material change" appears in other notice
laws, such as the ERISA requirements for summary plan descriptions. We
therefore retain the "materiality" condition for revision of notices,
and encourage covered entities to draw on the concept as it has
developed through those other laws. We agree that the addition of a new
category of use or disclosure of health information that may be made
without authorization would likely qualify as a material change.
*Comment:* We proposed to permit covered entities to implement revised
policies and procedures without first revising the notice if a
compelling reason existed to do so. Some commenters objected to this
proposal because they were concerned that the "compelling reason"
exception would give covered entities broad discretion to engage in post
hoc violations of its own information practices.
*Response:* We agree and eliminate this provision. Covered entities may
not implement revised information policies and procedures before
properly documenting the revisions and updating their notice. See §
164.530(i). Because in the final rule we require the notice to include
all disclosures that may be made, not only those the covered entity
intends to make, we no longer need this provision to accommodate
emergencies.
*Comment:* Some comments suggested that we require covered entities to
maintain a log of all past notices, with changes from the previous
notice highlighted. They further suggested we require covered entities
to post this log on their web sites.
*Response:* In accordance with § 164.530(j)(2), a covered entity must
retain for six years a copy of each notice it issues. We do not require
highlighting of changes to the notice or posting of prior notices, due
to the associated administrative burdens and the complexity such a
requirement would build into the notice over time. We encourage covered
entities, however, to make such materials available upon request.
*Comment*: Several commenters requested clarification about when,
relative to the compliance date, covered entities are required to
produce their notice. One commenter suggested that covered entities be
allowed a period not less than 180 days after adoption of the final rule
to develop and distribute the notice. Other comments requested that the
notice compliance date be consistent with other HIPAA regulations.
*Response:* We require covered entities to have a notice available upon
request as of the compliance date of this rule (or the compliance date
of the covered entity if such date is later). See § 164.534 and the
corresponding preamble discussion of the compliance date.
*Comment:* Some commenters suggested that covered entities, particularly
covered health care providers, should be required to discuss the notice
with individuals. They argued that posting a notice or otherwise
providing the notice in writing may not achieve the goal of informing
individuals of how their information will be handled, because some
individuals may not be literate or able to function at the reading level
used in the notice. Others argued that entities should have the
flexibility to choose alternative modes of communicating the information
in the notice, including voice disclosure. In contrast, some commenters
were concerned that requirements to provide the notice in plain language
or in languages other than English would be overly burdensome.
*Response:* We require covered entities to write the notice in plain
language so that the average reader will be able to understand the
notice. We encourage, but do not require, covered entities to consider
alternative means of communicating with certain populations. We note
that any covered entity that is a recipient of federal financial
assistance is generally obligated under Title VI of the Civil Rights Act
of 1964 to provide material ordinarily distributed to the public in the
primary languages of persons with limited English proficiency in the
recipients' service areas. While we believe the notice will prompt
individuals to initiate discussions with their health plans and health
care providers about the use and disclosure of health information, we
believe this should be a matter left to each individual and that
requiring covered entities to initiate discussions with each individual
would be overly burdensome.
*Comment:* Some commenters suggested that covered entities, particularly
health plans, should be permitted to distribute their notice in a
newsletter or other communication with individuals.
*Response:* We agree, so long as the notice is sufficiently separate
from other important documents. We therefore prohibit covered entities
from combining the notice in a single document with either a consent (§
164.506) or an authorization (§ 164.508), but do not otherwise prohibit
covered entities from including the notice in or with other documents
the covered entity shares with individuals.
*Comment:* Some comments suggested that covered entities should not be
required to respond to requests for the notice from the general public.
These comments indicated that the requirement would place an undue
burden on covered entities without benefitting individuals.
*Response:* We proposed that the notice be publicly available so that
individuals may use the notice to compare covered entities' privacy
practices and to select a health plan or health care provider
accordingly. We therefore retain the proposed requirement for covered
entities to provide the notice to any person who requests a copy,
including members of the general public.
*Comment:* Many commenters argued that the distribution requirements for
health plans should be less burdensome. Some suggested requiring
distribution upon material revision, but not every three years. Some
suggested that health plans should only be required to distribute their
notice annually or upon re-enrollment. Some suggested that health plans
should only have to distribute their notice upon initial enrollment, not
re-enrollment. Other commenters supported the proposed approach.
*Response:* We agree that the notice distribution requirements for
health plans can be less burdensome than in the NPRM while still being
effective. In the final rule, we reduce health plans' distribution
burden in several ways. First, we require health plans to remind
individuals every three years of the availability of the notice and of
how to obtain a copy of the notice, rather than requiring the notice to
be distributed every three years as proposed. Second, we clarify that
health plans only have to distribute the notice to new enrollees on
enrollment, not to current members of the health plan upon
re-enrollment. Third, we specifically allow all covered entities to
distribute the notice electronically in accordance with § 164.520(c)(3).
We retain the requirement for health plans to distribute the notice
within 60 days of a material revision. We believe the revised
distribution requirements will ensure that individuals are adequately
informed of health plans' information practices and any changes to those
procedures, without unduly burdening health plans.
*Comment:* Many commenters argued that health plans should not be
required to distribute their notice to every person covered by the plan.
They argued that distributing the notice to every family member would be
unnecessarily duplicative, costly, and difficult to administer. They
suggested that health plans only be required to distribute the notice to
the primary participant or to each household with one or more insured
individuals.
*Response:* We agree, and clarify in the final rule that a health plan
may satisfy the distribution requirement by providing the notice to the
named insured on behalf of the dependents of that named insured. For
example, a group health plan may satisfy its notice requirement by
providing a single notice to each covered employee of the plan sponsor.
We do not require the group health plan to distribute the notice to each
covered employee and to each covered dependent of those employees.
*Comment:* Many comments requested clarification about health plans'
ability to distribute the notice via other entities. Some commenters
suggested that group health plans should be able to satisfy the
distribution requirement by providing copies of the notice to plan
sponsors for delivery to employees. Others requested clarification that
covered health care providers are only required to distribute their own
notice and that health plans should be prohibited from using their
affiliated providers to distribute the health plan's notice.
*Response:* We require health plans to distribute their notice to
individuals covered by the health plan. Health plans may elect to hire
or otherwise arrange for others, including group health plan sponsors
and health care providers affiliated with the health plan, to carry out
this distribution. We require covered providers to distribute only their
own notices, and neither require nor prohibit health plans and health
care providers from devising whatever arrangements they find suitable to
meet the requirements of this rule. However, if a covered entity
arranges for another person or entity to distribute the covered entity's
notice on its behalf and individuals do not receive such notice, the
covered entity would be in violation of the rule.
*Comment:* Some comments stated that covered providers without direct
patient contact, such as clinical laboratories, might not have
sufficient patient contact information to be able to mail the notice.
They suggested we require or allow such providers to form agreements
with referring providers or other entities to distribute notices on
their behalf or to include their practices in the referring entity's own
notice.
*Response:* We agree with commenters' concerns about the potential
administrative and financial burdens of requiring covered providers that
have indirect treatment relationships with individuals, such as clinical
laboratories, to distribute the notice. Therefore, we require these
covered providers to provide the notice only upon request. In addition,
these covered providers may elect to reach agreements with other
entities distribute their notice on their behalf, or to participate in
an organized health care arrangement that produces a joint notice. See §
164.520(d) and the corresponding preamble discussion of joint notice
requirements.
*Comment:* Some commenters requested that covered health care providers
be permitted to distribute their notice prior to an individual's initial
visit so that patients could review the information in advance of the
visit. They suggested that distribution in advance would reduce the
amount of time covered health care providers' staff would have to spend
explaining the notice to patients in the office. Other comments argued
that providers should distribute their notice to patients at the time
the individual visits the provider, because providers lack the
administrative infrastructure necessary to develop and distribute mass
communications and generally have difficulty identifying active
patients.
*Response:* In the final rule, we clarify that covered providers with
direct treatment relationships must provide the notice to patients no
later than the first service delivery to the patient after the
compliance date. For the reasons identified by these commenters, we do
not require covered providers to send their notice to the patient in
advance of the patient's visit. We do not prohibit distribution in
advance, but only require distribution to the patient as of the time of
the visit. We believe this flexibility will allow each covered provider
to develop procedures that best meet its and its patients' needs.
*Comment:* Some comments suggested that covered providers should be
required to distribute the notice as of the compliance date. They noted
that if the covered provider waited to distribute the notice until first
service delivery, it would be possible (pursuant to the rule) for a use
or disclosure to be made without the individual's authorization, but
before the individual receives the notice.
*Response:* Because health care providers generally lack the
administrative infrastructure necessary to develop and distribute mass
communications and generally have difficulty identifying active
patients, we do not require covered providers to distribute the notice
until the first service delivery after the compliance date. We
acknowledge that this policy allows uses and disclosure of health
information without individuals' consent or authorization before the
individual receives the notice. We require covered entities, including
covered providers, to have the notice available upon request as of the
compliance date of the rule. Individuals may request a copy of the
notice from their provider at any time.
*Comment:* Many commenters were concerned with the requirement that
covered providers post their notice. Some commenters suggested that
covered hospital-based providers should be able to satisfy the
distribution requirements by posting their notice in multiple locations
at the hospital, rather than handing the notice to patients -
particularly with respect to distribution after material revisions have
been made. Some additionally suggested that these covered providers
should have copies of the notice available on site. Some commenters
emphasized that the notice must be clear and conspicuous to give
individuals meaningful and effective notice of their rights. Other
commenters noted that posting the notice will not inform former patients
who no longer see the provider.
*Response:* We clarify in the final rule that the requirement to post a
notice does not substitute for the requirement to give individuals a
notice or make notices available upon request. Covered providers with
direct treatment relationships, including covered hospitals, must give a
copy of the notice to the individual as of first service delivery after
the compliance date. After giving the individual a copy of the notice as
of that first visit, the covered provider has no other obligation to
actively distribute the notice. We believe it is unnecessarily
burdensome to require covered providers to mail the notice to all
current and former patients each time the notice is revised, because
unlike health plans, providers may have a difficult time identifying
active patients. All individuals, including those who no longer see the
covered provider, have the right to receive a copy of the notice on
request.
If the covered provider maintains a physical delivery site, it must also
post the notice (including revisions to the notice) in a clear and
prominent location where it is reasonable to expect individuals seeking
service from the covered provider to be able to read the notice. The
covered provider must also have the notice available on site for
individuals to be able to request and take with them.
*Comment:* Some comments requested clarification about the distribution
requirements for a covered entity that is a health plan and a covered
health care provider.
*Response:* Under § 164.504(g), discussed above, covered entities that
conduct multiple types of covered functions, such as the kind of
entities described in the above comments, are required to comply with
the provisions applicable to a particular type of health care function
when acting in that capacity. Thus, in the example described above, the
covered entity is required by § 164.504(g) to follow the requirements
for health plans with respect to its actions as a health plan and to
follow the requirements for health care providers with respect to its
actions as a health care provider.
*Comment:* We received many comments about the ability of covered
entities to distribute their notices electronically. Many commenters
suggested that we permit covered entities to distribute the notice
electronically, either via a web site or e-mail. They argued that
covered entities are increasingly using electronic technology to
communicate with patients and otherwise administer benefits. They also
noted that other regulations permit similar documents, such as
ERISA-required summary plan descriptions, to be delivered
electronically. Some commenters suggested that electronic distribution
should be permitted unless the individual specifically requests a hard
copy or lacks electronic access. Some argued that entities should be
able to choose a least-cost alternative that allows for periodic changes
without excessive mailing costs. A few commenters suggested requiring
covered entities to distribute notices electronically.
*Response:* We clarify in the final rule that covered entities may elect
to distribute their notice electronically, provided the individual
agrees to receiving the notice electronically and has not withdrawn such
agreement. We do not require any particular form of agreement. For
example, a covered provider could ask an individual at the time the
individual requests a copy of the notice whether she prefers to receive
it in hard copy or electronic form. A health plan could ask an
individual applying for coverage to provide an e-mail address where the
health plan can send the individual information. If the individual
provides an e-mail address, the health plan can infer agreement to
obtain information electronically.
An individual who has agreed to receive the notice electronically,
however, retains the right to request a hard copy of the notice. This
right must be described in the notice. In addition, if the covered
entity knows that electronic transmission of the notice has failed, the
covered entity must produce a hard copy of the notice. We believe this
provision allows covered entities flexibility to provide the notice in
the form that best meets their needs without compromising individuals'
right to adequate notice of covered entities' information practices.
We note that covered entities may also be subject to the Electronic
Signatures in Global and National Commerce Act. This rule is not
intended to alter covered entities' requirements under that Act.
*Comment:* Some commenters were concerned that covered providers with
"face-to-face" patient contact would have a competitive disadvantage
against covered internet-based providers, because the face-to-face
providers would be required to distribute the notice in hard copy while
internet-based providers could satisfy the requirement by requiring
review of the notice on the web site before processing an order. They
suggested allowing face-to-face covered providers to satisfy the
distribution requirement by asking patients to review the notice posted
on site.
*Response:* We clarify in the final rule that covered health care
providers that provide services to individuals over the internet have
direct treatment relationships with those individuals. Covered
internet-based providers, therefore, must distribute the notice at the
first service delivery after the compliance date by automatically and
contemporaneously providing the notice electronically in response to the
individual's first request for service, provided the individual agrees
to receiving the notice electronically.
Even though we require all covered entity web sites to post the entity's
notice prominently, we note that such posting is not sufficient to meet
the distribution requirements. A covered internet-based provider must
send the notice electronically at the individual's first request for
service, just as other covered providers with direct treatment
relationships must give individuals a copy of the notice as of the first
service delivery after the compliance date.
We do not intend to create competitive advantages among covered
providers. A web-based and a non-web-based covered provider each have
the same alternatives available for distribution of the notice. Both
types of covered providers may provide either a paper copy or an
electronic copy of the notice.
*Comment:* We received several comments suggesting that some covered
entities should be exempted from the notice requirement or permitted to
combine notices with other covered entities. Many comments argued that
the notice requirement would be burdensome for hospital-based physicians
and result in numerous, duplicative notices that would be meaningless or
confusing to patients. Other comments suggested that multiple health
plans offered through the same employer should be permitted to produce a
single notice.
*Response:* We retain the requirement for all covered health care
providers and health plans to produce a notice of information practices.
Health care clearinghouses are required to produce a notice of
information practices only to the extent the clearinghouse creates or
receives protected health information other than as a business associate
of a covered entity. See § 164.500(b)(2). Two other types of covered
entities are not required to produce a notice: a correctional
institution that is a covered entity and a group health plan that
provides benefits only through one or more contracts of insurance with
health insurance issuers or HMOs.
We clarify in § 164.504(d), however, that affiliated covered entities
under common ownership or control may designate themselves as a single
covered entity for purposes of this rule. An affiliated covered entity
is only required to produce a single notice.
In addition, covered entities that participate in an organized health
care arrangement - which could include hospitals and their associated
physicians - may choose to produce a single, joint notice, if certain
requirements are met. See § 164.501 and the corresponding preamble
discussion of organized health care arrangements.
We clarify that each covered entity included in a joint notice must meet
the applicable distribution requirements. If any one of the covered
entities, however, provides the notice to a given individual, the
distribution requirement with respect to that individual is met for all
of the covered entities included in the joint notice. For example, a
covered hospital and its attending physicians may elect to produce a
joint notice. When an individual is first seen at the hospital, the
hospital must provide the individual with a copy of the joint notice.
Once the hospital has done so, the notice distribution requirement for
all of the attending physicians that provide treatment to the individual
at the hospital and that are included in the joint notice is satisfied.
*Comment:* We solicited and received comments on whether to require
covered entities to obtain the individual's signature on the notice.
Some commenters suggested that requiring a signature would convey the
importance of the notice, would make it more likely that individuals
read the notice, and could have some of the same benefits of a consent.
They noted that at least one state already requires entities to make a
reasonable effort to obtain a signed notice. Other comments noted that
the signature would be useful for compliance and risk management
purposes because it would document that the individual had received the
notice.
The majority of commenters on this topic, however, argued that a signed
acknowledgment would be administratively burdensome, inconsistent with
the intent of the Administrative Simplification requirements of HIPAA,
impossible to achieve for incapacitated individuals, difficult to
achieve for covered entities that do not have direct contact with
patients, inconsistent with other notice requirements under other laws,
misleading to individuals who might interpret their signature as an
agreement, inimical to the concept of permitting uses and disclosures
without authorization, and an insufficient substitute for authorization.
*Response*: We agree with the majority of commenters and do not require
covered entities to obtain the individual's signed acknowledgment of
receipt of the notice. We believe that we satisfied most of the
arguments in support of requiring a signature with the new policy
requiring covered health care providers with direct treatment
relationships to obtain a consent for uses and disclosures of protected
health information to carry out treatment, payment, and health care
operations. See § 164.506 and the corresponding preamble discussion of
consent requirements. We note that this rule does not preempt other
applicable laws that require a signed notice and does not prohibit a
covered entity from requesting an individual to sign the notice.
*Comment:* Some commenters supported requiring covered entities to
adhere to their privacy practices, as described in their notice. They
argued that the notice is meaningless if a covered entity does not
actually have to follow the practices contained in its notice. Other
commenters were concerned that the rule would prevent a covered entity
from using or disclosing protected health information in otherwise
lawful and legitimate ways because of an intentional or inadvertent
omission from its published notice. Some of these commenters suggested
requiring the notice to include a description of some or all disclosures
that are required or permitted by law. Some commenters stated that the
adherence requirement should be eliminated because it would generally
inhibit covered entities' ability to innovate and would be burdensome.
*Response*: We agree that the value of the notice would be significantly
diminished absent a requirement that covered entities adhere to the
statements they make in their notices. We therefore retain the
requirement for covered entities to adhere to the terms of the notice.
See § 164.502(i).
Many of these commenters' concerns regarding a covered entity's
inability to use or disclose protected health information due to an
intentional or inadvertent omission from the notice are addressed in our
revisions to the proposed content requirements for the notice. Rather
than require covered entities to describe only those uses and
disclosures they anticipate making, as proposed, we require covered
entities to describe all uses and disclosures they are required or
permitted to make under the rule without the individual's consent or
authorization. We permit a covered entity to provide a statement that it
will disclose protected health information that is otherwise required by
law, as permitted in § 164.512(a), without requiring them to list all
state laws that may require disclosure. Because the notice must describe
all legally permissible uses and disclosures, the notice will not
generally preclude covered entities from making any uses or disclosures
they could otherwise make without individual consent or authorization.
This change will also ensure that individuals are aware of all possible
uses and disclosures that may occur without their consent or
authorization, regardless of the covered entity's current practices.
We encourage covered entities, however, to additionally describe the
more limited uses and disclosures they actually anticipate making in
order to give individuals a more accurate understanding of how
information about them will be shared. We expect that certain covered
entities will want to distinguish themselves on the basis of their
privacy protections. We note that a covered entity that chooses to
exercise this option must clearly state that, at a minimum, the covered
entity may make disclosures that are required by law and that are
necessary to avert a serious and imminent threat to health or safety.
**SECTION 164.522---RIGHTS TO REQUEST PRIVACY PROTECTION FOR PROTECTED
HEALTH INFORMATION**
**Section 164.522(a)---Right of an Individual to Request Restriction of
Uses and Disclosures**
*Comment:* Several commenters supported the language in the NPRM
regarding the right to request restrictions. One commenter specifically
stated that this is a balanced approach that addresses the needs of the
few who would have reason to restrict disclosures without negatively
affecting the majority of individuals. At least one commenter explained
that if we required consent or authorization for use and disclosure of
protected health information for treatment, payment, and health care
operations that we must also have a right to request restrictions of
such disclosure in order to make the consent meaningful.
Many commenters requested that we delete this provision, claiming it
would interfere with patient care, payment, and data integrity. Most of
the commenters that presented this position asserted that the framework
of giving patients control over the use or disclosure of their
information is contrary to good patient care because incomplete medical
records may lead to medical errors, misdiagnoses, or inappropriate
treatment decisions. Other commenters asserted that covered entities
need complete data sets on the populations they serve to effectively
conduct research and quality improvement projects and that restrictions
would hinder research, skew findings, impede quality improvement, and
compromise accreditation and performance measurement.
*Response:* We acknowledge that widespread restrictions on the use and
disclosure of protected health information could result in some
difficulties related to payment, research, quality assurance, etc.
However, in our efforts to protect the privacy of health information
about individuals, we have sought a balance in determining the
appropriate level of individual control and the smooth operation of the
health care system. In the final rule, we require certain covered
providers and permit all covered entities to obtain consent from
individuals for use and disclosure of protected health information for
treatment, payment, and health care operations (see § 164.506). In order
to give individuals some control over their health information for uses
and disclosures of protected health information for treatment, payment,
and health care operations, we provide individuals with the opportunity
to request restrictions of such uses and disclosures.
Because the right to request restrictions encourages discussions about
how protected health information may be used and disclosed and about an
individual's concerns about such uses and disclosures, it may improve
communications between a provider and patient and thereby improve care.
According to a 1999 survey on the Confidentiality of Medical Records by
the California HealthCare Foundation, one out of every six people engage
in behavior to protect themselves from unwanted disclosures of health
information, such as lying to providers or avoiding seeking care. This
indicates that, without the ability to request restrictions, individuals
would have incentives to remain silent about important health
information that could have an effect on their health and health care,
rather than consulting a health care provider.
Further, this policy is not a dramatic change from the *status quo*.
Today, many state laws restrict disclosures for certain types of health
information without patient's authorization. Even if there is no
mandated requirement to restrict disclosures of health information,
providers may agree to requests for restrictions of disclosures when a
patient expresses particular sensitivity and concern for the disclosure
of health information.
We agree that there may be instances in which a restriction could
negatively affect patient care. Therefore, we include protections
against this occurrence. First, the right to request restrictions is a
right of individuals to make the request. A covered entity may refuse to
restrict uses and disclosures or may agree only to certain aspects of
the individual's request if there is concern for the quality of patient
care in the future. For example, if a covered provider believes that it
is not in the patient's best medical interest to have such a
restriction, the provider may discuss the request for restriction with
the patient and give the patient the opportunity to explain the concern
for disclosure. Also, a covered provider who is concerned about the
implications on future treatment can agree to use and disclose sensitive
protected health information for treatment purposes only and agree not
to disclose information for payment and operation purposes. Second, a
covered provider need not comply with a restriction that has been agreed
to if the individual who requested the restriction is in need of
emergency treatment and the restricted protected health information is
needed to provide the emergency treatment. This exception should limit
the harm to health that may otherwise result from restricting the use or
disclosure of protected health information. We encourage covered
providers to discuss with individuals that the information may be used
or disclosed in emergencies. We require that the covered entity that
discloses restricted protected health information in an emergency
request that the health care provider that receives such information not
further use or re-disclose the information.
*Comment:* Some health plans stated that an institutionalized right to
restrict can interfere with proper payment and can make it easier for
unscrupulous providers or patients to commit fraud on insurance plans.
They were concerned that individuals could enter into restrictions with
providers to withhold information to insurance companies so that the
insurance company would not know about certain conditions when
underwriting a policy.
*Response:* This rule does not enhance the ability of unscrupulous
patients or health care providers to engage in deceptive or fraudulent
withholding of information. This rule grants a right to request a
restriction, not an absolute right to restrict. Individuals can make
such requests today. Other laws criminalize insurance fraud; this
regulation does not change those laws.
*Comment:* One commenter asserted that patients cannot anticipate the
significance that one aspect of their medical information will have on
treatment of other medical conditions, and therefore, allowing them to
restrict use or disclosure of some information is contrary to the
patient's best interest.
*Response:* We agree that patients may find it difficult to make such a
calculus, and that it is incumbent on health care providers to help them
do so. Health care providers may deny requests for or limit the scope of
the restriction requested if they believe the restriction is not in the
patient's best interest.
*Comment:* One commenter asked whether an individual's restriction to
disclosure of information will be a bar to liability for misdiagnosis or
failure to diagnose by a covered entity who can trace its error back to
the lack of information resulting from such restriction.
*Response:* Decisions regarding liability and professional standards are
determined by state and other law. This rule does not establish or limit
liability for covered entities under those laws. We expect that the
individual's request to restrict the disclosure of their protected
health information would be considered in the decision of whether or not
a covered entity is liable.
*Comment:* One commenter requested that we allow health plans to deny
coverage or reimbursement when a covered health care provider's
agreement to restrict use or disclosure prevents the plan from getting
the information that is necessary to determine eligibility or coverage.
*Response:* In this rule, we do not modify insurers' rules regarding
information necessary for payment. We recognize that restricting the
disclosure of information may result in a denial of payment. We expect
covered providers to explain this possibility to individuals when
considering their requests for restrictions and to make alternative
payment arrangements with individuals if necessary.
*Comment:* Some commenters discussed the administrative burden and cost
of the requirement that individuals have the right to request
restrictions and that trying to segregate certain portions of
information for protection may be impossible. Others stated that the
administrative burden would make providers unable to accommodate
restrictions, and would therefore give patients false expectations that
their right to request restrictions may be acted upon. One commenter
expressed concern that large covered providers would have a particularly
difficult time establishing a policy whereby the covered entity could
agree to restrictions and would have an even more difficult time
implementing the restrictions since records may be kept in multiple
locations and accessed by multiple people within the organization. Still
other commenters believed that the right to request restrictions would
invite argument, delay, and litigation.
*Response:* We do not believe that this requirement is a significant
change from current practice. Providers already respond to requests by
patients regarding sensitive information, and are subject to state law
requirements not to disclose certain types of information without
authorization. This right to request is permissive so that covered
entities can balance the needs of particular individuals with the
entity's ability to manage specific accommodations.
*Comment:* Some commenters were concerned that a covered entity would
agree to a restriction and then realize later that the information must
be disclosed to another caregiver for important medical care purposes.
*Response:* Some individuals seek treatment only on the condition that
information about that treatment will not be shared with others. We
believe it is necessary and appropriate, therefore, that when a covered
provider agrees to such a restriction, the individual must be able to
rely on that promise. We strongly encourage covered providers to
consider future treatment implications of agreeing to a restriction. We
encourage covered entities to inform others of the existence of a
restriction when appropriate, provided that such notice does not amount
to a *de facto* disclosure of the restricted information. If the covered
provider subject to the restriction believes that disclosing the
protected health information that was created or obtained subject to the
restriction is necessary to avert harm (and it is not for emergency
treatment), the provider must ask the individual for permission to
terminate or modify the restriction. If the individual agrees to the
termination of the restriction, the provider must document this
termination by noting this agreement in the medical record or by
obtaining a written agreement of termination from the individual and may
use or disclose the information for treatment. If the individual does
not agree to terminate or modify the restriction, however, the provider
must continue to honor the restriction with respect to protected health
information that was created or received subject to the restriction. We
note that if the restricted protected health information is needed to
provide emergency treatment to the individual who requested the
restriction, the covered entity may use or disclose such information for
such treatment.
*Comment:* Commenters asked that we require covered entities to keep an
accounting of the requests for restrictions and to report this
information to the Department in order for the Department to determine
whether covered entities are showing \"good faith\" in dealing with
these requests.
*Response:* We require that covered entities that agree to restrictions
with individuals document such restrictions. A covered entity must
retain such documentation for six years from the date of its creation or
the date when it last was in effect, whichever is later. We do not
require covered entities to keep a record of all requests made,
including those not agreed to, nor that they report such requests to the
Department. The decision to agree to restrictions is that of the covered
entity. Because there is no requirement to agree to a restriction, there
is no reason to impose the burden to document requests that are denied.
Any reporting requirement could undermine the purpose of this provision
by causing the sharing, or appearance of sharing, of information for
which individuals are seeking extra protection.
*Comment:* One commenter asserted that providers that currently allow
such restrictions will choose not to do so under the rule based on the
guidance of legal counsel and loss prevention managers, and suggested
that the Secretary promote competition among providers with respect to
privacy by developing a third-party ranking mechanism.
*Response:* We believe that providers will do what is best for their
patients, in accordance with their ethics codes, and will continue to
find ways to accommodate requested restrictions when they believe that
it is in the patients\' best interests. We anticipate that providers who
find such action to be of commercial benefit will notify consumers of
their willingness to be responsive to such requests. Involving third
parties could undermine the purpose of this provision, by causing the
sharing, or appearance of sharing, of information for which individuals
are seeking extra protection.
*Comment:* One commenter said that any agreement regarding
patient-requested restrictions should be in writing before a covered
provider would be held to standards for compliance.
*Response:* We agree that agreed to restrictions must be documented in
writing, and we require that covered entities that agree to restrictions
document those restrictions in accordance with § 164.530(j). The writing
need not be formal; a notation in the medical record will suffice. We
disagree with the request that an agreed to restriction be reduced to
writing in order to be enforced. If we adopted the requested policy, a
covered entity could agree to a restriction with an individual, but
avoid being held to this agreed to restriction under the rule by failing
to document the restriction. This would give a covered entity the
opportunity to agree to a restriction and then, at its sole discretion,
determine if it is enforceable by deciding whether or not to make a note
of the restriction in the record about the individual. Because the
covered entity has the ability to agree or fail to agree to a
restriction, we believe that once the restriction is agreed to, the
covered entity must honor the agreement. Any other result would be
deceptive to the individual and could lead an individual to disclose
health information under the assumption that the uses and disclosures
will be restricted. Under § 164.522, a covered entity could be found to
be in violation of the rule if it fails to put an agreed-upon
restriction in writing and also if it uses or discloses protected health
information inconsistent with the restriction.
*Comment:* Some commenters said that the right to request restrictions
should be extended to some of the uses and disclosures permitted without
authorization in § 164.510 of the NPRM, such as disclosures to next of
kin, for judicial and administrative proceedings, for law enforcement,
and for governmental health data systems. Other commenters said that
these uses and disclosures should be preserved without an opportunity
for individuals to opt out.
*Response:* We have not extended the right to request restrictions under
this rule to disclosures permitted in § 164.512 of the final rule.
However, we do not preempt other law that would enforce such agreed-upon
restrictions. As discussed in more detail, above, we have extended the
right to request restrictions to disclosures to persons assisting in the
individual's care, such as next of kin, under § 164.510(b). Any
restriction that a covered entity agrees to with respect to persons
assisting in the individual's care in accordance with the rule will be
enforceable under the rule.
*Comment:* A few commenters raised the question of the effect of a
restriction agreed to by one covered entity that is part of a larger
covered entity, particularly a hospital. Commenters were also concerned
about who may speak on behalf of the covered entity.
*Response:* All covered entities are required to establish policies and
procedures for providing individuals the right to request restrictions,
including policies for who may agree to such restrictions on the covered
entity's behalf. Hospitals and other large entities that are concerned
about employees agreeing to restrictions on behalf of the organization
will have to make sure that their policies are communicated
appropriately to those employees. The circumstances under which members
of a covered entity's workforce can bind the covered entity are a
function of other law, not of this regulation.
*Comment:* Commenters expressed confusion about the intended effect of
any agreed-upon restrictions on downstream covered entities. They
asserted that it would be extremely difficult for a requested
restriction to be followed through the health care system and that it
would be unfair to hold covered entities to a restriction when they did
not agree to such restriction. Specifically, commenters asked whether a
covered provider that receives protected health information in
compliance with this rule from a physician or medical group that has
agreed to limit certain uses of the information must comply with the
original restriction. Other commenters expressed concern that not
applying a restriction to downstream covered entities is a loophole and
that all downstream covered providers and health plans should be bound
by the restrictions.
*Response:* Under the final rule, a restriction that is agreed to
between an individual and a covered entity is only binding on the
covered entity that agreed to the restriction and not on downstream
entities. It would also be binding on any business associate of the
covered entity since a business associate can not use or disclose
protected health information in any manner that a covered entity would
not be permitted to use or disclose such information. We realize that
this may limit the ability of an individual to successfully restrict a
use or disclosure under all circumstances, but we take this approach for
two reasons. First, we allow covered entities to refuse individuals'
requests for restrictions. Requiring downstream covered entities to
abide by a restriction would be tantamount to forcing them to agree to a
request to which they otherwise may not have agreed. Second, some
covered entities have information systems which will allow them to
accommodate such requests, while others do not. If the downstream
provider is in the latter category, the administrative burden of such a
requirement would be unmanageable.
We encourage covered entities to explain this limitation to individuals
when they agree to restrictions, so individuals will understand that
they need to ask all their health plans and providers for desired
restrictions. We also require that a covered entity that discloses
protected health information to a health care provider for emergency
treatment, in accordance with § 164.522 (a)(iii), to request that the
recipient not further use or disclose the information.
*Comment:* One commenter requested that agreed-to restrictions of a
covered entity not be applied to business associates.
*Response:* As stated in § 164.504(e)(2), business associates are acting
on behalf of, or performing services for, the covered entity and may
not, with two narrow exceptions, use or disclose protected health
information in a manner that would violate this rule if done by the
covered entity. Business associates are agents of the covered entity
with respect to protected health information they obtain through the
business relationship. If the covered entity agrees to a restriction
and, therefore, is bound to such restriction, the business associate
will also be required to comply with the restriction. If the covered
entity has agreed to a restriction, the satisfactory assurances from the
business associate, as required in § 164.504(e), must include assurances
that protected health information will not be used or disclosed in
violation of an agreed to restriction.
*Comment:* One commenter requested clarification that the right to
request restrictions cannot be used to restrict the creation of
de-identified information.
*Response:* We found no reason to treat the use of protected health
information to create de-identified information different from other
uses of protected health information. The right to request restriction
applies to any use or disclosure of protected health information to
carry out treatment, payment, or health care operations. If the covered
entity uses protected health information to create de-identified
information, the covered entity need not agree to a restriction of this
use.
*Comment:* Some commenters stated that individuals should be given a
true right to restrict uses and disclosures of protected health
information in certain defined circumstances (such as for sensitive
information) rather than a right to request restrictions.
*Response:* We are concerned that a right to restrict could create
conflicts with the professional ethical obligations of providers and
others. We believe it is better policy to allow covered entities to
refuse to honor restrictions that they believe are not appropriate and
leave the individual with the option of seeking service from a different
covered entity. In addition, many covered entities have information
systems that would make it difficult or impossible to accommodate
certain restrictions.
*Comment:* Some commenters requested that self-pay patients have
additional rights to restrict protected health information. Others
believed that this policy would result in *de facto* discrimination
against those patients that could not afford to pay out-of-pocket.
*Response:* Under the final rule, the decision whether to tie an
agreement to restrict to the way the individual pays for services is
left to each covered entity. We have not provided self-pay patients with
any special rights under the rule.
*Comment:* Some commenters suggested that we require restrictions to be
clearly noted so that insurers and other providers would be aware that
they were not being provided with complete information.
*Response:* Under the final rule, we do not require or prohibit a
covered entity to note the existence of an omission of information. We
encourage covered entities to inform others of the existence of a
restriction, in accordance with professional practice and ethics, when
appropriate to do so. In deciding whether or not to disclose the
existence of a restriction, we encourage the covered entity to carefully
consider whether disclosing the existence is tantamount to disclosure of
the restricted protected health information so as to not violate the
agreed to restriction.
*Comment:* A few commenters said that covered entities should have the
right to modify or revoke an agreement to restrict use or disclosure of
protected health information.
*Response:* We agree that, as circumstances change, covered entities
should be able to revisit restrictions to which they had previously
agreed. At the same time, individuals should be able to rely on
agreements to restrict the use or disclosure of information that they
believe is particularly sensitive. If a covered entity would like to
revoke or modify an agreed-upon restriction, the covered entity must
renegotiate the agreement with the individual. If the individual agrees
to modify or terminate the restriction, the covered entity must get
written agreement from the individual or must document the oral
agreement. If the individual does not agree to terminate or modify the
restriction, the covered entity must inform the individual that it is
modifying or terminating its agreement to the restriction and any
modification or termination would apply only with respect to protected
health information created or received after the covered entity informed
the individual of the termination. Any protected health information
created or received during the time between when the restriction was
agreed to and when the covered entity informed the individual or such
modification or termination remains subject to the restriction.
*Comment:* Many commenters advocated for stronger rights to request
restrictions, particularly that victims of domestic violence should have
an absolute right to restrict disclosure of information.
*Response:* We address restrictions for disclosures in two different
ways, the right to request restrictions (§ 164.522(a)) and confidential
communications (§ 164.522(b)). We have provided all individuals with a
right to request restrictions on uses or disclosures of treatment,
payment, and health care operations. This is not an absolute right to
restrict. Covered entities are not required to agree to requested
restrictions; however, if they do, the rule would require them to act in
accordance with the restrictions. (See the preamble regarding § 164.522
for a more comprehensive discussion of the right to request
restrictions.)
In the final rule, we create a new provision that provides individuals
with a right to confidential communications, in response to these
comments. This provision grants individuals with a right to restrict
disclosures of information related to communications made by a covered
entity to the individual, by allowing the individual to request that
such communications be made to the person at an alternative location or
by an alternative means. For example, a woman who lives with an abusive
man and is concerned that his knowledge of her health care treatment may
lead to additional abuse can request that any mail from the provider be
sent to a friend's home or that telephone calls by a covered provider be
made to her at work. Other reasonable accommodations may be requested as
well, such as requesting that a covered provider never contact the
individual by a phone, but only contact her by electronic mail. A
provider must accommodate an individual's request for confidential
communications, under this section, without requiring an explanation as
to the reason for the request as a condition of accommodating the
request. The individual does not need to be in an abusive situation to
make such requests of a covered provider. The only conditions that a
covered provider may place on an individual is that the request be
reasonable with respect to the administrative burden on the provider,
the request to be in writing, the request specify an alternative address
or other method of contact, and that (where relevant) the individual
provide information about how payment will be handled. What is
reasonable may vary by the size or type of covered entity; however,
additional modest cost to the provider would not be unreasonable.
An individual also has a right to restrict communications from a health
plan. The right is the same as with covered providers except it is
limited to cases where the disclosure of information could endanger the
individual. A health plan may require an individual to state this fact
as a condition of accommodating the individual's request for
confidential communications. This would provide victims of domestic
violence the right to control such disclosures.
*Comment:* Commenters opposed the provision of the NPRM (§
164.506(c)(1)(ii)(B)) stating that an individual\'s right to request
restrictions on use or disclosure of protected health information would
not apply in emergency situations as set forth in proposed § 164.510(k).
Commenters asserted that victims who have been harmed by violence may
first turn to emergency services for help and that, in such situations,
the victim should be able to request that the perpetrator not be told of
his or her condition or whereabouts.
*Response:* We agree with some of the commenters' concerns. In the final
rule, the right to request restrictions is available to all individuals
regardless of the circumstance or the setting in which the individual is
obtaining care. For example, an individual that seeks care in an
emergency room has the same right to request a restriction as an
individual seeking care in the office of a covered physician.
However, we continue to permit a covered entity to disclose protected
health information to a health care provider in an emergency treatment
situation if the restricted protected health information is needed to
provide the emergency treatment or if the disclosure is necessary to
avoid serious and imminent threats to public health and safety. Although
we understand the concern of the commenters, we believe that these
exceptions are limited and will not cause a covered entity to disclose
information to a perpetrator of a crime. We are concerned that a covered
provider would be required to delay necessary care if a covered entity
had to determine if a restriction exists at the time of such emergency.
Even if a covered entity knew that there was a restriction, we permitted
this limited exception for emergency situations because, as we had
stated in the preamble for § 164.506 of the NPRM, an emergency situation
may not provide sufficient opportunity for a patient and health care
provider to discuss the potential implications of restricting use and
disclosure of protected health information on that emergency. We also
believe that the importance of avoiding serious and imminent threats to
health and safety and the ethical and legal obligations of covered
health care providers\' to make disclosures for these purposes is so
significant that it is not appropriate to apply the right to request
restrictions on such disclosures.
We note that we have included other provisions in the final rule
intended to avoid or minimize harm to victims of domestic violence.
Specifically, we include provisions in the final rule that allow
individuals to opt out of certain types of disclosures and require
covered entities to use professional judgment to determine whether
disclosure of protected health information is in a patient's best
interest (see § 164.510(a) on use and disclosure for facility
directories and § 164.510(b) on uses and disclosures for assisting in an
individual's care and notification purposes). Although an agreed to
restriction under § 164.522 would apply to uses and disclosures for
assisting in an individual's care, the opt out provision in § 164.510(b)
can be more helpful to a person who is a victim of domestic violence
because the individual can opt out of such disclosure without obtaining
the agreement of the covered provider. We permit a covered entity to
elect not to treat a person as a personal representative (see §
164.502(g)) or to deny access to a personal representative (see §
164.524(a)(3)(iii)) where there are concerns related to abuse. We also
include a new § 164.512(c) which recognizes the unique circumstances
surrounding disclosure of protected health information about victims of
abuse, neglect, and domestic violence.
**Section 164.522(b)---Confidential Communications Requirements**
*Comment:* Several commenters requested that we add a new section to
prevent disclosure of sensitive health care services to members of the
patient's family through communications to the individual's home, such
as appointment notices, confirmation or scheduling of appointments, or
mailing a bill or explanation of benefits, by requiring covered entities
to agree to correspond with the patient in another way. Some commenters
stated that this is necessary in order to protect inadvertent disclosure
of sensitive information and to protect victims of domestic violence
from disclosure to an abuser. A few commenters suggested that a covered
entity should be required to obtain an individual's authorization prior
to communicating with the individual at the individual's home with
respect to health care relating to sensitive subjects such as
reproductive health, sexually transmissible diseases, substance abuse or
mental health.
*Response:* We agree with commenters' concerns regarding covered
entities' communications with individuals. We created a new provision, §
164.522(b), to address confidential communications by covered entities.
This provision gives individuals the right to request that they receive
communications from covered entities at an alternative address or by an
alternative means, regardless of the nature of the protected health
information involved. Covered providers are required to accommodate
reasonable requests by individuals and may not require the individual to
explain the basis for the request as a condition of accommodation.
Health plans are required to accommodate reasonable requests by
individuals as well; however, they may require the individual to provide
a statement that disclosure of the information could endanger the
individual, and they may condition the accommodation on the receipt of
such statement.
Under the rule, we have required covered providers to accommodate
requests for communications to alternative addresses or by alternative
means, regardless of the reason, to limit risk of harm. Providers have
more frequent one-on-one communications with patients, making the safety
concerns from an inadvertent disclosure more substantial and the need
for confidential communications more compelling. We have made the
requirement for covered providers absolute and not contingent on the
reason for the request because we wanted to make it relatively easy for
victims of domestic violence, who face real safety concerns by
disclosures of health information, to limit the potential for such
disclosures.
The standard we created for health plans is different from the
requirement for covered providers, in that we only require health plans
to make requested accommodations for confidential communications when
the individual asserts that disclosure could be dangerous to the
individual. We address health plan requirements in this way because
health plans are often issued to a family member (the employee), rather
than to each individual member of a family, and therefore, health plans
tend to communicate with the named insured rather than with individual
family members. Requiring plans to accommodate a restriction for one
individual could be administratively more difficult than it is for
providers that regularly communicate with individuals. However, in the
case of domestic violence or potential abuse, the level of harm that can
result from a disclosure of protected health information tips the
balance in favor of requiring such restriction to prevent inadvertent
disclosure. We have adopted the policy recommended by the National
Association of Insurance Commissioners in the Health Information Policy
Model Act (1998) as this best reflects the balance of the appropriate
level of regulation of the industry compared with the need to protect
individuals from harm that may result from inadvertent disclosure of
information. This policy is also consistent with recommendations made in
the Family Violence Prevention Fund's publication "Health Privacy
Principles for Protecting Victims of Domestic Violence" (October 2000).
Of course, health plans may accommodate requests for confidential
communications without requiring a statement that the individual would
be in danger from disclosure of protected health information.
*Comment:* One commenter requested that we create a standard that all
information from a health plan be sent to the patient and not the
policyholder or subscriber.
*Response:* We require health plans to accommodate certain requests that
information not be sent to a particular location or by particular means.
A health plan must accommodate reasonable requests by individuals that
protected health information about them be sent directly to them and not
to a policyholder or subscriber, if the individual states that he or she
may be in danger from disclosure of such information. We did not
generally require health plans to send information to the patient and
not the policyholder or subscriber because we believed it would be
administratively burdensome and because the named insured may have a
valid need for such information to manage payment and benefits.
**Sensitive Subjects**
*Comment:* Many commenters requested that additional protections be
placed on sensitive information, including information regarding
HIV/AIDS, sexually transmitted diseases, mental health, substance abuse,
reproductive health, and genetics. Many requested that we ensure the
regulation adequately protects victims of domestic violence. They
asserted that the concern for discrimination or stigma resulting from
disclosure of sensitive health information could dissuade a person from
seeking needed treatment. Some commenters noted that many state laws
provide additional protections for various types of information. They
requested that we develop federal standards to have consistent rules
regarding the protection of sensitive information to achieve the goals
of cost savings and patient protection. Others requested that we require
patient consent or special authorization before certain types of
sensitive information was disclosed, even for treatment, payment, and
health care operations, and some thought we should require a separate
request for each disclosure. Some commenters requested that the right to
request restrictions be replaced with a requirement for an authorization
for specific types of sensitive information. There were recommendations
that we require covered entities to develop internal policies to address
sensitive information.
Other commenters argued that sensitive information should not be
segregated from the record because it may limit a future provider's
access to information necessary for treatment of the individual and it
could further stigmatize a patient by labeling him or her as someone
with sensitive health care issues. These commenters further maintained
that segregation of particular types of information could negatively
affect analysis of community needs, research, and would lead to higher
costs of health care delivery.
*Response:* We generally do not differentiate among types of protected
health information, because all health information is sensitive. The
level of sensitivity varies not only with the type of information, but
also with the individual and the particular situation faced by the
individual. This is demonstrated by the different types of information
that commenters singled out as meriting special protection, and in the
great variation among state laws in defining and protecting sensitive
information. Most states have a law providing heightened protection for
some type of health information. However, even though most states have
considered the issue of sensitive information, the variation among
states in the type of information that is specially protected and the
requirements for permissible disclosure of such information demonstrates
that there is no national consensus.
Where, as in this case, most states have acted and there is no
predominant rule that emerges from the state experience with this issue,
we have decided to let state law predominate. The final rule only
provides a floor of protection for health information and does not
preempt state laws that provider greater protection than the rule. Where
states have decided to treat certain information as more sensitive than
other information, we do not preempt those laws.
To address the variation in the sensitivity of protected health
information without defining specially sensitive information, we
incorporate opportunities for individuals and covered entities to
address specific sensitivities and concerns about uses and disclosures
of certain protected health information that the patient and provider
believe are particularly sensitive, as follows:
- Covered entities are required to provide individuals with notice of
their privacy practices and give individuals the opportunity to
request restrictions of the use and disclosure of protected health
information by the covered entity. (See § 164.522(a) regarding right
to request restrictions.)
- Individuals have the right to request, and in some cases require,
that communications from the covered entity to them be made to an
alternative address or by an alternative means than the covered
entity would otherwise use. (See § 164.522(b) regarding confidential
communications.)
- Covered entities have the opportunity to decide not to treat a
person as a personal representative when the covered entity has a
reasonable belief that an individual has been subjected to domestic
violence, abuse, or neglect by such person or that treating such
person as a personal representative could endanger the individual.
(See § 164.502(g)(5) regarding personal representatives.)
- Covered entities may deny access to protected health information
when there are concerns that the access may result in varying levels
of harm. (See § 164.524(a)(3) regarding denial of access.)
- Covered health care providers may, in some circumstances and
consistent with any known prior preferences of the individual,
exercise professional judgment in the individual's best interest to
not disclose directory information. (See § 164.510(a) regarding
directory information.)
- Covered entities may, in some circumstances, exercise professional
judgment in the individual's best interest to limit disclosure to
persons assisting in the individual's care. (See § 164.510(b)
regarding persons assisting in the individual's care.)
This approach allows for state law and personal variation in this area.
The only type of protected health information that we treat with
heightened protection is psychotherapy notes. We provide a different
level of protection because they are unique types of protected health
information that typically are not used or required for treatment,
payment, or health care operations other than by the mental health
professional that created the notes. (See § 164.508(a)(2) regarding
psychotherapy notes.)
**SECTION 164.524---ACCESS OF INDIVIDUALS TO PROTECTED HEALTH
INFORMATION**
*Comment*: Some commenters recommended that there be no access to
disease registries.
*Response*: Most entities that maintain disease registries are not
covered entities under this regulation; examples of such non-covered
entities are public health agencies and pharmaceutical companies. If,
however, a disease registry is maintained by a covered entity and is
used to make decisions about individuals, this rule requires the covered
entity to provide access to information about a requesting individual
unless one of the rule's conditions for denial of access is met. We
found no persuasive reasons why disease registries should be given
special treatment compared with other information that may be used to
make decisions about an individual.
*Comment*: Some commenters stated that covered entities should be held
accountable for access to information held by business partners so that
individuals would not have the burden of tracking down their protected
health information from a business partner. Many commenters, including
insurers and academic medical centers, recommended that, to reduce
burden and duplication, only the provider who created the protected
health information should be required to provide individuals access to
the information. Commenters also asked that other entities, including
business associates, the Medicare program, and pharmacy benefit
managers, not be required to provide access, in part because they do not
know what information the covered entity already has and they may not
have all the information requested. A few commenters also argued that
billing companies should not have to provide access because they have a
fiduciary responsibility to their physician clients to maintain the
confidentiality of records.
*Response*: A general principle in responding to all of these points is
that a covered entity is required to provide access to protected health
information in accordance with the rule regardless of whether the
covered entity created such information or not. Thus, we agree with the
first point: in order to meet its requirements for providing access, a
covered entity must not only provide access to such protected health
information it holds, but must also provide access to such information
in a designated record set of its business associate, pursuant to its
business associate contract, unless the information is the same as
information maintained directly by the covered entity. We require this
because an individual may not be aware of business associate
relationships. Requiring an individual to track down protected health
information held by a business associate would significantly limit
access. In addition, we do not permit a covered entity to limit its duty
to provide access by giving protected health information to a business
associate.
We disagree with the second point: if the individual directs an access
request to a covered entity that has the protected health information
requested, the covered entity must provide access (unless it may deny
access in accordance with this rule). In order to assure that an
individual can exercise his or her access rights, we do not require the
individual to make a separate request to each originating provider. The
originating provider may no longer be in business or may no longer have
the information, or the non-originating provider may have the
information in a modified or enhanced form.
We disagree with the third point: other entities must provide access
only if they are covered entities or business associates of covered
entities, and they must provide access only to protected health
information that they maintain (or that their business associates
maintain). It would not be efficient to require a covered entity to
compare another entity's information with that of the entity to which
the request was addressed. (See the discussion regarding covered
entities for information about whether a pharmacy benefit manager is a
covered entity.)
We disagree with the fourth point: a billing company will be required by
its business associate contract only to provide the requested protected
health information to its physician client. This action will not violate
any fiduciary responsibility. The physician client would in turn be
required by the rule to provide access to the individual.
*Comment:* Some commenters asked for clarification that the
clearinghouse function of turning non-standardized data into
standardized data does not create non-duplicative data and that
"duplicate" does not mean "identical." A few commenters suggested that
duplicated information in a covered entity's designated record set be
supplied only once per request.
*Response:* We consider as duplicative information the same information
in different formats, media, or presentations, or which have been
standardized. Business associates who have materially altered protected
health information are obligated to provide individuals access to it.
Summary information and reports, including those of lab results, are not
the same as the underlying information on which the summaries or reports
were based. A clean document is not a duplicate of the same document
with notations. If the same information is kept in more than one
location, the covered entity has to produce the information only once
per request for access.
*Comment*: A few commenters suggested requiring covered entities to
disclose to third parties without exception at the requests of
individuals. It was argued that this would facilitate disability
determinations when third parties need information to evaluate
individuals' entitlement to benefits. Commenters argued that since
covered entities may deny access to individuals under certain
circumstances, individuals must have another method of providing third
parties with their protected health information.
*Response*: We allow covered entities to forward protected health
information about an individual to a third party, pursuant to the
individual's authorization under § 164.508. We do not require covered
entities to disclose information pursuant to such authorizations because
the focus of the rule is privacy of protected health information.
Requiring disclosures in all circumstances would be counter to this
goal. In addition, a requirement of disclosing protected health
information to a third party is not a necessary substitute for the right
of access to individuals, because we allow denial of access to
individuals under rare circumstances. However, if the third party is a
personal representative of the individual in accordance with §
164.502(g) and there is no concern regarding abuse or harm to the
individual or another person, we require the covered entity to provide
access to that third party on the individual's behalf, subject to
specific limitations. We note that a personal representative may obtain
access on the individual's behalf in some cases where covered entity may
deny access to the individual. For example, an inmate may be denied a
copy of protected health information, but a personal representative may
be able to obtain a copy on the individual's behalf. See § 164.502(g)
and the corresponding preamble discussion regarding the ability of a
personal representative to act on an individual's behalf.
*Comment*: The majority of commenters supported granting individuals the
right to access protected health information for as long as the covered
entity maintains the protected health information; commenters argued
that to do otherwise would interfere with existing record retention
laws. Some commenters advocated for limiting the right to information
that is less than one or two years old. A few commenters explained that
frequent changes in technology makes it more difficult to access stored
data. The commenters noted that the information obtained prior to the
effective date of the rule should not be required to be accessible.
*Response*: We agree with the majority of commenters and retain the
proposal to require covered entities to provide access for as long as
the entity maintains the protected health information. We do not agree
that information created prior to the effective date of the rule should
not be accessible. The reasons for granting individuals access to
information about them do not vary with the date the information was
created.
*Comment*: A few commenters argued that there should be no grounds for
denying access, stating that individuals should always have the right to
inspect and copy their protected health information.
*Response*: While we agree that in the vast majority of instances
individuals should have access to information about them, we cannot
agree that a blanket rule would be appropriate. For example, where a
professional familiar with the particular circumstances believes that
providing such access is likely to endanger a person's life or physical
safety, or where granting such access would violate the privacy of other
individuals, the benefits of allowing access may not outweigh the harm.
Similarly, we allow denial of access where disclosure would reveal the
source of confidential information because we do not want to interfere
with a covered entity's ability to maintain implicit or explicit
promises of confidence.
We create narrow exceptions to the rule of open access, and we expect
covered entities to employ these exceptions rarely, if at all. Moreover,
we require covered entities to provide access to any protected health
information requested after excluding only the information that is
subject to a denial. The categories of permissible denials are not
mandatory, but are a means of preserving the flexibility and judgment of
covered entities under appropriate circumstances.
*Comment*: Many commenters supported our proposal to allow covered
entities to deny an individual access to protected health information if
a professional determines either that such access is likely to endanger
the life or physical safety of a person or, if the information is about
another person, access is reasonably likely to cause substantial harm to
such person.
Some commenters requested that the rule also permit covered entities to
deny a request if access might be reasonably likely to cause
psychological or mental harm, or emotional distress. Other commenters,
however, were particularly concerned about access to mental health
information, stating that the lack of access creates resentment and
distrust in patients.
*Response*: We disagree with the comments suggesting that we expand the
grounds for denial of access to an individual to include a likelihood of
psychological or mental harm of the individual. We did not find
persuasive evidence that this is a problem sufficient to outweigh the
reasons for providing open access. We do allow a denial for access based
on a likelihood of substantial psychological or mental harm, but only if
the protected health information includes information about another
person and the harm may be inflicted on such other person or if the
person requesting the access is a personal representative of the
individual and the harm may be inflicted on the individual or another
person.
We generally agree with the commenters concerns that denying access
specifically to mental health records could create distrust. To balance
this concern with other commenters' concerns about the potential for
psychological harm, however, we exclude psychotherapy notes from the
right of access. This is the only distinction we make between mental
health information and other types of protected health information in
the access provisions of this rule. Unlike other types of protected
health information, these notes are not widely disseminated through the
health care system. We believe that the individual's privacy interests
in having access to these notes, therefore, are outweighed by the
potential harm caused by such access. We encourage covered entities that
maintain psychotherapy notes, however, to provide individuals access to
these notes when they believe it is appropriate to do so.
*Comment*: Some commenters believed that there is a potential for abuse
of the provision allowing denial of access because of likely harm to
self. They questioned whether there is any experience from the Privacy
Act of 1974 to suggest that patients who requested and received their
records have ever endangered themselves as a result.
*Response*: We are unaware of such problems from access to records that
have been provided under the Privacy Act but, since these are private
matters, such problems might not come to our attention. We believe it is
more prudent to preserve the flexibility and judgment of health care
professionals familiar with the individuals and facts surrounding a
request for records than to impose the blanket rule suggested by these
commenters.
*Comment:* Commenters asserted that the NPRM did not adequately protect
vulnerable individuals who depend on others to exercise their rights
under the rule. They requested that the rule permit a covered entity to
deny access when the information is requested by someone other than the
subject of the information and, in the opinion of a licensed health care
professional, access to the information could harm the individual or
another person.
*Response*: We agree with the commenters that such protection is
warranted and add a provision in § 164.524(a)(3), which permits a
covered health care provider to deny access if a personal representative
of the individual is making the request for access and a licensed health
care professional has determined, in the exercise of professional
judgment, that providing access to such personal representative could
result in substantial harm to the individual or another person. Access
can be denied even if the potential harm may be inflicted by someone
other than the personal representative.
This provision is designed to strike a balance between the competing
interests of ensuring access to protected health information and
protecting the individual or others from harm. The "substantial harm"
standard will ensure that a covered entity cannot deny access in cases
where the harm is de minimus.
The amount of discretion that a covered entity has to deny access to a
personal representative is generally greater than the amount of
discretion that a covered entity has to deny access to an individual.
Under the final rule, a covered entity may deny access to an individual
if a licensed health care professional determines that the access
requested is reasonably likely to endanger the life or physical safety
of the individual or another person. In this case, concerns about
psychological or emotional harm would not be sufficient to justify
denial of access. We establish a relatively high threshold because we
want to assure that individuals have broad access to health information
about them, and due to the potential harm that comes from denial of
access, we believe denials should be permitted only in limited
circumstances.
The final rule grants covered entities greater discretion to deny access
to a personal representative than to an individual in order to provide
protection to those vulnerable people who depend on others to exercise
their rights under the rule and who may be subjected to abuse or
neglect. This provision applies to personal representatives of minors as
well as other individuals. The same standard for denial of access on the
basis of potential harm that applies to personal representatives also
applies when an individual is seeking access to his or her protected
health information, and the information makes reference to another
person. Under these circumstances, a covered entity may deny a request
for access if such access is reasonably likely to cause substantial harm
to such other person. The standard for this provision and for the
provision regarding access by personal representatives is the same
because both circumstances involve one person obtaining information
about another person, and in both cases the covered entity is balancing
the right of access of one person against the right of a second person
not to be harmed by the disclosure.
Under any of these grounds for denial of access to protected health
information, the covered entity is not required to deny access to a
personal representative under these circumstances, but has the
discretion to do so.
In addition to denial of access rights, we also address the concerns
raised by abusive or potentially abusive situations in the section
regarding personal representatives by giving covered entities discretion
to not recognize a person as a personal representative of an individual
if the covered entity has a reasonable belief that the individual has
been subjected to domestic violence, abuse, or neglect by or would be in
danger from a person seeking to act as the personal representative. (See
§ 164.502(g))
*Comment*: A number of commenters were concerned that this provision
would lead to liability for covered entities if the release of
information results in harm to individuals. Commenters requested a "good
faith" standard in this provision to relieve covered entities of
liability if individuals suffer harm as a result of seeing their
protected health information or if the information is found to be
erroneous. A few commenters suggested requiring providers (when
applicable) to include with any disclosure to a third party a statement
that, in the provider's opinion, the information should not be disclosed
to the patient.
*Response*: We do not intend to create a new duty to withhold
information nor to affect other laws on this issue. Some state laws
include policies similar to this rule, and we are not aware of liability
arising as a result.
*Comment*: Some commenters suggested that both the individual's health
care professional and a second professional in the relevant field of
medicine should review each request. Many commenters suggested that
individuals have a right to have an independent review of any denial of
access, e.g., review by a health care professional of the individual's
choice.
*Response*: We agree with the commenters who suggest that denial on
grounds of harm to self or others should be determined by a health
professional, and retain this requirement in the final rule. We
disagree, however, that all denials should be reviewed by a professional
of the individual's choice. We are concerned that the burden such a
requirement would place on covered entities would be significantly
greater than any benefits to the individual. We believe that any health
professional, not just one of the individual's choice, will exercise
appropriate professional judgment. To address some of these concerns,
however, we add a provision for the review of denials requiring the
exercise of professional judgment. If a covered entity denies access
based on harm to self or others, the individual has the right to have
the denial reviewed by another health care professional who did not
participate in the original decision to deny access.
*Comment*: A few commenters objected to the proposal to allow covered
entities to deny a request for access to health information if the
information was obtained from a confidential source that may be revealed
upon the individual's access. They argued that this could be subject to
abuse and the information could be inherently less reliable, making the
patient's access to it even more important.
*Response*: While we acknowledge that information provided by
confidential sources could be inaccurate, we are concerned that allowing
unfettered access to such information could undermine the trust between
a health care provider and patients other than the individual. We retain
the proposed policy because we do not want to interfere with a covered
entity's ability to obtain important information that can assist in the
provision of health care or to maintain implicit or explicit promises of
confidence, which may be necessary to obtain such information. We
believe the concerns raised about abuse are mitigated by the fact that
the provision does not apply to promises of confidentiality made to a
health care provider. We note that a covered entity may provide access
to such information.
*Comment*: Some commenters were concerned that the NPRM did not allow
access to information unrelated to treatment, and thus did not permit
access to research information.
*Response*: In the final rule, we eliminate the proposed special
provision for "research information unrelated to treatment." The only
restriction on access to research information in this rule applies where
the individual agrees in advance to denial of access when consenting to
participate in research that includes treatment. In this circumstance,
the individual\'s right of access to protected health information
created in the course of the research may be suspended for as long as
the research is in progress, but access rights resume after such time.
In other instances, we make no distinction between research information
and other information in the access provisions in this rule.
*Comment*: A few commenters supported the proposed provision temporarily
denying access to information obtained during a clinical trial if
participants agreed to the denial of access when consenting to
participate in the trial. Some commenters believed there should be no
access to any research information. Other commenters believed denial
should occur only if the trial would be compromised. Several recommended
conditioning the provision. Some recommended that access expires upon
completion of the trial unless there is a health risk. A few commenters
suggested that access should be allowed only if it is included in the
informed consent and that the informed consent should note that some
information may not be released to the individual, particularly research
information that has not yet been validated. Other commenters believed
that there should be access if the research is not subject to IRB or
privacy board review or if the information can be disclosed to third
parties.
*Response*: We agree with the commenters that support temporary denial
of access to information from research that includes treatment if the
subject has agreed in advance, and with those who suggested that the
denial of access expire upon completion of the research, and retain
these provisions in the final rule. We disagree with the commenters who
advocate for further denial of this information. These comments did not
explain why an individual's interest in access to health information
used to make decisions about them is less compelling with respect to
research information. Under this rule, all protected health information
for research is subject either to privacy board or IRB review unless a
specific authorization to use protected health information for research
is obtained from the individual. Thus, this is not a criterion we can
use to determine access rights.
*Comment*: A few commenters believed that it would be "extremely
disruptive of and dangerous" to patients to have access to records
regarding their current care and that state law provides sufficient
protection of patients' rights in this regard.
*Response*: We do not agree. Information about current care has
immediate and direct impact on individuals. Where a health care
professional familiar with the circumstances believes that it is
reasonably likely that access to records would endanger the life or
physical safety of the individual or another person, the regulation
allows the professional to withhold access.
*Comment*: Several commenters requested clarification that a patient not
be denied access to protected health information because of failure to
pay a bill. A few commenters requested clarification that entities may
not deny requests simply because producing the information would be too
burdensome.
*Response*: We agree with these comments, and confirm that neither
failure to pay a bill nor burden are lawful reasons to deny access under
this rule. Covered entities may deny access only for the reasons
provided in the rule.
*Comment*: Some commenters requested that the final rule not include
detailed procedural requirements about how to respond to requests for
access. Others made specific recommendations on the procedures for
providing access, including requiring written requests, requiring
specific requests instead of blanket requests, and limiting the
frequency of requests. Commenters generally argued against requiring
covered entities to acknowledge requests, except under certain
circumstances, because of the potential burden on entities.
*Response*: We intend to provide sufficient procedural guidelines to
ensure that individuals have access to their protected health
information, while maintaining the flexibility for covered entities to
implement policies and procedures that are appropriate to their needs
and capabilities. We believe that a limit on the frequency of requests
individuals may make would arbitrarily infringe on the individual's
right of access and have, therefore, not included such a limitation. To
limit covered entities' burden, we do not require covered entities to
acknowledge receipt of the individuals' requests, other than to notify
the individual once a decision on the request has been made. We also
permit a covered entity to require an individual to make a request for
access in writing and to discuss a request with an individual to clarify
which information the individual is actually requesting. If individuals
agree, covered entities may provide access to a subset of information
rather than all protected health information in a designated record set.
We believe these changes provide covered entities with greater
flexibility without compromising individuals' access rights.
*Comment*: Commenters offered varying suggestions for required response
time, ranging from 48 hours because of the convenience of electronic
records to 60 days because of the potential burden. Others argued
against a finite time period, suggesting the response time be based on
mutual convenience of covered entities and individuals, reasonableness,
and exigencies. Commenters also varied on suggested extension periods,
from one 30-day extension to three 30- day extensions to one 90-day
extension, with special provisions for off-site records.
*Response*: We are imposing a time limit because individuals are
entitled to know when to expect a response. Timely access to protected
health information is important because such information may be
necessary for the individual to obtain additional health care services,
insurance coverage, or disability benefits, and the covered entity may
be the only source for such information. To provide additional
flexibility, we eliminate the requirement that access be provided as
soon as possible and we lengthen the deadline for access to off-site
records. For on-site records, covered entities must act on a request
within 30 days of receipt of the request. For off-site records, entities
must complete action within 60 days. We also permit covered entities to
extend the deadline by up to 30 days if they are unable to complete
action on the request within the standard deadline. These time limits
are intended to be an outside deadline rather than an expectation. We
expect covered entities to be attentive to the circumstances surrounding
each request and respond in an appropriate time frame.
*Comment:* A few commenters suggested that, upon individuals' requests,
covered entities should be required to provide protected health
information in a format that would be understandable to a patient,
including explanations of codes or abbreviations. The commenters
suggested that covered entities be permitted to provide summaries of
pertinent information instead of full copies of records; for example, a
summary may be more helpful for the patient's purpose than a series of
indecipherable billing codes.
*Response*: We agree with these commenters' point that some health
information is difficult to interpret. We clarify, therefore, that the
covered entity may provide summary information in lieu of the underlying
records. A summary may only be provided if the covered entity and the
individual agree, in advance, to the summary and to any fees imposed by
the covered entity for providing such summary. We similarly permit a
covered entity to provide an explanation of the information. If the
covered entity charges a fee for providing an explanation, it must
obtain the individual's agreement to the fee in advance.
*Comment*: Though there were recommendations that fees be limited to the
costs of copying, the majority of commenters on this topic requested
that covered entities be able to charge a reasonable, cost-based fee.
Commenters suggested that calculation of access costs involve factors
such as labor costs for verification of requests, labor and software
costs for logging of requests, labor costs for retrieval, labor costs
for copying, expense costs for copying, capital cost for copying,
expense costs for mailing, postal costs for mailing, billing and
bad-debt expenses, and labor costs for refiling. Several commenters
recommended specific fee structures.
*Response*: We agree that covered entities should be able to recoup
their reasonable costs for copying of protected health information, and
include such provision in the regulation. We are not specifying a set
fee because copying costs could vary significantly depending on the size
of the covered entity and the form of such copy (e.g., paper,
electronic, film). Rather, covered entities are permitted to charge a
reasonable, cost-based fee for copying (including the costs of supplies
and labor), postage, and summary or explanation (if requested and agreed
to by the individual) of information supplied. The rule limits the types
of costs that may be imposed for providing access to protected health
information, but does not preempt applicable state laws regarding
specific allowable fees for such costs. The inclusion of a copying fee
is not intended to impede the ability of individuals to copy their
records.
*Comment:* Many commenters stated that if a covered entity denies a
request for access because the entity does not hold the protected health
information requested, the covered entity should provide, if known, the
name and address of the entity that holds the information. Some of these
commenters additionally noted that the Uniform Insurance Information and
Patient Protection Act, adopted by 16 states, already imposes this
notification requirement on insurance entities. Some commenters also
suggested requiring providers who leave practice or move offices to
inform individuals of that fact and of how to obtain their records.
*Response:* We agree that, when covered entities deny requests for
access because they do not hold the protected health information
requested, they should inform individuals of the holder of the
information, if known; we include this provision in the final rule. We
do not require health care providers to notify all patients when they
move or leave practice, because the volume of such notifications would
be unduly burdensome.
**SECTION 164.526---AMENDMENT OF PROTECTED HEALTH INFORMATION**
*Comment:* Many commenters strongly encouraged the Secretary to adopt
"appendment" rather than "amendment and correction" procedures. They
argued that the term "correction" implies a deletion of information and
that the proposed rule would have allowed covered entities to remove
portions of the record at their discretion. Commenters indicated that
appendment rather than correction procedures will ensure the integrity
of the medical record and allow subsequent health care providers access
to the original information as well as the appended information. They
also indicated appendment procedures will protect both individuals and
covered entities since medical records are sometimes needed for
litigation or other legal proceedings.
*Response:* We agree with commenters' concerns about the term
"correction." We have revised the rule and deleted "correction" from
this provision in order to clarify that covered entities are not
required by this rule to delete any information from the designated
record set. We do not intend to alter medical record retention laws or
current practice, except to require covered entities to append
information as requested to ensure that a record is accurate and
complete. If a covered entity prefers to comply with this provision by
deleting the erroneous information, and applicable record retention laws
allow such deletion, the entity may do so. For example, an individual
may inform the entity that someone else's X-rays are in the individual's
medical record. If the entity agrees that the X-ray is inaccurately
filed, the entity may choose to so indicate and note where in the record
the correct X-ray can be found. Alternatively, the entity may choose to
remove the X-ray from the record and replace it with the correct X-ray,
if applicable law allows the entity to do so. We intend the term
"amendment" to encompass either action.
We believe this approach is consistent with well-established privacy
principles, with other law, and with industry standards and ethical
guidelines. The July 1977 Report of the Privacy Protection Study
Commission recommended that health care providers and other
organizations that maintain medical-record information have procedures
for individuals to correct or amend the information.[^28] The Privacy
Act (5 U.S.C. 552a) requires government agencies to permit individuals
to request amendment of any record the individual believes is not
accurate, relevant, timely, or complete. In its report "Best Principles
for Health Privacy," the Health Privacy Working Group recommended, "An
individual should have the right to supplement his or her own medical
record. Supplementation should not be implied to mean 'deletion' or
'alteration' of the medical record."[^29] The National Association of
Insurance Commissioners' Health Information Privacy Model Act
establishes the right of an individual who is the subject of protected
health information to amend protected health information to correct any
inaccuracies. The National Conference of Commissioners on Uniform State
Laws' Uniform Health Care Information Act states, "Because accurate
health-care information is not only important to the delivery of health
care, but for patient applications for life, disability and health
insurance, employment, and a great many other issues that might be
involved in civil litigation, this Act allows a patient to request an
amendment in his record."
Some states also establish a right for individuals to amend health
information about them. For example, Hawaii law (HRS section 323C-12)
states, "An individual or the individual's authorized representative may
request in writing that a health care provider that generated certain
health care information append additional information to the record in
order to improve the accuracy or completeness of the information;
provided that appending this information does not erase or obliterate
any of the original information." Montana law (MCA section 50-16-543)
states, "For purposes of accuracy or completeness, a patient may request
in writing that a health care provider correct or amend its record of
the patient\'s health care information to which he has access."
Connecticut, Georgia, and Maine provide individuals a right to request
correction, amendment, or deletion of recorded personal information
about them maintained by an insurance institution. Many other states
have similar provisions.
Industry and standard-setting organizations have also developed policies
for amendment of health information. The National Committee for Quality
Assurance and the Joint Commission on Accreditation of Healthcare
Organizations issued recommendations stating, "The opportunity for
patients to review their records will enable them to correct any errors
and may provide them with a better understanding of their health status
and treatment. Amending records does not erase the original information.
It inserts the correct information with a notation about the date the
correct information was available and any explanation about the reason
for the error."[^30] Standards of the American Society for Testing and
Materials state, "An individual has a right to amend by adding
information to his or her record or database to correct inaccurate
information in his or her patient record and in secondary records and
databases which contain patient identifiable health information."[^31]
We build on this well-established principle in this final rule.
*Comment:* Some commenters supported the proposal to allow individuals
to request amendment for as long as the covered provider or plan
maintains the information. A few argued that the provision should be
time-limited, e.g., that covered entities should not have to amend
protected health information that is more than two years old. Other
comments suggested that the provision should only be applied to
protected health information created after the compliance date of the
regulation.
*Response:* The purpose of this provision is to create a mechanism
whereby individuals can ensure that information about them is as
accurate as possible as it travels through the health care system and is
used to make decisions, including treatment decisions, about them. To
achieve this result, individuals must have the ability to request
amendment for as long as the information used to make decisions about
them exists. We therefore retain the proposed approach. For these
reasons, we also require covered entities to address requests for
amendment of all protected health information within designated record
sets, including information created or obtained prior to the compliance
date, for as long as the entity maintains the information.
*Comment:* A few commenters were concerned that the proposal implied
that the individual is in control of and may personally change the
medical record. These commenters opposed such an approach.
*Response:* We do not give individuals the right to alter their medical
records. Individuals may request amendment, but they have no authority
to determine the final outcome of the request and may not make actual
changes to the medical record. The covered entity must review the
individual's request and make appropriate decisions. We have clarified
this intent in § 164.526(a)(1) by stating that individuals have a right
to have a covered entity amend protected health information and in §
164.526(b)(2) by stating that covered entities must act on an
individual's request for amendment.
*Comment:* Some comments argued that there is no free-text field in some
current transaction formats that would accommodate the extra text
required to comply with the amendment provisions (e.g., sending
statements of disagreement along with all future disclosures of the
information at issue). Commenters argued that this provision will burden
the efficient transmission of information, contrary to HIPAA
requirements.
*Response:* We believe that most amendments can be incorporated into the
standard transactions as corrections of erroneous data. We agree that
some of the standard transactions cannot currently accommodate
additional material such as statements of disagreement and rebuttals to
such statements. To accommodate these rare situations, we modify the
requirements in § 164.526(d)(iii). The provision now states that if a
standard transaction does not permit the inclusion of the additional
material required by this section, the covered entity may separately
transmit the additional material to the recipient of the standard
transaction. Commenters interested in modifying the standard
transactions to allow the incorporation of additional materials may also
bring the issue up for resolution through the process established by the
Transactions Rule and described in its preamble.
*Comment:* The NPRM proposed to allow amendment of protected health
information in designated record sets. Some commenters supported the
concept of a designated record set and stated that it appropriately
limits the type of information available for amendment to information
directly related to treatment. Other commenters were concerned about the
burden this provision will create due to the volume of information that
will be available for amendment. They were primarily concerned with the
potential for frivolous, minor, or technical requests. They argued that
for purposes of amendment, this definition should be limited to
information used to make medical or treatment decisions about the
individual. A few commenters requested clarification that individuals do
not have a right to seek amendment unless there is verifiable
information to support their claim or they can otherwise convince the
entity that the information is inaccurate or incomplete.
*Response:* We believe that the same information available for
inspection should also be subject to requests for amendment, because the
purpose of these provisions is the same: to give consumers access to and
the chance to correct errors in information that may be used to make
decisions that affect their interests. We thus retain use of the
"designated record set" in this provision. However, we share commenters'
concerns about the potential for minor or technical requests. To address
this concern, we have clarified that covered entities may deny a request
for amendment if the request is not in writing and does not articulate a
reason to support the request, as long as the covered entity informs the
individual of these requirements in advance.
*Comment:* Many commenters noted the potentially negative impact of the
proposal to allow covered entities to deny a request for amendment if
the covered entity did not create the information at issue. Some
commenters pointed out that the originator of the information may no
longer exist or the individual may not know who created the information
in question. Other commenters supported the proposal that only the
originator of the information is responsible for amendments to it. They
argued that any extension of this provision requiring covered entities
to amend information they have not created is administratively and
financially burdensome.
*Response:* In light of the comments, we modify the rule to require the
holder of the information to consider a request for amendment if the
individual requesting amendment provides a reasonable basis to believe
that the originator of the information is no longer available to act on
a request. For example, if a request indicates that the information at
issue was created by a hospital that has closed, and the request is not
denied on other grounds, then the entity must amend the information.
This provision is necessary to preserve an individual's right to amend
protected health information about them in certain circumstances.
*Comment:* Some commenters stated that the written contract between a
covered entity and its business associate should stipulate that the
business associate is required to amend protected health information in
accordance with the amendment provisions. Otherwise, these commenters
argued, there would be a gap in the individual's right to have erroneous
information corrected, because the covered entity could deny a request
for amendment of information created by a business associate.
*Response:* We agree that information created by the covered entity or
by the covered entity's business associates should be subject to
amendment. This requirement is consistent with the requirement to make
information created by a business associate available for inspection and
copying. We have revised the rule to require covered entities to specify
in the business associate contract that the business associate will make
protected health information available for amendment and will
incorporate amendments accordingly. (See § 164.504(e).)
*Comment:* One commenter argued that covered entities should be required
to presume information must be corrected where an individual informs the
entity that an adjudicative process has made a finding of medical
identity theft.
*Response:* Identity theft is one of many reasons why protected health
information may be inaccurate, and is one of many subjects that may
result in an adjudicative process relevant to the accuracy of protective
health information. We believe that this provision accommodates this
situation without a special provision for identity theft.
*Comment:* Some commenters asserted that the proposed rule's requirement
that action must be taken on individuals' requests within 60 days of the
receipt of the request was unreasonable and burdensome. A few commenters
proposed up to three 30-day extensions for "extraordinary" (as defined
by the entity) requests.
*Response:* We agree that 60 days will not always be a sufficient amount
of time to adequately respond to these requests. Therefore, we have
revised this provision to allow covered entities the option of a 30-day
extension to deal with requests that require additional response time.
However, we expect that 60 days will be adequate for most cases.
*Comment:* One commenter questioned whether a covered entity could
appropriately respond to a request by amending the record, without
indicating whether it believes the information at issue is accurate and
complete.
*Response:* An amendment need not include a statement by the covered
entity as to whether the information is or is not accurate and complete.
A covered entity may choose to amend a record even if it believes the
information at issue is accurate and complete. If a request for
amendment is accepted, the covered entity must notify the individual
that the record has been amended. This notification need not include any
explanation as to why the request was accepted. A notification of a
denied request, however, must contain the basis for the denial.
*Comment:* A few commenters suggested that when an amendment is made,
the date should be noted. Some also suggested that the physician should
sign the notation.
*Response:* We believe such a requirement would create a burden that is
not necessary to protect individuals' interests, and so have not
accepted this suggestion. We believe that the requirements of §
164.526(c) regarding actions a covered entity must take when accepting a
request will provide an adequate record of the amendment. A covered
entity may date and sign an amendment at its discretion.
*Comment:* The NPRM proposed that covered entities, upon accepting a
request for amendment, make reasonable efforts to notify those persons
the individual identifies, and other persons whom the covered entity
knows have received the erroneous or incomplete information and who may
have relied, or could foreseeably rely, on such information to the
detriment of the individual. Many commenters argued that this
notification requirement was too burdensome and should be narrowed. They
expressed concern that covered entities would have to notify anyone who
might have received the information, even persons identified by the
individual with whom the covered entity had no contact. Other commenters
also contended that this provision would require covered entities to
determine the reliance another entity might place on the information and
suggested that particular part of the notification requirements be
removed. Another commenter suggested that the notification provision be
eliminated entirely, believing that it was unnecessary.
*Response:* Although there is some associated administrative burden with
this provision, we believe it is a necessary requirement to effectively
communicate amendments of erroneous or incomplete information to other
parties. The negative effects of erroneous or incomplete medical
information can be devastating. This requirement allows individuals to
exercise some control in determining recipients they consider important
to be notified, and requires the covered entity to communicate
amendments to other persons that the covered entity knows have the
erroneous or incomplete information and may take some action in reliance
on the erroneous or incomplete information to the detriment of the
individual. We have added language to clarify that the covered entity
must obtain the individual's agreement to have the amendment shared with
the persons the individual and covered entity identifies. We believe
these notification requirements appropriately balance covered entities'
burden and individuals' interest in protecting the accuracy of medical
information used to make decisions about them. We therefore retain the
notification provisions substantially as proposed.
*Comment:* Some commenters argued against the proposed provision
requiring a covered entity that receives a notice of amendment to notify
its business associates, "as appropriate," of necessary amendments. Some
argued that covered entities should only be required to inform business
associates of these changes if the amendment could affect the
individual's further treatment, citing the administrative and financial
burden of notifying all business associates of changes that may not have
a detrimental effect on the patient. Other commenters suggested that
covered entities should only be required to inform business associates
whom they reasonably know to be in possession of the information.
*Response:* We agree with commenters that clarification is warranted.
Our intent is that covered entities must meet the requirements of this
rule with respect to protected health information they maintain,
including protected health information maintained on their behalf by
their business associates. We clarify this intent by revising the
definition of designated record set (see § 164.501) to include records
maintained "by or for" a covered entity. Section 164.526(e) requires a
covered entity that is informed of an amendment made by another covered
entity to incorporate that amendment into designated record sets,
whether the designated record set is maintained by the covered entity or
for the covered entity by a business associate. If a business associate
maintains the record at issue on the covered entity's behalf, the
covered entity must fulfill its requirement by informing the business
associate of the amendment to the record. The contract with the business
associate must require the business associate to incorporate any such
amendments. (See § 164.504(e).)
*Comment:* Some commenters supported the proposal to require covered
entities to provide notification of the covered entity's statement of
denial and the individual's statement of disagreement in any subsequent
disclosures of the information to which the dispute relates. They argued
that we should extend this provision to prior recipients of disputed
information who have relied on it. These commenters noted an
inconsistency in the proposed approach, since notification of accepted
amendments is provided to certain previous recipients of erroneous
health information and to recipients of future disclosures. They
contended there is not a good justification for the different treatment
and believed that the notification standard should be the same,
regardless of whether the covered entity accepts the request for
amendment.
These commenters also recommended that the individual be notified of the
covered entity's intention to rebut a statement of disagreement. They
suggested requiring covered entities to send a copy of the statement of
rebuttal to the individual.
*Response:* Where a request for amendment is accepted, the covered
entity knows that protected health information about the individual is
inaccurate or incomplete or the amendment is otherwise warranted; in
these circumstances, it is reasonable to ask the covered entity to
notify certain previous recipients of the information that reliance on
such information could be harmful. Where, however, the request for
amendment is denied, the covered entity believes that the relevant
information is accurate and complete or the amendment is otherwise
unacceptable. In this circumstance, the burden of prior notification
outweighs the potential benefits. We therefore do not require
notification of prior recipients.
We agree, however, that individuals should know how a covered entity has
responded to their requests, and therefore add a requirement that
covered entities also provide a copy of any rebuttal statements to the
individual.
**SECTION 164.528---ACCOUNTING OF DISCLOSURES OF PROTECTED HEALTH
INFORMATION**
*Comment:* Many commenters expressed support for the concept of the
right to receive an accounting of disclosures. Others opposed even the
concept. One commenter said that it is likely that some individuals will
request an accounting of disclosures from each of his or her health care
providers and payors merely to challenge the disclosures that the
covered entity made.
Some commenters also questioned the value to the individual of providing
the right to an accounting. One commenter stated that such a provision
would be meaningless because those who deliberately perpetrate an abuse
are unlikely to note their breach in a log.
*Response:* The final rule retains the right of an individual to receive
an accounting of disclosures of protected health information. The
provision serves multiple purposes. It provides a means of informing the
individual as to which information has been sent to which recipients.
This information, in turn, enables individuals to exercise certain other
rights under the rule, such as the rights to inspection and amendment,
with greater precision and ease. The accounting also allows individuals
to monitor how covered entities are complying with the rule. Though
covered entities who deliberately make disclosures in violation of the
rule may be unlikely to note such a breach in the accounting, other
covered entities may document inappropriate disclosures that they make
out of ignorance and not malfeasance. The accounting will enable the
individual to address such concerns with the covered entity.
We believe this approach is consistent with well-established privacy
principles, with other law, and with industry standards and ethical
guidelines. The July 1977 Report of the Privacy Protection Study
Commission recommended that a health care provider should not disclose
individually-identifiable information for certain purposes without the
individual's authorization unless "an accounting of such disclosures is
kept and the individual who is the subject of the information being
disclosed can find out that the disclosure has been made and to
whom."[^32] With certain exceptions, the Privacy Act (5 U.S.C. 552a)
requires government agencies to "keep an accurate accounting of\... the
date, nature, and purpose of each disclosure of a record to any person
or to another agency\... and\... the name and address of the person or
agency to whom the disclosure is made." The National Association of
Insurance Commissioners' Health Information Privacy Model Act requires
carriers to provide to individuals on request "information regarding
disclosure of that individual's protected health information that is
sufficient to exercise the right to amend the information." We build on
these standards in this final rule.
*Comment:* Many commenters disagreed with the NPRM's exception for
treatment, payment, and health care operations. Some commenters wanted
treatment, payment, and health care operations disclosures to be
included in an accounting because they believed that improper
disclosures of protected health information were likely to be committed
by parties within the entity who have access to protected health
information for treatment, payment, and health care operations related
purposes. They suggested that requiring covered entities to record
treatment, payment, and health care operations disclosures would either
prevent improper disclosures or enable transgressions to be tracked.
One commenter reasoned that disclosures for treatment, payment, and
health care operations purposes should be tracked since these
disclosures would be made without the individual's consent. Others
argued that if an individual's authorization is not required for a
disclosure, then the disclosure should not have to be tracked for a
future accounting to the individual.
One commenter requested that the provision be restated so that no
accounting is required for disclosures "compatible with or directly
related to" treatment, payment or health care operations. This comment
indicated that the change would make § 164.515(a)(l) of the NPRM
consistent with § 164.508(a)(2)(i)(A) of the NPRM.
*Response:* We do not accept the comments suggesting removing the
exception for disclosures for treatment, payment, and health care
operations. While including all disclosures within the accounting would
provide more information to individuals about to whom their information
has been disclosed, we believe that documenting all disclosures made for
treatment, payment, and health care operations purposes would be unduly
burdensome on entities and would result in accountings so voluminous as
to be of questionable value. Individuals who seek treatment and payment
expect that their information will be used and disclosed for these
purposes. In many cases, under this final rule, the individual will have
consented to these uses and disclosures. Thus, the additional
information that would be gained from including these disclosures would
not outweigh the added burdens on covered entities. We believe that
retaining the exclusion of disclosures to carry out treatment, payment,
and health care operations makes for a manageable accounting both from
the point of view of entities and of individuals. We have conformed the
language in this section with language in other sections of the rule
regarding uses and disclosures to carry out treatment, payment, and
health care operations. See § 164.508 and the corresponding preamble
discussion regarding our to decision to use this language.
*Comments:* A few commenters called for a record of all disclosures,
including a right of access to a full audit trail where one exists. Some
commenters stated while audit trails for paper records are too expensive
to require, the privacy rule should not discourage audit trails, at
least for computer-based records. They speculated that an important
reason for maintaining a full audit trail is that most abuses are the
result of activity by insiders. On the other hand, other commenters
pointed out that an enormous volume of records would be created if the
rule requires recording all accesses in the manner of a full audit
trail.
One commenter supported the NPRM's reference to the proposed HIPAA
Security Rule, agreeing that access control and disclosure requirements
under this rule should be coordinated with the final HIPAA Security
Rule. The commenter recommended that HHS add a reference to the final
HIPAA Security Rule in this section and keep specific audit log and
reporting requirements generic in the privacy rule.
*Response*: Audit trails and the accounting of disclosures serve
different functions. In the security field, an audit trail is typically
a record of each time a sensitive record is altered, how it was altered
and by whom, but does not usually record each time a record is used or
viewed. The accounting required by this rule provides individuals with
information about to whom a disclosure is made. An accounting, as
described in the this rule, would not capture uses. To the extent that
an audit trail would capture uses, consumers reviewing an audit trail
may not be able to distinguish between accesses of the protected health
information for use and accesses for disclosure. Further, it is not
clear the degree to which the field is technologically poised to provide
audit trails. Some entities could provide audit trails to individuals
upon their request, but we are concerned that many could not.
We agree that it is important to coordinate this provision of the
privacy rule with the Security Rule when it is issued as a final rule.
*Comments:* We received many comments from researchers expressing
concerns about the potential impact of requiring an accounting of
disclosures related to research. The majority feared that the accounting
provision would prove so burdensome that many entities would decline to
participate in research. Many commenters believed that disclosure of
protected health information for research presents little risk to
individual privacy and feared that the accounting requirement could shut
down research.
Some commenters pointed out that often only a few data elements or a
single element is extracted from the patient record and disclosed to a
researcher, and that having to account for so singular a disclosure from
what could potentially be an enormous number of records imposes a
significant burden. Some said that the impact would be particularly
harmful to longitudinal studies, where the disclosures of protected
health information occur over an extended period of time. A number of
commenters suggested that we not require accounting of disclosures for
research, registries, and surveillance systems or other databases unless
the disclosure results in the actual physical release of the patient's
entire medical record, rather than the disclosure of discrete elements
of information contained within the record.
We also were asked by commenters to provide an exclusion for research
subject to IRB oversight or research that has been granted a waiver of
authorization pursuant to proposed § 164.510, to exempt "in-house"
research from the accounting provision, and to allow covered entities to
describe the type of disclosures they have made to research projects,
without specifically listing each disclosure. Commenters suggested that
covered entities could include in an accounting a listing of the various
research projects in which they participated during the time period at
issue, without regard to whether a particular individual's protected
health information was disclosed to the project.
*Response:* We disagree with suggestions from commenters that an
accounting of disclosures is not necessary for research. While it is
possible that informing individuals about the disclosures made of their
health information may on occasion discourage worthwhile activities, we
believe that individuals have a right to know who is using their health
information and for what purposes. This information gives individuals
more control over their health information and a better base of
knowledge from which to make informed decisions.
For the same reasons, we also do not believe that IRB or privacy board
review substitutes for providing individuals the right to know how their
information has been disclosed. We permit IRBs or privacy boards to
determine that a research project would not be feasible if authorization
were required because we understand that it could be virtually
impossible to get authorization for archival research involving large
numbers of individuals or where the location of the individuals is not
easy to ascertain. While providing an accounting of disclosures for
research may entail some burden, it is feasible, and we do not believe
that IRBs or privacy boards would have a basis for waiving such a
requirement. We also note that the majority of comments that we received
from individuals supported including more information in the accounting,
not less.
We understand that requiring covered entities to include disclosures for
research in the accounting of disclosures entails some burden, but we
believe that the benefits described above outweigh the burden.
We do not agree with commenters that we should exempt disclosures where
only a few data elements are released or in the case of data released
without individuals' names. We recognize that information other than
names can identify an individual. We also recognize that even a few data
elements could be clues to an individual's identity. The actual volume
of information released is not an appropriate indicator of whether an
individual could have a concern about privacy.
We disagree with comments that suggested that it would be sufficient to
provide individuals with a general list of research projects to which
information has been disclosed by the covered entity. We believe that
individuals are entitled to a level of specificity about disclosures of
protected health information about them and should know to which
research projects their protected health information has been disclosed,
rather than to which projects protected health information may have been
disclosed. However, we have added a provision allowing for a summary
accounting of recurrent disclosures. For multiple disclosures to the
same recipient pursuant to a single authorization or for a single
purpose permitted under the rule without authorization, the covered
entity may provide a summary accounting addressing the series of
disclosures rather than a detailed accounting of each disclosure in the
series. This change is designed to ease the burden on covered entities
involved in longitudinal projects.
With regard to the suggestion that we exempt "in-house" research from
the accounting provision, we note that only disclosures of protected
health information must appear in an accounting.
*Comments:* Several commenters noted that disclosures for public health
activities may be of interest to individuals, but add to the burden
imposed on entities. Furthermore, some expressed fear that priority
public health activities would be compromised by the accounting
provision. One commenter from a health department said that covered
entities should not be required to provide an accounting to certain
index cases, where such disclosures create other hazards, such as
potential harm to the reporting provider. This commenter also speculated
that knowing protected health information had been disclosed for these
public health purposes might cause people to avoid treatment in order to
avoid being reported to the public health department.
A provider association expressed concern about the effect that the
accounting provision might have on a non-governmental, centralized
disease registry that it operates. The provider organization feared that
individuals might request that their protected health information be
eliminated in the databank, which would make the data less useful.
*Response:* As in the discussion of research above, we reject the
contention that we should withhold information from individuals about
where their information has been disclosed because informing them could
occasionally discourage some worthwhile activities. We also believe
that, on balance, individuals' interest in having broad access to this
information outweighs concerns about the rare instances in which
providing this information might raise concerns about harm to the person
who made the disclosure. As we stated above, we believe that individuals
have a right to know who is using their health information and for what
purposes. This information gives individuals more control over their
health information and a better base of knowledge from which to make
informed decisions.
*Comment:* We received many comments about the proposed time-limited
exclusion for law enforcement and health oversight. Several commenters
noted that it is nearly impossible to accurately project the length of
an investigation, especially during its early stages. Some recommended
we permit a deadline based on the end of an event, such as conclusion of
an investigation. One commenter recommended amending the standard such
that covered entities would never be required to give an accounting of
disclosures to health oversight or law enforcement agencies. The
commenter noted that there are public policy reasons for limiting the
extent to which a criminal investigation is made known publicly,
including the possibility that suspects may destroy or falsify evidence,
hide assets, or flee. The commenter also pointed out that disclosure of
an investigation may unfairly stigmatize a person or entity who is
eventually found to be innocent of any wrongdoing.
On the other hand, many commenters disagreed with the exemption for
recording disclosures related to oversight activities and law
enforcement. Many of these commenters stated that the exclusion would
permit broad exceptions for government purposes while holding
disclosures for private purposes to a more burdensome standard.
Some commenters felt that the NPRM made it too easy for law enforcement
to obtain an exception. They suggested that law enforcement should not
be excepted from the accounting provision unless there is a court order.
One commenter recommended that a written request for exclusion be dated,
signed by a supervisory official, and contain a certification that the
official is personally familiar with the purpose of the request and the
justification for exclusion from accounting.
*Response:* We do not agree with comments suggesting that we permanently
exclude disclosures for oversight or law enforcement from the
accounting. We believe generally that individuals have a right to know
who is obtaining their health information and for what purposes.
At the same time, we agree with commenters that were concerned that an
accounting could tip off subjects of investigations. We have retained a
time-limed exclusion period similar to that proposed in the NPRM. To
protect the integrity of investigations, in the final rule we require
covered entities to exclude disclosures to a health oversight agency or
law enforcement official for the time specified by that agency or
official, if the agency or official states that including the disclosure
in an accounting to the individual would be reasonably likely to impede
the agency or official's activities. We require the statement from the
agency or official to provide a specific time frame for the exclusion.
For example, pursuant to a law enforcement official's statement, a
covered entity could exclude a law enforcement disclosure from the
accounting for a period of three months from the date of the official's
statement or until a date specified in the statement.
In the final rule, we permit the covered entity to exclude the
disclosure from an accounting to an individual if the agency or official
makes the statement orally and the covered entity documents the
statement and the identify of the agency or official that made the
statement. We recognize that in urgent situations, agencies and
officials may not be able to provide statements in writing. If the
agency or official's statement is made orally, however, the disclosure
can be excluded from an accounting to the individual for no longer than
30 days from the oral statement. For exclusions longer than 30 days, a
covered entity must receive a written statement.
We believe these requirements appropriately balance individuals' rights
to be informed of the disclosures of protected health information while
recognizing the public's interest in maintaining the integrity of health
oversight and law enforcement activities.
*Comment:* One commenter stated that under Minnesota law, providers who
are mandated reporters of abuse are limited as to whom they may reveal
the report of abuse (generally law enforcement authorities and other
providers only). This is because certain abusers, such as parents, by
law may have access to a victim's (child's) records. The commenter
requested clarification as to whether these disclosures are exempt from
the accounting requirement or whether preemption would apply.
*Response:* While we do not except mandatory disclosures of abuse from
the accounting for disclosure requirement, we believe the commenter's
concerns are addressed in several ways. First, nothing in this
regulation invalidates or limits the authority or procedures established
under state law providing for the reporting of child abuse. Thus, with
respect to child abuse the Minnesota law's procedures are not preempted
even though they are less stringent with respect to privacy. Second,
with respect to abuse of persons other than children, we allow covered
entities to refuse to treat a person as an individual's personal
representative if the covered entity believes that the individual has
been subjected to domestic violence, abuse, or neglect from the person.
Thus, the abuser would not have access to the accounting. We also note
that a covered entity must exclude a disclosure, including disclosures
to report abuse, from the accounting for specified period of time if the
law enforcement official to whom the report is made requests such
exclusion.
*Comment:* A few comments noted the lack of exception for disclosures
made to intelligence agencies.
*Response:* We agree with the comments and have added an exemption for
disclosures made for national security or intelligence purposes under §
164.512(k)(2). Individuals do not have a right to an accounting of
disclosures for these purposes.
*Comment:* Commenters noted that the burden associated with this
provision would, in part, be determined by other provisions of the rule,
including the definitions of "individually identifiable," "treatment,"
and "health care operations." They expressed concern that the covered
entity would have to be able to organize on a patient by patient basis
thousands of disclosures of information, which they described as
"routine." These commenters point to disclosures for patient directory
information, routine banking and payment processes, uses and disclosures
in emergency circumstances, disclosures to next of kin, and release of
admissions statistics to a health oversight agency.
*Response:* We disagree with the commenters that ambiguity in other
areas of the rule increase the burden associated with maintaining an
accounting. The definitions of treatment, payment, and health operations
are necessarily broad and there is no accounting required for
disclosures for these purposes. These terms cover the vast majority of
routine disclosures for health care purposes. (See § 164.501 and the
associated preamble for a discussion of changes made to these
definitions.)
The disclosures permitted under § 164.512 are for national priority
purposes, and determining whether a disclosure fits within the section
is necessary before the disclosure can be made. There is no additional
burden, once such a determination is made, in determining whether it
must be included in the accounting.
We agree with the commenters that there are areas where we can reduce
burden by removing additional disclosures from the accounting
requirement, without compromising individuals' rights to know how their
information is being disclosed. In the final rule, covered entities are
not required to include the following disclosures in the accounting:
disclosures to the individual, disclosures for facility directories
under § 164.510(a), or disclosures to persons assisting in the
individual's care or for other notification purposes under § 164.510(b).
For each of these types of disclosures, the individual is likely to
already know about the disclosure or to have agreed to the disclosure,
making the inclusion of such disclosures in the accounting less
important to the individual and unnecessarily burdensome to the covered
entity.
*Comment:* Many commenters objected to requiring business partners to
provide an accounting to covered entities upon their request. They cited
the encumbrance associated with re-contracting with the various business
partners, as well as the burden associated with establishing this type
of record keeping.
*Response:* Individuals have a right to know to whom and for what
purpose their protected health information has been disclosed by a
covered entity. The fact that a covered entity uses a business associate
to carry out a function does not diminish an individual's right to know.
*Comments:* One commenter requested clarification as to how far a
covered entity's responsibility would extend, asking whether an entity
had to track only their direct disclosures or subsequent re-disclosures.
*Response:* Covered entities are required to account for their
disclosures, as well as the disclosures of their business associates, of
protected health information. Because business associates act on behalf
of covered entities, it is essential that their disclosures be included
in any accounting that an individual requests from a covered entity.
Covered entities are not responsible, however, for the actions of
persons who are not their business associates. Once a covered entity has
accounted for a disclosure to any person other than a business
associate, it is not responsible for accounting for any further uses or
disclosures of the information by that other person.
*Comments:* Some commenters said that the accounting provision described
in the NPRM was ambiguous and created uncertainty as to whether it
addresses disclosures only, as the title would indicate, or whether it
includes accounting of uses. They urged that the standard address
disclosures only, and not uses, which would make implementation far more
practicable and less burdensome.
*Response:* The final rule requires disclosures, not uses, to be
included in an accounting. See § 164.501 for definitions of "use" and
"disclosure."
*Comments:* We received many comments from providers and other
representatives of various segments of the health care industry,
expressing the view that a centralized system of recording disclosures
was not possible given the complexity of the health care system, in
which disclosures are made by numerous departments within entities. For
example, commenters stated that a hospital medical records department
generally makes notations regarding information it releases, but that
these notations do not include disclosures that the emergency department
may make. Several commenters proposed that the rule provide for patients
to receive only an accounting of disclosures made by medical records
departments or some other central location, which would relieve the
burden of centralizing accounting for those entities who depend on paper
records and tracking systems.
*Response:* We disagree with commenters' arguments that covered entities
should not be held accountable for the actions of their subdivisions or
workforce members. Covered entities are responsible for accounting for
the disclosures of protected health information made by the covered
entity, in accordance with this rule. The particular person or
department within the entity that made the disclosure is immaterial to
the covered entity's obligation. In the final rule, we require covered
entities to document each disclosure that is required to be included in
an accounting. We do not, however, require this documentation to be
maintained in a central registry. A covered hospital, for example, could
maintain separate documentation of disclosures that are made from the
medical records department and the emergency department. At the time an
individual requests an accounting, this documentation could be
integrated to provide a single accounting of disclosures made by the
covered hospital. Alternatively, the covered hospital could centralize
its processes for making and documenting disclosures. We believe this
provision provides covered entities with sufficient flexibility to meet
their business needs without compromising individuals' rights to know
how information about them is disclosed.
*Comments:* Commenters stated that the accounting requirements placed
undue burden on covered entities that use paper, rather than electronic,
records.
*Response:* We do not agree that the current reliance on paper records
makes the accounting provision unduly burdensome. Covered entities must
use the paper records in order to make a disclosure, and have the
opportunity when they do so to make a notation in the record or in a
separate log. We require an accounting only for disclosures for purposes
other than treatment, payment, and health care operations. Such
disclosures are not so numerous that they cannot be accounted for, even
if paper records are involved.
*Comments:* The exception to the accounting provision for disclosures of
protected health information for treatment, payment, and health care
operations purposes was viewed favorably by many respondents. However,
at least one commenter stated that since covered entities must
differentiate between disclosures that require documentation and those
that do not, they will have to document each instance when a patient's
medical record is disclosed to determine the reason for the disclosure.
This commenter also argued that the administrative burden of requiring
customer services representatives to ask in which category the
information falls and then to keep a record that they asked the question
and record the answer would be overwhelming for plans. The commenter
concluded that the burden of documentation on a covered entity would not
be relieved by the stipulation that documentation is not required for
treatment, payment, and health care operations.
*Response:* We disagree. Covered entities are not required to document
every disclosure in order to differentiate those for treatment, payment,
and health care operations from those for purposes for which an
accounting is required. We require that, when a disclosure is made for
which an accounting is required, the covered entity be able to produce
an accounting of those disclosures upon request. We do not require a
covered entity to be able to account for every disclosure. In addition,
we believe that we have addressed many of the commenters' concerns by
clarifying in the final rule that disclosures to the individual,
regardless of the purpose for the disclosure, are not subject to the
accounting requirement.
*Comment*s: An insurer explained that in the context of underwriting, it
may have frequent and multiple disclosures of protected health
information to an agent, third party medical provider, or other entity
or individual. It requested we reduce the burden of accounting for such
disclosures.
*Response:* We add a provision allowing for a summary accounting of
recurrent disclosures. For multiple disclosures to the same recipient
pursuant to a single authorization or for a single purpose permitted
under the rule without authorization, the covered entity may provide a
summary accounting addressing the series of disclosures rather than a
detailed accounting of each disclosure in the series.
*Comment:* Several commenters said that it was unreasonable to expect
covered entities to track disclosures that are requested by the
individual. They believed that consumers should be responsible for
keeping track of their own requests.
Other commenters asked that we specify that entities need not retain and
provide copies of the individual's authorization to disclose protected
health information. Some commenters were particularly concerned that if
they maintain all patient information on a computer system, it would be
impossible to link the paper authorization with the patient's electronic
records.
Another commenter suggested we allow entities to submit copies of
authorizations after the 30-day deadline for responding to the
individual, as long as the accounting itself is furnished within the
30-day window.
*Response:* In the final rule we do not require disclosures to the
individual to be included in the accounting. Other disclosures requested
by the individual must be included in the accounting, unless they are
otherwise excepted from the requirement. We do not agree that
individuals should be required to track these disclosures themselves. In
many cases, an authorization may authorize a disclosure by more than one
entity, or by a class of entities, such as all physicians who have
provided medical treatment to the individual. Absent the accounting, the
individual cannot know whether a particular covered entity has acted on
the authorization.
We agree, however, that it is unnecessarily burdensome to require
covered entities to provide the individual with a copy of the
authorization. We remove the requirement. Instead, we require the
accounting to contain a brief statement describing the purpose for which
the protected health information was disclosed. The statement must be
sufficient to reasonably inform the individual of the basis for the
disclosure. Alternatively, the covered entity may provide a copy of the
authorization or a copy of the written request for disclosure, if any,
under §§ 164.502(a)(2)(ii) or 164.512.
*Comments:* We received many comments regarding the amount of
information required in the accounting. A few commenters requested that
we include additional elements in the accounting, such as the method of
transmittal and identity of the employee who accessed the information.
Other commenters, however, felt that the proposed requirements went
beyond what is necessary to inform the individual of disclosures.
Another commenter stated that if the individual's right to obtain an
accounting extends to disclosures that do not require a signed
authorization, then the accounting should be limited to a disclosure of
the manner and purpose of disclosures, as opposed to an individual
accounting of each entity to whom the protected health information was
disclosed. An insurer stated that this section of the proposed rule
should be revised to provide more general, rather than detailed,
guidelines for accounting of disclosures. The commenter believed that
its type of business should be allowed to provide general information
regarding the disclosure of protected health information to outside
entities, particularly with regard to entities with which the insurer
maintains an ongoing, standard relationship (such as a reinsurer).
*Response:* In general, we have retained the proposed approach, which we
believe strikes an appropriate balance between the individual's right to
know to whom and for what purposes their protected health information
has been disclosed and the burden placed on covered entities. In the
final rule, we clarify that the accounting must include the address of
the recipient only if the address is known to the covered entity. As
noted above, we also add a provision allowing for a summary accounting
of recurrent disclosures. We note that some of the activities of concern
to commenters may fall under the definition of health care operations
(see § 164.501 and the associated preamble).
*Comment:* A commenter asked that we limit the accounting to information
pertaining to the medical record itself, as opposed to protected health
information more generally. Similarly, commenters suggested that the
accounting be limited to release of the medical record only.
*Response:* We disagree. Protected health information exists in many
forms and resides in many sources. An individual's right to know to whom
and for what purposes his or her protected health information has been
disclosed would be severely limited if it pertained only to disclosure
of the medical record, or information taken only from the record.
*Comment:* A commenter asked that we make clear that only disclosures
external to the organization are within the accounting requirement.
*Response:* We agree. The requirement only applies to disclosures of
protected health information, as defined in § 164.501.
*Comment:* Some commenters requested that we establish a limit on the
number of times an individual could request an accounting. One comment
suggested we permit individuals to request one accounting per year;
another suggested two accountings per year, except in "emergency
situations." Others recommended that we enable entities to recoup some
of the costs associated with implementation by allowing the entity to
charge for an accounting.
*Response:* We agree that covered entities should be able to defray
costs of excessive requests. The final rule provides individuals with
the right to receive one accounting without charge in a twelve-month
period. For additional requests by an individual within a twelve-month
period, the covered entity may charge a reasonable, cost-based fee. If
it imposes such a fee, the covered entity must inform the individual of
the fee in advance and provide the individual with an opportunity to
withdraw or modify the request to avoid or reduce the fee.
*Comment:* In the NPRM, we solicited comments on the appropriate
duration of the individual's right to an accounting. Some commenters
supported the NPRM's requirement that the right exist for as long as the
covered entities maintains the protected health information. One
commenter, however, noted that most audit control systems do not retain
data on activity for indefinite periods of time.
Other commenters noted that laws governing the length of retention of
clinical records vary by state and by provider type and suggested that
entities be allowed to adhere to state laws or policies established by
professional organizations or accrediting bodies. Some commenters
suggested that the language be clarified to state that whatever minimum
requirements are in place for the record should also guide covered
entities in retaining their capacity to account for disclosures over
that same time, but no longer.
Several commenters asked us to consider specific time limits. It was
pointed out that proposed § 164.520(f)(6) of the NPRM set a six-year
time limit for retaining certain information including authorization
forms and contracts with business partners. Included in this list was
the accounting of disclosures, but this requirement was inconsistent
with the more open-ended language in § 164.515. Commenters suggested
that deferring to this six-year limit would make this provision
consistent with other record retention provisions of the standard and
might relieve some of the burden associated with implementation. Other
specific time frames suggested were two years, three years, five years,
and seven years.
Another option suggested by commenters was to keep the accounting record
for as long as entities have the information maintained and "active" on
their systems. Information permanently taken off the covered entity's
system and sent to "dead storage" would not be covered. One commenter
further recommended that we not require entities to maintain records or
account for prior disclosures for members who have "disenrolled."
*Response:* We agree with commenters who suggested we establish a
specific period for which an individual may request an accounting. In
the final rule, we provide that individuals have a right to an
accounting of the applicable disclosures that have been made in the
six-year period prior to a request for an accounting. We adopt this time
frame to conform with the other documentation retention requirements in
the rule. We also note that an individual may request, and a covered
entity may then provide, an accounting of disclosures for a period of
time less than six years from the date of the request. For example, an
individual could request an accounting only of disclosures that occurred
during the year prior to the request. In addition, we note that covered
entities do not have to account for disclosures that occurred prior to
the compliance date of this rule.
*Comments:* Commenters asked that we provide more time for entities to
respond to requests for accounting. Suggestions ranged from 60 days to
90 days. Another writer suggested that entities be able to take up to
three 30-day extensions from the original 30-day deadline. Commenters
raised concerns about the proposed requirement that a covered health
care provider or health plan act as soon as possible.
*Response:* We agree with concerns raised by commenters and in the final
rule, covered entities are required to provide a requested accounting no
later than 60 days after receipt of the request. We also provide for one
30 day extension if the covered entity is unable to provide the
accounting within the standard time frame. We eliminate the requirement
for a covered entity to act as soon as possible.
We recognize that circumstances may arise in which an individual will
request an accounting on an expedited basis. We encourage covered
entities to implement procedures for handling such requests. The time
limitation is intended to be an outside deadline, rather than an
expectation. We expect covered entities always to be attentive to the
circumstances surrounding each request and to respond in an appropriate
time frame.
*Comment:* A commenter asked that we provide an exemption for
disclosures related to computer upgrades, when protected health
information is disclosed to another entity solely for the purpose of
establishing or checking a computer system.
*Response:* This activity falls within the definition of health care
operations and is, therefore, excluded from the accounting requirement.
**SECTION 164.530---ADMINISTRATIVE REQUIREMENTS**
**Section 164.530(a)---Designation of a Privacy Official and Contact
Person**
*Comment:* Many of the commenters on this topic objected to the cost of
establishing a privacy official, including the need to hire additional
staff, which might need to include a lawyer or other highly paid
individual.
*Response:* We believe that designation of a privacy official is
essential to ensure a central point of accountability within each
covered entity for privacy-related issues. The privacy official is
charged with developing and implementing the policies and procedures for
the covered entity, as required throughout the regulation, and for
compliance with the regulation generally. While the costs for these
activities are part of the costs of compliance with this rule, not extra
costs associated with the designation of a privacy official, we do
anticipate that there will be some cost associated with this
requirement. The privacy official role may be an additional
responsibility given to an existing employee in the covered entity, such
as an office manager in a small entity or an information officer or
compliance official in a larger institution. Cost estimates for the
privacy official are discussed in detail in the overall cost analysis.
*Comment:* A few commenters argued for more flexibility in meeting the
requirement for accountability. One health care provider maintained that
covered entities should be able to establish their own system of
accountability. For example, most physician offices already have the
patient protections incorporated in the proposed administrative
requirements -- the commenter urged that the regulation should
explicitly promote the application of flexibility and scalability. A
national physician association noted that, in small offices, in
particular, responsibility for the policies and procedures should be
allowed to be shared among several people. A major manufacturing
corporation asserted that mandating a privacy official is unnecessary
and that it would be preferable to ask for the development of policies
that are designed to ensure that processes are maintained to assure
compliance.
*Response:* We believe that a single focal point is needed to achieve
the necessary accountability. At the same time, we recognize that
covered entities are organized differently and have different
information systems. We therefore do not prescribe who within a covered
entity must serve as the privacy official, nor do we prohibit combining
this function with other duties. Duties may be delegated and shared, so
long as there is one point of accountability for the covered entity's
policies and procedures and compliance with this regulation.
*Comment:* Some commenters echoed the proposal of a professional
information management association that the regulation establish formal
qualifications for the privacy official, suggesting that this should be
a credentialed information management professional with specified
minimum training standards. One commenter emphasized that the privacy
official should be sufficiently high in management to have influence.
*Response:* While there may be some advantages to establishing formal
qualifications, we concluded the disadvantages outweigh the advantages.
Since the job of privacy official will differ substantially among
organizations of varying size and function, specifying a single set of
qualifications would sacrifice flexibility and scalability in
implementation.
*Comment:* A few commenters suggested that we provide guidance on the
tasks of the privacy official. One noted that this would reduce the
burden on covered entities to clearly identify those tasks during the
initial HIPAA implementation phase.
*Response:* The regulation itself outlines the tasks of the privacy
official, by specifying the policies and procedures required, and
otherwise explaining the duties of covered entities. Given the wide
variation in the function and size of covered entities, providing
further detail here would unnecessarily reduce flexibility for covered
entities. We will, however, provide technical assistance in the form of
guidance on the various provisions of the regulation before the
compliance date.
*Comment:* Some comments expressed concern that the regulation would
require a company with subsidiaries to appoint a privacy official within
each subsidiary. Instead they argued that the corporate entity should
have the option of designating a single corporate official rather than
one at each subsidiary.
*Response:* In the final regulation, we give covered entities with
multiple subsidiaries that meet the definition of covered entities under
this rule the flexibility to designate whether such subsidiaries are
each a separate covered entity or are together a single covered entity.
(See § 164.504(b) for the rules requiring such designation.) If only one
covered entity is designated for the subsidiaries, only one privacy
officer is needed. Further, we do not prohibit the privacy official of
one covered entity from serving as the privacy official of another
covered entity, so long as all the requirements of this rule are met for
each such covered entity.
**Section 164.530(b)---Training**
*Comment:* A few commenters felt that the proposed provision was too
stringent, and that the content of the training program should be left
to the reasonable discretion of the covered entity.
*Response:* We clarify that we do not prescribe the content of the
required training; the nature of the training program is left to the
discretion of the covered entity. The scenarios in the NPRM preamble of
potential approaches to training for different sized covered entities
were intended as examples of the flexibility and scalability of this
requirement.
*Comment:* Most commenters on this provision asserted that
recertification/retraining every three years is excessive, restrictive,
and costly. Commenters felt that retraining intervals should be left to
the discretion of the covered entity. Some commenters supported
retraining only in the event of a material change. Some commenters
supported the training requirement as specified in the NPRM.
*Response:* For the reasons cited by the commenters, we eliminate the
triennial recertification requirements in the final rule. We also
clarify that retraining is not required every three years. Retraining is
only required in the case of material changes to the privacy policies
and procedures of the covered entity.
*Comment:* Several commenters objected to the burden imposed by required
signatures from employees after they are trained. Many commenters
suggested that electronic signatures be accepted for various reasons.
Some felt that it would be less costly than manually producing,
processing, and retaining the hard copies of the forms. Some suggested
sending out the notice to the personal workstation via email or some
other electronic format and having staff reply via email. One commenter
suggested that the covered entity might opt to give web based training
instead of classroom or some other type. The commenter indicated that
with web based training, the covered entity could record whether or not
an employee had received his or her training through the use of a guest
book or registration form on the web site. Thus, a physical signature
should not be required.
*Response:* We agree that there are many appropriate mechanisms by which
covered entities can implement their training programs, and therefore
remove this requirement for signature. We establish only a general
requirement that covered entities document compliance with the training
requirement.
*Comment:* Some commenters were concerned that there was no proposed
requirement for business associates to receive training and/or to train
their employees. The commenters believed that if the business associate
violated any privacy requirements, the covered entity would be held
accountable. These commenters urged the Secretary to require periodic
training for appropriate management personnel assigned outside of the
component unit of the covered entity, including business associates.
Other commenters felt that it would not be fair to require covered
entities to impose training requirements on business associates.
*Response:* We do not have the statutory authority directly to require
business associates to train their employees. We also believe it would
be unnecessarily burdensome to require covered entities to monitor
business associates' establishment of specific training requirements.
Covered entities' responsibility for breaches of privacy by their
business associates is described in §§ 164.504(e) and 164.530(f). If a
covered entity believes that including a training requirement in one or
more of its business associate contracts is an appropriate means of
protecting the health information provided to the business associate, it
is free to do so.
*Comments:* Many commenters argued that training, as well as all of the
other administrative requirements, are too costly for covered entities
and that small practices would not be able to bear the added costs.
Commenters also suggested that HHS should provide training materials at
little, or no, cost to the covered entity.
*Response:* For the final regulation, we make several changes to the
proposed provisions. We believe that these changes address the issue of
administrative cost and burden to the greatest extent possible,
consistent with protecting the privacy of health information. In
enforcing the privacy rule, we expect to provide general training
materials. We also hope to work with professional associations and other
groups that target classes of providers, plans and patients, in
developing specialized material for these groups.
We note that, under long-standing legal principles, entities are
generally responsible for the actions of their workforce. The
requirement to train workforce members to implement the covered entity's
privacy policies and procedures, and do such things as pass evidence of
potential problems to those responsible, is in line with these
principles. For example, the comments and our fact finding indicate
that, today, many hospitals require their workforce members to sign a
confidentiality agreement, and include confidentiality matters in their
employee handbooks.
**Section 164.530(c)---Safeguards**
*Comments:* A few comments assert that the rule requires some
institutions that do not have adequate resources to develop costly
physical and technical safeguards without providing a funding mechanism
to do so. Another comment said that the vague definitions of adequate
and appropriate safeguards could be interpreted by HHS to require the
purchase of new computer systems and reprogram many old ones. A few
other comments suggested that the safeguards language was vague and
asked for more specifics.
*Response:* We require covered entities to maintain safeguards adequate
for their operations, but do not require that specific technologies be
used to do so. Safeguards need not be expensive or high-tech to be
effective. Sometimes, it is an adequate safeguard to put a lock on a
door and only give the keys to those who need access. As described in
more detail in the preamble discussion of § 164.530, we do not require
covered entities to guarantee the safety of protected health information
against all assaults. This requirement is flexible and scalable to allow
implementation of required safeguards at a reasonable cost.
*Comments:* A few commenters noted that once protected health
information becomes non-electronic, by being printed for example, it
escapes the protection of the safeguards in the proposed Security Rule.
They asked if this safeguards requirement is intended to install similar
security protections for non-electronic information.
*Response:* This provision is not intended to incorporate the provisions
in the proposed Security regulation into this regulation, or to
otherwise require application of those provisions to paper records.
*Comments:* Some commenters said that it was unclear what
\"appropriate\" safeguards were required by the rule and who establishes
the criteria for them. A few noted that the privacy safeguards were not
exactly the same as the security safeguards, or that the \'other
safeguards\' section was too vague to implement. They asked for more
clarification of safeguards requirements and flexible solutions.
*Response:* In the preamble discussion of § 164.530, we provide examples
of types of safeguards that can be appropriate to satisfy this
requirement. Other sections of this regulation require specific
safeguards for specific circumstances. The discussion of the
requirements for "minimum necessary' uses and disclosures of protected
health information includes related guidance for developing role-based
access policies for a covered entity's workforce. The requirements for
"component entities" include requirements for firewalls to prevent
access by unauthorized persons. The proposed Security Rule included
further details on what safeguards would be appropriate for electronic
information systems. The flexibility and scalability of these rules
allows covered entities to analyze their own needs and implement
solutions appropriate for their own environment.
*Comments:* A few comments asked for a requirement for a firewall
between a health care component and the rest of a larger organization as
another appropriate safeguard.
*Response:* We agree, and have incorporated such a requirement in §
164.504.
*Comments:* One commenter agreed with the need for administrative,
physical, and technical safeguards, but took issue with our
specification of the type of documentation or proof that the covered
entity is taking action to safeguard protected health information.
*Response:* This privacy rule does not require specific forms of proof
for safeguards.
*Comments:* A few commenters asked that, for the requirement for a
signed certification of training and the requirements for verification
of identity, we consider the use of electronic signatures that meet the
requirements in the proposed security regulation to meet the
requirements of this rule.
*Response:* In this final rule, we drop the requirements for signed
certifications of training. Signatures are required elsewhere in this
regulation, for example, for a valid authorization. In the relevant
sections we clarify that electronic signatures are sufficient provided
they meet standards to be adopted under HIPAA. In addition, we do not
intend to interfere with the application of the Electronic Signature in
Global and National Commerce Act.
*Comments:* A few commenters requested that the privacy requirements for
appropriate administrative, technical, and physical safeguards be
considered to have been met if the requirements of the proposed Security
Rule have been met. Others requested that the safeguards requirements of
the final Privacy Rule mirror or be harmonized with the final Security
Rule so they do not result in redundant or conflicting requirements.
*Response:* Unlike the proposed regulation, the final regulation covers
all protected health information, not just information that had at some
point been electronic. Thus, these commenters' assumption that the
proposed Privacy Rule and the proposed Security Rule covered the same
information is not the case, and taking the approach suggested by these
comments would leave a significant number of health records unprotected.
The safeguards required by this regulation are appropriate for both
paper and electronic information. We will take care to ensure that the
final Security Rule works in tandem with these requirements.
*Comments:* One commenter requested that the final privacy rule be
published before the final Security Rule, recognizing that the privacy
policies must be in place before the security technology used to
implement them could be worked out. Another commenter asked that the
final Security Rule be published immediately and not wait for an
expected delay while privacy policies are worked out.
*Response:* Now that this final privacy rule has been published in a
timely manner, the final Security Rule can be harmonized with it and
published soon.
*Comments:* Several commenters echoed an association recommendation
that, for those organizations that have implemented a computer based
patient record that is compliant with the requirements of the proposed
Security Rule, the minimum necessary rule should be considered to have
been met by the implementation of role-based access controls.
*Response:* The privacy regulation applies to paper records to which the
proposed Security Rule does not apply. Thus, taking the approach
suggested by these comments would leave a significant number of health
records unprotected. Further, since the final Security Rule is not yet
published and the number of covered entities that have implemented this
type of computer-based patient record systems is still small, we cannot
make a blanket statement. We note that this regulation requires covered
entities to develop role-based access rules, in order to implement the
requirements for "minimum necessary" uses and disclosures of protected
health information. Thus, this regulation provides a foundation for the
type of electronic system to which these comments refer.
**Section 164.530(d)---Complaints to the Covered Entity**
*Comment:* Several commenters felt that some form of due process is
needed when it comes to internal complaints. Specifically, they wanted
to be assured that the covered entity actually hears the complaints made
by the individual and that the covered entity resolves the complaint
within a reasonable time frame. Without due process the commenters felt
that the internal complaint process is open ended. Some commenters
wanted the final rule to include an appeals process for individuals if a
covered entity's determination in regards to the complaint is
unfavorable to the individual.
*Response:* We do not require covered entities to implement any
particular due process or appeals process for complaints, because we are
concerned about the burden this could impose on covered entities. We
provide individuals with an alternative to take their complaints to the
Secretary. We believe that this provides incentives for covered entities
to implement a complaint process that resolves complaints to
individuals' satisfaction.
*Comment:* Some commenters felt that the individual making the complaint
should exhaust all other avenues to resolve their issues before filing a
complaint with the Secretary. A number of commenters felt that any
complaint being filed with the Secretary should include documentation of
the reviews done by the covered entity.
*Response:* We reject these suggestions, for two reasons. First, we want
to avoid establishing particular process requirements for covered
entities' complaint programs. Also, this rule does not require the
covered entity to share any information with the complainant, only to
document the receipt of the complaint and the resolution, if any.
Therefore, we cannot expect the complainant to have this information
available to submit to the Secretary. Second, we believe the individual
making the complaint should have the right to share the complaint with
the Secretary at any point in time. This approach is consistent with
existing civil rights enforcement programs for which the Department is
responsible. Based on that experience, we believe that most complaints
will come first to covered entities for disposition.
*Comment:* Some commenters wanted the Department to prescribe a minimum
amount of time before the covered entity could dispose of the
complaints. They felt that storing these complaints indefinitely would
be cumbersome and expensive.
*Response:* We agree, and in the final rule require covered entities to
keep all items that must be documented, including complaints, for at
least six years from the date of creation.
*Comments:* Some commenters objected to the need for covered entities to
have at least one employee, if not more, to deal with complaints. They
felt that this would be costly and is redundant in light of the
designation of a contact person to receive complaints.
*Response:* We do not require assignment of dedicated staff to handle
complaints. The covered entity can determine staffing based on its needs
and business practices. We believe that consumers need one clear point
of contact for complaints, in order that this provision effectively
inform consumers how to lodge complaints and so that the compliant will
get to someone who knows how to respond. The contact person (or office)
is for receipt of complaints, but need not handle the complaints.
**Section 164.530(e)---Sanctions**
*Comment:* Commenters argued that most covered entities already have
strict sanctions in place for violations of a patient's privacy, either
due to current laws, contractual obligations, or good operating
practices. Requiring covered entities to create a formal sanctioning
process would be superfluous.
*Response:* We believe it is important for the covered entity to have
these sanction policies and procedures documented so that employees are
aware of what actions are prohibited and punishable. For entities that
already have sanctions policies in place, it should not be problematic
to document those policies. We do not define the particular sanctions
that covered entities must impose.
*Comment:* Several commenters agreed that training should be provided
and expectations should be clear so that individuals are not sanctioned
for doing things that they did not know were wrong or inappropriate. A
good faith exception should be included in the final rule to protect
these individuals.
*Response:* We agree that employees should be trained to understand the
covered entity's expectations and understand the consequences of any
violation. This is why we are requiring each covered entity to train its
workforce. However, we disagree that a good faith exception is
explicitly needed in the final rule. We leave the details of sanctions
policies to the discretion of the covered entity. We believe it is more
appropriate to leave this judgment to the covered entity that will be
familiar with the circumstances of the violation, rather than to specify
such requirements in the regulation.
*Comment:* Some commenters felt that the sanctions need to reach
business partners as well, not just employees of the covered entities.
These commenters felt all violators should be sanctioned, including
government officials and agencies.
*Response:* All members of a covered entity's workforce are subject to
sanctions for violations, including government officials who are part of
a covered entity's workforce. Requirements for addressing privacy
violations by business associates are discussed in §§ 164.504(e) and
164.530(f).
*Comments:* Many commenters appreciated the flexibility left to the
covered entities to determine sanctions. However, some were concerned
that the covered entity would need to predict each type of violation and
the associated sanction. They argue that, if the Department could not
determine this in the NPRM, then the covered entities should be allowed
to come up with sanctions as appropriate at the time of the violation.
Some commenters wanted a better explanation and understanding of what
HHS' expectation is of when is it appropriate to apply sanctions. Some
commenters felt that the sanctioning requirement is nebulous and
requires independent judgment of compliance; as a result it is hard to
enforce. Offending individuals may use the vagueness of the standard as
an defense.
*Response:* We agree with the commenters that argue that covered
entities should be allowed to determine the specific sanctions as
appropriate at the time of the violation. We believe it is more
appropriate to leave this judgment to the covered entity, because the
covered entity will be familiar with the circumstances of the violation
and the best way to improve compliance.
*Comment:* A commenter felt that the self-imposition of this requirement
is an inadequate protection, as there is an inherent conflict of
interest when an entity must sanction one of its own.
*Response:* We believe it is in the covered entity's best interests to
appropriately sanction those individuals who do not follow the outlined
policies and procedures. Allowing violations to go unpunished may lead
bigger problems later, and result in complaints being registered with
the Department by aggrieved parties and/or an enforcement action.
*Comment:* This provision should cover all violations, not just repeat
violations.
*Response:* We do not limit this requirement to repeat offenses.
**Section 164.530(f)---Duty to Mitigate**
*Comments:* A few commenters felt that any duty to mitigate would be
onerous, especially for small entities. One commenter supported an
affirmative duty to mitigate for employees of the covered entity , as
long as there is no prescribed mitigation policy. One commenter stated
that a requirement for mitigation is unnecessary because any prudent
entity would do it.
Some practitioner organizations as well as a health plan, expressed
concern about the obligation to mitigate in the context of the business
associate relationship. Arguing that it is unnecessary for the
regulation to explicitly extend the duty to mitigate to business
associates, commenters noted that: any prudent entity would discipline a
vendor or employee that violates a regulation; that the matter is best
left to the terms of the contract, and that it is difficult and
expensive for a business associate to have a separate set of procedures
on mitigation for each client/provider. One commenter suggested that the
federal government should fund the monitoring needed to administer the
requirement.
*Response*: Eliminating the requirement to mitigate harm would undermine
the purposes of this rule by reducing covered entities' accountability
to their patients for failure to protect their confidential data. To
minimize burden, we do not prescribe what mitigation policies and
procedures must be implemented. We require only that the covered entity
mitigate harm. We also assume that violations will be rare, and so the
duty to mitigate harm will rarely be triggered. To the extent a covered
entity already has methods for mitigating harm, this rule will not pose
significant burden, since we don\'t require the covered entity to follow
any prescribed method or set of rules.
We also modify the NPRM to impose the duty to mitigate only where the
covered entity has actual knowledge of harm. Further reducing burden,
the rule requires mitigation \"to the extent practicable.\" It does not
require the covered entity to eliminate the harm unless that is
practicable. For example, if protected health information is advertently
provided to a third party without authorization in a domestic abuse
situation, the covered entity would be expected to promptly contact the
patient as well as appropriate authorities and apprize them of the
potential danger .
The harm to the individual is the same, whether the privacy breach was
caused by a member of the covered entity's workforce, or by a
contractor. We believe the cost of this requirement to be minimal for
covered entities that engage in prudent business practices for
exchanging protected health information with their business associates.
*Comment*: A few commenters noted that it is difficult to determine
whether a violation has resulted in a deleterious effect, especially as
the entity cannot know all places to which information has gone and uses
that have been made of it. Consequently, there should be a duty to
mitigate even if a deleterious effect cannot be shown, because the
individual has no other redress.
*Response*: As noted above, this provision only applies if the covered
entity has actual knowledge of the harm, and requires mitigation \"to
the extent practicable.\" The covered entity is expected to take
reasonable steps based on knowledge of where the information has been
disclosed, how it might be used to cause harm to the patient or another
individual, and what steps can actually have a mitigating effect in that
specific situation.
*Comments*: Commenters stated that the language of the regulation was in
some places vague and imprecise thus providing covered entities with
insufficient guidance and allowing variation in interpretation.
Commenters also noted that this could result in inconsistency in
implementation as well as permitting such inconsistency to be used as a
defense by an offending entity. Particular language for which at least
one commenter requested clarification included \"reasonable steps\" and
what is entailed in the duty to mitigate.
*Response*: We considered ways in which we might increase specificity,
including defining \"to the extent practicable\" and \"reasonable
steps\" and relating the mitigating action to the deleterious impact.
While this approach could remove from the covered entity the burden of
decision-making about actions that need to be taken, we believe that
other factors outweighed this potential benefit. Not only would there be
a loss of desirable flexibility in implementation, but it would not be
possible to define \"to the extent practicable\" in a way that makes
sense for all types of covered entities. We believe that allowing
flexibility and judgment by those familiar with the circumstances to
dictate the approach is the best approach to mitigating harm.
**Section 164.530(g)---Refraining from Intimidating or Retaliatory
Acts**
*Comment:* Several commenters stated that the regulation should prohibit
covered entities from engaging in intimidating or retaliatory acts
against any person, not just against the "individual," as proposed. They
suggested adding "or other person or entity" after "any individual."
*Response:* We agree, and allow any person to file a compliant with the
Secretary. "Person" is not limited to natural persons, but includes any
type of organization, association or group such as other covered
entities, health oversight agencies and advocacy groups.
*Comment:* A few commenters suggested deleting this provision in its
entirety. One commenter indicated that the whistleblower and retaliation
provisions could be inappropriately used against a hospital and that the
whistleblower's ability to report numerous violations will result in a
dangerous expansion of liability. Another commenter stated that covered
entities could not take action against an employee who had violated the
employer's privacy provisions if this employee files a complaint with
the Secretary.
Several commenters suggested deleting "in any manner" and "or opposing
any act or practice made unlawful by this subpart" in § 164.522(d)(4).
The commenters indicated that, as proposed, the rule would make it
difficult to enforce compliance within the workforce. One commenter
stated that the proposed 164.522(d)(4) "is extremely broad and may allow
an employee to reveal protected health information to fellow employees,
the media and others (e.g., an employee may show a medical record to a
friend or relative before filing a complaint with the Department). This
commenter further stated that covered entities will "absolutely be
prevented from prohibiting such conduct." One commenter suggested adding
that a covered entity may take disciplinary action against any member of
its work force or any business partner who uses or discloses
individually identifiable health information in violation of this
subpart in any manner other than through the processes set forth in the
regulation.
*Response:* To respond to these comments, we make several changes to the
proposed provision.
First, where the activity does not involve the filing of a complaint
under § 160.306 of this part or participation in an investigation or
proceeding initiated by the government under the rule, we delete the
phrase "in any manner" and add a requirement that the individual's
opposition to "any act or practice" made unlawful by this subpart be in
good faith, and that the expression of that opposition must be
reasonable. Second, we add a requirement that the individual's
opposition to "any act or practice" made unlawful by this subpart must
not involve a disclosure of protected health information that is in
violation of this subpart. Thus, the employee who discloses protected
health information to the media or friends is not protected. In
providing interpretations of the retaliation provision, we will consider
existing interpretations of similar provisions such as the guidance
issued by EEOC in this regard.
**Section 164.530(h)---Waiver of Rights**
There are no comments directly about this section because it was not
included in the proposed rule.
**Section 164.530(i)---Policies and Procedures and §
164.530(j)---Documentation Requirements**
*Comments:* Many of the comments to this provision addressed the costs
and complexity of the regulation as a whole, not the additional costs of
documenting policies and procedures per se. Some did, either implicitly
or explicitly, object to the need to develop and document policies and
procedures as creating excessive administrative burden. Many of these
commenters also asserted that there is a contradiction between the
administrative burden of this provision and one of the statutory
purposes of this section of the HIPAA to reduce costs through
administrative simplification. Suggested alternatives were generally
reliance on existing regulations and ethical standards, or on current
business practices.
*Response:* A specific discussion of cost and burden is found in the
Regulatory Impact Analysis of this final rule.
We do not believe there is a contradiction between the administrative
costs of this provision and of the goal of administrative
simplification. In the Administrative Simplification provisions of the
HIPAA, Congress combined a mandate to facilitate the efficiencies and
cost savings for the health care industry that the increasing use of
electronic technology affords, with a mandate to improve privacy and
confidentiality protections. Congress recognized, and we agree, that the
benefits of electronic commerce can also cause increased vulnerability
to inappropriate access and use of medical information, and so must be
balanced with increased privacy protections. By including the mandate
for privacy standards in section 264 of the HIPAA, Congress determined
that existing regulations and ethical standards, and current business
practices were insufficient to provide the necessary protections.
Congress mandated that the total benefits associated with administrative
simplification must outweigh its costs, including the costs of
implementing the privacy regulation. We are well within this mandate.
*Comments:* Several commenters suggested that the documentation
requirements not be established as a standard under the regulation,
because standards are subject to penalties. They recommend we delete the
documentation standards and instead provide specific guidance and
technical assistance. Several commenters objected to the suggestion in
the NPRM that professional associations assist their members by
developing appropriate policies for their membership. Several
commentators representing professional associations believed this to be
an onerous and costly burden for the associations, and suggested instead
that we develop specific models which might require only minor
modification. Some of these same associations were also concerned about
liability issues in developing such guidelines. One commenter argued
that sample forms, procedures, and policies should be provided as part
of the Final Rule, so that practitioners would not be overburdened in
meeting the demands of the regulations. They urged us to apply this
provision only to larger entities.
*Response:* The purpose of requiring covered entities to develop
policies and procedures for implementing this regulation is to ensure
that important decisions affecting individuals' rights and privacy
interests are made thoughtfully, not on an ad hoc basis. The purpose of
requiring covered entities to maintain written documentation of these
policies is to facilitate workforce training, and to facilitate creation
of the required notice of information practices. We further believe that
requiring written documentation of key decisions about privacy will
enhance accountability, both within the covered entity and to the
Department, for compliance with this regulation.
We do not include more specific guidance on the content of the required
policies and procedures because of the vast difference in the size of
covered entities and types of covered entities' businesses. We believe
that covered entities should have the flexibility to design the policies
and procedures best suited to their business and information practices.
We do not exempt smaller entities, because the privacy of their patients
is no less important than the privacy of individuals who seek care from
large providers. Rather, to address this concern we ensure that the
requirements of the rule are flexible so that smaller covered entities
need not follow detailed rules that might be appropriate for larger
entities with complex information systems.
We understand that smaller covered entities may require some assistance,
and intend to provide such technical assistance after publication of
this rule. We hope to work with professional associations and other
groups that target classes of providers, plans and patients, in
developing specialized material for these groups. Our discussions with
several such organizations indicate their intent to work on various
aspects of model documentation, including forms. Because the
associations' comments regarding concerns about liability did not
provide sufficient details, we cannot address them here.
*Comment:* Many commenters discussed the need for a recognition of
scalability of the policies and procedures of an entity based on size,
capabilities, and needs of the participants. It was noted that the
actual language of the draft regulations under § 164.520 did not address
scalability, and suggested that some scalability standard be formally
incorporated into the regulatory language and not rely solely on the
NPRM introductory commentary.
*Response:* In § 164.530(i)(1) of the final rule, we specify that we
require covered entities to implement policies and procedures that take
into account the size of the covered entity and the types of activities
that relate to protected health information undertaken by the covered
entity.
*Comment:* One commenter objected to our proposal to allow covered
entities to make uses or disclosures not permitted by their current
notice if a compelling reason exists to make the use or disclosure and
the entity documents the reasons and changes its policies within 30 days
of the use or disclosure. The commenter argued that the subjective
language of the regulation might give entities the ability to engage in
*post hoc* justifications for violations of their own information
practices and policies. The commenter suggested that there should be an
objective standard for reviewing the covered entity's reasons before
allowing the covered entity to amend its policies.
*Response:* We eliminate this provision from the final rule. The final
rule requires each covered entity to include in its notice of
information practices a statement of all permitted uses under this rule,
not just those in which the covered entity actually engages in at the
time of that notice.
*Comment:* Some commenters expressed concern that the required retention
period in the NPRM applied to the retention of medical records.
*Response:* The retention requirement of this regulation only applies to
the documentation required by the rule, for example, keeping a record of
accounting for disclosures or copies of policies and procedures. It does
not apply to medical records.
*Comments:* Comments on the six year retention period were mixed. Some
commenters endorsed the six-year retention period for maintaining
documentation. One of the comments stated this retention period would
assist physicians legally. Other commenters believed that the retention
period would be an undue burden. One commenter noted that most State
Board of Pharmacy regulations require pharmacies to keep records for two
years, so the six year retention period would triple document retention
costs.
*Response:* We established the retention period at six years because
this is the statute of limitations for the civil monetary penalties.
This rule does not apply to all pharmacy records, but only to the
documentation required by this rule.
**Section 164.530(k)---Group Health Plans**
There were no comments directly about this section because it was not
included in the proposed rule.
**SECTION 164.532---TRANSITION PROVISIONS**
*Comment:* Commenters urged the Department to clarify whether the "reach
of the transition requirement" is limited to a particular time frame, to
the provider's activities in a particular job, or work for a particular
employer. For example, one commenter questioned how long a nurse is a
covered entity after she moves from a job reviewing files with protected
health information to an administrative job that does not handle
protected health information; or whether an occupational health nurse
who used to transmit first reports of injury to her company's workers'
compensation carrier last year but no longer does so this year because
of a carrier change still is a covered entity.
*Response:* Because this comment addresses a question of enforcement, we
will address it in the enforcement regulation.
*Comment*: Several commenters sought clarification as to the application
of the privacy rule to research already begun prior to the effective
date or compliance date of the final rule. These commenters argued that
applying the privacy rule to research already begun prior the rule's
effective date would substantially overburden IRBs and that the
resulting research interruptions could harm participants and threaten
the reliability and validity of conclusions based upon clinical trial
data. The commenters recommended that the rule grandfather in any
ongoing research that has been approved by and is under the supervision
of an IRB.
*Response*: We generally agree with the concerns raised by commenters.
In the final rule, we have provided that covered entities may rely upon
consents, authorizations, or other express legal permissions obtained
from an individual for a specific research project that includes the
treatment of individuals to use or disclose protected health information
the covered entity obtained before or after the applicable compliance
date of this rule as long as certain requirements are met. These
consents, authorizations, or other express legal permissions may
specifically permit a use or disclosure of individually identifiable
health information for purposes of the project or be a general consent
of the individual to participate in the project. A covered entity may
use or disclose protected health information it created or received
before or after the applicable compliance date of this rule for purposes
of the project provided that the covered entity complies with all
limitations expressed in the consent, authorization, or permission.
In regard to research projects that include the treatment of
individuals, such as clinical trials, covered entities engaged in these
projects will have obtained at least an informed consent from the
individual to participate in the project. In some cases, the researcher
may also have obtained a consent, authorization, or other express legal
permission to use or disclose individually identifiable health
information in a specific manner. To avoid disrupting ongoing research
and because the participants have already agreed to participate in the
project (which expressly permits or implies the use or disclosure of
their protected health information), we have grandfathered in these
consents, authorizations, and other express legal permissions.
It is unlikely that a research project that includes the treatment of
individuals could proceed under the Common Rule with a waiver of
informed consent. However, to the extent such a waiver has been granted,
we believe individuals participating in the project should be able to
determine how their protected health information is used or disclosed.
Therefore, we require researchers engaged in research projects that
include the treatment of individuals who obtained an IRB waiver of
informed consent under the Common Rule to obtain an authorization or a
waiver of such authorization from an IRB or a privacy board under §
164.512(i) of this rule.
If a covered entity obtained a consent, authorization, or other express
legal permission from the individual who is the subject of the research,
it would be able to rely upon that consent, authorization, or
permission, consistent with any limitations it expressed, to use or
disclose the protected health information it created or received prior
to or after the compliance date of this regulation. If a covered entity
wishes to use or disclose protected health information but no such
consent, authorization, or permission exists, it must obtain an
authorization pursuant to § 164.508 or obtain a waiver of authorization
under § 164.512(i). To the extent such a project is ongoing and the
researchers are unable to locate the individuals whose protected health
information they are using or disclosing, we believe the IRB or privacy
board under the criteria set forth in § 164.512(i) will be able to take
that circumstance into account when conducting its review. In most
instances, we believe this type of research will be able to obtain a
waiver of authorization and be able to continue uninterrupted.
*Comment*: Several comments raised questions about the application of
the rule to individually identifiable information created prior to (1)
the effective date of the rule, and (2) the compliance dates of the
rule. One commenter suggested that the rule should apply only to
information gathered after the effective date of the final rule. A drug
manufacturer asked what would be the effect of the rule on research on
records compiled before the effective date of the rule.
*Response*: We disagree with the commenter's suggestion. The
requirements of this regulation apply to all protected health
information held by a covered entity, regardless of when or how the
covered entity obtained the information. Congress required us to adopted
privacy standards that apply to individually identifiable health
information. While it limited the compliance date for health plans,
covered health care providers, and healthcare clearinghouses, it did not
provide similar limiting language with regard to individually
identifiable health information. Therefore, uses and disclosures of
protected health information made by a covered entity after the
compliance date of this regulation must meet the requirements of these
rules. Uses or disclosures of individually identifiable health
information made prior to the compliance date are not affected; covered
entities will not be sanctioned under this rule based on past uses or
disclosures that are inconsistent with this regulation.
Consistent with the definition of individually identifiable health
information in HIPAA, of which protected health information is a subset,
we do not distinguish between protected health information in research
records and protected health information in other records. Thus, a
covered entity's research records are subject to this regulation to the
extent they contain protected health information.
**SECTION 164.534 - EFFECTIVE DATE AND COMPLIANCE DATE**
Section 1175(b)(1)(A) of the Act requires all covered entities other
than small health plans to comply with a standard or implementation
specification "not later than 24 months after the date on which an
initial standard or implementation specification is adopted or
established"; section 1175(b)(1)(B) provides that small health plans
must comply not later than 36 months after that date. The proposed rule
provided, at proposed § 164.524 (which was titled "Effective date"),
that a covered entity was required to be in compliance with the proposed
subpart E not later than 24 months following the effective date of the
rule, except that small health plans were required to be in compliance
not later than 36 months following the effective date of the rule.
The final rules retain these dates in the text of Subpart E, but
denominate them as "compliance dates," to distinguish the statutory
dates from the date on which the rules become effective. The effective
date of the final rules is 60 days following publication in the [Federal
Register]{.underline}.
***Meaning of Effective Date***
*Comment*: A number of commenters expressed confusion about the
difference between the effective date of the rule and the effective date
on which compliance was required (the statutory compliance dates set out
at section 1175(b)(1), summarized above).
*Response*: The Department agrees that the title of proposed § 164.524
was confusing. Similar comments were received on the Transactions Rule.
Those comments were addressed by treating the "effective date" of the
rule as the date on which adoption takes effect (the "Effective Date"
heading at the beginning of the preamble), while the dates provided for
by section 1175(b)(1) of the statute were denominated as "compliance
dates." These changes are reflected in the definition of "compliance
date" in § 160.103 below (initially published as part of the
Transactions Rule) and are also reflected at § 164.524 below. Section
164.524 below has also been reorganized to follow the organization of
the analogous provisions of the Transactions Rule. The underlying
policy, however, remains as proposed.
***Extend the Compliance Date***
*Comment*: Some commenters recommended that the compliance date be
extended. A number of comments objected that the time frame for
compliance with the proposed standards is unrealistically short. It was
pointed out that providers and others would have to do the following,
among other things, prior to the applicable compliance date: assess
their current systems and departments, determine which state laws were
preempted and which were not, update and reprogram computer systems,
train workers, create and implement the required privacy policies and
procedures, and create or update contracts with business partners. One
comment also noted that the task of coming into compliance during the
same time period with the other regulations being issued under HIPAA
would further complicate the task. These comments generally supported an
extension of the compliance dates by one or more years. Other comments
supported extending the compliance dates on the ground that the
complexity of the tasks involved in implementing the regulation would be
a heavy financial burden for providers and others, and that they should
be given more time to comply, in order to spread the associated capital
and workforce costs over a longer period. It was also suggested that
there be provision for granting extensions of the compliance date, based
on some criteria, such as a good faith effort to comply or that the
compliance dates be extended to two years following completion of a
"state-by-state preemption analysis" by the Department.
*Response:* The Secretary acknowledges that covered entities will have
to make changes to their policies and procedures during the period
between the effective date of the rules below and the applicable
compliance dates. The delayed compliance dates which the statute
provides for constitute a recognition of the fact changes will be
required and are intended to permit covered entities to manage and
implement these changes in an orderly fashion. However, because the time
frames for compliance with the initial standards are established by
statute, the Secretary has no discretion to extend them: compliance is
statutorily required "not later than" the applicable compliance date.
Nor do we believe that it would be advisable to accomplish this result
by delaying the effective date of the final rules beyond 60 days. Since
the Transactions Rule is now in effect, it is imperative to bring the
privacy protections afforded by the rules below into effect as soon as
possible. Retaining the delayed effective date of 60 days, as originally
contemplated, will minimize the gap between transactions covered by
those rules and not also afforded protection under the rules below.
***Phase-in Requirements***
*Comment:* Several comments suggested that the privacy standards be
phased in gradually, to ease the manpower and cost burdens of
compliance. A couple of equipment manufacturing groups suggested that
updating of various types of equipment would be necessary for compliance
purposes, and suggested a phased approach to this \-- for example, an
initial phase consisting of preparation of policies, plans, and risk
assessments, a second phase consisting of bringing new equipment into
compliance, and a final phase consisting of bringing existing equipment
into compliance.
*Response*: As noted in the preceding response, section 1175(b)(1) does
not allow the Secretary discretion to change the time frame within which
compliance must be achieved. Congress appears to have intended the
phasing in of compliance to occur during the two-year compliance period,
not thereafter.
***Compliance Gap Vis-à-Vis State Laws and Small Health Plans***
*Comment:* Several comments stated that, as drafted, the preemption
provisions would be effective as of the rule's effective date (i.e., 60
days following publication), even though covered entities would not be
required to comply with the rules for at least another two years.
According to these comments, the "preempted" state laws would not be in
effect in the interim, so that the actual privacy protection would
decrease during that period. A couple of comments also expressed concern
about how the preemption provisions would work, given the one-year
difference in applicable compliance dates for small health plans and
other covered entities. A state medical society pointed out that this
gap would also be very troublesome for providers who deal with both
"small health plans" and other health plans. One comment asked what
entities that decided to come into compliance early would have to do
with respect to conflicting state laws and suggested that, since all
parties "need to know with confidence which laws govern at the moment,
\... \[t\]here should be uniform effective dates."
*Response:* We agree that clarification is needed with respect to the
applicability of state laws in the interim between the effective date
and the compliance dates. What the comments summarized above appeared to
assume is that the preemption provisions of section 1178 operate to
broadly and generally invalidate any state law that comes within their
ambit. We do not agree that this is the effect of section 1178. Rather,
what section 1178 does - where it acts to preempt - is to preempt the
state law in question with respect to the actions of covered entities to
which the state law applies. Thus, if a provision of state law is
preempted by section 1178, covered entities within that state to which
the state law applies do not have to comply with it, and must instead
comply with the contrary federal standard, requirement, or
implementation specification. However, as compliance with the contrary
federal standard, requirement, or implementation specification is not
required until the applicable compliance date, we do not view the state
law in question as meeting the test of being "contrary." That is, since
compliance with the federal standard, requirement, or implementation
standard is not required prior to the applicable compliance date, it is
possible for covered entities to comply with the state law in question.
See § 160.202 (definition of "contrary"). Thus, since the state law is
not "contrary" to an applicable federal standard, requirement, or
implementation specification in the period before which compliance is
required, it is not preempted.
Several implications of this analysis should be spelled out. First, one
conclusion that flows from this analysis is that preemption is specific
to covered entities and does not represent a general invalidation of
state law, as suggested by many commenters. Second, because preemption
is covered entity-specific, preemption will occur at different times for
small health plans than it will occur for all other covered entities.
That is, the preemption of a given state law for a covered entity, such
as a provider, that is covered by the 24-month compliance date of
section 1175(b)(1)(A) will occur 12 months earlier than the preemption
of the same state law for a small health plan that is covered by the
36-month compliance date of section 1175(b)(1)(B). Third, the preemption
occurs only for covered entities; a state law that is preempted under
section 1178(a)(1) would not be preempted for persons and entities to
which it applies who are not covered entities. Thus, to the extent
covered entities or non-covered entities follow the federal standards on
a voluntary basis (i.e., the covered entity prior to the applicable
compliance date, the non-covered entity at any time), the state law in
question will not be preempted for them.
***Small Health Plans***
*Comment:* Several comments, pointing to the "Small Business" discussion
in the preamble to the proposed rules, applauded the decision to extend
the compliance date to three years for small businesses. It was
requested that the final rules clarify that the three year compliance
date applies to small doctors offices and other small entities, as well
as to small health plans.
*Response:* We recognize that our discussion in the preamble to the
proposed rules may have suggested that more covered entities came within
the 36 month compliance date than is in fact the case. Again, this is an
area in which we are limited by statute. Under section 1175(b) of the
Act, only small health plans have three years to come into compliance
with the standards below. Thus, other "small businesses" that are
covered entities must comply by the two-year compliance date.
***Coordination with the Security Standard***
*Comment:* Several comments suggested that the security standard be
issued either with or after the privacy standards. It was argued that
both sets of standards deal with protecting health information and will
require extensive personnel training and revisions to business
practices, so that coordinating them would make sense. An equipment
manufacturers group also pointed out that it would be logical for
covered entities and their business partners to know what privacy
policies are required in purchasing security systems, and that "the
policies on privacy are implemented through the security standards
rather than having already finalized security standards drive policy."
*Response:* We agree with these comments, and are making every effort to
coordinate the final security standards with the privacy standards
below. The privacy standards below are being published ahead of the
security standards, which is also responsive to the stated concerns.
***Prospective Application***
*Comment*: Several comments raised questions about the application of
the rule to individually identifiable information created prior to (1)
the effective date of the rule, and (2) the compliance dates of the
rule. One provider group suggested that the rule should apply only to
information gathered after the effective date of the final rule. A drug
manufacturer asked what would be the effect of the rule on research on
records compiled before the effective date of the rule.
*Response*: These comments are addressed in connection with the
discussion of § 164.532 above.
**IMPACT ANALYSES**
**Cost/Benefit Analysis**
*Comment:* Many commenters made general statements to the effect that
the cost estimates for implementing the provisions of the proposed
regulation were incomplete or greatly understated.
*Response:* The proposal, including the cost analysis, is, in effect, a
first draft. The purpose of the proposal was to solicit public comment
and to use those comments to refine the final regulation. As a result of
the public comment, the Department has significantly refined our initial
cost estimates for implementing this regulation. The cost analysis below
reflects a much more complete analysis of the major components of the
regulation than was presented in the proposal.
*Comment:* Numerous commenters noted that significant areas of potential
cost had not been estimated and that if they were estimated, they would
greatly increase the total cost of the regulation. Potential cost areas
identified by various respondents as omitted from the analyses include
the minimum disclosure requirements; the requisite monitoring by covered
entities of business partners with whom they share private health
information; creation of de-identified information; internal complaint
processes; sanctions and enforcement; the designation of a privacy
official and creation of a privacy board; new requirements for
research/optional disclosures; and future litigation costs.
*Response:* We noted in the proposed rule that we did not have data from
which to estimate the costs of many provisions, and solicited comments
providing such data. The final analysis below reflects the best estimate
possible for these areas, based on the information available. The data
and the underlying assumptions are explained in the cost analysis
section below.
*Comment:* A number of comments suggested that the final regulation be
delayed until more thorough analyses could be undertaken and completed.
One commenter stated that the Department should refrain from
implementing the regulation until a more realistic assessment of costs
could be made and include local governments in the process. Similarly, a
commenter requested that the Department assemble an outside panel of
health industry experts, including systems analysts, legal counsel, and
management consultants to develop stronger estimates.
*Response:* The Department has engaged in extensive research, data
collection and fact-finding to improve the quality of its economic
analysis. This has included comments from and discussions with the kinds
of experts one commenter suggested. The estimates represent a reasonable
assessment of the policies proposed.
*Comment:* Several commenters indicated that the proposed regulation
would impose significant new costs on providers' practices. Furthermore,
they believe that it runs counter to the explicit statutory intent of
HIPAA's Administrative Simplification provisions which require that "any
standard adopted . . . shall be consistent with the objective of
reducing the administrative costs of providing and paying for health
care."
*Response:* As the Department explained in the Transactions Rule, this
provision applies to the administrative simplification regulations of
HIPAA in the aggregate. The Transactions Rule is estimated to save the
health care system \$29.9 billion in nominal dollars over ten years.
Other regulations published pursuant to the administrative
simplification authority in HIPAA, including the privacy regulation,
will result in costs, but these costs are within the statutory directive
so long as they do not exceed the \$29.9 billion in estimated savings.
Furthermore, as explained in the Transactions Rule, and the preamble to
this rule, assuring privacy is essential to sustaining many of the
advances that computers will provide. If people do not have confidence
that their medical privacy will be protected, they will be much less
likely to allow their records to be used for any purpose or might even
avoid obtaining necessary medical care.
*Comment:* Several commenters criticized the omission of aggregate,
quantifiable benefit estimates in the proposed rule. Some respondents
argued that the analysis in the proposed rule used "de minimus" cost
estimates to argue only that benefits would certainly exceed such a low
barrier. These commenters further characterized the benefits analysis in
the Notice of Proposed Rulemaking as "hand waving" used to divert
attention from the fact that no real cost-benefit comparison is
presented. Another commenter stated that the benefit estimates rely
heavily on anecdotal and unsubstantiated inferences. This respondent
believes that the benefit estimates are based on postulated, but largely
unsubstantiated causal linkages between increased privacy and earlier
diagnosis and medical treatment.
*Response:* The benefits of privacy are diffused and intangible but
real. Medical privacy is not a good people buy or sell in a market;
therefore, it is very difficult to quantify. The benefits discussion in
the proposal reflects this difficulty. The examples presented in the
proposal were meant to be illustrative of the benefits based on a few
areas of medicine where some relevant data was available. Unfortunately,
no commenters provided either a better methodological approach or better
data for assessing the overall benefits of privacy. Therefore, we
believe the analysis in the proposal represents a valid illustration of
the benefits of privacy, and we do not believe it is feasible to provide
an overall dollar estimate of the benefits of privacy in the aggregate.
*Comment:* One commenter criticized the benefit analysis as being
incomplete because it did not consider the potential cost of new
treatments that might be engendered by increased confidence in medical
privacy resulting from the regulation.
*Response:* There is no data or model to reliably assess such long-term
behavioral and scientific changes, nor to determine what portion of the
increasingly rapid evolution of new improved treatments might stem from
improved privacy protections. Moreover, to be complete, such analysis
would have to include the savings that might be realized from earlier
detection and treatment. It is not possible at this time to project the
magnitude or even the direction of the net effects of the response to
privacy that the commenter suggests.
**Scope of the Regulation**
*Comment:* Numerous commenters noted the potential cost and burden of
keeping track in medical records of information which had been
transmitted electronically, which would be subject to the rule, as
opposed to information that had only been maintained in paper form.
*Response:* This argument was found to have considerable merit and was
one of the reasons that the Department concluded that the final
regulation should apply to all medical records maintained by covered
entities, including information that had never been transmitted
electronically. The costs analysis below reflects the change in scope.
**Notice Requirements**
*Comment:* Several commenters expressed their belief that the
administrative and cost burdens associated with the notice requirements
were understated in the proposed rule. While some respondents took issue
with the policy development cost estimates associated with the notice,
more were focused on its projected implementation and production costs.
For example, one respondent stated that determining "first service"
would be an onerous task for many small practices, and that provider
staff will now have to manually review each patient's chart or access a
computer system to determine whether the patient has been seen since
implementation of the rule.
*Response:* The policy in the final rule has been changed to make the
privacy policy notice to patients less burdensome. Providers will be
able to distribute the notice when a patient is seen and will not have
to distribute it to a patient more than once, unless substantive changes
are made in the notice. This change will significantly reduce the cost
of distributing the privacy notices.
*Comment:* Some commenters also took issue with the methodology used to
calculate the cost estimates for notices. These respondents believe that
the survey data used in the proposed rule to estimate the costs (i.e.,
"encounters," "patients," and "episodes" per year) are very different
concepts that, when used together, render the purported total
meaningless. Commenters further stated that they can verify the estimate
of 543 million patients cited as being seen at least once every five
years.
*Response:* In the course of receiving treatment, a patient may go to a
number of medical organizations. For example, a person might see a
doctor in a physician's office, be admitted to a hospital, and later go
to a pharmacy for medication. Each time a person "encounters" a
facility, a medical record may be started or additions made to an
existing record. The concept in the proposal was to identify the number
of record sets that a person might have for purposes of estimating
notice and copying costs. For example, whether a person made one or ten
visits in the course of a year to a specific doctor would, for our
purposes, be one record set because in each visit the doctor would most
likely be adding information to an existing medical record. The comments
demonstrated that we had not explained the concept well. As explained
below we modified the concept to more effectively measure the number of
record sets that exist and explain it more clearly.
*Comment:* Several commenters criticized the lack of supporting evidence
for the cost estimates of notice development and dissemination. Another
opinion voiced in the comments is that the estimated cost for plans of
\$0.75 per insured person is so low that it may cover postage, but it
cannot include labor and capital usage costs.
*Response:* Based on comments and additional fact finding, the
Department was able to gain a better understanding of how covered
entities would develop policies and disseminate information. The cost
analysis below explains more fully how we derived the final cost
estimates for these areas.
*Comment:* A commenter noted that privacy policy costs assume that
national associations will develop privacy policies for members but HHS
analysis does not account for the cost to the national associations. A
provider cost range of \$300-\$3,000 is without justification and seems
low.
*Response:* The cost to the national associations was included in the
proposal estimates, and it is included in the final analysis (see
below).
*Comment:* A commenter states that the notice costs discussion mixes the
terms "patients", "encounters" and "episodes" and 397 million encounter
estimate is unclear.
*Response:* A clearer explanation of the concepts employed in this
analysis is provided below.
**Systems Compliance Costs**
*Comment*: Numerous commenters questioned the methodology used to
estimate the systems compliance cost and stated that the ensuing cost
estimates were grossly understated. Some stated that the regulation will
impose significant information technology costs to comply with
requirement to account for disclosures, additional costs for hiring new
personnel to develop privacy policies, and higher costs for training
personnel.
*Response:* Significant comments were received regarding the cost of
systems compliance. In response, the Department retained the assistance
of consultants with extensive expertise in health care information
technology. We have relied on their work to revise our estimates, as
described below. The analysis does not include "systems compliance" as a
cost item, per se. Rather, in the final analysis we organized estimates
around the major policy provisions so the public could more clearly see
the costs associated with them. To the extent that the policy might
require systems changes (and a number of them do), we have incorporated
those costs in the provision's estimate.
*Comment:* Items explicitly identified by commenters as significantly
adding to systems compliance costs include tracking disclosures of
protected health information and patient authorizations; restricting
access to the data; accommodating minimum disclosure provisions;
installing notices and disclaimers; creating de-identified data;
tracking uses of protected health information by business partners;
tracking amendments and corrections; increased systems capacity; and
annual systems maintenance. The commenters noted that some of the
aforementioned items are acknowledged in the proposed rule as future
costs to covered entities, but several others are singularly ignored.
*Response:* The Department recognizes the validity of much of this
criticism. Unfortunately, other than general criticism, commenters
provided no specific data or methodological information which might be
used to improve the estimates. Therefore, the Department retained
consultants with extensive expertise in these areas to assess the
proposed regulation, which helped the Department refine its policies and
cost estimates.
In addition, it is important to note that the other HIPAA administrative
simplification regulations will require systems changes. As explained
generally in the cost analysis for the electronic Transactions rule, it
is assumed that providers and vendors will undertake systems changes for
these regulations collectively, thereby minimizing the cost of changes.
**Inspection and Copying**
*Comment:* Numerous commenters disagreed with the cost estimates in the
NPRM for inspection and copying of patient records, believing that they
were too low.
*Response:* The Department has investigated the potential costs through
a careful reading of the comments and subsequent factfinding discussions
with a variety of providers. We believe the estimates, explained more
fully below, represent a reasonable estimate in the aggregate. It is
important to note, however, that this analysis is not measuring the cost
of all inspection and copying because a considerable amount of this
already occurs. The Department is only measuring the incremental
increase likely to occur as a result of this regulation.
*Comment:* One commenter speculates that, even at a minimum charge of
\$.50/page, (and not including search and retrieval charges), costs
could run as high as \$450 million annually.
*Response:* The \$0.50 per page in the proposal represent an average of
several data sources. Subsequently, an industry commenter, which
provided extensive medical records copying, stated that this was a
reasonable average cost. Hence, we retained the number for the final
estimate.
*Comment:* One respondent states that, since the proposed rules give
patients the right to inspect and copy their medical records regardless
of storage medium, HHS must make a distinction in its cost estimates
between records stored electronically and those which must be accessed
by manual means, since these costs will differ.
*Response:* The cost estimates made for regulations are not intended to
provide such refined gradations; rather, they are intended to show the
overall costs for the regulation as a whole and its major components.
For inspections and copying (and virtually all other areas for which
estimates are made) estimates are based on averages; particular
providers may experience greater or lesser costs than the average cost
used in this analysis.
*Comment:* Several commenters noted that the Department did not appear
to include the cost of establishing storage systems, retrieval fees and
the cost of searching for records, and that these costs, if included,
would significantly increase the Department's estimate.
*Response:* Currently, providers keep and maintain medical records and
often provide copies to other providers and patients. Therefore, much of
the cost of maintaining records already exists. Indeed, based on public
comments, the Department has concluded that there will be relatively few
additional copies requested as the result of this regulation (see
below). We have measured and attributed to this regulation the
incremental cost, which is the standard for conducting this kind of
analysis.
*Comment:* A federal agency expressed concern over the proposal to allow
covered entities to charge a fee for copying personal health information
based on reasonable costs. The agency requests personal health
information from many covered entities and pays a fee that it
establishes. Allowing covered entities to establish the fee, the agency
fears, may cost them significantly more than the current amounts they
pay and as a result, could adversely affect their program.
*Response:* The proposal and the final rule establish the right to
access and copy records only for individuals, not other entities; the
"reasonable fee" is only applicable to the individual's request. The
Department's expectation is that other existing practices regarding
fees, if any, for the exchange of records not requested by an individual
will not be affected by this rule.
**Appending Records (Amendment and Correction)**
*Comment:* The proposed rule estimated the cost of amending and
correcting patients' records at \$75 per instance and \$260 million per
year for small entities. At least one commenter stated that such
requests will rise significantly upon implementation of the regulations
and increase in direct proportion to the number of patients served.
Another commenter described the more subtle costs associated with record
amendment and correction, which would include a case-by-case clinical
determination by providers on whether to grant such requests, forwarding
the ensuing record changes to business partners, and issuing written
statements to patients on the reasons for denials, including a recourse
for complaints.
*Response:* The comments were considered in revising the proposal, and
the decision was made to clarify in the final regulation that providers
must only append the record (the policy is explained further in the
preamble and the regulation text). The provider is now only required to
note in the medical record any comments from the patient; they may, but
are not required to, correct any errors. This change in policy
significantly reduces the cost from the initial proposal estimate.
*Comment:* Several commenters criticized the proposed rule's lack of
justification for assumptions regarding the percentage of patients who
request inspection and copying, who also request amendment and
correction. Another commenter pointed out that the cost estimate for
amendment and correction is dependent on a base assumption that only 1.5
percent of patients will request inspection of their records. As such,
if this estimate were too low by just one percentage point, then the
estimates for inspection and copying plus the costs for amendment and
correction could rise by 67 percent.
*Response:* Based on information and data received in the public
comments, the estimate for the number of people requesting inspection
and copying has been revised. No commenter provided specific information
on the number of amended record requests that might result, but the
Department subsequently engaged in fact-finding and made appropriate
adjustments in its estimates. The revisions are explained further below.
**Consent and Authorizations**
*Comment:* One respondent indicated that the development, collection,
and data entry of all the authorizations will create a new transaction
type for employers, health plans, and providers, and result in
duplicated efforts among them. This commenter estimates that the costs
of mailing, re-mailing, answering inquiries, making outbound calls and
performing data entry in newly created authorization computer systems
could result in expenses of close to \$2.0 billion nationally. Another
commenter indicated that authorization costs will be at least double the
notice dissemination costs due to the cost of both outbound and return
postage.
*Response:* Public commenters and subsequent factfinding clearly
indicate that most providers with patient contact already obtain
authorizations for release of records, so for them there is virtually no
new cost. Further, this comment does not reflect the actual regulatory
requirement. For example, there is no need to engage in mailing and
re-mailing of forms, and we do not foresee any reason why there should
be any significant calls involved.
*Comment:* A commenter criticized the percentage (1%) that we used to
calculate the number of health care encounters expected to result in
requests to withhold the release of protected information. This
respondent postulates that even if one in six patients who encounter the
U.S. health care system opt to restrict access to their records, the
total expected national cost per year could rise to \$900 million.
*Response:* The final regulation requirements regarding the release of
protected health information has been substantially changed, thereby
greatly reducing the potential cost burden. A fuller explanation of the
cost is provided below in the regulatory impact analysis.
*Comment:* An additional issue raised by commenters was the added cost
of seeking authorizations for health promotion and disease management
activities, health care operations that traditionally did not require
such action.
*Response:* In the final regulation, a covered entity can use medical
information collected for treatment or operations for its own health
promotion and disease management efforts without obtaining additional
authorization. Therefore, there is no additional cost incurred.
**Business Associates**
*Comment:* A number of commenters were concerned about the cost of
monitoring business partners. Specifically, one commenter stated that
the provisions of the proposed regulation pertaining to business
partners would likely force the discontinuation of outsourcing for some
functions, thereby driving up the administrative cost of health care.
*Response:* The final regulation clarifies the obligations of the
business associates in assuring privacy. As explained in the preamble,
business associates must take reasonable steps to assure confidentiality
of health records they may have, and the covered entity must take
appropriate action if they become aware of a violation of the agreement
they have with the business associate. This does not represent an
unreasonable burden; indeed, the provider is required to take the same
kind of precautions and provide the same kind of oversight that they
would in many other kinds of contractual relationships to assure they
obtain the quality and level of performance that they would expect from
a business associate.
*Comment:* HHS failed to consider enforcement costs associated with
monitoring partners and litigation costs arising from covered entities
seeking restitution from business partners whose behavior puts the
covered entity at risk for noncompliance.
*Response:* The Department acknowledged in the proposal that it was not
estimating the cost of compliance with the business associates provision
because of inadequate information. It requested information on this
issue, but no specific information was provided in the comments.
However, based on revisions in the final policy and subsequent
factfinding, the Department has provided an estimate for this
requirement, as explained below.
**Training**
*Comment:* Many of the commenters believe that the Department used
unrealistic assumptions in the development of the estimated cost of the
training provisions and they provided their own estimates.
*Response:* The commenters' estimates varied widely, and could not be
used by the Department in revising its analysis because there was
inadequate explanation of how the estimates were made.
*Comment:* Several commenters argued that if even an hour of time of
each of the entity's employees is spent on training instead of "work"
and they are paid the minimum wage, an entity would incur \$100 of cost
for training no more than 20 employees. The commenters noted that the
provision of health care services is a labor-intensive enterprise, and
many covered entities have thousands of employees, most of whom make
well in excess of minimum wage. They questioned whether the estimates
include time taken from the employee's actual duties (opportunity cost)
and the cost of a trainer and materials.
*Response:* As explained in more detail below, the Department made
extensive revisions in its training estimate, including the number of
workers in the health care sector, the cost of workers in training based
on average industry wages, and training costs (instructors and
materials). The revised estimate is a more complete and accurate
estimate of the costs likely to be borne as a result of the final
regulation.
*Comment:* One commenter estimated that simply training an employee
could have a burdensome impact on his company. He argued, for example, a
10-hour annual requirement takes 0.5% of an employee's time if they work
a 2000-hour year, but factoring in sick and vacation leave, the effects
of industry turnover could significantly increase the effect.
*Response:* In the analysis below, the Department has factored in
turnover rates, employment growth and greater utilization based on data
obtained from broad-based surveys and a public comment.
*Comment:* Some commenters felt that the regulatory training provisions
are overly burdensome. Specific concerns centered around the requirement
to train all individuals who may come in contact with protected health
information and the requirement to have such individuals sign a new
certifying statement at least every three years. Some commenters felt
that the content of the training program should be left to the
discretion of the covered entity.
*Response:* Changes and clarifications in the training requirements are
made in the final regulation, explained below. For example, the
certification requirement has been eliminated. As in the NPRM, the
content of the training program is left to the discretion of the covered
entity. These changes are expected to lessen the training burden and are
reflected in the final cost estimates.
**Compliance and Enforcement**
*Comment:* A Member of Congress and a number of privacy and consumer
groups expressed their concern with whether the Office for Civil Rights
(OCR) in HHS has adequate funding to carry out the major responsibility
of enforcing the complaint process established by this rule. The Member
stated that \"\[d\]ue to the limited enforcement ability allowed for in
this rule by HIPAA, it is essential that OCR have the capacity to
enforce the regulations. Now is the time for The Secretary to begin
building the necessary infrastructure to enforce the regulation
effectively.\"
*Response:* The Secretary agrees with the commenters and is committed to
an effective enforcement program. We will work with Congress to ensure
that the Department has the necessary funds to secure voluntary
compliance through education and technical assistance, to investigate
complaints and conduct compliance reviews, to provide states with
exception determinations and to use civil and criminal penalties when
necessary.
**Economic Effect on Small Entities**
*Comment:* Many commenters stated that the cost estimates on the effect
of the proposed regulation on small businesses were understated or
incomplete.
*Response:* The Department conducted a thorough review of potential data
sources that would improve the quality of the analysis of the effects on
small business. The final regulatory flexibility analysis below is based
on the best data available (much of it from the Small Business
Administration) and represents a reliable estimate for the effects on
small entities in various segments of the health care industry. It is
important to note that the estimates are for small business segments in
the aggregate; the cost to individual firms will vary, perhaps
considerably, based on its particular circumstances.
*Comment:* The cost of implementing privacy regulations, when added to
the cost of other required HIPAA regulations, could increase overhead
significantly. As shown in the 1993 Workgroup on Electronic Data
Interchange (WEDI) Report, providers will bear the larger share of
implementation costs and will save less than payors.
*Response:* The regulatory flexibility analysis below shows generally
the marginal effect of the privacy regulation on small entities.
Collectively, the HIPAA administrative standards will save money in the
health care system. As important, given the rapid expansion of
electronic commerce, it is probable that small entities would need to
comply with standards for electronic commerce in order to complete
effectively, even if the standards were voluntary. The establishment of
uniform standards through regulation help small entities because they
will not have to invest in multiple systems, which is what they would
confront if they system remained voluntary.
*Comment:* One respondent believed that the initial and ongoing costs
for small provider offices could be as much as 11 times higher than the
estimates provided in the proposed rule. Other commenters stated that
the estimates for small entities are "absurdly low".
*Response:* Although there were a number of commenters highly critical
of the small business analysis, none provided alternative estimates or
even provided a rationale for their statements. Many appeared to assume
that *all* costs associated with medical record confidentiality should
be estimated. This represents a misunderstanding of the purpose of the
analysis: to estimate the incremental effects of this regulation, i.e.,
the new costs (and savings) that will result from changes required by
the regulation. The Department has made substantial changes in the final
small entities analysis (below), reflecting policy changes in the final
rule and additional information and data collected by the Department
since the issuance of the proposal last fall. We believe that these
estimates reasonably reflect the costs that various types of small
entities will experience in general, though the actual costs of
particular providers might vary considerably based on their current
practices and technology.
*Comment*: A respondent expressed the belief that small providers would
bear a disproportionate share of the regulation's administrative burden
because of the likelihood of larger companies incurring fewer marginal
costs due to greater in-house resources to aid in the legal and
technical analysis of the proposed rule.
*Response:* As explained below, the Department does not agree with the
assertion that small entities will be disproportionately affected. Based
on discussions with a number of groups, the Department expects many
professional and trade associations to provide their members with
analysis of the regulation, including model policies, statements and
basic training materials. This will minimize the cost for most small
entities. Providers that use protected health information for voluntary
practices, such as marketing or research, are more likely to need
specific legal and technical assistance, but these are likely to be
larger providers.
*Comment:* Several commenters took issue with the "top-down" approach
that we used to estimate costs for small businesses, believing that this
methodology provided only a single point estimate, gave no indication of
the variation around the estimate, and was subject to numerous
methodological errors since the entities to which the numerator
pertained may not have been the same as the denominator. These
respondents further recommended that we prepare a "bottom-up" analysis
using case studies and/or a survey of providers to refine the estimates.
*Response:* The purpose of the regulatory flexibility analysis is to
provide a better insight into the relative burden of small businesses
compared to larger firms in complying with a regulation. There may be
considerable variance around average costs within particular industry
sectors, even among small businesses within them. The estimates are
based on the best data available, including information from the Small
Business Administration, the Census Bureau, and public comments.
*Comment:* A commenter stated that the proposal's cost estimate does not
account for additional administrative costs imposed on physicians, such
as requirements to rewrite contracts with business partners.
*Response:* Such costs are included in the analysis below.
*Comment:* Numerous public comments were directed specifically at the
systems compliance cost estimates for small businesses. One respondent
maintained that the initial upgrade cost alone would range from \$50
thousand to more than \$1 million per covered entity.
*Response:* The cost estimates for systems compliance varied enormously;
unfortunately, none of the commenters provided documentation of how they
made their estimates, preventing us from comparing their data and
assumptions to the Department's. Because of concern about the costs in
this area, however, the Department retained an outside consultant to
provide greater expertise and analysis. The product of this effort has
been incorporated in the analysis below.
*Comment:* One commenter stated that just the development and
documentation of new health information policies and procedures (which
would require an analysis of the federal regulations and state law
privacy provisions), would cost far more than the \$396 cited in the
Notice of Proposed Rulemaking as the average start-up cost for small
businesses.
*Response:* As explained below in the cost analysis, the Department
anticipates that most of the policies and procedures that will be
required under the final rule will be largely standardized, particularly
for small businesses. Thus, much of the work and cost can be done by
trade associations and professional groups, thereby minimizing the costs
and allowing it to be spread over a large membership base.
*Comment:* A number of comments criticized the initial estimates for
notices, inspection and copying, amendments and correction, and training
as they relate to small businesses.
*Response:* The Department has made substantial revisions in its
estimates for all of these areas which is explained below in the
regulatory flexibility analysis.
*Comment:* One commenter noted that there appeared to be a discrepancy
in the number of small entities cited. There is no explanation for the
difference and no explanation for difference between "establishments"
and "entities."
*Response:* There are discrepancies among the data bases on the number
of "establishments" and "entities" or "firms". The problem arises
because most surveys count (or survey) establishments, which are
physical sites. A single firm or entity may have many establishments.
Moreover, although an establishment may have only a few employees, the
firm may have a large number of workers (the total of all its various
establishments) and therefore not be a small entity.
As discussed below, there is some discrepancy between the aggregate
numbers we use for the regulatory impact analysis (RIA) and the
regulatory flexibility analysis (RFA). We concluded that for purposes of
the RFA, which is intended to measure the effects on small entities, we
would use Small Business Administration data, which defines entities
based on revenues rather than physical establishments to count the
number of small entities in various SIC. This provides a more accurate
estimate of small entities affected. For the RIA, which is measuring
total effects, we believe the establishment based surveys provide a more
reliable count.
*Comment:* Because small businesses must notify patients of their
privacy policies on patients' first visit after the effective date of
the regulation, several commenters argued that staff would have to
search records either manually or by computer on a daily basis to
determine if patients had been seen since the regulation was
implemented.
*Response:* Under the final regulation, all covered entities will have
to provide patients copies of their privacy policy at the first visit
after the effective date of the regulation. The Department does not view
this as burdensome. We expect that providers will simply place a note or
marker at the beginning of a file (electronic or paper) when a patient
is given the notice. This is neither time-consuming nor expensive, and
it will not require constant searches of records.
*Comment:* A commenter stated that the definitions of small business,
small entity, and a small health plan are inconsistent because the NPRM
includes firms with annual receipts of \$5 million or less and
non-profits.
*Response:* The Small Business Administration, whose definitions we use
for this analysis, includes firms with \$5 million or less in receipts
and all non-profits as "small businesses." We recognize that some health
plans, though very large in terms of receipts (and insured lives),
nonetheless would be considered "small businesses" under this definition
because they are non-profits. In the final regulatory flexibility
analysis, we generally have maintained the Small Business Administration
definitions because it is the accepted standard for these analyses.
However, we have added several categories, such as IRBs and employer
sponsored group health plans, which are not small entities, per se, but
will be effected by the final rule and we were able to identify costs
imposed by the regulation on them.
*Comment:* The same commenter wanted clarification that all non-profit
organizations are small entities and that the extended effective date
for compliance applies to them.
*Response:* For purposes of the regulatory flexibility analysis, the
Department is utilizing the Small Business Administration guidelines.
However, under HIPAA the Secretary may extend the effective compliance
date from 24 months to 36 months for "small health plans". The Secretary
is given the explicit discretion of defining the term for purposes of
compliance with the regulation. For compliance purposes, the Secretary
has decided to define "small health plans" as those with receipts of \$5
million or less, regardless of their tax status. As noted above, some
non-profit plans are large in terms of revenues (i.e., their revenues
exceed \$5 million annually). The Department determined that such plans
do not need extra time for compliance.
*Comment:* Several commenters requested that "small providers"
\[undefined\] be permitted to take 36 months to come into compliance
with the final regulation, just as small health plans will be permitted
to do so.
*Response:* Congress specified small health plans, but not small
providers, as needing extra time to comply. The majority of providers
affected by the regulation are "small", based on the SBA definitions; in
other words, granting the delay would be tantamount to make the
effective date three years rather than two. In making policy decisions
for the final regulation, extensive consideration was given to
minimizing the cost and administrative burden associated with
implementing the rule. The Department believes that the requirements of
the final rule will not be difficult to fulfill, and therefore, it has
maintained the two year effective date.
**External Studies**
*Comment:* One commenter submitted a detailed analysis of privacy
legislation that was pending and concluded that they might cost over
\$40 billion.
*Response*: The study did not analyze the policies in the proposal, and
therefore, the estimates do not reflect the costs that would have been
imposed by the proposed regulation. In fact, the analysis was prepared
before the Administration's proposed privacy regulation was even
published. As a result, the analysis is of limited relevance to the
regulation actually proposed.
The following are examples of assumptions and costs in the analysis that
do not match privacy policies or requirements stated in the proposed
rule.
1\. Authorizations: The study assumed rules requiring new authorizations
from current subscribers to use their data for treatment, payment of
claims, or other health plan operations. The proposed rule would have
prohibited providers or plans from obtaining patient authorization to
use data for treatment, payment or health care operations, and the final
rule makes obtaining consent for these purposes voluntary for all health
plans and for providers that do not have direct treatment relationships
with individuals.
2\. Disclosure History: The study assumes that providers, health plans,
and clearinghouses would have to track all disclosures of health
information. Under the NPRM and the final rule, plans, providers and
clearinghouses are only required to account for disclosures that are not
for treatment, payment, and health care operations, a small minority of
all disclosures.
3\. Inspection, Copying, and Amendment: The study assumed requirements
to allow patients and their subscribers to inspect, copy, and amend all
information that includes their name, social security number or other
identifying feature (e.g. customer service calls, internal memorandum,
claim runs). However, the study assumed broader access than provided in
the rule, which requires access only to information in records used to
make decisions about individuals, not all records with identifiable
information.
4\. Infrastructure development: The study attributed significant costs
to infrastructure implementation of (computer systems, training, and
other compliance costs). As explained below, the compliance requirements
are much less extensive than assumed in this study. For example, many
providers and plans will not be required to modify their privacy systems
but will only be required to document their practices and notify
patients of these practices, and others will be able to purchase
low-cost, off-the-shelf software that will facilitate the new
requirements. The final regulation will not require massive capital
expenditures; we assumed, based on our consultants' work, that providers
will rely on low-cost incremental adjustments initially, and as their
technology becomes outdated, they will replace it with new systems that
incorporate the HIPAA standard requirements.
Although many of the policy assumptions in the study are fundamentally
different than those in the proposed or final regulation, the study did
provide some assistance to the Department in preparing its final
analysis. The Department compared data, methodologies and model
assumptions, which helped us think more critically about our own
analysis and enhanced the quality of our final work.
*Comment:* One commenter submitted a detailed analysis of the NPRM
Regulatory Impact Analysis and concluded that it might cost over \$64
billion over 5 years. This analysis provided an interesting framework
for analyzing the provision for the rule. More precisely, the analysis
generally attempted to identify the number of entities would be required
to comply with each of the significant provision of the proposed rule,
then estimated the numbers of hours required to comply per entity, and
finally, estimated an hourly wage.
*Response:* HHS adopted this general structure for the final RIA because
it provided a better framework for analysis than what the Department had
done in the NPRM. However, HHS did not agree with many of the specific
assumptions used by in this analysis, for several reasons. First, in
some instances the assumptions were no longer relevant because the
requirements of the NPRM were altered in the final rule. For other
assumptions, HHS found more appropriate data sources for the number of
covered entities, wages rates and trend rates or other factors affecting
costs. In addition, HHS believes that in a few instances, this analysis
over-estimated what is required of covered entities to comply. Based on
public comments and its own factfinding, the Department believes many of
its assumptions used in the final analysis more accurately reflect what
is likely to be the real cost of the regulation.
**IV. FINAL REGULATORY IMPACT ANALYSIS**
5U.S.C. 804(2) (as added by section 251 of Public Law 104-21), specifies
that a "major rule" is any rule that the Office of Management and Budget
finds is likely to result in:
· An annual effect on the economy of \$100 million or more;
· A major increase in costs or prices for consumers, individual
industries, federal, state, or local government agencies, or geographic
regions; or
· Significant adverse effects in competition, employment, investment
productivity, innovation, or on the ability of United States based
enterprises to compete with foreign-based enterprises in domestic and
export markets. The impact of this final rule will be over \$1 billion
in the first year of implementation. Therefore, this rule is a major
rule as defined in 5 U.S.C. 804(2).
Executive Order 12866 directs agencies to assess all costs and benefits
of available regulatory alternatives and, when regulation is necessary,
to select regulatory approaches that maximize net benefits (including
potential economic, environmental, public health and safety effects;
distributive impacts; and equity). According to Executive Order 12866, a
regulatory action is "significant" if it meets any one of a number of
specified conditions, including having an annual effect on the economy
of \$100 million or more adversely affecting in a material way a sector
of the economy, competition, or jobs, or if it raises novel legal or
policy issues. The purpose of the regulatory impact analysis is to
assist decision-makers in understanding the potential ramifications of a
regulation as it is being developed. The analysis is also intended to
assist the public in understanding the general economic ramifications of
a regulation, both in the aggregate as well as the major policy areas of
a regulation and how they are likely to affect the major industries or
sectors of the economy covered by it.
In accordance with the Small Business Regulatory Enforcement and
Fairness Act (Pub. L. 104-121), the Administrator of the Office of
Information and Regulatory Affairs of the Office of Management and
Budget (OMB) has determined that this rule is a major rule for the
purpose of congressional review.
The proposal for the privacy regulation included a preliminary
regulatory impact analysis (RIA) which estimated the cost of the rule at
\$3.8 billion over five years. The preliminary analysis also noted that
a number of significant areas were not included in the estimate due to
inadequate information. The proposal solicited public comment on these
and all other aspects of the analysis. In this preamble, the Department
has summarized the public comments pertinent to the cost analysis and
its response to them. However, because of the extensive policy changes
incorporated in the final regulation, additional data collected from the
public comments and the Department's fact-finding, and changes in the
methodology underlying the estimates, the Department is setting forth in
this section a more complete explanation of its revised estimates and
how they were obtained. This will facilitate a better understanding by
the public of how the estimates were developed and provide more insight
into how the Department believes the regulation will ultimately affect
the health care sector.
The impact analysis measures the effect of the regulation on current
practices. In the case of privacy, as discussed in the preamble, there
already exists considerable, though quite varied, efforts to protect the
confidentiality of medical information. The RIA is measuring the change
in these current practices and the cost of new and additional
responsibilities that are required to conform to the new regulation.
To achieve a reasonable level of privacy protection, the Department
defined three objectives for the final rule: 1) to establish national
baseline standards, implementation specifications, and requirements for
health information privacy protection, 2) to protect the privacy of
individually identifiable health information maintained or transmitted
by covered entities, and 3) to protect the privacy of all individually
identifiable health information within covered entities, regardless of
its form.
Establishing minimum standards, implementation specifications, and
requirements for health information privacy protection creates a level
baseline of privacy protection for patients across states. The Health
Privacy Project's report, [The State of Health Privacy: An Uneven
Terrain]{.underline}[^33] makes it clear that under the current system
of state laws, privacy protection is extremely variable. The
Department's statutory authority under HIPAA which allows the privacy
regulation to preempt any state law if such law is contrary to and not
more stringent than privacy protection pursuant to this regulation. This
sets a floor, but permits a state to create laws that are more
protective of privacy. We discuss preemption in greater detail in other
parts of the preamble.
The second objective is to establish a uniform base of privacy
protection for individually identifiable health information maintained
or transmitted by covered entities. HIPAA restricts the type of entities
covered by the rule to three broad categories: health care providers
that transmit health information in HIPAA standard transactions, health
plans, and health care clearinghouses. However, there are similar public
and private entities that are not within the Department's authority to
regulate under HIPAA. For example, life insurance companies are not
covered by this rule but may have access to a large amount of
individually identifiable health information.
The third objective is to protect the privacy of all individually
identifiable health information held by covered entities, including
their business associates. Health information is currently stored and
transmitted in multiple forms, including electronic, paper, and oral
forms. To provide consistent protection to information, and to avoid
requiring covered entities from distinguishing between health
information that has been transmitted or maintained electronically and
that which has not, this rule covers all individually identifiable
health information in any form maintained or transmitted by a covered
entity.
For purposes of this cost analysis, the Department has assumed all
health care providers will be affected by the rule. This results in an
overestimation of costs because there are providers that do not engage
in any HIPAA standard transactions, and therefore, are not affected. The
Department could not obtain any reliable data on the number of such
providers, but the available data suggest that there are very few such
entities, and given the expected increase in all forms of electronic
health care in the coming decade, the number of paper-only providers is
likely to decrease.
**A. Relationship of this Analysis to Analyses in Other HIPAA
Regulations**
Congress has recognized that privacy standards, implementation
specifications and requirements must accompany the electronic data
interchange standards, implementation specifications and requirements
because the increased ease of transmitting and sharing individually
identifiable health information will result in an increase in concern
regarding privacy and confidentiality of such information. The bulk of
the first Administrative Simplification section that was debated on the
floor of the Senate in 1994 (as part of the Health Security Act) was
made up of privacy provisions. The requirement for the issuance of
concomitant privacy measures remained a part of the HIPAA bill passed by
the House of Representatives in 1996, but the requirement for privacy
measures was removed in conference. Instead, Congress added section 264
to Title II of HIPAA, which directs the Secretary to develop and submit
to Congress recommendations addressing at least the following:
\(1\) The rights that an individual who is a subject of individually
identifiable health information should have.
\(2\) The procedures that should be established for the exercise of such
rights.
\(3\) The uses and disclosures of such information that should be
authorized or required. The Secretary\'s Recommendations were submitted
to Congress on September 11, 1997, and are summarized below. Section
264(c)(1) of HIPAA provides that:
If legislation governing standards with respect to the privacy of
individually identifiable health information transmitted in connection
with the transactions described in section 1173(a) of the Social
Security Act (as added by section 262) is not enacted by \[August 21,
1999\], the Secretary of Health and Human Services shall promulgate
final regulations containing such standards not later than \[February
21, 2000\]. Such regulations shall address at least the subjects
described in subsection \[regarding recommendations\].
Because the Congress did not enact legislation governing standards with
respect to the privacy of individually identifiable health information
prior to August 21, 1999, the Department has, in accordance with this
statutory mandate, developed final rules setting forth standards to
protect the privacy of such information.
Title II of the Health Insurance Portability and Accountability Act
(HIPAA) also provides a statutory framework for the promulgation of
other administrative simplification regulations. On August 17, 2000, the
Transactions Rule was published. Proposals for health care provider
identifier (May 1998), employer identifier (June 1998), and security and
electronic signature standards (August 1998) have also been published.
These regulations are expected to be made final in the foreseeable
future.
HIPAA states that, "any standard adopted under this part shall be
consistent with the objective of reducing the administrative costs of
providing and paying for health care." (Section 1172 (b)). This
provision refers to the administrative simplification regulations in
their totality, including this rule regarding privacy standards. The
savings and costs generated by the various standards should result in a
net savings to the health care system. The Transactions Rule shows a net
savings of \$29.9 billion over ten years (2002-2011), or a net present
value savings of \$19 billion. This estimate does not include the growth
in "e-health" and "e-commerce" that may be spurred by the adoption of
uniform codes and standards.
This final Privacy Rule is estimated to produce net costs of \$18.0
billion, with net present value costs of \$11.8 billion (2003 dollars)
over ten years (2003-2012). This estimate is based on some costs already
having been incurred due to the requirements of the Transactions Rule,
which included an estimate of a net savings to the health care system of
\$29.9 billion over ten years (2002 dollars) and a net present value of
\$19.1 billion. The Department expects that the savings and costs
generated by all administrative simplification standards should result
in a net savings to the health care system.
**B. Summary of Costs and Benefits**
Measuring both the economic costs and benefits of health information
privacy is difficult. Traditionally, privacy has been addressed by state
laws, contracts, and professional practices and guidelines. Moreover,
these practices have been evolving as computers have dramatically
increased the potential use of medical data; the scope and form of
health information is likely to be very different ten years from now
than it is today. This final regulation is both altering current health
information privacy practice and shaping its evolution as electronic
uses expand.
To estimate costs, the Department used information from published
studies, trade groups and associations, public comments to the proposed
regulation, and fact-finding by staff. The analysis focused on the major
policy areas in the regulation that would result in significant costs.
Given the vast array of institutions affected by this regulation and the
considerable variation in practices, the Department sought to identify
the "typical" current practice for each of the major policy areas and
estimate the cost of change resulting from the regulation. Because of
the paucity of data and incomplete information on current practices, the
Department has consistently made conservative assumptions (that is,
given uncertainty, we have made assumptions that, if incorrect, are more
likely to overstate rather than understate the true cost).
Benefits are difficult to measure because people conceive of privacy
primarily as a right, not as a commodity. Furthermore, a wide gap
appears to exist between what people perceive to be the level of privacy
afforded health information about them and what actually occurs with the
use of such information today. Arguably, the "cost" of the privacy
regulation is the amount necessary to bring health information privacy
to these perceived levels.
The benefits of enhanced privacy protections for individually
identifiable health information are significant, even though they are
hard to quantify. The Department solicited comments on this issue, but
no commenters offered a better alternative. Therefore, the Department is
essentially reiterating the analysis it offered in the proposed Privacy
Rule. The illustrative examples set forth below, using existing data on
mental health, cancer screening, and HIV/AIDS patients, suggest the
level of economic and health benefits that might accrue to individuals
and society. Moreover, the benefits of improved privacy protection are
likely to increase in the future as patients gain trust in health care
practitioners' ability to maintain the confidentiality of their health
information.
The estimated cost of compliance with the final rule is \$17.6 billion
over the ten year period, 2003-2012.[^34] This includes the cost of all
the major requirements for the rule, including costs to federal, state
and local governments. The net present value of the final rule, applying
a 11.2 percent discount rate[^35], is \$11.8 billion.[^36]
The first year estimate is \$3.2 billion (this includes expenditures
that may be incurred before the effective date in 2003). This represents
about 0.23 percent of projected national health expenditures for
2003[^37]. By 2008, seven years after the rule's effective date, the
rule is estimated to cost 0.07 percent of projected national health
expenditures.
The largest cost items are the requirement to have a privacy official,
\$5.9 billion over ten years, and the requirement that disclosures of
protected health information only involve the minimum amount necessary,
\$5.8 billion over ten years (see Table 1). These costs reflect the
change that affected organizations will have to undertake to implement
and maintain compliance with the requirements of the rule and achieve
enhanced privacy of protected health information.
**Table 1. The Cost of Complying with the Proposed Privacy Regulation,
in Dollars**
+--------------------+----------------+--------------+-----------------+
| **Provision** | **Initial or | **Average | **Ten Year Cost |
| | First Year | Annual Cost | (2003-2012)** |
| | Cost** | (\$Million, | |
| | | Years | **(\$Million)** |
| | **(2003, | 2-10)** | |
| | \$Million)** | | |
+--------------------+----------------+--------------+-----------------+
| Policy Development | \$597.7 | \$0 | \$597.7 |
+--------------------+----------------+--------------+-----------------+
| Minimum Necessary | 926.2 | 536.7 | 5,756.7 |
+--------------------+----------------+--------------+-----------------+
| Privacy Officials | 723.2 | 575.8 | 5,905.8 |
+--------------------+----------------+--------------+-----------------+
| Disclosure | 261.5 | 95.9 | 1,125.1 |
| Tracking/ | | | |
| | | | |
| History | | | |
+--------------------+----------------+--------------+-----------------+
| Business | 299.7 | 55.6 | 800.3 |
| Associates | | | |
+--------------------+----------------+--------------+-----------------+
| Notice | 50.8 | 37.8 | 391.0 |
| Distribution | | | |
+--------------------+----------------+--------------+-----------------+
| Consent | 166.1 | 6.8 | 227.5 |
+--------------------+----------------+--------------+-----------------+
| Inspection/Copying | 1.3 | 1.7 | 16.8 |
+--------------------+----------------+--------------+-----------------+
| Amendment | 5.0 | 8.2 | 78.8 |
+--------------------+----------------+--------------+-----------------+
| Requirements on | 40.2 | 60.5 | 584.8 |
| Research | | | |
+--------------------+----------------+--------------+-----------------+
| Training | 287.1 | 50.0 | 737.2 |
+--------------------+----------------+--------------+-----------------+
| De-Identification | 124.2 | 117.0 | 1,177.4 |
| of Information | | | |
+--------------------+----------------+--------------+-----------------+
| Employers with | 52.4 | 0 | 52.4 |
| Insured Group | | | |
| Health Plans | | | |
+--------------------+----------------+--------------+-----------------+
| Internal | 6.6 | 10.7 | 103.2 |
| Complaints | | | |
+--------------------+----------------+--------------+-----------------+
| Total\* | 3,242.0 | 1,556.9 | 17,554.7 |
+--------------------+----------------+--------------+-----------------+
| Net Present Value | 3,242.0 | 917.8 | 11,801.8 |
+--------------------+----------------+--------------+-----------------+
^\*^Note: Numbers may not add due to rounding.
**C. Need for the Final Rule**
The need for a national health information privacy framework is
described in detail in Section I of the preamble above. In short,
privacy is a necessary foundation for delivery of high quality health
care \-- the entire health care system is built upon the willingness of
individuals to share the most intimate details of their lives with their
health care providers. At the same time, there is increasing public
concern about loss of privacy generally, and health privacy in
particular. The growing use of interconnected electronic media for
business and personal activities, our increasing ability to know an
individual's genetic make-up, and the increasing complexity of the
health care system each bring the potential for tremendous benefits to
individuals and society, but each also brings new potential for
invasions of our privacy.
Concerns about the lack of attention to information privacy in the
health care industry are not merely theoretical. Section I of the
preamble, above, lists numerous examples of the kinds of deliberate or
accidental privacy violations that call for a national legal framework
of health privacy protections. Disclosure of health information about an
individual can have significant implications well beyond the physical
health of that person, including the loss of a job, alienation of family
and friends, the loss of health insurance, and public humiliation. The
answer to these concerns is not for consumers to withdraw from the
health care system, but for society to establish a clear national legal
framework for privacy.
This section adds to the discussion in Section I, above, a discussion of
the market failures inherent in the current system which create
additional and compelling reasons to establish national health
information privacy standards. Market failures will arise to the extent
that privacy is less well protected than the parties would have agreed
to, if they were fully informed and had the ability to monitor and
enforce contracts. The chief market failures with respect to privacy of
health information concern information, negotiation, and enforcement
costs between the entity and the individual. The information costs arise
because of the information asymmetry between the company and the patient
\-- the company typically knows far more than the patient about how the
protected health information will be used by that company. A health care
provider or plan, for instance, knows many details about how protected
health information may be generated, combined with other databases, or
sold to third parties.
Absent this regulation, patients face at least two layers of cost in
learning about how their information is used. First, as with many
aspects of health care, patients face the challenge of trying to
understand technical medical terminology and practices. A patient
generally will have difficulty understanding medical records and the
implications of transferring health information about them to a third
party. Second, in the absence of consistent national rules, patients may
face significant costs in trying to learn and understand the nature of a
company\'s privacy policies.
The costs of learning about companies\' policies are magnified by the
difficulty patients face in detecting whether companies, in fact, are
complying with those policies. Patients might try to adopt strategies
for monitoring whether companies have complied with their announced
policies. These sorts of strategies, however, are both costly (in time
and effort) and likely to be ineffective. In addition, modern health
care often requires protected health information to flow legitimately
among multiple entities for purposes of treatment, payment, health care
operations, and other necessary uses. Even if the patient could identify
the provider whose data ultimately leaked, the patient could not easily
tell which of those multiple entities had impermissibly transferred her
information. Therefore, the cost and ineffectiveness of monitoring leads
to less than optimal protection of individually identifiable health
information.
The incentives facing a company that acquires individually identifiable
health information also discourage privacy protection. A company gains
the full benefit of using such information, including its own marketing
efforts or its ability to sell the information to third parties. The
company, however, does not suffer the losses from disclosure of
protected health information; the patient does. Because of imperfect
monitoring, customers often will not learn of, and thus not be able to
take efficient action to prevent uses or disclosures of sensitive
information. Because the company internalizes the gains from using the
information, but does not bear a significant share, if any, of the cost
to patients (in terms of lost privacy), it will have a systematic
incentive to over-use individually identifiable health information. In
market failure terms, companies will have an incentive to use
individually identifiable health information where the patient would not
have freely agreed to such use.
These difficulties are exacerbated by the third-party nature of many
health insurance and payment systems. Even where individuals would wish
to bargain for privacy, they may lack the legal standing to do so. For
instance, employers often negotiate the terms of health plans with
insurers. The employee may have no voice in the privacy or other terms
of the plan, facing a take-it-or-leave-it choice of whether to be
covered by insurance. The current system leads to significant market
failures in bargaining privacy protection. Many privacy-protective
agreements that patients would wish to make, absent barriers to
bargaining, will not be reached.
The economic arguments become more compelling as the medical system
shifts from predominantly paper to predominantly electronic records.
Rapid changes in information technology should result in increased
market failures in the markets for individually identifiable health
information. Improvements in computers and networking mean that the
costs of gathering, analyzing, and disseminating electronic data are
plunging. Market forces are leading many health care providers and
health plans to shift from paper to electronic records, due both to
lower cost and the increased functionality provided by having
information in electronic form. These market changes will be accelerated
by the administrative simplification implemented by the other
regulations promulgated under HIPAA. A chief goal of administrative
simplification, in fact, is to create a more efficient flow of medical
information, where appropriate. This privacy regulation is an integral
part of the overall effort of administrative simplification; it creates
a framework for more efficient flows for certain purposes, including
treatment and payment, while restricting flows in other circumstances
except where appropriate institutional safeguards exist.
If the medical system shifts predominantly to electronic records in the
near future, accompanying privacy rules will become more critical to
prevent unanticipated, inappropriate, or unnecessary uses or disclosures
of individually identifiable health information without patient consent
and without effective institutional controls against further
dissemination. In terms of the market failure, it will become more
difficult for patients to know how their health provider or health plan
is using health information about them. It will become more difficult to
monitor the subsequent flows of individually identifiable health
information, as the number of electronic flows and possible points of
leakage both increase. Similarly, the costs and difficulties of
bargaining to get the patients\' desired level of use will likely rise
due to the greater number and types of entities that receive protected
health information.
As the benefits section, below, discusses in more detail, the protection
of privacy and correcting the market failure also have practical
implications. Where patients are concerned about lack of privacy
protections, they might fail to get medical treatment that they would
otherwise seek. This failure to get treatment may be especially likely
for certain conditions, including mental health, and HIV. Similarly,
patients who are concerned about lack of privacy protections may report
health information inaccurately to their providers when they do seek
treatment. For instance, they might decide not to mention that they are
taking prescription drugs that indicate that they have an embarrassing
condition. These inaccurate reports may lead to mis-diagnosis and
less-than-optimal treatment, including inappropriate additional
medications. In short, the lack of privacy safeguards can lead to
efficiency losses in the form of foregone or inappropriate treatment.
In summarizing the economic arguments supporting the need for this
regulation, the discussion here has emphasized the market failures that
will be addressed by this regulation. These arguments become
considerably stronger with the shift from predominantly paper to
predominantly electronic records. As discussed in the benefits section
below, the proposed privacy protections may prevent or reduce the risk
of unfair treatment or discrimination against vulnerable categories of
persons, such as those who are HIV positive, and thereby, foster better
health. The proposed regulation may also help educate providers, health
plans, and the general public about how protected health information is
used. This education, in turn, may lead to better information practices
in the future.
**D. Baseline Privacy Protections**
An analysis of the costs and benefits of the regulation requires a
baseline from which to measure the regulation\'s effects. For some
regulations, the baseline is relatively straightforward. For instance,
an industry might widely use a particular technology, but a new
regulation may require a different technology, which would not otherwise
have been adopted by the industry. In this example, the old and widely
used technology provides the baseline for measuring the effects of the
regulation. The costs and the benefits are the difference between
keeping the old technology and implementing the new technology.
Where the underlying technology and industry practices are rapidly
changing, however, it can be far more difficult to determine the
baseline and thereby measure the costs and benefits of a regulation.
There is no simple way to know what technology industry would have
chosen to introduce if the regulation had never existed, nor how
industry practices would have evolved.
Today, the entities covered by the HIPAA privacy regulation are in the
midst of a shift from primarily paper records to electronic records. As
covered entities spend significant resources on hardware, software, and
other information technology costs, questions arise about which of these
costs are fairly attributable to the privacy regulations as opposed to
costs that would have been expended even in the absence of the
regulations. Industry practices generally are rapidly evolving, as
described in more detail in Part I of this preamble. New technological
or other measure taken to protect privacy are in part attributable to
the expected expense of shifting to electronic medical records, rather
than being solely attributable to the new regulations. In addition, the
existence of privacy rules in other sectors of the economy help set a
norm for what practices will be considered good practices for health
information. The level of privacy protection that would exist in the
health care sector, in the absence of regulations, thus would likely be
affected by regulatory and related developments in other sectors. In
short, it is therefore difficult to project a cost or benefits baseline
for this rule.
The common security practice of using \"firewalls\" illustrates how each
of the three baselines might apply. Under the first baseline, the full
cost of implementing firewalls should be included in a Regulatory Impact
Analysis for a rule that expects entities to have firewalls. Because
current law has not required firewalls, a new rule expecting this
security measure must include the full cost of creating firewalls. This
approach, however, would seem to overstate the cost of such a
regulation. Firewalls would seem to be an integral part of the decision
to move to an on-line, electronic system of records. Firewalls are also
being widely deployed by users and industries where no binding security
or privacy regulations have been proposed.
Under the second baseline, the touchstone is the level of risk of
security breaches for individually identifiable health information under
current practices. There is quite possibly a greater risk of breach for
an electronic system of records, especially where such records are
accessible globally through the Internet, than for patient records
dispersed among various doctors\' offices in paper form. Using the
second baseline, the costs of firewalls for electronic systems should
not be counted as a cost of the regulation except where firewalls create
greater security than existed under the previous, paper-based system.
Finally, the third baseline would require an estimate of the typical
level of firewall protections that covered entities would adopt in the
absence of regulation, and include in the Regulatory Impact Analysis
only the costs that exceed what would otherwise have been adopted. For
this analysis, the Department has generally assumed that the status quo
would otherwise exist throughout the ten-year period (in a few areas we
explicitly discuss likely changes). We made this decision for two
reasons. First, predicting the level of change that would otherwise
occur is highly problematic. Second, it is a "conservative"
assumption--that is, any error will likely be an overstatement of the
true costs of the regulation.
Privacy practices are most often shaped by professional organizations
that publish ethical codes of conduct and by state law. On occasion,
state laws defer to professional conduct codes. At present, where
professional organizations and states have developed only limited
guidelines for privacy practices, an entity may implement privacy
practices independently. However, it is worth noting that changes in
privacy protection continue to increase in various areas. For example,
European Union countries may only send individually identifiable
information to companies, including U.S. firms, that comply with their
privacy standards, and the growing use of health data in other areas of
commerce, such as finance and general commercial marketing, have also
increased the demand for privacy in ways that were not of concern in the
past.
***1. Professional codes of ethics***
The Department examined statements issued by five major professional
groups, one national electronic network association and a leading
managed care association.[^38] There are a number of common themes that
all the organizations appear to subscribe to:
· The need to maintain and protect an individual's health information;
· The development of policies to ensure the confidentiality of
individually identifiable health information;
· A restriction that only the minimum necessary information should be
released to accomplish the purpose for which the information is sought.
Beyond these principles, the major associations differ with respect to
the methods used to protect individually identifiable health
information. There is no common professional standard across the health
care field with respect to the protection of individually identifiable
health information. One critical area of difference is the extent to
which professional organizations should release individually
identifiable health information. A major mental health association
advocates the release of identifiable patient information ". . .only
when de-identified data are inadequate for the purpose at hand." A major
association of physicians counsels members who use electronically
maintained and transmitted data to require that they and their patients
know in advance who has access to protected patient data, and the
purposes for which the data will be used. In another document, the
association advises physicians not to "sell" patient information to data
collection companies without fully informing their patients of this
practice and receiving authorization in advance to release of the
information.
Only two of the five professional groups state that patients have the
right to review their medical records. One group declares this as a
fundamental patient right, while the second association qualifies its
position by stating that the physician has the final word on whether a
patient has access to his or her health information. This association
also recommends that its members respond to requests for access to
patient information within ten days, and recommends that entities allow
for an appeal process when patients are denied access. The association
further recommends that when a patient contests the accuracy of the
information in his or her record and the entity refuses to accept the
patient's change, the patient's statement should be included as a
permanent part of the patient's record.
In addition, three of the five professional groups endorse the
maintenance of audit trails that can track the history of disclosures of
individually identifiable health information.
The one set of standards that we reviewed from a health network
association advocated the protection of individually identifiable health
information from disclosure without patient authorization and emphasized
that encrypting information should be a principal means of protecting
individually identifiable health information. The statements of a
leading managed care association, while endorsing the general principles
of privacy protection, were vague on the release of information for
purposes other than treatment. The association suggested allowing the
use of protected health information without the patient's authorization
for what they term "health promotion." It is possible that the use of
protected health information for "health promotion" may be construed
under the rule as part of marketing activities.
Based on the review of the leading association standards, we believe
that the final rule embodies most or all of the major principles
expressed in the standards. However, there are some major areas of
difference between the rule and the professional standards reviewed. The
final rule generally provides stronger, more consistent, and more
comprehensive guarantees of privacy for individually identifiable health
information than the professional standards. The differences between the
rule and the professional codes include the individual's right of access
to health information in the covered entity's possession, relationships
between contractors and covered entities, and the requirement that
covered entities make their privacy policies and practices available to
patients through a notice and the ability to respond to questions
related to the notice. Because the regulation requires that (with a few
exceptions) patients have access to their protected health information
that a covered entity possesses, large numbers of health care providers
may have to modify their current practices in order to allow patient
access, and to establish a review process if they deny a patient access.
Also, none of the privacy protection standards reviewed require that
health care providers or health plans prepare a formal statement of
privacy practices for patients (although the major physician association
urges members to inform patients about who would have access to their
protected health information and how their health information would be
used). Only one HMO association explicitly made reference to information
released for legitimate research purposes. The regulation allows for the
release of protected health information for research purposes without an
individual's authorization, but only if the research where such
authorization is waived by an institutional research board or an
equivalent privacy board. This research requirement may cause some
groups to revise their disclosure authorization standards.
**2. *State Laws***
The second body of privacy protections is found in a complex, and often
confusing, myriad of state laws and requirements. To determine whether
or not the final rule would preempt a state law, first we identified the
relevant laws, and second, we addressed whether state or federal law
provides individuals with greater privacy protection.
*Identifying the relevant state statutes:* Health information privacy
provisions can be found in laws applicable to many issues including
insurance, worker's compensation, public health, birth and death
records, adoptions, education, and welfare. In many cases, state laws
were enacted to address a specific situation, such as the reporting of
HIV/AIDS, or medical conditions that would impair a person's ability to
drive a car. For example, Florida has over 60 laws that apply to
protected health information. According to the Georgetown Privacy
Project[^39], Florida is not unique. Every state has laws and
regulations covering some aspect of medical information privacy. For the
purpose of this analysis, we simply acknowledge the variation in state
requirements.
We recognize that covered entities will need to learn the laws of their
states in order to comply with such laws that are not contrary to the
rule, or that are contrary to and more stringent than the rule. This
analysis should be completed in the context of individual markets;
therefore, we expect that professional associations or individual
businesses will complete this task.
Recognizing the limits of our ability to effectively summarize state
privacy laws, we discuss conclusions generated by the Georgetown
University Privacy Project's report, [The State of Health Privacy: An
Uneven Terrain]{.underline}. The Georgetown report is among the most
comprehensive examination of state health privacy laws currently
published, although it is not exhaustive. The report, which was
completed in July 1999, is based on a 50-state survey.
To facilitate discussion, we have organized the analysis into two
sections: access to health information and disclosure of health
information. Our analysis is intended to suggest areas where the final
rule appears to preempt various state laws; it is not designed to be a
definitive or wholly comprehensive state-by-state comparison.
*Access to Subject's Information:* In general, state statutes provide
individuals with some access to medical records about them. However,
only a few states allow individuals access to health information held by
all their health care providers and health plans. In 33 states,
individuals may access their hospital and health facility records. Only
13 states guarantee individuals access to their HMO records, and 16
states provide individuals access to their medical information when it
is held by insurers. Seven states have no statutory right of patient
access; three states and the District of Columbia have laws that only
assure individuals' right to access their mental health records. Only
one state permits individuals access to records about them held by
health care providers, but it excludes pharmacists from the definition
of provider. Thirteen states grant individuals statutory right of access
to pharmacy records.
The amount that entities are allowed to charge for copying of
individuals' records varies widely from state to state. A study
conducted by the American Health Information Management Association[^40]
found considerable variation in the amounts, structure, and combination
of fees for search and retrieval, and the copying of the record.
In 35 states, there are laws or regulations that set a basis for
charging individuals inspecting and copying fees. Charges vary not only
by state, but also by the purpose of the request and the facility
holding the health information. Also, charges vary by the number of
pages and whether the request is for X-rays or for standard medical
information.
Of the 35 states with laws regulating inspection and copying charges,
seven states either do not allow charges for retrieval of records or
require that the entity provide the first copy free of charge. Some
states may prohibit hospitals from charging patients a retrieval and
copying fee, but allow clinics to do so. Many states allow fee
structures, while eleven states specify only that the record holder may
charge "reasonable/actual costs."
According to the report by the Georgetown Privacy Project, among states
that do grant access to patient records, the most common basis for
denying individuals access is concern for the life and safety of the
individual or others.
The amount of time an entity is given to supply the individual with his
or her record varies widely. Many states allow individuals to amend or
correct inaccurate health information, especially information held by
insurers. However, few states provide the right to insert a statement in
the record challenging the covered entity's information when the
individual and entity disagree.[^41]
*Disclosure of Health Information:* State laws vary widely with respect
to disclosure of individually identifiable health information.
Generally, states have applied restrictions on the disclosure of health
information either to specific entities or for specific health
conditions. Only three state laws place broad limits on disclosure of
individually identifiable health information without regard for policies
and procedures developed by covered entities. Most states require
patient authorization before an entity may disclose health information
to certain recipients, but the patient often does not have an
opportunity to object to any disclosures.[^42]
It is also important to point out that none of the states appear to
offer individuals the right to restrict disclosure of their health
information for treatment.
State statutes often have exceptions to requiring authorization before
disclosure. The most common exceptions are for purposes of treatment,
payment, or auditing and quality assurance functions. Restrictions on
re-disclosure of individually identifiable health information also vary
widely from state to state. Some states restrict the re-disclosure of
health information, and others do not. The Georgetown report cites state
laws that require providers to adhere to professional codes of conduct
and ethics with respect to disclosure and re-disclosure of protected
health information.
Most states have adopted specific measures to provide additional
protections for health information regarding certain sensitive
conditions or illnesses. The conditions and illnesses most commonly
afforded added privacy protection are:
· Information derived from genetic testing;
· Communicable and sexually-transmitted diseases;
· Mental health; and
· Abuse, neglect, domestic violence, and sexual assault.
Some states place restrictions on releasing condition-specific health
information for research purposes, while others allow release of
information for research without the patient's authorization. States
frequently require that researchers studying genetic diseases, HIV/AIDS,
and other sexually transmitted diseases have different authorization and
privacy controls than those used for other types of research. Some
states require approval from an IRB or agreements that the data will be
destroyed or identifiers removed at the earliest possible time. Another
approach has been for states to require researchers to obtain sensitive,
identifiable information from a state public health department. One
state does not allow automatic release of protected health information
for research purposes without notifying the subjects that their health
information may be used in research and allowing them an opportunity to
object to the use of their information.[^43]
*Comparing state statutes to the final rule:* The variability of state
law regarding privacy of individually identifiable health information
and the limitations of the applicability of many such laws demonstrates
the need for uniformity and minimum standards for privacy protection.
This regulation is designed to meet these goals while allowing stricter
state laws to be enacted and remain effective. A comparison of state
privacy laws with the final regulation highlights several of the rule's
key implications:
· No state law requires covered entities to make their privacy and
access policies available to patients. Thus, all covered entities that
have direct contact with patients will be required by this rule to
prepare a statement of their privacy protection and access policies.
This necessarily assumes that entities have to develop procedures if
they do not already have them in place.
· The rule will affect more entities than are covered or encompassed
under many state laws.
· Among the three categories of covered entities, it appears that health
plans will be the most significantly affected by the access provisions
of the rule. Based on the Health Insurance Association of America (HIAA)
data[^44], there are approximately 94.7 million non-elderly persons with
private health insurance in the 35 states that do not provide patients a
legal right to inspect and copy their records.
· Under the rule, covered entities will have to obtain an individual's
authorization before they could use or disclose their information for
purposes other than treatment, payment, and health care operations \--
except in the situations explicitly defined as allowable disclosures
without authorization. Although the final rule would establish a
generally uniform disclosure and re-disclosure requirement for all
covered entities, the entities that currently have the greatest ability
and economic incentives to use and disclose protected health information
for marketing services to both patients and health care providers
without individual authorization.
· While the final rule appears to encompass many of the requirements
found in current state laws, it also is clear that within state laws,
there are many provisions that cover specific cases and health
conditions. Certainly, in states that have no restrictions on
disclosure, the rule will establish a baseline standard. But in states
that do place conditions on the disclosure of protected health
information, the rule may place additional requirements on covered
entities.
**3. *Other Federal Laws***
The relationship with other federal statutes is discussed above in the
preamble.
**E. Costs**
Covered entities will be implementing the privacy final rules at the
same time many of the administrative simplification standards are being
implemented. As described in the overall impact analysis for the
Transactions Rule, the data handling change occurring due to the other
HIPAA standards will have both costs and benefits. To the extent the
changes required for the privacy standards, implementation
specifications, and requirements can be made concurrently with the
changes required by the other regulations, costs for the combined
implementation should be only marginally higher than for the
administrative simplification standards alone. The extent of this
incremental cost is uncertain, in the same way that the costs associated
with each of the individual administrative simplification standards is
uncertain.
The costs associated with implementing the requirements under this
Privacy Rule will be directly related to the number of affected entities
and the number of affected transactions in each entity. There are
approximately 12,200 health plans (including self-insured employer and
government health plans that are at least partially
self-administered)[^45], 6480 hospitals, and 630,000 non-hospital
providers that will bear implementation costs under the final rule.
The relationship between the HIPAA security and privacy standards is
particularly relevant. On August 17, 2000, the Secretary published a
final rule to implement the HIPAA standards on electronic transactions.
That rule adopted standards for eight electronic code sets to be used
for those transactions. The proposed rule for security and electronic
signature standards was published on August 12, 1998. That proposal
specified the security requirements for covered entities that transmit
and store information specified in Part C, Title II of the Act. In
general, that proposed rule proposed administrative and technical
standards for protecting "\...any health information pertaining to an
individual that is electronically maintained or transmitted." (63 FR
43243). The final Security Rule will detail the system and
administrative requirements that a covered entity must meet in order to
assure itself and the Secretary that health information is safe from
destruction and tampering from people without authorization for its
access.
By contrast, the Privacy Rule describes the requirements that govern the
circumstances under which protected health information must be used or
disclosed with and without patient involvement and when a patient may
have access to his or her protected health information.
While the vast majority of health care entities are privately owned and
operated, we note that federal, state, and local government providers
are reflected in the total costs as well. Federal, state, and locally
funded hospitals represent approximately 26 percent of hospitals in the
United States. This is a significant portion of hospitals, but it
represents a relatively small proportion of all provider entities. We
estimated that the number of government providers who are employed at
locations other than government hospitals is significantly smaller
(approximately two percent of all providers). Weighting the relative
number of government hospital and non-hospital providers by the revenue
these types of providers generate, we estimate that health care services
provided directly by government entities represent 3.4 percent of total
health care services. Indian Health Service and tribal facilities costs
are included in the total, since the adjustments made to the original
private provider data to reflect federal providers included them. In
developing the rule, the Department consulted with states,
representatives of the National Congress of American Indians,
representatives of the National Indian Health Board, and a
representative of the self-governance tribes. During the consultation we
discussed issues regarding the application of Title II of HIPAA to the
states and tribes.
The costs associated with this final rule involve, for each provision,
consideration of both the degree to which covered entities must modify
their existing records management systems and privacy policies under the
final rule, and the extent to which there is a change in behavior by
both patients and the covered entities as a result of the final rule.
The following sections examine these provisions as they apply to the
various covered entities under the final rule. The major costs that
covered entities will incur are one-time costs associated with
implementation of the final rules, and ongoing costs that result in
continuous requirements in the final rule.
The Department has quantified the costs imposed by the final regulation
to the extent possible. The cost of many provisions were estimated by
first using data from the Census Bureau's Statistics of U.S. Business to
identify the number of non-hospital health care providers, hospitals and
health plans. Then, using the Census Bureau's Current Population Survey
(CPS) wage data for the classes of employees affected by the rule, the
Department identified the hourly wage of the type of employee assumed to
be mostly likely responsible for compliance with a given provision.
Where the Department believed a number of different types of employees
might be responsible for complying with a certain provision, as is often
expected to be the case, the Department established a weighted-average
wage based on the types of employees involved. Finally, the Department
made assumptions regarding the number of person-hours per institution
required to comply with the rule.
The Department cannot determine precisely how many person-hours per
institution will be required to comply with a given provision, however,
the Department attempted to establish reasonable estimates based on
fact-finding discussions with private sector health care providers, the
advice of the Department's consultants, and the Department's own best
judgement of the level of burden required to comply with a given
provision. Moreover, the Department recognizes that the number of hours
required to comply with a given requirement of the rule will vary from
provider to provider and health plan to health plan, particularly given
the flexibility and scalability permitted under the rule. Therefore, the
Department considers the estimates to be averages across the entire
class of health care providers, hospitals, or health plans in question.
Underlying all annual cost estimates are growth projections. For growth
in the number of patients, the Department used data from the National
Ambulatory Medical Care Survey, the National Hospital Ambulatory Medical
Care Survey, the National Home and Hospice Survey, the National Nursing
Home Survey, and information from the American Hospital Association. For
growth in the number of health care workers, the Department used data
from the Bureau of Health Professions in the Department's Health
Resources Services Administration (HRSA). For insurance coverage growth
(private and military coverage), we used a five-year average annual
growth rate in employer-sponsored, individual, military, and overall
coverage growth from the Census Bureau's CPS, 1995-1999. To estimate
growth in the number of Medicare and Medicaid enrollees, the Department
used the enrollment projections of the Health Care Financing
Administration's Office of the Actuary. For growth in the number of
hospitals, health care providers and health plans, trend rates were
derived from the Census Bureau's Statistics of U.S. Businesses, using
SIC code-specific five-year annual average growth rate from1992-1997
(the most recent data available). For wage growth, the Department used
the same assumptions made in the Medicare Trustees' Hospital Insurance
Trust Fund report for 2000.
In some areas, the Department was able to obtain very reliable data,
such as survey data from the Statistics of U.S. Businesses and the
Medical Expenditures Panel Survey (MEPS). In numerous areas, however,
there was too little information or data to support quantitative
estimates. As a result, the Department relied on data provided in the
public comments or subsequent fact-finding to provide a basis for making
key assumptions. We were able to provide a reasonable cost estimate for
virtually all aspects of the regulation, except law enforcement. In this
latter area, the Department was unable to obtain sufficient data about
current practices (e.g., the number of criminal and civil investigations
that may involve requests for protected health information., the number
of subpoenas for protected health information., etc.) to determine the
marginal effects of the regulation. As discussed more fully below, the
Department believes the effects of the final rule are marginal because
the policies adopted in the final rule appear to largely reflect current
practice.
The NPRM included an estimate of \$3.8 billion for the privacy proposal.
The estimate for the final rule is \$18.0 billion. Much of the
difference can be explained by two factors. First, the NPRM estimate was
for five years; the final rule estimate is for ten years. The Department
chose the longer period for the final rule because ten years was also
the period of analysis in the Transactions Rule RIA, and we wanted to
facilitate comparisons, given that the net benefits and costs of the
administrative simplification rules should be considered together.
Second, the final impact analysis includes cost estimates for a number
of key provisions that were not estimated in the NPRM because the
Department did not have adequate information at the time. Although we
received little useable data in the public comments (see comment and
response section), the Department was able to undertake more extensive
fact-finding and collect sufficient information to make informed
assumptions about the level of effort and time various provisions of the
final rule are likely to impose on different types of affected entities.
The estimate of \$18.0 billion represents a gross cost, not a net cost.
As discussed more fully below in the benefits section, the benefits of
enhanced privacy and confidentiality of personal health information are
very significant. If people believe their information will be used
properly and not disseminated beyond certain bounds without their
knowledge and consent, they will be much more likely to seek proper
health care, provide all relevant health information, and abide by their
providers' recommendations. In addition, more confidence by individuals
and covered entities that privacy will be maintained will lead to an
increase in electronic transactions and the efficiencies and cost
savings that stem from such action. The benefits section quantifies some
examples of benefits. The Department was not able to identify data
sources or models that would permit us to measure benefits more broadly
or accurately. The inability to quantify benefits, however, does not
lessen the importance or value that is ultimately realized by having a
national standard for health information privacy.
The largest initial costs resulting from the final Privacy Rule stem
primarily from the requirement that covered entities use and disclose
only the minimum necessary protected health information, that covered
entities develop policies and codify their privacy procedures, and that
covered entities designate a privacy official and train all personnel
with access to individually identifiable health information. The largest
ongoing costs will result from the minimum necessary provisions
pertaining internal uses of individually identifiable health
information, and the cost of a privacy official. In addition, covered
entities will have recurring costs for training, disclosure tracking and
notice requirements. A smaller number of large entities may have
significant costs for de-identification of protected health information
and additional requirements for research.
The privacy costs are in addition to the Transactions Rule estimates.
The cost of complying with the regulation represents approximately 0.23
percent of projected national health expenditures the first year the
regulation is enacted. The costs for the first eight years of the final
regulation represents 0.07 percent of the increase in national health
care costs experienced over the same period.[^46]
***Minimum Necessary***
The "minimum necessary" policy in the final rule has essentially three
components: first, it does not pertain to certain uses and disclosures
including treatment-related exchange of information among health care
providers; second, for disclosures that are made on a routine and
recurring basis, such as insurance claims, a covered entity is required
to have policies and procedures for governing such exchanges (but the
rule does not require a case-by-case determination); and third,
providers must have a process for reviewing non-routine requests on a
case-by-case basis to assure that only the minimum necessary information
is disclosed.
Based on public comments and subsequent fact-finding, the Department has
concluded that the requirements of the final rule are generally similar
to the current practice of most providers. For standard disclosure
requests, for example, providers generally have established procedures
for determining how much health information is released. For non-routine
disclosures, providers have indicated that they currently ask questions
to discern how much health information is necessary for such disclosure.
Under the final rule, we anticipate providers will have to be more
thorough in their policies and procedures and more vigilant in their
oversight of them; hence, the costs of this provision are significant.
To make the final estimates for this provision, the Department
considered the minimum necessary requirement in two parts. First,
providers, hospitals, and health plans will need to establish policies
and procedures which govern uses and disclosures of protected health
information. Next, these entities will need to adjust current practices
that do not comply with the rule, such as updating passwords and making
revisions to software.
To determine the policies and procedures for the minimum necessary
requirement, the Department assumed that each hospital would spend 160
hours, health plans would spend 107 hours, and non-hospital providers
would spend 8 hours. As noted above, the time estimates for this and
other provisions of the rule are considered an average number of
person-hours for the institutions involved. An underlying assumption is
that some hospitals, and to a lesser extent health plans, are part of
chains or larger entities that will be able to prepare the basic
materials at a corporate level for a number of covered entities.
Once the policies and procedures are established, the Department
estimates there will be costs resulting from implementing the new
policies and procedures to restrict internal uses of protected health
information to the minimum necessary. Initially, this will require 560
hours for hospitals, 160 hours for health plans, and 12 hours for
non-hospital providers.[^47] The wage for health care providers and
hospitals is estimated at \$47.28, a weighted average of various health
care professionals based on CPS data; the wage for health plans is
estimated to be \$33.82, based on average wages in the insurance
industry (note that all wage assumptions in this impact analysis assume
a 39 percent load for benefits, the standard Bureau of Labor Statistics
assumption). In addition, there will be time required on an annual basis
to ensure that the implemented practices continue to meet the
requirements of the rule. Therefore, the Department estimates that on an
annual ongoing basis (after the first year), hospitals will require 320
hours, health plans 100 hours, and non-hospital providers 8 hours to
comply with this provision.
The initial cost attributable to the minimum necessary provision is
\$926 million. The total cost of the provision is \$5.757 billion.
(These estimates are for the cost of complying with the minimum
necessary provisions that restrict internal uses to the minimum
necessary. The Department has estimated in the business associates
section below the requirement limiting disclosures outside the covered
entity to the minimum amount necessary.)
***Privacy Official***
The final rule requires entities to designate a privacy official who
will be responsible for the development and implementation of privacy
policies and procedures. In this cost analysis, the Department has
estimated each of the primary administrative requirements of the rule
(e.g., training, policy and procedure development, etc), including the
development and implementation costs associated with each specific
requirement. These activities will certainly involve the privacy
official to some degree; thus, some costs for the privacy official,
particularly in the initial years, are subsumed in other cost
requirements. Nonetheless, we anticipate that there will be additional
ongoing responsibilities that the privacy official will have to address,
such as coordinating between departments, evaluating procedures and
assuring compliance. To avoid double-counting, the cost calculated in
this section is only for the ongoing, operational functions of a privacy
official (e.g., clarifying procedures for staff) that are in addition to
items discussed in other sections of this impact analysis.
The Department assumes the privacy official role will be an additional
responsibility given to an existing employee in the covered entity, such
as an office manager in a small entity or a compliance official in a
larger institution. Moreover, today any covered entity that handles
individually identifiable health information has one or more people with
responsibility for handling and protecting the confidentiality of such
information. As a result of the specific requirement for a privacy
official, the Department assumes covered entities will centralize this
function, but the overall effort is not likely to increase
significantly. Specifically, the Department has assumed non-hospital
providers will need to devote, on average, an additional 30 minutes per
week of an official's time (i.e., 26 hours per year) to compliance with
the final regulation for the first two years and 15 minutes per week for
the remaining eight years (i.e., 13 hours per year). For hospitals and
health plans, which are more likely to have a greater diversity of
activities involving privacy issues, we have assumed three hours per
week for the first two years (i.e., 156 hours per year), and 1.5 hours
per week for the remaining eight years (i.e., 78 hours per year).
For non-hospital providers, the time was calculated at a wage of \$34.13
per hour, which is the average wage for managers of medicine and health
according to the CPS. For hospitals, we used a wage of \$79.44, which is
the rate for senior planning officers.[^48] For health plans, the
Department assumed a wage of \$88.42 based on the wage for top claims
executives.[^49] Although individual hospitals and health plans may not
necessarily select their planning officers or claims executives to be
their privacy officials, we believe they will be of comparable
responsibility, and therefore comparable pay, in larger institutions.
The initial year cost for privacy officials will be \$723 million; the
ten-year cost will be \$5.9 billion.
***Internal Complaints***
The final rule requires each covered entity to have an internal process
to allow an individual to file a complaint concerning the covered
entity's compliance with its privacy policies and procedures. The
requirement includes designating a contact person or office responsible
for receiving complaints and documenting the disposition of them, if
any. This function may be performed by the privacy official, but because
it is a distinct right under the final rule and may be performed by
someone else, we are costing it separately.
The covered entity only is required to receive and document a complaint
(no response is required), which we assume will take, on average, ten
minutes (the complaint can be oral or in writing). The Department
believes that such complaints will be uncommon. We have assumed that one
in every thousand patients will file a complaint, which is approximately
10.6 million complaints over ten years. Based on a weighted-average
hourly wage of \$47.28 at ten minutes per complaint, the cost of this
policy is \$6.6 million in the first year. Using wage growth and patient
growth assumptions, the cost of this policy is \$103 million over ten
years.
***Disclosure Tracking and History***
The final rule requires providers to be able to produce a record of all
disclosures of protected health information, except in certain
circumstances. The exceptions include disclosures for treatment,
payment, health care operations, or disclosures to an individual. This
requirement will require a notation in the record (electronic or paper)
of when, to whom, and what information was disclosed, as well as the
purpose of such disclosure or a copy of an individual's written
authorization or request for a disclosure.
Based on information from several hospital sources, the Department
assumes that all hospitals already track disclosures of individually
identifiable health information and that 15 percent of all patient
records held by a hospital will have an annual disclosure that will have
to be recorded in an individual's record. It was more difficult to
obtain a reliable estimate for non-hospital providers, though it appears
that they receive many fewer requests. The Department assumed a ten
percent rate for ambulatory care patients and five percent, for nursing
homes, home health, dental and pharmacy providers. (It was difficult to
obtain any reliable data for these latter groups, but those we talked to
said that they had very few, and some indicated that they currently keep
track of them in the records.) These estimated percentages represent
about 63 million disclosures that will have to be recorded in the first
year, with each recording estimated to require two minutes. At the
average nurse's salary of \$30.39 per hour, the cost in the first year
is \$25.7 million. For health plans, the Department assumed that
disclosures of protected health information are more rare than for
health care providers. Therefore, the Department assumed that there will
be disclosures of protected health information for five percent of
covered lives. At the average wage for the insurance industry of \$33.82
per hour, the initial cost for health plans is \$6.8 million. Using our
standard growth rates for wages, patients, and covered entities, the
ten-year cost for providers and health plans is \$519 million.
In addition, although hospitals generally track patient disclosures
today, the Department assumes that hospitals will seek to update
software systems to assure full compliance. Based on software upgrade
costs provided by the Department's private sector consultants with
expertise in the area (the Gartner Group), the Department assumed that
each upgrade would cost \$35,000 initially and \$6,300 annually
thereafter, for a total cost of \$572 million over ten years.
The final rule also requires covered entities to provide individuals
with an accounting of disclosures upon request. The Department assumes
that few patients will request a history of disclosures of their
protected medical information. Therefore, we estimate that one in a
thousand patients will request such an accounting each year, which is
approximately 850,000 requests. If it takes an average of five minutes
to copy any disclosures and the work is done by a nurse, the cost will
for the first year will be \$2.1 million. The total ten-year cost is
\$33.8 million.
***De-identification of Information***
The rule allows covered entities to determine that health information is
de-identified (i.e., that it is not individually identifiable health
information) if certain conditions are met. Currently, some entities
release de-identified information for research purposes. De-identified
information may originate from automated systems (such as records
maintained by pharmacy benefit managers) and non-automated systems (such
as individual medical records maintained by providers). As compared with
current practice, the rule requires that an expanded list of identifiers
be removed for the data (such as driver's license numbers, and detailed
geographic and certain age information). For example, as noted in a
number of public comments, currently complete birth dates (day, month,
and year) and zip codes are often included in de-identified information.
The final rule requires that only the year of birth (except in certain
circumstances) and the first three digits of the zip code can be
included in de-identified information.
These changes will not require extensive change from current practice.
Providers generally remove most of the 19 identifiers listed in the
final rule. The Department relied on Gartner Group estimates that some
additional programmer time will be required by covered entities that
produce de-identified information to make revisions in their procedures
to eliminate additional identifiers. Entities that de-identify
information will have to review existing and future data flows to assure
compliance with the final rule. For example, an automated system may
need to be re-programmed to remove additional identifiers from otherwise
protected health information. (The costs of educating staff about the
de-identification requirements are included in the cost estimate for
training staff on privacy policies.)
The Department was not able to obtain any reliable information on the
volume of medical data that is currently de-identified. To provide some
measure of the potential magnitude, we assumed that health plans and
hospitals would have an average of two existing agreements that would
need to be reviewed and modified. Based on information provided by our
consultants, we estimate that these agreements would require an average
of 152 hours by hospitals and 116 hours by health plans to review and
revise existing agreements to conform to the final rule. Using the
weighted average wage of \$47.28, the initial costs will be \$124
million. Using our standard growth rates for wages, patients, and
covered entities, the total cost of the provision is \$1.1 billion over
ten years.
The Department expects that the final rule and the increasing trend
toward computerization of large record sets will result over time in
de-identification being performed by relatively few firms or
associations. Whether the covered entity is a small provider with
relatively few files or a hospital or health plan with large record
files, it will be more efficient to contract with specialists in these
firms or associations (as "business associates" of the covered entity)
to de-identify files. The process will be different but the ultimate
cost is likely to be the same or only slightly higher, if at all, than
the costs for de-identification today. The estimate is for the costs
required to conform existing and future agreements to the provisions of
the rule. The Department has not quantified the benefits that might
arise from changes in the market for de-identified information because
the centralization and efficiency that will come from it will not be
fully realized for several years, and we do not have a reliable means of
estimating such changes.
***Policy and Procedures Development***
The final regulation imposes a variety of requirements which
collectively will necessitate entities to develop policies and
procedures (henceforth in this section to be referred to as policies) to
establish and maintain compliance with the regulation. These include
policies such as those for inspection and copying, amending records, and
receiving complaints.[^50] In developing the final regulations,
simplifying the administrative burden was a significant consideration.
To the extent practical, consistent with maintaining adequate protection
of protected health information, the final rule is designed to encourage
the development of policies by professional associations and others,
that will reduce costs and facilitate greater consistency across
providers and other covered entities.
The development of policies will occur at two levels: first, at the
association or other large scale levels; and second, at the entity
level. Because of the generic nature of many of the final rule's
provisions, the Department anticipates that trade, professional
associations, and other groups serving large numbers of members or
clients will develop materials that can be used broadly. These will
likely include the model privacy practice notice that all covered
entities will have to provide patients; general descriptions of the
regulation's requirements appropriate for various types of health care
providers; checklists of steps entities will have to take to comply;
training materials; and recommended procedures or guidelines. The
Department spoke with a number of professional associations, and they
confirmed that they would expect to provide such materials for their
members at either the federal or state level.
Using Faulkner and Gray's *Health Data Directory 2000*, we identified
216 associations that would be likely to provide guidance to members. In
addition, we assume three organizations (i.e., one for hospitals, health
plans, and other health care providers) in each state would also provide
some additional services to help covered entities coordinate the
requirements of this rule with state laws and requirements. The
Department assumed that these associations would each provide 320 hours
of legal analysis at \$150 per hour, and 640 hours of senior analysts
time at \$50 per hour. This equals \$17.3 million. Hourly rates for
legal council are the average billing rate for a staff attorney.[^51]
The senior analysts rates are based on a salary of \$75,000 per year,
plus benefits, which was provided by a major professional association.
For larger health care entities such as hospitals and health plans, the
Department assumed that the complexity of their operations would require
them to seek more customized assistance from outside council or
consultants. Therefore, the Department assumes that each hospital and
health plan (including self-administered, self-insured health plans)
will, on average, require 40 hours of outside assistance. The resulting
cost for external policy development is estimated to be \$112 million.
All covered entities are expected to require some time for internal
policy development beyond what is provided by associations or outside
consultants. For most non-hospital providers, the external assistance
will provide most of the necessary information. Therefore, we expect
these health care providers will need only eight hours to adapt these
policies for their specific use (training cost is estimated separately
in the impact analysis). Hospitals and health plans, which employ more
individuals and are involved in a wider array of endeavors, are likely
to require more specific policies tailored to their operations to comply
with the final rule. For these entities, we assume an average of 320
hours of policy development per institution. The total cost for internal
policy development is estimated to be \$468 million.
The total cost for policy, plan, and procedures development for the
final regulation is estimated to be \$598 million. All of these costs
are initial costs.
***Training***
The final regulation's requirements provide covered entities with
considerable flexibility in how to best fulfill the necessary training
of their workforce. As a result, the actual practices may vary
substantially based on such factors as the number of members of the
workforce, the types of operations, worker turnover, and experience of
the workforce. Training is estimated to cost \$737 million over ten
years. The Department estimates that at the time of the effective date,
approximately 6.7 million health care workers will have to be trained,
and in the subsequent ten years, 7 million more will have to be trained
because of worker turnover. The estimate of employee numbers are based
on 2000 CPS data regarding the number of health care workers who
indicated they worked for a health care institution. To estimate a
workforce turnover rate, the Department relied on a study submitted in
the public comments which used a turnover rate of ten percent or less,
depending on the labor category. To be conservative, the Department
assumed ten percent for all categories.
Covered entities will need to provide members of the workforce with
varying amounts of training depending on their responsibilities, but on
average, the Department estimates that each member of the workforce who
is likely to have access to protected health information will require
one hour of training in the policies and procedures of the covered
entity. The initial training cost estimate is based on teacher training
with an average class size of ten. After the initial training, the
Department expects some training (for example, new employees in larger
institutions) will be done by videotape, video conference, or computer,
all of which are likely to be less expensive. Training materials were
assumed to cost an average of \$2 per worker. The opportunity cost for
the training time is based on the average wage for each health care
labor category listed in the CPS, plus a 39 percent load for benefits.
Wages were increased based on the wage inflation factor utilized for the
short-term assumptions (which covers ten years) in the Medicare
Trustees' Annual Report for 1999.
***Notice***
This section describes only the cost associated with the production and
provision of a notice. The cost of developing the policy stated in the
notice is covered under policies and procedures, above.
Covered health care providers with direct treatment relationships are
required to provide a notice of privacy practices no later than the date
of the first service delivery to individuals after the compliance date
for the covered health care provider. The Department assumed that for
most types of health care providers (such as physicians, dentists, and
pharmacists) one notice would be distributed to each patient during his
or her first visit following the compliance date for the covered
provider, but not for subsequent visits. For hospitals, however, the
Department assumed that a notice would be provided at each admission,
regardless of how many visits an individual has in a given year. In
subsequent years, the Department assumed that non-hospital providers
would only provide notices to their new patients, because it is assumed
that providers can distinguish between new and old patients, although
hospitals will continue to provide a notice for each admission. The
total number of notices provided in the initial year is estimated to be
816 million.
Under the final rule, only providers that have direct treatment
relationships with individuals are required to provide notices to them.
To estimate the number of visits that trigger a notice in the initial
year and in subsequent years, the Department relied on the Medical
Expenditure Panel Survey (MEPS, 1996 data) conducted by the Department's
Agency for Healthcare Quality and Research. This data set provides
estimates for the number of total visits to a variety of health care
providers in a given year and estimates of the number of patients with
at least one visit to each type of each care provider. To estimate the
number of new patients in a given year, the Department used the National
Ambulatory Medical Care Survey and the National Hospital Ambulatory
Medical Care Survey, which indicate that for ambulatory care visits to
physician offices and hospital ambulatory care departments, 13 percent
of all patients are new. This data was used as a proxy for other types
of providers, such as dentists and nursing homes, because the Department
did not have estimates for new patients for other types of providers.
The number of new patients was increased over time to account for growth
in the patient population. Therefore, the number of notices provided in
years 2004 through 2012 is estimated to be 5.3 billion.
For health plans, the Department estimated the number of notices by
trending forward the average annual rate of growth from 1995 through
1998 (the most recent data available) of private policy holders using
the Census Bureau's Current Population Survey, and also by using Health
Care Financing Administration Office of the Actuary's estimates for
growth in Medicare and Medicaid enrollment. It should be noted that the
regulation does not require that the notice be mailed to individuals.
Therefore, the Department assumed that health plans would include their
privacy policy in the annual mailings they make to members, such as by
adding a page to an existing information booklet.
Since clinical laboratories generally do not have direct contact with
patients, they would not normally be required to provide notices.
However, there are some laboratory services that involve direct patient
contact, such as patients who have tests performed in a laboratory or at
a health fair. We found no data from which we could estimate the number
of such visits. Therefore, we have assumed that labs would incur no
costs as a result of this requirement.
The printing cost of the policy is estimated to be \$0.05, based on data
obtained from the Social Security Administration, which does a
significant number of printings for distribution. Some large bulk users,
such as health plans, can probably reproduce the document for less, and
small providers simply may copy the notice, which would also be less
than \$0.05. Nonetheless, at \$0.05, the total cost of the initial
notice is \$50.8 million.
Using our standard growth rate for patients, the total cost for notices
is estimated to be \$391 million for the ten-year period.
***Requirements on Use and Disclosure for Research***
The final regulation places certain requirements on covered entities
that supply individually identifiable health information to researchers.
As a result of these requirements, researchers who seek such health
information and the Institutional Review Boards (IRBs) that review
research projects will have additional responsibilities. Moreover, a
covered entity doing research, or another entity requesting disclosure
of protected health information for research that is not currently
subject to IRB review (research that is 100 percent privately funded and
which takes place in institutions which do not have "multiple project
assurances") may need to seek IRB or privacy board approval if they want
to avoid the requirement to obtain authorization for use or disclosure
of protected health information for research, thereby creating the need
for additional IRBs and privacy boards that do not currently exist.
To estimate the additional requirements placed on existing IRBs, the
Department relied on a survey of IRBs conducted by James Bell Associates
on behalf of NIH and on estimates of the total number of existing IRBs
provided by NIH staff. Based on this information, the Department
concluded that of the estimated 4,000 IRBs in existence, the median
number of initial current research project reviews is 133 per IRB, of
which only ten percent do not receive direct consent for the use of
protected health information. (Obtaining consent nullifies the need for
IRB privacy scrutiny.) Therefore, in the first year of implementation,
there will be 76,609 initial reviews affected by the regulation, and the
Department assumes that the requirement to consider the privacy
protections in the research protocols under review will add an average
of 1 hour to each review. The cost to researchers for having to develop
protocols which protect protected health information is difficult to
estimate, but the Department assumes that each of the affected 76,609
studies will require an average of an additional 8 hours of time for
protocol development and implementation. At the average medical
scientist hourly wage of \$46.61, the initial cost is \$32.1 million;
the total ten-year cost of these requirements is \$468 million over ten
years.
As stated above, some privately funded research not subject to any IRB
review currently may need to obtain IRB or privacy board approval under
the final rule. Estimating how much research exists which does not
currently go through any IRB review is highly speculative, because the
experts consulted by the Department all agree that there is no data on
the volume of privately funded research. Likewise, public comments on
this subject provided no useful data. However, the Department assumed
that most research that takes place today is subject to IRB review,
given that so much research has some government funding and many large
research institutions have multiple project assurances. As a result, the
Department assumed that the total volume of non-IRB reviewed research is
equal to 25 percent of all IRB-reviewed research, leading to 19,152 new
IRB or privacy board reviews in the first year of the regulation. Using
the same assumptions as used above for wages, time spent developing
privacy protection protocols for researchers, and time spent by IRB and
privacy board members, the total one-year cost for new IRB and privacy
board reviews is \$8 million.
For estimating total ten-year costs, the Department used the Bell study,
which showed an average annual growth rate of 3.7 percent in the number
of studies reviewed by IRBs. Using this growth rate, the total ten-year
cost for the new research requirements is \$117 million.
***Consent***
Under the final rule, a covered health care provider with direct
treatment relationships must obtain an individual's consent for use or
disclosure of protected health information for treatment, payment, or
health care operations. Covered providers with indirect treatment
relationships and health plans may obtain such consent if they so
choose. Providers and health plans that seek consent under this rule can
condition treatment or enrollment upon provision of such consent. Based
on public comments and discussions with a wide array of health care
providers, it is apparent that most currently obtain written consent for
use and disclosure of individually identifiable health information for
payment. Under the final rule, they will have to obtain consent for
treatment and health care operations, as well, but this may entail only
minor changes in the language of the consent to incorporate these other
categories and to conform to the rule.
Although the Department was unable to obtain any systematic data, the
anecdotal evidence suggests that most non-hospital providers and
virtually all hospitals follow this practice. For the cost analysis, the
Department assumes that 90 percent of the non-hospital providers and all
hospitals currently obtain some consent for use and disclosure of
individually identifiable health information. For providers that
currently obtain written consent, there is only a nominal cost for
changing the language on the document to conform to the rule. For this
activity, we assumed \$0.05 cost per document for revising existing
consent documents.
For the ten percent of treating providers who currently do not obtain
consent, there is the cost of creating consent documents (which will be
standardized), which is also assumed to be \$0.05 per document. It is
assumed that all providers required to obtain consent under the rule
will do so upon the first visit, so there will be no mailing cost. For
non-hospital providers, we assume the consent will be maintained in
paper form, which is what most providers currently do (electronic form,
if available, is cheaper to maintain). There is no new cost for records
maintenance because the consent will be kept in active files (paper or
electronic).
The initial cost of the consent requirement is estimated to be \$166
million. Using our standard assumptions for patient growth, the total
costs for the ten years is estimated to be \$227 million.
***Authorizations***
Patient authorizations are required for uses or disclosures of protected
health information that are not otherwise explicitly permitted under the
final rule with or without consent. In addition to uses and disclosures
of protected health information for treatment, payment, and health care
operations with or without consent, the rule also permits certain uses
of protected health information, such as fund-raising for the covered
entity and certain types of marketing activity, without prior consent or
authorization. Authorizations are generally required if a covered entity
wants to provide protected health information to third party for use by
the third party for marketing or for research that is not approved by an
IRB or privacy board.
The requirement for obtaining authorizations for use or disclosure of
protected health information for most marketing activity will make
direct third-party marketing more difficult because covered entities may
not want to obtain and track such authorizations, or they may obtain too
few to make the effort economically worthwhile. However, the final rule
permits an alternative arrangement: the covered entity can engage in
health-related marketing on behalf of a third party, presumably for a
fee. Moreover, the covered entity could retain another party, through a
business associate relationship, to conduct the actual health-related
marketing, such as mailings or telemarketing, under the covered entity's
name. The Department is unable to estimate the cost of these changes
because there is no credible data on the extent of current third party
marketing practices or the price that third party marketers currently
pay for information from covered entities. The effect of the final rule
is to change the arrangement of practices to enhance accountability of
protected health information by the covered entity and its business
associates; however, there is nothing inherently costly in these
changes.
Examples of other circumstances in which authorizations are required
under the final rule include disclosure of protected health information
to an employer for an employment physical, pre-enrollment underwriting
for insurance, or the sharing of protected health insurance information
by an insurer with an employer. The Department assumes there is no new
cost associated with these requirements because providers have said that
obtaining authorization under such circumstances is current practice.
To use or disclose psychotherapy notes for most purposes (including for
treatment, payment, or health care operations), a covered entity must
obtain specific authorization by the individual that is distinct from
any authorization for use and disclosure of other protected health
information. This is current practice, so there is no new cost
associated with this provision.
***Confidential Communications***
The final rule permits individuals to receive communications of
protected health information from a covered health care provider or a
health plan by an alternative means or at an alternative address. A
covered provider and a health plan must accommodate reasonable requests;
however, a health plan may require the individual to state that
disclosure of such information may endanger the individual. A number of
providers and health plans indicated that they currently provide this
service for patients who request it. For providers and health plans with
electronic records system, maintaining separate addresses for certain
information is simple and inexpensive, requiring little or no change in
the system. For providers with paper records, the cost may be higher
because they will have to manually check records to determine which
information must be treated in accordance with such requests. Although
some providers currently provide this service, the Department was unable
to obtain any reliable estimate of the number of such requests today or
the number of providers who perform this service. The cost attributable
to this requirement to send materials to alternate addresses does not
appear to be significant.
***Employers With Insured Group Health Plans***
Some group health plans will use or maintain protected health
information, particularly group health plans that are self-insured.
Also, some plan sponsors that perform administrative functions on behalf
of their group health plans, may need protected health information. The
final rule permits a group health plan, or a health insurance issuer or
HMO that provides benefits on behalf of the group health plan, to
disclose protected health information to a plan sponsor who performs
administrative functions on its behalf for certain purposes and if
certain requirements are met. The plan documents must be amended to:
describe the permitted uses and disclosures of protected health
information by the plan sponsor; specify that disclosure is permitted
only upon receipt of a certification by the plan sponsor that the plan
documents have been amended and the plan sponsor agrees to certain
restrictions on the use of protected health information; and provide for
adequate firewalls to assure unauthorized personnel do not have access
to individually identifiable health information.
Some plan sponsors may need information, not to administer the group
health plan, but to amend, modify, or terminate the plan. ERISA case law
describes such activities as settlor functions. For example, a plan
sponsor may want to change its contract from a preferred provider
organization to a health maintenance organization (HMO). In order to
obtain premium information, the plan sponsor may need to provide the HMO
with aggregate claims information. Under the rule, the plan sponsor can
obtain summary information with certain identifiers removed, in order to
provide it to the HMO and receive a premium rate.
The Department assumes that most plan sponsors who are small employers
(those with 50 or fewer employees) will elect not to receive protected
health information because they will have little, if any, need for such
data. Any needs that plan sponsors of small group health plans may have
for information can be accomplished by receiving the information in
summary form. The Department has assumed that only 5 percent of plan
sponsors of small group health plans that provide coverage through a
contract with an issuer will actually take the steps necessary to
receive protected health information. This is approximately 96,900
firms. For these firms, the Department assumes it will take one hour to
determine procedural and organization issues and an additional 1/3 hour
of an attorney's time to make plan document changes, which will be
simple and essentially standardized. This will cost \$7.1 million.
Plan sponsors who are employers of medium (51-199 employees) and large
(over 200 employees) firms that provide health benefits through
contracts with issuers are more likely to want access to protected
health information for plan administration, for example to use it to
audit claims or perform quality assurance functions on behalf of the
group health plan. The Department assumes that 25 percent of plan
sponsors of medium sized firms and 75 percent of larger firms will want
to receive protected health information. This is approximately 38,000
medium size firms and 27,000 larger firms. To provided access to
protected health information by the group health plan, a plan sponsor
will have to assess the current flow of protected health information
from their issuer and determine what information is necessary and
appropriate. The plan sponsors may then have to make internal
organizational changes to assure adequate protection of protected health
information so that the relevant requirements are met for the group
health plan. We assume that medium size firms will take 16 work hours to
complete organizational changes, plus one hour of legal time to make
changes to plan documents and certify to the insurance carrier that the
firm is eligible to receive protected health information. We assume that
larger firms will require 32 hours of internal organizational work and
one hour of legal time. This will cost \$52.4 million and is a one-time
expense.
***Business Associates***
The final rule requires a covered entity to have a written contract or
other arrangement that documents satisfactory assurance that business
associate will appropriately safeguard protected health information in
order to disclose it to a business associate based on such an
arrangement. The Department expects business associate contracts to be
fairly standardized, except for language that will have to be tailored
to the specific arrangement between the parties, such as the allowable
uses and disclosures of information. The Department assumes the standard
language initially will be developed by trade and professional
associations for their members. Small providers are likely to simply
adopt the language or make minor modifications, while health plans and
hospitals may start with the prototype language but may make more
specific changes to meet their institutional needs. The regulation
includes a requirement that the covered entity take steps to correct,
and in some cases terminate, a contract, if necessary, if they know of
violations by a business associate. This oversight requirement is
consistent with standard oversight of a contract.
The Department could not derive a per entity cost for this work
directly. In lieu of this, we have assumed that the trade and
professional associations' work plus any minor tailoring of it by a
covered entity would amount to one hour per non-hospital provider and
two hours for hospitals and health plans. The larger figure for
hospitals and health plans reflects the fact that they are likely to
have a more extensive array of relationships with business associates.
The cost for the changes in business associate contracts is estimated to
be \$103 million. This will be an initial year cost only because the
Department assumes that this contract language will become standard in
future contracts.
In addition, the Department has estimated the cost for business
associates to comply with the minimum necessary provisions. As part of
the minimum necessary provisions, covered entities will have to
establish policies to ensure that only the minimum necessary protected
health information is shared with business associates. To the extent
that data are exchanged, covered entities will have to review the data
and systems programs to assure compliance.
For non-hospital providers, we estimate that the first year will require
an average of three hours to review existing agreements, and thereafter,
they will require an additional hour to assure business associate
compliance. We estimate that hospitals will require an additional 200
hours the first year and 16 hours in subsequent years; health plans will
require an additional 112 hours the first year and 8 hours in subsequent
years. As in other areas, we have assumed a weighted average wage for
the respective sectors.
The cost of the covered entities assuring business associates' complying
with the minimum necessary is \$197 million in the first year, and a
total of \$697 million over ten years. (These estimates include the both
the cost for the covered entity and the business associates.)
***Inspection and Copying***
In the NPRM estimate, inspection and copying were a major cost. Based on
data and information from the public comments and further fact-finding,
however, the Department has re-estimated these policies and found them
to be much less expensive.
The public comments demonstrate that copying of records is wide-spread
today. Records are routinely copied, in whole or in part, as part of
treatment or when patients change providers. In addition, copying occurs
as part of legal proceedings. The amount of inspection and copying of
medical records that occurs for these purposes is not expected to change
measurably as a result of the final regulation.
The final regulation establishes the right of individuals to access,
that is to inspect and obtain a copy of, protected health information
about them in designated record sets. Although this is an important
right, the Department does not expect it to result in dramatic increases
in requests from individuals. The Georgetown report on state privacy
laws indicates that 33 states currently give patients some right to
access medical information. The most common right of access granted by
state law is the right to inspect personal information held by
physicians and hospitals. In the process of developing estimates for the
cost of providing access, we assumed that most providers currently have
procedures for allowing patients to inspect and obtain a copy of
individually identifiable health information about themselves. The
economic impact of requiring entities to allow individuals to access
their records should be relatively small. One public commenter addressed
this issue and provided specific data which supports this conclusion.
Few studies address the cost of providing medical records to patients.
The most recent was a study in 1998 by the Tennessee Comptroller of the
Treasury. It found an average cost of \$9.96 per request, with an
average of 31 pages per request. The cost per page of providing copies
was \$0.32 per page. This study was performed on hospitals only. The
cost per request may be lower for other types of providers, since those
seeking hospital records are more likely to have more complicated
records than those in a primary care or other types of offices. An
earlier report showed much higher costs than the Tennessee study. In
1992, Rose Dunn published a report based on her experience as a manager
of medical records. She estimated a 10-page request would cost \$5.32 in
labor costs only, equaling labor cost per page of \$0.53. However, this
estimate appears to reflect costs before computerization. The expected
time spent per search was 30.6 minutes; 85 percent of this time could be
significantly reduced with computerization (this includes time taken for
file retrieval, photocopying, and re-filing; file retrieval is the only
time cost that would remain under computerization).
In estimating the cost of copying records, the Department relied on the
public comment from a medical records outsourcing industry
representative, which submitted specific volume and cost data from a
major firm that provides extensive medical record copying services.
According to these data, 900 million pages of medical records are copied
each year in the U.S., the average medical record is 31 pages, and
copying costs are \$0.50 per page. In addition, the commenter noted that
only 10 percent of all requests are made directly from patients, and of
those, the majority are for purposes of continuing care (transfer to
another provider), not for purposes of individual inspection. The
Department assumed that 25 percent of direct patient requests to copy
medical records are for purposes of inspecting their accuracy (i.e., 2.5
percent of all copy requests) or 850,000 in 2003 if the current practice
remained unchanged.
To estimate the marginal increase in copying that might result from the
regulation, the Department assumed that as patients gained more
awareness of their right to inspect and copy their records, more
requests will occur. As a result, the Department assumed a ten percent
increase in the number of requests to inspect and copy medical records
over the current baseline, which would amount to a little over 85,000
additional requests in 2003 at a cost of \$1.3 million. Allowing for a
5.3 percent increase in records based on the increase in ambulatory care
visits, the highest growth rate among health service sectors (the
National Ambulatory Medical Care Survey, 1998), the total cost for the
ten-year period would be \$16.8 million.
The final rule allows a provider to deny an individual the right to
inspect or obtain a copy of protected health information in a designated
record set under certain circumstances, and it provides, in certain
circumstances, that the patient can request the denial to be reviewed by
another licensed health care professional. The initial provider can
choose a licensed health care professional to render the second review.
The Department assumes denials and subsequent requests for reviews will
be extremely rare. The Department estimates there are about 932,000
annual requests for inspections (i.e., base plus new requests resulting
from the regulation), or approximately 11 million over the ten-year
period. If one-tenth of one percent of these requests were to result in
a denial in accordance with the rule, the result would be 11,890 cases.
Not all these cases would be appealed. If 25 percent were appealed, the
result would be 2,972 cases. If a second provider were to spend 15
minutes reviewing the case, the cost would be \$6,000 in the first year
and \$86,360 over ten years.
***Amendments to Protected Health Information***
Many providers and health plans currently allow patients to amend the
information in their medical record, where appropriate. If an error
exists, both the patient and the provider or health plan benefit from
the correction. However, as with inspection and copying, many states do
not provide individuals with the right to request amendment to protected
health information about themselves. Based on these assumptions, the
Department concludes that the principal economic effect of the final
rule would be to expand the right to request amendments to protected
health information held by a health plan or provider to those who are
not currently covered by amendment requirements under state laws or
codes of conduct. In addition, the rule may draw additional attention to
the issue of inaccuracies in information and may stimulate patient
demand for amendment of medical records, including in those states that
currently provide a right to amend medical records.
Under the final regulation, if a patient requests an amendment to his or
her medical record, the provider must either accept the amendment or
provide the individual with the opportunity to submit a statement
disagreeing with the denial. The provider must acknowledge the request
and inform the patient of his action.
The cost calculations assume that individuals who request an opportunity
to amend their medical record have already obtained a copy of it.
Therefore, the administrative cost of amending the patient's record is
completely separate from inspection and copying costs.
Based on fact-finding discussions with a variety of providers, the
Department assumes that 25 percent of the projected 850,000 people who
request to inspect their records will seek to amend them. This number is
the existing demand plus the additional requests resulting from the
rule. Over ten years, the number of expected amendment requests will be
2.7 million. Unlike inspections, which currently occur in a small
percentage of cases, our fact-finding suggests that patients very rarely
seek to amend their records, but that the establishment of this right in
the rule will spur more requests. The 25 percent appears to be high
based on our discussions with providers but it is being used to avoid an
underestimation of the cost.
As noted, the provider or health plan is not required to evaluate any
amendment requests, only to append or otherwise link to the request in
the record. We expect the responses will vary: sometimes an assistant
will only make the appropriate notation in the record, requiring only a
few minutes; other times a provider or manager will review the request
and make changes if appropriate, which may require as much as an hour.
To be conservative in its estimate, the Department has assumed, on
average, 30 minutes for each amendment request at a cost of \$47.28 per
hour (2000 CPS).
The first-year cost for the amendment policy is estimated to be \$5
million. The ten-year cost of this provision is \$78.8 million.
***Law Enforcement and Judicial and Administrative Proceedings***
The law enforcement provisions of the final rule allow disclosure of
protected health information without patient authorization under four
circumstances: (1) pursuant to legal process or as otherwise required by
law; (2) to locate or identify a suspect, fugitive, material witness, or
missing person; (3) under specified conditions regarding a victim of
crime; and (4) and when a covered entity believes the protected health
information constitutes evidence of a crime committed on its premises.
As under current law and practice, a covered entity may disclose
protected health information to a law enforcement official if such
official.
Based on our fact finding, we are not able to estimate any additional
costs from the final rule regarding disclosures to law enforcement
officials. The final rule makes clear that current court orders and
grand jury subpoenas will continue to provide a basis for covered
entities to disclose protected health information to law enforcement
officials. The three-part test, which covered entities must use to
decide whether to disclose information in response to an administrative
request such as an administrative subpoena, represents a change from
current practice. There will be only minimal costs to draft the standard
language for such subpoenas. We are unable to estimate other costs
attributable to the use of administrative subpoenas. We have not been
able to discover any specific information about the costs to law
enforcement of establishing the predicates for issuing the
administrative subpoena, nor have we been able to estimate the number of
such subpoenas that will likely be issued once the final rule is
implemented.
A covered entity may disclose protected health information in response
to an order in the course of a judicial or administrative proceeding if
reasonable efforts have been made to give the individual, who is the
subject of the protected health information, notice of and an
opportunity to object to the disclosure or to secure a qualified
protective order.
The Department was unable to estimate any additional costs due to
compliance with the final rule's provisions regarding judicial and
administrative proceedings. The provision requiring a covered entity to
make efforts to notify an individual that his or her records will be
used in proceedings is similar to current practice; attorneys for
plaintiffs and defendants agreed that medical records are ordinarily
produced after the relevant party has been notified. With regard to
protective orders, we believe that standard language for such orders can
be created at minimal cost. The cost of complying with such protective
orders will also likely be minimal, because attorney\'s client files are
ordinarily already treated under safeguards comparable to those
contemplated under the qualified protective orders. The Department was
unable to make an estimate of how many such protective orders might be
created annually.
We thus do not make any estimate of the initial or ongoing costs for
judicial, administrative, or law enforcement proceedings.
***Costs to the Federal Government***
The rule will have a cost impact on various federal agencies that
administer programs that require the use of individual health
information. The federal costs of complying with the regulation and the
costs when federal government entities are serving as providers are
included in the regulation's total cost estimate outlined in the impact
analysis. Federal agencies or programs clearly affected by the rule are
those that meet the definition of a covered entity. However, non-covered
agencies or programs that handle medical information, either under
permissible exceptions to the disclosure rules or through an
individual's expressed authorization, will likely incur some costs
complying with provisions of this rule. A sample of federal agencies
encompassed by the broad scope of this rule include the: Department of
Health and Human Services, Department of Defense, Department of Veterans
Affairs, Department of State, and the Social Security Administration.
The greatest cost and administrative burden on the federal government
will fall to agencies and programs that act as covered entities, by
virtue of being either a health plan or provider. Examples include the
Medicare, Medicaid, Children's Health Insurance and Indian Health
Service programs at the Department of Health and Human Services; the
CHAMPVA health program at the Department of Veterans Affairs; and the
TRICARE health program at the Department of Defense. These and other
health insurance or provider programs operated by the federal government
are subject to requirements placed on covered entities under this rule,
including, but not limited to, those outlined in Section D of the impact
analysis. While many of these federal programs already afford privacy
protections for individual health information through the Privacy Act
and standards set by the Departments and implemented through their
contracts with providers, this rule is nonetheless expected to create
additional requirements. Further, we anticipate that most federal health
programs will, to some extent, need to modify their existing practices
to comply fully with this rule. The cost to federal programs that
function as health plans will be generally the same as those for the
private sector.
A unique cost to the federal government will be in the area of
enforcement. The Office for Civil Rights (OCR), located at the
Department of Health and Human Services, has the primary responsibility
to monitor and audit covered entities. OCR will monitor and audit
covered entities in both the private and government sectors, will ensure
compliance with requirements of this rule, and will investigate
complaints from individuals alleging violations of their privacy rights.
In addition, OCR will be required to recommend penalties and other
remedies as part of their enforcement activities. These responsibilities
represent an expanded role for OCR. Beyond OCR, the enforcement
provisions of this rule may have additional costs to the federal
government through increased litigation, appeals, and inspector general
oversight.
Examples of other unique costs to the federal government may include
such activities as public health surveillance at the Centers for Disease
Control and Prevention, health research projects at the Agency for
Healthcare Research and Quality, clinical trials at the National
Institutes of Health, and law enforcement investigations and
prosecutions by the Federal Bureau of Investigations. For these and
other activities, federal agencies will incur some costs to ensure that
protected health information is handled and tracked in ways that comply
with the requirements of this title.
We estimate that federal costs under this rule will be approximately
\$196 million in 2003 and \$1.8 billion over ten years. The ten-year
federal cost estimate represents about 10.2 percent of the privacy
regulation's total cost. This estimate was derived in two steps.
First, we assumed that the proportion of the privacy regulation's total
cost accruing to the federal government in a given year will be
equivalent to the proportion of projected federal costs as a percentage
of national health expenditures for that year. To estimate these
proportions, we used the Health Care Financing Administration's November
1998 National Health Expenditure projections (the most recent data
available) of federal health expenditures as a percent of national
health expenditures from 2003 through 2008, trended forward to 2012. We
then adjusted these proportions to exclude Medicare and Medicaid
spending, reflecting the fact that the vast majority of participating
Medicare and Medicaid providers will not be able to pass through the
costs of complying with this rule to the federal government because they
are not reimbursed under cost-based payment systems. This calculation
yields a partial federal cost of \$166 million in 2003 and \$770 million
over ten years.
Second, we add the Medicare and federal Medicaid costs resulting from
the privacy regulation that HCFA's Office of the Actuary project can be
passed through to the federal government. These costs reflect the
actuaries' assumption regarding how much of the total privacy regulation
cost burden will fall on participating Medicare and Medicaid providers,
based on the November 1998 National Health Expenditure data. Then the
actuaries estimate what percentage of the total Medicare and federal
Medicaid burden could be billed to the programs, assuming that 1) only 3
percent of Medicare providers and 5 percent of Medicaid providers are
still reimbursed under cost-based payment systems, and 2) over time,
some Medicaid costs will be incorporated into the state's Medicaid
expenditure projections that are used to develop the federal cost share
of Medicaid spending. The results of this actuarial analysis add another
\$30 million in 2003 and \$1.0 billion over ten years to the federal
cost estimate. Together, these three steps constitute the total federal
cost estimate of \$236 million in 2003 and \$2.2 billion over ten years.
***Costs to State and Local Governments***
The rule will also have a cost effect on various state and local
agencies that administer programs requiring the use of individually
identifiable health information. State and local agencies or programs
clearly affected by the rule are those that meet the definition of a
covered entity. The costs when government entities are serving as
providers are included in the total cost estimates. However, non-covered
agencies or programs that handle individually identifiable health
information, either under permissible exceptions to the disclosure rules
or through an individual's expressed authorization, will likely incur
some costs complying with provisions of this rule. Samples of state and
local agencies or programs encompassed by the broad scope of this rule
include: Medicaid, State Children's Health Insurance Programs, county
hospitals, state mental health facilities, state or local nursing
facilities, local health clinics, and public health surveillance
activities, among others. We have included state and local costs in the
estimation of total costs in this section.
The greatest cost and administrative burden on the state and local
government will fall to agencies and programs that act as covered
entities, by virtue of being either a health plan or provider, such as
Medicaid, State Children's Health Insurance Programs, and county
hospitals. These and other health insurance or provider programs
operated by state and local government are subject to requirements
placed on covered entities under this rule, including, but not limited
to, those outlined in this section (Section E) of the impact analysis.
Many of these state and local programs already afford privacy
protections for individually identifiable health information through the
Privacy Act. For example, state governments often become subject to
Privacy Act requirements when they contract with the federal government.
This rule is expected to create additional requirements beyond those
covered by the Privacy Act. Furthermore, we anticipate that most state
and local health programs will, to some extent, need to modify their
existing Privacy Act practices to fully comply with this rule. The cost
to state and local programs that function as health plans will be
different than the private sector, much as the federal costs vary from
private health plans.
A preliminary analysis suggests that state and local government costs
will be on the order of \$460 million in 2003 and \$2.4 billion over ten
years. We assume that the proportion of the privacy regulation's total
cost accruing to state and local governments in a given year will be
equivalent to the proportion of projected state and local costs as a
percentage of national health expenditures for that year. To estimate
these proportions, we used the Health Care Financing Administration's
November 1998 National Health Expenditure projections of state and local
health expenditures as a percent of national health expenditures from
2003 through 2008, trended forward to 2012. Based on this approach, we
assume that over the entire 2003 to 2012 period, 13.6 percent, or \$2.4
billion, of the privacy regulation's total cost will accrue to state and
local governments. Of the \$2.4 billion state and local government cost,
19 percent will be incurred in the regulation's first year (2003). In
each of the out-years (2004-2012), the average percent of the total cost
incurred will be about nine percent per year. These state and local
government costs are included in the total cost estimates discussed in
the regulatory impact analysis.
**F. Benefits**
There are important societal benefits associated with improving health
information privacy. Confidentiality is a key component of trust between
patients and providers, and some studies indicate that a lack of privacy
may deter patients from obtaining preventive care and treatment[^52].
For these reasons, traditional approaches to estimating the value of a
commodity cannot fully capture the value of personal privacy. It may be
difficult for individuals to assign value to privacy protection because
most individuals view personal privacy as a right. Therefore, the
benefits of the proposed regulation are impossible to estimate based on
the market value of health information alone. However, it is possible to
evaluate some of the benefits that may accrue to individuals as a result
of proposed regulation, and these benefits, alone, suggest that the
regulation is warranted. Added to these benefits is the intangible value
of privacy, the security that individuals feel when personal information
is kept confidential. This benefit is very real and very significant but
there are no reliable means of measuring dollar value of such benefit.
As noted in the comment and response section, a number of commenters
raised legitimate criticisms of the Department's approach to estimating
benefits. The Department considered other approaches, including attempts
to measure benefits in the aggregate rather than the specific examples
set forth in the NPRM. However, we were unable to identify data or
models that would provide credible measures. Privacy has not been
studied empirically from an economic perspective, and therefore, we
concluded that the approach taken in the NPRM is still the most useful
means of illustrating that the benefits of the regulation are
significant in relation to the economic costs.
Before beginning the discussion of the benefits, it is important to
create a framework for how the costs and benefits may be viewed in terms
of individuals rather than societal aggregates. We have estimated the
value an insured individual would need to place on increased privacy to
make the privacy regulation a net benefit to those who receive health
insurance. Our estimates are derived from data produced by the 1998
Current Population Survey from the Census Bureau (the most recent
available at the time of the analysis), which show that 220 million
persons are covered by either private or public health insurance.
Joining the Census Bureau data with the costs calculated in Section E,
we have estimated the cost of the regulation to be approximately \$6.25
per year (or approximately \$0.52 per month) for each insured individual
(including people in government programs). If we assume that individuals
who use the health care system will be willing to pay more than this per
year to improve health information privacy, the benefits of the proposed
regulation will outweigh the cost.
This is a conservative estimate of the number of people who will benefit
from the regulation because it assumes that only those individuals who
have health insurance or are in government programs will use medical
services or benefit from the provisions of the proposed regulation.
Currently, there are 42 million Americans who do not have any form of
health care coverage. The estimates do not include those who pay for
medical care directly, without any insurance or government support. By
lowering the number of users in the system, we have inflated our
estimate of the per-person cost of the regulation; therefore, we assume
that our estimate represents the highest possible cost for an
individual.
An alternative approach to determining how people would have to value
increased privacy for this regulation to be beneficial is to look at the
costs divided by the number of encounters with health care professionals
annually. Data from the Medical Expenditure Panel Survey (MEPS) produced
by the Agency for Healthcare Policy Research (AHCPR) show approximately
776.3 million health care visits (e.g., office visits, hospital and
nursing home stays, etc.) in the first year (2003). As with the
calculation of average annual cost per insured patient, we divided the
total cost of complying with the regulation by the total annual number
of health care visits. The cost of instituting requirements of the
proposed regulation is \$0.19 per health care visit. If we assume that
individuals would be willing to pay more than \$0.19 per health care
visit to improve health information privacy, the benefits of the
proposed regulation outweigh the cost.
***Qualitative Discussion***
A well designed privacy standard can be expected to build confidence
among the public about the confidentiality of their medical records. The
seriousness of public concerns about privacy in general are shown in the
1994 Equifax-Harris Consumer Privacy Survey, where "84 percent of
Americans are either very or somewhat concerned about threats to their
personal privacy."[^53] A 1999 report, "Promoting Health and Protecting
Privacy" notes "\...many people fear their personal health information
will be used against them: to deny insurance, employment, and housing,
or to expose them to unwanted judgements and scrutiny.\"[^54] These
concerns would be partly allayed by the privacy standard.
Fear of disclosure of treatment is an impediment to health care for many
Americans. In the 1993 Harris-Equifax Health Information Privacy Survey,
seven percent of respondents said they or a member of their immediate
family had chosen not to seek medical services due to fear of harm to
job prospects or other life opportunities. About two percent reported
having chosen not to file an insurance claim because of concerns of lack
of privacy or confidentiality.[^55] Increased confidence on the part of
patients that their privacy would be protected would lead to increased
treatment among people who delay or never begin care, as well as among
people who receive treatment but pay directly (to the extent that the
ability to use their insurance benefits will reduce cost barriers to
more complete treatment). It will also change the dynamic of current
payments. Insured patients currently paying out-of-pocket to protect
confidentiality will be more likely to file with their insurer and to
seek all necessary care. The increased utilization that would result
from increased confidence in privacy could be beneficial under many
circumstances. For many medical conditions, early and comprehensive
treatment can lead to lower costs.
The following are four examples of areas where increased confidence in
privacy would have significant benefits. They were chosen both because
they are representative of widespread and serious health problems, and
because they are areas where reliable and relatively complete data are
available for this kind of analysis. The logic of the analysis, however,
applies to any health condition, including relatively minor conditions.
We expect that some individuals might be concerned with maintaining
privacy even if they have no significant health problems because it is
likely that they will develop a medical condition in the future that
they will want to keep private.
[Cancer]{.underline}
The societal burden of disease imposed by cancer is indisputable. Cancer
is the second leading cause of death in the US[^56], exceeded only by
heart disease. In 2000, it is estimated that 1.22 million new cancer
cases will be diagnosed.[^57] The estimated prevalence of cancer cases
(both new and existing cases) in 1999 was 8.37 million.[^58] In addition
to mortality, incidence, and prevalence rates, the other primary methods
of assessing the burden of disease are cost-of-illness and quality of
life measures.[^59] Cost of illness measures the economic costs
associated with treating the disease (direct costs) and lost income
associated with morbidity and mortality (indirect costs). The National
Institutes of Health estimates that the overall annual cost of cancer in
1990 was \$96.1 billion; \$27.5 billion in direct medical costs and
\$68.7 billion for lost income due to morbidity and mortality.[^60]
Health-related quality of life measures integrate the mortality and
morbidity effects of disease to produce health status scores for an
individual or population. For example, the Quality Adjusted Life Year
(QALY) combines the pain, suffering, and productivity loss caused by
illness into a single measure. The Disability Adjusted Life Year (DALY)
is based on the sum of life years lost to premature mortality and years
that are lived, adjusted for disability.[^61] The analysis below is
based on the cost-of-illness measure for cancer, which is more developed
than the quality of life measure.
Among the most important elements in the fight against cancer are
screening, early detection and treatment of the disease. However, many
patients are concerned that cancer detection and treatment will make
them vulnerable to discrimination by insurers or employers. These
privacy concerns have been cited as a reason patients do not seek early
treatment for diseases such as cancer. As a result of forgoing early
treatment, cancer patients may ultimately face a more severe illness
and/or premature death.
Increasing people's confidence in the privacy of their medical
information would encourage more people with cancer to seek cancer
treatment earlier, which would increase cancer survival rates and thus
reduce the lost wages associated with cancer. For example, only 24
percent of ovarian cancers are diagnosed in the early stages. Of these,
approximately 90 percent of patients survive treatment. The survival
rate of women who detect breast cancer early is similarly high; more
than 90 percent of women who detect and treat breast cancer in its early
stages will survive.[^62]
We have attempted to estimate the annual savings in foregone wages that
would result from earlier treatment due to enhanced protection of the
privacy of medical records. We do not assume there would be increased
medical costs from earlier treatment because the costs of earlier and
longer cancer treatment are probably offset by the costs of treating
late-stage cancer among people who would otherwise not be treated until
their cases had progressed.
Although figures on the number of individuals who avoid cancer treatment
due to privacy concerns do not exist, some indirect evidence is
available. A 1993 Harris-Equifax Health Information Privacy Survey
(noted earlier) found that seven percent of respondents reported that
they or a member of their immediate family had chosen not to seek
services for a physical or mental health condition due to fear of harm
to job prospects or other life opportunities. It should be noted that
this survey is somewhat dated and represents only one estimate.
Moreover, given the wording of the question, there are other reasons
aside from privacy concerns that led these individuals to respond
affirmatively. However, for the purposes of this estimate, we assume
that privacy concerns were responsible for the majority of positive
responses.
Based on the Harris-Equifax survey estimate that seven percent of people
did not seek services for physical or mental health conditions due to
fears about job prospects or other opportunities, we assume that the
proportion of people diagnosed with cancer who did not seek earlier
treatment due to these fears is also seven percent. Applying this seven
percent figure to the estimated number of total cancer cases (8.37
million) gives us an estimate of 586,000 people who did not seek earlier
cancer treatment due to privacy concerns. We estimate annual lost wages
due to cancer morbidity and mortality per cancer patient by dividing
total lost wages (\$68.7 billion) by the number of cancer patients (8.37
million), which rounds to \$8,200. We then assume that cancer patients
who seek earlier treatment would achieve a one-third reduction in cancer
mortality and morbidity due to earlier treatment. The assumption of a
one-third reduction in mortality and morbidity is derived from a study
showing a one-third reduction in colorectal cancer mortality due to
colorectal cancer screening.[^63] We could have chosen a lower or higher
treatment success rate. By multiplying 586,000 by \$8,200 by one-third,
we calculate that \$1.6 billion in lost wages could be saved each year
by encouraging more people to seek early cancer treatment through
enhanced privacy protections. This estimate illustrates the potential
savings in lost wages due to cancer that could be achieved with greater
privacy protections.
[HIV/AIDS]{.underline}
Early detection is essential for the survival of a person with HIV
(Human Immunodeficiency Virus). Concerns about the confidentiality of
HIV status would likely deter some people from getting tested. For this
reason, each state has passed some sort of legislation regarding
confidentiality of an individual's HIV status. However, HIV status can
be revealed indirectly through disclosure of HAART (Highly Active
Anti-Retroviral Therapy) or similar HIV treatment drug use. In addition,
since HIV/AIDS (Acquired Immune Deficiency Syndrome) is often the only
specially protected condition, "blacked out" information on medical
charts could indicate HIV positive status.[^64] Strengthening privacy
protections beyond this disease could increase confidence in privacy
regarding HIV as well. Drug therapy for HIV positive persons has proven
to be a life-extending, cost-effective tool.[^65] A 1998 study showed
that beginning treatment with HAART in the early asymptomatic stage is
more cost-effective than beginning it late. After five years, only 15
percent of patients with early treatment are estimated to develop an ADE
(AIDS-defining event), whereas 29 percent would if treatment began
later. Early treatment with HAART prolongs survival (adjusted for
quality of life) by 6.2 percent. The overall cost of early HAART
treatment is estimated at \$23,700 per quality-adjusted year of life
saved.[^66]
[Other Sexually Transmitted Diseases]{.underline}
It is difficult to know how many people are avoiding testing for STDs
despite having a sexually transmitted disease. A 1998 study by the
Kaiser Family Foundation found that the incidence of disease was 15.3
million in 1996, though there is great uncertainty due to
under-reporting.[^67] For a potentially embarrassing disease such as an
STD, seeking treatment requires trust in both the provider and the
health care system for confidentiality of such information. Greater
trust should lead to more testing and greater levels of treatment.
Earlier treatment for curable STDs can mean a decrease in morbidity and
the costs associated with complications. These include expensive
fertility problems, fetal blindness, ectopic pregnancies, and other
reproductive complications.[^68] In addition, there could be greater
overall savings if earlier treatment translates into reduced spread of
infections.
[Mental Health Treatment]{.underline}
When individuals have a better understanding of the privacy practices
that we are requiring in this proposed rule, some will be less reluctant
to seek mental health treatment. One way that individuals will receive
this information is through the notice requirement. Increased use of
mental health and services would be expected to be beneficial to the
persons receiving the care, to their families, and to society at large.
The direct benefit to the individual from treatment would include
improved quality of life, reduced disability associated with mental
conditions, reduced mortality rate, and increased productivity
associated with reduced disability and mortality. The benefit to
families would include quality of life improvements and reduced medical
costs for other family members associated with abusive behavior by the
treated individual.
The potential economic benefits associated with improving privacy of
individually identifiable health information and thus encouraging some
portion of individuals to seek initial mental health treatment or
increase service use are difficult to quantify well. Nevertheless, using
a methodology similar to the one used above to estimate potential
savings in cancer costs, one can lay out a range of possible benefit
levels to illustrate the possibility of cost savings associated with an
expansion of mental health and treatment to individuals who, due to
protections offered by the privacy regulation, might seek treatment that
they otherwise would not have. This can be illustrated by drawing upon
existing data on the economic costs of mental illness and the treatment
effectiveness of interventions.
The 1998 Substance Abuse and Mental Health Statistics Source Book from
the Substance Abuse and Mental Health Services Administration (SAMHSA)
estimates that the economic cost to society of mental illness in 1994
was about \$204.4 billion. About \$91.7 billion was due to the cost of
treatment and medical care and \$112.6 billion (1994 dollars) was due to
loss of productivity associated with morbidity and mortality and other
related costs, such as crime.[^69] Evidence suggests that appropriate
treatment of mental health disorders can result in 50-80 percent of
individuals experiencing improvements in these types of conditions.
Improvements in patient functioning and reduced hospital stays could
result in hundreds of millions of dollars in cost savings annually.
Although figures on the number of individuals who avoid mental health
treatment due to privacy concerns do not exist, some indirect evidence
is available. As noted in the cancer discussion, the 1993 Harris-Equifax
Health Information Privacy Survey found that 7 percent of respondents
reported that they or a member of their immediate family had chosen not
to seek services for a physical or mental health condition due to fear
of harm to job prospects or other life opportunities. (See above for
limitations to this data).
We assume that the proportion of people with a mental health disorder
who did not seek treatment due to fears about job prospects or other
opportunities is the same as the proportion in the Harris-Equifax survey
sample who did not seek services for physical or mental health
conditions due to the same fears (7 percent). The 1999 Surgeon General's
Report on Mental Health estimates that 28 percent of the U.S. adult
population has a diagnosable mental and/or substance abuse disorder and
20 percent of the population has a mental and/or substance abuse
disorder *for which they do not receive treatment*.[^70] Based on the
Surgeon General's Report, we estimate that 15 percent of the adult
population has a mental disorder for which they do not seek
treatment.[^71] Assuming that 7 percent of those with mental disorders
did not seek treatment due to privacy concerns, we estimate that 1.05
percent of the adult population[^72] (15 percent multiplied by 7
percent), or 2.07 million people, did not seek treatment for mental
illness due to privacy fears.
The indirect (non-treatment) economic cost of mental illness per person
with mental illness is \$2,590 (\$112.6 billion divided by 43.4 million
people with mental illness).[^73] The treatment cost of mental illness
per person with mental illness is \$2,110 (\$91.7 billion divided by
43.4 million individuals). If we assume that indirect economic costs
saved by encouraging more individuals with mental illness to enter
treatment are offset by the additional treatment costs, the net savings
is about \$480 per person.
As stated above, appropriate treatment of mental health disorders can
result in 50-80 percent of individuals experiencing improvements in
these types of conditions. Therefore, we multiply the number of
individuals with mental disorders who would seek treatment with greater
privacy protections (2.07 million) by the treatment effectiveness rate
by the net savings per effective treatment (\$480). Assuming a 50
percent success rate, this equation yields annual savings of \$497
million. Assuming an 80 percent success rate, this yields annual savings
of \$795 million.
Given the existing data on the annual economic costs of mental illness
and the rates of treatment effectiveness for these disorders, coupled
with assumptions regarding the percentage of individuals who would seek
mental health treatment with greater privacy protections, the potential
net economic benefits could range from approximately \$497 million to
\$795 million annually.
**V. FINAL REGULATORY FLEXIBILITY ANALYSIS**
**A. Introduction**
Pursuant to the Regulatory Flexibility Act 5 U.S.C. 601 et.seq., the
Department must prepare a regulatory flexibility analysis if the
Secretary certifies that a final rule would have a significant economic
impact on a substantial number of small entities.[^74]
This analysis addresses four issues: (1) the need for, and objective of,
the rule; (2) a summary of the public comments to the NPRM and the
Department's response; (3) a description and estimate of the number of
small entities affected by the rule; and (4) a description of the steps
the agency has taken to minimize the economic impact on small entities,
consistent with the law and the intent of the rule. The following
sections provide details on each of these issues. A description of the
projected reporting and record keeping requirements of the rule are
included in Section IX, below.
**B. Reasons for Promulgating the Rule**
This proposed rule is being promulgated in response to a statutory
mandate to do so under section 264 of Public Law 104-191. Additional
information on the reasons for promulgating the rule can be found in
earlier preamble discussions (see Section I. B. above).
***1. Objectives and Legal Basis***
This information can be found in earlier preamble discussions (See I. C.
and IV., above).
***2. Relevant Federal Provisions***
This information can be found in earlier preamble discussions (See I.
C., above).
**C. Summary of Public Comments**
The Department received only a few comments regarding the Initial
Regulatory Flexibility Analysis (IRFA) contained in the NPRM. A number
of commenters argued that the estimates IRFA were too low or incomplete.
The estimates were incomplete to the extent that a number of significant
policy provisions in the proposal were not estimated because of too
little information at the time. In the final IRFA we have estimates for
these provisions. As for the estimates being too low, the Department has
sought as much information as possible. The methodology employed for
allocating costs to the small business sectors is explained in the
following section.
Most of the other comments pertaining to the IRFA criticized specific
estimates in the NPRM. Generally, the commenters argued that certain
cost elements were not included in the cost estimates presented in the
NPRM. The Department has expanded our description of our data and
methodology in both the final RIA and this final RFA to try to clarify
the data and assumptions made and the rationale for using them.
Finally, a number of commenters suggested that small entities be
exempted from coverage from the final rule, or that they be given more
time to comply. As the Department has explained in the Response to
Comment section above, such changes were considered but rejected. Small
entities constitute the vast majority of all entities that are covered;
to exempt them would essentially nullify the purpose of the rule.
Extensions were also considered but rejected. The rule does not take
effect for two years, which is ample time for small entities to learn
about the rule and make the necessary changes to come into compliance.
**D. Economic Effects on Small Entities**
***1. Number and Types of Small Entities Affected***
The Small Business Administration defines small businesses in the health
care sector as those organizations with less than \$5 million in annual
revenues. Nonprofit organizations are also considered small
entities;[^75] however, individuals and states are not included in the
definition of a small entity. Similarly, small government jurisdictions
with a population of less than 50,000 are considered small
entities.[^76]
Small businesses in the health care sector affected by this rule may
include such businesses as: nonprofit health plans, hospitals, and
skilled nursing facilities (SNFs); small businesses providing health
coverage; small physician practices; pharmacies; laboratories; durable
medical equipment (DME) suppliers; health care clearinghouses; billing
companies; and vendors that supply software applications to health care
entities.
The U.S. Small Business Administration reports that as of 1997, there
were 562,916 small health care entities[^77] classified within the SIC
codes we have identified as being covered establishments (Table A).
**Table A.\--Number of Health Care Establishments That Meet SBA Size
Standards, 1997^1^**
-----------------------------------------------------------------------------------------------------
**Standard **Industry** **Total Number of **Number of **% of
Industrial Code Health Care Establishments Establishments
(SIC)** Establishments** that Meet SBA that Meet SBA
Size Size
Standards^2^ or Standards^2^ or
RFA non- profit RFA non-profit
standard** standard**
------------------- ---------------------------- ------------------ ---------------- ----------------
5910 Drug Stores & Proprietary 48,147 23,923 49.7%
Stores
6320 Accident & Health Insurance 8,083 665 8.2%
& Medical Service Plans (SIC
6320), Self-Insured/ Self
Administered (no SIC), Third
Party Administrators (no
SIC)^3^
7352 Medical Equipment Rental and 3,346 1,836 54.9%
Leasing
8010 Offices & Clinics Of Doctors 190,233 170,962 89.9%
Of Medicine
8020 Offices & Clinics Of 115,020 113,864 99.0%
Dentists
8030 Offices & Clinics Of Doctors 9,143 8,850 96.8%
Of Osteopathy
8040 Offices & Clinics Of Other 89,482 86,596 96.8%
Health Practitioners
8050 Nursing & Personal Care 33,178 17,727 53.4%
Facilities
8060 Hospitals 6,991 3,485 49.8%
8070 Medical & Dental 17,586 13,015 74.0%
Laboratories
8080 Home Health Care Services 19,562 12,841 65.6%
8090 Miscellaneous Health & 22,145 11,219 50.7%
Allied Services
n/a Fully Insured ERISA^2^ 2,125,000 0 NA
n/a Institutional Review Boards 450,000 0 NA
(IRB)^2^
n/a Total^2^ 562,916 464,983 82.6%
1 Source: Office of
Advocacy, U.S.
Small Business
Administration,
from data provided
by the Bureau of
the Census,
Statistics of U.S.
Businesses, 1997.
Establishments that
have less than
\$5,000,000 in
annual revenue are
considered small
businesses here, as
are non-profit
establishments
(regardless of
revenue). We have
non-profit data for
the following SICs:
8050, 8060, and
8080 and have
included the number
of non-profits in
each category into
the table.
^2^ We have not
included the number
of fully insured
ERISA plans or
institutional
review boards (IRB)
in the total number
of health care
establishments or
the number of
establishments that
meet SBA standards
for small entities,
since these are not
separate businesses
with SIC codes and
we do not have
sufficient data to
impute revenues to
them.
^3^ We have
included
self-insured,
self-administered
plans and third
party
administrators in
the total number of
health plans, even
though neither has
individual SIC
codes because we
have the ability to
impute revenues to
them. Therefore,
the number of
health plans in SIC
6320 is greater
than the figure
usually reported in
the Statistics of
U.S. Businesses.
-----------------------------------------------------------------------------------------------------
These small businesses represent 82.6% of all health care establishments
examined.[^78] Small businesses represent a significant portion of the
total number of health care establishments but a small portion of the
revenue stream for all health care establishments. In 1997, the small
health care businesses represented generated approximately \$430 billion
in annual receipts, or 30.2% of the total revenue generated by health
care establishments (Table B).[^79] The following sections provide
estimates of the number of small health care establishments that will be
required to comply with the rule. Note, however, that the SBA's
published annual receipts of health care industries differ from the
National Health Expenditure data that the Health Care Financing
Administration (HCFA) maintains. These data do not provide the specific
revenue data required for a RFA; only the SBA data has the requisite
establishment and revenue data for this analysis.
**Table B.\--Annual Receipts of Health Care Entities, 1997^1^**
--------------------------------------------------------------------------------------------------------------------
**Standard Industrial Code **Industry** **Total Revenue** **Revenue Generated **% of Total
(SIC)** by Small Entities** Revenue
Generated by
Small
Entities**
-------------------------------- ---------------------------- --------------------- ------------------- ------------
5910 Drug Stores & Proprietary \$100,302,441,000 \$25,620,978,000 25.5%
Stores
6320 Accident & Health Insurance \$512,111,493,027 \$657,074,000 0.1%
& Medical Service Plans (SIC
6320), Self-Insured/ Self
Administered (no SIC), Third
Party Administrators (no
SIC)2
*7352* Medical Equipment Rental & \$4,040,646,000 \$1,193,345,000 29.5%
Leasing
*8010* Offices & Clinics Of Doctors \$182,148,148,000 \$105,334,031,000 57.8%
Of Medicine
*8020* Offices & Clinics Of \$48,766,434,000 \$47,218,844,000 96.8%
Dentists
*8030* Offices & Clinics Of Doctors \$4,613,192,000 \$4,039,868,000 87.6%
Of Osteopathy
*8040* Offices & Clinics Of Other \$28,110,189,000 \$23,170,899,000 82.4%
Health Practitioners
*8050* Nursing & Personal Care \$77,166,537,000 \$24,484,098,431 31.7%
Facilities
*8060* Hospitals \$382,540,791,000 \$172,552,388,454 45.1%
*8070* Medical & Dental \$19,872,150,000 \$6,862,628,000 34.5%
Laboratories
*8080* Home Health Care Services \$31,061,036,000 \$12,085,755,906 38.9%
*8090* Miscellaneous Health & \$35,034,774,000 \$6,812,006,000 19.4%
Allied Services
*N/A* Total Receipts \$1,425,767,831,027 \$430,031,915,791 30.2%
1 Source: Office of Advocacy,
U.S. Small Business
Administration, from data
provided by the Bureau of the
Census, Statistics of U.S.
Businesses, 1997. Entities that
have less than \$5,000,000 in
annual revenue are considered
small businesses here, as are
non-profit entities (regardless
of revenue). We have non-profit
data for the following SICs:
8050, 8080, and 8060 and have
included the number of
non-profits in each category
into the table.
2 We have included
self-insured/self-administered
plans and third party
administrators in the total
number of health plans, even
though neither has individual
SIC codes because we have the
ability to impute revenues to
them.
--------------------------------------------------------------------------------------------------------------------
The Small Business Administration reports that approximately 74 percent
of the 18,000 medical laboratories and dental laboratories in the U.S.
are small entities.[^80] Furthermore, based on SBA data, 55 percent of
the 3,300 durable medical equipment suppliers that are not part of drug
and proprietary stores in the U.S. are small entities. Over 90 percent
of health practitioner offices are small businesses.[^81] Doctor offices
(90%), dentist offices (99%), osteopathy (97%) and other health
practitioner offices (97%) are primarily considered small businesses.
There are also a number of hospitals, home health agencies, non-profit
nursing facilities, and skilled nursing facilities that will be affected
by the proposed rule. According to
the American Hospital Association, there are approximately 3,131
nonprofit hospitals nationwide. Additionally, there are 2,788 nonprofit
home health agencies in the U.S. and the Health Care Financing
Administration reports that there are 591 nonprofit nursing facilities
and 4,280 nonprofit skilled nursing facilities.[^82]
Some contractors that are not covered entities but that work with
covered health care entities will be required to adopt policies and
procedures to protect information. We do not expect that the additional
burden placed on contractors will be significant. We have not estimated
the effect of the proposed rule on these entities because we cannot
reasonably anticipate the number or type of contracts affected by the
proposed rule. We also do not know the extent to which contractors would
be required to modify their policy practices as a result of the rule.
***2. Activities and Costs Associated with Compliance***
This section summarizes specific activities that covered entities must
undertake to comply with the rule's provisions and options considered by
the Department that would reduce the burden to small entities. In
developing this rule, the Department considered a variety of
alternatives for minimizing the economic burden that it will create for
small entities. We did not exempt small businesses from the rule because
they represent such a large and critical proportion of the health care
industry (82.6 percent); a significant portion of individually
identifiable health information is generated or held by these small
businesses.
The guiding principle in our considerations of how to address the burden
on small entities has been to make provisions performance rather than
specification oriented--that is, the rule states the standard to be
achieved but allows institutions flexibility to determine how to achieve
the standard within certain parameters. Moreover, to the extent
possible, we have allowed entities to determine the extent to which they
will address certain issues. This ability to adapt provisions to
minimize burden has been addressed in the regulatory impact analysis
above, but it will be briefly discussed again in the following section.
Before discussing specific provisions, it is important to note some of
the broader questions that were addressed in formulating this rule. The
Department considered extending the compliance period for small entities
but concluded that it did not have the legal authority to do so (see
discussion above). The rule, pursuant to HIPAA, creates an extended
compliance time of 36 months (rather than 24 months) only for small
health plans and not for other small entities. The Department also
considered giving small entities longer response times for time limits
set forth in the rule, but decided to establish standard time limits
that we believe are reasonable for covered entities of all sizes, with
the understanding that larger entities may not need as much time as they
have been allocated in certain situations. This permits each covered
entity the flexibility to establish policies regarding time limits that
are consistent with the entity's current practices.
Although we considered the needs of small entities during our
discussions of all provisions for this final rule, we are highlighting
the most significant discussions in the following sections:
***Scalability***
Wherever possible, the final rule provides a covered entity with
flexibility to create policies and procedures that are best suited to
the entity's current practices in order to comply with the standards,
implementation specifications, and requirements of the rule. This allows
the covered entity to assess its own needs in devising, implementing,
and maintaining appropriate privacy policies, procedures, and
documentation to address these regulatory requirements. It also will
allow a covered entity to take advantage of developments and methods for
protecting privacy that will evolve over time in a manner that is best
suited to that institution. This approach allows covered entities to
strike a balance between protecting privacy of individually identifiable
health information and the economic cost of doing so within prescribed
boundaries set forth in the rule. Health care entities must consider
both factors when devising their privacy solutions. The Department
assumes that professional and trade associations will provide guidance
to their members in understanding the rule and providing guidance on how
they can best achieve compliance. This philosophy is similar to the
approach in the Transactions Rule.
The privacy standard must be implemented by all covered entities,
regardless of size. However, we believe that the flexible approach under
this rule is more efficient and appropriate then a single approach to
safeguarding health information privacy. For example, in a small
physician practice, the office manager might be designated to serve as
the privacy official as one of many of her duties. In a large health
plan, the privacy official position may require more time and greater
privacy experience, or the privacy official may have the regular support
and advice of a privacy staff or board. The entity can decide how to
implement this privacy official requirement based on the entity's
structure and needs.
The Department decided to use this scaled approach to minimize the
burden on all entities, with an emphasis on small entities. The varying
needs and capacities of entities should be reflected in the policies and
procedures adopted by the organization and the overall approach it takes
to achieve compliance.
***Minimum Necessary***
> The "minimum necessary" policy in the final rule has essentially three
> components: first,
it does not pertain to certain uses and disclosures including
treatment-related exchange of information among health care providers;
second, for disclosures that are made on a routine basis, such as
insurance claims, a covered entity is required to have policies and
procedures governing such exchanges (but the rule does not require a
case-by-case determination in such cases); and third, providers must
have a process for reviewing non-routine requests on a case-by-case
basis to assure that only the minimum necessary information is
disclosed. The final rule makes changes to the NPRM that reduce the
burden of compliance on small businesses.
Based on public comments and subsequent fact-finding, the Department
sought to lessen the burden of this provision. The NPRM proposed
applying the minimum necessary standard to disclosures to providers for
treatment purposes and would have required individual review of all uses
of protected health information. The final rule exempts disclosures of
protected health information from a covered entity to a health care
provider for treatment from the minimum necessary provision and
eliminates the case-by-case determinations that would have been
necessary under the NPRM. The Department has concluded that the
requirements of the final rule are similar to the current practice of
most health care providers. For standard disclosure requests, for
example, providers generally have established procedures. Under the
final rule providers will have to have policies and procedures to
determine the minimum amount of protected health information to disclose
for standard disclosure requests as well, but may need to review and
revise existing procedures to make sure they are consistent with the
final rule. For non-routine disclosures, providers have indicated that
they currently ask questions to discern how much information should be
disclosed. In short, the minimum necessary requirements of this rule are
similar to current practice, particularly among small providers.
***Policy and Procedures***
The rule requires that covered entities develop and document policies
and procedures with respect to protected health information to establish
and maintain compliance with the regulation. Through the standards,
requirements, and implementation specifications, we are proposing a
framework for developing and documenting privacy policies and procedures
rather than adopting a rigid, prescriptive approach to accommodate
entities of different sizes, type of activities, and business practices.
Small providers will be able to develop more limited policies and
procedures under the rule, than will large providers and health plans,
based on the volume of protected health information. We also expect that
provider and health plan associations will develop model policies and
procedures for their members, which will reduce the burden on small
businesses.
***Privacy Official***
The rule requires covered entities to designate a privacy official who
will be responsible for the development and implementation of privacy
policies and procedures. The implementation of this requirement may vary
based on the size of the entity. For example, a small physician's
practice might designate the office manager as the privacy official in
addition to her broader administrative responsibilities. Once the
privacy official has been trained, the time required to accomplish the
duties imposed on such person is not likely to be much more than under
current practice. Therefore, the requirement imposes a minimal burden on
small businesses.
***Internal Complaints***
The final rule requires covered entities to have an internal process for
individuals to make complaints regarding the covered entities' privacy
policies and procedures required by the rule and its compliance with
such policies. The requirement includes identifying a contact person or
office responsible for receiving complaints and documenting all
complaints received and the disposition of such complaints, if any. The
covered entity only is required to receive and document a complaint (the
complaint can be oral or in writing), which should take a short amount
of time. The Department believes that complaints about a covered
entity's privacy policies and procedures will be uncommon. Thus, the
burden on small businesses should be minimal.
***Training***
In developing the NPRM, the Department considered a number of
alternatives for training, including requiring specific training
materials, training certification, and periodic retraining. In the NPRM,
the Department recommended flexibility in the materials and training
method used, but proposed recertification every three years and
retraining in the event of material changes in policy.
Based on public comment, particularly from small businesses, the
Department has lessened the burden in the final rule. As in the
proposal, the final rule requires all employees who are likely to have
contact with protected health information to be trained. Covered
entities will have to train employees by the compliance date specific to
the type of covered entity and train new employees within a reasonable
time of initial employment. In addition, a covered entity will have to
train each member of its workforce whose functions are affected by a
material change in the policies or procedures of such entity. However,
the final rule leaves to the employer the decisions regarding the nature
and method of training to achieve this requirement. The Department
expects a wide variety of options to be made available by associations,
professional groups, and vendors. Methods might include classroom
instruction, videos, booklets, or brochures tailored to particular
levels of need of workers and employers. Moreover, the recertification
requirement of the NPRM has been dropped to ease the burden on small
entities.
***Consent***
The NPRM proposed prohibiting covered entities from requiring
individuals to provide written consent for the use and disclosure of
protected health information for treatment, payment, and health care
operations purposes. The final rule requires certain health care
providers to obtain written consent before using or disclosing protected
health information for treatment, payment, and health care operations,
with a few exceptions. This requirement was included in the final rule
in response to comments that this reflects current practice of health
care providers health care providers with direct treatment
relationships. Because providers are already obtaining such consent,
this requirement represents a minimal burden.
***Notice of Privacy Rights***
The rule requires covered entities to prepare and make available a
notice that informs individuals about uses and disclosures of protected
health information that may be made by the covered entity and that
informs of the individual's rights and covered entity's legal duties
with respect to protected health information. The final rule makes
changes to the NPRM that reduce the burden of this provision on covered
entities and allows flexibility. The NPRM proposed that the notice
describe the uses and disclosures of information that the entity
*expected to make* without individual authorization. The final rule only
requires that the notice describe uses and disclosures that the entity
is *permitted or required to make under the rule* without an
individual's written consent or authorization. This change will allow
entities to use standardized notice language within a given state, which
will minimize the burden of each covered entity preparing a notice.
Professional associations may develop model language to assist entities
in developing notices required by the rule. While the final rule
specifies minimum notice requirements, it allows entities flexibility to
add more detail about a covered entity's privacy policies.
The NPRM also proposed that health plans distribute the notice every
three years. The final rule reduced this burden by requiring health
plans (in addition to providing notice to individuals at enrollment and
prior to the compliance date of this rule) to inform individuals at
least once every three years about the availability of the notice and
how to obtain a copy rather than to distribute a copy of the notice.
In discussing the requirement for covered entities to prepare and make
available a notice, we considered exempting small businesses (83 percent
of entities) or extremely small entities (fewer than 10 employees). The
Department decided that informing consumers of their privacy rights and
of the activities of covered entities with which they conduct business
was too important a goal of this rule to exempt any entities.
In addition to requiring a basic notice, we considered requiring a
longer more detailed notice that would be available to individuals on
request. However, we decided that it would be overly burdensome to all
entities, especially small entities, to require two notices.
We believe that the proposed rule appropriately balances the benefits of
providing individuals with information about uses and disclosures of
protected health information with covered entities' need for flexibility
in describing such information.
***Access to Protected Health Information***
The public comments demonstrate that inspection and copying of
individually identifiable health information is wide-spread today.
Individuals routinely request copies of such information, in whole or in
part, for purposes that include providing health information to another
health care provider or as part of legal proceedings. The amount of
inspection and copying of individually identifiable health information
that occurs for these purposes is not expected to change as a result of
the final regulation.
The final regulation establishes the right of individuals to inspect and
copy protected health information about them. Although this is an
important right, the Department does not expect it to result in dramatic
increases in requests from individuals. We assume that most health care
providers currently have procedures for allowing patients to inspect and
copy this information. The economic impact on small businesses of
requiring covered entities to provide individuals with access to
protected health information should be relatively small. Moreover,
entities can recoup the costs of copying such information by charging
reasonable cost-based fees.
***Amendments to Protected Health Information***
Many health care providers and health plans currently make provisions to
help patients expedite amendments and corrections of their medical
record where appropriate. If an error exists, both the patient and the
health care provider or health plan benefit from the correction.
However, as with inspection and copying, a person's right to request
amendment and correction of individually identifiable health information
about them is not guaranteed by all states. Based on these assumptions,
the Department concludes that the principal economic effect of the final
rule will be to expand the right to request amendments to protected
health information held by health plans and covered health care
providers to those who are not currently granted such right by state
law. In addition, the rule may draw additional attention to the issue of
record inaccuracies and stimulate patient demand for amendment of
medical records.
Under the final regulation, if an individual requests an amendment to
protected health information about him or her, the health care provider
must either accept the amendment or provide the individual with the
opportunity to submit a statement disagreeing with the denial. We expect
the responses to requests will vary: sometimes an assistant will only
make the appropriate notation in the record, requiring only a few
minutes; other times a health care provider or manager will review the
request and make changes if appropriate, which may require as much as an
hour.
Unlike inspections, which currently occur in a small percentage of
cases, fact-finding suggests that individuals rarely seek to amend their
records today, but the establishment of this right in the rule may spur
more requests, including among those who in the past would have only
sought to inspect their records. Nevertheless, we expect that the
absolute number of additional amendment requests caused by the rule to
be small (about 200,000 per year spread over more than 600,000
entities), which will impose only a minor burden on small businesses.
***Accounting for Disclosures***
The rule grants individuals the right to receive an accounting of
disclosures made by a health care provider or plan for purposes other
than treatment, payment, or health care operations, with certain
exceptions such as disclosures to the individual. The individual may
request an accounting of disclosures made up to six years prior to the
request. In order to fulfill such requests, covered health care
providers and health plans may track disclosures by making a notation in
the individual's medical record regarding the (manual or electronic)
when a disclosure is made. We have learned through fact-finding that
some health care providers currently track various types of disclosures.
Moreover, the Department does not expect many individuals will request
an accounting of disclosures. Thus, this requirement will impose a minor
burden on small businesses.
***De-Identification of Information***
In this rule, the Department allows covered entities to determine that
health information is de-identified (i.e. that it is not individually
identifiable health information), if certain conditions are met.
Moreover, information that has been de-identified in accordance with the
rule is not considered individually identifiable information and may be
used or disclosed without regard to the requirements of the regulation.
The covered entity may assign a code or other means of record
identification to allow de-identified information to be re-identified if
requirements regarding derivation and security are met.
As with other components of this rule, the approach used to remove
identifiers from data can be scaled to the size of the entity.
Individually identifiable health information can be de-identified in one
of two ways; by either removing each of the identifiers listed in the
rule or by engaging in a statistical and scientific analysis to
determine that information is very unlikely to identify an individual.
Small entities without the resources to conduct such an analysis t can
create de-identified information by removing the full list of possible
identifiers set forth in this regulation. Unless the covered entity
knows that the information could still identify an individual, the
requirement of this rule would be fulfilled. However, larger, more
sophisticated covered entities may choose to determine independently
what information needs to be removed based on sophisticated statistical
and scientific analysis.
Efforts to remove identifiers from information are optional. If a
covered entity can not use or disclose protected health information for
a particular purpose but believes that removing identifiers is
excessively burdensome, it can choose not to release the protected
health information, or it can seek an authorization from individuals for
the use or disclosure of protected health information including some or
all of the identifiers.
Finally, as discussed in the Regulatory Impact Analysis, the Department
believes that very few small entities engage in de-identification
currently. Fewer small entities are expected to engage in such activity
in the future because the increasing trend toward computerization of
large record sets will result in de-identification being performed by
relatively few firms or associations over time. We expect that a small
covered entity will find it more efficient to contract with specialists
in large firms to de-identify protected health information. Larger
entities are more likely to have both the electronic systems and the
volume of records that will make them attractive for this business.
***Monitoring Business Associates***
The final rule requires a covered entity with a business associate to
have a written contract or other arrangement that documents satisfactory
assurance that the business associate will appropriately safeguard
protected health information. The Department expects business associate
contracts to be fairly standardized, except for language that will have
to be tailored to the specific arrangement between the parties, such as
the allowable uses and disclosures of information. The Department
assumes the standard language initially will be developed by trade and
professional associations for their members. Small health care providers
are likely to simply adopt the language or make minor modifications. The
regulation includes a requirement that the covered entity take steps to
correct, and in some cases terminate, a contract, if necessary, if they
know of violations by a business associate. This oversight requirement
is consistent with standard oversight of a contract. The Department
expects that most entities, particularly smaller ones, will utilize
standard language that restricts uses and disclosures of individually
identifiable health information their contracts with business
associates. This will limit the burden on small businesses.
The NPRM proposed that covered entities be held accountable for the uses
and disclosures of individually identifiable health information by their
business associates. An entity would have been in violation of the rule
if it knew of a breach in the contract by a business associate and
failed to cure the breach or terminate the contract. The final rule
reduces the extent to which an entity must monitor the actions of its
business associates. The entity no longer has to "ensure" that each
business associate complies with the rule's requirements. Entities will
be required to cure a breach or terminate a contract for business
associate actions only if they knew about a contract violation. The
final rule is consistent with the oversight a business would provide for
any contract, and therefore, the changes in the final rule will impose
no new significant cost for small businesses in monitoring their
business associates' behavior.
***Employers With Insured Group Health Plans***
Some group health plans will use or maintain individually identifiable
health information, particularly group health plans that are
self-insured. Also, some plan sponsors that perform administrative
functions on behalf of their group health plans may need protected
health information. The final rule permits a group health plan, or a
health insurance issuer or HMO that provides benefits on behalf of the
group health plan, to disclose protected health information to a plan
sponsor who performs administrative functions on its behalf for certain
purposes and if certain requirements are met. The plan documents must be
amended to: describe the permitted uses and disclosures of protected
health information by the plan sponsor; specify that disclosure is
permitted only upon receipt of a certification by the plan sponsor that
the plan documents have been amended and the plan sponsor agrees to
certain restrictions on the use of protected health information; and
provide for adequate firewalls to assure unauthorized personnel do not
have access to individually identifiable health information.
Some plan sponsors may need information, not to administer the group
health plan, but to amend, modify, or terminate the health plan. ERISA
case law describes such activities as settlor functions. For example a
plan sponsor may want to change its contract from a preferred provider
organization to a health maintenance organization (HMO). In order to
obtain premium information, the health plan sponsor may need to provide
the HMO with aggregate claims information. Under the rule, the health
plan sponsor can obtain summary information with certain identifiers
removed, in order to provide it to the HMO and receive a premium rate.
The Department assumes that most health plan sponsors who are small
employers (those with 50 or fewer employees) will elect not to receive
individually identifiable health information because they will have
little, if any, need for such data. Any needs that sponsors of small
group health plans may have for information can be accomplished by
receiving the information in summary form from their health insurance
issuers.
***3. The Burden on a Typical Small Business***
The Department expects small entities to face a cost burden as a result
of complying with the proposed regulation. We estimate that the burden
of developing privacy policies and procedures is lower in dollar terms
for small businesses than for large businesses, but we recognize that
the cost of implementing privacy provisions could be a larger burden to
small entities as a proportion of total revenue. Due to these concerns,
we have relied on the principle of scalability throughout the rule, and
have based our cost estimates on the expectation that small entities
will develop less expensive and less complex privacy measures that
comply with the rule than large entities.
In many cases, we have specifically considered the impact that the rule
may have on solo practitioners or rural health care providers. If a
health care provider only maintains paper records and does not engage in
any electronic transactions, the regulation would not apply to such
provider. We assume that those providers will be small health care
providers. For small health care providers that are covered health care
providers, we expect that they will not be required to change their
business practices dramatically, because we based many of the standards,
implementation specifications, and requirements on current practice and
we have taken a flexible approach to allow scalability based on a
covered entity's activities and size. In developing policies and
procedures to comply with the proposed regulation, scalability allows
entities to consider their basic functions and the ways in which
protected health information is used or disclosed. All covered entities
must take appropriate steps to address privacy concerns, and in
determining the scope and extent of their compliance activities,
businesses should weigh the costs and benefits of alternative approaches
and should scale their compliance activities to their structure,
functions, and capabilities within the requirements of the rule.
***Cost Assumptions***
To determine the cost burden to small businesses of complying with the
final rule, we used as a starting point the overall cost of the
regulation determined in the regulatory impact analysis (RIA). Then we
adopted a methodology that apportions the costs found in the RIA to
small business by using Census Bureau's Statistics of U.S. Businesses.
This Census Bureau survey contains data on the number and proportion of
establishments, by Standard Industrial Classification Code (SIC code),
that have revenues of less than \$5 million, which meets the Small
Business Administration's definition of a small business in the health
care sector. This data permitted us to calculate the proportion of the
cost of each requirement in the rule that is attributable to small
businesses. This methodology used for the regulatory flexibility
analysis (RFA) section is therefore based on the methodology used in the
(RIA), which was discussed earlier.
The businesses accounted for in the SIC codes contain three groups of
covered entities: non-hospital health care providers, hospitals, and
health plans. Non-hospital health care providers include: drug stores,
offices and clinics of doctors, dentists, osteopaths, and other health
practitioners, nursing and personal care facilities, medical and dental
laboratories, home health care services, miscellaneous health and allied
services, and medical equipment rental and leasing establishments.
Health plans include accident and health insurance and medical service
plans.
***Data Adjustments***
Several adjustments were made to the SIC code data to more accurately
determine the cost to small and non-profit businesses. For health plans
(SIC code 6320), we adjusted the SIC data to include self-insured,
self-administered health plans because these health plans are not
included in any SIC code, though they are covered entities under the
rule. Similarly, we have added third-party administrators (TPAs) into
this SIC. Although they are not covered entities, TPAs are likely to be
business associates of covered entities. For purposes of the regulatory
analyses, we have assumed that TPAs would bear many of the same costs of
the health plans to assure compliance for the covered entity. To make
this adjustment, we assumed the self-insured/self administered health
plans and TPAs have the average revenue of the health plans contained in
the SIC code, and then added those assumed revenues to the SIC code and
to the total of all health care expenditures. Moreover, we needed to
account for the cost to non-profit institutions that might receive more
than \$5 million in revenue, because all non-profit institutions are
small businesses regardless of revenue. To make this adjustment for
hospitals, nursing homes, and home health agencies, we used data on the
number of non-profit institutions from industry sources and from data
reported to HCFA. With this data, we assumed the current count of
establishments in the SIC codes includes these non-profit entities and
that non-profits have the same distribution of revenues as all
establishments reported in the applicable SIC codes. The proportions
discussed below, which determine the cost for small business, therefore
include these non-profit establishments in SIC codes 8030, 8060, and
8080.
The SIC code tables provided in this RFA do not include several
categories of businesses that are included in the total cost to small
businesses. Claims clearinghouses are not included in the table because
claims clearinghouses report their revenues under the SIC 7374 "Computer
Processing and Data Preparation," and the vast majority of businesses in
this SIC code are involved in non-medical claims data processing. In
addition, claims processing is often just one business-line of companies
that may be involved in multiple forms of data processing, and
therefore, even if the claims processing line of the business generates
less than \$5 million in revenue, the company in total may exceed the
SBA definition for a small business (the total firm revenue, not each
line of business, is the standard for inclusion). Similarly,
fully-insured ERISA health plans sponsored by employers are not
identified as a separate category in the SIC code tables because
employers in virtually all SIC codes may sponsor fully-insured health
plans. We have identified the cost for small fully-insured ERISA health
plans by using the Department of Labor definition of a small ERISA plan,
which is a plan with fewer than 100 insured participants. Using this
definition, the initial cost for small fully-insured ERISA health plans
is \$7.1 million. Finally, Institutional Review Boards (IRBs) will not
appear in a separate SIC code because IRBs are not "businesses"; rather,
they are committees of researchers who work for institutions where
medical research is conducted, such as universities or teaching
hospitals. IRB members usually serve as a professional courtesy or as
part of their employment duties and are not paid separately for their
IRB duties. Although IRBs are not "businesses" that generate revenues,
we have treated them as small business for illustrative purposes in this
RFA to demonstrate the additional opportunity costs that will be faced
by those researchers who sit on IRBs. Therefore, assuming IRBs are small
businesses, the initial costs are \$.089 million and ongoing costs are
approximately \$84.2 million over 9 years.
***The Cost Model Methodology***
The RIA model employs two basic methodologies to determine the costs to
small businesses that are covered entities. As stated above, the RFA
determines the cost to small businesses by apportioning the total costs
in the RIA using SIC code data. In places where the cost of a given
provision of the final rule is a function of the number of covered
entities, we determined the proportion of entities in each SIC code that
have less than \$5 million in revenues (see Table A). We then multiplied
this proportion by the per-entity cost estimate of a given provision as
determined in the RIA. For example, the cost of the privacy official
provision is based on the fact that each covered entity will need to
have a privacy official. Therefore, we multiplied the total cost of the
privacy official, as determined in the RIA, by the proportion of small
businesses in each SIC code to determine the small business cost. Using
hospitals for illustrative purposes, because small and non-profit
hospitals account for 50 percent of all hospitals, our methodology
assigned 50 percent of the cost to small hospitals.
We used a second, though similar, method when the cost of a given
provision in the RIA did not depend on the number of covered entities.
For example, the requirement to provide notice of the privacy policy is
a direct function of the number of patients in the health care system
because the actual number of notices distributed depends on how many
patients are seen. Therefore, for provisions like the notice
requirement, we used SIC code revenue data in a two-step process. First,
we apportioned the cost of each provision among sectors of the health
care industry by SIC code. For example, because hospital revenue
accounts for 27 percent of all health care revenue, we multiplied the
total cost of each such provision by 27 percent to determine the cost
for the hospital sector in total. Then to determine the cost for small
hospitals specifically, we calculated the proportion of revenues within
the SIC code that are attributable to small business and multiplied that
proportion by the overall cost. For example, 45.1 percent of all
hospital revenue is generated by small hospitals, therefore, the cost to
small hospitals was assumed to account for 45.1 percent of all hospital
costs. Estimates, by nature are inexact. However, we feel this is a
reasonable way to determine the small business costs attributable to
this regulation given the limited data from which to work.
***Total Costs and Costs per Establishment for Small Business***
Based on the methodology described above, the total cost of complying
with the final rule in the initial year of 2003 is \$1.9 billion. The
ongoing costs to small business from 2004 to 2012 is \$9.3 billion.
Table C presents the initial and ongoing costs to small business by each
SIC code. According to this table, small doctors offices, small dentists
offices and small hospitals will face the highest cost of complying with
the final rule. However, much of the reason for the higher costs faced
by these three groups of small health care providers is explained by the
fact that there are a significant number of health care providers in
these categories.
**Table C.\--Annual Cost to Small Business of Implementing Provisions of
the Proposed Privacy Regulation**^1^
-------------------------------- ---------------------- ----------------- ----------------- ------------------
**SIC** **Industry** **Initial Cost **Ongoing Cost **Total Costs**
(Year 1)^1^** (Year 2-10)**
5910 Drug Stores & \$153,976,159 \$780,573,862 \$934,550,021
Proprietary Stores
6320 Accident & Health \$41,348,527 \$169,540,638 \$210,889,164
Insurance & Medical
Service Plans^2^
7353 Medical Equipment \$7,171,728 \$36,356,688 \$43,528,416
Rental & Leasing
8010 Offices & Clinics of \$633,033,192 \$3,209,127,747 \$3,842,160,938
Doctors of Medicine
8120 Offices & Clinics of \$283,774,344 \$1,438,578,786 \$1,722,353,130
Dentists
8030 Offices & Clinics of \$24,278,673 \$123,079,430 \$147,358,103
Doctors of Osteopathy
8040 Offices & Clinics of \$139,251,750 \$705,929,263 \$845,181,013
Other Health
Practitioners
8050 Nursing & Personal \$147,143,775 \$745,937,461 \$893,081,236
Care Facilities
8060 Hospitals \$355,459,094 \$1,199,498,063 \$1,554,957,157
8070 Medical & Dental \$41,242,809 \$209,078,203 \$250,321,012
Laboratories
8080 Home Health Care \$72,632,601 \$368,207,067 \$440,839,668
Services
8090 Misc Health & And \$40,938,582 \$207,535,943 \$248,474,525
Allied Services
n/a Fully Insured/ ERISA \$7,137,028 \$0 \$7,137,028
n/a IRBs \$88,813 \$84,162,446 \$84,251,259
n/a Total Cost For Small \$1,947,477,073 \$9,277,605,598 \$11,225,082,671
Business
^1^ Source: Office of Advocacy,
U.S. Small Business
Administration, from data
provided by the Bureau of the
Census, Statistics of U.S.
Businesses, 1997. Entities that
have less than \$5,000,000 in
annual revenue are considered
small businesses here, as are
non-profit entities (regardless
of revenue). We have non-profit
data for the following SICs:
8050, 8080, and 8060 and have
included the number of
non-profits in each category
into the table.
^2^The initial costs include all
costs in the first year,
including costs that recur in
subsequent years.
^3^ We have included
self-insured/self-administered
health plans and third party
administrators in the total
number of health plans, even
though neither has individual
SIC codes because we have the
ability to impute revenues to
them.
-------------------------------- ---------------------- ----------------- ----------------- ------------------
On a per-establishment basis, Table D demonstrates that the average cost
for small business of complying with the proposed rule in the first year
is \$4,188 per-establishment. The ongoing costs of privacy compliance
are approximately \$2,217 each year thereafter. We estimate that the
average cost of compliance in the first year for each small non-hospital
health care provider is approximately 0.6 percent of per-establishment
revenues. In subsequent years, per-establishment costs about 0.3 percent
of per-establishment revenues. For small hospitals and health plans, the
per-establishment cost of compliance in the first year is 0.2 percent
and 6.3 percent of per-establishment revenues respectively. For
subsequent years, the cost is only 0.1 percent and 2.9 percent of
pre-establishment revenues respectively. These costs may be offset in
many firms by the savings realized through requirements of the
Transactions Rule.
**Table D.\--Average Annual per Establishment Privacy Costs^1^**
-------------------------------- ------------------------ ------------------ -------------------
**SIC** **Industry** **Year 1 Privacy **Average Year 2-10
Costs Per Privacy Costs per
Establishment** Establishment**
5910 Drug Stores & \$6,436 \$3,625
Proprietary Stores
6320 Accident & Health \$62,162 \$28,320
Insurance & Medical
Service Plans^2^
7353 Medical Equipment Rental \$3,906 \$2,200
& Leasing
8010 Offices & Clinics of \$3,703 \$2,086
Doctors of Medicine
8120 Offices & Clinics of \$2,492 \$1,404
Dentists
8030 Offices & Clinics of \$2,743 \$1,545
Doctors of Osteopathy
8040 Offices & Clinics of \$1,608 \$906
Other Health Practioners
8050 Nursing & Personal Care \$8,301 \$4,676
Facilities
8060 Hospitals \$101,999 \$38,244
8070 Medical & Dental \$3,169 \$1,785
Laboratories
8080 Home Health Care \$5,656 \$3,186
Services
8090 Misc Health & And Allied \$3,649 \$2,055
Services
n/a Fully Insured/ ERISA^3^ N/A N/A
n/a IRB^3^ N/A N/A
n/a Average for All Small \$4,188 \$2,217
Business
^1^ Source: Office of Advocacy,
U.S. Small Business
Administration, from data
provided by the Bureau of the
Census, Statistics of U.S.
Businesses, 1997. Entities that
have less than \$5,000,000 in
annual revenue are considered
small businesses here, as are
non-profit entities (regardless
of revenue). We have non-profit
data for the following SICs:
8050, 8080, and 8060 and have
included the number of
non-profits in each category
into the table.
^2^ We have included
self-insured/self-administered
health plans and third party
administrators in the total
number of health plans, even
though neither has individual
SIC codes because we have the
ability to impute revenues to
them.
^2^We have not included the
number of fully insured ERISA
health plans or institutional
review boards (IRB) in the total
number of health care entities
or the number of entities that
meet SMA standards for small
entities, since these are not
separate businesses with SIC
codes and we do not have
sufficient data to impute
revenues to them.
-------------------------------- ------------------------ ------------------ -------------------
Table E shows the cost to each SIC code of the major cost items of the
final rule. Listed are the top-five most costly provisions of the rule
(to small business) and then the cost of all other remaining provisions.
The costs of the most expensive five provisions represent 90 percent of
the cost of the ongoing costs to small business, while the remaining
provisions only represent 7 percent.
**Table E.\--Average Annual Ongoing Cost to Small Business of
Implementing Provisions of the Privacy Regulation, After the First
Year**^1^
------------------- --------------- --------------- -------------- -------------------- -------------- ---------------
**Industry** **Average **Average **Average **Average Annual **Average **Average
Annual Ongoing Annual Ongoing Annual Ongoing Ongoing Cost for Annual Ongoing Annual Ongoing
Cost for Cost for Cost for De-Identification, Cost for Cost for All
Privacy Minimum Disclosure per Industry Training, per Other
Official, per Necessary, per Tracking, per Sector** Industry Provisions, per
Industry Industry Industry Sector** Industry
Sector** Sector** Sector** Sector**
Drug Stores & \$37,997,168 \$30,008,085 \$3,597,262 \$3,751,011 \$4,083,677 \$7,293,227
Proprietary Stores
Accident & Health \$5,920,267 \$5,395,070 \$985,072 \$3,614,697 \$59,086 \$2,863,657
Insurance & Medical
Service plans
(including Self
Insured/ Self
Administered Health
plans, & TPAs)^2^
Medical Equipment \$1,769,789 \$1,397,683 \$167,549 \$174,710 \$190,205 \$339,696
Rental & Leasing
Offices & clinics \$156,215,538 \$123,370,486 \$14,789,213 \$15,421,311 \$16,788,984 \$29,984,217
of Doctors of
Medicine
Offices & clinics \$70,027,863 \$55,304,176 \$6,629,667 \$6,913,022 \$7,526,119 \$13,441,241
of Doctors of
Dentists
Offices & clinics \$5,991,323 \$4,731,619 \$567,210 \$591,452 \$643,907 \$1,149,982
of Doctors of
Osteopathy
Offices & clinics \$34,363,581 \$27,138,476 \$3,253,264 \$3,392,310 \$3,693,164 \$6,595,791
of Other Health
Practitioners
Nursing & Personal \$36,311,120 \$28,676,536 \$3,437,641 \$3,584,567 \$3,902,472 \$6,969,604
care Facilities
Hospitals \$25,475,393 \$56,613,285 \$19,558,912 \$14,153,321 \$309,555 \$17,167,095
Medical & Dental \$10,177,614 \$8,037,723 \$963,534 \$1,004,715 \$1,093,821 \$1,953,505
Laboratories
Home Health care \$17,923,769 \$14,155,212 \$1,696,876 \$1,769,402 \$1,926,325 \$3,440,312
Services
Misc Health & \$10,102,539 \$7,978,433 \$956,426 \$997,304 \$1,085,752 \$1,939,095
Allied Health
Services
Fully Insured/ERISA N/A N/A N/A N/A N/A \$9,351,383
IRB N/A N/A N/A N/A N/A \$0
Total \$412,275,964 \$362,806,784 \$56,602,625 \$55,367,822 \$41,303,067 \$102,488,804
^1^ Source: Office
of Advocacy, U.S.
Small Business
Administration,
from data provided
by the Bureau of
the Census,
Statistics of U.S.
Businesses, 1997.
Entities that have
less than
\$5,000,000 in
annual revenue are
considered small
businesses here, as
are non-profit
entities
(regardless of
revenue). We have
non-profit data for
the following SICs:
8050, 8080, and
8060 and have
included the number
of non-profits in
each category into
the table.
Businesses, 1997.
Entities that have
less than
\$5,000,000 in
annual revenue are
considered small
businesses here, as
are non-profit
entities
(regardless of
revenue). We have
non-profit data for
the following SICs:
8050, 8080, and
8060 and have
included the number
of non-profits in
each category into
the table.
^2^ We have
included
self-insured,
self-administered
health plans and
third party
administrators in
the total number of
health plans, even
though neither has
individual SIC
codes because we
have the ability to
impute revenues to
them.
------------------- --------------- --------------- -------------- -------------------- -------------- ---------------
**VI. UNFUNDED MANDATES**
The Unfunded Mandates Reform Act of 1995 (P.L. 104-4) requires
cost-benefit and other analyses for rules that would cost more than
\$100 million in a single year. The rule qualifies as a significant rule
under the statute. The Department has carried out the cost-benefit
analysis in sections D and E of this document, which includes a
discussion of unfunded costs to state and local governments resulting
from this regulation. In developing this regulation, the Department
adopted the least burdensome alternatives, consistent with achieving the
rule's goals.
**A. Future Costs**
The Department estimates some of the future costs of the rule in Section
E of the Preliminary Regulatory Impact Analysis of this document. The
estimates made include costs for the ten years after the effective date.
As discussed in Section E, state and local government costs will be in
the order of \$460 million in 2003 and \$2.4 billion over ten years.
Estimates for later years are not practical. The changes in technology
are likely to alter the nature of medical record-keeping, and the uses
of medical data are likely to vary dramatically over this period.
Therefore, any estimates for years beyond 2012 are not feasible.
**B. Particular regions, communities, or industrial sectors**
The rule applies to the health care industry and would, therefore,
affect that industry disproportionately. Any long-run increase in the
costs of health care services would largely be passed on to the entire
population of consumers. However, as discussed in the administrative
simplification regulation, the Transactions Rule is estimated to save
the health care industry nearly \$30 billion over essentially the same
time period. This more than offsets the costs of the Privacy Rule;
indeed, as discussed above, the establishment of consistent, national
standards for the protection of medical information is essential to
fully realize the savings from electronic transactions standards and
other advances that may be realized through "e-health" over the next
decade. Without strong privacy rules, patients and providers may be very
reluctant to fully participate in electronic and e-health opportunities.
**C. National productivity and economic growth**
The rule is not expected to substantially affect productivity or
economic growth. It is possible that productivity and growth in certain
sectors of the health care industry could be slightly lower than
otherwise because of the need to divert research and development
resources to compliance activities. The diversion of resources to
compliance activities would be temporary. Moreover, the Department
anticipates that, because the benefits of privacy are large, both
productivity and economic growth would be higher than in the absence of
the final rule. In section I.A. of this document, the Department
discusses its expectation that this rule will increase communication
among consumers, health plans, and providers and that implementation of
privacy protections will lead more people to seek health care. The
increased health of the population will lead to increased productivity
and economic growth.
**D. Full employment and job creation**
Some of the human resources devoted to delivery of health care services
will be redirected by the rule. The rule could lead to some short-run
changes in employment patterns as a result of the structural changes
within the health care industry. The growth of employment (job creation)
for the roles typically associated with the health care profession could
also temporarily change but be balanced by an increased need for those
who can assist entities with complying with this rule. Therefore, while
there could be a temporary slowing of growth in traditional health care
professions, that will be offset by a temporary increase in growth in
fields that may assist with compliance with this rule (e.g. worker
training, and management consultants).
**E. Exports**
Because the rule does not mandate any changes in products, current
export products will not be required to change in any way.
The Department consulted with state and local governments, and Tribal
governments. See sections X and XI, below.
**VII. ENVIRONMENTAL IMPACT**
The Department has determined under 21 CFR 25.30(k) that this action is
of a type that does not individually or cumulatively have a significant
effect on the human environment. Therefore, neither an environmental
assessment nor an environmental impact statement is required.
**VIII. COLLECTION OF INFORMATION REQUIREMENTS**
Under the Paperwork Reduction Act of 1995 (PRA), agencies are required
to provide a 30-day notice in the Federal Register and solicit public
comment before a collection of information requirement is submitted to
the Office of Management and Budget (OMB) for review and approval. In
order to fairly evaluate whether an information collection should be
approved by OMB, section 3506(c)(2)(A) of the PRA requires that we
solicit comment on the following issues:
· Whether the information collection is necessary and useful to carry
out the proper functions of the agency;
· The accuracy of the agency\'s estimate of the information collection
burden;
· The quality, utility, and clarity of the information to be collected;
and
· Recommendations to minimize the information collection burden on the
affected public, including automated collection techniques.
Under the PRA, the time, effort, and financial resources necessary to
meet the information collection requirements referenced in this section
are to be considered. Due to the complexity of this regulation, and to
avoid redundancy of effort, we are referring readers to Section V (Final
Regulatory Impact Analysis) above, to review the detailed cost
assumptions associated with these PRA requirements. We explicitly seek,
and will consider, public comment on our assumptions as they relate to
the PRA requirements summarized in this section.
**Section 160.204---Process for Requesting Exception Determinations**
Section 160.204 would require persons requesting to except a provision
of state law from preemption under § 160.203(a) to submit a written
request, that meets the requirements of this section, to the Secretary
to except a provision of state law from preemption under § 160.203. The
burden associated with these requirements is the time and effort
necessary for a state to prepare and submit the written request for an
exception determination to the Secretary for approval. On an annual
basis it is estimated that it will take 40 states 16 hours each to
prepare and submit a request. The total annual burden associated with
this requirement is 640 hours. The Department solicits public comment on
the number of requests and hours for others likely to submit requests.
**Section 160.306---Complaints to the Secretary**
A person who believes that a covered entity is not complying with the
applicable requirements of part 160 or the applicable standards,
requirements, and implementation specifications of Subpart E of part 164
of this subchapter may file a complaint with the Secretary. This
requirement is exempt from the PRA as stipulated under 5 CFR
1320.4(a)(2), an audit/ administrative action exemption.
**Section 160.310---Responsibilities of Covered Entities**
A covered entity must keep such records and submit such compliance
reports, in such time and manner and containing such information,
necessary to enable the Secretary to ascertain whether the covered
entity has complied or is complying with the applicable requirements of
part 160 and the applicable standards, requirements, and implementation
specifications of Subpart E of Part 164. Refer to § 164.530 for
discussion.
**Section 164.502---Uses and Disclosures of Protected Health
Information: General Rules**
A covered entity is permitted to disclose protected health information
to an individual, and is required to provide and individual with access
to protected health information, in accordance with the requirements set
forth under § 164.524. Refer to § 164.524 for discussion.
**Section 164.504---Uses and Disclosures - Organizational Requirements**
Except for disclosures of protected health information by a covered
entity that is a health care provider to another health care provider
for treatment purposes, § 164.504 requires a covered entity to maintain
documentation demonstrating that it meets the requirements set forth in
this section and to demonstrate that it has obtained satisfactory
assurance from business associates that meet the requirements of this
part with each of its business associates. The burden is 5 minutes per
entity times an annual average of 764,799 entities for a total burden of
63,733 burden hours.
**Section 164.506---Consent for Treatment, Payment, and Health Care
Operations**
Except in certain circumstances, a covered health care provider that has
a direct treatment relationship must obtain an individual's consent for
use or disclosure of protected health information for treatment,
payment, or health care operations. While this requirement is subject to
the PRA, we believe that the burden associated with this requirement is
exempt from the PRA as stipulated under 5 CFR 1320.3(b)(2).
**Section 164.508---Uses and Disclosures for Which Individual
Authorization Is Required**
Under this section, a covered entity will need to obtain a written
authorization from an individual, before it uses or discloses protected
health information of the individual if the use or disclosure is not
otherwise permitted or required under the rule without authorization.
The burden associated with these requirements is the time and effort
necessary for a covered entity to obtain written authorization prior to
the disclosure of individually identifiable health information. On an
annual basis, we estimate that it will take 764,799 entities, an annual
average burden per entity of one hour for a total annual burden of
764,799 burden hours.
**Section 164.510---Uses and Disclosures Requiring an Opportunity for
the Individual to Agree or to Object**
Section 164.510 allows, but does not require, covered entities to use or
disclose protected health information: (1) for health care institutions'
directories; and (2) to family members, close friends, or other persons
assisting in an individual's care, as well as government agencies and
disaster relief organizations conducting disaster relief activities.
This section of the rule addresses situations in which the interaction
between the covered entity and the individual is relatively informal,
and agreements may be made orally, without written authorizations for
use or disclosure. In general, to disclose protected health information
for these purposes, covered entities must inform individuals in advance
and must provide a meaningful opportunity for the individual to prevent
or restrict the disclosure. In certain circumstances, such as in an
emergency , when this informal discussion cannot practicably occur,
covered entities can make decisions about disclosure or use, in
accordance with the requirements of this section based on their
professional judgement of what is in the patient's best interest. While
these provisions are subject to the PRA, we believe that the burden
associated with this requirement is exempt from the PRA as stipulated
under 5 CFR 1320.3(b)(2).
**Section 164.512---Uses and Disclosures for which Consent, Individual
Authorization, or Opportunity to Agree or Object is Not Required**
Section 164.512 includes provisions that allow, but that do not require,
covered entities to disclose protected health information without
individual authorization for a variety of purposes which represent
important national priorities. Pursuant to § 164.512, covered entities
may disclose protected health information for specified purposes as
follows: as required by law; for public health activities; to public
officials regarding victims of abuse, neglect, or domestic violence; for
health oversight; for judicial and administrative proceedings; for law
enforcement; for specified purposes regarding decedents; for organ
donation and transplantation; for research; to avert an imminent threat
to health or safety; for specialized government functions (such as for
intelligence and national security activities); and to comply with
workers' compensation laws. While these provisions are subject to the
PRA, we believe that the burden associated with this requirement is
exempt from the PRA as stipulated under 5 CFR 1320.3(b)(2).
For research, if a covered entity wants to use or disclose protected
health information without individual authorization, it must obtain
documentation that a waiver, in whole or in part, of the individual
authorization required by § 164.508 for use or disclosure of protected
health information has been approved by either an Institutional Review
Board (IRB), established in accordance with 7 CFR 1c.107, 10 CFR
745.107, 14 CFR 1230.107, 15 CFR 27.107, 16 CFR 1028.107, 21 CFR 56.107,
22 CFR 225.107, 28 CFR 46.107, 32 CFR 219.107, 34 CFR 97.107, 38 CFR
16.107, 40 CFR 26.107, 45 CFR 46.107, 45 CFR 690.107, or 49 CFR 11.107;
or a privacy board. The burden associated with these requirements is the
time and effort necessary for a covered entity to maintain documentation
demonstrating that they have obtained IRB or privacy board approval,
which meet the requirements of this section. On an annual basis it is
estimated that these requirements will affect 113,524 IRB reviews. We
further estimate that it will take an average of 5 minutes per review to
meet these requirements on an annual basis. Therefore, the total
estimated annual burden associated with this requirement is 9,460 hours.
**Section 164.514---Other Procedural Requirements Relating to Uses and
Disclosures of Protected Health Information**
Prior to any disclosure permitted by this subpart, a covered entity must
verify the identity and authority of persons requesting protected health
information, if the identity or authority of such person is not known to
the covered entity, and obtain any documentation, statements, or
representations from the person requesting the protected health
information that is required as a condition of the disclosure. In
addition, a covered entity must retain any signed consent pursuant to §
164.506 and any signed authorization pursuant to § 164.508 for
documentation purposes as required by § 164.530(j). This requirement is
exempt from the PRA as stipulated under 5 CFR 1320.4(a)(1) and (a)(2).
**Section 164.520---Notice of Privacy Practices for Protected Health
Information**
Except in certain circumstances set forth in this section, individuals
have a right to adequate notice of the uses and disclosures of protected
health information that may be made by the covered entity, and of the
individual's rights and the covered entity's legal duties with respect
to protected health information. To comply with this requirement a
covered entity must provide a notice, written in plain language, that
includes the elements set forth in this section. For health plans, there
will be an average of 160.2 million notices each year. We assume that
the most efficient means of distribution for health plans will be to
send them out annually as part of the materials they send to current and
potential enrollees, even though it is not required by the regulation.
The number of notices per health plan per year would be about 10,570. We
further estimate that it will require each health plan, on average, only
10 seconds to disseminate each notice. The total annual burden
associated with this requirement is calculated to be 267,000 hours.
Health care providers with direct treatment relationships would provide
a copy of the notice to an individual at the time of first service
delivery to the individual, make the notice available at the service
delivery site for individuals to request and take with them, whenever
the content of the notice is revised, make the notice available upon
request and post the notice, if required by this section, and post a
copy of the notice in a location where it is reasonable to expect
individuals seeking services from the provider to be able to read the
notice. The annual number of notices disseminated by all providers is
613 million. We further estimate that it will require each health care
provider, on average, 10 seconds to disseminate each notice. This
estimate is based upon the assumption that the required notice will be
incorporated into and disseminated with other patient materials. The
total annual burden associated with this requirement is calculated to be
1 million hours.
In addition, a covered entity must document compliance with the notice
requirements by retaining copies of the notices issued by the covered
entity. Refer to § 164.530 for discussion.
**Section 164.522---Rights to Request Privacy Protection for Protected
Health Information**
Given that the burden associated with the following information
collection requirements will differ significantly, by the type and size
of health plan or health care provider, we are explicitly soliciting
comment on the burden associated with the following requirements: as
outlined and required by this section, covered entities must provide
individuals with the opportunity to request restrictions related to the
uses or disclosures of protected health information for treatment,
payment, or health care operations. In addition, covered entities must
accommodate requests for confidential communications in certain
situations.
**Section 164.524---Access of Individuals to Protected Health
Information**
As set forth in this section, covered entities must provide individuals
with access to inspect and obtain a copy of protected health information
about them in designated record sets, for so long as the protected
health information is maintained in the designated record sets. This
includes such information in a business associate's designated record
set that is not a duplicate of the information held by the health care
provider or health plan for so long as the information is maintained.
Where the request is denied in whole or in part, the covered entity must
provide the individual with a written statement of the basis for the
denial and a description of how the individual may complain to the
covered entity pursuant to the complaint procedures established in §
164.530 or to the Secretary pursuant to the procedures established in §
160.306 of this subpart. In certain cases, the covered entity must
provide the individual the opportunity to have another health care
professional review the denial. Pursuant to public comment, we estimate
that each disclosure will contain 31 pages and that 150,000 disclosures
will be made on an annual basis at three minutes per disclosure for a
total burden of 7,500 hours. Refer to section V.E. for detailed
discussion related to the costs associated with meeting these
requirements.
**Section 164.526---Amendment of Protected Health Information**
Given that burden associated with the following information collection
requirements will differ significantly, by the type and size of health
plan or health care provider, we are explicitly soliciting comment on
the burden associated with the following requirements: Individuals have
the right to request amendment of protected health information about
them in designated record sets created by a covered entity. Where the
request is denied, a covered entity must provide the individual with a
written statement of the basis for the denial and an explanation of how
the individual may pursue the matter, including how to file a complaint
with the Secretary pursuant to § 160.306 of this subpart. As
appropriate, a covered entity must identify the protected health
information in the designated record set that is the subject of the
disputed amendment and append or otherwise link the individual's request
for an amendment, the covered entity's denial of the request, the
individual's statement of disagreement, if any, and the covered entity's
rebuttal, if any, to the designated record set.
**Section 164.528---Accounting for Disclosures of Protected Health
Information**
Based upon public comment it is assumed that it will take 5 minutes per
request times 1,081,000 requests for an annual burden of 90,083 hours.
An individual may request that a covered entity provide an accounting
for disclosure for a period of time less than six years from the date of
the individual's request, as outlined in this section.
**Section 164.530---Administrative Requirements**
A covered entity must maintain such policies and procedures in written
or electronic form where policies or procedures with respect to
protected health information are required by this subpart. Where a
communication is required by this subpart to be in writing, a covered
entity must maintain such writing, or an electronic copy, as
documentation; and where an action or activity is required by this
subpart to be documented, it must maintain a written or electronic
record of such action or activity. While these requirements are subject
to the PRA, we believe the burden associated with these requirements is
exempt from the PRA as stipulated under 5 CFR 1320.3(b)(2).
We have submitted a copy of this rule to OMB for its review of the
information collection requirements in Secs. 160.204, 160.306, 160.310,
164.502, 164.504, 164.506, 164.508, 164.510, 164.512, 164.514, 164.520,
164.522, 164.524, 164.526, 164.528, and Sec. 164.530. These requirements
are not effective until they have been approved by OMB. If you comment
on any of these information collection and record keeping requirements,
please mail copies directly to the following: Health Care Financing
Administration, Office of Information Services, Division of HCFA
Enterprise Standards, Room N2-14-26, 7500 Security Boulevard, Baltimore,
MD 21244-1850. ATTN: John Burke and to the Office of Information and
Regulatory Affairs, Office of Management and Budget, Room 10235, New
Executive Office Building, Washington, DC 20503. ATTN: Allison Herron
Eydt, HCFA Desk Officer.
**IX. EXECUTIVE ORDER 13132: FEDERALISM**
The Department has examined the effects of provisions in the final
privacy regulation on the relationship between the federal government
and the states, as required by Executive Order 13132 on \"Federalism.\"
Our conclusion is that the final rule does have federalism implications
because the rule has substantial direct effects on states, on the
relationship between the national government and states, and on the
distribution of power and responsibilities among the various levels of
government. The federalism implications of the rule, however, flow from
and are consistent with the underlying statute. The statute allows us to
preempt state or local rules that provide less stringent privacy
protection requirements than federal law is consistent with this
Executive Order. Overall, the final rule attempts to balance both the
autonomy of the states with the necessity to create a federal benchmark
to preserve the privacy of personally identifiable health information.
It is recognized that the states generally have laws that relate to the
privacy of individually identifiable health information. The HIPAA
statute dictates the relationship between state law and this final rule.
Except for laws that are specifically exempted by the HIPAA statute,
state laws continue to be enforceable, unless they are contrary to Part
C of Title XI of the standards, requirements, or implementation
specifications adopted or pursuant to subpart x. However, under section
264(c)(2), not all contrary provisions of state privacy laws are
preempted; rather, the law provides that contrary provisions of state
law relating to the privacy of individually identifiable health
information that are also "more stringent" than the federal regulatory
requirements or implementation specifications will continue to be
enforceable.
Section 3(b) of Executive Order 13132 recognizes that national action
limiting the policymaking discretion of states will be imposed ". . .
only where there is constitutional and statutory authority for the
action and the national activity is appropriate in light of the presence
of a problem of national significance." Personal privacy issues are
widely identified as a national concern by virtue of the scope of
interstate health commerce. HIPAA's provisions reflect this position.
HIPAA attempts to facilitate the electronic exchange of financial and
administrative health plan transactions while recognizing challenges
that local, national, and international information sharing raise to
confidentiality and privacy of health information.
Section 3(d)(2) of the Executive Order 13132 requires the federal
government defer to the states to establish standards where possible.
HIPAA requires the Department to establish standards, and we have done
so accordingly. This approach is a key component of the final Privacy
Rule, and it adheres to Section 4(a) of Executive Order 13132, which
expressly contemplates preemption when there is a conflict between
exercising state and federal authority under federal statute. Section
262 of HIPAA enacted Section 1178 of the Social Security Act, developing
a "general rule" that state laws or provisions that are contrary to the
provisions or requirements of Part C of Title XI, or the standards or
implementation specifications adopted, or established thereunder are
preempted. Several exceptions to this rule exist, each of which is
designed to maintain a high degree of state autonomy.
Moreover, Section 4(b) of the Executive Order authorizes preemption of
state law in the federal rule making context when there is \"the
exercise of state authority is directly conflicts with the exercise of
federal authority under federal statute\*\*\*.\" Section 1178 (a)(2)(B)
of HIPAA specifically preempts state laws related to the privacy of
individually identifiable health information unless the state law is
more stringent. Thus, we have interpreted state and local laws and
regulations that would impose less stringent requirements for protection
of individually identifiable health information as undermining the
agency\'s goal of ensuring that all patients who receive medical
services are assured a minimum level of personal privacy. Particularly
where the absence of privacy protection undermines an individual's
access to health care services, both the personal and public interest is
served by establishing federal rules.
The final rule would establish national minimum standards with respect
to the collection, maintenance, access, use, and disclosure of
individually identifiable health information. The federal law will
preempt state law only where state and federal laws are "contradictory"
and the federal regulation is judged to establish "more stringent"
privacy protections than state laws.
As required by the previous Executive Order (E.O.13132), states and
local governments were given, through the notice of proposed rule
making, an opportunity to participate in the proceedings to preempt
state and local laws (Section 4(e)). The Secretary also provided a
review of preemption issues upon requests from states. In addition,
anticipating the promulgation of the Executive Order, appropriate
officials and organizations were consulted before this proposed action
is implemented (Section 3(a) of Executive Order 13132).
The same section also includes some qualitative discussion of costs that
would occur beyond that time period. Most of the costs of the proposed
rule, however, would occur in the years immediately after the
publication of a final rule. Future costs beyond the ten year period
will continue but will not be as great as the initial compliance costs.
Finally, we have considered the cost burden that this proposed rule
would impose on state and local health care programs, such as Medicaid,
county hospitals, and other state health benefits programs. As discussed
in Section E of the Regulatory Impact Analysis of this document, we
estimate state and local government costs will be in the order of \$460
million in 2003 and \$2.4 billion over ten years.
The agency concludes that the policy in this final document has been
assessed in light of the principles, criteria, and requirements in
Executive Order 13132; that this policy is not inconsistent with that
Order; that this policy will not impose significant additional costs and
burdens on the states; and that this policy will not affect the ability
of the states to discharge traditional state governmental functions.
During our consultation with the states, representatives from various
state agencies and offices expressed concern that the final regulation
would preempt all state privacy laws. As explained in this section, the
regulation would only preempt state laws where there is a direct
conflict between state laws and the regulation, and where the regulation
provides more stringent privacy protection than state law. We discussed
this issue during our consultation with state representatives, who
generally accepted our approach to the preemption issue. During the
consultation, we requested further information from the states about
whether they currently have laws requiring that providers have a "duty
to warn" family members or third parties about a patient's condition
other than in emergency circumstances. Since the consultation, we have
not received additional comments or questions from the states.
**X. EXECUTIVE ORDER 13086: CONSULTATION AND COORDINATION WITH INDIAN
TRIBAL GOVERNMENTS**
In drafting the proposed rule, the Department consulted with
representatives of the National Congress of American Indians and the
National Indian Health Board, as well as with a representative of the
self-governance Tribes. During the consultation, we discussed issues
regarding the application of Title II of HIPAA to the Tribes, and
potential variations based on the relationship of each Tribe with the
IHS for the purpose of providing health services. Participants raised
questions about the status of Tribal laws regarding the privacy of
health information.
**LIST OF SUBJECTS**
**45 CFR Part 160**
Electronic transactions, Employer benefit plan, Health, Health care,
Health facilities, Health insurance, Health records, Medicaid, Medical
research, Medicare, Privacy, Reporting and record keeping requirements.
**45 CFR Part 164**
Electronic transactions, Employer benefit plan, Health, Health care,
Health facilities, Health insurance, Health records, Medicaid, Medical
research, Medicare, Privacy, Reporting and record keeping requirements.
[Note to reader]{.underline}: This final rule is one of several proposed
and final rules that are being published to implement the Administrative
Simplification provisions of the Health Insurance Portability and
Accountability Act of 1996. 45 CFR subchapter C, consisting of Parts 160
and 162 was added at 65 FR 50365, August 17, 2000. Part 160 consists of
general provisions, Part 162 consists of the various administrative
simplification regulations relating to transactions and identifiers, and
new Part 164 consists of the regulations implementing the security and
privacy requirements of the legislation.
Dated: \_\_\_\_\_\_\_\_\_
\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_
> Donna Shalala,
>
> [Secretary]{.underline}
**BILLING CODE 4150-04M**
For the reasons set forth in the preamble, 45 CFR Subtitle A, Subchapter
C, is amended as follows:
1\. Part 160 is revised to read as follows:
**PART 160 -- GENERAL ADMINISTRATIVE REQUIREMENTS**
**Subpart A -- General Provisions**
160.101 Statutory basis and purpose.
160.102 Applicability.
160.103 Definitions.
160.104 Modifications.
**Subpart B -- Preemption of State Law**
160.201 Applicability.
160.202 Definitions.
160.203 General rule and exceptions.
160.204 Process for requesting exception determinations.
160.205 Duration of effectiveness of exception determinations.
**Subpart C -- Compliance and Enforcement**
160.300 Applicability.
160.302 Definitions.
160.304 Principles for achieving compliance.
160.306 Complaints to the Secretary.
160.308 Compliance reviews.
160.310 Responsibilities of covered entities.
160.312 Secretarial action regarding complaints and compliance reviews.
Authority: Sec. 1171 through 1179 of the Social Security Act, (42 U.S.C.
1320d-1329d-8) as added by sec. 262 of Pub. L. 104-191, 110 Stat.
2021-2031 and sec. 264 of Pub. L. 104-191 (42 U.S.C. 1320d-2(note)).
**Subpart A - General Provisions**
[§ 160.101 Statutory basis and purpose.]{.underline}
The requirements of this subchapter implement sections 1171 through 1179
of the Social Security Act (the Act), as added by section 262 of Public
Law 104-191, and section 264 of Public Law 104-191.
[§ 160.102 Applicability.]{.underline}
\(a\) Except as otherwise provided, the standards, requirements, and
implementation specifications adopted under this subchapter apply to the
following entities:
\(1\) A health plan.
\(2\) A health care clearinghouse.
\(3\) A health care provider who transmits any health information in
electronic form in connection with a transaction covered by this
subchapter.
\(b\) To the extent required under section 201(a)(5) of the Health
Insurance Portability Act of 1996, (Pub. L. 104-191), nothing in this
subchapter shall be construed to diminish the authority of any Inspector
General, including such authority as provided in the Inspector General
Act of 1978, as amended (5 U.S.C. App.).
[§ 160.103 Definitions.]{.underline}
Except as otherwise provided, the following definitions apply to this
subchapter:
*Act* means the Social Security Act.
*ANSI* stands for the American National Standards Institute.
*Business associate*: (1) Except as provided in paragraph (2) of this
definition, *business associate* means, with respect to a covered
entity, a person who:
\(i\) On behalf of such covered entity or of an organized health care
arrangement (as defined in § 164.501 of this subchapter) in which the
covered entity participates, but other than in the capacity of a member
of the workforce of such covered entity or arrangement, performs, or
assists in the performance of:
\(A\) A function or activity involving the use or disclosure of
individually identifiable health information, including claims
processing or administration, data analysis, processing or
administration, utilization review, quality assurance, billing, benefit
management, practice management, and repricing; or
\(B\) Any other function or activity regulated by this subchapter; or
\(ii\) Provides, other than in the capacity of a member of the workforce
of such covered entity, legal, actuarial, accounting, consulting, data
aggregation (as defined in § 164.501 of this subchapter), management,
administrative, accreditation, or financial services to or for such
covered entity, or to or for an organized health care arrangement in
which the covered entity participates, where the provision of the
service involves the disclosure of individually identifiable health
information from such covered entity or arrangement, or from another
business associate of such covered entity or arrangement, to the person.
\(2\) A covered entity participating in an organized health care
arrangement that performs a function or activity as described by
paragraph (1)(i) of this definition for or on behalf of such organized
health care arrangement, or that provides a service as described in
paragraph (1)(ii) of this definition to or for such organized health
care arrangement, does not, simply through the performance of such
function or activity or the provision of such service, become a business
associate of other covered entities participating in such organized
health care arrangement.
\(3\) A covered entity may be a business associate of another covered
entity.
*Compliance date* means the date by which a covered entity must comply
with a standard, implementation specification, requirement, or
modification adopted under this subchapter.
*Covered entity* means:
\(1\) A health plan.
\(2\) A health care clearinghouse.
\(3\) A health care provider who transmits any health information in
electronic form in connection with a transaction covered by this
subchapter.
*Group health plan* (also see definition of *health plan* in this
section) means an employee welfare benefit plan (as defined in section
3(1) of the Employee Retirement Income and Security Act of 1974 (ERISA),
29 U.S.C. 1002(1)), including insured and self‑insured plans, to the
extent that the plan provides medical care (as defined in section
2791(a)(2) of the Public Health Service Act (PHS Act), 42 U.S.C.
300gg-91(a)(2)), including items and services paid for as medical care,
to employees or their dependents directly or through insurance,
reimbursement, or otherwise, that:
\(1\) Has 50 or more participants (as defined in section 3(7) of ERISA,
29 U.S.C. 1002(7)); or
\(2\) Is administered by an entity other than the employer that
established and maintains the plan.
*HCFA* stands for Health Care Financing Administration within the
Department of Health and Human Services.
*HHS* stands for the Department of Health and Human Services.
*Health care* means care, services, or supplies related to the health of
an individual. *Health care* includes, but is not limited to, the
following:
\(1\) Preventive, diagnostic, therapeutic, rehabilitative, maintenance,
or palliative care, and counseling, service, assessment, or procedure
with respect to the physical or mental condition, or functional status,
of an individual or that affects the structure or function of the body;
and
\(2\) Sale or dispensing of a drug, device, equipment, or other item in
accordance with a prescription.
*Health care clearinghouse* means a public or private entity, including
a billing service, repricing company, community health management
information system or community health information system, and
"value-added" networks and switches, that does either of the following
functions:
\(1\) Processes or facilitates the processing of health information
received from another entity in a nonstandard format or containing
nonstandard data content into standard data elements or a standard
transaction.
\(2\) Receives a standard transaction from another entity and processes
or facilitates the processing of health information into nonstandard
format or nonstandard data content for the receiving entity.
*Health care provider* means a provider of services (as defined in
section 1861(u) of the Act, 42 U.S.C. 1395x(u)), a provider of medical
or health services (as defined in section 1861(s) of the Act, 42 U.S.C.
1395x(s)), and any other person or organization who furnishes, bills, or
is paid for health care in the normal course of business.
*Health information* means any information, whether oral or recorded in
any form or medium, that:
\(1\) Is created or received by a health care provider, health plan,
public health authority, employer, life insurer, school or university,
or health care clearinghouse; and
\(2\) Relates to the past, present, or future physical or mental health
or condition of an individual; the provision of health care to an
individual; or the past, present, or future payment for the provision of
health care to an individual.
*Health insurance issuer* (as defined in section 2791(b)(2) of the PHS
Act, 42 U.S.C. 300gg-91(b)(2) and used in the definition of *health
plan* in this section) means an insurance company, insurance service, or
insurance organization (including an HMO) that is licensed to engage in
the business of insurance in a State and is subject to State law that
regulates insurance. Such term does not include a group health plan.
*Health maintenance organization (HMO)* (as defined in section
2791(b)(3) of the PHS Act, 42 U.S.C. 300gg-91(b)(3) and used in the
definition of *health plan* in this section) means a federally qualified
HMO, an organization recognized as an HMO under State law, or a similar
organization regulated for solvency under State law in the same manner
and to the same extent as such an HMO.
*Health plan* means an individual or group plan that provides, or pays
the cost of, medical care (as defined in section 2791(a)(2) of the PHS
Act, 42 U.S.C. 300gg-91(a)(2)).
\(1\) *Health plan* includes the following, singly or in combination:
\(i\) A group health plan, as defined in this section.
\(ii\) A health insurance issuer, as defined in this section.
\(iii\) An HMO, as defined in this section.
\(iv\) Part A or Part B of the Medicare program under title XVIII of the
Act.
\(v\) The Medicaid program under title XIX of the Act, 42 U.S.C. 1396,
et seq.
\(vi\) An issuer of a Medicare supplemental policy (as defined in
section 1882(g)(1) of the Act, 42 U.S.C. 1395ss(g)(1)).
\(vii\) An issuer of a long-term care policy, excluding a nursing home
fixed-indemnity policy.
\(viii\) An employee welfare benefit plan or any other arrangement that
is established or maintained for the purpose of offering or providing
health benefits to the employees of two or more employers.
\(ix\) The health care program for active military personnel under title
10 of the United States Code.
\(x\) The veterans health care program under 38 U.S.C. chapter 17.
\(xi\) The Civilian Health and Medical Program of the Uniformed Services
(CHAMPUS)(as defined in 10 U.S.C. 1072(4)).
\(xii\) The Indian Health Service program under the Indian Health Care
Improvement Act, 25 U.S.C. 1601, et seq.
\(xiii\) The Federal Employees Health Benefits Program under 5 U.S.C.
8902, et seq.
\(xiv\) An approved State child health plan under title XXI of the Act,
providing benefits for child health assistance that meet the
requirements of section 2103 of the Act, 42 U.S.C. 1397, et seq.
\(xv\) The Medicare + Choice program under Part C of title XVIII of the
Act, 42 U.S.C. 1395w-21 through 1395w-28.
\(xvi\) A high risk pool that is a mechanism established under State law
to provide health insurance coverage or comparable coverage to eligible
individuals.
\(xvii\) Any other individual or group plan, or combination of
individual or group plans, that provides or pays for the cost of medical
care (as defined in section 2791(a)(2) of the PHS Act, 42 U.S.C.
300gg-91(a)(2)).
\(2\) *Health plan* excludes:
\(i\) Any policy, plan, or program to the extent that it provides, or
pays for the cost of, excepted benefits that are listed in section
2791(c)(1) of the PHS Act, 42 U.S.C. 300gg-91(c)(1); and
\(ii\) A government-funded program (other than one listed in paragraph
(1)(i)-(xvi)of this definition):
\(A\) Whose principal purpose is other than providing, or paying the
cost of, health care; or
\(B\) Whose principal activity is:
(*1*) The direct provision of health care to persons; or
(*2*) The making of grants to fund the direct provision of health care
to persons.
*Implementation specification* means specific requirements or
instructions for implementing a standard.
*Modify* or *modification* refers to a change adopted by the Secretary,
through regulation, to a standard or an implementation specification.
*Secretary* means the Secretary of Health and Human Services or any
other officer or employee of HHS to whom the authority involved has been
delegated.
*Small health plan* means a health plan with annual receipts of \$5
million or less.
*Standard* means a rule, condition, or requirement:
\(1\) Describing the following information for products, systems,
services or practices:
\(i\) Classification of components.
\(ii\) Specification of materials, performance, or operations; or
\(iii\) Delineation of procedures; or
\(2\) With respect to the privacy of individually identifiable health
information.
*Standard setting organization* (SSO) means an organization accredited
by the American National Standards Institute that develops and maintains
standards for information transactions or data elements, or any other
standard that is necessary for, or will facilitate the implementation
of, this part.
*State* refers to one of the following:
\(1\) For a health plan established or regulated by Federal law, *State*
has the meaning set forth in the applicable section of the United States
Code for such health plan.
\(2\) For all other purposes, *State* means any of the several States,
the District of Columbia, the Commonwealth of Puerto Rico, the Virgin
Islands, and Guam.
*Trading partner agreement* means an agreement related to the exchange
of information in electronic transactions, whether the agreement is
distinct or part of a larger agreement, between each party to the
agreement. (For example, a trading partner agreement may specify, among
other things, the duties and responsibilities of each party to the
agreement in conducting a standard transaction.)
*Transaction* means the transmission of information between two parties
to carry out financial or administrative activities related to health
care. It includes the following types of information transmissions:
\(1\) Health care claims or equivalent encounter information.
\(2\) Health care payment and remittance advice.
\(3\) Coordination of benefits.
\(4\) Health care claim status.
\(5\) Enrollment and disenrollment in a health plan.
\(6\) Eligibility for a health plan.
\(7\) Health plan premium payments.
\(8\) Referral certification and authorization.
\(9\) First report of injury.
\(10\) Health claims attachments.
\(11\) Other transactions that the Secretary may prescribe by
regulation.
*Workforce* means employees, volunteers, trainees, and other persons
whose conduct, in the performance of work for a covered entity, is under
the direct control of such entity, whether or not they are paid by the
covered entity.
[§ 160.104 Modifications.]{.underline}
\(a\) Except as provided in paragraph (b) of this section, the Secretary
may adopt a modification to a standard or implementation specification
adopted under this subchapter no more frequently than once every 12
months.
\(b\) The Secretary may adopt a modification at any time during the
first year after the standard or implementation specification is
initially adopted, if the Secretary determines that the modification is
necessary to permit compliance with the standard or implementation
specification.
\(c\) The Secretary will establish the compliance date for any standard
or implementation specification modified under this section.
\(1\) The compliance date for a modification is no earlier than 180 days
after the effective date of the final rule in which the Secretary adopts
the modification.
\(2\) The Secretary may consider the extent of the modification and the
time needed to comply with the modification in determining the
compliance date for the modification.
\(3\) The Secretary may extend the compliance date for small health
plans, as the Secretary determines is appropriate.
**Subpart B - Preemption of State Law**
[§160.201 Applicability]{.underline}.
The provisions of this subpart implement section 1178 of the Act, as
added by section 262 of Public Law 104-191.
[§ 160.202 Definitions.]{.underline}
For purposes of this subpart, the following terms have the following
meanings:
*Contrary*, when used to compare a provision of State law to a standard,
requirement, or implementation specification adopted under this
subchapter, means:
\(1\) A covered entity would find it impossible to comply with both the
State and federal requirements; or
\(2\) The provision of State law stands as an obstacle to the
accomplishment and execution of the full purposes and objectives of part
C of title XI of the Act or section 264 of Pub. L. 104-191, as
applicable.
*More stringent* means, in the context of a comparison of a provision of
State law and a standard, requirement, or implementation specification
adopted under subpart E of part 164 of this subchapter, a State law that
meets one or more of the following criteria:
\(1\) With respect to a use or disclosure, the law prohibits or
restricts a use or disclosure in circumstances under which such use or
disclosure otherwise would be permitted under this subchapter, except if
the disclosure is:
\(i\) Required by the Secretary in connection with determining whether a
covered entity is in compliance with this subchapter; or
\(ii\) To the individual who is the subject of the individually
identifiable health information.
\(2\) With respect to the rights of an individual who is the subject of
the individually identifiable health information of access to or
amendment of individually identifiable health information, permits
greater rights of access or amendment, as applicable; provided that,
nothing in this subchapter may be construed to preempt any State law to
the extent that it authorizes or prohibits disclosure of protected
health information about a minor to a parent, guardian, or person acting
*in loco parentis* of such minor.
\(3\) With respect to information to be provided to an individual who is
the subject of the individually identifiable health information about a
use, a disclosure, rights, and remedies, provides the greater amount of
information.
\(4\) With respect to the form or substance of an authorization or
consent for use or disclosure of individually identifiable health
information, provides requirements that narrow the scope or duration,
increase the privacy protections afforded (such as by expanding the
criteria for), or reduce the coercive effect of the circumstances
surrounding the authorization or consent, as applicable.
\(5\) With respect to recordkeeping or requirements relating to
accounting of disclosures, provides for the retention or reporting of
more detailed information or for a longer duration.
\(6\) With respect to any other matter, provides greater privacy
protection for the individual who is the subject of the individually
identifiable health information.
*Relates to the privacy of individually identifiable health information*
means, with respect to a State law, that the State law has the specific
purpose of protecting the privacy of health information or affects the
privacy of health information in a direct, clear, and substantial way.
*State law* means a constitution, statute, regulation, rule, common law,
or other State action having the force and effect of law.
[§ 160.203 General rule and exceptions.]{.underline}
A standard, requirement, or implementation specification adopted under
this subchapter that is contrary to a provision of State law preempts
the provision of State law. This general rule applies, except if one or
more of the following conditions is met:
\(a\) A determination is made by the Secretary under § 160.204 that the
provision of State law:
\(1\) Is necessary:
\(i\) To prevent fraud and abuse related to the provision of or payment
for health care;
\(ii\) To ensure appropriate State regulation of insurance and health
plans to the extent expressly authorized by statute or regulation;
\(iii\) For State reporting on health care delivery or costs; or
\(iv\) For purposes of serving a compelling need related to public
health, safety, or welfare, and, if a standard, requirement, or
implementation specification under part 164 of this subchapter is at
issue, if the Secretary determines that the intrusion into privacy is
warranted when balanced against the need to be served; or
\(2\) Has as its principal purpose the regulation of the manufacture,
registration, distribution, dispensing, or other control of any
controlled substances (as defined in 21 U.S.C. 802), or that is deemed a
controlled substance by State law.
\(b\) The provision of State law relates to the privacy of health
information and is more stringent than a standard, requirement, or
implementation specification adopted under subpart E of part 164 of this
subchapter.
\(c\) The provision of State law, including State procedures established
under such law, as applicable, provides for the reporting of disease or
injury, child abuse, birth, or death, or for the conduct of public
health surveillance, investigation, or intervention.
\(d\) The provision of State law requires a health plan to report, or to
provide access to, information for the purpose of management audits,
financial audits, program monitoring and evaluation, or the licensure or
certification of facilities or individuals.
[§ 160.204 Process for requesting exception determinations.]{.underline}
\(a\) A request to except a provision of State law from preemption under
§ 160.203(a) may be submitted to the Secretary. A request by a State
must be submitted through its chief elected official, or his or her
designee. The request must be in writing and include the following
information:
\(1\) The State law for which the exception is requested;
\(2\) The particular standard, requirement, or implementation
specification for which the exception is requested;
\(3\) The part of the standard or other provision that will not be
implemented based on the exception or the additional data to be
collected based on the exception, as appropriate;
\(4\) How health care providers, health plans, and other entities would
be affected by the exception;
\(5\) The reasons why the State law should not be preempted by the
federal standard, requirement, or implementation specification,
including how the State law meets one or more of the criteria at §
160.203(a); and
\(6\) Any other information the Secretary may request in order to make
the determination.
\(b\) Requests for exception under this section must be submitted to the
Secretary at an address that will be published in the [Federal
Register]{.underline}. Until the Secretary\'s determination is made, the
standard, requirement, or implementation specification under this
subchapter remains in effect.
\(c\) The Secretary\'s determination under this section will be made on
the basis of the extent to which the information provided and other
factors demonstrate that one or more of the criteria at § 160.203(a) has
been met.
[§ 160.205 Duration of effectiveness of exception
determinations.]{.underline}
An exception granted under this subpart remains in effect until:
\(a\) Either the State law or the federal standard, requirement, or
implementation specification that provided the basis for the exception
is materially changed such that the ground for the exception no longer
exists; or
\(b\) The Secretary revokes the exception, based on a determination that
the ground supporting the need for the exception no longer exists.
**Subpart C - Compliance and Enforcement**
[§ 160.300 Applicability.]{.underline}
This subpart applies to actions by the Secretary, covered entities, and
others with respect to ascertaining the compliance by covered entities
with and the enforcement of the applicable requirements of this part 160
and the applicable standards, requirements, and implementation
specifications of subpart E of part 164 of this subchapter.
[§ 160.302 Definitions.]{.underline}
As used in this subpart, terms defined in § 164.501 of this subchapter
have the same meanings given to them in that section.
[§ 160.304 Principles for achieving compliance.]{.underline}
\(a\) [Cooperation.]{.underline} The Secretary will, to the extent
practicable, seek the cooperation of covered entities in obtaining
compliance with the applicable requirements of this part 160 and the
applicable standards, requirements, and implementation specifications of
subpart E of part 164 of this subchapter.
\(b\) [Assistance.]{.underline} The Secretary may provide technical
assistance to covered entities to help them comply voluntarily with the
applicable requirements of this part 160 or the applicable standards,
requirements, and implementation specifications of subpart E of part 164
of this subchapter.
[§ 160.306 Complaints to the Secretary.]{.underline}
\(a\) [Right to file a complaint.]{.underline} A person who believes a
covered entity is not complying with the applicable requirements of this
part 160 or the applicable standards, requirements, and implementation
specifications of subpart E of part 164 of this subchapter may file a
complaint with the Secretary.
\(b\) [Requirements for filing complaints.]{.underline} Complaints under
this section must meet the following requirements:
\(1\) A complaint must be filed in writing, either on paper or
electronically.
\(2\) A complaint must name the entity that is the subject of the
complaint and describe the acts or omissions believed to be in violation
of the applicable requirements of this part 160 or the applicable
standards, requirements, and implementation specifications of subpart E
of part 164 of this subchapter.
\(3\) A complaint must be filed within 180 days of when the complainant
knew or should have known that the act or omission complained of
occurred, unless this time limit is waived by the Secretary for good
cause shown.
\(4\) The Secretary may prescribe additional procedures for the filing
of complaints, as well as the place and manner of filing, by notice in
the [Federal Register]{.underline}.
\(c\) [Investigation.]{.underline} The Secretary may investigate
complaints filed under this section. Such investigation may include a
review of the pertinent policies, procedures, or practices of the
covered entity and of the circumstances regarding any alleged acts or
omissions concerning compliance.
[§ 160.308 Compliance reviews.]{.underline}
The Secretary may conduct compliance reviews to determine whether
covered entities are complying with the applicable requirements of this
part 160 and the applicable standards, requirements, and implementation
specifications of subpart E of part 164 of this subchapter.
[§ 160.310 Responsibilities of covered entities.]{.underline}
\(a\) [Provide records and compliance reports.]{.underline} A covered
entity must keep such records and submit such compliance reports, in
such time and manner and containing such information, as the Secretary
may determine to be necessary to enable the Secretary to ascertain
whether the covered entity has complied or is complying with the
applicable requirements of this part 160 and the applicable standards,
requirements, and implementation specifications of subpart E of part 164
of this subchapter.
\(b\) [Cooperate with complaint investigations and compliance
reviews.]{.underline} A covered entity must cooperate with the
Secretary, if the Secretary undertakes an investigation or compliance
review of the policies, procedures, or practices of a covered entity to
determine whether it is complying with the applicable requirements of
this part 160 and the standards, requirements, and implementation
specifications of subpart E of part 164 of this subchapter.
\(c\) [Permit access to information.]{.underline} (1) A covered entity
must permit access by the Secretary during normal business hours to its
facilities, books, records, accounts, and other sources of information,
including protected health information, that are pertinent to
ascertaining compliance with the applicable requirements of this part
160 and the applicable standards, requirements, and implementation
specifications of subpart E of part 164 of this subchapter. If the
Secretary determines that exigent circumstances exist, such as when
documents may be hidden or destroyed, a covered entity must permit
access by the Secretary at any time and without notice.
\(2\) If any information required of a covered entity under this section
is in the exclusive possession of any other agency, institution, or
person and the other agency, institution, or person fails or refuses to
furnish the information, the covered entity must so certify and set
forth what efforts it has made to obtain the information.
\(3\) Protected health information obtained by the Secretary in
connection with an investigation or compliance review under this subpart
will not be disclosed by the Secretary, except if necessary for
ascertaining or enforcing compliance with the applicable requirements of
this part 160 and the applicable standards, requirements, and
implementation specifications of subpart E of part 164 of this
subchapter, or if otherwise required by law.
[§ 160.312 Secretarial action regarding complaints and compliance
reviews.]{.underline}
\(a\) [Resolution where noncompliance is indicated.]{.underline} (1) If
an investigation pursuant to § 160.306 or a compliance review pursuant
to § 160.308 indicates a failure to comply, the Secretary will so inform
the covered entity and, if the matter arose from a complaint, the
complainant, in writing and attempt to resolve the matter by informal
means whenever possible.
\(2\) If the Secretary finds the covered entity is not in compliance and
determines that the matter cannot be resolved by informal means, the
Secretary may issue to the covered entity and, if the matter arose from
a complaint, to the complainant written findings documenting the
non-compliance.
\(b\) [Resolution when no violation is found.]{.underline} If, after an
investigation or compliance review, the Secretary determines that
further action is not warranted, the Secretary will so inform the
covered entity and, if the matter arose from a complaint, the
complainant in writing.
2\. A new Part 164 is added to read as follows:
**PART 164 -- SECURITY AND PRIVACY**
**Subpart A -- General Provisions**
Sec.
164.102 Statutory basis.
164.104 Applicability.
164.106 Relationship to other parts.
**Subparts B-D -- \[Reserved\]**
**Subpart E -- Privacy of Individually Identifiable Health Information**
164.500 Applicability.
164.501 Definitions.
164.502 Uses and disclosures of protected health information: general
rules.
164.504 Uses and disclosures: organizational requirements.
164.506 Consent for uses or disclosures to carry out treatment, payment,
and health care operations
164.508 Uses and disclosures for which an authorization is required.
164.510 Uses and disclosures requiring an opportunity for the individual
to agree or to object.
164.512 Uses and disclosures for which consent, an authorization, or
opportunity to agree or object is not required.
164.514 Other requirements relating to uses and disclosures of protected
health information.
164.520 Notice of privacy practices for protected health information.
164.522 Rights to request privacy protection for protected health
information.
164.524 Access of individuals to protected health information.
164.526 Amendment of protected health information.
164.528 Accounting of disclosures of protected health information.
164.530 Administrative requirements.
164.532 Transition requirements.
164.534 Compliance dates for initial implementation of the privacy
standards.
Authority: 42 U.S.C. 1320d-2 and 1320d-4, sec. 264 of Pub. L. 104-191,
110 Stat. 2033-2034(42 U.S.C. 1320(d-2(note)).
**Subpart A\--General Provisions**
[§ 164.102 Statutory basis.]{.underline}
The provisions of this part are adopted pursuant to the Secretary\'s
authority to prescribe standards, requirements, and implementation
standards under part C of title XI of the Act and section 264 of Public
Law 104-191.
[§ 164.104 Applicability.]{.underline}
Except as otherwise provided, the provisions of this part apply to
covered entities: health plans, health care clearinghouses, and health
care providers who transmit health information in electronic form in
connection with any transaction referred to in section 1173(a)(1) of the
Act.
[§ 164.106 Relationship to other parts.]{.underline}
In complying with the requirements of this part, covered entities are
required to comply with the applicable provisions of parts 160 and 162
of this subchapter.
**Subpart B-D\--\[Reserved\]**
**Subpart E - Privacy of Individually Identifiable Health Information**
[§ 164.500 Applicability.]{.underline}
\(a\) Except as otherwise provided herein, the standards, requirements,
and implementation specifications of this subpart apply to covered
entities with respect to protected health information.
\(b\) Health care clearinghouses must comply with the standards,
requirements, and implementation specifications as follows:
\(1\) When a health care clearinghouse creates or receives protected
health information as a business associate of another covered entity,
the clearinghouse must comply with:
\(i\) Section 164.500 relating to applicability;
\(ii\) Section 164.501 relating to definitions;
\(iii\) Section 164.502 relating to uses and disclosures of protected
health information, except that a clearinghouse is prohibited from using
or disclosing protected health information other than as permitted in
the business associate contract under which it created or received the
protected health information;
\(iv\) Section 164.504 relating to the organizational requirements for
covered entities, including the designation of health care components of
a covered entity;
\(v\) Section 164.512 relating to uses and disclosures for which
consent, individual authorization or an opportunity to agree or object
is not required, except that a clearinghouse is prohibited from using or
disclosing protected health information other than as permitted in the
business associate contract under which it created or received the
protected health information;
\(vi\) Section 164.532 relating to transition requirements; and
\(vii\) Section 164.534 relating to compliance dates for initial
implementation of the privacy standards.
\(2\) When a health care clearinghouse creates or receives protected
health information other than as a business associate of a covered
entity, the clearinghouse must comply with all of the standards,
requirements, and implementation specifications of this subpart.
\(c\) The standards, requirements, and implementation specifications of
this subpart do not apply to the Department of Defense or to any other
federal agency, or non-governmental organization acting on its behalf,
when providing health care to overseas foreign national beneficiaries.
[§ 164.501 Definitions.]{.underline}
As used in this subpart, the following terms have the following
meanings:
*Correctional institution* means any penal or correctional facility,
jail, reformatory, detention center, work farm, halfway house, or
residential community program center operated by, or under contract to,
the United States, a State, a territory, a political subdivision of a
State or territory, or an Indian tribe, for the confinement or
rehabilitation of persons charged with or convicted of a criminal
offense or other persons held in lawful custody. *Other persons held in
lawful custody* includes juvenile offenders adjudicated delinquent,
aliens detained awaiting deportation, persons committed to mental
institutions through the criminal justice system, witnesses, or others
awaiting charges or trial.
*Covered functions* means those functions of a covered entity the
performance of which makes the entity a health plan, health care
provider, or health care clearinghouse.
*Data aggregation* means, with respect to protected health information
created or received by a business associate in its capacity as the
business associate of a covered entity, the combining of such protected
health information by the business associate with the protected health
information received by the business associate in its capacity as a
business associate of another covered entity, to permit data analyses
that relate to the health care operations of the respective covered
entities.
*Designated record set* means:
\(1\) A group of records maintained by or for a covered entity that is:
\(i\) The medical records and billing records about individuals
maintained by or for a covered health care provider;
\(ii\) The enrollment, payment, claims adjudication, and case or medical
management record systems maintained by or for a health plan; or
\(iii\) Used, in whole or in part, by or for the covered entity to make
decisions about individuals.
\(2\) For purposes of this paragraph, the term *record* means any item,
collection, or grouping of information that includes protected health
information and is maintained, collected, used, or disseminated by or
for a covered entity.
*Direct treatment relationship* means a treatment relationship between
an individual and a health care provider that is not an indirect
treatment relationship.
*Disclosure* means the release, transfer, provision of access to, or
divulging in any other manner of information outside the entity holding
the information.
*Health care operations* means any of the following activities of the
covered entity to the extent that the activities are related to covered
functions, and any of the following activities of an organized health
care arrangement in which the covered entity participates:
\(1\) Conducting quality assessment and improvement activities,
including outcomes evaluation and development of clinical guidelines,
provided that the obtaining of generalizable knowledge is not the
primary purpose of any studies resulting from such activities;
population-based activities relating to improving health or reducing
health care costs, protocol development, case management and care
coordination, contacting of health care providers and patients with
information about treatment alternatives; and related functions that do
not include treatment;
\(2\) Reviewing the competence or qualifications of health care
professionals, evaluating practitioner and provider performance, health
plan performance, conducting training programs in which students,
trainees, or practitioners in areas of health care learn under
supervision to practice or improve their skills as health care
providers, training of non-health care professionals, accreditation,
certification, licensing, or credentialing activities;
\(3\) Underwriting, premium rating, and other activities relating to the
creation, renewal or replacement of a contract of health insurance or
health benefits, and ceding, securing, or placing a contract for
reinsurance of risk relating to claims for health care (including
stop-loss insurance and excess of loss insurance), provided that the
requirements of § 164.514(g) are met, if applicable;
\(4\) Conducting or arranging for medical review, legal services, and
auditing functions, including fraud and abuse detection and compliance
programs;
\(5\) Business planning and development, such as conducting
cost-management and planning-related analyses related to managing and
operating the entity, including formulary development and
administration, development or improvement of methods of payment or
coverage policies; and
\(6\) Business management and general administrative activities of the
entity, including, but not limited to:
\(i\) Management activities relating to implementation of and compliance
with the requirements of this subchapter;
\(ii\) Customer service, including the provision of data analyses for
policy holders, plan sponsors, or other customers, provided that
protected health information is not disclosed to such policy holder,
plan sponsor, or customer.
\(iii\) Resolution of internal grievances;
\(iv\) Due diligence in connection with the sale or transfer of assets
to a potential successor in interest, if the potential successor in
interest is a covered entity or, following completion of the sale or
transfer, will become a covered entity; and
\(v\) Consistent with the applicable requirements of § 164.514, creating
de-identified health information, fundraising for the benefit of the
covered entity, and marketing for which an individual authorization is
not required as described in § 164.514(e)(2).
*Health oversight agency* means an agency or authority of the United
States, a State, a territory, a political subdivision of a State or
territory, or an Indian tribe, or a person or entity acting under a
grant of authority from or contract with such public agency, including
the employees or agents of such public agency or its contractors or
persons or entities to whom it has granted authority, that is authorized
by law to oversee the health care system (whether public or private) or
government programs in which health information is necessary to
determine eligibility or compliance, or to enforce civil rights laws for
which health information is relevant.
*Indirect treatment relationship* means a relationship between an
individual and a health care provider in which:
\(1\) The health care provider delivers health care to the individual
based on the orders of another health care provider; and
\(2\) The health care provider typically provides services or products,
or reports the diagnosis or results associated with the health care,
directly to another health care provider, who provides the services or
products or reports to the individual.
*Individual* means the person who is the subject of protected health
information.
*Individually identifiable health information* is information that is a
subset of health information, including demographic information
collected from an individual, and:
\(1\) Is created or received by a health care provider, health plan,
employer, or health care clearinghouse; and
\(2\) Relates to the past, present, or future physical or mental health
or condition of an individual; the provision of health care to an
individual; or the past, present, or future payment for the provision of
health care to an individual; and
\(i\) That identifies the individual; or
\(ii\) With respect to which there is a reasonable basis to believe the
information can be used to identify the individual.
*Inmate* means a person incarcerated in or otherwise confined to a
correctional institution.
*Law enforcement official* means an officer or employee of any agency or
authority of the United States, a State, a territory, a political
subdivision of a State or territory, or an Indian tribe, who is
empowered by law to:
\(1\) Investigate or conduct an official inquiry into a potential
violation of law; or
\(2\) Prosecute or otherwise conduct a criminal, civil, or
administrative proceeding arising from an alleged violation of law.
*Marketing* means to make a communication about a product or service a
purpose of which is to encourage recipients of the communication to
purchase or use the product or service.
\(1\) *Marketing* does not include communications that meet the
requirements of paragraph (2) of this definition and that are made by a
covered entity:
\(i\) For the purpose of describing the entities participating in a
health care provider network or health plan network, or for the purpose
of describing if and the extent to which a product or service (or
payment for such product or service) is provided by a covered entity or
included in a plan of benefits; or
\(ii\) That are tailored to the circumstances of a particular individual
and the communications are:
\(A\) Made by a health care provider to an individual as part of the
treatment of the individual, and for the purpose of furthering the
treatment of that individual; or
\(B\) Made by a health care provider or health plan to an individual in
the course of managing the treatment of that individual, or for the
purpose of directing or recommending to that individual alternative
treatments, therapies, health care providers, or settings of care.
\(2\) A communication described in paragraph (1) of this definition is
not included in marketing if:
\(i\) The communication is made orally; or
\(ii\) The communication is in writing and the covered entity does not
receive direct or indirect remuneration from a third party for making
the communication.
*Organized health care arrangement* means:
\(1\) A clinically integrated care setting in which individuals
typically receive health care from more than one health care provider;
\(2\) An organized system of health care in which more than one covered
entity participates, and in which the participating covered entities:
\(i\) Hold themselves out to the public as participating in a joint
arrangement; and
\(ii\) Participate in joint activities that include at least one of the
following:
\(A\) Utilization review, in which health care decisions by
participating covered entities are reviewed by other participating
covered entities or by a third party on their behalf;
\(B\) Quality assessment and improvement activities, in which treatment
provided by participating covered entities is assessed by other
participating covered entities or by a third party on their behalf; or
\(C\) Payment activities, if the financial risk for delivering health
care is shared, in part or in whole, by participating covered entities
through the joint arrangement and if protected health information
created or received by a covered entity is reviewed by other
participating covered entities or by a third party on their behalf for
the purpose of administering the sharing of financial risk.
\(3\) A group health plan and a health insurance issuer or HMO with
respect to such group health plan, but only with respect to protected
health information created or received by such health insurance issuer
or HMO that relates to individuals who are or who have been participants
or beneficiaries in such group health plan;
\(4\) A group health plan and one or more other group health plans each
of which are maintained by the same plan sponsor; or
\(5\) The group health plans described in paragraph (4) of this
definition and health insurance issuers or HMOs with respect to such
group health plans, but only with respect to protected health
information created or received by such health insurance issuers or HMOs
that relates to individuals who are or have been participants or
beneficiaries in any of such group health plans.
*Payment* means:
\(1\) The activities undertaken by:
\(i\) A health plan to obtain premiums or to determine or fulfill its
responsibility for coverage and provision of benefits under the health
plan; or
\(ii\) A covered health care provider or health plan to obtain or
provide reimbursement for the provision of health care; and
\(2\) The activities in paragraph (1) of this definition relate to the
individual to whom health care is provided and include, but are not
limited to:
\(i\) Determinations of eligibility or coverage (including coordination
of benefits or the determination of cost sharing amounts), and
adjudication or subrogation of health benefit claims;
\(ii\) Risk adjusting amounts due based on enrollee health status and
demographic characteristics;
\(iii\) Billing, claims management, collection activities, obtaining
payment under a contract for reinsurance (including stop-loss insurance
and excess of loss insurance), and related health care data processing;
\(iv\) Review of health care services with respect to medical necessity,
coverage under a health plan, appropriateness of care, or justification
of charges;
\(v\) Utilization review activities, including precertification and
preauthorization of services, concurrent and retrospective review of
services; and
\(vi\) Disclosure to consumer reporting agencies of any of the following
protected health information relating to collection of premiums or
reimbursement:
\(A\) Name and address;
\(B\) Date of birth;
\(C\) Social security number;
\(D\) Payment history;
\(E\) Account number; and
\(F\) Name and address of the health care provider and/or health plan.
*Plan sponsor* is defined as defined at section 3(16)(B) of ERISA, 29
U.S.C. 1002(16)(B).
*Protected health information* means individually identifiable health
information:
\(1\) Except as provided in paragraph (2) of this definition, that is:
\(i\) Transmitted by electronic media;
\(ii\) Maintained in any medium described in the definition of
*electronic media* at § 162.103 of this subchapter; or
\(iii\) Transmitted or maintained in any other form or medium.
\(2\) *Protected health information* excludes individually identifiable
health information in:
\(i\) Education records covered by the Family Educational Right and
Privacy Act, as amended, 20 U.S.C. 1232g; and
\(ii\) Records described at 20 U.S.C. 1232g(a)(4)(B)(iv).
*Psychotherapy notes* means notes recorded (in any medium) by a health
care provider who is a mental health professional documenting or
analyzing the contents of conversation during a private counseling
session or a group, joint, or family counseling session and that are
separated from the rest of the individual's medical record.
*Psychotherapy notes* excludes medication prescription and monitoring,
counseling session start and stop times, the modalities and frequencies
of treatment furnished, results of clinical tests, and any summary of
the following items: diagnosis, functional status, the treatment plan,
symptoms, prognosis, and progress to date.
*Public health authority* means an agency or authority of the United
States, a State, a territory, a political subdivision of a State or
territory, or an Indian tribe, or a person or entity acting under a
grant of authority from or contract with such public agency, including
the employees or agents of such public agency or its contractors or
persons or entities to whom it has granted authority, that is
responsible for public health matters as part of its official mandate.
*Required by law* means a mandate contained in law that compels a
covered entity to make a use or disclosure of protected health
information and that is enforceable in a court of law. *Required by law*
includes, but is not limited to, court orders and court-ordered
warrants; subpoenas or summons issued by a court, grand jury, a
governmental or tribal inspector general, or an administrative body
authorized to require the production of information; a civil or an
authorized investigative demand; Medicare conditions of participation
with respect to health care providers participating in the program; and
statutes or regulations that require the production of information,
including statutes or regulations that require such information if
payment is sought under a government program providing public benefits.
*Research* means a systematic investigation, including research
development, testing, and evaluation, designed to develop or contribute
to generalizable knowledge.
*Treatment* means the provision, coordination, or management of health
care and related services by one or more health care providers,
including the coordination or management of health care by a health care
provider with a third party; consultation between health care providers
relating to a patient; or the referral of a patient for health care from
one health care provider to another.
*Use* means, with respect to individually identifiable health
information, the sharing, employment, application, utilization,
examination, or analysis of such information within an entity that
maintains such information.
[§ 164.502 Uses and disclosures of protected health information: general
rules.]{.underline}
\(a\) [Standard.]{.underline} A covered entity may not use or disclose
protected health information, except as permitted or required by this
subpart or by subpart C of part 160 of this subchapter.
\(1\) [Permitted uses and disclosures.]{.underline} A covered entity is
permitted to use or disclose protected health information as follows:
\(i\) To the individual;
\(ii\) Pursuant to and in compliance with a consent that complies with §
164.506, to carry out treatment, payment, or health care operations;
\(iii\) Without consent, if consent is not required under § 164.506(a)
and has not been sought under § 164.506(a)(4), to carry out treatment,
payment, or health care operations, except with respect to psychotherapy
notes;
\(iv\) Pursuant to and in compliance with an authorization that complies
with § 164.508;
\(v\) Pursuant to an agreement under, or as otherwise permitted by, §
164.510; and
\(vi\) As permitted by and in compliance with this section, § 164.512,
or § 164.514(e), (f), and (g).
\(2\) [Required disclosures.]{.underline} A covered entity is required
to disclose protected health information:
\(i\) To an individual, when requested under, and as required by §§
164.524 or 164.528; and
\(ii\) When required by the Secretary under subpart C of part 160 of
this subchapter to investigate or determine the covered entity\'s
compliance with this subpart.
\(b\) [Standard: minimum necessary.]{.underline} (1) [Minimum necessary
applies.]{.underline} When using or disclosing protected health
information or when requesting protected health information from another
covered entity, a covered entity must make reasonable efforts to limit
protected health information to the minimum necessary to accomplish the
intended purpose of the use, disclosure, or request.
\(2\) [Minimum necessary does not apply.]{.underline} This requirement
does not apply to:
\(i\) Disclosures to or requests by a health care provider for
treatment;
\(ii\) Uses or disclosures made to the individual, as permitted under
paragraph (a)(1)(i) of this section, as required by paragraph (a)(2)(i)
of this section, or pursuant to an authorization under § 164.508, except
for authorizations requested by the covered entity under § 164.508(d),
(e), or (f);
\(iii\) Disclosures made to the Secretary in accordance with subpart C
of part 160 of this subchapter;
\(iv\) Uses or disclosures that are required by law, as described by §
164.512(a); and
\(v\) Uses or disclosures that are required for compliance with
applicable requirements of this subchapter.
\(c\) [Standard: uses and disclosures of protected health information
subject to an agreed upon restriction.]{.underline} A covered entity
that has agreed to a restriction pursuant to § 164.522(a)(1) may not use
or disclose the protected health information covered by the restriction
in violation of such restriction, except as otherwise provided in §
164.522(a).
\(d\) [Standard: uses and disclosures of de-identified protected health
information.]{.underline}
\(1\) [Uses and disclosures to create de-identified
information.]{.underline} A covered entity may use protected health
information to create information that is not individually identifiable
health information or disclose protected health information only to a
business associate for such purpose, whether or not the de-identified
information is to be used by the covered entity.
\(2\) [Uses and disclosures of de-identified information.]{.underline}
Health information that meets the standard and implementation
specifications for de-identification under § 164.514(a) and (b) is
considered not to be individually identifiable health information, i.e.,
de-identified. The requirements of this subpart do not apply to
information that has been de-identified in accordance with the
applicable requirements of § 164.514, provided that:
\(i\) Disclosure of a code or other means of record identification
designed to enable coded or otherwise de-identified information to be
re-identified constitutes disclosure of protected health information;
and
\(ii\) If de-identified information is re-identified, a covered entity
may use or disclose such re-identified information only as permitted or
required by this subpart.
(e)(1) [Standard: disclosures to business associates.]{.underline} (i) A
covered entity may disclose protected health information to a business
associate and may allow a business associate to create or receive
protected health information on its behalf, if the covered entity
obtains satisfactory assurance that the business associate will
appropriately safeguard the information.
\(ii\) This standard does not apply:
\(A\) With respect to disclosures by a covered entity to a health care
provider concerning the treatment of the individual;
\(B\) With respect to disclosures by a group health plan or a health
insurance issuer or HMO with respect to a group health plan to the plan
sponsor, to the extent that the requirements of § 164.504(f) apply and
are met; or
\(C\) With respect to uses or disclosures by a health plan that is a
government program providing public benefits, if eligibility for, or
enrollment in, the health plan is determined by an agency other than the
agency administering the health plan, or if the protected health
information used to determine enrollment or eligibility in the health
plan is collected by an agency other than the agency administering the
health plan, and such activity is authorized by law, with respect to the
collection and sharing of individually identifiable health information
for the performance of such functions by the health plan and the agency
other than the agency administering the health plan.
\(iii\) A covered entity that violates the satisfactory assurances it
provided as a business associate of another covered entity will be in
noncompliance with the standards, implementation specifications, and
requirements of this paragraph and § 164.504(e).
\(2\) [Implementation specification: documentation.]{.underline} A
covered entity must document the satisfactory assurances required by
paragraph (e)(1) of this section through a written contract or other
written agreement or arrangement with the business associate that meets
the applicable requirements of § 164.504(e).
\(f\) [Standard: deceased individuals.]{.underline} A covered entity
must comply with the requirements of this subpart with respect to the
protected health information of a deceased individual.
(g)(1) [Standard: personal representatives.]{.underline} As specified in
this paragraph, a covered entity must, except as provided in paragraphs
(g)(3) and (g)(5) of this section, treat a personal representative as
the individual for purposes of this subchapter.
\(2\) [Implementation specification: adults and emancipated
minors.]{.underline} If under applicable law a person has authority to
act on behalf of an individual who is an adult or an emancipated minor
in making decisions related to health care, a covered entity must treat
such person as a personal representative under this subchapter, with
respect to protected health information relevant to such personal
representation.
\(3\) [Implementation specification: unemancipated minors.]{.underline}
If under applicable law a parent, guardian, or other person acting *in
loco parentis* has authority to act on behalf of an individual who is an
unemancipated minor in making decisions related to health care, a
covered entity must treat such person as a personal representative under
this subchapter, with respect to protected health information relevant
to such personal representation, except that such person may not be a
personal representative of an unemancipated minor, and the minor has the
authority to act as an individual, with respect to protected health
information pertaining to a health care service, if:
\(i\) The minor consents to such health care service; no other consent
to such health care service is required by law, regardless of whether
the consent of another person has also been obtained; and the minor has
not requested that such person be treated as the personal
representative;
\(ii\) The minor may lawfully obtain such health care service without
the consent of a parent, guardian, or other person acting *in loco
parentis*, and the minor, a court, or another person authorized by law
consents to such health care service; or
\(iii\) A parent, guardian, or other person acting *in loco parentis*
assents to an agreement of confidentiality between a covered health care
provider and the minor with respect to such health care service.
\(4\) [Implementation specification: deceased individuals.]{.underline}
If under applicable law an executor, administrator, or other person has
authority to act on behalf of a deceased individual or of the
individual\'s estate, a covered entity must treat such person as a
personal representative under this subchapter, with respect to protected
health information relevant to such personal representation.
\(5\) [Implementation specification: abuse, neglect, endangerment
situations.]{.underline} Notwithstanding a State law or any requirement
of this paragraph to the contrary, a covered entity may elect not to
treat a person as the personal representative of an individual if:
\(i\) The covered entity has a reasonable belief that:
\(A\) The individual has been or may be subjected to domestic violence,
abuse, or neglect by such person; or
\(B\) Treating such person as the personal representative could endanger
the individual; and
\(ii\) The covered entity, in the exercise of professional judgment,
decides that it is not in the best interest of the individual to treat
the person as the individual's personal representative.
\(h\) [Standard: confidential communications.]{.underline} A covered
health care provider or health plan must comply with the applicable
requirements of § 164.522(b) in communicating protected health
information.
\(i\) [Standard: uses and disclosures consistent with
notice.]{.underline} A covered entity that is required by § 164.520 to
have a notice may not use or disclose protected health information in a
manner inconsistent with such notice. A covered entity that is required
by § 164.520(b)(1)(iii) to include a specific statement in its notice if
it intends to engage in an activity listed in §
164.520(b)(1)(iii)(A)-(C), may not use or disclose protected health
information for such activities, unless the required statement is
included in the notice.
\(j\) [Standard: disclosures by whistleblowers and workforce member
crime victims.]{.underline}
\(1\) [Disclosures by whistleblowers.]{.underline} A covered entity is
not considered to have violated the requirements of this subpart if a
member of its workforce or a business associate discloses protected
health information, provided that:
\(i\) The workforce member or business associate believes in good faith
that the covered entity has engaged in conduct that is unlawful or
otherwise violates professional or clinical standards, or that the care,
services, or conditions provided by the covered entity potentially
endangers one or more patients, workers, or the public; and
\(ii\) The disclosure is to:
\(A\) A health oversight agency or public health authority authorized by
law to investigate or otherwise oversee the relevant conduct or
conditions of the covered entity or to an appropriate health care
accreditation organization for the purpose of reporting the allegation
of failure to meet professional standards or misconduct by the covered
entity; or
\(B\) An attorney retained by or on behalf of the workforce member or
business associate for the purpose of determining the legal options of
the workforce member or business associate with regard to the conduct
described in paragraph (j)(1)(i) of this section.
\(2\) [Disclosures by workforce members who are victims of a
crime.]{.underline} A covered entity is not considered to have violated
the requirements of this subpart if a member of its workforce who is the
victim of a criminal act discloses protected health information to a law
enforcement official, provided that:
\(i\) The protected health information disclosed is about the suspected
perpetrator of the criminal act; and
\(ii\) The protected health information disclosed is limited to the
information listed in § 164.512(f)(2)(i).
[§ 164.504 Uses and disclosures: organizational
requirements.]{.underline}
\(a\) [Definitions.]{.underline} As used in this section:
*Common control* exists if an entity has the power, directly or
indirectly, significantly to influence or direct the actions or policies
of another entity.
*Common ownership* exists if an entity or entities possess an ownership
or equity interest of 5 percent or more in another entity.
*Health care component* has the following meaning:
\(1\) Components of a covered entity that perform covered functions are
part of the health care component.
\(2\) Another component of the covered entity is part of the entity's
health care component to the extent that:
\(i\) It performs, with respect to a component that performs covered
functions, activities that would make such other component a business
associate of the component that performs covered functions if the two
components were separate legal entities; and
\(ii\) The activities involve the use or disclosure of protected health
information that such other component creates or receives from or on
behalf of the component that performs covered functions.
*Hybrid entity* means a single legal entity that is a covered entity and
whose covered functions are not its primary functions.
*Plan administration functions* means administration functions performed
by the plan sponsor of a group health plan on behalf of the group health
plan and excludes functions performed by the plan sponsor in connection
with any other benefit or benefit plan of the plan sponsor.
*Summary health information* means information, that may be individually
identifiable health information, and:
\(1\) That summarizes the claims history, claims expenses, or type of
claims experienced by individuals for whom a plan sponsor has provided
health benefits under a group health plan; and
\(2\) From which the information described at § 164.514(b)(2)(i) has
been deleted, except that the geographic information described in §
164.514(b)(2)(i)(B) need only be aggregated to the level of a five digit
zip code.
\(b\) [Standard: health care component.]{.underline} If a covered entity
is a hybrid entity, the requirements of this subpart, other than the
requirements of this section, apply only to the health care component(s)
of the entity, as specified in this section.
(c)(1) [Implementation specification: application of other
provisions.]{.underline} In applying a provision of this subpart, other
than this section, to a hybrid entity:
\(i\) A reference in such provision to a "covered entity" refers to a
health care component of the covered entity;
\(ii\) A reference in such provision to a "health plan," "covered health
care provider," or "health care clearinghouse" refers to a health care
component of the covered entity if such health care component performs
the functions of a health plan, covered health care provider, or health
care clearinghouse, as applicable; and
\(iii\) A reference in such provision to "protected health information"
refers to protected health information that is created or received by or
on behalf of the health care component of the covered entity.
\(2\) [Implementation specifications: safeguard
requirements.]{.underline} The covered entity that is a hybrid entity
must ensure that a health care component of the entity complies with the
applicable requirements of this subpart. In particular, and without
limiting this requirement, such covered entity must ensure that:
\(i\) Its health care component does not disclose protected health
information to another component of the covered entity in circumstances
in which this subpart would prohibit such disclosure if the health care
component and the other component were separate and distinct legal
entities;
\(ii\) A component that is described by paragraph (2)(i) of the
definition of *health care component* in this section does not use or
disclose protected health information that is within paragraph (2)(ii)
of such definition for purposes of its activities other than those
described by paragraph (2)(i) of such definition in a way prohibited by
this subpart; and
\(iii\) If a person performs duties for both the health care component
in the capacity of a member of the workforce of such component and for
another component of the entity in the same capacity with respect to
that component, such workforce member must not use or disclose protected
health information created or received in the course of or incident to
the member's work for the health care component in a way prohibited by
this subpart.
\(3\) [Implementation specifications: responsibilities of the covered
entity.]{.underline} A covered entity that is a hybrid entity has the
following responsibilities:
\(i\) For purposes of subpart C of part 160 of this subchapter,
pertaining to compliance and enforcement, the covered entity has the
responsibility to comply with this subpart.
\(ii\) The covered entity has the responsibility for complying with §
164.530(i), pertaining to the implementation of policies and procedures
to ensure compliance with this subpart, including the safeguard
requirements in paragraph (c)(2) of this section.
\(iii\) The covered entity is responsible for designating the components
that are part of one or more health care components of the covered
entity and documenting the designation as required by § 164.530(j).
(d)(1) [Standard: affiliated covered entities.]{.underline} Legally
separate covered entities that are affiliated may designate themselves
as a single covered entity for purposes of this subpart.
\(2\) [Implementation specifications: requirements for designation of an
affiliated covered entity.]{.underline} (i) Legally separate covered
entities may designate themselves (including any health care component
of such covered entity) as a single affiliated covered entity, for
purposes of this subpart, if all of the covered entities designated are
under common ownership or control.
\(ii\) The designation of an affiliated covered entity must be
documented and the documentation maintained as required by § 164.530(j).
\(3\) [Implementation specifications: safeguard
requirements.]{.underline} An affiliated covered entity must ensure
that:
\(i\) The affiliated covered entity's use and disclosure of protected
health information comply with the applicable requirements of this
subpart; and
\(ii\) If the affiliated covered entity combines the functions of a
health plan, health care provider, or health care clearinghouse, the
affiliated covered entity complies with paragraph (g) of this section.
(e)(1) [Standard: business associate contracts.]{.underline} (i) The
contract or other arrangement between the covered entity and the
business associate required by § 164.502(e)(2) must meet the
requirements of paragraph (e)(2) or (e)(3) of this section, as
applicable.
\(ii\) A covered entity is not in compliance with the standards in §
164.502(e) and paragraph (e) of this section, if the covered entity knew
of a pattern of activity or practice of the business associate that
constituted a material breach or violation of the business associate's
obligation under the contract or other arrangement, unless the covered
entity took reasonable steps to cure the breach or end the violation, as
applicable, and, if such steps were unsuccessful:
\(A\) Terminated the contract or arrangement, if feasible; or
\(B\) If termination is not feasible, reported the problem to the
Secretary.
\(2\) [Implementation specifications: business associate
contracts.]{.underline} A contract between the covered entity and a
business associate must:
\(i\) Establish the permitted and required uses and disclosures of such
information by the business associate. The contract may not authorize
the business associate to use or further disclose the information in a
manner that would violate the requirements of this subpart, if done by
the covered entity, except that:
\(A\) The contract may permit the business associate to use and disclose
protected health information for the proper management and
administration of the business associate, as provided in paragraph
(e)(4) of this section; and
\(B\) The contract may permit the business associate to provide data
aggregation services relating to the health care operations of the
covered entity.
\(ii\) Provide that the business associate will:
\(A\) Not use or further disclose the information other than as
permitted or required by the contract or as required by law;
\(B\) Use appropriate safeguards to prevent use or disclosure of the
information other than as provided for by its contract;
\(C\) Report to the covered entity any use or disclosure of the
information not provided for by its contract of which it becomes aware;
\(D\) Ensure that any agents, including a subcontractor, to whom it
provides protected health information received from, or created or
received by the business associate on behalf of, the covered entity
agrees to the same restrictions and conditions that apply to the
business associate with respect to such information;
\(E\) Make available protected health information in accordance with §
164.524;
\(F\) Make available protected health information for amendment and
incorporate any amendments to protected health information in accordance
with §164.526;
\(G\) Make available the information required to provide an accounting
of disclosures in accordance with § 164.528;
\(H\) Make its internal practices, books, and records relating to the
use and disclosure of protected health information received from, or
created or received by the business associate on behalf of, the covered
entity available to the Secretary for purposes of determining the
covered entity\'s compliance with this subpart; and
\(I\) At termination of the contract, if feasible, return or destroy all
protected health information received from, or created or received by
the business associate on behalf of, the covered entity that the
business associate still maintains in any form and retain no copies of
such information or, if such return or destruction is not feasible,
extend the protections of the contract to the information and limit
further uses and disclosures to those purposes that make the return or
destruction of the information infeasible.
\(iii\) Authorize termination of the contract by the covered entity, if
the covered entity determines that the business associate has violated a
material term of the contract.
\(3\) [Implementation specifications: other arrangements.]{.underline}
(i) If a covered entity and its business associate are both governmental
entities:
\(A\) The covered entity may comply with paragraph (e) of this section
by entering into a memorandum of understanding with the business
associate that contains terms that accomplish the objectives of
paragraph (e)(2) of this section.
\(B\) The covered entity may comply with paragraph (e) of this section,
if other law (including regulations adopted by the covered entity or its
business associate) contains requirements applicable to the business
associate that accomplish the objectives of paragraph (e)(2) of this
section.
\(ii\) If a business associate is required by law to perform a function
or activity on behalf of a covered entity or to provide a service
described in the definition of *business associate* in § 160.103 of this
subchapter to a covered entity, such covered entity may disclose
protected health information to the business associate to the extent
necessary to comply with the legal mandate without meeting the
requirements of this paragraph (e), provided that the covered entity
attempts in good faith to obtain satisfactory assurances as required by
paragraph (e)(3)(i) of this section, and, if such attempt fails,
documents the attempt and the reasons that such assurances cannot be
obtained.
\(iii\) The covered entity may omit from its other arrangements the
termination authorization required by paragraph (e)(2)(iii) of this
section, if such authorization is inconsistent with the statutory
obligations of the covered entity or its business associate.
\(4\) [Implementation specifications: other requirements for contracts
and other arrangements.]{.underline} (i) The contract or other
arrangement between the covered entity and the business associate may
permit the business associate to use the information received by the
business associate in its capacity as a business associate to the
covered entity, if necessary:
\(A\) For the proper management and administration of the business
associate; or
\(B\) To carry out the legal responsibilities of the business associate.
\(ii\) The contract or other arrangement between the covered entity and
the business associate may permit the business associate to disclose the
information received by the business associate in its capacity as a
business associate for the purposes described in paragraph (e)(4)(i) of
this section, if:
\(A\) The disclosure is required by law; or
(B)(*1*) The business associate obtains reasonable assurances from the
person to whom the information is disclosed that it will be held
confidentially and used or further disclosed only as required by law or
for the purpose for which it was disclosed to the person; and
(*2*) The person notifies the business associate of any instances of
which it is aware in which the confidentiality of the information has
been breached.
(f)(1)[Standard: requirements for group health plans.]{.underline} (i)
Except as provided under paragraph (f)(1)(ii) of this section or as
otherwise authorized under § 164.508, a group health plan, in order to
disclose protected health information to the plan sponsor or to provide
for or permit the disclosure of protected health information to the plan
sponsor by a health insurance issuer or HMO with respect to the group
health plan, must ensure that the plan documents restrict uses and
discloses of such information by the plan sponsor consistent with the
requirements of this subpart.
\(ii\) The group health plan, or a health insurance issuer or HMO with
respect to the group health plan, may disclose summary health
information to the plan sponsor, if the plan sponsor requests the
summary health information for the purpose of :
\(A\) Obtaining premium bids from health plans for providing health
insurance coverage under the group health plan; or
\(B\) Modifying, amending, or terminating the group health plan.
\(2\) [Implementation specifications: requirements for plan
documents.]{.underline} The plan documents of the group health plan must
be amended to incorporate provisions to:
\(i\) Establish the permitted and required uses and disclosures of such
information by the plan sponsor, provided that such permitted and
required uses and disclosures may not be inconsistent with this subpart.
\(ii\) Provide that the group health plan will disclose protected health
information to the plan sponsor only upon receipt of a certification by
the plan sponsor that the plan documents have been amended to
incorporate the following provisions and that the plan sponsor agrees
to:
\(A\) Not use or further disclose the information other than as
permitted or required by the plan documents or as required by law;
\(B\) Ensure that any agents, including a subcontractor, to whom it
provides protected health information received from the group health
plan agree to the same restrictions and conditions that apply to the
plan sponsor with respect to such information;
\(C\) Not use or disclose the information for employment-related actions
and decisions or in connection with any other benefit or employee
benefit plan of the plan sponsor;
\(D\) Report to the group health plan any use or disclosure of the
information that is inconsistent with the uses or disclosures provided
for of which it becomes aware;
\(E\) Make available protected health information in accordance with §
164.524;
\(F\) Make available protected health information for amendment and
incorporate any amendments to protected health information in accordance
with §164.526;
\(G\) Make available the information required to provide an accounting
of disclosures in accordance with § 164.528;
\(H\) Make its internal practices, books, and records relating to the
use and disclosure of protected health information received from the
group health plan available to the Secretary for purposes of determining
compliance by the group health plan with this subpart;
\(I\) If feasible, return or destroy all protected health information
received from the group health plan that the sponsor still maintains in
any form and retain no copies of such information when no longer needed
for the purpose for which disclosure was made, except that, if such
return or destruction is not feasible, limit further uses and
disclosures to those purposes that make the return or destruction of the
information infeasible; and
\(J\) Ensure that the adequate separation required in paragraph
(f)(2)(iii) of this section is established.
\(iii\) Provide for adequate separation between the group health plan
and the plan sponsor. The plan documents must:
\(A\) Describe those employees or classes of employees or other persons
under the control of the plan sponsor to be given access to the
protected health information to be disclosed, provided that any employee
or person who receives protected health information relating to payment
under, health care operations of, or other matters pertaining to the
group health plan in the ordinary course of business must be included in
such description;
\(B\) Restrict the access to and use by such employees and other persons
described in paragraph (f)(2)(iii)(A) of this section to the plan
administration functions that the plan sponsor performs for the group
health plan; and
\(C\) Provide an effective mechanism for resolving any issues of
noncompliance by persons described in paragraph (f)(2)(iii)(A) of this
section with the plan document provisions required by this paragraph.
\(3\) [Implementation specifications: uses and disclosures.]{.underline}
A group health plan may:
\(i\) Disclose protected health information to a plan sponsor to carry
out plan administration functions that the plan sponsor performs only
consistent with the provisions of paragraph (f)(2) of this section;
\(ii\) Not permit a health insurance issuer or HMO with respect to the
group health plan to disclose protected health information to the plan
sponsor except as permitted by this paragraph;
\(iii\) Not disclose and may not permit a health insurance issuer or HMO
to disclose protected health information to a plan sponsor as otherwise
permitted by this paragraph unless a statement required by §
164.520(b)(1)(iii)(C) is included in the appropriate notice; and
\(iv\) Not disclose protected health information to the plan sponsor for
the purpose of employment-related actions or decisions or in connection
with any other benefit or employee benefit plan of the plan sponsor.
\(g\) [Standard: requirements for a covered entity with multiple covered
functions.]{.underline}
\(1\) A covered entity that performs multiple covered functions that
would make the entity any combination of a health plan, a covered health
care provider, and a health care clearinghouse, must comply with the
standards, requirements, and implementation specifications of this
subpart, as applicable to the health plan, health care provider, or
health care clearinghouse covered functions performed.
\(2\) A covered entity that performs multiple covered functions may use
or disclose the protected health information of individuals who receive
the covered entity's health plan or health care provider services, but
not both, only for purposes related to the appropriate function being
performed.
[§ 164.506 Consent for uses or disclosures to carry out treatment,
payment, or health care operations.]{.underline}
\(a\) [Standard: consent requirement.]{.underline} (1) Except as
provided in paragraph (a)(2) or (a)(3) of this section, a covered health
care provider must obtain the individual's consent, in accordance with
this section, prior to using or disclosing protected health information
to carry out treatment, payment, or health care operations.
\(2\) A covered health care provider may, without consent, use or
disclose protected health information to carry out treatment, payment,
or health care operations, if:
\(i\) The covered health care provider has an indirect treatment
relationship with the individual; or
\(ii\) The covered health care provider created or received the
protected health information in the course of providing health care to
an individual who is an inmate.
(3)(i) A covered health care provider may, without prior consent, use or
disclose protected health information created or received under
paragraph (a)(3)(i)(A)-(C) of this section to carry out treatment,
payment, or health care operations:
\(A\) In emergency treatment situations, if the covered health care
provider attempts to obtain such consent as soon as reasonably
practicable after the delivery of such treatment;
\(B\) If the covered health care provider is required by law to treat
the individual, and the covered health care provider attempts to obtain
such consent but is unable to obtain such consent; or
\(C\) If a covered health care provider attempts to obtain such consent
from the individual but is unable to obtain such consent due to
substantial barriers to communicating with the individual, and the
covered health care provider determines, in the exercise of professional
judgment, that the individual's consent to receive treatment is clearly
inferred from the circumstances.
\(ii\) A covered health care provider that fails to obtain such consent
in accordance with paragraph (a)(3)(i) of this section must document its
attempt to obtain consent and the reason why consent was not obtained.
\(4\) If a covered entity is not required to obtain consent by paragraph
(a)(1) of this section, it may obtain an individual's consent for the
covered entity's own use or disclosure of protected health information
to carry out treatment, payment, or health care operations, provided
that such consent meets the requirements of this section.
\(5\) Except as provided in paragraph (f)(1) of this section, a consent
obtained by a covered entity under this section is not effective to
permit another covered entity to use or disclose protected health
information.
\(b\) [Implementation specifications: general requirements.]{.underline}
(1) A covered health care provider may condition treatment on the
provision by the individual of a consent under this section.
\(2\) A health plan may condition enrollment in the health plan on the
provision by the individual of a consent under this section sought in
conjunction with such enrollment.
\(3\) A consent under this section may not be combined in a single
document with the notice required by § 164.520.
(4)(i) A consent for use or disclosure may be combined with other types
of written legal permission from the individual (e.g., an informed
consent for treatment or a consent to assignment of benefits), if the
consent under this section:
\(A\) Is visually and organizationally separate from such other written
legal permission; and
\(B\) Is separately signed by the individual and dated.
\(ii\) A consent for use or disclosure may be combined with a research
authorization under § 164.508(f).
\(5\) An individual may revoke a consent under this section at any time,
except to the extent that the covered entity has taken action in
reliance thereon. Such revocation must be in writing.
\(6\) A covered entity must document and retain any signed consent under
this section as required by § 164.530(j).
\(c\) [Implementation specifications: content requirements.]{.underline}
A consent under this section must be in plain language and:
\(1\) Inform the individual that protected health information may be
used and disclosed to carry out treatment, payment, or health care
operations;
\(2\) Refer the individual to the notice required by § 164.520 for a
more complete description of such uses and disclosures and state that
the individual has the right to review the notice prior to signing the
consent;
\(3\) If the covered entity has reserved the right to change its privacy
practices that are described in the notice in accordance with §
164.520(b)(1)(v)(C), state that the terms of its notice may change and
describe how the individual may obtain a revised notice;
\(4\) State that:
\(i\) The individual has the right to request that the covered entity
restrict how protected health information is used or disclosed to carry
out treatment, payment, or health care operations;
\(ii\) The covered entity is not required to agree to requested
restrictions; and
\(iii\) If the covered entity agrees to a requested restriction, the
restriction is binding on the covered entity;
\(5\) State that the individual has the right to revoke the consent in
writing, except to the extent that the covered entity has taken action
in reliance thereon; and
\(6\) Be signed by the individual and dated.
\(d\) [Implementation specifications: defective consents.]{.underline}
There is no consent under this section, if the document submitted has
any of the following defects:
\(1\) The consent lacks an element required by paragraph (c) of this
section, as applicable; or
\(2\) The consent has been revoked in accordance with paragraph (b)(5)
of this section.
\(e\) [Standard: resolving conflicting consents and
authorizations.]{.underline} (1) If a covered entity has obtained a
consent under this section and receives any other authorization or
written legal permission from the individual for a disclosure of
protected health information to carry out treatment, payment, or health
care operations, the covered entity may disclose such protected health
information only in accordance with the more restrictive consent,
authorization, or other written legal permission from the individual.
\(2\) A covered entity may attempt to resolve a conflict between a
consent and an authorization or other written legal permission from the
individual described in paragraph (e)(1) of this section by:
\(i\) Obtaining a new consent from the individual under this section for
the disclosure to carry out treatment, payment, or health care
operations; or
\(ii\) Communicating orally or in writing with the individual in order
to determine the individual's preference in resolving the conflict. The
covered entity must document the individual's preference and may only
disclose protected health information in accordance with the
individual's preference.
(f)(1) [Standard: joint consents.]{.underline} Covered entities that
participate in an organized health care arrangement and that have a
joint notice under § 164.520(d) may comply with this section by a joint
consent.
\(2\) [Implementation specifications: requirements for joint
consents.]{.underline} (i) A joint consent must:
\(A\) Include the name or other specific identification of the covered
entities, or classes of covered entities, to which the joint consent
applies; and
\(B\) Meet the requirements of this section, except that the statements
required by this section may be altered to reflect the fact that the
consent covers more than one covered entity.
\(ii\) If an individual revokes a joint consent, the covered entity that
receives the revocation must inform the other entities covered by the
joint consent of the revocation as soon as practicable.
[§164.508 Uses and disclosures for which an authorization is
required.]{.underline}
\(a\) [Standard: authorizations for uses and disclosures.]{.underline}
(1) [Authorization required: general rule.]{.underline} Except as
otherwise permitted or required by this subchapter, a covered entity may
not use or disclose protected health information without an
authorization that is valid under this section. When a covered entity
obtains or receives a valid authorization for its use or disclosure of
protected health information, such use or disclosure must be consistent
with such authorization.
\(2\) [Authorization required: psychotherapy notes.]{.underline}
Notwithstanding any other provision of this subpart, other than
transition provisions provided for in § 164.532, a covered entity must
obtain an authorization for any use or disclosure of psychotherapy
notes, except:
\(i\) To carry out the following treatment, payment, or health care
operations, consistent with consent requirements in § 164.506:
\(A\) Use by originator of the psychotherapy notes for treatment;
\(B\) Use or disclosure by the covered entity in training programs in
which students, trainees, or practitioners in mental health learn under
supervision to practice or improve their skills in group, joint, family,
or individual counseling; or
\(C\) Use or disclosure by the covered entity to defend a legal action
or other proceeding brought by the individual; and
\(ii\) A use or disclosure that is required by § 164.502(a)(2)(ii) or
permitted by § 164.512(a); § 164.512(d) with respect to the oversight of
the originator of the psychotherapy notes; § 164.512(g)(1); or §
164.512(j)(1)(i).
\(b\) [Implementation specifications: general requirements.]{.underline}
(1) [Valid authorizations.]{.underline}
\(i\) A valid authorization is a document that contains the elements
listed in paragraph (c) and, as applicable, paragraph (d), (e), or (f)
of this section.
\(ii\) A valid authorization may contain elements or information in
addition to the elements required by this section, provided that such
additional elements or information are not be inconsistent with the
elements required by this section.
\(2\) [Defective authorizations.]{.underline} An authorization is not
valid, if the document submitted has any of the following defects:
\(i\) The expiration date has passed or the expiration event is known by
the covered entity to have occurred;
\(ii\) The authorization has not been filled out completely, with
respect to an element described by paragraph (c), (d), (e), or (f) of
this section, if applicable;
\(iii\) The authorization is known by the covered entity to have been
revoked;
\(iv\) The authorization lacks an element required by paragraph (c),
(d), (e), or (f) of this section, if applicable;
\(v\) The authorization violates paragraph (b)(3) of this section, if
applicable;
\(vi\) Any material information in the authorization is known by the
covered entity to be false.
\(3\) [Compound authorizations.]{.underline} An authorization for use or
disclosure of protected health information may not be combined with any
other document to create a compound authorization, except as follows:
\(i\) An authorization for the use or disclosure of protected health
information created for research that includes treatment of the
individual may be combined as permitted by § 164.506(b)(4)(ii) or
paragraph (f) of this section;
\(ii\) An authorization for a use or disclosure of psychotherapy notes
may only be combined with another authorization for a use or disclosure
of psychotherapy notes;
\(iii\) An authorization under this section, other than an authorization
for a use or disclosure of psychotherapy notes may be combined with any
other such authorization under this section, except when a covered
entity has conditioned the provision of treatment, payment, enrollment
in the health plan, or eligibility for benefits under paragraph (b)(4)
of this section on the provision of one of the authorizations.
\(4\) [Prohibition on conditioning of authorizations.]{.underline} A
covered entity may not condition the provision to an individual of
treatment, payment, enrollment in the health plan, or eligibility for
benefits on the provision of an authorization, except:
\(i\) A covered health care provider may condition the provision of
research-related treatment on provision of an authorization under
paragraph (f) of this section;
\(ii\) A health plan may condition enrollment in the health plan or
eligibility for benefits on provision of an authorization requested by
the health plan prior to an individual\'s enrollment in the health plan,
if:
\(A\) The authorization sought is for the health plan's eligibility or
enrollment determinations relating to the individual or for its
underwriting or risk rating determinations; and
\(B\) The authorization is not for a use or disclosure of psychotherapy
notes under paragraph (a)(2) of this section;
\(iii\) A health plan may condition payment of a claim for specified
benefits on provision of an authorization under paragraph (e) of this
section, if:
\(A\) The disclosure is necessary to determine payment of such claim;
and
\(B\) The authorization is not for a use or disclosure of psychotherapy
notes under paragraph (a)(2) of this section; and
\(iv\) A covered entity may condition the provision of health care that
is solely for the purpose of creating protected health information for
disclosure to a third party on provision of an authorization for the
disclosure of the protected health information to such third party.
\(5\) [Revocation of authorizations.]{.underline} An individual may
revoke an authorization provided under this section at any time,
provided that the revocation is in writing, except to the extent that:
\(i\) The covered entity has taken action in reliance thereon; or
\(ii\) If the authorization was obtained as a condition of obtaining
insurance coverage, other law provides the insurer with the right to
contest a claim under the policy.
\(6\) [Documentation.]{.underline} A covered entity must document and
retain any signed authorization under this section as required by §
164.530(j).
\(c\) [Implementation specifications: core elements and
requirements.]{.underline} (1) [Core elements.]{.underline} A valid
authorization under this section must contain at least the following
elements:
\(i\) A description of the information to be used or disclosed that
identifies the information in a specific and meaningful fashion;
\(ii\) The name or other specific identification of the person(s), or
class of persons, authorized to make the requested use or disclosure;
\(iii\) The name or other specific identification of the person(s), or
class of persons, to whom the covered entity may make the requested use
or disclosure;
\(iv\) An expiration date or an expiration event that relates to the
individual or the purpose of the use or disclosure;
\(v\) A statement of the individual's right to revoke the authorization
in writing and the exceptions to the right to revoke, together with a
description of how the individual may revoke the authorization;
\(vi\) A statement that information used or disclosed pursuant to the
authorization may be subject to redisclosure by the recipient and no
longer be protected by this rule;
\(vii\) Signature of the individual and date; and
\(viii\) If the authorization is signed by a personal representative of
the individual, a description of such representative's authority to act
for the individual.
\(2\) [Plain language requirement.]{.underline} The authorization must
be written in plain language.
\(d\) [Implementation specifications: authorizations requested by a
covered entity for its own uses and disclosures.]{.underline} If an
authorization is requested by a covered entity for its own use or
disclosure of protected health information that it maintains, the
covered entity must comply with the following requirements.
\(1\) [Required elements.]{.underline} The authorization for the uses or
disclosures described in this paragraph must, in addition to meeting the
requirements of paragraph (c) of this section, contain the following
elements:
\(i\) For any authorization to which the prohibition on conditioning in
paragraph (b)(4) of this section applies, a statement that the covered
entity will not condition treatment, payment, enrollment in the health
plan, or eligibility for benefits on the individual\'s providing
authorization for the requested use or disclosure;
\(ii\) A description of each purpose of the requested use or disclosure;
\(iii\) A statement that the individual may:
\(A\) Inspect or copy the protected health information to be used or
disclosed as provided in § 164.524; and
\(B\) Refuse to sign the authorization; and
\(iv\) If use or disclosure of the requested information will result in
direct or indirect remuneration to the covered entity from a third
party, a statement that such remuneration will result.
\(2\) [Copy to the individual.]{.underline} A covered entity must
provide the individual with a copy of the signed authorization.
\(e\) [Implementation specifications: authorizations requested by a
covered entity for disclosures by others.]{.underline} If an
authorization is requested by a covered entity for another covered
entity to disclose protected health information to the covered entity
requesting the authorization to carry out treatment, payment, or health
care operations, the covered entity requesting the authorization must
comply with the following requirements.
\(1\) [Required elements.]{.underline} The authorization for the
disclosures described in this paragraph must, in addition to meeting the
requirements of paragraph (c) of this section, contain the following
elements:
\(i\) A description of each purpose of the requested disclosure;
\(ii\) Except for an authorization on which payment may be conditioned
under paragraph (b)(4)(iii) of this section, a statement that the
covered entity will not condition treatment, payment, enrollment in the
health plan, or eligibility for benefits on the individual\'s providing
authorization for the requested use or disclosure; and
\(iii\) A statement that the individual may refuse to sign the
authorization.
\(2\) [Copy to the individual.]{.underline} A covered entity must
provide the individual with a copy of the signed authorization.
\(f\) [Implementation specifications: authorizations for uses and
disclosures of protected health information created for research that
includes treatment of the individual.]{.underline} (1) [Required
elements.]{.underline} Except as otherwise permitted by § 164.512(i), a
covered entity that creates protected health information for the
purpose, in whole or in part, of research that includes treatment of
individuals must obtain an authorization for the use or disclosure of
such information. Such authorization must:
\(i\) For uses and disclosures not otherwise permitted or required under
this subpart, meet the requirements of paragraphs (c) and (d) of this
section; and
\(ii\) Contain:
\(A\) A description of the extent to which such protected health
information will be used or disclosed to carry out treatment, payment,
or health care operations;
\(B\) A description of any protected health information that will not be
used or disclosed for purposes permitted in accordance with §§ 164.510
and 164.512, provided that the covered entity may not include a
limitation affecting its right to make a use or disclosure that is
required by law or permitted by § 164.512(j)(1)(i); and
\(C\) If the covered entity has obtained or intends to obtain the
individual's consent under § 164.506, or has provided or intends to
provide the individual with a notice under § 164.520, the authorization
must refer to that consent or notice, as applicable, and state that the
statements made pursuant to this section are binding.
\(2\) [Optional procedure.]{.underline} An authorization under this
paragraph may be in the same document as:
\(i\) A consent to participate in the research;
\(ii\) A consent to use or disclose protected health information to
carry out treatment, payment, or health care operations under § 164.506;
or
\(iii\) A notice of privacy practices under § 164.520.
[§ 164.510 Uses and disclosures requiring an opportunity for the
individual to agree or to object.]{.underline}
A covered entity may use or disclose protected health information
without the written consent or authorization of the individual as
described by §§ 164.506 and 164.508, respectively, provided that the
individual is informed in advance of the use or disclosure and has the
opportunity to agree to or prohibit or restrict the disclosure in
accordance with the applicable requirements of this section. The covered
entity may orally inform the individual of and obtain the individual's
oral agreement or objection to a use or disclosure permitted by this
section.
\(a\) [Standard: use and disclosure for facility
directories.]{.underline}
\(1\) [Permitted uses and disclosure.]{.underline} Except when an
objection is expressed in accordance with paragraphs (a)(2) or (3) of
this section, a covered health care provider may:
\(i\) Use the following protected health information to maintain a
directory of individuals in its facility:
\(A\) The individual's name;
\(B\) The individual's location in the covered health care provider's
facility;
\(C\) The individual's condition described in general terms that does
not communicate specific medical information about the individual; and
\(D\) The individual's religious affiliation; and
\(ii\) Disclose for directory purposes such information:
\(A\) To members of the clergy; or
\(B\) Except for religious affiliation, to other persons who ask for the
individual by name.
\(2\) [Opportunity to object.]{.underline} A covered health care
provider must inform an individual of the protected health information
that it may include in a directory and the persons to whom it may
disclose such information (including disclosures to clergy of
information regarding religious affiliation) and provide the individual
with the opportunity to restrict or prohibit some or all of the uses or
disclosures permitted by paragraph (a)(1) of this section.
\(3\) [Emergency circumstances.]{.underline} (i) If the opportunity to
object to uses or disclosures required by paragraph (a)(2) of this
section cannot practicably be provided because of the individual's
incapacity or an emergency treatment circumstance, a covered health care
provider may use or disclose some or all of the protected health
information permitted by paragraph (a)(1) of this section for the
facility's directory, if such disclosure is:
\(A\) Consistent with a prior expressed preference of the individual, if
any, that is known to the covered health care provider; and
\(B\) In the individual's best interest as determined by the covered
health care provider, in the exercise of professional judgment.
\(ii\) The covered health care provider must inform the individual and
provide an opportunity to object to uses or disclosures for directory
purposes as required by paragraph (a)(2) of this section when it becomes
practicable to do so.
\(b\) [Standard: uses and disclosures for involvement in the
individual's care and notification purposes.]{.underline}
\(1\) [Permitted uses and disclosures.]{.underline} (i) A covered entity
may, in accordance with paragraphs (b)(2) or (3) of this section,
disclose to a family member, other relative, or a close personal friend
of the individual, or any other person identified by the individual, the
protected health information directly relevant to such person's
involvement with the individual's care or payment related to the
individual's health care.
\(ii\) A covered entity may use or disclose protected health information
to notify, or assist in the notification of (including identifying or
locating), a family member, a personal representative of the individual,
or another person responsible for the care of the individual of the
individual's location, general condition, or death. Any such use or
disclosure of protected health information for such notification
purposes must be in accordance with paragraphs (b)(2), (3), or (4) of
this section, as applicable.
\(2\) [Uses and disclosures with the individual present.]{.underline} If
the individual is present for, or otherwise available prior to, a use or
disclosure permitted by paragraph (b)(1) of this section and has the
capacity to make health care decisions, the covered entity may use or
disclose the protected health information if it:
\(i\) Obtains the individual's agreement;
\(ii\) Provides the individual with the opportunity to object to the
disclosure, and the individual does not express an objection; or
\(iii\) Reasonably infers from the circumstances, based the exercise of
professional judgment, that the individual does not object to the
disclosure.
\(3\) [Limited uses and disclosures when the individual is not
present.]{.underline} If the individual is not present for, or the
opportunity to agree or object to the use or disclosure cannot
practicably be provided because of the individual's incapacity or an
emergency circumstance, the covered entity may, in the exercise of
professional judgment, determine whether the disclosure is in the best
interests of the individual and, if so, disclose only the protected
health information that is directly relevant to the person's involvement
with the individual's health care. A covered entity may use professional
judgment and its experience with common practice to make reasonable
inferences of the individual's best interest in allowing a person to act
on behalf of the individual to pick up filled prescriptions, medical
supplies, X-rays, or other similar forms of protected health
information.
\(4\) [Use and disclosures for disaster relief purposes.]{.underline} A
covered entity may use or disclose protected health information to a
public or private entity authorized by law or by its charter to assist
in disaster relief efforts, for the purpose of coordinating with such
entities the uses or disclosures permitted by paragraph (b)(1)(ii) of
this section. The requirements in paragraphs (b)(2) and (3) of this
section apply to such uses and disclosure to the extent that the covered
entity, in the exercise of professional judgment, determines that the
requirements do not interfere with the ability to respond to the
emergency circumstances.
[§ 164.512 Uses and disclosures for which consent, an authorization, or
opportunity to agree or object is not required.]{.underline}
A covered entity may use or disclose protected health information
without the written consent or authorization of the individual as
described in §§ 164.506 and 164.508, respectively, or the opportunity
for the individual to agree or object as described in § 164.510, in the
situations covered by this section, subject to the applicable
requirements of this section. When the covered entity is required by
this section to inform the individual of, or when the individual may
agree to, a use or disclosure permitted by this section, the covered
entity's information and the individual's agreement may be given orally.
\(a\) [Standard: uses and disclosures required by law.]{.underline} (1)
A covered entity may use or disclose protected health information to the
extent that such use or disclosure is required by law and the use or
disclosure complies with and is limited to the relevant requirements of
such law.
\(2\) A covered entity must meet the requirements described in paragraph
(c), (e), or (f) of this section for uses or disclosures required by
law.
\(b\) [Standard: uses and disclosures for public health
activities.]{.underline}
\(1\) [Permitted disclosures.]{.underline} A covered entity may disclose
protected health information for the public health activities and
purposes described in this paragraph to:
\(i\) A public health authority that is authorized by law to collect or
receive such information for the purpose of preventing or controlling
disease, injury, or disability, including, but not limited to, the
reporting of disease, injury, vital events such as birth or death, and
the conduct of public health surveillance, public health investigations,
and public health interventions; or, at the direction of a public health
authority, to an official of a foreign government agency that is acting
in collaboration with a public health authority;
\(ii\) A public health authority or other appropriate government
authority authorized by law to receive reports of child abuse or
neglect;
\(iii\) A person subject to the jurisdiction of the Food and Drug
Administration:
\(A\) To report adverse events (or similar reports with respect to food
or dietary supplements), product defects or problems (including problems
with the use or labeling of a product), or biological product deviations
if the disclosure is made to the person required or directed to report
such information to the Food and Drug Administration;
\(B\) To track products if the disclosure is made to a person required
or directed by the Food and Drug Administration to track the product;
\(C\) To enable product recalls, repairs, or replacement (including
locating and notifying individuals who have received products of product
recalls, withdrawals, or other problems); or
\(D\) To conduct post marketing surveillance to comply with requirements
or at the direction of the Food and Drug Administration;
\(iv\) A person who may have been exposed to a communicable disease or
may otherwise be at risk of contracting or spreading a disease or
condition, if the covered entity or public health authority is
authorized by law to notify such person as necessary in the conduct of a
public health intervention or investigation; or
\(v\) An employer, about an individual who is a member of the workforce
of the employer, if:
\(A\) The covered entity is a covered health care provider who is a
member of the workforce of such employer or who provides a health care
to the individual at the request of the employer:
(*1*) To conduct an evaluation relating to medical surveillance of the
workplace; or
(*2*) To evaluate whether the individual has a work‑related illness or
injury;
\(B\) The protected health information that is disclosed consists of
findings concerning a work‑related illness or injury or a
workplace-related medical surveillance;
\(C\) The employer needs such findings in order to comply with its
obligations, under 29 CFR parts 1904 through 1928, 30 CFR parts 50
through 90, or under state law having a similar purpose, to record such
illness or injury or to carry out responsibilities for workplace medical
surveillance;
\(D\) The covered health care provider provides written notice to the
individual that protected health information relating to the medical
surveillance of the workplace and work‑related illnesses and injuries is
disclosed to the employer:
(*1*) By giving a copy of the notice to the individual at the time the
health care is provided; or
(*2*) If the health care is provided on the work site of the employer,
by posting the notice in a prominent place at the location where the
health care is provided.
\(2\) [Permitted uses.]{.underline} If the covered entity also is a
public health authority, the covered entity is permitted to use
protected health information in all cases in which it is permitted to
disclose such information for public health activities under paragraph
(b)(1) of this section.
\(c\) [Standard: disclosures about victims of abuse, neglect or domestic
violence.]{.underline}
\(1\) [Permitted disclosures.]{.underline} Except for reports of child
abuse or neglect permitted by paragraph (b)(1)(ii) of this section, a
covered entity may disclose protected health information about an
individual whom the covered entity reasonably believes to be a victim of
abuse, neglect, or domestic violence to a government authority,
including a social service or protective services agency, authorized by
law to receive reports of such abuse, neglect, or domestic violence:
\(i\) To the extent the disclosure is required by law and the disclosure
complies with and is limited to the relevant requirements of such law;
\(ii\) If the individual agrees to the disclosure; or
\(iii\) To the extent the disclosure is expressly authorized by statute
or regulation and:
\(A\) The covered entity, in the exercise of professional judgment,
believes the disclosure is necessary to prevent serious harm to the
individual or other potential victims; or
\(B\) If the individual is unable to agree because of incapacity, a law
enforcement or other public official authorized to receive the report
represents that the protected health information for which disclosure is
sought is not intended to be used against the individual and that an
immediate enforcement activity that depends upon the disclosure would be
materially and adversely affected by waiting until the individual is
able to agree to the disclosure.
\(2\) [Informing the individual.]{.underline} A covered entity that
makes a disclosure permitted by paragraph (c)(1) of this section must
promptly inform the individual that such a report has been or will be
made, except if:
\(i\) The covered entity, in the exercise of professional judgment,
believes informing the individual would place the individual at risk of
serious harm; or
\(ii\) The covered entity would be informing a personal representative,
and the covered entity reasonably believes the personal representative
is responsible for the abuse, neglect, or other injury, and that
informing such person would not be in the best interests of the
individual as determined by the covered entity, in the exercise of
professional judgment.
\(d\) [Standard: uses and disclosures for health oversight
activities.]{.underline}
\(1\) [Permitted disclosures.]{.underline} A covered entity may disclose
protected health information to a health oversight agency for oversight
activities authorized by law, including audits; civil, administrative,
or criminal investigations; inspections; licensure or disciplinary
actions; civil, administrative, or criminal proceedings or actions; or
other activities necessary for appropriate oversight of:
\(i\) The health care system;
\(ii\) Government benefit programs for which health information is
relevant to beneficiary eligibility;
\(iii\) Entities subject to government regulatory programs for which
health information is necessary for determining compliance with program
standards; or
\(iv\) Entities subject to civil rights laws for which health
information is necessary for determining compliance.
\(2\) [Exception to health oversight activities.]{.underline} For the
purpose of the disclosures permitted by paragraph (d)(1) of this
section, a health oversight activity does not include an investigation
or other activity in which the individual is the subject of the
investigation or activity and such investigation or other activity does
not arise out of and is not directly related to:
\(i\) The receipt of health care;
\(ii\) A claim for public benefits related to health; or
\(iii\) Qualification for, or receipt of, public benefits or services
when a patient's health is integral to the claim for public benefits or
services.
\(3\) [Joint activities or investigations.]{.underline} Nothwithstanding
paragraph (d)(2) of this section, if a health oversight activity or
investigation is conducted in conjunction with an oversight activity or
investigation relating to a claim for public benefits not related to
health, the joint activity or investigation is considered a health
oversight activity for purposes of paragraph (d) of this section.
\(4\) [Permitted uses.]{.underline} If a covered entity also is a health
oversight agency, the covered entity may use protected health
information for health oversight activities as permitted by paragraph
(d) of this section.
\(e\) [Standard: disclosures for judicial and administrative
proceedings.]{.underline}
\(1\) [Permitted disclosures]{.underline}. A covered entity may disclose
protected health information in the course of any judicial or
administrative proceeding:
\(i\) In response to an order of a court or administrative tribunal,
provided that the covered entity discloses only the protected health
information expressly authorized by such order; or
\(ii\) In response to a subpoena, discovery request, or other lawful
process, that is not accompanied by an order of a court or
administrative tribunal, if:
\(A\) The covered entity receives satisfactory assurance, as described
in paragraph (e)(1)(iii) of this section, from the party seeking the
information that reasonable efforts have been made by such party to
ensure that the individual who is the subject of the protected health
information that has been requested has been given notice of the
request; or
\(B\) The covered entity receives satisfactory assurance, as described
in paragraph (e)(1)(iv) of this section, from the party seeking the
information that reasonable efforts have been made by such party to
secure a qualified protective order that meets the requirements of
paragraph (e)(1)(v) of this section.
\(iii\) For the purposes of paragraph (e)(1)(ii)(A) of this section, a
covered entity receives satisfactory assurances from a party seeking
protecting health information if the covered entity receives from such
party a written statement and accompanying documentation demonstrating
that:
\(A\) The party requesting such information has made a good faith
attempt to provide written notice to the individual (or, if the
individual's location is unknown, to mail a notice to the individual's
last known address);
\(B\) The notice included sufficient information about the litigation or
proceeding in which the protected health information is requested to
permit the individual to raise an objection to the court or
administrative tribunal; and
\(C\) The time for the individual to raise objections to the court or
administrative tribunal has elapsed, and:
(*1*) No objections were filed; or
(*2*) All objections filed by the individual have been resolved by the
court or the administrative tribunal and the disclosures being sought
are consistent with such resolution.
\(iv\) For the purposes of paragraph (e)(1)(ii)(B) of this section, a
covered entity receives satisfactory assurances from a party seeking
protected health information, if the covered entity receives from such
party a written statement and accompanying documentation demonstrating
that:
\(A\) The parties to the dispute giving rise to the request for
information have agreed to a qualified protective order and have
presented it to the court or administrative tribunal with jurisdiction
over the dispute; or
\(B\) The party seeking the protected health information has requested a
qualified protective order from such court or administrative tribunal.
\(v\) For purposes of paragraph (e)(1) of this section, a *qualified
protective order* means, with respect to protected health information
requested under paragraph (e)(1)(ii) of this section, an order of a
court or of an administrative tribunal or a stipulation by the parties
to the litigation or administrative proceeding that:
\(A\) Prohibits the parties from using or disclosing the protected
health information for any purpose other than the litigation or
proceeding for which such information was requested; and
\(B\) Requires the return to the covered entity or destruction of the
protected health information (including all copies made) at the end of
the litigation or proceeding.
\(vi\) Nothwithstanding paragraph (e)(1)(ii) of this section, a covered
entity may disclose protected health information in response to lawful
process described in paragraph (e)(1)(ii) of this section without
receiving satisfactory assurance under paragraph (e)(1)(ii)(A) or (B) of
this section, if the covered entity makes reasonable efforts to provide
notice to the individual sufficient to meet the requirements of
paragraph (e)(1)(iii) of this section or to seek a qualified protective
order sufficient to meet the requirements of paragraph (e)(1)(iv) of
this section.
\(2\) [Other uses and disclosures under this section.]{.underline} The
provisions of this paragraph do not supersede other provisions of this
section that otherwise permit or restrict uses or disclosures of
protected health information.
\(f\) [Standard: disclosures for law enforcement purposes.]{.underline}
A covered entity may disclose protected health information for a law
enforcement purpose to a law enforcement official if the conditions in
paragraphs (f)(1) through (f)(6) of this section are met, as applicable.
\(1\) [Permitted disclosures: pursuant to process and as otherwise
required by law]{.underline}. A covered entity may disclose protected
health information:
\(i\) As required by law including laws that require the reporting of
certain types of wounds or other physical injuries, except for laws
subject to paragraph (b)(1)(ii) or (c)(1)(i) of this section; or
\(ii\) In compliance with and as limited by the relevant requirements
of:
\(A\) A court order or court-ordered warrant, or a subpoena or summons
issued by a judicial officer;
\(B\) A grand jury subpoena; or
\(C\) An administrative request, including an administrative subpoena or
summons, a civil or an authorized investigative demand, or similar
process authorized under law, provided that:
(*1*) The information sought is relevant and material to a legitimate
law enforcement inquiry;
(*2*) The request is specific and limited in scope to the extent
reasonably practicable in light of the purpose for which the information
is sought; and
(*3*) De-identified information could not reasonably be used.
\(2\) [Permitted disclosures: limited information for identification and
location purposes.]{.underline} Except for disclosures required by law
as permitted by paragraph (f)(1) of this section, a covered entity may
disclose protected health information in response to a law enforcement
official's request for such information for the purpose of identifying
or locating a suspect, fugitive, material witness, or missing person,
provided that:
\(i\) The covered entity may disclose only the following information:
\(A\) Name and address;
\(B\) Date and place of birth;
\(C\) Social security number;
\(D\) ABO blood type and rh factor;
\(E\) Type of injury;
\(F\) Date and time of treatment;
\(G\) Date and time of death, if applicable; and
\(H\) A description of distinguishing physical characteristics,
including height, weight, gender, race, hair and eye color, presence or
absence of facial hair (beard or moustache), scars, and tattoos.
\(ii\) Except as permitted by paragraph (f)(2)(i) of this section, the
covered entity may not disclose for the purposes of identification or
location under paragraph (f)(2) of this section any protected health
information related to the individual's DNA or DNA analysis, dental
records, or typing, samples or analysis of body fluids or tissue.
\(3\) [Permitted disclosure: victims of a crime.]{.underline} Except for
disclosures required by law as permitted by paragraph (f)(1) of this
section, a covered entity may disclose protected health information in
response to a law enforcement official's request for such information
about an individual who is or is suspected to be a victim of a crime,
other than disclosures that are subject to paragraph (b) or (c) of this
section, if:
\(ii\) The individual agrees to the disclosure; or
\(iii\) The covered entity is unable to obtain the individual's
agreement because of incapacity or other emergency circumstance,
provided that:
\(A\) The law enforcement official represents that such information is
needed to determine whether a violation of law by a person other than
the victim has occurred, and such information is not intended to be used
against the victim;
\(B\) The law enforcement official represents that immediate law
enforcement activity that depends upon the disclosure would be
materially and adversely affected by waiting until the individual is
able to agree to the disclosure; and
\(C\) The disclosure is in the best interests of the individual as
determined by the covered entity, in the exercise of professional
judgment.
\(4\) [Permitted disclosure: decedents.]{.underline} A covered entity
may disclose protected health information about an individual who has
died to a law enforcement official for the purpose of alerting law
enforcement of the death of the individual if the covered entity has a
suspicion that such death may have resulted from criminal conduct.
\(5\) [Permitted disclosure: crime on premises.]{.underline} A covered
entity may disclose to a law enforcement official protected health
information that the covered entity believes in good faith constitutes
evidence of criminal conduct that occurred on the premises of the
covered entity.
\(6\) [Permitted disclosure: reporting crime in
emergencies.]{.underline} (i) A covered health care provider providing
emergency health care in response to a medical emergency, other than
such emergency on the premises of the covered health care provider, may
disclose protected health information to a law enforcement official if
such disclosure appears necessary to alert law enforcement to:
\(A\) The commission and nature of a crime;
\(B\) The location of such crime or of the victim(s) of such crime; and
\(C\) The identity, description, and location of the perpetrator of such
crime.
\(ii\) If a covered health care provider believes that the medical
emergency described in paragraph (f)(6)(i) of this section is the result
of abuse, neglect, or domestic violence of the individual in need of
emergency health care, paragraph (f)(6)(i) of this section does not
apply and any disclosure to a law enforcement official for law
enforcement purposes is subject to paragraph (c) of this section.
\(g\) [Standard: uses and disclosures about decedents.]{.underline} (1)
[Coroners and medical examiners.]{.underline} A covered entity may
disclose protected health information to a coroner or medical examiner
for the purpose of identifying a deceased person, determining a cause of
death, or other duties as authorized by law. A covered entity that also
performs the duties of a coroner or medical examiner may use protected
health information for the purposes described in this paragraph.
\(2\) [Funeral directors.]{.underline} A covered entity may disclose
protected health information to funeral directors, consistent with
applicable law, as necessary to carry out their duties with respect to
the decedent. If necessary for funeral directors carry out their duties,
the covered entity may disclose the protected health information prior
to, and in reasonable anticipation of, the individual's death.
\(h\) [Standard: uses and disclosures for cadaveric organ, eye or tissue
donation purposes.]{.underline} A covered entity may use or disclose
protected health information to organ procurement organizations or other
entities engaged in the procurement, banking, or transplantation of
cadaveric organs, eyes, or tissue for the purpose of facilitating organ,
eye or tissue donation and transplantation.
\(i\) [Standard: uses and disclosures for research
purposes.]{.underline} (1) [Permitted uses and disclosures.]{.underline}
A covered entity may use or disclose protected health information for
research, regardless of the source of funding of the research, provided
that:
\(i\) [Board approval of a waiver of authorization.]{.underline} The
covered entity obtains documentation that an alteration to or waiver, in
whole or in part, of the individual authorization required by §164.508
for use or disclosure of protected health information has been approved
by either:
\(A\) An Institutional Review Board (IRB), established in accordance
with 7 CFR 1c.107, 10 CFR 745.107, 14 CFR 1230.107, 15 CFR 27.107, 16
CFR 1028.107, 21 CFR 56.107, 22 CFR 225.107, 24 CFR 60.107, 28 CFR
46.107, 32 CFR 219.107, 34 CFR 97.107, 38 CFR 16.107, 40 CFR 26.107, 45
CFR 46.107, 45 CFR 690.107, or 49 CFR 11.107; or
\(B\) A privacy board that:
(*1*) Has members with varying backgrounds and appropriate professional
competency as necessary to review the effect of the research protocol on
the individual's privacy rights and related interests;
(*2*) Includes at least one member who is not affiliated with the
covered entity, not affiliated with any entity conducting or sponsoring
the research, and not related to any person who is affiliated with any
of such entities; and
(*3*) Does not have any member participating in a review of any project
in which the member has a conflict of interest.
\(ii\) [Reviews preparatory to research.]{.underline} The covered entity
obtains from the researcher representations that:
\(A\) Use or disclosure is sought solely to review protected health
information as necessary to prepare a research protocol or for similar
purposes preparatory to research;
\(B\) No protected health information is to be removed from the covered
entity by the researcher in the course of the review; and
\(C\) The protected health information for which use or access is sought
is necessary for the research purposes.
\(iii\) [Research on decedent's information.]{.underline} The covered
entity obtains from the researcher:
\(A\) Representation that the use or disclosure is sought is solely for
research on the protected health information of decedents;
\(B\) Documentation, at the request of the covered entity, of the death
of such individuals; and
\(C\) Representation that the protected health information for which use
or disclosure is sought is necessary for the research purposes.
\(2\) [Documentation of waiver approval.]{.underline} For a use or
disclosure to be permitted based on documentation of approval of an
alteration or waiver, under paragraph (i)(1)(i) of this section, the
documentation must include all of the following:
\(i\) [Identification and date of action.]{.underline} A statement
identifying the IRB or privacy board and the date on which the
alteration or waiver of authorization was approved;
\(ii\) [Waiver criteria.]{.underline} A statement that the IRB or
privacy board has determined that the alteration or waiver, in whole or
in part, of authorization satisfies the following criteria:
\(A\) The use or disclosure of protected health information involves no
more than minimal risk to the individuals;
\(B\) The alteration or waiver will not adversely affect the privacy
rights and the welfare of the individuals;
\(C\) The research could not practicably be conducted without the
alteration or waiver;
\(D\) The research could not practicably be conducted without access to
and use of the protected health information;
\(E\) The privacy risks to individuals whose protected health
information is to be used or disclosed are reasonable in relation to the
anticipated benefits if any to the individuals, and the importance of
the knowledge that may reasonably be expected to result from the
research;
\(F\) There is an adequate plan to protect the identifiers from improper
use and disclosure;
\(G\) There is an adequate plan to destroy the identifiers at the
earliest opportunity consistent with conduct of the research, unless
there is a health or research justification for retaining the
identifiers, or such retention is otherwise required by law; and
\(H\) There are adequate written assurances that the protected health
information will not be reused or disclosed to any other person or
entity, except as required by law, for authorized oversight of the
research project, or for other research for which the use or disclosure
of protected health information would be permitted by this subpart.
\(iii\) [Protected health information needed.]{.underline} A brief
description of the protected health information for which use or access
has been determined to be necessary by the IRB or privacy board has
determined, pursuant to paragraph (i)(2)(ii)(D) of this section;
\(iv\) [Review and approval procedures.]{.underline} A statement that
the alteration or waiver of authorization has been reviewed and approved
under either normal or expedited review procedures, as follows:
\(A\) An IRB must follow the requirements of the Common Rule, including
the normal review procedures (7 CFR 1c.108(b), 10 CFR 745.108(b), 14 CFR
1230.108(b), 15 CFR 27.108(b), 16 CFR 1028.108(b), 21 CFR 56.108(b), 22
CFR 225.108(b), 24 CFR 60.108(b), 28 CFR 46.108(b), 32 CFR 219.108(b),
34 CFR 97.108(b), 38 CFR 16.108(b), 40 CFR 26.108(b), 45 CFR 46.108(b),
45 CFR 690.108(b), or 49 CFR 11.108(b)) or the expedited review
procedures (7 CFR 1c.110, 10 CFR 745.110, 14 CFR 1230.110, 15 CFR
27.110, 16 CFR 1028.110, 21 CFR 56.110, 22 CFR 225.110, 24 CFR 60.110,
28 CFR 46.110, 32 CFR 219.110, 34 CFR 97.110, 38 CFR 16.110, 40 CFR
26.110, 45 CFR 46.110, 45 CFR 690.110, or 49 CFR 11.110);
\(B\) A privacy board must review the proposed research at convened
meetings at which a majority of the privacy board members are present,
including at least one member who satisfies the criterion stated in
paragraph (i)(1)(i)(B)(*2*) of this section, and the alteration or
waiver of authorization must be approved by the majority of the privacy
board members present at the meeting, unless the privacy board elects to
use an expedited review procedure in accordance with paragraph
(i)(2)(iv)(C) of this section;
\(C\) A privacy board may use an expedited review procedure if the
research involves no more than minimal risk to the privacy of the
individuals who are the subject of the protected health information for
which use or disclosure is being sought. If the privacy board elects to
use an expedited review procedure, the review and approval of the
alteration or waiver of authorization may be carried out by the chair of
the privacy board, or by one or more members of the privacy board as
designated by the chair; and
\(v\) [Required signature.]{.underline} The documentation of the
alteration or waiver of authorization must be signed by the chair or
other member, as designated by the chair, of the IRB or the privacy
board, as applicable.
\(j\) [Standard: uses and disclosures to avert a serious threat to
health or safety.]{.underline} (1) [Permitted disclosures.]{.underline}
A covered entity may, consistent with applicable law and standards of
ethical conduct, use or disclose protected health information, if the
covered entity, in good faith, believes the use or disclosure:
(i)(A) Is necessary to prevent or lessen a serious and imminent threat
to the health or safety of a person or the public; and
\(B\) Is to a person or persons reasonably able to prevent or lessen the
threat, including the target of the threat; or
\(ii\) Is necessary for law enforcement authorities to identify or
apprehend an individual:
\(A\) Because of a statement by an individual admitting participation in
a violent crime that the covered entity reasonably believes may have
caused serious physical harm to the victim; or
\(B\) Where it appears from all the circumstances that the individual
has escaped from a correctional institution or from lawful custody, as
those terms are defined in § 164.501.
\(2\) [Use or disclosure not permitted..]{.underline} A use or
disclosure pursuant to paragraph (j)(1)(ii)(A) of this section may not
be made if the information described in paragraph (j)(1)(ii)(A) of this
section is learned by the covered entity:
\(i\) In the course of treatment to affect the propensity to commit the
criminal conduct that is the basis for the disclosure under paragraph
(j)(1)(ii)(A) of this section, or counseling or therapy; or
\(ii\) Through a request by the individual to initiate or to be referred
for the treatment, counseling, or therapy described in paragraph
(j)(2)(i) of this section.
\(3\) [Limit on information that may be disclosed.]{.underline} A
disclosure made pursuant to paragraph (j)(1)(ii)(A) of this section
shall contain only the statement described in paragraph (j)(1)(ii)(A) of
this section and the protected health information described in paragraph
(f)(2)(i) of this section.
\(4\) [Presumption of good faith belief.]{.underline} A covered entity
that uses or discloses protected health information pursuant to
paragraph (j)(1) of this section is presumed to have acted in good faith
with regard to a belief described in paragraph (j)(1)(i) or (ii) of this
section, if the belief is based upon the covered entity's actual
knowledge or in reliance on a credible representation by a person with
apparent knowledge or authority.
\(k\) [Standard: uses and disclosures for specialized government
functions.]{.underline} (1) [Military and veterans
activities.]{.underline} (i) [Armed Forces personnel.]{.underline} A
covered entity may use and disclose the protected health information of
individuals who are Armed Forces personnel for activities deemed
necessary by appropriate military command authorities to assure the
proper execution of the military mission, if the appropriate military
authority has published by notice in the **Federal Register** the
following information:
\(A\) Appropriate military command authorities; and
\(B\) The purposes for which the protected health information may be
used or disclosed.
\(ii\) [Separation or discharge from military service.]{.underline} A
covered entity that is a component of the Departments of Defense or
Transportation may disclose to the Department of Veterans Affairs (DVA)
the protected health information of an individual who is a member of the
Armed Forces upon the separation or discharge of the individual from
military service for the purpose of a determination by DVA of the
individual's eligibility for or entitlement to benefits under laws
administered by the Secretary of Veterans Affairs.
\(iii\) [Veterans.]{.underline} A covered entity that is a component of
the Department of Veterans Affairs may use and disclose protected health
information to components of the Department that determine eligibility
for or entitlement to, or that provide, benefits under the laws
administered by the Secretary of Veterans Affairs.
\(iv\) [Foreign military personnel.]{.underline} A covered entity may
use and disclose the protected health information of individuals who are
foreign military personnel to their appropriate foreign military
authority for the same purposes for which uses and disclosures are
permitted for Armed Forces personnel under the notice published in the
**Federal Register** pursuant to paragraph (k)(1)(i) of this section.
\(2\) [National security and intelligence activities.]{.underline} A
covered entity may disclose protected health information to authorized
federal officials for the conduct of lawful intelligence,
counter-intelligence, and other national security activities authorized
by the National Security Act (50 U.S.C. 401, *et seq.*) and implementing
authority (e.g., Executive Order 12333).
\(3\) [Protective services for the President and others.]{.underline} A
covered entity may disclose protected health information to authorized
federal officials for the provision of protective services to the
President or other persons authorized by 18 U.S.C. 3056, or to foreign
heads of state or other persons authorized by 22 U.S.C. 2709(a)(3), or
to for the conduct of investigations authorized by 18 U.S.C. 871 and
879.
\(4\) [Medical suitability determinations.]{.underline} A covered entity
that is a component of the Department of State may use protected health
information to make medical suitability determinations and may disclose
whether or not the individual was determined to be medically suitable to
the officials in the Department of State who need access to such
information for the following purposes:
\(i\) For the purpose of a required security clearance conducted
pursuant to Executive Orders 10450 and 12698;
\(ii\) As necessary to determine worldwide availability or availability
for mandatory service abroad under sections 101(a)(4) and 504 of the
Foreign Service Act; or
\(iii\) For a family to accompany a Foreign Service member abroad,
consistent with section 101(b)(5) and 904 of the Foreign Service Act.
\(5\) [Correctional institutions and other law enforcement custodial
situations.]{.underline} (i) [Permitted disclosures.]{.underline} A
covered entity may disclose to a correctional institution or a law
enforcement official having lawful custody of an inmate or other
individual protected health information about such inmate or individual,
if the correctional institution or such law enforcement official
represents that such protected health information is necessary for:
\(A\) The provision of health care to such individuals;
\(B\) The health and safety of such individual or other inmates;
\(C\) The health and safety of the officers or employees of or others at
the correctional institution;
\(D\) The health and safety of such individuals and officers or other
persons responsible for the transporting of inmates or their transfer
from one institution, facility, or setting to another;
\(E\) Law enforcement on the premises of the correctional institution;
and
\(F\) The administration and maintenance of the safety, security, and
good order of the correctional institution.
\(ii\) [Permitted uses.]{.underline} A covered entity that is a
correctional institution may use protected health information of
individuals who are inmates for any purpose for which such protected
health information may be disclosed.
\(iii\) [No application after release.]{.underline} For the purposes of
this provision, an individual is no longer an inmate when released on
parole, probation, supervised release, or otherwise is no longer in
lawful custody.
\(6\) [Covered entities that are government programs providing public
benefits.]{.underline} (i) A health plan that is a government program
providing public benefits may disclose protected health information
relating to eligibility for or enrollment in the health plan to another
agency administering a government program providing public benefits if
the sharing of eligibility or enrollment information among such
government agencies or the maintenance of such information in a single
or combined data system accessible to all such government agencies is
required or expressly authorized by statute or regulation.
\(ii\) A covered entity that is a government agency administering a
government program providing public benefits may disclose protected
health information relating to the program to another covered entity
that is a government agency administering a government program providing
public benefits if the programs serve the same or similar populations
and the disclosure of protected health information is necessary to
coordinate the covered functions of such programs or to improve
administration and management relating to the covered functions of such
programs.
\(l\) [Standard: disclosures for workers' compensation.]{.underline} A
covered entity may disclose protected health information as authorized
by and to the extent necessary to comply with laws relating to workers'
compensation or other similar programs, established by law, that provide
benefits for work-related injuries or illness without regard to fault.
[§ 164.514 Other requirements relating to uses and disclosures of
protected health information.]{.underline}
\(a\) [Standard: de-identification of protected health
information.]{.underline} Health information that does not identify an
individual and with respect to which there is no reasonable basis to
believe that the information can be used to identify an individual is
not individually identifiable health information.
\(b\) [Implementation specifications: requirements for de-identification
of protected health information.]{.underline} A covered entity may
determine that health information is not individually identifiable
health information only if:
\(1\) A person with appropriate knowledge of and experience with
generally accepted statistical and scientific principles and methods for
rendering information not individually identifiable:
\(i\) Applying such principles and methods, determines that the risk is
very small that the information could be used, alone or in combination
with other reasonably available information, by an anticipated recipient
to identify an individual who is a subject of the information; and
\(ii\) Documents the methods and results of the analysis that justify
such determination; or
(2)(i) The following identifiers of the individual or of relatives,
employers, or household members of the individual, are removed:
\(A\) Names;
\(B\) All geographic subdivisions smaller than a State, including street
address, city, county, precinct, zip code, and their equivalent
geocodes, except for the initial three digits of a zip code if,
according to the current publicly available data from the Bureau of the
Census:
(*1*) The geographic unit formed by combining all zip codes with the
same three initial digits contains more than 20,000 people; and
(*2*) The initial three digits of a zip code for all such geographic
units containing 20,000 or fewer people is changed to 000.
\(C\) All elements of dates (except year) for dates directly related to
an individual, including birth date, admission date, discharge date,
date of death; and all ages over 89 and all elements of dates (including
year) indicative of such age, except that such ages and elements may be
aggregated into a single category of age 90 or older;
\(D\) Telephone numbers;
\(E\) Fax numbers;
\(F\) Electronic mail addresses;
\(G\) Social security numbers;
\(H\) Medical record numbers;
\(I\) Health plan beneficiary numbers;
\(J\) Account numbers;
\(K\) Certificate/license numbers;
\(L\) Vehicle identifiers and serial numbers, including license plate
numbers;
\(M\) Device identifiers and serial numbers;
\(N\) Web Universal Resource Locators (URLs);
\(O\) Internet Protocol (IP) address numbers;
\(P\) Biometric identifiers, including finger and voice prints;
\(Q\) Full face photographic images and any comparable images; and
\(R\) Any other unique identifying number, characteristic, or code; and
\(ii\) The covered entity does not have actual knowledge that the
information could be used alone or in combination with other information
to identify an individual who is a subject of the information.
\(c\) [Implementation specifications: re-identification.]{.underline} A
covered entity may assign a code or other means of record identification
to allow information de-identified under this section to be
re-identified by the covered entity, provided that:
\(1\) [Derivation.]{.underline} The code or other means of record
identification is not derived from or related to information about the
individual and is not otherwise capable of being translated so as to
identify the individual; and
\(2\) [Security.]{.underline} The covered entity does not use or
disclose the code or other means of record identification for any other
purpose, and does not disclose the mechanism for re-identification.
(d)(1) [Standard: minimum necessary requirements.]{.underline} A covered
entity must reasonably ensure that the standards, requirements, and
implementation specifications of § 164.502(b) and this section relating
to a request for or the use and disclosure of the minimum necessary
protected health information are met.
\(2\) [Implementation specifications: minimum necessary uses of
protected health information.]{.underline} (i) A covered entity must
identify:
\(A\) Those persons or classes of persons, as appropriate, in its
workforce who need access to protected health information to carry out
their duties; and
\(B\) For each such person or class of persons, the category or
categories of protected health information to which access is needed and
any conditions appropriate to such access.
\(ii\) A covered entity must make reasonable efforts to limit the access
of such persons or classes identified in paragraph (d)(2)(i)(A) of this
section to protected health information consistent with paragraph
(d)(2)(i)(B) of this section.
\(3\) [Implementation specification: minimum necessary disclosures of
protected health information.]{.underline} (i) For any type of
disclosure that it makes on a routine and recurring basis, a covered
entity must implement policies and procedures (which may be standard
protocols) that limit the protected health information disclosed to the
amount reasonably necessary to achieve the purpose of the disclosure.
\(ii\) For all other disclosures, a covered entity must:
\(A\) Develop criteria designed to limit the protected health
information disclosed to the information reasonably necessary to
accomplish the purpose for which disclosure is sought; and
\(B\) Review requests for disclosure on an individual basis in
accordance with such criteria.
\(iii\) A covered entity may rely, if such reliance is reasonable under
the circumstances, on a requested disclosure as the minimum necessary
for the stated purpose when:
\(A\) Making disclosures to public officials that are permitted under §
164.512, if the public official represents that the information
requested is the minimum necessary for the stated purpose(s);
\(B\) The information is requested by another covered entity;
\(C\) The information is requested by a professional who is a member of
its workforce or is a business associate of the covered entity for the
purpose of providing professional services to the covered entity, if the
professional represents that the information requested is the minimum
necessary for the stated purpose(s); or
\(D\) Documentation or representations that comply with the applicable
requirements of § 164.512(i) have been provided by a person requesting
the information for research purposes.
\(4\) [Implementation specifications: minimum necessary requests for
protected health information.]{.underline} (i) A covered entity must
limit any request for protected health information to that which is
reasonably necessary to accomplish the purpose for which the request is
made, when requesting such information from other covered entities.
\(ii\) For a request that is made on a routine and recurring basis, a
covered entity must implement policies and procedures (which may be
standard protocols) that limit the protected health information
requested to the amount reasonably necessary to accomplish the purpose
for which the request is made.
\(iii\) For all other requests, a covered entity must review the request
on an individual basis to determine that the protected health
information sought is limited to the information reasonably necessary to
accomplish the purpose for which the request is made.
\(5\) [Implementation specification: other content
requirement.]{.underline} For all uses, disclosures, or requests to
which the requirements in paragraph (d) of this section apply, a covered
entity may not use, discloses or request an entire medical record,
except when the entire medical record is specifically justified as the
amount that is reasonably necessary to accomplish the purpose of the
use, disclosure, or request.
(e)(1) [Standard: uses and disclosures of protected health information
for marketing.]{.underline} A covered entity may not use or disclose
protected health information for marketing without an authorization that
meets the applicable requirements of § 164.508, except as provided for
by paragraph (e)(2) of this section.
\(2\) [Implementation specifications: requirements relating to
marketing.]{.underline} (i) A covered entity is not required to obtain
an authorization under § 164.508 when it uses or discloses protected
health information to make a marketing communication to an individual
that:
\(A\) Occurs in a face-to-face encounter with the individual;
\(B\) Concerns products or services of nominal value; or
\(C\) Concerns the health-related products and services of the covered
entity or of a third party and the communication meets the applicable
conditions in paragraph (e)(3) of this section.
\(ii\) A covered entity may disclose protected health information for
purposes of such communications only to a business associate that
assists the covered entity with such communications.
\(3\) [Implementation specifications: requirements for certain marketing
communications.]{.underline} For a marketing communication to qualify
under paragraph (e)(2)(i) of this section, the following conditions must
be met:
\(i\) The communication must:
\(A\) Identify the covered entity as the party making the communication;
\(B\) If the covered entity has received or will receive direct or
indirect remuneration for making the communication, prominently state
that fact; and
\(C\) Except when the communication is contained in a newsletter or
similar type of general communication device that the covered entity
distributes to a broad cross-section of patients, enrollees, or other
broad groups of individuals, contain instructions describing how the
individual may opt out of receiving future such communications.
\(ii\) If the covered entity uses or discloses protected health
information to target the communication to individuals based on their
health status or condition:
\(A\) The covered entity must make a determination prior to making the
communication that the product or service being marketed may be
beneficial to the health of the type or class of individual targeted;
and
\(B\) The communication must explain why the individual has been
targeted and how the product or service relates to the health of the
individual.
\(iii\) The covered entity must make reasonable efforts to ensure that
individuals who decide to opt out of receiving future marketing
communications, under paragraph (e)(3)(i)(C) of this section, are not
sent such communications.
(f)(1) [Standard: uses and disclosures for fundraising.]{.underline} A
covered entity may use, or disclose to a business associate or to an
institutionally related foundation, the following protected health
information for the purpose of raising funds for its own benefit,
without an authorization meeting the requirements of § 164.508:
\(i\) Demographic information relating to an individual; and
\(ii\) Dates of health care provided to an individual.
\(2\) [Implementation specifications: fundraising
requirements.]{.underline} (i) The covered entity may not use or
disclose protected health information for fundraising purposes as
otherwise permitted by paragraph (f)(1) of this section unless a
statement required by § 164.520(b)(1)(iii)(B) is included in the covered
entity's notice;
\(ii\) The covered entity must include in any fundraising materials it
sends to an individual under this paragraph a description of how the
individual may opt out of receiving any further fundraising
communications.
\(iii\) The covered entity must make reasonable efforts to ensure that
individuals who decide to opt out of receiving future fundraising
communications are not sent such communications.
\(g\) [Standard: uses and disclosures for underwriting and related
purposes.]{.underline} If a health plan receives protected heath
information for the purpose of underwriting, premium rating, or other
activities relating to the creation, renewal, or replacement of a
contract of health insurance or health benefits, and if such health
insurance or health benefits are not placed with the health plan, such
health plan may not use or disclose such protected health information
for any other purpose, except as may be required by law.
(h)(1) [Standard: verification requirements]{.underline}. Prior to any
disclosure permitted by this subpart, a covered entity must:
\(i\) Except with respect to disclosures under § 164.510, verify the
identity of a person requesting protected health information and the
authority of any such person to have access to protected health
information under this subpart, if the identity or any such authority of
such person is not known to the covered entity; and
\(ii\) Obtain any documentation, statements, or representations, whether
oral or written, from the person requesting the protected health
information when such documentation, statement, or representation is a
condition of the disclosure under this subpart.
\(2\) [Implementation specifications: verification]{.underline}. (i)
[Conditions on disclosures]{.underline}. If a disclosure is conditioned
by this subpart on particular documentation, statements, or
representations from the person requesting the protected health
information, a covered entity may rely, if such reliance is reasonable
under the circumstances, on documentation, statements, or
representations that, on their face, meet the applicable requirements.
\(A\) The conditions in § 164.512(f)(1)(ii)(C) may be satisfied by the
administrative subpoena or similar process or by a separate written
statement that, on its face, demonstrates that the applicable
requirements have been met.
\(B\) The documentation required by § 164.512(i)(2) may be satisfied by
one or more written statements, provided that each is appropriately
dated and signed in accordance with § 164.512(i)(2)(i) and (v).
\(ii\) [Identity of public officials]{.underline}. A covered entity may
rely, if such reliance is reasonable under the circumstances, on any of
the following to verify identity when the disclosure of protected health
information is to a public official or a person acting on behalf of the
public official:
\(A\) If the request is made in person, presentation of an agency
identification badge, other official credentials, or other proof of
government status;
\(B\) If the request is in writing, the request is on the appropriate
government letterhead; or
\(C\) If the disclosure is to a person acting on behalf of a public
official, a written statement on appropriate government letterhead that
the person is acting under the government\'s authority or other evidence
or documentation of agency, such as a contract for services, memorandum
of understanding, or purchase order, that establishes that the person is
acting on behalf of the public official.
\(iii\) [Authority of public officials]{.underline}. A covered entity
may rely, if such reliance is reasonable under the circumstances, on any
of the following to verify authority when the disclosure of protected
health information is to a public official or a person acting on behalf
of the public official:
\(A\) A written statement of the legal authority under which the
information is requested, or, if a written statement would be
impracticable, an oral statement of such legal authority;
\(B\) If a request is made pursuant to legal process, warrant, subpoena,
order, or other legal process issued by a grand jury or a judicial or
administrative tribunal is presumed to constitute legal authority.
\(iv\) [Exercise of professional judgment.]{.underline} The verification
requirements of this paragraph are met if the covered entity relies on
the exercise of professional judgment in making a use or disclosure in
accordance with § 164.510 or acts on a good faith belief in making a
disclosure in accordance with § 164.512(j).
[§ 164.520 Notice of privacy practices for protected health
information.]{.underline}
\(a\) [Standard: notice of privacy practices.]{.underline} (1) [Right to
notice.]{.underline} Except as provided by paragraph (a)(2) or (3) of
this section, an individual has a right to adequate notice of the uses
and disclosures of protected health information that may be made by the
covered entity, and of the individual's rights and the covered entity's
legal duties with respect to protected health information.
\(2\) [Exception for group health plans.]{.underline} (i) An individual
enrolled in a group health plan has a right to notice:
\(A\) From the group health plan, if, and to the extent that, such an
individual does not receive health benefits under the group health plan
through an insurance contract with a health insurance issuer or HMO; or
\(B\) From the health insurance issuer or HMO with respect to the group
health plan though which such individuals receive their health benefits
under the group health plan.
\(ii\) A group health plan that provides health benefits solely through
an insurance contract with a health insurance issuer or HMO, and that
creates or receives protected health information in addition to summary
health information as defined in § 164.504(a) or information on whether
the individual is participating in the group health plan, or is enrolled
in or has disenrolled from a health insurance issuer or HMO offered by
the plan, must:
\(A\) Maintain a notice under this section; and
\(B\) Provide such notice upon request to any person. The provisions of
paragraph (c)(1) of this section do not apply to such group health plan.
\(iii\) A group health plan that provides health benefits solely through
an insurance contract with a health insurance issuer or HMO, and does
not create or receive protected health information other than summary
health information as defined in § 164.504(a) or information on whether
an individual is participating in the group health plan, or is enrolled
in or has disenrolled from a health insurance issuer or HMO offered by
the plan, is not required to maintain or provide a notice under this
section.
\(3\) [Exception for inmates.]{.underline} An inmate does not have a
right to notice under this section, and the requirements of this section
do not apply to a correctional institution that is a covered entity.
\(b\) [Implementation specifications: content of notice.]{.underline}
\(1\) [Required elements.]{.underline} The covered entity must provide a
notice that is written in plain language and that contains the elements
required by this paragraph.
\(i\) [Header.]{.underline} The notice must contain the following
statement as a header or otherwise prominently displayed: "THIS NOTICE
DESCRIBES HOW MEDICAL INFORMATION ABOUT YOU MAY BE USED AND DISCLOSED
AND HOW YOU CAN GET ACCESS TO THIS INFORMATION. PLEASE REVIEW IT
CAREFULLY."
\(ii\) [Uses and disclosures.]{.underline} The notice must contain:
\(A\) A description, including at least one example, of the types of
uses and disclosures that the covered entity is permitted by this
subpart to make for each of the following purposes: treatment, payment,
and health care operations.
\(B\) A description of each of the other purposes for which the covered
entity is permitted or required by this subpart to use or disclose
protected health information without the individual's written consent or
authorization.
\(C\) If a use or disclosure for any purpose described in paragraphs
(b)(1)(ii)(A) or (B) of this section is prohibited or materially limited
by other applicable law, the description of such use or disclosure must
reflect the more stringent law as defined in § 160.202.
\(D\) For each purpose described in paragraph (b)(1)(ii)(A) or (B) of
this section, the description must include sufficient detail to place
the individual on notice of the uses and disclosures that are permitted
or required by this subpart and other applicable law.
\(E\) A statement that other uses and disclosures will be made only with
the individual\'s written authorization and that the individual may
revoke such authorization as provided by § 164.508(b)(5).
\(iii\) [Separate statements for certain uses or
disclosures.]{.underline} If the covered entity intends to engage in any
of the following activities, the description required by paragraph
(b)(1)(ii)(A) of this section must include a separate statement, as
applicable, that:
\(A\) The covered entity may contact the individual to provide
appointment reminders or information about treatment alternatives or
other heath-related benefits and services that may be of interest to the
individual;
\(B\) The covered entity may contact the individual to raise funds for
the covered entity; or
\(C\) A group health plan, or a health insurance issuer or HMO with
respect to a group health plan, may disclose protected health
information to the sponsor of the plan.
\(iv\) [Individual rights.]{.underline} The notice must contain a
statement of the individual's rights with respect to protected health
information and a brief description of how the individual may exercise
these rights, as follows:
\(A\) The right to request restrictions on certain uses and disclosures
of protected health information as provided by § 164.522(a), including a
statement that the covered entity is not required to agree to a
requested restriction;
\(B\) The right to receive confidential communications of protected
health information as provided by § 164.522(b), as applicable;
\(C\) The right to inspect and copy protected health information as
provided by § 164.524;
\(D\) The right to amend protected health information as provided by §
164.526;
\(E\) The right to receive an accounting of disclosures of protected
health information as provided by § 164.528; and
\(F\) The right of an individual, including an individual who has agreed
to receive the notice electronically in accordance with paragraph (c)(3)
of this section, to obtain a paper copy of the notice from the covered
entity upon request.
\(v\) [Covered entity's duties.]{.underline} The notice must contain:
\(A\) A statement that the covered entity is required by law to maintain
the privacy of protected health information and to provide individuals
with notice of its legal duties and privacy practices with respect to
protected health information;
\(B\) A statement that the covered entity is required to abide by the
terms of the notice currently in effect; and
\(C\) For the covered entity to apply a change in a privacy practice
that is described in the notice to protected health information that the
covered entity created or received prior to issuing a revised notice, in
accordance with § 164.530(i)(2)(ii), a statement that it reserves the
right to change the terms of its notice and to make the new notice
provisions effective for all protected health information that it
maintains. The statement must also describe how it will provide
individuals with a revised notice.
\(vi\) [Complaints.]{.underline} The notice must contain a statement
that individuals may complain to the covered entity and to the Secretary
if they believe their privacy rights have been violated, a brief
description of how the individual may file a complaint with the covered
entity, and a statement that the individual will not be retaliated
against for filing a complaint.
\(vii\) [Contact.]{.underline} The notice must contain the name, or
title, and telephone number of a person or office to contact for further
information as required by § 164.530(a)(1)(ii).
\(viii\) [Effective date.]{.underline} The notice must contain the date
on which the notice is first in effect, which may not be earlier than
the date on which the notice is printed or otherwise published.
\(2\) [Optional elements.]{.underline} (i) In addition to the
information required by paragraph (b)(1) of this section, if a covered
entity elects to limit the uses or disclosures that it is permitted to
make under this subpart, the covered entity may describe its more
limited uses or disclosures in its notice, provided that the covered
entity may not include in its notice a limitation affecting its right to
make a use or disclosure that is required by law or permitted by §
164.512(j)(1)(i).
\(ii\) For the covered entity to apply a change in its more limited uses
and disclosures to protected health information created or received
prior to issuing a revised notice, in accordance with §
164.530(i)(2)(ii), the notice must include the statements required by
paragraph (b)(1)(v)(C) of this section.
\(3\) [Revisions to the notice.]{.underline} The covered entity must
promptly revise and distribute its notice whenever there is a material
change to the uses or disclosures, the individual's rights, the covered
entity's legal duties, or other privacy practices stated in the notice.
Except when required by law, a material change to any term of the notice
may not be implemented prior to the effective date of the notice in
which such material change is reflected.
\(c\) [Implementation specifications: provision of notice.]{.underline}
A covered entity must make the notice required by this section available
on request to any person and to individuals as specified in paragraphs
(c)(1) through (c)(4) of this section, as applicable.
\(1\) [Specific requirements for health plans]{.underline}. (i) A health
plan must provide notice:
\(A\) No later than the compliance date for the health plan, to
individuals then covered by the plan;
\(B\) Thereafter, at the time of enrollment, to individuals who are new
enrollees; and
\(C\) Within 60 days of a material revision to the notice, to
individuals then
covered by the plan.
\(ii\) No less frequently than once every three years, the health plan
must notify individuals then covered by the plan of the availability of
the notice and how to obtain the notice.
\(iii\) The health plan satisfies the requirements of paragraph (c)(1)
of this section if notice is provided to the named insured of a policy
under which coverage is provided to the named insured and one or more
dependents.
\(iv\) If a health plan has more than one notice, it satisfies the
requirements of paragraph (c)(1) of this section by providing the notice
that is relevant to the individual or other person requesting the
notice.
\(2\) [Specific requirements for certain covered health care
providers.]{.underline} A covered health care provider that has a direct
treatment relationship with an individual must:
\(i\) Provide the notice no later than the date of the first service
delivery, including service delivered electronically, to such individual
after the compliance date for the covered health care provider;
\(ii\) If the covered health care provider maintains a physical service
delivery site:
\(A\) Have the notice available at the service delivery site for
individuals to request to take with them; and
\(B\) Post the notice in a clear and prominent location where it is
reasonable to expect individuals seeking service from the covered health
care provider to be able to read the notice; and
\(iii\) Whenever the notice is revised, make the notice available upon
request on or after the effective date of the revision and promptly
comply with the requirements of paragraph (c)(2)(ii) of this section, if
applicable.
\(3\) [Specific requirements for electronic notice.]{.underline} (i) A
covered entity that maintains a web site that provides information about
the covered entity's customer services or benefits must prominently post
its notice on the web site and make the notice available electronically
through the web site.
\(ii\) A covered entity may provide the notice required by this section
to an individual by e-mail, if the individual agrees to electronic
notice and such agreement has not been withdrawn. If the covered entity
knows that the e-mail transmission has failed, a paper copy of the
notice must be provided to the individual. Provision of electronic
notice by the covered entity will satisfy the provision requirements of
paragraph (c) of this section when timely made in accordance with
paragraph (c)(1) or (2) of this section.
\(iii\) For purposes of paragraph (c)(2)(i) of this section, if the
first service delivery to an individual is delivered electronically, the
covered health care provider must provide electronic notice
automatically and contemporaneously in response to the individual's
first request for service.
\(iv\) The individual who is the recipient of electronic notice retains
the right to obtain a paper copy of the notice from a covered entity
upon request.
\(d\) [Implementation specifications: joint notice by separate covered
entities.]{.underline} Covered entities that participate in organized
health care arrangements may comply with this section by a joint notice,
provided that:
\(1\) The covered entities participating in the organized health care
arrangement agree to abide by the terms of the notice with respect to
protected health information created or received by the covered entity
as part of its participation in the organized health care arrangement;
\(2\) The joint notice meets the implementation specifications in
paragraph (b) of this section, except that the statements required by
this section may be altered to reflect the fact that the notice covers
more than one covered entity; and
\(i\) Describes with reasonable specificity the covered entities, or
class of entities, to which the joint notice applies;
\(ii\) Describes with reasonable specificity the service delivery sites,
or classes of service delivery sites, to which the joint notice applies;
and
\(iii\) If applicable, states that the covered entities participating in
the organized health care arrangement will share protected health
information with each other, as necessary to carry out treatment,
payment, or health care operations relating to the organized health care
arrangement.
\(3\) The covered entities included in the joint notice must provide the
notice to individuals in accordance with the applicable implementation
specifications of paragraph (c) of this section. Provision of the joint
notice to an individual by any one of the covered entities included in
the joint notice will satisfy the provision requirement of paragraph (c)
of this section with respect to all others covered by the joint notice.
\(e\) [Implementation specifications: documentation.]{.underline} A
covered entity must document compliance with the notice requirements by
retaining copies of the notices issued by the covered entity as required
by § 164.530(j).
[§ 164.522 Rights to request privacy protection for protected health
information.]{.underline}
(a)(1) [Standard: right of an individual to request restriction of uses
and disclosures.]{.underline} (i) A covered entity must permit an
individual to request that the covered entity restrict:
\(A\) Uses or disclosures of protected health information about the
individual to carry out treatment, payment, or health care operations;
and
\(B\) Disclosures permitted under § 164.510(b).
\(ii\) A covered entity is not required to agree to a restriction.
\(iii\) A covered entity that agrees to a restriction under paragraph
(a)(1)(i) of this section may not use or disclose protected health
information in violation of such restriction, except that, if the
individual who requested the restriction is in need of emergency
treatment and the restricted protected health information is needed to
provide the emergency treatment, the covered entity may use the
restricted protected health information, or may disclose such
information to a health care provider, to provide such treatment to the
individual.
\(iv\) If restricted protected health information is disclosed to a
health care provider for emergency treatment under paragraph (a)(1)(iii)
of this section, the covered entity must request that such health care
provider not further use or disclose the information.
\(v\) A restriction agreed to by a covered entity under paragraph (a) of
this section, is not effective under this subpart to prevent uses or
disclosures permitted or required under §§ 164.502(a)(2)(i), 164.510(a)
or 164.512.
\(2\) [Implementation specifications: terminating a
restriction.]{.underline} A covered entity may terminate its agreement
to a restriction, if :
\(i\) The individual agrees to or requests the termination in writing;
\(ii\) The individual orally agrees to the termination and the oral
agreement is documented; or
\(iii\) The covered entity informs the individual that it is terminating
its agreement to a restriction, except that such termination is only
effective with respect to protected health information created or
received after it has so informed the individual.
\(3\) [Implementation specification: documentation.]{.underline} A
covered entity that agrees to a restriction must document the
restriction in accordance with § 164.530(j).
(b)(1) [Standard: confidential communications requirements.]{.underline}
(i) A covered health care provider must permit individuals to request
and must accommodate reasonable requests by individuals to receive
communications of protected health information from the covered health
care provider by alternative means or at alternative locations.
\(ii\) A health plan must permit individuals to request and must
accommodate reasonable requests by individuals to receive communications
of protected health information from the health plan by alternative
means or at alternative locations, if the individual clearly states that
the disclosure of all or part of that information could endanger the
individual,
\(2\) [Implementation specifications: conditions on providing
confidential communications.]{.underline}
\(i\) A covered entity may require the individual to make a request for
a confidential communication described in paragraph (b)(1) of this
section in writing.
\(ii\) A covered entity may condition the provision of a reasonable
accommodation on:
\(A\) When appropriate, information as to how payment, if any, will be
handled; and
\(B\) Specification of an alternative address or other method of
contact.
\(iii\) A covered health care provider may not require an explanation
from the individual as to the basis for the request as a condition of
providing communications on a confidential basis.
\(iv\) A health plan may require that a request contain a statement that
disclosure of all or part of the information to which the request
pertains could endanger the individual.
[§ 164.524 Access of individuals to protected health
information.]{.underline}
\(a\) [Standard: access to protected health information.]{.underline}
(1) [Right of access.]{.underline} Except as otherwise provided in
paragraph (a)(2) or (a)(3) of this section, an individual has a right of
access to inspect and obtain a copy of protected health information
about the individual in a designated record set, for as long as the
protected health information is maintained in the designated record set,
except for:
\(i\) Psychotherapy notes;
\(ii\) Information compiled in reasonable anticipation of, or for use
in, a civil, criminal, or administrative action or proceeding; and
\(iii\) Protected health information maintained by a covered entity that
is:
\(A\) Subject to the Clinical Laboratory Improvements Amendments of
1988, 42 U.S.C. 263a, to the extent the provision of access to the
individual would be prohibited by law; or
\(B\) Exempt from the Clinical Laboratory Improvements Amendments of
1988, pursuant to 42 CFR 493.3(a)(2).
\(2\) [Unreviewable grounds for denial.]{.underline} A covered entity
may deny an individual access without providing the individual an
opportunity for review, in the following circumstances.
\(i\) The protected health information is excepted from the right of
access by paragraph (a)(1) of this section.
\(ii\) A covered entity that is a correctional institution or a covered
health care provider acting under the direction of the correctional
institution may deny, in whole or in part, an inmate's request to obtain
a copy of protected health information, if obtaining such copy would
jeopardize the health, safety, security, custody, or rehabilitation of
the individual or of other inmates, or the safety of any officer,
employee, or other person at the correctional institution or responsible
for the transporting of the inmate.
\(iii\) An individual's access to protected health information created
or obtained by a covered health care provider in the course of research
that includes treatment may be temporarily suspended for as long as the
research is in progress, provided that the individual has agreed to the
denial of access when consenting to participate in the research that
includes treatment, and the covered health care provider has informed
the individual that the right of access will be reinstated upon
completion of the research.
\(iv\) An individual's access to protected health information that is
contained in records that are subject to the Privacy Act, 5 U.S.C. §
552a, may be denied, if the denial of access under the Privacy Act would
meet the requirements of that law.
\(v\) An individual's access may be denied if the protected health
information was obtained from someone other than a health care provider
under a promise of confidentiality and the access requested would be
reasonably likely to reveal the source of the information.
\(3\) [Reviewable grounds for denial.]{.underline} A covered entity may
deny an individual access, provided that the individual is given a right
to have such denials reviewed, as required by paragraph (a)(4) of this
section, in the following circumstances:
\(i\) A licensed health care professional has determined, in the
exercise of professional judgment, that the access requested is
reasonably likely to endanger the life or physical safety of the
individual or another person;
\(ii\) The protected health information makes reference to another
person (unless such other person is a health care provider) and a
licensed health care professional has determined, in the exercise of
professional judgment, that the access requested is reasonably likely to
cause substantial harm to such other person; or
\(iii\) The request for access is made by the individual's personal
representative and a licensed health care professional has determined,
in the exercise of professional judgment, that the provision of access
to such personal representative is reasonably likely to cause
substantial harm to the individual or another person.
\(4\) [Review of a denial of access.]{.underline} If access is denied on
a ground permitted under paragraph (a)(3) of this section, the
individual has the right to have the denial reviewed by a licensed
health care professional who is designated by the covered entity to act
as a reviewing official and who did not participate in the original
decision to deny. The covered entity must provide or deny access in
accordance with the determination of the reviewing official under
paragraph (d)(4) of this section.
\(b\) [Implementation specifications: requests for access and timely
action.]{.underline}
\(1\) [Individual's request for access.]{.underline} The covered entity
must permit an individual to request access to inspect or to obtain a
copy of the protected health information about the individual that is
maintained in a designated record set. The covered entity may require
individuals to make requests for access in writing, provided that it
informs individuals of such a requirement.
\(2\) [Timely action by the covered entity.]{.underline} (i) Except as
provided in paragraph (b)(2)(ii) of this section, the covered entity
must act on a request for access no later than 30 days after receipt of
the request as follows.
\(A\) If the covered entity grants the request, in whole or in part, it
must inform the individual of the acceptance of the request and provide
the access requested, in accordance with paragraph (c) of this section.
\(B\) If the covered entity denies the request, in whole or in part, it
must provide the individual with a written denial, in accordance with
paragraph (d) of this section.
\(ii\) If the request for access is for protected health information
that is not maintained or accessible to the covered entity on-site, the
covered entity must take an action required by paragraph (b)(2)(i) of
this section by no later than 60 days from the receipt of such a
request.
\(iii\) If the covered entity is unable to take an action required by
paragraph (b)(2)(i)(A) or (B) of this section within the time required
by paragraph (b)(2)(i) or (ii) of this section, as applicable, the
covered entity may extend the time for such actions by no more than 30
days, provided that:
\(A\) The covered entity, within the time limit set by paragraph
(b)(2)(i) or (ii) of this section, as applicable, provides the
individual with a written statement of the reasons for the delay and the
date by which the covered entity will complete its action on the
request; and
\(B\) The covered entity may have only one such extension of time for
action on a request for access.
\(c\) [Implementation specifications: provision of access.]{.underline}
If the covered entity provides an individual with access, in whole or in
part, to protected health information, the covered entity must comply
with the following requirements.
\(1\) [Providing the access requested.]{.underline} The covered entity
must provide the access requested by individuals, including inspection
or obtaining a copy, or both, of the protected health information about
them in designated record sets. If the same protected health information
that is the subject of a request for access is maintained in more than
one designated record set or at more than one location, the covered
entity need only produce the protected health information once in
response to a request for access.
\(2\) [Form of access requested.]{.underline} (i) The covered entity
must provide the individual with access to the protected health
information in the form or format requested by the individual, if it is
readily producible in such form or format; or, if not, in a readable
hard copy form or such other form or format as agreed to by the covered
entity and the individual.
\(ii\) The covered entity may provide the individual with a summary of
the protected health information requested, in lieu of providing access
to the protected health information or may provide an explanation of the
protected health information to which access has been provided, if:
\(A\) The individual agrees in advance to such a summary or explanation;
and
\(B\) The individual agrees in advance to the fees imposed, if any, by
the covered entity for such summary or explanation.
\(3\) [Time and manner of access.]{.underline} The covered entity must
provide the access as requested by the individual in a timely manner as
required by paragraph (b)(2) of this section, including arranging with
the individual for a convenient time and place to inspect or obtain a
copy of the protected health information, or mailing the copy of the
protected health information at the individual's request. The covered
entity may discuss the scope, format, and other aspects of the request
for access with the individual as necessary to facilitate the timely
provision of access.
\(4\) [Fees.]{.underline} If the individual requests a copy of the
protected health information or agrees to a summary or explanation of
such information, the covered entity may impose a reasonable, cost-based
fee, provided that the fee includes only the cost of:
\(i\) Copying, including the cost of supplies for and labor of copying,
the protected health information requested by the individual;
\(ii\) Postage, when the individual has requested the copy, or the
summary or explanation, be mailed; and
\(iii\) Preparing an explanation or summary of the protected health
information, if agreed to by the individual as required by paragraph
(c)(2)(ii) of this section.
\(d\) [Implementation specifications: denial of access.]{.underline} If
the covered entity denies access, in whole or in part, to protected
health information, the covered entity must comply with the following
requirements.
\(1\) [Making other information accessible.]{.underline} The covered
entity must, to the extent possible, give the individual access to any
other protected health information requested, after excluding the
protected health information as to which the covered entity has a ground
to deny access.
\(2\) [Denial.]{.underline} The covered entity must provide a timely,
written denial to the individual, in accordance with paragraph (b)(2) of
this section. The denial must be in plain language and contain:
\(i\) The basis for the denial;
\(ii\) If applicable, a statement of the individual's review rights
under paragraph (a)(4) of this section, including a description of how
the individual may exercise such review rights; and
\(iii\) A description of how the individual may complain to the covered
entity pursuant to the complaint procedures in § 164.530(d) or to the
Secretary pursuant to the procedures in § 160.306. The description must
include the name, or title, and telephone number of the contact person
or office designated in § 164.530(a)(1)(ii).
\(3\) [Other responsibility.]{.underline} If the covered entity does not
maintain the protected health information that is the subject of the
individual's request for access, and the covered entity knows where the
requested information is maintained, the covered entity must inform the
individual where to direct the request for access.
\(4\) [Review of denial requested.]{.underline} If the individual has
requested a review of a denial under paragraph (a)(4) of this section,
the covered entity must designate a licensed health care professional,
who was not directly involved in the denial to review the decision to
deny access. The covered entity must promptly refer a request for review
to such designated reviewing official. The designated reviewing official
must determine, within a reasonable period of time, whether or not to
deny the access requested based on the standards in paragraph (a)(3) of
this section. The covered entity must promptly provide written notice to
the individual of the determination of the designated reviewing official
and take other action as required by this section to carry out the
designated reviewing official's determination.
\(e\) [Implementation specification: documentation.]{.underline} A
covered entity must document the following and retain the documentation
as required by § 164.530(j):
\(1\) The designated record sets that are subject to access by
individuals; and
\(2\) The titles of the persons or offices responsible for receiving and
processing requests for access by individuals.
[§ 164.526 Amendment of protected health information.]{.underline}
\(a\) [Standard: right to amend.]{.underline}
\(1\) [Right to amend.]{.underline} An individual has the right to have
a covered entity amend protected health information or a record about
the individual in a designated record set for as long as the protected
health information is maintained in the designated record set.
\(2\) [Denial of amendment.]{.underline} A covered entity may deny an
individual's request for amendment, if it determines that the protected
health information or record that is the subject of the request:
\(i\) Was not created by the covered entity, unless the individual
provides a reasonable basis to believe that the originator of protected
health information is no longer available to act on the requested
amendment;
\(ii\) Is not part of the designated record set;
\(iii\) Would not be available for inspection under § 164.524; or
\(iv\) Is accurate and complete.
\(b\) [Implementation specifications: requests for amendment and timely
action.]{.underline}
\(1\) [Individual's request for amendment.]{.underline} The covered
entity must permit an individual to request that the covered entity
amend the protected health information maintained in the designated
record set. The covered entity may require individuals to make requests
for amendment in writing and to provide a reason to support a requested
amendment, provided that it informs individuals in advance of such
requirements.
\(2\) [Timely action by the covered entity.]{.underline} (i) The covered
entity must act on the individual's request for an amendment no later
than 60 days after receipt of such a request, as follows.
\(A\) If the covered entity grants the requested amendment, in whole or
in part, it must take the actions required by paragraphs (c)(1) and (2)
of this section.
\(B\) If the covered entity denies the requested amendment, in whole or
in part, it must provide the individual with a written denial, in
accordance with paragraph (d)(1) of this section.
\(ii\) If the covered entity is unable to act on the amendment within
the time required by paragraph (b)(2)(i) of this section, the covered
entity may extend the time for such action by no more than 30 days,
provided that:
\(A\) The covered entity, within the time limit set by paragraph
(b)(2)(i) of this section, provides the individual with a written
statement of the reasons for the delay and the date by which the covered
entity will complete its action on the request; and
\(B\) The covered entity may have only one such extension of time for
action on a request for an amendment.
\(c\) [Implementation specifications: accepting the
amendment.]{.underline} If the covered entity accepts the requested
amendment, in whole or in part, the covered entity must comply with the
following requirements.
\(1\) [Making the amendment.]{.underline} The covered entity must make
the appropriate amendment to the protected health information or record
that is the subject of the request for amendment by, at a minimum,
identifying the records in the designated record set that are affected
by the amendment and appending or otherwise providing a link to the
location of the amendment.
\(2\) [Informing the individual.]{.underline} In accordance with
paragraph (b) of this section, the covered entity must timely inform the
individual that the amendment is accepted and obtain the individual's
identification of and agreement to have the covered entity notify the
relevant persons with which the amendment needs to be shared in
accordance with paragraph (c)(3) of this section.
\(3\) [Informing others.]{.underline} The covered entity must make
reasonable efforts to inform and provide the amendment within a
reasonable time to:
\(i\) Persons identified by the individual as having received protected
health information about the individual and needing the amendment; and
\(ii\) Persons, including business associates, that the covered entity
knows have the protected health information that is the subject of the
amendment and that may have relied, or could foreseeably rely, on such
information to the detriment of the individual.
\(d\) [Implementation specifications: denying the
amendment.]{.underline} If the covered entity denies the requested
amendment, in whole or in part, the covered entity must comply with the
following requirements.
\(1\) [Denial.]{.underline} The covered entity must provide the
individual with a timely, written denial, in accordance with paragraph
(b)(2) of this section. The denial must use plain language and contain:
\(i\) The basis for the denial, in accordance with paragraph (a)(2) of
this section;
\(ii\) The individual's right to submit a written statement disagreeing
with the denial and how the individual may file such a statement;
\(iii\) A statement that, if the individual does not submit a statement
of disagreement, the individual may request that the covered entity
provide the individual's request for amendment and the denial with any
future disclosures of the protected health information that is the
subject of the amendment; and
\(iv\) A description of how the individual may complain to the covered
entity pursuant to the complaint procedures established in § 164.530(d)
or to the Secretary pursuant to the procedures established in § 160.306.
The description must include the name, or title, and telephone number of
the contact person or office designated in §164.530(a)(1)(ii).
\(2\) [Statement of disagreement.]{.underline} The covered entity must
permit the individual to submit to the covered entity a written
statement disagreeing with the denial of all or part of a requested
amendment and the basis of such disagreement. The covered entity may
reasonably limit the length of a statement of disagreement.
\(3\) [Rebuttal statement.]{.underline} The covered entity may prepare a
written rebuttal to the individual's statement of disagreement. Whenever
such a rebuttal is prepared, the covered entity must provide a copy to
the individual who submitted the statement of disagreement.
\(4\) [Recordkeeping.]{.underline} The covered entity must, as
appropriate, identify the record or protected health information in the
designated record set that is the subject of the disputed amendment and
append or otherwise link the individual's request for an amendment, the
covered entity's denial of the request, the individual's statement of
disagreement, if any, and the covered entity's rebuttal, if any, to the
designated record set.
\(5\) [Future disclosures.]{.underline} (i) If a statement of
disagreement has been submitted by the individual, the covered entity
must include the material appended in accordance with paragraph (d)(4)
of this section, or, at the election of the covered entity, an accurate
summary of any such information, with any subsequent disclosure of the
protected health information to which the disagreement relates.
\(ii\) If the individual has not submitted a written statement of
disagreement, the covered entity must include the individual's request
for amendment and its denial, or an accurate summary of such
information, with any subsequent disclosure of the protected health
information only if the individual has requested such action in
accordance with paragraph (d)(1)(iii) of this section.
\(iii\) When a subsequent disclosure described in paragraph (d)(5)(i) or
(ii) of this section is made using a standard transaction under part 162
of this subchapter that does not permit the additional material to be
included with the disclosure, the covered entity may separately transmit
the material required by paragraph (d)(5)(i) or (ii) of this section, as
applicable, to the recipient of the standard transaction.
\(e\) [Implementation specification: actions on notices of
amendment.]{.underline} A covered entity that is informed by another
covered entity of an amendment to an individual's protected health
information, in accordance with paragraph (c)(3) of this section, must
amend the protected health information in designated record sets as
provided by paragraph (c)(1) of this section.
\(f\) [Implementation specification: documentation.]{.underline} A
covered entity must document the titles of the persons or offices
responsible for receiving and processing requests for amendments by
individuals and retain the documentation as required by § 164.530(j).
[§ 164.528 Accounting of disclosures of protected health
information.]{.underline}
\(a\) [Standard: right to an accounting of disclosures of protected
health information.]{.underline}
\(1\) An individual has a right to receive an accounting of disclosures
of protected health information made by a covered entity in the six
years prior to the date on which the accounting is requested, except for
disclosures:
\(i\) To carry out treatment, payment and health care operations as
provided in § 164.502;
\(ii\) To individuals of protected health information about them as
provided in § 164.502;
\(iii\) For the facility's directory or to persons involved in the
individual's care or other notification purposes as provided in §
164.510;
\(iv\) For national security or intelligence purposes as provided in §
164.512(k)(2);
\(v\) To correctional institutions or law enforcement officials as
provided in § 164.512(k)(5); or
\(vi\) That occurred prior to the compliance date for the covered
entity.
(2)(i) The covered entity must temporarily suspend an individual's right
to receive an accounting of disclosures to a health oversight agency or
law enforcement official, as provided in § 164.512(d) or (f),
respectively, for the time specified by such agency or official, if such
agency or official provides the covered entity with a written statement
that such an accounting to the individual would be reasonably likely to
impede the agency\'s activities and specifying the time for which such a
suspension is required.
\(ii\) If the agency or official statement in paragraph (a)(2)(i) of
this section is made orally, the covered entity must:
\(A\) Document the statement, including the identity of the agency or
official making the statement;
\(B\) Temporarily suspend the individual's right to an accounting of
disclosures subject to the statement; and
\(C\) Limit the temporary suspension to no longer than 30 days from the
date of the oral statement, unless a written statement pursuant to
paragraph (a)(2)(i) of this section is submitted during that time.
\(3\) An individual may request an accounting of disclosures for a
period of time less than six years from the date of the request.
\(b\) [Implementation specifications: content of the
accounting.]{.underline} The covered entity must provide the individual
with a written accounting that meets the following requirements.
\(1\) Except as otherwise provided by paragraph (a) of this section, the
accounting must include disclosures of protected health information that
occurred during the six years (or such shorter time period at the
request of the individual as provided in paragraph (a)(3) of this
section) prior to the date of the request for an accounting, including
disclosures to or by business associates of the covered entity.
\(2\) The accounting must include for each disclosure:
\(i\) The date of the disclosure;
\(ii\) The name of the entity or person who received the protected
health information and, if known, the address of such entity or person;
\(iii\) A brief description of the protected health information
disclosed; and
\(iv\) A brief statement of the purpose of the disclosure that
reasonably informs the individual of the basis for the disclosure; or,
in lieu of such statement:
\(A\) A copy of the individual's written authorization pursuant to §
164.508; or
\(B\) A copy of a written request for a disclosure under §§
164.502(a)(2)(ii) or 164.512, if any.
\(3\) If, during the period covered by the accounting, the covered
entity has made multiple disclosures of protected health information to
the same person or entity for a single purpose under §§
164.502(a)(2)(ii) or 164.512, or pursuant to a single authorization
under § 164.508, the accounting may, with respect to such multiple
disclosures, provide:
\(i\) The information required by paragraph (b)(2) of this section for
the first disclosure during the accounting period;
\(ii\) The frequency, periodicity, or number of the disclosures made
during the accounting period; and
\(iii\) The date of the last such disclosure during the accounting
period.
\(c\) [Implementation specifications: provision of the
accounting.]{.underline}
\(1\) The covered entity must act on the individual's request for an
accounting, no later than 60 days after receipt of such a request, as
follows.
\(i\) The covered entity must provide the individual with the accounting
requested; or
\(ii\) If the covered entity is unable to provide the accounting within
the time required by paragraph (c)(1) of this section, the covered
entity may extend the time to provide the accounting by no more than 30
days, provided that:
\(A\) The covered entity, within the time limit set by paragraph (c)(1)
of this section, provides the individual with a written statement of the
reasons for the delay and the date by which the covered entity will
provide the accounting; and
\(B\) The covered entity may have only one such extension of time for
action on a request for an accounting.
\(2\) The covered entity must provide the first accounting to an
individual in any 12 month period without charge. The covered entity may
impose a reasonable, cost-based fee for each subsequent request for an
accounting by the same individual within the 12 month period, provided
that the covered entity informs the individual in advance of the fee and
provides the individual with an opportunity to withdraw or modify the
request for a subsequent accounting in order to avoid or reduce the fee.
\(d\) [Implementation specification: documentation.]{.underline} A
covered entity must document the following and retain the documentation
as required by § 164.530(j):
\(1\) The information required to be included in an accounting under
paragraph (b) of this section for disclosures of protected health
information that are subject to an accounting under paragraph (a) of
this section;
\(2\) The written accounting that is provided to the individual under
this section; and
\(3\) The titles of the persons or offices responsible for receiving and
processing requests for an accounting by individuals.
[§ 164.530 Administrative requirements.]{.underline}
(a)(1) [Standard: personnel designations.]{.underline} (i) A covered
entity must designate a privacy official who is responsible for the
development and implementation of the policies and procedures of the
entity.
\(ii\) A covered entity must designate a contact person or office who is
responsible for receiving complaints under this section and who is able
to provide further information about matters covered by the notice
required by § 164.520.
\(2\) [Implementation specification: personnel
designations.]{.underline} A covered entity must document the personnel
designations in paragraph (a)(1) of this section as required by
paragraph (j) of this section.
(b)(1) [Standard: training.]{.underline} A covered entity must train all
members of its workforce on the policies and procedures with respect to
protected health information required by this subpart, as necessary and
appropriate for the members of the workforce to carry out their function
within the covered entity.
\(2\) [Implementation specifications: training.]{.underline} (i) A
covered entity must provide training that meets the requirements of
paragraph (b)(1) of this section, as follows:
\(A\) To each member of the covered entity\'s workforce by no later than
the compliance date for the covered entity;
\(B\) Thereafter, to each new member of the workforce within a
reasonable period of time after the person joins the covered entity's
workforce; and
\(C\) To each member of the covered entity's workforce whose functions
are affected by a material change in the policies or procedures required
by this subpart, within a reasonable period of time after the material
change becomes effective in accordance with paragraph (i) of this
section.
\(ii\) A covered entity must document that the training as described in
paragraph (b)(2)(i) of this section has been provided, as required by
paragraph (j) of this section.
(c)(1) [Standard: safeguards.]{.underline} A covered entity must have in
place appropriate administrative, technical, and physical safeguards to
protect the privacy of protected health information.
\(2\) [Implementation specification: safeguards.]{.underline} A covered
entity must reasonably safeguard protected health information from any
intentional or unintentional use or disclosure that is in violation of
the standards, implementation specifications or other requirements of
this subpart.
(d)(1) [Standard: complaints to the covered entity.]{.underline} A
covered entity must provide a process for individuals to make complaints
concerning the covered entity\'s policies and procedures required by
this subpart or its compliance with such policies and procedures or the
requirements of this subpart.
\(2\) [Implementation specification: documentation of
complaints.]{.underline} As required by paragraph (j) of this section, a
covered entity must document all complaints received, and their
disposition, if any.
(e)(1) [Standard: sanctions]{.underline}. A covered entity must have and
apply appropriate sanctions against members of its workforce who fail to
comply with the privacy policies and procedures of the covered entity or
the requirements of this subpart. This standard does not apply to a
member of the covered entity's workforce with respect to actions that
are covered by and that meet the conditions of § 164.502(j) or paragraph
(g)(2) of this section.
\(2\) [Implementation specification: documentation.]{.underline} As
required by paragraph (j) of this section, a covered entity must
document the sanctions that are applied, if any.
\(f\) [Standard: mitigation.]{.underline} A covered entity must
mitigate, to the extent practicable, any harmful effect that is known to
the covered entity of a use or disclosure of protected health
information in violation of its policies and procedures or the
requirements of this subpart by the covered entity or its business
associate.
\(g\) [Standard: refraining from intimidating or retaliatory
acts.]{.underline} A covered entity may not intimidate, threaten,
coerce, discriminate against, or take other retaliatory action against:
\(1\) [Individuals.]{.underline} Any individual for the exercise by the
individual of any right under, or for participation by the individual in
any process established by this subpart, including the filing of a
complaint under this section;
\(2\) [Individuals and others.]{.underline} Any individual or other
person for:
\(i\) Filing of a complaint with the Secretary under subpart C of part
160 of this subchapter;
\(ii\) Testifying, assisting, or participating in an investigation,
compliance review, proceeding, or hearing under Part C of Title XI; or
\(iii\) Opposing any act or practice made unlawful by this subpart,
provided the individual or person has a good faith belief that the
practice opposed is unlawful, and the manner of the opposition is
reasonable and does not involve a disclosure of protected health
information in violation of this subpart.
\(h\) [Standard: waiver of rights.]{.underline} A covered entity may not
require individuals to waive their rights under § 160.306 of this
subchapter or this subpart as a condition of the provision of treatment,
payment, enrollment in a health plan, or eligibility for benefits.
(i)(1) [Standard: policies and procedures.]{.underline} A covered entity
must implement policies and procedures with respect to protected health
information that are designed to comply with the standards,
implementation specifications, or other requirements of this subpart.
The policies and procedures must be reasonably designed, taking into
account the size of and the type of activities that relate to protected
health information undertaken by the covered entity, to ensure such
compliance. This standard is not to be construed to permit or excuse an
action that violates any other standard, implementation specification,
or other requirement of this subpart.
\(2\) [Standard: changes to policies or procedures.]{.underline} (i) A
covered entity must change its policies and procedures as necessary and
appropriate to comply with changes in the law, including the standards,
requirements, and implementation specifications of this subpart;
\(ii\) When a covered entity changes a privacy practice that is stated
in the notice described in § 164.520, and makes corresponding changes to
its policies and procedures, it may make the changes effective for
protected health information that it created or received prior to the
effective date of the notice revision, if the covered entity has, in
accordance with § 164.520(b)(1)(v)(C), included in the notice a
statement reserving its right to make such a change in its privacy
practices; or
\(iii\) A covered entity may make any other changes to policies and
procedures at any time, provided that the changes are documented and
implemented in accordance with paragraph (i)(5) of this section.
\(3\) [Implementation specification: changes in law.]{.underline}
Whenever there is a change in law that necessitates a change to the
covered entity's policies or procedures, the covered entity must
promptly document and implement the revised policy or procedure. If the
change in law materially affects the content of the notice required by §
164.520, the covered entity must promptly make the appropriate revisions
to the notice in accordance with § 164.520(b)(3). Nothing in this
paragraph may be used by a covered entity to excuse a failure to comply
with the law.
\(4\) [Implementation specifications: changes to privacy practices
stated in the notice.]{.underline} (i) To implement a change as provided
by paragraph (i)(2)(ii) of this section, a covered entity must:
\(A\) Ensure that the policy or procedure, as revised to reflect a
change in the covered entity's privacy practice as stated in its notice,
complies with the standards, requirements, and implementation
specifications of this subpart;
\(B\) Document the policy or procedure, as revised, as required by
paragraph (j) of this section; and
\(C\) Revise the notice as required by § 164.520(b)(3) to state the
changed practice and make the revised notice available as required by §
164.520(c). The covered entity may not implement a change to a policy or
procedure prior to the effective date of the revised notice.
\(ii\) If a covered entity has not reserved its right under §
164.520(b)(1)(v)(C) to change a privacy practice that is stated in the
notice, the covered entity is bound by the privacy practices as stated
in the notice with respect to protected health information created or
received while such notice is in effect. A covered entity may change a
privacy practice that is stated in the notice, and the related policies
and procedures, without having reserved the right to do so, provided
that:
\(A\) Such change meets the implementation the requirements in
paragraphs (i)(4)(i)(A)-(C) of this section; and
\(B\) Such change is effective only with respect to protected health
information created or received after the effective date of the notice.
\(5\) [Implementation specification: changes to other policies or
procedures.]{.underline} A covered entity may change, at any time, a
policy or procedure that does not materially affect the content of the
notice required by § 164.520, provided that:
\(i\) The policy or procedure, as revised, complies with the standards,
requirements, and implementation specifications of this subpart; and
\(ii\) Prior to the effective date of the change, the policy or
procedure, as revised, is documented as required by paragraph (j) of
this section.
(j)(1) [Standard: documentation.]{.underline} A covered entity must:
\(i\) Maintain the policies and procedures provided for in paragraph (i)
of this section in written or electronic form;
\(ii\) If a communication is required by this subpart to be in writing,
maintain such writing, or an electronic copy, as documentation; and
\(iii\) If an action, activity, or designation is required by this
subpart to be documented, maintain a written or electronic record of
such action, activity, or designation.
\(2\) [Implementation specification: retention period.]{.underline} A
covered entity must retain the documentation required by paragraph
(j)(1) of this section for six years from the date of its creation or
the date when it last was in effect, whichever is later.
\(k\) [Standard: group health plans.]{.underline} (1) A group health
plan is not subject to the standards or implementation specifications in
paragraphs (a) through (f) and (i) of this section, to the extent that:
\(i\) The group health plan provides health benefits solely through an
insurance contract with a health insurance issuer or an HMO; and
\(ii\) The group health plan does not create or receive protected health
information, except for:
\(A\) Summary health information as defined in § 164.504(a); or
\(B\) Information on whether the individual is participating in the
group health plan, or is enrolled in or has disenrolled from a health
insurance issuer or HMO offered by the plan.
\(2\) A group health plan described in paragraph (k)(1) of this section
is subject to the standard and implementation specification in paragraph
(j) of this section only with respect to plan documents amended in
accordance with § 164.504(f).
[§ 164.532 Transition provisions.]{.underline}
\(a\) [Standard: effect of prior consents and
authorizations.]{.underline} Notwithstanding other sections of this
subpart, a covered entity may continue to use or disclose protected
health information pursuant to a consent, authorization, or other
express legal permission obtained from an individual permitting the use
or disclosure of protected health information that does not comply with
§§ 164.506 or 164.508 of this subpart consistent with paragraph (b) of
this section.
\(b\) [Implementation specification: requirements for retaining
effectiveness of prior consents and authorizations.]{.underline}
Notwithstanding other sections of this subpart, the following provisions
apply to use or disclosure by a covered entity of protected health
information pursuant to a consent, authorization, or other express legal
permission obtained from an individual permitting the use or disclosure
of protected health information, if the consent, authorization, or other
express legal permission was obtained from an individual before the
applicable compliance date of this subpart and does not comply with §§
164.506 or 164.508 of this subpart.
\(1\) If the consent, authorization, or other express legal permission
obtained from an individual permits a use or disclosure for purposes of
carrying out treatment, payment, or health care operations, the covered
entity may, with respect to protected health information that it created
or received before the applicable compliance date of this subpart and to
which the consent, authorization, or other express legal permission
obtained from an individual applies, use or disclose such information
for purposes of carrying out treatment, payment, or health care
operations, provided that:
\(i\) The covered entity does may not make any use or disclosure that is
expressly excluded from the a consent, authorization, or other express
legal permission obtained from an individual; and
\(ii\) The covered entity complies with all limitations placed by the
consent, authorization, or other express legal permission obtained from
an individual.
\(2\) If the consent, authorization, or other express legal permission
obtained from an individual specifically permits a use or disclosure for
a purpose other than to carry out treatment, payment, or health care
operations, the covered entity may, with respect to protected health
information that it created or received before the applicable compliance
date of this subpart and to which the consent, authorization, or other
express legal permission obtained from an individual applies, make such
use or disclosure, provided that:
\(i\) The covered entity does not make any use or disclosure that is
expressly excluded from the consent, authorization, or other express
legal permission obtained from an individual; and
\(ii\) The covered entity complies with all limitations placed by the
consent, authorization, or other express legal permission obtained from
an individual.
\(3\) In the case of a consent, authorization, or other express legal
permission obtained from an individual that identifies a specific
research project that includes treatment of individuals:
\(i\) If the consent, authorization, or other express legal permission
obtained from an individual specifically permits a use or disclosure for
purposes of the project, the covered entity may, with respect to
protected health information that it created or received either before
or after the applicable compliance date of this subpart and to which the
consent or authorization applies, make such use or disclosure for
purposes of that project, provided that the covered entity complies with
all limitations placed by the consent, authorization, or other express
legal permission obtained from an individual.
\(ii\) If the consent, authorization, or other express legal permission
obtained from an individual is a general consent to participate in the
project, and a covered entity is conducting or participating in the
research, such covered entity may, with respect to protected health
information that it created or received as part of the project before or
after the applicable compliance date of this subpart, make a use or
disclosure for purposes of that project, provided that the covered
entity complies with all limitations placed by the consent,
authorization, or other express legal permission obtained from an
individual.
\(4\) If, after the applicable compliance date of this subpart, a
covered entity agrees to a restriction requested by an individual under
§ 164.522(a), a subsequent use or disclosure of protected health
information that is subject to the restriction based on a consent,
authorization, or other express legal permission obtained from an
individual as given effect by paragraph (b) of this section, must comply
with such restriction.
[§ 164.534 Compliance dates for initial implementation of the privacy
standards.]{.underline}
\(a\) [Health care providers.]{.underline} A covered health care
provider must comply with the applicable requirements of this subpart no
later than \[OFR - insert date 24 months after the effective date of the
final rule in the **Federal Register**\].
\(b\) [Health plans.]{.underline} A health plan must comply with the
applicable requirements of this subpart no later than the following
date, as applicable:
\(1\) [Health plans other than small health plans --]{.underline}
\[OFR - insert date 24 months after the effective date of the final rule
in the **Federal Register**\].
\(2\) [Small health plans --]{.underline} \[OFR - insert date 36 months
after the effective date of the final rule in the **Federal
Register**\].
\(c\) [Health care clearinghouses.]{.underline} A health care
clearinghouse must comply with the applicable requirements of this
subpart no later than \[OFR - insert date 24 months after the effective
date of the final rule in the **Federal Register**\].
[^1]: The Principles are: (1) Notice; (2) Choice (*i.e.,* consent); (3)
Onward Transfer (*i.e.,* subsequent disclosures); (4) Security; (5)
Data Integrity; (6) Access; and (7) Enforcement. Department of
Commerce, Safe Harbor Principles, July 21, 2000 ("Principles"). They
do not apply to manually processed data.
[^2]: Privacy Protection Study Commission, "Personal Privacy in an
Information Society," July 1977, p. 298-299.
[^3]: Health Privacy Working Group, "Best Principles for Health
Privacy," Health Privacy Project, Institute for Health Care Research
and Policy, Georgetown University, July 1999.
[^4]: National Committee on Quality Assurance and the Joint Commission
on Accreditation of Healthcare Organizations, "Protecting Personal
Health Information: A Framework for Meeting the Challenges in a
Managed Care Environment,"1998, p. 25.
[^5]: ASTM, "Standard Guide for Confidentiality, Privacy, Access and
Data Security, Principles for Health Information Including
Computer-Based Patient Records," E 1869-97, § 11.1.1.
[^6]: Definition of Disease Management, October 1999 (from web site of
Disease Management Association of America
(www.dmaa.org/definition.html) accessed May 21, 2000.
Other references used for our analysis include:
Mary C. Gurnee, et al, Constructing Disease Management Programs,
Managed Care, June 1997, accessed at http://managedcaremag.com,
5/19/2000
Peter Wehrwein, Disease Management Gains a Degree of Respectability,
Managed Care, August 1997, accessed at www.managedcaremag.com,
5/18/00
John M. Harris, Jr., disease management: New Wine in Old Bottles,
124 Annals of Internal Medicine 838 (1996)
Robert S. Epstein and Louis M. Sherwood, From Outcomes research to
disease management: A Guide for the Perplexed, 124 Annals of
Internal Medicine 832 (1996)
Anne Mason et al, disease management, the Pharmaceutical Industry
and the NHS, Office of Health Economics (United Kingdom), accessed
at www.ohe.org, 5/19/2000
Thomas Bodenheimer, Disease Management \-- Promises and Pitfalls,
340 New Eng. J. Med, April 15, 1999, accessed at www.nejm.org,
4/20/99
Bernard Lo and Ann Alpers, Uses and Abuses of Prescription Drug
information in pharmacy benefits Management Programs, 283 JAMA 801
(2000)
Robert F. DeBusk, Correspondence, Disease Management, and Regina E.
Herzlinger, Correspondence, Disease Management, 341 New Eng. J. Med,
Sept 2, 1999, accessed 9/2/99
Letter, John A. Gans, American Pharmaceutical Association, to Health
Care Financing Administration, Reference HCFA-3002-P, April 12,
1999, accessed at www.aphanet.org, 1/18/2000
Ronald M. Davis, et al, Editorial, Advances in Managing Chronic
Disease, 320 BMJ 525 (2000), accessed at www.bmj.com, 2/25/00
Thomas Bodenheimer, Education and Debate, disease management in the
American Market, 320 BMJ 563 (2000), accessed at www.bmj.com,
2/25/2000
David J. Hunter, disease management: has it a future?, 320 BMJ 530
(2000), accessed www.bmj.com 2/25/2000
Trisha Greenhalgh, Commercial partnerships in chronic disease
management: proceeding with caution, 320 BMJ 566 (2000).
Edmund X. DeJesus, disease management in a Warehouse, Healthcare
Informatics, September 1999, accessed at
www.healthcare-informatics.com, 5/19/00
Regulation, 42 CFR 422.112, Medicare+Choice Program, subpart C,
Benefits and Beneficiary Protections, sec. 422.112, Access to
Services
Arnold Chen, Best Practices in Coordinated Care, Submitted by
Mathematica Policy Research, Inc., to Health Care Financing
Administration, March 22, 2000.
[^7]: *Confidentiality in Adolescent Health Care*, a joint policy
statement of the American Academy of Pediatrics; the American
Academy of Family Physicians; the American College of Obstetricians
and Gynecologists; NAACOG-The Organization for Obstetric,
Gynecologic, and Neonatal Nurses; and the National Medical
Association.
[^8]: J. Merz, P. Sankar, S.S. Yoo, "Hospital Consent for Disclosure of
Medical Records," *Journal of Law, Medicine & Ethics*, 26 (1998):
241-248.
[^9]: Privacy Protection Study Commission, "Personal Privacy in an
Information Society," July 1977, p. 306.
[^10]: Privacy Protection Study Commission, "Personal Privacy in an
Information Society," July 1977, pp. 215-217.
[^11]: Health Privacy Working Group, "Best Principles for Health
Privacy," Health Privacy Project, Institute for Health Care Research
and Policy, Georgetown University, July 1999, p. 19.
[^12]: AMA Council on Ethical and Judicial Affairs, "Opinion E-5.05:
Confidentiality," Issued December 1983, Updated June 1994.
[^13]: Privacy Protection Study Commission, "Personal Privacy in an
Information Society," July 1977, p. 196-197.
[^14]: Privacy Protection Study Commission, "Personal Privacy in an
Information Society," July 1977, p. 315
[^15]: ASTM, "Standard Guide for Confidentiality, Privacy, Access and
Data Security, Principles for Health Information Including
Computer-Based Patient Records," E 1869-97, § 12.1.4.
[^16]: Confidentiality and Data Access Committee, Federal Committee on
Statistical Methodology, Office of Management and Budget.
[^17]: Sweeney, L. Guaranteeing Anonymity when Sharing Medical Data, the
Datafly System. Masys, D., Ed. Proceedings, American Medical
Informatics Association, Nashville, TN: Hanley & Belfus, Inc.,
1997:51-55.
[^18]: The U.S. Census Bureau\'s Recommendations Concerning the Census
2000 Public Use Microdata Sample (PUMS) Files
\[http://www.ipums.org/\~census2000/2000pums_bureau.pdf\],
Population Division, U.S. Census Bureau, November 3, 2000.
[^19]: Figures derived from US Census data on 1990 Decennial Census of
Population and Housing, Summary Tape File 3B (STF3B). These data are
available to the public (for a fee) at
http://www.census.gov/mp/www/rom/msrom6af.html.
[^20]: *Statistical Policy Working Paper 22 ‑ Report on Statistical
Disclosure Limitation Methodology*
([http://www.fcsm.gov/working‑papers/wp22.html]{.underline})
(prepared by the Subcommittee on Disclosure Limitation Methodology,
Federal Committee on Statistical Methodology, Office of Management
and Budget).
[^21]: *The Geographic Component of Disclosure Risk for Microdata*.
Brian Greenberg and Laura Voshell. Bureau of the Census Statistical
Research Division Report: Census/SRD/RR-90-13, October, 1990.
[^22]: A Simulation Study of the Identifiability of Survey Respondents
when their Community of Residence is Known. John Horm, National
Center for Health Statistics, 2000.
[^23]: Privacy Protection Study Commission, "Personal Privacy in an
Information Society," July 1977, p. 313.
[^24]: Privacy Protection Study Commission, "Personal Privacy in an
Information Society," July 1977, p. 192.
[^25]: Health Privacy Working Group, "Best Principles for Health
Privacy," Health Privacy Project, Institute for Health Care Research
and Policy, Georgetown University, July 1999, p. 19.
[^26]: National Committee on Quality Assurance, "Surveyor Guidelines for
the Accreditation of MCOs,"effective July1, 2000 - June 30, 2001, p.
324.
[^27]: ASTM, "Standard Guide for Confidentiality, Privacy, Access and
Data Security, Principles for Health Information Including
Computer-Based Patient Records," E 1869-97, § 9.2.
[^28]: Privacy Protection Study Commission, "Personal Privacy in an
Information Society," July 1977, p. 300-303.
[^29]: Health Privacy Working Group, "Best Principles for Health
Privacy," Health Privacy Project, Institute for Health Care Research
and Policy, Georgetown University, July 1999.
[^30]: National Committee on Quality Assurance and the Joint Commission
on Accreditation of Healthcare Organizations, "Protecting Personal
Health Information: A Framework for Meeting the Challenges in a
Managed Care Environment,"1998, p. 25.
[^31]: ASTM, "Standard Guide for Confidentiality, Privacy, Access and
Data Security, Principles for Health Information Including
Computer-Based Patient Records," E 1869-97, § 11.1.1.
[^32]: Privacy Protection Study Commission, "Personal Privacy in an
Information Society," July 1977, p. 306-307.
[^33]: Janlori Goldman, Institute for Health Care Research and Policy,
Georgetown University: \<http://www.healthprivacy.org/resources\>.
[^34]: The proposed privacy rule provided an estimate for a five-year
period. However, the Transactions Rule provided a cost estimate for
a ten year period. The decision was made to provide the final
privacy estimates in a ten year period so that it would be possible
to compare the costs and benefits of the two regulations.
[^35]: This based on a seven percent real discount rate, explained in
OMB Circular A-94, and a projected 4.2 percent inflation rate
projected over the ten-year period covered by this analysis.
[^36]: The regulatory impact analysis in the Transactions Rule showed a
net savings of \$29.9 billion (net present value of \$19.1 billion
in 2002 dollars). The cost estimates included all electronic systems
changes that would be necessitated by the HIPAA administrative
standards (e.g., security, safeguards, and electronic signatures;
eligibility for a health plan; and remittance advice and payment
claim status), except privacy. At the time the Transactions Rule was
developed, the industry provided estimates for the systems changes
in the aggregate. The industry argued that affected parties would
seek to make all electronic changes in one effort because that
approach would be the most cost-efficient. The Department agreed,
and therefore, it "bundled" all the system change cost in the
Transactions Rule estimate. Privacy was not included because at the
time the Department had not made a decision to develop a privacy
rule. As the Department develops other HIPAA administrative
simplification standards, there may be additional costs and savings
due to the non-electronic components of those regulations, and they
will be identified in regulatory impact analyses that accompany
those regulations. The Department anticipates that such costs and
savings will be relatively small compared to the privacy and
Transactions rules. The Department anticipates that the net economic
impact of the rules will be a net savings to the health care system.
[^37]: Health spending projections from *National Health Expenditure
Projections 1998‑2008* (January 2000), Health Care Financing
Administration, Office of the Actuary,
\< [http://hcfa.hhs.gov/stats/nhe‑proj/]{.underline} \>.
[^38]: American Association of Health Plans, [Code of
Conduct]{.underline}; [http://www.aahp.org.;]{.underline} American
Dental Association, [Principles of Ethics and Professional
Conduct]{.underline}; [http://www.ada.org.;]{.underline} American
Hospital Association, "Disclosure of Medical Record Information,"
[Management Advisory: Information Management]{.underline}; 1990,
AHA: Chicago, IL.; American Medical Association, [AMA Policy
Finder - Current Opinions Council on Ethical and Judicial
Affairs]{.underline}; serval documents available through the Policy
Finder at [http://www.ama-assn.org.;]{.underline} American
Psychiatric Association, "APA Outlines Standards Needed to Protect
Patient's Medical Records"; Release No. 99-32, May27: 1999;
[http://www.psych.org.]{.underline}
[^39]: Ibid, Goldman, p. 6.
[^40]: "Practice Briefs," Journal of AHIMA; Harry Rhodes, Joan C.
Larson, Association of Health Information Outsourcing Service;
January 1999.
[^41]: Ibid, Goldman, p.20.
[^42]: Ibid, Goldman, p.21.
[^43]: "Medical records and privacy: empirical effects of legislation; A
memorial to Alice Hersh"; McCarthy, Douglas B; Shatin, Deborah; et
al.. [Health Service Research]{.underline}: April 1, 1999; No. 1,
Vol. 34; p 417. The article details the effects of the Minnesota law
conditioning disclosure of protected health information on patient
authorization.
[^44]: [Source Book of Health Insurance Data: 1997-1998]{.underline},
Health Insurance Association of America, 1998. p. 33.
[^45]: "Health plans," for purposes of the regulatory impact and
regulatory flexibility analyses, include licensed insurance carriers
who sell health products; third party administrators that will have
to comply with the regulation for the benefit of the plan sponsor;
and self-insured health plans that are at least partially
administered by the plan sponsor.
[^46]: Health Care Finance Administration, Office of the Actuary, 2000.
Estimates for the national health care expenditure accounts are only
available through 2008; hence, we are only able to make the
comparison through that year.
[^47]: These estimates were, in part, derived from a report prepared for
the Department by the Gartner Group, consultants in health care
information technology: "Gartner DHHS Privacy Regulation Study," by
Jim Klein and Wes Rishel, submitted to the Office of the Assistant
Secretary for Policy and Evaluation on OCTOBER 20, 2000.
[^48]: "Top Compensation in the Healthcare Industry, 1997\", Coopers &
Lybrand, New York, NY., \<http://www.pohly.com/salary/2.shtml\>.
[^49]: "A Unifif Survey of Compensation in Financial Services: 2000,"
July 2000, Unifi Network
Survey unit, PriceWaterhouseCoopers LLP and Global HR Solutions LLC,
Westport, Ct.,
\<http://public.wsj.com/careers/resources/documents/20000912-insuranceexecs-tab.htm\>.
[^50]: The cost for policies for minimum necessary, because they will be
distinct and extensive, are presented separately, above.
[^51]: "The Altman Weil 1999 Survey of Law Firm Economics,"
\<[http://www.altmanweil.com]{.underline}/publications/
survey/sife99/standard.htm\>.
[^52]: Equifax-Harris Consumer Privacy Survey, 1994
[^53]: [Consumer Privacy Survey]{.underline}, Harris-Equifax, 1994, p vi
[^54]: [Promoting Health: Protecting Privacy]{.underline}, California
Health Care Foundation and Consumers Union, January 1999, p 12
[^55]: [Health Information Privacy Survey]{.underline}, Harris-Equifax,
1993, pp 49-50
[^56]: American Cancer Society.
http://4a2z.com/cgi/rfr.cgi?4CANCER‑2‑http://www.cancer.org/frames.html
[^57]: American Cancer Society.
http://www3.cancer.org/cancerinfo/sitecenter.asp?ctid=8&scp=0&scs=0&scss=0&scdoc=40000
[^58]: Polednak, AP. "Estimating Prevalence of Cancer in the United
States," *Cancer* 1997; 8-:136-41.
[^59]: Martin Brown, "The Burden of Illness of Cancer: Economic Cost and
Quality of Life." *Annual Review of Public Health*, 2001:22:91-113.
[^60]: *Disease-Specific Estimates of Direct and Indirect Costs of
Illness and NIH Support: Fiscal Year 2000 Update*. Department of
Health and Human Services, National Institutes of Health, Office of
the Director, February 2000.
[^61]: DALY scores for 10 cancer sites are presented in Brown, "The
Burden of Illness of Cancer: Economic Cost and Quality of Life,"
figure 1.
[^62]: Breast Cancer Information Service.
http://trfn.clpgh.org/bcis/FAQ/facts2.html
[^63]: Jack S. Mandel, et al., "Reducing Mortality from Colorectal
Cancer by Screening for Fecal Occult Blood," *The New England
Journal of Medicine*, May 13, 1993, Vol. 328, No. 19.
[^64]: [Promoting Health: Protecting Privacy]{.underline}, California
Health Care Foundation and Consumers Union, January 1999, p 13
[^65]: For example, Roger Detels, M.D., et al., in "Effectiveness of
Potent Anti-retroviral Therapy\..." JAMA, 1998;280:1497-1503 note
the impact of therapy on HIV persons with respect to lengthening the
time to development of AIDS, not just delaying death in persons who
already have AIDS.
[^66]: John Hornberger et al, \"Early treatment with highly active
anti-retroviral therapy (HAART) is cost-effective compared to
delayed treatment,\" 12th World AIDS conference, 1998.
[^67]: [Sexually Transmitted Diseases in America]{.underline}, Kaiser
Family Foundation, 1998, p 12
[^68]: Standard Medical information; see http://www.mayohealth.org for
examples.
[^69]: Substance Abuse and Mental Health Services Administration.
[http://www.samhsa.gov/oas/srcbk/costs-02.htm.]{.underline} Source
of data: DP Rice, *Costs of Mental Illness* (unpublished data).
[^70]: Department of Health and Human Services. *Mental Health: A Report
of the Surgeon General*. Rockville, MD: 1999, page 408.
[^71]: According to the Surgeon General's Report, 28 percent of the
adult population have either a mental or addictive disorder,
*whether or not they receive services*: 19 percent have a mental
disorder alone, 6 percent have a substance abuse disorder alone, and
3 percent have both. Subtracting the 3 percent who have both, about
three-quarters of the population with either a mental or addictive
disorder have a mental disorder and one-quarter have a substance
abuse disorder. We assume that this ratio (three-quarter to
one-quarter) is the same for the adult population with either a
mental or addictive disorder *who do not receive services*. Thus, we
assume that 15 percent of the population have an untreated mental
disorder (three-quarters of 20percent) and 5 percent have an
untreated addictive disorder (one-quarter of 20 percent).
[^72]: According to the Population Estimates Program, Population
Division, U.S. Census Bureau, the U.S. population age 20 and older
is 197.1 million on Sept. 1, 2000. This estimate of the adult
population is used throughout this section.
[^73]: The number of adults with mental illness is calculated by
multiplying the U.S. Census Bureau estimate of the U.S. adult
population -- 197.1 million -- by the percent of the adult
population with mental illness -- 22 percent, according to the
Surgeon General's Report on Mental Health, which says that 19
percent of the population have a mental disorder alone and three
percent have a mental and substance abuse disorder.
[^74]: "Entities" and "establishments" are synonymous in this analysis.
[^75]: "Entities" and "establishments" are used synonymously in this
RFA.
[^76]: "Small governments" were not included in this analysis directly;
rather we have included the kinds of institutions within those
governments that are likely to incur costs, such as government
hospitals and clinics.
[^77]: Entities are the physical location where an enterprise conducts
business. An enterprise may conduct business in more than one
establishment.
[^78]: Office of Advocacy, U.S. Small Business Administration, from data
provided by the Bureau of the Census, Statistics of U.S. Businesses,
1997.
[^79]: Op.cit, 1997
[^80]: Office of Advocacy, U.S. Small Business Administration, from data
provided by the Bureau of the Census, Statistics of U.S. Businesses,
1997.
[^81]: Op.cit., 1997
[^82]: Health Care Financing Administration, OSCAR.
|
en
|
converted_docs
|
523240
|
**Theory Group Publication List 11/2005-10/2006**
"Baryon Triality And Neutrino Masses From An Anomalous Flavor U(1)"
By Hitoshi Murayama, Herbi K. Dreiner, Christoph Luhn, Marc Thormeier.
# LBNL-61894
Oct 2006. 52pp., hep-ph/0610026
"A Paradox In The Global Description Of The Multiverse" By Raphael
Bousso, Ben Freivogel,
# LBNL-61893
Oct 2006. 8pp., hep-th/0610132
"Disentangling Dimension Six Operators Through Di-Higgs Boson
Production" By Jesse Thaler (UC, Berkeley & LBL, Berkeley),
Aaron Pierce (Harvard U., Phys. Dept. & Michigan U.), Lian-Tao Wang
(Harvard U., Phys. Dept.) HUTP-06-A0037,
*LBNL-61548*
Sep 2006. 20pp., hep-ph/0609049
"Hunting the Scalar Glueball: Prospects for BES III"
Michael S. Chanowitz (LBL, Berkeley) .
Proceedings International Workshop on Tau-Charm Physics, Beijing, China
5-7 June 2006, Eds: Yi-Fang Wang and Hai-Bo Li
International Journal Mod. Phys. A, 21:5535 (2006)
LBNL-61631, Sep 2006. 10pp.
hep-ph/0609217
"A New Lorentz Violating Nonlocal Field Theory From String-Theory" By
Ori J. Ganor, UCB-PTH-06-19,
# LBNL-61897
Sep 2006. 8pp., hep-th/0609107
"Partial Waves Of Baryon-Antibaryon In Three-Body B Meson Decay"
By Mahiko Suzuki
# LBNL-61605
Sep 2006. 15pp., hep-ph/0609133
"Visible Cascade Higgs Decays To Four Photons At Hadron Colliders" By
Patrick J. Fox (LBL, Berkeley), Spencer Chang (CCPP, New York), Neal
Weiner (CCPP, New York)
*LBNL-61896*
Aug 2006. 6pp.,hep-ph/0608310
"Studies Of The Over-Rotating BMPV Solution" By Lisa Dyson (UC, Berkeley
& LBL, Berkeley). UCB-PTH-06-16,
*LBNL-61474*
Aug 2006. 29pp., hep-th/0608137
"Landscape Prediction For The Higgs Boson And Top Quark Masses" By
Taizan Watari, Brian Feldstein, Lawrence J. Hall, UCB-PTH-06-15,
*LBNL-61940*
Aug 2006. 41pp., hep-ph/0608121
"Supersymmetry Without The Desert" By Yasunori Nomura, David Poland (UC,
Berkeley & LBL, Berkeley), UCB-PTH-06-17,
# LBNL-61484
Aug 2006. 40pp., hep-ph/0608253
"Little M-Theory" By Jesse Thaler (Harvard U., Phys. Dept. & UC,
Berkeley & LBL, Berkeley), Hsin-Chia Cheng (UC, Davis), Lian-Tao Wang
(Harvard U., Phys. Dept.)
# LBNL-61941
Jul 2006. 32pp., HEP 0609:003,2006, hep-ph/0607205
"Supersymmetry Without A Light Higgs Boson" By Lawrence J. Hall,
Yasunori Nomura (UC, Berkeley & LBL, Berkeley) ,Riccardo Barbieri (Pisa,
Scuola Normale Superiore & INFN, Pisa), Vyacheslav S. Rychkov (Pisa,
Scuola Normale Superiore). UCB-PTH-0614,
*LBNL-61281 J Art*
Jul 2006. 27pp., hep-ph/0607332
"Power Corrections In Charmless Nonleptonic B-Decays: Annihilation Is
Factorizable And Real" By Zoltan Ligeti (LBL, Berkeley & MIT, LNS),
Christian M. Arnesen (MIT, LNS) , Ira Z. Rothstein (Carnegie Mellon U.)
, Iain W. Stewart (MIT, LNS) . MIT-CTP-3751,
*LBNL-61942*, CMU-HEP-06-08,
Jul 2006. 31pp., hep-ph/0607001
"Probing Late Neutrino Mass Properties With Supernova Neutrinos" By
Gilad Perez,
J. Baker (Arizona U.), H. Goldberg (Northeastern U.) , I. Sarcevic
(Arizona U.),
# LBNL-61943
Jul 2006. 23pp.: hep-ph/0607281
"Event Generation From Effective Field Theory" By Matthew D. Schwartz,
Christian W. Bauer.,
# LBNL-61439
Jul 2006. 43pp., hep-ph/0607296
"Topological Strings And (Almost) Modular Forms" By Mina Aganagic,
Vincent
Bouchard, Albrecht Klemm ,
## LBNL-61944
Jul 2006. 62pp., hep-th/0607100
"Probing Dark Energy Via Neutrino & Supernova Observatories"By Lawrence
J. Hall, Hitoshi Murayama, Michele Papucci, Gilad Perez (LBL, Berkeley &
UC, Berkeley) . *LBNL-61023*, UCB-PTH-06-13,
Jul 2006. 30pp.,hep-ph/0607109
"Collider Signals Of Top Quark Flavor Violation From A Warped Extra
Dimension" By Gilad Perez, Kaustubh Agashe (Syracuse U.), Amarjit Soni
(Brookhaven),SU-4252-830, BNL-HET-06-4,
# LBNL-61945
Jun 2006. 5pp., hep-ph/06062
"Supersymmetry With Small Mu: Connections Between Naturalness, Dark
Matter, And (Possibly) Flavor" By Yasunori Nomura (UC, Berkeley & LBL,
Ryuichiro Kitano (SLAC), Berkeley), SLAC-PUB-11892, UCB-PTH-06-11,
# LBNL-60363
Jun 2006. 27pp., hep-ph/0606134
"Magic Supergravities, N= 8 And Black Hole Composites" By Eric G. Gimon
(UC, Berkeley & LBL, Berkeley), Sergio Ferrara (CERN & Frascati & UCLA)
, , Renata Kallosh (Stanford U., Phys. Dept.) . CERN-PH-TH-2006-116,
SU-ITP-2006-19,
*LBNL-60487*, UCLA-06-TEP-19,
Jun 2006. 35pp., hep-th/0606211
"Four Dimensional Black Hole Microstates: From D-Branes To Spacetime
Foam"
By Eric G. Gimon (UC, Berkeley & LBL, Berkeley),Vijay Balasubramanian
(Pennsylvania U.) , , Thomas S. Levi (LBL, Berkeley) . UPR-1154-T,
*LBNL-60486*,
Jun 2006. 32pp, hep-th/0606118
"A Holographic Framework For Eternal Inflation" By Ben Freivogel (UC,
Berkeley & LBL, Berkeley), Yasuhiro Sekino (Stanford U., Phys. Dept. &
Okayama Inst. Quantum Phys.), Leonard Susskind, Chen-Pin Yeh (Stanford
U., Phys. Dept.) . SU-ITP-06-18, OIQP-06-07, UCB-PTH-06-12,
*LBNL-60518*,
Jun 2006. 53pp., hep-th/0606204
"Eternal Inflation: The Inside Story" By Raphael Bousso, Ben Freivogel,
I-Sheng Yang, UCB-PTH-06-09,
*LBNL-60250*,
Jun 2006. 36pp., hep-th/0606114
"How Can We Test Seesaw Experimentally?" By Matthew R. Buckley,
Hitoshi Murayama
# LBNL-61946
Jun 2006. 5pp., hep-ph/0606088
"Holographic Grand Unification" By Yasunori Nomura, David Poland, Brock
Tweedie (UC, Berkeley & LBL, Berkeley), UCB-PTH-06-06,
# LBNL-60061
May 2006. 28pp., hep-ph/0605014
"CP Violation And The CKM Matrix" By Zoltan Ligeti (LBL, Berkeley & MIT,
LNS), Andreas Hocker (CERN), CERN-PH-EP-2006-007,
*LBNL-59882*, MIT-CTP-3729, CERN-PH-EP-2006-007,
May 2006. 59pp., Submitted to Ann.Rev.Nucl.Part.Sci. , hep-ph/0605217
"Holographic Probabilities In Eternal Inflation" By Raphael Bousso,
UCB-PTH-06-10, *LBNL-60251*
May 2006. 14pp., hep-th/0605263
"Hadronic B Decays From SCET" By Christian W. Bauer, FPCP-2006-039, Jun
2006. 5pp. Invited talk at 4th Flavor Physics and CP Violation
Conference (FPCP 2006), Vancouver, British Columbia, Canada, 9-12
# LBNL-61440
Apr 2006,C060409:039,2006, hep-ph/0606018
"A Supersymmetric Twin Higgs" By Lawrence J. Hall (UC, Berkeley & LBL,
Berkeley), Spencer Chang (CCPP, New York), Neal Weiner (CCPP, New York),
# LBNL-61956
Apr 2006. 21pp., hep-ph/0604076
"Implications of the measurement of the B0(s) - anti-B0(s) mass
difference"
By Zoltan Ligeti (LBL, Berkeley & MIT, LNS), Michele Papucci (LBL,
Berkeley & UC, Berkeley) , Gilad Perez (LBL, Berkeley) .
*LBNL-59996*, UCB-PTH-06-05, MIT-CTP-3734,
Apr 2006. 5pp., Phys.Rev.Lett.97: 101801,2006, hep-ph/0604112
"A Universe Without Weak Interactions" By Gilad Perez, Roni Harnik (SLAC
& Stanford U., Phys. Dept.), Graham D. Kribs (Oregon U.),
SLAC-PUB-11795,
### LBNL-61955
Apr 2006. 27pp., Phys.Rev.D74:035006,2006, hep-ph/0604027
"Improving Jet Distributions With Effective Field Theory" By Christian
W. Bauer, Matthew D. Schwartz,
*LBNL-59964,*
Apr 2006. 4pp., hep-ph/0604065
"Improved Naturalness With A Heavy Higgs: An Alternative Road To LHC
Physics"
By Lawrence J. Hall (UC, Berkeley & LBL, Berkeley), Riccardo Barbieri
(Pisa, Scuola Normale Superiore & INFN, Pisa), Vyacheslav S. Rychkov
(Pisa, Scuola Normale Superiore & INFN, Pisa) . UCB-PTH-06-04,
# LBNL-59894
Mar 2006. 25pp., Phys.Rev.D74:015007,2006, hep-ph/0603188
"Probabilities In The Landscape: The Decay Of Nearly Flat Space" By
Raphael Bousso, Ben Freivogel, Matthew Lippert,
### LBNL-59843
Mar 2006. 18pp., Phys.Rev.D74:046008,2006, hep-th/0603105
"Polarization Of Lambda And Anti-Lambda In 920-Gev Fixed-Target
Proton-Nucleus Collisions" By Christian W. Bauer, HERA-B Collaboration
(I. Abt et al.), DESY-06-027,
### LBNL-61953
Mar 2006. 11pp., Phys.Lett.B638: 415-421,2006, hep-ex/0603047
"Supersymmetry, Naturalness, And Signatures At The LHC" By Yasunori
Nomura (UC, Berkeley & LBL, Berkeley), Ryuichiro Kitano (SLAC),
SLAC-PUB-11674, UCB-PTH-06-01,
# LBNL-59605
Feb 2006. 57pp., Phys.Rev.D73:095004,2006, hep-ph/0602096
"Summing Planar Bosonic Open Strings" By Korkut Bardakci,
## LBNL-59617
Feb 2006. 26pp., Nucl.Phys.B746: 136-154,2006, hep-th/0602131
"Transversity GPD In Photo- And Electroproduction Of Two Vector Mesons"
By R. Enberg (Ecole Polytechnique, CPHT & LBL, Berkeley), B. Pire (Ecole
Polytechnique, CPHT) , L. Szymanowski (Warsaw, Inst. Nucl. Studies &
Liege U. & Orsay, LPT), CPHT-RR005-0106,
# LBNL-59084
Jan 2006. 15pp., Eur.Phys.J.C47: 87-94,2006, hep-ph/0601138
**"Journal Of Physics G: Nuclear And Particle Physics",Review Of
Particle Physics, By J. David Jackson, Taizan Watari, Particle Data
Group (W.-M. Yao et al.). 2006.**
## **LBNL-**
**J.Phys.G33:1-1232,2006**
"Quantum Chromodynamics And It's Coupling" in Review of Particle
Properties,
By I. Hinchlifte, J. Phys. G33: 110, 2006.
### LBNL-61950
"The CKM Quark Mixing Matrix" in Review of Particle Properties, By Z.
Ligeti,
A. Ceccucci, and Y. Sakai, J. Phys. G33: 138, 2006.
*LBNL-61952*
"Branes, Black Holes And Topological Strings On Toric Calabi-Yau
Manifolds" By Mina Aganagic (UC, Berkeley), Daniel Jafferis, Natalia
Saulina (Harvard U., Phys. Dept.).
HUTP-05-A0050, UCB-PTH-05-42,
#### LBNL-59609 J Art
Dec 2005. 50pp., hep-th/0512245
"Holography And Entropy Bounds In The Plane Wave Matrix Model"
By Raphael Bousso, Aleksey L. Mints (UC, Berkeley & LBL, Berkeley) .
UCB-PTH-05-32,
*LBNL-58947*,
Dec 2005. 20pp. Phys.Rev.D73:126005, 2006, hep-th/0512201
"A Deformation Of Twistor Space And A Chiral Mass Term In N=4 Super
Yang-Mills Theory" By Ori J. Ganor (UC, Berkeley & LBL, Berkeley),
Dah-Wei Chiou, Bom Soo Kim.
*LBNL-54227*, UCB-PTH-05-39,
Dec 2005. 52pp., JHEP 0603:027,200, hep-th/0512242
"Thermodynamics Of Noncritical M-Theory And The Topological A-Model" By
Petr Horava, Cynthia A. Keeler (UC, Berkeley & LBL, Berkeley)
## LBNL-59513
Dec 2005. 35pp., Nucl.Phys.B745:1-28,2006, hep-th/0512325
"Universality And M(X) Cut Effects In B \-\--\> X(S) L+ L-" By Zoltan
Ligeti (LBL, Berkeley & MIT, LNS) , Frank J. Tackmann (LBL, Berkeley),
Keith S.M. Lee (MIT, LNS) , Iain W. Stewart (MIT, LNS) ,. MIT-CTP-3707,
# LBNL-59134
Dec 2005. 4pp. Phys.Rev.D74:011501,2006, hep-ph/0512191
"Search For The Invisible Decay Of Neutrons With Kamland"
By Hitoshi Murayama, KamLAND Collaboration (T. Araki et al.).
#### LBNL-59897
Dec 2005. 5pp. Phys.Rev.Lett.96:101802,2006, hep-ex/0512059
"Asymptotic States Of The Bounce Geometry" By Raphael Bousso, Ben
Freivogel (UC, Berkeley & LBL, Berkeley). UCB-PTH-05-33,
# LBNL-58948
Nov 2005. 20pp. Phys.Rev.D73:083507,2006 hep-th/0511084
"On Quadratic Divergences In Supergravity, Vacuum Energy And The
Supersymmetric Flavor Problem" By Mary K. Gaillard (UC, Berkeley & LBL,
Berkeley), Brent D. Nelson (Pennsylvania U.) .
*LBNL-59069*, UCB-PTH-05-38, UPR-1136-T,
Nov 2005. 41pp., Nucl.Phys.B751:75-107,2006, hep-ph/0511234
"Supersymmetry Parameter Analysis: SPA Convention And Project"
By Ian Hinchliffe, J.A. Aguilar-Saavedra et al. SLAC-PUB-11579,
CERN-PH-TH-2005-232, DESY-05-242, FERMILAB-PUB-05-524-T, KEK-TH-1054,
*LBNL-61048*
Nov 2005. 19pp., Eur.Phys.J.C46:43-60,2006, hep-ph/0511344
"Hard Pomeron In Exclusive Meson Production At ILC" By R. Enberg (Ecole
Polytechnique, CPHT & LBL, Berkeley), B. Pire (Ecole Polytechnique,
CPHT) , L. Szymanowski (Warsaw, Inst. Nucl. Studies & Liege U.), S.
Wallon (Orsay, LPT). LPT-05-77, CPHT-PC-064-1105,
Nov 2005. 4pp. Presented at Photon: Its First Hundred Years and the
Future. Includes PHOTON2005 and PLC2005, Warsaw and Kazimierz, Poland,
30 Aug - 8 Sep 2005.
Acta Phys.Polon.B37:847-852,2006, hep-ph/0511144
#### LBNL-61961 Poster
"On The Treatment Of Threshold Effects In SUSY Spectrum Computations" By
J. Ferrandis (LBL, Berkeley), H. Baer (Florida State U.), S. Kraml
(CERN) , W. Porod (Valencia U., IFIC & Zurich U.) . CERN-PH-TH-2005-217,
FSU-HEP-051107, IFIC-05-57,
*LBNL-59093*, ZU-TH-20-05,
Nov 2005. 15pp. Phys.Rev.D73:015010,2006 hep-ph/0511123
"Naturalness And Higgs Decays In The MSSM With A Singlet"
By Patrick J. Fox (LBL, Berkeley), Spencer Chang (CCPP, New York), Neal
Weiner (CCPP, New York).
#### LBNL-59010
Nov 2005. 35pp. JHEP 0608:068,2006 hep-ph/0511250
Revised 11/15/2006 @ 3:01pm
|
en
|
all-txt-docs
|
349985
|
*Pages 1--3 from Microsoft Word - 39165*
1
Statement of Commissioner Jonathan S. Adelstein Before the Children NOW Digital TV Conference
June 9, 2004 Washington, D. C.
Thank you, Patti.
Think about it. Parents wouldnt let their children wander by themselves through a neighborhood they dont know. But many parents let their kids do just that with their minds
through TV. A third of children under six have a TV in their bedroom. And, as Children NOW reported, by the first grade, most children will have spent the equivalent of three school years in
front of the TV.
Among other dangers, it turns out these neighborhoods are filled with slick storekeepers trying to lure kids in to buy candy, junk food and violent games. Not every street is Sesame
Street. Clearly, some people in the neighborhood dont have your kids best interests in mind.
The FCCs job is to make sure TV has safe places for children and that parents know how to keep their kids out of the dangerous places -- and out of candy stores.
Parents, be warned: the cops on the beat arent on top of the new developments in the neighborhood. The FCC is long overdue in defining the public interest obligations on
broadcasters in the digital age. Just this morning, Congress held another hearing on how to complete the digital transition but we still havent figured out the ground rules for kids!
Most parents naturally question what their kids are watching. There are some great programs on TV, and studies show that true educational TV can help young childrens
development.
So lets make sure that tomorrows digital television has more safe neighborhoods to wander in. Lets insist on more informative, educational, healthy choices for our children.
Broadcasters are the landlords of the television landscape. But the FCC is supposed to protect the public against the natural tendencies of corporations to seek out the bottom- line above
all else. We have two principal ways of doing that. First, we have protections against media concentration, but most of them were gutted last summer. Second, we have public interest
obligations.
Broadcasters bargain with the government is that in exchange for free use of the public airwaves, they are supposed to serve the public interest. They are supposed to be good
neighbors. To this day, many do it remarkably well. Many take pride in their local communities and their stewardship of the airwaves.
But the FCC provides very little assurance that all broadcasters will do so. It has so weakened the specific public interest obligations that broadcasters dont have much left to prove.
1
2
Its time to restore these public interest obligations for the new era of interactive, digital TV.
Digital TV promises to enhance the TV world for everyone, including children. Broadcasters can turn todays single analog channel into 5 or 6 channels. This makes room for
more programs to educate, inform, and inspire our nations children. And, as Senator Brownback said this morning, datacasting can give parents real- time ratings and content
information so they know what their kids are getting and can keep them out of the candy store if they want.
Broadcasters should use this capability to expand the diversity and quality of programming. They should use this opportunity to empower parents.
Interactivity can be both a positive and a negative for our children. We know that advertisers will exploit the opportunities and our childrens vulnerabilities. But it also offers
great potential to further learning and development. Broadcasters should understand the social responsibilities that come with interactivity targeted at children. And we on the FCC need to get
the right protections in place before its too late.
I firmly believe that new horizons in broadcasting should correspond to new horizons in serving the public interest. So we at the FCC must do our part. The FCC must urgently define
the new rules for the digital era, and that includes childrens television.
Six years ago, some broadcasters recognized that to the extent that multicasting expands broadcasting opportunities, the public interest obligations should also expand. It is time the FCC
adopts that basic principle. We cant afford to wait any longer. How many more stations will begin multicasting before they understand the rules of the road? Were spending more time
figuring out the end of the digital television transition when we havent even completed its beginning.
We started a proceeding on childrens obligations nearly four years ago. We need to complete it right away. Many issues involving childrens TV involve the complex relationships
between electronic media and a childs cognitive, social, emotional and physical development. Much more research needs to be done on how interactivity affects the balance. I applaud
Senators Brownback, Lieberman and Clinton for their legislation to do that. Compared to the complexity of those issues, defining public interest obligations should be easy.
Many organizations here today came together through the Childrens Media Policy Coalition to promote two alternative approaches to help meet childrens educational needs. They
said broadcasters should dedicate 3 hours per week on main channels, with additional obligations on other channels, or 3 percent of broadcast time, to educational and informational programming.
The Coalition also suggested important ways to avoid excessive commercialization and to give parents tools to help their children make appropriate viewing choices. The Benton Foundation
found that the vast bulk of Americans agree. So, with that strong support, its hard to understand why is this still lingering at the FCC.
2
3
With some hard work, I'm confident we can provide more safe places for our children to experience on TV.
It's about time we started. We cant let our children venture into an unknown, unprotected digital media environment all because the FCC didnt do its job.
I want to thank Children NOW, as well as the American Academy of Pediatrics and the American Psychological Association, for convening this excellent forum and taking the lead on
this critical issue.
3
|
en
|
markdown
|
215447
|
# Presentation: 215447
## Distributed Processing
**Craig E. Tull**
**HCG/NERSC/LBNL**
**(US) ATLAS Grid Software Workshop**
**BNL - May 7, 2002**
## Distributed Processing
**ATLAS distributed processing, PPDG year 2 program**
**role of MOP, other middleware & third party tools**
**objectives: deliverables to users**
**job description language: status, objectives, options**
**EDG JDL**
## Architecture
**Information & Monitoring**
**Replica Manager**
**Grid Scheduler**
- Replica Optimization
- Replica Catalog Interface
**Grid Application Layer**
**Job Management**
**Local Application**
**Local Database**
**Fabric services**
**Configuration**
**Management**
**Node **
**Installation &**
**Management**
**Monitoring**
**and**
**Fault Tolerance**
**Resource Management**
**Fabric Storage**
**Management**
**Grid**
**Fabric**
**Local Computing**
**Grid**
**Data Management**
**Metadata Management**
**Object to File Mapper**
**Underlying Grid Services**
**Computing Element Services**
**Authorisation, Authentication and Accounting**
**Replica Catalog**
**Storage Element Services**
**SQL Database Service**
**Service Index**
- pink: WP1yellow:WP2
**Architecture**
## Jul’01: PSEUDOCODE FOR ATLAS SHORT TERM UC01
- Logical File Name
- LFN = "lfn://"hostname"/"any_string
- Physical File Name
- PFN = "pfn://"hostname"/"path
- Transfer File Name
- TFN = "gridftp://"PFN_hostname"/path
- JDL
- InputData = {LFN[]}
- OutputSE = host.domain.name
- Worker Node
- LFN[] = WP1.LFNList()
- for (i=0;i<LFN.list;i++){
- PFN[] = ReplicaCatalog.getPhysicalFileNames(LFN[i])
- j = Athena.eventSelectonSrv.determineClosestPF(PFN[])
- localFile = GDMP.makeLocal(PFN[j],OutputSE)
- Athena.eventSelectionSrv.open(localFile)
- }
- PFN[] = getPhysicalFileNames(LFN):
- PFN = getBestPhysicalFileName(PFN[], String[] protocols)
- TFN = getTransportFileName(PFN, String protocol)
- filename = getPosixFileName(TFN)
## Sample Use Case: Simple Grid Job
**Submit and run a simple batch job to process one input file to produce one output file**
**The user specifies his job via a JDL file:**
**Executable=/usr/local/atlas.sh**
**Requirements = TS >= 1GB**
**Input.LFN = lfn://atlas.hep/foo.in**
**argv1 = TFN(Input.LFN)**
**Output.LFN= lfn://atlas.hep/foo.out**
**Output.SE = datastore.rl.ac.uk **
**argv2 = TFN(Output.LFN)**
**and where the submitted “job” is:**
**#!/bin/sh**
**gridcp $1 $HOME/tmp1**
**grep higgs $HOME/tmp1 > $HOME/tmp2**
**gridcp $HOME/tmp2 $2**
## Steps for Simple Job Example
- Grid Scheduler
- Replica Manager
- Compute
- Element
- Storage
- Element
- Compute
- Element
- Storage
- Element
- Replica
- Catalogue
- User
- Select CE and SE
- site A
- site B
## Steps to Executethis Simple Grid Job
**User submits the job to the Grid Scheduler. **
**Grid Scheduler asks the Replica Manager for list of all PFNs for the specified input file. **
**Grid Scheduler determines if it is possible to run the job at a Compute Element that is “local” to one of the PFNs. **
**If not, it locates the best CE for the job, and creates a new replica of the input file on a SE local to that CE. **
**Grid Scheduler then allocates space for the output file, and “pins” the input file so that is not deleted or staged to tape until after the job has completed.**
**Then the job is submitted to the CEs job queue. **
**When the Grid Scheduler is notified that the job has completed, it tells the Replica Manager to create a copy of the output file at the site specified in the Job Descriptions file. **
**Replica Manager then will tag this copy of the output file the “master”, and make the original file a “replica”.**
## WP1: Job Status
**SUBMITTED -- The user has submitted the job to the User Interface.**
**WAITING -- The Resource Broker has received the job.**
**READY -- A Computing Element matching job requirements has been selected.**
**SCHEDULED -- The Computing Element has received the job.**
**RUNNING -- The job is running on a Computing Element.**
**CHKPT -- The job has been suspended and check-pointed on a Computing Element.**
**DONE -- The execution of the job has completed.**
**ABORTED -- The job has been terminated.**
**CLEARED -- The user has retrieved all output files successfully. Bookkeeping information is purged some time after the job enters this state.**
## WP1: Job Submission Service (JSS)
- strictly coupled with a Resource Broker
- deployed for each installed RB
- single interface (non-blocking), used by the RB
- job_submit()
- submit a job to the specified Computing Element, managing also input and output sandboxes
- job_cancel()
- kill a list of jobs, identified by their dg_jobId.
- Logging and Bookkeeping (LB) Service - store & manage logging and bookkeeping information generated by Scheduler & JSS components (Information and Monitoring service
- Bookkeeping: currently active jobs - job definition, expressed in JDL, status, resource consumption, user-defined data(?)
- Logging - status of the Grid Scheduler & related components. These data are kept for a longer term and are used mainly for debugging, auditing and statistical purposes
## WP1: Job Description Language (JDL)
- Condor *classified advertisements* (*ClassAds*) adopted as Job Description Language (JDL)
- Semi-structured data model: no specific schema is required.
- Symmetry: all entities in the Grid, in particular applications and computing resources, should be expressible in the same language.
- Simplicity: the description language should be simple both syntactically and semantically.
- Executable = “simula”;
- Arguments = “1 2 3”;
- StdInput = “simula.config”;
- StdOutput = “simula.out”;
- StdError = “simula.err”;
- InputSandbox = {“/home/joe/simula.config”, “/usr/local/bin/simula”};
- OutputSandbox = {“simula.out”, “simula.err”, “core”};
- InputData = “LF:test367-2”;
- Replica Catalog = “ldap://pcrc.cern.ch:2010/rc=Replica Catalog, dc=pcrc, dc=cern, dc=ch”
- DataAccessProtocol = {“file”, “gridftp”};
- OutputSE = “lxde01.pd.infn.it”;
- Requirements = other.Architecture == “INTEL” && other.OpSys == “LINUX”;
- Rank = other.AverageSI00;
## WP1: Sandbox
**Working area (input & output) replicated on each CE to which Grid job is submitted.**
**Very convenient & natural.**
**My Concerns:**
**Requires network access (with associated privileges) to **_**all**_** CEs on Grid.**
**Could be a huge security issue with local administrators.**
**Not (yet) coordinated with WP2 services.**
**Sandbox contents not customizable to local (CE/SE/PFN) environment.**
**Temptation to Abuse (****not**** for data files)**
## EDG JDL
**job description language: status, objectives, options**
**Status: **
**Working in EDG testbed**
**Objectives:**
**Provide WP1 Scheduler enough information to locate necessary resources (CE, SE, data, software) to execute job.**
**Options:**
|
en
|
all-txt-docs
|
329751
|
IN THE UNITED STATES DISTRICT COURT
FOR THE DISTRICT OF COLUMBIA
ELOUISE PEPION COBELL, et al., )
)
Plaintiffs, )
)
v. ) Case No. 1:96cv01285(JR)
)
DIRK KEMPTHORNE, Secretary of the Interior, )
et al., )
)
Defendants. )
__________________________________________)
NOTICE OF FILING OF MARCH 2008 STATUS REPORT BY THE DEPARTMENT OF THE INTERIOR OFFICE OF TRUST RECORDS
The Department of the Interior Office of Trust Records hereby submits its status report
for activity in March 2008. A copy of the report is attached hereto.
Dated: April 15, 2008 Respectfully submitted,
JEFFREY S. BUCHOLTZ Acting Assistant Attorney General MICHAEL F. HERTZ Deputy Assistant Attorney General
J. CHRISTOPHER KOHN Director
/s/ Robert E. Kirschman, Jr. ROBERT E. KIRSCHMAN, JR. Deputy Director
(D.C. Bar No. 406635) JOHN R. KRESSE Trial Attorney Commercial Litigation Branch Civil Division
P.O. Box 875, Ben Franklin Station Washington, D.C. 20044-0875 Telephone: (202) 616-0328
CERTIFICATE OF SERVICE
I hereby certify that, on April 15, 2008 the foregoing Notice of Filing of March 2008 Status Report by the Department of the Interior Office of Trust Records was served by Electronic Case Filing, and on the following who is not registered for Electronic Case Filing, by facsimile:
Earl Old Person (Pro se) Blackfeet Tribe
P.O. Box 850 Browning, MT 59417 Fax (406) 338-7530
/s/ Kevin P. Kingston Kevin P. Kingston
ACTIVITY REPORT
OFFICE-OFTRUSTRE CORDS
March 1 - 31, 2008
PROGRAMMATIC:
Labat-Anderson (Labat Indexing Project)
Labat reported that indexing of 1,921 boxes of inactiv~ Indian records was completed in March 2008. Th~ total number of box~!completed through March 2008 is approximately 171,340.
Movement of Records
The Bureau of Indian Affairs (BIA) and Office of the ~peeial Trustee (OST)
moved 2,909~ boxes of inactive records from various field locations to Lenexa, Kansas, for indexing and subsequent storage at the At~erican Indian Records Repository (AIRR) during this reporting period.
Site Assessments Statement
DuaSng themonth of March, OTRA performed 3 records assessments at the following locations: Hopi Agency BIA office, Cherokee Agency OST IIM office, and Tulsa OST IIM office. OTRA also performed 10 follow-up records assessments at the following locations: WestemRegi0n BIA office; San Carlos Agency BIA office; San Carlos OST IIM office; Salt River Agency BIA office; Salt River OST I]2vl office; Pima Agency BIA office; Pima OST IIM office; Fort ApaeheAgencyBIA office; Fort Apache OST IIM oft~. ce; and OST Office of Appraisal Services; Western Region. OTRA issued 4 records assessment reports, one for eadh oflthe following locations: Fort Defiance!~Agency BLA office (followrup);. Hopi Agency BIA office; Tulsa OST IIM:,Office; and Cherokee OST
IIM office.
Records Training
In March 2008, OTR provided records management tr~irtg for 46 BIAJOST records contacts and 49 tribal employees. OTR provided training on vital records for 25 BIA employees.
Equipment
30 pieces .of fireproof filing equipment were delivered .to BIA/OST and Tribal offices in March 2008.
Litigation Support and Research Requests
OTR continued to provide significant support to the Office of the Solicitor, Office of Historical Trust Accounting and its contractors, the Department of Justice and its contractors, and tribal attorneys on behalf of various Tribes. AIRR staff provided responses to 288 research requests from BIA, OST and other requesters. With the filing of numerous tribal trust litigation eases, litigation-related information and document requests pertaining to records at the AIRR continue to increase. Many of these requests have very short deadlines.
ADMINISTRATIVE: General administrative activities continued.
GENERAL OBSERVATIONS: None.
I declare under penalty of perjury that the foregoing is true and correct to the best of my knowledge, information and belief, r express no opinion on the content of the Site Assessments Statement described above. ~ ~..~.
Ethel J Abe~ta
declare under penalty of perjury that flae content of the Site Assessments Statement deseribeA ,above is true and correct to the best of my knowledge, information and belief. express no opinion on the contents of other sectionrdsubsecfions of the rei~rt.
Julene Theis Acting Director, Office of Trust Review mad -Audit
|
en
|
all-txt-docs
|
254887
|
Title: National Institute of Justice Journal - Crime in Public Housing: Clarifying Research Issues.
Series: NIJ Journal
Author: NIJ
Published: March 1998
Subject: Restorative justice, terrorism, program evaluations
68 pages
152,000 bytes
-------------------------------
Figures, charts, forms and tables are not included in this ASCII plain-text
file. To view this document in its entirety, download the Adobe Acrobat
graphic file available from this Web site or order a print copy from NCJRS
at 800-851-3420.
-------------------------------
U.S. Department of Justice
Office of Justice Programs
National Institute of Justice
National Institute of Justice Journal
March 1998
-------------------------------
Director's Message
Two themes run through this issue of the National Institute of Justice
Journal. Readers will find many examples of partnerships and
collaboration between researchers, policymakers, practitioners, and
agencies with related missions. This issue is also full of examples of how
the involvement of a community contributes to better understanding of
crime and an improved criminal justice system.
Jeffrey Fagan and his coauthors, for example, in the cover story offer
insights on conducting crime-related research in public housing. In this
emerging area of research, the authors highlight the significance of the
context in which crime occurs. The neighborhood, the larger community,
and public policies all have an effect on crime and the residents who live
in and near public housing. Researchers need to keep in mind these factors
as well as the community's history and socioeconomic trends when they
design research methods and interpret their findings.
Also in the cover story is a brief description of NIJ's new collaboration
with the U.S. Department of Housing and Urban Development (HUD),
Office of Public and Indian Housing. This collaboration will link
researchers with local public housing agencies to more accurately assess
the effects of HUD's Public Housing Drug Elimination Program. Working
together, public housing officials and researchers will develop information
that will bring into sharper focus the nature of crime in public housing.
Doing justice differently is the focus of the interview with Visiting Fellow
Thomas Quinn. Restorative justice, the topic of Mr. Quinn's visiting
fellowship, is an approach through which all parties involved -- offender,
victim, and community -- achieve justice. It is an innovative approach for
modern courts, although indigenous peoples have practiced it for
centuries. Restorative justice emphasizes the harm caused to the victim
and the impact on the broader community rather than the traditional view
that the crime is an act against the state.
Protecting communities from terrorists is the topic of the third article in
this issue. Although most Americans are not personally familiar with
terrorist attacks, accounts of the experiences from abroad are sobering. NIJ
has been a partner with several Federal agencies through task forces and
working groups created to enhance the American capability to deal with
terrorist attacks, especially attacks aimed at public transportation systems.
In April, NIJ and the U.S. Departments of State and Transportation are
cosponsoring an international gathering that will feature new technologies
and best practices to combat terrorist activity against land transportation
systems.
The themes of partnership and putting crime in the context of the
community will continue to be important messages in the NIJ Journal.
Watch for the June issue, which will feature the story about how Boston
officials collaborated and analyzed the context in which a particularly
troubling type of crime occurred and achieved an amazing decrease in
juvenile violence.
Jeremy Travis
Director
National Institute of Justice
-------------------------------
National Institute of Justice
Jeremy Travis
Director
NIJ Journal Editorial Board
Sally T. Hillsman
Deputy Director for Office of Research and Evaluation
John L. Schwarz
Deputy Director for Office of Development and Dissemination
David Boyd
Deputy Director for Office of Science and Technology
Cheryl A. Crawford
Mary G. Graham
Pamela K. Lattimore
Marj P. Leaming
Michelle-Marie Mendez
Christy A. Visher
Issue Editor
Jolene Hernon
-------------------------------
The National Institute of Justice Journal is published by the National
Institute of Justice, the research arm of the U.S. Department of Justice, to
announce the Institute's policy-relevant research results and initiatives.
The Attorney General has determined that publication of this periodical is
necessary in the transaction of the public busi-ness required by law of the
Department of Justice.
Opinions or points of view expressed in this document are those of the
authors and do not necessarily reflect the official position of the U.S.
Department of Justice.
The National Criminal Justice Reference Service (NCJRS), a centralized
national clearinghouse of criminal justice information, is sponsored by the
Office of Justice Programs agencies and the Office of National Drug
Control Policy. Registered users of NCJRS receive the National Institute
of Justice Journal and NCJRS Catalog free. To become a registered user,
write NCJRS User Services, Box 6000, Rockville, MD 20849-6000, call
800-851-3420, or e-mail [email protected].
The National Institute of Justice is a component of the Office of Justice
Programs, which also includes the Bureau of Justice Assistance, the
Bureau of Justice Statistics, the Office of Juvenile Justice and Delinquency
Prevention, and the Office for Victims of Crime.
-------------------------------
Contents
Issue No. 235
FEATURES
Crime in Public Housing: Clarifying Research Issues
Restorative Justice: An Interview With Visiting Fellow Thomas Quinn
Protecting Public Transportation From Terrorists
RESEARCH PREVIEW
Sentencing Guidelines: A State Perspective
DEPARTMENTS
New & Noteworthy
Solicitations
NIJ Awards
Final Reports
NIJ in the Journals
Recent NIJ Publications
Events
-------------------------------
Crime in Public Housing: Clarifying Research Issues
by Jeffrey Fagan, Tamara Dumanovsky, J. Phillip Thompson, and Garth
Davies
-------------------------------
Jeffrey Fagan is Director of the Center for Violence Research and
Prevention in the School of Public Health at Columbia University, and
Tamara Dumanovsky is Staff Associate at the Center. J. Phillip Thompson
is an Associate Professor in the School of Political Science at Columbia
University. Garth Davies is an Assistant Professor in the School of
Criminology at Simon Fraser University. This research is supported in part
by generous grants from the National Consortium on Violence Research,
the Robert Wood Johnson Foundation, and the National Institute of
Justice.
-------------------------------
In recent years, crime and public housing have been closely linked in our
political and popular cultures. Tragic episodes of violence have reinforced
the notion that public housing is a milieu with rates of victimization and
offending far greater than other locales.[1] However, these recent
developments belie the complex social and political evolution of public
housing from its origins in the 1930s, through urban renewal, and into the
present.[2]
Stereotypes abound about public housing, its management, residents, and
crime rates. In reality, variation is the norm, and it is these variations that
affect crime. The study of crime in public housing is in its earliest phase,
and there is much to learn. A few studies suggest that crime rates are
higher in public housing complexes than in their immediate
surroundings;[3] other studies suggest quite the opposite.[4] Still others
suggest a process of diffusion and exchange of violent crimes between
public housing and the surrounding neighborhood contexts.[5]
Predictably, most studies vary in several important ways, complicating
comparisons of studies. Many focus on larger public housing authorities
(PHAs) in older cities, even though these communities are the exceptions
among the more than 3,000 PHAs in the United States.[6] Many studies
rely on crime complaints to the police or housing authorities rather than on
victimization studies. Conducting a victimization study or household
survey in a public housing community is a difficult logistical enterprise,
often characterized by undercounts of population and variation in
telephone ownership.[7] The U.S. Department of Housing and Urban
Development (HUD) is currently supporting research to better understand
the process of conducting victimization surveys in public housing.
Few studies give adequate attention to public housing's historical,
socioeconomic, structural, and administrative contexts, despite the
variability among and within public housing communities. Multimeasure
studies of crime in public housing are rare, and efforts to assess the
epidemiology and correlates of crime have been quite limited. Attention to
the surrounding context has been uneven despite the likelihood that many
crimes are committed by nonresidents.
Despite the challenges, there are lessons to be learned from previous
research. This article summarizes some of these lessons, explores the
variability among public housing communities, and suggests that research
on communities, spatial analysis of crime locations and patterns, injury
epidemiology, and victimization surveys provide important new directions
for studying crime in public housing. (See "Methodology Challenges:
Design, Measurement, and Data Collection Issues for Researchers" and
"Collecting Data: Features and Possible Limitations.")
A brief history of public housing
Public housing's varied history is often intertwined with the social and
political history of its home city. Public housing in New York City, for
example, developed in response to historical needs as a job creation
program (such as First Houses), as housing for wartime workers (such as
Red Hook and Fort Greene), as veterans' housing, as filler between slums
and urban renewal projects, as relocation housing for people displaced by
transportation and infrastructure projects, as a way to keep working-class
whites from leaving the city, and, finally, as housing for poor minority
people -- especially in the 1960s.[8]
The bulk of public housing in the United States was built in the 1950s and
1960s as a vehicle for "slum clearance" in communities already
characterized by structural disadvantage, such as poverty, long-term
unemployment, and limited public services. Often the result was
large-scale, highrise developments in socially isolated areas where little
attention was paid to availability of or access to public or private services.
A second wave of development in the 1970s and 1980s paid closer
attention to the community context and resulted in lowrise developments
intended to be integrated into the neighborhood and with better access to
transportation, shopping areas, schools, and other social services.
Historically, public housing has perpetuated segregation through
"community preference" policies that gave priority to applicants already
living in the neighborhood. Although these policies receive credit for
maintaining social networks and organization within neighborhoods, they
also had the effect of maintaining a neighborhood's racial and ethnic
homogeneity.[9]
The social context of today's public housing varies widely, and much of it
suffers from poor design, deteriorating structures, inadequate funding, a
large concentration of poor people, isolation from social services, high
crime rates, and cumbersome management.[10]
The history of public housing policy is significant for research in several
respects. The structure and location of public housing sites necessarily and
reciprocally affected the surrounding areas, and the extent and type of
neighborhood change are important factors in understanding contemporary
variability in crime rates. Since many public housing sites were originally
built in otherwise undeveloped areas, understanding the subsequent
development of surrounding neighborhoods and patterns of neighborhood
change should provide a more complete analysis of changes within public
housing. In addition, a development's socioeconomic, racial, ethnic, and
family characteristics may affect crime rates.
The limited research on crime in public housing has looked only at
structure-of-housing issues (for example, comparing crime rates between
highrise and lowrise developments or looking at differences between
larger and smaller public housing authorities). But structural variations
may mask underlying differences in location, composition, social
organization, and, most important, policy. (See "Variability Within
Chicago's Highrise Public Housing.")
Variation in the administration of public housing
In addition to contextual and structural factors, several aspects of
management and administration may affect crime rates in public housing.
Management of public housing. The administration of a public housing
authority affects the characteristics of a housing development. The
combinations of State and Federal supervision of PHAs, in addition to the
idiosyncratic policies of city governments, raise significant issues.
Developments are increasingly being turned over to private management
agencies; some PHAs are experimenting with resident management; other
PHAs sponsor homeownership programs that encourage qualified
residents to purchase apartments in rehabilitated buildings at bargain rates.
Many of these programs are new and tend to apply to smaller, rehabilitated
buildings. It may be too soon to measure the effects, if any, of the most
recent management trends.
Admission and eviction policies. Criteria for admission and eviction vary
across sites and can change the composition, attitudes, and perceptions of
both the residents and the wider neighborhood. Criminal history,
drug-related offenses, family composition, and employment status have
been used as criteria. Some PHAs are increasingly using employment
status as a criterion for admission to increase the numbers of
working-class families in developments. Others are converting highrise
developments into housing for the elderly. Because such changes are
intended to improve residents' quality of life, equal attention should be
paid to developments targeted and not targeted by such policies. One
consequence may be increased segregation and isolation of the most
disadvantaged residents in sites with these eviction and admission policies.
Police agencies. The amount and extent of police presence and response
vary across and within PHAs and to a certain degree depend on the
relationship between the local PHA and the police department. Some
larger PHAs have their own police agencies that patrol public housing
sites.[11] Larger public housing projects without housing authority police
agencies often require special police attention and relationships with the
city's police department, especially if the development is isolated from its
surrounding neighborhoods.
Assessments of crime need to take into account differences in types of
crime control programs in a public housing site. (See "NIJ and HUD
Collaborate on Research and Evaluation.") These programs vary
considerably both between and within cities, and the various strategies --
ranging from drug sweeps to curfews -- may conflate crime trends with
enforcement trends. A sharp increase in arrest rates in public housing may
indicate an increase in police presence, not necessarily an increase in
crime.
Tenant organizations and perceptions. Some PHAs have formal and
institutionalized tenant organizations that often act as a bridge between
residents and the PHAs and may form ties with local police departments,
social service agencies, and community organizations. The presence of an
active tenant organization may indicate a level of community stability and
cohesion that has a significant impact on crime rates. Since public safety is
most likely to be one of the more important issues for such organizations,
comparing the degree of tenant organizing and its effectiveness between
public housing developments may be an important component of studying
crime (and fear of crime) in public housing. (See "Variation in the Types
of Residents in Public Housing Communities.")
Residents' own perceptions of public housing may be influenced by the
history of its development. The composition of the housing, the length of
residents' tenancy, and their connections to the larger community all affect
residents' attitudes about public housing. The general reputation of public
housing in surrounding neighborhoods and in the city will affect how
people behave and, in turn, may affect crime and fear of crime.
Variations in physical structure and neighborhood
Many public housing projects are large-scale, multiple-building, highrise
developments covering several square city blocks. Research has shown
that the relationship between building size and crime rates varies by type
of crime.[12] For example, highrise buildings have lower burglary rates
than lowrise developments. However, there can be significant differences
between similarly structured public housing developments. More attention
should be paid to studying variability in types and rates of crime between
similar housing developments to learn about factors other than structure
that might explain variability in crime rates.[13]
Given their size and structural design, it is easy to argue that large public
housing developments are "spatial" neighborhoods. What needs to be
established is whether they are also "social" neighborhoods.[14] Most do
not contain within their boundaries, and often not on their immediate
periphery, facilities and institutions (schools, shopping centers, places of
worship) that are commonly associated with a "neighborhood." Social
dimensions of neighborhoods are dependent on interaction patterns and
social networks. Although in some cases spatial location determines social
interactions, such as school districts, spatial proximity is not a guarantee of
social interaction. The extent of informal interactions between tenants,
their level of familiarity and recognition, and the use of common spaces
may all be measures of social neighborhoods within public housing. It
could be argued that the spatial isolation of some public housing projects
makes them more like traditional neighborhoods than other areas where
individuals tend to have more interactions with people outside their
neighborhoods.
In his study of Section 8 public housing construction in Chicago, Robert
Bursik found that public housing construction was followed by high rates
of neighborhood instability which, in turn, was related to higher rates of
delinquency.[15] The Bursik study demonstrates the impact of policy
decisions on neighborhood change and shows that neighborhood
instability, independent of compositional changes, has a significant impact
on delinquency rates. It suggests that other studies could measure patterns
of stability in and around public housing, apart from compositional
changes, to see if stable public housing developments tend to be located in
stable neighborhoods and to determine the effects of varying rates of
stability on crime rates.
Notes
1. See, for example, Kotlowitz, A., There Are No Children Here, New
York: Doubleday, 1991; and Lemann, N., The Promised Land: The Great
Black Migration and How It Changed America, New York: Knopf, 1991.
2. Marcuse, P., "Interpreting 'Public Housing' History," Journal of
Architecture and Planning Research 12(3)(1995):241-258.
3. Roncek, D.W., R. Bell, and J.M.A. Francik, "Housing Projects and
Crime," Social Problems 29(2)(1981):151-166; and Dunworth, T., and A.
Saiger, Drugs and Crime in Public Housing: A Three-City Analysis,
Washington, DC: U.S. Department of Justice, National Institute of Justice,
1994.
4. Farley, J.E., "Has Public Housing Gotten a Bum Rap? The Incidence of
Crime in St. Louis Public Housing Developments," Environment and
Behavior 14(4)(1982):443-477; and Harrell, A., and C. Gouvis, Predicting
Neighborhood Risk of Crime, Washington, DC: The Urban Institute,
1994.
5. Fagan, J., and G. Davies, "Crime in Public Housing: Two-Way
Diffusion Effects in Surrounding Neighborhoods," presented at the
Workshop on Spatial Analysis of Criminal Justice Data, New York: City
University of New York, Graduate Center, 1997.
6. Holzman, H., "Criminological Research on Public Housing: Toward a
Better Understanding of People, Places, and Spaces," Crime and
Delinquency 42(3)(1996):361-378.
7. Holzman, H.R., T.R. Kudrick, and K.P. Voytek, "Revisiting the
Relationship Between Crime and Architectural Design: An Analysis of
Data from HUD's 1994 Survey of Public Housing Residents," Cityscape:
A Journal of Policy Development and Research 2 (1996):107-126.
8. Marcuse, Peter, "Public Housing in New York City: History of a
Program," unpublished manuscript, 1997.
9. Saegert, Susan, and G. Winkel, "Social Capital Formation in
Low-Income Housing," New York: City University of New York,
Graduate School and University Center, unpublished paper, 1997.
10. Public housing in several cities, including Detroit, Newark, Chicago,
and New Orleans, is considered "troubled." HUD considers housing
authorities troubled if they score less than 60 out of 100 points against
HUD's "PHMAP" (Public Housing Management Assessment Program)
indicators. See, for example, House Committee on Government Reform
and Oversight, "Public Housing: Status of HUD's Takeover of the Chicago
Housing Authority," testimony before the Subcommittee on Human
Resources and Intergovernmental Relations, September 5, 1995.
11. In 1995, New York City consolidated the housing and transit police
departments with the New York Police Department. It may be too soon to
study the effects of this consolidation.
12. Holzman, Kudrick, and Voytek, "Revisiting the Relationship Between
Crime and Architectural Design," 107-126.
13. Popkin, Susan J., Victoria E. Gwiasda, Jean M. Amendolia, Andrea A.
Anderson, Gordon Hanson, Wendell A. Johnson, Elise Martel, Lynn M.
Olson, and Dennis P. Rosenbaum, "The Hidden War: The Battle to
Control Crime in Chicago's Public Housing," unpublished report in
fulfillment of NIJ grant numbers 93-IJ-CX-0037 and 95-IJ-CX-0011.
14. Tienda, Marta, "Poor People and Poor Places: Deciphering
Neighborhood Effects on Behavioral Outcomes," in Macro-Micro
Linkages in Sociology, ed. Joan Huber, Newbury Park, CA: Sage
Publications, Inc., 1991.
15. Bursik, Robert J., "Social Disorganization and Theories of Crime and
Delinquency: Problems and Prospects," Criminology 26 (1988):519-551.
-------------------------------
Methodology Challenges: Design, Measurement, and Data Collection
Issues for Researchers
Criminological research on public housing is still relatively new. Its
development can benefit from the methodological and conceptual
influences from related disciplines, especially urban sociology, political
economy, and crime prevention research, as well as geography,
demography, and the sophisticated techniques available from spatial
analysis, survey research, and qualitative methods.
The issues surrounding public housing research can be sorted into several
domains: design considerations, measurement considerations, and data
collection strategies.
Design considerations
Unit of analysis. Selecting the unit of analysis for research and an
appropriate design often depends on a series of questions relating to the
nature of the unit to be studied. For example, an intervention to prevent
crimes at specific locations may differ from an intervention designed to
reduce criminality among individuals, and an evaluation of the
intervention would require very different theories and designs.[1]
Comparison groups. The selection of the unit of analysis also affects other
design considerations, such as the selection of comparison groups.
Identifying valid and appropriate comparisons is a complex problem.
Public housing residents are nested within buildings, and buildings are
nested within developments. Researchers are increasingly concerned with
the nested or hierarchical effects of neighborhood, school, or other
contextual factors and their influence on outcomes.
Accordingly, researchers cannot simply select random samples of
individuals from the same buildings. Nor can they avoid the question of
comparison groups by using predesigns and postdesigns. This would raise
history, maturation, and other validity threats. One solution is to sample
individuals from other comparable public housing developments within
the same city. Other alternatives include using "bootstrapping"[2] or case
control designs in which projects and individuals serve as their own
controls. Research also can benefit from examining within-unit change
over time, based on interactions with specific social and structural
contexts.
Diffusion and displacement effects. The relationship of public housing to
surrounding areas reflects another dimension of the nested status of public
housing. Not only are individuals nested in buildings and developments,
but developments are nested in neighborhoods, and the neighborhoods
themselves exert both criminogenic and protective influences. Drug
transactions often involve persons from outside the housing development,
and their movements in and out of the development create a large area
where crimes may take place. Situational crime prevention efforts may
displace crime to nearby neighborhoods or to neighborhoods some
distance away.[3]
Some studies show higher rates of diffusion within public housing
compared with the overall city rate, but such comparisons are invalid
because of a lack of comparability of the areas. Other studies compared
blocks within and outside public housing developments and found higher
rates within the public housing blocks.[4] One study of violence in and
around public housing projects used weighted least-squares procedures to
approximate diffusion effects.[5] The researchers found evidence of
outward diffusion for some violent crimes (robbery, homicide) and
simultaneous diffusion only for assault.
Event locations. Some buildings within multibuilding housing
developments have higher crime rates than other buildings. Moreover,
crimes occur in a variety of locations inside and outside the development,
and sampling may be required even though it poses its own
methodological problems. Locations, too, are nested, and the effects of an
intervention in a specific location may be mediated by events that occur in
the surrounding area. Thus, for example, locating increased patrol in a
specific hot spot may have artifactual effects if the patrol in the
surrounding or control area is reduced (or increased) due to other,
serendipitous factors.
Apportioning effects. Multiple interventions are common in a public
housing project. Sorting and allocating their effects requires a highly
complex and disaggregated design. Designs should anticipate multiple
interventions, as well as interventions that span both developments and
neighboring areas.
Measurement considerations
Although there may be adequate scales and methods to count events, other
challenges emerge when attempting to standardize counts through
computation of rates. Geocoded complaint and arrest records present
strong advantages in dealing with spatial measurement concerns.
However, geocoding cannot pinpoint floors in highrises or shared spaces
in many public housing sites. Alternate data sources may be useful in
estimating crime problems within specific boundaries of housing
developments. Vital statistics and health data often contain address
information and can be sampled and geocoded to estimate violence rates in
and around public housing.
A related problem involves crimes that take place in shared spaces. For
example, when drug selling occurs on streets adjacent to, but officially
outside, housing developments and when it involves tenants, the
assignment of these events to a housing project becomes conceptually
difficult. Researchers need to develop rules for such occurrences, but the
rules may exert a strong influence on crime rates and estimates of program
effectiveness.
Data collection strategies
Surveys. Recent studies involving National Crime Victimization Surveys
in public housing developments suggest that advances are forthcoming in
measuring crime in public housing,[6] but sampling concerns continue to
arise from uneven patterns of telephone ownership. Additional sampling
problems reflect the gap in official versus actual occupancy patterns;
respondents are unlikely to provide data on victimization of unofficial
occupants. Household surveys are also important tools in gathering
observational and attitudinal data.
Conducting comparable surveys in surrounding neighborhoods creates
additional problems, especially in counting households. A related
theoretical and practical problem is the determination of the boundaries of
surrounding neighborhoods. Few theories suggest the size of an ecological
context for public housing -- whether it is 1 block, 100 yards, or a larger
social or administrative boundary. Practically, the distance in which
displacement and design effects are likely to be salient is also difficult to
determine.
Official records. Public housing authorities that have police departments
may be able to supply arrest and complaint records for specific public
housing communities, and data from the city's police department may be
geocoded to determine which crimes occur in public housing. In some
cases, though, arrests or other data may be generated by special task forces
(citywide drug or robbery details, for example) or by agencies from other
jurisdictions, such as the State police or the Drug Enforcement
Administration, but data from these additional sources are more difficult to
obtain.
A second complication involves the distinctions between location event,
offender residence, and victim residence. Rarely do crime data record all
three pieces of information. The importance of this triangulation for public
housing rivals, if not exceeds, its importance in understanding
victim-offender interactions and the contextual factors that shape these
interactions.
Observations. The advantages of direct observation are self-evident, but
such activity is labor intensive, expensive, and requires experienced
observers. Coding and reliability questions also need to be addressed.
Nevertheless, observation can overcome many of the limitations of other
data sources, and time and place sampling can streamline these efforts.
A related strategy is key informant interviews. Key informant strategies
have been used extensively in several notable studies of urban life,[7]
including data collection in public housing.[8] This method involves
identifying persons whose knowledge of neighborhood life is extensive
and who are capable and accurate reporters of the dynamic exchanges
among people within social networks and spaces. Repeated interviews
with key informants over time can establish a longitudinal database of
events and dynamics within the area of interest. Data can be either
structured, quantifiable responses to a protocol or open-ended qualitative
narratives that result from a structured conversation between researcher
and informant.
Notes
1. Ekblom, P., and K. Pease, "Evaluating Crime Prevention," in Building a
Safer Society, vol. 19, ed. M. Tonry and D.P. Farrington, Chicago:
University of Chicago Press, 1995:585-662.
2. Bootstrapping, which capitalizes on natural variation within a sample,
involves asking different types of questions to subsets within a sample. A
theory can then be constructed based on the answers.
3. Barnes, G.C., "Defining and Optimizing Displacement," in Crime and
Place, ed. J.E. Eck and D.L. Weisburd, Washington, DC: Police Executive
Research Forum, 1995:95-113; Ekblom and Pease, "Evaluating Crime
Prevention"; and Clarke, R.V., "Situational Crime Prevention," in
Building a Safer Society, vol. 19, ed. M. Tonry and D.P. Farrington,
Chicago: University of Chicago Press, 1995: 91-150.
4. Roncek, D.W., R. Bell, and J.M.A. Francik, "Housing Projects and
Crime," Social Problems 29(2)(1981):151-166. See also Harrell, A., and
C. Gouvis, Predicting Neighborhood Risk of Crime, Washington, DC: The
Urban Institute, 1994.
5. Fagan, J., and G. Davies, "Crime in Public Housing: Two-Way
Diffusion Effects in Surrounding Neighborhoods," presented at the
Workshop on Spatial Analysis of Criminal Justice Data, New York: City
University of New York, Graduate Center, 1997.
6. Holzman, H., and L. Piper, "Measuring Crime in Public Housing:
Methodological Issues and Research Strategies," paper presented at the
Annual Meeting of the American Society of Criminology, Boston,
Massachusetts, November 1995; and Holzman, H., "Criminological
Research on Public Housing: Toward a Better Understanding of People,
Places, and Spaces," Crime and Delinquency 42(3)(1996):361-378.
7. Engle, S.M., Urban Danger, Philadelphia: Temple University Press,
1981; and Fischer, C.S., To Dwell Among Friends: Personal Networks in
Town and City, Chicago: University of Chicago Press, 1982.
8. Sullivan, M., Getting Paid, Ithaca, NY: Cornell University Press, 1989.
-------------------------------
Collecting Data: Features and Possible Limitations
Public housing authorities
Features:
Larger PHAs may collect and report crime data, including records of
crime-related complaints by tenants or tenant organizations. Organized
tenant patrols may maintain victimization records.
Limitations:
Data on locations of events may be missing; such data are needed to assess
hot spots and evaluate safety measures. Official crime statistics may
undercount actual crime rates.
Police department records
Features:
Police records may include identifiers for public housing (that is, the data
may indicate that the incident occurred within public housing boundaries).
The records may also indicate the residence of the victims, offenders, or
both. Complaint and arrest reports may be available. National
Incident-Based Reporting System data also will contain event information.
Limitations:
Data may not be specific to units and locations in public housing. Official
crime statistics may undercount actual crime rates.
Injury surveillance data
Features:
Mortality and morbidity data for intentional injuries may include the
event's location as well as residential data about the injured or deceased
person. Geocoded data for residential and event locations would allow
analyses of violent crime in public housing and surrounding
neighborhoods.
Limitations:
Data often do not contain information about an offender's residence.
Tenant/resident surveys
Features:
Annual tenant surveys can measure crime rates, residents' fear of crime,
victimization rates of residents, and crime hot spots.
Limitations:
Data may undercount public housing residents, and telephone interviews
can result in sample bias.
-------------------------------
Variability Within Chicago's HighRise Public Housing
An NIJ-sponsored study of the effectiveness of the Chicago Housing
Authority's (CHA's) comprehensive antidrug initiative illustrates the
difficulty of implementing programs and conducting research in public
housing settings.
The research tracked CHA's antidrug efforts for 3 years within three
developments -- Rockwell Gardens, Henry Horner Homes, and Harold
Ickes Homes -- and conducted a more limited assessment of an experiment
with intensive police patrols in the Robert Taylor Homes.[1]
Researchers found that reduction in crime and fear of crime varied
significantly not only between similar developments but also within the
same development. Despite several key similarities (structural,
programmatic, and targeted crime type), other more powerful differences
exerted greater influence on crime. For example, the program was
implemented inconsistently within a single development because of
variability in levels of disorder and social cohesion, management
practices, residents' perceptions toward the police and one another, and the
occurrence of such external events as visits by leading political figures and
lawsuits against the housing authority.
The CHA model antidrug program to control violent crime was both
comprehensive and collaborative, and CHA policies were well defined.
Yet onsite management practices varied considerably, making
implementation uneven. The program was also affected by the unique
nature of each development and, in some cases, the individual differences
between buildings in the same development. Strong resident leadership in
one building in Rockwell Gardens, for example, brought about tremendous
changes that never extended to other Rockwell buildings.
In addition to the buildings' variability, external developments affected the
researchers' ability to take accurate measurements. A class-action lawsuit
against CHA, settled during the evaluation period, resulted in a massive
redevelopment effort at Horner that clearly had a much larger impact than
any of the antidrug interventions.
In all four developments, gangs dominated daily life and wielded more
influence over the level of drug trafficking and violence than either the
police or housing authority management. However, the nature of gang
control varied both across the four sites and within individual sites. In
Rockwell and Horner, for example, multiple gangs fought over control of
buildings, turning them into virtual war zones. The gang warfare was so
extreme at Horner that the residents in one building formed a pact with the
gang members as a means of protection. Ickes, on the other hand, was
spared the turf battles because a single gang controlled the development.
The Chicago public housing experience points out the complexities of and
challenges to understanding crime issues in public housing. It also
illustrates that researchers need to consider the broad and subtle
differences that exist within an individual housing community,
recognizing that the same policy and program can have widely varying
results.
1. Popkin, Susan J., Victoria E. Gwiasda, Jean M. Amendolia, Andrea A.
Anderson, Gordon Hanson, Wendell A. Johnson, Elise Martel, Lynn M.
Olson, and Dennis P. Rosenbaum, "The Hidden War: The Battle to
Control Crime in Chicago's Public Housing," final report submitted in
fulfillment of NIJ grant numbers 93-IJ-CX-0037 and 95-IJ-CX-0011. The
research examined the impact of the antidrug efforts through the eyes of
the residents. Researchers conducted four waves of door-to-door surveys,
six rounds of indepth interviews with a small group of residents, two
rounds of interviews with key staff involved in implementing the antidrug
initiative, and ethnographic observations of each of the developments. In
addition, official crime statistics from 1988 through 1995 were examined
to assess the effect of CHA's efforts on residents' demand for police
service.
-------------------------------
NIJ and HUD Collaborate on Research and Evaluation
The National Institute of Justice (NIJ) and the Department of Housing and
Urban Development (HUD) have become partners in an effort to build
safer public housing communities.
By combining NIJ's expertise in research and evaluation with HUD's
expertise in providing housing authorities with resources, the two agencies
are collaborating to understand the implementation and effectiveness of
HUD's Public Housing Drug Elimination Program (PHDEP). HUD's
Office of Public and Indian Housing and NIJ have signed an interagency
agreement through which HUD has transferred $1.3 million to NIJ for a
two-part effort to conduct joint research and evaluation.
In the first part of the effort, NIJ and HUD have embarked on plans to
provide housing authorities with the resources to implement locally based
research partnerships. The researcher-housing authority partnerships are
designed to provide feedback on PHDEP initiatives at both the local and
national level. These partnerships build on a similar NIJ initiative that has
created dozens of successful researcher-criminal justice agency teams that
are cooperatively designing and implementing local research projects and
evaluations across the Nation.
The researcher-housing authority partnerships can take one of two forms:
(1) those that focus on developing and implementing technically sound
strategies to evaluate the effectiveness of programs, with feedback so that
course corrections can occur throughout the life of the program, and (2)
those that focus on identifying problems, designing and implementing
testable solutions, and evaluating the impact of the solution.
The second part of the effort will develop a standard national reporting and
information system for PHDEP, a comprehensive effort to reduce and
eliminate drug-related crime that has supported $1.2 billion worth of
activities over the last 8 years. NIJ will assess current PHDEP reporting
requirements and develop a standard semiannual reporting form that
grantee housing authorities can use to measure crime reduction more
tangibly than current methods.
-------------------------------
Variation in the Types of Residents in Public Housing Communities
Based on ongoing field research in New York City's public housing, J.
Phillip Thompson and Susan Saegert have categorized PHA families into
at least four types, who are usually found in the same buildings.[1] The list
is not exhaustive or necessarily representative of most PHAs; it simply
suggests the variety among public housing residents and some of the
complexities and sensitivities presented in gathering data from public
housing families and individuals.
o Long-term residents. These are middle-aged or older residents who have
typically lived in the same development for 25 years or more. They often
anchor the local tenant association, conduct social events for the residents,
help residents find jobs, and transmit local history, among other functions.
They are usually women with extended families in the building.
o Distressed families. These are families facing multiple and serious
physical, financial, and mental problems.
o Working-class loners. These families are usually headed by a working
adult. They typically keep to themselves, fearing crime and social disorder
within their development. They are trying to leave public housing.
o Coping but isolated. These residents are typically new to the community
and are socially isolated (they therefore may feel vulnerable to violent
assault). They try to keep their kids in the house and out of trouble and are
trying to adjust to their environment.
1. Thompson, J.P., and S. Saegert, "Social Capital in Public Housing,"
forthcoming, Center for Urban Studies, Columbia University, 1998.
-------------------------------
Restorative Justice:
An Interview With Visiting Fellow Thomas Quinn
-------------------------------
Thomas Quinn is the former Executive Director of the Delaware Criminal
Justice Council. In this article, he talks about the research he conducted as
an NIJ Visiting Fellow.
-------------------------------
Q. Will you first define restorative justice?
A. The definition and practices are evolving -- in much the same way that
community policing evolved.
Let's look first at restorative justice in juxtaposition with the model that
dominates American justice: the retributive model. The retributive model,
which focuses on offenders and their punishment, does a good job of
incarcerating violent, repeat offenders, but it does not -- and many people
argue that it cannot -- adequately address victim and community harm.
Nor does it give offenders an adequate opportunity to earn back their place
in society. Offenders who sit in a prison cell complete their punishment,
but the results do little to reduce citizen fear of crime, heal victims, or
increase citizen satisfaction with the criminal justice system -- and
research indicates that the informed public wants nonviolent offenders to
work to repay the community rather than sit idly in jail.[1]
Restorative justice, in contrast, focuses on restoring the health of the
community, repairing the harm done, meeting victims' needs, and
emphasizing that the offender can -- and must -- contribute to those
repairs.
Restorative justice condemns the criminal act, holds offenders
accountable, involves the participants, and encourages repentant offenders
to earn their way back into the good graces of society.[2] Restorative
justice considers crime an act against the individual and the community
rather than against the State.
Q. How do community justice and restorative justice differ and how are
they the same?
A. I think we're still sorting out the precise definitions and practices of
community justice and restorative justice. The two concepts are alike in
many ways, especially in their inclusiveness and shift toward collective
problem solving. They differ, however, in that restorative justice focuses
to a greater extent on the underlying philosophy of repairing the harm to
the victim.
In terms of practices, some community justice practices encompass
restorative justice principles, others do not. For example, a neighborhood
watch program that creates a resident-police partnership is a community
justice effort but not a restorative justice practice. On the other hand, a
victim who communicates with the offender in a structured setting in an
effort to bring closure to an incident participates in a restorative justice
practice, not a community justice effort. (See exhibit 1.)
Q. What is the origin of restorative justice? Isn't it a return to ancient
models of justice?
A. Indeed yes. Unwritten codes as well as the earliest written codes
focused on repairing the harm. Before the Norman conquest of England,
local villages delivered justice by making the offender repay the victim.
Then, when William the Conqueror became ruler, crimes became a
disruption of the "King's peace," and offenders were fined in the King's
Court. By requiring citizens to come to his courts for justice, the king
gained power; by collecting fines that in the past would have gone to the
victims, he gained wealth. We still have that emphasis with crimes
"against the state." Today, other cultures include restoration to the victim
and community as core elements of justice, including Muslim, American
Indian, and many Pacific Rim societies.[3]
Q. Can you describe some restorative practices and talk about how widely
they are practiced?
A. Probably the most familiar examples are restitution and community
service -- although both are often applied solely as punitive sanctions
rather than linked meaningfully to the offense or as a way for the
community to be healed. (See "Varieties of Restorative Justice Practices.")
Victim-offender mediation is becoming more widespread, both as an
alternative to the traditional criminal justice system as well as a part of the
system. Hundreds of programs now exist in the United States with
hundreds more in other countries.
It's hard to quantify how widely these activities are practiced, but the
trends are clear. The National Association of Counties passed a resolution
in July 1996 calling for "the immediate incremental and eventual
systemic" movement toward restorative justice. At the Federal level, the
Office of Justice Programs of the U.S. Department of Justice has several
efforts under way to explore how best to bring attention and insight to both
restorative justice and community justice practices.
For these new approaches to move into the mainstream, however, I believe
existing criminal justice agencies must be infused with a restorative justice
philosophy -- something that moves away from simply adding programs or
policies and toward a change in the way we think about crime. The process
would be similar to the process police departments must go through to
convert to the community policing philosophy.
Q. As part of your fellowship, you conducted a survey to learn more about
restorative justice. What did the responses reveal?
A. We developed a survey with assistance from the University of
Delaware's Center for Applied Demography and Survey Research and sent
it to an interdisciplinary sample of 290 legislators, county executives,
prosecutors, judges, victim advocates, and police and corrections
professionals.[4]
On the whole, respondents gave the restorative justice movement a
positive rating. The facets that generated the most positive responses
related to:
o Increased victim and community involvement through a more personal
process.
o More direct involvement of offenders.
o The potential for improved system efficiency because of the fused
agency focus.
Q. Let's talk first about increased victim and community involvement.
Aren't victims reluctant to have contact with offenders?
A. Some victims have no interest in having contact with their offender,
and some offenders are recalcitrant, unrepentant, and unwilling to accept
any blame. But for victims who experience a restorative justice process,
there is widespread evidence -- beyond my survey -- supporting the
perceived benefits.
Victims who are exposed to restorative approaches are significantly more
satisfied with the process and the outcome, and their satisfaction is
consistently higher whether the findings are from adult or juvenile courts;
small towns or big cities; or the United States, Germany, Great Britain, or
elsewhere.[5] Fear of being revictimized by the same offender also
decreases after restorative justice practices are used. In one study, 50
percent fewer victims who participated in mediation expressed fear of
revictimization by the same offender compared to victims who had not
participated in mediation.[6]
Positive feedback is not limited to minor cases. In an evaluation of
victim-offender dialogues in 39 serious cases (including robbery, rape, and
homicide) in British Columbia, Canada, victims or their survivors were
given the option of a face-to-face, video, or written dialogue with the
offender. A followup survey found unanimous support for the process.
Offenders reported a sense of personal growth, and victims a sense of
closure.[7]
Q. If restorative justice increases victim satisfaction and reduces fear of
revictimization, are victim advocacy groups embracing it?
A. The victim advocacy community is cautiously endorsing restorative
justice practices. Many are suspicious that restorative justice is a veiled
attempt at "rehabilitation" with no serious effort to involve or address
victims' concerns.
Another aspect has been noted by Marlene Young, the Executive Director
of the National Organization of Victim Assistance: Most offenders return
to their communities, and for this reason, among others, she encourages
victim advocacy groups to work to ensure that restorative justice
interventions are positive ones for victims and the community as a
whole.[8]
Q. Let's turn to offenders. What does the research show?
A. Respondents in my survey saw two positive effects:
o Offenders are more likely to understand the impact of their crimes.
o Offenders are more likely to feel anxiety about having to face victims or
community representatives. Some respondents viewed this as a
disadvantage to the offender, but others believed increased anxiety about
facing the consequences of one's actions contributes to a heightened sense
of responsibility and therefore increases the reparative aspects.
In other research, offenders overwhelmingly express satisfaction with
restorative justice processes -- up to 90 percent of offenders say they are
satisfied with the process. Offenders' perception of fairness exceeds 80
percent.[9]
Further, some studies indicate that recidivism for offenders who
participate in restorative justice activities is lower than for comparison
groups of like offenders who are processed regularly.[10] A study of
Washington State's Department of Corrections Victim Awareness
Education Program found that offenders released from prison after taking
part in an approximately 6-week program to learn about the impact of
crime on victims were less likely to recidivate than a comparison group
who did not take part in those panels.[11] Those who completed the
program had much lower repeat offense rates than those who did not (9
percent versus 37 percent). More research is needed, but what is available
is promising.
Q. What about the system as a whole? What benefits did respondents see
forthe criminal justice system?
A. The respondents cited numerous benefits related to system efficiency:
o Minor cases can be diverted from the formal process.
o Dispositions can be reached more quickly.
o The use of incarceration can be reduced.
o The image of the justice system can be enhanced.
o Victim advocates can become allies with other reformers to effect
positive system change.
o All parties can focus on the same issues and share the same goals.
o Agencies can develop and use new measures of success.
Again, research supports many of the benefits the respondents envisioned.
For example, a study in North Carolina found that cases can be diverted,
freeing prosecutors' and judges' time.[12]
Law enforcement agencies, too, have shown that restorative justice
programs can save resources. When the Harrisburg, Pennsylvania, police
randomly assigned citizen dispute cases to a mediation settlement
program, they found that cases that were settled by mediation were
significantly less likely to need police assistance in the future compared
with cases involving a control group.[13]
A common weakness often cited is that a relatively small proportion of the
eligible cases are actually handled by the optional alternative process. This
shortcoming is so common that the Fund for Dispute Resolution
commissioned a report on how to increase referrals and ensure that all
eligible cases are processed through alternative mechanisms.[14] The
resulting report contains a series of recommendations that call for a more
proactive, assertive process for case referral and more vigorous intake
methods.[15]
Q. What about the drawbacks? What disadvantages did respondents
identify?
A. Respondents identified several drawbacks. The three concerns that
evoked the strongest response (40 to 49 percent of respondents) relate to:
o The vagueness of the term "restorative justice."
The term can lead to some confusion and misunderstanding. It especially
seems to be confused with the term "community justice." As mentioned
earlier, the philosophy is still evolving.[16] We continue to benefit from
the debate over the definition and application of "community policing,"
and I believe it will be the same for "restorative justice."
o Due process issues.
Respondents expressed concerns about both procedural and substantive
due process. Just as we strive to avoid coercion and achieve fundamental
fairness in traditional procedures, so should we take care that restorative
justice efforts are also acceptable to all parties involved, that participation
is voluntary, and that all parties understand the implications of their
participation.[17]
o Possible resulting disparity.
Whole sentencing systems are designed to ensure that similar offenders are
treated similarly (based on the current offense and the criminal history).
When we also consider victim characteristics, some of these carefully
designed controls may no longer work. At the same time, injustice can
now result from rigid rules that prohibit consideration of all the factors
involved with a case. Suffice it to say that full consideration of the victim
will challenge some of the carefully crafted guideline systems now in
place, requiring criminal justice professionals to exercise new creativity in
light of more variables.
Although not cited as a drawback by the survey respondents, some
restorative justice practices take more time and preparation than the
routine procedures in most American courts. Although this seems to
conflict with reports of faster disposition, it should be noted that some
programs are designed to be expeditious; others -- like the family group
conferences practiced in New Zealand and Canada[18] -- aim to transform
relationships. Building a solution that blends support, involved
partnerships, and an involved community takes time, but it may well be
worth it.
Q. What conclusions have you come to as you end your fellowship?
A. The evidence has convinced me that the restorative justice model has
great potential to coexist with the existing incapacitative and retributive
models and to contribute to greater well-being for victims and
communities. I started this fellowship with a keen interest in citizen
satisfaction with the criminal justice system. Most of the practitioners and
policymakers I've talked with in the past 20 years have expressed similar
interests. The restorative justice approach makes us look through a
different lens, to envision a new paradigm for addressing the disruption
crime causes victims and communities.
I've come to believe that restorative justice is a logical next step in a
number of national trends. First, it is an integral part of the movement to
involve communities in solving their crime problems and encourage
justice components to participate in community solutions. Justice agencies
no longer simply interpret case law and process offenders. They are part of
the "devolution" of Federal responsibility that gives local communities a
greater role in criminal justice processes.
It is also an integral part of "reinventing" government, because it
encourages flexibility and interdisciplinary efforts among the parties that
are closest to the source of problems.[19] Both reinventing government
and restorative justice push to clearly link existing policies, expenditures,
and results.
Thomas Jefferson acknowledged that our institutions must change as
society evolves and matures. It is apparent that we are in a time of change,
and our system of justice must change as well. Fortunately, the impending
transition to involve the community and the victim has the potential to be
a positive one.
Notes
1. Doble, John, Crime and Corrections: The Views of the People of
Vermont -- A Report to the Vermont Department of Corrections,
Englewood, NJ: John Doble Research Associates, Inc., 1994. See also
Doble, John, Stephen Immerwahr, and Amy Richardson, Punishing
Criminals: The People of Delaware Consider the Options, a report
prepared by the Public Agenda Foundation for the Edna McConnell Clark
Foundation, New York: William S. Fell Co., 1991; John Doble Research
Associates, Inc., Crime and Corrections: The Views of the People of
Oregon, a report prepared by the Oregon State-Centered Project for the
Edna McConnell Clark Foundation, Englewood, NJ: 1995; and "Media
Crime Wave Continues: Crime News Quadrupled in Four Years,"
Overcrowded Times (February 1996):3.
2. Braithwaite, John, Crime, Shame and Reintegration, Cambridge,
England: Cambridge University Press, 1989. Braithwaite calls the process
"reintegrative shaming."
3. Consedine, Jim, Restorative Justice: Healing the Effects of Crime,
Lyttleton, New Zealand: Ploughshares Publications, 1995; Melton, Ada
Pecos, "Indigenous Justice Systems and Tribal Society," Judicature
79(3)(November-December 1995):126-133; and Meyer, Manu, "To Set
Right -- Ho'oponopono: A Native Hawaiian Way of Peacemaking," The
Compleat Lawyer (Fall 1995). See also Accord 14(1)(June 1995) for a
collection of articles related to historical aspects of restorative justice.
4. The survey recipients were participants in discussion groups at
professional gatherings between mid-1995 and mid-1996. All survey
respondents had at least some knowledge of restorative justice. Some had
only limited exposure; others had more extensive understanding of the
philosophy, programs, and research findings. Of the 290 surveys mailed,
145 usable surveys were returned by the deadline. Respondents were
asked to rate statements on a five-point scale from "very positive" to "very
negative."
5. Most of the research on alternative approaches to increasing victim
satisfaction involves victim-offender mediation, which has grown
significantly in the past 15 years. There are now more than 650
community mediation programs in the United States involving almost
20,000 volunteer mediators. See Ray, Larry, "Overview of Community
Mediation," an unpublished report prepared by the National Association
for Community Mediation, Washington, DC, 1996. See also Ray, Erica,
"Multidoor Courthouse," in National Symposium on Court-Connected
Dispute Resolution Research: A Report on Current Research Findings --
Implications for Courts and Future Research Needs, ed. Susan Keilitz,
Williamsburg, VA: National Center for State Courts, 1994.
For examples of international experiences, see Pelikan, Crista, "Conflict
Resolution Between Victim and Offender in Austria and the Federal
Republic of Germany," in Crime in Europe, ed. Frances Heidensohn and
Martin Farrell, London, England: Routledge, 1991:167; Umbreit, Mark,
with Robert B. Coates and Boris Kalanj, Victim Meets Offender: The
Impact of Restorative Justice and Mediation, Monsey, NY: Criminal
Justice Press, 1994; Coates, Robert B., Victim Meets Offender: An
Evaluation of Victim-Offender Reconciliation Programs, Valparaiso, IN:
PACT Institute of Justice, 1985; and Roberts, Tim, "Evaluation of the
Victim-Offender Mediation Project: Final Report for the Solicitor
General," an unpublished report, Langley, British Columbia, Canada,
1995.
6. A review in 10 sites and 3 countries found that victim satisfaction with
the outcome of mediation ranged from 84 to 90 percent. See, for example,
Umbreit, with Coates and Kalanj, Victim Meets Offender. See also Vera
Institute of Justice, "Mediation and Arbitration as Alternatives to
Prosecution in Felony Arrest Cases: An Evaluation of the Brooklyn
Dispute Resolution Center (First Year)," New York: Vera Institute of
Justice, 1978.
7. Roberts, "Evaluation of the Victim-Offender Mediation Project."
8. Young, Marlene, "Restorative Community Justice: A Call to Action," a
discussion draft paper presented by the National Organization for Victim
Assistance, Washington, DC, 1995.
9. Umbreit, with Coates and Kalanj, Victim Meets Offender; and Roberts,
"Evaluation of the Victim-Offender Mediation Project."
10. For example, a study in Utah indicated that juveniles involved in
robbery, assault, burglary, theft, auto theft, and vandalism who agreed to
or were ordered to pay restitution had, after 1 year, lower rates of
recidivism (32 percent) than similar offenders who did not (38 percent).
Schneider, Anne, "Restitution and Recidivism Rates of Juvenile
Offenders: Results from Four Experimental Studies," Criminology
24(3)(August 1986); and Butts, Jeffrey A., and Howard N. Snyder,
"Restitution and Recidivism," Juvenile Justice Bulletin, Washington, DC:
U.S. Department of Justice, Office of Juvenile Justice and Delinquency
Prevention, September 1992.
For cases informally handled through diversion programs, for example, the
difference was even greater: Those involved with restitution had a
12-percent recidivism rate compared with a 20-percent rate for those not
so involved. These findings are consistent with a 1989 national evaluation
of restitution and recidivism that indicated that, in three of the four sites
evaluated, the restitution group had lower repeat offense rates in the 3-year
followup period than the control group. The sites were Boise, Idaho;
Washington D.C.; Clayton County, Georgia; and Oklahoma County,
Oklahoma. The nonrestitution alternative differed in the four jurisdictions.
Statistics were significant at the .05 level in two jurisdictions and at .27 in
the third. In the fourth site, there was no difference between the two
groups. National Trends in Juvenile Restitution Programming,
Washington, DC: U.S. Department of Justice, Office of Juvenile Justice
and Delinquency Prevention, July 1989:9-10.
11. Stutz, William, Victim Awareness Education Program Evaluation,
Olympia, WA: Washington State Department of Corrections, May 1994.
See also Umbreit, with Coates and Kalanj, Victim Meets Offender;
Schneider, "Restitution and Recidivism Rates of Juvenile Offenders"; and
Consedine, Restorative Justice, 24.
12. See, for example, Clark, S.H., E. Valente, Jr., and R.R. Mace,
Mediation of Interpersonal Disputes: An Evaluation of North Carolina's
Programs, Chapel Hill, NC: Mediation Network of North Carolina, 1992.
The findings were statistically significant, however, in only one of the
three counties studied. As with other studies, victims in the diverted
projects reported high satisfaction.
13. For the cases referred to mediation, the number of repeat calls for
service to the same address dropped 83 percent (from 272 to 47) compared
to callbacks for cases processed routinely, which dropped 17 percent (from
118 to 98). Researchers theorize that the dispute settlement approach is
better able to solve repeat problems, thus freeing up substantial police
time. Shepard, Roosevelt, "Executive Summary, Neighborhood Dispute
Settlement: An Evaluation Report," Harrisburg, PA: Board of Directors,
Neighborhood Dispute Settlement of Dauphine County, 1995. Subsequent
updated data were submitted by Program Director Stephen J. Roy.
14. Clark, Valente, and Mace, Mediation of Interpersonal Disputes; and
Umbreit, Mark, How To Increase Referrals to Victim-Offender Mediation
Programs, Ontario, Canada: Fund for Dispute Resolution, 1993.
15. Keilitz (ed.), National Symposium on Court-Connected Dispute
Resolution Research.
16. Recently, 47 percent of police chiefs and sheriffs surveyed were
unclear about the practical meaning of community policing. See Wycoff,
Mary Ann, Community Policing Strategies, Research Preview,
Washington, DC: U.S. Department of Justice, National Institute of Justice,
November 1995.
17. In 1994, the American Bar Association (ABA) endorsed
victim-offender dialogue programs urging that the choice to participate be
voluntary. "ABA Endorsement of Victim-Offender Mediation/Dialogue
Programs," approved by the ABA House of Delegates, August 1994,
unpublished paper. Victim advocates joined in the ABA's
recommendations.
18. Burford, Gale, and Joan Pennell, "Family Group Decision Making:
Generating Indigenous Structures for Resolving Family Violence,"
Protecting Children 12(3)(1996); McElrea, F.W.M., "Restorative Justice:
The New Zealand Youth Court: A Model for Development in Other
Courts?" Journal of Judicial Administration 4(1994); and Immarigeon,
Russ, "Family Conferences, Juvenile Offenders, and Accountability," The
New York State Child Advocate 3(Fall 1994).
19. Gaebler, Ted, and David Osborne, Reinventing Government: How the
Entrepreneurial Spirit Is Transforming the Public Sector, Reading, MA:
Addison-Wesley Publishing Company, 1992.
-------------------------------
Varieties of Restorative Justice Practices
Victim impact statements provide an opportunity for victims to express
their concerns to the prosecutors and the court.
Victim impact panels give victims an opportunity to confront groups of
offenders -- not necessarily the ones who committed their crimes -- and to
talk about the anger and hurt caused by the crime.
Family group conferences are an indigenous Maori approach recently
being adapted to the majority culture in some areas of New Zealand,
Australia, and the United States. These group victim-offender mediations
include family members of both victims and offenders.[1]
Sentencing circles are an American and Canadian Indian approach that is
being revived. They involve a wide array of interested parties, including
those closest to the victim and offender and others likely to affect their
future. Saskatchewan is increasingly using sentencing circles.[2]
The Balanced and Restorative Justice (BARJ) project, which is supported
by the U.S. Department of Justice's Office of Juvenile Justice and
Delinquency Prevention and is in place in several sites,[3] calls for every
sanction involving juveniles to include consideration of public safety,
accountability to victim and community, and the development of
competency by offenders.
Vermont uses citizen reparative boards to determine the nature and details
of the conditions of probation for convicted offenders. Trained volunteers
provide offenders with a clear understanding of the impact their crimes
had on the community as well as an appropriate and relevant assignment
to repair the damage.
Restorative justice sentencing plans are being developed in Winnipeg,
Canada, as strategies that are individualized to the offender and victim and
are cost-effective sanctions that help repair the harm.[4]
Notes
1. McElrea, F.W.M., "Restorative Justice -- The New Zealand Youth
Court: A Model for Development in Other Courts?" Journal of Judicial
Administration 4(1994); and Immarigeon, Russ, "Family Conferences,
Juvenile Offenders, and Accountability," The New York State Child
Advocate 3(Fall 1994).
2. Stuart, Barry, "Circle Sentencing -- Mediation and Consensus: Turning
Swords into Ploughshares," Accord 14(1)(June 1995).
3. Bazemore, Gordon, and Mark Umbreit, Balanced and Restorative
Justice Program Summary, Washington, DC: U.S. Department of Justice,
Office of Juvenile Justice and Delinquency Prevention, October 1994.
4. The Restorative Resolutions Project in operation in Winnipeg, Canada,
prepares client-specific plans based on restorative principles. See
Galaway, Burt, and Gord Richardson, "Evaluation of the Restorative
Resolutions Project of The John Howard Society of Manitoba, Final
Report," Winnipeg, Canada: University of Manitoba, June 1995.
-------------------------------
Protecting Public Transportation From Terrorists
by Eric Barnes
-------------------------------
Eric Barnes is the operations and planning coordinator with the National
Law Enforcement and Corrections Technology Center-Southeast Region.
Contributors to this article include Marj P. Leaming, Ph.D., NIJ program
manager, and Linda Cavazos, NIJ intern.
-------------------------------
Few Americans have been victims of terrorist attacks, but the general
public's peace of mind and confidence in Federal, State, and local
government can be shattered by such devastating events as the bombings
at the World Trade Center, Oklahoma City's Murrah Federal Building, and
Atlanta's Centennial Park. These acts have underscored the harsh reality
that citizens of the United States are not immune from terrorist targeting.
The number of terrorist groups have grown substantially during the 1990s,
both domestically and internationally. The U.S. Department of State has
designated 30 foreign extremist organizations as terrorist groups; many of
these operate within the United States.[1] The Federal Bureau of
Investigation (FBI) has identified an ever-increasing number of organized
or ad hoc domestic terrorist groups with political and social agendas.
When President Clinton signed the Antiterrorism and Effective Death
Penalty Act of 1996 (Public Law 104-132) on April 24, 1996, he ensured
that developing strategies and enhancing capabilities to combat domestic
and international threats will continue to receive high priority.
Transit systems as targets
Metropolitan public transportation networks are enticing targets for
terrorists because they typically carry large numbers of people in a
concentrated, predictable geographic area under routine timeframes. (See
"What Is Land Transportation?") They also are highly accessible.
According to the U.S. Department of Transportation, there were 702
violent attacks against transportation and transportation infrastructures
worldwide in 1996. Fewer than 2 percent of these attacks occurred in the
United States. In addition, the U.S. Department of State recorded 296
international terrorist attacks in 1996. Ninety-two of these attacks -- or
nearly one-third -- were against transportation and transportation
infrastructures.[2]
European, Middle Eastern, and Asian countries rely on their public transit
systems more heavily than the United States and have experienced more
terrorist attacks than the United States. Yet even officials in these more
experienced countries could not prevent the Sarin gas attacks on the Tokyo
subway or bombings on Paris trains.
Most American cities give responsibility for transportation security to their
municipal law enforcement agencies, although some larger municipalities
support specifically designated transportation security forces. These
officers are trained to handle assault, larceny, vandalism, fare evasion, and
similar offenses, but most lack the specialized training and advanced
protective gear and equipment needed to respond to the enormous death
and destruction that can occur in a terrorist attack.
Formulating the Federal policy response
The Federal response to protecting public transportation systems involves
many agencies working toward two primary goals: (1) to enhance the
capability of local agencies to detect and prevent a terrorist attack, and (2)
to improve the emergency response and containment capabilities after an
attack.
Within the U.S. Department of Justice, the National Institute of Justice
(NIJ) is leading the effort to identify technology needs and priorities,
develop enhanced capabilities, and bring newly developed products to the
commercial market. To accomplish its goal, NIJ participates in the
activities of three groups with different missions related to
counterterrorism: (1) the G-7 plus Russia, which is composed of
policymakers and experts with an international focus; (2) the Infrastructure
Protection Task Force, which works to prevent terrorist acts against the
infrastructures of the United States; and (3) the Technical Support
Working Group, which focuses on developing technology to respond to all
types of domestic terrorism. Each is discussed below.
The G-7 plus Russia. The advanced industrial nations (Canada, France,
Germany, Great Britain, Italy, Japan, and the United States -- the G-7 --
plus Russia) met at the Lyons Summit in France on July 30, 1996, and
adopted a 25-point plan calling for close cooperation in international
efforts to combat terrorist acts. The plan included tightened control on
firearms and explosives, improved bomb detection methods, prevention of
terrorist communications on the Internet, and faster exchange of
information on terrorist activities, including those involving chemical,
biological, or nuclear materials.
U.S. Attorney General Janet Reno led the United States delegation to the
Lyons Summit. Based on commitments made at the Lyons meeting, two
gatherings for land transportation security policymakers were held in
Washington, D.C., in November 1996 and April 1997. The international
strategy continues to develop through these cooperative meetings.
Infrastructure Protection Task Force. This domestic interagency task force,
which is chaired by the FBI, is mandated by Congress and the President to
identify and coordinate government and private-sector efforts to protect
the United States' critical infrastructures from debilitating threats and
ensure their continued operation.[3]
Transportation is one of the eight critical national infrastructures
determined by the President and Congress to be of such importance that its
incapacity or destruction would have a dramatic effect on the defense,
economic security, and public welfare of the United States.[4] Many of the
critical infrastructures are privately owned and operated, thus necessitating
a partnership between the private sector and government agencies.
The task force considers both physical threats to facilities and cyberthreats
to controlling information components. Participants are:
Federal Bureau of Investigation (chair)
Department of Justice
Department of Defense
Department of Energy
Department of Transportation
Central Intelligence Agency
Defense Information Systems Agency
National Communications System
National Security Agency
Department of the Treasury
National Institute of Standards and Technology
Technical Support Working Group. The Department of Justice also
participates in the Technical Support Working Group (TSWG), which was
established by the National Security Council's Policy Coordinating
Committee on Terrorism. TSWG conducts rapid prototyping research and
development related to counterterrorism, with primary funding from the
U.S. Departments of State and Defense. Members of the U.S. Departments
of Defense and Energy cochair the group.
TSWG brings together technical developers, such as national laboratories,
to discuss how technology can best meet identified needs, the level of
effort required to develop capabilities, and ways to commercialize
products. TSWG's designated research priorities through fiscal year 1998
include the following:
o A new first-responder mask, designed for chemical and biological
weapons protection and ease of breathing and adequate vision, that
provides 12-hour protection in a one-size-fits-all design.
o A mechanical car bomb extractor consisting of a saw mounted on an
articulating arm that would be integrated with existing bomb squad robots
to provide remote operations and removal.
o A portable, easy-to-use, real-time, and digital X-ray unit to inspect
suspicious packages.
o A small percussion-activated nonelectric device that fires shotgun
cartridges filled with liquid at a bomb and disrupts the bomb's circuitry but
leaves evidence intact.
o An enhanced explosives ordnance disposal suit providing blast
resistance and chemical and biological protection in a single unit.
o A chemical and biological mitigation system consisting of a tent filled
with aqueous foam placed around a bomb delivery device to mitigate
dispersion effects.
o Several enhanced chemical agent detection devices.
Focus groups help define needs and identify priorities
As the United States prepared its position paper on counterterrorism for
submission to the G-7, NIJ and the U.S. Department of Transportation
surveyed select groups of people closely involved in issues of terrorist
attacks on land transportation systems, including first responders and
transportation security officials. (See "Assessing Technology Needs to
Combat Terrorism.")
Transportation and security officials served as a sounding board for an
upcoming international conference on land transportation security
technology. (See "International Conference on Land Transportation
Security Technology.") Participants were particularly interested in training
packages and products, especially a new training program the Bureau of
Justice Assistance is offering to first responders in more than 140
jurisdictions. (See "For More Information . . . .")
Formulating the field response
NIJ's response to identified counterterrorism needs falls into two broad
categories -- technology and training.
Develop new technologies. NIJ is entering the second year of an initiative
to put better counterterrorism tools into the hands of State and local law
enforcement officers. (See "Examples of Counterterrorism Technology.")
NIJ's approach, which takes advantage of existing technology to maximize
the impact of the funds provided by Congress, is two-pronged:
o Identify potential solutions related to infrastructure security, hostage
rescue, explosive detection and remediation, and information technology.
These activities are managed for NIJ by the Joint Program Steering Group
(which is cosponsored by NIJ and the U.S. Department of Defense's
Defense Advanced Research Projects Agency) and coordinated with
agencies involved in combating terrorism, such as the FBI.
o Develop standards for these new technologies funded by NIJ and
managed by the U.S. Department of Commerce's Office of Law
Enforcement Standards.
Several research and development efforts are already generating products.
Two examples of concealed weapon detection systems are now being
demonstrated. A highly sensitive prototype electromagnetic system with a
low false alarm rate is being demonstrated in Bannock County, Idaho. A
portable, through-the-wall surveillance system that employs radar
technology was demonstrated with the Los Angeles County Sheriff's
Department during summer 1997. In addition, NIJ, the FBI, and the U.S.
Navy will participate in the evaluation of a state-of-the-art, X-ray-based
explosive diagnostic system.
As new technology develops and existing technology improves, NIJ
identifies and upgrades high-priority advancements in combating terrorism
and creates new standards to ensure that those technologies are adequate
and compatible with other relevant systems.[5]
Training for first responders. To give law enforcement and first responders
practice handling terrorist attacks, NIJ, through its National Law
Enforcement and Corrections Technology Center-Southeast Region, is
developing a mock transportation security exercise in partnership with
Oak Ridge National Laboratories.
The exercise will provide a venue for selected law enforcement and
transportation security agencies to face various scenarios of hostage,
explosive, and chemical attacks on public transportation systems.[6] It will
also showcase new products and technologies to support the
counterterrorism operation and demonstrate their capabilities. The rail
lines, tunnels, and facilities at Oak Ridge, supplemented by actual public
transit railcars and buses, will provide an excellent training ground for this
endeavor.
Videotape and training materials regarding the operation and application
of technological tools will be produced and provided to law enforcement,
transportation security, and public safety agencies.
Training for bomb disposal teams. Another hands-on training experience,
Operation Albuquerque, is a series of exercises designed for teams that
handle bombs and other explosives. NIJ is sponsoring the training in
conjunction with Sandia National Labs and the National Law Enforcement
Corrections and Technology Center-Rocky Mountain Region.
Sandia Labs staff plant mock explosive devices throughout Albuquerque,
New Mexico, and participant teams try to locate and defuse them.
Realistic scenarios test the planning, procedures, and command and
control of emergency bomb response operations. The exercise also
showcases technology and evaluates products such as a bomb disabler that
will be used against low-yield explosive devices.
Interactive training resources. NIJ is developing training tools to help law
enforcement agencies learn about virtual reality and training simulation
technology. These tools are being developed in partnership with the
University of Central Florida, the Naval Air Warfare Center Training
Systems Division, and the U.S. Army Simulation, Training &
Instrumentation Command.
The interactive Bomb Threat Training Simulator gives land transportation
security personnel training related to bomb threats. The training consists of
three modules, each of which responds to a particular aspect of a typical
bomb threat scenario: receipt of the threat, assessment of its seriousness,
and response; proper searching of the building; and selection of evacuation
routes. The simulation ends with an evaluation of the trainees'
performance. The computer-based nature of the training allows a greater
number of people to be trained than might otherwise be possible due to
time, cost, or operational considerations.
Another interactive simulator training is the Weapons Team Engagement
Trainer, which provides trainees an opportunity to confront armed
adversaries in an interactive, realistic scenario. Through the training,
hostage rescue units and SWAT teams improve their decisionmaking,
tactical, and marksmanship skills. Wall-sized video screens play scenarios
for users outfitted with specially designed weapons and Multiple
Integrated Laser Engagement Systems (MILES) that record when both
offenders and users are "hit." Cameras record trainee actions so the system
can replay scenes and stress important points.
Plowshares is another interactive emergency management training
program. Now under development by the U.S. Army, the system was
originally designed to train personnel to respond to natural disasters, but it
can be modified to portray a scenario in which terrorists attack public
transportation networks. Plowshares offers training on coordinating a
response to large-scale disasters.
Transferring excess Federal property to local law enforcement. To enhance
transportation security, the Section 1033 Program (named for the
legislation that created it) allows State and local law enforcement and
public safety agencies to acquire U.S. Department of Defense equipment
for use against terrorism at no (or low) cost. Coupled with standard State
surplus programs and the complementary 1122 Program (which authorizes
State use of the General Services Administration purchasing procedures),
the Section 1033 Program can greatly enhance the capability of agencies
with counterterrorism responsibilities by making it easier for them to
purchase equipment. NIJ is the U.S. Department of Justice focal point for
these excess property programs.[7]
The commitment
The Attorney General is committed to thwarting and apprehending both
foreign and domestic terrorists who attempt to commit criminal acts
against U.S. citizens. Enhancing the capability of State and local law
enforcement and public safety officers to counter terrorism requires the
combined efforts of many agencies working collaboratively. These efforts
involve identifying areas for research and development, sharing the
lessons learned from past domestic and international encounters with
terrorists, and developing and applying appropriate training and
operational techniques.
Notes
1. Giacomo, Carol, "U.S. Designates 30 Foreign Groups as Terrorist,"
Reuters National News, October 8, 1997.
2. U.S. Department of State, Patterns of Global Terrorism 1996, Office of
the Secretary of State, Office of Coordinator for Counterterrorism,
Department of State Publication No. 10433, April 1997.
3. The Infrastructure Protection Task Force (IPTF) was created on July 15,
1996, when President Clinton signed Executive Order 13010. IPTF is a
component of the President's Commission on Critical Infrastructure
Protection.
4. In addition to transportation, the task force may consider other major
infrastructure categories, including banking and finance, continuity of
government services, electrical power, emergency services, gas and oil
distribution and storage, telecommunications, and water supply systems.
5. Among the standards now in development are NIJ Standard 0101.03,
"Ballistic Resistance of Police Body Armor"; NIJ Standard 0601.00,
"Walk-Through Metal Detectors for Use in Weapons Detection"; and NIJ
Standard 0603.00, "X-ray Systems for Bomb Disarmament." Other tasks
include the development of law enforcement community communications
standards, concealed weapons detectors operating on different physical
principles from those of existing metal detectors, and digital
communications intercept systems.
6. Participation at training sessions is by invitation only. For more
information, contact NLECTC-Rocky Mountain Region at 800-416-8086.
7. For more information, contact Ken Dover at NLECTC-Southeast
Region at 800-292-4385.
-------------------------------
What Is Land Transportation?
Land transportation in the United States represents approximately $777
billion, or 11 percent of the gross domestic product. Disruption of
transportation infrastructure affects a massive network of commuters and
travelers, businesses, and military activities that depend on the rapid
movement of people and products.
Presently, the definition of "land transportation" is evolving, but the
general components include:
Land
o 3.9 million miles of public roads and highways.
o 6.9 million freight trucks, driven 0.2 trillion miles.
o 58 million light trucks, driven 0.7 trillion miles.
o 686,000 buses, driven 8.4 billion miles.
o 136 million personal vehicles, driven 1.5 trillion miles.
Pipelines
o 114,000 miles of crude oil pipelines, transporting 323 billion ton-miles.
o 276,000 miles of natural gas transmission pipelines.
o 919,000 miles of natural gas distribution pipelines.
Rail and Transit
o 170,433 miles of railroad track.
o 1.2 million freight cars and 18,800 locomotives, carrying 1.3 trillion
ton-miles.
o 1,921 passenger cars and 356 passenger locomotives, carrying 20.7
million passengers.
o 43,723 transit buses, traveling 17.2 billion passenger-miles.
o 9,048 rapid and light rail trains, traveling 11.5 billion passenger-miles.
o 4,300 commuter railways, traveling 8.0 billion passenger-miles.
Source: U.S. Department of Transportation, Bureau of Transportation
Statistics, Transportation in the United States: A Review, Washington,
DC: 1997.
-------------------------------
Assessing Technology Needs to Combat Terrorism
The Antiterrorism and Effective Death Penalty Act (Public Law 104-132),
signed April 24, 1996, authorized $5 million in fiscal year 1997 for the
U.S. Department of Justice's Office of Justice Programs to develop
training services for local firefighters and emergency services personnel
and $10 million to develop counterterrorism technologies.
To determine the technology needs of State and local law enforcement,
NIJ went to the practitioners. With help from four of its regional National
Corrections and Law Enforcement Technology Centers, NIJ conducted
interviews and discussions in May 1997 with 195 representatives from 138
agencies across the country. These representatives were drawn from State
government, large and small municipalities, rural and regional agencies,
and a number of law enforcement disciplines, including transportation
security agencies, SWAT teams, hostage rescue units, and bomb squads.
The assessment is ongoing and should be completed in spring 1998. The
interim findings formed the basis of NIJ's fiscal year 1998
counterterrorism technology development program.
Among the most pressing issues raised by law enforcement participants
were cyberterrorism, intelligence collection and sharing, and improving
the ability to deal with weapons of mass destruction in situations such as
bomb threats, hostage rescues, and attacks on mass transit. Among the
most often cited technology needs to combat terrorism were the following:
o A secure national intelligence database accessible by State and local law
enforcement agencies.
o A better means of detecting and classifying explosive devices in a timely
manner.
o A secure communications link between those who first respond to the
scene.
o An improved means of detecting and classifying chemical and biological
agents in a timely manner.
o An interagency communications system for crisis management --
interoperability for the many public safety agencies that respond to the
scene. Interoperability is the ability of firefighters, for example, to
communicate with the police department's bomb squad and medical
emergency teams.
A review of the inventory of needs points to the fact that the capabilities
needed to combat terrorism are the same as those needed to combat crime
in general, with the possible exception of the capability to address the
threat posed by weapons of mass destruction. Overall, the technology
needs expressed by participants in this inventory correspond with the
technology development efforts NIJ has undertaken to address law
enforcement needs in general.
For a copy of the study, State and Local Law Enforcement Technology
Needs to Combat Terrorism -- Volume I: Inventory of Needs (January
1998), write to Dr. Peter Nacci, Deputy Chairman of the Joint Program
Steering Group, National Institute of Justice, 810 Seventh Street N.W.,
Room 7208, Washington, DC 20531.
-------------------------------
International Conference on Land Transportation Security Technology
More than 20 percent of terrorist activities occur on land transportation
systems, including trains, buses, subways, and roadways. In response to
the need to protect these systems, the National Institute of Justice, the U.S.
Department of State, and the U.S. Department of Transportation will
cosponsor the first international conference to feature new technologies
and best practices to combat terrorist activity against land transportation
systems.
The conference will be held at the Marriott Marquis in Atlanta, Georgia,
April 7-9, 1998. Both domestic and international presenters (particularly
from the G-7 nations -- Canada, France, Germany, Great Britain, Italy,
Japan, and the United States -- plus Russia), will discuss current and
emerging terrorist threats, results from case studies, lessons learned and
techniques developed during response to terrorist actions, and new
technologies. Featured technologies will include the following:
o Explosive and chemical detection systems and sensors.
o Surveillance systems and technologies.
o Information systems security and multijurisdictional command and
control structure.
o Emergency management.
o Protection/mitigation.
o Terrorism vulnerability assessments.
o Overview of 29 CFR [Code of Federal Regulations] 1910, hazardous
materials protection.
o Hands on, simulation, and virtual reality training tools.
o Enhancement of first-responder capabilities through the International
Association of Chiefs of Police "First Responder Practical Exercise."
Policymakers, transportation security professionals, and first responders
(local and State law enforcement, fire, and emergency medical services
personnel) should attend. For information on attending or exhibiting at the
conference, call Marina Leight at Government Technology, 916-363-5000,
ext. 3764, or e-mail [email protected].
-------------------------------
For More Information . . .
A great deal of information is available on terrorism and counterterrorism.
Some of the best sources are listed below:
o The National Law Enforcement and Corrections Technology Centers:
http://www.nlectc.org; NLECTC-National, 800-248-2742.
o Infrastructure Protection Task Force World Wide Web home page:
http://www.fbi.gov/programs/iptf/iptf.htm.
o Transit Security Newsletter, Office of Safety and Security, Federal
Transit Administration:
http://www.fta.dot.gov/library/program/tsn/tsn.htm.
o U.S. Department of Transportation Web page: http://www.dot.gov.
o U.S. Department of State Web page:
http://www.state.gov/www/global/terrorism/index.html.
o For information about first responder training, order FY 1997
Metropolitan Firefighter and Emergency Services National Training
Program for First Responders to Terrorist Incidents, Bureau of Justice
Assistance Fact Sheet, FS 000185, from the BJA Clearinghouse, 800-688-
4252, or obtain a copy electronically from http://www.ojp.usdoj.gov/bja
(click on "Special Programs").
-------------------------------
Examples of Counterterrorism Technology
Technologies under development that could be applied to counterterrorism
efforts include the following:
o "Bullet resistant" vests with titanium or ceramic inserts that are
lightweight, inconspicuous, and protect against rifle and handgun fire.
Enhanced helmets of the same materials are also being developed.
o Weapons detection systems that can identify a weapon containing little
or no metal at a distance of 30 feet. Multiple technologies are being
evaluated (X-ray sensors, a sensor system combining passive millimeter
wave and infrared cameras, a sensor system combining ultrasound and
radar sensors, and a low magnetic sensor system). Current efforts are
based on portal applications; portable and handheld systems are
long-range goals. The Air Force Research Laboratory in Rome, New
York, and the Office of Science and Technology's National Law
Enforcement and Corrections Technology Center-Northeast Region are
key players in this effort.
o Less-than-lethal incapacitation technologies that are both legal and
socially acceptable include eye-safe laser dazzlers, pyrotechnic devices,
enhanced pepper spray delivery systems, and net devices.
o Information sharing systems that involve both tactical communications
and existing commercial communications, such as the Internet and cellular
telephones, are being evaluated. Architectures that exchange and retrieve
data and are protected by firewalls and encryption devices, such as the
National Security Agency's FORTEZZA Card, are being demonstrated.
The National Law Enforcement and Corrections Technology Center-
Rocky Mountain Region has just finished documenting the requirements
needed for a communication system that can be used for crisis
management involving multiple public safety agencies and more than one
jurisdiction.
o Sniper fire identification systems capable of detecting and locating a
sniper to within a 10- by 10-foot area in either urban or rural
environments. The effort is focusing on developing systems that can be
handcarried, worn, or mounted on vehicles. Acoustic, integrated infrared
and/or laser systems to track shots fired back to their source are being
evaluated.
o Location and tagging systems that identify and monitor the movement of
individuals and vehicles. Accurate tagging and navigation technologies
include Global Positioning Systems, command and control systems, and
Global Information Systems. These technologies need enhancements and
miniaturization to be incorporated into decisionmaking support, to
promote rapid response to critical events, and to enhance officer
protection.
-------------------------------
Research Preview
Sentencing Guidelines: A State Perspective
Summary of a Presentation by James Austin, National Council on Crime
and Delinquency
Sentencing reform legislation mushroomed in the 1980s and 1990s. Amid
public cries of "Get tough on crime," State policymakers across the Nation
responded with stricter and harsher sentencing guidelines and laws, such
as truth in sentencing, three strikes and you're out, and mandatory
minimum sentences. These forms of structured sentencing are intended to
reduce both leniency and bias by limiting the discretion of prosecutors,
defense counsel, judges, prison officials, and parole boards whose actions
at various points in the criminal justice system affect sentences.
With funding from the National Institute of Justice (NIJ) and the Bureau
of Justice Assistance (BJA), the National Council on Crime and
Delinquency (NCCD) documented recent State sentencing legislation and
current practices. Preliminary findings indicate an initial flurry of State
interest in determinate sentencing, in which the offender is given a fixed
term that may be reduced by "good-time" credits. Nearly three-fourths of
States, however, have retained indeterminate sentencing, in which an
administrative agency -- typically a parole board -- has the authority to
release an offender and to revoke parole. A number use a blend of the two
sentencing structures. In addition, all States use some version of
mandatory minimum sentences, which are imposed by statute and target
habitual offenders and such crimes as possession of a deadly weapon,
driving under the influence of alcohol or other drugs, and drug trafficking
and possession.
In the juvenile justice system, States are making it easier to transfer
youthful offenders to adult courts. Some States are now allowing juvenile
records to be used in future adult court proceedings, opening juvenile court
proceedings to the public, and making the family, as well as the offender,
more accountable for crimes committed.
Adult corrections
The survey of State sentencing practices revealed that 36 States and the
District of Columbia continue to use indeterminate sentencing.
Additionally, the vast majority of States, including those that have adopted
determinate and sentencing guideline models, retain some form of
discretionary parole release, such as the use of good-time credits and
postrelease supervision. Only Hawaii and Utah do not allow inmates to
earn some type of good-time credit to reduce their sentences or hasten
their eligibility for parole.
Although most States retain indeterminate sentencing, sentencing in many
States is becoming more determinate through the increased use of
mandatory minimums, truth in sentencing (in which inmates are required
to serve a certain percentage of their sentences), and reductions in the
amount of good-time credits an inmate can potentially earn.
To date, 19 States and the Federal Government have sentencing
commissions, while 17 States have implemented either presumptive
sentencing guidelines (which are developed by sentencing commissions,
prescribe policies for officials to follow, and provide procedures for
departing from the guidelines) or voluntary/advisory sentencing
guidelines. Of these 17 States, 10 use presumptive guidelines while 7
States' guidelines are voluntary or advisory. (Some States have both
sentencing commissions and sentencing guidelines. However, some States
with sentencing commissions have not yet adopted guidelines, while in
one State -- Tennessee -- the commission was abolished though the
guidelines remain.)
Juvenile justice
Across the Nation, States are facilitating the process of transferring
juveniles to adult court by adding specific transferable offenses and by
lowering the maximum age for the juvenile court's jurisdiction.
Twenty-three States changed their exclusion laws (legislation specifying
which offenses are excluded from the juvenile court's jurisdiction and
must be handled in adult court) by adding crimes to be excluded, and six
lowered the age limit at which a juvenile can be transferred. Ten States
changed their judicial waiver laws (legislation enabling the juvenile judge
to waive the juvenile to adult court) by adding crimes to be waived, and 11
lowered the age limit for waivers.
As of 1995, 47 States allowed judicial waivers based on such factors as
age, current offense, criminal history, and possibility for rehabilitation.
Thirty-seven States had provisions for statutory exclusions. Eleven States
provided for prosecutorial waivers, which allow the prosecutor to decide
which court will have jurisdiction when the juvenile and adult courts have
concurrent jurisdiction. Also, 22 States provided for reverse waivers,
which allow the criminal court to transfer cases from adult to juvenile
court under certain circumstances. In 18 States, once a juvenile is waived
to adult court, all subsequent charges are prosecuted in adult court.
Possible effects on prison populations
NCCD's research included projecting prison populations for approximately
22 States. Data show that, as of mid-1997, more than 1.2 million people
were incarcerated in the United States. If current practices continue,
researchers predict, this figure will rise to 1.4 million by the year 2000. In
addition, they note that if all States adopt truth-in-sentencing regulations,
as proposed by the Federal Government, prison populations could increase
by an additional 200,000 to 300,000 by 2000. Throughout the States
included in NCCD studies, incarceration rates have gradually risen since
the early 1980s.
These numbers are not driven by an influx of prisoners into the system --
overall increases in sentence lengths are the primary factor in prison
population increases. According to NCCD researchers, in the past 5 years
the average prison stay has increased to 48 months from 30 months. This
has caused a "stacking effect" in prisons (i.e., inmates with very long
sentences cannot be released for many years), so that, with more offenders
receiving sentences of up to 25 years to life, it is only when inmates die in
prison that the population will stabilize or begin to decline.
Future developments
It is likely that in the next decade the States will continue to move toward
more blended systems of determinate and indeterminate sentencing. To
achieve more flexibility in sentencing, many States that passed fixed
sentencing guidelines are now beginning to use indeterminate sentences
with parole for certain types of offenses, whereas States with
indeterminate sentencing practices are assigning fixed sentence lengths to
particular crimes.
NCCD researchers emphasize that researchers, practitioners, and
especially policymakers will find it useful to be aware of the impact of
sentencing reforms on the correctional system now and in the future. They
conclude that without major changes in sentencing laws over the next few
years, the prison population will continue to grow and to consist
increasingly of minority group members and women.
The issues raised by the adoption of sentencing reforms offer opportunities
for further study. Researchers may want to look at the efficiency of
different ways of managing an inmate population whose size and
characteristics are changing and at the relative cost-effectiveness of these
different techniques.
-------------------------------
This document is based on Dr. James Austin's presentation to an audience
of researchers and criminal justice practitioners as part of NIJ's Research
in Progress Seminar Series. The study was sponsored in part by NIJ
(contract number 95-IJ-CX-0026). Dr. Austin is the Executive Vice
President of the National Council on Crime and Delinquency. A 60-minute
VHS videotape of the seminar, Sentencing Guidelines: A State
Perspective, is available for $19 ($24 in Canada and other countries). Ask
for NCJ 164726.
-------------------------------
Points of view in this document do not necessarily reflect the official
position of the U.S. Department of Justice.
FS 000197
-------------------------------
New & Noteworthy
NIJ revamps its Web page
The National Institute of Justice has completely revised its home page on
the World Wide Web -- http://www.ojp.usdoj.gov/nij. Bookmark this site
and stay up to date on:
o NIJ funding opportunities.
o Program activities.
o Recently released publications and products in many topic areas.
o Contact information for NIJ staff.
o Recent awards as well as the complete portfolio of NIJ research projects.
The page also includes a keyword search within NIJ, NCJRS, or OJP.NIJ
updates its home page regularly, so click the "What's New" button each
time you visit.
Training system for SWAT teams wins award
The Naval Air Warfare Center Training Systems Division (NAWCTSD)
received an Award of Excellence in Technology Transfer from the Federal
Laboratory Consortium for its upgrade of the Weapons Team Engagement
Training (WTET) system and its transfer of this technology to law
enforcement agencies.
Developed with NIJ funding, the WTET system offers a realistic,
interactive environment to train and evaluate the proficiency of hostage
rescue units and SWAT teams. It consists of wall-sized videoscreens that
play hostage scenarios for users outfitted with specially designed weapons
and laser tags that record when the user is "hit." The system can replay the
scenario and give the trainee information on the location, number of
"shots" fired, and number of hits.
The Federal Laboratory Consortium's award recognizes the outstanding
job done by member laboratories in developing and transferring
technology to outside partners, primarily in the private sector. The award
will be presented as part of the Consortium's annual Technology Transfer
Meeting in San Antonio, Texas, in May 1998.
Criminal justice programs win coveted innovations award
Programs to improve criminal justice operations were among the winners
and finalists in the most recent round of awards given by the prestigious
Innovations in American Government competition. Each year, the Ford
Foundation, which funds the competition, and Harvard University's John
F. Kennedy School of Government, which administers it in partnership
with the Council for Excellence in Government, selects 25 programs that
have taken a fresh approach to a problem in government in such areas as
criminal justice, education, transportation, and the environment.
1997 winners
o Operation Cease Fire, based in the Boston Police Department, deals with
gang violence preemptively by identifying potential "hot spots" of gang
trouble. The program has virtually eliminated deaths of young people by
guns through intervention that taps the knowledge of a wide range of
stakeholders, including clergy, community leaders, academics, and gang
members themselves. The program is summarized in Juvenile Gun
Violence and Gun Markets in Boston, by David Kennedy, Research
Preview, March 1997, FS 000160. The program is also the subject of an
NIJ-sponsored evaluation, which will be reported in forthcoming NIJ
publications.
o Structured sentencing is a legislative approach to managing prison
growth while ensuring that violent offenders serve their full sentences. The
legislation, devised by North Carolina's Sentencing and Policy Advisory
Commission and passed by the General Assembly, mandates sentences
based on the severity of the crime and the offender's record. Early-release
parole is eliminated and career and violent criminals are channeled into
longer prison stays. The program is the topic of an NIJ report, Managing
Prison Growth in North Carolina Through Structured Sentencing, by
Ronald F. Wright, Program Focus, February 1998, NCJ 168944. (See page
35 for more information.) The approach is also the subject of an
NIJ-sponsored evaluation, which will be reported in forthcoming
publications.
1997 finalists
o Disarming the criminal, a program of the Bureau of Alcohol, Tobacco
and Firearms of the U.S. Department of the Treasury, aims to reduce
firearms violence by tracing illegal firearms to their sources and applying
aggressive, focused enforcement. In 1996, the netting of 2,230 traffickers
by the program prevented an estimated 53,500 firearms-related crimes.
o First Offender Prostitution Program, operated by the San Francisco
District Attorney's Office in collaboration with law enforcement, public
health, and private agencies, offers women and girls counseling and
resources to help them escape prostitution and allows "johns" who are
first-time offenders to pay a fine and attend an educational program
instead of being prosecuted.
o The Constituent Services Office of Missouri's Department of Corrections
has improved communication with and services to prisoners, lowered
costs, and reduced the number of inmate lawsuits by identifying and
addressing questions and complaints about inmate medical services,
visiting procedures, and transfer policies.
o Healthy Start, operated by the State of Hawaii's Department of Health,
prevents child abuse and neglect by identifying problems early and
offering intensive home-based services to families with young children.
Healthy Start is described in Helping To Prevent Child Abuse -- and
Future Criminal Consequences: Hawai'i Healthy Start, by Ralph B. Earle,
Program Focus, October 1995, NCJ 156216.
o Gallery 37, a program of the Chicago Department of Cultural Affairs,
offers arts-based employment and skills to Chicago's 14- to 21-year-olds,
including at-risk young people. Designed to improve job skills and work
habits, Gallery 37 has attracted national and international attention.
For more information. More details about the winners and finalists from
this year and previous years and about the Innovations in American
Government program are available at Web site
http://www.ksg.harvard.edu/innovations, or by calling 617-495-0558.
Video series spotlights intermediate sanctions
Judges and policy teams interested in a broader, more practical
understanding of intermediate sanctions can turn to a new instructional
video seminar series. Facilitating the Appropriate Use of Intermediate
Sanctions conveys lessons learned from almost 100 jurisdictions that have
worked with a policy team approach to intermediate sanctions. This work,
begun through the joint efforts of the State Justice Institute and the
National Institute of Corrections and its National Intermediate Sanctions
Project, provides assistance to jurisdictions around the Nation interested in
forming policy teams to guide the appropriate use of intermediate
sanctions. The Center for Effective Public Policy produced the videos.
The tapes combine footage from the April 1996 broadcast of a national
videoconference on the same topic with extensive new footage of
interviews, panel discussions, and presentations from a wide variety of
practitioners. State Justice Institute board member Tommy Jewell, a judge
in the Second Judicial District, Albuquerque, New Mexico, hosts the
series. Roger Warren, President of the National Center for State Courts
and a former judge in Sacramento, California, serves as moderator.
Titles of each module are:
o Seminar 1: An Introduction to Intermediate Sanctions for Judges.
o Seminar 2: The Judicial Role in the Development and Use of
Intermediate Sanctions.
o Seminar 3: The Policy Team's Role in the Developing and Implementing
Intermediate Sanctions.
o Seminar 4: A Guide for a Policy Team Meeting on the Appropriate Use
of Intermediate Sanctions.
The first three seminars each take about 11/2 hours to view and discuss;
the fourth requires a half-day to complete the viewing and discussion
portions. Each is accompanied by materials to guide discussion.
A complete set of the seminars, including videotapes, instructions,
participant materials, and reference materials, is available from State
Justice Institute-designated libraries and the judicial educator in each
State. Copies of the series are also available directly from the Center for
Effective Public Policy, 8403 Colesville Road, Silver Spring, MD 20910;
telephone 301-589-9383; or fax 301-589-3505. The videotapes are free,
but please include $25 for shipping and handling.
High-tech police car is online and ready to roll
The Advanced Law Enforcement and Response Technology (ALERT)
system is a powerful mix of computer and communications technology
incorporated into the front seat of police squad cars. The integrated system
is expected to revolutionize the way police officers conduct business.
Originally the brainchild of the U.S. Department of Transportation,
ALERT has evolved into a cooperative intergovernmental undertaking and
cofunded by NIJ, the International Association of Chiefs of Police, and
other partners. The ALERT technology gives police officers immediate
access to information at the touch of a screen or button. The system
integrates a handheld, wireless computer with a dashboard-mounted touch
screen that controls all of a vehicle's emergency response functions,
including lights, sirens, videocameras, Global Positioning System
coordinates, radio, and radar. ALERT technology was developed by the
Texas Transportation Institute.
All necessary citation and accident forms are stored within ALERT's
handheld unit. Police officers can enter data at the scene of an incident and
access Federal, State, and local traffic and criminal records without
returning to their vehicles. Using ALERT's digital camera, officers can
capture visual information in the field and send images electronically to
local and national databases. Using the same technology, local and
national law enforcement departments can send images to officers in the
field. Depending on the complexity of an incident, an officer can reduce
data collection time 20 to 50 percent.
The ALERT system enhances officer safety by providing critical
information regarding stopped subjects and vehicles, improving data
collection and dissemination, and optimizing incident response and
management. Ultimately, the system may be customized for use in other
first-response applications, including emergency medical services,
commercial vehicle operations, and roadside services.
For more information about the ALERT vehicle, point your Web browser
to http://alert.tamu.edu, or write to Texas Transportation Institute, Texas
A&M University, College Station, TX 77843-3135.
NIJ experiences remarkable growth
Stimulated by the 1994 Crime Act, NIJ's programs and staff have grown
considerably. The portfolio of activities related to the Crime Act priority
areas (policing, violence against women, sentencing and corrections, and
drug courts) now totals roughly $60 million. The science and technology
portfolio, because of strong support from Congress, has more than tripled
in the last 2 years.
Major partnerships with other Federal agencies include a 5-year,
approximately $35 million joint research effort with the Centers for
Disease Control and Prevention on violence against women. NIJ and the
Office of National Drug Control Policy are launching a multisite research
demonstration project to test a systemwide approach to drug abuse among
offenders. NIJ is adding 12 new sites to the 23 now in the Arrestee Drug
Abuse Monitoring (ADAM) program. (See page 31 for more details about
ADAM.)
To learn more about NIJ's expanding programs and activities and the staff
involved in them, visit the NIJ home page at http://www.ojp.usdoj.gov/nij.
-------------------------------
Solicitations
Watch the NIJ Web page (http://www.ojp.usdoj.gov/nij) for funding
announcements, or call NCJRS at 800-851-4320 to place your name on a
mailing list to receive a specific solicitation.
Residential Substance Abuse Treatment. NIJ, in collaboration with the
Corrections Program Office, continues to assemble a portfolio of
evaluation projects to provide a comprehensive assessment of the
Residential Substance Abuse Treatment for State Prisoners program. A
solicitation is now available that pertains to locally conducted process and
outcome evaluations of programs that develop an inmate's cognitive,
behavioral, social, vocational, and other skills to solve substance abuse
and related problems.
Process evaluations are due May 5 and September 15, 1998. Outcome
evaluations are due April 14 and August 18, 1998, and February 16, 1999.
Development of guidelines for questioned documents. NIJ will request
proposals in two interest areas: (1) development of scientifically based and
validated guidelines for evaluating and identifying questioned documents;
and (2) assessment, evaluation, and validation of the five major questioned
document database technologies (those developed by the FBI, Secret
Service, National Institute of Standards and Technology, and Carol
Chaski). Funding is expected to be approximately $300,000. The release
date is anticipated to be May 1998, with a due date of August 1998.
Fellowships. NIJ offers several types of study fellowships for graduate
students, practitioners, and academics. They include the Graduate
Research Fellowship, Visiting Fellowship, Crime Mapping Fellowship,
and Data Resources Program Fellowship. Submissions are accepted
throughout the year. An announcement about the John B. Pickett
Fellowship at Harvard University's John F. Kennedy School of
Government is expected soon.
Violence against women. A solicitation is expected in late April for
proposals for research and evaluation on violence against women. The
solicitation will have five parts: partnerships, experimental designs,
longitudinal studies, program evaluations, and basic research.
Law enforcement family support. A new solicitation will be issued on the
NIJ Web page on March 13 (and mailed shortly after) for proposals for
demonstration services, training, research, and criminal justice system
development related to stress reduction for police officers and their
families.
-------------------------------
NIJ's investigator-initiated solicitation
NIJ is seeking proposals for investigator-initiated criminal justice research
and development. Prospective investigators are invited to submit proposals
to explore topics relevant to State and local criminal justice policy and
practice. Awards generally range from $25,000 to $300,000 for 1- to
2-year projects.
The deadlines for receipt of proposals under the two funding cycles are
June 16 and December 15, 1998.
Call NCJRS at 800-851-3420 to order Solicitation for
Investigator-Initiated Research, 1998 (SL 000240). Or access NIJ on the
World Wide Web at http://www.ojp.usdoj.gov/nij/funding.htm for online
copies and guidelines.
Of particular interest are proposals that reflect these themes:
o Rethinking justice and the processes that create just communities.
o Understanding the nexus between crime and its social context.
o Breaking the cycle of crime by testing research-based interventions.
o Creating the tools and technologies that meet the needs of practitioners.
o Expanding the horizons through interdisciplinary and international
perspectives.
-------------------------------
NIJ Awards
Recipients of ADAM awards announced
The Institute's former Drug Use Forecasting (DUF) program has been
expanded and enhanced. Renamed Arrestee Drug Abuse Monitoring
(ADAM), the program added 12 new sites in December and plans to
increase the sites to 75 by the year 2000, significantly enhancing the
program's role as a research platform for conducting studies of
drug-related crime. Once fully developed, ADAM will collect information
about drug use in cities, suburbs, rural areas, and Native American sites.
The ADAM program consists of collecting and analyzing interviews and
urinalyses of adult and juvenile arrestees and detainees in police lockups
to respond to and predict drug use in ADAM communities.
The new sites are presented in exhibit 1. They join the established sites:
Atlanta, Birmingham, Chicago, Cleveland, Dallas, Denver, Detroit, Ft.
Lauderdale, Houston, Indianapolis, Los Angeles, Manhattan, Miami, New
Orleans, Omaha, Philadelphia, Phoenix, Portland, San Antonio, San
Diego, San Jose, St. Louis, and Washington, D.C.
NIJ awards funds for law enforcement family support
The Law Enforcement Family Support program was mandated by the
1994 Crime Act to respond to the negative consequences job-related stress
can exert on law enforcement personnel and their families.
NIJ issued two rounds of solicitations seeking proposals for innovative
approaches to reducing the stress imposed by law enforcement work. The
recipients, listed in exhibit 2, will manage projects that range from
educational training programs to counseling to peer support groups to
improved management for handling critical incidents.
-------------------------------
Final Reports
The following final reports -- in manuscript form as submitted by authors -
- pertain to completed NIJ-sponsored research projects. The reports are
available from NCJRS through interlibrary loan and as photocopies. For
information about applicable fees, call NCJRS at 800-851-3420.
"Preventing Assassination: Secret Service Exceptional Case Study
Project," by R.A. Fein and B. Vossekuil, ACCN 167224, 1997, 182 pp.,
grant number 92-IJ-CX-0013. The authors collected data about all persons
known to have engaged in assassination-type behaviors directed at
prominent public officials in the United States since 1949. The data
indicate that assassinations and attacks on public officials result from
patterns of discernable thinking and behavior.
"National Survey of Municipal Police Departments on Urban Quality of
Life Initiatives," by C.A. Cosgrove and A.C. Grant, ACCN 167172, 1997,
104 pp., grant number 95-IJ-CX-0050. This study collected information on
how local agencies respond to panhandling, public incivilities, disorderly
conduct, unauthorized camping in public places, and juvenile curfews. The
analysis focused on the law enforcement response, law enforcement
tactics, and the use of ordinances to prevent public disorder problems.
"Experimental Evaluation of Drug Testing and Treatment Interventions for
Probationers in Maricopa County, Arizona," by E.P. Deschenes, S. Turner,
P.W. Greenwood, and J. Chiesa, ACCN 165181, 1996, 172 pp., grant
number 91-DD-CX-K050. Maricopa County implemented a drug testing
and alternative interventions program for adult probationers convicted of
drug possession. The findings suggest that increasing drug testing provides
a quick measure of substance use and other technical violations and that
the drug court program has been successful in providing treatment for drug
offenders but has had little impact on recidivism.
"Corporate Sector Response to Domestic Violence," by N.E. Isaac, ACCN
166617, 1997, 104 pp., grant number 94-IJ-CX-0050. The corporate sector
increasingly recognizes that domestic violence is a problem employees are
likely to bring to employee assistance programs. The study examines the
issues through interviews and an indepth case study at Polaroid
Corporation, which has been particularly proactive in responding to
domestic violence as an issue both for employees and within the
community.
-------------------------------
NIJ in the Journals
The following articles are based on studies sponsored by NIJ. Copies are
available on loan from NCJRS; in some cases, photocopies may be
obtained. For information on availability, call NCJRS at 800-851-3420; or
send an Internet e-mail to [email protected]. Please cite the accession
(ACCN) number.
"Boys' Experimentation and Persistence in Developmental Pathways
Toward Serious Delinquency," Journal of Child and Family Studies
6(3)(1997):321-357, by R. Loeber, K. Keenan, and Q. Zhang, ACCN
169595. Mental health professionals (for example, social workers, child
care workers, parole officers, and psychologists) need information to
better identify those young people who are most at risk, exhibit behavior
that will be only temporary or of little long-term consequence, or are likely
to show worsening problem behavior over time. In this article, the authors
expand their earlier exploration of how children's disruptive and
delinquent behavior develops over time. They distinguish between boys
who experiment and boys who persist in disruptive behavior, and they
outline pathways to serious delinquency. They also examine the
relationship between persistent disruptive behavior and a diagnosis of
Attention Deficit Hyperactivity Disorder and find that the diagnosis is
more common among boys who persist than in those who experiment.
"The Effect of a Videotaped Arrest on Public Perceptions of Police Use of
Force," Journal of Criminal Justice 25(5)(1997):381-395, by E.S. Jefferis,
R.J. Kaminski, S. Holmes, and D.E. Hanley, ACCN 169147. This article
examines the impact of a controversial, violent arrest captured on
videotape and widely broadcast on local television. Findings indicate that
the videotaped arrest had a negative impact on citizens' perceptions of
force used by police during arrest situations; the effect was substantially
greater among non-Caucasians. Furthermore, over a 10-year period,
non-Caucasians were consistently more likely than Caucasians to believe
police used force excessively.
"Evaluating a Domestic Violence Program in a Community Policing
Environment: Research Implementation Issues," Crime & Delinquency
43(3)(July 1997):279-297, by A. Jolin and C.A. Moose, grant number 95-
IJ-CX-0054, ACCN 167228. The authors trace the impact of community
policing values on the formation and operation of a special domestic
violence reduction unit, which emerged as a solution to the family
violence problem in Portland, Oregon. The article highlights the
differences between the police response to domestic violence in the
context of traditional policing versus community policing. Particular
attention is paid to the role of research in police policy formation when
community policing principles are implemented.
"Pulling Levers: Chronic Offenders, High-Crime Settings, and a Theory of
Prevention," Valparaiso University Law Review 31(2)(Spring 1997):449-
484, by D.M. Kennedy, grant number 94-IJ-CX-0056, ACCN 169596.
Professor Kennedy explains how Boston's criminal justice and social
services agencies joined forces to reduce serious youth violence in the city.
The power of the Boston approach was enhanced by strategic use of
communication between authorities and offenders. The intervention
strategy, which he calls "pulling levers," imposed costs on offenders
across many dimensions by permitting officials to apply a varied menu of
sanctions and incentives that greatly increased the effectiveness of the
strategy.
"Recidivism Rates Among Child Molesters and Rapists: A
Methodological Analysis," Law and Human Behavior 21(6)(1997):635-
659, by R.A. Prentky, A.F.S. Lee, R.A. Knight, and D. Cerce, ACCN
169594. This article addresses the high variability of sex offender
recidivism rates by examining several of the critical methodological
differences that underlie this variability. The authors used a data set of 251
sex offenders (136 rapists and 115 child molesters) discharged over a
25-year period to examine changes in recidivism as a function of changes
in dispositional definition of reoffense (i.e., whether an offender was
arrested, indicted, or convicted of another offense), categories of criminal
offenses considered, and the length of exposure time. The data indicate
that sex offenders remain at risk to reoffend long after their discharge,
sometimes as long as 15-20 years. Forensic, clinical, and policy
implications of this high variability are discussed.
-------------------------------
Recent NIJ Publications
The following recent and forthcoming NIJ publications are available in
both online and hardcopy formats. To order hardcopy, call NCJRS at 800-
851-3420; or send an e-mail to [email protected]. Electronic copies can
be downloaded from the NIJ Web site: http://www.ojp.usdoj.gov/nij.
Managing Prison Growth in North Carolina Through Structured
Sentencing, Program Focus, by Ronald F. Wright, U.S. Department of
Justice, National Institute of Justice, February 1998, 16 pp., NCJ 168944.
Not long ago, North Carolina's prisons were full of nonviolent,
low-priority offenders rather than violent, high-priority offenders. Today,
after a fundamental change in sentencing policy, North Carolina judges
can sentence more violent offenders to longer prison sentences while
sentencing less violent offenders to less costly alternatives. This report
describes how North Carolina's General Assembly and its Sentencing and
Policy Advisory Commission, working cooperatively, designed a
sentencing structure that increased the certainty and length of
imprisonment for the most serious felonies while creatively using
community and intermediate sanctions for lesser offenses.
National Guidelines for Death Investigation, Research Report, U.S.
Department of Justice, National Institute of Justice, December 1997, 48
pp., NCJ 167568. The National Institute of Justice teamed with the Bureau
of Justice Assistance and the Centers for Disease Control and Prevention
to develop the first set of National Guidelines for Death Investigation.
Until now there were no nationally accepted standards of practice for
conducting death-scene investigations. Then, in February 1998, the
first-ever national standards were released in the form of this 48-page
booklet. National Guidelines for Death Investigation outlines 29
guidelines for evaluating the body, establishing and recording information
to construct a profile of the decedent, and completing the scene
investigation. In addition, the report discusses 52 tools necessary to
thoroughly investigate a death scene.
National Guidelines for Death Investigation has been endorsed by the
National Association of Medical Examiners. It was produced with the
vigorous participation of the highly experienced officials and professionals
who served on the National Medicolegal Review Panel and with
grassroots input from a Technical Working Group of Death Investigators
consisting of 12 executive board members and 144 field committee
members.
Wireless Communications and Interoperability Among State and Local
Law Enforcement Agencies, Research in Brief, by Mary J. Taylor, Robert
C. Epper, and Thomas K. Tolman, U.S. Department of Justice, National
Institute of Justice, January 1998, 12 pp., NCJ 168945; and State and
Local Law Enforcement Wireless Communications and Interoperability: A
Quantitative Analysis, Research Report, by Mary J. Taylor, Robert C.
Epper, and Thomas K. Tolman, U.S. Department of Justice, National
Institute of Justice, January 1998, 130 pp., NCJ 168961. Routine police
work requires effective coordination and communication with other police
agencies, fire departments, and emergency medical services to mount a
well-coordinated response. But wireless communication across
jurisdictions -- interoperability -- can be difficult. This report presents the
results of a 1997 National Law Enforcement and Corrections Technology
Center survey of State and local law enforcement agencies regarding their
current and planned use of communications equipment and services. More
than half of the agencies with outdated equipment (older than 10 years)
had plans to replace or upgrade their radio systems.
In addition to presenting the quantitative data, the report describes the
agencies' experiences with common obstacles to interoperability. Limited
funds, frequency incompatibility, and the fragmented nature of the radio
spectrum currently allocated to public safety were reported to be the
biggest interoperability problems.
As a response to the recommendations to alleviate spectrum shortfalls and
promote interoperability, the Federal Communications Commission in
January 1998 allocated 24 megahertz (Mhz) to the fixed and mobile
services for public safety use. This spectrum allocation doubles the
spectrum available to public safety services, including police, fire
departments, and emergency medical services.
-------------------------------
Events
Perspectives on crime stimulate policy discussions
George Kelling on broken windows. "Broken Windows and Cultural
Pluralism" was the topic of George Kelling's lecture opening the
"Perspectives on Crime and Justice" lecture series on December 2, 1997.
Professor Kelling, a Visiting Professor at Rutgers University and Fellow at
Harvard's Kennedy School of Government, discussed the core concepts
from the widely known "Broken Windows" article he authored with James
Q. Wilson, which appeared in the Atlantic Monthly in 1982. He described
the application of the concepts to today's crime issues, emphasizing that
citizens and community groups are among the best sources for crafting
solutions and establishing neighborhood priorities.
Randall Kennedy on race and reasonable searches. In the second lecture in
the series, held February 3, Randall Kennedy, Professor of Law at the
Harvard Law School, spoke about "Race, the Police, and 'Reasonable
Suspicion.'" He proposed reforms to eliminate race as a factor in law
enforcement policies related to reasonable suspicion. He emphasized that,
except in extraordinary situations, police officers should not consider the
color of a person's skin in making a decision to stop a suspect. He believes
racial considerations can poison law enforcement-citizen relationships,
but, more importantly, race is -- with few exceptions -- an invalid factor in
determining likely guilt.
David Musto on drug use in America. Knowing the history of drug use in
the United States can serve as a useful perspective on the current substance
abuse problem. David Musto, M.D., Professor of Child Psychiatry and
History of Medicine, Yale School of Medicine, spoke about "The
American Experience with Stimulants and Opiates" at the third
Perspectives lecture on March 3. Dr. Musto reviewed the rise and fall of
drug epidemics and the alternating periods of tolerance for and
criminalization of drugs, and he suggested that public policy shapes the
response to drugs less than it is shaped by a constellation of social and
other factors.
The full presentations of these lectures are available on video from the
National Criminal Justice Reference Service (NCJRS). To order Dr.
Kelling's presentation, ask for NCJ 168103; to order Professor Kennedy's
presentation, ask for NCJ 168967; to order Dr. Musto's presentation, order
NCJ 169283. Each videotape is approximately 1 hour and costs $29.50 in
the United States and $33 in Canada and other countries. The collected
papers from last year's series are available at no charge in Perspectives on
Crime and Justice: 1996-1997 Lecture Series, NCJ 166609. For ordering
information, call NCJRS at 800-851-3420; or send an e-mail to
[email protected]. Electronic copies of Perspectives on Crime and
Justice: 1996-1997 Lecture Series can be downloaded from the Justice
Information Center Web site: http://www.ncjrs.org, or from the NIJ Web
site: http://www.ojp.usdoj.gov/nij.
Future Perspectives lectures are:
o Joan Petersilia, Ph.D., Professor of Criminology, Law, and Society,
University of California-Irvine, "If Not Prison, What? Assessing
Alternative Punishment," April 1, 1998.
o Philip J. Cook, Ph.D., Director of the Terry Sanford Institute of Policy
Studies, Duke University, "The Epidemic of Youth Gun Violence," May
5, 1998.
For more information or to register for the next Perspectives lecture,
contact the Institute for Law and Justice at 703-684-5300. Space at the
lectures is limited. To obtain information about previous Perspectives
lectures, point your Web browser to the Professional Conference Series
home page at http://www.nijpcs.org and click on "Past Conference
Materials."
Planning meetings explore new research issues
As research in a topic area continues to evolve and new issues surface, NIJ
refines its research and evaluation agenda to respond to the newest
findings and the implications for policy and practice. One method of doing
this involves holding invitation-only planning sessions with leading
practitioners, researchers, and policymakers. Recent meetings involved
child abuse and neglect, crime in Washington, D.C., and police overtime.
Child abuse and neglect interventions. Research continues to document the
link between child abuse and neglect and subsequent delinquency and
criminality. At a 2-day meeting in October 1997, 24 participants gathered
to develop research topics related to criminal justice policy and practice in
this area. Presentations focused on:
o Statutes and policies governing child abuse and neglect.
o Current services and practices.
o Child abuse and neglect interventions and theoretical perspectives.
o Federal agency initiatives and perspectives.
o Findings and lessons learned from research and intervention studies.
o Research design issues, especially as they relate to effective
demonstrations.
The commissioned papers and presentation materials are available on NIJ's
Web site (http://www.ojp.usdoj.gov/nij) or through interlibrary loan at
NCJRS, 800-851-3420.
Crime and justice in Washington, D.C. Passage of the D.C. Revitalization
Act signed by President Clinton in August 1997 gave the District of
Columbia's criminal justice leaders an opportunity to reassess and refine
the city's criminal justice system. To support the process, NIJ sponsored a
gathering in January at which local leaders and some of the country's
foremost criminal justice thinkers shared innovative ideas, discussed
strategies that are working elsewhere in the Nation, and began establishing
an agenda for the future.
Police overtime focus group. In January 1998, NIJ hosted a focus group
concerned about overtime issues that are problematic to policymakers,
management practices that assist in controlling overtime expenditures, and
ways that the Federal Government can assist in promoting progress in the
management and control of police overtime. Participants included law
enforcement officials, court systems personnel, city managers, and labor
union representatives. Observers included representatives of law
enforcement professional associations, specialists in police integrity, and
researchers.
"Cluster conferences" bring together grantees with related projects
NIJ's research and evaluation portfolio contains a number of projects
related by topic areas, such as violence against women and drug abuse. To
foster coordination and communication among these related projects, NIJ
brings those carrying out the projects to Washington, D.C., to share
information and resources, expand their networks, and explore ways to
leverage the impact of findings. The gatherings, called "cluster
conferences," give project investigators an opportunity to describe
problems and share solutions and early findings. Three recent cluster
conferences are described below.
Residential Substance Abuse Treatment teams. Representatives from the
20 projects evaluating the Residential Substance Abuse Treatment (RSAT)
programs for State and local correctional facilities met in November 1997
to share problems and solutions. RSAT is funded by the Office of Justice
Programs' (OJP's) Corrections Program Office (CPO); NIJ manages a
portfolio of evaluations, including a national evaluation project as well as
local projects. Participants outlined data collection instruments and
sources to foster comparability across the sites and discussed coordination
and collaboration of their efforts.
NIJ and CPO plan to expand the RSAT program evaluation portfolio and
are organizing national and regional meetings and workshops to support
partnerships between correctional administrators and researchers.
Information on RSAT evaluation solicitations and partnership meetings
and workshops may be obtained from the Department of Justice Response
Center at 800-421-6770 (in the Washington, D.C., area at 202-307-1480)
or on NIJ's home page at http://www.ojp.usdoj.gov/nij. Click on "Search"
and enter the words "Residential Substance Abuse Treatment."
Law enforcement family support. The Violent Crime Control and Law
Enforcement Act of 1994 (Crime Act) recognized the negative
consequences that job-related stress exerts on law enforcement personnel
and their families and mandated the establishment of the Law Enforcement
Family Support (LEFS) program. NIJ has now awarded grants to 15
agencies and organizations to develop, demonstrate, and test innovative
stress-reduction and support programs and to deliver training on how to
plan, implement, and manage stress-reduction and family support
programs and services. (See page 33 for a complete listing of the LEFS
program grantees.) The grantees and NIJ staff met in January to discuss
startup efforts and brainstorm about disseminating their findings and
recommendations.
Conferences: recent and upcoming
January
Community vitality and crime reduction. NIJ, OJP, and the Executive
Office for Weed and Seed cosponsored "What Can the Federal
Government Do to Decrease Crime and Revitalize Communities?" in
January 1998 to examine the role of government, police, and community
residents in public safety programs. Panelists discussed trends in health
care, trade, economics, demographics, welfare reform, and aging and their
impact on communities. Themes centered around promising programs and
approaches; participants identified research questions and implications for
evaluation design. Featured speakers were David Kennedy and Deborah
Prothrow-Stith from Harvard University and Roger Conner from the
Center for the Community Interest.
March
Academy of Criminal Justice Sciences (ACJS). NIJ-sponsored research
and development programs were well represented at the 35th annual ACJS
conference, March 10-14, 1998, in Albuquerque, New Mexico. Among the
NIJ presentations were:
o Oleoresin Capsicum: An Analysis of Pepper Spray Failures, presented
by Stephen M. Edwards and Robert J. Kaminski, which focused on
incidents in which pepper spray had no incapacitating effect on suspects to
discover factors associated with its failure.
o A Multimethod Exploration of Crime Hot Spots, presented by Eric
Jefferis, Nancy La Vigne, Cyndy Nahabedian, and Joe Szakas, which
compared accuracy, consistency, face validity, utility for statistical
analyses, and user friendliness of crime mapping hot spot identification
software packages.
o Long-Term NIJ Evaluations of Community Policing, presented by Lois
Mock, Wes Skogan, Tom McEwen, Mary Ann Wycoff, Dennis
Rosenbaum, and Charles Mindel, which discussed results from
longitudinal evaluations of community policing programs in several
jurisdictions.
o Prevention and Control of Firearms Violence, presented by Lois Mock,
Scott Decker, Rick Rosenfeld, Jeffrey Roth, David Kennedy, and Ed
McGarrel, which presented results of ongoing research about the
effectiveness of techniques to prevent and control firearms violence,
including directed patrols, targeted handgun interventions, and others.
o Homicide in Eight U.S. Cities, presented by Pamela Lattimore, which
summarized the findings from NIJ's recently completed research project
that examined varying homicide trends in Atlanta, Detroit, Indianapolis,
Miami, New Orleans, Richmond, Tampa, and Washington, D.C.
o Making Partnerships Work, presented by Voncile Gowdy, which
discussed ways to improve partnerships between researchers and
practitioners in corrections.
o Responding to Crime in Indian Country, presented by Winnie Reed,
Norena Henry, Carol Lujan, Eileen Luna, and Stewart Wakeling, which
presented the results of three NIJ projects: Policing on American Indian
Reservations, Impact Evaluation of STOP Grant Programs for Reducing
Violence Against Women Among Indian Tribes, and Indian Country
Justice Initiative Evaluation.
April
Alcohol and crime connection. Recognizing the need to explore more fully
the link between alcohol abuse and crime, OJP will sponsor a symposium
entitled "Alcohol and Crime: Impacting the Criminal Justice System" from
April 5 to April 7, 1998, in Tysons Corner, Virginia.
OJP is inviting researchers, biochemical and medical experts, treatment
providers, substance abuse and prevention specialists, criminal justice
practitioners, and domestic violence specialists. The goals are to raise
consciousness about the connection between alcohol and crime, solicit
ideas for research and demonstration projects from experts in the field,
identify responses appropriate to OJP's mission and funding, and
encourage other relevant Federal agencies to support programs.
Sessions will focus on four key themes: contribution of alcohol abuse to
family violence, alcohol abuse interventions for offender populations,
underage alcohol use, and place-based intervention initiatives.
Land transportation security technology. Practitioners responsible for
designing land transportation security systems will be attending the first
International Land Transportation Security Technology Conference,
sponsored by NIJ and the U.S. Departments of Transportation and State,
from April 7 to April 9, 1998.
The conference evolved from a 1996 international meeting attended by
Attorney General Janet Reno that highlighted that 20 percent of all
terrorist attacks are directed at land transportation targets. It will showcase
new technologies and best practices and will feature presentations by
experts as well as technology exhibits applicable to land transportation
security.
For more information, contact Marina Leight with Government
Technology at 916-363-5000, ext. 374, or e-mail [email protected].
Police-corrections cooperative efforts. NIJ, the Office of Community
Oriented Policing Services, and CPO will sponsor a symposium on
police-corrections partnerships from April 23 to April 25, 1998, in
Knoxville, Tennessee. More than 150 police chiefs, sheriffs, wardens,
probation officers, community corrections officials, and researchers will
examine the origins, goals, operations, and achievements of existing
partnerships. Participants will discuss administrative aspects of
partnerships (such as sharing databases and resources and conducting joint
planning and training sessions) as well as substantive issues (such as the
relationship of prison gang leadership to street gang activities, fugitive
apprehension, and weapons reduction).
June
Managed care and criminal justice conference. OJP and the Center for
Substance Abuse Treatment are Federal sponsors of the first annual
conference on managed care and its impact on offenders who receive
substance abuse treatment and aftercare services. The conference will be
held June 28 to June 30, 1998, in Albuquerque, New Mexico, and hosted
by the Institute for Behavioral Healthcare in joint sponsorship with the
criminal justice partnership/CentraLink and national Treatment
Accountability for Safer Communities (TASC). The program will bring
together professionals from criminal justice, health and human services,
and managed health care to discuss the emerging impact of managed care
on offender populations, provide information on promising models and
options for service delivery, and continue discussion among professionals
from various disciplines. For more information, contact CentraLink, 415-
435-7286, fax 415-435-9092.
Workshops offer hands-on experience
Drug-involved youths. NIJ hosted a workshop on developing interventions
for drug-involved juveniles for researchers, treatment providers, juvenile
court judges, and juvenile counselors. Topics included coordination
difficulties among Federal, State, and local agencies; conflicts inherent in
meeting the interests of juveniles, their families, and the community; and
the importance of monitoring program progress and making midcourse
corrections. Recommendations from the workshop, held December 11,
1997, included:
o Intensive case management to make certain that services provided
matched services ordered.
o Coordination of resources through a leadership agency.
o Continuous evaluation and monitoring to maintain program integrity.
o Culturally and developmentally appropriate rewards and punishments
for participating youths.
Forecasting prison populations. NIJ, CPO, and the Bureau of Justice
Statistics hosted a national workshop entitled "Prison Population
Forecasting and Projection: Managing Capacity" in December 1997. The
143 participants shared technical details about their approaches to
forecasting and projecting their State's prison population and capacity.
They discussed changing crime conditions, legislative trends and
uncertainties, and fiscal constraints.
Many States needed basic assistance and information about forecasting
techniques and software; a 3-hour session before the workshop offered an
introduction to and overview of various statistical techniques. The
remainder of the 2-day workshop featured presentations from experts in
State offices and other organizations who are currently forecasting or
projecting prison populations.
The presentations answered questions and led to discussion about the
strengths and limitations of various methodologies and the details of
implementing those methodologies.
The proceedings from "Prison Population Forecasting and Projection:
Managing Capacity" are expected later this year.
-------------------------------
Sentencing and Corrections Problem Solving for State Policymakers
This unique multiyear initiative will bring together for the first time
State-level policymakers from all three branches of government and from
all 50 States to engage in open and candid conversation over important
sentencing and corrections issues.
Invited participants from each State include the governor, chief budget
officer, heads of adult and juvenile corrections, the chief justice, and the
heads of both houses of the legislature.
The event will take place June 8 and 9, 1998, in St. Petersburg, Florida.
Participants will discuss common critical problems, including:
o How to deal with competing financial demands of prison building and
other State needs.
o How to effectively handle serious juvenile offenders, especially when
sentenced as adults.
o How to meet truth-in-sentencing concerns and at the same time deal with
prison management issues.
o How to make and keep prisons free of drugs and other contraband.
For more information, contact John Thomas at NIJ (e-mail
[email protected], or phone 202-514-6206).
-------------------------------
U.S. Department of Justice
Office of Justice Programs
810 Seventh Street N.W.
Washington, DC 20531
Janet Reno
Attorney General
U.S. Department of Justice
Raymond C. Fisher
Associate Attorney General
Laurie Robinson
Assistant Attorney General
Noel Brennan
Deputy Assistant Attorney General
Jeremy Travis
Director, National Institute of Justice
-------------------------------
Office of Justice Programs
World Wide Web Site:
http://www.ojp.usdoj.gov
National Institute of Justice
World Wide Web Site:
http://www.ojp.usdoj.gov/nij
|
en
|
all-txt-docs
|
362797
|
ZCZC MIATCDEP3 ALL
TTAA00 KNHC DDHHMM
TROPICAL STORM GEORGETTE DISCUSSION NUMBER 5
NATIONAL WEATHER SERVICE MIAMI FL
2 AM PDT WED AUG 12 1998
THE TRACK HAS EDGED A LITTLE MORE TO THE RIGHT...315/7 KT...
PRESUMABLY IN RESPONSE TO THE INTERACTION BETWEEN GEORGETTE AND THE
UPPER-LEVEL LOW NOW CENTERED ABOUT 500 NM TO THE NORTH. GEORGETTE
HAS A SMALL...BUT GROWING...SPOT OF DEEP CONVECTION AT THE ESTIMATED
CENTER OF CIRCULATION AND A STRONG BAND OF CONVECTION THAT WRAPS
INTO THE CENTER FROM THE SW-S-E-N. DVORAK INTENSITY ESTIMATES
SUPPORT INCREASING THE WIND SPEED TO 50 KT. A SHIP ABOUT 160 NM NE
OF THE CENTER REPORTED 25 KT WINDS AND 15 FT SEAS AT 0600 UTC.
THE PREVIOUS NHC FORECAST HAD THE TRACK OF GEORGETTE WRAPPING AROUND
THE EASTERN SIDE OF THE UPPER LOW...WHICH THE AVN FORECASTS WILL
CONTINUE TO MOVE WESTWARD. THE 00Z GFDL AND AVN HAVE SIMILAR
SOLUTIONS TO THAT SEQUENCE OF EVENTS...SHOWING A TURN TOWARD THE
NORTH AND THEN AN ACCELERATION BACK TOWARD THE NW. IT IS NOT
CLEAR...HOWEVER...WHETHER THEY DO SO BECAUSE OF THE UPPER LOW OR...
INSTEAD...BECAUSE OF A RESIDUAL MODEL VORTEX INITIALIZED BY THE AVN
NEAR 12N 119W. THE NHC FORECAST IS SIMILAR TO THE OFFICIAL TRACK OF
6 HOURS AGO AND ON THE RIGHT SIDE OF THE GUIDANCE...BETWEEN GFDL AND
P91E IN BOTH POSITION AND SPEED.
THE INTENSITY FORECAST REMAINS CLOSE TO SHIFOR/S.
RAPPAPORT
FORECAST POSITIONS AND MAX WINDS
INITIAL 12/0900Z 13.4N 111.6W 50 KTS
12HR VT 12/1800Z 14.3N 112.4W 60 KTS
24HR VT 13/0600Z 16.0N 113.4W 65 KTS
36HR VT 13/1800Z 18.1N 114.7W 65 KTS
48HR VT 14/0600Z 20.3N 116.6W 65 KTS
72HR VT 15/0600Z 24.0N 121.0W 45 KTS
NNNN
|
en
|
markdown
|
646469
|
# Presentation: 646469
## Hospital Measures Reporting in Ohio
Michele Shipp, MD, DrPH
- Michele Shipp, MD, DrPH
- AHRQ QUALITY INDICATORS USERS MEETING
- Wednesday September 9, 2008
- AHRQ ANNUAL CONFERENCE 2008
- Selecting Indicators for Public Reporting:
- The Ohio Experience
## Hospital Performance Measures Selection
- Ohio Department of Health
- Alvin Jackson, MD
- Madelyn Dile, JD
- Jodi Govern, JD
- Kaliyah Shaheen, MPH
**Notes:**
Dr. Jackson, the Director of the Health Department, served as the Chair of the Hospital Measures Advisory Council;
Madelyn Dile – Assistant Chief for the Division of Quality Assurance - Facilitated the meetings;
Jodi Govern JD, also at the Division of Quality Assurance, filled in in case of Madelyn’s absence and facilitated the Infection control Group meeting;
Kaliyah Shaheen, Data Manager for the Division of Quality Assurance, was appointed by Dr. Jackson as his Data Expert and served as a member on the Data Expert Group along with serving as a member of the Infection Control Group and has been the contact for Council members. Also, Ms. Shaheen has been the main data person involved in the process at ODH; she also will be managing the reporting website.
## BACKGROUND
## HOUSEBILL 197
**HB 197 became law in November 2006**
- Requires Ohio hospitals to report performance measure data to the Ohio Department of Health for the purpose of public reporting
**Notes:**
Bullet 1 and sub-bullet 1
Representative James Raussen sponsored HB 197. The concept was first introduced in 2004 and evolved over time from originally mandating the collection of patient level records from hospitals to its current enactment which requires hospital to calculate all measures and report the calculated result directly to ODH.
ODH did not have the staff resources needed to extract data from patient charts.
Because no funding was attached to the mandate ODH has struggled allocating resource to the project.
The intent of the Bill has always been to assist with consumer decision-making through public reporting, and to promote transparency among hospitals.
## HOUSEBILL 197
**Required Measure Sets**
- Centers for Medicare and Medicaid Services (CMS)
- The Joint Commission (JC)
- National Quality Forum (NQF) endorsed measures
- Agency for Healthcare Research and Quality (AHRQ)
**Notes:**
Sub-bullet 2
At least one measure from each of the above mentioned organizations must be recommended, but other measures could be recommended from additional organizations not mentioned in the statute. Some members wanted to only consider measures from the above organizations and resisted considering any other measures being recommended. Especially in the realm of infection control measures.
Other organizations considered: CDC, Vermont Oxford Network, American College of Cardiology, New York State... and others
## Creation of Advisory Council
- A Hospital Measures Advisory Council was created by statute and consisted of:
- Director of Health (Council Chair)
- Two members of the House of Representatives
- Two members of the Senate
- Superintendent of Insurance
- Executive Director of the Commission on Minority Health
- Representatives from several agencies
**Notes:**
Bullet 1
All 17 members of the council were appointed by the House and Senate with the exception of the Director of health, Superintendent of Insurance and Director of Minority Health.
Timeline:
The Bill was enacted in November 2006
The Senate appointed all of it members March 15, 2007
The House appointed all but one of its members July 31, 2007
The House appointed its last member August 16, 2007
The council had one year from August 16, 2007 to make its recommendations back to the Director of Health
All sub bullets
Appointments made by the Senate:
Two members of the Senate, and a representative from each of the following; physicians specializing in public health, hospitals, health service researchers, health care consumers and large employers
During the process all members appointed by the Senate were very involved in the process and attended the majority of the meeting
Appointments made by the House:
Two members of the House, and a representative from each of the following; health insurers, small employers, organized labor, physicians in general practice and children’s hospitals
During the process all members except the two House Representatives were very involved in the process and attended the majority of the meetings
Representatives
Health Insurers, Small and Large Employers, Organized Labor, Physicians in General Practice, Physicians Specializing in Public Health, Children’s Hospitals, Hospitals, Health Care Consumers and Health Services Researchers
## Creation of other Groups
- Mandated Groups
- A Data Expert Group
- An Infection Control Group
- Ad Hoc Groups
- The Advisory Council created Pediatric and Perinatal workgroups
**Notes:**
Bullet 1
Each member of the Hospital Measures Advisory Council was required to appoint a data expert
The majority of the data experts appointed were dedicated to the process and drove from all parts of Ohio to attend monthly meetings. The two House Representative members did not appoint Data Expert Group members.
Bullet 2
An infection Control Group -was also required to provide information about infection measures
The Directors Committee on Emerging Infections which was made up of several ODH staff and Infection control specialists from across Ohio had been interested in being involved in the process. This existing group had asked the Advisory Council to consider them as the Infection Control Group for the purposes of HB 197. The Advisory Council agreed this group could serve that function and asked that they add consumer representation.
Note: Because the Hospital Measures Advisory Council, Data Expert Group and Infection Control Group were statutorily mandated groups, the meetings were subject to the public meetings laws and had to be held in person.
Bullet 3
These group looked at measures specific to these populations – not mandated
The Advisory Council member representing Children’s Hospitals had asked the Advisory Council to consider allowing the Group of Children’s hospitals from across Ohio review and make recommendations on pediatric measures. The Council agreed this not mandated workgroup.
After the Advisory Council reviewed the initial selection of perinatal measures all of which were AHRQ measures they felt they did not have the expertise necessary to make recommendations on perinatal measures and thus asked ODH to convene a group of experts in the perinatal field to make recommendations.
Note: Because the pediatric and perinatal workgroups were not written in statute they were not subject to public meeting laws and therefore could convene via phone or private meetings.
## Process for Measures Selection
- Data Expert Group monthly meetings
- Creation of set criteria as guidelines
- Examination of measure specifications
- Selection of measures
- Recommendations to Advisory Council on selected measures
- * **Measures related to Adult care, Chronic Diseases, Patient Safety – Slide 9**
**Notes:**
Bullet 1
The Data Expert Group was truly the workhorse behind the selection of measures.
Data Expert Group met monthly to review each measure created by the organizations mentioned in the law [about 300 to 400 measures related to hospital quality] by condition category
Bullet 2
The Data Expert Group created a set of criteria that would serve as guidelines for selection of measures in each category.
The guidelines for measure selection on the next two slides were created by ODH staff and amended by the Data Expert Group. All members agreed that these were the areas most important when considering measures for public reporting.
The specifications for each measure were examined and it was determined whether or not it met the majority of the criteria
## Measure Selection Criteria
- Importance
- Do the measures reflect unequivocally important aspects of patient care?
- Preventability
- Can a poor score be prevented through proper care?
- Is excess variation in the data accounted for by factors unrelated to hospital quality?
- Genuine quality improvement
- Can a hospital’s rate be improved without improving quality?
**Notes:**
No notes – self explanatory
## Measure Selection Criteria (cont.)
- Data integrity
- Can a hospital accurately collect the data from its records?
- Does the measure adequately measure the construct it attempts to measure?
- Ability to publicly report
- Is the measure of use to consumers?
- Is the measure comprehensible to consumers?
- Do hospitals have a sufficient case load to accurately report quality?
- Burden
- Does calculating the measure place undue burden on hospitals?
**Notes:**
Bullet 5
## Measure Selection Criteria (cont.)
- Evidence-based
- Is there scientific research demonstrating the accuracy and importance of the measure?
- Variance
- Is there sufficient variability in performance among hospitals to allow for comparison?
- National Quality Forum endorsement
- Is the measure endorsed by the National Quality Forum?
**Notes:**
Bullet 3
National Quality Forum
Particular emphasis was stressed by both the Data Expert Group and the Advisory Council that NQF endorsement be used as a gold standard for whether or not a measure should be recommended.
This was important because of the process used by NQF to endorse measures:
The measure must be evidence based
The measure specifications must be publicly available
The guideline for the measure must be consistent with current clinical practice guidelines
Measure is well defined
Testing of the measure shows validity about quality
Adequate risk-adjustment exists
## Overview of Selected Measures
- All measures from 4 required sources considered
- Total of 84 measures were recommended to the Advisory Council
- 47 CMS measures
- 17 AHRQ measures
- 10 JC measures
- 10 Infection measures
**Notes:**
Sub-bullet 1– AHRQ
A set of 84 measures were recommended to the Advisory Council by the Data Expert Group, Infection Control Group and the pediatric workgroup
I will discuss AHRQ measures on the upcoming slides
Sub-bullet 2 -CMS
The Group did not have a difficult time deciding on the recommendation of CMS’ Acute Myocardial Infraction, Heart Failure and Pneumonia or Surgical Care measures. These measures are core measures that are already being collected by CMS and Joint Commission quarterly. The Council also decided to “bundle” (all-or-none measures) for the CMS data. For example: All of the Heart Failure measures collected would be bundled into a new measure that would identify if the hospital provided all applicable care to all eligible patients.
Sub-bullet 3 – JC
All ten Joint Commission Stroke measures were agreed upon and recommended for delayed reporting (2 years after the adoption of rules). This lag time will allow for hospitals to become comfortable collecting this new set of measures, which is currently in pilot stages.
Sub-bullet 4 – Infection measures
The infection control measures received the most press and contention. The Infection Control Group met only three times, but was very focused and succinct in their recommendations. They recommended the collection of Clostridium Difficile and MRSA/MSSA along with questions regarding infection control staffing and handwashing practices. Some members of the Council raised concerns regarding the collection of this data saying it was not risk adjusted and there was a lack of testing. On the other-hand C. diff had been collected in Ohio in 2006, therefore Ohio hospitals are familiar with reporting this measures and MRSA/MSSA is pulled from lab reports therefore would not be overly burdensome to hospitals. All measures recommended by the Infection Control Group passed by majority vote
## AHRQ: Patient Safety Indicators
- The Data Expert Group recommended the following AHRQ Patient Safety Indicators to the Advisory Council
- PSI-1: Complications of Anesthesia
- PSI-3: Decubitus Ulcer
- PSI-5: Foreign Body Left During Procedure
- PSI-9: Postoperative Hemorrhage or Hematoma
- PSI-16: Transfusion Reaction
- PSI-17: Birth Trauma—Injury to Neonate
- PSI-18: Obstetric Trauma– Vaginal Delivery with Instrument
- PSI-19: Obstetric Trauma—Vaginal Delivery without instrument
- PSI-20: Obstetric Trauma—Cesarean Delivery
**Notes:**
Bullet 1
The Data Expert Group believed the above AHRQ Patient Safety indicators (PSI) were the best for purposes of public reporting out of all the PSI measures.
Note – see slide 12 for discussion of the selection of AHRQ measures go from 17 considered to the 7 passed for collection:
Transfusion Reaction and Postoperative Hemorrhage or Hematoma did not pass voting by the Advisory Council.
Transfusion reaction was believed to not be the most meaningful to consumers in terms of comparison. Considering that this measures is a “never event” and the majority of the data that would be displayed publicly would wither be no cases or not enough cases.
Postoperative Hemorrhage or Hematoma was not passed because the Advisory Council believed a more meaningful measure to the consumer would be unscheduled return visits' to the operating room. Since such a measure did not already exist the council deferred this for future consideration.
## AHRQ : Inpatient Quality Indicators
- The Data Expert Group recommended the following AHRQ Inpatient Quality Indicators for inclusion
- IQI-5: CABG volume
- IQI-6: PCTA volume
- IQI-12: CABG mortality rate
- IQI-30: PCTA mortality rate
- IQI-21: Cesarean Delivery Rate
- IQI-22: Vaginal Birth after Cesarean Rate, Uncomplicated
- IQI-33: Primary Cesarean Delivery Rate
- IQI-34: Vaginal Birth after Cesarean Rate, All
**Notes:**
Bullet 1
The Data Expert Group believed the above AHRQ Inpatient Quality Indicators (IQI) were the best for purposes of public reporting out of all the IQI measures.
Sub-bullet 3 and 4
Discussions surrounding mortality measures were intense. The members representing consumers and public health agreed that mortality was data consumers wanted to see. While hospitals and physicians believed the mortality measures were not risk adjusted appropriately and issues such as do not resuscitate are neither appropriately nor consistently dealt with across hospitals, thereby making mortality rates misleading to a consumer.
Sub-bullets 8 – 10 this slide and 6- 10 on slide 10
There was quite a bit opposition surrounding the birth measures. The majority of the discussion was around the topic of ICD-9 codes and whether or not these measures were truly an indication of hospital quality. The Council decided to reject all of them and ask the Department to convene a perinatal workgroup to make recommendations on perinatal measures. These recommendations are not yet final and it is anticipated that the list of perinatal measures will be presented to the Advisory Council sometime in October 2008.
## AHRQ: Recommended Measures
- After consideration and voting by the Advisory Council, 7 of the 17 AHRQ measures were recommended to the Director of Health for public reporting
- PSI -1: Complications of Anesthesia
- PSI-3: Decubitus Ulcer
- PSI-5: Foreign Body Left During Procedure
- IQI-5: CABG volume
- IQI-6: PCTA volume
- IQI-12: CABG mortality rate
- IQI-30: PCTA mortality rate
- If passed through the rule making process hospitals will begin reporting these measures in late 2009
**Notes:**
Bullet 1
These 7 AHRQ measures were decided to be the most appropriate for public reporting.
When considering AHRQ measures for selection there were those in favor and those opposed.
Members representing the Senate, health insurance, and public health were in favor of AHRQ measures because of the ease of extracting the information from billing records and the ease of calculating the measures through the provide AHRQ software. Some of the members representing hospitals and physicians expressed concerns about:
reliability of the ICD-9 coding – are hospitals using the correct codes and is the patient record being interpreted properly
lack of current reporting – hospitals are not currently required to report on these measures
Transition to software to CMS Medicare Severity Diagnosis Related Groups (MS-DRG) Grouper.
Complications of anesthesia, decubitus ulcer and foreign body left in during procedure where chosen because they are easily understood by the consumer.
While there was opposition to mortality measures in general, PCTA and CABG mortality measures where thought to be good for public reporting because volume data and surgical site infection data for CABG would also be collected. This would give the consumer a spectrum of data to review and not just the mortality rate.
## Current Hospital Reporting in Ohio
- April 2007 Hospital reporting start date by HB 197
- ODH selected 11 measures for interim reporting
- 2 of these measures were from AHRQ
- Reporting done April and October 2007, 2008
**Notes:**
Bullet 1
While House Bill 197 required the creation of an Advisory Council, it also required that reporting begin as of April 2007
Bullet 2
ODH moved forward with a small selection of measures for hospitals to begin reporting as of April 2007
Because the Council’s report of recommendations was not due until August 16, 2008, ODH worked with Ohio Hospital Association in selecting a small set of measure to be reported in the interim.
Bullet 3
Although not intended the interim reporting has identified issues with the statutory mandates including:
The law requires all hospitals to report for all measures however, not all measures apply to all hospitals - for example; rehabilitation, psychiatric and children’s hospitals.
The law requires hospitals to report a years worth of data each April and October. This results in a six month overlap of data each time hospitals report.
## Hospital Reporting Beginning April 2007
- Postoperative Respiratory Failure
- Adult
- Pediatric
- Iatrogenic Pneumothorax
- Adult
- Pediatric
- Neonate
**Notes:**
Sub-bullet 1
Postoperative Failure was initially selected for interim reporting because high quality of care can reduce the risk of respiratory failure.
Sub-bullet 2
Iatrogenic pneumothorax was selected because it can be prevented by good surgical techniques and close observation of ventilator patients.
## Current ReportingFeedback from Hospitals
- Postoperative Respiratory Failure
- Ohio has found the numbers are too small for Iatrogenic Pneumothorax and may not be the best measure for the purpose of public reporting
- Only 2 hospitals in the adult category and 1 hospital in the neonatal category had reportable data
**Notes:**
Majority of hospitals [from 187] made no comment.
About 10 offered comments about
Bullet 1
Ohio hospitals have said they are using ICD-9 code 518.5 (Pulmonary insufficiency following trauma and surgery) for postoperative respiratory failure not ICD-9 code 518.81, Acute respiratory failure or 518.84, Acute and chronic respiratory failure
## Iatrogenic Pneumothorax - Pediatrics
- October 1, 2006 – September 30, 2007
- 187 hospitals
## Other Measures Currently Being Reported
- Aspirin at Arrival for Acute Myocardial Infarction
- Beta Blocker at Arrival for Acute Myocardial Infraction
- Pneumococcal Vaccination for Pneumonia
- Blood Culture before Initial Antibiotic for Pneumonia
- ACEI or ARB Left Ventricular Systolic Dysfunction for Heart Failure
- Evaluation of Left Ventricular Systolic function for Heart Failure
## Next Steps
- Adopt rules reflecting recommended measures
- Six to nine month process
- Public comment period
- Public hearing
- Reporting of new measures to begin no earlier than October 2009
- Development of the consumer website
- To be operational by January 2010
**Notes:**
Bullet 1
Timeframe for the adoption of rules may take longer depending on amount of opposition and nature of testimony during the public hearing process. Which may delay the reporting of the new measures.
Bullet 2
No funding was provided for the development of the website.
The Advisory Council’s recommendations borrow from New York’s website for display and comparison functionality and from the New Jersey website for informational text regarding measures and will allow for consumer feedback.
Consumer feedback will occur during the beta testing stage of the website and will be obtained through Advisory Council member constituents.
## If you have any questions please contact Kaliyah Shaheen at 614-995-4982 or [email protected]
September 2008
- September 2008
- Thank You
**Questions??**
|
en
|
all-txt-docs
|
246121
|
Table 17. Continued
Reg;ion
Survey
akl Country Year
Central America'
1986
Sample area Number
Belize
National Drug
Use Survey
12,595
Costa Rica
Honduras
1984
1986
Nicaragua 1988
Panama
1984
1989
Mexico 1989
1988
1980
San Jose
Preuniversity
students
487 15-20 Calderon et al. 17 10 13
694 15-30 National University 29 4 17
High school students 468
in Managua
Nationwide 11,383
Private college 464
Secondary students 9,967
First year 88,735
university
students
Mexico City sec- 3,408
ondary students
Latin Caribbean++
Cuba 1988 Nationwide 1,067
Selected Caribbean countries
Bahamas 1987 Areawide 4,838
Out-of-school 74
youths
In-school youths 4,767
Cayman 1985 Areawide 2,077
Islands
French
Guiana
1986 Areawide
Jamaica 1987 Secondary students
Suriname
1988 Seven cities and
rural areas
Aruba and 1988 Aruba
Netherlands
Antilles
Trinidad and 1985 All secondary
Tobago students
U.S. Virgin 1988 Household
Islands Behavioral Risk
Factor Survey
`Given for current daily smokers.
`Smoked during the previous year.
*Ever smoked.
"Smoked during the previous month.
2,192
Age Sponsor
lo-20 Pride Belize
15-18 University of Nicaragua
1 l-l 8 National Cancer Association
15-19 Department of Health
National University
Mexican Insitute of
Psychiatry
473
13-17 Consumer Institute 8 3 6
United Nations Fund
for Drug Abuse
20$
103 32$
10-l 7 Drug Advisory
Committee
11-13
1 l-21 National Council on
Drug Abuse
13-21 24 12
Prevalence* (%)
Men Women Total
12$
40 52 46
10 4 7**
3 3 6
6
42$
9+
15$
23$
2%
40 19 29$
7 3 5"
36 12
23
12 17+
1 l-19 Trinidad and Tobago
Government Drug
Survey
12-17 U.S. Virgin Islands
Government
_Excludes El Salvador and Guatemala.
**Smoked during the previous week.
`+Excludes Dominican Republic, Haiti, and Puerto Rico.
"SOccasional smoker.
Table 18. Prevalence of smoking among women of childbearing age, selected Latin American
and Caribbean countries, 1979-1987 -
Survev
1
Number Sponsor Prevalence (%)
Country
Argentina
Brazil
Chile
Colombia
Costa Rica
Ecuador
Guatemala
Mexico
Panama
Paraguay
Puerto Rico
Suriname
Uruguay
Venezuela
Year Sample area
1987 Nationwide
1981 Southern Brazil CDCS
1982 Piaui State CDC
1982 Amazonas State CDC
1987 Nationwide CLAP
1983 Santiago
1987 Nationwide
1986 Nationwide
1987 Nationwide
1983 Nationwide
1987 Nationwide
1979 U.S. border
1987 Nationwide 986
1987 Nationwide 1,935
1982 Entire territory
1985 Urban areas
1987 Nationwide
1987 Nationwide 980 CLAP
4,605 CLAP*
1,480 CLAP
2,009
4,187
CLAP
EP
CDC
CLAP
CLAP
5,169
CLAP
Source: Pan American Health Organization (1992).
`Centro Latinoamericano de Perinatologia y Desarrollo Human0 de la Organizacibn Panamericana de Salud.
%ix months before pregnancy.
*enters for Disease Control.
BBefore pregnancy/during pregnancy.
Table 19. Public knowledge and attitudes on smoking and health in Latin America
and the Caribbean, 1982-1990
38+
25
27
22
36
58/26_
21
12
8
7
3
19
4
7
16
26
44+
34
Country
Bolivia
Year Sample
1983 344 daily smokers
1983 120 adolescents
1987 72 physicians
Question Response (%I
Is smoking dangerous? (yes) 83
Is smoking harmful to health? (somewhat 96
or very)
Is smoking harmful to health? (somewhat 94
or very)
Brazil
1988 P&-to Alegre
1988 PBrto Alegre
Is the life expectancy of smokers
decreased by smoking? (yes)
Is environmental tobacco smoke harmful
to children? (yes)
48
100
78 Prevalence and Mortality
Table 19. Continued
Country
Costa Rica
Year
1984
Sample
Urban students
Cuba 1988 Nationwide
Guatemala 1989 Treasury employees
Honduras
1986
1987
Preuniversity students
aged 15-30
Ministry of Health
employees in
Tegucigalpa
Mexico
Panama 1989 Students
Paraguay
Peru
1990 Physicians
1982 Adolescents
1989 Adult smokers
Puerto Rico 1989 San Juan
Uruguay 1984 Montevideo
Venezuela
1984 Nationwide
1984 Caracas
1988 Nationwide
1988 Nationwide
1984 Nationwide
1986 Caracas
1986 Caracas
1986 Caracas
1989 Caracas
Question Response (X)
Are health risks associated with smoking?
(adequate knowledge of such risks)
Do you approve of a ban on indoor
smoking? (yes)
Are health risks associated with smoking?
(low level of knowledge)
Does smoking cause lung cancer and
other diseases? (yes)
Do you favor a worksite smoking
regulation? (yes)
Are you bothered by smoking at your
worksite? (yes)
Is smoking harmful to health? (yes)
Is smoking less harmful than use of other
drugs? (yes)
Are you bothered when other people
smoke? (yes)
Is smoking undesirable? (yes)
Is smoking harmful? (yes)
What is the most important reason to stop
smoking? (health)
Do you believe that smoking is harmful
to the health of smokers? (yes)
Does smoking affect health negatively?
(yes)
Is smoking harmful to health? (yes)
Should smoking be restricted in public
places? (yes)
Should all forms of tobacco advertising be
banned? (yes)
Is smoking harmful to others? (yes)
Are some cigarettes less harmful than
others? (yes)
Should smoking be restricted in public
places? (yes)
Should radio and television advertising of
tobacco be banned-including indirect
advertising? (yes)
81
98
64/56*
50
70
77
90
55
60
30
95
66
89
81
94
83
72
75/81'
53
89
60
so urce: Pan American Health Organization (1992).
`Smokers/nonsmokers.
Table 20. Modified stem-and-leaf display of prevalence of smoking (%) among adults,
selected countries of Latin America and the Caribbean, 1980s and 1990~~
-
Men
o-9
10-19
20-29
30-39
40-49
50-59
60-69
Women
o-9 2 3 4 4 5 6 6 8 8 9
10-19 11 11 11 11 12 13 13 13 14 14 14 14 15 16 17 17 18 18 18 18
20-29 20 20 22 23 23 23 23 24 24 25 26 26 27 27 27 28 29
30-39 30 31 31 32 32 33 33 34 36 36 38
40-49 40 40 45 49
6
10 10 15 18 19
20 23 25 25 25 26 27 27 28 28
32 32 32 33 34 34 35 35 35 35 35 36 36 36 37 37 38 38 38 39 39
40 41 41 42 42 43 43 44 45 45 45 46 48 48 48 48 49 49
51 52 52 53 56
66 68
Median = 37
Median = 20
*Prevalence data from Table 16 are grouped by decile (stem) and listed in ascending order (leaf). The data are from different
sources and derive from various methodologies. This display provides a visual overview of the range of measured values.
Table 21. Prevalence of smoking (%) among
Hispanic persons in the United States,
aged 20-74, by ethnic group and sex,
selected years
Ethnic group and sex 1982-1984* 1987+
Mexican origin
(southwest United States)
Men 43.6 31.8
Women 24.5 17.4
Cuban origin (Miami area)
Men 41.8 23.3
Women 23.1 20.4
Puerto Rican origin
(New York City area)
Men 41.3 38.6
Women 32.6 24.1
*Hispanic Health and Nutrition Examination Survey, 1982-
1984 (Escobedo, Remington, Anda 119891).
`Schoenborn (1989).
80 Prevalence and Mortality
Smoking-Attributable Mortality in Latin America and the Caribbean
Introduction
Births and deaths are the most widely collected
and reported health events, and mortality is a stan-
dard measure of the health status of a population.
Mortality has traditionally been used as an indicator
of socioeconomic status and standard of living, espe-
cially in countries for which measures of economic
productivity are inappropriate.
Mortality is a useful measure when setting
health priorities, communicating health-related infor-
mation, and marshalling political support for a health
initiative. It is a measure easily understood by the
public, and it can affect the public's perception of risk.
For example, the following statement about the
United States has a po\sJerful simplicity: "cigarette
smoking, alone, causes more premature deaths than
do all the following together: acquired immunodefi-
ciency syndrome, cocaine, heroin, alcohol, fire, auto-
mobile accidents, homicide, and suicide" (Warner
1987, p. 2081). Yet the data that allow such a statement
are difficult to assemble, and the methodologies used
to determine the number of deaths attributable to
smoking are complex (USDHHS 19891.
Although useful, mortality data do not indicate
the full effect of a disease or set of diseases on a
community. They do not describe the pain, morbidity,
disability, economic costs, and decreased quality of
life of persons who live with an illness, nor do they
describe the secondary effects on family members who
lose a close relative.
However, other measures of the effect of a dis-
ease have limitations as well. For example, life expec-
tancy, which can express the health status of a
population, may be misleading. For developing coun-
tries, life expectancy is strongly inff uenced by infant
and childhood mortality and much less so by disease
prevention or therapeutic advances that affect adult
health. People who have died from a smoking-related
disease would have lived approximately 15 years
longer if they had not been smokers (Warner 1987).
This powerful effect is diluted if the improvement in
smokers' life expectancy is averaged over the whole
population.
In the following discussion, an attempt is made
to specify the number of deaths in Latin America and
the Caribbean attributable to smoking, while keeping
in mind the limitations of common disease measures.
The result is an approximation, an early step in an
iterative process for determining the health impact of
tobacco use in the Americas. The methodology, which
applies the concept of attributable mortality, is com-
plicated by the need to estimate and adjust data to
compensate for missing or insufficient data. A step-
by-step description of the methodology is provided in
Table 22. The effects of the empirical decisions made
are discussed at the end of the chapter (see "A Com-
ment on the Methodology").
Mortality Data
The data in this section are from the PAHO
Technical Information System, a data base that in-
cludes mortality information. PAHO collects mortal-
ity data (by age, sex, and cause of death) from source
jurisdictions by using questionnaires, national publi-
cations, and other methods. Most of the data are from
civil registries, which rely on death certificates com-
pleted by health personnel in the field. These mortal-
ity data have several problems: the coverage of the
population is incomplete, the quality of some data is
questionable, and the cause-of-death groupings of the
World Health Organization (WHO)/PAHO data col-
lection questionnaire limit comparability with other
data.
Coverage
PAHO has estimated that the underregistration
of mortality is more than 20 percent in Brazil, Colom-
bia, Dominican Republic, Ecuador, EI Salvador, Hon-
duras, Panama, and Peru (PAHO 1990b). The diverse
reporting standards from various countries necessi-
tated several country-specific decisions. In Brazil, for
example, the most populous country in Latin America
and the Caribbean, the estimated underregistration is
approximately 25 percent. The level of underreport-
ing differs between areas, although it tends to be
worse in the poorer, northern part of the country. The
number of reported deaths was used for the whole
country, although it is an underestimate. In Paraguay,
mortality information is published for only a portion
of the country, and the information may not be repre-
sentative of the remainder of the country. However,
the areas not covered by the mortality registry are
geographically defined and include about 40 percent
of the population. Thus, reasonably reliable disease
rates can be determined for a portion of Paraguay but
not for the country as a whole. For this country, data
from the well-defined reporting areas only were used;
for other countries, similar decision rules were used.
Prez~alrircc mrd Mortality 81
Estimate overall mortality
For each country, evaluate vital registration and use the
portion of the data that provides an accurate
population-based mortality estimate.
For the 10 jurisdictions without mortality data, use
United Nations population schedules and apply
mortality rates from countries with similar socio-
demographic configurations.
Do not correct for underreporting.
Exclude and do not correct for ill-defined causes.
(Resultant population and mortality estimates are
reported in Table 25.)
Estimate cause-specific mortality
Identify the major smoking-associated disease groups
(coronary heart disease; cerebrovascular disease;
lung cancer; oral, laryngeal, and esophageal cancer;
bladder cancer; and chronic obstructive pulmonary
disease [COPDI).
Use cause-specific mortality data for countries for
which such data are available.
For the 10 jurisdictions without such data, use data
from four countries representative of the de-
mographic and socioeconomic spectrum of the
Americas (Guatemala, Colombia, Argentina, and
the United States).
(Resultant cause-specific mortality estimates are in
Table 26.)
Estimate relative risk and attributable risk
Use U.S. estimates for relative risk since country-
specific relative risk is generally not available.
Determine the smoking-attributable fraction (SAF) for the
United States by using the attributable-risk calculation.
Data Quality
One measure of the quality of mortality information
is the proportion of deaths assigned to the rubric "symp-
toms, signs, and illdefined conditions" (Manual oflnter-
national Statistical Classification of Diseases, Injuries, and
Causes of Death, Ninth Revision [ZCD-91). Currently,
the percentage of mortality ascribed to ill-defined
Table 22. Method used for calculating smoking-attributable mortality in the Americas
Adjust estimates by using an index related to lung
cancer
Use an index of the maturity of the epidemic that
relates the lung cancer rate for each country to that
of the United States.
For each country, determine an adjusted SAF for each
disease by multiplying the index by the U.S. SAF for
each disease (Table 32).
For each country, multiply the adjusted SAF for each
disease by the number of deaths from the disease to
obtain smoking-attributable mortality (SAM)
(approximately 375,000).
Adjust the estimate further
Calculate SAM for the United States alone by using
this method and compare the result with the official
value reported for 1985 (U.S. Department of Health
and Human Services 1989).
For each cause, calculate the difference between the
result from this method and from the official
method.
Apply these upward adjustments to the cause-specific
SAMs: increase COPD by 230R, increase cancers by
10.4% (using the difference in lung cancer esti-
mates), and increase other diseases and causes by
16.4% (see footnotes to Table 33).
Calculate the adjusted estimate of SAM in the
Americas (526,000).
causes is greater than 10 percent for 16 of the 39
jurisdictions submitting mortality information
(PAHO 1990a). In this analysis, ill-defined causes were
excluded from calculations of proportions or rates.
Because a decedent may not have received
health care or the certifying physician may not have
been the physician who treated the decedent, diagnostic
82 Prevalence and MortaZity
imprecision may occur. More serious distortion may
result because the certifying physician did not have
the diagnostic tools necessary for accurately determin-
ing the cause of death.* Furthermore, managers of
health services may not be willing or able to ensure
accurate recording or conduct the diagnostic tests that
would yield an accurate diagnosis, especially for the
elderly. As a result, assessments of mortality levels
and trends are often made by considering disease-
specific rates for middle-aged rather than elderly pop-
ulations (Doll and Peto 1981).
Coding
Since 1979, PAHO's participating member states
have classified cause of death by using the ICD-9
coding scheme. To store these data, PAHO developed
a grouping of causes of death based on, but not iden-
tical to, the Basic Tabulation List of the ICD-9. The
PAHO grouping is also similar, but not identical, to
the groupings used by WHO and CDC. The difference
in grouping, which has a variable effect on disease
classification, does not affect deaths categorized as
due to the following conditions:
Com~ition ICD-9 code
Coronary heart disease 410414
Cerebrovascular disease 430-438
Lung cancer 162
Cancers of the lip, oral cavity, or pharynx 140-149
Cancer of the esophagus 150
Cancer of the larynx 161
Cancer of the bladder 188
However, PAHO grouped cancers of the pan-
creas (ICD-9 157) and kidney (ICD-9 189) with other
cancers. Chronic obstructive pulmonary disease
(COPD), when coded as ICD-9 490-492 and 496, can-
not be isolated in the PAHO grouping. The relevant
PAHO categories are "bronchitis (chronic and unspec-
ified), emphysema, and asthma" fICD-9 490-493).
Thus, unlike the grouping for COPD used in the cal-
culation of smoking-attributable mortality (SAM) in
the United States (CDC 19911, the PAHO grouping
includes ICD-9 493 (asthma) and excludes ICD-9 496.
Life Expectancy and Mortality
Trends in Life Expectancy and Overall Mortality
For all countries and subregions of the Americas,
the overall trend is an increase in life expectancy at
birth (Table 23). Over the last 35 years in Latin Amer-
ica and the Caribbean, the average life expectancy at
Table 23. Life expectancy* at birth for persons
born during selected periods, by region
and count6
Region
and country
Year of birth
1950-55 1970-75 1985-90
51.8 61.2 66.6
40.4 46.7 53.1
37.6 48.5 54.7
43.9 55.5 61.4
42.1 54.0 62.0
45.3 58.8 62.2
42.3 54.7 63.3
42.3 54.0 64.0
51.0 59.8 64.9
48.4 58.9 65.4
2000
Latin America
Bolivia
Haiti
Peru
Guatemala
El Salvador
Nicaragua
Honduras
Brazil
Ecuador
Dominican
Republic
Paraguay
Colombia
Mexico
Venezuela
Argentina
Chile
Uruguay
Costa Rica
Cuba
69.7
60.5
59.4
67.9
68.1
68.8
69.3
68.2
68.0
68.2
46.0 59.9 65.9 69.7
62.6 65.6 66.9 67.9
50.6 61.6 68.2 70.7
50.8 62.6 68.9 72.1
55.2 66.2 69.7 71.3
62.7 67.3 70.6 72.3
53.8 63.6 71.5 72.7
66.3 68.8 72.0 73.0
57.3 68.1 74.7 75.8
59.5 71.0 75.2 76.3
Caribbean 56.4 67.1 72.4 74.7
North America 69.1 72.2 76.1 78.1
United States 69.0 71.3 75.4 77.6
Canada 69.1 73.1 76.7 78.5
Source: Centro Latinoamericano de Demografia (1990); Pan
American Health Organization (1990a).
*Estimates through 1985 are based on actual data. After
1985, estimates are projections based on trends and on
comparisons with data from similar countries.
birth has increased by about 15 years-from 51.8 to
66.6 years. In North America, the increase was seven
years-from 69.1 to 76.1 years, reflecting a slower
increase as life expectancy at birth reaches age 75 to 80.
Among Latin American and Caribbean coun-
tries, the current differences in life expectancy at birth
are great-ranging from 53.1 and 54.7 years in Bolivia
and Haiti, respectively, to 75.2 years in Cuba. Over the
last 35 years, the range has diminished somewhat.
2 Historically, the lack of appropriate diagnostic tools had
a major impact on the number of deaths assigned to lung
cancer. When diagnostic radiology was introduced in
England in the 192Os, the rate of certified lung cancer
deaths increased threefold (Pet0 7986).
Prmahce mzd Mortality 83
During 1950 to 1955, the range was 28.7 years; today
it is 22.1 years, and by the year 2000, it is expected to
decrease to 16.9 years. Few Latin American and Ca-
ribbean countries are at the low end of the range. Cur-
rently, only about 3 percent of the population of Latin
America and the Caribbean lives in countries with a
life expectancy at birth lower than 55 years, while 86
percent lives incountries with a life expectancy at birth
of 65 years or more. All countries except Bolivia and
Haiti are expected to achieve a life expectancy at birth
of 65 years or more by the year 2000 (PAHO 1990a).
Differences in the rate of increase are also evident
among countries. For example, although life expec-
tancy at birth in Chile and Uruguay is now similar, it
increased three times more in Chile than in Uruguay
over the last 35 years. In general, the increase in life
expectancy at birth was slower in the 1970s and 1980s
than in the 1950s.
The current life expectancy at birth in Latin
America and the Caribbean is equivalent to that in the
United States around 1945 to 1950-before many
major advances in chronic disease prevention and
treatment occurred (PAHO 1990a). Based on the cur-
rent rate of improvement, the life expectancy at birth
in Latin America and the Caribbean should reach that
currently found in the United States by about the first
quarter of the next century (Centro Latinoamericano
de Demografia 1990).
The range of population and mortality parame-
ters is illustrated by data for four countries (Guate-
mala, Colombia, Argentina, and the United States)
that represent the broad spectrum of variation within
the Americas (Table 24). This variation highlights the
diverse potential effects of smoking on a population.
For example, for all deaths in women (excluding
deaths from ill-defined causes), the fraction of deaths
in women aged 35 or older ranges from 34 percent in
Guatemala to 95 percent in the United States. Since
most SAM occurs among persons 35 years old or older,
it is this group whose health is most affected by a
tobacco habit.
Estimates of Mortality
The PAHO Technical Information System con-
tains national mortality data suitable for this analysis
for all but 10 jurisdictions in the Americas: Antigua
and Barbuda, Bermuda, Bolivia, Guadaloupe, Gre-
nada, Haiti, Montserrat, Netherlands Antilles, Nicara-
gua, and Saint Pierre and Miquelon.
To determine the number of deaths in the Amer-
icas attributable to smoking, the number of deaths for
these 10 jurisdictions had to be estimated. The United
Nations (1989) population estimates for these jurisdic-
tions were used for this calculation. Crude population
mortality rates and other major mortality parameters
were applied by using data for countries in the PAHO
Technical Information System believed to be similar
with respect to life expectancy, geographic region,
per capita gross national product, tobacco consump-
tion rates, and other factors. These estimates were
used along with others obtained by standard means
(Table 25).
These nonstandard estimates are sensitive to the
choice of country used to model the mortality struc-
ture. In general, these are underestimates of actual
mortality because of underreporting and because
Table 24. Mortality from defined causes,* selected countries, c. 1985
Persons aged 235 years
Country
Sex
Population+
Total
Mortality+
Mortality+
Percentage of
total mortality
Guatemala M 3,914
F 3,826
Colombia M 14,103
F 14,007
Argentina M 15,049
F 15,283
United States M 116,160
F 122,571
Source: Pan American Health Organization (1990b).
*Excludes ill-defined causes; see text.
+Number, in thousands.
32 11 34
27 9 34
74 45 61
55 39 70
129 110 85
103 89 86
1,080 987 91
975 930 95
84 Prevalence and Mortality
Table 25. Mortality from defined causes,* regions of the Americas, c. 1985
Region
Latin America
Sex
M
F
Andean Area
Southern ConeS
Brazil M
Central Americas
Mexico
M 39,744 224
F 39,631 171
Latin Caribbean
M 12,934 101
F 12,801 87
32 41
26 42
134 60
112 66
63 62
52 60
Caribbean
M 3,510 21 17 78
F 3,571 18 15 82
North America"
M 128,768 1,179
F 135,410 1,055
1,078 92
1,006 95
1,831 77
1,614 82
3,444 80
All regions of the Americas M 329,301 2,368
F 335,868 1,965
Total 665,169 4,333
Population+
Total
Mortality+
197,023 1,168
196,887 892
40,177 207
39,705 166
24,377 190
24,785 153
Mortality+
736
592
109
95
159
131
Percentage of
total mortality
63
66
53
57
84
86
67,601 367 239 65
67,963 254 177 70
12,190 78
12,002 62
Source: Pan American Health Organization (1990b)
*Excludes ill-defined causes; see text.
+Number, in thousands.
SIncludes Falkland Islands.
SExcludes Belize.
IlIncludes Bermuda and St. Pierre and Miquelon.
mortality from ill-defined causes has been excluded to a high of 92 to 95 percent in North America. Most
(as discussed earlier). The resultant estimates of of the population of Latin America lives in countries
smoking-related mortality are conservative. where this fraction is between 60 and 70 percent.
Total, Cause-Specific, and Age-Specific Mortality
The composite of reported and estimated mor-
tality indicates that approximately 4,300,OOO deaths
occur in the Americas each year; about half of these
deaths (2,060,OOO) occur in Latin America (Table 25).
In the Americas overall, about 80 percent of deaths
occur among persons aged 35 or older; in Latin Amer-
ica, the fraction is about 64 percent. The fraction of
deaths occurring among persons aged 35 or older
varies from a low of about 41 percent in Central America
The greatest absolute increase in life expectancy
at birth is generally associated with improvements in
mortality rates for children. In Latin America, a gra-
dient of economic development is associated with
increased life expectancy. In general, the death rate
for children is lower in more highly developed coun-
tries, but the death rate for older persons is similar in
various economic settings. For example, in Argentina,
the mortality rate per 1,000 persons under five years
of age is 7.9, and for persons aged 65 or older, it is 65.8.
In Guatemala, the rate for persons under five years of
Persons aged 235 years
Prevalence and Mortality 85
age is 21.4, but for persons aged 65 or older, it is 67.5
(PAHO 1990a).
The gradient of economic development is also
reflected in the cause-of-death mortality structure.
Among men aged 45 to 64, mortality from heart dis-
ease, expressed as a percentage of total mortality, is 11
percent in Guatemala, 27 percent in Colombia, and 37
percent in the United States. But some similarities are
emerging. For both the 45 to 64 and the 65 or older age
groups, the three leading causes of death for each sex
are the same in both Colombia and the United States.
For the oldest age group, the leading cause of death-
diseases of the heart-is also the same in Guatemala
(PAHO 1990a).
This pattern-increasing similarity of causes of
death-is likely to intensify. As life expectancy im-
proves, the epidemiologic profile of a country
changes. Countries with a lower life expectancy tend
to have a younger population, and the greatest mor-
tality is in the younger age groups. In these countries,
deaths are primarily due to infections (such as acute
respiratory infections and diarrhea), malnutrition,
and conditions originating in the perinatal period. As
these diseases are controlled and life expectancy in-
creases, deaths from chronic diseases-in particular,
cardiovascular diseases and cancer-become the
dominant health problem (PAHO 1990a).
Mortality from Smoking-Related Diseases
Estimates of Cause-Specific Mortality
The major diseases associated with tobacco
smoking include coronary heart disease, cerebrovas-
cular disease, COPD, and cancers of the lung, lip, oral
cavity, pharynx, larynx, esophagus, pancreas, blad-
der, and kidney. In the United States, each of these
causes (considering cancers of the lip, oral cavity, and
pharynx as a single group) contributes at least 2,000
deaths to the total number of deaths attributable to
smoking (USDHHS 1989).
The four countries for which population data
were assessed (Table 24) and the six smoking-related
conditions (Table 26) were the focus of this analysis of
the effect of smoking on countries of the Americas.
Cancers of the lip, oral cavity, pharynx, larynx, and
esophagus were grouped because of the similar smoking-
attributable risk for these conditions (USDHHS 1989).
Cancers of the kidney and pancreas were excluded
because they cannot be specifically identified in the
PAHO Technical Information System. The four countries
Table 26. Deaths from six major causes as a percentage of all deaths from defined causes,* for persons
aged 35 or older, selected countries, c. 1985
Corm-;ry Cormr~ry Cerebro- Cerebro- Oral,+ Chronic
vascular vascular laryngeal, obstructive
Country disease disease disease disease Lung and esopha- Bladder pulmona-ry All
and sext (aged 35-64) (aged 265) (aged 3.564) (aged 265) cancer geal cancer cancer diseases categories
Guatemala
Men 2.2 3.6 1.2 2.5 0.1 0.3 0.1 1.2 11.2
Women 1.6 3.2 1.8 3.8 0.4 0.1 0.0 1.1 12.0
Colombia
Men 6.3 10.1 3.4 6.8 2.1 1.6 0.3 1.9 32.5
Women 4.7 10.2 4.7 9.5 1.3 1.0 0.2 1.8 33.4
Argentina
Men 4.8 8.1 3.6 7.0 5.6 2.5 0.9 1.2 33.7
Women 1.6 8.6 2.7 9.9 1.1 0.8 0.2 0.9 25.8
United States
Men 7.6 21.3 1.0 5.0 8.5 1.5 0.7 1.3 46.9
Women 2.8 24.1 1.0 8.9 4.2 0.6 0.3 0.9 42.8
Source: Pan American Health Organization (1990b).
*Codes from Manual uflntm~ational Stntistical Classification of Diseases, [Injuries, ad Causes of Death, Ninth Revision: coronary
heart disease, 410-414; cerebrovascular disease,430438; lung cancer, 162; cancers of lip, oral cavity, and pharynx, 140-149;
cancer of the esophagus, 150; cancer of the larynx, 161; cancer of the bladder, 188.
`Cancer of the lip, oral cavity, and pharvnx.
SThe denominator for each row is the total number of deaths from defined causes, by country and sex.
%ee text for a description of this rubric.
86 Prevalence and Mortality
chosen represented four different points on the spec-
trum of mortality rates. Guatemala was chosen, even
though its lung cancer rate is low, because it reports
nationwide mortality statistics and has one of the low-
est levels of life expectancy in Latin America.
For persons aged 35 or older, the distribution of
deaths from the six major causes was expressed as a
percentage of all deaths from defined causes (Table
26). Because SAM from coronary heart disease and
cerebrovascular disease differs significantly between
persons aged 35 to 64 and persons aged 65 or over
(USDHHS 1989), estimates for both these age groups
are presented.
For all six smoking-related illnesses and age sub-
categories taken together (Table 26, last column), the
proportion of deaths caused in persons aged 35 or
older differed among the countries. In Guatemala,
these diseases accounted for slightly over IO percent
of adult deaths. In Argentina and Colombia, they
accounted for 25 to 33 percent of deaths, while in the
United States, they contributed approximately 45 per-
cent of deaths.
To estimate the number of deaths from smoking-
related conditions for subregions of the Americas
(Table 27), both the reported mortality data (Table 25)
and synthetic mortality estimates for the 10 jurisdic-
tions without data were used. For these jurisdictions,
the mortality distribution patterns from the four se-
lected countries (Table 24) were applied, as described.
Substantially more deaths in North America
than in Latin America and the Caribbean were attrib-
uted to coronary heart disease, lung cancer, and blad-
der cancer. The number of deaths was similar in
North America and in Latin America and the Carib-
bean for cerebrovascular disease, COPD, and oral can-
cer. Using these estimates, 81 percent of lung cancer
deaths in the Americas occur in North America. When
accounting for underreporting, the proportion is prob-
ably closer to 75 percent. (Using a different approach,
other researchers have estimated that North America
accounts for 77 percent of lung cancer deaths [Parkin,
Laara, Muir 19881). Because lung cancer is a strong
indicator of all smoking-attributable diseases, a rough
approximation suggests that the number of deaths in
Latin America and the Caribbean attributable to
smoking will be about one-third to one-fourth of the
number in North America.
Estimates of Relative Risk Due to Smoking
Relative risk is defined as Y = &1)/d(O), where d(l)
and d(O) are the incidence of a particular disease for
exposed and unexposed cohorts, respectively. For
current smokers, the relative risk for a disease estimates
the increase in disease incidence associated with a
history of smoking. This risk varies widely among
population groups due to differences in smoking-
related factors, such as person-years of smoking con-
tributed by heavy smokers, age at initiation, and ciga-
rette product smoked. For example, among current
smokers in a population, the relative risk for lung
cancer would be expected to be relatively low if a
sizable proportion of the population recently began to
smoke heavily. If, however, heavy smoking has been
common since World War II, the risk would be rela-
tively high. The main reason for this effect is that the
exposure category defined by "current smokers" is
based on current rather than past smoking habit, but
lung cancer rates primarily depend on smoking pat-
terns of 20 or more years ago.
For many of the smoking-related causes of death,
few country-specific estimates of relative risk are
available for Latin American and Caribbean popula-
tions, and most have focused on cancer. For current
cigarette smokers in the United States, aged 35 or
older, the estimated relative risk for lung cancer is 22.4
for men and 11.9 for women (USDHHS 1989). In
Cuba, the relative risk is 14.1 for men and 7.3 for
women. Dark tobacco is the variety of tobacco most
commonly smoked in Cuba and many other areas of
Latin America. In Cuba, dark tobacco is associated
with a higher relative risk for lung cancer than light
tobacco is: for men, 14.3 and 11.3, respectively, and for
women, 8.6 and 4.6, respectively (Joly, Lubin, Car-
aballoso 1983). In Colombia, the relative risk for lung
cancer among current smokers was 10.3 in one case-
control study of 102 persons with lung cancer, 74
percent of whom were men (Restrepo et al. 1989).
The study in Colombia also reported relative risk
for cancer of the bladder, larynx, and oral cavity/ hy-
popharynx of 3.7, 37.9, and 11.2, respectively. In La
Plata, Argentina, where the rate of bladder cancer is
high, a relative risk of 7.2 for bladder cancer was found
for men who were current smokers (Iscovich et ~31.
1987). In a study of 232 cases of cancer in Brazil (87
percent of patients were men), the relative risk for
cancer of the tongue, gum, floor of the mouth ~1~1
other parts of the oral cavity was 9.3 for current snlok-
ers of manufactured cigarettes (Franc0 et al. 1989). 11~
a 1966 case-control study of male cigarette smokers
and nonsmokers in Puerto Rico, the relati\,e risk \VII~
1.5 for esophageal cancer, 1.1 for cancer of the scroll
cavity, and 2.7 for cancer of the pharynx (Martine'
1969). In Montevideo, Uruguay, the relati\,e risk for
laryngeal cancer was 35.4 for male smoker5 Of d&irk
tobacco and 14.7 for male smokers of light tobacco (IX
Stefani et al, 1987). For comparison, for U.S. mc'il \\`llo
Table 27. Deaths (in thousands) from six major causes, * for persons aged 35 or older, selected regions
-
of the Americas, c. 1985
_.~. ~~__~
Coronary Coronary Cerebro- Cerebro-
heart heart vascular vascular
Re ion
Fi disease disease disease disease Lung
an sex (aged 35-W (aged 265) (aged 3S64) (aged 265) cancer
Oral,+
laryngeal,
and esopha-
geal cancer
Bladder
cancer
Chronic
obstructive
p;;ye;;;q
"
Latin America
Men 38.1
Women 16.7
Andean Area
Men 5.5
Women 3.1
Southern Cones
Men 7.3
Women 2.2
Brazil
Men 16.6
Women 7.2
Central America"
Men 1.0
Women 0.5
Mexico
Men 4.2
Women 1.9
Latin Caribbean
Men 3.5
Women 1.8
Caribbean
Men 0.8
Women 0.4
North America'
Men 82.2
Women 27.8
All regions of
the Americas
Men 121.0
Women 44.9
Total 165.9
59.7 28.5 49.8 22.4 14.1 3.0 15.6
53.2 22.6 55.5 6.8 4.0 1.0 11.3
8.7 3.2 6.1 2.1 1.3 0.3 2.0
7.6 3.3 7.2 1.0 0.6 0.1 1.8
13.8 5.5 11.9 8.2 3.9 1.2 2.9
12.6 3.7 14.4 1.4 1.1 0.3 1.7
19.3 15.7 21.0 6.1 6.2 0.9 4.8
17.5 11.5 21.7 1.9 1.4 0.3 2.7
2.0 0.5 1.3 0.3 0.2 0.05 0.6
1.6 0.6 1.5 0.2 0.01 0.02 0.5
7.1 2.3 5.6 2.8 1.1 0.3 4.5
6.3 2.2 6.8 1.3 0.4 0.1 3.8
8.9 1.4 3.9 2.5 1.4 0.3 0.9
7.5 1.3 3.9 0.9 0.4 0.1 0.7
1.2 0.7 1.9 0.4 0.3 0.1 0.3
1.1 0.6 2.2 0.1 0.1 0.03 0.2
230.3 11.2 54.7 92.0 16.4 7.5 14.2
242.2 9.6 89.8 41.7 6.1 3.4 9.2
291.2 40.4 106.3 114.4 30.8 10.6 30.1
296.5 32.8 147.5 48.5 10.1 4.4 20.6
587.7 73.2 253.8 162.9 40.9 15.0 50.7
Source: Pan American Health Organization (1990b).
*Codes from Manual of Intertrational Statistical CIassificatim of Diseases, I?rjuries, fl?~d Cawes (?f Dmth, Ninth Revision: coronary
heart disease, 410414; cerebrovascular disease, 43&438; lung cancer, 162; cancers of lip, oral cavity, and pharynx, 14G149;
cancer of the esophagus, 150; cancer of the larynx, 161; cancer of the bladder, 188.
`Cancer of the lip, oral cavity, and pharynx.
% ee text for a description of this rubric.
_Includes Falkland Islands.
"Excludes Belize.
`Includes Bermuda and St. Pierre and Miquelon.
88 Prevalence and Mortality
are current smokers, the relative risk for cancer of the
bladder is 2.9, cancer of the esophagus 7.6, cancer of
the larynx 10.5, and cancer of the lip, oral cavity, and
pharynx 27.5 (USDHHS 1989).
Two case-control studies were conducted to in-
vestigate the factors associated with esophageal can-
cer in Uruguay, which has one of the highest rates of
esophageal cancer in the world. In one study of 226
cases, the relative risk was 6.5 for ever smokers (82
percent were men) (Vassallo et al. 1985). In the other
study of 199 cases, the relative risk was 5.7 for current
male smokers (De Stefani et al. 1990). In bordering
southern Brazil, which also has a high rate of esopha-
geal cancer, the relative risk was 8.4 for male smokers
(Victora et al. 1987).
For countries for which relative risk estimates
were lacking, relative risks were derived from U.S.
data and used in the following computations of SAM
(USDHHS 1989, 1990). Small differences in relative
risk estimates are unlikely to have a large overall effect
on SAM because of the structure of the formula for
calculating attributable risk (see below).
Smoking-Attributable Mortality
Estimates of Smoking-Attributable Mortality
Worldwide
Interest in attempting to quantify the extent of
the health hazard caused by tobacco led to develop-
ment of smoking-attributable fractions (SAFs). These
values estimate the proportion of cases of a specific
disease in a population that can beattributed to smoking.
SAF = P(u-ll---
1 +p (r-l)
in which p is the proportion of the population that has
ever smoked and Y is the risk for ever smokers relative
to never smokers. The SAF calculated for each disease
of interest is multiplied by the number of deaths for
that disease, and the result is the SAM for that disease.
The sum of SAM values for all diseases associated
with tobacco use gives the total number of deaths
attributable to smoking.
The SAF can be refined to account for differences
in smoking status (never, current, or former smoker)
and for age and sex subgroups. Smoking prevalence
and relative risk can be estimated for each of these
subgroups. SAFs have been calculated for 10 selected
causes of death in the United States (Table 28).
Recent studies have estimated the number of
deaths attributable to smoking in the United States
(Table 29). The estimates by Rice and colleagues,
Table 28. Smoking-attributable fraction for 10
selected causes of death, United States,
1985
Men Women
~~~ ~~~ L?) ~
(7c'c)
45 41
21 12
51 55
24 6
90 79
92 61
81 87
78 75
29 34
47 37
48 12
84 79
-.
Cause of death
Coronary heart disease
(aged 35-64)
Coronary heart disease
(aged 565)
Cerebrovascular disease
(aged 35-64)
Cerebrovascular disease
(aged 265)
Cancer of the lung
Cancer of the lip, oral cavity,
and pharynx
Cancer of the larynx
Cancer of the esophagus
Cancer of the pancreas
Cancer of the bladder
Cancer of the kidney
Chronic obstructive pulmonary
disease
Source: U.S. Department of Health and
(1989).
Human Services
CDC, and USDHHS all considered smoking status,
age, and sex. The estimates vary for several reasons:
the diseases included, the specific methodology used,
the target year, and the source of the smoking preva-
lence data and the relative risk estimates. The most
recent (1988) estimate for the United States (434,000
smoking-attributable deaths) is discussed in Chapter
4, "Economic Costs of the Health Effects of Smoking."
The 1985 estimate is used here to maintain consistency
with data available for Latin America and the Caribbean.
SAM has been estimated for many European
countries (Table 30), and the current worldwide esti-
mate is 3 million smoking-attributable deaths per year.
The methodology described earlier for calculat-
ing SAM can be used for countries for which reliable
information is available on smoking prevalence and
on the risk for major tobacco-associated diseases
among ever smokers relative to never smokers. Un-
fortunately, few countries in Latin America have such
data; an alternative methodology for calculating SAM
is described below.
Lung Cancer Mortality as an Index of Prior
Smoking in a Population
Numerous attempts have been made to describe
the relationship between smoking habits and mortality
Prezahce nud Mortality 89
Table 29. Smoking-attributable mortality smoking habits of the population, as expressed by the
in the United States risk of dying from lung cancer.
Reference
Rice et al., 1986
U.S. Office of Technology
Assessment, 1985
Centers for Disease Control,
1987b
Year Estimate
1980 270,000
1982 314,000
1985 320,000
for R(US,N-Sj < R(C) < RKIS)
U.S. Department of Health
and Human Services, 1989
1985* 390,000
in which R(C) is the lung cancer mortality rate for a
country in the Americas, R(US) is the lung cancer rate
for the United States (Table 31), and RtUS,N-S) is the
lung cancer rate for never smokers in the United States
(12.7 for men and 11.1 for women). When R(C) is
greater than RfUS), the index is arbitrarily set to 1.
The index has the following properties:
o It equals 0 for the few countries in Latin America
and the Caribbean with a lung cancer rate below
that of never smokers in the United States.
o It equals 1 for countries that have a lung cancer rate
higher than that of the United States (although there
were none).
*The 1985 estimate (rather than the 1988 estimate of 434,000
reported in Chapter 4, Table 1) is used here to maintain
consistency with the demographic and vital data available
for Latin America and the Caribbean.
from lung cancer in a population. Many of these
attempts have not been entirely successful, primarily
due to the lack of key information. Current lung cancer
mortality rates reflect smoking habits of 20 to 40 years
ago. Reliable data on lung cancer incidence and mor-
tality are available for many industrialized countries,
but only limited information is available on previous
smoking habits. Furthermore, the relationship between
smoking and lung cancer is affected by many factors.
Duration of smoking is the factor most strongly corre-
lated with risk for lung cancer. For example, when
duration of regular tobacco use is doubled from 15 to
30 years, lung cancer incidence increases about 20-fold
Pete 1986). Other factors that affect lung cancer risk
include number of cigarettes smoked per day, age at
initiation, tar yield of tobacco products, use of filters,
blend of tobaccos, and depth of inhalation. Many of
these factors vary over time, not only for a national
population but for individuals within a population.
Only in recent years have surveys in a few industrial-
ized countries collected data on these factors in some
detail. Thus, data are unavailable for building an
optimal model of smoking habits and lung cancer risk.
Nevertheless, tobacco consumption is highly
correlated with lung cancer; the SAF has been calcu-
lated at over 90 percent for countries that have popu-
lations with a long history of high prevalence of heavy
smokers (Table 31). This strong association suggests
that lung cancer mortality can be used as a surrogate
to measure the impact of smoking on a population.
The following index (0 uses lung cancer mortal-
ity rates for the population aged 55-64. This index, a
measure of smoking maturity in a population, con-
tains population risk factor information related to the
o It falls between 0 and 1 for countries with a lung
cancer rate between the U.S. rate for never smokers
and the overall U.S. rate, and the value increases as
the country's rate approaches that of the United
States.
This index can be used to develop estimates of
SAM for countries in Latin America and the Carib-
bean. For a given country, the lung cancer rate and
index are calculated, and this lung cancer index is used
to adjust all diseases. The index is multiplied bv the
disease-specific SAF for the United States to obtain an
adjusted disease-specific SAF for a specific country.
The number of deaths from a specific cause is then
multiplied by the adjusted SAF to obtain the SAM.
Thus, the index adjusts the SAF downward-to
a level appropriate for the extent of lung cancer in the
population. The index is nonlinear; large changes in
the upper range of lung cancer rates have only a small
effect on the SAF. But changes in the lower range, closer
to the rate for never smokers, have a proportionately
larger effect on the SAF. In Table 31, the SAF is given
with and without the index adjustment. The index
uniformly offers a more conservative estimate of SAF.
Because of the potential for diagnosis of lung
cancer to be more inadequate in some elderly popula-
tions than in younger populations, and because of the
need to choose a relatively stable measure of smoking
habits, the lung cancer rate for persons aged 55 to 64
was used in creating the index. If older age groups are
used, significant diagnostic misclassification occurs,
and the relationship to smoking is more tenuous. The low
rates for younger age groups render the rate estimates
90 Preztalence and Mortality
Table 30. Estimated number of deaths due to tobacco use in 27 countries of the World Health Organization
(WHO) European Region*
Country
Austria
Belgium
Bulgaria
Czechoslovakia
Denmark
Finland
France
German Democratic Republic
Germany, Federal Republic of
Greece
Hungary
Iceland
Ireland
Israel
Italy
Luxembourg
Malta
Netherlands
Norway
Poland
Portugal
Romania
Spain
Sweden
Switzerland
United Kingdom
Yugoslavia
Total for region
Total worldwide
Year
1985
1984
1984
1984
1985
1984
1984
1984
1985
1984
1985
1984
1983
1984
1981
1985
1985
1985
1984
1985
1985
1984
1980
1985
1985
1984
1982
1991
Male Female
5,527 3,354
8,905 2,664
6,129 3,215
14,693 7,363
5,531 3,311
4,094 1,900
25,751 10,102
12,393 6,178
49,572 26,433
5,305 1,718
10,742 5,541
115 78
2,754 1,449
1,416 859
39,489 15,324
298 121
115 54
12,140. 3,892
3,046 1,553
23,858 7,337
3,656 1,778
12,178 7,907
14,492 5,738
7,104 4,339
4,299 1,610
60,764 33,916
9,103 3,732
343,469 161,466
Total
8,881
11,569
9,344
22,056
8,842
5,994
35,853
18,571
76,005
7,023
16,283
193
4,203
2,275
54,813
419
169
16,032
4,599
31,195
5,434
20,085
20,230
11,443
5,909
94,680
12,835
504,935
3,000,000
Source: WHO (1988, 1991 [for worldwide estimate]).
Represents about 6OYG of the regional population. Tobacco is held responsible for about 90% of all deaths from lung cancer,
75% of bronchitis/emphysema deaths, and 257c of all deaths from ischemic heart disease. The estimate for each country is
based on the most current data provided to WHO by the countries themselves.
unstable. Further, the use of a single, well-defined
group at risk has the virtue of simplicity-data di-
rectly available to a country are used, and adjustment
that might be necessary for cross-country compari-
sons is avoided.
Estimates of Smoking-Attributable Mortality in
the Americas
Unadjusted Estimates
Before adjustment, approximately 375,000
deaths in the Americas were attributable to smc.king
around 1985 (Table 32). These were distributed by
disease as follows:
Disease Total SAM
Coronary heart disease 144,200
Cerebrovascular disease 46,800
Lung cancer 128,600
Oral, laryngeal, and esophageal cancer 23,200
Bladder cancer 5,700
COPD 27,300
In Latin America and the Caribbean, an interme-
diate estimate of 64,000 smoking-attributable deaths
was obtained, and most of these deaths were from
coronary heart disease (about 18,500), cerebrovascular
disease (about 17,000), and lung cancer (about 13,000).
The largest contribution to SAM in Latin America was
made by Brazil, followed closely by the Southern Cone
subregion.
Prezlalence and Mortality 91
Table 31. Smoking-attributable fraction (SAF) and adjusted SAF for lung cancer mortality,
selected industrialized countries, 1978-1981
Index of
Crude lung
Country Sex cancer rate* SAF smoking
maturity A%Fd
Canada M 142.8 .90 .92 .85
F 34.0 .71 .77 .60
England and Wales M 228.5 .94 1 .oo .92
F 63.3 .80 1.00 .78
Japan M 64.8 .83 .58 .53
F 21.0 .58 .50 .39
Sweden M 85.0 .83 .69 .63
F 28.0 .57 .66 .51
United State& M 166.7 .92 1 .oo .92
F 50.0 .78 1.00 .78
Source: Adapted from International Agency for Research on Cancer (1986).
:For persons aged 35 or older. The calculation actually uses the rate for persons aged 5544 years.
Difference
between SAF
and adjusted
SAF
.05
.ll
.02
.02
.30
.19
.20
.06
.oo
.oo
:Calculated by multiplying the SAF for the United States by the country-specific index of smoking maturity; see text.
+Total population.
SAM was calculated as the percentage of deaths exclusion of deaths attributed to ill-defined causes.
for persons aged 35 or older (last column of Table 32). SAM was adjusted for the first four of these factors as
For the Latin American subregions, the proportion follows. For the United States, the estimate of SAM
was highest for men in the Southern Cone and lowest was calculated and compared with that made for 1985
for men in Central America. In the Southern Cone, the KJSDHHS 1989). The latter estimate, which provided
difference in the rate for men and women reflects a a benchmark, was 37.2 percent larger than the estimate
large historical difference in the rate of tobacco con- computed in this analysis. The percent difference be-
sumption (see "Prevalence of Smoking" earlier in this tween these two estimates was used to alter upward
chapter). The lung cancer mortality rate for women in the estimates for the other countries in the Americas.
Peru was less than that for U.S. women who were The adjustments were made by cause (Table 33, see
never smokers. The index was zero, and by this footnotes), since the degree of underestimate varied
method, no deaths were attributable to smoking. with the condition.
Adjusted Estimates
The estimates of SAM (Table 32) are under-
estimates for several reasons: (1) COPD was un-
dercounted due to differences in cause-of-death
groupings; (2) cancers of the kidney and pancreas
were omitted; (3) the SAF for cancers of the oral cavity,
esophagus, and larynx is an underestimate (the three
cancers were grouped, and the smallest SAF for the
three was used); (4) other categories of disease or death
were omitted, including other types of cardiovascular
and respiratory disease, cervical cancer, infant deaths
due to maternal smoking during pregnancy and post-
natal exposure to environmental tobacco smoke, lung
cancer deaths due to passive smoking, and deaths
from smoking-related fires; and (5) an undercount of
deaths due to both underregistration of cases and the
After adjustment, an estimated 526,000 annual
deaths in the Americas are attributable to tobacco use;
about 100,000 of these are in Latin America and the
Caribbean. About two-thirds of these deaths occur in
Brazil and the Southern Cone. The estimated 36,000
deaths for Bermuda, Canada, and St. Pierre and
Miquelon correspond closely with estimates derived
by using several different methods and previously
reported for Canada alone (Collishaw, Tostowaryk,
Wigle 1988; PAHO 1992). As discussed below, the
100,000 annual deaths in Latin America and the Car-
ibbean, estimated from data for the mid-1980s, is
conservative. If the current U.S. SAF is applied and if
Latin American and Caribbean countries follow a tra-
jectory similar to that of North America, over 1 million
smoking-attributable deaths per year will occur in
Latin America and the Caribbean by the year 2030.
92 Prevalence and Mortality
A Comment on the Methodology
The attribution of mortality requires an empiri-
cal approach. In the method used here, which varies
somewhat in detail, but not in fundamental approach,
from other methods (WHO 19891, at least five basic
empirical decisions were made. First, the analysis
excluded mortality data for which cause of death was
inadequately specified, and no attempt was made to
adjust for the underreporting of deaths. Second, syn-
thetic estimates of mortality structure were used for
countries with little or no data. Third, a proration was
used to adjust for causes of death that could not be
analyzed by using PAHO data. Fourth, an empirical
index was developed to adjust for the many factors
that influence the risk that smoking imposes on a
population. Fifth, the SAM calculation made for the
United States (USDHHS 1989) was used as a bench-
mark for adjusting the estimates derived in this anal-
ysis. Each of these decisions influenced the final
estimate; in addition, some specific features of the
index and factors related to attributable risk in general
also had an influence.
The net effect of the empirical decisions is diffi-
cult to assess, but the first decision-no correction for
underreporting and no proration for ill-defined
causes-probably dominates and results in a sizable
underestimate. The order of magnitude of the under-
estimate can be approximated by comparing the esti-
mate of total mortality in Latin America derived for
this analysis (2,060,OOO [Table 251) with an estimate,
derived by using regression methods, that attempted
to account for underreporting (3,197,OOO [Hakulinen
et al. 19861). Based on this difference in overall mor-
tality of about 55 percent, the number of smoking-
attributable deaths might be as high as 155,000. The
more conservative estimate of 100,000 smoking-
attributable deaths was deemed more appropriate be-
cause it directly relates to the data with which
ministries of health in Latin American and Caribbean
countries actually work. In addition, the conservative
method allows a simple, uniform decision rule to be
used by all countries of the region in making their own
computations. Finally, this approach allows for in-
creasingly credible estimates of SAM to be made as
better mortality data become available and the esti-
mates are gradually refined.
The index of smoking maturation is based on a
comparison of lung cancer rates. Although accurate
information is more readily available for lung cancer
than for other conditions, it may not be the optimal
condition for use in calculating the index. Although
tar levels affect the risk for lung cancer, they appar-
ently do not affect the risk for cardiovascular disease
and COPD (USDHHS 1981). Further, the lag between
increased consumption of tobacco and a rise in lung
cancer mortality may not be representative of the lag
for other diseases. In addition, use of the 55 to 64 age
group for calculating the index underestimates the
population's exposure to smoking in most Latin
American and Caribbean countries because peak
tobacco-consumption rates have not yet been reached.
Because the index is empirical, there is no clear
methodologic justification for the square root transfor-
mation. Many transformations are available; the
square root was used because of properties appropri-
ate to the analysis. Specifically, taking the square root
of numbers less than one produces a nonlinear effect:
it increases all numbers that are less than one, but it
has a greater effect on numbers close to zero than on
numbers close to one. Thus, upward revision is pro-
portionately greater for countries with low rates than
for countries with high rates. This choice modulates,
to some extent, the conservative nature of the index.
On the other hand, no deaths were attributed to smok-
ing in countries with lung cancer rates less than those
for U.S. never smokers. Since smoking is not uni-
formly distributed in such countries, rates may be
higher for some subgroups, and at least some deaths
should have been attributed to smoking.
Finally, this methodology is weakened by a lack
of information on multiple risk factors. The SAF may
be higher or lower when risks other than smoking play
a significant role in disease causation. Because smok-
ing is the dominant risk factor for lung cancer, this
effect is probably negligible. In cardiovascular disease,
however, smoking interacts with hypertension, hyper-
cholesterolemia, physical inactivity, obesity, diabetes,
and possibly other risk factors as well, and this effect
may be considerable.
Thus, the empirical choices and the specifics of
the analysis may have differing effects, but the final
estimate of 526,000 annual deaths attributable to
smoking in the Americas is almost certainly conserva-
tive. This estimate-perhaps best viewed as the first
point on a continuum of such estimates-provides an
order of magnitude for the number of smoking-related
deaths in the Americas.
If, as suggested in the first half of this chapter,
the prevalence of cigarette smoking is increasing in
some areas, accurate assessment of SAM is of consid-
erable importance. As noted, the lack of some critical
data diminishes the precision of the estimates and
fosters a greater reliance on empirical decisions. As
data systems develop, individual countries will be
better able to apply these methods for calculating
SAM for their own populations.
Table 32. Smoking-attributable mortality* for men and women in the Americas, c. 1985
Region and
country
Men
Latin America
Andean Area
Colombia
Peru
Venezuela
Southern Cone'
Argentina
Chile
Brazil
Central America**
Mexico
Latin Caribbean
Cuba
Caribbean
North America++
Canada
United States
All regions of the
Americas
Women
Latin America
Andean Area
Colombia
Peru
Venezuela
Southern Cone'
Argentina
Chile
Brazil
Central America**
Mexico
Latin Caribbean
Cuba
Caribbean
North America++
Canada
United States
All regions of the
Americas
Lung cancer
mortality rateS
Index of
smoking
maturity
--__
-
-
.302
.140
.444
-
.829
.566
.456
-
,376
-
.716
(aged ~65)
SAfl "
(aged 265) (aged ~65)
SAM"
-___
SAF SAM SAF SAM
-
-
34.1
19.5
55.6
-
155.5
80.6
57.8
-
44.3
-
119.8
- 8,426 - 6,432 - 7,090
- 785 - 557 - 462
.136 386 ,063 287 .154 237
.063 24 .029 25 .072 24
,200 354 .093 228 .226 167
- 2,583 - 2,245 - 2,151
.373 1,983 .174 1,156 .423 1,659
.255 290 .119 344 .288 261
.205 3,411 .096 1,844 .233 3,652
- 71 - 89 - 36
,169 708 ,079 559 .192 435
- 867 - 1,138 - 355
,322 711 ,150 974 .365 298
-
- - 128 - 108 - 129
- -
209.0 .975
219.0 1.000
- 36,907 - 48,251 - 5,696
.439 3,376 .205 4,044 .497 449
.450 33,526 .210 44,204 .510 5,243
- - 45,460 - 54,791 - 12,914
-
-
16.1
7.8
23.7
-
16.6
19.5
15.0
-
16.4
-
42.2
-
-
,267
-
,409
-
,279
,338
,240
.2;
-
.632
-
-
,710
-
,167
-
.114
,139
.098
-
.112
-
,259
1,848
346
198
- 1,837
- 234
,032 126
- -
,049 108
- 403
,033 259
.041 119
,029 505
28
,033 207
- 459
,076 405
-
-
149
236
162
63
706
20
209
331
299
-
,147
-
,225
-
.153
,186
,132
-
,151
-
,347
857
101
59
-
42
223
149
58
313
10
113
98
85
-
-
75.1
90.1
-
-
.901
1 .ooo
-
-
-
.369
,410
30
11,315
768
10,547
- 27 -
- 28,854 -
.108 1,919 .496
.120 26,934 .550
29
5,343
386
4,957
- 13,194 - 30,718 - 6,229
Coronary
heart disease Coronary
heart disease
Cerebro-
vascular
disease
Source: Pan American Health Organization (1990b).
"Mortality from defined causes for persons aged
`Cancer of the lip, oral cavity, and pharynx. 35 or older, in thousands.
tThe lung cancer rate for U.S. never smokers used for the index calculation was 15.5 per 100,000 men aged 5.564 and 10.4
per 100,000 women aged 55-64.
94 Prevalence and Mortality
-
-
,073
.034
,107
,199
,136
,109
-
,090
,172
5,959 - 11,549 - 5,946 - 845 - 5,819 52,066 ,071
418 - 579 - 305 - 36 - 441 3,584 ,033
222 .272 258 .236 164 ,142 17 .254 212 1,784 ,040
26 .126 33 ,109 12 ,066 2 ,118 38 184 .009
143 ,400 263 .346 116 ,209 15 ,373 148 1,434 .063
2,182 - 5,952 - 2,446 - 468 - 1,727 19,754 .124
1,527 .746 4,580 ,647 1,782 .390 368 ,697 916 14,370 ,131
315 .509 492 ,441 260 .266 35 475 553 2,549 .083
2,302 .410 2,522 .356 2,197 .214 191 ,383 1,827 17,945 .075
56 - 75 - 33 - 5 - 67 431 .013
503 .339 938 .293 322 .177 47 .316 1,409 4,920 .037
498 - 1,483 - 645 - 98 - 348 3,432 .086
399 ,644 1,334 ,558 462 ,336 86 .601 252 4,517 ,146
- 198 - 214 - 131 - 18 - 105 1,030 ,062
- 13,098 - 82,569 - 12,781 - 3,503 - 11,892 214,696 .199
.234 1,162 .878 7,249 .761 1,254 .458 367 ,819 1,245 19,147 .211
.240 11,932 ,900 75,310 ,780 11,523 .470 3,135 ,840 10,645 195,519 .198
- 19,255 - 94,331 - 18,859 - 4,366 - 17,817 267,792 ,146
-
857
101
59
-
1,567
210
102
-
673
97
64
-
-
,016
-
,025
-
.017
.020
,014
-
.016
-
.038
-
.211
-
.323
-
.220
.267
.190
-
.217
-
.499
-
,163
-
,249
-
,170
,206
.147
-
,167
-
.385
-
.099
-
.151
-
,103
,125
.089
-
,102
-
.234
103
11
7
-
2,257 12,247 .021
289 1,716 .018
151 977 .025
-
42
223
149
58
313
10
113
98
85
108
317
220
87
360
2%
389
352
33
181
116
55
207
10
74
104
89
-
5
30
22
6
30
1
10
20
17
-
,211
-
.323
-
.220
,267
,190
-
.217
-
.499
- -
138 739
386 2,308
170 1,473
203 727
517 4,156
35 140
827 2,052
203 1,877
167 1,671
-
.039
.018
.016
,029
,023
,005
,018
.036
,069
-
29
5,343
386
4,957
-
-
.054
.060
-
.712
.790
26
32,706
2,242
30,463
-
-
.550
,610
11
3,657
312
3,345
- 6,229 - 34,299 - 4,342
-
-
.333
,370
-
3
1,253
105
1,148
-
-
.712
.790
33 218 ,015
7,170 95,562 ,095
532 6,631 .088
6,638 88,928 ,096
1,359 - 9,460 108,027 .067
Cerebro-
vascular
disease
(aged 265)
SAF SAM
Lung
cancer
SAF SAM SAF SAM SAF SAM SAF SAM
Oral,+
laryngeal, and
esophageal
cancer
`Smoking-attributable fraction.
`iSmoking-attributablemortality.
`Includes Falkland Islands.
*`Excludes Belize.
`+lncludes Bermuda and St. Pierre and Miquelon.
Bladder
cancer
Chronic
obstructive
pulmonary
disease
Total
SAM
Total SAM
t~:~~:~l
mortality
Table 33. Adjusted estimates of smoking-attributable mortality (SAM) in the Americas, c. 1985
-
Chronic
obstructive Total
Region and Total p;;;e;;:+q Other diseases5
country SAM* Cancer4 and causes adjusted
SAM
Latin America 64,300 18,600 1,400 13,800 98,100
Andean Area 5,300 1,700 10 1,200
Southern Cone/l 8,200
22,100 4,900 700 4,500 32,100
Brazil 22,100 5,400 300 4,600
Central America1 32,400
600 200 10 100 900
Mexico 7,000 5,100 100 2,000 14,200
Latin Caribbean 7,300 1,300 200 1,400 10,200
Caribbean 1,200 300 30 300 1,900
North America 310,300 43,800 12,000 60,000 426,100
United States 284,400 39,800 11,000 55,000 390,200
Other** 25,800 4,100 1,000 5,100 36,000
All regions of the
Americas 375,800 62,700 13,400 74,100 526,000
Source: Pan American Health Organization (1990b). Adjustments were based on 1985 estimates for the United States; U.S.
Department of Health and Human Services (1989). Percentages used for upward adjustment for chronic obstructive pulmo-
nary disease and other diseases and causes were specific to those diagnostic rubrics. Upward adjustment for cancers was
based on lung cancer.
*Total for men and women from Table 32.
+230% adjustment to compensate for undercounting.
*10.4% increase added to adjust for omission of cancers of the kidney and pancreas and for underestimates of smoking-
attributable fraction for cancers of oral cavity, esophagus, and larynx.
516.4% increase added to adjust for exclusion of cervical cancer, other types of cardiovascular and respiratory diseases,
deaths among newborns due to smoking by the mother, lung cancer deaths due to passive smoking, and deaths from
smoking-related fires.
IlIncludes Falkland Islands.
IExcludes Belize.
**Includes Bermuda, Canada, and St. Pierre and Miquelon.
96 Prevalence and Mortality
Conclusions
1. Certain sociodemographic phenomena-such as
change in population structure, increasing urban-
ization, increased availability of education, and
entry of women into the labor force-have in-
creased the susceptibility of the population of
Latin America and the Caribbean to smoking.
2. The lack of systematic surveillance information
about the prevalence of smoking in most areas of
Latin America and the Caribbean hinders com-
prehensive control efforts. Available information
reflects a variety of survey methods, analytic
schemes, and reporting formats.
3. Available data indicate that the median preva-
lence of smoking in Latin America and the Carib-
bean is 37 percent for men and 20 percent for
women. Variation among countries is consider-
able, however, and smoking prevalence is 50 per-
cent or more in some populations but less than 10
percent in others. In general, prevalence is highest
in the urban areas of the more developed coun-
tries and is higher among men than among
women.
4. The initiation of smoking (as measured by the
prevalence of smoking among persons 20 to 24
years of age) exceeds 30 percent in selected urban
areas. Although systematic time series are not
available, the data suggest that more recent co-
horts (especially of women) in the urban areas of
more developed countries are adopting tobacco
use at a higher rate than did their predecessors.
The smoking epidemic in Latin America and the
Caribbean is not yet of long duration or high
intensity, and the mortality burden imposed by
smoking is smaller than that for North America.
By 1985, an estimated minimum of 526,000 smoking-
attributable deaths were occurring each year in all
the countries of the Americas; 100,000 of these
deaths occurred in Latin American and the Carib-
bean countries.
The estimate of 526,000 deaths annually is conser-
vative and is best viewed as the first point on a
continuum of such estimates. However, it pro-
vides an order of magnitude for the number of
smoking-attributable deaths in the Americas.
The time lag between the onset of smoking and the
onset of smoking-attributable disease is forebod-
ing. In North America, a high prevalence of smok-
ing, now declining, has been followed by an
increasing burden of smoking-attributable mor-
bidity and mortality. In Latin America and the
Caribbean, rising prevalence portends a major
burden of smoking-attributable disease.
Prezvlrrm~ md Mortality 97
References
ANDERSON, J.E. Smoking during pregnancy and while
using oral contraceptives. Data from seven surveys in west-
em hemisphere populations. Paper presented at the Inter-
national Conference on Smoking and Reproductive Health,
San Francisco, California, October 15-17,1985.
ANKER, R., HEIN, C. Empleo de la mujer fuera de la
agricultura en paises de1 tercer mundo. In: Desigualdades
Entre Hombres y Mujeres en 10s Mercados de Trabajo Urban0 de1
Tercer Mundo. Geneva: Oficina International de1 Trabajo,
1987.
ASOCIACION DEMOGRAEICA COSTARRICENSE AND
CENTERS FOR DISEASE CONTROL. Encuesta Nacionat de
Fecundidad y Salud, Costa Rica 1986. San Jose, Costa Rica,
1987.
BECERRA, J.E., SMITH, J.C. Maternal smoking and low
birthweight in the reproductive history of women in Puerto
Rico, 1982. American Iournal of Public Health 781268-272,
March 1988.
BRUNNER, J.J. Educacidn Superior en America Latina:
Cambios y Desafios. Chile: Fondo de Cultura Economica,
1990.
CENTERS FOR DISEASE CONTROL. Brazil Demographic
and HealthSurvey, 1986. Columbia, Maryland: Institute for
Resource Development/Macro International Systems, Inc.,
1986. Data tapes.
CENTERS FOR DISEASE CONTROL. Guatemala Demo-
graphic and Health Survey, 1987. Columbia, Maryland:
Institute for Resource Development/Macro International
Systems, Inc., 1987a. Data tapes.
CENTERS FOR DISEASE CONTROL. Smoking-attributable
mortality and years of potential life lost-United States,
1984. Morbidity and Mortality Week/y Reporf 36t42L693-697,
October 30,1987b.
CENTERS FOR DISEASE CONTROL. Rio de Janeiro,
Curitiba, Recife Young Adult Reproductive Health Survey,
1989-1990. Rio de Janeiro: Sociedade Civil Bern Estar Fa-
miliar no Brasil, 1990a. Data tapes.
CENTERS FOR DISEASE CONTROL. Costa Rica Young
Adult Reproductive Health Survey, 1990. San Jose, Costa
Rica: Programa Salud Reproductiva, 1990b. Data tapes.
CENTERS FOR DISEASE CONTROL. Smoking-attrib-
utable mortality and years of potential life lost-United
States, 1988. Morbidity and Mortality Weekly Report 40(4):62-
71, February 1,199l.
CENTRO LATINOAMERICANO DE DEMOGRAFIA.
Bolefin Demografico/Demographic Bulletin. Santiago, Chile:
CELADE, Year XXIII, No. 45, January 1990.
COLLISHAW, N.E., TOSTOWARYK, W., WIGLE, D.T.
Mortality attributable to tobacco use in Canada. Canadian
Journa/ of Public Health 79(3):166-169, May-June 1988.
DE OLIVEIRA, O., ROBERTS, B. Los antecedentes de la
crisis urbana: Urbanizacibn y transformacibn ocupacional
en America Latina: 1940-1980. In: Lombardi, M., Veiga, D.
teds.) Las Ci&drs en Co@icto: Una Perspectiza Lntinoameric-
ana. Montevideo, Uruguay: Centro de Informaciones y
Estudios de1 Uruguay, Ediciones de la Banda Oriental, 1989.
DE STEFANI, E., CORREA, I'., OREGGIA, F., LEIVA, J,,
RIVERO, S., FERNANDEZ, G., DENEO-PELLEGRINI, H.,
ZAVALA, D., FONTHAM, E. Risk factors for laryngeal
cancer. Cancer 60(12):3087-3091, December 15,1987.
DE STEFANI, E., MUNOZ, N., ESTEVE, J., VASALLO, A.,
VICTORA, C.G., TEUCHMANN, S. Mate drinking, alcohol,
tobacco, diet and esophageal cancer in Uruguay. Cancer
Research 50:426-431, January 15,199O.
DOLL, R., PETO, R. The causes of cancer. Quantitative
estimates of avoidable risks of cancer in the United States
today. Jocmal of the National Cmcer Institute 66(6):1191-
1308, June 1981.
ECONOMIC COMMISSION FOR LATIN AMERICA AND
THE CARIBBEAN. Transformacidn Ocupacional y Crisis Social
en America Latina. Santiago, Chile: Naciones Unidas, 1989.
ERNSTER, V.L. Selling cigarettes: How women are used.
In: Forbes, W.F., Frecker, R.C., Nostbakken, D. (eds.) Pro-
ceedings of the Fifth World Conference on Smoking and Health,
Volume II. Ottawa, Canada: Canadian Council on Smoking
and Health, 1983.
ESCOBEDO, L.G., ANDA, R.F., SMITH P.F., REMINGTON,
P.L., MAST, E.E. So&demographic characteristics of ciga-
rette smoking initiation in the United States. Implications
for smoking prevention policy. /ournal offhe American Med-
ical Association 264(12):1550-1555, September 26,199O.
ESCOBEDO, L.G., REMINGTON, P.L., ANDA, R.F. Long-
term secular trends in initiation of cigarette smoking among
Hispanics in the United States. Public Health Reports
104(6):583-587, November-December 1989.
FRANCO, E.L., KOWALSKI, L.P., OLIVEIRA, B.V.,
CURADO, MI'., PEREIRA, R.N., SILVA, M.E., FAVA, A.S.,
TORLONI, H. Risk factors for oral cancer in Brazil: A case-
control study. Internafionaf Jounznl of Cancer 43:992-1ooO,l989.
GALLUP ORGANIZATION. The incidence of smoking in
Central and Latin America. Conducted for the American
Cancer Society. Princeton, New Jersey: Gallup Organiza-
tion, April 1988.
HAKULINEN, T., HANSLUWKA, H., LOPEZ, A.D.,
NAKADA, T. Global and regional mortality patterns by
cause of death in 1980. tnternational Journal of Eyidemiotogy
15:226-233, June 1986.
98 Prevalence and Mortality
HARRIS, J.E. Cigarette smoking among successive birth
cohorts of men and women in the United States during
1900-80. ]ournul offhe Nutional CancerInstitute 71(3):473-479,
1983.
HAYNES, S.G., HARVEY, C., MONTES, H., NICKENS, H.,
COHEN, B.H. Patterns of cigarette smoking among Hispanics
in the United States: Results from Hispanic Health and
Nutrition Examination Survey, 1982-1984. American Jourd
of Public Heu[th 80(supplement):47-53, December 1990.
INTERNATIONAL AGENCY FOR RESEARCH ON CAN-
CER. Tobacco Smoking. IARC Monographs on the Evalua-
tion of the Carcinogenic Risk of Chemicals to Humans,
Volume 38. Lyon, France: International Agency for Re-
search on Cancer, 1986.
ISCOVICH, J., CASTELLETTO, R., ESTEVE, J., MUNOZ, N.,
COLANZI, R.,CORONEL, A., DEAMEZOLA, I., TASSI, V.,
ARSLAN, A. Tobacco smoking, occupational exposure and
bladder cancer in Argentina. Zderdiorzol Jourd of Cancrr
40(6):734-740, December 15,1987.
JAMISON, D.T., MOSLEY, W.H. Disease control priorities
in developing countries: Health policy responses to epide-
miological change. American \ourno/ of Pnblic Health
81(1):15-22, January 1991.
JOLY, D.J. Enczlesta Sobre lus Caracteristicas de1 HLbito de
Fumar en AmPrica Latina. Washington, DC: Organizacibn
Panamericana de la Salud, Oficina Sanitaria Panamericana,
Oficina Regional de la Organizacidn Mundial de la Salud.
Publicaci6n Cientifica No. 337,1977.
JOLY, O.G., LUBIN, J.H., CARABALLOSO, M. Dark to-
bacco and lung cancer in Cuba. Jourd ofthe National Cancer
Iwtitute 70(6):1033-1039, June 1983.
MARTINEZ, I. Factors associated with cancer of the esoph-
agus, mouth and pharynx in Puerto Rico. Journal of the
Nutionul Cancer lnstifllle 42(6):1069-1094, June 1969.
MCFARLANE, C., WARREN, C.W. 1989 jamuicu Contrucep-
tiue Prezlalence Surzley: Final Report. Kingston, Jamaica:
National Family Planning Board, December 1989.
MERRICK, T.W. Population pressures in Latin America.
Populufion Bulletin 41(3), July 1986.
NATIONAL FAMILY PLANNING BOARD AND CEN-
TERS FOR DISEASE CONTROL. Young Adulf Reproductive
Health Survey,Jumuicu 1987: Final Report. Kingston, Jamaica:
National Family Planning Board, March 1988.
OMRAN, A.R. The epidemiologic transition: A theory of
the epidemiology of population change. Milbunk Memorial
Fwd Qluzrterly 49(4):509-538, October 1971.
PALLONI, A. Mortality in Latin America: Emerging pat-
terns. Poplrlation and Dmelopment Rezliezo 7(4):623449, De-
cember 1981.
PAN AMERICAN HEALTH ORGANIZATION. Health
Conditions in the Americas, 1990 Edition. Washington, DC:
Pan American Health Organization, Pan American Sanitary
Bureau, Regional Office of the World Health Organization.
Scientific Publication No. 524, 1990a.
PAN AMERICAN HEALTH ORGANIZATION. Mortality
Database. Washington, DC: Pan American Health Organi-
zation, Health Situation and Trend Assessment Program,
199Ob. Database.
PAN AMERICAN HEALTH ORGANIZATION. Tobacco or
Heulth: Status in the Americas. Washington, DC: Pan Amer-
ican Health Organization. Scientific Publication No. 536,
1992.
PARKIN, D.M., LAARA, E., MUIR, C.S. Estimates of the
worldwide frequency of sixteen major cancers in 1980. ln-
ternationa/JournulofCuncer 41(2):184-197, February 15,1988.
PETO, R. Influence of dose and duration of smoking on lung
cancer rates. In: Zaridze, D., Peto, R. teds.) Tobacco: A Major
International Health Huxard. Lyon, France: International
Agency for Research on Cancer. IARC Scientific Publication
No. 74,1986.
PORTES, A. Lotin American C/ass Structures: Their Com-
posifionand Change Dzcring theLust Decades. Washington, DC:
The Johns Hopkins University, School of Advanced Interna-
tional Studies, 1984.
RESTREPO, H.E., CORREA, I'., HAENSZEL, W., BRINTON,
L.A., FRANCO, A. A case-control study of tobacco-related
cancers in Colombia. &&tin of the Pun American Health
Oqanization 23(4):40-13, 1989.
RICE, D.P., HODGSON, T.A., SINSHEIMER, I'.,
BROWNER, W., KOPSTEIN, A.N. The economic costs of the
health effects of smoking, 1984. The MiIbunk Quarterly
64(4):489-547,1986.
SAKAMOTO, C.P., FREIRE, H.S., MORRIS, L. lnvestigqrio
Sobre S&de Reproductizla do jovem nu Cidade de Srio Puulo:
Relutdrio Final Atlanta, Georgia: Centers for Disease Con-
trol, 1991.
SCHOENBORN, C.A. Smoking and Other Tobacco Use:
United States 1987. U.S. Department of Health and Human
Services, Public Health Service, Centers for Disease Control,
National Center for Health Statistics. DHHS Publication No.
(PHS) 89-1597, Vital and Health Statistics, Series 10, No. 169,
1989.
SMITH, J.C., WARREN, C.W., GARCIA-NUNEZ, J. The
U.S.-Mexico Border: Contraceptive Use and Maternal Health
Cure in Perspective, 1979. El Paso, Texas: United States-
Mexico Border Health Association, 1983.
THE WORLD BANK. World Development Report 2992: The
Challenge of Development. New York: Oxford University
Press, 1991.
Prrz~alencr and Mortality 99
TUKEY, J.W. Exploratory Data Analysis. Reading, Massa-
chusetts: Addison-Wesley Publishing Company, 1977.
UNITED NATIONS. World Population Prospects, 1988. De-
partment of International Economic and Social Affairs. New
York: United Nations, 1989.
UNITED NATIONS. World Population Prospects, 1990. De-
partment of International Economic and Social Affairs. New
York: United Nations, 1991.
UNITED NATIONS EDUCATIONAL, SCIENTIFIC, AND
CULTURAL ORGANIZATION. Statistical Yeurbook/An-
nuuire Sfutistique/Anuurio Estadziistico 7989. Paris: Unesco,
1989.
U.S. DEPARTMENT OF HEALTH AND HUMAN SER-
VICES The Health Consequences of Smoking. The Changing
Cigarette: A Report of the Surgeon General. U.S. Department
of Health and Human Services, Public Health Service, Office
of the Assistant Secretary for Health, Office on Smoking and
Health. DHHS Publication No. (PHS) Sl-50156,198l.
U.S. DEPARTMENT OF HEALTH AND HUMAN SER-
VICES. Reducing the Heulth Consequences of Smoking: 25 Years
ofProgress. A Report ofthe Surgeon General. U.S. Department
of Health and Human Services, Public Health Service, Cen-
ters for Disease Control, Center for Chronic Disease Preven-
tion and Health Promotion, Office on Smoking and Health.
DHHS Publication No. (CDC) 89-8411,1989.
U.S. DEPARTMENT OF HEALTH AND HUMAN SER-
VICES. The Health Benefits of Smoking Cessation. A Report of
the Surgeon General. U.S. Department of Health and Human
Services, Public Health Service, Centers for Disease Control,
Center for Chronic Disease Prevention and Health Promo-
tion, Office on Smoking and Health. DHHS Publication No.
(CDC) 90-84161990.
U.S. OFFICE OF TECHNOLOGY ASSESSMENT. Smoking-
Related Deaths and Financial Costs. Health Program, Office of
Technology Assessment, U.S. Congress, September 1985.
UNIVERSIDADE FEDERAL DA BAHIA AND CENTERS
FOR DISEASE CONTROL. Salide e Educucuo Sexual do Jovem:
Urn Estudo em Salvador. Salvador, Brazil. February 1989.
VALENZUELA, M.S., HEROLD, J.M., MORRIS, L. Encuesta
de Salad Reprodzzctizla en Adnltos loz~enes: Grun San&go-I988
Informe Final. Atlanta, Georgia: Centers for Disease Control,
July 1989.
VASSALLO, A., CORREA, I'., DE STEFANI, E., CENDAN,
M., ZAVALA, D., CHEN, V., CARZOGLIO, J., DENEO-
PELLEGRINI, H. Esophageal cancer in Uruguay: A case-
control study. Journal of the Nationul Cancer Institute
75(6):1005-1009, December 1985.
VICTORA, C.G., MUNOZ, N., DAY, N.E., BARCELOS, L.B.,
PECCIN, D.A., BRAGA, N.M. Hot beverages and oesopha-
geal cancer in southern Brazil: A case-control study. Inter-
national \ournal of Cancer 39:710-716, 1987.
WARNER, K.E. Health and economic implications of a
tobacco-free society. Journal of the American Medical Associn-
tion 258(15):2080-2086, October 16, 1987.
WILKIE, J.W., OCHOA, E. feds.) Statistical Abstract of Latin
America, Volume 27. Los Angeles, California: UCLA Latin
American Center Publications, 1989.
WILKIE, R.W. Latin American Population and Urbanization
Arrulysis: Maps und Stutistics, 1950-2982. Los Angeles, Cali-
fornia: UCLA Latin American Center Publications, 1984.
WORLD HEALTH ORGANIZATION. Manna/ of Interna-
tional Statistical Classification of Diseases, Injuries, and Causes
of Death. Based on Recommendations of the Ninth Revision
Conference, 1973. Geneva: World Health Organization,
1977.
WORLD HEALTH ORGANIZATION. A 5 Yeur Action Plan:
Smoke free Europe. World Health Organization Regional Of-
fice for Europe. Copenhagen, Denmark: World Health Or-
ganization, 1988.
WORLD HEALTH ORGANIZATION. Report of a WHO
consultation on statistical aspects of tobacco-related mortal-
ity. Report prepared by World Health Organization, Ge-
neva, WHO/TOH/CLH/90.2, October 9-13,1989.
WORLD HEALTH ORGANIZATION. Tobacco-attributable
mortality: global estimates and projections. Tobacco Alert:
4-5,7, January 1991.
200 Prevalence and Mortality
|
en
|
markdown
|
017582
|
# Presentation: 017582
## Public Hearing on Direct-to-Consumer Promotion of Medical Products
- Gail H. Javitt, JD, MPH
- Genetics and Public Policy Center
- Johns Hopkins University
- November 1, 2005
**Notes:**
Thanks for inviting me
Our mission is to create the environment and tools needed by key decision makers in both the private and public sectors to carefully consider and respond to the challenges and opportunities that arise from scientific advances in genetics
Our first project looks at reproductive genetics, which include reproductive genetic testing, genetic modification and reproductive cloning
We do not take positions – we are a resource for all side of the growing debate how to guide the development and use of these technologies. But for today, I thought it would be useful and interesting to present what you need to know about Preimplantation Genetic Diagnosis, genetic testing of embryos created through IVF, which is rapidly becoming a part of IVF for thousands of patients and is growing rapidly in use.
## “No prescription required”
- “**No prescription required”**** **
**“****More than 99.9% accurate”**** **
**“****Completely safe”**
## Slide 3
**Notes:**
New Hope for Understanding DNA PredispositionsUnder normal conditions in the "Reward System" the neurotransmitter Dopamine works to maintain our normal drives. When dopamine is released into the synapse it stimulates certain dopamine receptors. These stimulated dopamine receptors signal feelings of well-being and stress reduction occurs as the main result. When there is a dysfunction in the "brain reward cascade" which could be caused by certain genetic variants, the brain requires a dopamine fix to feel good. People are born with this genetic trait that leads to substance seeking behavior. New Hope for Understanding DNA PredispositionsUnder normal conditions in the "Reward System" the neurotransmitter Dopamine works to maintain our normal drives. When dopamine is released into the synapse it stimulates certain dopamine receptors. These stimulated dopamine receptors signal feelings of well-being and stress reduction occurs as the main result. When there is a dysfunction in the "brain reward cascade" which could be caused by certain genetic variants, the brain requires a dopamine fix to feel good. People are born with this genetic trait that leads to substance seeking behavior.
New Hope for Understanding DNA PredispositionsUnder normal conditions in the "Reward System" the neurotransmitter Dopamine works to maintain our normal drives. When dopamine is released into the synapse it stimulates certain dopamine receptors. These stimulated dopamine receptors signal feelings of well-being and stress reduction occurs as the main result. When there is a dysfunction in the "brain reward cascade" which could be caused by certain genetic variants, the brain requires a dopamine fix to feel good. People are born with this genetic trait that leads to substance seeking behavior.
## Slide 4
## Genetic Testing Quality Initiative
- validity of tests is supported by the science before they are offered to patients and uses of outcomes of tests
- all laboratories must demonstrate their ability to get the right answer reliably
- health care providers are educated about these tests and able to provide them to patients with adequate context and counseling
- patients have confidence in the claims made about tests and in the tests themselves.
- Goals:
## Slide 6
|
en
|
converted_docs
|
503592
|
**2008 ISOG**
**SUMMARY OF CHANGES**
The following is a brief summary of the significant changes that were
made to the 2008 Interagency Single Engine Airtanker Operations Guide
(ISOG). All changes made to the document will be italicized in the 2008
revision. The ISOG should be posted to the National SEAT Web Site by the
last week in February. Hard copies should be available through the Great
Basin Cache Supply Office by March 2008. Order NFES #1844
Changes:
- Changed language **document wide** when referring to documentation
in the Aircraft Daily Diary to documenting in the SEAT Daily
Operations Worksheet (SEAT-002). Filling out the Aircraft Daily
Diary is no longer a requirement, a Daily Diary section has been
added to the SEAT Daily Operations Worksheet.
- Changed language **document wide** from the National
Call-When-Needed (CWN) contract to the National On Call Contract.
```{=html}
<!-- -->
```
- Added language for pilot qualifications for the new amphibious SEAT
aircraft add to the fleet. (Chapter 2, Section II, A. Pilot
Qualifications)
- Added new language to allow a SEAT Manager to manage up to three
trainees. (Chapter 2, Section IV, B. SEAT Manager Trainee)
- Added new language under the SEAT Manager duties to include the SEAT
Manager must know what type of contract they are administrating;
National On Call, Variable Term or Exclusive Use. (Chapter 2,
Section IV, C SEAT Manager Duties and Responsibilities)
- Added language for new required forms that must be completed each
day; AMD 23, SEAT Daily Operations Worksheet (SEAT-002), SEAT Cost
Summary (SEAT-003), and duty charts for both the pilot and driver
(SEAT-004 / SEAT-005). (Chapter 2, Section IV, C SEAT Manager Duties
and Responsibilities)
- Added new language for SEAT Managers to review relief costs and
provide documentation if the cost exceeds the limits identified in
the contract. (Chapter 2, Section IV, C SEAT Manager Duties and
Responsibilities)
- Added new language requiring the completion of the new SEAT Base
Operating Plan (SEAT-Plan-001). (Chapter 2, Section IV, C SEAT
Manager Duties and Responsibilities)
- Added new language to ensure the SEAT Manager contacts the Contract
Officers Representative (COR) within the first 24 hours when
managing a Variable Term or Exclusive Use contract. (Chapter 2,
Section IV, D. Exclusive Use or Variable Term SEAT Management)
- Added new language to the SEAT Manager's duties at a large airtanker
base to included helping coordinate any issues related to sterile
cockpit environment. (Chapter 2, Section IV, E. SEAT Manager Duties
at Established Airtanker Bases)
- Added new required 2008 forms in the SEAT Managers Kit. (Chapter 2,
Section IV, H. SEAT Managers Kit)
- Updated language for mandatory reference materials SEAT Managers
must have with them when on assignment. (Chapter 2, Section IV, I.
Mandatory Guides, Reference Material and Forms)
- Added a new section for General Safety to include; Flight Safety,
Situational Awareness and Minimum Safe Altitudes. (Chapter 3,
Section I, General Safety)
- Added additional language for requesting and obtaining approval for
proficiency flights. (Chapter 3, Section II, H. Proficiency flights)
- Added new language defining flights over waterways and the 300 foot
buffer requirement. (Chapter 3, Section II, I. Flights Over
Waterways)
- Added new language to include amphibious aircraft requirements for
all mission flights. No support vehicle for amphibious aircraft.
(Chapter 3, Section II, J. Required Support Equipment)
- Added new language defining the different types of SEAT contracts;
National On Call, Variable Term and Exclusive Use. (Chapter 3,
Section III, A,B &C Types of Contracts)
- Added new language on placing an order for a SEAT with the different
types of contracts. (Chapter 3, Section IV, A&B Placing an Order for
a SEAT)
- Clarified language on providing lunch to SEAT contractor personnel.
(Chapter 3, Section V, F. Meals)
- Added new language defining the sterile cockpit environment.
(Chapter 4, Section V, G. Sterile Cockpit Environment)
- Updated language for gate and tank specifications. (Chapter 5,
Section IV Tank and Gate Requirements and Standards)
- New language in the heading for Chapter 6 Title: "SEAT Bases and
Landing Areas".
- New language defining the different SEAT base categories. (Chapter
6, Section VI, SEAT Base Categories)
- Added new language requiring the completion of the new SEAT Base
Operating Plan (SEAT-Plan-001) for all Category II -- IV bases.
(Chapter 6, Section VIII, SEAT Base Operating Plan)
- New language on SEAT Base security for both the aircraft and the
base. (Chapter 6, Section IX, A.& B. SEAT Base Security)
- Add the following to the glossary: Fire Traffic Area (FTA), SEAT
Base Categories, Sterile Cockpit Environment, Waterways Environment
Guidance (300 Foot Buffer)
|
en
|
all-txt-docs
|
466411
|
"Il Trovatore, op. 627 /","sm2/sm1856/300000","300400","001.gif","1","1","","001.tif"
"Il Trovatore, op. 627 /","sm2/sm1856/300000","300400","002.gif","2","2","","002.tif"
"Il Trovatore, op. 627 /","sm2/sm1856/300000","300400","003.gif","3","3","","003.tif"
"Il Trovatore, op. 627 /","sm2/sm1856/300000","300400","004.gif","4","4","","004.tif"
"Il Trovatore, op. 627 /","sm2/sm1856/300000","300400","005.gif","5","5","","005.tif"
"Il Trovatore, op. 627 /","sm2/sm1856/300000","300400","006.gif","6","6","","006.tif"
"Il Trovatore, op. 627 /","sm2/sm1856/300000","300400","007.gif","7","7","","007.tif"
"Il Trovatore, op. 627 /","sm2/sm1856/300000","300400","008.gif","8","8","","008.tif"
"Il Trovatore, op. 627 /","sm2/sm1856/300000","300400","009.gif","9","9","","009.tif"
|
en
|
markdown
|
169150
|
# Presentation: 169150
## Session 5:Roadmap for Recovery
## Recovery Stages
- Stage 1: Withdrawal
- Stage 2: Early Abstinence (“Honeymoon”)
- Stage 3: Protracted Abstinence (“the Wall”)
- Stage 4: Adjustment/Resolution
- Matrix IOP
## Stage 1: Withdrawal
- Physical detoxification
- Cravings
- Depression/anxiety
- Low energy
- Irritability
- WITHDRAWAL
- Exhaustion
- Insomnia
- Paranoia
- Memory problems
- Intense hunger
- Matrix IOP
## WithdrawalRelapse Risk Factors
- Powerful cravings
- Paranoia
- Depression
- Disordered sleep patterns
- Unstructured time
- Proximity of triggers
- Fear of withdrawal symptoms
- Matrix IOP
## WithdrawalStructure
- Self-designed structure
- Helps eliminate avoidable triggers
- Makes the concept of “one day at a time” concrete
- Reduces anxiety
- Counters the drug-using lifestyle
- Provides a basic foundation for ongoing recovery
- Matrix IOP
## Building Blocks of Structure
- Matrix IOP
## Scheduling Pitfalls
- Unrealistic schedules
- Unbalanced schedules
- Imposed schedules
- No support from significant others
- Holidays, illness, and other changes
- Matrix IOP
## Stage 2: Early Abstinence
- Intense feelings
- Mood swings
- Other substance use
- Inability to prioritize
- Mild paranoia
**Stage 2: Early Abstinence**
- Increased energy and optimism
- Overconfidence
- Difficulty concentrating
- Continued memory problems
- HONEYMOON
- Matrix IOP
## Early AbstinenceRelapse Risk Factors
- “Workaholism”
- Discontinuation of structure (including treatment)
- Overconfidence
- Secondary drug or alcohol use
- Inability to prioritize
- Resistance to behavior change
- Occasional paranoia
- Matrix IOP
## Early AbstinenceTriggers and Thought Stopping
- Trigger
- Thought
- Thought stopping
- Continued thoughts
- Use
- Cravings
- Matrix IOP
## Interruption
**Interruption**
- Matrix IOP
## Types of Triggers
- Triggers can relate to
- People
- Places
- Things
- Times
- Emotional states
- Matrix IOP
## Triggers People
- Friends who use drugs/dealers
- Absence of significant other
- Voices of friends who use drugs/dealers
- Intimate partners
- People discussing drug use
- Matrix IOP
## Triggers Places
- Drug dealer’s home
- Bars and clubs
- Drug use neighborhoods
- Work
- Some street corners
*Anyplace* associated with use
- Matrix IOP
## Triggers Things
- Drug paraphernalia
- Money/ATMs
- Movies/TV shows about drugs and alcohol
- Sexually explicit magazines/movies
- Certain music
- Secondary drug or alcohol use
- Matrix IOP
## Triggers Times
- Idle time
- After work
- Holidays
- Birthdays/anniversaries
- Stressful times
- Paydays
- Friday/Saturday nights
- Matrix IOP
## Triggers Emotional States
- Anxiety
- Depression
- Boredom
- Fear
- Sexual arousal *or* deprivation
- Fatigue
- Anger
- Frustration
- Concern about weight gain
- Matrix IOP
## Thought Stopping
- Learn to recognize “using thoughts”
- Use visual imagery
- Snap a rubberband
- Relax
- Call someone
- Matrix IOP
## Nontrigger Activities
- Exercise
- 12-Step/mutual-help group meetings
- New recreation/hobby
- Faith-based or spiritual activities
- Eating/sleeping
- Non–drug-oriented movies
- Structured/monitored periods
- Matrix IOP
## Stage 3: Protracted Abstinence
- Continued lifestyle changes
- Anger and depression
- Isolation
- Family adjustment
**Return** **of** **cravings**
**Return to old behaviors**
- THE WALL
- Positive benefits from abstinence
- Emotional swings
- Unclear thinking
- Matrix IOP
## Protracted AbstinenceRelapse Risk Factors
- Increased emotionality
- Behavioral “drift”
- Decreased ability to feel pleasure
- Low energy/fatigue
- Secondary drug use
- Breakdown of structure
- Interpersonal conflict
- Loss of motivation
- Insomnia
- Paranoia
- Relapse justification
- Matrix IOP
## Secondary Drugs and Alcohol
- Use of a secondary drug or alcohol may lead to relapse to stimulants through
- Cortical disinhibition
- Stimulant craving induction
- 12-Step philosophy conflict
- Abstinence violation effect
- Interference with new behaviors
- Matrix IOP
## Protracted AbstinenceRelapse Justification
**The addicted brain attempts to provide a *****seemingly***** rational reason (justification) for behavior that moves a person in recovery closer to a slip.**
- Matrix IOP
## Relapse JustificationOther People Made Me Do It
- My wife used so ...
- I was doing fine until he brought home ...
- I went to the beach with my sister and ...
- My brother came over for dinner and brought some ...
- I wanted to see my friend just once more, and he offered me some ...
- Matrix IOP
## Relapse Justification I Needed It for a Specific Purpose
- I was getting fat again and needed to control my weight, so I ...
- I couldn’t get the energy I needed without ...
- I can’t have fun without ...
- Life is too boring without ...
- I can’t be comfortable in social situations or meet people without ...
- Matrix IOP
## Relapse Justification I Was Testing Myself
- I wanted to see whether it would “work better” now that I’ve been clean awhile.
- I wanted to see my friends again, and I’m stronger now.
- I needed a little money and thought I could sell a little without using.
- I wanted to see whether I could use just a little and no more.
- I wanted to see whether I could be around it and say no.
- I thought I could drink without using.
- Matrix IOP
## Relapse Justification It Wasn’t My Fault
- It was right before my period, and I was depressed.
- I had an argument with my spouse.
- My parents were bugging me.
- My partner was intimate with another person.
- The weather was gloomy.
- I was only going to take a hit and ...
- Matrix IOP
## Relapse Justification It Was an Accident
- I was in a bar, and someone offered me some meth.
- I was at work, and someone offered ...
- I found some in my car.
- I went to a movie about ...
- A friend called to see how I was doing. We were talking and decided to get together.
- Matrix IOP
## Relapse Justification I Felt Bad
- Life is so boring I may as well use.
- I was feeling depressed, so ...
- My job wasn’t going well and I was frustrated, so ...
- I was feeling sorry for myself, so I ...
- Recovery is just too hard.
- Matrix IOP
## Stage 4: Adjustment and Resolution
- Feelings of accomplishment
- ADJUSTMENT/RESOLUTION
**Maintaining a balanced lifestyle**
**Accepting that recovery is a life-long process**
**Monitoring for **
**relapse** **signs**
**Addressing underlying issues that may surface ****or resurface**
- Continued lifestyle/ relationship change
- Matrix IOP
## Adjustment and ResolutionRelapse Risk Factors
- Secondary drug or alcohol use
- Feeling “cured” and relaxing vigilance for relapse signs
- Relaxation of structure
- Losing recovery momentum/commitment
- Struggle with accepting addiction and recovery as a life-long process
- Reemergence of underlying emotional issues
- Matrix IOP
## Adjustment and ResolutionBalance
**Work**
**Recovery ****Activities**
**Sleep**
**Leisure**
**Relationships**
- Matrix IOP
|
en
|
all-txt-docs
|
439363
|
THIS OPINION WAS INITIALLY ISSUED UNDER PROTECTIVE ORDER
AND IS BEING RELEASED TO THE PUBLIC IN ITS
ENTIRETY ON DECEMBER 23, 1992
MOTION FOR SUMMARY RELIEF DENIED: December 11, 1992
GSBCA 12082-P
TECHNOLOGY, MANAGEMENT & ANALYSIS CORPORATION,
Protester,
v.
ENVIRONMENTAL PROTECTION AGENCY,
Respondent,
and
ORACLE COMPLEX SYSTEMS CORPORATION,
Intervenor.
William W. Goodrich, Jr., and Thomas W.A. Barham of Arent
Fox Kintner Plotkin & Kahn, Vienna, VA, and Jacob B. Pompan and
Daniel A. Perkowski of Pompan, Ruffner & Bass, Alexandria, VA,
counsel for Protester.
Avital G. Zemel, Office of the General Counsel,
Environmental Protection Agency, Washington, DC, and L. Carol
Roberson, Office of General Counsel, Environmental Protection
Agency, Research Triangle Park, NC, counsel for Respondent.
Richard O. Duvall, Richard L. Moorhouse, and Michael H.
Ditton of Dunnells, Duvall & Porter, Washington, DC, counsel for
Intervenor.
Before Board Judges NEILL, HYATT, and VERGILIO.
NEILL, Board Judge.
On October 8, 1992, this protest was filed by Technology,
Management & Analysis Corporation (TMA). The procurement in
question involves a contract for the supply and support of
relational database management system (RDBMS) software and
related services under request for proposals (RFP) number
W002073-A3 issued by the U.S. Environmental Protection Agency
(EPA).
Respondent awarded the protested contract to Oracle Complex
Systems Corporation (OCSC), which has intervened, as a matter of
right, in this protest. Protester's initial complaint set forth
four bases of protest. On November 3, on motion from protester,
two of the four counts were dismissed with prejudice. Shortly
thereafter, the Board granted protester's motion to amend its
complaint to include two additional counts. The first alleges
negotiations with OCSC after submission of best and final offers
(BAFOs). The second count alleges that the offer of OCSC was
unbalanced.
Both respondent and intervenor moved for summary relief with
regard to the allegation of negotiations with OCSC after BAFOs.
Protester opposed the motions and brought its own cross-motion
for summary relief on the same count. We denied the cross-motion
and granted the two motions for summary relief. Technology,
Management & Analysis Corp. v. Environmental Protection Agency,
GSBCA 12082-P (Dec. 9, 1992).
Still before us is a motion for summary relief filed by the
EPA regarding the second count of the amended complaint, namely,
the allegation that the offer of OCSC was unbalanced. OCSC
supports the motion. For the reasons set out below, however, the
motion is denied.
Discussion
Among the facts relevant to the protest count alleging an
unbalanced offer, respondent lists the following as undisputed:
5. The estimate of the EPA's ordering needs has not
changed since the evaluation of the proposals and award
of the contract. . . .
6. The entire basis for Protester's allegation of
materially unbalanced offer is the speculation that
EPA's ordering pattern will change during the contract
(Answers to Respondent's Second Interrogatories, # 23,
24 and 25).
Respondent's Motion for Summary Relief as to Count VI at 4.
In a relatively detailed opposition to respondent's motion
for summary relief, counsel for protester vigorously challenges
the two facts set out above and said by respondent to be
undisputed. See Protester's Opposition to Respondent's Motion
for Summary Relief as to Count VI at 4-9.
It is well established that summary judgment will not be
granted if the moving party fails to establish the absence of any
genuine issue of material fact. Copeland's Enterprises, Inc. v.
CNV, Inc., 945 F.2d 1563, 1565-66 (Fed. Cir. 1991); Armco, Inc.
v. Cyclops Corp., 791 F.2d 147, 149 (Fed. Cir. 1986); Integrated
Systems Group, Inc., GSBCA 11494-P, 92-1 BCA 24,621, at 122,807
n.2, 1991 BPD 335, at 2 n.2; Griffin Services, Inc., GSBCA
11171, 91-3 BCA 24,156, at 120,872. We find that respondent in
this case has not met its burden. There clearly is an on-going
dispute between the parties regarding the stability or immutable
character of the EPA's ordering needs and pattern. We,
therefore, cannot grant respondent's motion to the extent that it
is premised on an alleged lack of controversy on these issues.
A second argument raised, in the alternative, by respondent
in support of its motion for summary relief is that even if the
OCSC offer is unbalanced, neither the solicitation nor the
Federal Acquisition Regulation (FAR) mandates rejection of a
materially unbalanced offer. Respondent's Motion for Summary
Relief as to Count VI at 10-11.
Protester counters this second argument of respondent by
citing to a provision in Section M of the solicitation which
notified offerors that "buy-in" offers which are priced low for
some ordering periods and high for other periods could not be
accepted. Protester's Opposition to Respondent's Motion for
Summary Relief as to Count VI at 3. The record for this case is
not yet sufficiently developed for us to be able to conclude that
this has or has not occurred or that the parties are in agreement
or disagreement on that matter.
Protester also points out that in SMS Data Products v.
United States, 900 F.2d 1553 (Fed. Cir. 1990), the Court held:
[N]o bid meeting the definition of mathematical
imbalance can be accepted if it includes bid prices
representing anything other than the value of a bona
fide fiscal year's requirements, either in the form of
explicit "separate charges" or implicit charges.
Implicit charges occur if the price of an item is not
proportional to its value, but instead includes part of
another fiscal year's requirement.
Id. at 1556. Protester contends that in this case, it will show
unbalancing which falls squarely under the SMS Data Products
rule. Whether this is correct rests of course on our eventual
assessment of the record as developed on this issue by the
parties. In a motion such as this, however, we are required to
resolve all significant doubt in favor of the non-movant. Armco,
791 F.2d at 149. Accordingly, we assume that, based on the
proffer offered in its opposition, for purposes of this motion,
protester will meet its burden of proof on this matter. For this
reason, we reject the alternative argument of respondent.
Decision
Respondent's motion for summary relief as to count VI is
DENIED.
____________________
EDWIN B. NEILL
Board Judge
We concur:
_______________________
CATHERINE B. HYATT
Board Judge
_______________________
JOSEPH A. VERGILIO
Board Judge
|
en
|
converted_docs
|
981434
|
##### QADATA Summary -- June 2006
The Inorganic Blind Sample Project (IBSP) of the Branch of Quality
Systems reviews about 100 inorganic analytical lines at the National
Water Quality Laboratory (NWQL) using double-blind, quality-control
samples. A summary of this review, the QADATA Summary, is a short report
commenting on only those analytical lines for which the quality-control
charts indicate or have indicated a bias and/or higher than expected
variability. Overall, the vast majority of the inorganic methods at the
NWQL demonstrate acceptable variability and little or no bias.
The data reviewed in this summary is for the time period 11/01/05
through 05/25/06; however, longer-range charts may be used when they add
clarity to the problem. The attached quality-control charts contain data
from samples that have been subject to the same laboratory handling
procedures as the samples submitted by the USGS district offices, and
the data have the same level of quality-control review as the data
released to the districts. Therefore, any factors that affect the data
displayed on the IBSP quality-control charts should also affect the
districts' data in a similar manner. Data from samples known to have
been affected by a problem independent of the laboratory are removed
from the charts.
In this report, the "Problem" is determined and written by IBSP and then
sent to the NWQL. The NWQL then gets two weeks to respond to the issue
by writing a "Lab Comment" and a "Corrective Action." Comments from the
lab are incorporated into the QADATA Summary as received. The most
recent comments and responses are in bold followed by comments and
responses from previous QADATA Summaries. Approximately one month after
the QADATA Summary is distributed, the NWQL and IBSP personnel usually
meet to follow-up on corrective actions and how the corrective actions
have impacted the new data.
Current charts (updated twice weekly) may be accessed at
<http://bqs.usgs.gov/bsp/FY06charts.htm>. Laboratory and district
personnel can also make their own custom QADATA retrieval to parallel
their objectives by using the QADATA Application online at
[http://bqs.usgs.gov/bsp](http://bqs.usgs.gov/bsp/mainpage.html) (select
QADATA Application button). Charts pertaining specifically to this
report can be accessed electronically by following the underlined
hyperlinks embedded within the report and associated with each analysis
discussed.
Historical QADATA Summaries may be accessed at
<http://bqs.usgs.gov/bsp/QAData.htm>.
*Tedmund M. Struzeski*
<[email protected]>
Table of Contents
Report Highlights Page
[One-Page Summary](#Highlights) 3
Detailed Description by Analyte
Nutrients
[Phosphorus, Filtered,](#nwql2331) (Low-level), Colorimetry, Labcode
2331, Parmcode 0666G 4
Trace Metals
[Strontium, Filtered,](#nwql2507) ICP-MS, Labcode 2507, Parmcode 1080I 5
Majors
[Alkalinity, Filtered,](#nwql2109) Electrometry, Labcode 2109, Parmcode
29801A 6
[Alkalinity, Whole-Water Recoverable,](#nwql0070) Electrometry, Labcode
0070, Parmcode 90410A 6
[Fluoride, Filtered,](#nwql0031) ISE, Labcode 0031, Parmcode 0950B 6
> []{#Highlights .anchor}**Report Highlights**
######### Note: Click the underlined text to access the control chart associated with the comment.
1. [Phosphorus](http://bqs.usgs.gov/bsp/QADATA_all/06Jun/Jun06NWQL00666G.gif),
filtered, colorimetry, low-level, parmcode 0666G -- Increased
variability, but less bias, starting January 2006.
2. [Alkalinity](http://bqs.usgs.gov/bsp/QADATA_all/06Jun/Jun06NWQL29801A.gif),
filtered, electrometry, parmcode 29801A -- Positive bias starting
October 2005. Recent data show 7.8% bias.
3. [Alkalinity](http://bqs.usgs.gov/bsp/QADATA_all/06Jun/Jun06NWQL90410A.gif),
whole-water recoverable, electrometry, parmcode 90410A -- Positive
bias starting September 2005. Recent data show 7.5% bias.
4. [Fluoride](http://bqs.usgs.gov/bsp/QADATA_all/06Jun/Jun06NWQL00950B.gif),
filtered, ISE, parmcode 0950B -- Increase in positive bias starting
April 2006. Data since then show 18% bias
NWQL PERFORMANCE ON IBSP SAMPLES
######### **Note: Click the underlined text in the left-hand column to access the control chart for the associated comment.**
+----------+------------------+-------------------+-------------------+
| ** | **Problem** | **NWQL** | **Corrective** |
| Nutrient | | | |
| Determin | | **Lab Comment** | **Action** |
| ations** | | | |
+==========+==================+===================+===================+
| [[]{# | **A positive | **One of the | **The analyst |
| nwql2331 | bias starting in | samples was | operating the |
| .anch | 2005 is shown | determined to be | instrument has |
| or}**Pho | improving in | a mispour by the | been instructed |
| sphorus, | February 2006. | analyst. Further | to take greater |
| F | However, | investigation is | care when |
| iltered* | variability has | now under way to | preparing samples |
| *](http: | increased as of | determine the | for analysis. We |
| //bqs.us | late-January | cause of the | are examining the |
| gs.gov/b | 2006. Since | lower-than-target | original data and |
| sp/QADAT | then, four out | values for the | are rerunning the |
| A_all/06 | of 34 results | other three | other three |
| Jun/Jun0 | (12%) are more | samples.** | samples to |
| 6NWQL006 | than\ | | determine if they |
| 66G.gif) | 4 f-pseudosigmas | | were mispoured as |
| **L | lower than the | | well. The |
| ow-level | target value.** | | examination is |
| Col | | | targeted to be |
| orimetry | | | completed by June |
| labcode | | | 16, 2006. Further |
| 2331 | | | corrective action |
| parmcode | | | may be necessary |
| 0666G** | | | depending on the |
| | | | results of the |
| | | | investigation.** |
+----------+------------------+-------------------+-------------------+
| | | | |
+----------+------------------+-------------------+-------------------+
+---------+---+------------------+-------------------+-------------------+
| **Trace | * | | **NWQL** | **Corrective** |
| Metal | * | | | |
| De | P | | **Comment** | **Action** |
| termina | r | | | |
| tions** | o | | | |
| | b | | | |
| | l | | | |
| | e | | | |
| | m | | | |
| | * | | | |
| | * | | | |
+=========+===+==================+===================+===================+
| [[]{#n | * | | **New calibration | **Analysis will |
| wql2507 | * | | standards were | be closely |
| .ancho | R | | prepared in May. | monitored until |
| r}**Str | e | | All blind samples | next QADATA |
| ontium, | s | | have been rerun | Summary is |
| Fil | u | | using the new | distributed.** |
| tered** | l | | calibration | |
| ](http: | t | | standards and no | |
| //bqs.u | s | | bias is evident | |
| sgs.gov | f | | at this time.** | |
| /bsp/QA | r | | | |
| DATA_al | o | | | |
| l/06Jun | m | | | |
| /Jun06N | t | | | |
| WQL0108 | h | | | |
| 0I.gif) | e | | | |
| * | l | | | |
| *ICP-MS | o | | | |
| labcode | w | | | |
| 2507 | c | | | |
| p | o | | | |
| armcode | n | | | |
| 1080I** | c | | | |
| | e | | | |
| | n | | | |
| | t | | | |
| | r | | | |
| | a | | | |
| | t | | | |
| | i | | | |
| | o | | | |
| | n | | | |
| | b | | | |
| | l | | | |
| | i | | | |
| | n | | | |
| | d | | | |
| | s | | | |
| | a | | | |
| | m | | | |
| | p | | | |
| | l | | | |
| | e | | | |
| | ( | | | |
| | a | | | |
| | t | | | |
| | 3 | | | |
| | 1 | | | |
| | . | | | |
| | 8 | | | |
| | u | | | |
| | g | | | |
| | / | | | |
| | L | | | |
| | ) | | | |
| | a | | | |
| | r | | | |
| | e | | | |
| | b | | | |
| | i | | | |
| | a | | | |
| | s | | | |
| | e | | | |
| | d | | | |
| | o | | | |
| | n | | | |
| | a | | | |
| | v | | | |
| | e | | | |
| | r | | | |
| | a | | | |
| | g | | | |
| | e | | | |
| | 6 | | | |
| | . | | | |
| | 4 | | | |
| | % | | | |
| | l | | | |
| | o | | | |
| | w | | | |
| | e | | | |
| | r | | | |
| | t | | | |
| | h | | | |
| | a | | | |
| | n | | | |
| | t | | | |
| | h | | | |
| | e | | | |
| | t | | | |
| | a | | | |
| | r | | | |
| | g | | | |
| | e | | | |
| | t | | | |
| | v | | | |
| | a | | | |
| | l | | | |
| | u | | | |
| | e | | | |
| | . | | | |
| | I | | | |
| | n | | | |
| | a | | | |
| | d | | | |
| | d | | | |
| | i | | | |
| | t | | | |
| | i | | | |
| | o | | | |
| | n | | | |
| | , | | | |
| | a | | | |
| | b | | | |
| | o | | | |
| | u | | | |
| | t | | | |
| | o | | | |
| | n | | | |
| | e | | | |
| | - | | | |
| | h | | | |
| | a | | | |
| | l | | | |
| | f | | | |
| | o | | | |
| | f | | | |
| | t | | | |
| | h | | | |
| | e | | | |
| | r | | | |
| | e | | | |
| | s | | | |
| | u | | | |
| | l | | | |
| | t | | | |
| | s | | | |
| | f | | | |
| | o | | | |
| | r | | | |
| | t | | | |
| | h | | | |
| | i | | | |
| | s | | | |
| | s | | | |
| | a | | | |
| | m | | | |
| | p | | | |
| | l | | | |
| | e | | | |
| | a | | | |
| | r | | | |
| | e | | | |
| | o | | | |
| | u | | | |
| | t | | | |
| | s | | | |
| | i | | | |
| | d | | | |
| | e | | | |
| | o | | | |
| | f | | | |
| | t | | | |
| | h | | | |
| | e | | | |
| | l | | | |
| | o | | | |
| | w | | | |
| | e | | | |
| | r | | | |
| | c | | | |
| | o | | | |
| | n | | | |
| | t | | | |
| | r | | | |
| | o | | | |
| | l | | | |
| | l | | | |
| | i | | | |
| | m | | | |
| | i | | | |
| | t | | | |
| | ( | | | |
| | - | | | |
| | 2 | | | |
| | f | | | |
| | - | | | |
| | p | | | |
| | s | | | |
| | e | | | |
| | u | | | |
| | d | | | |
| | o | | | |
| | s | | | |
| | i | | | |
| | g | | | |
| | m | | | |
| | a | | | |
| | s | | | |
| | ) | | | |
| | . | | | |
| | R | | | |
| | e | | | |
| | s | | | |
| | u | | | |
| | l | | | |
| | t | | | |
| | s | | | |
| | f | | | |
| | o | | | |
| | r | | | |
| | a | | | |
| | l | | | |
| | l | | | |
| | o | | | |
| | t | | | |
| | h | | | |
| | e | | | |
| | r | | | |
| | b | | | |
| | l | | | |
| | i | | | |
| | n | | | |
| | d | | | |
| | s | | | |
| | a | | | |
| | m | | | |
| | p | | | |
| | l | | | |
| | e | | | |
| | s | | | |
| | s | | | |
| | u | | | |
| | b | | | |
| | m | | | |
| | i | | | |
| | t | | | |
| | t | | | |
| | e | | | |
| | d | | | |
| | s | | | |
| | h | | | |
| | o | | | |
| | w | | | |
| | a | | | |
| | c | | | |
| | c | | | |
| | e | | | |
| | p | | | |
| | t | | | |
| | a | | | |
| | b | | | |
| | l | | | |
| | e | | | |
| | b | | | |
| | i | | | |
| | a | | | |
| | s | | | |
| | a | | | |
| | n | | | |
| | d | | | |
| | v | | | |
| | a | | | |
| | r | | | |
| | i | | | |
| | a | | | |
| | b | | | |
| | i | | | |
| | l | | | |
| | i | | | |
| | t | | | |
| | y | | | |
| | . | | | |
| | * | | | |
| | * | | | |
+---------+---+------------------+-------------------+-------------------+
| *P | | | | |
| revious | | | | |
| c | | | | |
| omments | | | | |
| for | | | | |
| str | | | | |
| ontium, | | | | |
| fi | | | | |
| ltered, | | | | |
| ICP-MS, | | | | |
| labcode | | | | |
| 2507, | | | | |
| p | | | | |
| armcode | | | | |
| 1080I* | | | | |
+---------+---+------------------+-------------------+-------------------+
| From | T | | | |
| | h | | | |
| > | e | | | |
| QADATA | d | | | |
| > | a | | | |
| Summary | t | | | |
| > April | a | | | |
| > 2006 | a | | | |
| | r | | | |
| | e | | | |
| | n | | | |
| | o | | | |
| | w | | | |
| | b | | | |
| | i | | | |
| | a | | | |
| | s | | | |
| | e | | | |
| | d | | | |
| | l | | | |
| | e | | | |
| | s | | | |
| | s | | | |
| | t | | | |
| | h | | | |
| | a | | | |
| | n | | | |
| | 5 | | | |
| | % | | | |
| | f | | | |
| | r | | | |
| | o | | | |
| | m | | | |
| | t | | | |
| | h | | | |
| | e | | | |
| | i | | | |
| | r | | | |
| | t | | | |
| | a | | | |
| | r | | | |
| | g | | | |
| | e | | | |
| | t | | | |
| | v | | | |
| | a | | | |
| | l | | | |
| | u | | | |
| | e | | | |
| | . | | | |
| | H | | | |
| | o | | | |
| | w | | | |
| | e | | | |
| | v | | | |
| | e | | | |
| | r | | | |
| | , | | | |
| | t | | | |
| | h | | | |
| | r | | | |
| | e | | | |
| | e | | | |
| | o | | | |
| | u | | | |
| | t | | | |
| | o | | | |
| | f | | | |
| | t | | | |
| | h | | | |
| | e | | | |
| | l | | | |
| | a | | | |
| | s | | | |
| | t | | | |
| | 1 | | | |
| | 3 | | | |
| | r | | | |
| | e | | | |
| | s | | | |
| | u | | | |
| | l | | | |
| | t | | | |
| | s | | | |
| | ( | | | |
| | 2 | | | |
| | 3 | | | |
| | % | | | |
| | ) | | | |
| | a | | | |
| | r | | | |
| | e | | | |
| | o | | | |
| | u | | | |
| | t | | | |
| | s | | | |
| | i | | | |
| | d | | | |
| | e | | | |
| | \ | | | |
| | - | | | |
| | 2 | | | |
| | f | | | |
| | ‑ | | | |
| | p | | | |
| | s | | | |
| | e | | | |
| | u | | | |
| | d | | | |
| | o | | | |
| | s | | | |
| | i | | | |
| | g | | | |
| | m | | | |
| | a | | | |
| | s | | | |
| | . | | | |
| | | | | |
| | A | | | |
| | n | | | |
| | a | | | |
| | l | | | |
| | y | | | |
| | s | | | |
| | i | | | |
| | s | | | |
| | s | | | |
| | h | | | |
| | o | | | |
| | u | | | |
| | l | | | |
| | d | | | |
| | b | | | |
| | e | | | |
| | c | | | |
| | l | | | |
| | o | | | |
| | s | | | |
| | e | | | |
| | l | | | |
| | y | | | |
| | m | | | |
| | o | | | |
| | n | | | |
| | i | | | |
| | t | | | |
| | o | | | |
| | r | | | |
| | e | | | |
| | d | | | |
| | u | | | |
| | n | | | |
| | t | | | |
| | i | | | |
| | l | | | |
| | t | | | |
| | h | | | |
| | e | | | |
| | n | | | |
| | e | | | |
| | x | | | |
| | t | | | |
| | Q | | | |
| | A | | | |
| | D | | | |
| | A | | | |
| | T | | | |
| | A | | | |
| | S | | | |
| | u | | | |
| | m | | | |
| | m | | | |
| | a | | | |
| | r | | | |
| | y | | | |
| | i | | | |
| | s | | | |
| | d | | | |
| | i | | | |
| | s | | | |
| | t | | | |
| | r | | | |
| | i | | | |
| | b | | | |
| | u | | | |
| | t | | | |
| | e | | | |
| | d | | | |
| | . | | | |
+---------+---+------------------+-------------------+-------------------+
| From | A | | There was | We transferred |
| | n | | increased scatter | the Sr analysis |
| > | u | | starting in | to the older |
| QADATA | p | | October and the | ICP-MS the week |
| > | w | | upward trend | of January 29th |
| Summary | a | | starting in | and have stopped |
| > F | r | | December. | running Sr on the |
| ebruary | d | | Starting in Oct. | new instrument. |
| > 2006 | t | | most of the Sr | There is not |
| | r | | results were from | enough data to |
| | e | | the new ICP-MS. | see the effect on |
| | n | | | the bias. If that |
| | d | | | fixes the problem |
| | i | | | we will not |
| | n | | | analyze Sr on the |
| | t | | | new instrument |
| | h | | | until we |
| | e | | | determine the |
| | d | | | cause of the |
| | a | | | problem and fix |
| | t | | | it. |
| | a | | | |
| | i | | | |
| | s | | | |
| | s | | | |
| | h | | | |
| | o | | | |
| | w | | | |
| | n | | | |
| | \ | | | |
| | s | | | |
| | t | | | |
| | a | | | |
| | r | | | |
| | t | | | |
| | i | | | |
| | n | | | |
| | g | | | |
| | D | | | |
| | e | | | |
| | c | | | |
| | e | | | |
| | m | | | |
| | b | | | |
| | e | | | |
| | r | | | |
| | 2 | | | |
| | 0 | | | |
| | 0 | | | |
| | 5 | | | |
| | . | | | |
| | D | | | |
| | a | | | |
| | t | | | |
| | a | | | |
| | s | | | |
| | i | | | |
| | n | | | |
| | c | | | |
| | e | | | |
| | t | | | |
| | h | | | |
| | e | | | |
| | n | | | |
| | e | | | |
| | x | | | |
| | h | | | |
| | i | | | |
| | b | | | |
| | i | | | |
| | t | | | |
| | a | | | |
| | p | | | |
| | o | | | |
| | s | | | |
| | i | | | |
| | t | | | |
| | i | | | |
| | v | | | |
| | e | | | |
| | b | | | |
| | i | | | |
| | a | | | |
| | s | | | |
| | o | | | |
| | f | | | |
| | 7 | | | |
| | . | | | |
| | 1 | | | |
| | % | | | |
| | a | | | |
| | b | | | |
| | o | | | |
| | v | | | |
| | e | | | |
| | t | | | |
| | h | | | |
| | e | | | |
| | t | | | |
| | a | | | |
| | r | | | |
| | g | | | |
| | e | | | |
| | t | | | |
| | v | | | |
| | a | | | |
| | l | | | |
| | u | | | |
| | e | | | |
| | . | | | |
+---------+---+------------------+-------------------+-------------------+
| | | | | |
+---------+---+------------------+-------------------+-------------------+
+---------+---+------------------+-------------------+-------------------+
| **Major | * | | **NWQL** | **Corrective** |
| De | * | | | |
| termina | P | | **Comment** | **Action** |
| tions** | r | | | |
| | o | | | |
| | b | | | |
| | l | | | |
| | e | | | |
| | m | | | |
| | * | | | |
| | * | | | |
+=========+===+==================+===================+===================+
| [[]{#n | * | | **Use of new | **At this time no |
| wql2109 | * | | instrumentation | corrective action |
| .anchor | T | | was initiated in | will be taken. |
| }**Alka | h | | July 2005. Prior | The inflection |
| linity, | e | | to the new | point technique |
| Fil | d | | instrumentation, | for determining |
| tered** | a | | spike recoveries | concentration is |
| ](http: | t | | showed a negative | being |
| //bqs.u | a | | bias. After the | investigated for |
| sgs.gov | i | | new | use in this |
| /bsp/QA | n | | instrumentation | method. The |
| DATA_al | d | | was initiated the | investigation is |
| l/06Jun | i | | bias became | targeted to be |
| /Jun06N | c | | positive with | completed by |
| WQL2980 | a | | decreasing | October 1, |
| 1A.gif) | t | | magnitude and | 2006.** |
| * | e | | more scatter. | |
| *Electr | a | | Recoveries for | |
| ometric | p | | reference | |
| labcode | o | | material M-152 | |
| 2109 | s | | (target value = | |
| p | i | | 6.00 mg/L) from | |
| armcode | t | | April 2006 to | |
| 2 | i | | present show a | |
| 9801A** | v | | 0.2% positive | |
| | e | | bias. M-168 | |
| | b | | recoveries | |
| | i | | (target value = | |
| | a | | 28.2 mg/L) from | |
| | s | | March to present | |
| | . | | show a 3.4% | |
| | R | | positive bias.** | |
| | e | | | |
| | s | | | |
| | u | | | |
| | l | | | |
| | t | | | |
| | s | | | |
| | f | | | |
| | r | | | |
| | o | | | |
| | m | | | |
| | s | | | |
| | a | | | |
| | m | | | |
| | p | | | |
| | l | | | |
| | e | | | |
| | s | | | |
| | a | | | |
| | n | | | |
| | a | | | |
| | l | | | |
| | y | | | |
| | z | | | |
| | e | | | |
| | d | | | |
| | a | | | |
| | s | | | |
| | o | | | |
| | f | | | |
| | N | | | |
| | o | | | |
| | v | | | |
| | e | | | |
| | m | | | |
| | b | | | |
| | e | | | |
| | r | | | |
| | 2 | | | |
| | 0 | | | |
| | 0 | | | |
| | 5 | | | |
| | a | | | |
| | r | | | |
| | e | | | |
| | b | | | |
| | i | | | |
| | a | | | |
| | s | | | |
| | e | | | |
| | d | | | |
| | o | | | |
| | n | | | |
| | a | | | |
| | v | | | |
| | e | | | |
| | r | | | |
| | a | | | |
| | g | | | |
| | e | | | |
| | 7 | | | |
| | . | | | |
| | 8 | | | |
| | % | | | |
| | a | | | |
| | b | | | |
| | o | | | |
| | v | | | |
| | e | | | |
| | t | | | |
| | h | | | |
| | e | | | |
| | t | | | |
| | a | | | |
| | r | | | |
| | g | | | |
| | e | | | |
| | t | | | |
| | v | | | |
| | a | | | |
| | l | | | |
| | u | | | |
| | e | | | |
| | * | | | |
| | * | | | |
| | . | | | |
+---------+---+------------------+-------------------+-------------------+
| | | | | |
+---------+---+------------------+-------------------+-------------------+
| [[]{#n | * | | **Use of new | **At this time no |
| wql0070 | * | | instrumentation | corrective action |
| .anchor | T | | was initiated in | will be taken. |
| }**Alka | h | | July 2005. Prior | The inflection |
| linity, | e | | to the new | point technique |
| Whol | d | | instrumentation, | for determining |
| e-Water | a | | spike recoveries | concentration is |
| Recove | t | | showed a negative | being |
| rable** | a | | bias. After the | investigated for |
| ](http: | i | | new | use in this |
| //bqs.u | n | | instrumentation | method. The |
| sgs.gov | d | | was initiated the | investigation is |
| /bsp/QA | i | | bias became | targeted to be |
| DATA_al | c | | positive with | completed by |
| l/06Jun | a | | decreasing | October 1, |
| /Jun06N | t | | magnitude and | 2006.** |
| WQL9041 | e | | more scatter. | |
| 0A.gif) | a | | Recoveries for | |
| * | p | | reference | |
| *Electr | o | | material M-152 | |
| ometric | s | | (target value = | |
| labcode | i | | 6.00 mg/L) from | |
| 0070 | t | | April 2006 to | |
| p | i | | present show a | |
| armcode | v | | 0.2% positive | |
| 9 | e | | bias. M-168 | |
| 0410A** | b | | recoveries | |
| | i | | (target value = | |
| | a | | 28.2 mg/L) from | |
| | s | | March to present | |
| | . | | show a 3.4% | |
| | R | | positive bias.** | |
| | e | | | |
| | s | | | |
| | u | | | |
| | l | | | |
| | t | | | |
| | s | | | |
| | f | | | |
| | r | | | |
| | o | | | |
| | m | | | |
| | s | | | |
| | a | | | |
| | m | | | |
| | p | | | |
| | l | | | |
| | e | | | |
| | s | | | |
| | a | | | |
| | n | | | |
| | a | | | |
| | l | | | |
| | y | | | |
| | z | | | |
| | e | | | |
| | d | | | |
| | a | | | |
| | s | | | |
| | o | | | |
| | f | | | |
| | N | | | |
| | o | | | |
| | v | | | |
| | e | | | |
| | m | | | |
| | b | | | |
| | e | | | |
| | r | | | |
| | 2 | | | |
| | 0 | | | |
| | 0 | | | |
| | 5 | | | |
| | a | | | |
| | r | | | |
| | e | | | |
| | b | | | |
| | i | | | |
| | a | | | |
| | s | | | |
| | e | | | |
| | d | | | |
| | o | | | |
| | n | | | |
| | a | | | |
| | v | | | |
| | e | | | |
| | r | | | |
| | a | | | |
| | g | | | |
| | e | | | |
| | 7 | | | |
| | . | | | |
| | 5 | | | |
| | % | | | |
| | a | | | |
| | b | | | |
| | o | | | |
| | v | | | |
| | e | | | |
| | t | | | |
| | h | | | |
| | e | | | |
| | t | | | |
| | a | | | |
| | r | | | |
| | g | | | |
| | e | | | |
| | t | | | |
| | v | | | |
| | a | | | |
| | l | | | |
| | u | | | |
| | e | | | |
| | * | | | |
| | * | | | |
| | . | | | |
+---------+---+------------------+-------------------+-------------------+
| | | | | |
+---------+---+------------------+-------------------+-------------------+
| [[]{#n | * | | **The upward | **The high bias |
| wql0031 | * | | shift in bias | evident in April |
| .anch | T | | seen in the BQS | seems to have |
| or}**Fl | h | | charts was not | diminished. The |
| uoride, | e | | evident in the | Nutrient Unit |
| Fil | d | | online QC charts | will closely |
| tered** | a | | for the months of | monitor line |
| ](http: | t | | April and May. | performance and |
| //bqs.u | a | | The analytical | BQS charts to see |
| sgs.gov | e | | system, however, | what effect the |
| /bsp/QA | x | | has been | change of |
| DATA_al | h | | thoroughly | electrodes has |
| l/06JUN | i | | cleaned several | made. If |
| /JUN06N | b | | times and all | necessary, new |
| WQL0095 | i | | pump tubing | standards will be |
| 0B.gif) | t | | replaced. A new | made.** |
| **\ | a | | reference and | |
| ISE | m | | fluoride | |
| labcode | a | | electrode were | |
| 0031 | r | | installed on May | |
| p | k | | 17.** | |
| armcode | e | | | |
| 0950B** | d | | | |
| | u | | | |
| | p | | | |
| | w | | | |
| | a | | | |
| | r | | | |
| | d | | | |
| | s | | | |
| | h | | | |
| | i | | | |
| | f | | | |
| | t | | | |
| | s | | | |
| | t | | | |
| | a | | | |
| | r | | | |
| | t | | | |
| | i | | | |
| | n | | | |
| | g | | | |
| | A | | | |
| | p | | | |
| | r | | | |
| | i | | | |
| | l | | | |
| | 2 | | | |
| | 0 | | | |
| | 0 | | | |
| | 6 | | | |
| | w | | | |
| | i | | | |
| | t | | | |
| | h | | | |
| | s | | | |
| | o | | | |
| | m | | | |
| | e | | | |
| | i | | | |
| | m | | | |
| | p | | | |
| | r | | | |
| | o | | | |
| | v | | | |
| | e | | | |
| | - | | | |
| | m | | | |
| | e | | | |
| | n | | | |
| | t | | | |
| | s | | | |
| | h | | | |
| | o | | | |
| | w | | | |
| | n | | | |
| | i | | | |
| | n | | | |
| | M | | | |
| | a | | | |
| | y | | | |
| | . | | | |
| | R | | | |
| | e | | | |
| | s | | | |
| | u | | | |
| | l | | | |
| | t | | | |
| | s | | | |
| | f | | | |
| | r | | | |
| | o | | | |
| | m | | | |
| | s | | | |
| | a | | | |
| | m | | | |
| | p | | | |
| | l | | | |
| | e | | | |
| | s | | | |
| | a | | | |
| | n | | | |
| | a | | | |
| | l | | | |
| | y | | | |
| | z | | | |
| | e | | | |
| | d | | | |
| | a | | | |
| | s | | | |
| | A | | | |
| | p | | | |
| | r | | | |
| | i | | | |
| | l | | | |
| | a | | | |
| | r | | | |
| | e | | | |
| | b | | | |
| | i | | | |
| | a | | | |
| | s | | | |
| | e | | | |
| | d | | | |
| | o | | | |
| | n | | | |
| | a | | | |
| | v | | | |
| | e | | | |
| | r | | | |
| | a | | | |
| | g | | | |
| | e | | | |
| | 1 | | | |
| | 8 | | | |
| | % | | | |
| | a | | | |
| | b | | | |
| | o | | | |
| | v | | | |
| | e | | | |
| | t | | | |
| | h | | | |
| | e | | | |
| | t | | | |
| | a | | | |
| | r | | | |
| | g | | | |
| | e | | | |
| | t | | | |
| | v | | | |
| | a | | | |
| | l | | | |
| | u | | | |
| | e | | | |
| | * | | | |
| | * | | | |
| | . | | | |
+---------+---+------------------+-------------------+-------------------+
| | | | | |
+---------+---+------------------+-------------------+-------------------+
######
|
en
|
markdown
|
890753
|
# Presentation: 890753
## MiniBooNE: Status and Prospects
- Eric Prebys, FNAL/BooNE Collaboration
## The MiniBooNE Collaboration
- Y.Liu, I.Stancu*University of Alabama*
- S.Koutsoliotas*Bucknell University*
- E.Hawker, R.A.Johnson, J.L.Raaf*University of Cincinnati*
- T.Hart, R.H.Nelson, E.D.Zimmerman*University of Colorado*
- A.A.Aguilar-Arevalo, L.Bugel, J.M.Conrad, J.Link, J.Monroe, D.Schmitz, M.H.Shaevitz, M.Sorel, G.P.Zeller*Columbia University*
- D.Smith*Embry Riddle Aeronautical University*
- L.Bartoszek, C.Bhat, S.J.Brice, B.C.Brown, D.A.Finley, R.Ford, F.G.Garcia, P.Kasper, T.Kobilarcik, I.Kourbanis, A.Malensek, W.Marsh, P.Martin, F.Mills, C.Moore, E.Prebys, A.D.Russell, P.Spentzouris, R.Stefanski, T.Williams*Fermi National Accelerator Laboratory*
- D.Cox, A.Green, T.Katori, H.Meyer, R.Tayloe*Indiana University*
- G.T.Garvey, C.Green, W.C.Louis, G.McGregor, S.McKenney, G.B.Mills, H.Ray, V.Sandberg, B.Sapp, R.Schirato, R.Van de Water, N.L.Walbridge, D.H.White*Los Alamos National Laboratory*
- R.Imlay, W.Metcalf, S.Ouedraogo, M.Sung, M.O.Wascko*Louisiana State University*
- J.Cao, Y.Liu, B.P.Roe, H.J.Yang*University of Michigan*
- A.O.Bazarko, P.D.Meyers, R.B.Patterson, F.C.Shoemaker, H.A.Tanaka*Princeton University*
- P.Nienaber*St. Mary's University of Minnesota*
- B.T.Fleming*Yale University*
## Outline
- State of neutrino mixing measurements
- Without LSND
- LSND and Karmen
- Experiment
- Beam
- Detector
- Calibration and cross checks
- Analysis
- Resent Results
- Future Plans and outlook
- Anti-neutrino running
- Path to oscillation results
## Theory of Neutrino Oscillations
- Neutrinos are produced and detected as *weak eigenstates* (e ,, or ).
- These can be represented as *linear combination of mass eigenstates*.
- If the above matrix is not diagonal *and* the masses are not equal, then the net weak flavor content will *oscillate *as the neutrinos propagate.
**Example: **if there is mixing between the e and :then the probability that a e will be detected as a after a distance *L* is:
- Distance in *km*
- Energy in GeV
- Mass eigenstates
- Flavor eigenstates
- Only measure *magnitude* of the *difference* of the squares of the masses.
## Probing Neutrino Mass Differences
- & Reactors
- Accelerators use decay to *directly* probe e
- Reactors use use *disappearance* to probe e
- Cerenkov detectors directly measure and e content in atmospheric neutrinos. Fit to e mixing hypotheses
- Solar neutrino experiments typically measure the disappearance of e.
- Also probe with “long baseline” accelerator and reactor experiments
## SuperKamiokande Atmospheric Result
- Huge water Cerenkov detector can directly measure and e signals.
- Use azimuthal dependence to measure distance traveled (through the Earth)
- Positive result announced in 1998.
- Consistent with mixing.
- Outer detector
- Inner detector
## SNO Solar Neutrino Result
- Looked for Cerenkov signals in a large detector filled with heavy water.
- Focus on 8B neutrinos
- Used 3 reactions:
* ****e*+*d**p+p+e**-*: only sensitive to ***e*
- ***x*+*d**p+n+****x*: equally sensitive to ***e *,***** *,****
* ****x*+ *e**-* ***x*+ *e**-*: 6 times more sensitive to ***e *than ***** *,*****d*
- Consistent with initial full SSM flux of ***e*’s mixing to ***** *,******
- Just SNO
- SNO+others
## Reactor Experimental Results
- Single reactor experiments (Chooz, Bugey, etc). Look for ***e* disappearance: all negative
- KamLAND (single scintillator detector looking at ALL Japanese reactors): ***e* disappearance consistent with mixing.
## K2K
- First “long baseline” accelerator experiment
- Beam from KEK PS to Kamiokande, 250 km away
- Look for disappearance (atmospheric “problem”)
- Results consistent with mixing
- Best fit
- No mixing
- Allowed Mixing Region
## Three Generation Mixing (Driven by experiments listed)
- General Mixing Parameterization
- CP violating phase
- Almost diagonal
- Third generation weakly coupled to first two
- “Wolfenstein Parameterization”
- Mixing large
- No easy simplification
- Think of mass and weak eigenstates as totally separate
## Best Three Generation Picture
## The LSND Experiment (1993-1998)
- Signature
- Cerenkov ring from electron
- Delayed from neutron capture
- ~30 m
- Energy 20-50 MeV
- mix
## LSND Result
- (Soudan, Kamiokande,
- MACRO, Super-K)
- (Homestake, SAGE,
- GALLEX, Super-K
- SNO, KamLAND)
- Excess Signal:
- Best fit:
- Only exclusive appearance result to date
- Problem: m2 ~ 1 eV2 not consistent with other results with simple three generation mixing
## Possibilities
- 4 neutrinos?
- We know from Z lineshape there are only 3 active flavors
- Sterile?
- CP or CPT Violation?
- More exotic scenarios?
- LSND Wrong?
- Can’t throw it out just because people don’t like it.
## Karmen II Experiment: not quite enough
- Pulse 800 MeV proton beam (ISIS)
- 17.6 m baseline
- 56 tons of liquid scintillator
- Factor of 7 less statistical reach than LSND
- -> NO SIGNAL
- Combined analysis still leaves an allowed region
- Combined
## Role of MiniBooNE
- Boo(ster) N(eutrino) E(xperiment)
- Full “BooNE” would have two detectors
- Primary Motivation: Absolutely confirm or refute LSND result
- Optimized for L/E ~ 1
- Higher energy beam -> Different systematics than LSND
- Timeline
- Proposed: 12/97
- Began Construction: 10/99
- Completed: 5/02
- First Beam: 8/02
- Began to run concurrently with NuMI: 3/05
- Presently ~7E20 proton on target in neutrino mode
- More protons that all other users in the 35 year history of Fermilab combined!
- Oscillation results: 2006
## MiniBooNE Neutrino Beam (not to scale)
- 8 GeV Protons
- ~ 7E16 p/hr max
- ~ 1 detected neutrino/minute
- L/E ~ 1
**FNAL****Booster**
**Be Target****and Horn**
**“****Little Muon Counter” (LMC): to understand K flux**
**50 m Decay Region**
**500m dirt**
**Detector**
## Detector
- 950,000 l of pure mineral oil
- 1280 PMT’s in inner region
- 240 PMT’s outer veto region
- Light produced by Cerenkov radiation and scintillation
- Light barrier
- Trigger:
- All beam spills
- Cosmic ray triggers
- Laser/pulser triggers
- Supernova trigger
## Neutrino Detection/Particle ID
- Important Background!!!
## Delivering Protons
- Requirements of MiniBooNE greatly exceed the historical performance of the 30+ year old 8 GeV Booster, pushes...
- Average repetition rate
- Above ground radiation
- Radiation damage and activation of accelerator components
- Intense Program to improvethe Booster
- Shielding
- Loss monitoring and analysis
- Lattice improvements (result of Beam Physics involvement)
- Collimation system
- Very challenging to continue to operate 8 GeV line during NuMI/MINOS operation
- Once believed imposible
- Element of lab’s “Proton Plan”
- Goal to continue to deliver roughly 2E20 protons per years to the 8 GeV program for at least the next few years.
## Running MiniBooNE with NuMI
- Note: these projections do *not* take into account the collider turning off in 2009
- NuMI rates would go up at least 20%, possible higher
- Major operational changes could make continued operation of 8 GeV line very difficult
- NuMI/MINOS
- MiniBooNE
## Beam to MiniBooNE
- NuMI Running
- NuMI Problems
- ~7 x 1020 protons
## Analysis: Modeling neutrino flux
- Analysis: Modeling neutrino flux
- Production
- GEANT4 model of target, horn, and beamline
- MARS for protons and neutrons
- Sanford-Wang fit to production data for and K
- Mesons allowed to decay in model of decay pipe.
- Retain neutrinos which point at target
- Soon hope to improve model with data from the HARP experiment taken from a target identical to MiniBooNE
## Interactions
- Cross sections
- Based on NUANCE 3 Monte Carlo
- Use NEUT and NEUEN as cross checks
- Theoretical input:
- Llewellyn-Smith free neucleon cross sections
- Rein-Sehgal resonant and coherent cross-sections
- Bodek-Yang DIS at low-Q2
- Standard DIS parametrization at high Q2
- Fermi-gas model
- Final state interaction model
- Detector
- Full GEANT 3.21 model of detector
- Includes detailed optical model of oil
- Reduced to raw PMT hits and analyzed in the same way as real data
- MiniBooNE
## Background
- If the LSND best fit is accurate, only about a third of our observed rate will come from oscillations
- Backgrounds come from both intrinsic e and misidentified
- Energy distribution can help separate
## Blindness
- Given the low signal to background ratio and the inherent difficulty of the analysis, there are many opportunities for unintentional bias
- Therefore, we consider a blind analysis essential
- General philosophy: guilty until proven innocent
- Events go “into the box” unless they are specifically tagged as being non-signal events, e.g
- Muons
- Single -like ring
- Topological cuts
- 0
- No Michel electron
- Clear two-ring fit, both with E>40 MeV
- Will only look at remaining data when we are confident that we model the beam and detector well.
- Note: This still allows us to look at the majority of our data!
## Characterizing the Detector
- Laser Calibration
- Laser pulses illuminate one of 4 flasks which scatter light isotropically
- Used to understand PMT response
- Cosmic Muons
- Muon Tracker used in conjunction with “cubes” to trigger on a particular endpoint (energy)
- Vital in understanding energy scale
## The Detector (cont’d)
- Electrons from muon decay (Michel electrons)
- Vital for understanding signal events.
- 0 Events
- Help to understand higher energy e
- Help fix energy scale
## Selecting Neutrino Events
- Collect data from -5 to +15 usec around each beam spill trigger.
- Identify individual “events” within this window based on PMT hits clustered in time.
- Time (ns)
- Time (ns)
- Time (ns)
- No cuts
- Veto hits < 6
- Veto hits<6tank hits>200
- 1600 ns spill
## Muon Reconstruction
- Muon reconstruction is based on a fit to PMT’s clustered in time
- Position and time of arrival are used to reconstuct the origin, direction and path length of the muon track segment
- Cos of angle of PMT hits relative to beam
## Charged Current Quasi-elastic Events
- Veto hits < 6
- Tank hits > 200
- PMT position/time fit consistent with muon
- Angular distribution
## Recent Results: (CCPiP)*
- Important for understanding backgrounds and nuclear cross sections.
- MiniBooNE
- *analysis by M. Wascko and J. Monroe
## Signature of CCPiP Event
- Look for exactly three events:
- First promptly with the beam
- Second two within the ~15 usec trigger window
- First event consistent with CC muon
- Second two consistent with Michel decays.
- (only charged tracks shown)
- Muon generates Cerenkov ring and stops
- Muon decay (“Michel”) electrons
## CCPiP Results
- CCPiP/CCQE ratio
- Corrected for efficiencies
## Additional Cross-checks: Neutrinos from NuMI beamline*
- NuMI decay pipe extends to almost just below the MiniBooNE detector
- *primarily analysis of A. Aguilar
## Path to “opening the box”
- Our present sample neutrino data is sufficient to release an oscillation result
- We are not yet confident enough in our analysis to do so
- Continue to refine Monte Carlo until open box samples agree within errors
- HARP data on MiniBooNE target an important constraint
- Generate systematic error matrix by varying all important production and optical model parameters (“Unisim Monte Carlo”).
- When confident, practice on a fake oscillation signal.
## Experimental Sensitivity
- Experimental Sensitivity
- No signal
- Can exclude most of LSND at 5
- Signal
- Can achieve good m2 separation
## Accommodating a Positive Signal
- We know from LEP that there are only 3 active, light neutrino flavors.
- If MiniBooNE confirms the LSND results, it might be evidence for the existence of sterile neutrinos
## Everybody Loves a Mystery
- 3+2 Sterile neutrinos
- Sorel, Conrad, and Shaevitz (hep-ph/0305255)
- MaVaN & 3+1
- Hung (hep-ph/0010126)
- Sterile neutrinos
- Kaplan, Nelson, and Weiner (hep-ph/0401099)
- Explain Dark Energy?
- CPT violation and 3+1 neutrinos
- Barger, Marfatia & Whisnant (hep-ph/0308299)
- Explain matter/antimatter asymmetry
- Lorentz Violation
- Kostelecky & Mewes (hep-ph/0406035)
- Extra Dimensions
- Pas, Pakvasa, & Weiler (hep-ph/0504096)
- Sterile Neutrino Decay
- Palomares-Ruiz, Pascoli & Schwetz (hep-ph/0505216)
## Near Future: MiniBooNE antineutrino running
- Inherently interesting
- Not much anti-neutrino data
- Directly address LSND signal
- Important for understanding our own systematics and those of other experiments
- Problems:
- Cross section not well known
- Lower rate (about 1⁄4)
- Wrong sign background
- Example of new physics:
- As we speak, MiniBooNE is switching the horn polarity to run in antineutrino mode
## Conclusions and Outlook
- MiniBooNE has been running for over three years, and continues to run well in the NuMI era
- The analysis tools are well developed and being refined to achieve the quality necessary to release the result of our blind analysis
- Recent results for CCQE and CCPiP give us confidence on our understanding of the detector and data.
- Look forward to many interesting results in 2006
|
en
|
converted_docs
|
547757
|
**Before the**
**Federal Communications Commission**
**Washington, D.C. 20554**
+----------------------------------+---+------------------------------+
| In the Matter of | * | File No. SLD-153862 |
| | * | |
| Request for Review of the | ) | CC Docket No. 96-45 |
| | * | |
| Decision of the | * | CC Docket No. 97-21 |
| | | |
| Universal Service Administrator | * | |
| by | * | |
| | ) | |
| Fairfax County Public Library | * | |
| | * | |
| Fairfax, Virginia | | |
| | * | |
| Federal-State Joint Board on | * | |
| | ) | |
| Universal Service | * | |
| | * | |
| Changes to the Board of | | |
| Directors of the | * | |
| | * | |
| National Exchange Carrier | ) | |
| Association, Inc. | * | |
| | * | |
| | | |
| | * | |
| | * | |
| | ) | |
| | * | |
| | * | |
| | | |
| | * | |
| | * | |
| | ) | |
| | * | |
| | * | |
| | | |
| | * | |
| | * | |
| | ) | |
| | * | |
| | * | |
| | | |
| | * | |
| | * | |
| | ) | |
| | * | |
| | * | |
| | | |
| | * | |
| | * | |
| | ) | |
| | * | |
| | * | |
| | | |
| | * | |
| | * | |
| | ) | |
| | \ | |
| | ) | |
| | \ | |
| | ) | |
| | \ | |
| | ) | |
| | * | |
| | * | |
+----------------------------------+---+------------------------------+
**ORDER**
**Adopted: March 28, 2001 Released: March 29, 2001**
By the Accounting Policy Division, Common Carrier Bureau:
1. In this Order, we deny a Request for Review filed by the Fairfax
County Public Library (Fairfax), Fairfax, Virginia,[^1] seeking
review of a funding commitment decision issued by the Schools and
Libraries Division (SLD) of the Universal Service Administrative
Company (Administrator) pursuant to a funding request for internal
connections.[^2]
2. Under the schools and libraries universal service support mechanism,
eligible schools, libraries, and consortia that include eligible
schools and libraries, may apply for discounts for eligible
telecommunications services, Internet access, and internal
connections.[^3] The instant appeal arises from SLD's denial of
Fairfax's Year 2 application for discounted internal connections,
Funding Request Numbers (FRNs) 298505 and 298506, on the grounds
that a significant portion of Fairfax's funding requests included
products ineligible for discounts.[^4] In particular, SLD stated
that speakerphones are ineligible for discounts. Fairfax filed an
appeal with SLD on November 19, 1999.[^5] SLD denied Fairfax's
appeal on May 5, 2000, reiterating that a significant portion of
Fairfax's funding request included products ineligible for
discounts.[^6]
3. Fairfax filed the instant appeal with the Commission on May 22,
2000.[^7] In this appeal, Fairfax states that SLD's decision to deny
Fairfax's funding request was arbitrary and should be reversed. In
particular, Fairfax argues that: (1) SLD unfairly penalized Fairfax
simply because it submitted separate funding requests, on a
site-specific basis, rather than requesting all discounts for
services in one funding request; (2) Fairfax made a good-faith
effort to exclude ineligible services and would have excluded the
speakerphones in question if they had been cited on the list of
eligible and ineligible services that was published by SLD; (3) it
is arbitrary to reject funding requests based on a threshold of 30
percent ineligibility, especially where estimates are concerned;
and (4) SLD has no statutory authority to deny funding for otherwise
eligible internal connections just because a single component may be
ineligible.[^8]
4. We have reviewed Fairfax's appeal and conclude that SLD properly
denied Fairfax's applications for discounts. We reject Fairfax's
argument that it was unfairly penalized for submitting separate
funding requests. Fairfax was well aware of SLD's policies regarding
ineligible services,[^9] but nonetheless chose to file separate
funding requests, further exposing itself to the possibility that
certain locations could be denied funding while others might be
granted funds. Fairfax concedes that it filed separate funding
requests for accounting and budgetary convenience, not because it
was required to do so by SLD.[^10]
5. We also reject Fairfax's claim that it could not have reasonably
known that speakerphones were ineligible for discounts because they
were not cited in SLD's list of eligible and ineligible services. In
the *Universal Service Order*, the Commission determined that
support for internal connections will not be available to finance
the purchase of equipment that is not needed to transport
information to individual classrooms, such as personal computers,
fax machines or modems.[^11] Consistent with this determination, the
Commission's Common Carrier Bureau (Bureau) issued a Public Notice
stating that "telephone handsets" are not eligible for support.[^12]
In its Request for Review, Fairfax concedes that its "E-Rate
consultant advised it that the speakerphones would probably be
excluded as ineligible."[^13] In particular, Fairfax's consultant,
Funds for Learning, advised Fairfax that "under the SLD rules, the
costs of speaker phones should \[be\] excluded. . . . \[T\]he
requests for the Kingstowne and Great Falls libraries should be
reduced by \$6,035.63 each."[^14] Given the clear Commission
precedent, we find no merit in Fairfax's argument that it could not
have known that speakerphones were ineligible for discounts.
6. We also reject Fairfax's allegation that it is arbitrary to reject
funding requests based on a threshold of 30 percent ineligibility.
The \"30 percent policy\" is not a Commission rule, but rather is an
SLD operating procedure established pursuant to Commission
policy.[^15] This operating procedure, used during SLD\'s
application review process, enables SLD to efficiently process
requests for funding for services that are eligible for discounts
but that also include some ineligible components. If 30 percent or
less of the request is for funding of ineligible services, SLD
normally will consider the application and issue a funding
commitment for the eligible services. If more than 30 percent of the
request is for funding of ineligible services, SLD will deny the
funding request in its entirety. The 30 percent policy allows SLD to
efficiently process requests for funding that contain only a small
amount of ineligible services without expending significant fund
resources working with applicants that are requesting funding of
ineligible services. Thus, contrary to Fairfax's claim of
arbitrariness, we find SLD's 30 percent policy to be reasonable and
prudent.
7. Finally, we reject Fairfax's claim that SLD has no statutory
authority to deny funding for otherwise eligible internal
connections just because a single component may be ineligible. SLD
implements the schools and libraries universal service mechanism
under Commission guidance. The Commission's rules repeatedly state
that universal service funds support only eligible services.[^16] In
this vein, the Commission has stated that schools and libraries may
not receive full support for contracts that provide only a single
price for a package that bundles services eligible for support with
those that are not eligible for support.[^17] Applicants are
instructed that any ineligible services must be identified and
segregated from services eligible for funding.[^18] In its FCC Form
471, Fairfax included a single price for a contract that includes
both eligible and ineligible products. Given Commission rules and
precedent, SLD properly denied Fairfax's entire funding request.
Therefore, SLD clearly has authority, under these limited
circumstances, to deny funding requests that include both eligible
and ineligible services, and we reject Fairfax's claims to the
contrary.
8. ACCORDINGLY, IT IS ORDERED, pursuant to authority delegated under
sections 0.91, 0.291, and 54.722(a) of the Commission's rules, 47
C.F.R. §§ 0.91, 0.291, and 54.722(a), that the Request for Review
filed on May 22, 2000 by Fairfax County Public Schools, Fairfax,
Virginia, IS DENIED.
FEDERAL COMMUNICATIONS COMMISSION
Mark G. Seifert
Deputy Chief, Accounting Policy Division
> Common Carrier Bureau
[^1]: *Request for Review by Fairfax County Public Library, of Decision
of Universal Service Administrato*r, CC Docket Nos. 97-21 and 96-45,
filed May 22, 2000 (Request for Review).
[^2]: *See* Letter from Schools and Libraries Division, Universal
Service Administrative Company, to W. Joseph Coleman Jr., Fairfax
County Public Library, issued October 26, 1999 (Funding Commitment
Decision Letter); Letter from Schools and Libraries Division,
Universal Service Administrative Company, to W. Joseph Coleman Jr.,
Fairfax County Public Library, issued May 5, 2000 (Administrator's
Decision on Appeal).
[^3]: 47 C.F.R. §§ 54.502, 54.503.
[^4]: *See* Funding Commitment Decision Letter at 4-5.
[^5]: Letter from W. Joseph Coleman Jr., Fairfax County Public Library,
to Schools and Libraries Division, Universal Service Administrative
Company, filed November 19, 1999 (SLD Letter of Appeal).
[^6]: *See* Administrator's Decision on Appeal at 1.
[^7]: *See* Request for Review.
[^8]: *See id.* at 3-5.
[^9]: *See id.* at 3, 5.
[^10]: *See id.* at 2.
[^11]: *See Federal-State Joint Board on Universal Service*, CC Docket
No. 96-45, Report and Order, 12 FCC Rcd 8776, 9021, para. 460 (1997)
(Universal Service Order), as corrected by *Federal-State Joint
Board on Universal Service*, CC Docket No. 96-45, Errata, FCC 97-157
(rel. June 4, 1997), *affirmed in part in Texas Office of Public
Utility Counsel v. FCC*, 183 F.3d 393 (5th Cir. 1999), *cert. denied
in Celpage, Inc. v. FCC*, 120 S. Ct. 2212 (May 30, 2000), *cert.
denied in AT&T Corp. v. Cincinnati Bell Tel. Co.*, 120 S. Ct. 2237
(June 5, 2000), *cert. dismissed, GTE Service Corp. v. FCC*, 121 S.
Ct. 423 (November 2, 2000).
[^12]: *See Common Carrier Bureau Reiterates Services Eligible for
Discounts to Schools and Libraries*, CC Docket No. 96-45, Public
Notice, DA 98-1110 (rel. Jun. 11, 1998).
[^13]: Request for Review at 3.
[^14]: Facsimile Transmission from Sara Fitzgerald, Funds for Learning,
to Joe Spakowski, Fairfax County Public Library (transmitted Oct.
13, 1999).
[^15]: *See Changes to the Board of Directors of the National Exchange
Carrier Association, Inc., Federal-State Joint Board on Universal
Service*, CC Docket Nos. 97-21 and 96-45, Third Report and Order in
CC Docket No. 97-21 and Fourth Order on Reconsideration in CC Docket
No. 97-21 and Eighth Order on Reconsideration in CC Docket No.
96-45, 13 FCC Rcd 25058 (1998).
[^16]: 47 C.F.R. §§54.502, 54.503.
[^17]: *See Universal Service Order*, 12 FCC Rcd at 9022, para. 461-62.
[^18]: *See* Instructions for Completing the Schools and Libraries
Universal Service Services Ordered and Certification Form (FCC Form
471), OMB Approval No. 3060-0806 (December 1998) at pp. 15-16.
|
en
|
converted_docs
|
542513
|
Slide 1
**Ua mau ke ea o ka aina i ka pono**
**The life (sovereignty) of the land is perpetuated in (by)
righteousness**
**Maintaining Momentum!!**
**Laura Thielen**
Slide 2
**Change in Governor; Change in Party**
**Former Gov. Ben Cayetano, Democrat to Current Gov. Linda Lingle,
Republican**
**How This Has Affected Homelessness in Hawaii**
Slide 3
**Honolulu Mayoral Race Heats Up!!**
This slide includes photos of the Mayoral candidates.
Slide 4
**The Ideal Homeless Policy Academy Team**
- Representative of the Governor's office
- President of the State Senate
- Speaker of the House of Representatives
- State Department directors
- City and county representatives
- Veterans Administration
- HUD representative
- Representatives from local homeless coalition
- Community members
Slide 5
**The Reality of a Homeless Policy Academy Team**
**Year 1**:
- State Department representatives
- HUD
- VA
- Homeless providers
**Year 2: Change in Administration, Change in Representation**
- State Department representatives
- City representatives
- HUD
- Veterans Administration
- Homeless services providers
Worker Bees Make It Work!!!
Slide 6
**Key Advocates**
- Dedicated service providers
- Media
- Former Governor
- New Governor
- Cabinet level staff
- Department level leadership
Slide 7
**Challenges/Lessons Learned**
- Keep working on initiatives
- Continuously educate Government officials
- Continuously update the media and get them involved
- Get involved with national trainers
- Don't give up despite disappointments
- Maintain pressure on administration
- Be creative
- Be willing to work with all members of
administration/legislature/council no matter what their party
affiliation or past record
Slide 8
**Remember the Stakeholders**
This slide includes photos of Hawaii's homeless
Slide 9
**Develop a Realistic Plan**
- Work with service providers
- Collect relevant data
- Continuously update plan
- Have a strong confident facilitator
- Participate in legislative process to make changes
- Focus on small benchmarks to reach larger goals
- Get the plan heard through the media
- Always keep the end goal in sight -- ending chronic homelessness
Slide 10
**Keeping Homelessness On the Front Page**
- The Honolulu Advertiser
- Starbulletin.com
- Downtown Planet
- Pacific Business News
- Letters to the Editor - 30
- Editorials -- 26
- Articles -- 75
- Dedicated Writers -- Several
Slide 11
**In Hawaii, These Were the Top Stories of 2003**
According to local Newspaper, The Honolulu Advertiser
1. Construction Boom
2. Community Warfare on Crystal Methamphetamine
3. Bus Strike
4. Illegal Mayoral Contributions
5. President of the University of Hawaii, Evan Dobelle
6. Assault on Hawaiian Interests
7. State School System
8. UH football coach June Jones makes more than \$800,000
9. Hawaiian Airlines files for bankruptcy
10. Governor criticizes State Supreme Court
11. Homelessness
> -Honolulu Advertiser, December 28, 2003
Slide 12
**You have the ability to maintain momentum!**
.
|
en
|
all-txt-docs
|
440911
|
SOUTH CENTRAL AND SOUTHEAST COLORADO AREA FORECAST DISCUSSION
NATIONAL WEATHER SERVICE PUEBLO
152 PM MDT WED JUN 2 1999
...THREAT REMAINS FOR STRONG-SEVERE THUNDERSTORMS IN SOUTHEASTERN
COLORADO THIS EVENING...
TONIGHT: CURRENT WATER VAPOR IMAGERY LOOP SHOWED WEAK MID-LEVEL VORT
LOBE MOVING THROUGH NORTHWESTERN CO WITH ANOTHER WAVE INTO CENTRAL
AZ. 18Z/02 SURFACE ANALYSIS HAD DRYLINE BETWEEN KLHX AND KLAA TO
JUST WEST OF KSPD. LAPS CAPE READINGS ARE 2000-2200 J/KG...WITH
NO CONVECTIVE INHIBITION...ACROSS FAR SOUTHEASTERN CO. 1KM VIS/IR
SATELLITE IMAGERY...AND QUICK LOOK OUT THE WINDOW...REVEALED LITTLE
IN THE WAY OF SIGNIFICANT VERTICAL DEVELOPMENT...YET. JUST WAITING
FOR MID-LEVEL ENERGY. 18Z/02 RUC SHOWING WEAK MID-LEVEL SHORTWAVE
MOVING THROUGH CWA 22Z/02-03Z/03. IN RESPONSE...LOW LEVEL SURFACE
CONVERGENCE SHOULD TIGHTEN UP...IN RESPONSE THE MID-LEVEL ENERGY...
AND HELP INITIATE TSRA. VERTICAL WIND PROFILE WOULD SUGGEST
SUPERCELL THREAT IN EXTREME SOUTHEASTERN CO...WHILE MODEL SOUNDINGS
CONTINUE TO SHOW AN INVERTED-V TYPE STRUCTURE ALONG I-25 WITH STRONG
TO DAMAGING WINDS A THREAT MAINLY THIS EVENING. SEE SPC DAY 1
OUTLOOK. AFTER SUNSET...PRETTY SURE THE THREAT OF ORGANIZED
PRECIPITATION IS SLIME AS MID-LEVEL SHORTWAVE HEAD NORTHWARD TOWARDS
WY. ANY LEFT-OVER ORGANIZED TSRA WILL BE AROUND OUTFLOW BOUNDARIES.
LOOKING FOR LITTLE CHANGE IN MIN TEMPERATURES FROM LAST NIGHT...
SO CURRENT ZFP LOOKS GOOD.
THURSDAY: ATYPICAL EARLY JUNE UPPER LEVEL PATTERN TO CONTINUE ACROSS
CONTIGUOUS 48 STATES WITH LARGE CLOSED LOW IN CENTRAL CA AND SHOULD
DROP IN SOUTHERN CA BY THURSDAY NIGHT. DEEP SOUTHWEST FLOW WILL
CONTINUE ACROSS CWA ON THURSDAY...PER MODEL TIME SECTIONS. LITTLE
IN THE WAY OF WEAK MID-LEVEL WAVES EXPECTED FOR THURSDAY. HAVE THE
STANDARD PROBLEM OF KEEPING ZFP FROM YO-YOING FORECAST POPS. THE
QUALITY OF THE DEPTH OF MOISTURE IS DEFINITIELY IN QUESTION FOR
THURSDAY...ESPECIALLY IN THE PLAINS. AVN HAS A MEAN RH OF 20-30% FOR
THURSDAY AFTERNOON. STILL COULD NOT RULE OUT SOME DIURNAL TSRA IN
THE MOUNTAINS...SO WILL MAINTAIN SMALL POPS. FAIRLY CONFIDENT ON
PULLING POPS IN THE PLAINS/VALLEYS AND WILL DO SO. WITH LITTLE IN
THE WAY OF AIR MASS CHANGE...PERSISTENCE ON TEMPS LOOKS TO BE THE
WAY TO GO. CURRENT ZFP HAS THIS UNDER CONTROL.
THURSDAY NIGHT/FRIDAY: SOME MODEL DIFFERENCES ON TIMING OF
UNSEASONABLY STRONG LOW PRESSURE SYSTEM PULLING OUT. NGM IS
USUALLY THE FASTEST...SO WILL LEAN TOWARDS A ETA/AVN SOLUTION.
AS FAR AS SENSIBLE WEATHER IS A CONCERN...DEEP SOUTHWESTERLY FLOW
WILL PERSIST ACROSS CWA WITH RELATIVELY DEEP DRY AIR...MEAN RH 25-
35%. ONCE AGAIN...STRUGGLING WITH THE FLIP-FLOP OF POP ISSUE. THERE
SHOULD BE A SMALL THREAT FOR THURSDAY EVENING SHRA/TSRA IN THE
MOUNTAINS...IF THEY FORM THURSDAY AFTERNOON. OTHERWISE...WILL
REMOVE POPS IN PLAINS/VALLEYS FOR FRIDAY. WILL CONTINUE WITH
PERSISTENCE ON TEMPERATURES.
EXTENDED: AVN HAS GOOD CONTINUITY WITH THE OLD MRF ON SPATIAL AND
TEMPORAL ISSUES OF STRONG LOW PRESSURE SYSTEM MOVING THROUGH CWA ON
SATURDAY. COULD GET REAL INTERESTING IN CO ON SATURDAY. WILL PLAN
TO MAINTAIN CHANCE WORDING FOR SATURDAY/SUNDAY. AS LOW LIFTS TO
NORTHERN PLAINS LATE SUNDAY...NEXT LOW TO DROP IN THE PACIFIC
NORTHWEST FOR MONDAY. AT THE MOMENT...WILL GO AHEAD AND KEEP
MONDAY DRY. TEMPERATURES WILL BE NEAR SEASONAL READINGS.
.PUB...NONE.
METZE
</PRE><HR> <BR><PRE>FXUS65 KPUB 020951 co
AREA FORECAST DISCUSSION
NATIONAL WEATHER SERVICE TALLAHASSEE FL
1030 AM EDT WED JUN 2 1999
NGM LI/CAPE VALUES PRETTY INSIGNIFICANT...BUT BUFKIT MODEL
SOUNDING DATA FROM THE 00Z ETA SHOWS LI/S DOWN TO -1 TO -2 RANGE
THIS AFTERNOON WITH CAPES RISING ABOVE 1000. NEWER 03Z ETA AND 12Z
RUC RUNS ARE A BIT MORE UNSTABLE WITH LI/S OF -2 TO -3 ACROSS THE
BIG BEND AND CAPES OVER 1000 ACROSS PANHANDLE AND IMMEDIATE COASTAL
BIG BEND. LIMITING FACTOR WILL BE THE CAP AROUND 700 MB EVIDENT ON
12Z TLH SOUNDING. UPPER SUPPORT WILL BE WEAK TODAY AND MAINLY N OF
CWA. THE CAP STRNEGTH APPEARS STRONGEST ACROSS SW GA SI NIL POPS
LOOK GOOD THERE. TEMPTED TO REMOVE POPS FOR EASTERN ZONES BUT WONT
TRY TO FINESSE AT THIS TIME WITH AFORMENTIONED INSTABILITY AND SEA
BREEZE CONVERGENCE BEING A FACTOR AS WELL. WILL LEAVE SLIGHT CHANCE
POPS IN ALL ZONES BUT BELIEVE BEST CHANCE FOR CONVECTION WILL BE
ACROSS COASTAL AND WESTERN BIG BEND.
TEMPERATURES LOOK ON TRACK. ONLY CHANGE WILL BE TO BRING WINDS
AROUND TO MORE SOUTHERLY WITH SEA BREEZE.
MAW
</PRE><HR> <BR><PRE>FXUS62 KTBW 021432 fl
AREA FORECAST DISCUSSION
NATIONAL WEATHER SERVICE GRAY ME
957 AM EDT WED JUN 2 1999
DISC...ATMOS BCMG MOR UNSTABLE ATTM...AS MOR BINOVC THS MRNG &
TEMPS/TDS ON THE RISE. HWVR...LACKING DYNAMICS ALFT (XCPT FOR WK PVA
THRU 18Z AS PER 12Z RUC INDICATES)...AS MAIN SW WL RMN WL TO THE SW OF
OUR FA THRU 00Z. TRIGGER FOR CONVECTION MAY BE FOCUSED ON BNDRY OVR
SWRN ME WHICH SEPARATES TDS IN THE MID/UPR 50S...FM TDS IN THE MID 60S.
ANOTHER FOCUS FOR CONVECTION/PCPN WL BE STNRY FNT OVR NRNMST ME. CAPES
BASICALLY IN THE 500-1000 RNG W/ LIS ARND -1/-2. PTBL WTR VALUES ARND
1.3".
BROKE OFF MEZ001/002 AS FNT HAS MADE IT THRU FVE. KEPT THEM W/ MOR
CLDS. OTHERWISE...ONLY MINOR CHANGES TO TEMP/CLD FCST.
.GYX...NONE.
THIS PRODUCT IS ALSO AVAILABLE ON THE NWS GRAY WEBSITE:
HTTP://WWW.NWS.NOAA.GOV/ER/GYX
JC
me
AREA FORECAST DISCUSSION
NATIONAL WEATHER SERVICE BALTIMORE/WASHINGTON
910 PM EDT WED JUN 2 1999
ERLR THIS EVNG ONE STRONG CELL WARNED ON MOVED FROM CNTRL BERKELEY CTY
WV ACRS SRN WASH CTY MD BTWN HAGERSTOWN AND BOONESBORO THEN NEAR
THURMONT MD INTO NW CARROLL CTY BEFORE SPINNING OFF ANOTHER CELL ON THE
ITS SRN XTRM AND MOVING INTO CNTRL CARROLL AND BALTIMORE CTY'S.
MEANWHILE ANOTHER CLUSTER OF SMALL CELLS HAS DVLPD VCNTY OF THE E
PORTION OF THE ERN PNHNDL OF WV. THESE CELLS WILL CONTINUE TO THE ENE
BUT LTST MESO ANALYSIS WUD SUGGEST THESE ARE NOT ENTERING A VERY FAVORBL
ENVIRONMENT FOR CONTINUED DVLPMNT. ELSW ACRS THE CWA THE MESOS SUGGEST
CONTINUED STABILIZATION.
LTST RUC FCST WEAK CDFNT TO ADVANCE TO A BWI-NYG LINE BY ARND 09Z.
ANOTHER WEAK LINE OF CONV ACTVTY IS DVLPG OVR N-CNTRL WV ATTM WHICH MAY
MOVE ACRS THE NRN ZNS OF THE CWA LATER TNGT SO WILL KEEP A 30 POP THERE.
ELSW RUC UPR SUPPORT FCST AND MESOS WUD SUGGEST LTL IF ANY ACTVY OVRNGT
ACRS THE SRN ZNS. OTW ERLR FCST APPEARS ON TARGET.
THAT'S IT FOR NOW...LATER.
.LWX...NONE.
PAP
</PRE><HR> <BR><PRE>FXUS61 KLWX 021830 md
AREA FORECAST DISCUSSION
NATIONAL WEATHER SERVICE GRAND RAPIDS MI
345 PM EDT WED JUN 2 1999
19Z MSAS ANALYSIS INDICATES COLD FRONT HAS CLEARED LAN...JXN...AND
OUR CWA. TEMPS ALONG THE LAKE SHORE HAVE COOLED TO NEAR DEWPTS...
NEAR 50 DEG F. VIS SATL LOOP SHOWS RAPID CLEARING OVR WI AND ERN IA.
WRAP-AROUND -SHRA MAINLY CONFINED TO AREAS N OF CWA...WITH A FEW
NOTED OVER KENT...IONIA...BARRY COUNTIES. THESE WILL BE E OF CWA BY
FCST TIME.
MODELS IN GENERAL AGREEMENT THRU 48 HRS. ETA AND RUC (18Z RUN) HAVE
A GOOD HANDLE ON CURRENT LOW-LVL MOISTURE FIELDS AND THUS FOLLOWED
FOR TIMING OF CLEARING. EXPECT LOW CLOUDS TO ERODE ALONG LAKE SHORE
COUNTIES 00-03Z TIME FRAME...AND 03-09Z TIME FRAME INLAND AREAS.
THURS FEATURES A SUNNY FCST. FCST SOUNDINGS AND INSTABILITY CU
SCHEME SHOW LITTLE IF ANY CU DEVELOPMENT (WITH CAPPING INVERSION
AROUND 5K FT) AND VRY DRY MID AND HIGH LAYERS.
S/WAVE EJECTS OUT OF WRN U.S. TROF THURS AND RIDES NE OVR BUILDING
RIDGE ACROSS CENTRAL U.S. MODELS SHOW INCREASE IN H4 LAYER MOISTURE
AFT 00Z SAT ACROSS WRN LWR MI. BY 12Z...MODELS SHOW PCPN AS CLOSE AS
WRN WI AND IL. WITH VRY DRY AIR IN PLACE AND FCST WEAKENING OF THIS
WAVE AS IT APPROACHES LWR MI FRI...WILL LEAVE PCPN OUT OF FCST. BUT
WITH SIG MID-HIGH LVL MOISTURE MOVG ACROSS CWA...PARTLY SUNNY FCST
NEEDED.
FWC/FAN TEMPS WITHIN 1-2 DEG OF EACH OTHER...FCST REFLECTS THIS.
FOR EXTENDED PERIOD...OPTED TO LEAVE CHANCE OF SHRA AND TSRA FOR
LATE SAT AND SUN. RETURN SRLY WARM AND HUMID FLOW OVR WEEKEND WILL
SUPPLY THE MOISTURE AND IMPULSES MOVG OUT OF WRN U.S. TROF MAY
GENERATE CONVECTIVE COMPLEXES OVR NRN PLAINS AND UPPR MS VALLEY.
REMNANTS OF SUCH COULD BRING DECAYING SHRA AND TSRA ACTIVITY TO WRN
LWR MICH LATE SAT AND SUN. BY MONDAY...RIDGE STRENGTHENS AND
RETROGRADES. THIS WILL KEEP US DRY...BUT BUILDING HEAT MAY BRING
TEMPS CLOSE TO 90 DEG BY TUE OR WED OF NEXT WEEK.
.GRR...NONE.
GREENE
</PRE><HR> <BR><PRE>FXUS63 KDTX 021913 mi
AREA FORECAST DISCUSSION
NATIONAL WEATHER SERVICE GRAND RAPIDS MI
1108 AM EDT WED JUN 2 1999
WILL UPDATE FCST TO LOWER TEMPS MOST AREAS... TO LOWER RAIN CHANCES
FOR SWRN CWA... AND TO END -SHRA AND TSRA ERN CWA BY LATE AFTERNOON.
14Z MSAS ANALYSIS PLACED SFC LOW CENTER BETWEEN CAD AND HTL WITH
COLD FRONT SSW THROUGH GRR...JUST W OF AZO...TO JUST E OF SBN.
DEWPTS STARTING TO FALL W OF HWY 131 AND W/NW FLOW OVR STILL COOL
LAKE MICH STARTING TO DROP TEMPS INTO 50S ALONG THE LAKE SHORE.
SATL LOOPS AND 12Z RUC ANALYSIS SHOWS UPPR LVL LOW JUST MOVG ONSHORE
ACROSS W CNTRL LWR MI ATTM...IN LINE WITH PREVIOUS FCST. WRAP AROUND
MOISTURE JUST N/W OF UPPR LOW WILL CLIP NRN 1/3 OF CWA THIS
AFTN...THUS LEFT SCATTERED SHOWERS IN THOSE AREAS. TIMED ENDING THE
SHOWERS MID/LATE AFTN. FOR SW CWA...LOWERED POPS TO 30 PCT FOR EARLY
AFTN AND FOR SE CWA...LEFT SCATTERED WORDING ENDING LATE AFTERNOON.
FRONTAL MOVEMENT WILL BE SLOW AND WILL NOT LIKELY CLEAR EXTRM SE
(KJXN AREA) UNTIL AROUND 20Z. LEFT MENTION OF THUNDER SE. LTG DATA
HAS SHOWN SOME MINIMAL ACTIVITY WITH CONVECTION ALONG/AHEAD OF FRONT
THIS MORNING.
TEMPS LOWERED AS COOLER/DRIER AIR IS FILTERING IN A BIT FASTER THAN
PREVIOUSLY FCST. LIMITED SS THIS AFTN WILL KEEP TEMPS CLOSE TO
CURRENT VALUES. W/NW FLOW OVR LAKE WILL AFFECT TEMPS WRN CWA AS WELL.
SVR THREAT IS MINIMAL OUR CWA THIS AFTN AS LITTLE COLD AIR ALOFT
ASSOC WITH UPPR LOW. LIMITED SS AHEAD OF SFC FRONT AND FROPA PRIOR
TO 20Z ALL WORKING AGAINST ANY DEEP CONVECTIVE DEVELOPMENT.
FCST UPDATE OUT BY 11:15 AM EST.
.GRR...NONE.
GREENE
</PRE><HR> <BR><PRE>FXUS63 KAPX 021500 mi
AREA FORECAST DISCUSSION
NATIONAL WEATHER SERVICE GAYLORD MI
1055 AM EDT WED JUN 2 1999
QUICK UPDATE PREVIOUSLY SENT OUT TO REMOVE EARLY MORNING MENTION OF PATCHY
FOG. SFC LOW IS NOW INTO NW LOWER MI WITH SHOWERS WRAPPING UP AND
AROUND THE LOW EXTENDING FROM SE LOWER MI THROUGH NRN LOWER MI BACK
INTO NRN LAKE MI. MOST OF THE WELL ORGANIZED TSRA HAS DIMINISHED
FROM W TO E AND HAS MOVED INTO CENTRAL LAKE HURON. LATEST RUC IS
RIGHT ON TARGET WITH SHOWING 850-500 MB Q-VECTOR CONVERGENCE TAKING
THE SAME ROUTE...AND CONTINUING TO MOVE E AWAY FROM LOWER MI
THROUGHOUT THE AFTERNOON. UPPER LOW AND VORT MAX SWINGS THROUGH
LOWER MI THIS AFTERNOON...WHICH WILL QUICKLY DIMINISHING DPVA FROM W
TO E ACROSS NRN LOWER MI.
LATEST 1.1 RES BASE REF FROM GRR INDICATES ADDITIONAL CONVECTION
DEVELOPING IN AREAS ACROSS SRN LOWER MI THAT HAVE RECEIVED SOME
SOLAR HEATING THIS MORNING PER LATEST VSBL SATELLITE IMAGERY...AND
ARE IN A THETA E RIDGE. RUC SUGGESTS THE THETA E RIDGE WILL ACTUALLY
ROTATE AROUND THE UPPER LOW...KEEPING PORTIONS OF NRN LOWER MI S OF
A LINE FROM APN TO TVC IN THE RIDGE THROUGH THE AFTERNOON. THUS...IN
THESE AREAS WILL MAINTAIN CATEGORICAL POPS AND MENTION OF THUNDER
THIS AFTERNOON. N OF THAT LINE...WILL EXTEND PERIODS OF SHRA INTO
THE AFTERNOON AS EASTWARD PROGRESSION OF THE LOW IS SLOWER THAN
PREVIOUSLY ANTICIPATED. EXPECT RATHER LARGE AREA OF WRAP-AROUND SHRA
OVER NRN LAKE MI WILL SWEEP ACROSS AREA N OF TVC TO APN DURING THE
AFTERNOON. THEREFORE WILL KEEP PERIODS OF SHOWERS IN THE FORECAST
FOR THE AFTERNOON.
ONLY MINOR ADJUSTMENTS DOWNWARD FOR FORECASTED HIGHS TODAY...MAINLY
ACROSS ERN UPR MI AND FAR NRN LOWER IN LIGHT OF CURRENT CONDITIONS
AND INCREASING LOW LEVEL CAA BEHIND THE SFC LOW. WIND FORECAST WILL
ALSO HAVE TO BE FRESHENED.
TO USERS OF KAPX WSR-88D DATA...
THE GAYLORD RADAR WILL REMAIN DOWN THROUGH LATE AFTERNOON...WE WILL
KEEP YOU POSTED OF THE PROGRESS. WE WILL CONTINUE TO UTILIZE
OUR BACKUPS RADARS: KMQT...KGRB...KDTX...KGRR. PLEASE DO THE SAME.
WE ARE SORRY THIS INCONVENIENCE. PLEASE DO NOT HESITATE TO CALL IF YOU
HAVE QUESTIONS.
.APX...NONE.
EME
</PRE><HR> <BR><PRE>FXUS63 KDTX 021307 mi
AREA FORECAST DISCUSSION
NATIONAL WEATHER SERVICE MARQUETTE MI
430 AM EDT WED JUN 2 1999
CONCERNS TODAY ARE PRECIP OVR SE CWA...THEN CLEARING AND MAX TEMPS.
SW UPPER LEVEL FLOW AT 500MB DOMINATING MUCH OF CONUS WITH UPR LOW
DIGS OVR PACIFIC NW AND 500MB CONFLUENCE IN E CANADA OVR SFC HIGH
PRS.
STRONG SHORTWAVE ANALYZED BY 00Z ETA OVR E IOWA...RESPONSIBLE FOR
SEVERE CONVECTION CURRENTLY SPREADING NE ACROSS S LK MICHIGAN INTO
LOWER MI. BOTH NGM/ETA CONSISTENT IN MOVING SHORTWAVE NE IN SE LOWER
MI BY 21Z. STRONGEST LIFT AND CONVECTION ASSOCIATED WITH FEATURE
WILL REMAIN MOSTLY S OF CWA PER 850-500MB QVECTOR FIELD AND
GUIDANCE. EXCEPTION IS MENOMINEE/DELTA/S SCHOOLCRAFT COUNTIES...
WITH KGRB 88D REFLECTIVITY DATA DEPICTING SHIELD OF RAIN SPREADING
RAPIDLY NE AT 06Z...AND 03Z RUC/18Z MESOETA SUPPORTING IDEA OF THIS
CONVECTION CLIPPING THIS PORTION OF CWA BETWEEN 09-18Z AS 1004MB SFC
LOW TRACKS NE TO BIG RAPIDS/CADILLAC IN LOWER MI. WILL LEAVE THUNDER
OUT AS BEST INSTABILITY REMAINS SE OF CWA PER 03Z RUC SHOWALTER
INDICES.
IFR/MVFR CEILINGS EXTEND WEST INTO CENTRAL MINNESOTA AT 06Z. PER ETA
RH CROSS SECTION AND 850-700MB QVECTOR DIV AFT 18Z...EXPECT
GRADUALLY CLEARING LATE TODAY FROM W TO E. AS UPPER LOW OVR W COAST
DIGS S TONIGHT AND THURSDAY...UPR LEVEL RIDGE AMPLIFIES OVR HIGH
PLAINS WITH SFC HIGH PRS RIDGE ENTRENCHED FM HUDSONS BAY S THROUGH
MISSISSIPPI RVR VALLEY. BY 00Z FRI UPR RIDGE AXIS APPROACHES W
CWA...WITH NGM BEING SLIGHTLY MORE PROGRESSIVE WITH FEATURE THAN
ETA.
IN RESPONSE TO LEE SIDE CYCLOGENSIS OVR HIGH PLAINS IMPRESSIVE
RETURN FLOW DEVELOPS OF GULF OVR PLAINS ON THURSDAY AND FRIDAY. 00Z AVNS
310K SFC DEPICTING ISENTROPIC LIFT WITH STRONG WAA PATTERN SPREADING
N ACROSS CWA ON FRIDAY. CONSEQUENTLY WILL INTRODUCE CHANCE OF
SHOWERS FRI WITH WARM FRONTAL PASSAGE FOLLOWED BY MORE
UNSTABLE...HIGHER THETA E AIR ADVECTING INTO CWA FROM SW. MRF
SUGGESTS WEAK COLD FRONTAL PASSAGE OCCURS SATURDAY NIGHT AS SFC LOW
MOVES E ACROSS S CANADA TO JAMES BAY BY 00Z MONDAY. BEST CHANCE
OF SIGNIFICANT CONVECTION LATE SATURDAY OR SATURDAY NIGHT.
PRS/THICKNESS FIELDS INDICATE FRONT MAY STALL AND WEAKEN VICINITY OF
S CWA ON SUNDAY WITH UPR FLOW BECOMING PARALLEL TO FRONT...SO WILL
RETAIN CHANCE OF SHOWERS.
TEMPS A BIT TRICKY TODAY...DEPENDING ON EXACT TIMING OF CLEARING.
BASED ON MQT LAMP GUIDANCE WILL UNDERCUT FWC BY A FEW DEGREES AND
ASSUME CLEARING REACHES MQT THIS EVENING. WARMEST OVR SW CWA PARTIAL
WHERE CLEARING ARRIVES AROUND 18Z.
.MQT...NONE.
WOLF
</PRE><HR> <BR><PRE>FXUS63 KDTX 020820 mi
AREA FORECAST DISCUSSION
NATIONAL WEATHER SERVICE TWIN CITIES/CHANHASSEN MN
830 PM CDT WED JUN 2 1999
THE UPPER AIR SOUNDING AT CHANHASSEN THIS EVENING SHOWS A STABLE AND
DRY AIR MASS. THE PRECIPITABLE WATER VALUE DECREASED IN HALF FROM 12
HOURS AGO. SATELLITE SHOWS CLOUD TRACES OVER OUR COUNTY WARNING AREA
DISSIPATING AND RUC HINTS THAT A MIDDLE LEVEL RIDGE WILL REMAIN
SAFELY EAST OF US THROUGH THE NIGHT. ANTICIPATE FAIR WEATHER THROUGH
THURSDAY MORNING. PREVIOUS FORECAST SCENARIO LOOKS HARD TO IMPROVE
ON.
.MSP...NONE
WH
</PRE><HR> <BR><PRE>FXUS63 KDLH 022037 mn
AREA FORECAST DISCUSSION
NATIONAL WEATHER SERVICE TWIN CITIES/CHANHASSEN MN
915 AM CDT WED JUN 2 1999
CONCERN THIS AFTERNOON IS EXTENT OF CLEARING. NO KMPX SOUNDING BUT KINL
SHOWING FAIRLY DEEP MOISTURE YET. 12Z RUC SEEMS TO HAVE BEEN
INITIALIZED TOO DRY FOR MPX. LAPS SOUNDING SEEMS TO HAVE TOO DEEP A
MOIST LAYER WHEN COMPARED TO PIREPS...SO SOME WHERE BETWEEN. THINK
CLEARING WILL WORK EAST DURING DAY BUT MAYBE NOT AS FAST AS RUC LOW
LEVEL MOISTURE PROGS SUGGEST IN THE EAST. THERE IS CONTINUING LOW LEVEL
DIV FORECAST THOUGH. CURRENT MAX TEMP FORECASTS SEEM OK WITH SOME
MINOR ADJUSTMENTS.
.MSP...NONE
RICHARDSON
</PRE><HR> <BR><PRE>FXUS63 KMPX 020911 mn
FORECAST DISCUSSION
NATIONAL WEATHER SERVICE JACKSON MS
915 PM CDT WED JUN 02 1999
ON SATELLITE THE REGION CONTINUES UNDER NORTHWEST FLOW...WITH RIDGE
AXIS TO THE WEST. THE ACTIVITY HAS MOSTLY DISSIPATED FOR NOW...BUT
EXPECT SOME ISOLATED ACTIVITY MAY DEVELOP LATER TONIGHT. THE RUC
MODEL SHOWS A WEAK SHORTWAVE COMING ACROSS THE REGION TONIGHT...BUT
MOISTURE WILL BE LACKING FOR ANY SCATTERED THUNDERSTORM COVERAGE. SO
WITH THIS IN MIND KEPT LOW POPS ACROSS THE REGION THROUGH THE NIGHT
AND LEFT TEMPS ALONE.
.JAN...
MS...NONE.
LA...NONE.
AR...NONE.
17
</PRE><HR> <BR><PRE>FXUS74 KJAN 022044 ms
AREA FORECAST DISCUSSION
NATIONAL WEATHER SERVICE BILLINGS MT
830 PM MDT WED JUN 3 1999
WATER VAPOR IMAGERY INDICATES UPPER LOW OVER ORFE/CA BORDER SAGGING
SOUTH WITH VORT LOBES EJECTING FROM IT. LATEST SURFACE MAP INDICATES
SURFACE LOW OVER BILLINGS WITH WARM FRONT STRETCHING ESE ALONG THE MT/WY
BORDER...WHERE MOST OF THE CONVECTION HAS FIRED UP. SEVERAL SURFACE
TROFS ALSO EMINATE FROM THE LOW.
00Z RUC INDICATES VORT LOBE SWINGING NORTH TO THE MT/WY BORDER BY EARLY
MORNING WITH A SLOW MOVEMENT OF THE WARM FRONT. SHOWERS/THUNDERSTORMS
SHOULD DECREASE AND WEAKEN OVERNIGHT WITH LOSS OF SURFACE HEATING...BUT
WITH ENOUGH DYNAMICS IN PLACE AND WARM FRONT MOVING SLOWLY NORTH WOULD
NOT BE SURPRISED TO STILL HAVE SCATTERED THUNDER OVERNIGHT.
WILL DECREASE POPS TO SCATTERED ALL AREAS FOR TONIGHT AND REMOVE MENTION
OF SEVERE FROM THE ZONES. STROBIN
BIL EB 052/073 050/076 053 634433
LVM .. 049/068 048/070 ... 634644
HDN .. 050/075 049/076 ... 634433
MLS .. 058/078 054/080 ... 634432
4BQ .. 057/078 055/079 ... 634332
BHK .. 051/076 051/078 ... 634432
SHR EB 049/073 047/079 050 634322
</PRE><HR> <BR><PRE>FXUS65 KTFX 030235 mt
AREA FORECAST DISCUSSION
NATIONAL WEATHER SERVICE BILLINGS MT
903 AM MDT WED JUN 02 1999
VERY LITTLE TO ARGUE WITH ON CURRENT FORECAST PACKAGE. A BIT OF
TWEAKING...BUT THAT IS ABOUT ALL.
SATELLITE PICTURES SHOW MOIST FLOW TO BE ABOUT DUE NORTH FROM THE GREAT
BASIN WITH EVEN A SLIGHT NORTHWEST BIAS TO IT. FOCUS OF THUNDERSTORM
ACTIVITY SHOULD BE MAINLY OVER WESTERN ZONES OF COUNTY WARNING AREA.
UPPER AIR DIFFLUENT FLOW ALSO SUPPORTS THIS.
HOWEVER...AM LOOKING AT A CONVERGENT BOUNDARY OVER THE EASTERN ZONES AS
POSSIBLY BEING ANOTHER FOCUS FOR THUNDERSTORM DEVELOPMENT. THE 12Z RAOB
SOUNDINGS DID NOT INDICATE CAPPING FOR HINDERING THUNDERSTORMS FROM
FORMING AND SOUNDING MODIFICATION SHOWS CAPES TO BE RATHER HIGH IN THAT
AREA. THUNDERSTORMS ARE FORECAST EVERYWHERE IN THE COUNTY WARNING AREA.
FOR THE NOW...THE GOING POPS LOOK GOOD.
UNFORTUNATELY...HAD NO RUC RUN FOR 12Z TO CONSULT. CHB
BIL EE 081/054 070/052 077 52244
LVM .. 075/051 069/... ... 52444
HDN .. 082/053 071/... ... 52244
MLS .. 085/059 076/056 ... 52244
4BQ .. 085/061 077/... ... 52244
BHK .. 085/058 078/... ... 52244
SHR EE 078/050 066/048 074 52444
</PRE><HR> <BR><PRE>FXUS65 KTFX 020908 mt
AREA FORECAST DISCUSSION
NATIONAL WEATHER SERVICE BINGHAMTON NY
940 PM EDT WED JUN 2 1999
3RD DRIEST MAY ON RECORD AT BGM AND ONLY 0.81 MONTHLY TOTAL AT SYR (6TH
DRIEST MAY) AND SIG RAIN CONTINUES TO ELUDE MUCH OF CNTRL NY AND NE PA.
WIND SHIFT LINE/FRONT PUSHING ACRS CNTRL NYS ATTM. LINE OF SHRA
ENTERING THE WRN CWA ASSCD WITH THIS BNDRY. UPR VORT MAX IS SHEARING
OUT TO THE NE AND WE'VE LOST THE DAYTIME HEATING. RUC SNDGS SHOW
STABLIZATION OCCURING AND LTG DATA INDICATES STRIKES CONFINED TO EASTERN
LAKE ONTARIO COUNTIES. ALTHOUGH I CAN'T RULE OUT AN ISOLD TSTM
OVERNIGHT..TRENDS INDICATE THE BEST POTNL IS OVER. AFTN PCKG MENTIONED
ONLY EVNG TSTMS AND THIS LOOKS GOOD SO WILL STICK WITH CONTINUITY AND
JUST GO WITH -SHRA FOR THE OVERNIGHT PD. HOWEVER WILL WORD PCPN AS SCT
AND DROP POPS INTO THE CHC CAT. TMRW'S FCST MAXES MAY BE A TAD ON THE
HIGH SIDE BUT MIDSHIFT CAN MAKE ANY TWEEKS TO LATER PDS IF NEEDED. LOOKS
LIKE A FEW VERY NICE DAYS TO FOLLOW BUT WE REALLY COULD USE THE RAIN.
.BGM...NONE.
BRADY
</PRE><HR> <BR><PRE>FXUS71 KOKX 030132 ny
STATE FORECAST DISCUSSION
NATIONAL WEATHER SERVICE ALBANY NY
1045 AM TUE JUN 1 1999
.DISC...AMS HS CHANGED LTL SINCE YSTDY. BERMUDA HI STL IN PLC.
CLDFNT HAS MVED ABT 200 MILES S...AND NOW LNS UP NR KCAR/KYUL/KMGG
LN. ATTM KENX WSR-88D SHWS LTL ACTVTY AS AREA IS NICELY CAPPED BY NVA
OVR RGN. LTST RUC CARRIES A SFC WV FM MI 2 SRN ONTARIO BY THIS EVE.
CLDFNT ITSFL MVS VRY LTL DRG THIS TIME. HOWEVER SFC CAPES JMP
MARKEDLY (~1200 J/KG KPOU ~1500 J/KG KALB AND EVN A BIT MORE N). NXT
SHT WV ALFT WL HELP DESTABILIZE ATMOS...ESP N AND W OF KALB.
HV MADE A FEW CHANGES 2 PREVIOUS PACKAGE REGARDG THIS PM. HV ADD A
BIT MORE SUN...RAISED TEMPS A CAT AND SO WITH THE POPS. (XCPT KPT
THEM AT 30 SERN ZN DUE TO SLITELY LOER CAPES AND FCT THAT FCRG
MECHANISM). BRN > 50 SO WE ARE LKG AT NON SUPER CELLS. HELICITY
HEALTHY AT 100 (M/S2) SO NOT OUT OF THE QUESTION A SQL LN CLD FM..BUT
MORE LIKELY ANY SVR WLD BE FM PULSE TYPE STMS. FA NOT OUTLKD FOR SVR
AND TEND 2 AGREE THAT ANY SVR WX SHLD BE ISLD. BIGGEST PRBLM WITH ANY
TSRA THIS PM WLD BE HVR RAINERS (PW > 1.5 INCHES) SO HVY DOWNPOUR
POSS CONTINUED. WBZ WITHIN HAIL THRESHOLD OF 10.5 KFT...BUT NOT
ENOUGH OF A THREAT 2 ADD 2 PCKGE ATTM.
NO MET CHANGES 2 LTR PDS. CONVC POT INCREASES TON AND ERLY TOM AS
CLFNT APPRCHES FA.
WRKZFP AVBL. ZONES GONE BFR 11 AM. BYE!
.ALB...NONE.
HWJIV
</PRE><HR> <BR><PRE>FXUS71 KBUF 021413 ny
FORECAST DISCUSSION FOR EASTERN NORTH DAKOTA AND NORTHWEST MINNESOTA
NATIONAL WEATHER SERVICE EASTERN ND/GRAND FORKS ND
900 PM CDT WED JUN 02 1999
FORECAST CHALLENGE FOR UPDATE CONCERNS TEMPS AND TSRA/SHRA THREAT.
CONVECTION TRYING TO FIRE IE. SLIGHTLY ENHANCED TOPS AHEAD OF WARM FRONT
FROM SE MT ALONG WESTERN DAKOTAS BORDER TO CENTRAL SD VIA IR LOOP
ALTHOUGH NOT TOO IMPRESSIVE ATTM. MAIN ACTION ATTM ALONG HIGH PLAINS.
STILL FEEL FAVORED AREA FOR TSRA TONIGHT TO THE WEST OF OUR FA AHEAD OF
SFC BOUNDARY IN ZONE OF STRONGEST H8 WAA...BOUNDARY LAYER MOIST
FLUX...MAIN H8 THETA-E RIDGE...DEVELOPING 30-40 KT LLJET...GREATER
INSTABILITY AND POOLING 60 DEGREE DEWPOINTS OVR THE CENTRAL DAKOTAS. 00Z
BIS SOUNDING FROM SHARP INDICATED LI OF -8 AND CAPE NEARLY 2500 J/KG.
SOME CONCERNS WITH WK W-E BOUNDARY OVR SE ND FROM 00Z SFC ANALYSIS WHICH
COINCIDES WITH H8 THETA-E LOBE FROM RUC. SOME ACCAS NOTED TO THE SOUTH
OF THE STATION. WITH THESE FEATURES UNDER MID LEVEL RIDGE WILL MAINTAIN
DRY FCST BUT WILL MONITOR. WILL MAINTAIN SLIGHT POPS OVR EXTREME
WESTERN FA WHICH BECOMES ON BACK SIDE OF RIDGE LATE AND CLOSER TO ABOVE
MENTIONED FEATURES. CURRENT TEMPS SEEM ON TRACK BUT WILL TAKE A LAST
LOOK BEFORE MAKING ANY MINOR CHANGES IF NEEDED.
.FGF...NONE
VOELKER
</PRE><HR> <BR><PRE>FXUS63 KBIS 021959 nd
AREA FORECAST DISCUSSION
NATIONAL WEATHER SERVICE WILMINGTON OH
945 AM EDT JUN 2 1999
KILN RADAR SHOWS A LINE OF SHOWERS AND THUNDERSTORMS EXTENDING FROM
CENTRAL OHIO SOUTHWEST INTO NORTHERN KENTUCKY. THIS LINE WILL
CONTINUE MOVING EAST THIS MORNING...STABILIZING THE AIRMASS IN ITS
WAKE. HOWEVER...THIS STABILIZATION IS EXPECTED TO BE BRIEF.
CURRENT SURFACE BASED CAPES ARE BETWEEN 500 TO 1000 J/KG. MODIFIED
ILN SOUNDING YIELDS AROUND 1600 J/KG DURING THE AFTERNOON WITH
EXPECTED HIGHS AROUND 80. LATEST SURFACE MAP SHOWS A COLD FRONT
ALONG THE ILLINOIS/INDIANA BORDER. PREVIOUS MODEL RUNS AND THE RUC
MOVE THIS COLD FRONT TO THE INDIANA/OHIO BORDER BY 18Z (2 PM) AND
THEN INTO CENTRAL OHIO BY LATE AFTERNOON. THIS FRONT IS ALSO
ASSOCIATED WITH AN UPR LVL S/W LOCATED ACROSS LOWER MICHIGAN. THE
FRONT ALONG WITH THE UPR LEVEL S/W WILL PROVIDE THE NECESSARY LIFT
TO TRIGGER MORE SHOWERS AND THUNDERSTORMS FOR THE AFTERNOON HOURS.
THE WET BULB ZERO ON ILN SOUNDING THIS MORNING WAS NEAR 11K. THIS
IS ON THE WARM SIDE. MODELS SHOW A MID LEVEL DRY PUNCH WORKING INTO
THE REGION DURING THE AFTERNOON. THIS DRY AIR ALOFT WILL ALLOW FOR
EVAPORATIVE COOLING. THUS...THE MAIN THREAT FOR SEVERE WEATHER
TODAY (IF IT MATERIALIZES) APPEARS TO BE DAMAGING WINDS. CURRENT
THINKING IS THAT SCATTERED SHOWERS AND THUNDERSTORMS WILL FORM
ACROSS THE WRN CWFA THIS AFTERNOON...AND THEN THEY WILL BECOME MORE
CONSOLIDATED ACROSS THE ERN CWFA BY LATE AFTERNOON.
AS THE COLD FRONT MOVES EAST TONIGHT...DRIER AIR WILL INFILTRATE THE
REGION...BRINGING AN END TO SHOWERS AND THUNDERSTORMS.
.ILN...NONE.
HICKMAN
oh
STATE FORECAST DISCUSSION
NATIONAL WEATHER SERVICE MOUNT HOLLY NJ
300 PM EDT WED JUN 2 1999
---------------------------------------------------------------------
NOTE TO USERS OF THIS PRODUCT - EFFECTIVE 9 AM EDT JUNE 15 1999...
THE STATE FORECAST DISCUSSION FROM THE NATIONAL WEATHER SERVICE
FORECAST OFFICE IN MOUNT HOLLY...NEW JERSEY WILL BECOME AN AREA
FORECAST DISCUSSION...WITH A NEW WORLD METEOROLOGICAL ORGANIZATION
(WMO) HEADER AND NOAA WEATHER WIRE SERVICE (NWWS) PRODUCT IDENTIFIER.
PLEASE TAKE THE APPROPRIATE STEPS TO ENSURE YOUR CONTINUED RECEIPT OF
THIS PRODUCT.
WMO HEADER FXUS71 KPHI FXUS61 KPHI
NWWS ID PHLSFDPHL PHLAFDPHI
IF YOU HAVE QUESTIONS REGARDING THIS CHANGE...PLEASE CONTACT
METEOROLOGIST-IN-CHARGE GARY SZATKOWSKI AT 609-261-6600.
---------------------------------------------------------------------
DISC: LARGE SFC HI OVR SE W/B DIFLECTING APPROACHING LO PRES NNE INTO
EASTERN CANADA. SFC LO SPINNING THRU MI ATTM WITH SVRL CONVECTIVE
BANDS E INTO OHIO/PENNA AS SW MOVES ENE THIS EVENING. SOME TSTMS
WILL HOLD TOGETHER MOVING INTO UNSTABLE AIR E OF APPALACHIANS. W/B
WATCHING LINE OF TSTMS FOR ANY SUSPECT CELLS BUT NONE ARE LOOKING
TOO OMINOUS AT THIS TIME. SOME HVY RAIN WAS FALLING OVER WRN HALF OF
PA AND EXPECT THAT WE MAY GET INTO A FEW DOWNPOURS THIS EVENING ESP
OVER THE NRN PART OF CFA. SPC RUC2 SHOWS MAX ACROSS PA BORDER /.76/
AND WITH THE FRONT FIRST HALF OF THU. WINDS LIKELY TO GUSTS ON THE
ORDER OF 30 TO 40 KTS THIS EVENING WITH ANY TSTMS. 80H JET NICELY
PACKED E OF LO WITH SPEEDS OF 35-50KT.
WE GET THRU THIS PERIOD OF MUCH NEEDED RAIN TONIGHT AND ANOTHER
CHANCE WITH CFNT ON THU. MOST OF ACTIVITY ON THU WITH THE FRONT AND
MAY BE THRU BY NOONTIME EXCEPT FOR THE EXTREME SE SEXNS. A
REFRESHING CHANGE...NOT THAT ITS BEEN THAT BAD...ON TAP THU NIGHT
INTO FRI.
.PHI...NONE.
SEE YA...
EBERWINE (DIX 88D OTS)
</PRE><HR> <BR><PRE>FXUS61 KCTP 021857 pa
STATE FORECAST DISCUSSION
NATIONAL WEATHER SERVICE MOUNT HOLLY NJ
1035 AM EDT WED JUN 2 1999
---------------------------------------------------------------------
NOTE TO USERS OF THIS PRODUCT - EFFECTIVE 9 AM EDT JUNE 15 1999...
THE STATE FORECAST DISCUSSION FROM THE NATIONAL WEATHER SERVICE
FORECAST OFFICE IN MOUNT HOLLY...NEW JERSEY WILL BECOME AN AREA
FORECAST DISCUSSION...WITH A NEW WORLD METEOROLOGICAL ORGANIZATION
(WMO) HEADER AND NOAA WEATHER WIRE SERVICE (NWWS) PRODUCT IDENTIFIER.
PLEASE TAKE THE APPROPRIATE STEPS TO ENSURE YOUR CONTINUED RECEIPT OF
THIS PRODUCT.
WMO HEADER FXUS71 KPHI FXUS61 KPHI
NWWS ID PHLSFDPHL PHLAFDPHI
IF YOU HAVE QUESTIONS REGARDING THIS CHANGE...PLEASE CONTACT
METEOROLOGIST-IN-CHARGE GARY SZATKOWSKI AT 609-261-6600.
---------------------------------------------------------------------
NOT GOING TO MAKE TOO MANY ADJ IF ANY. CWA BRIGHTENING UP AND TEMPS
W/B REACHING TOWARD FCST HIGHS FROM EARLIER PCKG. SPEED MAX OF 50KT
AND HIGH PW'S TO REMAIN W OF FA THIS AFTERNOON. SPC'S RUC2 MODEL
UPDATE A NICE DEPICTION OF CURRENT STATE OF ATMOS AND FOR THIS
AFTERNOON MOST OF CWF WILL BE PRECIP FREE. IMPRES VORT MAX OVER LWR
MI W/B FIRING MECH LATER ON TODAY.
OTHERWISE...SEE YA THIS AFTERNOON.
.PHI...NONE.
EBERWINE
</PRE><HR> <BR><PRE>FXUS71 KPBZ 021402 pa
AREA FORECAST DISCUSSION...UPDATED
NATIONAL WEATHER SERVICE GREENVILLE-SPARTANBURG SC
1153 PM EDT WED JUN 2 1999
QUICK UPDATE PLANNED TO LOWER POPS IN NC MTNS...NORTHEAST GEORGIA
AND WESTERN MOST SOUTH CAROLINA...AND TO ADD SOME QUALIFIER WORDING
FOOTHILLS/PIEDMONT AS APPEARS CONVECTION WILL BEGIN TO WANE IN
PREDAWN. ALTHO 00Z RUC DOES SUPPORT LEAVING SOME LOW POPS IN
OVERNIGHT...IT IS ALSO SUGGSTNG BEST MOISTR CONVERGENCE TO EAST OF
OUR CWFA LATE TONIGHT. ALSO PLAN TO PUNCH UP FOG WORDING A BIT; WITH
SOME AREAS RECEIVING OVER AN INCH OF RAIN TONIGHT...AREAS OF DENSE
FOG NOW APPEAR LIKELY...ESPECIALLY MTN ZONES AND ADJACENT FOOTHILLS.
.GSP...NONE.
BURRUS
</PRE><HR> <BR><PRE>FXUS62 KGSP 030155 sc
AREA FORECAST DISCUSSION
NATIONAL WEATHER SERVICE GREENVILLE-SPARTANBURG SC
955 PM EDT WED JUN 2 1999
CONVECTION CONTINUES TO PROPAGATE EASTWARD ACROSS CWFA...AHEAD OF
WELL DEFINED VORTICITY CENTER IN GEORGIA AND SHORTWAVE/FRONTAL BNDRY
COMBO UPSTREAM IN TENNESSEE. INSTABILITY REMAINS MINIMAL...BUT
CONVERGENCE ENHANCED BY OUTFLOW FROM MAIN PRECIP AREA IS DEVELOPING
A NEW LINE OF STORMS NEAR GSP EXTENDING NOW INTO NORTH CAROLINA.
WILL RAISE POPS TO LIKELY IN FOOTHILLS/PIEDMONT ZONES AND MAY FOR
OVRNGT...MOST OF PRECIP SHUD BE OUT OF AREA BY MIDNIGHT EXCEPT
EXTREME EASTERN SECTIONS...AND MAY HAVE TO UPDATE BEFORE MIDNIGHT IF
PRECIP DWINDLES UNEXPECTEDLY FAST. WITH JUICY AIR IN PLACE AND
SHORTWAVE/FRONT STILL TO MOVE INTO REGION PER 00Z RUC...WE COULD SEE
ADDITIONAL CONVECTION DEVELOP ALMOST ANYWHERE. WILL TAKE POPS DOWN TO
LOW CHC IN EXTREME WEST.
.GSP...NONE.
BURRUS
</PRE><HR> <BR><PRE>FXUS62 KCHS 030102 sc
AREA FORECAST DISCUSSION
NATIONAL WEATHER SERVICE CHARLESTON SC
900 PM EDT WED JUN 2 1999
SCATTERED PCPN OVER N CNTL GA EARLY THIS EVE SLOLY MOVG E. 12Z MODELS
AS WELL AS LTST MESO ETA/RUC2/MAPS SHOW S/WV OVER NE GA SLIDING NE
TNGT PASSING WELL N OF AREA. ONE AREA OF LIFT GOES N WITH THE S/WV...
ANOTHER AREA SUSPICIOUSLY MOVES ACROSS SE GA. 00Z LAPS/MAPS ANAL
SHOWING A POCKET OF HIER CAPE/THETA-E AND LWR LI OVER INLAND SE GA
HOLDING TOGETHER. 00Z CHS SOUNDING NOT IMPRESSIVE AT ALL AS FAR AS
MOISTURE AND STABILITY. FOR THE UPDATE...WL INSERT A SLGT CHC POP FOR
WELL INLAND SE GA AND ALLENDALE CTY SC FOR SHRA. IF PCPN OVER CNTL GA
HOLDS TOGETHER NEXT COUPLE OF HRS...CAN UPDATE AREAS FURTHER E FOR
A 20 POP. OTHER THAN THAT...WINDS ALG THE CST STIRRING FAIRLY WELL
THIS EVE. WL UP CSTL WINDS TO 10 MPH TNGT AND MAY TWEAK FCST LOWS
UP A CAT IN A FEW SPOTS. OTHER THAN THAT...NO SIG CHGS.
CWF: EXPECTING OCNLY GUSTY CONDITIONS ALG THE BEACHES AGAIN TONIGHT
ON THE COOLING LAND/ WARMER WATER INTERFACE. RUC INDICATES TIGHTER
GRADIENT WILL RESIDE JUST N OF OUR S CAROLINA MFA AND WILL LIKELY
CONTINUE WITH 15 KT OVERNIGHT ALTHOUGH FINAL DECISION MAY LEAD TO
BECMG SW 15 TO 20 KT NRN WATERS ON UPDATE. GEORGIA WATERS FCST ON
TARGET AND EXPECT FEW CHANGES.
.CHS...
SC...NONE.
GA...NONE.
RVT/TJR
</PRE><HR> <BR><PRE>FXUS72 KCAE 030027 sc
AREA FORECAST DISCUSSION...UPDATED
NATIONAL WEATHER SERVICE GREENVILLE-SPARTANBURG SC
753 PM EDT WED JUN 2 1999
UPDATE FORTHCOMING TO REMOVE WATCH WORDING FROM FIVE COUNTIES IN
NORTHEAST GEORGIA AND WESTERN NORTH CAROLINA...AND BLEND THEM BACK
IN WITH THEIR CUSTOMARY GROUPINGS TO THEIR IMMEDIATE EAST. 21Z RUC
SUGSTS SHORTWAVE WILL PASS ALMOST DIRECTLY OVER OUR CWFA AHEAD OF
SURFACE COLD FRONT...WITH CONVECTION ON NRN END OF CONVECTIVELY
INDUCED VORTICITY MAXIMUM MOVING INTO OUR NORTHEAST GEORGIA COUNTIES
AS THE 8 PM HOUR APPROACHES. WILL MAKE NO OTHER CHANGES TO THE ZONES
WITH THIS UPDATE.
.GSP...NONE.
BURRUS
</PRE><HR> <BR><PRE>FXUS62 KCHS 021856 sc
AREA FORECAST DISCUSSION
NATIONAL WEATHER SERVICE GREENVILLE-SPARTANBURG SC
209 PM EDT WED JUN 2 1999
CONVECTIVLY INDUCED VORT FROM LAST NIGHTS CONVECTION HAS SPRUNG INTO
LIFE AGAIN TDA WITH AN IMPRESSIVE LOOKING AREA OF CONVECTION OVER
NE AL. THIS FEATURE IS EMBEDDED IN A LARGER SCALE WEAK TROUGH.
SFC FRONT...SUCH AS IT IS...HAS NOT MADE A LOT OF SWRD PROGRESS
TDA. IN FACT...IT LOOKS ONE OF THOSE SITUATIONS WHERE IT WILL BE
VERY DIFFICULT TO JUDGE WHEN THE FRONT PASSES THE CWA. SFC DWPTS
DO NOT TAKE A DIVE UNTIL TMRW AFTN.
THE NGM AND AVN DID NOT INITIALIZE THE VORT AS WELL AS THE ETA. IN
FACT...THE ETA SOLUTION OF SHEARING THE VORT ACROSS THE REGION
OVERNIGHT IS NOT A BAD ONE. THE RUC TAKES THE MCV SE ACROSS GA THIS
EVENING...WHICH DOESN/T MAKE SENSE.
WHILE SOME CONVECTION IS DEVELOPING ON LEE TROUGH IN THE NC
FOOTHILLS...THE BULK IS STILL A WAYS TO THE WEST. I/M INCLINED TO
BELIEVE THAT WITH THE WEAK SHEAR THE MCS WL FALL APART LATER IN
THE EVENING AND NOT GENERATE WIDESPREAD CONVECTION OVER THE CWA...
THOUGH I WL KEEP HIGHER POPS IN THE WRN COUNTIES. ON THE PLUS
SIDE...NGM/ETA BOTH HAVE GOOD H8 CONVERGENCE OVER THE REGION BY 06Z
AND DEEP MOISTURE. THE NGM GENERATES A LARGE SWATH OF PCPN ACROSS
THE CWA OVERNIGHT...AND HAS FOR THE PAST COUPLE RUNS. STILL...AS WE
HAVE HAD SUCH A TOUGH TIME GETTING PCPN LATELY...WL NOT HAVE MORE
THAN HIGH CHANCE POPS ANYWHERE UNLESS THINGS CHANGE BEFORE ISSUANCE
TIME.
I REMOVED THE LOW CHANCE POPS FROM THE MTNS ON THU...OTHERWISE
W/FRONT-LEE TROUGH COMBO OVER ERN CWA...IDEA OF KEEPING CHANCE
POPS ERN MOST ZONES STILL A GOOD ONE.
RIDGE BUILDS INTO REGION THU NGHT AND FRI. WHILE ETA HAS A WEAK
MINOR WAVE APPROACHING FRI...SEE NO WAY THIS COULD INITIATE ANYTHING
W/BNDRY LAYER DRYING AND NO CONVERGENCE. ONLY MINOR DIFFERENCES FROM
FWC TEMPS THROUGH THE PERIOD.
STILL PLAN ON KEEPING THE EXTENDED DRY WITH H5 RIDGE IS NO HURRY TO
LEAVE THE SE.
CAEWRKGSP OUT BY 230.
PRELIMINARY NUMBERS:
AVL 60/82/55/82 4100
CLT 64/85/62/85 3310
GSP 64/86/62/86 3210
.GSP...NONE.
MCAVOY
</PRE><HR> <BR><PRE>FXUS72 KCAE 021457 sc
STATE FORECAST DISCUSSION
NATIONAL WEATHER SERVICE COLUMBIA SC
1015 AM EDT WED JUN 2 1999
TSTMS MOVG ACRS AL INTO NW GA ATTM WHILE BAND OF MID CLDS DVLP ACRS
CNTRL SC. 12Z RUC BRINGS H5 S/WV EWD AND WEAKENS IT SM. A LTL LOW LVL
MSTR CONVGNC WORKS INTO WRN SXNS CAROLINS BY LATE AFTN FOR CONTD LOW CHC
TSTMS. ATTM DO NOT EXPECT ANY SVR TSTMS WITH STRONGER STMS PRODUCING SM
HAIL/G40KT. CLDS ACRS CNTRL SC MAY HOLD TEMPS DN A FEW DEGS BUT SHD SEE
SM BRKS DURG THE AFTN. NO CHGS TO CUR FCST.
.CAE...NONE.
CDL
</PRE><HR> <BR><PRE>FXUS62 KGSP 021417 sc
AREA FORECAST DISCUSSION FOR SOUTHEAST SD/SOUTHWEST MN/NORTHWEST IA
NATIONAL WEATHER SERVICE SIOUX FALLS SD
903 PM CDT WED JUN 2 1999
LARGE SCALE PATTERN THIS EVENING HAS LARGE COLD TROF ALG CA COAST...
AND COUPLE OF STGR IMPULSES WRAPPING ARND. 12Z ETA/NGM ARE GOOD AT
PLACEMENT OF VORT NORTH OF 4 CORNERS...AVN OFF TO N...BUT LIKE THE
ETA SECONDARY PLACEMENT IN ERN NM...SETTING OFF LARGE MCS IN TX
PNHDL. ETA OTHERWISE WAS ALSO PREFERRED...WITH SOME CONTRIBUTIONS
TNGT ALLOWABLE FM RUC...ALTHOUGH 21Z RUC WAS LTL ON DRY SIDE AT LOW
LEVELS AGAIN...ABOUT 2-4C TOO LOW AT 850 HPA. DILEMMA THIS EVENING
IS DEALING WITH CONVECTIVE THREAT.
INITATION AT THIS TIME IS OCCURRING IN LOW LEVEL CONVERGENCE MAX ON
NRN PERIPHERY OF LLJ...AT RUC ADVERTISED NR 40 KTS AT RWD. OBSERVED
NWRD MOVEMENT AGREES THUS FAR WELL WITH THE RUC 850-300 THICKNESS...
WHICH WOULD TAKE ACTION INTO ND...THEN LEAK ESE LTR TNGT...REMAINING
LARGELY TIED TO ENERGY SOURCE COURTESY OF LLJ INTO SCNTRL SD.
BEST CHC WOULD BE FOR ORGANIZED SYSTEM TO BYOE (BRING YOUR OWN
ENVIRONMENT)...BUT WOULD STILL TAKE QUITE A BEATING DOING SO. RUC
SUGGESTS THAT AIRMASS AS HEADING EAST OVR CWA BY 09Z WILL BE VERY
UNFAVORABLE BY THE TIME YOU REACH I-29...AND WIND FIELDS NOT THAT
IMPRESSIVE AS WELL TO KEEP UP ORGANIZATION GAINED EARLIER. REMNANTS
OF COMPLEX WOULD LKLY TAKE UNTIL MRNG HOURS TO ARRIVE IN THESE
AREAS...AND CRNT FCST HANDLES QUITE WELL.
SFC WNDS ARE BACKING SLIGHTLY THROUGH THE PLAINS IN RESPONSE TO WRN
PLAINS PRESSURE FALLS...TO N OF OK SFC WMFNT. MOST LIKELY AREA TNGT
TO REMAIN AT LEAST SOMEWHAT COUPLED WILL BE WRN CWA...SO IF DECIDE
TO UPDATE...WL BUMP UP 5 MPH OR SO...AND BACK OFF TIMING AND
INCREASE CERTAINTY OF CONVECTION LTR TNGT.
ACTUALLY...AM SOMEWHAT MORE CONCERNED ABOUT CONVECTIVE THREAT THU
EVNG ACRS WRN CWA AS WMFNT LIFTS NWRD INTO NEBRASKA...AND LLJ
REINVIGORATES. BUT FOR NOW...WL LEAVE THAT UP TO MID FCSTR TO
SOLVE...AS BOUNDARIES WILL BE BETTER DEFINED BY THEN.
.FSD...NONE
CHAPMAN
</PRE><HR> <BR><PRE>FXUS63 KUNR 030153 sd
AREA FORECAST DISCUSSION
NATIONAL WEATHER SERVICE MORRISTOWN TN
946 PM EDT WED JUN 2 1999
...UPDATE FOR PRECIP MOVING OUT OF THE AREA...
CURRENT RADAR TRENDS SHOW PRECIP MOVING OUT OF NORTHEAST TENNESSEE
AND SOUTHWEST VIRGINIA AT THIS TIME. STILL CONCERNED A LITTLE FOR
CHANCE POPS OVERNIGHT. RUC SHOWS ANOTHER SHORTWAVE TO MOVE INTO THE
AREA BETWEEN 09-12Z...AND WITH LINGERING OUTFLOW BOUNDARIES AND WEAK
SURFACE COLD FRONT...COULD SEE SOME ISOLATED THUNDERSTORMS FIRE
AGAIN LATE TONIGHT...SO WILL GO WITH A PARTLY CLOUDY SKY AND 20
PERCENT CHANCE OF SHOWERS AND THUNDERSTORMS.
THE ATMOSPHERE IS STILL UNSTABLE...BUT WITH THE ATMOSPHERE BEING
TURNED OVER THIS AFTERNOON AND EVENING...SHOULD NOT BECOME SEVERE.
ANOTHER CONCERN IS WITH CLEARING SKIES...AND RECENT RAINS...FOG
POSSIBLE SO WILL ADD PATCHY FOG TO THE ZONES.
THANKS...PDK
</PRE><HR> <BR><PRE>FXUS64 KOHX 030124 tn
AREA FORECAST DISCUSSION...RESEND
NATIONAL WEATHER SERVICE MORRISTOWN TN
1045 AM EDT WED JUN 2 1999
APPEARS THAT ZONES HANDLE THIS AFTERNOON/S WEATHER SCENARIO RATHER
WELL...SO NO CHANGES ARE ANTICIPATED.
09Z RUC INDICATES EARLY MORNING S/W IN NORTH-CENTRAL ALABAMA...WITH
COOLER AIR ALOFT SUPPORTING ELEVATED CAPES UP TO 2000 J/KG AND
THUNDERSTORMS NOW GETTING INTO THE SOUTH PLATEAU AND VALLEY. ALSO...
TO THE NORTH...NOCTURNAL MCS OVER KENTUCKY FALLING APART RATHER
RAPIDLY. SOME THUNDERSTORMS FORMED THIS MORNING ALONG MAIN OUTFLOW
BOUNDARY IN CUMBERLAND PLATEAU INTO NORTHEAST TENNESSEE.
LATEST MODEL AND SATELLITE DATA INDICATE THAT H5 TROUGH AND S/W
SYSTEM UPSTREAM IN THE MID-MISSISSIPPI VALLEY WILL SUPPORT AFTERNOON
CONVECTION IN ADVANCE OF COLD FRONT AND ALONG LINGERING OUTFLOW
BOUNDARIES. SOME AFTERNOON HEATING WILL INCREASE INSTABILITIES...
WITH CAPES RANGING FROM 2000 TO 3000 J/KG AND LI/S UP TO -7.
DM
</PRE><HR> <BR><PRE>FXUS64 KOHX 021419 tn
UTAH AREA FORECAST DISCUSSION
NATIONAL WEATHER SERVICE SALT LAKE CITY UTAH
900 PM MDT WED JUN 2 1999
SYNOPSIS...SOUTHERLY FLOW AHEAD OF A LOW ALONG THE WEST COAST WILL
CONTINUE OVER THE AREA INTO FRIDAY. THE AIRMASS WILL DRY SOMEWHAT
FROM THE SOUTHWEST TONIGHT AND THURSDAY...THEN MOISTEN UP AGAIN
THURSDAY NIGHT AND FRIDAY AS THE UPPER LOW MOVES INLAND. SHOWERS WILL
DECREASE FROM THE SOUTHWEST TONIGHT AND WILL BE SCATTERED ABOUT THE
AREA THURSDAY...MAINLY OVER THE NORTH. SHOWERS WILL INCREASE FROM THE
SOUTHWEST AGAIN THURSDAY NIGHT AND FRIDAY.
DISCUSSION...COUPLE OF VORTICITY CENTERS ROLLING UP THE FRONT SIDE
OF THE LOW. ONE HAS CROSSED THE UINTAS AND IS NOW IS SOUTHWEST WY
AND BEST DEPICTED BY RUC AT 500MB. THE SECOND IS ACROSS EASTCENTRAL
NV AND SOUTHWESTERN UT AND BEST DEPICTED BY RUC AT 300MB.
CONVECTIVE ACTIVITY HAS SUBSIDED PAST FEW HOURS EXCEPT NEAR
SOUTHERN UT-NV WAVE. AS THIS WAVE CONTINUES TO MOVE NORTH...WOULD
EXPECT CONTINUED ACTIVITY ACROSS WEST CENTRAL THEN NORTHWEST UTAH
INTO THE EARLY NIGHT...WITH RUC PROGGING 300MB WAVE AXIS PASSING
GREAT SALT LAKE AT 09Z. PRECIPITATION TAPERING OFF IN THE NORTH
AND WILL LET URBAN/SMALL STREAM ADVISORY EXPIRE. CURRENT FORECASTS
FOR TONIGHT LOOK OK AND NO AMENDMENTS PLANNED.
SLC 8656 CDC 7466 BURCH
.SLC...FLOOD WARNING FOR THE LOGAN RIVER UFN UTZ001-007.
URBAN AND SMALL STREAM ADV TIL 10PM UT/SL COUNTIES.
</PRE><HR> <BR><PRE>FXUS65 KSLC 022201 ut
AREA FORECAST DISCUSSION
NATIONAL WEATHER SERVICE BALTIMORE/WASHINGTON
910 PM EDT WED JUN 2 1999
ERLR THIS EVNG ONE STRONG CELL WARNED ON MOVED FROM CNTRL BERKELEY CTY
WV ACRS SRN WASH CTY MD BTWN HAGERSTOWN AND BOONESBORO THEN NEAR
THURMONT MD INTO NW CARROLL CTY BEFORE SPINNING OFF ANOTHER CELL ON THE
ITS SRN XTRM AND MOVING INTO CNTRL CARROLL AND BALTIMORE CTY'S.
MEANWHILE ANOTHER CLUSTER OF SMALL CELLS HAS DVLPD VCNTY OF THE E
PORTION OF THE ERN PNHNDL OF WV. THESE CELLS WILL CONTINUE TO THE ENE
BUT LTST MESO ANALYSIS WUD SUGGEST THESE ARE NOT ENTERING A VERY FAVORBL
ENVIRONMENT FOR CONTINUED DVLPMNT. ELSW ACRS THE CWA THE MESOS SUGGEST
CONTINUED STABILIZATION.
LTST RUC FCST WEAK CDFNT TO ADVANCE TO A BWI-NYG LINE BY ARND 09Z.
ANOTHER WEAK LINE OF CONV ACTVTY IS DVLPG OVR N-CNTRL WV ATTM WHICH MAY
MOVE ACRS THE NRN ZNS OF THE CWA LATER TNGT SO WILL KEEP A 30 POP THERE.
ELSW RUC UPR SUPPORT FCST AND MESOS WUD SUGGEST LTL IF ANY ACTVY OVRNGT
ACRS THE SRN ZNS. OTW ERLR FCST APPEARS ON TARGET.
THAT'S IT FOR NOW...LATER.
.LWX...NONE.
PAP
</PRE><HR> <BR><PRE>FXUS61 KLWX 021830 md
EAST CENTRAL FLORIDA FORECAST DISCUSSION
NATIONAL WEATHER SERVICE MELBOURNE FL
1025 AM EDT THU JUN 3 1999
THIS AFTERNOON...VERY WEAK FLOW UP THROUGH 5KFT SHOWN BY THE CAPE
915MHZ PROFILER WILL ALLOW EAST COAST SEA BREEZE TO PUSH WELL INLAND
THIS AFTERNOON. HIGHEST POPS ARE ACROSS THE SOUTH...LOWERING AS YOU
GO NORTH. THIS MAKES SENSE AS 12Z RUC SHOWS HIGHEST MOISTURE ACROSS
SOUTHERN THIRD OF FA...WHERE SOME SHOWER ACTIVITY IS OCCURRING AT
THIS TIME...ALBIET MAINLY OFFSHORE. EXPECT SHOWERS AND STORMS TO
DEVELOP THIS AFTERNOON ALONG SEA BREEZE..ESPECIALLY AS IT INTERACTS
WITH LAKE BOUNDARIES AND OUTFLOWS FROM OTHER SHOWERS AND STORMS.
MAY BUMP UP MAX TEMPS FOR PORTIONS OF CENTRAL AND SOUTHERN SECTIONS
...ALREADY 84F HERE AT MLB. OTHERWISE CURRENT FORECAST LOOKS GOOD.
MARINE...POSITION OF RIDGE AXIS IS OVER NORTH FL AND DRIFTING SOUTH
...THUS BUOY WINDS ARE A LITTLE LIGHTER NORTH AS INDICATED IN THE
CURRENT CWF. SEA BREEZE CIRCULATION TO KICK WINDS UP TO ~10KT NEAR
SHORE...SO WILL INDICATE THIS IN THE FLG-COF LEG. OTHERWISE...NO
CHANGES.
.MLB...NONE.
KELLY/CRISTALDI
</PRE><HR> <BR><PRE>FXUS62 KEYW 031410 fl
AREA FORECAST DISCUSSION...UPDATED
NATIONAL WEATHER SERVICE DES MOINES IA
1031 AM CDT THU JUN 3 1999
CHALLENGE FOR THIS UPDATE TO BE SW CWA PRECIP CHCS AND TEMPS CWA
WIDE.
MORNING UPPER AIR ANALYSIS SHOWING RIDGE EXTENDING FROM MID MISS
VALLEY...NORTH THRU ERN IA AND CEN MN. MEANWHILE...AT 850 MB...
THERMAL RIDGE...AND THETA E RIDGE COULD BE FOUND OVER CEN AND ERN
KS/NE. BEST LOW LEVEL JET ALSO IN THOSE AREAS. FINALLY...RAOBS AND
PROFILERS SHOWING SHORT WAVE TROF ROTATING NORTHWARD THRU NE. AT
THE SFC...WARM FRONT FROM NE PAN THRU CEN KS TO SW MO AT 15Z.
MOISTURE AND WARM ADV OVER THIS WARM FRONT CONTINUES TO SET OFF SOME
SHOWERS AND A FEW TSRA. ORIGINAL BATCH OF PRECIP HAS MOVED THROUGH
MO VALLEY IN WRN IA AND ERN NE. THIS ACTIVITY HAS PRETTY MUCH
DISSIPATED AS SHOWING ON 88D AND WARMING IR SAT LOOPS. FARTHER
SOUTH...LIFT OVER WARM FRONT CONTINUES IN NE KS WITH AREAS JUST
SOUTH OF WARM FRONT GETTING GOOD HEATING. WILL LIKELY SEE MORE
TSRA IN THESE AREAS. GIVEN LATEST LAPS TRENDS FOR LI/CAPE/CIN/THETA
E CONV IN FAR WRN IA...SW IA...NRN MO...AND POINTS SW...WOULD EXPECT
THIS ACTIVITY TO CONTINUE. 12Z RUC ALSO BEARS THIS OUT WITH THETA E
RIDGE AND CONV MOVING IN SW CWA AFTER 18Z. IT EVEN BRINGS IN A
LITTLE PRECIP INTO THESE AREAS AS WELL.
THUS...WILL CONTINUE WDLY SCT SHRA/TSRA IN SW CWA FOR THE REST OF
THE DAY.
FOR TEMPS...PLENTY OF CLOUD COVER ACROSS CWA...EVEN THO ITS PRETTY
THIN IN NE CWA. LATEST VIS LOOPS WOULD POINT TO THICKER CLOUDS
MOVING OVER MOST OF CWA. THUS...TEMPS WILL HAVE TO BE KNOCKED DOWN
A NOTCH OR TWO.
.DSM...NONE
SEARCY
</PRE><HR> <BR><PRE>FXUS63 KDMX 030836 ia
AREA FORECAST DISCUSSION
NATIONAL WEATHER SERVICE JACKSON KY
955 AM EDT THU JUN 3 1999
UPDATE TO TAKE OUT DENSE FOG ADVISORY. VIS SAT SHOWS LOW CLOUDS
SCATTERING OUT UNDER BRIGHT JUNE SUNSHINE. THINK WE WILL SEE A
SCATTERING OF CU INTO EARLY AFTERNOON. 12Z RUC AND 03Z MESOETA SHOWING
8H MOISTURE INCREASING THIS AFTN IN THE MTN ZONES SO MAY BE PARTLY
SUNNY THERE. WILL WAIT FOR MORE MODEL DATA AND UPDATE AGAIN IF NEED BE
BY LATE MORNING.
.JKL...NONE
WHP
</PRE><HR> <BR><PRE>FXUS71 KRLX 031345 ky
AREA FORECAST DISCUSSION
NATIONAL WEATHER SERVICE MARQUETTE MI
1100 AM EDT THU JUN 3 1999
TRANQUIL DAY UNDERWAY ACROSS FA. HIGH TEMPS ARE THE ONLY CONCERN.
VIS SATELLITE IMAGES THIS MORNING SHOW NEARLY CLOUDLESS SKY ACROSS
FA. SOME CI FROM CONVECTION IN PLAINS IS SPREADING E ACROSS MN
TOWARD UPPER LAKES REGION.
LATEST SFC ANALYSIS DEPICTS HIGH PRESSURE RIDGE EXTENDING FROM W
ONTARIO ACROSS W LK SUPERIOR...W UPPER MI INTO E WI. SFC HIGH WILL
SLOWLY PROGRESS E ACROSS UPPER MI/LK SUPERIOR THIS AFTN. ABUNDANT
SUNSHINE AND VERY LIGHT WIND REGIME ASSOCIATED WITH HIGH PRESSURE
WILL ALLOW LK BREEZES TO DOMINATE ACROSS FA THIS AFTN...AND THIS IS
REFLECTED NICELY IN 12Z RUC LOW-LEVEL WIND FIELDS.
USING 12Z GRB SOUNDING AND ASSUMING MIXING UP TO 800-825MB...HIGH
TEMPS IN THE LOWER-MID 70S SHOULD BE REALIZED IN THE INTERIOR W AND
CNTRL PORTIONS OF FA. SLIGHTLY LOWER TEMPS EXPECTED FOR INTERIOR E
FA BEST ON 12Z APX SOUNDING. THESE NUMBERS CORRESPOND WELL WITH
CURRENT FCST AND WITH 14Z LAMP GUIDANCE.
WILL ONLY MAKE MINOR ADJUSTMENTS TO CURRENT FCST ON UPDATE.
.MQT...NONE.
ROLFSON
</PRE><HR> <BR><PRE>FXUS63 KGRR 031434 mi
AREA FORECAST DISCUSSION
NATIONAL WEATHER SERVICE GRAND RAPIDS MI
1035 AM EDT THU JUN 3 1999
WILL ONLY MAKE SOME MINOR MODIFICATIONS TO THE GOING ZONE FORECASTS
THIS MORNING. LATEST VISIBLE SATELLITE IMAGERY SHOWS LOW CLOUDS
QUICKLY MIXING OUT ON THEIR WESTERN EDGE WITH TEMPERATURES RISING
AND ANTICYCLONIC FLOW BUILDING INTO THE AREA. SHOULD BE ABLE TO
REMOVE BECOMING WORDING FROM ZONES... AND GO WITH A MOSTLY SUNNY
FORECAST FOR THE AFTERNOON... BUT WILL WAIT A LITTLE WHILE TO GIVE
THE CLOUD COVER IN THE GREATER LANSING AREA A CHANCE TO MIX OUT
MORE. MODIFIED 12Z SOUNDINGS AND CU SCHEME FROM THE 12Z RUC POINT
TOWARD SCATTERED CU AT BEST ACROSS MOST OF THE FORECAST AREA THIS
AFTERNOON. THE EASTERN AND FAR SOUTHERN PORTION OF THE AREA COULD
SEE SOME BKN CU... BUT DON/T FEEL THE POTENTIAL IS SUFFICIENT TO
PRECLUDE A MOSTLY SUNNY FORECAST. CIRRUS DEBRIS TO THE WEST WILL
CONTINUE TO THIN AS IT DESCENDS THE RIDGE INTO THE AREA... SO IT
WILL NOT POSE MUCH OF A PROBLEM FOR THIS AFTERNOON. FORECAST
TEMPERATURES LOOK PRETTY GOOD... AND MATCH UP WELL WITH MODIFIED 12Z
SOUNDINGS FROM APX AND DTX... AS WELL AS FORECAST 850MB TEMPERATURES
FOR THIS AFTERNOON FROM THE RUC. HOWEVER... WILL BREAK OUT TWO
ADDITIONAL ZONE GROUPS TO BETTER REFINE THE EXPECTED NORTH-SOUTH
TEMPERATURE GRADIENT.
ZONES WILL BE ISSUED BY 1115 AM.
.GRR...NONE.
TRH
</PRE><HR> <BR><PRE>FXUS63 KDTX 031409 mi
AREA FORECAST DISCUSSION
NATIONAL WEATHER SERVICE DETROIT/PONTIAC MI
1008 AM EDT THU JUN 3 1999
VERY AUTUMNAL FEEL OUT THERE THIS MRNG...AS LOW CLOUDS NOT GIVING UP
EASILY IN LOW LVL CYCLONIC FLOW. SFC TROFFINESS IS COUNTERACTING
DIURNAL EFFECTS TO SOME DEGREE...BUT JUNE SUNSHINE STARTING TO WIN
OUT ALONG THE EDGES...ESP IN NW LWR MI. WL SLOW DOWN THE CLEARING
TREND A BIT.
ETA CONTINUES TO PORTRAY ENUF LOW LVL MOISTURE TO POP CU IN THE
PLACES THAT DO CLEAR OUT. THE ETA HAS RUN FAR TOO MOIST IN THE LOW
LVLS...AND AM UNSURE IF RECENT CHANGES IN THE ETA HAVE CORRECTED
THIS. HOWEVER...LATEST RUC SUPPORTS ETA IN KEEPING LOTS OF MOISTURE
BLO 850 MB TDY. WL LEAVE IN PARTLY SUNNY FOR NOW...BUT MAY UPDATE TO
MOSTLY SUNNY IF CU DO NOT DEVELOP IN PLACES LIKE ARB/ADG/TTF BY
MIDDAY.
WITH CLOUDS AROUND LONGER...WL TREND MAX TEMPS DOWN. WL ADJUST WIND
WORDING TO REFLECT MESOETA TREND OF NW WIND...BECOMG NORTH ALL BUT
FAR SOUTH.
.DTX...NONE.
ZOLTOWSKI
</PRE><HR> <BR><PRE>FXUS63 KMQT 030854 mi
AREA FORECAST DISCUSSION
NATIONAL WEATHER SERVICE GAYLORD MI
1025 PM EDT WED JUN 02 1999
CURRENT APX 88D SHOWING AREA OF RAIN...THAT HAD AFFECTED NORTHERN LOWER
AND EASTERN UPPER MICHIGAN EARLIER THIS AFTERNOON AND EVENING...HAS
DIMINISHED GREATLY AND EXITED COMPLETELY EAST OF THE AREA. LATEST
IR STLT LOOP AND AREA SURFACE OBSERVATIONS FROM WISCONSIN AND MINNESOTA
SHOWING GENERALLY SCT LOW AND HIGH CLOUDS IN AN AREA OF DEVELOPING UPPER
LEVEL AND SURFACE RIDGING. THIS AREA OF RIDGING AND DRYING IS FORECAST
BY THE RUC TO CONTINUE SLOWLY MOVING EASTWARD INTO THE GREAT LAKES
REGION OVERNIGHT.
WITH WEAKENING PRESSURE GRADIENT OVERNIGHT AND THEREFORE CALMING WINDS
AND CLEARING SKIES... WILL MENTION SOME FOG IN THE FORECAST DUE TO THE
RAINFALL AND COOLING TEMPS.
.APX...NONE.
SWR
</PRE><HR> <BR><PRE>FXUS63 KDTX 030222 mi
AREA FORECAST DISCUSSION
NATIONAL WEATHER SERVICE OMAHA/VALLEY NE
240 AM CDT THU JUN 3 1999
FORECAST CHALLENGES -- THUNDERSTORM POTENTIAL THROUGH FORECAST
SYNOPSIS -- THUNDERSTORMS CONTINUE TO DEVELOP IN STRONG SOUTHERLY
FLOW. PROFILERS SHOW CONTINUED DEVELOPMENT OF THE LOW LEVEL JET.
MENAWHILE MAJOR CIRC REMAINS OFF THE CA COAST. A VERY DISTINCT WAVE
IS MAKING ITS WAY NORTHEAST INTO W CENTRAL KANSAS. IT IS VERY
EVIDENT ON THE WATER VAPOR IMAGERY. 8Z ANALYSIS INDICATED A RIDGE
AXIS FROM CNTRL MN...THROUGH WRN IA A
LOOKING AT THE 06Z RUC AS A SHORT TERM INDICATES CONTINUED VERY
RAPID MOISTURE ADVECTION JUST ABOVE 850 MB. WITH THIS AND
CONVERGENCE THERE IS A STRONG ARGUMENT FOR THE THUNDERSTORMS IN N
CENTRAL KANSAS TO CONTINUE TO MOVE NORTHEAST AND INCREASE IN
COVERAGE.
FORECAST...IT WOULD APPEAR THAT ALTHOUGH THE NGM SEEMED TO BE DOING
BETTER PRIRO TO 06Z WITH MOST ACTIVITY TO THE S ACROSS SRN KANSAS
AND OKLAHOMA...THE ETA IS LOOKING MORE RELIABLE. THIS WILL MEAN ONE
AREA OF THUNDERSTORMS MOVING THROUGH THE CWA TODAY FROM THE SW. THE
BIE AREA SHOULD CLEAR ENOUGH THAT TEMPS THERE ARE LIKELY TO REACH
THE MID 80S. WITH THE WAVE MOVING ALONG RATHER DISTINCTLY...SHOULD
GET MODERATE TO HEAVY RAIN BUT FOR A SHORT PERIOD OF TIME IN THE
PARTS OF SERN AND EAST CENTRAL NEBRASKA THAT ARE ALREADY WET.
LOOKING FURTHER OUT...THERE IS SOME ARGUMENT TO AGREE WITH THE ETA
AND ALLOW FOR ANOTHER CHANCE OF THUNDERSTORMS LATE TONIGHT INTO
THURSDAY.
LOOKING AT TEMPS...TEND TO HOLD NRN CWA TO MID 70S UNDER CLOUDS...TO
MID 80S IN BIE. FOR TNT WITH INCREASING WINDS AGAIN AND MOISTURE
ADVECTION MID 60S SEEMS LOGICAL. FOR FRIDAY SLIGHT CHANCE IN THE
E. FOR FRIDAY WILL DEPEND ON SHOWERS BUT WILL HOLD AROUND 80.
.OMA...NONE
POWERS
</PRE><HR> <BR><PRE>FXUS63 KGID 030654 AMD ne
AREA FORECAST DISCUSSION
NATIONAL WEATHER SERVICE BINGHAMTON NY
1030 AM EDT THU JUN 3 1999
KBGM RADAR SHOWS MOST OF THE CWA PRECIP FREE ATTM. THERE ARE A FEW WEAK
RETURNS OVER ONEIDA COUNTY...THE WYOMING VALLEY AND THE POCONOS. ANY
SPRINKLES OR ISOLATED LGT SHOWERS REMAINING THIS AFT CAN BE COVERED BY
NOWCASTS AND WILL NOT INCLUDE IN THE ZONES. 09 UTC RUC SHOWS LOW LVL
MOISTURE HANGING ON THRU MUCH OF THE AFT. VIS SAT PICS SHOW QUITE A BIT
OF CLOUDS UPSTREAM SO WILL GO WITH MOCLDY. ALSO LOWERED TEMPS DUE TO
MORE CLOUDS THAN EXPECTED AND SOME PLACES ACTUALLY DROPPING A DEGREE OR
TWO OVER THE PAST HOUR. NO OTHER CHANGES.
.BGM...NONE.
SMF
</PRE><HR> <BR><PRE>FXUS71 KALY 031416 ny
STATE FORECAST DISCUSSION
NATIONAL WEATHER SERVICE ALBANY NY
1015 AM EDT THU JUN 3 1999
KENX WSR-88D STILL LIMITED TO CLEAR AIR MODE PENDING ARRIVAL OF
BACK-ORDERED PARTS.
.DISC...1ST CLDFNT NR A KAQW/KPOU LN ATTM. WND HAS SHFT 2 THE W
BEHIND IT...AND TDS ARE LOERING. HOWEVER STRGR SHT WV STL LURKS OVR
SERN ONT AS WELL AS 2NDRY SFC TROUGH. THIS WV (AND BNDRY) ARE PROGGED
2 SLD ACRS NRN NY BY ERLY PM. SAT PIX SHWS LOTS OF CLDS UPSTRM AND IT
APPRS THAT MDLS HV MISSED THIS FEATURE. THEY HV SPRD FRM ABT ALB AND
PTS N AND W. 270 WND MINIMIZES DWNSPG IN OUR AREA. ONCE THE WND TURNS
320-340...THEN WE SHLD DWNSLP NICELY (DURG EVE). CLDS APPRNTLY THE
RESULT OF PRTY GD LO LVL CAA WHICH IN TURN IS INCRG INV BTWN H8/H7
HGHT. THIS SCENARIO WL TEND 2 STABILIZE THE ATMOS. LTST RUC DOES
DEPICT THIS. WITH THE SHT WV MVG ACRS STL DO NOT FEEL COMPLETELY
COMFORTABLE REMVG ALL MENTION OF PCPN. WL GO FOR THE 20 POP DEAL MST
AREAS. DUE TO A MORE STABILIZED ATMOS...WL KP TSRA OUT XCPT FOR MID
HUDSON VLY AND LITCHFIELD HILLS WHICH IRONICALLY ARE/WL B ENJOYING
THE MST SUN. THE FNT HS NOT MVD THROUGH THERE YET. SO WL MENTION 20
POP TSRA THERE.
HV ADJSTD TMPS DWNRD DUE TO THE CLDS MOST PLCS. FEEL THAT TMPS WL NOT
RISE MUCH (IF AT ALL) FM KALB ON N AND W. OTRWISE JST FINE TUNED THIS
PM.
NO MET CHANGES 2 LTR PDS. EVN IF WE GET ANY RAFL TDY...WL BE MINIMAL
SO LKS AS IF WE ARE HEADED TWD DROUGHT SINCE NO MORE RA XCPTD THRU AT
LST THE UPCOMING WKND.
WRKZFP AVBL. ZONES GONE BY 1030AM.
.ALB...NONE.
HWJIV
</PRE><HR> <BR><PRE>FXUS71 KBUF 031403 ny
AREA FORECAST DISCUSSION
NATIONAL WEATHER SERVICE WILMINGTON NC
944 AM EDT THU JUN 3 1999
DISC: CURRENTLY WATER VAPOR AND UPPER AIR ANALYSIS SHOWING SHORTWAVE
CENTERED OVER THE CENTRAL CAROLINAS AND MOVING FAIRLY RAPIDLY TO THE
EAST. THIS FEATURE MATCHES WELL WITH THE CONVECTION OVER THE
SOUTHERN PORTION OF THE CWA.
09Z RUCII DIVERGENCE OF Q AT 300-700 MB SHOWS THE LIFT MOVING TO THE
ENE WITH TIME WITH SOUTH CAROLINA PORTION OF THE CWA UNDER A LESS
FAVORABLE AREA BY LATE AFTERNOON WITH EASTERN NORTH CAROLINA WITH
THE MORE FAVORABLE LIFT. THE 12Z RUC SHOWS THIS DIV Q AREA TO BE
SLIGHTLY WEAKER THAN 09Z FORECAST BUT THE TREND OF THE ENE MOVEMENT
OF LIFT IS STILL EVIDENT. ONLY CHANGES WILL BE TO SLIGHTLY TWEAK UP
POPS OVER SOUTHERN CWA IN RESPONSE TO ONGOING CONVECTION.
CWF...12Z RUC SHOWS THE SW WIND OF 20 KNOTS THROUGH THE AFTERNOON
AND CURRENT FCST LOOKS TO BE IN ORDER. NO MAJOR CHANGES PLANNED.
.ILM...NONE.
HAWKINS
</PRE><HR> <BR><PRE>FXUS62 KILM 030650 nc
FORECAST DISCUSSION FOR EASTERN NORTH DAKOTA AND NORTHWEST MINNESOTA
NATIONAL WEATHER SERVICE EASTERN ND/GRAND FORKS ND
1000 AM CDT THU JUN 03 1999
.CURRENT SYNOPTIC OVERVIEW...
13Z SURFACE AND STREAMLINE ANALYSIS DEPICTED LOW PRESSURE IN EASTERN
MONTANA WITH ILL DEFINED WARM FRONT EXTENDING EAST TOWARDS NORTH
DAKOTA/CANADIAN BORDER. KMVX RADAR INDICATED A BAND OF NORTHWARD
ADVANCING SHOWERS ALONG A ABERDEEN TO MINOT LINE WITH NO LIGHTNING
STRIKES CURRENTLY NOTED...PER LDS.
.SHORT TERM...
12Z RUC CONFIRMED AFOREMENTIONED SHOWER BAND OCCURRING ALONG 5H SHEAR
AXIS AND 85H THETA RIDGE. EXPECT PRECIPITATION THREAT TO CONTINUE
THROUGH THE AFTERNOON WITH BEST CHANCES FOR PRECIPITATION CONTINUING
ALONG INSTABILITY AXIS ALONG AND WEST OF FARGO TO DEVILS LAKE LINE.
LATE MORNING UPDATED PLANNED WITH ONLY SOME COSMETIC CHANGES PLANNED AT
THIS TIME.
.FGF...NONE
BERG
</PRE><HR> <BR><PRE>FXUS63 KFGF 030853 nd
AREA FORECAST DISCUSSION
NATIONAL WEATHER SERVICE GREENVILLE-SPARTANBURG SC
142 AM EDT THU JUN 3 1999
CURRENT SHORTWAVE MOVED RAPIDLY E OF AREA BY 03Z RUC. SERIES OF
SHORTWAVES TO CROSS AREA THIS PACKAGE. MODELS DISAGREE ON STRENGTH
AND TIMING. WNW LOW LEVEL FLOW TO EXIST OVER AREA TODAY LIMITING
CONVECTIVE DEVELOPMENT LEE OF MOUNTAINS. UPSLOPE FLOW TO SUPPORT
POPS MOUNTAINS. FRONTAL CONVERGENCE AT TIME OF MAX HEATING TO
SUPPORT POPS I-77 CORRIDOR WHERE DOWNSLOPE EFFECT LESS. COLD FRONT
TO SLOWLY CROSS AREA BY 00Z TONIGHT...BUT MODELS DIFFER ON WHERE
TO STALL FRONT AFTERWARD...AND DIFFER ON ORIENTATION. LOW LEVEL
MOISTURE TO PERSIST THROUGH 06Z TONIGHT IN ETA...REPLACED BY HIGH
LEVEL MOISTURE THEREAFTER. NGM MAINTAINS LOW LEVEL MOISTURE
THROUGH 48 HOURS...HOWEVER ITS STALLED FRONT IS FARTHER S THAN
ETA AND DO NOT EXPECT A BELT OF LOW CEILINGS TO EXIST ALONG
S TIER FRI. EXPECT CLOUDS/POPS MOUNTAINS/I-77 TODAY...MOSTLY
SUNNY FOOTHILLS. PARTLY CLOUDY TONIGHT. PARTLY SUNNY FRI S TIER
...MOSTLY SUNNY REST.
AVL 82/56/81 300
CLT 86/63/84 300
GSP 88/62/84 000
.GSP...NONE.
JAT
</PRE><HR> <BR><PRE>FXUS62 KCHS 030523 AMD sc
AREA FORECAST DISCUSSION
NATIONAL WEATHER SERVICE MORRISTOWN TN
925 AM EDT THU JUN 3 1999
FRONT STILL DIFFICULT TO LOCATE ON LATEST SURFACE ANALYSIS. BELIEVE
IT EXTENDS OVER WESTERN NC...ACROSS THE CUMBERLAND PLATEAU...OVER
NORTHERN TN AND INTO SOUTHERN MO. ISOLATED THUNDERSTORM THAT DEVELOP
ALONG THE FRONT THIS MORNING DISSIPATED IN THE MOUNTAINS. STILL
SHOWING AN ISOLATED SHOWER IN SOUTHERN VALLEY. MODELS PUSHING FRONT
SOUTH TODAY. 09Z RUC HAD ANOTHER WEAK 500MB TROF/VORTICITY MAX
PASSING OVER CWA THIS AFTERNOON. SHOULD SEE SOME SUNSHINE TODAY WHICH
WILL INCREASE OUR INSTABILITY. MODIFYING BNA 12Z SOUNDING WITH
AFTERNOON HIGHS IN THE MID 80S AND DEW POINTS IN THE MID 60S...GAVE
CAPES OVER 2000. WITH THE FRONT STILL IN AREA...RECOMMEND RAISING
POPS OVER SOUTHERN VALLEY AND SMOKIES THIS AFTERNOON.
RDU...SUGGEST RAISING POPS TO 30 PERCENT.
CRW...NO CHANGES NEEDED.
GH
</PRE><HR> <BR><PRE>FXUS74 KMEG 030838 tn
AREA FORECAST DISCUSSION
NATIONAL WEATHER SERVICE GAYLORD MI
1110 AM EDT THU JUN 3 1999
LATEST SURFACE CHART SHOWS HIGH PRESSURE OVER ONTARIO...AND THIS
WILL CONTINUE BUILDING SOUTHEAST ACROSS MICHIGAN THIS AFTERNOON.
THIS HIGH WILL CONTINUE TRANQUIL WEATHER ACROSS FORECAST AREA TODAY
AND EVENTUALLY SCOUR OUT THE RESIDUAL LOW CLOUDINESS. THE
EXTENT/SPEED OF CLEARING IS THE MAIN FORECAST PROBLEM FOR THE
AFTERNOON.
12Z RUC HOLDS ONTO THE LOW LEVEL MOISTURE LONGER THAN 00Z MODELS...
AS SHOWN ON 925MB AND 1000/850 MB RH PROGS. DRY AIR WILL CONTINUE TO
ADVECT IN FROM THE NORTHWEST THIS AFTERNOON...AS WELL AS
DRYING/SUBSIDENCE FROM ALOFT. CLEARING IS STILL EXPECTED THIS
AFTERNOON...THOUGH WILL BACK OFF ON THE TIMING A BIT FOR MUCH OF
NORTHERN LOWER.
HAVE ALSO LOWERED TEMPERATURES MOST ZONES DUE TO WEAK LOW LEVEL...
ADDITIONAL CLOUD COVER AND CURRENT CONDITIONS.
.APX...NONE.
BAK
</PRE><HR> <BR><PRE>FXUS63 KMQT 031502 mi
AREA FORECAST DISCUSSION
NATIONAL WEATHER SERVICE GREENVILLE-SPARTANBURG SC
1028 AM EDT THU JUN 3 1999
MORNING UPPER AIR ANALYSIS SHOWS A VERY MOIST AND RATHER UNSTABLE
AIRMASS OVER THE REGION. SFC FRONT IS RATHER ILL-DEFINED...BUT
APPEARS TO EXTEND ACROSS CENTRAL TN AND THEN ENE INTO EXTREME NRN
NC. BY LATE AFTN SFC BNDRY IS PROGGED BY THE RUC TO EXTEND FROM THE
CENTRAL NC MTNS ESE ACROSS THE NC/SC BORDER. THIS IS A LITTLE FURTHER
N THAN THE 00Z MODELS AND MAKES SENSE PER PRIND. DELTA-T/S ARE 16 TO
17 DEGREES THIS MORNING FROM H7 TO H5...NOT BAD. THE RUC PROJECTS
OUR LAPSE RATES TO BECOME SHALLOWER THIS AFTN...BUT BASED ON
UPSTREAM TEMPS...I DON/T SEE THIS HAPPENING.
AS A RESULT I WILL GO WITH 30 POPS FOR THE NC MTNS AND THE SC AND
NE GA ZONES. I/D LIKE TO REMOVE POPS FROM OUR ERN NC ZONES BASED ON
THE PROJECTED DRYING IN THE NC PIEDMONT...BUT I/LL KEEP THEM IN
BASED ON THE SLIGHT CHANCE THAT CONVERGENCE ON THE LEE TROUGH WL FIRE
CONVECTION (AND THE FACT THAT THEY HAVE BEEN IN THE ZONES FOR 4 RUNS
NOW).
W/HIGHEST LOW LVL THICKNESS IN A FEW DAYS AND W FLOW...TEMPS LOOK
GOOD.
.GSP...NONE.
MCAVOY
</PRE><HR> <BR><PRE>FXUS62 KCHS 031356 sc
|
en
|
all-txt-docs
|
203194
|
PUBLIC NOTICE
FEDERAL COMMUNICATIONS COMMISSION
1919 M STREET, N.W.
WASHINGTON, D.C. 20554
News media information 202/418-0500 Fax-On-Demand 202/418-2830 Internet: http://www.fcc.gov ftp.fcc.gov
Released: February 28, 1997
WIRELESS TELECOMMUNICATIONS BUREAU
COMMERCIAL WIRELESS SERVICE INFORMATION
Report No. LB-97-22
This Public Notice includes the following information regarding assignment and transfer
applications filed with the Wireless Telecommunications Bureau, Commercial Wireless Division:
Broadband Services transfer/assignment applications accepted for filing, if any;
Broadband Services transfer/assignment applications granted, if any;
Narrowband Services transfer/assignment applications accepted for filing, if any;
Narrowband Services transfer/assignment applications granted, if any.
BROADBAND SERVICESTRANSFER/ASSIGNMENT APPLICATIONS ACCEPTED
FOR FILING
No applications listed on this notice.
_____________________________________________________________________________
BROADBAND SERVICESTRANSFER/ASSIGNMENT APPLICATIONS GRANTED
The following MSA transfer application was filed and appeared on Public Notice, Report No. LB-97-16,
released January 24, 1997. No petitions to deny have been filed and the Commission has found the
application to be in the public interest. The Commission has granted the application effective February 28,
1997.
01379-CL-TC-97 Transfer of Control of Pueblo MSA Limited Partnership, Station KNKA519 from Pine
Drive Telephone Company to CommNet Cellular Inc., Market No. 241B - Pueblo MSA.
________________________________________________________________________________
The Commission (By Commercial Wireless Division) has granted the following pro forma PCS and
MSA/RSA transfer applications as indicated.
50083-CW-TC-97 Pro Forma PCS Broadband transfer of control of GWI PCS1, Inc. from General
Wireless, Inc. to General Wireless, Inc., Market B404 (C Block) - San Francisco BTA.
(Granted 02/28/97, Station KNLF566)
50084-CW-TC-97 Pro Forma PCS Broadband transfer of control of GWI PCS2, Inc. from General
Wireless, Inc. to General Wireless, Inc., Market B079 (C Block) - Chico-Oroville BTA.
(Granted 02/28/97, Station KNLF558)
50085-CW-TC-97 Pro Forma PCS Broadband transfer of control of GWI PCS3, Inc. from General
Wireless, Inc. to General Wireless, Inc., Market B485 (C Block) - Yuba City BTA.
(Granted 02/28/97, Station KNLF569)
50086-CW-TC-97 Pro Forma PCS Broadband transfer of control of GWI PCS4, Inc. from General
Wireless, Inc. to General Wireless, Inc., Market B389 (C Block) - Sacramento BTA.
(Granted 02/28/97, Station KNLF564)
50087-CW-TC-97 Pro Forma PCS Broadband transfer of control of GWI PCS5, Inc. from General
Wireless, Inc. to General Wireless, Inc., Market B434 (C Block) - Stockton BTA.
(Granted 02/28/97, Station KNLF567)
50088-CW-TC-97 Pro Forma PCS Broadband transfer of control of GWI PCS6, Inc. from General
Wireless, Inc. to General Wireless, Inc., Market B397 (C Block) - Salinas-Monterey BTA.
(Granted 02/28/97, Station KNLF565)
50089-CW-TC-97 Pro Forma PCS Broadband transfer of control of GWI PCS7, Inc. from General
Wireless, Inc. to General Wireless, Inc., Market B022 (C Block) - Athens BTA.
(Granted 02/28/97, Station KNLF556)
50090-CW-TC-97 Pro Forma PCS Broadband transfer of control of GWI PCS8, Inc. from General
Wireless, Inc. to General Wireless, Inc., Market B024 (C Block) - Atlanta BTA.
(Granted 02/28/97, Station KNLF557)
50091-CW-TC-97 Pro Forma PCS Broadband transfer of control of GWI PCS9, Inc. from General
Wireless, Inc. to General Wireless, Inc., Market B160 (C Block) - Gainesville BTA.
(Granted 02/28/97, Station KNLF561)
50092-CW-TC-97 Pro Forma PCS Broadband transfer of control of GWI PCS10, Inc. from General
Wireless, Inc. to General Wireless, Inc., Market B152 (C Block) - Ft. Pierce BTA.
(Granted 02/28/97, Station KNLF560)
50093-CW-TC-97 Pro Forma PCS Broadband transfer of control of GWI PCS11, Inc. from General
Wireless, Inc. to General Wireless, Inc., Market B469 (C Block) - West Palm Beach BTA.
(Granted 02/28/97, Station KNLF568)
50094-CW-TC-97 Pro Forma PCS Broadband transfer of control of GWI PCS12, Inc. from General
Wireless, Inc. to General Wireless, Inc., Market B293 (C Block) - Miami BTA.
(Granted 02/28/97, Station KNLF562)
50095-CW-TC-97 Pro Forma PCS Broadband transfer of control of GWI PCS13, Inc. from General
Wireless, Inc. to General Wireless, Inc., Market B313 (C Block) - Naples BTA.
(Granted 02/28/97, Station KNLF563)
50096-CW-TC-97 Pro Forma PCS Broadband transfer of control of GWI PCS14, Inc. from General
Wireless, Inc. to General Wireless, Inc., Market B151 (C Block) - Ft. Myers BTA.
(Granted 02/28/97, Station KNLF559)
01629-CL-TC-97 Pro Forma transfer of control of Dobson Cellular of Enid, Inc. from Dobson Operating
Company (formerly known as Dobson Communications Corporation) to Dobson Communications
Corporation (formerly known as Dobson Holdings Corporation), Market No. 302A - Enid MSA.
(Granted 02/24/97, Station KNKA818)
01630-CL-TC-97 Pro Forma transfer of control of Dobson Cellular of Kansas/Missouri, Inc. from Dobson
Operating Company (formerly known as Dobson Communications Corporation) to Dobson
Communications Corporation (formerly known as Dobson Holdings Corporation), Market No. 432A - KS
5 - Brown RSA.
(Granted 02/24/97, Station KNKN637)
01631-CL-TC-97 Pro Forma transfer of control of Dobson Cellular of Kansas/Missouri, Inc. from Dobson
Operating Company (formerly known as Dobson Communications Corporation) to Dobson
Communications Corporation (formerly known as Dobson Holdings Corporation), Market No. 504A - MO
1 - Atchison RSA.
(Granted 02/24/97, Station KNKN553)
01632-CL-TC-97 Pro Forma transfer of control of Dobson Cellular of Kansas/Missouri, Inc. from Dobson
Operating Company (formerly known as Dobson Communications Corporation) to Dobson
Communications Corporation (formerly known as Dobson Holdings Corporation), Market No. 505A - MO
2 - Harrison RSA.
(Granted 02/24/97, Station KNKP989)
01633-CL-TC-97 Pro Forma transfer of control of Dobson Cellular of Kansas/Missouri, Inc. from Dobson
Operating Company (formerly known as Dobson Communications Corporation) to Dobson
Communications Corporation (formerly known as Dobson Holdings Corporation), Market No. 507A - MO
4 - DeKalb RSA.
(Granted 02/24/97, Station KNKN829)
01634-CL-TC-97 Pro Forma transfer of control of Dobson Cellular of Kansas/Missouri, Inc. from Dobson
Operating Company (formerly known as Dobson Communications Corporation) to Dobson
Communications Corporation (formerly known as Dobson Holdings Corporation), Market No. 508(A2) -
MO 5 - Linn RSA.
(Granted 02/24/97, Station KNKQ434)
01635-CL-TC-97 Pro Forma transfer of control of Dobson Cellular of Woodward, Inc. from Dobson
Operating Company (formerly known as Dobson Communications Corporation) to Dobson
Communications Corporation (formerly known as Dobson Holdings Corporation), Market No. 597A - OK
2 - Harper RSA.
(Granted 02/24/97, Station KNKN629)
01636-CL-TC-97 Pro Forma transfer of control of Oklahoma RSA 5 Limited Partnership from Dobson
Operating Company (formerly known as Dobson Communications Corporation) to Dobson
Communications Corporation (formerly known as Dobson Holdings Corporation), Market No. 600B - OK
5 - Roger Mills RSA.
(Granted 02/24/97, Station KNKN607)
01637-CL-TC-97 Pro Forma transfer of control of Oklahoma RSA 7 Limited Partnership from Dobson
Operating Company (formerly known as Dobson Communications Corporation) to Dobson
Communications Corporation (formerly known as Dobson Holdings Corporation), Market No. 602B - OK
7 - Beckham RSA.
(Granted 02/24/97, Station KNKN578)
01638-CL-TC-97 Pro Forma transfer of control of Texas RSA No. 2 Limited Partnership from Dobson
Operating Company (formerly known as Dobson Communications Corporation) to Dobson
Communications Corporation (formerly known as Dobson Holdings Corporation), Market No. 653B - TX
2 - Hansford RSA.
(Granted 02/24/97, Station KNKN646)
_____________________________________________________________________________________
NARROWBAND SERVICES
TRANSFER/ASSIGNMENT APPLICATIONS ACCEPTED FOR FILING
The applications listed herein have been found, upon initial review, to be acceptable for filing.
The Commission may return any of the applications if, upon further examination, it is determined they are
defective or not in conformance with the Commission's Rules and Regulations, or its policies.
Final action will not be taken on these applications earlier than 31 days following the date of this
notice, except for radio applications not requiring a 30 day notice period (Section 309(c)) of the
Communications Act.
FILE NUMBER: 21730-CD-AL-97
LICENSEE: TWO-WAY RADIO COMMUNICATIONS COMPANY
OF KANSAS, INC.
CALLSIGN: KKB402
ACTION: ASSIGNMENT
ASSIGNOR: TWO-WAY RADIO COMMUNICATIONS COMPANY
OF KANSAS, INC.
ASSIGNEE: GATEWAY COMMUNICATIONS, INC.
FILE NUMBER: 21731-CD-AL-97
LICENSEE: SJR LEASING, INC.
CALLSIGN: KUO645
ACTION: ASSIGNMENT
ASSIGNOR: SJR LEASING, INC.
ASSIGNEE: SCHUYLKILL MOBILE FONE, INC.
____________________________________________________________________________________
NARROWBAND SERVICES
TRANSFER/ASSIGNMENT APPLICATIONS GRANTED
The following transfer/assignment applications were granted effective February 28, 1997, unless otherwise
noted.
FILE NUMBER: 33994-CD-AL-96
LICENSEE: ELECTRONIC TRACKING SYSTEMS, INC.
CALLSIGN: KNKP608,KNKP609,KNLW206 & KNLW208
ACTION: ASSIGNMENT
ASSIGNOR: ELECTRONIC TRACKING SYSTEMS, INC.
ASSIGNEE: TSR PAGING INC. AND PAGING PARTNERS CORPORATION
(Granted pursuant to Order (DA 97-399), released February 21, 1997.)
FILE NUMBER: 21259-CD-AL-97
LICENSEE: SCOTT MAASEN
CALLSIGN: KNLT741 & KNLT748
ACTION: ASSIGNMENT
ASSIGNOR: SCOTT MAASEN
ASSIGNEE: RADIO COMMUNICATIONS SPECIALISTS, INC.
FILE NUMBER: 21296-CD-AL-97
LICENSEE: TELECONNECT LONG DISTANCE SERVICES & SYSTEMS CO.
CALLSIGN: KNKM483 (LEAD)
ACTION: ASSIGNMENT
ASSIGNOR: TELECONNECT LONG DISTANCE SERVICES & SYSTEMS CO.
ASSIGNEE: MOBILECOMM OF THE NORTHEAST, INC.
FILE NUMBER: 21298-CD-AL-97
LICENSEE: TELECONNECT LONG DISTANCE SERVICES & SYSTEMS CO.
CALLSIGN: KNKO322 & KNKO729
ACTION: ASSIGNMENT
ASSIGNOR: TELECONNECT LONG DISTANCE SERVICES & SYSTEMS CO.
ASSIGNEE: MOBILECOMM OF THE SOUTHWEST, INC.
FILE NUMBER: 21299-CD-AL-97
LICENSEE: TELECONNECT LONG DISTANCE SERVICES & SYSTEMS CO.
CALLSIGN: KNKM475,KNKO324,KNKO326 & KNKO320
ACTION: ASSIGNMENT
ASSIGNOR: TELECONNECT LONG DISTANCE SERVICES & SYSTEMS CO.
ASSIGNEE: MOBILECOMM OF THE WEST, INC.
FILE NUMBER: 21301-CD-AL-97
LICENSEE: SOUTHERNNET SYSTEMS, INC.
CALLSIGN: KNKM490
ACTION: ASSIGNMENT
ASSIGNOR: SOUTHERNNET SYSTEMS, INC.
ASSIGNEE: MOBILECOMM OF THE SOUTHEAST, INC.
FILE NUMBER: 21302-CD-AL-97
LICENSEE: SOUTHERNNET SYSTEMS, INC.
CALLSIGN: KNKM397 & KNKM459
ACTION: ASSIGNMENT
ASSIGNOR: SOUTHERNNET SYSTEMS, INC.
ASSIGNEE: MOBILECOMM OF TENNESSEE, INC.
FILE NUMBER: 21304-CD-TC-97
LICENSEE: UPPER PENINSULA TELEPHONE COMPANY
CALLSIGN: WQZ590,KQZ732,KWU296,KQK776,KNKC489 & KNKM228
ACTION: TRANSFER
TRANSFEROR: LESLIE G. MATTHEWS AND CECILE C. MATTHEWS
TRANSFEREE: LYNCH MICHIGAN TELEPHONE HOLDING CORPORATION
FILE NUMBER: 21305-CR-TC-97
LICENSEE: UPPER PENINSULA TELEPHONE COMPANY
CALLSIGN: KNKD499,KNKD500,KNKI543,KNKI639 & KNKO986 (RURAL RADIO)
ACTION: TRANSFER
TRANSFEROR: LESLIE G. MATTHEWS AND CECILE C. MATTHEWS
TRANSFEREE: LYNCH MICHIGAN TELEPHONE HOLDING CORPORATION
FILE NUMBER: 21306-CD-AL-97
LICENSEE: HIGH TECH COMMUNICATIONS CORP. OF IOWA
CALLSIGN: KNKG443,KNKG444,KNKG445,KNKG447 & KNLU256
ACTION: ASSIGNMENT
ASSIGNOR: HIGH TECH COMMUNICATIONS CORP. OF IOWA
ASSIGNEE: MEGACOMM CORPORATION
FILE NUMBER: 21729-CD-AL-97
LICENSEE: MERCURY PAGING & COMMUNICATIONS, INC.
CALLSIGN: KNKK617
ACTION: ASSIGNMENT (PRO FORMA)
ASSIGNOR: MERCURY PAGING & COMMUNICATIONS, INC.
ASSIGNEE: PNI SPECTRUM, LLC
FILE NUMBER: 21735-CD-P/AL-97
LICENSEE: PERSONAL COMMUNICATIONS, INC.
CALLSIGN: KGH870
ACTION: PARTIAL ASSIGNMENT (PRO FORMA)
FREQUENCY: 152.18 MHZ AT STATE COLLEGE, CLEARFIELD AND
PINE GROVE MILLS, PA
ASSIGNOR: PERSONAL COMMUNICATIONS, INC.
ASSIGNEE: STEVEN S. SELTZER, TO BE PLACED UNDER NEW
CALL SIGN KNLW399
- FCC -
|
en
|
markdown
|
802061
|
# Presentation: 802061
## BEHAVIORAL FAMILY COUNSELING AND NALTREXONE FOR MALE OPIOID-DEPENDENT PATIENTS
- William Fals-Stewart, Ph.D.
*Research Institute on Addictions*
## Heroin Use:Scope of the Problem
- In U.S., Growing Problem
*Most Common Primary Illicit Substance of Those Entering Treatment in U.S.*
*Cost Estimated to Be $30 Billion Annually*
*Only 20% of Those in Need of Treatment Actually Receive It*
- Significant Problem Internationally
## Pharmacological Treatment: NALTREXONE
- Opioid Antagonist
- *Blocks Subjective Reinforcing Effects of Opioid-Based Drugs*
- Positive Outcomes for Motivated Patients
*Physicians and Other Health Care Providers*
*Those Facing Employment Termination*
*Probationers and Others Facing Legal Sanctions*
## Use of Naltrexone in Community-Based Practice
- Despite Early Promise of Naltrexone, Not Widely Used in Community Practice
- Engagement and Compliance Problems
*Common Delivery Approaches are Unwieldy*
*Standard Medication Delivery Methods Lead to Rampant Noncompliance*
## Enhancing Naltrexone Compliance: Two Methods
- Voucher-Based Reinforcement Methods
- Family/Significant Other (SO) Approaches
## Voucher-Based Methods
- Recent Studies
*Preston et al., 1999*
*Carroll et al., 2001*
- Increase Compliance, Treatment Retention, and Opioid Abstinence During Period When Contingencies Were in Effect
- No Long-Term Follow-Up After Removal of Contingencies
## Family-Based Approach:Behavioral Family Counseling (BFC)
- Spouse or Significant Other (SO) Observe Medication Taking
- “Medication Contract” is Established Between Patient and SO, Which is Monitored in Counseling
- SO Verbally (and Positively) Reinforces Patient’s Compliance
## Behavioral Family Counseling & Medication Compliance: Previous Studies
- Disulfiram with Alcoholic Patients
- Naltrexone with Alcoholic Patients
- HIV Medication with Drug-Abusing Patients
- Lithium with Bipolar Patient
## Aims of Present Study
- Would the Use of Medication Contracts Between Opioid Dependent Patients and SOs Enhance Naltrexone Compliance During Primary Treatment?
- What Are the Durability of Observed Effects After Primary Treatment is Completed?
## Participants
- 124 Detoxified Opioid-Dependent Men Entering Outpatient Treatment
- Nonsubstance-Abusing SO (Intimate Partner, Parent, or Other Family Member) Willing to Participate in Treatment
## Sociodemographics/Background
- Age * ** **32.4 (6.2) Years*
- Education* ** ** **13.2 (2.1) Years*
- Race/Ethnicity* ** **61% Minority*
- Opioid Use* ** **6.6 (4.4) Years*
- Family Member* *
* ** **Spouses ** ** **35%*
* ** **Partner ** ** **13%*
* ** **Parent ** ** **36%*
* ** **Sibling ** ** **16%*
## Procedures
- Naltrexone Prescription to All Patients
- 50 mg/day
- Random Assignment:
- Behavioral Family Counseling (BFC)
- Individual-Based Treatment (IBT)
- Monitoring Naltrexone Compliance
- Within-Treatment and 12-Month Follow-Up Outcomes (Substance Use, Psychosocial)
## Description of Treatments
- Behavioral Family Counseling (BFC)
*Included Individual, Group, and Family Counseling during 24 weeks*
*“**Recovery Contract” with Family Member; Included Daily Monitoring of Naltrexone*
- Individual-Based Treatment
*Included Individual and Group Counseling Only during 24 weeks*
*No Recovery Contract*
## Primary Measures
- Timeline Followback Interview
*Calendar Assessment of Substance Use Frequency*
*Index: Percent Days Abstinent (PDA)*
- Addiction Severity Index (ASI)
*Composite Scores*
- Urine Assay Results
- Pill Counts, Blister Packs
## Results: Primary Outcomes
- Treatment Response Indicators
*Naltrexone Compliance*
*Substance Use*
- Posttreatment Outcomes
*Substance Use*
*Psychosocial Functioning*
## Treatment Response Indicators
*Effects During Primary Treatment*
## Days of Naltrexone Ingestion
## Percentage of Opioid-Free Urines During Treatment
## Opioid Survival: During Treatment
**BFC**
**IBT**
## Posttreatment Outcomes
*12-Month Follow-Up*
## Percent Days Abstinent (PDA) Opioids:12-Month Follow-Up
## Percent Days Abstinent (PDA) All Drugs:12-Month Follow-Up
**BFC**
**IBT**
## 12-Month Follow-UpASI Composite Scores
## Mechanisms of Action: Mediational Analyses
- Examined Mediational Effect of Naltrexone Compliance on Treatment Response and Outcomes
- #Days of Naltrexone Use Was a Significant Partial Mediator of:
*Substance Use During Treatment*
*Substance Use After Treatment*
*ASI Composite Score Differences*
## Summary
- Participants in BFC Had Significantly Better Treatment Response and Outcome Compared to IBT
- Treatment Effects Were Partially Mediated by Naltrexone Compliance
## Limitations
- Engagement of Participants
*Participant Recruitment Difficult*
*Reluctance to Take Naltrexone*
- Requires Positive Family Participation
*Often Difficult*
## Ongoing Research
- Combination of Voucher Reinforcement and BFC
- BFC + Naltrexone versus BFC w/o Naltrexone
- Cost-Benefit and Cost-Effectiveness Studies
## Support
- National Institute on Drug Abuse
- R01DA012189
- R01DA014402
- R01DA014402-Supplement
- R01DA015937
- R01DA016236
- National Institute on Alcohol Abuse and Alcoholism
- R21AA013690
- Alpha Foundation
## Contact
- William Fals-Stewart, Ph.D.
- Research Institute on Addictions
- 1021 Main Street
- Buffalo, NY 14203-1016
- [email protected]
- Slides available at: *www.addictionandfamilies.org*
|
en
|
converted_docs
|
662432
|
Last revised 21 August 2008
**Preferred Magnitudes of Selected Significant Earthquakes**
<table style="width:100%;">
<colgroup>
<col style="width: 15%" />
<col style="width: 6%" />
<col style="width: 24%" />
<col style="width: 1%" />
<col style="width: 5%" />
<col style="width: 2%" />
<col style="width: 7%" />
<col style="width: 8%" />
<col style="width: 8%" />
<col style="width: 20%" />
</colgroup>
<thead>
<tr class="header">
<th><strong>Date</strong></th>
<th><h1 id="time">Time†</h1></th>
<th colspan="2"><strong>Place</strong></th>
<th colspan="2"><strong>Lat.</strong></th>
<th><strong>Long.</strong></th>
<th><h2 id="fatalities">Fatalities</h2></th>
<th><strong>M</strong></th>
<th><strong>M<sub>X</sub></strong>‡ <strong>(M reference)</strong></th>
</tr>
</thead>
<tbody>
<tr class="odd">
<td>January 23, 1556 </td>
<td></td>
<td colspan="2">Shensi, China </td>
<td colspan="2">34.5</td>
<td>109.7</td>
<td>830,000</td>
<td>~8</td>
<td></td>
</tr>
<tr class="even">
<td>August 17, 1668 </td>
<td></td>
<td colspan="2">Anatolia, Turkey </td>
<td colspan="2">40.0</td>
<td>36.0</td>
<td>8,000</td>
<td>~8</td>
<td></td>
</tr>
<tr class="odd">
<td>January 26, 1700 </td>
<td></td>
<td colspan="5">Cascadia subduction zone from No. CA to Vancouver
Is.</td>
<td></td>
<td>~9</td>
<td>M (Satake et al, 1996)</td>
</tr>
<tr class="even">
<td>November 1, 1755 </td>
<td>10:16</td>
<td colspan="2">Lisbon, Portugal </td>
<td colspan="2">36.0</td>
<td>-11.0</td>
<td>70,000</td>
<td>~8.7</td>
<td>M<sub>I</sub> (Johnston, 1996)</td>
</tr>
<tr class="odd">
<td>December 16, 1811</td>
<td>08:00</td>
<td colspan="2">New Madrid, MO </td>
<td colspan="2">36.6</td>
<td>-89.6</td>
<td></td>
<td>~7.2–8.1</td>
<td>M<sub>I</sub> (Johnston, 1996; Hough et al, 2000; Bakun and Hopper,
2004)</td>
</tr>
<tr class="even">
<td>January 23, 1812 </td>
<td>15:00</td>
<td colspan="2">New Madrid, MO </td>
<td colspan="2">36.6</td>
<td>-89.6</td>
<td></td>
<td>~7.0–7.8</td>
<td>M<sub>I</sub> (Johnston, 1996; Hough et al, 2000; Bakun and Hopper,
2004)</td>
</tr>
<tr class="odd">
<td>February 7, 1812 </td>
<td>09:45</td>
<td colspan="2">New Madrid, MO </td>
<td colspan="2">36.6</td>
<td>-89.6</td>
<td></td>
<td>~7.4–8.0</td>
<td>M<sub>I</sub> (Johnston, 1996; Hough et al, 2000; Bakun and Hopper,
2004)</td>
</tr>
<tr class="even">
<td>June 2, 1823 </td>
<td>08:00</td>
<td colspan="2">South flank of Kilauea, HI </td>
<td colspan="2">19.3</td>
<td>-155</td>
<td></td>
<td>~7</td>
<td>M<sub>I</sub> (Klein and Wright, 2000) </td>
</tr>
<tr class="odd">
<td>June 10, 1836 </td>
<td>15:30</td>
<td colspan="2">S San Francisco Bay region, CA </td>
<td colspan="2">36.96</td>
<td>-121.37</td>
<td></td>
<td>~6.5</td>
<td>M<sub>I</sub> (Bakun, 1999) </td>
</tr>
<tr class="even">
<td>June 1838</td>
<td></td>
<td colspan="2">San Francisco Peninsula, CA </td>
<td colspan="2">37.27</td>
<td>-122.23</td>
<td></td>
<td>~6.8</td>
<td>M<sub>I</sub> (Bakun, 1999) </td>
</tr>
<tr class="odd">
<td>January 5, 1843 </td>
<td>02:45</td>
<td colspan="2">Marked Tree, AR </td>
<td colspan="2">35.5</td>
<td>-90.5</td>
<td></td>
<td>~6.3</td>
<td>M<sub>I</sub> (Johnston, 1996) </td>
</tr>
<tr class="even">
<td>January 9, 1857 </td>
<td>16:24</td>
<td colspan="5">Fort Tejon, CA (San Andreas fault from Parkfield to
Wrightwood)</td>
<td>1</td>
<td>~7.9</td>
<td>M (Grant and Sieh, 1993; Stein and Hanks, 1998)</td>
</tr>
<tr class="odd">
<td>December 16, 1857</td>
<td>21:00</td>
<td colspan="2">Naples, Italy </td>
<td colspan="2">40.3</td>
<td>16.0</td>
<td>11,000</td>
<td>~6.9</td>
<td>M<sub>I</sub></td>
</tr>
<tr class="even">
<td>October 8, 1865 </td>
<td>20:46</td>
<td colspan="2">San Jose, CA</td>
<td colspan="2">37.21</td>
<td>-121.86</td>
<td></td>
<td>~6.5</td>
<td>M<sub>I</sub> (Bakun, 1999) </td>
</tr>
<tr class="odd">
<td>April 3, 1868 </td>
<td>02:25</td>
<td colspan="2">Hilea, SE Hawaii, HI </td>
<td colspan="2">19.2</td>
<td>-155.5</td>
<td>77</td>
<td>~7.9</td>
<td>M<sub>I</sub> (Klein and Wright, 2000) </td>
</tr>
<tr class="even">
<td>October 21, 1868 </td>
<td>15:53</td>
<td colspan="2">Hayward, CA </td>
<td colspan="2">37.7</td>
<td>-122.1</td>
<td>30</td>
<td>~6.8</td>
<td>M<sub>I</sub> (Bakun, 1999) </td>
</tr>
<tr class="odd">
<td>February 20, 1871 </td>
<td>08:42</td>
<td colspan="2">Molokai, HI </td>
<td colspan="2">21.2</td>
<td>-156.9</td>
<td></td>
<td>~6.8</td>
<td>M<sub>I</sub> (Klein and Wright, 2000) </td>
</tr>
<tr class="even">
<td>March 26, 1872 </td>
<td>10:30</td>
<td colspan="2">Owens Valley, CA </td>
<td colspan="2">36.5</td>
<td>-118.0</td>
<td>27</td>
<td>~7.4</td>
<td>M (Beanland and Clark, 1994) </td>
</tr>
<tr class="odd">
<td>December 15, 1872</td>
<td>05:40</td>
<td colspan="2">N Cascades, WA </td>
<td colspan="2">47.9</td>
<td>-120.3</td>
<td></td>
<td>~6.8</td>
<td>M<sub>I</sub> (Bakun et al, 2002)</td>
</tr>
<tr class="even">
<td>November 23, 1873</td>
<td>05:00</td>
<td colspan="2">CA-OR coast</td>
<td colspan="2">42.2</td>
<td>-124.2</td>
<td></td>
<td>~7.3</td>
<td>M<sub>I</sub> (Bakun, 2000) </td>
</tr>
<tr class="odd">
<td>September 1, 1886 </td>
<td>02:51</td>
<td colspan="2">Charleston, SC </td>
<td colspan="2">32.9</td>
<td>-80.0</td>
<td>60</td>
<td>~7.3</td>
<td>M<sub>I</sub> (Johnston, 1996) </td>
</tr>
<tr class="even">
<td>April 24, 1890 </td>
<td>11:36</td>
<td colspan="2">Corralitos, CA </td>
<td colspan="2">36.96</td>
<td>-121.78</td>
<td></td>
<td>~6.3</td>
<td>M<sub>I</sub> (Bakun, 1999) </td>
</tr>
<tr class="odd">
<td>October 27, 1891 </td>
<td>21:38</td>
<td colspan="2">Mino-Owari, Japan </td>
<td colspan="2">35.6</td>
<td>136.6</td>
<td>7,273</td>
<td>~8</td>
<td>M<sub>S</sub></td>
</tr>
<tr class="even">
<td>April 19, 1892 </td>
<td>10:50</td>
<td colspan="2">Vacaville, CA </td>
<td colspan="2">38.50</td>
<td>-121.82</td>
<td>1</td>
<td>~6.4</td>
<td>M<sub>I</sub> (Bakun, 1999) </td>
</tr>
<tr class="odd">
<td>April 21, 1892 </td>
<td>17:43</td>
<td colspan="2">Winters, CA </td>
<td colspan="2">38.59</td>
<td>-121.96</td>
<td></td>
<td>~6.4</td>
<td>M<sub>I</sub> (Bakun, 1999) </td>
</tr>
<tr class="even">
<td>October 31, 1895 </td>
<td>11:08</td>
<td colspan="2">Charleston, MO </td>
<td colspan="2">37.0</td>
<td>-89.4</td>
<td></td>
<td>~6.6</td>
<td>M<sub>I</sub> (Johnston, 1996) </td>
</tr>
<tr class="odd">
<td>June 15, 1896 </td>
<td>10:32</td>
<td colspan="2">Sanriku, Japan </td>
<td colspan="2">39.5</td>
<td>144.0</td>
<td>27,000</td>
<td>~8.5</td>
<td>M</td>
</tr>
<tr class="even">
<td>June 12, 1897 </td>
<td>11:06</td>
<td colspan="2">Assam, India </td>
<td colspan="2">26.0</td>
<td>91.0</td>
<td>1,500</td>
<td>~8.3</td>
<td></td>
</tr>
<tr class="odd">
<td>June 20, 1897 </td>
<td>20:14</td>
<td colspan="2">Calaveras fault, CA </td>
<td colspan="2">37.0</td>
<td>-121.6</td>
<td></td>
<td>~6.3</td>
<td>M<sub>I</sub> (Bakun, 1999) </td>
</tr>
<tr class="even">
<td>March 31, 1898 </td>
<td>07:43</td>
<td colspan="2">Mare Island, Ca </td>
<td colspan="2">38.11</td>
<td>-122.36</td>
<td></td>
<td>~6.3</td>
<td>M<sub>I</sub> (Bakun, 1999) </td>
</tr>
<tr class="odd">
<td>April 15, 1898 </td>
<td>07:07</td>
<td colspan="2">Mendocino County, CA </td>
<td colspan="2">39.3</td>
<td>-123.9</td>
<td></td>
<td>~6.8</td>
<td>M<sub>I</sub> (Bakun, 2000) </td>
</tr>
<tr class="even">
<td>September 4, 1899 </td>
<td>00:22</td>
<td colspan="2">Cape Yakataga, AK </td>
<td colspan="2">60.0</td>
<td>-142.0</td>
<td></td>
<td>7.9</td>
<td>M<sub>S</sub></td>
</tr>
<tr class="odd">
<td>September 10, 1899</td>
<td>21:41</td>
<td colspan="2">Yakutat Bay, AK </td>
<td colspan="2">60.0</td>
<td>-142.0</td>
<td></td>
<td>8.0</td>
<td>M<sub>S</sub></td>
</tr>
<tr class="even">
<td>October 9, 1900 </td>
<td>12:28</td>
<td colspan="2">Kodiak Is., AK </td>
<td colspan="2">57.1</td>
<td>-153.5</td>
<td></td>
<td>7.7</td>
<td>M<sub>S</sub></td>
</tr>
<tr class="odd">
<td>March 3, 1901 </td>
<td>07:45</td>
<td colspan="2">Parkfield, CA </td>
<td colspan="2">36.2</td>
<td>-120.7</td>
<td></td>
<td>6.4</td>
<td>M<sub>S</sub> (Abe, 1988) </td>
</tr>
<tr class="even">
<td>August 27, 1904 </td>
<td>21:56</td>
<td colspan="2">Fairbanks, AK </td>
<td colspan="2">64.7</td>
<td>-148.1</td>
<td></td>
<td>7.3</td>
<td>M<sub>S</sub></td>
</tr>
<tr class="odd">
<td>July 9, 1905 </td>
<td>09:40</td>
<td colspan="2">Mongolia</td>
<td colspan="2">49.0</td>
<td>99.0</td>
<td></td>
<td>8.4</td>
<td><h3 id="m-kanamori-1977">M (Kanamori, 1977)</h3></td>
</tr>
<tr class="even">
<td>January 31, 1906 </td>
<td>15:36</td>
<td colspan="2">Colombia-Ecuador</td>
<td colspan="2">1.0</td>
<td>-81.5</td>
<td>1,000</td>
<td>8.8</td>
<td><h3 id="m-kanamori-1977-1">M (Kanamori, 1977)</h3></td>
</tr>
<tr class="odd">
<td>April 18, 1906 </td>
<td>13:12</td>
<td colspan="5">San Francisco, CA (San Andreas fault from Cape Mendocino
to San Juan Bautista)</td>
<td>3,000</td>
<td>7.8</td>
<td>M (Bakun, 1999) </td>
</tr>
<tr class="even">
<td>August 17, 1906 </td>
<td>00:40</td>
<td>Valparaiso, Chile </td>
<td colspan="2">-33.0</td>
<td colspan="2">-72.0</td>
<td>20,000</td>
<td>8.2</td>
<td><h3 id="m-kanamori-1977-2">M (Kanamori, 1977)</h3></td>
</tr>
<tr class="odd">
<td>December 28, 1908</td>
<td>04:20</td>
<td>Messina, Italy </td>
<td colspan="2">38.3</td>
<td colspan="2">15.6</td>
<td>70,000</td>
<td>7.2</td>
<td>M<sub>S</sub></td>
</tr>
<tr class="even">
<td>July 1, 1911 </td>
<td>22:00</td>
<td>Calaveras fault, CA </td>
<td colspan="2">37.39</td>
<td colspan="2">-121.80</td>
<td></td>
<td>6.5</td>
<td>M<sub>S</sub></td>
</tr>
<tr class="odd">
<td>October 3, 1915 </td>
<td>06:52</td>
<td>Pleasant Valley, NV </td>
<td colspan="2">40.5</td>
<td colspan="2">-117.5</td>
<td></td>
<td>7.1</td>
<td>M (Stover and Coffman, 1993) </td>
</tr>
<tr class="even">
<td>October 11, 1918</td>
<td>14:14</td>
<td>Puerto Rico</td>
<td colspan="2">18.47</td>
<td colspan="2">-67.63</td>
<td>116</td>
<td>7.5</td>
<td>M<sub>S</sub> (McCann, 1985)</td>
</tr>
<tr class="odd">
<td>December 6, 1918 </td>
<td>08:41</td>
<td>Vancouver Is., B.C., Canada </td>
<td colspan="2">49.62</td>
<td colspan="2">-125.92</td>
<td></td>
<td>7.0</td>
<td>M<sub>L</sub> (Gutenberg and Richter, 1954: Rogers, 1983) </td>
</tr>
<tr class="even">
<td>December 16, 1920</td>
<td>12:05</td>
<td>Ningxia-Gansu, China </td>
<td colspan="2">36.60</td>
<td colspan="2">105.32</td>
<td>200,000</td>
<td>7.8</td>
<td>M (Kanamori, 1977)</td>
</tr>
<tr class="odd">
<td>January 31, 1922 </td>
<td>13:17</td>
<td>offshore, Cape Mendocino, CA </td>
<td colspan="2">40.70</td>
<td colspan="2">-125.55</td>
<td></td>
<td>7.3</td>
<td>M<sub>G-R</sub> (Ellsworth, 1990) </td>
</tr>
<tr class="even">
<td>March 10, 1922 </td>
<td>11:21</td>
<td>Parkfield, CA </td>
<td colspan="2">35.9</td>
<td colspan="2">-120.9</td>
<td></td>
<td>6.1</td>
<td>M (Bakun and McEvilly, 1984) </td>
</tr>
<tr class="odd">
<td>January 22, 1923 </td>
<td>09:04</td>
<td>offshore, Cape Mendocino, CA </td>
<td colspan="2">40.49</td>
<td colspan="2">-125.32</td>
<td></td>
<td>7.2</td>
<td>M<sub>G-R</sub> (Ellsworth, 1990) </td>
</tr>
<tr class="even">
<td>September 1, 1923 </td>
<td>02:58</td>
<td>Kanto, Japan </td>
<td colspan="2">35.40</td>
<td colspan="2">139.08</td>
<td>143,000</td>
<td>7.9</td>
<td><h3 id="m-kanamori-1977-3">M (Kanamori, 1977)</h3></td>
</tr>
<tr class="odd">
<td>March 1, 1925 </td>
<td>02:19</td>
<td>Charlevoix, Quebec, Canada </td>
<td colspan="2">47.76</td>
<td colspan="2">-69.84</td>
<td></td>
<td>6.3</td>
<td>M (Bent, 1992) </td>
</tr>
<tr class="even">
<td>June 28, 1925 </td>
<td>01:21</td>
<td>Clarkston Valley, MT </td>
<td colspan="2">46.32</td>
<td colspan="2">-111.52</td>
<td></td>
<td>6.6</td>
<td>M (Dosier, 1989)</td>
</tr>
<tr class="odd">
<td>June 29, 1925 </td>
<td>14:42</td>
<td>Santa Barbara, CA </td>
<td colspan="2">34.3</td>
<td colspan="2">-119.8</td>
<td>13</td>
<td>6.8</td>
<td>M (Stein and Hanks, 1998)</td>
</tr>
<tr class="even">
<td>October 22, 1926 </td>
<td>12:35</td>
<td>Monterey Bay, CA </td>
<td colspan="2">36.62</td>
<td colspan="2">-122.35</td>
<td></td>
<td>6.1</td>
<td>M<sub>G-R</sub> (Ellsworth, 1990) </td>
</tr>
<tr class="odd">
<td>October 22, 1926 </td>
<td>13:35</td>
<td>Monterey Bay, CA </td>
<td colspan="2">36.55</td>
<td colspan="2">-122.18</td>
<td></td>
<td>6.1</td>
<td>M<sub>G-R</sub> (Ellsworth, 1990) </td>
</tr>
<tr class="even">
<td>March 7, 1927 </td>
<td>09:27</td>
<td>Tango, Japan </td>
<td colspan="2">35.80</td>
<td colspan="2">134.92</td>
<td>3,020</td>
<td>7.6</td>
<td>M<sub>S</sub></td>
</tr>
<tr class="odd">
<td>May 22, 1927 </td>
<td>22:32</td>
<td>Tsinghai, China </td>
<td colspan="2">37.39</td>
<td colspan="2">102.31</td>
<td>200,000</td>
<td>7.6</td>
<td>M (Kanamori, 1977)</td>
</tr>
<tr class="even">
<td>November 4, 1927 </td>
<td>13:51</td>
<td>offshore Lompoc, CA </td>
<td colspan="2">34.92</td>
<td colspan="2">-121.03</td>
<td></td>
<td>7.1</td>
<td>M (Stein and Hanks, 1998)</td>
</tr>
<tr class="odd">
<td>November 18, 1929</td>
<td>20:32</td>
<td>Grand Banks, Nova Scotia, Canada </td>
<td colspan="2">44.69</td>
<td colspan="2">-56.01</td>
<td></td>
<td>7.3</td>
<td>M (Bent,1995) </td>
</tr>
<tr class="even">
<td>December 21, 1932</td>
<td>06:10</td>
<td>Cedar Mountain, NV </td>
<td colspan="2">38.51</td>
<td colspan="2">-118.08</td>
<td></td>
<td>7.2</td>
<td>M</td>
</tr>
<tr class="odd">
<td>March 2, 1933 </td>
<td>17:31</td>
<td>Sanriku, Japan </td>
<td colspan="2">39.22</td>
<td colspan="2">144.62</td>
<td>2,990</td>
<td>8.4</td>
<td><h3 id="m-kanamori-1977-4">M (Kanamori, 1977)</h3></td>
</tr>
<tr class="even">
<td>March 11, 1933 </td>
<td>01:54</td>
<td>Long Beach, CA </td>
<td colspan="2">33.6</td>
<td colspan="2">-118.0</td>
<td>115</td>
<td>6.4</td>
<td>M (Hauksson & Gross, 1991) </td>
</tr>
<tr class="odd">
<td>November 20, 1933</td>
<td>23:21</td>
<td>Baffin Bay, Canada </td>
<td colspan="2">73.00</td>
<td colspan="2">-69.98</td>
<td></td>
<td>7.4</td>
<td>M (Stein et al. 1979)</td>
</tr>
<tr class="even">
<td>January 15, 1934 </td>
<td>08:43</td>
<td>Bihar, India </td>
<td colspan="2">27.55</td>
<td colspan="2">87.09</td>
<td>10,700</td>
<td>8.1</td>
<td><h3 id="m-kanamori-1977-5">M (Kanamori, 1977)</h3></td>
</tr>
<tr class="odd">
<td>June 8, 1934 </td>
<td>04:47</td>
<td>Parkfield, CA </td>
<td colspan="2">35.9</td>
<td colspan="2">-120.9</td>
<td></td>
<td>6.1</td>
<td>M (Bakun and McEvilly, 1984) </td>
</tr>
<tr class="even">
<td>November 1, 1935 </td>
<td>06:03</td>
<td>Timiskaming, Quebec, Canada </td>
<td colspan="2">48.89</td>
<td colspan="2">-79.00</td>
<td></td>
<td>6.2</td>
<td>M (Bent, 1996) </td>
</tr>
<tr class="odd">
<td>July 22, 1937 </td>
<td>17:09</td>
<td>Salcha, AK </td>
<td colspan="2">64.49</td>
<td colspan="2">-146.85</td>
<td></td>
<td>7.3</td>
<td>M<sub>S</sub></td>
</tr>
<tr class="even">
<td>January 23, 1938 </td>
<td>08:32</td>
<td>Maui, HI </td>
<td colspan="2">20.96</td>
<td colspan="2">-156.18</td>
<td></td>
<td>6.8</td>
<td>M<sub>S</sub> (Klein and Wright, 2000) </td>
</tr>
<tr class="odd">
<td>November 10, 1938</td>
<td>20:18</td>
<td>Shumagin Islands, AK </td>
<td colspan="2">55.33</td>
<td colspan="2">-158.37</td>
<td></td>
<td>8.2</td>
<td><h3 id="m-kanamori-1977-6">M (Kanamori, 1977)</h3></td>
</tr>
<tr class="even">
<td>December 26, 1939</td>
<td>23:57</td>
<td>Erzincan, Turkey </td>
<td colspan="2">39.77</td>
<td colspan="2">39.53</td>
<td>32,700</td>
<td>7.8</td>
<td>M<sub>S</sub></td>
</tr>
<tr class="odd">
<td>May 19, 1940 </td>
<td>04:36</td>
<td>Imperial Valley, CA </td>
<td colspan="2">32.73</td>
<td colspan="2">-115.50</td>
<td>9</td>
<td>7.1</td>
<td>M (Ellsworth, 1990) </td>
</tr>
<tr class="even">
<td>December 7, 1944 </td>
<td>04:35</td>
<td>Tonankai, Japan </td>
<td colspan="2">33.75</td>
<td colspan="2">136.00</td>
<td>1,223</td>
<td>8.1</td>
<td><h3 id="m-kanamori-1977-7">M (Kanamori, 1977)</h3></td>
</tr>
<tr class="odd">
<td>April 1, 1946 </td>
<td>12:28</td>
<td>Unimak Is., AK </td>
<td colspan="2">52.75</td>
<td colspan="2">-163.50</td>
<td>165</td>
<td>8.1</td>
<td>M (Tanioka and Seno, 2001) </td>
</tr>
<tr class="even">
<td>June 23, 1946 </td>
<td>17:13</td>
<td>Vancouver Island, B.C., Canada </td>
<td colspan="2">49.75</td>
<td colspan="2">-124.50</td>
<td></td>
<td>7.3</td>
<td>ML (Gutenberg and Richter, 1954; Rogers, 1983)</td>
</tr>
<tr class="odd">
<td>August 4, 1946</td>
<td>17:51</td>
<td>Dominican Republic</td>
<td colspan="2">19.25</td>
<td colspan="2">-69.00</td>
<td>100</td>
<td>8.0</td>
<td>M<sub>S</sub> (Abe, 1981)</td>
</tr>
<tr class="even">
<td>December 20, 1946</td>
<td>19:19</td>
<td>Nankaido, Japan </td>
<td colspan="2">32.5</td>
<td colspan="2">134.5</td>
<td>1,330</td>
<td>8.1</td>
<td><h3 id="m-kanamori-1977-8">M (Kanamori, 1977)</h3></td>
</tr>
<tr class="odd">
<td>October 16, 1947 </td>
<td>02:09</td>
<td>Fairbanks, AK </td>
<td colspan="2">64.2</td>
<td colspan="2">-148.3</td>
<td></td>
<td>7.2</td>
<td>M</td>
</tr>
<tr class="even">
<td>April 13, 1949 </td>
<td>19:55</td>
<td>Olympia, WA </td>
<td colspan="2">47.1</td>
<td colspan="2">-122.7</td>
<td>8</td>
<td>7.1</td>
<td>M<sub>L</sub> (Baker and Langston, 1987) </td>
</tr>
<tr class="odd">
<td>August 22, 1949 </td>
<td>04:01</td>
<td>Queen Charlotte Is., B.C, Canada </td>
<td colspan="2">53.62</td>
<td colspan="2">-133.27</td>
<td></td>
<td>8.1</td>
<td><h3 id="m-kanamori-1977-9">M (Kanamori, 1977)</h3></td>
</tr>
<tr class="even">
<td>August 15, 1950 </td>
<td>14:09</td>
<td>Assam-Tibet</td>
<td colspan="2">28.5</td>
<td colspan="2">96.5</td>
<td>1,526</td>
<td>8.6</td>
<td><h3 id="m-kanamori-1977-10">M (Kanamori, 1977)</h3></td>
</tr>
<tr class="odd">
<td>August 21, 1951 </td>
<td>10:57</td>
<td>Kona, HI </td>
<td colspan="2">19.50</td>
<td colspan="2">-155.95</td>
<td></td>
<td>6.9</td>
<td>M<sub>S</sub> (Klein and Wright, 2000) </td>
</tr>
<tr class="even">
<td>July 21, 1952 </td>
<td>11:52</td>
<td>Kern County, CA </td>
<td colspan="2">34.95</td>
<td colspan="2">-119.05</td>
<td>12</td>
<td>7.3</td>
<td>M (Stein and Hanks, 1998)</td>
</tr>
<tr class="odd">
<td>November 4, 1952 </td>
<td>16:58</td>
<td>Kamchatka, Russia </td>
<td colspan="2">52.76</td>
<td colspan="2">160.06</td>
<td></td>
<td>9.0</td>
<td><h3 id="m-kanamori-1977-11">M (Kanamori, 1977)</h3></td>
</tr>
<tr class="even">
<td>March 29, 1954 </td>
<td>06:17</td>
<td>Spain</td>
<td colspan="2">37.03</td>
<td colspan="2">-3.51</td>
<td></td>
<td>7.9</td>
<td>M</td>
</tr>
<tr class="odd">
<td>July 6, 1954 </td>
<td>11:13</td>
<td>Rainbow Mtn, NV </td>
<td colspan="2">39.42</td>
<td colspan="2">-118.53</td>
<td></td>
<td>6.6</td>
<td>M (Ellsworth, 1990) </td>
</tr>
<tr class="even">
<td>August 24, 1954 </td>
<td>05:51</td>
<td>Stillwater, NV </td>
<td colspan="2">39.58</td>
<td colspan="2">-118.45</td>
<td></td>
<td>6.8</td>
<td>M (Ellsworth, 1990) </td>
</tr>
<tr class="odd">
<td>December 16, 1954</td>
<td>11:07</td>
<td>Fairview Peak, NV </td>
<td colspan="2">39.32</td>
<td colspan="2">-118.20</td>
<td></td>
<td>7.1</td>
<td>M (Ellsworth, 1990) </td>
</tr>
<tr class="even">
<td>December 16, 1954 </td>
<td>11:11</td>
<td>Dixie Valley, NV </td>
<td colspan="2">39.5</td>
<td colspan="2">-118.0</td>
<td></td>
<td>6.8</td>
<td>M (Ellsworth, 1990) </td>
</tr>
<tr class="odd">
<td>October 24, 1955 </td>
<td>04:10</td>
<td>Concord, CA </td>
<td colspan="2">38.0</td>
<td colspan="2">-122.1</td>
<td>1</td>
<td>5.4</td>
<td>M<sub>L</sub> (Bolt and Miller, 1975) </td>
</tr>
<tr class="even">
<td>March 9, 1957 </td>
<td>14:22</td>
<td>Andreanof Is., AK </td>
<td colspan="2">51.56</td>
<td colspan="2">-175.39</td>
<td></td>
<td>8.6</td>
<td><h3 id="m-johnson-et-al.-1994">M (Johnson et al., 1994)</h3></td>
</tr>
<tr class="odd">
<td>December 4, 1957 </td>
<td>03:37</td>
<td>Gobi-Altai, Mongolia </td>
<td colspan="2">45.15</td>
<td colspan="2">99.21</td>
<td>30</td>
<td>8.1</td>
<td><h3 id="m-kanamori-1977-12">M (Kanamori, 1977)</h3></td>
</tr>
<tr class="even">
<td>April 7, 1958 </td>
<td>15:30</td>
<td>Huslia, AK </td>
<td colspan="2">65.94</td>
<td colspan="2">-156.37</td>
<td></td>
<td>7.3</td>
<td>M</td>
</tr>
<tr class="odd">
<td>July 10, 1958 </td>
<td>06:15</td>
<td>Fairweather, AK </td>
<td colspan="2">58.37</td>
<td colspan="2">-136.66</td>
<td>5</td>
<td>7.7</td>
<td>M (Abe and Kanamori, 1980)</td>
</tr>
<tr class="even">
<td>August 18, 1959 </td>
<td>06:37</td>
<td>Hebgen Lake, MT </td>
<td colspan="2">44.60</td>
<td colspan="2">-110.64</td>
<td>28</td>
<td>7.3</td>
<td>M (Dosier, 1985)</td>
</tr>
<tr class="odd">
<td>February 29, 1960 </td>
<td>23:40</td>
<td>Agadir, Morocco </td>
<td colspan="2">30.5</td>
<td colspan="2">-9.3</td>
<td>10,000</td>
<td>5.7</td>
<td>M</td>
</tr>
<tr class="even">
<td>May 22, 1960 </td>
<td>19:11</td>
<td>Chile</td>
<td colspan="2">-38.24</td>
<td colspan="2">-73.05</td>
<td>5,700</td>
<td>9.5</td>
<td><h3 id="m-kanamori-1977-13">M (Kanamori, 1977)</h3></td>
</tr>
<tr class="odd">
<td>March 28, 1964 </td>
<td>03:36</td>
<td>Prince William Sound, AK </td>
<td colspan="2">61.02</td>
<td colspan="2">-147.65</td>
<td>128</td>
<td>9.2</td>
<td><h3 id="m-kanamori-1977-14">M (Kanamori, 1977)</h3></td>
</tr>
<tr class="even">
<td>June 16, 1964 </td>
<td>04:01</td>
<td>Niigata, Japan </td>
<td colspan="2">38.43</td>
<td colspan="2">139.23</td>
<td>26</td>
<td>7.5</td>
<td>M</td>
</tr>
<tr class="odd">
<td>February 4, 1965 </td>
<td>05:01</td>
<td>Rat Is., AK </td>
<td colspan="2">51.21</td>
<td colspan="2">178.50</td>
<td></td>
<td>8.7</td>
<td><h3 id="m-kanamori-1977-15">M (Kanamori, 1977)</h3></td>
</tr>
<tr class="even">
<td>April 29, 1965 </td>
<td>15:28</td>
<td>Seattle-Tacoma, WA </td>
<td colspan="2">47.32</td>
<td colspan="2">-122.33</td>
<td>7</td>
<td>6.5</td>
<td>M<sub>L</sub> (Algermissen and Harding, 1965) </td>
</tr>
<tr class="odd">
<td>June 28, 1966 </td>
<td>04:26</td>
<td>Parkfield, CA </td>
<td colspan="2">35.88</td>
<td colspan="2">-120.49</td>
<td></td>
<td>6.1</td>
<td>M (Tsai and Aki, 1969) </td>
</tr>
<tr class="even">
<td>September 12, 1966</td>
<td>16:41</td>
<td>Truckee, CA </td>
<td colspan="2">39.38</td>
<td colspan="2">-120.22</td>
<td></td>
<td>5.9</td>
<td>M (Tsai and Aki, 1970) </td>
</tr>
<tr class="odd">
<td>December 10, 1967</td>
<td>22:51</td>
<td>Koyna, India </td>
<td colspan="2">17.39</td>
<td colspan="2">73.77</td>
<td></td>
<td>6.3</td>
<td>M (Langston, 1976) </td>
</tr>
<tr class="even">
<td>October 2, 1969 </td>
<td>06:19</td>
<td>Santa Rosa, CA </td>
<td colspan="2">38.30</td>
<td colspan="2">-122.76</td>
<td>1</td>
<td>5.7</td>
<td>M<sub>L</sub> (Bolt and Miller, 1975) </td>
</tr>
<tr class="odd">
<td>May 31, 1970 </td>
<td>20:23</td>
<td>Peru</td>
<td colspan="2">-9.25</td>
<td colspan="2">-78.84</td>
<td>66,000</td>
<td>7.9</td>
<td><h3 id="m-kanamori-1977-16">M (Kanamori, 1977)</h3></td>
</tr>
<tr class="even">
<td>July 31, 1970 </td>
<td>17:08</td>
<td>Colombia</td>
<td colspan="2">-1.49</td>
<td colspan="2">-72.56</td>
<td>1</td>
<td>8.0</td>
<td>M<sub>S</sub></td>
</tr>
<tr class="odd">
<td>February 9, 1971 </td>
<td>14:00</td>
<td>San Fernando, CA </td>
<td colspan="2">34.40</td>
<td colspan="2">-118.39</td>
<td>65</td>
<td>6.6</td>
<td>M (Heaton, 1982) </td>
</tr>
<tr class="even">
<td>February 4, 1975 </td>
<td>11:36</td>
<td>Haicheng, China </td>
<td colspan="2">40.72</td>
<td colspan="2">122.73</td>
<td>10,000</td>
<td>7.0</td>
<td>M (Cipar, 1979) </td>
</tr>
<tr class="odd">
<td>August 1, 1975 </td>
<td>20:20</td>
<td>Oroville, CA </td>
<td colspan="2">39.50</td>
<td colspan="2">-121.39</td>
<td></td>
<td>5.8</td>
<td>M</td>
</tr>
<tr class="even">
<td>November 29, 1975</td>
<td>14:47</td>
<td>South flank of Kilauea, HI </td>
<td colspan="2">19.45</td>
<td colspan="2">-155.03</td>
<td>2</td>
<td>7.2</td>
<td>M<sub>S</sub> (Klein and Wright, 2000) </td>
</tr>
<tr class="odd">
<td>February 4, 1976 </td>
<td>09:01</td>
<td>Guatemala</td>
<td colspan="2">15.30</td>
<td colspan="2">-89.14</td>
<td>23,000</td>
<td>7.5</td>
<td>M</td>
</tr>
<tr class="even">
<td>July 27, 1976 </td>
<td>19:42</td>
<td>Tangshan, China </td>
<td colspan="2">39.61</td>
<td colspan="2">117.89</td>
<td>255,000<strong>*</strong></td>
<td>7.5</td>
<td><h3 id="m-kanamori-1977-17">M (Kanamori, 1977)</h3></td>
</tr>
<tr class="odd">
<td>August 6, 1979 </td>
<td>17:05</td>
<td>Coyote Lake, CA </td>
<td colspan="2">37.11</td>
<td colspan="2">-121.52</td>
<td></td>
<td>5.7</td>
<td>M (Ellsworth, 1990) </td>
</tr>
<tr class="even">
<td>October 15, 1979 </td>
<td>23:17</td>
<td>Imperial Valley, CA </td>
<td colspan="2">32.82</td>
<td colspan="2">-115.65</td>
<td></td>
<td>6.5</td>
<td>M (Stein and Hanks, 1998) </td>
</tr>
<tr class="odd">
<td>January 24, 1980 </td>
<td>19:00</td>
<td>Livermore, CA </td>
<td colspan="2">37.71</td>
<td colspan="2">-121.73</td>
<td></td>
<td>5.8</td>
<td>M (Bolt et al., 1981) </td>
</tr>
<tr class="even">
<td>May 25, 1980 </td>
<td>16:33</td>
<td>Mammoth Lakes, CA </td>
<td colspan="2">37.60</td>
<td colspan="2">-118.83</td>
<td></td>
<td>6.2</td>
<td>M (Ellsworth, 1990) </td>
</tr>
<tr class="odd">
<td>May 25, 1980 </td>
<td>16:49</td>
<td>Mammoth Lakes, CA </td>
<td colspan="2">37.65</td>
<td colspan="2">-118.90</td>
<td></td>
<td>5.9</td>
<td>M<sub>L</sub> (Ellsworth, 1990) </td>
</tr>
<tr class="even">
<td>May 25, 1980 </td>
<td>19:44</td>
<td>Mammoth Lakes, CA </td>
<td colspan="2">37.55</td>
<td colspan="2">-118.82</td>
<td></td>
<td>5.9</td>
<td>M (Ellsworth, 1990) </td>
</tr>
<tr class="odd">
<td>May 27, 1980 </td>
<td>14:50</td>
<td>Mammoth Lakes, CA </td>
<td colspan="2">37.48</td>
<td colspan="2">-118.80</td>
<td></td>
<td>6.0</td>
<td>M (Ellsworth, 1990) </td>
</tr>
<tr class="even">
<td>November 8, 1980 </td>
<td>10:27</td>
<td>Gorda Plate, CA </td>
<td colspan="2">41.12</td>
<td colspan="2">-124.67</td>
<td></td>
<td>7.2</td>
<td>M (Ellsworth, 1990) </td>
</tr>
<tr class="odd">
<td>May 2, 1983 </td>
<td>23:42</td>
<td>Coalinga, CA </td>
<td colspan="2">36.23</td>
<td colspan="2">-120.32</td>
<td></td>
<td>6.4</td>
<td>M (Stein and Hanks, 1998) </td>
</tr>
<tr class="even">
<td>October 28, 1983 </td>
<td>14:06</td>
<td>Borah Peak, ID </td>
<td colspan="2">44.09</td>
<td colspan="2">-113.80</td>
<td>2</td>
<td>6.9</td>
<td>M (PDE Monthly Listing)</td>
</tr>
<tr class="odd">
<td>November 16, 1983</td>
<td>16:13</td>
<td>Kaoiki, HI </td>
<td colspan="2">19.44</td>
<td colspan="2">-155.38</td>
<td></td>
<td>6.7</td>
<td>M (PDE Monthly Listing)</td>
</tr>
<tr class="even">
<td>April 24, 1984 </td>
<td>21:15</td>
<td>Morgan Hill, CA </td>
<td colspan="2">37.30</td>
<td colspan="2">-121.71</td>
<td></td>
<td>6.1</td>
<td>M (PDE Monthly Listing)</td>
</tr>
<tr class="odd">
<td>November 23, 1984</td>
<td>18:08</td>
<td>Round Valley, CA </td>
<td colspan="2">37.45</td>
<td colspan="2">-118.60</td>
<td></td>
<td>5.8</td>
<td>M (Ellsworth, 1990) </td>
</tr>
<tr class="even">
<td>September 19, 1985</td>
<td>13:17</td>
<td>Michoacan, Mexico </td>
<td colspan="2">18.44</td>
<td colspan="2">-102.36</td>
<td>9,500</td>
<td>8.0</td>
<td>M (PDE Monthly Listing)</td>
</tr>
<tr class="odd">
<td>December 23, 1985</td>
<td>05:16</td>
<td>Nahanni, NW Terr, Canada </td>
<td colspan="2">62.16</td>
<td colspan="2">-124.31</td>
<td></td>
<td>6.8</td>
<td>M (Wetmiller et al., 1988) </td>
</tr>
<tr class="even">
<td>May 7, 1986 </td>
<td>22:47</td>
<td>Andreanof Is., AK </td>
<td colspan="2">51.56</td>
<td colspan="2">-174.81</td>
<td></td>
<td>7.9</td>
<td>M (PDE Monthly Listing)</td>
</tr>
<tr class="odd">
<td>July 8, 1986 </td>
<td>09:20</td>
<td>North Palm Springs, CA </td>
<td colspan="2">33.97</td>
<td colspan="2">-116.78</td>
<td></td>
<td>6.1</td>
<td>M (Hartzell, 1989) </td>
</tr>
<tr class="even">
<td>July 21, 1986 </td>
<td>14:42</td>
<td>Chalfant Valley, CA </td>
<td colspan="2">37.53</td>
<td colspan="2">-118.43</td>
<td></td>
<td>6.2</td>
<td>M (Ellsworth, 1990) </td>
</tr>
<tr class="odd">
<td>October 1, 1987 </td>
<td>14:42</td>
<td>Whittier Narrows, CA </td>
<td colspan="2">34.06</td>
<td colspan="2">-118.13</td>
<td>8</td>
<td>5.9</td>
<td>M (Hartzell and Iida, 1990) </td>
</tr>
<tr class="even">
<td>November 30, 1987</td>
<td>19:23</td>
<td>Gulf of Alaska</td>
<td colspan="2">58.84</td>
<td colspan="2">-142.60</td>
<td></td>
<td>7.8</td>
<td>M (PDE Monthly Listing)</td>
</tr>
<tr class="odd">
<td>January 22, 1988 </td>
<td>00:35</td>
<td>Tennant Creek, Australia</td>
<td colspan="2">-19.87</td>
<td colspan="2">133.78</td>
<td></td>
<td>6.3</td>
<td>M (Choy and Bowman, 1990) </td>
</tr>
<tr class="even">
<td>January 22, 1988 </td>
<td>03:57</td>
<td>Tennant Creek, Australia</td>
<td colspan="2">-19.88</td>
<td colspan="2">133.83</td>
<td></td>
<td>6.4</td>
<td>M (Choy and Bowman, 1990) </td>
</tr>
<tr class="odd">
<td>January 22, 1988 </td>
<td>12:04</td>
<td>Tennant Creek, Australia</td>
<td colspan="2">-19.90</td>
<td colspan="2">133.83</td>
<td></td>
<td>6.6</td>
<td>M (Choy and Bowman, 1990) </td>
</tr>
<tr class="even">
<td>March 6, 1988 </td>
<td>22:35</td>
<td>Gulf of Alaska</td>
<td colspan="2">57.26</td>
<td colspan="2">-142.75</td>
<td></td>
<td>7.7</td>
<td>M (PDE Monthly Listing)</td>
</tr>
<tr class="odd">
<td>November 25, 1988</td>
<td>23:46</td>
<td>Saguenay, Quebec, Canada </td>
<td colspan="2">48.06</td>
<td colspan="2">-71.27</td>
<td></td>
<td>5.9</td>
<td>M (Boatwright and Choy, 1992) </td>
</tr>
<tr class="even">
<td>December 7, 1988 </td>
<td>07:41</td>
<td>Spitak, Armenia </td>
<td colspan="2">40.93</td>
<td colspan="2">44.11</td>
<td>25,000</td>
<td>6.8</td>
<td>M (PDE Monthly Listing)</td>
</tr>
<tr class="odd">
<td>October 18, 1989 </td>
<td>00:04</td>
<td>Loma Prieta, CA </td>
<td colspan="2">37.14</td>
<td colspan="2">-121.76</td>
<td>63</td>
<td>6.9</td>
<td>M (Wald et al., 1991) </td>
</tr>
<tr class="even">
<td>December 25, 1989</td>
<td>14:24</td>
<td>Ungava, Quebec, Canada </td>
<td colspan="2">60.07</td>
<td colspan="2">-73.54</td>
<td></td>
<td>6.0</td>
<td>M (Bent, 1994) </td>
</tr>
<tr class="odd">
<td>June 28, 1991 </td>
<td>14:43</td>
<td>Sierra Madre, CA </td>
<td colspan="2">34.25</td>
<td colspan="2">-117.95</td>
<td>2</td>
<td>5.6</td>
<td>M (Wald et al., 1991) </td>
</tr>
<tr class="even">
<td>August 17, 1991 </td>
<td>22:17</td>
<td>Honeydew, CA</td>
<td colspan="2">41.79</td>
<td colspan="2">-125.58</td>
<td></td>
<td>7.0</td>
<td>M (PDE Monthly Listing)</td>
</tr>
<tr class="odd">
<td>April 23, 1992</td>
<td>04:50</td>
<td>Joshua Tree, CA</td>
<td colspan="2">33.87</td>
<td colspan="2">-116.55</td>
<td></td>
<td>6.2</td>
<td>M (Stein and Hanks, 1998)</td>
</tr>
<tr class="even">
<td>April 25, 1992 </td>
<td>18:06</td>
<td>Cape Mendocino, CA </td>
<td colspan="2">40.38</td>
<td colspan="2">-124.05</td>
<td></td>
<td>7.2</td>
<td>M (PDE Monthly Listing)</td>
</tr>
<tr class="odd">
<td>April 26, 1992 </td>
<td>07:41</td>
<td>Offshore, Cape Mendocino, CA </td>
<td colspan="2">40.55</td>
<td colspan="2">-124.29</td>
<td></td>
<td>6.5</td>
<td>M (Oppenheimer et al., 1993) </td>
</tr>
<tr class="even">
<td>April 26, 1992 </td>
<td>11:18</td>
<td>Offshore, Cape Mendocino, CA </td>
<td colspan="2">40.44</td>
<td colspan="2">-124.43</td>
<td></td>
<td>6.7</td>
<td>M (Oppenheimer et al., 1993) </td>
</tr>
<tr class="odd">
<td>June 28, 1992 </td>
<td>11:57</td>
<td>Landers, CA </td>
<td colspan="2">34.20</td>
<td colspan="2">-116.52</td>
<td>3</td>
<td>7.3</td>
<td>M (Sieh et al. 1993)</td>
</tr>
<tr class="even">
<td>June 29 1992 </td>
<td>10:14</td>
<td>Little Skull Mtn, NV </td>
<td colspan="2">36.77</td>
<td colspan="2">-116.32</td>
<td></td>
<td>5.7</td>
<td>M (Walter, 1993) </td>
</tr>
<tr class="odd">
<td>September 2, 1992 </td>
<td>00:16</td>
<td>Nicaragua</td>
<td colspan="2">11.77</td>
<td colspan="2">-87.35</td>
<td>116</td>
<td>7.6</td>
<td>M (PDE Monthly Listing)</td>
</tr>
<tr class="even">
<td>September 29, 1993</td>
<td>22:25</td>
<td>Latur-Killari, India </td>
<td colspan="2">18.08</td>
<td colspan="2">76.52</td>
<td>9,748</td>
<td>6.2</td>
<td>M (PDE Monthly Listing)</td>
</tr>
<tr class="odd">
<td>January 17, 1994 </td>
<td>12:30</td>
<td>Northridge, CA </td>
<td colspan="2">34.18</td>
<td colspan="2">-118.56</td>
<td>60</td>
<td>6.7</td>
<td>M (PDE Monthly Listing)</td>
</tr>
<tr class="even">
<td>June 9, 1994 </td>
<td>00:33</td>
<td>Bolivia</td>
<td colspan="2">-13.86</td>
<td colspan="2">-67.49</td>
<td>5</td>
<td>8.2</td>
<td>M (PDE Monthly Listing)</td>
</tr>
<tr class="odd">
<td>September 1, 1994 </td>
<td>15:15</td>
<td>Cape Mendocino, CA </td>
<td colspan="2">40.38</td>
<td colspan="2">-125.78</td>
<td></td>
<td>7.0</td>
<td>M (PDE Monthly Listing)</td>
</tr>
<tr class="even">
<td>January 16, 1995 </td>
<td>20:46</td>
<td>Kobe, Japan </td>
<td colspan="2">34.57</td>
<td colspan="2">135.03</td>
<td>5,502</td>
<td>6.9</td>
<td>M (PDE Monthly Listing)</td>
</tr>
<tr class="odd">
<td>May 21, 1997 </td>
<td>22:51</td>
<td>Jabalpur, India </td>
<td colspan="2">23.07</td>
<td colspan="2">80.12</td>
<td>38</td>
<td>5.8</td>
<td>M (Singh et al., 1999) </td>
</tr>
<tr class="even">
<td>July 17, 1998 </td>
<td>08:49</td>
<td>New Guinea</td>
<td colspan="2">-2.94</td>
<td colspan="2">142.58</td>
<td>2,183</td>
<td>7.0</td>
<td>M (PDE Monthly Listing)</td>
</tr>
<tr class="odd">
<td>January 25, 1999</td>
<td>18:19</td>
<td>Colombia</td>
<td colspan="2">4.45</td>
<td colspan="2">-75.65</td>
<td>1,185</td>
<td>6.1</td>
<td>M (PDE Monthly Listing)</td>
</tr>
<tr class="even">
<td>August 17, 1999 </td>
<td>00:01</td>
<td>Izmit, Turkey </td>
<td colspan="2">40.77</td>
<td colspan="2">30.00</td>
<td>17,118</td>
<td>7.6</td>
<td>M (PDE Monthly Listing)</td>
</tr>
<tr class="odd">
<td>September 20, 1999</td>
<td>17:47</td>
<td>Chi-Chi, Taiwan </td>
<td colspan="2">23.82</td>
<td colspan="2">120.86</td>
<td>2,400</td>
<td>7.6</td>
<td>M (PDE Monthly Listing)</td>
</tr>
<tr class="even">
<td>October 16, 1999 </td>
<td>09:46</td>
<td>Hector Mine, CA </td>
<td colspan="2">34.56</td>
<td colspan="2">-116.44</td>
<td></td>
<td>7.1</td>
<td>M (PDE Monthly Listing)</td>
</tr>
<tr class="odd">
<td>November 12, 1999</td>
<td>16:57</td>
<td>Duzce, Turkey</td>
<td colspan="2">40.82</td>
<td colspan="2">31.23</td>
<td>894</td>
<td>7.2</td>
<td>M (PDE Monthly Listing)</td>
</tr>
<tr class="even">
<td>September 3, 2000</td>
<td>08:36</td>
<td>Napa, CA</td>
<td colspan="2">38.38</td>
<td colspan="2">-122.41</td>
<td></td>
<td>5.0</td>
<td>M (BRK)</td>
</tr>
<tr class="odd">
<td>November 16, 2000</td>
<td>04:54</td>
<td>New Ireland, Papua New Guinea</td>
<td colspan="2">-4.00</td>
<td colspan="2">152.33</td>
<td></td>
<td>8.0</td>
<td>M (PDE Monthly Listing)</td>
</tr>
<tr class="even">
<td>January 13, 2001</td>
<td>17:33</td>
<td>El Salvador</td>
<td colspan="2">13.04</td>
<td colspan="2">-88.66</td>
<td>844</td>
<td>7.7</td>
<td>M (PDE Monthly Listing)</td>
</tr>
<tr class="odd">
<td>January 26,2001</td>
<td>03:16</td>
<td>Gujarat, India</td>
<td colspan="2">23.39</td>
<td colspan="2">70.23</td>
<td>20,085</td>
<td>7.6</td>
<td>M (PDE Monthly Listing)</td>
</tr>
<tr class="even">
<td>February 28, 2001</td>
<td>18:54</td>
<td>Olympia, WA</td>
<td colspan="2">47.11</td>
<td colspan="2">-122.60</td>
<td></td>
<td>6.8</td>
<td>M (PDE Monthly Listing)</td>
</tr>
<tr class="odd">
<td>June 23, 2001</td>
<td>20:33</td>
<td>Coastal Peru</td>
<td colspan="2">-16.30</td>
<td colspan="2">-73.55</td>
<td>75</td>
<td>8.4</td>
<td>M (PDE Monthly Listing)</td>
</tr>
<tr class="even">
<td>March 25, 2002</td>
<td>14:56</td>
<td>Hindu Kush Region, Afghanistan</td>
<td colspan="2">36.06</td>
<td colspan="2">69.32</td>
<td>1,000</td>
<td>6.1</td>
<td>M (PDE Monthly Listing)</td>
</tr>
<tr class="odd">
<td>April 20, 2002</td>
<td>10:50</td>
<td>Au Sable Forks, NY</td>
<td colspan="2">44.51</td>
<td colspan="2">-73.70</td>
<td></td>
<td>5.1</td>
<td>M (PDE Monthly Listing)</td>
</tr>
<tr class="even">
<td>November 3, 2002</td>
<td>22:12</td>
<td>Denali Park, AK</td>
<td colspan="2">63.52</td>
<td colspan="2">-147.44</td>
<td></td>
<td>7.9</td>
<td>M (PDE Monthly Listing)</td>
</tr>
<tr class="odd">
<td>May 21, 2003</td>
<td>18:44</td>
<td>Boumerdes, Algeria</td>
<td colspan="2">36.96</td>
<td colspan="2">3.63</td>
<td>2,266</td>
<td>6.8</td>
<td>M (PDE Monthly Listing)</td>
</tr>
<tr class="even">
<td>September 25, 2003</td>
<td>19:50</td>
<td>Hokkaido, Japan</td>
<td colspan="2">41.82</td>
<td colspan="2">143.91</td>
<td></td>
<td>8.3</td>
<td>M (PDE Monthly Listing)</td>
</tr>
<tr class="odd">
<td>November 17, 2003</td>
<td>06:43</td>
<td>Rat Is., AK</td>
<td colspan="2">51.15</td>
<td colspan="2">178.65</td>
<td></td>
<td>7.8</td>
<td>M (PDE Monthly Listing)</td>
</tr>
<tr class="even">
<td>December 22, 2003</td>
<td>19:15</td>
<td>San Simeon, CA</td>
<td colspan="2">35.71</td>
<td colspan="2">-121.10</td>
<td>2</td>
<td>6.6</td>
<td>M (PDE Monthly Listing)</td>
</tr>
<tr class="odd">
<td>December 26, 2003</td>
<td>01:56</td>
<td>Southeastern Iran</td>
<td colspan="2">28.99</td>
<td colspan="2">58.31</td>
<td>31,000</td>
<td>6.6</td>
<td>M (PDE Monthly Listing)</td>
</tr>
<tr class="even">
<td>September 28, 2004</td>
<td>17:15</td>
<td>Parkfield, CA</td>
<td colspan="2">35.81</td>
<td colspan="2">-120.37</td>
<td></td>
<td>6.0</td>
<td>M (PDE Monthly Listing)</td>
</tr>
<tr class="odd">
<td>December 26, 2004</td>
<td>00:58</td>
<td>Off west coast northern Sumatra</td>
<td colspan="2">3.30</td>
<td colspan="2">95.87</td>
<td>227,898</td>
<td>9.1</td>
<td>M (Park et al., 2005)</td>
</tr>
<tr class="even">
<td>March 28, 2005</td>
<td>16:09</td>
<td>Northern Sumatra, Indonesia</td>
<td colspan="2">2.07</td>
<td colspan="2">97.01</td>
<td>1,313</td>
<td>8.6</td>
<td>M (PDE Monthly Listing)</td>
</tr>
<tr class="odd">
<td>June 15, 2005</td>
<td>02:50</td>
<td>Off coast of No. California</td>
<td colspan="2">41.29</td>
<td colspan="2">-125.95</td>
<td></td>
<td>7.2</td>
<td>M (PDE Monthly Listing)</td>
</tr>
<tr class="even">
<td>October 8, 2005</td>
<td>03:50</td>
<td>Pakistan</td>
<td colspan="2">34.53</td>
<td colspan="2">73.58</td>
<td>86,000</td>
<td>7.6</td>
<td>M (PDE Monthly Listing)</td>
</tr>
<tr class="odd">
<td>May 26, 2006</td>
<td>22:53</td>
<td>Java, Indonesia</td>
<td colspan="2">-7.96</td>
<td colspan="2">110.45</td>
<td>5,749</td>
<td>6.3</td>
<td>M (PDE Monthly Listing)</td>
</tr>
<tr class="even">
<td>October 15, 2006</td>
<td>17:07</td>
<td>Island of Hawaii, HI</td>
<td colspan="2">19.88</td>
<td colspan="2">-155.94</td>
<td></td>
<td>6.7</td>
<td>M (PDE Monthly Listing)</td>
</tr>
<tr class="odd">
<td>November 15, 2006</td>
<td>11:14</td>
<td>Kuril Islands</td>
<td colspan="2">46.59</td>
<td colspan="2">153.27</td>
<td></td>
<td>8.3</td>
<td>M (PDE Monthly Listing)</td>
</tr>
<tr class="even">
<td>September 12, 2007</td>
<td>11:10</td>
<td>Southern Sumatra, Indonesia</td>
<td colspan="2">-4.44</td>
<td colspan="2">101.37</td>
<td>25</td>
<td>8.5</td>
<td>M (PDE Monthly Listing)</td>
</tr>
<tr class="odd">
<td>October 31, 2007</td>
<td>03:04</td>
<td>San Francisco Bay Area, CA</td>
<td colspan="2">37.43</td>
<td colspan="2">-121.77</td>
<td></td>
<td>5.6</td>
<td>M (PDE Monthly Listing)</td>
</tr>
<tr class="even">
<td>December 19, 2007</td>
<td>09:30</td>
<td>Andreanof Islands, AK</td>
<td colspan="2">51.36</td>
<td colspan="2">-179.51</td>
<td></td>
<td>7.2</td>
<td>M (PDE Monthly Listing)</td>
</tr>
<tr class="odd">
<td>May 12, 2008</td>
<td>06:28</td>
<td>Eastern Sichuan, China</td>
<td colspan="2">30.99</td>
<td colspan="2">103.36</td>
<td>87,652</td>
<td>7.9</td>
<td>M (QED)</td>
</tr>
<tr class="even">
<td colspan="10"></td>
</tr>
<tr class="odd">
<td colspan="10">† GMT</td>
</tr>
<tr class="even">
<td colspan="10">‡ M<sub>G-R</sub> = Gutenberg and Richter's (1954)
magnitude, M<sub>S</sub> = 20-sec surface-wave magnitude, M = moment
magnitude (Hanks and Kanamori, 1979), and M<sub>I</sub> is an intensity
magnitude, M<sub>L</sub> is local magnitude (Richter, 1935)</td>
</tr>
<tr class="odd">
<td colspan="10">' Data are sparse and consensus is lacking on the true
magnitude</td>
</tr>
<tr class="even">
<td colspan="10">* Fatalities estimated as high as 655,000</td>
</tr>
</tbody>
</table>
+-----------------------------------------------------------------------+
| ### References |
+-----------------------------------------------------------------------+
| Abe, K., 1981, Magnitudes of large shallow earthquakes from |
| 1904-1980: Physics of Earth and Planetary Interiors, v. 27, p. 72-92. |
+-----------------------------------------------------------------------+
| Abe, K., 1988, Magnitudes and origin times from Milne seismograph |
| data: Earthquakes in China and California, 1898-1912 in Lee, W. H. K, |
| Meyers, H., and Shimizaki, K., eds., Historical seismograms and |
| earthquakes of the world: San Diego, Calif., Academic Press, p.37-50. |
+-----------------------------------------------------------------------+
| Abe, K. and H. Kanamori, 1980, Magnitudes of great shallow |
| earthquakes from 1953 to 1977, Tectonophysics, v. 62, p. 191--203. |
+-----------------------------------------------------------------------+
| Algermissen, S.T. and S. Harding, 1965, Preliminary Seismological |
| Report, in US Coast and Geodetic Survey, 1965, The Puget Sound, |
| Washington earthquake of April 29, 1965: US Coast and Geodetic |
| Survey, p 1-26. |
+-----------------------------------------------------------------------+
| Baker, G.E. and C.A. Langston, 1987,Source parameters of the 1949 |
| magnitude 7.1 south Puget Sound, Washington earthquake as determined |
| from long-period body waves and strong motions: Bull. Seism. Soc Am. |
| v. 77 no 5, p. 1530-1557. |
+-----------------------------------------------------------------------+
| Bakun, W.H., 1999, Seismic Activity of the San Francisco Bay region, |
| Bull. Seism. Soc Am., 89, 764-784. |
+-----------------------------------------------------------------------+
| Bakun, W.H., 2000, Seismicity of California\'s north coast, Bull. |
| Seism. Soc. Amer, in press. |
+-----------------------------------------------------------------------+
| Bakun, W.H., R.A. Haugerud, M.G. Hopper, and R.S. Ludwin, 2002, The |
| December 1872 Washington state earthquake, Bull. Seismol. Soc. Am., |
| 92, p. 3239-3258. |
+-----------------------------------------------------------------------+
| Bakun, W.H. and M.G. Hopper, 2004, Magnitudes and locations of the |
| 1811-1812 New Madrid, Missouri, and the 1886 Charleston, South |
| Carolina, earthquakes, Bull. Seismol. Soc. Am., 94, p. 64-75. |
+-----------------------------------------------------------------------+
| Bakun, W. H. and T. V. McEvilly, 1984, Recurrence models and |
| Parkfield, California, earthquakes, J. Geophys. Res., 89, p. |
| 3051-3058. |
+-----------------------------------------------------------------------+
| Bolt, B. A. and R. D. Miller, 1975, Catalog of Earthquakes in |
| Northern california and Adjoining Areas: 1 January 1910 - 31 December |
| 1972, Seismographic Stations, University of California, Berkeley, |
| 1-567. |
+-----------------------------------------------------------------------+
| Bolt, B. A., T. V. McEvilly, and R. A. Uhrhammer, 1981, The Livermore |
| Valley, California, sequence of January 1980, Bull. Seismol. Soc. |
| Am., 71, p. 451-463. |
+-----------------------------------------------------------------------+
| Beanland, S. and M. M. Clark, 1994, The Owens valley fault zone, |
| eastern California, and surface rupture associated with the 1872 |
| earthquake; U. S. Geol. Surv Bull. 1982, 29pp. |
+-----------------------------------------------------------------------+
| Bent, A.L., 1992, A re-examination of the 1925 Charlevoix, Quebec, |
| earthquake, Bull. Seism. Soc. Am., 82, 2097-2113. |
+-----------------------------------------------------------------------+
| Bent, A.L., 1994, The 1989 (Ms6.3) Ungava, Quebec, earthquake: a |
| complex intraplate event, Bull. Seism. Soc. Am., 84, 1075-1088. |
+-----------------------------------------------------------------------+
| Bent, A.L., 1995, A complex double-couple source mechanism for the |
| Ms7.2 1929 Grand Banks earthquake, Bull. Seism. Soc. Am., 85, |
| 1003-1020. |
+-----------------------------------------------------------------------+
| Bent, A.L., 1996, An improved source mechanism for the 1935 |
| Timiskaming, Quebec earthquake from regional waveforms, Pure Appl. |
| Geophys.. 146, 5-20. |
+-----------------------------------------------------------------------+
| Boatwright, J. and Choy, G.L., 1992, Acceleration source spectra |
| anticipated for large earthquakes in northeastern North America, |
| Bull. Seism. Soc. Am., 82, 660-682. |
+-----------------------------------------------------------------------+
| BRK, University of California Seismographic Stations, Berkeley |
+-----------------------------------------------------------------------+
| Choy, G.L. and Bowman, J.R., 1990, Rupture process of a multiple main |
| shock sequence: analysis of teleseismic, local and field observations |
| of the Tennant |
+-----------------------------------------------------------------------+
| Creek, Australia earthquakes of January 22, 1988, J. Geophys. Res., |
| 95, 6867-6882. |
+-----------------------------------------------------------------------+
| Cipar, J., 1979, Source processes of the Haicheng, China earthquake |
| from observations of P and S waves: Seismol. Soc. Am. Bull., v. 69, |
| p. 1903-1916. |
+-----------------------------------------------------------------------+
| Dosier D.I., 1985, Source parameters and faulting processes of the |
| 1959 Hebgen Lake, Montana, earthquake sequence, J. Geophys. Res. 90, |
| 4537-4555. |
+-----------------------------------------------------------------------+
| Dosier, D.I., 1989, Source parameters of Montana earthquakes |
| (1925-1964) and tectonic deformation in the northern intermountain |
| seismic belt, Bull. Seism. Soc. Am. 79, 31-50. |
+-----------------------------------------------------------------------+
| Ellsworth, W. L., 1990, Earthquake history, 1769-1989, chap. 6 of |
| Wallace, R. E., ed., The San Andreas fault system, California: U. S. |
| Geological Survey Professional Paper 1515, p.153-188. |
+-----------------------------------------------------------------------+
| Grant, L.B. and K.E. Sieh, 1993, Stratigraphic evidence for seven |
| meters of dextral slip on the San Andreas fault during the 1857 |
| earthquake in the Carrizo Plain, Bull. Seism. Soc. Am., 83, 619-635. |
+-----------------------------------------------------------------------+
| Gutenberg, B. and C.F. Richter, 1954, Seismicity of the earth and |
| associated phenomena; 2nd ed: Princeton Univ. Press, 310 pp. |
+-----------------------------------------------------------------------+
| Hanks, T. C., and H. Kanamori, 1979, A moment magnitude scale, J. |
| Geophys. Res., 84, 2348-2350. |
+-----------------------------------------------------------------------+
| Hanks, T.C., J. A. Hileman, and W. Thatcher, 1975, Seismic moments of |
| the larger earthquakes of the southern California region, Geol. Soc. |
| Am. Bull, 86, 1131-1139. |
+-----------------------------------------------------------------------+
| Hartzell, S. H., 1989, Comparison of waveform inversion results for |
| the rupure history of finite fault; application to the 1986 North |
| Palm Springs, California, earthquake, J. Geophys. Res. 94, |
| 7515-7534. |
+-----------------------------------------------------------------------+
| Hartzell, S. H., & Iida, M., 1990, Source complexity of the 1987 |
| Whittier Narrows, California, earthquake from the inversion of strong |
| motion records, J. Geophys. Res. 95, 12,475-12,485. |
+-----------------------------------------------------------------------+
| Hartzell, S. H. and T. H. Heaton, 1983, Inversion of strong ground |
| motion and teleseismic waveform data for the fault rupture history of |
| the 1979 Imperial Valley, California, earthquake, Bull. Seism. Soc. |
| Am., 73, 1553-1583. |
+-----------------------------------------------------------------------+
| Hauksson, E., & Gross, S., 1991, Source parameters of the 1933 Long |
| Beach earthquake, Bull. Seism. Soc. Am. 81, 81-98. |
+-----------------------------------------------------------------------+
| Hauksson, E., L. M. Jones, K. Hutton, and D. Eberhart-Phillips, 1993, |
| The 1992 Landers earthquake sequence: seismological observations, J. |
| Geophys. Res., 98, 19,835-19,858. |
+-----------------------------------------------------------------------+
| Heaton, T. H., 1982, The 1971 San Fernando earthquake: a double |
| event?, Bull. Seism. Soc. Am. 72, 2037-2062. |
+-----------------------------------------------------------------------+
| Hough, S.E., J.G. Armbruster, L. Seeber, and J.G. Hough, 2000, On the |
| Modified Mercalli intensities and magnitudes of the 1811-1812 New |
| Madrid earthquakes, J. Geophys. Res., 105, 23,839-23,864. |
+-----------------------------------------------------------------------+
| Johnson, J.M., Y. Tanioka, L.J. Ruff, K. Sataki, H. Kanamori, and |
| L.R. Sykes, 1994, The 1957 great Aleutian earthquake, Pure and Appl. |
| Geophys., 142, 3-28. |
+-----------------------------------------------------------------------+
| Johnston, A., 1996, Seismic moment assessment of earthquakes in |
| stable continental regions -- III. New Madrid 1811-1812, Charleston |
| 1886, and Lisbon 1755, Geophys. J. Int. 126, 314-344. |
+-----------------------------------------------------------------------+
| Kanamori, H., 1977, The energy release in great earthquakes, J. |
| Geophys. Res. 82, 2981-2987. |
+-----------------------------------------------------------------------+
| Klein, F.W. and T.L. Wright, 2000, Catalog of Hawaiian earthquakes, |
| 1823-1959, USGS Prof. Paper 1623. |
+-----------------------------------------------------------------------+
| Langston, C.A., 1976, A body wave inversion of the Koyna, India |
| earthquake of December 10, 1967 and some implications for body wave |
| focal mechanisms, J. Geophys. Res., 81, 2517-2529. |
+-----------------------------------------------------------------------+
| McCann, W., 1985, On the Earthquake Hazard of Puerto Rico and the |
| Virgin Islands, Bull. Seism. Soc. Am., 75, 251-262. |
+-----------------------------------------------------------------------+
| Oppenheimer, D. H., G.C. Beroza, G.A. Carver, L. Dengler, J. P. |
| Eaton, L. Gee, F.I. Gonzalez, A.S. Jayko, W.H. Li, M. Lisowski, M. |
| Magee, G. A. Marshall, M. Murray, R. McPherson, B. Romanowicz, K. |
| Satake, R.W. Simpson, P.G. Somerville, R.S. Stein, and D. Valentine, |
| 1993, The Cape Mendocino, California, earthquakes of April 1992, |
| subduction at the triple junction, Science, 261, 433-438. |
+-----------------------------------------------------------------------+
| Park, J., T.R. Song, J. Tromp, E. Okal, S. Stein, G. Roult, E. |
| Clevede, G. Laske, H. Kanamori, P. Davis, J. Berger, C. Braitenberg, |
| M. Van Camp, X. Lei, H. Sun, H. Xu, and S. Rosat, 2005, Earth\'s Free |
| Oscillations Excited by the 26 December 2004 Sumatra-Andaman |
| Earthquake, Science, 308, 1139-1144. |
+-----------------------------------------------------------------------+
| PDE (Preliminary Determination of Epicenters) Monthly Listing, U.S. |
| Geol. Surv., Golden, CO. |
+-----------------------------------------------------------------------+
| Qamar, A. and M.C. Stickney, 1983, Montana Earthquakes 1869-1979: |
| Historical Seismicity and Earthquake Hazard, Montana Bureau of Mines |
| and Geology, Memoir 51, 80 pp. |
+-----------------------------------------------------------------------+
| QED (Quick Epicenter Determinations), U.S. Geol. Surv., Golden, CO. |
+-----------------------------------------------------------------------+
| Richins, W.D., J.C. Pechman, R.B. Smith, C.J. Langer, S.K. Goter, |
| J.E. Zollweg, and J.J. King, 1987, The 1983 Borah Peak, Idaho |
| earthquake and its aftershocks: Bull. Seismol. Soc. Am. 77, 697-723. |
+-----------------------------------------------------------------------+
| Richter, C.F., 1935, An instrumental earthquake magnitude scale: |
| Bull. Seismol. Soc. Am. 25, 1-32 |
+-----------------------------------------------------------------------+
| Rogers, G.C., 1983, Seismotectonics of British Columbia: University |
| of British Columbia Doctor of Philosophy Thesis, 247 pp. |
+-----------------------------------------------------------------------+
| Satake, K., K. Shimazaki, Y. Tsuji, and K. Ueda, 1996, Time and size |
| of a giant earthquake in Cascadia inferred from Japanese tsunami |
| records of January 1700, Nature 379, 246-249. |
+-----------------------------------------------------------------------+
| Sieh, K.E., 1978, Slip along the San Andreas fault associated with |
| the great 1857 earthquake, Bull. Seism. Soc. Am. 68, 1421-1448. |
+-----------------------------------------------------------------------+
| Sieh, K., Jones, L. M., Hauksson, E., Hudnut, K., Eberhart-Phillips, |
| D., Heaton, T., Hough, S., Hutton, K., Kanamori, H., Lilje, A., |
| Lindvall, S., McGill, S. F., Mori, J., Rubin, C., Spotila, J., Stock, |
| J., Thio, H. K., Treiman, J., Wernicke, B., & Zachariasen, J.,1993, |
| Near-field Investigations of the Landers Earthquake Sequence, |
| April-July, 1992, Science 260, 171-175. |
+-----------------------------------------------------------------------+
| Singh, S.K., Ordaz, M., Dattatrayam, R.S., and Gupta, H.K., 1999, A |
| spectral analysis of the 21 May 1997, Jabalpur India, earthquake |
| (**M**=5.8) and estimation of ground motion from future earthquakes |
| in the Indian shield region, Bull. Seism. Soc. Am. 89, 1620-1630. |
+-----------------------------------------------------------------------+
| Stein, R.S. and T.C. Hanks, 1998, M≥6 earthquakes in southern |
| California during the twentieth century: no evidence for a seismicity |
| or moment deficit, Bull. Seismol. Soc. Am. Bull. 88, p. 635-652. |
+-----------------------------------------------------------------------+
| Stein, S., Sleep, N.H., Geller, R.J., Wang, S.-C., and Kroeger, G.C., |
| 1979, Earthquakes along the passive margin of eastern Canada, |
| Geophys. Res. Lett. 6, 537-540. |
+-----------------------------------------------------------------------+
| Stover, D.W., ed, 1987, United States earthquakes, 1983: US |
| Geological Survey Bulletin 1698, 196 pp. |
+-----------------------------------------------------------------------+
| Stover, C.W., and J.L. Coffman, 1993, Seismicity of the United |
| States, 1568-1989 (Revised), US Geol. Surv. Prof. Pap. 1527, 418pp. |
+-----------------------------------------------------------------------+
| Tanioka, Y., and T, Seno, 2001, Detailed analysis of tsunami |
| waveforms generated by the 1946 Aleutian tsunami earthquake, Natural |
| Hazards abd Earth System Science, 1, 171-175. |
+-----------------------------------------------------------------------+
| Tsai, Y.B., and K. Aki, 1969, Simultaneous determination of the |
| seismic moment and attenuation of seismic surface waves, Bull. Seism. |
| Soc Amer. 59, 275-287. |
+-----------------------------------------------------------------------+
| Tsai, Y.B., and K. Aki, 1970, Source mechanism of the Truckee, |
| California, earthquake of September 12, 1966, Bull. Seism. Soc Amer. |
| 60, 1199-1208. |
+-----------------------------------------------------------------------+
| Wald, D. J., 1992, Strong motion and broadband teleseismic analysis |
| of the 1991 Sierra Madre, California, earthquake, J. Geophys. Res., |
| 97, 11,033-11,046. |
+-----------------------------------------------------------------------+
| Wald, D. W., D. V. Helmberger and T. H. Heaton, 1991, Rupture model |
| of the 1989 Loma Prieta earthquake from the inversion of |
| strong-motion and broadband teleseismic data, Bull. Seism. Soc. Am. |
| 81, 1540-1572. |
+-----------------------------------------------------------------------+
| Walter, W.R., 1993, Source parameters of the June 29, 1992 Little |
| Skull Mountain earthquake from complete regional waveforms at a |
| single station, Geophys. Res. Lett. 20, 403-406. |
+-----------------------------------------------------------------------+
| Wetmiller, R.J., Horner, R.B., Hasegawa, H.S., North, R.G., |
| Lamontagne, M., Weichert, D.H., and Evans, S.G., 1988, An analysis of |
| the 1985 Nahanni earthquakes, Bull. Seism. Soc. Am. 78, 590-616. |
+-----------------------------------------------------------------------+
|
en
|
converted_docs
|
999917
|
Before the
**Federal Communications Commission**
**Washington, D.C. 20554**
+----------------------------------+----+------------------------------+
| In the Matter of | * | CG Docket No. 05-231 |
| | *) | |
| Closed Captioning of Video | ** | |
| Programming | | |
| | * | |
| Telecommunications for the Deaf, | *) | |
| Inc. | ** | |
| | | |
| Petition for Rulemaking | * | |
| | *) | |
| | ** | |
| | | |
| | * | |
| | *) | |
| | ** | |
| | | |
| | * | |
| | *) | |
| | ** | |
| | | |
| | * | |
| | *) | |
| | ** | |
| | | |
| | * | |
| | *) | |
| | ** | |
| | | |
| | * | |
| | *) | |
| | ** | |
| | | |
| | * | |
| | *) | |
| | ** | |
| | | |
| | * | |
| | *) | |
| | ** | |
| | | |
| | * | |
| | *) | |
| | ** | |
+----------------------------------+----+------------------------------+
**NOTICE OF PROPOSED RULEMAKING**
**Adopted: July 14, 2005 Released: July 21, 2005**
**Comment Date: (45 days after publication in the Federal Register)**
**Reply Comment Date: (60 days after publication in the Federal
Register)**
By the Commission: Chairman Martin; Commissioners Abernathy, Copps, and
Adelstein issuing
> separate statements.
**TABLE OF CONTENTS**
**[Paragraph Number]{.underline}**
I. INTRODUCTION 1
II\. BACKGROUND 4
> A. History of Closed Captioning 4
>
> B. Closed Captioning Orders 6
>
> C. TDI Petition 8
III\. Discussion 9
> A. General Considerations 9
>
> 1\. Non-technical Quality Standards for Closed Captioning 10
>
> 2\. Technical Quality Standards 17
>
> 3\. Monitoring of Captioning 21
>
> 4\. Complaint Procedures 26
>
> 5\. Accessibility of Contact Information 32
>
> 6\. Standardized Captioning Complaint Form 35
>
> 7\. Fines and Penalties for Failure to Caption 36
>
> 8\. Compliance Reports 40
>
> 9\. Use of Electronic Newsroom Technique 44
>
> 10\. Availability of Captioners 49
>
> 11\. Electronic Filing of Exemption Requests 52
>
> B. Other Issues Raised in the TDI Petition 54
>
> 1\. Pass Through of Original Captioning 55
>
> 2\. Reformatting of Closed Captions 56
>
> 3\. Benchmark Compliance Audits 57
IV\. CONCLUSION. 58
V. procedural matters 59
VI\. ordering clause......................................... 67
AppenDICES:
Appendix A -- TDI's Sample TV Captioning Complaint Form
Appendix B -- Initial Regulatory Flexibility Analysis
# INTRODUCTION
1. In this Notice of Proposed Rulemaking (NPRM), we grant a petition
for rulemaking and initiate a proceeding to examine the Commission's
closed captioning rules.[^1] Specifically, we seek comment on: 1)
the current status of the Commission's closed captioning rules in
ensuring that video programming is accessible to deaf and hard of
hearing Americans and whether any revisions should be made to
enhance the effectiveness of those rules; and 2) several compliance
and quality issues relating to closed captioning that were raised in
a Petition for Rulemaking filed by Telecommunications for the Deaf,
Inc. (TDI), the National Association of the Deaf, Self Help for Hard
of Hearing People, Inc., the Association for Late Deafened Adults,
and the Deaf and Hard of Hearing Consumer Advocacy Network.[^2]
2. In 1996, Congress added section 713 to the Communications Act of
1934, as amended, (the Act) to generally require that video
programming be closed captioned to ensure access to people with
hearing disabilities, and required the Commission to adopt rules and
implementation schedules for the closed captioning of video
programming.[^3] The Commission has noted that closed captioning can
be an important learning tool for both children with hearing
disabilities and children without hearing disabilities learning to
read, and for millions of persons learning English as a second
language in improving their reading comprehension and spelling
skills.[^4]
3. The Commission has now had more than seven years experience with the
closed captioning rules since they became effective on January
1, 1998. At the time the Commission adopted the closed captioning
rules, it indicated that it would review the rules after closed
captioning was implemented to determine whether its expectations
regarding closed captioning were being met.[^5] We initiate this
review as a follow-up to the Commission's prior assurances and in
response to the *TDI Petition*. We share a common goal with TDI in
ensuring that closed captioning works as Congress intended, and in
making sure the rules adopted in 1997 are consistent with Congress'
goal that "all Americans ultimately have access to video services
and programs, particularly as video programming becomes an
increasingly important part of the home, school, and
workplace.\"[^6] We also note that, effective January 1, 2006, all
non-exempt new English language programming must be captioned.[^7]
We believe this rulemaking provides an excellent opportunity to
ensure that video programming distributors are prepared to fulfill
this requirement.
# BACKGROUND
## History of Closed Captioning
4. Closed captioning of television programs began in the 1970's.[^8]
Closed captioning is hidden as encoded data transmitted within the
vertical blanking interval (VBI) of the television signal which,
"when decoded, provides a visual depiction of information
simultaneously being presented on the aural channel (captions)."[^9]
To implement the Television Decoder Circuitry Act of 1990
(TDCA),[^10] the Commission adopted rules that require all
television receivers with screen sizes 13 inches or larger to be
capable of receiving and displaying closed captions.[^11] Although
there was a significant increase in captioning following the
enactment of the TDCA, Congress remained concerned that as the
number of channels of video programming continues to increase and
the variety of programming offerings expands "video programming
through all delivery systems should be accessible."[^12]
5. Prior to 1996, closed captioning of video programming was provided
through the voluntary efforts of the video programming industry and
private entities.[^13] Section 305 of the 1996 Act added a new
Section 713, Video Programming Accessibility, to the Act.[^14]
Section 713 required the Commission to prescribe rules and
implementation schedules for captioning of video programming.[^15]
In enacting Section 713, Congress generally required that video
programming be closed captioned, regardless of distribution
technology,[^16] to ensure access to persons with hearing
disabilities. Section 713 is intended to further Congress' goal "to
ensure that all Americans ultimately have access to video services
and programs, particularly as video programming becomes an
increasingly important part of the home, school, and
workplace."[^17]
## Closed Captioning Orders
6. In accordance with Section 713, the Commission adopted rules in 1997
for closed captioning of video programming.[^18] These rules require
that all video programming distributors, including over-the-air
broadcast television services and all multichannel video programming
distributors ("MVPDs") (including cable television, direct-to-home
satellite services, wireless cable systems, satellite master antenna
television, and open video systems)[^19] increase gradually the
amount of captioned programming offered and, generally require that
100% of new programming be closed captioned as of January 1, 2006,
subject to certain exceptions.[^20] New programming is defined as
programs first published or exhibited on or after January 1,
1998.[^21] Additionally, these rules established a transition period
for captioning of pre-rule programming, and require that 75% of all
pre-rule nonexempt programming delivered to consumers during the
first quarter of 2008 and thereafter must be captioned.[^22]
Pre-rule programming is defined as programs first published or
exhibited before January 1, 1998.[^23] The rules also require that,
pursuant to an established phase-in schedule, as of January 1, 2010,
100% of non-exempt new Spanish language programming be closed
captioned,[^24] and, as of January 1, 2012, and thereafter, 75% of
non-exempt Spanish language pre-rule programming be closed
captioned.[^25]
7. In July 2000, the Commission amended the closed captioning rules to
require an increasing amount of digital programming to be captioned
in a format that can be recovered and displayed by decoders meeting
the EIA-708 standard.[^26] The *DTV Closed Captioning Order* adopted
the same benchmark transition period for new and pre-rule digital
programming as exists for analog programming. The *DTV Closed
Captioning Order* also established July 1, 2002, as the date for
determining whether digital programming is new programming or
pre-rule programming.[^27] The rules for digital captioning became
effective July 1, 2002.[^28] Therefore, as of January 1, 2006, 100%
of new nonexempt analog *and* digital English language video
programming must be captioned. In the *DTV Closed Captioning Order*,
the Commission observed that viewers will be able to watch digital
programming on existing analog displays using a DTV converter, and
alerted programming distributors that in order for them "to count
captioned digital television programming toward their closed
captioning requirements in 47 C.F.R. Section 79.1, they must also
transmit captions that can be decoded by the decoder in that analog
set."[^29]
## TDI Petition
8. On July 23, 2004, Telecommunications for the Deaf, Inc. filed a
Petition for Rulemaking, requesting that the Commission initiate a
rulemaking to "establish additional enforcement mechanisms to better
implement the captioning rules, and to establish captioning quality
standards to ensure high quality and reliable closed
captioning."[^30] The *TDI* *Petition* specifically requests that
the Commission: 1) create a Commission-maintained database with
updated contact information for video programming distributors and
providers and a captioning complaint form; 2) establish compliance
reporting requirements and undertake audits to ensure effective
implementation of the captioning requirements; 3) revise the
complaint rules to require responses to consumer complaints
regarding captioning quality issues within 30 days; 4) establish
fines or penalties for non-compliance with the captioning rules; 5)
require continuous monitoring of captioning by the video programming
distributor or provider to ensure that technical problems are
remedied promptly and efficiently; 6) require video programming
distributors to reformat edited or compressed captioning; 7) require
that for a program to be considered "captioned" under the existing
rules, it must meet minimum standards set by the Commision for
completeness, accuracy, readability, and synchronicity with the
audio portion of the program; and 8) adopt non-technical standards
to ensure that video programming is "fully accessible" to deaf and
hard of hearing individuals.[^31] More than 90 comments were filed
in response to the *TDI Petition*. The majority of these commenters
supported the *TDI Petition*.[^32] The National Cable &
Telecommunications Association (NCTA) opposed the *TDI Petition*,
stating that it provides no cause for revisiting the captioning
rules, and noting that the rules "established a careful balance of
interests which has resulted in an enormous increase in the amount
of captioned programming over the last several years."[^33]
# Discussion
## General Considerations
9. The main objective of this NPRM is to seek comment on whether our
closed captioning rules as currently constituted are the most
effective and efficient way of ensuring that television viewing is
available to the millions of deaf and hard of hearing Americans. We
also seek comment on rules that the Commission may adopt to enhance
the effectiveness of closed captioning.
10. ***Non-technical Quality Standards for Closed Captioning***.
Currently there are no standards for non-technical quality aspects
of closed captioning. The Commission has considered non-technical
aspects of captioning to include matters such as accuracy of
transcription, spelling, grammar, punctuation, placement,
identification of nonverbal sounds, pop-on or roll-up style,[^34]
verbatim or edited for reading speed, and type font.[^35] In the
*1997 Closed Captioning NPRM*, the Commission recognized "that
captions must provide information substantially equivalent to that
of the audio portion of a video program in order to be useful and
ensure accessibility to individuals with hearing disabilities," and
"that it is well within the Commission's discretion to consider
whether to adopt rules, standards, or guidelines that address these
matters."[^36]
11. In adopting the closed captioning rules, the Commission declined to
set standards, but instead encouraged video programming providers to
establish standards through their arrangements and contracts with
captioning companies.[^37] The Commission expected quality standards
to become more common in captioning contracts.[^38] In the *Closed
Captioning Report and Order*, the Commission rejected the idea that
program producers would not strive for high quality captioning via
their contracts simply because they are not the actual consumers of
the captions, stating that "consumers can demonstrate their
satisfaction or lack of satisfaction with what is shown through
their purchase of advertised products, subscriptions to programming
services, or contacts with the video programming providers or video
programmers."[^39] The Commission stated it would consider
revisiting this issue if it becomes apparent that the Commission's
assumptions regarding the marketplace incentives for quality
captioning were incorrect.[^40]
12. TDI contends that market incentives have been insufficient to
address non-technical quality issues, resulting in little
improvement in captioning quality over the past five years. TDI
asserts there are "widespread problems" with non-technical
captioning quality based upon complaints they have received, and
urges the Commission to seek comment on establishing such
standards.[^41] NCTA, however, states that a rule regulating caption
quality would be counterproductive and burdensome.[^42] NCTA states
that although the accuracy of captions can suffer, especially when
the captioning must be done quickly and at the last minute, every
effort is made to avoid these errors.[^43] Further, NCTA contends
that cable networks have "significant" competitive and branding
incentives to provide quality captions, that program networks often
include accuracy requirements in their contracts with captioning
agencies, and that cable networks monitor the quality of the
captions, either in-house or through their contracts.[^44] Based on
the record before us, we seek comment on certain aspects of
non-technical quality issues.[^45]
13. *Non-technical Quality Issues.* Should the Commission establish
standards for the non-technical quality of closed captioning? Are
there non-technical quality issues other than those generally
considered (accuracy of transcription, spelling, grammar,
punctuation, placement, identification of nonverbal sounds, pop-on
or roll-up style, verbatim or edited for reading speed, and type
font) that the Commission should consider? What would constitute an
"error"? Are there reasons not to set standards for non-technical
quality aspects of closed captioning?
14. *Costs.* What would the costs be to programmers and distributors of
mandating non-technical quality standards? Does the captioning pool
consist of an adequate number of competent captioners to meet a
non-technical quality standard mandate?
15. *Pre-produced Programs.* We also seek comment on whether any
non-technical quality standards should be different for pre-produced
programs versus live programming. For example, when this issue was
raised in 1997, one commenter proposed that the Commission set a
maximum error rate of no more than two tenths of a percent (0.2%) of
the words in a prerecorded show, and require that no more than 3% of
the words in a live show may be wrong, misspelled, or absent.[^46]
We seek comment on whether these error rates are appropriate and, if
not, what error rates would be appropriate.
16. *Responsibility.* The *TDI Petition* notes that many distributors
disclaim responsibility for the quality of captioning: "Even more
disturbing is a recent trend among providers to include a disclaimer
in its broadcast stating that the provider is not responsible for
the correctness of captions."[^47] Additionally, TDI asserts that
the programming distributors should be held ultimately responsible
for monitoring captioning.[^48] TDI argues that if the text is full
of errors, it should not be counted as captioned for purposes of
meeting the captioning requirements.[^49] We seek comment on these
assertions.
17. ***Technical Quality Standards***. In the *Closed Captioning Report
and Order,* the Commission adopted a "pass through" rule to ensure
that programming with closed captions is delivered in a complete
manner with the belief that the enforcement of this rule, the
captioning requirements, and Sections 15.119 and 73.682 would ensure
the technical quality of captioning.[^50] The Commission stated: "We
find it unacceptable that existing captions might fail to be
transmitted in a complete and intact manner to consumers. The
reported problems -- such as captions not being delivered intact,
captions not synchronized with the video portion of the program,
captions ending before the end of the programming, programming
without captions even though the program indicated captioning or
captions transmitted during one offering of the program but not
another -- deny accessibility to persons with hearing disabilities
even when captioning seems to be available."[^51] The "pass through"
rule requires video programming providers to "pass through any
captioning they receive that is included with the video programming
they distribute as long as the captions do not need to be
reformatted."[^52]
18. In the *TDI* *Petition*, TDI asserts that the "pass through"
requirement[^53], along with Sections 15.119 and 76.606, have not
been sufficient to prevent and remedy technical problems that result
in captions not being delivered intact, thus not providing "full
accessibility" to video programming as required by Section 713 of
the Act.[^54] TDI asks the Commission to adopt additional mechanisms
and procedures to prevent technical problems from occurring and to
expeditiously remedy any technical problems that do arise. TDI notes
that the following types of technical problems occur
frequently:[^55]
- Captions turn off ten minutes before the end of national network
programming.
- Captions disappear one hour into a two-hour movie.
- Captions are absent, although TV programming schedules label the
show as captioned.
- Captions are illegible, including white boxes and overtypes.
- Captions appear on a national program in one locality but not
another.
- Captions are missing from repeats of previously aired captioned
programming or are scrambled and unreadable.
19. The *NCTA Opposition* states that the *Petition* contains no
evidence that the "pass through" rule is being ignored or that the
technical quality issues mentioned relate at all to this rule.[^56]
Further, NCTA asserts that "so far as we are aware, the availability
of captions in any particular program from its creation to the
transmission to cable operators and other multi-channel distributors
is routinely checked, either through active monitoring or spot
checks."[^57] NCTA states that the "pass through" rule does not need
modification, and that technical quality standards should not be
imposed by the Commission.[^58]
20. The Commission seeks comment on the need for additional mechanisms
and procedures in addition to the "pass through" rule to prevent
technical problems from occurring and to expeditiously remedy any
technical problems that do arise. Are such mechanisms and procedures
warranted? If so, what form should they take? We seek comment on the
kinds of technical problems experienced by consumers as well as
distributors.
21. ***Monitoring of Captioning***. In the *Closed Captioning Report and
Order*, the Commission stated that video programming distributors
are responsible for monitoring and maintaining their equipment and
signal transmissions to ensure that the captioning that is included
with the programming actually reaches consumers.[^59] However, the
Commission did not establish specific rules or steps that video
programming distributors would be required to follow. The Commission
placed the responsibility on the programming distributors to take
any corrective measures necessary to ensure the delivery of captions
and to make sure that the equipment used is working properly. The
Commission also allowed distributors to rely on certifications from
video programming suppliers stating that the programming actually
contains captions.[^60]
22. In its 1996 Report to Congress on Video Programming Accessibility,
the Commission stated:
> Problems also occur because of inadvertent errors in the transmission
> of captions by the broadcaster, distributor, cable network, local
> station or cable system operator. In many cases, the captions have
> been stripped, moved to the wrong line of the VBI \[vertical blanking
> interval\] or flipped onto the wrong field of line 21 by maladjusted
> signal processing equipment. The critical technical steps of a quality
> captioning service are accurate encoding, transmission reception and
> decoding of the signal. To avoid such errors, it is important that the
> captioned signal be monitored as it is fed, monitored during the
> duplication process and checked to ensure that the equipment used is
> not inadvertently stripping the captions, moving them onto the wrong
> line or placing them in the wrong field.[^61]
23. TDI asserts that consumers continue to face many technical problems
that could be eliminated if "video programming distributors and
providers had mechanisms in place to monitor captioning and
routinely check their engineering equipment and procedures."[^62]
However, TDI states that based on feedback from their consumers,
many providers and distributors do not know that problems exist
until they receive a consumer complaint.[^63] TDI raises further
concern that without continuous monitoring and equipment
maintenance, many video programming distributors may be counting
certain programming as captioned when in fact the captions were not
delivered with the programming.[^64] TDI also raises the concern
that programming guides may list rebroadcast or time compressed
material as captioned even though no captions appear, compounding
this problem, an issue that was also raised by commenters in
response to the *2004 Video Programming NOI*.[^65] TDI asks the
Commission to not allow incomplete or garbled captioning caused by
technical problems to be counted toward compliance.[^66]
24. NCTA argues that it is unnecessary and impractical for the
Commission to require constant monitoring of equipment.[^67] NCTA
states that cable operators routinely monitor their equipment to
ensure high quality transmissions of each signal's video, audio, and
line 21 closed captioning material.[^68] NCTA also asserts that
program networks monitor their network transmission to ensure the
quality of each program's technical specifications, including video,
audio, and closed captions.[^69] NCTA states that the Commission\'s
rules strike a careful balance of interests to ensure that the
responsibility for captioning is not unduly burdensome, and that the
video programming distributor\'s responsibility is to ensure that
the equipment used to transmit 500 plus channels to viewers is
capable of passing the captioning through, along with the
programming, and is in proper working order.[^70]
25. We seek comment on video programming distributors' responsibility to
monitor and maintain their equipment and signal transmissions.
Should distributors have specific mechanisms in place for monitoring
and maintenance? If so, what should these mechanisms consist of?
What impact would such mechanisms have on distributors? We also seek
comment on alternate ways to ensure that captioning is delivered
intact to consumers. Lastly, we seek comment on whether distributors
are monitoring their programming and advertising materials to ensure
that a program advertised to be closed captioned is indeed closed
captioned.[^71]
26. ***Complaint Procedures***. In the *1997 Closed Captioning NPRM* ,
the Commission required that complaints regarding closed captioning
first be directed to video programming distributors because it
believed this approach would "lead to quicker action to resolve a
complaint than if the complaint were filed directly with the
Commission."[^72] Pursuant to these rules, complaints must be filed
with the video programming distributor prior to the end of the
calendar quarter following the calendar quarter in which the alleged
violation has occurred, and video program distributors must respond
to the complaint no later than 45 days after the end of the quarter
in which the violation is alleged to have occurred or 45 days after
receipt of the written complaint, whichever is later.[^73] If a
consumer mistakenly sends a complaint to the wrong distributor
(*e.g.*, to a cable company instead of the local TV station that the
cable company carries), or if the programming about which the
consumer complains is exempt from the closed captioning rules
pursuant to Section 79.1(e)(9), the distributor is required to
either forward the complaint to the programmer within seven days, or
return the complaint within seven days to the consumer and to
provide the name and address of the correct distributor to whom the
complaint should be sent.[^74] If a video programming distributor
fails to respond to a complaint or a dispute remains after the
initial attempt at resolution by the video programming distributor
and the complainant, the complaint may be filed with the Commission
within 30 days after the time allotted for the video programming
provider to respond.[^75] The rule specifies the information that
the complainant and the distributor must provide to each other and
to the Commission, and states that if the Commission determines that
a violation has occurred, appropriate penalties may be imposed.[^76]
In adopting these procedures, the Commission stated its belief that
these procedures would provide consumers with an effective and
easily accessible complaint resolution mechanism, while freeing the
programming industry of any unnecessary burdens.[^77]
27. On reconsideration, the Commission denied petitioners' attempts to
eliminate the requirement that consumers contact the provider first
as well as petitioners' request to decrease the time in which video
programming distributors must respond to complaints.[^78]
Petitioners had argued on reconsideration that at least complaints
alleging failure to pass through captioning should be handled on a
more expedited basis than the time frame adopted by the Commission
in the *Closed Captioning Report and Order*.[^79] The Commission
reasoned that the adopted process was appropriate for complaints
regarding the measurement of compliance with the required amounts of
captioning (*i.e.*, benchmarks) since they are calculated on a
quarterly basis.[^80] In order to avoid confusion, the Commission
determined that all complaints of whatever nature (including
complaints alleging failure to pass through) would be handled in the
same fashion.[^81]
28. *TDI's Petition* states that under the current rules, four months
could pass before a video programming provider is legally required
to respond to a complaint, and in the interim, the consumer may
suffer from lack of access to the television video programming.[^82]
TDI notes that this problem is compounded when the consumer is
paying the high costs of cable, satellite or other distribution
services, but is not receiving captioned programming, "so that in
effect they have no access to the services for which they are paying
premium prices."[^83] TDI suggests the Commission revise the
complaint process to establish two categories of complaints:
complaints regarding the number of hours captioned; and complaints
regarding other captioning issues not related to the number of hours
captioned (*e.g*., technical problems resulting in missing or
garbled captions).[^84] TDI also encourages the Commission to
develop and make available on its website a standard captioning
complaint form that may be used by consumers to file written
complaints with the relevant video programming
distributor/producer.[^85]
29. NCTA opposes any change to the closed captioning complaint process.
It states that *TDI's Petition* provides no evidence that adopting a
new rule is either a necessary or appropriate response.[^86] NCTA
states that, with respect to cable television, in the normal course,
captioning questions can be quickly resolved, but when necessary, it
may require time to determine why a particular show is not
captioned. NCTA questions whether cable operators or programmers
have waited until the end of the calendar quarter to respond to
complaints. Lastly, NCTA notes that cable customer service rules
contain aggressive guidelines for resolving service interruptions
and responding to consumer inquiries.[^87]
30. As the Commission noted in the *Reconsideration Order*, part of the
rationale for giving video programming distributors additional time
to respond to consumer complaints was that distributors might have
to seek additional information from various video programming
providers before responding to consumer complaints.[^88] Given that,
effective January 1, 2006, all nonexempt new programming must be
captioned, it may be inconsistent to allow video programming
distributors more than 45 days in which to contact a programmer to
determine whether a given program is exempt before responding to a
captioning complaint. In addition, it may be appropriate that a
consumer who is faced with a sudden loss of captioning should have a
quicker means of recourse than writing a complaint and waiting for a
response that could take two months or longer.
31. As such, we seek comment on whether the Commission should revise the
current rule to allow for shorter complaint and response times. We
seek comment on what those time frames should be. We also seek
comment on whether complainants should be permitted to complain
directly to the Commission without complaining to the video
programming distributor first. If we decide to retain the current
complaint process, should the filing and response deadlines be
revised, and if so, how?
32. ***Accessibility of Contact Information.*** We seek comment on
whether the rules should be amended to allow consumers to complain
about closed captioning directly and immediately to video
programming distributors either via email, phone or fax; and,
whether distributors should be required to provide the name or phone
numbers for customer services on their websites, and in bills and
telephone directories. We also seek comment on whether placement of
customer service information in telephone directories and on
websites may be appropriate in the case of broadcast services, since
these are not subscription services with corresponding bills.
33. The *TDI Petition* requests that the Commission require video
programming distributors to post complete contact information on
their websites, update this information on a routine basis, and
provide the information to the FCC for posting on its website. NCTA
argues, however, that the Commission should not adopt a rule
requiring that video programming distributors that send bills to
consumers be required to include in those bills specific contact
information for submitting captioning complaints. NCTA notes that
cable operators already have customer service representatives (CSRs)
that can assist customers in resolving complaints, making a separate
point of contact for captioning complaints unnecessary.[^89] We seek
comment on this issue.
34. Given that the method by which deaf and hard of hearing people
communicate by telephone with hearing people differs from the method
used when two hearing people communicate, we seek comment on the
experiences that deaf and hard of hearing people have had when
contacting video programming distributors to complain or ask
questions, and seek comment from distributors regarding their
experiences in this area.[^90]
35. ***Standardized Captioning Complaint Form***. The *TDI Petition*
asked the Commission to develop and make available on its website a
captioning form that consumers can opt to use when filing written
complaints with a video programming distributor/producer similar to
the Commission's Form 475 used for general telephone complaints and
Form 501 for slamming complaints.[^91] TDI stresses that this
complaint form should be optional so that the consumer has other
options when filing complaints and submitted a sample complaint form
as Exhibit A in their Petition.[^92] The Commission seeks comment on
whether such a captioning complaint form would be useful.
36. ***Fines and Penalties for Failure to Caption.*** Neither the
Commission's closed captioning rules nor the Commission's Guidelines
for Assessing Forfeitures set specific forfeiture amounts for
violations of the closed captioning rules.[^93] The *TDI Petition*
argues that as new, more technically-advanced methods of
transmitting programming, such as digital television, become more
prevalent, the marketplace has failed to ensure compliance with the
captioning requirements.[^94] The *TDI Petition* contains the
results of a recent nationwide sampling of locally broadcast digital
television programming, conducted by WGBH's National Center for
Accessible Media (NCAM), which showed that 35% of local digital
television stations [failed to provide any closed
captioning]{.underline} and only 20% provided captions in compliance
with the Commission's caption decoder rules (47 CFR § 15.122).[^95]
37. TDI proposes the establishment of punitive measures, such as
specific fines, for noncompliance with the Commission's captioning
rules.[^96] TDI states that "\[s\]uch a forfeiture would create a
financial incentive for video programming distributors or providers
to comply with the Commission's benchmarks," and proposes an \$8,000
per violation base forfeiture amount for violations of the
captioning benchmark requirements, with each hour of programming
below the applicable benchmark being counted as a separate
violation.[^97] TDI suggests that, in January 2006, when 100%
captioning is required for new non-exempt programming, the \$8,000
per violation fine should apply for every hour of new programming
that is not captioned.[^98] TDI believes that increased enforcement
measures are required to provide incentives for the regulated
industry to comply with the rules and to ensure captioning quality,
reliability, and availability.[^99]
38. NCTA argues that these suggested punitive measures are unwarranted,
and that the authority already exists for the Commission to impose
penalties for violations of the rules. NCTA argues that occasional
glitches provide no basis for assuming each program that fails to
provide the required captions merits a fine.[^100] NCTA states that
fines may be appropriate in the case of willful or repeated failure
to comply with the rules, but that inadvertent mistakes or
occasional technical problems provide no basis for assuming each
program that fails to provide required captions merits a fine.[^101]
39. Section 79.1(g)(8) states: "If the Commission finds that a violation
has occurred, penalties may be imposed, including a requirement that
the video programming distributor deliver video programming
containing closed captioning in an amount exceeding that specified
in paragraph (b) of this section in a future time period."[^102] The
Commission's *Forfeiture Guidelines* do not contain any specific
guidelines regarding forfeitures for violations of the closed
captioning rules. We seek comment on whether the Commission should
establish specific per violation forfeiture amounts for
non-compliance with the captioning rules, and if so, what those
amounts should be. We direct commenters to Section 1.80(b) of the
Commission's rules for guidance on existing forfeitures for
violations of other Commission rules.
40. ***Compliance Reports***. In the *Closed Captioning Report and
Order*, the Commission placed the responsibility for compliance with
the closed captioning requirements on video programming
distributors, both for efficient monitoring and enforcement of the
rules, as well as to allow for a convenient, single entity to
address complaints.[^103] The Commission did not adopt reporting
requirements for distributors or require the filing of periodic
reports showing compliance with the closed captioning rules, stating
that such requirements would be unduly burdensome and
administratively cumbersome.[^104] In order to address potential
complaints, the Commission stated that video programming
distributors are required to "maintain records sufficient to
demonstrate compliance."[^105] On reconsideration, the Commission
did not disturb its decision regarding compliance reporting.[^106]
41. TDI asserts that the lack of reporting requirements "has seriously
hampered the effectiveness of the captioning rules and the ability
of captioning consumers, their advocates, and the Commission itself
to monitor compliance with the captioning rules."[^107] TDI states
that with very few exceptions, "the Commission and captioning
consumers have no means of determining whether video programming
distributors have complied with the captioning benchmarks for each
channel, for each calendar quarter, since the rules went into
effect\[.\]"[^108] Further, TDI states that, "\[p\]etitioners fear
that the lack of a benchmark reporting requirement has created a
situation where many providers are unaware that they are out of
compliance with the benchmarks\[.\]"[^109] TDI asserts that even
after the January 1, 2006, deadline, "the creation of a benchmark
reporting requirement would assist in the determination of whether
providers are in compliance with the Commission's benchmarks for
pre-rule non-exempt programming and for Spanish-language
programming."[^110] TDI proposes that the Commission require MVPDs
and broadcasters to certify compliance with the captioning rules to
the Commission, on a quarterly basis, within 30 days following the
end of the previous quarter.[^111]
42. NCTA argues that the Commission should not impose burdensome
recordkeeping requirements and notes that the Commission previously
rejected a proposal to enforce its captioning rules through a
reporting obligation.[^112] NCTA also notes that the Commission
allows cable operators to rely on certifications of compliance from
various networks they carry, and that many cable operators request
these certifications in writing.[^113] NCTA states that, with
several hundred channels on a given cable system, this is the only
practical way for a cable operator to confirm it is in compliance
with the rules.[^114] NCTA argues that maintaining and posting
captioning reports on a quarterly basis would impose a significant
paperwork and recordkeeping burden on the part of cable
operators.[^115]
43. The Commission seeks comment on requiring video programming
distributors to file compliance reports as to the amount of closed
captioning they provide. Should the Commission require such reports
to be filed? If so, how often should they be filed? How should they
be filed? Should the reports include information relating to new
non-exempt programming or only information pertaining to pre-rule
non-exempt and Spanish-language programming? How would a reporting
requirement be implemented? In the event we were to impose a
reporting requirement for closed captioning, we seek comment on
whether distributors would be able to rely on certifications from
programmers that the programming contains closed captioning. Are
there alternative methods to verify compliance? If we do or do not
impose a reporting requirement, we seek comment on whether the
Commission's rules should be amended to place a greater burden on
video programming distributors to ensure that the programming they
carry is captioned, regardless of the assurances they receive from
programmers. We seek comment on any other issues regarding
compliance reporting requirements.
44. ***Use of Electronic Newsroom Technique***. In the *Closed
Captioning Report and Order*, the Commission declined to adopt any
limits on the methodology that can be used to create closed
captioning and permitted the use of electronic newsroom technique
(ENT), in which the captions come from the text in the station's
news script computers.[^116] Only text transmitted from the
scripting computers to the teleprompters is captioned.[^117]
Unscripted material, such as breaking news, live reports from the
field, and some weather and sports reports, that do not appear on
the teleprompter are not typically captioned by this method.[^118]
45. In the *Closed Captioning Report and Order*, the Commission allowed
the use of ENT so as not to place any limits on the methodology used
to create closed captioning and because of the record's conflicting
accounts as to the number of real-time captioners available for live
newscasts where ENT could be used as an alternative.[^119] At the
same time, the Commission raised concerns that since certain
portions of live newscasts remain uncaptioned when using ENT, this
method is not the "functional equivalent" of the audio portion of
the programming.[^120] On reconsideration, the Commission noted the
limitations of ENT, especially with regard to field reports and late
breaking weather and sports reports, and narrowed the circumstances
in which captions created with ENT could be counted toward the
closed captioning requirement.[^121] As a result of that decision,
as of January 1, 2000, most video programming providers in the
largest 25 television markets were no longer allowed to count ENT
captioning toward compliance with the Commission's closed captioning
requirements.[^122] On reconsideration, the Commission prohibited
the major national broadcast networks (*i.e.*, ABC, CBS, Fox and
NBC), affiliates of these networks in the top 25 television markets
as defined by Nielsen's Designated Market Areas (DMAs), and national
nonbroadcast networks serving at least 50% of all homes subscribing
to multi-channel video programming services from counting electronic
newsroom-captioned programming towards compliance with the closed
captioning rules.[^123] The Commission also stated that, whenever a
broadcast television station, a broadcast television network or a
nonbroadcast network satisfies one of these criteria, it becomes
subject to the limitations placed on the use of ENT for compliance
with the rules.[^124]
46. At the same time the Commission limited the circumstances in which
ENT captions could be used as a substitute for real time captioning,
the Commission suggested it would eventually phase out its
recognition of ENT captioning.[^125] The Commission noted that it
expected the ability to use ENT would "by far be the exception
rather than the general rule, and that only those entities that are
so small or who present unusual circumstances will be permitted to
continue to use EN\[T\] because live closed captioning would be an
economic burden."[^126]
47. The current rule provides that "\[l\]ive programming, or repeats of
programming originally transmitted live that are captioned using
\[\] 'electronic newsroom technique' will be considered captioned,
except that effective January 1, 2000, and thereafter, the major
national broadcast networks (i.e., ABC, CBS, Fox and NBC),
affiliates of these networks in the top 25 television markets as
defined by Nielsen's Designated Market Areas (DMAs) and national
nonbroadcast networks serving at least 50% of all homes subscribing
to multi-channel video programming services shall not count
electronic newsroom captioned programming towards compliance with
these rules."[^127]
48. TDI asks the Commission to extend the prohibition of counting ENT to
markets beyond the top 25 DMAs.[^128] TDI states that the use of ENT
should be disfavored because it "does not provide a quality
captioned end product to consumers."[^129] NCTA opposes TDI's
suggestion, noting that the costs of live captioning "still remain
significant, particularly for local cable news operations that often
operate 24 hours a day, and that between the high costs and the
significant shortage of captioners, additional live captioning
obligations should not be imposed at this time."[^130] NCTA notes
that, although ENT captioning can only provide captions for
pre-recorded material, it does allow many more live newscasts to be
captioned than might otherwise be affordable.[^131] We seek comment
on TDI's proposal regarding ENT. We also seek comment on whether the
rationale that led to the Commission permitting the use of ENT by
some distributors, due to ENT's lower cost, is still relevant.[^132]
It appears that the cost of captioning has decreased substantially
since the *1996 Report to Congress*.[^133] Have captioning costs
decreased such that little hardship would result if the Commission
were to further limit the circumstances under which captions created
using electronic newsroom technique would be allowed to count as
captioned programming?
49. ***Availability of Captioners.*** In arriving at the transition
schedule for implementing closed captioning, the Commission
acknowledged the limited number of available captioners and
captioning services in existence, as well as the anticipated
increase in demand for captioning services as a result of Section
713.[^134] In arriving at an eight-year phase in period for
captioning 100% of new programming, the Commission weighed the needs
of deaf and hard of hearing individuals with the ability of the
programming industry to meet the demand for increased
captioning.[^135]
50. In this NPRM, we seek comment on the supply of captioners available
for real-time and pre-recorded captioning. We also seek comment on
the number of companies providing closed captioning services. We
seek comment on the impact that imposing a quality standard, if
adopted, will have on the supply of captioners.
51. We note that legislation is pending before Congress that, if passed,
would authorize the Department of Commerce's National
Telecommunications and Information Administration (NTIA) to provide
competitive grants for training court reporters and closed
captioners.[^136] The proposed legislation states: "Over the past
decade, student enrollment in programs that train realtime writers
and closed captioners has decreased by 50 percent, even though job
placement upon graduation is 100 percent."[^137] We seek comment on
what other steps could be taken to encourage individuals to train
and become captioners.
52. ***Electronic Filing of Exemption Requests***. In the *Closed
Captioning Report and Order,* the Commission stated that entities
requesting an exemption based on an undue burden from the closed
captioning rules would be required to petition the Commission for
that exemption.[^138] The Commission recognized that the Internet
and e-mail provides persons with hearing disabilities increased
accessibility to Commission activities and noted that the possible
use of electronic filing was being explored in a separate
proceeding.[^139] This electronic filing proceeding did not
ultimately make a decision as to electronic filings for situations
beyond rulemaking-related proceedings, such as petitions.[^140] The
Commission encouraged parties filing petitions for exemptions under
the undue burden standard to include a disk containing an electronic
version of their filing so the petition could be posted on the
Commission's website, making it more accessible.[^141]
53. Currently, Section 79.1 of the Commission's rules requires that a
petition for a full or partial exemption from the closed captioning
requirements based on an undue burden must be filed with the
Commission in writing, placed on public notice, and permit
interested persons to file comments or oppositions to the
petition.[^142] Due to the nature of this process, the petition
itself is generally not available electronically, unless a disk
containing an electronic version of the petition is submitted.
Rather, interested parties must come to the Commission's Reference
Information Center or contact the Commission's copy contractor to
retrieve a hardcopy version of the petition, in order to file
comments or oppositions.[^143] In comments filed in the *11^th^
Annual Video Competition Report* proceeding, the National
Association for the Deaf (NAD) recommended that the Commission
reduce the administrative delay in processing petitions for
exemption.[^144] We seek comment on requiring electronic filing for
petitions for exemption from the Commission's closed captioning
rules under the undue burden standard of Section 79.1(f). What
impact would such a requirement have on entities filing such
petitions, as well as on parties, including consumers, wishing to
file comments or oppositions to the petition? We seek comment on
whether electronic filing should be mandated or merely allowed. We
seek comment on whether an electronic filing requirement would
reduce the perceived delay in processing such petitions, as noted by
NAD.
## Other Issues Raised in the TDI Petition
54. The *TDI Petition* seeks review of several other aspects of the
closed captioning rules. These remaining *issues* are already
addressed in the Commission's rules, and we take this opportunity to
remind video programming distributors and programmers of their
obligations.
55. ***Pass Through of Original Captioning.*** First, TDI notes the
failure of many distributors to pass through captioning that they
receive and to ensure that captioning is not garbled and is
complete, even during the transitions between programs and into/out
of commercials (which are not currently required to be
captioned).[^145] Section 79.1(c) requires distributors to deliver
all programming they receive that contains closed captioning to
consumers with the captions intact (*i.e*., pass through the
original captions). This requires distributors to ensure that their
equipment is working properly in order to meet this rule.[^146]
56. ***Reformatting of Closed Captions.*** TDI also notes that many
programs are not reformatted, and asks the Commission to require
distributors to reformat previously captioned programming that has
been edited or compressed in order for the distributors to have
proper procedures in place for reformatting in anticipation of the
January 1, 2006, 100% benchmark date. In order for distributors to
comply with the January 1, 2006, 100% benchmark, they will be
required to pass through any original captions intact, and
re-caption the programming, or reformat edited or compressed
programming that contains captioning.[^147]
57. ***Benchmark Compliance Audits.*** Lastly, TDI requests a rulemaking
to authorize the use of benchmark compliance audits. NCTA notes that
the Commission already stated that it would conduct random audits of
captioning similar to the audits used to monitor compliance with
other rules.[^148] Given that the Commission already has the
authority to conduct audits regarding video programming
distributors' compliance with the closed captioning rules, we do not
think it is necessary to seek comment on this issue.[^149]
# CONCLUSION
58. We initiate this proceeding to assess how the Commission's closed
captioning rules are succeeding in ensuring that video programming
is accessible to the millions of deaf and hard of hearing Americans
and whether any revisions should be made to enhance the
effectiveness of those rules. After review of the record we will
determine what rules or other next steps are appropriate. Finally,
we welcome comment on any other issues relevant to the topics
addressed in this NPRM.
# procedural matters
59. Pursuant to sections 1.415 and 1.419 of the Commission's rules, 47
CFR §§ 1.415, 1.419, interested parties may file comments and reply
comments on or before the dates indicated on the first page of this
document. Comments may be filed using: (1) the Commission's
Electronic Comment Filing System (ECFS), (2) the Federal
Government's eRulemaking Portal, or (3) by filing paper
copies.[^150] For additional information on this proceeding, please
contact Amelia Brown in the Consumer & Governmental Affairs Bureau,
Disability Rights Office at (202) 418-2799.
60. [Electronic Filers]{.underline}: Comments may be filed
electronically using the Internet by accessing the ECFS:
<http://www.fcc.gov/cgb/ecfs/> or the Federal eRulemaking Portal:
[http://www.regulations.gov](http://www.regulations.gov/). Filers
should follow the instructions provided on the website for
submitting comments.
■ [For ECFS Filers]{.underline}, if multiple docket or rulemaking
numbers appear in the caption of this poceeding, filers must
transmit one electronic copy of the comments for each docket or
rulemaking number referenced in the caption. In completing the
transmittal screen, filers should include their full name, U.S.
Postal Service mailing address, and the applicable docket or
rulemaking number. Parties may also submit an electronic comment by
Internet e-mail. To get filing instructions, filers should send an
e-mail to <[email protected]>, and include the following words in the
body of the message, "get form." A sample form and directions will
be sent in response.
61\. [Paper Filers]{.underline}: Parties who choose to file by paper
must file an original and four copies of each filing. If more than
one docket or rulemaking number appears in the caption of this
proceeding, filers must submit two additional copies for each
additional docket or rulemaking number. Filings can be sent by hand
or messenger delivery, by commercial overnight courier, or by
first-class or overnight U.S. Postal Service mail (although we
continue to experience delays in receiving U.S. Postal Service
mail). All filings must be addressed to the Commission's Secretary,
Office of the Secretary, Federal Communications Commission.
62\. The Commission's contractor will receive hand-delivered or
messenger-delivered paper filings for the Commission's Secretary at 236
Massachusetts Avenue, NE., Suite 110, Washington, DC 20002. The filing
hours at this location are 8:00 a.m. to 7:00 p.m. All hand deliveries
must be held together with rubber bands or fasteners. Any envelopes must
be disposed of *before* entering the building.
> ■ Commercial overnight mail (other than U.S. Postal Service Express
> Mail and Priority Mail) must be sent to 9300 East Hampton Drive,
> Capitol Heights, MD 20743.
■ U.S. Postal Service first-class, Express, and Priority mail should be
addressed to 445 12^th^ Street, SW, Washington DC 20554.
Comments and reply comments must include a short and concise summary of
the substantive discussion and questions raised in the NPRM. We further
direct all interested parties to include the name of the filing party
and the date of the filing on each page of their comments and reply
comments. We strongly encourage that parties track the organization set
forth in this NPRM in order to facilitate our internal review process.
Comments and reply comments must otherwise comply with section 1.48 and
all other applicable sections of the Commission's rules.[^151]
63\. [People with Disabilities]{.underline}: To request materials in
accessible formats for people with disabilities (braille, large print,
electronic files, audio format), send an e-mail to <[email protected]> or
call the Consumer & Governmental Affairs Bureau at 202-418-0530 (voice),
202-418-0432 (TTY).
64\. [Ex Parte Rules.]{.underline} These matters shall be treated as a
"permit-but-disclose" proceeding in accordance with the Commission's *ex
parte* rules.[^152] Persons making oral *ex parte* presentations are
reminded that memoranda summarizing the presentations must contain
summaries of the substance of the presentations and not merely a listing
of the subjects discussed. More than a one or two sentence description
of the views and arguments presented is generally required.[^153] Other
requirements pertaining to oral and written presentations are set forth
in section 1.1206(b) of the Commission's rules.
65\. [Initial Regulatory Flexibility Analysis.]{.underline} With respect
to this NPRM, an Initial Regulatory Flexibility Analysis (IRFA), *see
generally*, 5 U.S.C. § 603, is contained in Appendix B. Comments must be
identified as responses to the IRFA and must be filed by the deadlines
for comments on the NPRM specified *supra*. The Commission will send a
copy of the NPRM, including the IRFA, to the Chief Counsel for Advocacy
of the Small Business Administration.[^154]
66\. [Initial Paperwork Reduction Act of 1995 Analysis.]{.underline}
This document contains proposed or modified information collection
requirements. The Commission, as part of its continuing effort to reduce
paperwork burdens, invites the general public and the Office of
Management and Budget (OMB) to comment on the information collection
requirements contained in this document, as required by the Paperwork
Reduction Act of 1995, Public Law 104-13. Public and agency comments are
due 60 days after date of publication of this Notice in the Federal
Register. Comments should address: (a) whether the proposed collection
of information is necessary for the proper performance of the functions
of the Commission, including whether the information shall have
practical utility; (b) the accuracy of the Commission\'s burden
estimates; (c) ways to enhance the quality, utility, and clarity of the
information collected; and (d) ways to minimize the burden of the
collection of information on the respondents, including the use of
automated collection techniques or other forms of information
technology. In addition, pursuant to the Small Business Paperwork Relief
Act of 2002, Public Law 107-198, *see* 44 U.S.C. 3506(c)(4), we seek
specific comment on how we might "further reduce the information
collection burden for small business concerns with fewer than 25
employees."
# ordering clauseS
67\. IT IS ORDERED, that pursuant to sections 4(i), 303(r) and 713 of
the Communications Act of 1934, as amended, 47 U.S.C. §§ 154(i), 303(r)
and 713, this Notice of Proposed Rulemaking is hereby ADOPTED.
68\. IT IS FURTHER ORDERED that the Commission\'s Consumer &
Governmental Affairs Bureau, Reference Information Center, SHALL SEND a
copy of this Notice of Proposed Rulemaking, including the Initial
Regulatory Flexibility Analysis, to the Chief Counsel for Advocacy of
the Small Business Administration.
> FEDERAL COMMUNICATIONS COMMISSION
Marlene H. Dortch
Secretary
**APPENDIX A**
TV Captioning Complaint Form
(As submitted by TDI)
Name: \_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_
Mailing Address:
\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_
\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_
Email Address:
\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_
Phone Number:
\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_ check
one -- ()TTY () Voice
Fax Number:
\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_
Preferred Method of Contact:
\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_
When did you have this captioning problem? Month \_\_\_\_\_\_ Day
\_\_\_\_\_ Year \_\_\_\_\_
Which TV Program did you notice had the problem?
\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_
Program was on: TV Station \_\_\_\_\_\_\_\_\_\_\_ Cable Company and
channel: \_\_\_\_\_\_\_
Satellite provider \_\_\_\_\_
Program lasted from \_\_\_\_p.m/a.m. to \_\_\_\_ p.m./a.m.
Captioning problem occurred around on \_\_\_\_\_ p.m./a.m. and ended
around on \_\_\_\_\_ p.m./a.m.
\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_
What was the problem with captioning?
**\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_**
Did you attempt to contact someone to discuss the problem? Yes\_\_\_
No\_\_\_\_
Were you successful? Yes \_\_\_\_ No \_\_\_\_
If No, why not?
\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_
If Yes, Date of Contact:
\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_
Person contacted:
\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_
Were you given a Reference Number or a Tracking Number? Yes \_\_\_\_ No
\_\_\_\_
Reference or Tracking Number (if applicable):
\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_
Name of TV Station/Cable Provider/Network:
\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_
What was the response?
**\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_**
Other comments (if needed)
**\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_**
**APPENDIX B**
**INITIAL REGULATORY FLEXIBILITY ANALYSIS**
1\. As required by the Regulatory Flexibility Act of 1980, as
amended,[^155] the Commission has prepared this Initial Regulatory
Flexibility Analysis of the possible significant economic impact on a
substantial number of small entities by the policies and rules proposed
in the Notice of Proposed Rulemaking. Written public comments are
requested on this IRFA. Comments must be identified as responses to the
IRFA and must be filed by the deadlines for comments on the Notice of
Proposed Rulemaking provided in the item. The Commission will send a
copy of this entire Notice of Proposed Rulemaking (\"NPRM\"), including
this IRFA, to the Chief Counsel for Advocacy of the Small Business
Administration (\"SBA\").[^156] In addition, the Notice of Proposed
Rulemaking and the IRFA (or summaries thereof) will be published in the
Federal Register.[^157]
**A. Need For, and Objectives of, the Proposed Rules.**
2\. We initiate this review relating to closed captioning in response to
several compliance and quality issues raised in a Petition for
Rulemaking filed by Telecommunications for the Deaf, Inc., the National
Association of the Deaf, Self Help for Hard of Hearing People, Inc., the
Association for Late Deafened Adults, and the Deaf and Hard of Hearing
Consumer Advocacy Network. This rulemaking proceeding will examine the
current status of the Commission's closed captioning rules with the goal
of ensuring that video programming is accessible to deaf and hard of
hearing Americans. This Notice also serves as a follow-up to the
Commission's prior assurances at the time the closed captioning rules
were adopted that certain captioning provisions would be reviewed and
evaluated at a future date. As described more fully below, this Notice
seeks to determine whether any revisions should be made to enhance the
effectiveness of those rules. In addition, given that, effective January
1, 2006, all nonexempt new programming must be captioned, we believe
this is an excellent opportunity to renew the discussion related to
closed captioning and remind programmers and distributors of their
obligations in order to ensure that video programmers and distributors
are prepared to fulfill this requirement. In particular, the Notice
seeks comment on establishing standards for the non-technical quality of
closed captioning, the potential costs for programmers and distributors,
the availability of competent captioners to meet a non-technical quality
standard mandate, and establishing different non-technical quality
standards for pre-produced versus live programming. In addition, the
Notice seeks comment on whether additional mechanisms and procedures,
beyond those already in the Commission's rules, are necessary to prevent
technical problems from occurring and to expeditiously remedy any
technical problems that do arise. The Notice also seeks comment on video
programming distributors' responsibility to monitor and maintain their
equipment and signal transmissions, and whether specific mechanisms
should be established for monitoring and maintenance. Additionally, the
Notice seeks comment on whether to revise the current rule to allow for
shorter complaint and response times, what those time frames should be,
and whether complainants should be permitted to complain directly to the
Commission without complaining to the video programming distributor
first. Further, the Notice seeks comment on requiring video programming
distributors to file compliance reports as to the amount of closed
captioning they provide, and any alternative methods available to verify
compliance.
B. **Legal Basis.**
3\. The authority for this proposed rulemaking is contained in Sections
4(i), 303(r) and 713 of the Communications Act of 1934, as amended, 47
U.S.C. §§ 154(i), 303(r) and 713.
**C. Description and Estimate of the Number of Small Entities Impacted**
4\. The RFA directs agencies to provide a description of, and where
feasible, an estimate of the number of small entities that may be
affected by the proposed rules and policies, if adopted.[^158] The RFA
generally defines the term \"small entity\" as having the same meaning
as the terms \"small business,\" \"small organization,\" and \"small
governmental jurisdiction.\"[^159] In addition, the term \"small
business\" has the same meaning as the term \"small business concern\"
under the Small Business Act.[^160] A \"small business concern\" is one
which: (1) is independently owned and operated; (2) is not dominant in
its field of operation; and (3) satisfies any additional criteria
established by the SBA.[^161]
5\. Cable and Other Program Distribution. This category includes among
others, cable systems operators, closed circuit television services,
direct broadcast satellite services, home satellite dish services,
multipoint distribution systems, multichannel multipoint distribution
service, satellite master antenna television systems, and subscription
television services. The SBA has developed a small business size
standard for this census category, which includes all such companies
generating \$12.5 million or less in revenue annually.[^162] According
to Census Bureau data for 1997, there were a total of 1,311 firms in
this category, that had operated for the entire year.[^163] Of this
total, 1,180 firms had annual receipts of under \$10 million and an
additional 52 firms had receipts of \$10 million or more but less than
\$25 million. Consequently, the Commission estimates that the majority
of providers in this service category are small businesses that may be
affected by the rules and policies involved herein.
6\. Cable and Other Subscription Programming. Entities in this category
"primarily engag\[e\] in operating studios and facilities for the
broadcasting of programs on a subscription or fee basis. The broadcast
programming is typically narrowcast in nature (e.g., limited format,
such as news, sports, education, or youth-oriented). These
establishments produce programming in their own facilities or acquire
programming from external sources."[^164] The SBA has developed a small
business size standard for this category; that size standard is \$12.5
million or less in average annual receipts.[^165] According to Census
Bureau data for 1997, there were 234 firms in this category that
operated for the entire year.[^166] Of these, 188 had annual receipts of
under \$10 million, and an additional 16 firms had receipts of between
\$10 million and \$24,999,999. Consequently, we estimate that the
majority of these firms are small entities that may be affected by our
action. In addition, limited preliminary census data for 2002 indicate
that the total number of Cable and Other Subscription Programming
entities increased approximately 44.5 percent from 1997 to 2002.[^167]
7\. Cable System Operators (Rate Regulation Standard). The Commission
has developed its own small business size standard for cable system
operators, for purposes of rate regulation. Under the Commission\'s
rules, a \"small cable company\" is one serving fewer than 400,000
subscribers nationwide.[^168] The most recent estimates indicate that
there were 1,439 cable operators who qualified as small cable system
operators at the end of 1995.[^169] Since then, some of those companies
may have grown to serve over 400,000 subscribers, and others may have
been involved in transactions that caused them to be combined with other
cable operators. Consequently, the Commission estimates that there are
now fewer than 1,439 small entity cable system operators that may be
affected by the rules and policies involved herein.
8\. Cable System Operators (Telecom Act Standard). The Communications
Act of 1934, as amended, also contains a size standard for small cable
system operators, which is \"a cable operator that, directly or through
an affiliate, serves in the aggregate fewer than 1 percent of all
subscribers in the United States and is not affiliated with any entity
or entities whose gross annual revenues in the aggregate exceed
\$250,000,000.\" [^170] The Commission has determined that there are
67,700,000 subscribers in the United States.[^171] Therefore, an
operator serving fewer than 677,000 subscribers shall be deemed a small
operator, if its annual revenues, when combined with the total annual
revenues of all its affiliates, do not exceed \$250 million in the
aggregate.[^172] Based on available data, the Commission estimates that
the number of cable operators serving 677,000 subscribers or fewer,
totals 1,450.[^173] The Commission neither requests nor collects
information on whether cable system operators are affiliated with
entities whose gross annual revenues exceed \$250 million,[^174] and
therefore are unable, at this time, to estimate more accurately the
number of cable system operators that would qualify as small cable
operators under the size standard contained in the Communications Act of
1934.
9\. Cable Television Relay Service. This service includes transmitters
generally used to relay cable programming within cable television system
distribution systems. The SBA has defined a small business size standard
for Cable and other Program Distribution, consisting of all such
companies having annual receipts of no more than \$12.5 million.[^175]
According to Census Bureau data for 1997, there were 1,311 firms in the
industry category Cable and Other Program Distribution, total, that
operated for the entire year.[^176] Of this total, 1,180 firms had
annual receipts of \$10 million or less, and an additional 52 firms had
receipts of \$10 million or more but less than \$25 million.[^177] Thus,
under this standard, we estimate that the majority of providers in this
service category are small businesses that may be affected by the rules
and policies involved herein.
10\. Direct Broadcast Satellite (\"DBS\") Service. DBS service is a
nationally distributed subscription service that delivers video and
audio programming via satellite to a small parabolic \"dish\" antenna at
the subscriber\'s location. Because DBS provides subscription services,
DBS falls within the SBA-recognized definition of Cable and Other
Program Distribution.[^178] This definition provides that a small entity
is one with \$12.5 million or less in annual receipts.[^179] Currently,
only four operators hold licenses to provide DBS service, which requires
a great investment of capital for operation. All four currently offer
subscription services. Two of these four DBS operators, DirecTV[^180]
and EchoStar Communications Corporation (\"EchoStar\"),[^181] report
annual revenues that are in excess of the threshold for a small
business. A third operator, Rainbow DBS, is a subsidiary of
Cablevision\'s Rainbow Network, which also reports annual revenues in
excess of \$12.5 million, and thus does not qualify as a small
business.[^182] The fourth DBS operator, Dominion Video Satellite, Inc.
(\"Dominion\"), offers religious (Christian) programming and does not
report its annual receipts.[^183] The Commission does not know of any
source which provides this information and, thus, we have no way of
confirming whether Dominion qualifies as a small business. Because DBS
service requires significant capital, we believe it is unlikely that a
small entity as defined by the SBA would have the financial wherewithal
to become a DBS licensee. Nevertheless, given the absence of specific
data on this point, we acknowledge the possibility that there are
entrants in this field that may not yet have generated \$12.5 million in
annual receipts, and therefore may be categorized as a small business,
if independently owned and operated.
11\. Local Multipoint Distribution Service. Local Multipoint
Distribution Service (LMDS) is a fixed broadband point-to-multipoint
microwave service that provides for two-way video
telecommunications.[^184] The auction of the 986 Local Multipoint
Distribution Service (LMDS) licenses began on February 18, 1998 and
closed on March 25, 1998. The Commission established a small business
size standard for LMDS licenses as an entity that has average gross
revenues of less than \$40 million in the three previous calendar
years.[^185] An additional small business size standard for \"very small
business\" was added as an entity that, together with its affiliates,
has average gross revenues of not more than \$15 million for the
preceding three calendar years.[^186] The SBA has approved these small
business size standards in the context of LMDS auctions.[^187] There
were 93 winning bidders that qualified as small entities in the LMDS
auctions. A total of 93 small and very small business bidders won
approximately 277 A Block licenses and 387 B Block licenses. On March
27, 1999, the Commission re-auctioned 161 licenses; there were 32 small
and very small businesses winning that won 119 licenses.
12\. Multipoint Distribution Service, Multichannel Multipoint
Distribution Service, and Instructional Television Fixed Service.
Multichannel Multipoint Distribution Service (MMDS) systems, often
referred to as \"wireless cable,\" transmit video programming to
subscribers using the microwave frequencies of the Multipoint
Distribution Service (MDS) and Instructional Television Fixed Service
(ITFS).[^188] In connection with the 1996 MDS auction, the Commission
defined \"small business\" as an entity that, together with its
affiliates, has average gross annual revenues that are not more than
\$40 million for the preceding three calendar years.[^189] The SBA has
approved of this standard.[^190] The MDS auction resulted in 67
successful bidders obtaining licensing opportunities for 493 Basic
Trading Areas (BTAs).[^191] Of the 67 auction winners, 61 claimed status
as a small business. At this time, we estimate that of the 61 small
business MDS auction winners, 48 remain small business licensees. In
addition to the 48 small businesses that hold BTA authorizations, there
are approximately 392 incumbent MDS licensees that have gross revenues
that are not more than \$40 million and are thus considered small
entities.[^192]
Concerning ITFS, we note that educational institutions are included in
this analysis as small entities.[^193] There are currently 2,032 ITFS
licensees, and all but 100 of these licenses are held by educational
institutions. Thus, we tentatively conclude that at least 1,932 ITFS
licensees are small businesses.
13\. Open Video Services. Open Video Service (OVS) systems provide
subscription services.[^194] The SBA has created a small business size
standard for Cable and Other Program Distribution.[^195] This standard
provides that a small entity is one with \$12.5 million or less in
annual receipts. The Commission has certified approximately 100 OVS
operators to serve 75 areas, and some of these are currently providing
service.[^196] Affiliates of Residential Communications Network, Inc.
(RCN) received approval to operate OVS systems in New York City, Boston,
Washington, D.C., and other areas. RCN has sufficient revenues to assure
that they do not qualify as a small business entity. Little financial
information is available for the other entities that are authorized to
provide OVS and are not yet operational. Given that some entities
authorized to provide OVS service have not yet begun to generate
revenues, the Commission concludes that those OVS operators remaining
might qualify as small businesses that may be affected by the rules and
policies proposed herein.
14\. Television Broadcasting. The SBA defines a television broadcasting
station as a small business if such station has no more than \$12
million in annual receipts.[^197] Business concerns included in this
industry are those \"primarily engaged in broadcasting images together
with sound.\"[^198] According to Commission staff review of the BIA
Publications, Inc. Master Access Television Analyzer Database as of June
26, 2004, about 860 of the 1,270 commercial television stations in the
United States have revenues of \$12 million or less. We note, however,
that, in assessing whether a business concern qualifies as small under
the above definition, business (control) affiliations [^199] must be
included. Our estimate, therefore, likely overstates the number of small
entities that might be affected by our action, because the revenue
figure on which it is based does not include or aggregate revenues from
affiliated companies. There are also 2,127 low power television stations
(LPTV).[^200] Given the nature of this service, we will presume that all
LPTV licensees qualify as small entities under the SBA definition.
15\. In addition, an element of the definition of \"small business\" is
that the entity not be dominant in its field of operation. We are unable
at this time to define or quantify the criteria that would establish
whether a specific television station is dominant in its field of
operation. Accordingly, the estimate of small businesses to which rules
may apply do not exclude any television station from the definition of a
small business on this basis and are therefore over-inclusive to that
extent. Also as noted, an additional element of the definition of
\"small business\" is that the entity must be independently owned and
operated. We note that it is difficult at times to assess these criteria
in the context of media entities and our estimates of small businesses
to which they apply may be over-inclusive to this extent.
**D. Description of Projected Reporting, Recordkeeping and Other
Compliance Requirements.**
16\. The proposed rules may impose additional reporting or recordkeeping
requirements on a number of different entities. For example, the Notice
discusses whether video programming distributors should be required to
submit reports to the Commission certifying that they are complying with
monitoring and maintenance of equipment and signal transmissions. In
addition the NPRM asks whether video programming distributors should be
required to file compliance reports as to the amount of closed
captioning they provide. These proposals may impose additional reporting
or recordkeeping requirements on entities. We seek comment on the
possible burden these requirements would place on small entities. Also,
we seek comment on whether a special approach toward any possible
compliance burdens on small entities might be appropriate.
**E. Steps Taken to Minimize Significant Impact on Small Entities, and
Significant Alternatives Considered.**
17\. The RFA requires an agency to describe any significant alternatives
that it has considered in reaching its proposed approach, which may
include the following four alternatives (among others): (1) the
establishment of differing compliance or reporting requirements or
timetables that take into account the resources available to small
entities; (2) the clarification, consolidation, or simplification of
compliance or reporting requirements under the rule for small entities;
(3) the use of performance, rather than design, standards; and (4) an
exemption from coverage of the rule, or any part thereof, for small
entities.[^201] The Commission seeks comment on whether it should indeed
be the responsibility of the video programming distributor to monitor
and maintain equipment and signal transmissions and asks if specific
mechanisms should be in place and what would be the impact of such
mechanisms on distributors. The Notice notes that, alternatively, NCTA
points out that a distributor's responsibilities should not be unduly
burdensome and invites comment on this matter. The Notice also proposes
providing a standardized captioning complaint form for consumers, which
may be a useful tool to those filing complaints. In addition, the Notice
discusses allowing consumers to complain to video programming
distributors via e-mail, phone or fax, which is aimed at providing
easier options for consumers who have concerns regarding captioning
problems and seek more immediate redress. The NPRM also points out that
effective January 1, 2006, all nonexempt new programming must be
captioned. Video programming distributors and providers will have to
caption their programming. Generally, 100% compliance is required;
however, particular entities, and under certain circumstances small
entities, may be exempt from the captioning requirements if they qualify
for an exemption pursuant to Section 79.1(d) which provides for exempt
programs and providers meeting the particular qualifications cited in
the rule or/and if captioning presents an undue burden, pursuant to
Section 79.1(f) which allows parties to file a petition with the
Commission requesting an exemption from captioning upon a sufficient
showing that captioning would pose significant difficulty or expense.
**F. Federal Rules Which Duplicate, Overlap, or Conflict With, the**
**Commission\'s Proposals.**
> None.
**STATEMENT OF**
**CHAIRMAN KEVIN J. MARTIN**
Re: *Telecommunications Relay Services and Speech-to-Speech Services
for*
*Individuals with Hearing and Speech Disabilities*, Order (CC Docket No.
98-67,
CG Docket No. 03-123), FCC 05-141
*Telecommunications Relay Services and Speech-to-Speech Services for*
*Individuals with Hearing and Speech Disabilities*, Report and Order (CG
Docket
No. 03-123, CC Docket No. 98-67), FCC 05-140
*Telecommunications Relay Services and Speech-to-Speech Services for*
> *Individuals with Hearing and Speech Disabilities*, Order on
> Reconsideration (CC Docket No. 98-67, CG Docket No. 03-123), FCC
> 05-139
*Closed Captioning of Video Programming Telecommunications for the Deaf,
Inc.*
*Petition for Rulemaking*, Notice of Proposed Rulemaking (CG Docket No.
05-
231), FCC 05-142
The items that we adopt today should improve the quality of life for
individuals with hearing or speech disabilities. One of the critical
functions of the Commission is to ensure that these individuals have
access to communications technologies in the same manner as people
without hearing or speech disabilities. Those consumers that rely on
Telecommunications Relay Services and Closed Captioning Services must
not be left out of the telecommunications revolution. In each of the
orders adopted today, we take measures to fulfill our statutory goal of
ensuring that every person has equal access to this nation's
communications services.
The four items adopted today coincide with the upcoming 15^th^
anniversary of President George H. W. Bush's signing of the Americans
with Disabilities Act (ADA) on July 26^th^ and the recent 25^th^
anniversary of closed captioning which occurred last March. With the
passage of the ADA in 1990, the Commission was directed to ensure that
hearing or speech disabilities not pose an impediment to communication.
I take this charge very seriously. Accessing communication services is
vital to the ability of the individuals with disabilities to participate
fully in society. The ADA specifically requires the Commission to ensure
that Telecommunications Relay Services (TRS) "are available, to the
extent possible and in the most efficient manner, to hearing-impaired
and speech-impaired individuals in the United States." In honor of the
15^th^ anniversary of this very important statute, we adopt several
items that make TRS more accessible to this community.
During the past 15 years, we have seen the evolution of TRS. Traditional
TTY service over regular phone lines has evolved into IP Relay and Video
Relay Services (VRS) used over Internet connections. VRS permits users
to participate in near real-time conversations in the users' primary
language, American Sign Language (ASL). Because of these features, its
popularity in the deaf and hard of hearing community has soared. For
example, the minutes of use of VRS have increased ten-fold in the past
two years and are continuing to grow at a phenomenal rate.
With the steps we take today, we expand the reach of the TRS fund to
compensate VRS translations between spoken Spanish and ASL as well as
two-line captioned phone service. In addition, we take an important step
to achieving adequate service quality of VRS by, for the first time,
imposing speed of answer and hours of service requirements. Just as a
hearing person can pick up the phone and immediately place a call, a
person with a disability should be able to reach his or her VRS provider
to place a call without experiencing unreasonable delays. We also begin
a rulemaking on whether our closed captioning rules are achieving our
goal of making video programming accessible to the millions of deaf and
hard of hearing Americans, and we ask whether any revisions should be
made to make these rules more effective.
The Commission is more committed than ever to ensuring that the goals of
the ADA are achieved. The actions we take today join the many others
that the Commission has taken over the years to eradicate the barriers
that stand in the way of functional equivalency. Functional equivalency
means individuals with disabilities having access to the same services
as everyone else. This equal access is vital to accessing jobs,
education, public safety, and simple communications with family,
friends, and neighbors.
Although there is still more to do in order to achieve functional
equivalence, I am proud of the items adopted today. I want to assure
those of you with hearing or speech disabilities that we will not stop
actively working to fulfill your need for functional equivalence. We
could not have taken today's actions without your valuable input. We
thank you for your participation in our proceedings and look forward to
working with you and the service providers to come up with solutions to
the next set of challenges that we intend to tackle. It is by working
together that we can best ensure that the tremendous advances in
communications are enjoyed by *all* Americans.
**STATEMENT OF**
**COMMISSIONER KATHLEEN Q. ABERNATHY**
> *Re: Telecommunications Relay Services and Speech-to-Speech Services
> for Individuals with Hearing and Speech Disabilities (CC Docket No.
> 98-67 and CG Docket No. 03-123), FCC 05-141*
>
> *Re: Telecommunications Relay Services and Speech-to-Speech Services
> for Individuals with Hearing and Speech Disabilities (CG Docket No.
> 03-123 and CC Docket No. 98-67), FCC 05-140*
>
> *Re: Telecommunications Relay Services and Speech-to-Speech Services
> for Individuals with Hearing and Speech Disabilities (CC Docket No.
> 98-67 and CG Docket No. 03-123), FCC 05-139*
>
> *Re: Closed Captioning of Video Programming and Telecommunications for
> the Deaf, Inc. Petition for Rulemaking (CG Docket No. 05-231), FCC
> 05-142*
Lou Ann Walker, a noted advocate for the hearing-impaired, once said
that the inability to *hear* is a nuisance, but the inability to
*communicate* is a tragedy. These four items will allow consumers with
hearing or speech impediments to communicate better by enabling them to
receive improved service from their telephones and televisions.
Many of the decisions this Commission is called upon to make involve
arcane matters with sometimes ambiguous results. That is not the case
here. The issues in these items could not be clearer, and the effects of
our rulings could not be more concrete. Today's decisions promise to
have a profound and positive impact on the lives of millions of
Americans living with hearing and speech disabilities. In short, I am
hopeful that by expanding access to TRS and VRS offerings, and by
opening a new proceeding to consider our closed captioning rules for
video programming, we are helping to turn tragedies into nuisances.
Of course, whenever we enhance offerings such as TRS, VRS, and closed
captioning, we must bear in mind the costs imposed by those offerings,
which are borne by all consumers. I am pleased that the TRS and VRS
items will dramatically expand access to these services *without*
significantly increasing the costs involved. I am also satisfied that
the *Notice of Proposed Rulemaking* on closed captioning seeks comment
on issues relating to cost and practicality, and will produce a full
record on those matters for the Commission's consideration.
Finally, I am particularly pleased that we have been able to resolve the
cost-containment questions raised by compensating Spanish-language VRS
from the Interstate TRS Fund. The record shows that Spanish is, by far,
the most widely used non-English language spoken in the United States.
It also demonstrates that the costs of providing ASL-to-Spanish VRS
service are not significantly greater than the costs associated with
ASL-to-English VRS service, a factor that was not clearly evident from
the prior record. In my judgment these factors warranted reevaluation,
and ultimately reversal, of our earlier decision denying compensation
for such services.
One of our most important responsibilities is to make sure that there
are no telecom "have-nots," and that the wealth of services provided by
today's new technologies are available to *all* consumers. These four
items, taken together, help to do just that.
**STATEMENT OF**
**COMMISSIONER MICHAEL J. COPPS**
Re: *Telecommunications Relay Services and Speech-to-Speech Services
for*
*Individuals with Hearing and Speech Disabilities*, Order (CC Docket No.
98-67,
CG Docket No. 03-123), FCC 05-141
*Telecommunications Relay Services and Speech-to-Speech Services for*
*Individuals with Hearing and Speech Disabilities*, Report and Order (CG
Docket
No. 03-123, CC Docket No. 98-67), FCC 05-140
*Telecommunications Relay Services and Speech-to-Speech Services for*
*Individuals with Hearing and Speech Disabilities*, Order on
Reconsideration
(CC Docket No. 98-67, CG Docket No. 03-123), FCC 05-139
*Closed Captioning of Video Programming Telecommunications for the Deaf,
Inc.*
*Petition for Rulemaking*, Notice of Proposed Rulemaking (CG Docket No.
05-
231), FCC 05-142
We all join in celebrating the fifteenth anniversary of the Americans
with Disabilities Act. It's hard to believe it's already been fifteen
years since Congress directed the Commission to ensure that people with
disabilities have access to functionally equivalent communications
services. "Functional equivalency" may sound like Washington jargon, but
for 54 million Americans it translates into equal opportunity, equal
rights and fuller participation in society.
We have come a long way in these fifteen years. And I am pleased that
the Commission has been a part of some of that progress---expanding TRS,
bringing new services like IP relay and VRS into the TRS fold, ensuring
hearing aid compatibility with wireless phones. But this would be a
hollow celebration if we did not also use this anniversary as a time of
rededication, a time of commitment to new goals and new challenges.
Because while the old obstacles of access and education and outreach
have not been resolved completely, new challenges, born of technology
and economic change, rise up to confront us.
The Commission takes on some of these challenges today. By finding that
two-line captioned telephone service is eligible for support from the
TRS fund, we expand functional equivalency for millions of Americans who
are hard of hearing. By developing speed of answer requirements for VRS,
we recognize that the ability to make a telephone call without delay is
fundamental to our concept of a "rapid, efficient, Nation-wide"
communications system. To date, VRS customers have endured unacceptably
long waiting times---sometimes, I am told, up to 30 minutes---before
being able to place a call. This kind of delay undermines functional
equivalency. So I am pleased that today we introduce speed of answer
standards that will pare down waiting time, without sacrificing the
quality of the interpreting service.
We also reverse last year's misguided decision to exclude some forms of
non-shared language TRS from reimbursement. As I pointed out at the
time, Spanish speakers are the fastest growing minority group in the
deaf school age population in the United States. For this population to
communicate in a functionally equivalent manner with their
Spanish-speaking parents, American Sign Language-Spanish VRS should be
eligible for compensation from the TRS fund. I am pleased that we
finally reach this conclusion here.
In addition to these actions on the TRS front, the Commission initiates
a Notice of Proposed Rulemaking to update our closed captioning
policies. For individuals who are deaf and hard of hearing, closed
captions provide a critical link to news, entertainment and emergency
information. By granting the petition for rulemaking filed by
Telecommunications for the Deaf, the National Association of the Deaf,
Self Help for Hard of Hearing People, the Association for Late Deafened
Adults and the Deaf and Hard of Hearing Consumer Advocacy Network, we
make an effort to keep our rules current and ensure that video
programming is accessible to everyone.
Though we make progress today, there are many issues that still need our
attention. There are open questions about equipment interoperability and
certification for national VRS providers. There is the need always for
more outreach and education. And, on another front, the disability
community is justly concerned about fallout from the U.S. Supreme Court
decision in *Brand X.* They do not want to see semantic exercises in
classification and reclassification deny them the victories they have
already won and the opportunities that new technologies hold for the
future.
So we have our work cut out for us. Even as we celebrate this fifteenth
anniversary, there is still a long and winding road to travel---rules to
be adopted, jobs to be secured, people to be appreciated for their
talents and humanity, hearts and minds to be really won over. Our
actions today represent some good strides down that road. I am pleased
to support them in full.
Finally, a note of appreciation for the Consumer and Governmental
Affairs Bureau. The Disability Rights Office is not the largest office
in this agency. But millions of Americans with disabilities---and their
friends, and their families, and their co-workers---are better off
because of the work of this office. Their efforts keep us all better
connected. Thank you.
**STATEMENT OF**
**COMMISSIONER JONATHAN S. ADELSTEIN**
*Re: In the Matter of Closed Captioning of Video Programming,
Accessibility of Programming Providing Emergency Information,
Telecommunications for the Deaf, Inc., Petition for Rulemaking, CG
Docket No. 05-231, Notice of Proposed Rulemaking.*
In light of the fifteenth anniversary of the Americans with Disabilities
Act, now is the time to review whether our closed captioning rules have
been successful at achieving the important goal of increasing access to
high quality video programming for the hearing-impaired community. I
fully support this Notice to seek comment on the adequacy of our current
closed captioning rules and on how the rules can be made more effective
and efficient.
Both Congress and the Commission have recognized how important it is
that *all* people have access to video programming, which is
increasingly affecting how we operate in the home, at the office, and at
school. When closed captioning is inaccurate, unavailable, or
unintelligible, millions of hearing-impaired individuals are excluded
from the opportunity to participate in political and cultural
experiences that shape our identity as Americans. For example, when
closed-captioning errors prevented many hearing-impaired viewers from
casting their vote for Fox television's program, "American Idol," these
viewers were prevented from being a part of this cultural event.
Television is increasingly the medium relied upon as the primary source
of local and national news, and a healthy democracy demands a
well-informed citizenry to make reasoned decisions about where our
country is and should be headed. Closed-captioning errors, however,
leave millions of Americans without access to this vital information and
uninformed. The consequences are even greater when the closed captioning
is providing emergency information.
As we prepare to review the current closed captioning rules, we must
remain committed to ensuring that video programming is not only
accessible, but also high quality. I am therefore pleased that this
Notice of Proposed Rulemaking addresses the issues of both technical and
non-technical standards for closed captioning. I am also pleased that
this Notice seeks comment on how the Commission can best ensure
compliance. We provide nothing but empty promises if our rules overlook
the critical means for monitoring and enforcement.
The Commission has already taken the important step of mandating that
non-exempt new programming be captioned as of January 1, 2006. Today's
rulemaking takes another step forward toward ensuring that the
hearing-impaired community receives functionally equivalent video
programming services. I commend my colleagues for their dedication to
confronting these issues that are so important for the deaf and hard of
hearing community, and I would like to thank the Consumer & Governmental
Affairs Bureau for all their hard work on this matter.
[^1]: *See* 47 C.F.R. Part 79. Closed captioning is an assistive
technology designed to provide access to television for persons with
hearing disabilities. Closed captioning is similar to subtitles in
that it displays the audio portion of a television signal as printed
words on the television screen. To assist viewers with hearing
disabilities, captions may also identify speakers, sound effects,
music and laughter. Unlike subtitles, however, closed captioning is
hidden as encoded data transmitted within the television signal. For
a more complete description of closed captioning, *see
Implementation of Section 305 of the Telecommunications Act of 1996
-- Video Programming Accessibility,* MM Docket No. 95-176, Notice of
Proposed Rulemaking, 12 FCC Rcd 1044 (Jan. 17, 1997) (*1997 Closed
Captioning NPRM*).
[^2]: *See* Telecommunications for the Deaf Inc. *et al.* Petition for
Rulemaking, RM-11065 (July 23, 2004) (*TDI Petition*). The joint
petitioners are collectively referred to herein as TDI. The Petition
appeared on Public Notice on September 2, 2004. *See* Public Notice,
Report No. 2670, dated September 2, 2004. More than 90 comments were
filed in response to the *TDI Petition*, most of which support the
Petition. The National Cable & Telecommunications Association filed
an Opposition to the *TDI Petition* on October 4, 2004 (*NCTA
Opposition*).
[^3]: 47 U.S.C. § 613. Section 713, Video Programming Accessibility, was
added to the Act by Section 305 of the Telecommunications Act of
1996. Telecommunications Act of 1996, Pub. L. 104-104, 110 Stat. 56
(1996) (the 1996 Act).
[^4]: *See Closed Captioning and Video Description of Video Programming,
Implementation of Section 305 of the Telecommunications Act of
1996,* MM Docket No. 95-176, Report, 11 FCC Rcd 19214 at 19227,
para. 34 (July 29, 1996) (*1996 Closed Captioning Report to
Congress*). The Commission noted that "\[s\]tudies have demonstrated
that captioning can improve a student's reading comprehension and
spelling, augment vocabulary and word recognition and increase
overall motivation to read." *Id*.
[^5]: *See Closed Captioning and Video Description of Video Programming,
Implementation of Section 305 of the Telecommunications Act of 1996,
Video Programming Accessibility,* MM Docket No. 95-176, Report and
Order, 13 FCC Rcd 3272, 3387, paras. 254-257 (August 22, 1997)
(*Closed Captioning Report and Order)*.
[^6]: H.R. Report 104-458 104^th^ Cong., 2d Sess. at 183-84 (*Conference
Report*) (Aug. 22, 1996).
[^7]: 47 C.F.R. § 79.1(b)(1)(iv).
[^8]: *1997 Closed Captioning NPRM*, 12 FCC Rcd 1044 at 1050, para. 7.
[^9]: 47 C.F.R. § 73.682(a)(22). In 1976, the Commission adopted rules
which provide that line 21 of the VBI is to be primarily used for
the transmission of closed captioning. The Commission's rules
specify technical standards for the reception and display of such
captioning. *Id*.
[^10]: Pub. L. No. 101-431, 104 Stat. 960 (1990) (codified at 47 U.S.C.
§§ 303(u), 330(b)).
[^11]: *See Implementation of Television Decoder Circuitry Act*, GEN
Docket No. 91-1, Report and Order, 6 FCC Rcd 2419 (Apr. 15, 1991).
[^12]: H.R. Report 104-204, 104^th^ Cong., 1^st^ Sess. at 113-14 (1995).
[^13]: *See* *Closed Captioning Report and Order*, 13 FCC Rcd at 3276,
para. 7.
[^14]: 47 U.S.C. § 613.
[^15]: 47 U.S.C § 613(b)-(c).
[^16]: Video programming may be delivered to consumers through a variety
of technologies. These distribution technologies include broadcast
television, cable television, wireless cable, direct-to-home
satellite services, and local telephone exchange carrier video.
[^17]: H.R. Report 104-458, 104^th^ Cong., 2d Sess. at 183-84 (1996).
[^18]: *Closed Captioning and Video Description of Video Programming,
Implementation of Section 305 of the Telecommunications Act of 1996,
Video Programming Accessibility,* MM Docket No. 95-176, Order on
Reconsideration, 13 FCC Rcd 19973 (Oct. 2, 1998) (*Reconsideration
Order)*.
[^19]: "Video programming distributor" is defined in 47 C.F.R. §
79.1(a)(2) as any television broadcast station licensed by the
Commission and any multichannel video programming distributor as
defined in section 76.100 of this chapter, and any other distributor
of video programming for residential reception that delivers such
programming directly to the home and is subject to the jurisdiction
of the Commission.
[^20]: *See* 47 C.F.R. §§ 79.1(b)(1), (b)(3), (d), (e), (f); *see also
Closed Captioning Report and Order*, 13 FCC Rcd at 3292-3295, paras.
41-47; *Reconsideration Order*, 13 FCC Rcd at 19978-79, paras. 9-10.
[^21]: 47 C.F.R. § 79.1(a)(5).
[^22]: 47 C.F.R. § 79.1(b)(2); *Closed Captioning Report and Order*, 13
FCC Rcd at 3301-02, paras 61-63.
[^23]: 47 C.F.R. § 79.1(a)(6).
[^24]: 47 C.F.R. § 79.1(b)(3)(iv).
[^25]: 47 C.F.R. § 79.1(b)(4)(ii).
[^26]: *Closed Captioning Requirements for Digital Television
Receivers*, *Closed Captioning and Video Description of Video
Programming , Implementation of Section 305 of the
Telecommunications Act of 1996, Video Programming Accessibility*, ET
Docket No. 99-254, MM Docket No. 95-176, Report and Order, 15 FCC
Rcd. 16788 (July 31, 2000) (*DTV Closed Captioning Order*); 47
C.F.R. § 15.122(b) (incorporating by reference, EIA-708-B, "Digital
Television Closed Captioning," Electronics Industries Alliance (Dec.
1999) ("EIA-708-B")). *See* Summary of Requirements at 15 FCC Rcd at
16790-16791 (listing requirements of the decoder operation, covered
devices, and compliance dates); *see also* 47 C.F.R. § 79.1.
[^27]: *DTV Closed Captioning Order*, 15 FCC Rcd at 16790-91 (*See*
Summary of Requirements); *see also* 47 C.F.R. § 79.1(a)(6)(ii).
[^28]: *DTV Closed Captioning Order*, 15 FCC Rcd. at 16791, para. 5;
*see also* 47 C.F.R. § 79.1(a)(6)(ii).
[^29]: *DTV Closed Captioning Order*, 15 FCC Rcd. at 16809, para. 63.
[^30]: *TDI Petition* at i.
[^31]: *See generally* *TDI Petition*. In addition to *TDI's Petition*,
comments submitted in response to the *Annual Assessment of the
Status of Competition in the Market for the Delivery of Video
Programming,* MB Docket No. 04-227, Notice of Inquiry, 19 FCC Rcd
10909 (June 17, 2004) (*2004 Video Programming NOI)* regarding the
Commission's annual assessment of the status of competition in the
market for the delivery of video programming similarly reflect
consumers' continuing concerns with closed captioning. *See Annual
Assessment of the Status of Competition in the Market for the
Delivery of Video Programming,* MB Docket No. 04-227, 11^th^ Annual
Report, 20 FCC Rcd 2755, 2850-51, para. 177 (Feb. 4, 2005) (*11^th^
Annual Video Programming Report).*
[^32]: *See, e.g.,* Comments of Elizabeth Rocchino (Aug. 26, 2004);
Accessible Media Industry Coalition (Sept. 29, 2004); Larry
Goldberg, National Center for Accessible Media (Sept. 28, 2004);
Jerald Jordan (Sept. 27, 2004); Nancy Linke-Ellis (Sept. 23, 2004);
Liz Petersen (Sept. 27, 2004).
[^33]: *NCTA Opposition* at 1-2. No other Oppositions were filed.
[^34]: With "pop-on captions," a phrase or sentence appears on the
screen all at once -- not line by line -- stays there for a few
seconds and then disappears or is replaced by another full caption.
The captions are timed to synchronize with the program and placed on
the screen to help identify the speaker. Pop-on captions are used
for prerecorded captioning. **"**Roll-up captions" roll onto and off
the screen in a continuous motion. Usually two to three lines of
text appear at one time. As a new line comes along, it appears on
the bottom, pushing the other lines on the screen up. Roll-up
captions are used for all live captioning and can also be used for
prerecorded captioning. *See* National Captioning Institute webpage:
<http://www.ncicap.org/preview/capterms.asp>.
[^35]: *1997 Closed Captioning NPRM*, 12 FCC Rcd at 1090-1091, para.
111; *Closed Captioning Report and Order*, 13 FCC Rcd at 3370, para.
214.
[^36]: *1997 Closed Captioning NPRM*, 12 FCC Rcd at 1087, para.104, at
1090-1091, para. 111.
[^37]: *Closed Captioning Report and Order*, 13 FCC Rcd at 3374, para.
222.
[^38]: *Id.* at 3374, para. 222, n.716.
[^39]: *Id.* at 3374, para. 223.
[^40]: *Id.* at 3374, para. 222.
[^41]: *TDI Petition* at 35 and 37.
[^42]: *NCTA Opposition* at 16.
[^43]: *Id.* at 15-16.
[^44]: *Id.* at 15.
[^45]: In response to the *2004 Video Programming NOI*, approximately
220 informal comments were filed by consumers. Quality issues were
among the topics discussed in these comments, including the accuracy
of captions, which commenters claim ranges from excellent to
undecipherable. *See 11^th^ Annual Video Programming Report*, 20 FCC
Rcd at 2850-51, para. 177.
[^46]: *Closed Captioning Report and Order*, 13 FCC Rcd at 3373, para.
219 (referring to the Comments of VITAC).
[^47]: *TDI Petition* at 27.
[^48]: *Id.*
[^49]: *Id*.
[^50]: *Closed Captioning Report and Order*, 13 FCC Rcd at 3368-3369,
para. 211; 47 C.F.R. § 79.1(c); 47 C.F.R. § 73.682 (TV transmission
standards). Section 15.119 sets forth the closed caption decoder
requirements for analog television receivers. 47 C.F.R. § 15.119.
Section 73.682 sets forth television transmission standards. 47
C.F.R. § 73.682.
[^51]: *Closed Captioning Report and Order*, 13 FCC Rcd at 3368-3369,
para. 211*.*
[^52]: *Id.* at 3368-3369, para. 211*.*
[^53]: *See* 47 C.F.R. § 79.1(c).
[^54]: *TDI Petition* at 24-26. (47 C.F.R. § 76.606 is titled "Closed
captioning").
[^55]: *TDI Petition* at 26-27.
[^56]: *NCTA Opposition* at 9.
[^57]: *Id.* at 10.
[^58]: *Id.* at 9.
[^59]: *Closed Captioning Report and Order*, 13 FCC Rcd at 3369, para.
212.
[^60]: *Id*.
[^61]: *1996 Closed Captioning Report to Congress*, 11 FCC Rcd at 19253,
para. 93.
[^62]: *TDI Petition* at 28.
[^63]: *Id.* at 28.
[^64]: *Id.* at 29.
[^65]: *TDI Petition* at 32; *11^th^ Annual Video Programming Report*,
20 FCC Rcd at 2850, para. 177, n.794.
[^66]: *TDI Petition* at 30.
[^67]: *NCTA Opposition* at 9-10.
[^68]: *Id.* at 9.
[^69]: *Id.* at 9-10.
[^70]: *Id.* at 10.
[^71]: *See Reconsideration Order*, 13 FCC Rcd at 20009, para. 83, in
which the Commission notes its expectation that "video programming
providers in conjunction with those publicizing programming and
publishing programming schedules will make every effort to correctly
label programming as to whether it is captioned."
[^72]: *Closed Captioning Report and Order*, 13 FCC Rcd at 3381, para.
240. On reconsideration, the Commission rejected petitioners'
requests to allow complaints to be filed directly with the
Commission, as is the case with complaints alleging violations of
the childrens' television rules. *Reconsideration Order*, 13 FCC Rcd
at 20023-20025, paras. 114-116.
[^73]: *Closed Captioning Report and Order*, 13 FCC Rcd at 3382, para.
243; *see also* 47 C.F.R. § 79.1(g)(3).
[^74]: 47 C.F.R. § 79.1(g)(1).
[^75]: *Closed Captioning Report and Order*, 13 FCC Rcd at 3382-83,
para. 243; *see also* 47 C.F.R. § 79.1(g)(4).
[^76]: *Id.*
[^77]: *Closed Captioning Report and Order*, 13 FCC Rcd at 3383, para.
244.
[^78]: *Reconsideration Order*, 13 FCC Rcd at 20025, para. 116.
[^79]: *Id.* at 20025, para. 115.
[^80]: *Id.* at 20025, para. 116.
[^81]: *Id.*
[^82]: *TDI Petition* at 21.
[^83]: *Id.*
[^84]: *Id.* at 22*.*
[^85]: *Id.* at 15-16. TDI notes that the complaint form may be
optional, and that consumers may use email or other means of
communication to provide the substance of the complaint. A copy of
the proposed complaint form included in the *TDI Petition* as
Exhibit A is attached hereto as Appendix A.
[^86]: *NCTA Opposition* at 7.
[^87]: *Id.,* n.17, citing 47 C.F.R. § 76.309.
[^88]: *Reconsideration Order,* 13 FCC Rcd at 20025, para. 116.
[^89]: *NCTA Opposition* at 3-4.
[^90]: On reconsideration, the Commission stated its expectation that
programming distributors would be responsive to consumers'
complaints and noted that, while all complaints must be filed in
writing, it is important that video programming distributors make
their organizations accessible to persons with hearing disabilities
seeking information about the entity's closed captioning or other
matters. *Reconsideration Order,* 13 FCC Rcd at 20025, para. 116 and
n.394.
[^91]: *TDI Petition* at 15-16.
[^92]: *TDI Petition* at Exhibit A, attached hereto as Appendix A.
[^93]: 47 C.F.R. § 1.80(b): Guidelines for Assessing Forfeitures
(*Forfeiture Guidelines).*
[^94]: *TDI Petition* at 23.
[^95]: *TDI Petition* at 23-24.
[^96]: *TDI Petition* at 22-23. TDI cites a 2002 action wherein the
Cable Services Bureau suggested it could impose increased captioning
requirements for failure to comply with the closed captioning rules.
*TDI Petition* at 23 n.37 citing *Comcast Order*, at 5 n.32 (47 CFR
§ 79.1(b)(8)).
[^97]: *TDI Petition* at 23. TDI notes that \$8,000 is akin to the
Commission's current forfeiture amount for violation of the
Commission's childrens' television programming requirements. *TDI
Petition* at 23 n.38.
[^98]: *TDI Petition* at 23.
[^99]: *TDI Petition* at 24.
[^100]: *NCTA Opposition* at 8.
[^101]: *NCTA Opposition* at 8.
[^102]: 47 C.F.R. § 79.1(g)(8).
[^103]: *Closed Captioning Report and Order*, 13 FCC Rcd at 3286, para.
27.
[^104]: *Id.* at 3383, para. 244.
[^105]: *Id.*
[^106]: *Reconsideration Order,* 13 FCC Rcd at 20026-27, para. 118.
[^107]: *TDI Petition* at 16.
[^108]: *Id.* at 16-17.
[^109]: *Id.* at 18.
[^110]: *Id*.
[^111]: *Id.* at 19. TDI notes that when the Commission elected not to
adopt benchmark compliance reporting requirements, it stated that it
would conduct compliance audits, but TDI is unaware that any such
audits have been conducted. The lack of compliance audits, TDI
asserts, "seriously undermines enforcement of the captioning rules
and \[their\] effectiveness\[.\]" *TDI Petition* at 20.
[^112]: *NCTA Opposition* at 4-5.
[^113]: *Id.* In the *Closed Captioning Report and Order* the Commission
stated that distributors may rely on certifications from program
suppliers that the programming is either captioned or exempt from
the rules and will not be held responsible if the program supplier
submits false certifications. *Closed Captioning* *Report and
Order*, 13 FCC Rcd at 3286-3287, para. 28; 3369, para. 212; 3383,
para. 244. In addition, the Commission's rules allow distributors to
rely on the certifications of program providers that programming is
captioned; and limits a distributor's responsibility for captioning
in situations where a program source falsely certifies that
programming meets the Commission's captioning requirements if the
distributor is unaware that the certification is false. 47 C.F.R. §
79.1(g)(6).
[^114]: *NCTA Opposition* at 5-6.
[^115]: *Id.* at 6.
[^116]: *Closed Captioning Report and Order*, 13 FCC Rcd at 3311, para.
84; *see also 1997 Closed Captioning NPRM*, 12 FCC Rcd at 1058,
para. 21.
[^117]: *1997 Closed Captioning NPRM*, 12 FCC Rcd at 1058, para. 21.
[^118]: *Id.*
[^119]: *Closed Captioning Report and Order*, 13 FCC Rcd at 3311-12,
para. 84.
[^120]: *Id.* As noted by the Commission, "\[ENT\] can only be used to
convert the dialogue included on a teleprompter script into
captions. As many live newscasts use interviews, field reports and
late-breaking weather and sports that cannot be scripted or
presented in textual or graphical form, persons with hearing
disabilities do not have full access to this programming when
\[ENT\] is used." *Reconsideration Order*, 13 FCC Rcd at 19991,
para. 35.
[^121]: *Reconsideration Order*, 13 FCC Rcd at 19991, para. 35-36.
[^122]: *Id.* at 19992, para. 38. We note that Section 79.1(d)(3) does
not exempt from the closed captioning requirements programming other
than English or Spanish language if the scripted program can be
captioned using ENT. 47 C.F.R. § 79.1(d)(3).
[^123]: *Reconsideration Order*, 13 FCC Rcd at 19992, para. 38.
[^124]: *Id.*
[^125]: *Id.* at 19991, para. 36.
[^126]: *Id.* at 19993, para. 40.
[^127]: 47 C.F.R. § 79.1(d)(3).
[^128]: *TDI Petition* at 35.
[^129]: *TDI Petition* at 34-35.
[^130]: *NCTA Opposition* at 13-14.
[^131]: *Id.* at 13.
[^132]: *See Reconsideration Order*, 13 FCC Rcd at 19993, para. 39.
[^133]: In response to the *2004 Video Programming NOI*, Fox provided
information on captioning costs paid to the several vendors they use
for originally-produced broadcast and nonbroadcast programming, both
live and recorded. "Fox's regional sports networks spend between
\$105 and \$365 to caption a single hour of programming, with the
higher fee associated with live sports events. For its National
Geographic channel, Fox indicates that it typically costs \$165 to
caption an hour of original programming ...when it purchases
programming from a third party, the cost of captioning is included
in the overall costs of the programming." *11th Annual Video
Programming Report*, 20 FCC Rcd at 2852, para. 180.
[^134]: *Closed Captioning Report and Order*, 13 FCC Rcd at 3292-93,
para. 41-42.
[^135]: *Id.* at 3292-94, paras. 41-44; *Reconsideration Order*, 13 FCC
Rcd at 19981, para. 15.
[^136]: Training for Realtime Writers Act of 2005, S. 268, 109^th^
Cong., 1^st^ Sess. (2005).
[^137]: *Id.* at § 2(7).
[^138]: *Closed Captioning Report and Order*, 13 FCC Rcd at 3363-64,
para. 199.
[^139]: *Id.* at 3365, para. 203.
[^140]: *See generally, Electronic Filing of Documents in Rulemaking
Proceedings*, GC Docket No. 97-113, Notice of Proposed Rulemaking,
12 FCC Rcd 5150 (April 7, 1997) (*Electronic Filing NPRM*).
[^141]: *Closed Captioning Report and Order*, 13 FCC Rcd at 3365, para.
203; at 3383-84 para. 245; *see also* *Electronic Filing NPRM*, 12
FCC Rcd 5150.
[^142]: 47 C.F.R. § 79.1(f).
[^143]: We note that these Petitions are occasionally placed on the DRO
website.
[^144]: National Association of the Deaf, Comments at 7, *11^th^ Annual
Video Programming Report*, 20 FCC Rcd at 2851-52, paras. 179-180.
[^145]: *TDI Petition* at 31-34.
[^146]: *Closed Captioning Report and Order*, 13 FCC Rcd at 3312, para.
85.
[^147]: Section 79.1(c) obligates all video programming distributors to
deliver "all programming received from the video programming owner
or other original source containing closed captioning to receiving
television households with the original closed captioning data
intact in a format that can be recovered and displayed by decoders
meeting the standards of part 15 of \[the Commission's rules\]
unless such programming is recaptioned or the captions are
reformatted by the programming distributor." 47 C.F.R. § 79.1(c).
However, on reconsideration, the Commission clarified that, "as the
benchmarks increase, distributors will have to reformat the captions
to comply with the rules." *Reconsideration Order*, 13 FCC Rcd at
20009, para. 82.
[^148]: *Reconsideration Order*, 13 FCC Rcd at 20026-27, para. 118.
[^149]: *Id.* Commission states its intention to conduct random audits
of captioning similar to the audits used to monitor compliance with
other Commission rules.
[^150]: *See Electronic Filing of Documents in Rulemaking Proceedings*,
63 FR 24121 (1998).
[^151]: *See* 47 C.F.R. § 1.48.
[^152]: 47 C.F.R. §§ 1.1200, *et seq*.
[^153]: *See* 47 C.F.R. § 1.1206(b)(2).
[^154]: *See* 5 U.S.C. § 603(a). In addition, the NPRM and IRFA (or
summaries thereof) will be published in the Federal Register.
[^155]: *See* 5 U.S.C. § 603. The RFA, see 5 U.S.C. §§601-612, has been
amended by the Small Business Regulatory Enforcement Fairness Act of
1996 (\"SBREFA\"), Pub. L. No. 104-121, Title II, 110 Stat. 857
(1996).
[^156]: *See* 5 U.S.C. § 603(a).
[^157]: *Id*.
[^158]: 5 U.S.C. § 603(b)(3).
[^159]: 5 U.S.C. § 601(6).
[^160]: 5 U.S.C. § 601(3) (incorporating by reference the definition of
\"small-business concern\" in the Small Business Act, 15 U.S.C. §
632). Pursuant to 5 U.S.C. § 601(3), the statutory definition of a
small business applies \"unless an agency, after consultation with
the Office of Advocacy of the Small Business Administration and
after opportunity for public comment, establishes one or more
definitions of such term which are appropriate to the activities of
the agency and publishes such definition(s) in the Federal
Register.\"
[^161]: 15 U.S.C. § 632.
[^162]: 13 C.F.R. § 121.201, NAICS code 513220 (changed to 517510 in
October 2002).
[^163]: U.S. Census Bureau, 1997 Economic Census, Subject Series:
Information, \"Establishment and Firm Size (Including Legal Form of
Organization),\" Table 4, NAICS code 513220 (issued October 2000).
[^164]: U.S. Census Bureau, "2002 NAICS Definitions: 515210 Cable and
Other Subscription Programming" (online, July 2005, at
[www.census.gov](http://www.census.gov/)).
[^165]: 13 C.F.R. § 121.201, NAICS code 515210 (changed from 513210 in
Oct. 2002).
[^166]: U.S. Census Bureau, 1997 Economic Census, Subject Series:
Information, \"Establishment and Firm Size (Including Legal Form of
Organization),\" Table 4, NAICS code 513210 (issued Oct. 2000).
[^167]: *See* U.S. Census Bureau, 2002 Economic Census, Industry Series:
"Information," Table 2, Comparative Statistics for the United States
(1997 NAICS Basis): 2002 and 1997, NAICS code 513210 (issued Dec.
2004). The preliminary data indicate that the total number of
"establishments" increased from 494 to 714. In this context, the
number of establishments is a less helpful indicator of small
business prevalence than is the number of "firms," because the
latter number takes into account the concept of common ownership or
control. The more helpful 2002 census data on firms, including
employment and receipts numbers, will be issued in late 2005.
[^168]: 47 C.F.R. § 76.901(e). The Commission developed this definition
based on its determination that a small cable system operator is one
with annual revenues of \$100 million or less. Implementation of
Sections of the 1992 Cable Act: Rate Regulation, Sixth Report and
Order and Eleventh Order on Reconsideration, 10 FCC Rcd 7393, 60 FR
10534 (February 27, 1995).
[^169]: Paul Kagan Associates, Inc., Cable TV Investor, February 29,
1996 (based on figures for December 30, 1995).
[^170]: 47 U.S.C. § 543(m)(2).
[^171]: *See* FCC Announces New Subscriber Count for the Definition of
Small Cable Operator, Public Notice, DA 01-158 (released January 24,
2001).
[^172]: 47 C.F.R. § 76.901(f).
[^173]: *See* FCC Announces New Subscriber Count for the Definition of
Small Cable Operator, Public Notice, DA 01-158 (released January 24,
2001).
[^174]: The Commission does receive such information on a case-by-case
basis if a cable operator appeals a local franchise authority\'s
finding that the operator does not qualify as a small cable operator
pursuant to Section 76.901(f) of the Commission\'s rules. *See* 47
C.F.R. 909(b).
[^175]: 13 C.F.R. § 121.201, NAICS code 517510.
[^176]: U.S. Census Bureau, 1997 Economic Census, Subject Series:
Information, \"Establishment and Firm Size (Including Legal Form of
Organization),\" Table 4 (issued October 2000).
[^177]: *Id*.
[^178]: [13 C.F.R. §
121.201](http://www.westlaw.com/Find/Default.wl?rs=dfa1.0&vr=2.0&DB=1000547&DocName=13CFRS121.201&FindType=L),
NAICS code 517510.
[^179]: *Id*.
[^180]: DirecTV is the largest DBS operator and the second largest MVPD,
serving an estimated 13.04 million subscribers nationwide; see
Annual Assessment of Status of Competition in the Market for the
Delivery of Video Programming, Eleventh Annual Report, FCC 05-13, ¶
55 (rel. Feb. 4, 2005)(\"2005 Cable Competition Report\").
[^181]: EchoStar, which provides service under the brand name Dish
Network, is the second largest DBS operator and the fourth largest
MVPD, serving an estimated 10.12 million subscribers nationwide.
*Id*.
[^182]: Rainbow DBS, which provides service under the brand name VOOM,
reported an estimated 25,000 subscribers. *Id*.
[^183]: Dominion, which provides service under the brand name Sky Angel,
does not publicly disclose its subscribership numbers on an
annualized basis. *Id*.
[^184]: *See* Rulemaking to Amend Parts 1, 2, 21, 25, of the
Commission\'s Rules to Redesignate the 27.5-29.5 GHz Frequency Band,
Reallocate the 29.5-30.5 Frequency Band, to Establish Rules and
Policies for Local Multipoint Distribution Service and for Fixed
Satellite Services, Second Report and Order, Order on
Reconsideration, and Fifth Notice of Proposed Rule Making, 12 FCC
Rcd 12545, 12689-90, ¶ 348 (1997).
[^185]: *Id*.
[^186]: *Id*.
[^187]: *See* Letter to Dan Phythyon, Chief, Wireless Telecommunications
Bureau, FCC, from Aida Alvarez, Administrator, SBA (Jan. 6, 1998).
[^188]: Amendment of Parts 21 and 74 of the Commission\'s Rules with
Regard to Filing Procedures in the Multipoint Distribution Service
and in the Instructional Television Fixed Service and Implementation
of Section 309(j) of the Communications Act - Competitive Bidding,
Report and Order, 10 FCC Rcd 9589, 9593 ¶ 7 (1995)(MDS Auction R&O).
[^189]: 47 C.F.R. § 21.961(b)(1).
[^190]: *See* Letter to Margaret Wiener, Chief, Auctions and Industry
Analysis Division, Wireless Telecommunications Bureau, FCC, from
Gary Jackson, Assistant Administrator for Size Standards, Small
Business Administration, dated March 20, 2003 (noting approval of
\$40 million size standard for MDS auction).
[^191]: Basic Trading Areas (BTAs) were designed by Rand McNally and are
the geographic areas by which MDS was auctioned and authorized. See
MDS Auction R&O, 10 FCC Rcd at 9608. ¶ 34.
[^192]: 47 U.S.C. § 309(j). Hundreds of stations were licensed to
incumbent MDS licensees prior to implementation of Section 309(j) of
the Communications Act of 1934, 47 U.S.C. § 309(j). For these
pre-auction licenses, the applicable standard is SBA\'s small
business size standard for \"other telecommunications\" (annual
receipts of \$12.5 million or less). See 13 C.F.R. § 121.201, NAICS
code 517910.
[^193]: The term \"small entity\" under SBREFA applies to small
organizations (nonprofits) and to small governmental jurisdictions
(cities, counties, towns, townships, villages, school districts, and
special districts with populations of less than 50,000). 5 U.S.C. §§
601(4)-(6). We do not collect annual revenue data on ITFS licensees.
[^194]: *See* 47 U.S.C. § 573.
[^195]: 13 C.F.R. § 121.201, NAICS code 513220 (changed to 517510 in
October 2002).
[^196]: *See* http://www.fcc.gov/csb/ovs/csovscer.html (current as of
June 2004).
[^197]: *See* 13 C.F.R. § 121.201, NAICS Code 515120 (adopted Oct.
2002).
[^198]: NAICS Code 515120. This category description continues, \"These
establishments operate television broadcasting studios and
facilities for the programming and transmission of programs to the
public. These establishments also produce or transmit visual
programming to affiliated broadcast television stations, which in
turn broadcast the programs to the public on a predetermined
schedule. Programming may originate in their own studios, from an
affiliated network, or from external sources.\" Separate census
categories pertain to businesses primarily engaged in producing
programming. *See* Motion Picture and Video Production, NAICS code
512110; Motion Picture and Video Distribution, NAICS Code 512120;
Teleproduction and Other Post-Production Services, NAICS Code
512191; and Other Motion Picture and Video Industries, NAICS Code
512199.
[^199]: \"\[Business concerns\] are affiliates of each other when one
concern controls or has the power to control the other or a third
party or parties controls or has to power to control both.\" 13
C.F.R. § 121.103(a)(1).
[^200]: FCC News Release, \"Broadcast Station Totals as of September 30,
2002.\"
[^201]: 5 U.S.C. § 603(b).
|
en
|
markdown
|
748944
|
# Presentation: 748944
## Lt Col Joanne Sechrest
Mgr, One-Stop Shop Services
DHS/IAIP, National Communications System
[email protected]
703.607.4960
http://www.ncs.gov
**Mgr, One-Stop Shop Services**
** ****DHS/IAIP, National Communications System**
**[email protected]**
**703.607.4960**
**http://www.ncs.gov**
**Government Emergency Telecommunications Service**
**(GETS)**
## Overview
Operational Concept
Criteria
Cost
Testing
How to Order
Contact Information
- Operational Concept
- Criteria
- Cost
- Testing
- How to Order
- Contact Information
**Outline**
**2**
## GETS: Network Congestion
*Congestion,**at *_*many*_* points, can block a call !*
**AT&T **
**MCI**
**SPRINT**
**Local Exchange**
**Networks**
**Government Emergency Telecommunications Service *****addresses ******wireline ******congestion***
**Local Exchange**
**Networks**
**3**
## GETS Overview
**GETS Overview**
**4**
## The GETS Calling Card
**GETS User**** **
** **
**GETS User**
** ****Organization**
**The GETS Calling Card**
**GETS priority is invoked**
**“****call-by-call”**
***Calling cards are in widespread use and easily understood by the NS/EP User, simplifying GETS usage***
***GETS is a "***_***ubiquitous***_***" service in the Public Switched Telephone Network...if you can get a DIAL TONE, you can make a GETS call***
**5**
## Why The PublicSwitched Network (PSN)?
**6**
- 95% of government telecommunications needs met by PSN
- > $300B Infrastructure; > 150M Access Lines; > 25K Switches
- GETS enhancements are deployed in the 3 major Interexchange Carriers and in the major Local Exchange Carriers across the US.
- GETS local enhancements are available from over 85% of the access lines connecting to the public switched network
- PSN Is _Ubiquitous, Robust, And Flexible_
## Operational Concept
**7**
## Plain Old Telephone Service (POTS) Routing
- AT
- IXC AT&T
- IXC MCI
- IXC Sprint
- IXC OTHER
**USER DIALS**
**1-703-818-4387**
- EO
- AT
**AIN**
- IXC AT&T
- IXC Sprint
- IXC OTHER
- End Office Sends Call to User’s *Presubscribed Carrier* Via Direct Route, If Available
- If Direct Path Blocked, EO Sends Call To Access Tandem
- “*All Circuits Are Busy, Please Hang-up And Call Later*”
- IXC MCI
**8**
## GETS Priority Features
**AT**
- IXC AT&T
- IXC MCI
- IXC Sprint
- IXC OTHER
**EO**
**AT**
- IXC AT&T
- IXC MCI
- IXC Sprint
- IXC OTHER
**EO**
***Interexchange Carriers***
**GETS Priority Features **
**and Enhanced Routing**
_***Plus!..GETS has***_
***Priority in the ***
*** ******signaling network***
***Exemption from ***
*** ******control restrictions***
**9**
## Power of GETS
- Utilizes robustness of the public switched network
- 6 Ways to get to long distance networks rather than 2
- Priority over public calls in signaling network
- Exemption from Network Management Controls
- Enhanced routing alternatives in public networks
- Queuing for available circuits during access and egress
- GETS power works for LOCAL and Long Distance
**10**
**When you have dial tone, GETS will typically get you through!**
## 9/11:
10,000 GETS calls attempted into/out of/within NYC and DC area with 95% completion rate
Used for calls between end offices when local trunks damaged but long distance trunks still operational
Nisqually Earthquake: GETS calls within area exempt from network management controls
Aug 03 NE Blackout: 1,231 GETS calls into/out of/within affected areas with 90% + success rate
**11**
- 9/11:
- 10,000 GETS calls attempted into/out of/within NYC and DC area with 95% completion rate
- Used for calls between end offices when local trunks damaged but long distance trunks still operational
- Nisqually Earthquake: GETS calls within area exempt from network management controls
- Aug 03 NE Blackout: 1,231 GETS calls into/out of/within affected areas with 90% + success rate
## Who is Eligible to use GETS?
- Organizations that support one or more of the following five National Security / Emergency Preparedness (NS/EP) mission areas, qualify for OMNCS sponsorship to become a GETS user:
***Non-Federal users require***
***NCS member sponsorship – typically done by the Office of Manager NCS***
**Who is Eligible to use GETS?**
- National Security Leadership
- National Security Posture and US Population Attack Warning
- Public Health, Safety, and Maintenance of Law and Order
- Public Welfare and Maintenance of National Economic Posture
- Disaster Recovery
**12**
## GETS Costs
- NCS pays for all Federal calls up to annual ceiling--departments billed for excess
- GETS calls generally cost 10 cents or less per minute
- Operator assisted and International higher
- NCS cannot pay for Non-Federal calls
- Non-Federal Organizations establish an “account” with DITCO at Scott AFB
- Not normally billed for calls to confirm receipt of individual GETS cards, familiarization and short duration test calls
- Reserve the right to bill for all calls, especially if there has been fraud, waste, or abuse using your GETS card(s)
**13**
## Familiarization and Testing
- Encourage GETS cards distribution
- Keep 10% in stockpile for unanticipated needs
- Encourage GETS card holders test their cards
- Incorporate GETS in exercise scenarios
- Use it from home, office, hotels, etc. and on cell networks and payphones – places you might be in an emergency
- Report problems to 1-800-818-GETS
- Utilize GETS 800/888 access numbers as fall back
**14**
## Toll-free Numbers
- Toll-free numbers CANNOT be used as destination numbers in GETS
- Toll-free number databases can fail during major emergencies
- Obtain regular telephone numbers for toll-free numbers before an emergency occurs
**15**
**800**
**866**
**877**
**888**
- GETS 800/888 Access numbers do not receive GETS priority treatment
- until** **the** **call reaches AT&T/MCI/Sprint
## How Do You Order GETS?
- Your organization Point of Contact (POC) applies for GETS for all users within your organization
- Easy on-line registration
- Upon approval, GETS cards and instructions mailed to POC within 3-5 days
- No established POC? or don’t know your POC – contact the NCS
**16**
## NCS Contact Information
_**TELEPHONE:**_
**Information/Sign-Up**
** ****1-866 NCS-CALL (627-2255) or 703 676-2255 (Option 1 for GETS)**
**Trouble Reporting (24x7) **
** ****1-800-818-GETS (4387) or 703 818-4387**
_**E-MAIL:**_
**[email protected]**
_**WEBSITE:**_
**http://gets.ncs.gov**
_**MAILING ADDRESS**_**:**
**OMNCS**
**P. O. Box 4502**
**Arlington, VA 22204-4502**
**17**
## Slide 18
|
en
|
converted_docs
|
905604
|
Alabama's Teacher
Equity Plan
a plan to ensure that poor and minority students are not taught at
higher rates than other students by inexperienced, unqualified and/or
out of field teachers
July 2006
{width="8.64861111111111in"
height="6.495138888888889in"}
**Alabama's Teacher Equity Plan**
[Background and Policy Support]{.underline}
Alabama's first serious look at the critical impact of teachers on
student achievement began in 1997 when the Task Force on Teaching and
Student Achievement was established. Comprised of a broad cross-section
of educators, business representatives, and public policy
representatives -- including education policy and program appointees in
the Governor's office, members of the State Board of Education, and
senior administrative staff in the Alabama Department of Education --
the Task Force convened for two years to study and make recommendations
about strategies to improve teaching and student achievement in Alabama.
Their findings and recommendations were published in 2000 in a 96-page
report entitled *Teaching and Learning: Meeting the Challenge of High
Standards*. (The report is available at:
<http://www.bestpracticescenter.org/pdfs/tal1-5p.pdf>.)
Alabama began focusing on the fact that *good teaching matters most*[^1]
and resolved to use teacher quality as a tool for school improvement.
The focus was succinctly noted:
> *If we are going to change our schools, we have to dig deeper. We have
> to get back to a fundamental truth about education: A well-prepared
> teacher is the critical ingredient in student learning. We must
> guarantee that every child in Alabama has a highly qualified teacher.
> No exceptions. No excuses.*[^2]
The *Teaching and Learning* report identified four critical components
that must work together to create and maintain sufficient numbers of
well-prepared, competent, and effective teachers and to raise student
academic achievement: (1) high teacher standards; (2) high quality
undergraduate and graduate teacher preparation programs with extensive
clinical experiences and strict accountability for results; (3)
sustained and sharply focused professional development which requires
teachers to reflect on their current teaching, refine what works, and
change what does not work; and (4) organization of schools so that
effective teaching is the top priority of every school.
The Task Force acknowledged that schools with a concentration of
high-poverty students and schools that are otherwise hard to staff are
more likely to have teachers that are less prepared and/or
inexperienced; thus, the urgency to ensure that each student has a
highly qualified, effective teacher.[^3]
Alabama had significant historical, legal, and practical barriers to
overcome in implementing the *No Child Left Behind Act of 2001* (NCLB).
However, the state's pre-NCLB resolve coupled with the high-stakes
federal legislation has enabled remarkable strides in teacher and
teaching quality in the state. The state has made significant progress
in the high quality professional development component, but less
progress toward ensuring an adequate supply of highly qualified,
experienced teachers and ensuring that sufficient numbers of such
teachers are employed by and continue teaching in the state's
high-poverty, high-minority schools and in schools identified for
improvement.
The A+ Education Foundation, a key player in developing and publishing
the *Teaching and Learning* report, has remained a tireless advocate of
highly qualified teachers for all students and has greatly influenced
local and state policymaking and funding to implement the critical
components of a comprehensive teacher development system. More recently,
Alabama's current governor has made teacher quality an urgent priority
in his administration. To ensure coherence of policy, resources, and
practice and to facilitate progression toward the desired goal, Governor
Bob Riley established the Governor's Commission on Teaching Quality. The
group commenced work on January 17, 2006, "to examine, recommend, and
work to implement laws, policies, and practices affecting teachers and
teaching effectiveness to ensure student success in Alabama's public
schools." (More and up-to-date information on the Governor's Commission
is available at <http://www.ti.state.al.us/>.) The Commission's goals
for Alabama, which encompass critical components identified by the 1997
Task Force are:
1. To improve the academic achievement of all students in the public
schools by aligning teacher practice and professional learning with
the *Alabama Quality Teaching Standards*.
2. To provide highly-effective teachers through aggressive recruitment
and experientially-based preparation.
3. To retain and reward high-quality teachers by creating professional
pathways with incentives for continuous professional learning and
career advancement along multiple routes.
The successful marriage of these goals to Alabama's existing academic
accountability system is key to having every student on grade level in
reading and mathematics by 2014.
Since enactment of NCLB in 2002, Alabama has made several policy changes
and additions that were needed to implement key strategies. Examples
include the following:
- June 2002 -- the State Board of Education adopted *Alabama
Professional Development Standards* which are based on the National
Staff Development Council standards.
- June 2003 -- the State Board of Education adopted the *Alabama Model
for Identifying Highly Qualified Teachers* which provides background
information, defines the term "highly qualified teacher" as it
applies to Alabama teachers, and describes teacher options for
meeting the NCLB requirement.
- June 2004 -- the State Board of Education adopted *Alabama Standards
for Effective Teacher Induction and Mentoring*.
- April 2005 -- the State Board of Education adopted Praxis II tests
as a pre-condition for initial teacher certification in Alabama.
(Alabama had been a "non-testing" state for many years prior to this
time.)
- July 2005 -- the State Board of Education adopted *Alabama Standards
for Instructional Leaders* and *Alabama Educator Code of Ethics*.
- February 2006 -- the State Board of Education adopted minimum cut
scores for Praxis II tests taken as a pre-condition for initial
teacher certification.
Currently, the Governor's Commission on Teaching Quality is organized
into five active task forces: (1) Standards, (2) Selection and
Preparation, (3) Certification, (4) Professional Development, and (5)
Working Conditions. It is anticipated that the Commission will continue
making recommendations to the State Board of Education for policy
actions needed to facilitate achievement of the it's goals. An
Implementation Committee was appointed by Governor Bob Riley in August
2005 to ensure timely and efficient implementation of the Governor's
Congress Recommendations.
**Identification of Where and to What Extent Inequities in Teacher
Assignment Exist**
[Alabama's Data and Reporting System]{.underline}
Evidence of probable success: The Alabama Department of Education is
keenly and painfully aware of the importance of high-quality data, an
efficient data collection system, and a functional reporting system.
Since 2002, Alabama has directed tremendous amounts of time, fiscal, and
human resources to build and enhance a data system that meets NCLB
expectations and requirements. In addition, the ADE recruited and
employed a chief information officer to direct data system development
and implementation. NCLB requires each state to collect data on the
qualifications and assignments of teachers at the LEA and school levels
and to publicly report specified data elements for the high-poverty
quartile of schools and the low-poverty quartile of schools, compared to
all schools. These data are reported in conjunction with the academic
accountability status of each LEA and school.
Prior to NCLB, Alabama implemented a state-mandated public reporting
system comprised of the following components: (1) Annual State Report
Card; (2) Annual LEA Report Cards; and, (3) Annual School Report Cards.
Since 2002, the state's annual reporting system has been expanded,
enhanced, and improved each year so that, effective with the 2005
reports, the system fully meets NCLB's annual public reporting
requirements and supports the State Board's *Educational Ruler*. (See
Page 2.)
Alabama's reporting system is an integral feature of the state
accountability system and provides numerous data elements of interest
and importance to educators, parents, and other stakeholders as well as
to local and state policymakers. Reports from the data system currently
are used to inform program and curriculum decisions related to student
achievement and, particularly, to inform budget decisions related to
school improvement, corrective actions, and/or restructuring due to
successive years of not making AYP. Modifications that are in-progress
for implementation during the 2006-2007 school year will utilize more
real-time data, based on individual student identifiers and refined
teacher certification/assignment alignment, to provide LEA- and
school-level progress update reports that can be used for periodic
(monthly) monitoring and making mid-course corrections within the school
year.
In-progress and future refinements to the state's data system are
critical to successful implementation of the State Plan for Highly
Qualified Teachers and, particularly, to successful implementation of
the Teacher Equity Plan. The state's progress to date for developing and
implementing NCLB-mandated data requirements and the state's commitment
of resources to data-driven decision making are evidences of successful
completion and implementation of data system-related strategies.
[Data System Strategies]{.underline}
1. Collect and report data on the distribution of core academic subject
teachers, including:
```{=html}
<!-- -->
```
a. the number and percentage of highly qualified teachers by LEA and
school, by grade level (elementary or middle/secondary) and by core
academic subject
b. the number and percentage of core academic subject classes taught by
highly qualified teachers by LEA and school, by grade level
(elementary or middle/secondary) and by core academic subject
c. the number and percentage of core academic subject classes taught by
inexperienced teachers by LEA and school, by grade level (elementary
or middle/secondary) and by core academic subject[^4]
> Alabama will cross-reference existing data sources to collect and
> report the number of inexperienced core academic subject teachers by
> LEA and school, by grade level and by core academic subject. The
> following process will be implemented:
1. Data from the 2006-2007 LEA Personnel Data Collection will be
analyzed in comparison to data collected in 2005-2006, 2004-2005,
and 2003-2004 to ascertain the number, employing LEA, and school and
teaching assignment of teachers who have taught a subject and/or
grade level for less than three (3) full academic years. The results
of this analysis will be stored in a database for further analysis.
2. Results from the previous analysis will be refined by
cross-verification with data stored in the ADE Teacher Certification
Management System to eliminate teachers who have out-of-state or
private school experience in the same subject and/or grade level.
3. A report of the number and percentage of inexperienced teachers by
LEA and school, by grade level, and by core academic subject will be
generated and posted on the ADE web site with other reports of
highly qualified teachers and equitable distribution of such
teachers.
4. Lists of teachers by school and teaching assignments will be
generated for each LEA and distributed to ADE staff who are
responsible for related technical assistance and monitoring
activities.
5. The report and working lists will be prepared and ready for use by
December 1, 2006, and will be updated annually in subsequent years.
```{=html}
<!-- -->
```
d. elements "a" and "b" and "c" for high-poverty schools, high-minority
schools, and schools not making AYP -- individually, compared high
to low, and in comparison to all schools
e. the number and percentage of highly qualified teachers who are
working under alternative certificates by LEA and school, by grade
level (elementary or middle/secondary) and by core academic subject
f. the number and percentage of core academic subject teachers who are
**[not]{.underline}** highly qualified by LEA and school, by grade
level (elementary or middle/secondary) and by core academic subject;
and indication of how many and which teachers are:
1. certified and highly qualified, but assigned to a subject and/or
grade not covered by highly qualified status
2. certified and assigned out-of-field
3. working under an alternative certificate, but not highly
qualified
4. working under an emergency certificate
5. not certified
6. certified in special education only and assigned to teach one or
more core academic subjects to students with disabilities
g. the number and percentage of core academic subject teachers that
participated in high-quality professional development during the
previous school year (Currently, this information is collected
manually and entered into an Excel spreadsheet by SDE staff.)
```{=html}
<!-- -->
```
2. Collect and report data on core academic subject teaching vacancies
that are difficult to fill with highly qualified teachers, by LEA,
school, and grade level.
3\. Implement a statewide teacher application system to connect highly
qualified teacher applicants with teaching vacancies in LEAs with
high-poverty schools, high-minority schools, and/or schools not making
AYP. Advocate for enhancements to increase the value of this mechanism
as a recruiting tool for LEAs with hard-to-staff schools. The teacher
application system will be operational on December 1, 2006.
4\. Implement a statewide system for collecting, retrieving, and
reporting data on teachers and instructional leaders who participate in
high-quality professional development. In an effort to better monitor
the professional development being offered, the state now requires
educators to register for their professional development online
utilizing STI-PD.
5\. Continue working with SREB to research teacher turnover and
shortages in Alabama; and, subsequently, use findings to inform task
forces of the Governor's Commission on Teaching Quality.
6\. Advocate for development of mechanisms to periodically collect and
report data that depict patterns of teacher retention, turnover, and
mobility by LEA and school and by grade level and core academic subject
7\. Advocate for expansion, refinement, and implementation of a system
of "identifiers" for individual teachers and core academic subjects to
replace the state's current Local Education Agency Personnel System
(LEAPS) report.
8\. Advocate for data collection and reporting enhancements to link
student achievement data with teacher qualifications.
[Findings]{.underline}
Current data indicate that Alabama is making progress toward having all
core academic subject teachers highly qualified and toward having such
teachers more equitably distributed across the state. The data also
establish the need for continued and more targeted state actions to
ensure equitable distribution of highly qualified teachers while
increasing the supply and availability of such teachers, particularly,
to hard to staff local education agencies (LEAs) and schools. Following
are key findings from the August 2006 data:
- At the end of the 2004-2005 school year, 85.0% of core academic
subject **elementary** teachers were highly qualified. As of August
2006, 93.7% of core academic subject elementary teachers are highly
qualified; an increase of 8.7%.
- During the past year, Alabama narrowed the gap from 10.1% to 3.7%
between core academic subject classes taught by highly qualified
teachers in high-poverty **elementary** schools (91.7%) and
corresponding low-poverty schools (95.4.1%).
- Among **elementary** schools, schools that are high-poverty,
high-minority[^5], [and]{.underline} identified for school
improvement are 5.1% more likely to have teachers who are not highly
qualified when compared to all elementary schools. Students who
attend a school that is high-poverty, high-minority,
[and]{.underline} identified for improvement are 6.8% more likely to
have teachers who are not highly qualified than their fellow
students in low-poverty, low-minority schools that are not
identified for improvement.
- At the end of the 2004-2005 school year, 77.9% of core academic
subject **middle/secondary** teachers were highly qualified. As of
August 2006, 82.7% of core academic subject middle/secondary
teachers are highly qualified; an increase of 4.8%.
- During the past year, Alabama narrowed the gap from 17.1% to 8.2%
between core academic subject classes taught by highly qualified
teachers in high-poverty **middle/secondary** schools (80.3%) and
corresponding low-poverty schools (88.5%).
- The more recent and more accurate data reflects that Alabama's
greatest inequity in distribution of highly qualified teachers is in
middle/secondary schools that have a combination of variables:
- Among middle/secondary schools, schools that are high-poverty,
high-minority, [and]{.underline} identified for school
improvement are 14.2% more likely to have teachers who are not
highly qualified when compared to all middle/secondary schools.
Students who attend a school that is high-minority
[and]{.underline} identified for improvement are 22% more likely
to have teachers who are not highly qualified than their fellow
students in low-poverty, low-minority schools that are not
identified for improvement.
- Schools that are high-minority are 5.5% more likely to have
teachers that are not highly qualified than schools that are
high-poverty. This appears to be an indication that schools and
LEAs have heeded the state's counsel to address the needs of
high-poverty schools.
- Schools that are identified for school improvement and
high-minority are 14.8% more likely to have teachers that are
not highly qualified than schools that are identified for school
improvement and high-poverty.
**See Attachments #1, #2, #3, and #4.**
**Goals and Strategies for Addressing Inequities in Teacher Assignment**
In keeping with Alabama's "good faith effort" to implement fully the
NCLB highly qualified teacher requirement, state staff are already
implementing the Teacher Equity Plan. While many actions described
herein are underway, it is anticipated that implementation of these
actions will extend beyond other components of the revised State Plan
for Highly Qualified Teachers which are scheduled for completion during
the 2006-2007 school year.
The ultimate purpose of Alabama's Teacher Equity Plan is to ensure that
all students in the state's public schools are taught by highly
qualified, experienced, and effective teachers toward the goal of having
all students on grade level in reading and mathematics by 2014. More
specifically, the plan is designed to target state and federal resources
to implement enhancement and/or corrective strategies to ensure that
students in high-poverty and/or high-minority schools and/or schools
that did not make adequate yearly progress (AYP) are taught by highly
qualified and effective teachers.
In support of the plan's overall and targeted outcomes, the Alabama
Department of Education will continue working with the Governor's
Commission on Teaching Quality, the Governor's Education Policy Office,
the Alabama State Board of Education, LEA and school administrators and
teachers, and other education advocacy groups to secure and implement
supporting laws, regulations, policies, and practices. Further, staff
from the Alabama Department of Education will monitor monthly the
distribution of teachers among Alabama's schools, grades, and subjects,
to ensure that poor and minority students are not taught by unqualified,
inexperienced[^6], and out-of-field teachers at higher rates than other
students.
This plan describes strategies for increasing and ensuring equitable
distribution of highly qualified teachers around four basic tasks:
implementing teacher standards that are linked to student academic
achievement; identifying potential candidates and preparing teachers for
today's classrooms, providing high-quality professional growth
opportunities, and retaining a sufficient supply of highly qualified and
effective teachers.
**1.0 [High Teacher Standards]{.underline}**
Evidence of probable success: Teacher effectiveness, or teacher impact,
has been a frequent education research topic for many years and the
basic finding is clear: students learn more from "good" teachers. Some
of the most frequently cited research findings are from the work of
William Sanders, formerly of the University of Tennessee at Knoxville,
and his colleagues who demonstrated the impact of good teachers
initially and over time in sequential years of student learning and
assessed achievement.[^7] Other researchers have attempted to identify
attributes and skills that are consistently ascribed to "good" teachers.
These efforts have yielded few definitive findings; however, high
teacher verbal skills[^8] and a deep knowledge of subject matter[^9] are
consistent attributes of effective teachers.
Alabama's Governor's Commission on Teaching Quality, and other earlier
education advocacy and study groups, have grappled with defining and
describing "good" teachers in relation to articulating high teacher
standards. The Commission recently approved a set of research- and
evidence-based standards that are linked to Alabama's student academic
achievement standards and has forwarded their draft document to the
State Board of Education for review and, hopefully, soon approval. This
document describes five proposed standards -- Content Knowledge,
Teaching and Learning, Literacy, Diversity, and Professionalism -- for
Alabama teachers and provides a rationale and key indicators for each.
(The proposed standards may be accessed at:
<http://www.ti.state.al.us/>.)
The broad-based composition of the Governor's Commission as the
originating source of the *Alabama Quality Teaching Standards*, and
establishment of standards in state-level policy through approval of the
Alabama State Board of Education will ensure the success of their use.
The teaching standards will serve as a foundation for forthcoming
recommendations for a statewide teacher mentoring program, multi-level
certification, differentiated compensation, professional development
accountability, and revision to teacher preparation programs.
[High Teacher Standards Strategies]{.underline}
1.1 Upon adoption by the State Board of Education, the *Alabama Quality
Teaching Standards* will be disseminated to all LEAs and institutions of
higher education that have teacher preparation programs. Special
emphasis will be placed on ensuring that preparation programs
aggressively integrate the standards into their programs.
1.2 The Office of Leadership Development, a component of ADE's Classroom
Improvement Section, will develop a professional development module that
explains and supports the new standards. The session will be presented
to LEAs through each of the state's eleven Regional Inservice Centers.
This activity will emphasize the research basis of the *Alabama Quality
Teaching Standards* and the improvements that can be expected as a
result of consistent and thorough implementation.
1.3 The Office of Leadership Development, in conjunction with other
components of the ADE, will ensure that future professional development
offerings support and reinforce the tenants of the *Alabama Quality
Teaching Standards.*
**2.0 Teacher Preparation and Certification**
Evidence of probable success: All teachers must be well-prepared to
ensure academic success of all students in Alabama's public schools. In
addition to having deep and broad knowledge of their subjects, teachers
must know how to teach their subjects. Standards-based,
well-articulated, and meticulously implemented teacher preparation
programs are essential to ensuring, for example, that the Algebra I
instruction in School A is equivalent to Algebra I instruction in School
B and all other schools in the state. We cannot rely solely on the
academic content standards in the state's courses of study to achieve
equivalent instruction across classes, schools, and school systems.
During the past 10-12 years, studies of education programs and practices
in Alabama have yielded information and findings consistent with
research across the country. In 1999, the Governor's Commission on
Instructional Improvement and Academic Excellence in Alabama's Public
Schools was created by legislative action. After 15 months of intensive
work, that commission concluded that Alabama's teacher preparation
programs needed to be revamped to better prepare teachers for today's
student achievement expectations, student diversity, and other classroom
challenges. In response to recommendations, the State Board of Education
now requires teacher preparation programs to document, by student scores
that meet or exceed the state-approved minimum scores on appropriate
Praxis II tests, that teacher candidates demonstrate knowledge of
subjects they will be certified to teach as a pre-condition for
certification. Also, teacher preparation programs are held accountable
for their graduates based on teachers' scores on the state's
Professional Education Personnel Evaluation (PEPE). The higher education
report card provides a separate [program grade]{.underline} based on the
PEPE score earned by each first year teacher, according to the following
scale: to earn a program grade of A, 95-100% of new teachers must earn
the benchmark PEPE score; for a grade of B, 90-94% of new teachers must
earn the benchmark score; C = 85-89%; D = 80-84%; and F = 0-79%. No
action is required of an institution that receives a program grade of A,
B, or C. The State Superintendent of Education will recommend that the
Alabama State Board of Education rescind approval of a program that
receives a grade of D for two consecutive years, a grade of F for two
consecutive years, or a combination of a D and an F for two consecutive
years.
The [institution's grade]{.underline} is computed by totaling the number
of points earned by the separate programs (A=4, B=3, C=2, D=1, F=0) and
dividing by the number of programs for which a grade was received. To
earn a composite grade of A, an institution must document that at least
95% of new teachers across all programs achieved the PEPE benchmark
score. To earn a composite grade of B, an institution must document that
90-94% of new teachers across all programs achieved the PEPE benchmark
score. To earn a composite grade of C, an institution must document that
85-89% of new teachers across all programs achieved the PEPE benchmark
score. To earn a composite grade of D, an institution must document that
80-84% of new teachers across all programs achieved the PEPE benchmark
score. If less than 80% of new teachers achieve the PEPE benchmark
score, the institution's grade is F. No action is required if an
institution's composite grade is A or B. If the institution receives a
grade of C, D, or F, the teacher education unit must develop and submit
an improvement plan to the State Superintendent and notify all
candidates admitted to the targeted program(s). The State Superintendent
will recommend that the Alabama State Board of Education rescind
approval of an institution's program if: (1) an institution receives a
grade of D for two consecutive years, a grade of F for two consecutive
years, or a combination of a grade of D and a grade of F for two
consecutive year, or (2) a unit grade of C, D, or F is not raised to at
least a B within two scholastic years after the unit's plan is
implemented.
Alabama has acknowledged the impact of instructional leaders on teacher
working conditions and, more specifically, the impact of effective
instructional leadership on reducing teacher turnover.[^10] Institutions
of higher education that have educator preparation programs are now
required to use the *Alabama Standards for Instructional Leaders* as a
basis for their programs of study. It is believed that effective
teachers are more likely to remain in a school with less desirable
working conditions if the school leaders are more effective. Further,
improving the effectiveness of school leaders will improve the working
environment for teachers and may have a stabilizing effect for teacher
retention in high-need schools.
In light of the critical role of teacher preparation programs, the
12-point vision of the sitting Governor's Commission on Teaching Quality
includes points specifically related to teacher preparation programs.
The Commission Task Force on Selection and Preparation is addressing
policy issues for revising teacher preparation program standards to
align with the proposed *Alabama Quality Teaching Standards* and to
develop a model of teacher education that is more clinical, i.e.,
designed to provide more opportunities for practical development and
alignment of academic theory and knowledge and teaching practice in
actual school settings.
[Teacher Preparation and Certification Strategies]{.underline}
1. Advocate for development and funding for a loan/scholarship program
for prospective core-academic subject teachers. (Early discussions
recommend that a candidate receive a pre-specified amount of support
for up to two years of full-time enrollment and the annual amount
would increase after completion of all requirements for admission to
a teacher education program. The loan pay-back amount would be
reduced incrementally each year, up to five years, if the teacher is
hired by and continues teaching in a high-poverty, high-minority,
and/or low-performing school.)
2. Actively promote and solicit participation in the Troops-to-Teachers
Program which provides financial assistance to any qualified Armed
Forces veteran who pursues certification through an alternative
route and agrees to teach three years in a high-poverty LEA.
Priority will be given to candidates who pursue certification in
hard-to-staff subjects.
3. Require and facilitate training to be conducted by the Federal
Student Loan Assistance Program Office for student financial aid
staff in specified institutions of higher education to increase
their knowledge, understanding, and ability to provide sound
guidance for potential teacher candidates.
4. Conduct a formal study of the effectiveness of existing partnerships
focused on teacher preparation for high-poverty, high-minority urban
areas currently implemented at the University of Alabama at
Birmingham. Explore means of replication, if it is determined that
this program increases the number of highly qualified new teachers
who are well-prepared to work in challenging environments.
5. Advocate for development and funding of a tiered certification
process with increasing salaries and responsibility and decreasing
professional oversight and support as a teacher progresses through
(currently conceptualized) certification phases of intern,
novice/resident, professional, master, and expert/instructional
specialist.
6. Revise existing certification renewal requirements to simplify the
process and facilitate re-entry into the workforce of highly
qualified teachers who have demonstrated core academic subject
teaching effectiveness.
7. Require, facilitate, monitor, and conduct action research on
implementation of *Alabama Standards for Instructional Leaders* in
education administrator preparation programs in Alabama institutions
of higher education.
8. Advocate for teacher preparation programs, including development of
a strong accountability component, to be clinically based so that
teachers have ample opportunities to build effective pedagogical
skills during the preparation process.
9. Advocate for accountability of teacher preparation programs in
linking education to their university arts and sciences counterparts
in meaningful ways based on the *Alabama Quality Teaching
Standards*.
**3.0 Induction, Professional Development, and Teacher Mentoring**
Evidence of probable success: To ensure academic success of all students
in Alabama's public schools, teachers must continue to grow
professionally through participation in activities that are integrally
related to their classroom needs and that are aligned with state
academic content and student achievement standards. Each of the in-state
studies of education referenced herein have recommended that the state
take measures to increase the availability of high-quality professional
development and to strengthen requirements for teacher participation in
such activities. Based on a recommendation in the 2001 *Report of the
Governor's Commission on Instructional Improvement and Academic
Excellence* and NCLB's requirements for professional development, the
State Board of Education adopted the *Alabama Professional Development
Standards* in June 2002. These standards are based on standards and
definitions embraced by the National Staff Development Council and are
supported by research- and evidence-based literature.
Following are three examples of major professional development
initiatives that are currently implemented in Alabama:
- **Alabama Reading Initiative** -- begun in the mid-1990's as a
home-grown State Department of Education effort to improve reading
achievement by improving teachers' ability to teach reading -- is
now a fully state-funded, nationally recognized professional
development initiative that has actualized its early vision of
improved reading achievement.
- **Alabama Mathematics, Science, and Technology Initiative** (AMSTI)
-- modeled after the state's reading initiative and piloted in 2002
in one of the state's eleven regional in-service regions, is
well-supported by the current Governor and received \$15 million in
the fiscal year 2006 state budget. Mathematics and science teachers
in seven of the 11 regional in-service regions have now received
training and continue to receive on-going support through AMSTI.
Evaluation results indicate that students in AMSTI schools
out-perform their non-AMSTI peers in the areas of mathematics,
science, and reading on statewide academic assessments. Plans are in
place to expand AMSTI until training and support sites are located
in all eleven in-service center regions and all students in the
state are served through the initiative.
- **Alabama Teacher Leader Network** -- developed to provide
opportunities for teachers, with guidance from their principals, to
build leadership responsibilities, therefore building capacity for
improving the quality of teaching in Alabama's schools. In 2004-2005
the Teacher Leader Network was piloted in 66 Alabama schools that
did not make adequate yearly progress (AYP) on the spring 2004
statewide assessments. The program is a three-year pilot with Year
One focusing on school improvement; Year Two focusing on action
research; and Year Three focusing on coaching and mentoring. Lessons
learned from the pilot will enable the TLN to be expanded to all
schools statewide during 2006-2007.
Similar emphasis has been placed on the importance of intensive,
high-quality teacher mentoring for teachers who are inexperienced, those
who are teaching based on emergency or alternative certificates, and
teachers in schools identified for academic improvement. Admittedly,
this is an area that needs considerable work in Alabama; however, some
progress has been made in recent years. As an outgrowth of a project
that was funded through a Teacher Quality Enhancement (Title II) grant,
the State Board of Education adopted *Alabama Standards for Effective
Teacher Induction and Mentoring* in June 2004. These standards are based
on the NCLB definition and criteria for high-quality teacher mentoring
and are supported by research- and evidenced-based literature. LEAs and
schools that use state or federal funds for teacher mentoring must use
these standards as a basis for their programs.
1. Assign Peer Mentors (through the State Support Team) to schools
identified for School Improvement/Corrective Action and beyond to
provide model lessons and subject-specific, job-embedded
professional development for non-highly qualified, inexperienced,
and otherwise ineffective teachers. (Other Alabama Department of
Education staff from the Federal Programs Section will broker and
monitor similar assistance to schools identified for improvement for
less than three years.)
2. Conduct a statewide study to ascertain critical needs for teaching
English language learners (ELLs). Based on findings, contract for
services to develop and implement a multi-year training and
mentoring program for core academic subject teachers so that their
teaching practice is culturally relevant and employs knowledge,
understandings, skills, and strategies needed to effectively teach
core academic subjects to ELLs.
3. Implement, as a temporary action, an on-line teacher mentoring
program facilitated by the State Support Team to augment the
immediate provision of teacher mentors and subject coaches in
schools where data identifies inequitable distribution of highly
qualified teachers.
4. Implement, through the State Support Team and under the direction of
the Accountability Roundtable, a system of teacher mentoring and
subject coaching, that is based on individual teacher needs and
assignments for teachers who are: inexperienced; assigned to teach
core academic subjects in schools identified for improvement; hired
through the Troops-to-Teachers program; hold alternative
certificates; and/or otherwise identified as ineffective or not
highly qualified.
5. Advocate for development and funding of a statewide, state-required
teacher induction and mentoring program.
6. Continue, on the current schedule, expansion and full implementation
of AMSTI and, through the authority of the Accountability
Roundtable, require LEAs to use school improvement funds to support
mandated participation of eligible teachers.
7. Continue statewide implementation of the Alabama Reading Initiative,
including training for new-hires and periodic recertification
training; and, through the authority of the Accountability
Roundtable, emphasize and require full participation and
implementation in middle/secondary schools not making AYP.
8. Target Teacher Leader Network expansion to high-poverty,
high-minority and/or schools identified for improvement.
9. Closely monitor development and implementation of state-required LEA
professional development plans to ensure alignment with teacher and
student needs reflected by highly qualified teacher and student
academic achievement data.
10. Advocate for policy authority to require prior approval of teacher
professional development and to require that such professional
development be aligned with the *Alabama Quality Teaching Standards*
and meet the definition and criteria of high-quality professional
development in accordance with the *Alabama Professional Development
Standards*.
**4.0 Recruitment and Retention of Teachers in High-Need Schools**
Evidence of probable success: Some LEAs and schools are experiencing
teacher shortages as a result of increased enrollment, teacher
retirements, difficult working conditions, and rural/remote locations.
Some schools are seeking highly qualified, experienced teachers to
address academic achievement problems. Since, highly qualified and
effective teachers are in high demand everywhere, attracting and
retaining them is of utmost importance. In addition to increasing the
supply and further developing teachers, state policy-makers are working
on mechanisms to ensure that highly qualified, effective teachers remain
in Alabama and that adequate numbers choose to work in the state's
hardest to staff schools. To attract and keep good teachers in
less-desirable settings, factors that are valued by such teachers --
e.g., instructional leadership, working conditions, and compensation --
have to be improved or accentuated.[^11]
Alabama has a salary matrix that establishes a minimum salary based on a
teacher's education level and the number of years teaching experience.
Since funds for teacher salaries are allocated through a state budget
appropriation based on the salary matrix, the Alabama Department of
Education has encouraged LEAs to use available federal funds to provide
financial incentives to attract and retain highly qualified teachers.
Acknowledging that this strategy alone is grossly insufficient, the
sitting task forces of the Governor's Commission on Teaching Quality are
developing recommendations that will address multiple paths and
differentiated compensation based on varying responsibilities in the
teaching profession. It is anticipated that one recommendation or set of
recommendations will relate to a state-required, state-funded teacher
induction program that will be tied to tiered certification. Related
research shows consistently that high-quality induction and early
mentoring significantly increases the retention rate of teachers[^12]
and is cost-effective.
In the absence of a hoped-for state-funded induction system, the Alabama
Department of Education is strongly encouraging LEAs and schools to use
available state and federal funds to implement teacher induction
programs that are based on the state-adopted standards and the model
developed and piloted through the state's Title II-funded Teacher
Quality Enhancement grant.
1. Assist LEA staff in developing community partnerships that will
provide community-based incentives to highly qualified core-academic
subject teachers who agree to work in hard-to-staff schools and live
in the schools' communities.
2. Develop training modules and conduct training for local board of
education members, LEA and designated school staff, and staff from
selected state educational organizations on developing and
implementing effective policies, procedures, and practices for
recruiting, hiring, and retaining highly qualified teachers;
particularly in LEAs that are identified as having hard-to-staff
schools.
3. Advocate for the annual salary supplement for teachers who are
certified through the National Board for Professional Teaching
Standards be contingent upon agreement to teach for a specified
number of years in a low-performing or otherwise hard-to-staff
school or subject.
4. Conduct annual "refresher" training to reduce rater "drift" for
school administrators who are teacher evaluators. Require such
training for evaluators identified for re-training by the
Accountability Round Table, State Support Team.
5. Secure assistance from the Federal Student Loan Assistance Program
Office to develop and conduct a campaign to publicize and provide
current, detailed information about federal student loan assistance
programs to LEAs; particularly, to those with communities that have
hard-to-staff schools.
6. Advocate for development and funding for a teacher financial
incentive program to provide an end-of-year bonus to each highly
qualified, experienced core academic subject teacher who agrees to
teach in a high-poverty, high-minority, and/or low-performing
school. (Early discussions recommend that the bonus be tied to AYP
so that the bonus amount increases annually, up to a pre-specified
maximum amount, for each consecutive year of employment in the same
school that continues to make AYP.)
7. Collaborate with area education foundations and state agencies to
develop a campaign for working with local chambers of commerce,
county commissions, city councils, and other local stakeholders to
develop community-based incentives to attract and retain highly
qualified teachers. LEAs with significant teacher turnover that
results in relatively high numbers of inexperienced and otherwise
not highly qualified teachers will be the target audience for this
activity.
8. Advocate for modifications to retirement benefits restrictions to
facilitate re-entry of highly qualified, effective retired teachers
into the workforce to be hired in specified hard-to-staff schools.
9. Continue development and advocate for expansion funds for ACCESS
Distance Learning in Alabama. (ACCESS distance learning provides
high school students in Alabama public schools access to advanced
diploma courses, additional electives, and advanced placement
courses in schools that currently cannot provide these opportunities
due to lack of highly qualified and experienced teachers. ACCESS
teachers must be both highly qualified and experienced in teaching
their assigned on-line subjects/courses.)
**Monitoring to Ensure Progress Toward Equitable Distribution of
Highly Qualified Teachers**
Using the state's data system, Alabama will track teacher
qualifications, teacher assignments, student population demographics,
and academic accountability over time at the state level and at the LEA
and school levels. These data will be reported publicly through annual
report cards and will be used to ascertain the degree and effectiveness
of implementation of (1) the State Plan for Highly Qualified Teachers,
including the Teacher Equity Plan, and (2) LEA Plans for Highly
Qualified Teachers. Data will also be used to identify the need for
making mid-course corrections and to support the development of
additional policies to address stubborn or residual inequities in the
distribution of highly qualified, inexperienced, and out-of-field
teachers.
Following are monitoring strategies that will be employed during the
2006-2007 school year and beyond to ensure that state actions described
in Alabama's State Plan for Highly Qualified Teachers (Revised-July
2006) (and modified in September and November 2006) are effectively
implemented. These same strategies will be used by Alabama Department of
Education staff to monitor implementation of LEA Plans for Highly
Qualified Teachers and, more specifically, to examine the issue of
equitable teacher assignment when monitoring LEAs through the
Comprehensive State Monitoring reviews. Particular attention will be
given to LEAs that data indicate need corrective actions to remedy
inequitable distribution of highly qualified and experienced teachers
and, more specifically, the LEAs in that group that are high-poverty,
high-minority, and/or identified for school improvement.
1. Information Systems Services staff will generate and disseminate to
designated Department of Education staff monthly reports of teacher
qualifications and assignments -- by LEA, schools within the LEA,
grade range, and core academic subject.
2. The Teacher Education and Certification Director will disseminate
monthly reports, with administrative annotations of comparisons to
the previous month's report, to designated Department administrators
and to field staff. Summaries will highlight assignments of
non-highly qualified teachers, including those who are: assigned
out-of-field, working under emergency or alternative certificates,
and/or [inexperienced]{.underline}.
3. Field staff will use progress report summaries during monthly
on-site technical assistance and monitoring work sessions with LEA
staff to review progress toward implementation of LEA Plans for
Highly Qualified Teachers. Field-based staff will address,
specifically, assignments of [inexperienced]{.underline} and
otherwise non-highly qualified teachers to ensure that progress is
being made toward achieving highly qualified staff and that
high-quality teacher mentoring and/or subject-specific coaching is
being provided in each case.
4. Field-based staff will submit formal monitoring updates to a team of
Department of Education staff biannually. The ADE team will review
monitoring reports, discuss challenges and solutions, and re-direct
resources to accomplish desired goals.
5. Cases on non-compliance that are not remedied immediately by the LEA
through established technical assistance, monitoring follow-up, and
(when needed) additional state support, will be forwarded to the
Deputy State Superintendent of Education-Professional Services
Division for administrative action.
In addition to the strategies described above, the Alabama Department of
Education will continue use of the state, LEA, and school report card
system to monitor and publicly report progress of LEAs toward reaching
and maintaining the goal of having all core academic subject teachers
highly qualified. It is believed that actions and strategies planned by
the Governor's Commission on Teaching Quality and described in this plan
will increase the number of highly qualified teachers and will target
access to those teachers to LEAs with hard-to-staff schools. The
Governor's Commission on Quality Teaching commenced work on January 17,
2006, and is expected to fully implement its recommendations over a
period of five years.
[^1]: *What Matters Most: Teaching for America's Future*, National
Commission on Teaching and America's Future, 1996
[^2]: *Teaching and Learning: Meeting the Challenge of High Standards --
A Report to the People of Alabama.* Montgomery, AL: A+ Education
Foundation. 1999, p. 3
[^3]: R. Ingersoll, cited in National Commission on Teaching and
America's Future*, No Dream Denied: A Pledge to America's Children*
(Washington, DC: NCTAF, 2003), pp. 27, 37.
[^4]: An "inexperienced" teacher is one who has taught a subject and/or
grade level for which he/she is properly certified for less than
three (3) full academic years.
[^5]: "High-minority" is the top quartile of schools when all schools in
the state are ranked from the highest to lowest percentage of
students identified by the state's demographic identifiers as
"minority." "Low-poverty" is the bottom quartile of schools from
that ranking method.
[^6]: For the purpose of identifying teachers as "inexperienced" and
are, thereby, the target audience for induction and/or teaching
mentoring, an "inexperienced" teacher is one who as taught for less
than three (3) full academic years.
[^7]: Sanders, W. L. & Rivers, J. C. (1998). Cumulative and residual
effects of teachers on future student academic achievement. In
Education Trust, *Thinking K-16: Good teaching matters: How well
qualified teachers can close the gap*.
[^8]: Ehrenberg. R. G. & Brewer, D. J. (1995). Did teachers' verbal
ability and race matter in the 1960s? Coleman revisited. *Economics
of Education Review, 14* (1), 1-21.
[^9]: Goldhaber, D. D. & Brewer, D. J. (1999). Teacher licensing and
student achievement. In M. Kanstoroom and C. Finn (Eds.), *Better
teachers, better schools*, (pp.215.238). Washington, DC: Thomas B.
Fordham Foundation.
[^10]: Ingersoll, R. (2001, January*). Teacher turnover, teacher
shortages, and the organization of schools*. Seattle: University of
Washington, Center for the Study of Teaching and Policy.
[^11]: Kirby, S., Naftel, S., & Berends, M. (1999). *Staffing at-risk
school districts in Texas: Problems and prospects*, pp. 57-58. Santa
Monica, CA: Rand.
[^12]: Smith, T., & Ingersoll, R. (2004). "What are the effects of
induction and mentoring on beginning teacher turnover?" *American
Educational Research Journal, 41*(2).
|
en
|
all-txt-docs
|
217859
|
SITE_ID,EPA_FACIL_ID,SITE_NAME,COUNTY,STATE,SITE_ALIAS_NAME,ALIAS_ID,ALIAS_ADDRESS,ALIAS_CITY,ALIAS_ZIP
0406924,NCSFN0406924,"V.C. CHEMICAL-WADESBORO",ANSON,NC,"VC CHEMICAL-WADESBORO",101,"STANBACK FERRY ROAD",WADESBORO,28170
0404280,NCD981475932,"FCX, INC. (WASHINGTON PLANT)",BEAUFORT,NC,"F C X (WASHINGTON PLANT)",101,"NC",BEAUFORT,
0404280,NCD981475932,"FCX, INC. (WASHINGTON PLANT)",BEAUFORT,NC,"F C X, INC (WASHINGTON PLANT)",201,"",NC,
0404280,NCD981475932,"FCX, INC. (WASHINGTON PLANT)",BEAUFORT,NC,"FCX, INC. (WASHINGTON PLANT)",202,"GRIMES RD",WASHINGTON,27889
0402763,NCD045922986,"FLANDERS FILTERS INC",BEAUFORT,NC,"FLANDERS FILTERS INC",101,"NC",BEAUFORT,
0405289,NCD003196847,"NATIONAL SPINNING CO",BEAUFORT,NC,"NATIONAL SPINNING CO",101,"NC",BEAUFORT,
0402628,NCD003184710,"CAROLINA CREOSOTING CORP",BRUNSWICK,NC,"CAROLINA CREOSOTING CORP",101,"NC",BRUNSWICK,
0402792,NCD051827905,"ESTECH GENL CHEMS CORP",BRUNSWICK,NC,"ESTECH GENL CHEMS CORP",101,"NC",NEW HANOVER,
0402792,NCD051827905,"ESTECH GENL CHEMS CORP",BRUNSWICK,NC,"SWIFT AGRI CHEM CORP",201,"NC",NEW HANOVER,
0403028,NCD980557805,"KERR-MCGEE CHEM CORP",BRUNSWICK,NC,"KERR-MCGEE CHEM CORP",101,"NC",BRUNSWICK,
0403028,NCD980557805,"KERR-MCGEE CHEM CORP",BRUNSWICK,NC,"KERR-MCGEE",201,"NC",BRUNSWICK,
0403122,NCD981023260,"POTTER'S SEPTIC TANK SERVICE PITS",BRUNSWICK,NC,"POTTER'S SEPTIC TANK SVS PITS",101,"NC",BRUNSWICK,
0403122,NCD981023260,"POTTER'S SEPTIC TANK SERVICE PITS",BRUNSWICK,NC,"POTTERS PIT",201,"NC",BRUNSWICK,
0403122,NCD981023260,"POTTER'S SEPTIC TANK SERVICE PITS",BRUNSWICK,NC,"POTTERS SEPTIC TANK",301,"NC",BRUNSWICK,
0403122,NCD981023260,"POTTER'S SEPTIC TANK SERVICE PITS",BRUNSWICK,NC,"POTTERS SEPTIC TANK",401,"NC",BRUNSWICK,
0403122,NCD981023260,"POTTER'S SEPTIC TANK SERVICE PITS",BRUNSWICK,NC,"POTTER'S SEPTIC TANK SERVICE PITS",402,"OFF 74-76",SANDY CREEK,27541
0403122,NCD981023260,"POTTER'S SEPTIC TANK SERVICE PITS",BRUNSWICK,NC,"POTTER'S SEPTIC TANK SERVICE PITS",403,"OFF 74-76 NEAR SANDY CREEK & NORTHWEST",MACO,28451
0405579,NC0210020541,"US DOD MILITARY OCEAN TER./SUNNY POINT",BRUNSWICK,NC,"SUNNY POINT MILITARY OCEAN TERMINAL",4270166,"ATTN: MTE SU-FE",SOUTHPORT,37388
0402586,NCD001704980,"WILMINGTON BRANCH",BRUNSWICK,NC,"WILMINGTON BRANCH",101,"NC",BRUNSWICK,
0406895,NCD044447589,"BLUE RIDGE PLATING COMPANY",BUNCOMBE,NC,"BLUE RIDGE PLATING COMPANY",101,"171 GLENN BRIDGE ROAD",ARDEN,28704
0402957,NCD095459392,"CHEMTRONICS, INC.",BUNCOMBE,NC,"CHEMTRONICS INC",101,"NC",BUNCOMBE,
0402957,NCD095459392,"CHEMTRONICS, INC.",BUNCOMBE,NC,"AMCEL PROPULSION INC.(NCD980557995)",201,"NC",BUNCOMBE,
0402957,NCD095459392,"CHEMTRONICS, INC.",BUNCOMBE,NC,"AMCEL PROPULSION INC",301,"NC",BUNCOMBE,
0402957,NCD095459392,"CHEMTRONICS, INC.",BUNCOMBE,NC,"CHEMTRONICS, INC",302,"OLD BEE TREE RD",SWANNANOA,28778
0402957,NCD095459392,"CHEMTRONICS, INC.",BUNCOMBE,NC,"CHEMTRONICS, INC.",303,"OLD BEE TREE RD",SWANNANOA,28778
0405443,NCD062548995,"QUORUM KNITTING",BUNCOMBE,NC,"QUORUM KNITTING",101,"NC",BUNCOMBE,
0402833,NCD062552153,"SAYLES-BILTMORE BLEACHERIES",BUNCOMBE,NC,"SAYLES-BILTMORE BLEACHERIES",101,"NC",BUNCOMBE,
0402753,NCD044440303,"BYPASS 601 GROUND WATER CONTAMINATION",CABARRUS,NC,"BYPASS 601 GROUNDWATER CONTAMINATION",101,"NC",CABARRUS,
0402753,NCD044440303,"BYPASS 601 GROUND WATER CONTAMINATION",CABARRUS,NC,"MARTIN'S SCRAP RECYCLING INC",201,"NC",CABARRUS,
0402753,NCD044440303,"BYPASS 601 GROUND WATER CONTAMINATION",CABARRUS,NC,"BYPASS 601 GROUND WATER CONTAMINATION",202,"440 HWY 29 NORTH",CONCORD,28025
0402688,NCD003448610,"GALVAN INDUSTRIES INC",CABARRUS,NC,"GALVAN INDUSTRIES INC",101,"NC",CABARRUS,
0402932,NCD086871282,"CALDWELL SYSTEMS INC",CALDWELL,NC,"CALDWELL SYSTEMS INC",101,"NC",CALDWELL,
0402932,NCD086871282,"CALDWELL SYSTEMS INC",CALDWELL,NC,"CALDWELL COUNTY LANDFILL",201,"",NC,
0402932,NCD086871282,"CALDWELL SYSTEMS INC",CALDWELL,NC,"HAAS, TRUITT PROPERTY (FORMER)",301,"",NC,
0403183,NC5210022906,"USA RESERVE XVIII AIRBORNE CORPS",CARTERET,NC,"USA RESERVE XVIII AIRBORNE CORPS",101,"NC",CARTERET,
0403183,NC5210022906,"USA RESERVE XVIII AIRBORNE CORPS",CARTERET,NC,"MOREHEAD CITY ARMY RESERVE CENTER",4270084,"405 FISHER ST",MOREHEAD CITY,36115-2601
0402802,NCD053488557,"SOUTHERN WOOD PIEDMONT CO",CHATHAM,NC,"SOUTHERN WOOD PIEDMONT CO",101,"NC",CHATHAM,
0402687,NCD003446721,"CELANESE CORP. (SHELBY FIBER OPERATIONS)",CLEVELAND,NC,"CELANESE CORP SHELBY FIBER OPERATIONS",101,"NC",CLEVELAND,
0402687,NCD003446721,"CELANESE CORP. (SHELBY FIBER OPERATIONS)",CLEVELAND,NC,"FIBER INDUSTRIES INC",201,"NC",CLEVELAND,
0402687,NCD003446721,"CELANESE CORP. (SHELBY FIBER OPERATIONS)",CLEVELAND,NC,"CELANESE CORP. (SHELBY FIBER OPERATIONS)",202,"HWY 198",SHELBY,28150
0402705,NCD024459471,"GUYTON BATTERY SERVICE",COLUMBUS,NC,"GUYTON BATTERY SERVICE",101,"NC",COLUMBUS,
0403159,NCD991278631,"HOLTRA CHEM/HONEYWELL INC.",COLUMBUS,NC,"LCP CHEMS-NC INC",101,"NC",COLUMBUS,
0403159,NCD991278631,"HOLTRA CHEM/HONEYWELL INC.",COLUMBUS,NC,"LCP CHEMS/ACME PLT",201,"NC",COLUMBUS,
0403159,NCD991278631,"HOLTRA CHEM/HONEYWELL INC.",COLUMBUS,NC,"LCP CHEMS-NC INC",202,"IND DR",RIEGELWOOD,28456
0406962,NCSFN0406962,"VINEGAR HILL LEAD SITE",COLUMBUS,NC,"WILLIAM STORE SITE",101,"701 N & MINOS MEARS",TABOR CITY,,28463
0402720,NCD024766719,"WRIGHT CHEMICAL CORP",COLUMBUS,NC,"WRIGHT CHEMICAL CORP",101,"NC",COLUMBUS,
0403174,NC1170027261,"CHERRY POINT MARINE CORPS AIR STATION",CRAVEN,NC,"USMC AIR STATION CHERRY POINT",101,"NC",CRAVEN,
0403174,NC1170027261,"CHERRY POINT MARINE CORPS AIR STATION",CRAVEN,NC,"USMCAS/MAG 14 SUPPLY",201,"NC",CRAVEN,
0403174,NC1170027261,"CHERRY POINT MARINE CORPS AIR STATION",CRAVEN,NC,"US MARINE CORPS/EOD RANGE",301,"NC",CRAVEN,
0403174,NC1170027261,"CHERRY POINT MARINE CORPS AIR STATION",CRAVEN,NC,"USMC/TRNG AREA 4",401,"NC",CRAVEN,
0403174,NC1170027261,"CHERRY POINT MARINE CORPS AIR STATION",CRAVEN,NC,"USMC/DEF PROP DSPL OFC",501,"NC",CRAVEN,
0403174,NC1170027261,"CHERRY POINT MARINE CORPS AIR STATION",CRAVEN,NC,"USMCAS/OLD SAN LDFL",601,"NC",CRAVEN,
0403174,NC1170027261,"CHERRY POINT MARINE CORPS AIR STATION",CRAVEN,NC,"USMC/DEF PROP DSPL OFC",701,"NC",CRAVEN,
0403174,NC1170027261,"CHERRY POINT MARINE CORPS AIR STATION",CRAVEN,NC,"USMCAS/IND SLUDGE PIT",801,"NC",CRAVEN,
0403174,NC1170027261,"CHERRY POINT MARINE CORPS AIR STATION",CRAVEN,NC,"USMCAS/INCIN",901,"NC",CRAVEN,
0403174,NC1170027261,"CHERRY POINT MARINE CORPS AIR STATION",CRAVEN,NC,"USMCAS/FACILS MANITENANCE COMPOUND",1001,"NC",CRAVEN,
0403174,NC1170027261,"CHERRY POINT MARINE CORPS AIR STATION",CRAVEN,NC,"USMCAS/CRASH CREW TRNING BERMS/RUNWAY 28",1101,"NC",CRAVEN,
0403174,NC1170027261,"CHERRY POINT MARINE CORPS AIR STATION",CRAVEN,NC,"USMC/DEF PROP DSPL OFC",1201,"NC",CRAVEN,
0403174,NC1170027261,"CHERRY POINT MARINE CORPS AIR STATION",CRAVEN,NC,"USMCAS/GREASE PIT",1301,"NC",CRAVEN,
0403174,NC1170027261,"CHERRY POINT MARINE CORPS AIR STATION",CRAVEN,NC,"CHERRY POINT MARINE CORPS AIR STATION",1302,"NC HWY 101",CHERRY POINT,28533
0403174,NC1170027261,"CHERRY POINT MARINE CORPS AIR STATION",CRAVEN,NC,"CHERRY POINT MARINE CORPS AIR STATION",1303,"ROOSEVELT BLVD. AND SLOCUM RD.",HAVELOCK,28533
0403174,NC1170027261,"CHERRY POINT MARINE CORPS AIR STATION",CRAVEN,NC,"MARINE CORPS AIR STATION CHERRY POINT",4270076,"US HWY 101 & US HWY 70",CHERRY POINT,38113
0402649,NCD003201837,"ENCEE CHEMICAL SALES INC",CRAVEN,NC,"ENCEE CHEMICAL SALES INC",101,"NC",CRAVEN,
0405543,NCD980802839,"USMC SLOCUM CRK MARINE CORPS AIR STA",CRAVEN,NC,"USMC SLOCUM CRK MARINE CORPS AIR STA",101,"NC",CRAVEN,
0402634,NCD003188828,"CAPE FEAR WOOD PRESERVING",CUMBERLAND,NC,"CAPE FEAR WOOD PRESERVING",101,"NC",CUMBERLAND,
0402634,NCD003188828,"CAPE FEAR WOOD PRESERVING",CUMBERLAND,NC,"CAPE FEAR WOOD PRESERVING",102,"REILLY RD",FAYETTEVILLE,28303
0402635,NCD003188844,"CAROLINA TRANSFORMER CO.",CUMBERLAND,NC,"CAROLINA TRANSFORMER",101,"NC",CUMBERLAND,
0402635,NCD003188844,"CAROLINA TRANSFORMER CO.",CUMBERLAND,NC,"CAROLINA TRANSFORMER CO",102,"HWY 301 N EASTERN BLVD",FAYETTEVILLE,28301
0402635,NCD003188844,"CAROLINA TRANSFORMER CO.",CUMBERLAND,NC,"CAROLINA TRANSFORMER CO.",103,"HWY 301 N EASTERN BLVD",FAYETTEVILLE,28301
0407456,NCD986178226,"TEXFI BLENDS INC.",CUMBERLAND,NC,"TEXFI BLENDS INC.",101,"",,
0407456,NCD986178226,"TEXFI BLENDS INC.",CUMBERLAND,NC,"TEXFI BLENDS",102,"601 HOFFER DRIVE",FAYETTEVILLE,28301
0405135,NC1690308233,"CAPE HATTERAS NATIONAL SEASHORE",DARE,NC,"NPS-CAPE HATTERAS NATIONAL SEASHORE",4270162,"DARE COUNTY",RODANTHE,32055
0402542,NCD000648402,"BATTERY TECH (DURACELL-LEXINGTON)",DAVIDSON,NC,"BATTERY TECH (DURACELL LEXINGTON)",101,"NC",DAVIDSON,
0402542,NCD000648402,"BATTERY TECH (DURACELL-LEXINGTON)",DAVIDSON,NC,"FARMERS MUTUAL EXCHANGE",201,"NC",DAVIDSON,
0403008,NCD980557581,"LEXINGTON MUNI LDFL",DAVIDSON,NC,"LEXINGTON MUNI LDFL",101,"NC",DAVIDSON,
0406956,NCSFN0406956,"BALL ROAD TRAILER",DURHAM,NC,"DURHAM ABANDONED DRUMS SITE",101,"7208 BALL ROAD",BAHAMA,275039438
0405234,NCD037160116,"SCM-GLIDDEN METAL FINISHERS",DURHAM,NC,"SCM-GLIDDEN METAL FINISHERS",101,"NC",DURHAM,
0405582,NC6680090002,"US EPA TECH CTR",DURHAM,NC,"TECHNOLOGY CENTER",4270169,"HWY 54 & ALEXANDER DRIVE",RESEARCH TRIANGLE PARK,35160
0403196,NC8210021624,"USA RESERVE XVIII AIRBORNE CORPS",EDGECOMBE,NC,"USA RESERVE XVIII AIRBORNE CORPS",101,"NC",EDGE,
0403196,NC8210021624,"USA RESERVE XVIII AIRBORNE CORPS",EDGECOMBE,NC,"ROCKY MOUNT ARMY RESERVE CENTER",4270095,"804 FAIRVIEW RD",ROCKY MOUNT,37319
0402549,NCD000770487,"JOHNSON CONTROLS GLOBE BATTERY DIV",FORSYTH,NC,"JOHNSON CONTROLS GLOBE BATTERY DIV",101,"NC",FORSYTH,
0402755,NCD044444735,"CROMPTON & KNOWLES CORP",GASTON,NC,"CROMPTON & KNOWLES CORP",101,"NC",GASTON,
0405489,NCD986175644,"DAVIS PARK ROAD TCE",GASTON,NC,"DAVIS PARK ROAD TCE SITE",101,"",,
0405489,NCD986175644,"DAVIS PARK ROAD TCE",GASTON,NC,"DAVIS PARK ROAD TCE",102,"2307 DAVIS PARK ROAD",GASTONIA,28052
0403079,NCD980729602,"JADCO-HUGHES FACILITY",GASTON,NC,"JADCO-HUGHES",101,"NC",GASTON,
0403079,NCD980729602,"JADCO-HUGHES FACILITY",GASTON,NC,"JADCO",201,"NC",GASTON,
0403079,NCD980729602,"JADCO-HUGHES FACILITY",GASTON,NC,"JADCO-HUGHES FACILITY",202,"NC HWY 2035",BELMONT,28012
0406610,NCD986223170,"MCBESS INDUSTRIES",GASTON,NC,"MCBESS IND HIGH SHOALS DIVISION",101,"",NC,
0405619,NCD986187128,"NORTH BELMONT PCE",GASTON,NC,"NORTH BELMONT PCE SITE",4270029,"",,
0405619,NCD986187128,"NORTH BELMONT PCE",GASTON,NC,"NORTH BELMONT PCE",4270030,"WOODLAWN ROAD AT CHURCH STREET",NORTH BELMONT,28012
0405619,NCD986187128,"NORTH BELMONT PCE",GASTON,NC,"NORTH BELMONT PCE",4270031,"WOODLAWN AVENUE",NORTH BELMONT,28012
0404841,NC0980557979,"USFS NANTAHALA NATIONAL FOREST",GRAHAM,NC,"USDA-FS GRAHAM COUNTY LANDFILL",101,"ATOHAH ROAD",GRAHAM,28771
0404841,NC0980557979,"USFS NANTAHALA NATIONAL FOREST",GRAHAM,NC,"USDA-FS GRAHAM COUNTY LANDFILL",102,"",NC,
0404841,NC0980557979,"USFS NANTAHALA NATIONAL FOREST",GRAHAM,NC,"SWAIN COUNTY LANDFILL",201,"ON BUCKNER'S RANCH",BRYSON CITY,28713
0404841,NC0980557979,"USFS NANTAHALA NATIONAL FOREST",GRAHAM,NC,"SWAIN COUNTY LANDFILL",202,"",NC,
0404841,NC0980557979,"USFS NANTAHALA NATIONAL FOREST",GRAHAM,NC,"NANTAHALA NF: GRAHAM COUNTY LANDFILL",4270160,"NORTH OF SNOWBIRD MOUNTAIN",ROBBINSVILLE,39309-5003
0404327,NCD122263825,"JFD ELECTRONICS/CHANNEL MASTER",GRANVILLE,NC,"JFD ELECTRONICS/CHANNEL MASTER",101,"NC",GRANVILLE,
0404327,NCD122263825,"JFD ELECTRONICS/CHANNEL MASTER",GRANVILLE,NC,"JFD ELECTRONICS/CHANNEL MASTER",102,"INDUSTRY DRIVE",OXFORD,27565
0403075,NCD980729412,"CAROLINA TANK CLEANING CO",GUILFORD,NC,"CAROLINA TANK CLEANING CO",101,"NC",GUILFORD,
0403006,NCD980557565,"HIGH POINT CITY LANDFILL",GUILFORD,NC,"HIGH POINT CITY LANDFILL",101,"NC",GUILFORD,
0403006,NCD980557565,"HIGH POINT CITY LANDFILL",GUILFORD,NC,"HIGH POINT/CITY OFF",201,"",NC,
0402961,NCD096165121,"TEXACO INC",GUILFORD,NC,"TEXACO INC",101,"NC",GUILFORD,
0403125,NCD981027915,"J STREET SITE",HARNETT,NC,"J STREET SITE",101,"NC",HARNETT,
0406989,NCSFN0406989,"BARBER ORCHARD",HAYWOOD,NC,"BARBER ORCHARD",101,"U.S. HIGHWAY 23/74",WAYNESVILLE,28786
0406989,NCSFN0406989,"BARBER ORCHARD",HAYWOOD,NC,"BARBER ORCHARD",102,"",,
0403124,NCD981026479,"BENFIELD INDUSTRIES, INC.",HAYWOOD,NC,"BENFIELD INDUSTRIES, INC",101,"NC",HAYWOOD,
0403124,NCD981026479,"BENFIELD INDUSTRIES, INC.",HAYWOOD,NC,"BENFIELD INDUSTRIES, INC",102,"RICHLAND ST.",HAZELWOOD,28738
0403124,NCD981026479,"BENFIELD INDUSTRIES, INC.",HAYWOOD,NC,"BENFIELD INDUSTRIES, INC.",103,"RICHLAND ST.",HAZELWOOD,28738
0402893,NCD079044426,"GENERAL ELECTRIC CO/SHEPHERD FARM",HENDERSON,NC,"GENL ELEC CO LSD",101,"NC",HENDERSON,
0402893,NCD079044426,"GENERAL ELECTRIC CO/SHEPHERD FARM",HENDERSON,NC,"GE/DRY/PND",201,"NC",HENDERSON,
0402893,NCD079044426,"GENERAL ELECTRIC CO/SHEPHERD FARM",HENDERSON,NC,"G E WASTE PROC WATER POND",301,"NC",HENDERSON,
0402893,NCD079044426,"GENERAL ELECTRIC CO/SHEPHERD FARM",HENDERSON,NC,"GENERAL ELECTRIC CO./SHEPHERD FARM",302,"SPARTANBURG HWY",EAST FLAT ROCK,28726
0402893,NCD079044426,"GENERAL ELECTRIC CO/SHEPHERD FARM",HENDERSON,NC,"GENERAL ELECTRIC CO/SHEPHERD FARM",303,"SPARTANBURG HWY",EAST FLAT ROCK,28726
0402844,NCD065288847,"CF INDS INC",HERTFORD,NC,"CF INDS INC",101,"NC",HERTFORD,
0402844,NCD065288847,"CF INDS INC",HERTFORD,NC,"NC NITROGEN COMPLEX",201,"NC",HERTFORD,
0403190,NC6570027460,"USAF DARE COUNTY RANGE SEYMOUR JOHNSON",HYDE,NC,"USAF DARE COUNTY RANGE SEYMOUR JOHNSON",101,"NC",HYDE,
0404225,NCD095458527,"FCX, INC. (STATESVILLE PLANT)",IREDELL,NC,"F C X., INC (STATESVILLE PLANT)",101,"NC",IREDELL,
0404225,NCD095458527,"FCX, INC. (STATESVILLE PLANT)",IREDELL,NC,"FCX, INC. (STATESVILLE PLANT)",102,"1620 W. FRONT ST.",STATESVILLE,28677
0406611,NCD062555792,"SIGMON'S SEPTIC TANK SERVICE",IREDELL,NC,"AAA ENTERPRISES",101,"EUFOLA ROAD OFF BUFFALO SHOALS",STATESVILLE,28677
0406611,NCD062555792,"SIGMON'S SEPTIC TANK SERVICE",IREDELL,NC,"AAA ENTERPRISES",102,"",NC,
0406611,NCD062555792,"SIGMON'S SEPTIC TANK SERVICE",IREDELL,NC,"SIGMON'S SEPTIC TANK SERVICE",103,"1268 EUFOLA ROAD",STATESVILLE,28677
0405199,NCD981744618,"UNITED ORGANICS",MARTIN,NC,"UNITED ORGANICS",101,"NC",MARTIN,
0403156,NCD991278540,"WEYERHAEUSER CO PLYMOUTH WOOD TRTNG PT",MARTIN,NC,"WEYERHAUSER CO WOOD TREATING PLT",0,"",,
0403156,NCD991278540,"WEYERHAEUSER CO PLYMOUTH WOOD TRTNG PT",MARTIN,NC,"WEYERHAEUSER CO PLYMOUTH WOOD TRTNG PT",101,"NC",MARTIN,
0403156,NCD991278540,"WEYERHAEUSER CO PLYMOUTH WOOD TRTNG PT",MARTIN,NC,"WEYERHAEUSER CO PLYMOUTH WOOD TRTNG PT",201,"NC",MARTIN,
0406402,NCD024740433,"E. C. MANUFACTURING",MECKLENBURG,NC,"EVERLOCK CHARLOTTE DIVISION",101,"",NC,
0402591,NCD002462414,"JONES CHEMICALS INC OF NORTH CAROLINA",MECKLENBURG,NC,"JONES CHEMICALS INC OF NORTH CAROLINA",101,"NC",MECKLENBURG,
0407421,NCD097361018,"KIN PROPERTIES ABANDONED DRUMS",MECKLENBURG,NC,"EASTERN ELECTRIC APPARATUS REPAIR CO.",101,"920 EASTWAY DRIVE",CHARLOTTE,28218
0402588,NCD001810365,"MARTIN-MARIETTA, SODYECO, INC.",MECKLENBURG,NC,"MARTIN MARIETTA-SODYECO DIVISION",101,"NC",MECKLENBURG,
0402588,NCD001810365,"MARTIN-MARIETTA, SODYECO, INC.",MECKLENBURG,NC,"MARTIN MARIETTA-SODYECO DIVISION",201,"NC",MECKLENBURG,
0402588,NCD001810365,"MARTIN-MARIETTA, SODYECO, INC.",MECKLENBURG,NC,"MARTIN-MARIETTA, SODYECO, INC",202,"HWY 27 W",CHARLOTTE,28210
0402588,NCD001810365,"MARTIN-MARIETTA, SODYECO, INC.",MECKLENBURG,NC,"MARTIN-MARIETTA, SODYECO, INC.",203,"HWY 27 W",CHARLOTTE,28210
0402588,NCD001810365,"MARTIN-MARIETTA, SODYECO, INC.",MECKLENBURG,NC,"MARTIN-MARIETTA, SODYECO, INC.",204,"HWY 27 W",CHARLOTTE,28214
0406303,NCD982096653,"RAM LEATHER CARE SITE",MECKLENBURG,NC,"RAM LEATHER CARE",101,"15100 ALBEMARLE RD.",CHARLOTTE,28227
0405508,NCD986176030,"RHODERIA DRIVE WELLS",MECKLENBURG,NC,"RHODERA DRIVE WELLS",101,"2126 RHODERA DRIVE",MATTHEWS,28106
0406112,NCD986232213,"SUMMIT RESOURCE MANAGEMENT",MECKLENBURG,NC,"SUMMIT RESOURCE MANGEMENT",101,"3481 GRIBBLE ROAD",MATTHEWS,28105
0406103,NCD986231967,"TOM SADLER ROAD WELLS",MECKLENBURG,NC,"TOM SANDLER ROAD WELLS",101,"2128 TOM SADLER ROAD",CHARLOTTE,28214
0406103,NCD986231967,"TOM SADLER ROAD WELLS",MECKLENBURG,NC,"TOM SADLER ROAD WELLS",102,"2128 TOM SADLER ROAD",CHARLOTTE,28214
0403099,NCD980843346,"ABERDEEN PESTICIDE DUMPS",MOORE,NC,"ABERDEEN PESTICIDE DUMPS",101,"NC",MOORE,
0403099,NCD980843346,"ABERDEEN PESTICIDE DUMPS",MOORE,NC,"FARM CHEMICAL",201,"NC",MOORE,
0403099,NCD980843346,"ABERDEEN PESTICIDE DUMPS",MOORE,NC,"ROUTE 211",301,"NC",MOORE,
0403099,NCD980843346,"ABERDEEN PESTICIDE DUMPS",MOORE,NC,"FAIRWAY SIX",401,"NC",MOORE,
0403099,NCD980843346,"ABERDEEN PESTICIDE DUMPS",MOORE,NC,"ABERDEEN PESTICIDES TWIN SITES",501,"NC",MOORE,
0403099,NCD980843346,"ABERDEEN PESTICIDE DUMPS",MOORE,NC,"MCIVER PESTICIDE SITE",601,"NC",MOORE,
0403099,NCD980843346,"ABERDEEN PESTICIDE DUMPS",MOORE,NC,"RT.211-ABERDEEN PESTICIDES",901,"NC",MOORE,
0403099,NCD980843346,"ABERDEEN PESTICIDE DUMPS",MOORE,NC,"ABERDEEN PESTICIDE DUMPS",902,"OFF HWY 5 W",ABERDEEN,28315
0402775,NCD048181218,"CAROLINA GALVANIZING CORP",MOORE,NC,"CAROLINA GALVANIZING CORP",101,"NC",MOORE,
0404170,NCD981927502,"GEIGY CHEMICAL CORP. (ABERDEEN PLANT)",MOORE,NC,"GEIGY CHEMICAL CORP.",101,"NC",MOORE,
0404170,NCD981927502,"GEIGY CHEMICAL CORP. (ABERDEEN PLANT)",MOORE,NC,"GEIGY CHEMICAL CORP. (ABERDEEN PLANT)",201,"",NC,
0404170,NCD981927502,"GEIGY CHEMICAL CORP. (ABERDEEN PLANT)",MOORE,NC,"GEIGY CHEMICAL CORP. (ABERDEEN PLANT)",202,"RT.211,.4MI WEST OF SR 2063",ABERDEEN,28315
0402681,NCD003234549,"SCM PROCTOR SILEX",MOORE,NC,"SCM PROCTOR SILEX",101,"NC",MOORE,
0402813,NCD055359079,"MASONITE CORP FIBERBOARD DIV",NASH,NC,"MASONITE CORP FIBERBOARD DIV",101,"NC",NASH,
0402580,NCD000830646,"CAROLINA P&L CO SUTTON STEAM ELEC PLT",NEW HANOVER,NC,"CAROLINA P&L CO SUTTON STEAM ELEC PLT",101,"NC",NEW HANOVER,
0403030,NCD980557821,"DOW CHEM PLT CAPE FEAR",NEW HANOVER,NC,"DOW CHEM PLT CAPE FEAR",101,"NC",NEW HANOVER,
0403139,NCD990734055,"HERCOFINA",NEW HANOVER,NC,"HERCOFINA",101,"NC",NEW HANOVER,
0403139,NCD990734055,"HERCOFINA",NEW HANOVER,NC,"HERCOFINA/HANOVER PLT",201,"NC",NEW HANOVER,
0403139,NCD990734055,"HERCOFINA",NEW HANOVER,NC,"HANOVER PLT INJ WELL (HERCOFINA)",301,"NC",NEW HANOVER,
0403139,NCD990734055,"HERCOFINA",NEW HANOVER,NC,"HERCOFINA/HANOVER PLT",401,"NC",NEW HANOVER,
0403139,NCD990734055,"HERCOFINA",NEW HANOVER,NC,"HANOVER PLT WST ACT SLUDGE LA (HERCOFINA",501,"NC",NEW HANOVER,
0403139,NCD990734055,"HERCOFINA",NEW HANOVER,NC,"HANOVER PLT PROC WST LA (HERCOFINA)",601,"NC",NEW HANOVER,
0403139,NCD990734055,"HERCOFINA",NEW HANOVER,NC,"NEW HANOVER CO LDFL",701,"NC",NEW HANOVER,
0403120,NCD981021157,"NEW HANOVER CNTY AIRPORT BURN PIT",NEW HANOVER,NC,"NEW HANOVER COUNTY AIRPORT BURN PIT",101,"NC",NEW HANOVER,
0403120,NCD981021157,"NEW HANOVER CNTY AIRPORT BURN PIT",NEW HANOVER,NC,"NEW HANOVER CNTY AIRPORT BURN PIT",102,"GARDNER DRIVE",WILMINGTON,28401
0406973,NCSFN0406973,"NORTHEAST CHEMICAL COMPANY SITE",NEW HANOVER,NC,"FLOWERS PROPERTY SITE",101,"U.S. HIGHWAY 421 NORTH",WILMINGTON,28401
0405590,NCD986187094,"REASOR CHEMICAL COMPANY",NEW HANOVER,NC,"REASOR CHEMICAL COMPANY",101,"5100 NORTH COLLEGE ROAD",CASTLE HAYNE,28429
0402821,NCD058517467,"SOUTHERN WOOD PIEDMONT CO#",NEW HANOVER,NC,"SOUTHERN WOOD PIEDMONT CO#",101,"NC",NEW HANOVER,
0402821,NCD058517467,"SOUTHERN WOOD PIEDMONT CO#",NEW HANOVER,NC,"SOUTHERN WOOD PIEDMONT CO#",201,"NC",NEW HANOVER,
0406754,NC0002178580,"V.C. CHEMICAL-ALMONT WORKS",NEW HANOVER,NC,"V.C. CHEMICAL - ALMONT WORKS",101,"2400 U.S. HIGHWAY 421 NORTH",WILMINGTON,28401
0406754,NC0002178580,"V.C. CHEMICAL-ALMONT WORKS",NEW HANOVER,NC,"V.C. CHEMICAL- ALMONT WORKS",102,"2400 U.S. HIGHWAY 421 NORTH",WILMINGTON,28401
0402718,NCD024644494,"ABC ONE HOUR CLEANERS",ONSLOW,NC,"ABC ONE HOUR CLEANERS",101,"NC",ONSLOW,
0402718,NCD024644494,"ABC ONE HOUR CLEANERS",ONSLOW,NC,"ABC ONE HOUR CLEANERS",102,"2127 LE JEUNE BLVD.",JACKSONVILLE,28540
0403185,NC6170022580,"CAMP LEJEUNE MILITARY RES. (USNAVY)",ONSLOW,NC,"USMC CAMP LEJEUNE MILITARY RESERVATION",101,"NC",ONSLOW,
0403185,NC6170022580,"CAMP LEJEUNE MILITARY RES. (USNAVY)",ONSLOW,NC,"USMC/LOT 140, HADNOT POINT ARE (SITE 7)",201,"NC",ONSLOW,
0403185,NC6170022580,"CAMP LEJEUNE MILITARY RES. (USNAVY)",ONSLOW,NC,"USMC/BLDGS TP452 & TP451 (SITE 10)",301,"NC",ONSLOW,
0403185,NC6170022580,"CAMP LEJEUNE MILITARY RES. (USNAVY)",ONSLOW,NC,"USMC/HADNOT POINT BURN DUMP (SITE 3)",401,"NC",ONSLOW,
0403185,NC6170022580,"CAMP LEJEUNE MILITARY RES. (USNAVY)",ONSLOW,NC,"USMC/FIRE FIGHTING TRAINING PIT (SITE 11",501,"NC",ONSLOW,
0403185,NC6170022580,"CAMP LEJEUNE MILITARY RES. (USNAVY)",ONSLOW,NC,"USMC/STORAGE LOTS 201 & 203 (SITE 12)",601,"NC",ONSLOW,
0403185,NC6170022580,"CAMP LEJEUNE MILITARY RES. (USNAVY)",ONSLOW,NC,"USMC/CAMP GEIGER DUMP (SITE 4)",701,"NC",ONSLOW,
0403185,NC6170022580,"CAMP LEJEUNE MILITARY RES. (USNAVY)",ONSLOW,NC,"USMC/BASE SAN LDFL ( SITE 5 )",801,"NC",ONSLOW,
0403185,NC6170022580,"CAMP LEJEUNE MILITARY RES. (USNAVY)",ONSLOW,NC,"USMC/CHEM LDFL ( SITE 1 )",901,"NC",ONSLOW,
0403185,NC6170022580,"CAMP LEJEUNE MILITARY RES. (USNAVY)",ONSLOW,NC,"USMC/BLDG PT 37 ( SITE 6 )",1001,"NC",ONSLOW,
0403185,NC6170022580,"CAMP LEJEUNE MILITARY RES. (USNAVY)",ONSLOW,NC,"USMC/K-326 RANGE (SITE 8)",1101,"NC",ONSLOW,
0403185,NC6170022580,"CAMP LEJEUNE MILITARY RES. (USNAVY)",ONSLOW,NC,"USMC/G4A RANGE (SITE 9)",1201,"NC",ONSLOW,
0403185,NC6170022580,"CAMP LEJEUNE MILITARY RES. (USNAVY)",ONSLOW,NC,"USMC CAMP LEJEUNE",1616,"",,
0403185,NC6170022580,"CAMP LEJEUNE MILITARY RES. (USNAVY)",ONSLOW,NC,"USMC CAMP LEJEUNE",1617,"",,
0403185,NC6170022580,"CAMP LEJEUNE MILITARY RES. (USNAVY)",ONSLOW,NC,"CAMP LEJEUNE MILITARY RES. (USNAVY)",1618,"NC HWY 24 & US HWY 16",CAMP LEJEUNE,28542
0403185,NC6170022580,"CAMP LEJEUNE MILITARY RES. (USNAVY)",ONSLOW,NC,"CAMP LEJEUNE MILITARY RES. (USNAVY)",1619,"NC HWY 24 & US HWY 16",ONSLOW COUNTY,28542
0403185,NC6170022580,"CAMP LEJEUNE MILITARY RES. (USNAVY)",ONSLOW,NC,"CAMP LEJEUNE MILITARY RESERVATION",4270086,"NC HWY 24 & US HWY 16",CAMP LEJEUNE,33131
0402650,NCD980515308,"UNIVERSITY OF NORTH CAROLINA CHAPEL HILL",ORANGE,NC,"UNIVERSITY OF NORTH CAROLINA CHAPEL HILL",101,"NC",ORANGE,
0404918,NCD986166163,"JENNINGS (DON) PROPERTY",PASQUOTANK,NC,"JENNINGS (DON) PROPERTY",101,"NC",PASQUOTANK,
0402933,NCD087336335,"TRIANGLE PACIFIC CORP IXL DIVISION",PASQUOTANK,NC,"TRIANGLE PACIFIC CORP IXL DIVISION",101,"NC",PASQUOTANK,
0404948,NCD981864614,"ULAH BATTERY LEAD RECLAIMING",RANDOLPH,NC,"ULAH BATTERY LEAD RECLAIMING",101,"KY",RANDOLPH,
0403095,NCD980840409,"CHARLES MACON LAGOON AND DRUM STORAGE",RICHMOND,NC,"CHARLES MACON LAGOON & DRUM STORAGE",101,"NC",RICHMOND,
0403095,NCD980840409,"CHARLES MACON LAGOON AND DRUM STORAGE",RICHMOND,NC,"MACON SITE 1 MI S OF CORDOVA",201,"NC",RICHMOND,
0403095,NCD980840409,"CHARLES MACON LAGOON AND DRUM STORAGE",RICHMOND,NC,"MACON MACHINE CO",301,"NC",RICHMOND,
0403095,NCD980840409,"CHARLES MACON LAGOON AND DRUM STORAGE",RICHMOND,NC,"CHARLES MACON LAGOON & DRUM STORAGE",302,"COUNTY RD 1103",CORDOVA,28330
0403095,NCD980840409,"CHARLES MACON LAGOON AND DRUM STORAGE",RICHMOND,NC,"CHARLES MACON LAGOON AND DRUM STORAGE",303,"COUNTY RD 1103",CORDOVA,28330
0403094,NCD980840342,"DOCKERY PROPERTY",RICHMOND,NC,"DOCKERY PROPERTY",101,"NC",RICHMOND,
0403094,NCD980840342,"DOCKERY PROPERTY",RICHMOND,NC,"CHARLES MACON LAGOON & DRUM",201,"",NC,
0403168,NCD991278953,"NATIONAL STARCH & CHEMICAL CORP.",ROWAN,NC,"NATIONAL STARCH & CHEM CORP",101,"NC",ROWAN,
0403168,NCD991278953,"NATIONAL STARCH & CHEMICAL CORP.",ROWAN,NC,"PROCTOR CHEMICAL CO. INC(NCD000623116)",201,"NC",ROWAN,
0403168,NCD991278953,"NATIONAL STARCH & CHEMICAL CORP.",ROWAN,NC,"NATIONAL STARCH & CHEM CORP",301,"NC",ROWAN,
0403168,NCD991278953,"NATIONAL STARCH & CHEMICAL CORP.",ROWAN,NC,"NATIONAL STARCH & CHEMICAL CORP",302,"CEDAR SPRINGS RD",SALISBURY,28144
0403168,NCD991278953,"NATIONAL STARCH & CHEMICAL CORP.",ROWAN,NC,"NATIONAL STARCH & CHEMICAL CORP.",303,"CEDAR SPRINGS RD",SALISBURY,28144
0403077,NCD980729537,"CAMP STRAUSS",TRANSYLVANIA,NC,"CAMP STRAUSS",101,"NC",TRANSYLVANIA,
0402618,NCD003166675,"ECUSTA MILL",TRANSYLVANIA,NC,"OLIN CORP ECUSTA PAPER & FILM GROUP",101,"NC",TRANSYLVANIA,
0402618,NCD003166675,"ECUSTA MILL",TRANSYLVANIA,NC,"SLUDGE DSPL AREA",201,"NC",TRANSYLVANIA,
0402618,NCD003166675,"ECUSTA MILL",TRANSYLVANIA,NC,"ISLAND INCIN",301,"NC",TRANSYLVANIA,
0402618,NCD003166675,"ECUSTA MILL",TRANSYLVANIA,NC,"FILM INCIN.",401,"NC",TRANSYLVANIA,
0402618,NCD003166675,"ECUSTA MILL",TRANSYLVANIA,NC,"ISLAND LDFL",501,"NC",TRANSYLVANIA,
0402618,NCD003166675,"ECUSTA MILL",TRANSYLVANIA,NC,"ORIG LDFL",601,"NC",TRANSYLVANIA,
0402618,NCD003166675,"ECUSTA MILL",TRANSYLVANIA,NC,"OLIN CORP ECUSTA PAPER & FILM GROUP",602,"VANDERBILT RD",PISGAH FOREST,28768
0402647,NCD003200383,"KOPPERS CO., INC. (MORRISVILLE PLANT)",WAKE,NC,"KOPPERS CO INC (MORRISVILLE PLT)",101,"NC",WAKE,
0402647,NCD003200383,"KOPPERS CO., INC. (MORRISVILLE PLANT)",WAKE,NC,"KOPPERS CO. INC. (MORRISVILLE PLANT)",102,"HWY 54 W",MORRISVILLE,27560
0402647,NCD003200383,"KOPPERS CO., INC. (MORRISVILLE PLANT)",WAKE,NC,"KOPPERS CO., INC. (MORRISVILLE PLANT)",103,"HWY 54 W",MORRISVILLE,27560
0403015,NCD980557656,"NORTH CAROLINA STATE UNIVERSITY (LOT 86, FARM UNIT #1)",WAKE,NC,"NC STATE U (LOT 86 FARM UNIT #1)",101,"NC",WAKE,
0403015,NCD980557656,"NORTH CAROLINA STATE UNIVERSITY (LOT 86, FARM UNIT #1)",WAKE,NC,"NC STATE UNIVERSITY(LOT 86,FARM UNIT #1)",1623,"",,
0403015,NCD980557656,"NORTH CAROLINA STATE UNIVERSITY (LOT 86, FARM UNIT #1)",WAKE,NC,"NC STATE UNIVERSITY(LOT 86,FARM UNIT #1)",1624,"CARTER-FINLEY STADIUM",RALEIGH,27607
0403015,NCD980557656,"NORTH CAROLINA STATE UNIVERSITY (LOT 86, FARM UNIT #1)",WAKE,NC,"NORTH CAROLINA STATE UNIVERSITY (LOT 86, FARM UNIT #1)",1625,"CARTER-FINLEY STADIUM",RALEIGH,27607
0406082,NCD003202603,"WARD TRANSFORMER",WAKE,NC,"WARD TRANSFORMER",101,"MT. HERMAN ROAD",RALEIGH,27560
0403068,NCD980602163,"ROADSIDE PCB SPILL",WARREN,NC,"PCB SPILLS",101,"NC",HALIFAX,
0403068,NCD980602163,"ROADSIDE PCB SPILL",WARREN,NC,"PCB SPILLS",102,"210 MILES OF NC HWY",ROANOKE RAPIDS,27870
0403068,NCD980602163,"ROADSIDE PCB SPILL",WARREN,NC,"PCB SPILLS",103,"210 MILES OF NC HWY",210 MILES OF ROADS,27589
0403068,NCD980602163,"ROADSIDE PCB SPILL",WARREN,NC,"PCB SPILLS",104,"210 MILES OF NC HWY",210 MILES OF ROADS,27589
0402563,NCD000813592,"GEORGIA-PACIFIC CORPORATION HARDWOOD SAWMILL",WASHINGTON,NC,"GA-PACIFIC CORP HDWD SAW",101,"NC",WASHINGTON,
0402563,NCD000813592,"GEORGIA-PACIFIC CORPORATION HARDWOOD SAWMILL",WASHINGTON,NC,"GA-PACIFIC CORP HDWD SAW",102,"",,
0402563,NCD000813592,"GEORGIA-PACIFIC CORPORATION HARDWOOD SAWMILL",WASHINGTON,NC,"GEORGIA-PACIFIC CORP. HARDWOOD SAWMILL",103,"PLYWOOD DR",PLYMOUTH,27962
0402563,NCD000813592,"GEORGIA-PACIFIC CORPORATION HARDWOOD SAWMILL",WASHINGTON,NC,"GEORGIA-PACIFIC CORPORATION HARDWOOD SAWMILL",104,"PLYWOOD DRIVE",PLYMOUTH DRIVE,27962
0402728,NCD039102959,"HEVI-DUTY ELECTRIC CO.",WAYNE,NC,"HEVI DUTY ELECTRIC/GENERAL SIGNAL",101,"NC",WAYNE,
0402728,NCD039102959,"HEVI-DUTY ELECTRIC CO.",WAYNE,NC,"HEAVY DUTY ELECTRIC CO",201,"NC",WAYNE,
0402728,NCD039102959,"HEVI-DUTY ELECTRIC CO.",WAYNE,NC,"HEVI-DUTY ELECTRIC CO.",301,"",NC,
0402728,NCD039102959,"HEVI-DUTY ELECTRIC CO.",WAYNE,NC,"HEVI-DUTY ELECTRIC CO.",302,"HWY 117 SOUTH",GOLDSBORO,27530
|
en
|
all-txt-docs
|
107664
|
#{ Title #}
User manual to getpar
#{ Authors #}
Leonid Petrov
#{ Date #}
2002.03.06
#{ Abstract #}
This document is a user manual for program getpar.
#{ Contact #}
Questions and comments about this guide should be sent to:
Leonid Petrov ( [email protected] )
#/ Overview #\
Program getpar parses a spool file of the listing of Solve solution,
extracts information from there, formats it and writes down in the
set of output files.
#/ Usage #\
Usage: getpar <spool_file> <prefix>
where
spool_file is the name of Solve spool file of global solution in
either complete or back mode;
prefix is the main portion of the output filenames including path.
The actual names of the output files are results of concatenation
of prefix with extension.
#/ Formats description #\
Each output file has first two lines comments. The comment lines contains
character # as the first character in the line. The first comment line,
adn therefore the first line of the file always holds the name of the format,
its version and date of format revision:
# GETPAR_XXX format version 1.0 of 2001.05.25
where XXX is (in catpital letter) extension of the file, for example,
# GETPAR_STA format version 1.0 of 2001.05.25
The second line, so-called header comment, contains the full path name of
the spool file. Since the format of getpar output files is the subject
of changes it is a good practice to check the format version each time when you
parse getpar output files.
##/ .sta -file ##\
.sta file contains estimates of positions of global stations and the formal
uncertainties of these estimates. The list of station positions is sorted in
alphabetic order of station names. Stations before and after episodic motions
are treated as different stations. Correlations between station positions and
velocities are also written.
File contains lines of four types:
1) Comment. The first character is #. Header comment contain the full name of
the spool file.
2) Cartesian components of the vector of station position. The first
8 characters of this line are STA_GCX:
Field Format Units Meaning
1-8 A8 -- record type identifier: STA_GCX:
11-25 A15 -- station name. Station name consist of 8-letters station
acronym and 6-letter epoch in format yymmdd. Epoch
is attached to the name only if the station had episodic
motion. Fields between the last letter of the station
name and the first letter of epoch are filled by _.
If the station didn't have episodic name then the space
after the last letter of the station name is left blank.
28-29 A2 -- component identifier. One of "X:", "Y:" or "Z:"
31-45 F15.2 mm value of X-component of station position.
50-59 F10.3 mm formal uncertainty of X-component of station position.
65-79 F15.2 mm value of Y-component of station position.
84-93 F10.3 mm formal uncertainty of Y-component of station position.
99-113 F15.2 mm value of Z-component of station position.
118-127 F10.3 mm formal uncertainty of Z-component of station position.
139-145 I7 -- the number of observations of this station used in
solution.
156-162 I7 -- total number of observations of this station.
174-178 I5 -- the number of sessions with this station used in
solution.
189-193 I5 -- total number of sessions of this station.
205-214 A10 -- the date of the first session with this station used
in solution. format: yyyy.mm.dd (as integer numbers)
226-235 A10 -- the date of the last session with this station used
in solution. format: yyyy.mm.dd (as integer numbers)
3) Local topocentric components of the vector of station position: Up, East,
North. The first 8 characters of this line are STA_GCU:
Field Format Units Meaning
1-8 A8 -- record type identifier: STA_GCU:
11-25 A15 -- station name. Station name consist of 8-letters station
acronym and 6-letter epoch in format yymmdd. Epoch
is attached to the name only if the station had episodic
motion. Fields between the last letter of the station
name and the first letter of epoch are filled by _.
If the station didn't have episodic name then the space
after the last letter of the station name is left blank.
28-29 A2 -- component identifier. One of "U:", "E:" or "N:"
31-45 F15.2 mm value of U-component of station position.
50-59 F10.3 mm formal uncertainty of U-component of station position.
65-79 F15.2 mm value of E-component of station position.
84-93 F10.3 mm formal uncertainty of E-component of station position.
99-113 F15.2 mm value of N-component of station position.
118-127 F10.3 mm formal uncertainty of N-component of station position.
4) Correlations between station positions and velocities. Correlation matrix
is defined as the matrix of 6x6 in the upper triangle representation without
the main diagonal which. Elements in the columns or rows of the matrix are
in the order: X-position, Y-position, Z-position, X-velocity, Y-velocity,
Z-velocity.
1-8 A8 -- record type identifier: STA_CRL:
11-25 A15 -- station name. Station name consist of 8-letters station
acronym and 6-letter epoch in format yymmdd. Epoch
is attached to the name only if the station had episodic
motion. Fields between the last letter of the station
name and the first letter of epoch are filled by _.
If the station didn't have episodic name then the space
after the last letter of the station name is left blank.
36-43 F6.3 d/l Correlation between X-position and Y-position
38-43 F6.3 d/l Correlation between X-position and Z-position
45-50 F6.3 d/l Correlation between Y-position and Z-position
52-57 F6.3 d/l Correlation between X-position and X-velocity
59-64 F6.3 d/l Correlation between Y-position and X-velocity
66-71 F6.3 d/l Correlation between Z-position and X-velocity
73-78 F6.3 d/l Correlation between X-position and Y-velocity
80-85 F6.3 d/l Correlation between Y-position and Y-velocity
87-92 F6.3 d/l Correlation between Z-position and Y-velocity
94-99 F6.3 d/l Correlation between X-velocity and Y-velocity
101-106 F6.3 d/l Correlation between X-position and Z-velocity
108-113 F6.3 d/l Correlation between Y-position and Z-velocity
115-120 F6.3 d/l Correlation between Z-position and Z-velocity
122-127 F6.3 d/l Correlation between X-velocity and Z-velocity
129-134 F6.3 d/l Correlation between Y-velocity and Z-velocity
##/ .vel -file ##\
.vel file contains values estimates of velocities of global stations and the
formal uncertainties of these estimates. The list of the estimates is sorted in
alphabetic order of station names. Stations before and after episodic motions
are treated as different stations. Correlations between station positions and
velocities are also written.
File contains lines of three types:
1) Comment. The first character is #. Header comment contain the full name of
the spool file.
2) Cartesian components of the vector of station velocity. The first
8 characters of this line are VEL_GCX:
Field Format Units Meaning
1-8 A8 -- record type identifier: VEL_GCX:
11-18 A8 -- station name.
24-32 F9.2 mm/yr value of X-component of station velocity.
37-44 F8.3 mm/yr formal uncertainty of X-component of station velocity.
50-58 F9.2 mm/yr value of Y-component of station velocity.
63-70 F8.3 mm/yr formal uncertainty of Y-component of station velocity.
76-84 F9.2 mm/yr value of Z-component of station velocity.
89-96 F8.3 mm/yr formal uncertainty of Z-component of station velocity.
3) Local topocentric components of the vector of station velocity: Up, East,
North. The first 8 characters of this line are VEL_GCU:
Field Format Units Meaning
1-8 A8 -- record type identifier: VEL_GCU:
11-18 A8 -- station name.
24-32 F9.2 mm/yr value of U-component of station velocity.
37-44 F8.3 mm/yr formal uncertainty of U-component of station velocity.
50-58 F9.2 mm/yr value of E-component of station velocity.
63-70 F8.3 mm/yr formal uncertainty of E-component of station velocity.
76-84 F9.2 mm/yr value of N-component of station velocity.
89-96 F8.3 mm/yr formal uncertainty of N-component of station velocity.
##/ .sou -file ##\
.sou file contains estimates of right ascension and declination of
global sources, as well as formal their uncertainties and correlations between
right ascension and declination of the same source.
File contains lines of two types:
1) Comment. The first character is #. Header comment contain the full name of
the spool file.
2) Estimates.
Field Format Units Meaning
1-8 A8 -- record type identifier: SOU_GCO:
11-18 A8 -- IVS source name.
25-26 I2 hours right ascension. hours part
27-27 A1 -- separator "_"
28-29 I2 min. right ascension. minutes part
30-30 A1 -- separator "_"
31-41 F11.8 sec. right ascension. seconds part
46-55 F10.4 mas formal error of right ascension
62-64 I3 deg. declination. degrees part.
65-65 A1 -- separator "_"
66-67 I2 arcmin declination. arcminutes part.
68-68 A1 -- separator "_"
69-78 F10.7 arcsec declination. arcseconds part.
83-92 F10.4 mas formal uncertainty of declination
99-104 F6.4 d/l correlation between the estimates of right ascension
and declination.
116-122 I7 -- the number of observations of this source used in
solution.
133-139 I7 -- total number of observations of this source.
151-155 I5 -- the number of sessions of this source used in
solution.
166-170 I5 -- total number of sessions with this source.
182-191 A10 -- the date of the first session with this source used
in solution. format: yyyy.mm.dd (as integer numbers)
203-212 A10 -- the date of the last session with this source used
in solution. format: yyyy.mm.dd (as integer numbers)
##/ .eop -file ##\
.eop file contains estimates of X pole coordinate, Y pole coordinate, UT1-TAI
angle, UT1 rate and UT1 acceleration as well as their formal uncertainties.
Estimates are obtained using all observations of the specific session.
.eop file contains also database names and time-tags.
File contains lines of two types:
1) Comment. The first character is #. Header comment contain the full name of
the spool file.
2) Estimates.
Field Format Units Meaning
1-8 A8 -- record type identifier: EOP_LOC:
11-20 A10 -- database name with leading dollar sign
23-25 I3 -- database version number
34-49 A16 calend EOP time tag in Solve format: YYYY.MM.DD-hh:mm
Time scale is not defined. Adjustments are at TDB
time scale, a priori EOP are at unknown time scale.
58-63 I6 -- number of observation used for getting these EOP
estimates.
69-79 F11.4 mas estimate of X-pole coordinate
84-93 F10.2 muas formal uncertainty of X-pole coordinate
99-109 F11.4 mas estimate of Y-pole coordinate
114-123 F10.2 muas formal uncertainty of Y-pole coordinate
129-139 F11.4 msec estimates of UT1-TAI
144-153 F10.2 musec formal uncertainty of UT1-TAI
159-169 F11.4 mas/day estimates of X pole rate
174-183 F10.2 muas/day formal uncertainties of X pole rate
189-199 F11.4 msec/day estimates of Y pole rate
204-213 F10.2 msec/day formal uncertainties of Y pole rate
219-229 F11.4 msec/day estimates of UT1-TAI rate
234-243 F10.2 musec/day formal uncertainties of UT1-TAI rate
249-259 F11.4 ms/day**2 estimates of UT1-TAI acceleration
264-273 F10.2 ms/day**2 formal uncertainties of UT1-TAI acceleration
If the specific parameter was not estimated in this experiment, the field
for its value and formal uncertainty is replaced by filler: $$$$$$. The filler
takes entire field.
##/ .nut -file ##\
.nut file contains estimates of daily offset of nutation in longitude and
nutation in obliquity as well as their formal uncertainties. .nut file contains
also database names and time-tags.
File contains lines of two types:
1) Comment. The first character is #. Header comment contain the full name of
the spool file.
2) Estimates.
Field Format Units Meaning
1-8 A8 -- record type identifier: NUT_LOC:
11-20 A10 -- database name with leading dollar sign
23-25 I3 -- database version number
37-46 F10.5 years time tag
53-59 I6 -- the number of used observations
64-74 F11.3 mas estimate of nutation in longitude
79-88 F10.1 muas formal uncertainty of nutation in longitude
94-104 F11.3 mas estimate of nutation in obliquity
109-118 F10.1 muas formal uncertainty of nutation in obliquity
##/ .crl -file ##\
.crl file contains off-diagonal coefficients of correlations between
the estimates of EOP at the same experiment. Correlations are ordered in
according the order of elements of a symmetric matrix in low-triangular
representation without the main diagonal. Order of rows/columns: X_pole,
X_pole rate, Y_pole, Y_pole rate, UT1, UT1 rate, Nutation in longitude,
Nutation in obliquity
File contains lines of two types:
1) Comment. The first character is #. Header comment contain the full name of
the spool file.
2) Correlations.
Field Format Units Meaning
1-8 A8 -- record type identifier: CRL_LOC:
11-20 A10 -- database name with leading dollar sign
23-25 I3 -- database version number
29-34 F6.4 d/l correlation between X_pole rate and X_pole
36-41 F6.4 d/l correlation between Y_pole and X_pole
43-48 F6.4 d/l correlation between Y_pole and X_pole rate
50-55 F6.4 d/l correlation between Y_pole rate and X_pole
57-62 F6.4 d/l correlation between Y_pole rate and X_pole rate
64-69 F6.4 d/l correlation between Y_pole rate and Y_pole
71-76 F6.4 d/l correlation between UT1 and X_pole
78-83 F6.4 d/l correlation between UT1 and X_pole rate
85-90 F6.4 d/l correlation between UT1 and Y_pole
92-97 F6.4 d/l correlation between UT1 and Y_pole rate
99-104 F6.4 d/l correlation between UT1 rate and X-pole
106-111 F6.4 d/l correlation between UT1 rate and X-pole rate
113-118 F6.4 d/l correlation between UT1 rate and Y-pole
120-125 F6.4 d/l correlation between UT1 rate and Y-pole rate
127-132 F6.4 d/l correlation between UT1 rate and UT1
134-139 F6.4 d/l correlation between Nutation Psi and X_pole
141-146 F6.4 d/l correlation between Nutation Psi and X_pole rate
148-153 F6.4 d/l correlation between Nutation Psi and Y_pole
155-160 F6.4 d/l correlation between Nutation Psi and Y_pole rate
162-167 F6.4 d/l correlation between Nutation Psi and UT1
169-174 F6.4 d/l correlation between Nutation Psi and UT1 rate
176-181 F6.4 d/l correlation between Nutation Eps and X_pole
183-188 F6.4 d/l correlation between Nutation Eps and X_pole rate
190-195 F6.4 d/l correlation between Nutation Eps and Y_pole
197-202 F6.4 d/l correlation between Nutation Eps and Y_pole rate
204-209 F6.4 d/l correlation between Nutation Eps and UT1
211-216 F6.4 d/l correlation between Nutation Eps and UT1 rate
218-223 F6.4 d/l correlation between Nutation Eps and Nutation Psi
##/ .lso -file ##\
.lso file file contains estimates of right ascension and declination of
local sources, as well as formal their uncertainties and correlations between
right ascension and declination of the same source. It contains also the time
tag of the estimates of right ascension and declination. File is sorted in
order of sessions and in order of appearance of local sources in the session.
File contains lines of two types:
1) Comment. The first character is #. Header comment contain the full name of
the spool file.
2) Estimates.
Field Format Units Meaning
1-8 A8 -- record type identifier: SOU_LSO:
11-18 A8 -- IVS source name.
21-30 A10 -- database name with leading dollar sign
33-35 I3 -- database version number
47-56 F10.5 years time tag
63-64 I2 hours right ascension. hours part
65-65 A1 -- separator "_"
66-67 I2 min. right ascension. minutes part
68-68 A1 -- separator "_"
69-79 F11.8 sec. right ascension. seconds part
84-93 F10.4 mas formal error of right ascension
100-102 I3 deg. declination. degrees part.
103-103 A1 -- separator "_"
104-105 I2 arcmin declination. arcminutes part.
106-106 A1 -- separator "_"
107-116 F10.7 arcsec declination. arcseconds part.
121-130 F10.4 mas formal uncertainty of declination
137-140 I4 -- Number of used observations of this source
144-147 I4 -- Total number of observations of this source
##/ .lst -file ##\
.lst file contains estimates of positions of local stations and the formal
uncertainties of these estimates. The list of station positions is sorted in
the order of sessions and then in the alphabetic order of station names.
Total estimates of station positions in crust-fixed XYZ coordinates system and
adjustments to the apriori positions in topocentric system are presented.
File contains lines of three types:
1) Comment. The first character is #. Header comment contain the full name of
the spool file.
2) Cartesian components of the vector of station position. The first
8 characters of this line are STA_LCX:
Field Format Units Meaning
1-8 A8 -- record type identifier: STA_LCX:
21-30 A10 -- database name with leading dollar sign
33-35 I3 -- database version number
47-56 F10.5 years time tag
59-60 A2 -- component identifier: X:
62-76 F15.2 mm value of X-component of station position.
81-90 F10.3 mm formal uncertainty of X-component of station position.
93-94 A2 -- component identifier: X:
96-110 F15.2 mm value of Y-component of station position.
115-124 F10.3 mm formal uncertainty of Y-component of station position.
127-128 A2 -- component identifier: Z:
130-144 F15.2 mm value of Z-component of station position.
149-158 F10.3 mm formal uncertainty of Z-component of station position.
3) Topocentric components of the vector of adjustments to the apriori station
position. The first 8 characters of this line are STA_LCU:
Field Format Units Meaning
1-8 A8 -- record type identifier: STA_LCU:
21-30 A10 -- database name with leading dollar sign
33-35 I3 -- database version number
47-56 F10.5 years time tag
59-60 A2 -- component identifier: U:
62-76 F15.2 mm value of U-component of station position.
81-90 F10.3 mm formal uncertainty of U-component of station position.
93-94 A2 -- component identifier: E:
96-110 F15.2 mm value of E-component of station position.
115-124 F10.3 mm formal uncertainty of E-component of station position.
127-128 A2 -- component identifier: N:
130-144 F15.2 mm value of N-component of station position.
149-158 F10.3 mm formal uncertainty of N-component of station position.
##/ .bas -file ##\
.bas file contains series of the estimates of the components of baseline
vectors of the stations whose positions were estimated as local parameters
as well as formal uncertainties of these these estimates. The list of the
estimates of baseline vectors is sorted in the order of sessions and then in
the alphabetic order of station names forming a baseline. All three component:
baseline length, transversal and and normal components are computed.
File contains lines of two types:
1) Comment. The first character is #. Header comment contain the full name of
the spool file.
2) Cartesian components of the vector of station position. The first
8 characters of this line are BAS_LCL:
Field Format Units Meaning
1-8 A8 -- record type identifier: BAS_LCL:
11-20 A10 -- database name with leading dollar sign
23-25 I3 -- database version number
35-44 F10.5 years time tag
46-53 A8 -- the name of the first station of the baseline
54-54 A1 -- delimiter: "/"
55-62 A8 -- the name of the second station of the baseline
64-77 F14.2 mm baseline length
78-83 F6.2 mm formal uncertainty of baseline length determination
85-94 F10.2 mm transversal (horizontal) component of baseline vector
96-102 F7.2 mm formal uncertainty of transversal comp. of baseline
104-114 F11.2 mm normal (vertical) component of baseline vector
116-122 F7.2 mm formal uncertainty of normal comp. of baseline vector
##/ .eob -file ##\
.eob file contains series of the estimates of X pole coordinate,
Y pole coordinate, UT1-TAI angle, UT1 rate, daily offsets of nutation angles
as well as their formal uncertainties and correlations. Time tag and database
name is attached to each line. .EOP format is an extension of the IERS EOP
format.
File contains lines of three types:
1) Comment. The first character is #. Header comments contain some information
about solution.
2) Header. The first two symbols are blank. Header lines contain titles of the
columns
3) Estimates.
1 1-1 A1 --- Usage flag
2 3-14 F12.6 days Modified Julian date of the TDT time tag
3 16-25 A10 --- Database name
4 27-32 A6 --- IVS session code (if available)
2 16-25 F8.6 arcsec The estimate of X pole coordinate
3 25-32 F8.6 arcsec The estimate of Y pole coordinate
4 34-43 F10.7 sec The UT1-UTC function
5 45-52 F8.3 mas Adjustment of the nutation in longitude angle with
respect to IAU 1980 nutation expansion
6 54-61 F8.3 mas Adjustment of the nutation in obliquity angle with
respect to IAU 1980 theory
7 63-70 F8.6 arcsec Formal uncertainty of X pole coordinate
8 72-79 F8.6 arcsec Formal uncertainty of Y pole coordinate
9 81-89 F9.7 sec Formal uncertainty of UT1-UTC function
10 91-97 F7.3 mas Formal uncertainty of nutation in longitude angle
11 99-105 F7.3 mas Formal uncertainty of nutation in obliquity angle
12 107-113 F7.2 psec Weighted root mean square of postfit residual of
the solution
13 115-120 F6.4 -- Correlation between the estimates of X-pole
positions and Y-pole position
14 122-127 F6.4 -- Correlation between the estimates of X-pole
positions and UT1-TAI angle
15 129-134 F6.4 -- Correlation between the estimates of Y-pole
positions and UT1-TAI angle
16 136-141 F6.4 -- Correlation between the estimates of nutation in
longitude and nutation in obliquity
17 143-148 I6 -- Number of used observations in the session
18 150-155 A6 -- IVS session code
19 157-161 F5.2 hours Session duration
20 163-171 F9.6 asc/day Estimate of rate change of X pole coordinate
21 173-181 F9.6 asc/day Estimate of rate change of Y pole coordinate
22 183-192 F10.7 sec Length of day
23 194-195 A2 Filler: -0 does not have any meaning
24 197-198 A2 Filler: -0 does not have any meaning
25 200-208 F9.6 asc/day Formal unceratinty of x pole coordinate rate
26 210-218 F9.6 asc/day Formal unceratinty of y pole coordinate rate
27 220-229 F10.7 sec Formal uncertainty of length of day
28 231-232 A2 Filler: -0 does not have any meaning
29 234-235 A2 Filler: -0 does not have any meaning
If the specific parameter was not estimated in this experiment, the field
for its value and formal uncertainty is replaced by filler: $$$$$$. The filler
takes entire field.
Field Format Units Meaning
2-10 F9.3 days modified Julian date of the time tag
##/ .trp -file ##\
.trp file contains apriori zenith path delay, adjustments of zenith
path delay, totals (apriori+adjustments) and formal uncertainties of
adjustments for each session, each station. In the case if zenith apriori path
delays were not written into the spool file, then apriori zenith path delays
are reported as zeroes.
Field Format Units Meaning
1-8 A8 -- record type identifier: TRP_SEG:
11-20 A10 -- database name with leading dollar sign
23-25 I3 -- database version number
32-50 A19 -- time tag of the extimates of troposphere path delay
in Solve format
32-35 I4 -- year number
37-38 I2 -- month number
40-41 I2 -- day number
43-44 I2 hours hour
46-47 I2 min minutes
49-50 I2 sec seconds
56-63 A8 --- IVS station name
69-82 F14.3 psec apriroi troposphere zenith path delay
88-101 F14.3 psec adjustment of troposphere zenith path delay
107-120 F14.3 psec total troposphere zenith path delay
126-139 F14.3 psec formal uncertainty of troposphere path delay
##/ .rms -file ##\
.rms file contains overall weighted root means square of postfit residuals
for all observations and a series of wrms of postfit residual for each
individual session. File is ordered in decreasing wrms.
File contains lines of three types:
1) Global statistics. Fields 11-17 are Global:
Field Format Units Meaning
1-8 A8 -- record type identifier: RMS_DEL:
11-17 A7 -- record subtype identifier: Global:
22-28 I7 -- Number of observations used in solution
36-45 F10.3 psec overall wrms of postfit delay residuals
50-59 F10.3 psec/sec overall wrms of postfit delay rate residuals.
Exception: the line with subtype identiifer Global
does not have rarte, but has chi/ndg in fields
62-71
2) Comment. The first character is #. Header comment contain the full name of
the spool file.
3) Local statistics.
Field Format Units Meaning
1-8 A8 -- record type identifier: RMS_DEL:
11-20 A10 -- database name with leading dollar sign
22-28 I7 -- Number of observations used in solution
30:41 I12/F3.1 psec wrms of delay in psec *
If WRMS > 10 psec then format is I12,
otherwise is F3.1
|
en
|
markdown
|
687530
|
# Presentation: 687530
## Tom Afferton
**Tom Afferton**
**Member of OIF Board of Directors**
**Division Manager – AT&T Labs**
**[email protected]**
**OIF Website: www.oiforum.com**
## What is the OIF?
- Launched in April of 1998 with an objective to foster development of low-cost and scaleable internet using optical technologies
- The only industry group bringing together professionals from the data and optical communities
- Open forum: 250+ member companies
- international
- carriers
- component and systems vendors
- testing and software companies
- _Mission_: To foster the development and deployment of interoperable products and services for data switching and routing using optical networking technologies
## OIF Focus
- Low-cost Scaleable Optical Internetworking
- IP-Over-Switched Optical Network Architecture
- Physical layer
**Low-cost optical interfaces between networking elements**
**Standard device level electrical interfaces for low-cost systems**
- Control layer interoperability between data and optical layers
**Dynamic configuration using IP signaling and control mechanisms**
- Accommodate legacy network under the new physical and control layer mechanisms
## OIF StructureTechnical Committee: 6 Working Groups
- Carrier
- Requirements and applications
- Architecture
- Services, network requirements and architectures
- Signaling
- Protocols for automatic management of optical connections
- OAM&P (Operations, Administration, Maintenance and Provisioning)
- Network management
- Physical and Link Layer
- Equipment and subsystem module interfaces
- Interoperability
- Interoperability testing
## Output from OIF
- Implementation agreements, based upon:
- Carrier group’s requirements
- Existing standards and specification when available
- New solutions when necessary
- Interoperability testing procedures
- Ensures compliance to implementation agreements and ultimately interoperable products and networks
- Input into other standards bodies
- Formal liasons in place with numerous other organizations (e.g. ITU, IETF. Complete list in back-up slides)
## OIF Process for Generating Implementation Agreements
- Framework provided by Working Group structure
- Working groups establish consensus-driven projects to focus contributions
- Progress driven by member contributions
- Posted on OIF website
- Basis for activities at quarterly technical meetings
- Formal voting process for reaching Implementation Agreements
- Two step process
- Straw ballot – passes with simple majority
- Principal ballot – passes with 2/3rds majority
- Process enables open debate, incorporation of comments
- Formal votes at each step
- *One vote per member company *
## OIF Activities – Physical Layer
- Business Need
- Lower equipment costs through interface agreements that reduce customization
- Key Projects
- Internal system interfaces
- System/Physical Interface (SPI)
- SPI-3, SPI-4 complete for 10G
- SPI-5 in progress for 40G
- Serializer/Deserializer-Framer Interface (SFI)
- SFI-4 complete for 10G
- SFI-5 in progress for 40G
- Low cost premises equipment interfaces
- Very Short Reach (VSR)
- VSR-1, VSR-2, VSR-3, VSR-4 complete for 10 Gb/s
- VSR-5 in progress for 40 Gb/s
- Footprint specification for tunable lasers in progress
## OIF Activities – Control Layer Switched Optical Networks
- A switched optical network is an optical network in which connections can be created using switching control technology.
- The OIF is among the organizations working on the interfaces to enable controllers to work together to perform this function
## OIF Activities – Control Layer
- Client
- Business Need
- Lower operations costs through automation of routing optical circuits
- Key Projects
- User-to-Network Interface – enables client equipment to request a service across optical networks
- UNI 1.0 complete for SONET circuits
- 25 vendor interop. Demonstratation at Supercomm in June, 2001
- Built upon protocols from IETF
- Also completed Call Detail Records to support billing with UNI 1.0
- UNI 2.0 in progress to add other features
- Network-to-Network Interface – enables optical networks to interact to deliver an end-to-end service
- NNI 1.0 in progress
- Targeting 1H03 for interoperability demonstration
- Client
- NNI
- UNI
- UNI
## Why do service providers care about optical control plane interfaces?
- Intelligent control plane, in general, lowers operating costs
- Automatic discovery of elements, capacity and connections
- Automatic routing and recovery of circuits
- Improved survivability against complex failures
- “Standardized” control plane interfaces enable
- Wider adoption of control plane capabilities
- Multi-vendor/carrier interoperability
- New dynamic optical services with customer control
- “Plug and play” introduction of new vendors/technologies
- In advance of control plane deployment, service providers will continue to rely on centralized management systems
## OIF control plane work vs. other organizations
- Internet Engineering Task Force (IETF)
- Community of individuals
- Generating “tool box” of protocols
- International Telecommunications Union
- Formal organization for establishing global standards
- In progress of developing comprehensive standards for “Automatic Switched Optical Network”
- Some overlap among OIF, IETF, ITU
- “Healthy” competition is evolving to cooperation
- Req’ts
- Protocols
- Req’ts
- Formals
- Standards
- Implementation
- Agreements
## Summary
- OIF brings together professionals from the data and optical worlds
- OIF is addressing issues important to carriers and their customers
- Control plane work is progressing well in OIF in collaboration with other organizations like the IETF and ITU
## Thank You
## OIF Membership Breakdown
- (data as of 12/01)
- Market Segment
## Implementation Agreements
- SPI-3: System Packet Interface Level 3 for STS-48/STM-16
- SPI-4 phase 1: System Physical Interface Level 4 for STS-192/STM-64
- SPI-4 phase 2: System Packet Interface Level 4 for STS-192/STM-64
- SFI-4: Serdes/Framer Electical Interface: Common electrical interface between framers and serializer/deserializer parts for STS-192/STM-64 interfaces.
- SFI-5: Serdes/Framer Electical Interface: 40Gb/s interface for physical devices
- SPI-5: OC-768 System Packet Interface
- Very Short Reach (VSR) OC-192 Interface based on 12 fiber Parallel Optics
- Serial OC192 1310 nm Very Short Reach (VSR) Interfaces
- Very Short Reach (VSR) OC-192 Interface based on 4 fiber Parallel Optics
- Serial OC192 850 nm Very Short Reach (VSR) Interfaces
- User Network Interface (UNI) 1.0
- CDR: Call Detail Records for UNI 1.0 billing
## OIF and other Standards Bodies
- Established Liaisons With:
- American National Standards Institute - ANSI T1
- International Telecommunications Union - ITU-T
- Internet Engineering Task Force - IETF
- ATM Forum
- IEEE 802.3ae 10 Gb Ethernet
- Network Processing Forum - NPF
- Metro Ethernet Forum - MEF
- Tele Management Forum - TMF
## OIF and other Standards Bodies
|
en
|
converted_docs
|
877167
|
Appendix O. Sample Final Program Review Determination
Mr. William Smith, President CERTIFIED MAIL
The School of Practical Nursing Return Receipt Requested
### 1 North Avenue REF: OPEID#
New York, N.Y. 10007 PRCN 199840200000
Dear Mr. Smith:
This office has reviewed Ms. Norton's letter dated February 10, 2000, in
response to the remaining issues from the November 14, 1998 Title IV
program review report. That report covered The School of Practical
Nursing's (TSPN) administration of the Federal Title IV, HEA programs
during the 1997/98 and 1998/99 award years.
We have made final determinations for all program review findings. The
purpose of this letter is to (1) identify the liabilities due from TSPN;
(2) provide instructions for the payment of liabilities to the
Department of Education (ED) and holders of the FFEL; and (3) notify you
of your right to appeal. This final program review determination letter
contains an appendix, which includes a list of all Title IV aid
recipients sampled for the 1997/98 and 1998/99 award years.
TSPN should be aware that repeat findings in future program reviews or
failure to resolve satisfactorily the findings of this program review
may lead to administrative proceedings to fine, limit, suspend or
terminate the institution pursuant to 34 CFR, Part 668, Subpart G of the
Student Financial Assistance General Provisions regulations.
Additionally, this office will recommend that an Institutional
Improvement Specialist contact TSPN to discuss the institution's
technical assistance needs.
The institution has taken the required corrective actions to resolve
findings \# 3, and 5. Therefore, those findings are closed. The
consequences of the program violation identified in findings #1, 2, and
4, are as follows.
# **FINDINGS AND FINAL DETERMINATIONS**
#### Finding
**[1. Incomplete Verification]{.underline}**
TSPN failed to complete verification for several students in the review
sample who were selected for verification.
TSPN failed to collect copies of both sides of student #22's tax
returns. Furthermore, the student reported that she received \$800 in
child support on her verification worksheet. However, the child support
had not been included on her Student Aid Report (SAR). There was no
documentation in the student's file that calculations had been performed
to determine whether this revised information affected her eligibility.
For student #16, the only verification documentation in her file were
copies of her 1996 W-2 earnings statements. However, the student
reported on her SAR that she and her spouse filed a tax return in 1996.
The W-2 can only be accepted in place of a Federal tax return if the
institution can document that the student could not provide a copy of
the tax return, even after attempts to collect the document from the
IRS. Also, there was no verification worksheet in her file, so the
student's household size was not verified.
Side two of student #27's tax return was missing, and her tax return
showed that she and/or her husband received \$1475 in untaxed pension
funds in 1997. These funds should have been reported as untaxed income
on her SAR, but were not. The only exception to including these funds as
untaxed income would be if the funds were "rolled-over" into another
qualified pension plan, such as an IRA. There was no documentation that
this was the case, nor was there any evidence that calculations had been
performed to determine whether the student's eligibility was affected by
the revised information.
Similar findings were noted for students #12, 15, and 25.
An institution is responsible for verifying the information that is used
to calculate an applicant\'s Pell Grant Index (PGI)/Expected Family
Contribution (EFC) as part of the determination of need for student
financial assistance, for certain students who are selected for
verification by the Department. See 34 CFR § 668.54. Information is
verified by securing additional documentation or, in some cases, a
signed statement attesting to the accuracy of the information provided.
34 CFR § 668.56 and § 668.57. Once the required documentation is
received, the institution must determine whether any of the data
elements reported on the ISIR are incorrect and, if so, calculations
must be performed to determine if the students' eligibility is affected.
34 CFR § 668.59.
Failure to complete verification could result in students receiving
funds they are not entitled to, and create a financial burden for ED.
#### Final Determination
In response to this finding, TSPN was required to ensure that all
persons responsible for the awarding of Title IV funds are familiar with
the regulatory requirements, especially those relating to verification
guidelines.
Furthermore, due to the pervasive nature of this finding, TSPN was also
required to review the files of all students who received Title IV
funds, and were selected for verification during the 1997/98 and 1998/99
award years. The institution was then afforded the opportunity to
collect any required documentation that was missing and perform any
required need analysis calculations if the documentation revised any of
the data originally reported.
As a result of the file review, TSPN identified several additional
students who had not completed verification. The institution was able to
collect the required documentation and confirm the eligibility for most
of the students.
However, documentation submitted for student #31 showed that the
student's Pell Grant eligibility was reduced by \$100. Additionally,
TSPN was unable to collect all required documentation for students #16
and 22, resulting in the following liabilities:
-student #16 \$ 845 Pell Grant \$1,312 FFEL
-student #22 1,170 Pell Grant 2,625 FFEL
Detailed instructions for the payment of this liability are contained in
the [Payment Instructions]{.underline} section of this letter.
#### Finding
**[2. Unresolved Conflicting Information]{.underline}**
The reviewers found that TSPN had failed to resolve conflicting
information found in two student's files.
Student #17's file contained a copy of her 1996 federal tax return. That
tax return showed that she received a \$716 earned income credit in 1996
that was not reflected on her SAR. Although the student was not selected
for verification, TSPN was required to review the information that was
in her file to determine if it showed any inconsistent information. The
institution should have performed a revised need analysis to determine
the effect the earned income credit would have on the student's
eligibility, but it did not. TSPN performed a revised need analysis
during the review, which showed the student's Pell Grant eligibility was
reduced from \$2190 to \$1990**.**
A similar issue was noted in student #19's file.
An institution must resolve any discrepant information prior to
disbursing any Title IV funds to students. See 34 CFR § 668.16(f).
Failure to resolve conflicting information may result in students
receiving funds they are not entitled to, and create a financial burden
for the Department.
#### Final Determination
As a result of this finding, TSPN was instructed to implement procedures
to ensure that all information collected for students is evaluated to
determine its impact on a student's eligibility.
The institution was able to resolve the discrepancy for student #19.
However, TSPN was unable to resolve the discrepancy for student #17 and
is therefore liable for the \$200 Pell Grant overaward for student #17.
Detailed instructions for the payment of this liability are contained in
the [Payment Instructions]{.underline} section of this letter.
#### Finding
**[4. Incorrect Refund Calculations]{.underline}**
TSPN did not perform a proper refund calculation for student #1, who
withdrew from school on 3/14/98.
The school had determined that no refund was due after the student's
tuition was adjusted to account for the withdrawal. However, TSPN failed
to consider cash payments the student was expected to make when
calculating whether a refund was due to the Title IV programs.
Regulations published on 4/29/94, effective 7/1/94, state that "\...an
institution may not include any unpaid amount of a scheduled cash
payment in determining the amount that an institution may retain for
institutional charges" See 34 CFR § 668.22(g)(2)(ii)). Once it has been
determined how much the student still owes the school after tuition
charges have been adjusted, the student is expected to pay the amount of
cash that he/she was scheduled to at the beginning of the enrollment
period. The fact that the student withdrew should not reduce his/her
obligation to make the expected payments. Only after the student has
paid the expected share should Title IV funds be applied.
Additionally, TSPN was not considering the Federal refund criteria when
performing refund calculations. The regulations at 668.22(b) specify
that the institution must consider the federal refund criteria (defined
at 668.22(d)) when the pro rata refund requirements do not apply, and
there are no specific refund standards established by its accrediting
agency or under state law. The school would than be required to pay the
refund based on the criteria that is most beneficial to the student. The
Director acknowledged that the federal refund criteria were not
considered at TSPN.
Failure to make proper refunds may result in the institution retaining
funds it is not entitled to and cause increased expense for ED.
Additionally, an institution's failure to make adequate refunds of FFEL
funds to students' lenders may increase the possibility of default,
which also causes increased expenses to ED.
#### Final Determination
As a result of this finding, TSPN was required to revise its refund
procedures, to ensure that all regulatory provisions are addressed.
As a result of applying the regulatory provisions, it was determined
that TSPN was required to pay an \$781 refund to the FFEL program for
student #1.
Detailed instructions for the payment of this liability are contained in
the [Payment Instructions]{.underline} section of this letter.
**[SUMMARY OF LIABILITIES]{.underline}**
The total liabilities resulting from this final program review
determination are as follows:
[Finding \# Pell Grant FFEL Total]{.underline}
1 \$ 2,115 3,937 \$ 6,052
2 200 0 200
4 [0 781 781]{.underline}
Total \$ 2,315 4,718 7,033
**[PAYMENT INSTRUCTIONS]{.underline}**
TSPN must pay the \$4,718 FFEL liabilities to the current holders of the
loan debts for the applicable students identified in this FPRD. TSPN
must provide proof (copy of the canceled checks, front and back) that
payment was made to the holder(s) of the loans within 45 days of receipt
of this letter, to the following address:
Program Reviewer
U.S. Department of Education
75 Park Place, Room 1206
New York, NY 10007
The total liability to be remitted to the Department of Education based
on this final program review determination is \$ 2,315.
Payment of the \$ 2,315 liability must be made within 45 days by
forwarding a check, made payable to the U.S. Department of Education, to
the following address:
U.S. Department of Education
P.O. Box 952226
St. Louis, MO 63195-2226
To properly identify your institution's payment, and to ensure that the
institution receives credit for the payment, please include the
following information on the check and any accompanying documents:
DUNS Number: XXXXXXXX
TIN: XXXXXXXX
PRCN: 199840200000
If ED does not receive payment within the 45-day period, interest will
accrue in monthly increments, starting with the date of this letter,
until the date of receipt of your payment. If you have any questions
regarding interest accruals or payment credits you may telephone (202)
401-1450 and ask to speak to your institution's account representative.
**Payment Plan:** If full payment to ED cannot be made within 45 days of
the date of this letter, contact the Financial Improvement Receivables
Group at (202) 401-1450 to apply for a payment plan. Interest charges
and other conditions apply.
Written requests may be sent to the address below:
Nancy Hoglund, Supervisor
Financial Improvement Receivables Group
U.S. Department of Education
Room 4C107
400 Maryland Ave., S.W.
Washington, DC 20202-4330
If within 45 days of the date of this letter, your institution has
neither made payment in accordance with the instructions provided, nor
entered into an arrangement to repay the liability under terms
satisfactory to the U.S. Department of Education, ED intends to collect
the amount due and payable by administrative offset against payments due
your organization from the Federal Government. [Your institution may
object to the collection by offset only by challenging the existence or
amount of the debt.]{.underline} Your institution makes this challenge
by timely appealing this determination under the procedures described in
the "Appeal Procedures" section of this letter. The Department will use
those procedures to consider any objection to offset. No separate appeal
opportunity will be provided.
If a timely appeal is filed, ED will defer offset until completion of
the appeal, unless it determines that offset is necessary as provided in
34 CFR § 30.28. This debt may also be referred to the Department of the
Treasury for further action as authorized by the Debt Collection
Improvement Act of 1996.
# **APPEAL PROCEDURES**
This constitutes ED\'s final program review determination with respect
to the liabilities identified from the November 14, 1998, program review
report. If the institution wishes to appeal to the Secretary for a
review of monetary liabilities established by this final program review
determination, the institution must file a written request for an
administrative hearing. ED must receive the request no later than **45
days** from the date the institution receives this final program review
determination. **An original and four copies of the information you
submit must be attached to your request**. Your request for an appeal
must be sent to:
Ms. Mary Gust, Director
Administrative Actions and Appeals Division
U. S. Department of Education
830 First St. NE Rm. 083E1
### Washington, D. C. 20202
If you hand-deliver your submission, or use an overnight delivery
service other than the U.S. Postal Service, please address your
submission as follows:
Ms. Mary Gust, Director
Administrative Actions and Appeals Division
U.S. Department of Education
830 First St. NE Rm. 083E1
Washington, DC 20002
Your institution's appeal request must: (1) indicate the findings,
issues and facts you dispute; (2) state the institution's position,
together with pertinent facts and reasons supporting its position; (3)
include all documentation it believes the Department should consider in
support of the appeal; and (4) include a copy of this final program
review determination. The program review control numbers (PRCN) must
also accompany your request for review.
If your institution's appeal request is complete and made on a timely
basis, the Department will schedule an administrative hearing in
accordance with Section 487 (b) (2) of the Higher Education Act of 1965,
as amended (HEA), 20 U.S.C. §1094 (b) (2). The procedures followed with
respect to your institution's appeal will be those provided in 34 CFR
Part 668, Subpart H.
Program records relating to the period covered by this program review
must be retained until the later of: resolution of the loan, claim or
expenditure questioned in the program review, 34 CFR § 668.24 (e)(3)(I);
or the end of the retention period applicable to the record under 34 CFR
§ 668.24 (e) (1) and (e) (2).
Your continued cooperation throughout the program review process is
appreciated. If you have any questions, please contact Program Reviewer
at (212) 264-4022. Questions relating to any appeal of this final
program review determination should be directed to the address noted in
the [Appeal Procedures]{.underline} section of this letter.
Sincerely,
Area Case Director
Case Management Division - Northeast
New York Team
cc: Financial Aid Administrator
##
##
##
##
##
##
##
##
##
##
##
##
**[APPENDIX]{.underline}**
**[Student Name]{.underline}** **[Social Security \#]{.underline}**
**[1997/1998]{.underline}**
1\.
2\.
3\.
4\.
5\.
6\.
7\.
8\.
9\.
10\.
11\.
12\.
13\.
14\.
15\.
**[1998/1999]{.underline}**
16\.
17\.
18\.
19\.
20\.
21\.
22\.
23\.
24\.
25\.
26\.
27\.
28\.
29\.
30\.
[Additional Student Identified in File Review for Finding
#1]{.underline}
31\.
|
en
|
all-txt-docs
|
444876
|
SEC NEWS DIGEST
Issue 2007-50 March 15, 2007
COMMISSION ANNOUNCEMENTS
JOAN LOIZEAUX NAMED ASSOCIATE GENERAL COUNSEL FOR ADJUDICATION
The Commission announced today the selection of Joan L. Loizeaux to
serve as Associate General Counsel for Adjudication.
Ms. Loizeaux is currently serving as the Principal Assistant General
Counsel for Adjudication. Ms. Loizeaux has been at the Commission
since 1992 and before that was a partner at Hogan & Hartson, a partner
at Reed Smith Shaw & McClay, and an Assistant General Counsel at the
Commodity Futures Trading Commission.
Brian Cartwright, SEC General Counsel, said, "Joan brings to our
office a wealth of adjudicatory experience as well as the background
and experience necessary to assist in the management of the Office of
the General Counsel. She has extensive experience in securities law
and advising the Commission regarding appeals of decisions issued by
administrative law judges and by self-regulatory organizations. She is
highly regarded throughout the Commission and her combination of
expertise, intellect and judgment makes her exceptionally qualified to
serve in this position."
Ms. Loizeaux said, "I am very honored by this appointment. I look
forward to the opportunity to work with the Commission to serve
investors and the public interest. I am lucky to work with such a
talented group of attorneys and staff."
Ms Loizeaux received her J.D. from the UCLA School of Law in 1972. She
received her A.B., magna cum laude, from Occidental College in 1968
and is a member of Phi Beta Kappa. She will succeed Anne Chafer who
retired from the Commission in September. Ms. Loizeaux is married and
has one son. (Press Rel. 2007-43)
COMMISSION ANNOUNCES ADDITIONAL SPEAKER AND PANELISTS FOR MARCH 19
ROUNDTABLE: CREATING INTERACTIVE DATA TO SERVE INVESTORS
The Corporate Library CEO Richard Bennett to Address Event
The Securities and Exchange Commission announced today panelists
participating in the March 19 SEC roundtable on the use of interactive
data by public companies and mutual funds to improve disclosure for
individual investors. The Commission also announced that, following
the panel discussion, Richard A. Bennett, CEO of The Corporate
Library, will discuss the role that interactive data will play in
supporting good governance at public companies.
The roundtable will begin at 10:00 a.m. with brief remarks by Chairman
Cox, followed by an opening address by John J. Brennan, Chairman and
CEO of the Vanguard Group. Mr. Brennan is expected to discuss how
interactive data will allow investors to easily gather and compare
mutual fund risk and return information that might otherwise be buried
within disclosure documents.
Following Mr. Brennan's remarks, John W. White, Director of the
Commission's Division of Corporation Finance, will discuss the use of
interactive data to create better disclosure documents.
The roundtable will also feature a panel discussion on the benefits,
including potential cost savings, of preparing financial reports using
interactive data written in a computer language called XBRL. Panelists
will include executives at public companies currently providing
investors with interactive data on a test basis as part of the SEC's
voluntary filing program. The panel will be moderated by Chicago Sun-
Times personal finance columnist Terry Savage and feature the
following panelists:
Rob Blake, Vice President, Domain and Taxonomies, XBRL US, Inc.
James Cinquegrana, IT Team Leader, General Electric Company
Elmer H. Huh, Senior Vice President, Enterprise Valuation Group, Fixed
Income Department, Lehman Brothers Inc.
Thomas D. Jacob, Financial Manager, External Reporting, 3M Company
K. R. Kent, Vice Chairman and Chief Financial Officer, Ford Motor
Credit Company
Clare O'Leary, Director of Special Projects, Pfizer Inc.
Patsy J. Ramsey, Director of External Reporting, The Dow Chemical
Company
Nicholas M. Rolli, Vice President, Investor Relations and Financial
Communications, Altria Corporate Services, Inc.
Lawrence J. Salva, Senior Vice President, Chief Accounting Officer and
Controller, Comcast Corporation
Andrea Stegall, Vice President - Corporate Governance Compliance,
South Financial Group, Inc.
Harold I. Zeidman, Partner, Department of Professional Practice -
Audit and Risk, KPMG LLP
The roundtable will be held in the Auditorium at the Commission's
headquarters at 100 F Street, N.E., Washington, D.C., from 10:00 a.m.
to noon. The roundtable will be open to the public with seating on a
first-come, first-served basis. Doors will open at 9:30 a.m. Visitors
will be subject to security checks. Materials related to the
roundtable, including the day's agenda, are accessible at
http://www.sec.gov/spotlight/xbrl.htm. Real time and archived audio
and video webcasts will be accessible at http://www.sec.gov.
The Commission welcomes feedback on any aspect of the use of
interactive data. The information that is submitted will become part
of the public record of the roundtable. Submissions to the Commission
may be provided by any of the following methods: Electronic
submissions:
Use the Commission's Internet submission form at
www.sec.gov/news/press.shtml or
Send an e-mail to [email protected]. Please include File Number 4-
515 on the subject line.
Paper submissions:
Send paper submissions in triplicate to Nancy M. Morris, Secretary,
Securities and Exchange Commission, 100 F Street, N.E., Washington,
D.C. 20549-1090.
All submissions should refer to File Number 4-515. This file number
should be included on the subject line if e-mail is used. To help
process and review your submissions more efficiently, please use only
one method. The Commission will post all submissions on the
Commission's Internet Web site at http://www.sec.gov/news/press/4-
515.shtml.
Please note that all submissions received will be posted without
change; the SEC does not edit personal identifying information from
submissions. You should submit only information that you wish to make
available publicly. (Press Rel. 2007-44)
ENFORCEMENT PROCEEDINGS
SEC SETTLES WITH FORMER RAYTHEON OFFICERS FOR IMPROPER DISCLOSURE AND
ACCOUNTING PRACTICES
Former CFO, Controller, and Subsidiary CFO Agree To Pay Over $1.5
Million in Disgorgement and Penalties
The Commission announced today that it has instituted settled
enforcement proceedings against three former financial officers of
Raytheon Company and one of its subsidiaries. The SEC charged that
they were each involved in or aware of certain improper accounting
practices that operated as a fraud by failing to adequately and
accurately disclose the deteriorating financial results and business
of Raytheon's commercial aircraft manufacturing subsidiary. The SEC
also charged that each officer was involved in or aware of certain
false and misleading disclosures in Raytheon's periodic reports.
Named in the SEC's enforcement actions were Franklyn A. Caine, the
former CFO of Raytheon, Edward S. Pliner, Raytheon's former Controller
and former lead auditor, and James E. Gray, the former CFO of Raytheon
Aircraft Company (RAC). Without admitting or denying the SEC's
allegations or findings, Caine, Pliner, and Gray agreed to pay more
than $1.5 million combined to settle the Commission's charges.
According to the allegations in SEC's complaints filed today in the
U.S. District Court for the District of Columbia:
* Between 1997 and 1999, Raytheon improperly recognized revenue on
RAC's sale of unfinished aircraft through "bill and hold" sales
transactions that did not comply with Generally Accepted Accounting
Principles. These practices resulted in material overstatements of
RAC's reported annual net sales revenue and operating income in 1997
and 1998, enabling both RAC and Raytheon to meet certain internal and
external earnings targets. According to the SEC, Gray was personally
involved in these premature revenue recognition practices, and Pliner
was aware of them as the company's lead outside auditor.
* Between 1997 and 2001, there were certain improper disclosure and
accounting practices at Raytheon related to RAC's commuter aircraft
business, including the failure to adequately disclose in the
company's periodic reports material risks, trends, and uncertainties
associated with the deterioration of that business line. These
practices resulted in the failure to recognize between $67 million and
$240 million in losses that were inherent in a planned "soft landing"
of the commuter aircraft line at year-end 2000, which would have
reduced Raytheon's 2000 profit before taxes by 8 to 27 percent. These
losses were instead improperly taken during the third quarter of 2001,
when Raytheon recorded a $693 million charge related to its commuter
assets after September 11, 2001. Given the charge that should have
been taken at year-end 2000, Raytheon's third quarter 2001 commuter
loss provision was overstated by 10 to 53 percent. According to the
SEC, as the company's CFO, Caine was personally involved in and aware
of these practices throughout 2000 and 2001. In addition, as
Raytheon's lead auditor between 1997 and 1999, and as the company's
Controller in 2000 and 2001, Pliner was aware of and later personally
involved in these improper practices.
In an Administrative Order issued today, the SEC found that, during
2000 and 2001, Caine violated Sections 17(a)(2) and 17(a)(3) of the
Securities Act of 1933 and caused Raytheon's violations of Sections
13(a) and 13(b)(2)(A) and 13(b)(2)(B) of the Securities Exchange Act
of 1934, and Exchange Act Rules 12b-20, 13a-1, 13a-13, and 13b2-1.
Caine was ordered to cease and desist from committing or causing the
violations charged as well as any future violations of these
provisions. Caine also consented to the entry of a final judgment in
the related civil action for the purposes of awarding civil monetary
penalties and disgorgement. As part of the settlement, Caine consented
to pay $706,072 in disgorgement of certain past bonus amounts plus
pre-judgment interest, and a $125,000 civil penalty.
In addition, Pliner consented to the entry of a court order, which
permanently enjoins him from violating Sections 17(a)(2) and 17(a)(3)
of the Securities Act and from aiding and abetting violations of
Sections 13(a) and 13(b)(2)(A) and 13(b)(2)(B) of the Exchange Act,
and Exchange Act Rules 12b-20, 13a-1, 13a-13, and 13b2-1. Pliner was
ordered to pay $415,042 in disgorgement of certain past bonus amounts
plus pre-judgment interest, and a $150,000 civil penalty. Pliner also
consented to the entry of a Commission order that will suspend him,
based on entry of the injunction in the related civil action, from
appearing and practicing before the Commission as an accountant for
three years pursuant to Rule 102(e)(3) of the Commission's Rules of
Practice.
Finally, Gray consented to the entry of a court order, which
permanently enjoins him from violating Sections 17(a)(2) and 17(a)(3)
of the Securities Act and from aiding and abetting violations of
Sections 13(a) and 13(b)(2)(A) and 13(b)(2)(B) of the Exchange Act,
and Exchange Act Rules 12b-20, 13a-1, 13a-13, and 13b2-1. Gray was
also ordered to pay disgorgement of certain past bonus amounts and
pre-judgment interest in the total amount of $105,753.
For additional information concerning this matter, see Litigation
Release No. LR-19747 (June 28, 2006) and Administrative Proceeding
Release No. 33-8715 (June 28, 2006). [SEC v. Franklyn A. Caine, Civil
Action No. 07-CV-00494 (GK) D.D.C.; SEC v. Edward S. Pliner, Civil
Action No. 07-CV-00495 (GK) D.D.C.; SEC v. James E. Gray, Civil Action
No. 07-CV-00496 (GK) D.D.C.] (LR-20041; AAE Rel. 2577); Administrative
Proceeding - (Rels. 33-8790; 34-55476; AAE Rel. 2578; File No. 3-
12592)
SELF-REGULATORY ORGANIZATIONS
APPROVAL OF PROPOSED RULE CHANGES
The Commission granted approval to a proposed rule change (SR-
NYSEArca-2006-51) submitted by NYSE Arca relating to amendments to
registration rules of NYSE Arca Equities, Inc. Publication is expected
in the Federal Register during the week of March 19. (Rel. 34-55446)
The Commission granted approval to a proposed rule change (SR-
NYSEArca-2006-50) submitted by NYSE Arca relating to amendments to
registration rules of NYSE Arca Equities, Inc. Publication is expected
in the Federal Register during the week of March 19. (Rel. 34-55447)
The Commission approved a proposed rule change (SR-Amex-2007-08)
submitted by the American Stock Exchange to establish a Passive Price
Improvement order for Specialists and Registered Traders. Publication
is expected in the Federal Register during the week of March 19. (Rel.
34-55464)
IMMEDIATE EFFECTIVENESS OF PROPOSED RULE CHANGES
A proposed rule change (SR-BSE-2007-11) filed by the Boston Stock
Exchange to amend the existing fee schedules has become effective
under Section 19(b)(3)(A) of the Act. Publication is expected in the
Federal Register during the week of March 19. (Rel. 34-55450)
A proposed rule change (SR-Amex-2007-28) filed by the American Stock
Exchange relating to transaction charges for equities, ETFs, and
Nasdaq UTP securities has become immediately effective pursuant to
Section 19(b)(3)(A) of the Securities Exchange Act of 1934.
Publication is expected in the Federal Register during the week of
March 19. (Rel. 34-55459)
A proposed rule change (SR-Amex-2007-30) filed by the American Stock
Exchange relating to transaction charges for equities and ETFs has
become immediately effective pursuant to Section 19(b)(3)(A) of the
Securities Exchange Act of 1934. Publication is expected in the
Federal Register during the week of March 19. (Rel. 34-55460)
A proposed rule change (SR-NASD-2007-013) filed by the National
Association of Securities Dealers relating to portfolio margin has
become effective under Section 19(b)(3)(A) of the Securities Exchange
Act of 1934. Publication is expected in the Federal Register during
the week of March 19. (Rel. 34-55471)
SECURITIES ACT REGISTRATIONS
The following registration statements have been filed with the SEC
under the Securities Act of 1933. The reported information appears as
follows: Form, Name, Address and Phone Number (if available) of the
issuer of the security; Title and the number and/or face amount of the
securities being offered; Name of the managing underwriter or
depositor (if applicable); File number and date filed; Assigned
Branch; and a designation if the statement is a New Issue.
Registration statements may be obtained in person or by writing to the
Commission's Public Reference Branch at 100 F Street, N.E.,
Washington, D.C. 20549-1090 or at the following e-mail box address:
<[email protected]>. In most cases, this information is also
available on the Commission's website: <www.sec.gov>.
SB-2 K-Care Nutritional Products Inc., UNIT D - 1275 EAST 27TH STREET,
NORTH VANCOUVER, A1, V7J1S5, 6049860016 -
2,115,500 ($211,550.00) Equity, (File 333-141271 - Mar. 14) (BR. 02)
S-8 Switch & Data Facilities Company, Inc., 1715 NORTH WESTSHORE BOULEVARD,
SUITE 650, TAMPA, FL, 33607, 813-207-7700 - 0 ($74,107,629.68) Equity,
(File 333-141272 - Mar. 14) (BR. 11B)
S-1 Polypore International, Inc., (704) 588-5310 -
0 ($362,250,000.00) Equity, (File 333-141273 - Mar. 14) (BR. 06A)
S-1 Houston Wire & Cable CO, 10201 NORTH LOOP EAST, HOUSTON, TX, 77029,
(713) 609-2100 - 0 ($163,627,750.00) Equity, (File 333-141274 -
Mar. 14) (BR. 10)
S-8 KNOT INC, 462 BROADWAY 6TH FLOOR, NEW YORK, NY, 10013, 2122198555 -
1,235,318 ($28,548,199.00) Equity, (File 333-141275 - Mar. 14) (BR. 02B)
S-8 DREW INDUSTRIES INC, 200 MAMARONECK AVE, WHITE PLAINS, NY, 10601,
9144289098 - 600,000 ($16,953,000.00) Equity, (File 333-141276 -
Mar. 14) (BR. 05A)
S-8 PANACOS PHARMACEUTICALS, INC., 134 COOLIDGE AVE, WATERTOWN, MA, 02472,
617-926-1551 - 3,025,000 ($12,430,832.00) Equity, (File 333-141277 -
Mar. 14) (BR. 01C)
S-8 PNM RESOURCES INC, ALVARADO SQUARE, NEW MEXICO, ALBUQUERQUE, NM, 87158,
5052412700 - 0 ($3,000,000.00) Equity, (File 333-141281 - Mar. 14)
(BR. 02A)
S-8 PNM RESOURCES INC, ALVARADO SQUARE, NEW MEXICO, ALBUQUERQUE, NM, 87158,
5052412700 - 75,000 ($22,265,000.00) Equity, (File 333-141282 -
Mar. 14) (BR. 02A)
S-8 FOXHOLLOW TECHNOLOGIES, INC., 740 BAY ROAD, REDWOOD CITY, CA,
94063-2469, 650-421-8400 - 2,056,539 ($40,972,134.50) Equity,
(File 333-141285 - Mar. 14) (BR. 10B)
S-4 HSW International, Inc., 3350 PEACHTREE ROAD, SUITE 1500, ATLANTA, GA,
30326, (404) 364-5823 - 0 ($146,659,858.29) Equity, (File 333-141286 -
Mar. 14) (BR. 11)
S-8 MAXYGEN INC, 515 GALVESTON DRIVE, REDWOOD CITY, CA, 94063, 6502985300 -
0 ($7,233,321.60) Equity, (File 333-141287 - Mar. 14) (BR. 01B)
SB-2 Mar Ked Mineral Exploration, Inc., 555 JERVIS STREET, SUITE 1602,
VANCOUVER, A1, V6E 1N1, 604-647-0630 - 5,900,000 ($295,000.00) Equity,
(File 333-141288 - Mar. 14) (BR. )
S-1 Beneficial Mutual Bancorp Inc, 510 WALNUT STREET, PHILADELPHIA, PA,
19106, 215-864-6000 - 0 ($364,399,750.00) Equity, (File 333-141289 -
Mar. 14) (BR. )
F-3D FORDING CANADIAN COAL TRUST, SUITE 1000, 205-9TH AVE SE, CALGARY, A0,
T2G 0R4, 10,000,000 ($219,500,000.00) Equity, (File 333-141290 -
Mar. 14) (BR. 04B)
S-8 RAPTOR NETWORKS TECHNOLOGY INC, 1241 E. DYER ROAD, SUITE 150,
SANTA ANA, CA, 92705, (949) 623-9300 -
1,275,000 ($1,275,000.00) Equity, (File 333-141291 - Mar. 14) (BR. 03B)
F-6 eTelecare Global Solutions, Inc., 31ST FLOOR CYBERONE BUILDING,
EASTWOOD CITY, CYBERPARK BAGUMBAYAN, QUEZON CITY METRO MANILA, R6,
1110, 6329165670 - 100,000,000 ($5,000,000.00) Equity,
(File 333-141293 - Mar. 14) (BR. 08)
S-3 EURONET WORLDWIDE INC, HORVAT UTCA 14-24, BUDAPEST, K5, 1027,
36-1-224-1000 - 6,374,528 ($166,853,270.40) Equity, (File 333-141294 -
Mar. 14) (BR. 11C)
S-3 ENDWAVE CORP, 130 BAYTECH DRIVE, SAN JOSE, CA, 95134, (408)522-3100 -
3,000,000 ($37,500,000.00) Equity, (File 333-141295 - Mar. 14) (BR. 11C)
S-8 MICRON ENVIRO SYSTEMS INC, 789 WEST PENDER ST, SUITE 1250,
VANCOUVER BC, A1, V6C 1H2, 6046466903 -
10,000,000 ($655,000.00) Equity, (File 333-141297 - Mar. 14) (BR. 04A)
S-8 POLO RALPH LAUREN CORP, 650 MADISON AVENUE, NEW YORK, NY, 10022,
2123187000 - 6,000,000 ($513,000,000.00) Equity, (File 333-141298 -
Mar. 14) (BR. 02C)
S-8 Spirit AeroSystems Holdings, Inc., 3801 SOUTH OLIVER, WICHITA, KS,
67210, (316) 526-1100 - 0 ($138,425,591.92) Equity, (File 333-141299 -
Mar. 14) (BR. 05C)
S-3ASR CHATTEM INC, 1715 W 38TH ST, CHATTANOOGA, TN, 37409, 4238214571 -
0 ($125,000,000.00) Debt Convertible into Equity, (File 333-141300 -
Mar. 14) (BR. 01A)
S-4 CONAGRA FOODS INC /DE/, ONE CONAGRA DR, OMAHA, NE, 68102, 4025954000 -
0 ($499,999,000.00) Non-Convertible Debt, (File 333-141301 - Mar. 14)
(BR. 04A)
S-3ASR DELTA PETROLEUM CORP/CO, 370 SEVENTEENTH STREET, SUITE 4300, DENVER,
CO, 80202, 3032939133 - 0 ($13,820,820.00) Equity,
0 ($0.00) Unallocated (Universal) Shelf, (File 333-141303 - Mar. 14)
(BR. 04A)
RECENT 8K FILINGS
Form 8-K is used by companies to file current reports on the following events:
1.01 Entry into a Material Definitive Agreement
1.02 Termination of a Material Definitive Agreement
1.03 Bankruptcy or Receivership
2.01 Completion of Acquisition or Disposition of Assets
2.02 Results of Operations and Financial Condition
2.03 Creation of a Direct Financial Obligation or an Obligation under an
Off-Balance Sheet Arrangement of a Registrant
2.04 Triggering Events That Accelerate or Increase a Direct Financial Obligation
under an Off-Balance Sheet Arrangement
2.05 Cost Associated with Exit or Disposal Activities
2.06 Material Impairments
3.01 Notice of Delisting or Failure to Satisfy a Continued Listing Rule or
Standard; Transfer of Listing
3.02 Unregistered Sales of Equity Securities
3.03 Material Modifications to Rights of Security Holders
4.01 Changes in Registrant's Certifying Accountant
4.02 Non-Reliance on Previously Issued Financial Statements or a Related Audit
Report or Completed Interim Review
5.01 Changes in Control of Registrant
5.02 Departure of Directors or Principal Officers; Election of Directors;
Appointment of Principal Officers
5.03 Amendments to Articles of Incorporation or Bylaws; Change in Fiscal Year
5.04 Temporary Suspension of Trading Under Registrant's Employee Benefit Plans
5.05 Amendments to the Registrant's Code of Ethics, or Waiver of a
Provision of the Code of Ethics
6.01. ABS Informational and Computational Material.
6.02. Change of Servicer or Trustee.
6.03. Change in Credit Enhancement or Other External Support.
6.04. Failure to Make a Required Distribution.
6.05. Securities Act Updating Disclosure.
7.01 Regulation FD Disclosure
8.01 Other Events
9.01 Financial Statements and Exhibits
8-K reports may be obtained in person or by writing to the Commission's Public
Reference Branch at 100 F Street, N.E., Washington, D.C. 20549-1090 or at the
following e-mail box address: <[email protected]>. In most cases, this information
is also available on the Commission's website: <www.sec.gov>.
STATE 8K ITEM NO.
NAME OF ISSUER CODE DATE COMMENT
21ST CENTURY INSURANCE GROUP CA 5.02 03/08/07
310 HOLDINGS, INC. NV 8.01,9.01 03/14/07
ACCREDITED HOME LENDERS HOLDING CO DE 8.01,9.01 03/12/07
ACCURIDE CORP DE 1.01,9.01 03/13/07
Aces Wired Inc NV 8.01 03/08/07
Aces Wired Inc NV 1.01,5.02,9.01 03/08/07
ADAMS GOLF INC DE 2.02,9.01 03/14/07
ADUDDELL INDUSTRIES INC CO 2.01,9.01 03/08/07
ADVANCED ANALOGIC TECHNOLOGIES INC DE 5.02 03/08/07
Affinity Group Holding, Inc. DE 8.01,9.01 03/09/07
AFFINITY GROUP INC DE 8.01,9.01 03/09/07
AFFORDABLE RESIDENTIAL COMMUNITIES IN MD 8.01,9.01 03/14/07
AFP IMAGING CORP NY 1.01,9.01 03/14/07
Agassiz Energy, LLC MN 2.03 03/09/07
Agfeed Industries, Inc NV 8.01,9.01 03/14/07
AIRGAS INC DE 2.01,8.01,9.01 03/09/07
Akeena Solar, Inc. DE 1.01,3.02,8.01,9.01 03/08/07
ALLIANCEBERNSTEIN HOLDING L.P. DE 7.01,9.01 03/13/07
ALLIANCEBERNSTEIN L.P. DE 7.01,9.01 03/13/07
ALLIED WORLD ASSURANCE CO HOLDINGS LT 8.01,9.01 03/14/07
ALTUS EXPLORATIONS INC NV 3.02,9.01 03/08/07
AMEREN CORP MO 1.01,2.03,9.01 03/09/07
AMERICAN HOMEPATIENT INC DE 2.02,9.01 03/13/07
AMERICAN PHYSICIANS CAPITAL INC MI 5.02,9.01 03/08/07
AMERICAN TECHNICAL CERAMICS CORP DE 1.01,2.03 03/09/07
AMERICAN VANGUARD CORP DE 2.02 03/08/07 AMEND
AMERIGROUP CORP 7.01,8.01,9.01 03/13/07
AMREIT TX 2.02,9.01 03/13/07
ANADIGICS INC DE 7.01,8.01,9.01 03/14/07
ANTIGENICS INC /DE/ DE 5.02,9.01 03/08/07
APCO ARGENTINA INC/NEW 2.02,9.01 03/13/07
Argyle Security Acquisition CORP 1.01,9.01 03/14/07
Arran Funding LTD XX 1.01,9.01 03/14/07
ASTRONICS CORP NY 2.02,9.01 03/14/07
ATMEL CORP DE 3.01,9.01 03/08/07
ATS CORP DE 7.01,9.01 03/14/07
ATS CORP DE 3.03,9.01 03/14/07
AVANIR PHARMACEUTICALS CA 5.02 03/12/07
AVI BIOPHARMA INC OR 1.01,7.01,8.01 01/08/07
AXIS CAPITAL HOLDINGS LTD 5.02 03/08/07
BABYUNIVERSE, INC. FL 8.01,9.01 03/14/07
Banc of America Commercial Mortgage I DE 8.01,9.01 03/13/07
Banc of America Funding 2007-2 Trust DE 8.01,9.01 02/27/07
Banc of America Mortgage 2007-1 Trust DE 8.01,9.01 02/27/07
BCAP LLC Trust 2007-AA1 8.01,9.01 02/27/07
BEA SYSTEMS INC DE 1.01 03/09/07
BIG SKY ENERGY CORP NV 5.02 03/12/07
BIOFORCE NANOSCIENCES HOLDINGS, INC. NV 4.02 03/13/07 AMEND
BIOJECT MEDICAL TECHNOLOGIES INC OR 5.02 03/08/07
BIOLASE TECHNOLOGY INC DE 2.02,9.01 03/14/07
BIOSTEM, INC. NV 1.01,9.01 02/28/07
BIRNER DENTAL MANAGEMENT SERVICES INC CO 8.01 03/14/07
BJs RESTAURANTS INC CA 8.01,9.01 03/14/07
BLACKHAWK CAPITAL GROUP BDC INC DE 1.01 03/14/07
BODYTEL SCIENTIFIC INC. NV 8.01,9.01 03/14/07
BODYTEL SCIENTIFIC INC. NV 8.01,9.01 03/14/07
BRE PROPERTIES INC /MD/ MD 8.01,9.01 03/13/07
BRUNSWICK CORP DE 5.02 03/13/07
BSD MEDICAL CORP DE 7.01,9.01 03/14/07
BUCA INC /MN MN 2.02 03/13/07 AMEND
CABELAS INC DE 1.01,9.01 03/08/07
CABELAS INC DE 1.01,9.01 03/08/07 AMEND
CANO PETROLEUM, INC 5.02 03/12/07
CARDINAL FINANCIAL CORP VA 7.01 03/13/07
CATALINA MARKETING CORP/DE DE 1.01,3.03,7.01,9.01 03/08/07
CB RICHARD ELLIS GROUP INC DE 7.01,9.01 03/14/07
CB RICHARD ELLIS GROUP INC DE 5.02 03/08/07
CCH II LLC 5.02,9.01 03/14/07
CCO HOLDINGS LLC 5.02,9.01 03/14/07
CELSION CORP MD 5.02,9.01 03/12/07
CENTENNIAL COMMUNICATIONS CORP /DE DE 5.02,9.01 03/14/07
CENTERSTATE BANKS OF FLORIDA INC FL 5.02 03/14/07
CHARMING SHOPPES INC PA 7.01,9.01 03/12/07
CHARTER COMMUNICATIONS HOLDINGS LLC DE 5.02,9.01 03/14/07
CHARTER COMMUNICATIONS INC /MO/ DE 5.02,9.01 03/14/07
Chase Mortgage Finance Trust Series 2 DE 8.01,9.01 03/14/07
CHINACAST EDUCATION CORP DE 4.01,9.01 02/28/07 AMEND
CHIQUITA BRANDS INTERNATIONAL INC NJ 1.01,9.01 03/14/07
Churchill Ventures LTD 8.01,9.01 03/06/07
CIT GROUP INC DE 5.02,9.01 03/12/07
CITIBANK OMNI-S MASTER TRUST 8.01,9.01 03/14/07
CITRIX SYSTEMS INC DE 4.02,7.01,9.01 03/14/07
CLAIRES STORES INC DE 8.01,9.01 03/13/07
CLARIENT, INC DE 9.01 03/08/07 AMEND
CLEAN HARBORS INC MA 2.02,9.01 03/14/07
CLEAR CHANNEL COMMUNICATIONS INC TX 8.01,9.01 03/13/07
CLEVELAND CLIFFS INC OH 8.01 03/13/07
CMS ENERGY CORP MI 1.01,2.01,9.01 03/13/07
CNL INCOME PROPERTIES INC MD 9.01 12/22/06 AMEND
COAST DISTRIBUTION SYSTEM INC DE 7.01,9.01 03/08/07 AMEND
COCA COLA BOTTLING CO CONSOLIDATED /D DE 2.03,9.01 03/08/07
COMCAST CORP PA 8.01,9.01 02/26/07
COMMUNITY BANKS INC /PA/ PA 1.01,2.03,9.01 03/09/07
COMPUTER HORIZONS CORP NY 3.01,9.01 03/09/07
CONOLOG CORP DE 1.01,3.02,9.01 03/12/07
CONSUMERS FINANCIAL CORP PA 4.01,9.01 02/21/07 AMEND
CRDENTIA CORP DE 1.01,5.02,9.01 03/08/07
CRITICAL THERAPEUTICS INC DE 1.01,7.01 03/13/07
CROGHAN BANCSHARES INC OH 5.02 03/13/07
CRYO CELL INTERNATIONAL INC DE 2.02,9.01 03/14/07
Cyclacel Pharmaceuticals, Inc. DE 5.02 03/09/07
CYPRESS BIOSCIENCE INC DE 2.02,9.01 03/14/07
CYPRESS SEMICONDUCTOR CORP /DE/ DE 1.01,2.03,3.02,8.01,9.01 03/07/07
DEARBORN BANCORP INC /MI/ MI 8.01,9.01 01/04/07 AMEND
DENDREON CORP DE 2.02,9.01 03/14/07
DENNYS CORP DE 1.01,9.01 03/08/07
DENTAL PATIENT CARE AMERICA INC UT 1.01,2.01,9.01 03/09/07
DEPOMED INC CA 2.02,9.01 03/14/07
Deutsche Alt-A Securities Mortgage Lo 8.01,9.01 03/14/07
Deutsche Alt-A Securities Mortgage Lo 8.01,9.01 03/14/07
DIAMOND DISCOVERIES INTERNATIONAL COR DE 5.02,9.01 03/13/07
Diamond I, Inc. DE 1.01,7.01,9.01 03/09/07
DIGITAL RIVER INC /DE DE 7.01 03/12/07
DIOMED HOLDINGS INC NV 7.01,9.01 03/14/07
DIRECT INSITE CORP DE 5.02 03/12/07
DOWNEY FINANCIAL CORP DE 7.01,9.01 02/28/07
Dynegy Acquisition, Inc. DE 8.01,9.01 03/14/07
Eagle Bulk Shipping Inc. 7.01,9.01 03/12/07
EASTMAN KODAK CO NJ 5.02,9.01 03/14/07
ECOLLEGE COM DE 2.02,8.01,9.01 03/14/07
Eddie Bauer Holdings, Inc. DE 2.02,7.01,9.01 03/14/07
eHealth, Inc. DE 5.02 03/08/07
EMDEON CORP DE 5.02 03/08/07
ENDO PHARMACEUTICALS HOLDINGS INC DE 7.01,9.01 03/14/07
ENERGY PARTNERS LTD DE 1.01,9.01 03/13/07
ENESCO GROUP INC IL 4.01,9.01 03/08/07
EON COMMUNICATIONS CORP DE 8.01 03/14/07
EPIC CAPITAL GROUP, INC. CO 8.01 03/09/07
EQUINIX INC DE 1.01,3.02 03/12/07
EURONET WORLDWIDE INC DE 8.01,9.01 03/12/07
EURONET WORLDWIDE INC DE 8.01 03/14/07
EVOLVING SYSTEMS INC DE 2.02,7.01 03/12/07
EXELON CORP PA 7.01,9.01 03/14/07
EXPLORATION CO OF DELAWARE INC DE 2.02,9.01 03/13/07
EXPRESS SCRIPTS INC DE 8.01,9.01 03/14/07
FAIRPOINT COMMUNICATIONS INC DE 7.01,8.01,9.01 03/14/07
FBL FINANCIAL GROUP INC IA 1.01,2.03,9.01 03/12/07
FEDEX CORP DE 5.03,9.01 03/12/07
FIRST DATA CORP DE 5.02 03/11/07
First Federal of Northern Michigan Ba 8.01,9.01 03/13/07
FIRST INDIANA CORP IN 8.01,9.01 03/09/07
FIRST MARINER BANCORP MD 1.01,5.02,9.01 01/08/07
FIRSTCITY FINANCIAL CORP DE 7.01,9.01 03/13/07
FISHER COMMUNICATIONS INC WA 5.02 03/08/07
FLEETWOOD ENTERPRISES INC/DE/ DE 2.02,9.01 03/08/07
FOOTHILLS RESOURCES INC 8.01,9.01 03/14/07
FOOTSTAR INC DE 8.01 03/14/07
Fortress International Group, Inc. DE 2.02,9.01 03/14/07
FRIEDMAN BILLINGS RAMSEY GROUP INC VA 8.01 03/13/07
Frontier Airlines Holdings, Inc. DE 8.01,9.01 03/08/07
GALAXY ENERGY CORP CO 1.01,9.01 03/12/07
GALAXY NUTRITIONAL FOODS INC DE 5.02 03/08/07
GALLERY OF HISTORY INC NV 5.02 03/12/07
GAP INC DE 5.02,9.01 03/09/07
GateHouse Media, Inc. DE 1.01,9.01 03/13/07
GENERAL DATACOMM INDUSTRIES INC DE 1.01,2.03,9.01 03/09/07
General Finance CORP DE 1.01,8.01,9.01 03/08/07
GENTA INC DE/ DE 1.01,9.01 03/13/07
GENVEC INC DE 2.02,9.01 03/14/07
GEOKINETICS INC DE 5.02,9.01 03/08/07
GILEAD SCIENCES INC DE 5.02 03/09/07
GLIMCHER REALTY TRUST MD 5.02 03/08/07
GLOBAL INDUSTRIES LTD LA 5.02 03/08/07
GOLD STANDARD INC UT 4.01 03/12/07
GOLDEN STAR RESOURCES LTD 2.02,9.01 03/14/07
GOODRICH PETROLEUM CORP DE 2.02,9.01 03/13/07
GOODYEAR TIRE & RUBBER CO /OH/ OH 5.02 03/14/07
Gottaplay Interactive, Inc. NV 1.01,2.01,3.02 02/28/07
GREAT ATLANTIC & PACIFIC TEA CO INC MD 8.01 03/13/07
GSR Mortgage Loan Trust 2007-1F DE 8.01,9.01 02/28/07
GTSI CORP DE 8.01 03/13/07
HANOVER GOLD CO INC DE 2.01 03/08/07
HEALTH NET INC DE 8.01 03/13/07
HEALTHSOUTH CORP DE 1.01,9.01 03/12/07
HEALTHWAYS, INC DE 7.01 03/14/07
HERBST GAMING INC NV 2.02,9.01 03/14/07
HERCULES OFFSHORE, INC. DE 5.02,9.01 03/08/07
HERITAGE WORLDWIDE INC 5.02 03/09/07
HIBBETT SPORTS INC 2.02,7.01,9.01 03/14/07
HICKORY TECH CORP MN 2.02,7.01,9.01 03/14/07
HINES REAL ESTATE INVESTMENT TRUST IN 8.01 03/14/07
Home Equity Loan Trust 2007-HSA1 8.01,9.01 03/14/07
HORIZON OFFSHORE INC DE 5.02 03/09/07
HOT TOPIC INC /CA/ CA 2.02,9.01 03/14/07
HOTEL OUTSOURCE MANAGEMENT INTERNATIO DE 8.01 03/13/07
HOUSING PROGRAMS LTD CA 1.01,2.01 03/08/07
Houston Wire & Cable CO 2.02 03/14/07
Hyde Park Acquisition CORP DE 8.01,9.01 03/13/07
ICO Global Communications (Holdings) DE 5.02 03/12/07
ICO INC TX 7.01 03/12/07
ICU MEDICAL INC/DE DE 1.01 03/13/07
IndyMac INDX Mortgage Loan Trust 2007 8.01,9.01 02/27/07
INN OF THE MOUNTAIN GODS RESORTS & CA 2.02,9.01 03/13/07
INNKEEPERS USA TRUST/FL MD 8.01,9.01 03/14/07
INNOCOM TECHNOLOGY HOLDINGS, INC. NV 7.01,8.01,9.01 03/13/07
INNOVO GROUP INC DE 1.01,2.01,9.01 05/17/05 AMEND
INSIGHT ENTERPRISES INC DE 3.01 03/12/07
INSITE VISION INC DE 2.02,9.01 03/14/07
INTERMOUNTAIN REFINING CO INC NM 2.01 02/28/07
INTERSECTIONS INC DE 1.01 03/08/07
ISLAND PACIFIC INC DE 5.02,9.01 03/14/07
ISTA PHARMACEUTICALS INC DE 1.01,2.03,9.01 03/12/07
Ithaka Acquisition Corp DE 1.01,9.01 02/23/07
IVI COMMUNICATIONS INC NV 3.02,5.03,9.01 03/12/07
J CREW GROUP INC DE 2.02,9.01 03/13/07
J P MORGAN CHASE & CO DE 9.01 03/09/07
J.P. Morgan Alternative Loan Trust 20 DE 8.01,9.01 03/14/07
J2 GLOBAL COMMUNICATIONS INC DE 8.01,9.01 03/14/07
J2 GLOBAL COMMUNICATIONS INC DE 8.01,9.01 03/14/07 AMEND
JACLYN INC DE 3.02,9.01 03/06/07
JANUS CAPITAL GROUP INC DE 5.02,9.01 03/12/07
JARDEN CORP DE 1.01,1.02,5.02,9.01 03/09/07
Jazz Technologies, Inc. DE 5.02 03/12/07
JEWETT CAMERON TRADING CO LTD OR 8.01 03/13/07
Keewatin Windpower Corp. NV 3.02 03/13/07
KENEXA CORP 5.02 03/08/07
Kentucky First Federal Bancorp 8.01,9.01 03/13/07
KNOVA SOFTWARE, INC. DE 1.02,2.01,3.01,3.03,5.01,5.02, 03/13/07
5.03,8.01,9.01
KRONOS WORLDWIDE INC 2.02,7.01,9.01 03/12/07
L 3 COMMUNICATIONS HOLDINGS INC DE 8.01 03/14/07
LAKE AREA CORN PROCESSORS LLC 7.01,9.01 03/14/07
LAKES ENTERTAINMENT INC MN 7.01,9.01 03/12/07
LANCE INC NC 5.02,9.01 03/08/07
LAND O LAKES INC 8.01 03/12/07
LB-UBS Commercial Mortgage Trust 2007 8.01,9.01 02/27/07
LB-UBS Commercial Mortgage Trust 2007 8.01,9.01 02/27/07
LEHMAN ABS CORP BELLSOUTH CAPITAL FUN DE 8.01,9.01 02/28/07
LEHMAN ABS CORP BELLSOUTH DEBT- BACKE DE 8.01,9.01 02/28/07
LEHMAN BROTHERS HOLDINGS INC DE 2.02,9.01 03/14/07
LEHMAN BROTHERS HOLDINGS INC DE 9.01 03/09/07
Lev Pharmaceuticals Inc DE 8.01,9.01 03/14/07
LEVEL 3 COMMUNICATIONS INC DE 7.01 03/14/07
LIGHTBRIDGE INC DE 2.05 10/10/06 AMEND
LILLY ELI & CO IN 8.01,9.01 03/07/07
LIME ENERGY CO. DE 8.01,9.01 03/13/07
Lincoln Park Bancorp 1.01,9.01 03/08/07
LIQUIDITY SERVICES INC 8.01,9.01 03/14/07
LPATH, INC NV 8.01 03/08/07
LSB FINANCIAL CORP IN 2.02,9.01 03/13/07
MACDERMID INC CT 7.01,9.01 03/14/07
MASTR Adjustable Rate Mortgages Trust DE 8.01,9.01 03/14/07
MAUI LAND & PINEAPPLE CO INC HI 5.02,9.01 03/12/07
MAXIMUS INC VA 8.01,9.01 03/13/07
MAXYGEN INC DE 2.02 02/06/07 AMEND
Measurement Specialties Inc NJ 5.02,9.01 03/14/07
MedaSorb Technologies CORP 8.01 02/25/07
MEDCATH CORP DE 8.01,9.01 03/13/07
Medical Exchange Inc. NV 1.01,2.01,2.03,9.01 03/07/07
MEDIS TECHNOLOGIES LTD DE 2.02,9.01 03/14/07
MEGOLA INC 4.01,9.01 03/13/07
MELLON BANK N A MA 8.01,9.01 03/09/07
MEMORY PHARMACEUTICALS CORP 8.01,9.01 03/13/07
MERRIMAC INDUSTRIES INC DE 1.01,3.03,9.01 03/13/07
METALICO INC 7.01,9.01 03/13/07
MIDDLEBY CORP DE 5.02,9.01 03/08/07
MIDDLESEX WATER CO NJ 8.01 03/14/07
MILLER INDUSTRIES INC /TN/ TN 2.02,9.01 03/14/07
ML-CFC Commercial Mortgage Trust 2007 DE 8.01,9.01 03/14/07
MMC ENERGY, INC. DE 8.01 03/12/07
Morgan Stanley Capital I Trust 2007-H DE 8.01,9.01 03/14/07
Morgan Stanley Home Equity Loan Trust DE 8.01,9.01 02/28/07
Morgan Stanley Mortgage Loan Trust 20 DE 8.01,9.01 02/28/07
MOVIE GALLERY INC DE 1.01,1.02,2.03,8.01,9.01 03/08/07
MPLC, Inc. DE 5.02,9.01 03/08/07
MTI TECHNOLOGY CORP DE 3.01,9.01 03/08/07
NATIONAL BEVERAGE CORP DE 2.02,9.01 03/14/07
NATIONAL CITY CORP DE 7.01,9.01 03/14/07
National Collegiate Student Loan Trus 1.01,9.01 03/08/07
NATIONAL WESTERN LIFE INSURANCE CO CO 2.02,9.01 03/13/07
Neff Rental LLC DE 5.02 03/14/07
NETSOL TECHNOLOGIES INC NV 7.01,9.01 03/14/07
NEW CENTURY FINANCIAL CORP MD 1.02,2.04,3.01,8.01,9.01 03/13/07
NEW RIVER PHARMACEUTICALS INC VA 2.02,9.01 03/13/07
NEW WORLD BRANDS INC DE 4.01,9.01 09/15/06 AMEND
NEW YORK MORTGAGE TRUST INC MD 8.01,9.01 03/14/07
NEWFIELD EXPLORATION CO /DE/ DE 7.01,9.01 03/13/07
NewGen Technologies, Inc NV 5.02 03/14/07
NEWS CORP 8.01,9.01 03/14/07
Nissan Auto Receivables 2007-A Owner DE 8.01,9.01 02/22/07
NITROMED INC DE 1.01,1.02,9.01 03/09/07
NL INDUSTRIES INC NJ 2.02,7.01,9.01 03/13/07
NORTHEAST UTILITIES MA 8.01,9.01 03/12/07
NORTHERN ETHANOL, INC. DE 8.01 03/13/07
NORTHSTAR REALTY 7.01 03/13/07
NORTHWEST AIRLINES CORP DE 1.01 03/09/07
NOVADEL PHARMA INC DE 7.01,8.01,9.01 03/08/07
NOVAVAX INC DE 2.02,9.01 03/14/07
NPS PHARMACEUTICALS INC DE 2.02,2.05,5.02,9.01 03/14/07
NTN BUZZTIME INC DE 2.02,9.01 03/14/07
Oakmont Acquisition Corp. DE 7.01,9.01 03/13/07
OCEANFIRST FINANCIAL CORP DE 2.02,9.01 03/12/07
OCTILLION CORP 5.02 03/08/07
OMNI ENERGY SERVICES CORP LA 7.01,9.01 03/08/07
ONE LIBERTY PROPERTIES INC MD 9.01 12/31/06
ONE LIBERTY PROPERTIES INC MD 1.01,9.01 03/09/07
ONE VOICE TECHNOLOGIES INC NV 4.01,9.01 02/16/07 AMEND
ORACLE CORP 5.02 03/12/07
ORIGEN FINANCIAL INC DE 2.02,9.01 03/13/07
ORION ETHANOL, INC KS 1.01,5.02,9.01 03/10/07
ORTHOLOGIC CORP DE 2.02,9.01 03/14/07
OSPREY GOLD CORP NV 5.03,8.01 03/13/07
OVERSTOCK.COM, INC UT 8.01,9.01 03/14/07
OXFORD MEDIA, INC. NV 2.01,9.01 03/08/07
PACEL CORP NV 8.01 03/08/07
PACIFIC GAS & ELECTRIC CO CA 8.01,9.01 03/13/07
PACIFICORP /OR/ OR 8.01,9.01 03/14/07
PANDA ETHANOL, INC. NV 1.01,9.01 03/01/07 AMEND
PAR TECHNOLOGY CORP DE 1.01 03/08/07
Partners Financial CORP FL 8.01,9.01 03/09/07
PATRIOT NATIONAL BANCORP INC CT 2.02,9.01 03/13/07
PDL BIOPHARMA, INC. DE 8.01,9.01 03/12/07
PEERLESS SYSTEMS CORP DE 2.02,9.01 03/14/07
PETRO STOPPING CENTERS L P DE 1.01,9.01 03/09/07
PG&E CORP CA 8.01,9.01 03/13/07
PICO HOLDINGS INC /NEW CA 2.02,9.01 03/12/07
PINNACLE AIRLINES CORP DE 8.01,9.01 03/08/07
PLURIS ENERGY GROUP INC NV 8.01 03/08/07
PMC COMMERCIAL TRUST /TX TX 2.02,9.01 03/13/07
POINT THERAPEUTICS INC DE 3.01,9.01 03/13/07
POLYONE CORP 5.02 03/08/07
POWER 3 MEDICAL PRODUCTS INC NY 4.01,9.01 03/08/07
PPT VISION INC MN 1.01,3.02,5.03,9.01 03/08/07
PRB Energy, Inc. NV 5.02 03/08/07 AMEND
PRINCIPAL LIFE INSURANCE CO IA 9.01 03/09/07
PRINCIPAL LIFE INSURANCE CO IA 9.01 03/09/07
PROGRESSIVE CORP/OH/ OH 7.01,9.01 03/14/07
PROSPECT ENERGY CORP MD 8.01,9.01 03/14/07
QUALMARK CORP CO 1.01,2.03 03/13/07
QUESTCOR PHARMACEUTICALS INC CA 5.02 03/08/07
RALI Series 2007-QA2 Trust DE 8.01,9.01 03/14/07
RALI Series 2007-QH2 Trust DE 8.01,9.01 03/14/07
RALI Series 2007-QS3 Trust DE 8.01,9.01 03/14/07
RASC Series 2007-KS1 Trust DE 8.01,9.01 03/14/07 AMEND
REGIONS FINANCIAL CORP DE 5.03,5.05,9.01 03/08/07
REPUBLIC AIRWAYS HOLDINGS INC DE 1.01,9.01 03/13/07
Residential Asset Securitization Trus 8.01,9.01 02/27/07
Residential Asset Securitization Trus 8.01,9.01 02/27/07
RFMSI Series 2007-S2 Trust DE 8.01,9.01 03/14/07
ROHM & HAAS CO DE 2.03,9.01 03/09/07
ROMA FINANCIAL CORP X1 2.02,9.01 03/09/07
RUB A DUB SOAP INC CO 3.02 03/14/07 AMEND
RUBIOS RESTAURANTS INC DE 7.01,9.01 03/14/07
RUSS BERRIE & CO INC NJ 1.01,5.02 03/13/07
SABRE HOLDINGS CORP DE 8.01 03/13/07
SAKS INC TN 8.01,9.01 03/14/07
SANTARUS INC DE 8.01 03/12/07
SAPIENT CORP DE 5.02 03/08/07
SE FINANCIAL CORP 2.02,9.01 03/12/07
SEACHANGE INTERNATIONAL INC DE 2.02,9.01 03/13/07
SELECT COMFORT CORP 7.01,9.01 03/14/07
SENSUS METERING SYSTEMS BERMUDA 2 LTD 5.02 03/09/07
SEQUA CORP /DE/ DE 5.02,9.01 03/14/07
SEQUIAM CORP CA 2.04,9.01 03/14/07
SHANDONG RUITAI CHEMICAL CO., LTD DE 5.03 03/12/07
Sibling Entertainment Group, Inc. NY 2.03,9.01 03/14/07
SIERRA PACIFIC RESOURCES /NV/ NV 1.01 03/09/07
SIGMA ALDRICH CORP DE 7.01,9.01 03/13/07
SIGMA ALDRICH CORP DE 1.01,2.03,9.01 03/13/07
SIRICOMM INC DE 8.01,9.01 03/14/07
SIRVA INC DE 5.02,9.01 03/08/07
SOMANETICS CORP MI 2.02,9.01 03/14/07
SONIC AUTOMOTIVE INC DE 5.02 03/13/07
SOUTH TEXAS OIL CO NV 2.01,8.01,9.01 03/14/07
SOUTH TEXAS OIL CO NV 4.01,5.02,9.01 03/14/07 AMEND
SOVEREIGN BANCORP INC PA 5.02 03/08/07
SPECIALIZED HEALTH PRODUCTS INTERNATI DE 2.02,9.01 03/14/07
SPECTRE GAMING INC MN 5.02,9.01 02/26/07
SPECTRUM PHARMACEUTICALS INC DE 2.02,9.01 03/14/07
SPECTRX INC DE 1.01,2.03,3.02 03/14/07 AMEND
SPEEDWAY MOTORSPORTS INC DE 2.02,9.01 03/14/07
STAAR SURGICAL CO DE 7.01 03/06/07
Stereotaxis, Inc. DE 1.01 03/12/07
STONELEIGH ACQUISITION CORP. DE 1.01,5.01,5.02,9.01 03/11/07
SULPHCO INC NV 3.02,5.02,9.01 03/12/07
SUPERGEN INC DE 2.02,9.01 03/14/07
SUREWEST COMMUNICATIONS CA 2.02,9.01 03/14/07
TBW Mortgage-Backed Trust Series 2007 DE 8.01,9.01 02/27/07
TBW Mortgage-Backed Trust Series 2007 DE 8.01,9.01 02/27/07
TECHNOLOGY SOLUTIONS COMPANY DE 5.02 03/14/07
Thornburg Mortgage Securities Trust 2 DE 8.01,9.01 02/27/07
TITAN PHARMACEUTICALS INC DE 1.02 03/12/07
Triton Petroleum Group Inc 8.01 03/14/07
TRUEYOU.COM DE 2.04,9.01 03/08/07
TRUEYOU.COM DE 5.02 03/12/07
U S GOLD CORP CO 7.01,8.01,9.01 03/14/07
U S GOLD CORP CO 7.01,8.01,9.01 03/14/07
U S GOLD CORP CO 7.01,8.01,9.01 03/14/07
ULTRALIFE BATTERIES INC DE 7.01,9.01 03/14/07
UMPQUA HOLDINGS CORP OR 8.01,9.01 03/14/07
UNIPROP MANUFACTURED HOUSING COMMUNIT MI 1.01 03/12/07
UNITEDHEALTH GROUP INC MN 8.01 03/13/07
Uranium Star Corp. NV 4.01,7.01,9.01 12/22/06 AMEND
VALENCE TECHNOLOGY INC DE 1.01,5.02,9.01 02/01/07
VALENCE TECHNOLOGY INC DE 8.01,9.01 03/13/07
Valera Pharmaceuticals Inc 8.01 03/12/07
VALHI INC /DE/ DE 2.02,7.01,9.01 03/14/07
VALLEY NATIONAL BANCORP NJ 7.01,9.01 03/14/07
VARSITY GROUP INC 1.01,2.03 03/08/07
VENTURES UNITED INC UT 8.01,9.01 03/14/07
VIEWPOINT CORP DE 2.02,9.01 03/14/07
VIEWSONIC CORP DE 5.02 03/08/07
VITAL IMAGES INC MN 8.01 03/09/07
Warner Music Group Corp. DE 1.01 03/14/07
WASHINGTON MUTUAL, INC WA 5.02 03/08/07
WATAIRE INTERNATIONAL, INC. WA 5.02 03/14/07
WEBEX COMMUNICATIONS INC DE 5.02,9.01 03/01/07
WebMD Health Corp. DE 5.02 03/08/07
Wells Fargo Alternative Loan 2007-PA1 DE 8.01,9.01 02/27/07
Wells Fargo Mortgage Backed Securitie DE 8.01,9.01 02/27/07
WEST PHARMACEUTICAL SERVICES INC PA 1.01,2.03,8.01,9.01 03/09/07
WHOLE FOODS MARKET INC TX 8.01 03/13/07
WILD OATS MARKETS INC DE 8.01 03/13/07
WILLBROS GROUP INC R1 2.02,9.01 03/08/07
WILLIS GROUP HOLDINGS LTD D0 8.01,9.01 03/13/07
WOLVERINE TUBE INC DE 2.02,9.01 03/14/07
WORLD HEART CORP A6 5.02,9.01 03/08/07
WPT ENTERPRISES INC 1.01,9.01 03/08/07
ZIPREALTY INC 2.02,9.01 03/14/07
Zumiez Inc 2.02,9.01 03/14/07
|
en
|
markdown
|
160184
|
# Presentation: 160184
## MODIS Surface Albedos and Distribution of Global Ecosystem Types
*Eric G. Moody**1,2**, Michael D. King**1**, Steven Platnick**1,3**, Crystal Schaff**4*
*1*NASA Goddard Space Flight Center
*2*Emergent IT, Inc.
*3*University of Maryland Baltimore County
*4*Boston University
- Outline
- Motivation
- Issues with original albedo scheme
- New Ecosystem-Albedo seasonal model
- Description of ecosystem classifications
- Implementation of new model
- Summary and future directions
## Motivation
- Retrieval of Cloud Optical Properties (MOD06OD)
- Computes optical thickness and effective radius using White-Sky surface albedos at wavelengths of 0.659, 0.865, 1.24, 1.6, 2.1, and 3.7 microns.
- Inaccurate albedo value will enhance or attenuate reflectance.
- Can cause retrieval failures and unreasonable/unphysical results.
- Preparation for consistent year processing.
- Pre- and post-launch White Sky Surface Albedo scheme flagged for update.
- [email protected]
- Eric G. Moody
## Original Albedo Scheme
- Scheme used IGBP ecosystem classifications as a surrogate for albedo.
- eg. Table of albedos for each ecosystem.
- Albedo data obtained from CERES/SARB.
- Issues with the scheme:
- Broad-banded data.
- Led to key bands having same surface albedo.
- No seasonal variation in albedo.
- Ecosystem with growth cycles not represented.
- Coarse resolution CERES IGBP global ecosystem map.
- 1 degree resolution left signatures
- [email protected]
- Eric G. Moody
## Design Parameters
- Fine resolution (10km) IGBP ecosystem and albedo data.
- Albedos at wavelengths of interest.
- Seasonally dependent albedo data set.
- Sufficient data to generate global albedo maps.
- -OR-
- Sufficient data to create an ecosystem-albedo surrogate.
- [email protected]
- Eric G. Moody
## MODIS-Land Products.
- Drs. Alan Strahler and Crystal Schaaf
- Boson Univ. Center for BRDF/Albedo Research
- MOD12 - Ecosystem Classification
- 10 km resolution, globally.
- Includes updates of IGBP classifications.
- MOD43B - BRDF/Albedo Product
- 10 km resolution, 16-day global composites.
- Includes White-Sky Albedos at specific wavelengths of interest.
- [email protected]
- Eric G. Moody
## Sufficient Data Available?
- NO (at the time of consistent year code delivery).
- Only 2 data sets certified for quantitative use.
- Spanned October, 2000.
- [email protected]
- Eric G. Moody
## Preliminary Analysis.
- Create seasonal ecosystem-albedo scheme if:
- Northern and Southern Hemispheres differ statistically.
- Sufficient data samples for each ecosystem type.
- Ecosystem-Albedo correlate.
- Analysis
- Compute statistics for “latitude belts” of varying sizes
- Mean, standard deviation, and sample size
- Albedos at various wavelengths, for each ecosystem type.
- Results
- All three criteria met.
- [email protected]
- Eric G. Moody
## Model Description.
- Tropics, no seasonal effect.
- Seasonally dependant.
- Transition region.
- [email protected]
- Eric G. Moody
## Model Data.
- Seasonally Dependent Regions.
- Northern Hemisphere values assumed to be winter albedos at the winter solstice.
- Southern Hemisphere values assumed to be summer albedos at the summer solstice.
- Sinusoidal fit of these albedos to simulate seasonality.
- Tropical Region (no seasonal effects)
- Albedos at various bands computed for ecosystem types
- Transition Region (some seasonal effects)
- Linear fit between tropical and north/south albedos.
- [email protected]
- Eric G. Moody
## IGBP Ecosystem Classifications
- Forests:
- Evergreen Needle and Broadleaf, Deciduous Needle and Broadleaf, and Mixed
- “Savannas”
- Closed and Open Shrublands, Woody Savanna, Savanna, Grasslands
- Other Vegetation
- Permanent Wetlands, Urban and Buildup, Cropland and Cropland Mosaics
- Miscellaneous:
- Permanent Snow/Ice, Tundra, Barren/Sparse, and Water Bodies
- [email protected]
- Eric G. Moody
## Global Ecosystem Distribution
- [email protected]
- Eric G. Moody
## Forest Ecosystem Distribution
- [email protected]
- Eric G. Moody
## Savanna Ecosystem Distribution
- [email protected]
- Eric G. Moody
## Other Vegetation Distribution
- [email protected]
- Eric G. Moody
## Miscellaneous Distributions
- [email protected]
- Eric G. Moody
## Slide 16
- [email protected]
- Eric G. Moody
## Slide 17
- [email protected]
- Eric G. Moody
## Slide 18
- [email protected]
- Eric G. Moody
## Slide 19
- [email protected]
- Eric G. Moody
## Slide 20
- [email protected]
- Eric G. Moody
## Slide 21
- [email protected]
- Eric G. Moody
## Slide 22
- [email protected]
- Eric G. Moody
## Slide 23
- [email protected]
- Eric G. Moody
## Slide 24
- [email protected]
- Eric G. Moody
## Slide 25
- [email protected]
- Eric G. Moody
## Slide 26
- [email protected]
- Eric G. Moody
## Standard Deviations.
- Albedo means at various wavelengths and times of year, for all ecosystem types, are within 7%.
- Majority are within 3%
- Suggests a reasonable correlation between ecosystem and albedo.
- [email protected]
- Eric G. Moody
## Slide 28
- [email protected]
- Eric G. Moody
## Albedo Movies
- _Albedo Movies_
- Loops through bands 0.65, 0.86,
- 1.24, 1.64, 2.1, and 3.7
- Loops through seasonal equinox
- and solstice, progressing from
- Julian days 91, 173, 293, 356
- _Ecosystem Color Scheme_
- Pink = Crops
- Green = Trees
- Yellows = Barren/Deserts
- Blues = Savannas
- [email protected]
- Eric G. Moody
## Ecosystem Color Scheme
- _Ecosystem Color Scheme_
- Pink = Crops
- Green = Trees
- Yellows = Barren/Deserts
- Blues = Savannas
- _Albedo Movies_
- Loops through bands 0.65, 0.86,
- 1.24, 1.64, 2.1, and 3.7
- Loops through seasonal equinox
- and solstice, progressing from
- Julian days 91, 173, 293, 356
- [email protected]
- Eric G. Moody
## Albedo Movies
- Loops through bands 0.65, 0.86,
- 1.24, 1.64, 2.1, and 3.7
- Loops through seasonal equinox
- and solstice, progressing from
- Julian days 91, 173, 293, 356
- _Ecosystem Color Scheme_
- Pink = Crops
- Green = Trees
- Yellows = Barren/Deserts
- Blues = Savannas
- [email protected]
- Eric G. Moody
## Ecosystem Color Scheme
- Pink = Crops
- Green = Trees
- Yellows = Barren/Deserts
- Blues = Savannas
- _Albedo Movies_
- Loops through bands 0.65, 0.86,
- 1.24, 1.64, 2.1, and 3.7
- Loops through seasonal equinox
- and solstice, progressing from
- Julian days 91, 173, 293, 356
- [email protected]
- Eric G. Moody
## Albedo Movies
- Loops through bands 0.65, 0.86,
- 1.24, 1.64, 2.1, and 3.7
- Loops through seasonal equinox
- and solstice, progressing from
- Julian days 91, 173, 293, 356
- _Ecosystem Color Scheme_
- Pink = Crops
- Green = Trees
- Yellows = Barren/Deserts
- Blues = Savannas
- [email protected]
- Eric G. Moody
## Ecosystem Color Scheme
- Pink = Crops
- Green = Trees
- Yellows = Barren/Deserts
- Blues = Savannas
- _Albedo Movies_
- Loops through bands 0.65, 0.86,
- 1.24, 1.64, 2.1, and 3.7
- Loops through seasonal equinox
- and solstice, progressing from
- Julian days 91, 173, 293, 356
- [email protected]
- Eric G. Moody
## Conclusions
- Improved surface albedo data for use in consistent year processing.
- Provided albedo and ecosystem data sets at a finer resolution.
- Added seasonal variability.
- Provided albedos at specific wavelengths of interest.
- Ecosystem can be used as a surrogate for albedo.
- [email protected]
- Eric G. Moody
## Future Directions
- Use a full year’s data (from consistent year) to improve ecosystem and albedo statistics.
- Investigate global albedo maps.
- Investigate ecosystem-albedo surrogate.
- ISRSE presentation, April 2002.
- Publish this work with BU group.
- [email protected]
- Eric G. Moody
|
en
|
markdown
|
235019
|
# Presentation: 235019
## National Estimates from the Drug Abuse Warning Network
- CAPT Kathy Poneleit
- United States Public Health Service
- Office of Applied Studies
- Substance Abuse & Mental Health Services Administration
- November 13, 2008
- _http://DAWNinfo.samhsa.gov_
## Today's Agenda
- No conflicts of interest
- Overview of DAWN
- Key findings from 2007
- Nonmedical use of opiates/opioids
- 2004-2007 comparisons
- Extended- vs. immediate-release oxycodone
- Extended- vs. immediate-release morphine
## DAWN Survey Design
- Stratified probability sample of hospitals
- Short-term, general, non-Federal hospitals with 24-hour emergency departments (EDs)
- National estimates account for:
- Sample design
- Unit nonresponse
- Partial nonresponse in responding hospital
## National Estimates
- Oversample areas (urban) +
- Remainder area (urban & rural)
## Source of DAWN Estimates, 2004-2007
| | 2004 | 2005 | 2006 | 2007 |
| --- | --- | --- | --- | --- |
| Eligible hospitals | 4,505 | 4,549 | 4,568 | 4,575 |
| Sample of hospitals | 556 | 562 | 544 | 542 |
| Responding hospitals | 220 | 224 | 205 | 207 |
| Response rate | 39.6 | 39.9 | 37.7 | 38.2 |
| Drug-related ED visits | 2,537,722 | 3,009,025 | 3,441,855 | 3,998,228 |
| Drugs reports | 4,047,135 | 4,624,455 | 5,384,817 | 6,247,718 |
**Notes:**
Response rate responding/issamped hospitals
Design weighted iss 24-26%
Weighted response is 24-26%
## DAWN Data Collection: Retrospective Review of Medical Records
- Source: DAWN, 2007 data, 11/11/2008
**National estimates**
**Charts reviewed 10,038,897**
**Cases found 375,031**
**Drug-related**
**ED visits **
**reviewed**
**ED visits **
**not reviewed**
## Analysis Domains
## Definition: Nonmedical Use of Pharmaceuticals
- Based on retrospective chart review
- Exceeded prescribed or recommended dose
- Used drugs prescribed for another
- Malicious poisoning
- Substance abuse
- Excludes drug-related suicide attempts
- Includes suicide ideation, plan, gesture
## Drug-Related ED Visit Rates, 2004-2007
- Source: National estimates from DAWN, 2004-2007
- No significant change
- 2006 vs. 2007
**Notes:**
The bars are in groups of 4 which represent sequentially the years 2004-2007
- Oxycodone
- Controlled and Immediate Release
## Nonmedical Use of Pharmaceuticals, Selected Opiates/Opioids, 2007
- Source: National estimates from DAWN, 2007
- * Single- & multi-ingredient formulations
**Notes:**
Starting with illicit drugs:
Here the confidence intervals help you see when differences are not statistically significant.
If the confidence intervals overlap, the estimates may not be different, such as cocaine & marijuana.
CIs also help you visualize the impact of sampling error. Some estimates are not very precise.
Cocaine: 67,429 – 184,413
Heroin: 31,369 – 63,839
Marijuana: 39,067 – 120,259
Stimulants: 20,860 – 64,216
Amphetamines – about 3⁄4 from toxicology findings
Methamphetamine
When drug screen tests only for amphetamines as a class, amphetamine positive could mean amphetamine or methamphetamine.
## Nonmedical Use of Pharmaceuticals, Selected Opiates/Opioids, 2007
- Source: National estimates from DAWN, 2007
- * Single- & multi-ingredient formulations
**Notes:**
Starting with illicit drugs:
Here the confidence intervals help you see when differences are not statistically significant.
If the confidence intervals overlap, the estimates may not be different, such as cocaine & marijuana.
CIs also help you visualize the impact of sampling error. Some estimates are not very precise.
Cocaine: 67,429 – 184,413
Heroin: 31,369 – 63,839
Marijuana: 39,067 – 120,259
Stimulants: 20,860 – 64,216
Amphetamines – about 3⁄4 from toxicology findings
Methamphetamine
When drug screen tests only for amphetamines as a class, amphetamine positive could mean amphetamine or methamphetamine.
## Classification of Oxycodone Reports
- Controlled release (CR)
- OxyContin (99%)
- Alternate terms:
- Generic OxyContin
- Teva OxyContin
- Impax OxyContin
- Oxycodone CR
- Oxycodone ER
- Oxycodone SR
- Immediate release (IR)
- acetaminophen-oxy
- e.g., Percocet (92%)
- aspirin-oxy
- e.g., Percodan
- ibuprofen-oxy
- e.g., Combunox
- oxycodone
- e.g., Roxicodone
## Classification of Oxycodone Reports (cont'd)
- Unknown release type (UK)
- Oxycodone (95%)
- alternate terms:
- Free oxycodone
- M-Oxy
- Oxycodone hydrochloride
- Oxycodone metabolites
## Nonmedical Use of Pharmaceuticals, Oxycodone, by Release Type, 2004-2007
- Source: National estimates from DAWN, 2004-2007
**Controlled**
**Immediate**
**Unknown**
**Notes:**
Starting with illicit drugs:
Here the confidence intervals help you see when differences are not statistically significant.
If the confidence intervals overlap, the estimates may not be different, such as cocaine & marijuana.
CIs also help you visualize the impact of sampling error. Some estimates are not very precise.
Cocaine: 67,429 – 184,413
Heroin: 31,369 – 63,839
Marijuana: 39,067 – 120,259
Stimulants: 20,860 – 64,216
Amphetamines – about 3⁄4 from toxicology findings
Methamphetamine
When drug screen tests only for amphetamines as a class, amphetamine positive could mean amphetamine or methamphetamine.
## Oxycodone, CR vs. IR – All Visits
- Source: DAWN estimates for the U.S., 2004-2007
- 2006 vs. 2007
- No significant change
**2004**
**2005**
**2006**
**2007**
## Oxycodone, CR vs. IR – Medical Use
- Source: DAWN estimates for the U.S., 2004-2007
- 2006 vs. 2007
- No Significant change
**2004**
**2005**
**2006**
**2007**
## Oxycodone, CR vs. IR – Nonmedical Use
- Source: DAWN estimates for the U.S., 2004-2007
- No significant change
- 2006 vs. 2007
**2004**
**2005**
**2006**
**2007**
## Oxycodone, CR vs. IR
- Source: DAWN estimates for the U.S., 2004-2007
**% of visits**
**Nonmedical use**
**Medical use**
## Nonmedical Use: Hydrocodone and Oxycodone by Release Type, 2004-2007
- Source: DAWN estimates for the U.S., 2004-2006
## Nonmedical Use: All Opiates/Opioids, ED Visit Rates, 2007
**ED visits per 100K population**
- Age
- Source: DAWN estimates for the U.S., 2007
## Nonmedical Use: All Hydrocodone, ED Visit Rates, 2007
**ED visits per 100K population**
- Age
- Source: DAWN estimates for the U.S., 2007
## Nonmedical Use: All Oxycodone, ED Visit Rates, 2007
**ED visits per 100K population**
- Age
- Source: DAWN estimates for the U.S., 2007
## Nonmedical Use: Oxycodone CR,ED Visit Rates, 2007
**ED visits per 100K population**
- Age
- Source: DAWN estimates for the U.S., 2007
## Nonmedical Use: Oxycodone IR,ED Visit Rates, 2007
**ED visits per 100K population**
- Age
- Source: DAWN estimates for the U.S., 2007
## Nonmedical Use: Oxycodone UK,ED Visit Rates, 2007
**ED visits per 100K population**
- Age
- Source: DAWN estimates for the U.S., 2007
## Nonmedical Use: Disposition from ED,Oxycodone by Release Type, 2007
- Nonmedical Use: Disposition from ED,Oxycodone by Release Type, 2007
- Source: DAWN estimates for the U.S., 2007
**% of ED visits**
**Controlled**
**Unknown**
**Immediate**
**Some **
**follow-up**
**No evidence**
**of follow-up**
**care**
## Nonmedical Use: Number of Drugs,Oxycodone by Release Type, 2007
- Nonmedical Use: Number of Drugs,Oxycodone by Release Type, 2007
- Source: DAWN estimates for the U.S., 2007
**% of ED visits**
**Controlled**
**Unknown**
**Immediate**
**Multiple**
**drugs**
## Nonmedical Use ED Visits: Conclusions
- Opioid analgesics nearing 287,000 visits
- 1⁄4 Oxycodone 1⁄4 Hydrocodone
- in immediate and unknown release types
- Highest visit rates in patients aged 21-54
- Majority of patients treated and released
- Polydrug use was higher for immediate versus controlled release
- Morphine
- Controlled and Immediate Release
## Nonmedical Use of Pharmaceuticals, Selected Opiates/Opioids, 2007
- Source: National estimates from DAWN, 2007
- * Single- & multi-ingredient formulations
**Notes:**
Starting with illicit drugs:
Here the confidence intervals help you see when differences are not statistically significant.
If the confidence intervals overlap, the estimates may not be different, such as cocaine & marijuana.
CIs also help you visualize the impact of sampling error. Some estimates are not very precise.
Cocaine: 67,429 – 184,413
Heroin: 31,369 – 63,839
Marijuana: 39,067 – 120,259
Stimulants: 20,860 – 64,216
Amphetamines – about 3⁄4 from toxicology findings
Methamphetamine
When drug screen tests only for amphetamines as a class, amphetamine positive could mean amphetamine or methamphetamine.
## Classification of Morphine Reports
- Controlled release (CR)
- MS Contin (71%)
- Alternate terms:
- Avinza
- Kadian
- Morphine Sulfate SR
- Oramorph SR
- Morphine Extended Release
- Morphine Patches
- Immediate release (IR)
- Morphine Sulfate
- Morphine Pill
- Morphine IR
- Morphine Rapi-Ject
- Roxanol
- Morphelan
## Nonmedical Use of Pharmaceuticals, Morphine, by Release Type, 2004-2007
- Source: National estimates from DAWN, 2004-2007
**Controlled**
**Immediate**
**Notes:**
Starting with illicit drugs:
Here the confidence intervals help you see when differences are not statistically significant.
If the confidence intervals overlap, the estimates may not be different, such as cocaine & marijuana.
CIs also help you visualize the impact of sampling error. Some estimates are not very precise.
Cocaine: 67,429 – 184,413
Heroin: 31,369 – 63,839
Marijuana: 39,067 – 120,259
Stimulants: 20,860 – 64,216
Amphetamines – about 3⁄4 from toxicology findings
Methamphetamine
When drug screen tests only for amphetamines as a class, amphetamine positive could mean amphetamine or methamphetamine.
## Morphine, CR vs. IR – All Visits
- Source: DAWN estimates for the U.S., 2004-2007
- 2006 vs. 2007
- No significant change
**2004**
**2005**
**2006**
**2007**
## Morphine, CR vs. IR – Medical Use
- Source: DAWN estimates for the U.S., 2004-2007
- 2006 vs. 2007
- No Significant change
## Morphine, CR vs. IR – Nonmedical Use
- Source: DAWN estimates for the U.S., 2004-2007
- No significant change
- 2006 vs. 2007
## Morphine, CR vs. IR
- Source: DAWN estimates for the U.S., 2004-2007
**% of visits**
**Nonmedical use**
**Medical use**
## Nonmedical Use: Hydrocodone and Morphine by Release Type, 2004-2007
- Source: DAWN estimates for the U.S., 2004-2006
## Nonmedical Use: All Morphine, ED Visit Rates, 2007
**ED visits per 100K population**
- Age
- Source: DAWN estimates for the U.S., 2007
## Nonmedical Use: Morphine CR,ED Visit Rates, 2007
**ED visits per 100K population**
- Age
- Source: DAWN estimates for the U.S., 2007
## Nonmedical Use: Morphine IR,ED Visit Rates, 2007
**ED visits per 100K population**
- Age
- Source: DAWN estimates for the U.S., 2007
## Nonmedical Use: Disposition from ED,Morphine by Release Type, 2007
- Nonmedical Use: Disposition from ED,Morphine by Release Type, 2007
- Source: DAWN estimates for the U.S., 2007
**% of ED visits**
**Controlled**
**Unknown**
**Immediate**
**Some **
**follow-up**
**No evidence**
**of follow-up**
**care**
## Nonmedical Use: Number of Drugs,Morphine by Release Type, 2007
- Nonmedical Use: Number of Drugs,Morphine by Release Type, 2007
- Source: DAWN estimates for the U.S., 2007
**% of ED visits**
**Controlled**
**Unknown**
**Immediate**
**Multiple**
**drugs**
## Nonmedical Use ED Visits: Conclusions
- Morphine related ED visits nearing 30,000
- Immediate release
- Controlled release is similar 2004-2007
- Highest visit rates in patients aged 21-54
- Majority of patients treated and released
- Polydrug use is typical
## Important Considerations:DAWN Depends on ED Medical Records
- Link between ED visit and use of drug
- Dose levels and source of drug unavailable
- Nonspecific drug reports
- Opiates/opioids, unspecified (unnamed)
- Unknown release-type
- Unique names for immediate versus extended release enable better surveillance
## Acknowledgements
- Rong Cai, Statistician
|
en
|
converted_docs
|
935533
|
<table style="width:100%;">
<colgroup>
<col style="width: 3%" />
<col style="width: 4%" />
<col style="width: 38%" />
<col style="width: 4%" />
<col style="width: 4%" />
<col style="width: 1%" />
<col style="width: 4%" />
<col style="width: 4%" />
<col style="width: 13%" />
<col style="width: 2%" />
<col style="width: 17%" />
<col style="width: 2%" />
<col style="width: 0%" />
</colgroup>
<tbody>
<tr class="odd">
<td colspan="13">OMB No. 3095-0038 Expires XX/XX/XXXX</td>
</tr>
<tr class="even">
<td colspan="3"><h2 id="court-order-requirements">COURT ORDER
REQUIREMENTS</h2></td>
<td colspan="10">OBTAINING FEDERAL PERSONNEL AND MEDICAL RECORDS
(MILITARY OR CIVILIAN) PURSUANT TO COURT ORDER OR SUBPOENA</td>
</tr>
<tr class="odd">
<td colspan="5">NAME OF SUBJECT OF RECORD</td>
<td colspan="4">SSAN/SN</td>
<td colspan="4">DATE OF INQUIRY</td>
</tr>
<tr class="even">
<td colspan="5"> </td>
<td colspan="4"> </td>
<td colspan="4"> </td>
</tr>
<tr class="odd">
<td></td>
<td colspan="12">Your subpoena is being returned without action because
it does not meet all the requirements outlined below.</td>
</tr>
<tr class="even">
<td colspan="13"><p>Access to military or civilian personnel and medical
records on file at the National Personnel Records Center, St. Louis,
Missouri, may be gained pursuant "to the order of a court of competent
jurisdiction." Valid court orders should be addressed to this Center.
Subpoenas qualify as orders of a court of competent jurisdiction only if
they have been signed by a judge. To be valid, court orders must also be
signed by a judge. Authority for these requirements is 5 U.S.C.
552a(b)(11), as interpreted by <u>Doe</u> vs. <u>DiGenova</u>, 779 F. 2d
74 (D.C. Cir. 1985), and <u>Stiles</u> vs. <u>Atlanta Gas and Light
Company</u>, 453 F. Supp. 798 (N.D. Ga. 1978).</p>
<p>Please furnish the address of the clerk of the court so that
photocopies may be furnished in the form of a certificate under seal to
the clerk of the court issuing the order. Or, the photocopies may be
sent to a recipient other than the clerk of the court as long as the
order of the court names another recipient and gives the appropriate
address. Under applicable Federal law, photocopies so certified shall be
admitted into evidence as original records 44 U.S.C. Sec. 2116(b). It is
also helpful to furnish the names and addresses of attorneys
involved.</p>
<p>The court order must describe the records and information desired in
sufficient detail to identify them with accuracy. A minimum of detail
would include as many of the following as possible: the complete name,
service number, social security number, date of birth, branch of service
or Federal agency by which employed, and dates of military service
(active, reserve, or retired) or of Federal employment. If clinical
treatment records are needed, include also the dates, places, and
type(s) of treatment given.</p>
<p>The court order should be addressed and sent by mail to either of the
following addresses, as appropriate:</p></td>
</tr>
<tr class="odd">
<td colspan="4"><blockquote>
<p>Director</p>
<p>National Personnel Records Center, NARA</p>
<p>(Military Personnel Records)</p>
<p>9700 Page Avenue</p>
<p>St. Louis, MO 63132-5100</p>
</blockquote></td>
<td colspan="9"><blockquote>
<p>Director</p>
<p>National Personnel Records Center, NARA</p>
<p>(Civilian Personnel Records)</p>
<p>111 Winnebago Street</p>
<p>St. Louis, MO 63118-4199</p>
</blockquote></td>
</tr>
<tr class="even">
<td></td>
<td colspan="12">As an alternative to obtaining a court order, you may
obtain certified copies of military or civilian personnel and medical
records by providing the signed and dated release authorization of the
subject of the record. The release authorization must be dated within
the last year and must state specifically that the documents may be
released to you.</td>
</tr>
<tr class="odd">
<td></td>
<td colspan="12"> </td>
</tr>
<tr class="even">
<td colspan="13"></td>
</tr>
<tr class="odd">
<td colspan="13"><h1
id="paperwork-reduction-act-public-burden-statement">PAPERWORK REDUCTION
ACT PUBLIC BURDEN STATEMENT</h1>
<h1
id="you-are-not-required-to-provide-the-information-requested-on-a-form-that-is-subject-to-the-paperwork-reduction-act-unless-the-form-displays-a-valid-omb-control-number.-the-information-requested-on-this-form-is-being-collected-and-used-by-the-national-personnel-records-center-to-ensure-that-the-requirement-is-met-to-obtain-either-a-court-order-or-a-release-from-the-veteran-before-access-to-military-and-civilian-personnel-and-medical-records-is-granted.-public-burden-reporting-for-this-collection-of-information-is-estimated-to-be-fifteen-minutes-per-response-including-time-for-reviewing-instructions-and-completing-and-reviewing-the-collection-of-information.-send-comments-regarding-the-burden-estimate-or-any-other-aspect-of-the-collection-of-information-including-suggestions-for-reducing-this-burden-to-national-archives-and-records-administration-nhp-8601-adelphi-road-college-park-md-20740-6001.-do-not-send-completed-forms-to-this-address.-send-completed-forms-to-the-address-shown-below.">You
are not required to provide the information requested on a form that is
subject to the Paperwork Reduction Act unless the form displays a valid
OMB control number. The information requested on this form is being
collected and used by the National Personnel Records Center to ensure
that the requirement is met to obtain either a court order or a release
from the veteran before access to military and civilian personnel and
medical records is granted. Public burden reporting for this collection
of information is estimated to be fifteen minutes per response,
including time for reviewing instructions and completing and reviewing
the collection of information. Send comments regarding the burden
estimate or any other aspect of the collection of information, including
suggestions for reducing this burden, to National Archives and Records
Administration (NHP), 8601 Adelphi Road, College Park, MD 20740-6001. DO
NOT SEND COMPLETED FORMS TO THIS ADDRESS. SEND COMPLETED FORMS TO THE
ADDRESS SHOWN BELOW. </h1></td>
</tr>
<tr class="even">
<td colspan="13"></td>
</tr>
<tr class="odd">
<td colspan="7"></td>
<td rowspan="2"></td>
<td colspan="3" rowspan="2"> </td>
<td colspan="2" rowspan="2"></td>
</tr>
<tr class="even">
<td colspan="2" rowspan="7"></td>
<td colspan="4" rowspan="7"> </td>
<td rowspan="7"></td>
</tr>
<tr class="odd">
<td></td>
<td colspan="3"><p>Date</p>
<p> </p></td>
<td colspan="2"></td>
</tr>
<tr class="even">
<td colspan="5">Prepared by </td>
<td></td>
</tr>
<tr class="odd">
<td colspan="5"> Operations Branch Reference Service Branch</td>
<td></td>
</tr>
<tr class="even">
<td colspan="5">NATIONAL PERSONNEL RECORDS CENTER</td>
<td></td>
</tr>
<tr class="odd">
<td colspan="3" rowspan="3"><p> Military Personnel Records</p>
<p>9700 Page Avenue</p>
<p>St. Louis, MO 63132-5100</p></td>
<td colspan="2" rowspan="3"><p> Civilian Personnel Records</p>
<p>111 Winnebago Street</p>
<p>St. Louis, MO 63118-4199</p></td>
<td></td>
</tr>
<tr class="even">
<td></td>
</tr>
<tr class="odd">
<td colspan="2"></td>
<td colspan="4"></td>
<td></td>
<td></td>
</tr>
</tbody>
</table>
NATIONAL ARCHIVES AND RECORDS ADMINISTRATION NA FORM 13027 (REV. XX-05)
|
en
|
markdown
|
161248
|
# Presentation: 161248
## Rocky Mountain spotted fever: From dog ticks to doxycycline
***David L. Swerdlow, MD***
***Rickettsial Zoonoses Branch ***
***Division of Viral and Rickettsial Diseases ***
***National Center for Zoonotic, Vectorborne and Enteric Diseases***
## Tick-borne infectious diseases in the United States
- Lyme disease
- Ehrlichioses
- Rocky Mountain spotted fever
- Babesioses
- Colorado tick fever
- Tularemia
- Tick-borne relapsing fever
## RMSF: background
- The most severe rickettsial illness of humans, caused by *Rickettsia rickettsii*
- First specific notation of the disease in 1896
- Endemic to the Americas
- Until recently, 300-800 U.S. cases/year
## Rocky Mountain spotted fever: why is it important?
- Widely distributed with significant morbidity and mortality
- Difficult to diagnose
- Rapid diagnosis and treatment prevents deaths
## General properties
**Small, coccobacillary bacteria**
**Slow growing**
**Intracellular**
## Gimenez staining for R. rickettsii
## BACKGROUND:The Primary Tick Vectors of RMSF
**Notes:**
The primary vectors for RMSF in the US are Dermacentor variabilis the American dog tick, widely distributed east of the Rocky Mountains and Dermacentor andersoni, the Rocky mountain wood tick which is found in the Rocky Mountain states.
## RMSF Incidence by County, 1997-2002
**Notes:**
RMSF is endemic in the US. About 700-1000 cases are reported from the US each year, occurring mostly in the southeast and southcentral US
## RMSF: epidemiology and patient demographics
- Over 90% of cases occur during April-September
- Peridomestic acquisition may account for majority of cases
- Age-specific incidence highest in children, disease more frequent in males
- Case clusters occur in hyperendemic foci
## RMSF: clinical manifestations
- Early: high fever, severe headache, myalgia, and gastrointestinal symptoms
- Late: rash, photophobia, confusion, ataxia, seizures, cough, dyspnea, arrhythmias, jaundice, severe abdominal pain
- Thrombocytopenia, hyponatremia
- Long term sequelae: CNS deficits, amputations
## RMSF: the rash
- Generally not apparent until 2-5 days after onset
- of fever
- Begins as 1 to 5 mm macules, typically on ankles, wrists, and forearms, spreads centripetally to trunk
- Petechial rash occurs on or after day 6
- Rash may be asymmetric, localized, or absent
## Slide 12
## Slide 13
## Severe sequelae
## RMSF: frequent initial diagnoses
- 1. Viral illness
- 2. Fever of undetermined etiology
- 3. Bacterial sepsis
- 4. Upper or lower respiratory tract infections,
- acute appendicitis, cholecystitis * *
## Differential Diagnosis of Rocky Mountain Spotted Fever
| Disease | Season | History/ Onset | Rash | Other Features |
| --- | --- | --- | --- | --- |
| Rocky Mountain Spotted fever | Late spring/
summer | Exposure to ticks, travel to endemic areas; starts with fever and develops rash after 2 to 3 days | Starts peripherally and spreads centrally; most marked on extremities, usually involves the palms and soles. | Often associated with thrombocytopenia and hyponatremia |
| Meningococcal infections | Late winter/ early spring | Often epidemics: fever and rash usually appear within 24 hours | Two patterns: macular and petechial lesions, few in number and generalized in distribution. | Gram-negative dipllococci in petechiae, buffy coat or in the CSF |
| Enteroviral Infections | Summer-fall | Febrile, illness in family or community, fever and rash often appear together | Starts on face or trunk, may involve palms and soles. | May be associated with aseptic meningitis |
| Measles | Winter-spring | Exposure to measles or killed measles vaccine, severe prodrome | Starts on head and spreads to trunk and extremities | Koplik spots during prodrome |
**Differential Diagnosis of Rocky Mountain Spotted Fever**
## Confirmation of R. rickettsii
**Notes:**
We identified cases through active surveillance at regional hospitals.
Environmental assessments were then conducte. Engorged ticks were collected from patient dogs, and flat ticks were collected from patient homes.
Our goal was to test large numbers of flat,
non-engorged ticks, to demonstrate the presence of R. rickettsii in the ticks
without the possibility of the rickettsia having been acquired from a recent blood meal
Patient specimens were collected for diagnostic confirmation of R. rickettsii at cdc.
Indirect Immunofluorescence assay , Immunohistochemical staining,
PCR, and Culture isolation were applie.
## Serologic diagnosis of RMSF
**85% of patients lack diagnostic titers in the first week of illness**
**As many as 50% of patients lack a diagnostic titer 7-9 days after onset of illness**
**Need to test acute and convalescent samples (2-4 weeks apart)**
**Indirect immunofluorescence assay (IFA)- four fold rise in titers confirmatory**
**ELISA not quantitative so can’t quantify increases between acute and convalescent samples**
## Deaths attributable to RMSF
- Case-fatality ratio as high as 20%-30% in untreated patients
- CFR highest in older adults and males
- Disease kills otherwise healthy adults and children
- Clinical progression may be rapid (median time to death 8 days)
## RMSF deaths in the United States,
** ****1940-1997**
- 1940
- 1950
- 1960
- 1970
- 1980
- 1990
- 10
- 50
- 100
- 140
## RMSF treatment
- Tetracyclines the drugs of choice: clinical response within 24-72 h
- Chloramphenicol an alternative therapy for some patients with RMSF
- Other broad-spectrum antimicrobials characteristically ineffective
## Antimicrobial therapy of RMSF
- Pregnant adult or
- tetracycline allergic
- Non-pregnant adult
- or child _>_45 kg
- Child <45 kg
- Chloramphenicol
- 500 mg qid i.v.
- Doxycycline
- 100 mg bid
- p.o. or i.v.
- Doxycycline
- 4.4 mg/kg/day
- in 2 divided
- doses p.o. or i.v.
- Therapy should be continued at least 72 h after defervescence
- AND until evidence of clinical improvement
## RMSF prevention
- Disease awareness and recognition
- Use of protective clothing and repellents
- Avoid tick areas
- Antimicrobial prophylaxis following tick bite not recommended
- Careful inspection for ticks and prompt removal (“grace period”)
## Prevention and Control
**Prevention and Control**
- **Wear light-colored clothing**
** ****Tuck your pants legs into **
** ****your socks**
** ****Use masking tape on your**
** ****upper leg-sticky side up**
** ****Apply repellant to**
** ****discourage tick attachment**
## Prevention and Control (cont.)
**Tick check and removal**
**Transmission unlikely to occur in less than 6 hours**
**Use fine-tipped tweezers**
## Surveillance and reporting
- RMSF is a nationally reportable disease
- Cases should be reported to state Health Department
- Reports then submitted to CDC
## RMSF Cases and Incidence
## Top Reporting States: Cases
## Human Ehrlichiosis Cases
## Spread of Ehrlichiosis Cases, WI
- 2002
- 2005
## Spread of Ehrlichiosis Cases, MN
- 2002
- 2005
## Lyme Disease
## Explanations for Increases
## Summary
- RMSF is a potentially life-threatening disease, endemic throughout much of the United States
- Broad differential diagnoses, early disease difficult to diagnose even for experienced physicians
- Confirmatory assays:
- Serology
- Polymerase chain reaction
- Immunopathology
- Isolation
- Consider RMSF as a cause of unexplained fever in spring and summer
- Doxycycline the drug of choice, regardless of age
## RMSF in eastern Arizona
**Since 2002, 24 cases RMSF mostly children with 2 deaths in a small community**
**Incidence rate 300 times higher than expected **
**Notes:**
additional cases of RMSF were reported Beginning in May of 2004, from the same community as the previous cases.
We then initiated an EpiAid with the following objectives:
To Determine magnitude of the outbreak and to collect ticks from the environment and assess for the presence of R. rickettsii. We also wanted to link our epidemiologic findings with laboratory evidence for transmission of r. rickettsii by rhipicephalus sanguineus ticks.
Because of previous observations in 2003, the big question to us was, Is Rh. sanguineus the vector of R. rickettsii in this outbreak?
## Summary of investigationRh. sanguineus vector of RMSF
***Dermacentor *****ticks not found**
**High density of *****Rh. sanguineus *****ticks surrounding patient homes and on dogs**
***Rh. sanguineus *****ticks found attached to patient**
**Confirmed the presence of *****R. rickettsii***** in ticks by PCR, sequencing/RFLP, culture**
***First reported evidence of RMSF associated with Rhipicephalus sanguineus in the United States***
**Notes:**
In conclusion, Our investigation showed that Rh. sanguineus appears to be the vector causing the RMSF outbreak
We found a High prevalence of Rh. ticks surrounding case homes and on dogs, we found Rh. sanguineus ticks found attached to case-patients, and we found no Dermacentor Ticks despite an extensive search
Our Laboratory evidence was crucial to link the high densities of Rh. sanguineus in peridomestic settings with Rickettsia rickettsii
This ourbreak was the first reported evidence of RMSF associated with Rh. sanguineus in the United States
## Rhipicephalus sanguineus
***Rhipicephalus sanguineus***
**(Brown dog tick)**
**Notes:**
These pictures showa known vector of R. rickettsii, Dermacentor variabilis on the left, compared to the tick we found in large numbers, rhipicephalus sanguineus on the right, a previously unrecognized vector of RMSF in the US.
## Environmental Assessment
**Typical peridomestic environment surrounding case-patient homes, found to be heavily populated by *****Rh. sanguineus***** ticks**
**Environmental Assessment**
**Notes:**
Ticks were collected from the peridomestic environment surrounding case homes. These pictures demonstrate the microhabitats found to be heavily populated by Rh sanguineus ticks: discarded furniture, dogs, and surrounding vegetation.
## Community and physician education
Treatment of homes
Treatment of dogs
Animal control
**Treatment of homes**
**Treatment of dogs **
**Animal control**
**Collaborative Intervention**
**Notes:**
Recognizing the need for an immediate intervention, we Created an RMSF Task Force consisting of the Indian Health Service, Tribal members/programs, Arizona Dept Health Services, and CDC
Our ongoing interventions include community and physician education, treatment of homes with pesticides, treatment of dogs with tick preventives, and environmental clean-up of tick habitats
## Get Rid of Ticks on Dogs
## Keep Ticks Off Children
## Slide 42
**Notes:**
Our investigation resulted in many targeted educational programs to
Encourage early recognition of RMSF and exclustion of brown dog ticks
from the environment. These ongoing efforts have been very well received
## Acknowledgments
- Christopher Paddock, MD
- John Openshaw
- Jennifer McQuiston, DVM
|
en
|
converted_docs
|
809981
|
Important Electronic Resources
- AGRICOLA:
[http://agricola.nal.usda.gov](http://agricola.nal.usda.gov/)
- AgSpace [http://agspace.nal.usda.gov](http://agspace.nal.usda.gov/)
- ARS Stakeholders Meeting -
<http://www.ars.usda.gov/meetings/Energy07/index.htm>
- ARS Technology Transfer Office --
<http://www.ars.usda.gov/Business/Business.htm>
- CSREES - <http://www.csrees.usda.gov/fo/fundview.cfm?fonum=1073>
- DDR (born digital documents)
[http://ddr.nal.usda.gov](http://ddr.nal.usda.gov/)
- ERS Briefing Room - <http://www.ers.usda.gov/Briefing/Bioenergy/>
- FS Partnership Guide -
http://www.partnershipresourcecenter.org/resources/partnership-guide/
- FS Woody Biomass -
<http://www.fs.fed.us/woodybiomass/index.shtml/news/index.shtml>
- Fuels for Schools (FS) - <http://www.fuelsforschools.org/>
- Grant Information - www.grants.gov
- NALDR (converted print to digital documents):
[http://naldr.nal.usda.gov](http://naldr.nal.usda.gov/)
- NAL\'s document delivery service see
<http://www.nal.usda.gov/services/request.shtml> or e-mail at
<[email protected]>.
- National Agricultural Library --
[www.nal.usda.gov](http://www.nal.usda.gov/)
- National Agricultural Library Biofuels Portal -
http://ttic.nal.usda.gov/biofuels/
- Sun Grant - <http://www.sungrant.org/index.cfm>
- The Human and Social Dimensions of a Bioeconomy: Implications for
Rural People and Places (CSREES) -
<http://www.csrees.usda.gov/about/white_papers/pdfs/bioeconomy_discussion_paper.pdf>
- USDA -- http://www.usda.gov
- USDA Energy Matrix -
<http://www.usda.gov/rus/index2/0208/EnergyPrograms.htm>
- A REVIEW OF THE CURRENT STATE OF BIOENERGY DEVELOPMENT IN G8 +5
COUNTRIES
- <http://www.globalbioenergy.org/fileadmin/user_upload/gbep/docs/2007_events/wecrome2007/MASTER_GBEP_Report_final_16.11.2007_01.pdf>
Acronyms
USDA -- United States Department of Agriculture
ARS -- Agricultural Research Service
CSREES -- Cooperative State Research Education and Extension Service
ERS -- Economic Research Service
FS -- Forest Service
NASS -- National Agricultural Statistics Service
|
en
|
converted_docs
|
273290
|
Statement of Rick Roth
before the
Committee on Agriculture of the U.S. House of Representatives
on the Labor Needs of American Agriculture
October 4, 2007
Good morning. My name is Rick Roth. I am a third generation farmer from
Belle Glade, Florida. I have been the president and principal owner of
Roth Farms, Inc. since 1986. I have the most diversified farming
operation in the Everglades Agricultural Area, 800 square miles of rich
organic soils south of Lake Okeechobee. This region of south Florida is
first in the production of sugar, sweet corn, and radishes in the United
States. Our family owns over 4,000 acres, and leases another 1000 acres.
We grow lettuce and leafy vegetables, radishes, sugar cane, sod, sweet
corn, green beans, field grown palm trees, and rice. We employ 55 people
full-time, plus 220 seasonally.
I currently serve on the Board of Directors of the Florida Farm Bureau
(10 years), the Florida Fruit and Vegetable Association (21 years), and
Sugar Cane Growers Cooperative of Florida (13 years). I am the Vice
President of Florida Farm Bureau, and this is my 7^th^ year of service.
I appreciate the opportunity to explain why we must pass immigration
reform legislation immediately and ask that you share the information
that you learn at this hearing with your colleagues on both sides of the
aisle\... We live in perilous times. We are at war against terrorism. We
must prevent unwanted illegal migration into our country. But, just as
important, we must simultaneously give employers like me the ability to
use legal foreign workers. Why? Because domestic food production is the
other national security issue.
Fruits and vegetables and other labor-intensive crops make up 50% of our
agricultural production today. Foreign born workers will plant,
cultivate, and harvest the crops that make up most of our food supply.
Will they do it here, using our food safety guidelines, or in another
country? Do we want to import labor to fill unwanted farm labor jobs, or
do we import more of our food supply. We already import over 50%.
I live in Florida. When you say Florida, most visitors think Mickey. If
you want to see real world marvels, come to Belle Glade. You will see
high tech agriculture that produces crops year-round, using fewer
nutrients, water, and chemicals per unit of production than anywhere in
the United States. I will personally give you the tour, and my opening
statement will be "welcome to PARADISE".
One of our keys to success in the EAA is our ability to maximize
production with fewer chemicals through crop rotation. Without an
adequate legal labor force, we jeopardize our vegetable industry, which
produces approximately 25,000 acres of sweet corn, 10,000 acres of green
beans, 7,000 acres of lettuce, and 5,000 acres of radishes per year with
an annual value of \$150 million.
Our family farm is one of 50 members who own one of the most successful
cooperatives in this country, Sugar Cane Growers Cooperative of Florida.
For the first 30 years of our 45 year existence, we relied primarily on
H2A workers to harvest sugar cane. All the burdensome regulations of the
H-2A program, including farm-worker housing, and higher labor costs make
this program a matter of last resort. The most onerous part of H2A is
farm-worker housing. Due to capital costs, county zoning and permitting,
and negative public opinion, it will take many years for employers to
move to H2A for their labor needs. To use this program, we must have
meaningful reform. But H2A alone is clearly not enough. We must provide
a means for the current experienced agricultural workforce to earn legal
status subject to conditions including a future agricultural work
requirement.
[Such a proposal is essential to solve both the short and long-term
agricultural labor crisis. We need the earned status provisions as a
bridge to greatly expanded use of the H2A program. It will provide the
much needed time to build the housing required of users of the H2A
program and will allow our government to expand its consular offices in
foreign countries so that they can process foreign workers for admission
in a timely manner. Currently, with less than 2% of the agricultural
workforce entering under the H2A program, growers are experiencing
harmful delays in getting their workers in a timely manner to harvest
highly perishable crops.]{.underline}
When we talk about jobs in Florida, we talk about the three-legged
stool: Tourism, agriculture, and construction. Our economy in Florida is
in a recession due to the dramatic increase in housing prices[. New home
sales are at a standstill, and the forecast for over a year is it will
take two years to work our way out of the over-supply. I feel the
impact. Our wholesale sod sales are down 50% from a year
ago]{.underline}. I can not imagine the degree of devastation that will
occur in Florida, but I can assure you we can send the US economy into a
depression if you deny employers access to a legal work force.
Agriculture is not the largest user of seasonal labor; we are just the
most visible.
As I complete my statement I would like to change the focus of my
remarks towards you. In the past, legislation with H-2A reform and
earned adjustment of status provisions has enjoyed broad bipartisan
support. Today, this issue is very emotional and controversial. Thank
God that our founding fathers did not create a true democracy, but
instead a representative form of government. It is your duty to ignore
all the hype and emotion, sift through all the opposing ideas and
options, and come up with a solution that will move this country
forward.
[I play doubles tennis. The winning strategy there also applies here.
"Down the middle, solve the riddle".]{.underline} Thank you for giving
me this opportunity and I would be happy to answer questions later, if
time permits.
|
en
|
all-txt-docs
|
026397
|
USGS Digital Spectral Library splib05a
Clark et. al. 2003
ASCII Spectral Data file contents:
line 13 title
line 14 history
line 15 to end: 3-columns of data:
wavelength reflectance standard deviation
(standard deviation of 0.000000 means not measured)
(*************** indicates a deleted number)
----------------------------------------------------
Polystyrene GDS345 BluInsul W1R1Fa AREF
copy of sprlf02a r 470
0.350000 0.409770 0.000000
0.351000 0.409770 0.000000
0.352000 0.410412 0.000000
0.353000 0.411164 0.000000
0.354000 0.412135 0.000000
0.355000 0.413396 0.000000
0.356000 0.414856 0.000000
0.357000 0.416383 0.000000
0.358000 0.417880 0.000000
0.359000 0.419380 0.000000
0.360000 0.420950 0.000000
0.361000 0.422641 0.000000
0.362000 0.424444 0.000000
0.363000 0.426335 0.000000
0.364000 0.428293 0.000000
0.365000 0.430318 0.000000
0.366000 0.432414 0.000000
0.367000 0.434591 0.000000
0.368000 0.436891 0.000000
0.369000 0.439364 0.000000
0.370000 0.442050 0.000000
0.371000 0.444956 0.000000
0.372000 0.448080 0.000000
0.373000 0.451425 0.000000
0.374000 0.455001 0.000000
0.375000 0.458824 0.000000
0.376000 0.462909 0.000000
0.377000 0.467277 0.000000
0.378000 0.471951 0.000000
0.379000 0.476945 0.000000
0.380000 0.482233 0.000000
0.381000 0.487780 0.000000
0.382000 0.493550 0.000000
0.383000 0.499511 0.000000
0.384000 0.505633 0.000000
0.385000 0.511884 0.000000
0.386000 0.518237 0.000000
0.387000 0.524662 0.000000
0.388000 0.531134 0.000000
0.389000 0.537626 0.000000
0.390000 0.544116 0.000000
0.391000 0.550578 0.000000
0.392000 0.556994 0.000000
0.393000 0.563343 0.000000
0.394000 0.569605 0.000000
0.395000 0.575762 0.000000
0.396000 0.581797 0.000000
0.397000 0.587691 0.000000
0.398000 0.593431 0.000000
0.399000 0.599002 0.000000
0.400000 0.604394 0.000000
0.401000 0.609615 0.000000
0.402000 0.614678 0.000000
0.403000 0.619593 0.000000
0.404000 0.624363 0.000000
0.405000 0.628988 0.000000
0.406000 0.633465 0.000000
0.407000 0.637771 0.000000
0.408000 0.641876 0.000000
0.409000 0.645756 0.000000
0.410000 0.649393 0.000000
0.411000 0.652774 0.000000
0.412000 0.655889 0.000000
0.413000 0.658753 0.000000
0.414000 0.661387 0.000000
0.415000 0.663818 0.000000
0.416000 0.666113 0.000000
0.417000 0.668347 0.000000
0.418000 0.670589 0.000000
0.419000 0.672882 0.000000
0.420000 0.675263 0.000000
0.421000 0.677756 0.000000
0.422000 0.680341 0.000000
0.423000 0.682985 0.000000
0.424000 0.685651 0.000000
0.425000 0.688286 0.000000
0.426000 0.690833 0.000000
0.427000 0.693247 0.000000
0.428000 0.695535 0.000000
0.429000 0.697716 0.000000
0.430000 0.699817 0.000000
0.431000 0.701895 0.000000
0.432000 0.704015 0.000000
0.433000 0.706231 0.000000
0.434000 0.708566 0.000000
0.435000 0.711031 0.000000
0.436000 0.713630 0.000000
0.437000 0.716325 0.000000
0.438000 0.719071 0.000000
0.439000 0.721818 0.000000
0.440000 0.724513 0.000000
0.441000 0.727104 0.000000
0.442000 0.729543 0.000000
0.443000 0.731815 0.000000
0.444000 0.733910 0.000000
0.445000 0.735823 0.000000
0.446000 0.737561 0.000000
0.447000 0.739135 0.000000
0.448000 0.740557 0.000000
0.449000 0.741842 0.000000
0.450000 0.743008 0.000000
0.451000 0.744070 0.000000
0.452000 0.745043 0.000000
0.453000 0.745943 0.000000
0.454000 0.746783 0.000000
0.455000 0.747566 0.000000
0.456000 0.748293 0.000000
0.457000 0.748968 0.000000
0.458000 0.749595 0.000000
0.459000 0.750177 0.000000
0.460000 0.750719 0.000000
0.461000 0.751230 0.000000
0.462000 0.751719 0.000000
0.463000 0.752191 0.000000
0.464000 0.752643 0.000000
0.465000 0.753066 0.000000
0.466000 0.753455 0.000000
0.467000 0.753808 0.000000
0.468000 0.754122 0.000000
0.469000 0.754397 0.000000
0.470000 0.754631 0.000000
0.471000 0.754824 0.000000
0.472000 0.754977 0.000000
0.473000 0.755092 0.000000
0.474000 0.755174 0.000000
0.475000 0.755227 0.000000
0.476000 0.755248 0.000000
0.477000 0.755236 0.000000
0.478000 0.755187 0.000000
0.479000 0.755102 0.000000
0.480000 0.754982 0.000000
0.481000 0.754828 0.000000
0.482000 0.754644 0.000000
0.483000 0.754432 0.000000
0.484000 0.754197 0.000000
0.485000 0.753937 0.000000
0.486000 0.753654 0.000000
0.487000 0.753347 0.000000
0.488000 0.753014 0.000000
0.489000 0.752653 0.000000
0.490000 0.752262 0.000000
0.491000 0.751840 0.000000
0.492000 0.751386 0.000000
0.493000 0.750898 0.000000
0.494000 0.750380 0.000000
0.495000 0.749835 0.000000
0.496000 0.749266 0.000000
0.497000 0.748674 0.000000
0.498000 0.748059 0.000000
0.499000 0.747419 0.000000
0.500000 0.746751 0.000000
0.501000 0.746048 0.000000
0.502000 0.745306 0.000000
0.503000 0.744520 0.000000
0.504000 0.743683 0.000000
0.505000 0.742793 0.000000
0.506000 0.741846 0.000000
0.507000 0.740840 0.000000
0.508000 0.739774 0.000000
0.509000 0.738647 0.000000
0.510000 0.737457 0.000000
0.511000 0.736203 0.000000
0.512000 0.734881 0.000000
0.513000 0.733487 0.000000
0.514000 0.732019 0.000000
0.515000 0.730475 0.000000
0.516000 0.728856 0.000000
0.517000 0.727163 0.000000
0.518000 0.725396 0.000000
0.519000 0.723555 0.000000
0.520000 0.721640 0.000000
0.521000 0.719654 0.000000
0.522000 0.717602 0.000000
0.523000 0.715487 0.000000
0.524000 0.713316 0.000000
0.525000 0.711096 0.000000
0.526000 0.708831 0.000000
0.527000 0.706523 0.000000
0.528000 0.704173 0.000000
0.529000 0.701778 0.000000
0.530000 0.699338 0.000000
0.531000 0.696851 0.000000
0.532000 0.694314 0.000000
0.533000 0.691733 0.000000
0.534000 0.689112 0.000000
0.535000 0.686453 0.000000
0.536000 0.683754 0.000000
0.537000 0.681010 0.000000
0.538000 0.678216 0.000000
0.539000 0.675367 0.000000
0.540000 0.672458 0.000000
0.541000 0.669484 0.000000
0.542000 0.666443 0.000000
0.543000 0.663332 0.000000
0.544000 0.660146 0.000000
0.545000 0.656880 0.000000
0.546000 0.653527 0.000000
0.547000 0.650082 0.000000
0.548000 0.646547 0.000000
0.549000 0.642926 0.000000
0.550000 0.639223 0.000000
0.551000 0.635442 0.000000
0.552000 0.631588 0.000000
0.553000 0.627664 0.000000
0.554000 0.623683 0.000000
0.555000 0.619658 0.000000
0.556000 0.615602 0.000000
0.557000 0.611534 0.000000
0.558000 0.607474 0.000000
0.559000 0.603440 0.000000
0.560000 0.599448 0.000000
0.561000 0.595512 0.000000
0.562000 0.591644 0.000000
0.563000 0.587852 0.000000
0.564000 0.584144 0.000000
0.565000 0.580527 0.000000
0.566000 0.577009 0.000000
0.567000 0.573595 0.000000
0.568000 0.570294 0.000000
0.569000 0.567109 0.000000
0.570000 0.564042 0.000000
0.571000 0.561097 0.000000
0.572000 0.558271 0.000000
0.573000 0.555563 0.000000
0.574000 0.552971 0.000000
0.575000 0.550495 0.000000
0.576000 0.548137 0.000000
0.577000 0.545898 0.000000
0.578000 0.543775 0.000000
0.579000 0.541765 0.000000
0.580000 0.539866 0.000000
0.581000 0.538068 0.000000
0.582000 0.536360 0.000000
0.583000 0.534732 0.000000
0.584000 0.533172 0.000000
0.585000 0.531666 0.000000
0.586000 0.530200 0.000000
0.587000 0.528762 0.000000
0.588000 0.527339 0.000000
0.589000 0.525918 0.000000
0.590000 0.524493 0.000000
0.591000 0.523054 0.000000
0.592000 0.521595 0.000000
0.593000 0.520117 0.000000
0.594000 0.518620 0.000000
0.595000 0.517107 0.000000
0.596000 0.515584 0.000000
0.597000 0.514059 0.000000
0.598000 0.512540 0.000000
0.599000 0.511030 0.000000
0.600000 0.509534 0.000000
0.601000 0.508056 0.000000
0.602000 0.506603 0.000000
0.603000 0.505180 0.000000
0.604000 0.503794 0.000000
0.605000 0.502454 0.000000
0.606000 0.501171 0.000000
0.607000 0.499954 0.000000
0.608000 0.498811 0.000000
0.609000 0.497748 0.000000
0.610000 0.496770 0.000000
0.611000 0.495881 0.000000
0.612000 0.495080 0.000000
0.613000 0.494369 0.000000
0.614000 0.493739 0.000000
0.615000 0.493185 0.000000
0.616000 0.492697 0.000000
0.617000 0.492271 0.000000
0.618000 0.491899 0.000000
0.619000 0.491576 0.000000
0.620000 0.491294 0.000000
0.621000 0.491045 0.000000
0.622000 0.490821 0.000000
0.623000 0.490619 0.000000
0.624000 0.490435 0.000000
0.625000 0.490268 0.000000
0.626000 0.490114 0.000000
0.627000 0.489968 0.000000
0.628000 0.489827 0.000000
0.629000 0.489691 0.000000
0.630000 0.489556 0.000000
0.631000 0.489423 0.000000
0.632000 0.489296 0.000000
0.633000 0.489182 0.000000
0.634000 0.489086 0.000000
0.635000 0.489018 0.000000
0.636000 0.488988 0.000000
0.637000 0.489006 0.000000
0.638000 0.489084 0.000000
0.639000 0.489232 0.000000
0.640000 0.489462 0.000000
0.641000 0.489774 0.000000
0.642000 0.490170 0.000000
0.643000 0.490650 0.000000
0.644000 0.491210 0.000000
0.645000 0.491846 0.000000
0.646000 0.492552 0.000000
0.647000 0.493324 0.000000
0.648000 0.494159 0.000000
0.649000 0.495053 0.000000
0.650000 0.496006 0.000000
0.651000 0.497018 0.000000
0.652000 0.498090 0.000000
0.653000 0.499216 0.000000
0.654000 0.500395 0.000000
0.655000 0.501619 0.000000
0.656000 0.502878 0.000000
0.657000 0.504161 0.000000
0.658000 0.505453 0.000000
0.659000 0.506731 0.000000
0.660000 0.507971 0.000000
0.661000 0.509149 0.000000
0.662000 0.510247 0.000000
0.663000 0.511247 0.000000
0.664000 0.512134 0.000000
0.665000 0.512904 0.000000
0.666000 0.513550 0.000000
0.667000 0.514071 0.000000
0.668000 0.514466 0.000000
0.669000 0.514733 0.000000
0.670000 0.514876 0.000000
0.671000 0.514904 0.000000
0.672000 0.514832 0.000000
0.673000 0.514674 0.000000
0.674000 0.514446 0.000000
0.675000 0.514165 0.000000
0.676000 0.513846 0.000000
0.677000 0.513498 0.000000
0.678000 0.513130 0.000000
0.679000 0.512748 0.000000
0.680000 0.512356 0.000000
0.681000 0.511959 0.000000
0.682000 0.511559 0.000000
0.683000 0.511154 0.000000
0.684000 0.510743 0.000000
0.685000 0.510318 0.000000
0.686000 0.509861 0.000000
0.687000 0.509346 0.000000
0.688000 0.508753 0.000000
0.689000 0.508065 0.000000
0.690000 0.507269 0.000000
0.691000 0.506356 0.000000
0.692000 0.505329 0.000000
0.693000 0.504201 0.000000
0.694000 0.502979 0.000000
0.695000 0.501671 0.000000
0.696000 0.500283 0.000000
0.697000 0.498824 0.000000
0.698000 0.497308 0.000000
0.699000 0.495749 0.000000
0.700000 0.494164 0.000000
0.701000 0.492573 0.000000
0.702000 0.490996 0.000000
0.703000 0.489455 0.000000
0.704000 0.487971 0.000000
0.705000 0.486567 0.000000
0.706000 0.485265 0.000000
0.707000 0.484088 0.000000
0.708000 0.483062 0.000000
0.709000 0.482206 0.000000
0.710000 0.481536 0.000000
0.711000 0.481060 0.000000
0.712000 0.480789 0.000000
0.713000 0.480725 0.000000
0.714000 0.480866 0.000000
0.715000 0.481214 0.000000
0.716000 0.481766 0.000000
0.717000 0.482520 0.000000
0.718000 0.483472 0.000000
0.719000 0.484614 0.000000
0.720000 0.485936 0.000000
0.721000 0.487430 0.000000
0.722000 0.489096 0.000000
0.723000 0.490935 0.000000
0.724000 0.492947 0.000000
0.725000 0.495127 0.000000
0.726000 0.497470 0.000000
0.727000 0.499971 0.000000
0.728000 0.502635 0.000000
0.729000 0.505469 0.000000
0.730000 0.508478 0.000000
0.731000 0.511668 0.000000
0.732000 0.515044 0.000000
0.733000 0.518614 0.000000
0.734000 0.522380 0.000000
0.735000 0.526348 0.000000
0.736000 0.530526 0.000000
0.737000 0.534927 0.000000
0.738000 0.539568 0.000000
0.739000 0.544464 0.000000
0.740000 0.549631 0.000000
0.741000 0.555085 0.000000
0.742000 0.560841 0.000000
0.743000 0.566911 0.000000
0.744000 0.573307 0.000000
0.745000 0.580037 0.000000
0.746000 0.587096 0.000000
0.747000 0.594473 0.000000
0.748000 0.602158 0.000000
0.749000 0.610124 0.000000
0.750000 0.618346 0.000000
0.751000 0.626791 0.000000
0.752000 0.635414 0.000000
0.753000 0.644162 0.000000
0.754000 0.652981 0.000000
0.755000 0.661810 0.000000
0.756000 0.670582 0.000000
0.757000 0.679236 0.000000
0.758000 0.687726 0.000000
0.759000 0.696012 0.000000
0.760000 0.704053 0.000000
0.761000 0.711816 0.000000
0.762000 0.719266 0.000000
0.763000 0.726375 0.000000
0.764000 0.733131 0.000000
0.765000 0.739526 0.000000
0.766000 0.745553 0.000000
0.767000 0.751215 0.000000
0.768000 0.756514 0.000000
0.769000 0.761458 0.000000
0.770000 0.766061 0.000000
0.771000 0.770341 0.000000
0.772000 0.774317 0.000000
0.773000 0.778007 0.000000
0.774000 0.781430 0.000000
0.775000 0.784603 0.000000
0.776000 0.787538 0.000000
0.777000 0.790248 0.000000
0.778000 0.792745 0.000000
0.779000 0.795045 0.000000
0.780000 0.797169 0.000000
0.781000 0.799133 0.000000
0.782000 0.800951 0.000000
0.783000 0.802635 0.000000
0.784000 0.804198 0.000000
0.785000 0.805648 0.000000
0.786000 0.806994 0.000000
0.787000 0.808244 0.000000
0.788000 0.809406 0.000000
0.789000 0.810486 0.000000
0.790000 0.811493 0.000000
0.791000 0.812429 0.000000
0.792000 0.813298 0.000000
0.793000 0.814105 0.000000
0.794000 0.814851 0.000000
0.795000 0.815540 0.000000
0.796000 0.816176 0.000000
0.797000 0.816767 0.000000
0.798000 0.817320 0.000000
0.799000 0.817843 0.000000
0.800000 0.818339 0.000000
0.801000 0.818809 0.000000
0.802000 0.819254 0.000000
0.803000 0.819677 0.000000
0.804000 0.820079 0.000000
0.805000 0.820463 0.000000
0.806000 0.820828 0.000000
0.807000 0.821177 0.000000
0.808000 0.821511 0.000000
0.809000 0.821835 0.000000
0.810000 0.822154 0.000000
0.811000 0.822473 0.000000
0.812000 0.822788 0.000000
0.813000 0.823095 0.000000
0.814000 0.823388 0.000000
0.815000 0.823670 0.000000
0.816000 0.823941 0.000000
0.817000 0.824206 0.000000
0.818000 0.824468 0.000000
0.819000 0.824732 0.000000
0.820000 0.825000 0.000000
0.821000 0.825266 0.000000
0.822000 0.825522 0.000000
0.823000 0.825761 0.000000
0.824000 0.825987 0.000000
0.825000 0.826204 0.000000
0.826000 0.826417 0.000000
0.827000 0.826630 0.000000
0.828000 0.826847 0.000000
0.829000 0.827069 0.000000
0.830000 0.827291 0.000000
0.831000 0.827507 0.000000
0.832000 0.827712 0.000000
0.833000 0.827906 0.000000
0.834000 0.828090 0.000000
0.835000 0.828267 0.000000
0.836000 0.828436 0.000000
0.837000 0.828600 0.000000
0.838000 0.828759 0.000000
0.839000 0.828912 0.000000
0.840000 0.829060 0.000000
0.841000 0.829201 0.000000
0.842000 0.829340 0.000000
0.843000 0.829484 0.000000
0.844000 0.829634 0.000000
0.845000 0.829786 0.000000
0.846000 0.829931 0.000000
0.847000 0.830062 0.000000
0.848000 0.830180 0.000000
0.849000 0.830285 0.000000
0.850000 0.830380 0.000000
0.851000 0.830462 0.000000
0.852000 0.830527 0.000000
0.853000 0.830573 0.000000
0.854000 0.830601 0.000000
0.855000 0.830612 0.000000
0.856000 0.830605 0.000000
0.857000 0.830575 0.000000
0.858000 0.830517 0.000000
0.859000 0.830424 0.000000
0.860000 0.830293 0.000000
0.861000 0.830120 0.000000
0.862000 0.829902 0.000000
0.863000 0.829637 0.000000
0.864000 0.829321 0.000000
0.865000 0.828952 0.000000
0.866000 0.828527 0.000000
0.867000 0.828042 0.000000
0.868000 0.827500 0.000000
0.869000 0.826910 0.000000
0.870000 0.826288 0.000000
0.871000 0.825652 0.000000
0.872000 0.825041 0.000000
0.873000 0.824498 0.000000
0.874000 0.824070 0.000000
0.875000 0.823799 0.000000
0.876000 0.823733 0.000000
0.877000 0.823906 0.000000
0.878000 0.824308 0.000000
0.879000 0.824920 0.000000
0.880000 0.825712 0.000000
0.881000 0.826625 0.000000
0.882000 0.827589 0.000000
0.883000 0.828544 0.000000
0.884000 0.829455 0.000000
0.885000 0.830296 0.000000
0.886000 0.831043 0.000000
0.887000 0.831696 0.000000
0.888000 0.832258 0.000000
0.889000 0.832734 0.000000
0.890000 0.833133 0.000000
0.891000 0.833465 0.000000
0.892000 0.833738 0.000000
0.893000 0.833961 0.000000
0.894000 0.834140 0.000000
0.895000 0.834283 0.000000
0.896000 0.834397 0.000000
0.897000 0.834488 0.000000
0.898000 0.834563 0.000000
0.899000 0.834623 0.000000
0.900000 0.834665 0.000000
0.901000 0.834690 0.000000
0.902000 0.834697 0.000000
0.903000 0.834685 0.000000
0.904000 0.834654 0.000000
0.905000 0.834608 0.000000
0.906000 0.834551 0.000000
0.907000 0.834488 0.000000
0.908000 0.834415 0.000000
0.909000 0.834329 0.000000
0.910000 0.834229 0.000000
0.911000 0.834120 0.000000
0.912000 0.834012 0.000000
0.913000 0.833911 0.000000
0.914000 0.833813 0.000000
0.915000 0.833710 0.000000
0.916000 0.833600 0.000000
0.917000 0.833487 0.000000
0.918000 0.833380 0.000000
0.919000 0.833287 0.000000
0.920000 0.833213 0.000000
0.921000 0.833162 0.000000
0.922000 0.833137 0.000000
0.923000 0.833131 0.000000
0.924000 0.833139 0.000000
0.925000 0.833156 0.000000
0.926000 0.833195 0.000000
0.927000 0.833268 0.000000
0.928000 0.833388 0.000000
0.929000 0.833552 0.000000
0.930000 0.833755 0.000000
0.931000 0.833993 0.000000
0.932000 0.834257 0.000000
0.933000 0.834538 0.000000
0.934000 0.834828 0.000000
0.935000 0.835124 0.000000
0.936000 0.835423 0.000000
0.937000 0.835722 0.000000
0.938000 0.836019 0.000000
0.939000 0.836309 0.000000
0.940000 0.836588 0.000000
0.941000 0.836851 0.000000
0.942000 0.837090 0.000000
0.943000 0.837302 0.000000
0.944000 0.837493 0.000000
0.945000 0.837671 0.000000
0.946000 0.837844 0.000000
0.947000 0.838017 0.000000
0.948000 0.838191 0.000000
0.949000 0.838369 0.000000
0.950000 0.838544 0.000000
0.951000 0.838709 0.000000
0.952000 0.838858 0.000000
0.953000 0.838996 0.000000
0.954000 0.839131 0.000000
0.955000 0.839268 0.000000
0.956000 0.839402 0.000000
0.957000 0.839528 0.000000
0.958000 0.839640 0.000000
0.959000 0.839740 0.000000
0.960000 0.839835 0.000000
0.961000 0.839926 0.000000
0.962000 0.840013 0.000000
0.963000 0.840093 0.000000
0.964000 0.840162 0.000000
0.965000 0.840225 0.000000
0.966000 0.840283 0.000000
0.967000 0.840340 0.000000
0.968000 0.840392 0.000000
0.969000 0.840436 0.000000
0.970000 0.840469 0.000000
0.971000 0.840489 0.000000
0.972000 0.840498 0.000000
0.973000 0.840495 0.000000
0.974000 0.840483 0.000000
0.975000 0.840466 0.000000
0.976000 0.840448 0.000000
0.977000 0.840431 0.000000
0.978000 0.840415 0.000000
0.979000 0.840402 0.000000
0.980000 0.840390 0.000000
0.981000 0.840375 0.000000
0.982000 0.840355 0.000000
0.983000 0.840330 0.000000
0.984000 0.840301 0.000000
0.985000 0.840269 0.000000
0.986000 0.840234 0.000000
0.987000 0.840195 0.000000
0.988000 0.840155 0.000000
0.989000 0.840113 0.000000
0.990000 0.840066 0.000000
0.991000 0.840016 0.000000
0.992000 0.839964 0.000000
0.993000 0.839912 0.000000
0.994000 0.839860 0.000000
0.995000 0.839800 0.000000
0.996000 0.839720 0.000000
0.997000 0.839617 0.000000
0.998000 0.839518 0.000000
0.999000 0.839457 0.000000
1.000000 0.839459 0.000000
1.001000 0.839519 0.000000
1.002000 0.839622 0.000000
1.003000 0.839749 0.000000
1.004000 0.839857 0.000000
1.005000 0.839895 0.000000
1.006000 0.839830 0.000000
1.007000 0.839688 0.000000
1.008000 0.839515 0.000000
1.009000 0.839349 0.000000
1.010000 0.839208 0.000000
1.011000 0.839105 0.000000
1.012000 0.839046 0.000000
1.013000 0.839015 0.000000
1.014000 0.838990 0.000000
1.015000 0.838949 0.000000
1.016000 0.838883 0.000000
1.017000 0.838811 0.000000
1.018000 0.838756 0.000000
1.019000 0.838728 0.000000
1.020000 0.838708 0.000000
1.021000 0.838673 0.000000
1.022000 0.838611 0.000000
1.023000 0.838542 0.000000
1.024000 0.838489 0.000000
1.025000 0.838469 0.000000
1.026000 0.838482 0.000000
1.027000 0.838529 0.000000
1.028000 0.838601 0.000000
1.029000 0.838680 0.000000
1.030000 0.838745 0.000000
1.031000 0.838786 0.000000
1.032000 0.838819 0.000000
1.033000 0.838863 0.000000
1.034000 0.838926 0.000000
1.035000 0.838996 0.000000
1.036000 0.839059 0.000000
1.037000 0.839103 0.000000
1.038000 0.839128 0.000000
1.039000 0.839135 0.000000
1.040000 0.839129 0.000000
1.041000 0.839120 0.000000
1.042000 0.839119 0.000000
1.043000 0.839132 0.000000
1.044000 0.839153 0.000000
1.045000 0.839175 0.000000
1.046000 0.839192 0.000000
1.047000 0.839202 0.000000
1.048000 0.839203 0.000000
1.049000 0.839194 0.000000
1.050000 0.839180 0.000000
1.051000 0.839166 0.000000
1.052000 0.839155 0.000000
1.053000 0.839148 0.000000
1.054000 0.839144 0.000000
1.055000 0.839144 0.000000
1.056000 0.839149 0.000000
1.057000 0.839162 0.000000
1.058000 0.839179 0.000000
1.059000 0.839186 0.000000
1.060000 0.839168 0.000000
1.061000 0.839119 0.000000
1.062000 0.839050 0.000000
1.063000 0.838976 0.000000
1.064000 0.838903 0.000000
1.065000 0.838821 0.000000
1.066000 0.838720 0.000000
1.067000 0.838595 0.000000
1.068000 0.838453 0.000000
1.069000 0.838305 0.000000
1.070000 0.838154 0.000000
1.071000 0.837987 0.000000
1.072000 0.837790 0.000000
1.073000 0.837556 0.000000
1.074000 0.837301 0.000000
1.075000 0.837042 0.000000
1.076000 0.836790 0.000000
1.077000 0.836535 0.000000
1.078000 0.836265 0.000000
1.079000 0.835976 0.000000
1.080000 0.835674 0.000000
1.081000 0.835368 0.000000
1.082000 0.835071 0.000000
1.083000 0.834797 0.000000
1.084000 0.834563 0.000000
1.085000 0.834375 0.000000
1.086000 0.834220 0.000000
1.087000 0.834081 0.000000
1.088000 0.833949 0.000000
1.089000 0.833836 0.000000
1.090000 0.833756 0.000000
1.091000 0.833716 0.000000
1.092000 0.833709 0.000000
1.093000 0.833722 0.000000
1.094000 0.833744 0.000000
1.095000 0.833764 0.000000
1.096000 0.833771 0.000000
1.097000 0.833760 0.000000
1.098000 0.833746 0.000000
1.099000 0.833746 0.000000
1.100000 0.833766 0.000000
1.101000 0.833788 0.000000
1.102000 0.833790 0.000000
1.103000 0.833757 0.000000
1.104000 0.833687 0.000000
1.105000 0.833582 0.000000
1.106000 0.833441 0.000000
1.107000 0.833262 0.000000
1.108000 0.833042 0.000000
1.109000 0.832776 0.000000
1.110000 0.832459 0.000000
1.111000 0.832082 0.000000
1.112000 0.831637 0.000000
1.113000 0.831113 0.000000
1.114000 0.830499 0.000000
1.115000 0.829781 0.000000
1.116000 0.828946 0.000000
1.117000 0.827976 0.000000
1.118000 0.826857 0.000000
1.119000 0.825576 0.000000
1.120000 0.824118 0.000000
1.121000 0.822468 0.000000
1.122000 0.820610 0.000000
1.123000 0.818524 0.000000
1.124000 0.816192 0.000000
1.125000 0.813594 0.000000
1.126000 0.810712 0.000000
1.127000 0.807532 0.000000
1.128000 0.804055 0.000000
1.129000 0.800284 0.000000
1.130000 0.796234 0.000000
1.131000 0.791947 0.000000
1.132000 0.787471 0.000000
1.133000 0.782855 0.000000
1.134000 0.778161 0.000000
1.135000 0.773448 0.000000
1.136000 0.768790 0.000000
1.137000 0.764287 0.000000
1.138000 0.760041 0.000000
1.139000 0.756155 0.000000
1.140000 0.752733 0.000000
1.141000 0.749878 0.000000
1.142000 0.747671 0.000000
1.143000 0.746141 0.000000
1.144000 0.745310 0.000000
1.145000 0.745195 0.000000
1.146000 0.745797 0.000000
1.147000 0.747118 0.000000
1.148000 0.749130 0.000000
1.149000 0.751750 0.000000
1.150000 0.754886 0.000000
1.151000 0.758447 0.000000
1.152000 0.762340 0.000000
1.153000 0.766477 0.000000
1.154000 0.770763 0.000000
1.155000 0.775102 0.000000
1.156000 0.779395 0.000000
1.157000 0.783556 0.000000
1.158000 0.787525 0.000000
1.159000 0.791248 0.000000
1.160000 0.794682 0.000000
1.161000 0.797818 0.000000
1.162000 0.800651 0.000000
1.163000 0.803184 0.000000
1.164000 0.805438 0.000000
1.165000 0.807437 0.000000
1.166000 0.809202 0.000000
1.167000 0.810744 0.000000
1.168000 0.812075 0.000000
1.169000 0.813211 0.000000
1.170000 0.814173 0.000000
1.171000 0.814988 0.000000
1.172000 0.815673 0.000000
1.173000 0.816236 0.000000
1.174000 0.816679 0.000000
1.175000 0.817010 0.000000
1.176000 0.817233 0.000000
1.177000 0.817356 0.000000
1.178000 0.817381 0.000000
1.179000 0.817301 0.000000
1.180000 0.817110 0.000000
1.181000 0.816803 0.000000
1.182000 0.816393 0.000000
1.183000 0.815891 0.000000
1.184000 0.815309 0.000000
1.185000 0.814657 0.000000
1.186000 0.813944 0.000000
1.187000 0.813177 0.000000
1.188000 0.812353 0.000000
1.189000 0.811468 0.000000
1.190000 0.810525 0.000000
1.191000 0.809544 0.000000
1.192000 0.808543 0.000000
1.193000 0.807538 0.000000
1.194000 0.806528 0.000000
1.195000 0.805511 0.000000
1.196000 0.804486 0.000000
1.197000 0.803464 0.000000
1.198000 0.802451 0.000000
1.199000 0.801464 0.000000
1.200000 0.800525 0.000000
1.201000 0.799663 0.000000
1.202000 0.798898 0.000000
1.203000 0.798232 0.000000
1.204000 0.797668 0.000000
1.205000 0.797209 0.000000
1.206000 0.796873 0.000000
1.207000 0.796675 0.000000
1.208000 0.796626 0.000000
1.209000 0.796731 0.000000
1.210000 0.796990 0.000000
1.211000 0.797404 0.000000
1.212000 0.797968 0.000000
1.213000 0.798678 0.000000
1.214000 0.799526 0.000000
1.215000 0.800497 0.000000
1.216000 0.801575 0.000000
1.217000 0.802745 0.000000
1.218000 0.803995 0.000000
1.219000 0.805313 0.000000
1.220000 0.806685 0.000000
1.221000 0.808096 0.000000
1.222000 0.809530 0.000000
1.223000 0.810971 0.000000
1.224000 0.812394 0.000000
1.225000 0.813779 0.000000
1.226000 0.815108 0.000000
1.227000 0.816382 0.000000
1.228000 0.817603 0.000000
1.229000 0.818772 0.000000
1.230000 0.819892 0.000000
1.231000 0.820966 0.000000
1.232000 0.821993 0.000000
1.233000 0.822972 0.000000
1.234000 0.823896 0.000000
1.235000 0.824765 0.000000
1.236000 0.825584 0.000000
1.237000 0.826358 0.000000
1.238000 0.827092 0.000000
1.239000 0.827785 0.000000
1.240000 0.828435 0.000000
1.241000 0.829044 0.000000
1.242000 0.829615 0.000000
1.243000 0.830155 0.000000
1.244000 0.830667 0.000000
1.245000 0.831151 0.000000
1.246000 0.831607 0.000000
1.247000 0.832037 0.000000
1.248000 0.832443 0.000000
1.249000 0.832832 0.000000
1.250000 0.833207 0.000000
1.251000 0.833566 0.000000
1.252000 0.833907 0.000000
1.253000 0.834230 0.000000
1.254000 0.834535 0.000000
1.255000 0.834821 0.000000
1.256000 0.835092 0.000000
1.257000 0.835349 0.000000
1.258000 0.835594 0.000000
1.259000 0.835830 0.000000
1.260000 0.836058 0.000000
1.261000 0.836279 0.000000
1.262000 0.836492 0.000000
1.263000 0.836692 0.000000
1.264000 0.836872 0.000000
1.265000 0.837032 0.000000
1.266000 0.837178 0.000000
1.267000 0.837321 0.000000
1.268000 0.837466 0.000000
1.269000 0.837612 0.000000
1.270000 0.837759 0.000000
1.271000 0.837906 0.000000
1.272000 0.838052 0.000000
1.273000 0.838196 0.000000
1.274000 0.838335 0.000000
1.275000 0.838462 0.000000
1.276000 0.838571 0.000000
1.277000 0.838657 0.000000
1.278000 0.838729 0.000000
1.279000 0.838795 0.000000
1.280000 0.838860 0.000000
1.281000 0.838923 0.000000
1.282000 0.838981 0.000000
1.283000 0.839030 0.000000
1.284000 0.839065 0.000000
1.285000 0.839081 0.000000
1.286000 0.839073 0.000000
1.287000 0.839043 0.000000
1.288000 0.838991 0.000000
1.289000 0.838919 0.000000
1.290000 0.838822 0.000000
1.291000 0.838698 0.000000
1.292000 0.838547 0.000000
1.293000 0.838378 0.000000
1.294000 0.838202 0.000000
1.295000 0.838027 0.000000
1.296000 0.837856 0.000000
1.297000 0.837694 0.000000
1.298000 0.837545 0.000000
1.299000 0.837411 0.000000
1.300000 0.837299 0.000000
1.301000 0.837213 0.000000
1.302000 0.837155 0.000000
1.303000 0.837128 0.000000
1.304000 0.837134 0.000000
1.305000 0.837169 0.000000
1.306000 0.837227 0.000000
1.307000 0.837301 0.000000
1.308000 0.837372 0.000000
1.309000 0.837419 0.000000
1.310000 0.837429 0.000000
1.311000 0.837402 0.000000
1.312000 0.837338 0.000000
1.313000 0.837239 0.000000
1.314000 0.837108 0.000000
1.315000 0.836946 0.000000
1.316000 0.836756 0.000000
1.317000 0.836542 0.000000
1.318000 0.836307 0.000000
1.319000 0.836056 0.000000
1.320000 0.835799 0.000000
1.321000 0.835543 0.000000
1.322000 0.835295 0.000000
1.323000 0.835052 0.000000
1.324000 0.834809 0.000000
1.325000 0.834567 0.000000
1.326000 0.834333 0.000000
1.327000 0.834117 0.000000
1.328000 0.833920 0.000000
1.329000 0.833731 0.000000
1.330000 0.833534 0.000000
1.331000 0.833318 0.000000
1.332000 0.833081 0.000000
1.333000 0.832822 0.000000
1.334000 0.832537 0.000000
1.335000 0.832218 0.000000
1.336000 0.831854 0.000000
1.337000 0.831440 0.000000
1.338000 0.830983 0.000000
1.339000 0.830487 0.000000
1.340000 0.829962 0.000000
1.341000 0.829425 0.000000
1.342000 0.828893 0.000000
1.343000 0.828382 0.000000
1.344000 0.827905 0.000000
1.345000 0.827475 0.000000
1.346000 0.827104 0.000000
1.347000 0.826796 0.000000
1.348000 0.826555 0.000000
1.349000 0.826384 0.000000
1.350000 0.826275 0.000000
1.351000 0.826219 0.000000
1.352000 0.826207 0.000000
1.353000 0.826221 0.000000
1.354000 0.826244 0.000000
1.355000 0.826257 0.000000
1.356000 0.826240 0.000000
1.357000 0.826173 0.000000
1.358000 0.826040 0.000000
1.359000 0.825831 0.000000
1.360000 0.825540 0.000000
1.361000 0.825159 0.000000
1.362000 0.824689 0.000000
1.363000 0.824128 0.000000
1.364000 0.823480 0.000000
1.365000 0.822754 0.000000
1.366000 0.821959 0.000000
1.367000 0.821106 0.000000
1.368000 0.820208 0.000000
1.369000 0.819278 0.000000
1.370000 0.818328 0.000000
1.371000 0.817364 0.000000
1.372000 0.816393 0.000000
1.373000 0.815422 0.000000
1.374000 0.814461 0.000000
1.375000 0.813519 0.000000
1.376000 0.812605 0.000000
1.377000 0.811717 0.000000
1.378000 0.810852 0.000000
1.379000 0.810008 0.000000
1.380000 0.809177 0.000000
1.381000 0.808348 0.000000
1.382000 0.807519 0.000000
1.383000 0.806689 0.000000
1.384000 0.805862 0.000000
1.385000 0.805041 0.000000
1.386000 0.804233 0.000000
1.387000 0.803444 0.000000
1.388000 0.802684 0.000000
1.389000 0.801966 0.000000
1.390000 0.801306 0.000000
1.391000 0.800716 0.000000
1.392000 0.800204 0.000000
1.393000 0.799777 0.000000
1.394000 0.799434 0.000000
1.395000 0.799161 0.000000
1.396000 0.798941 0.000000
1.397000 0.798758 0.000000
1.398000 0.798596 0.000000
1.399000 0.798441 0.000000
1.400000 0.798273 0.000000
1.401000 0.798072 0.000000
1.402000 0.797813 0.000000
1.403000 0.797484 0.000000
1.404000 0.797091 0.000000
1.405000 0.796644 0.000000
1.406000 0.796158 0.000000
1.407000 0.795653 0.000000
1.408000 0.795149 0.000000
1.409000 0.794668 0.000000
1.410000 0.794228 0.000000
1.411000 0.793852 0.000000
1.412000 0.793555 0.000000
1.413000 0.793352 0.000000
1.414000 0.793253 0.000000
1.415000 0.793265 0.000000
1.416000 0.793375 0.000000
1.417000 0.793568 0.000000
1.418000 0.793827 0.000000
1.419000 0.794133 0.000000
1.420000 0.794464 0.000000
1.421000 0.794798 0.000000
1.422000 0.795121 0.000000
1.423000 0.795414 0.000000
1.424000 0.795665 0.000000
1.425000 0.795871 0.000000
1.426000 0.796027 0.000000
1.427000 0.796134 0.000000
1.428000 0.796202 0.000000
1.429000 0.796241 0.000000
1.430000 0.796261 0.000000
1.431000 0.796274 0.000000
1.432000 0.796292 0.000000
1.433000 0.796328 0.000000
1.434000 0.796393 0.000000
1.435000 0.796501 0.000000
1.436000 0.796661 0.000000
1.437000 0.796870 0.000000
1.438000 0.797127 0.000000
1.439000 0.797428 0.000000
1.440000 0.797776 0.000000
1.441000 0.798169 0.000000
1.442000 0.798608 0.000000
1.443000 0.799082 0.000000
1.444000 0.799583 0.000000
1.445000 0.800103 0.000000
1.446000 0.800639 0.000000
1.447000 0.801188 0.000000
1.448000 0.801748 0.000000
1.449000 0.802315 0.000000
1.450000 0.802887 0.000000
1.451000 0.803459 0.000000
1.452000 0.804024 0.000000
1.453000 0.804575 0.000000
1.454000 0.805106 0.000000
1.455000 0.805615 0.000000
1.456000 0.806099 0.000000
1.457000 0.806558 0.000000
1.458000 0.806994 0.000000
1.459000 0.807409 0.000000
1.460000 0.807804 0.000000
1.461000 0.808176 0.000000
1.462000 0.808524 0.000000
1.463000 0.808847 0.000000
1.464000 0.809146 0.000000
1.465000 0.809422 0.000000
1.466000 0.809678 0.000000
1.467000 0.809917 0.000000
1.468000 0.810145 0.000000
1.469000 0.810368 0.000000
1.470000 0.810595 0.000000
1.471000 0.810837 0.000000
1.472000 0.811100 0.000000
1.473000 0.811378 0.000000
1.474000 0.811666 0.000000
1.475000 0.811956 0.000000
1.476000 0.812241 0.000000
1.477000 0.812514 0.000000
1.478000 0.812770 0.000000
1.479000 0.813004 0.000000
1.480000 0.813212 0.000000
1.481000 0.813394 0.000000
1.482000 0.813562 0.000000
1.483000 0.813726 0.000000
1.484000 0.813896 0.000000
1.485000 0.814074 0.000000
1.486000 0.814262 0.000000
1.487000 0.814463 0.000000
1.488000 0.814681 0.000000
1.489000 0.814922 0.000000
1.490000 0.815188 0.000000
1.491000 0.815479 0.000000
1.492000 0.815794 0.000000
1.493000 0.816130 0.000000
1.494000 0.816482 0.000000
1.495000 0.816841 0.000000
1.496000 0.817204 0.000000
1.497000 0.817569 0.000000
1.498000 0.817936 0.000000
1.499000 0.818304 0.000000
1.500000 0.818670 0.000000
1.501000 0.819030 0.000000
1.502000 0.819379 0.000000
1.503000 0.819712 0.000000
1.504000 0.820024 0.000000
1.505000 0.820309 0.000000
1.506000 0.820569 0.000000
1.507000 0.820801 0.000000
1.508000 0.821010 0.000000
1.509000 0.821203 0.000000
1.510000 0.821390 0.000000
1.511000 0.821577 0.000000
1.512000 0.821773 0.000000
1.513000 0.821982 0.000000
1.514000 0.822208 0.000000
1.515000 0.822448 0.000000
1.516000 0.822698 0.000000
1.517000 0.822954 0.000000
1.518000 0.823212 0.000000
1.519000 0.823467 0.000000
1.520000 0.823717 0.000000
1.521000 0.823967 0.000000
1.522000 0.824221 0.000000
1.523000 0.824482 0.000000
1.524000 0.824742 0.000000
1.525000 0.824993 0.000000
1.526000 0.825230 0.000000
1.527000 0.825458 0.000000
1.528000 0.825682 0.000000
1.529000 0.825907 0.000000
1.530000 0.826138 0.000000
1.531000 0.826382 0.000000
1.532000 0.826640 0.000000
1.533000 0.826905 0.000000
1.534000 0.827170 0.000000
1.535000 0.827431 0.000000
1.536000 0.827687 0.000000
1.537000 0.827940 0.000000
1.538000 0.828188 0.000000
1.539000 0.828432 0.000000
1.540000 0.828669 0.000000
1.541000 0.828898 0.000000
1.542000 0.829119 0.000000
1.543000 0.829333 0.000000
1.544000 0.829540 0.000000
1.545000 0.829736 0.000000
1.546000 0.829918 0.000000
1.547000 0.830087 0.000000
1.548000 0.830246 0.000000
1.549000 0.830403 0.000000
1.550000 0.830558 0.000000
1.551000 0.830700 0.000000
1.552000 0.830818 0.000000
1.553000 0.830906 0.000000
1.554000 0.830964 0.000000
1.555000 0.830998 0.000000
1.556000 0.831011 0.000000
1.557000 0.831007 0.000000
1.558000 0.830991 0.000000
1.559000 0.830964 0.000000
1.560000 0.830926 0.000000
1.561000 0.830875 0.000000
1.562000 0.830812 0.000000
1.563000 0.830736 0.000000
1.564000 0.830650 0.000000
1.565000 0.830552 0.000000
1.566000 0.830440 0.000000
1.567000 0.830311 0.000000
1.568000 0.830166 0.000000
1.569000 0.830015 0.000000
1.570000 0.829869 0.000000
1.571000 0.829731 0.000000
1.572000 0.829589 0.000000
1.573000 0.829427 0.000000
1.574000 0.829233 0.000000
1.575000 0.829008 0.000000
1.576000 0.828751 0.000000
1.577000 0.828463 0.000000
1.578000 0.828153 0.000000
1.579000 0.827826 0.000000
1.580000 0.827488 0.000000
1.581000 0.827134 0.000000
1.582000 0.826760 0.000000
1.583000 0.826363 0.000000
1.584000 0.825954 0.000000
1.585000 0.825543 0.000000
1.586000 0.825137 0.000000
1.587000 0.824731 0.000000
1.588000 0.824321 0.000000
1.589000 0.823904 0.000000
1.590000 0.823480 0.000000
1.591000 0.823053 0.000000
1.592000 0.822620 0.000000
1.593000 0.822168 0.000000
1.594000 0.821685 0.000000
1.595000 0.821160 0.000000
1.596000 0.820587 0.000000
1.597000 0.819963 0.000000
1.598000 0.819287 0.000000
1.599000 0.818571 0.000000
1.600000 0.817826 0.000000
1.601000 0.817058 0.000000
1.602000 0.816258 0.000000
1.603000 0.815412 0.000000
1.604000 0.814510 0.000000
1.605000 0.813536 0.000000
1.606000 0.812476 0.000000
1.607000 0.811320 0.000000
1.608000 0.810060 0.000000
1.609000 0.808692 0.000000
1.610000 0.807203 0.000000
1.611000 0.805566 0.000000
1.612000 0.803754 0.000000
1.613000 0.801737 0.000000
1.614000 0.799489 0.000000
1.615000 0.796985 0.000000
1.616000 0.794203 0.000000
1.617000 0.791132 0.000000
1.618000 0.787761 0.000000
1.619000 0.784089 0.000000
1.620000 0.780127 0.000000
1.621000 0.775894 0.000000
1.622000 0.771413 0.000000
1.623000 0.766730 0.000000
1.624000 0.761892 0.000000
1.625000 0.756951 0.000000
1.626000 0.751965 0.000000
1.627000 0.746995 0.000000
1.628000 0.742100 0.000000
1.629000 0.737344 0.000000
1.630000 0.732786 0.000000
1.631000 0.728481 0.000000
1.632000 0.724460 0.000000
1.633000 0.720753 0.000000
1.634000 0.717386 0.000000
1.635000 0.714369 0.000000
1.636000 0.711711 0.000000
1.637000 0.709418 0.000000
1.638000 0.707474 0.000000
1.639000 0.705867 0.000000
1.640000 0.704585 0.000000
1.641000 0.703624 0.000000
1.642000 0.702985 0.000000
1.643000 0.702660 0.000000
1.644000 0.702637 0.000000
1.645000 0.702901 0.000000
1.646000 0.703408 0.000000
1.647000 0.704050 0.000000
1.648000 0.704709 0.000000
1.649000 0.705245 0.000000
1.650000 0.705471 0.000000
1.651000 0.705188 0.000000
1.652000 0.704212 0.000000
1.653000 0.702383 0.000000
1.654000 0.699543 0.000000
1.655000 0.695585 0.000000
1.656000 0.690510 0.000000
1.657000 0.684334 0.000000
1.658000 0.677100 0.000000
1.659000 0.668918 0.000000
1.660000 0.659903 0.000000
1.661000 0.650186 0.000000
1.662000 0.639938 0.000000
1.663000 0.629329 0.000000
1.664000 0.618521 0.000000
1.665000 0.607646 0.000000
1.666000 0.596837 0.000000
1.667000 0.586218 0.000000
1.668000 0.575895 0.000000
1.669000 0.565979 0.000000
1.670000 0.556567 0.000000
1.671000 0.547749 0.000000
1.672000 0.539610 0.000000
1.673000 0.532231 0.000000
1.674000 0.525687 0.000000
1.675000 0.520050 0.000000
1.676000 0.515371 0.000000
1.677000 0.511647 0.000000
1.678000 0.508868 0.000000
1.679000 0.507012 0.000000
1.680000 0.506021 0.000000
1.681000 0.505835 0.000000
1.682000 0.506387 0.000000
1.683000 0.507594 0.000000
1.684000 0.509370 0.000000
1.685000 0.511635 0.000000
1.686000 0.514318 0.000000
1.687000 0.517351 0.000000
1.688000 0.520681 0.000000
1.689000 0.524288 0.000000
1.690000 0.528160 0.000000
1.691000 0.532295 0.000000
1.692000 0.536718 0.000000
1.693000 0.541464 0.000000
1.694000 0.546556 0.000000
1.695000 0.552004 0.000000
1.696000 0.557814 0.000000
1.697000 0.563971 0.000000
1.698000 0.570406 0.000000
1.699000 0.577041 0.000000
1.700000 0.583788 0.000000
1.701000 0.590529 0.000000
1.702000 0.597139 0.000000
1.703000 0.603504 0.000000
1.704000 0.609526 0.000000
1.705000 0.615110 0.000000
1.706000 0.620190 0.000000
1.707000 0.624764 0.000000
1.708000 0.628839 0.000000
1.709000 0.632434 0.000000
1.710000 0.635597 0.000000
1.711000 0.638375 0.000000
1.712000 0.640814 0.000000
1.713000 0.642953 0.000000
1.714000 0.644828 0.000000
1.715000 0.646469 0.000000
1.716000 0.647891 0.000000
1.717000 0.649111 0.000000
1.718000 0.650145 0.000000
1.719000 0.651024 0.000000
1.720000 0.651777 0.000000
1.721000 0.652446 0.000000
1.722000 0.653099 0.000000
1.723000 0.653810 0.000000
1.724000 0.654648 0.000000
1.725000 0.655685 0.000000
1.726000 0.656988 0.000000
1.727000 0.658613 0.000000
1.728000 0.660587 0.000000
1.729000 0.662928 0.000000
1.730000 0.665642 0.000000
1.731000 0.668696 0.000000
1.732000 0.672053 0.000000
1.733000 0.675653 0.000000
1.734000 0.679384 0.000000
1.735000 0.683131 0.000000
1.736000 0.686780 0.000000
1.737000 0.690229 0.000000
1.738000 0.693376 0.000000
1.739000 0.696126 0.000000
1.740000 0.698405 0.000000
1.741000 0.700138 0.000000
1.742000 0.701269 0.000000
1.743000 0.701784 0.000000
1.744000 0.701675 0.000000
1.745000 0.700957 0.000000
1.746000 0.699701 0.000000
1.747000 0.697985 0.000000
1.748000 0.695894 0.000000
1.749000 0.693532 0.000000
1.750000 0.691005 0.000000
1.751000 0.688413 0.000000
1.752000 0.685845 0.000000
1.753000 0.683385 0.000000
1.754000 0.681101 0.000000
1.755000 0.679028 0.000000
1.756000 0.677193 0.000000
1.757000 0.675618 0.000000
1.758000 0.674301 0.000000
1.759000 0.673243 0.000000
1.760000 0.672451 0.000000
1.761000 0.671960 0.000000
1.762000 0.671807 0.000000
1.763000 0.672027 0.000000
1.764000 0.672650 0.000000
1.765000 0.673708 0.000000
1.766000 0.675207 0.000000
1.767000 0.677099 0.000000
1.768000 0.679328 0.000000
1.769000 0.681838 0.000000
1.770000 0.684565 0.000000
1.771000 0.687443 0.000000
1.772000 0.690397 0.000000
1.773000 0.693322 0.000000
1.774000 0.696108 0.000000
1.775000 0.698666 0.000000
1.776000 0.700952 0.000000
1.777000 0.702927 0.000000
1.778000 0.704562 0.000000
1.779000 0.705847 0.000000
1.780000 0.706777 0.000000
1.781000 0.707358 0.000000
1.782000 0.707631 0.000000
1.783000 0.707637 0.000000
1.784000 0.707423 0.000000
1.785000 0.707042 0.000000
1.786000 0.706547 0.000000
1.787000 0.705992 0.000000
1.788000 0.705434 0.000000
1.789000 0.704925 0.000000
1.790000 0.704508 0.000000
1.791000 0.704196 0.000000
1.792000 0.703997 0.000000
1.793000 0.703915 0.000000
1.794000 0.703948 0.000000
1.795000 0.704092 0.000000
1.796000 0.704325 0.000000
1.797000 0.704579 0.000000
1.798000 0.704774 0.000000
1.799000 0.704855 0.000000
1.800000 0.704830 0.000000
1.801000 0.704722 0.000000
1.802000 0.704560 0.000000
1.803000 0.704396 0.000000
1.804000 0.704289 0.000000
1.805000 0.704282 0.000000
1.806000 0.704368 0.000000
1.807000 0.704528 0.000000
1.808000 0.704748 0.000000
1.809000 0.705028 0.000000
1.810000 0.705374 0.000000
1.811000 0.705790 0.000000
1.812000 0.706288 0.000000
1.813000 0.706882 0.000000
1.814000 0.707578 0.000000
1.815000 0.708355 0.000000
1.816000 0.709183 0.000000
1.817000 0.710038 0.000000
1.818000 0.710917 0.000000
1.819000 0.711821 0.000000
1.820000 0.712752 0.000000
1.821000 0.713683 0.000000
1.822000 0.714585 0.000000
1.823000 0.715428 0.000000
1.824000 0.716199 0.000000
1.825000 0.716888 0.000000
1.826000 0.717488 0.000000
1.827000 0.717998 0.000000
1.828000 0.718423 0.000000
1.829000 0.718765 0.000000
1.830000 0.719026 0.000000
1.831000 0.719206 0.000000
1.832000 0.719308 0.000000
1.833000 0.719338 0.000000
1.834000 0.719305 0.000000
1.835000 0.719219 0.000000
1.836000 0.719093 0.000000
1.837000 0.718942 0.000000
1.838000 0.718780 0.000000
1.839000 0.718613 0.000000
1.840000 0.718439 0.000000
1.841000 0.718260 0.000000
1.842000 0.718074 0.000000
1.843000 0.717879 0.000000
1.844000 0.717675 0.000000
1.845000 0.717455 0.000000
1.846000 0.717214 0.000000
1.847000 0.716944 0.000000
1.848000 0.716653 0.000000
1.849000 0.716359 0.000000
1.850000 0.716076 0.000000
1.851000 0.715811 0.000000
1.852000 0.715563 0.000000
1.853000 0.715331 0.000000
1.854000 0.715126 0.000000
1.855000 0.714968 0.000000
1.856000 0.714876 0.000000
1.857000 0.714856 0.000000
1.858000 0.714907 0.000000
1.859000 0.715024 0.000000
1.860000 0.715214 0.000000
1.861000 0.715490 0.000000
1.862000 0.715865 0.000000
1.863000 0.716342 0.000000
1.864000 0.716915 0.000000
1.865000 0.717577 0.000000
1.866000 0.718316 0.000000
1.867000 0.719115 0.000000
1.868000 0.719956 0.000000
1.869000 0.720828 0.000000
1.870000 0.721726 0.000000
1.871000 0.722647 0.000000
1.872000 0.723574 0.000000
1.873000 0.724481 0.000000
1.874000 0.725343 0.000000
1.875000 0.726145 0.000000
1.876000 0.726884 0.000000
1.877000 0.727561 0.000000
1.878000 0.728176 0.000000
1.879000 0.728729 0.000000
1.880000 0.729222 0.000000
1.881000 0.729659 0.000000
1.882000 0.730051 0.000000
1.883000 0.730410 0.000000
1.884000 0.730744 0.000000
1.885000 0.731056 0.000000
1.886000 0.731347 0.000000
1.887000 0.731622 0.000000
1.888000 0.731885 0.000000
1.889000 0.732143 0.000000
1.890000 0.732399 0.000000
1.891000 0.732654 0.000000
1.892000 0.732910 0.000000
1.893000 0.733165 0.000000
1.894000 0.733417 0.000000
1.895000 0.733661 0.000000
1.896000 0.733893 0.000000
1.897000 0.734106 0.000000
1.898000 0.734291 0.000000
1.899000 0.734443 0.000000
1.900000 0.734558 0.000000
1.901000 0.734632 0.000000
1.902000 0.734664 0.000000
1.903000 0.734657 0.000000
1.904000 0.734614 0.000000
1.905000 0.734542 0.000000
1.906000 0.734461 0.000000
1.907000 0.734389 0.000000
1.908000 0.734342 0.000000
1.909000 0.734327 0.000000
1.910000 0.734347 0.000000
1.911000 0.734403 0.000000
1.912000 0.734491 0.000000
1.913000 0.734604 0.000000
1.914000 0.734740 0.000000
1.915000 0.734912 0.000000
1.916000 0.735134 0.000000
1.917000 0.735414 0.000000
1.918000 0.735729 0.000000
1.919000 0.736052 0.000000
1.920000 0.736360 0.000000
1.921000 0.736660 0.000000
1.922000 0.736962 0.000000
1.923000 0.737273 0.000000
1.924000 0.737585 0.000000
1.925000 0.737885 0.000000
1.926000 0.738166 0.000000
1.927000 0.738432 0.000000
1.928000 0.738697 0.000000
1.929000 0.738966 0.000000
1.930000 0.739228 0.000000
1.931000 0.739465 0.000000
1.932000 0.739663 0.000000
1.933000 0.739821 0.000000
1.934000 0.739947 0.000000
1.935000 0.740046 0.000000
1.936000 0.740122 0.000000
1.937000 0.740175 0.000000
1.938000 0.740208 0.000000
1.939000 0.740215 0.000000
1.940000 0.740188 0.000000
1.941000 0.740121 0.000000
1.942000 0.740021 0.000000
1.943000 0.739897 0.000000
1.944000 0.739760 0.000000
1.945000 0.739626 0.000000
1.946000 0.739512 0.000000
1.947000 0.739434 0.000000
1.948000 0.739391 0.000000
1.949000 0.739376 0.000000
1.950000 0.739384 0.000000
1.951000 0.739425 0.000000
1.952000 0.739517 0.000000
1.953000 0.739676 0.000000
1.954000 0.739886 0.000000
1.955000 0.740119 0.000000
1.956000 0.740347 0.000000
1.957000 0.740564 0.000000
1.958000 0.740779 0.000000
1.959000 0.740999 0.000000
1.960000 0.741222 0.000000
1.961000 0.741439 0.000000
1.962000 0.741642 0.000000
1.963000 0.741830 0.000000
1.964000 0.742005 0.000000
1.965000 0.742169 0.000000
1.966000 0.742322 0.000000
1.967000 0.742463 0.000000
1.968000 0.742591 0.000000
1.969000 0.742702 0.000000
1.970000 0.742790 0.000000
1.971000 0.742849 0.000000
1.972000 0.742890 0.000000
1.973000 0.742930 0.000000
1.974000 0.742985 0.000000
1.975000 0.743049 0.000000
1.976000 0.743101 0.000000
1.977000 0.743124 0.000000
1.978000 0.743132 0.000000
1.979000 0.743158 0.000000
1.980000 0.743231 0.000000
1.981000 0.743348 0.000000
1.982000 0.743484 0.000000
1.983000 0.743618 0.000000
1.984000 0.743742 0.000000
1.985000 0.743864 0.000000
1.986000 0.743987 0.000000
1.987000 0.744118 0.000000
1.988000 0.744265 0.000000
1.989000 0.744432 0.000000
1.990000 0.744608 0.000000
1.991000 0.744768 0.000000
1.992000 0.744891 0.000000
1.993000 0.744967 0.000000
1.994000 0.744991 0.000000
1.995000 0.744960 0.000000
1.996000 0.744877 0.000000
1.997000 0.744748 0.000000
1.998000 0.744580 0.000000
1.999000 0.744381 0.000000
2.000000 0.744161 0.000000
2.001000 0.743929 0.000000
2.002000 0.743704 0.000000
2.003000 0.743510 0.000000
2.004000 0.743367 0.000000
2.005000 0.743274 0.000000
2.006000 0.743213 0.000000
2.007000 0.743171 0.000000
2.008000 0.743158 0.000000
2.009000 0.743196 0.000000
2.010000 0.743307 0.000000
2.011000 0.743482 0.000000
2.012000 0.743694 0.000000
2.013000 0.743918 0.000000
2.014000 0.744138 0.000000
2.015000 0.744344 0.000000
2.016000 0.744528 0.000000
2.017000 0.744691 0.000000
2.018000 0.744841 0.000000
2.019000 0.744986 0.000000
2.020000 0.745135 0.000000
2.021000 0.745295 0.000000
2.022000 0.745473 0.000000
2.023000 0.745660 0.000000
2.024000 0.745840 0.000000
2.025000 0.745996 0.000000
2.026000 0.746129 0.000000
2.027000 0.746252 0.000000
2.028000 0.746374 0.000000
2.029000 0.746498 0.000000
2.030000 0.746619 0.000000
2.031000 0.746734 0.000000
2.032000 0.746836 0.000000
2.033000 0.746919 0.000000
2.034000 0.746977 0.000000
2.035000 0.747011 0.000000
2.036000 0.747029 0.000000
2.037000 0.747038 0.000000
2.038000 0.747023 0.000000
2.039000 0.746963 0.000000
2.040000 0.746837 0.000000
2.041000 0.746655 0.000000
2.042000 0.746445 0.000000
2.043000 0.746234 0.000000
2.044000 0.746028 0.000000
2.045000 0.745820 0.000000
2.046000 0.745605 0.000000
2.047000 0.745367 0.000000
2.048000 0.745090 0.000000
2.049000 0.744759 0.000000
2.050000 0.744390 0.000000
2.051000 0.744016 0.000000
2.052000 0.743669 0.000000
2.053000 0.743336 0.000000
2.054000 0.742983 0.000000
2.055000 0.742576 0.000000
2.056000 0.742116 0.000000
2.057000 0.741623 0.000000
2.058000 0.741116 0.000000
2.059000 0.740597 0.000000
2.060000 0.740063 0.000000
2.061000 0.739509 0.000000
2.062000 0.738950 0.000000
2.063000 0.738415 0.000000
2.064000 0.737928 0.000000
2.065000 0.737495 0.000000
2.066000 0.737109 0.000000
2.067000 0.736765 0.000000
2.068000 0.736467 0.000000
2.069000 0.736230 0.000000
2.070000 0.736065 0.000000
2.071000 0.735978 0.000000
2.072000 0.735968 0.000000
2.073000 0.736034 0.000000
2.074000 0.736162 0.000000
2.075000 0.736327 0.000000
2.076000 0.736505 0.000000
2.077000 0.736673 0.000000
2.078000 0.736807 0.000000
2.079000 0.736883 0.000000
2.080000 0.736887 0.000000
2.081000 0.736810 0.000000
2.082000 0.736643 0.000000
2.083000 0.736377 0.000000
2.084000 0.736006 0.000000
2.085000 0.735519 0.000000
2.086000 0.734905 0.000000
2.087000 0.734146 0.000000
2.088000 0.733228 0.000000
2.089000 0.732153 0.000000
2.090000 0.730938 0.000000
2.091000 0.729597 0.000000
2.092000 0.728170 0.000000
2.093000 0.726710 0.000000
2.094000 0.725269 0.000000
2.095000 0.723872 0.000000
2.096000 0.722533 0.000000
2.097000 0.721265 0.000000
2.098000 0.720088 0.000000
2.099000 0.719024 0.000000
2.100000 0.718093 0.000000
2.101000 0.717282 0.000000
2.102000 0.716560 0.000000
2.103000 0.715895 0.000000
2.104000 0.715259 0.000000
2.105000 0.714623 0.000000
2.106000 0.713958 0.000000
2.107000 0.713211 0.000000
2.108000 0.712318 0.000000
2.109000 0.711217 0.000000
2.110000 0.709892 0.000000
2.111000 0.708351 0.000000
2.112000 0.706602 0.000000
2.113000 0.704620 0.000000
2.114000 0.702366 0.000000
2.115000 0.699799 0.000000
2.116000 0.696925 0.000000
2.117000 0.693771 0.000000
2.118000 0.690363 0.000000
2.119000 0.686732 0.000000
2.120000 0.682910 0.000000
2.121000 0.678923 0.000000
2.122000 0.674760 0.000000
2.123000 0.670390 0.000000
2.124000 0.665773 0.000000
2.125000 0.660825 0.000000
2.126000 0.655436 0.000000
2.127000 0.649490 0.000000
2.128000 0.642860 0.000000
2.129000 0.635405 0.000000
2.130000 0.627000 0.000000
2.131000 0.617623 0.000000
2.132000 0.607313 0.000000
2.133000 0.596127 0.000000
2.134000 0.584224 0.000000
2.135000 0.571823 0.000000
2.136000 0.559167 0.000000
2.137000 0.546589 0.000000
2.138000 0.534491 0.000000
2.139000 0.523262 0.000000
2.140000 0.513230 0.000000
2.141000 0.504672 0.000000
2.142000 0.497845 0.000000
2.143000 0.492812 0.000000
2.144000 0.489515 0.000000
2.145000 0.487878 0.000000
2.146000 0.487683 0.000000
2.147000 0.488623 0.000000
2.148000 0.490385 0.000000
2.149000 0.492601 0.000000
2.150000 0.494868 0.000000
2.151000 0.496799 0.000000
2.152000 0.498157 0.000000
2.153000 0.498792 0.000000
2.154000 0.498571 0.000000
2.155000 0.497494 0.000000
2.156000 0.495643 0.000000
2.157000 0.493110 0.000000
2.158000 0.490051 0.000000
2.159000 0.486666 0.000000
2.160000 0.483155 0.000000
2.161000 0.479703 0.000000
2.162000 0.476484 0.000000
2.163000 0.473673 0.000000
2.164000 0.471399 0.000000
2.165000 0.469768 0.000000
2.166000 0.468886 0.000000
2.167000 0.468864 0.000000
2.168000 0.469815 0.000000
2.169000 0.471837 0.000000
2.170000 0.474878 0.000000
2.171000 0.478801 0.000000
2.172000 0.483461 0.000000
2.173000 0.488645 0.000000
2.174000 0.494107 0.000000
2.175000 0.499599 0.000000
2.176000 0.504874 0.000000
2.177000 0.509693 0.000000
2.178000 0.513828 0.000000
2.179000 0.517191 0.000000
2.180000 0.519774 0.000000
2.181000 0.521588 0.000000
2.182000 0.522788 0.000000
2.183000 0.523616 0.000000
2.184000 0.524321 0.000000
2.185000 0.525197 0.000000
2.186000 0.526562 0.000000
2.187000 0.528722 0.000000
2.188000 0.531821 0.000000
2.189000 0.535907 0.000000
2.190000 0.541008 0.000000
2.191000 0.546983 0.000000
2.192000 0.553598 0.000000
2.193000 0.560621 0.000000
2.194000 0.567852 0.000000
2.195000 0.575113 0.000000
2.196000 0.582218 0.000000
2.197000 0.589004 0.000000
2.198000 0.595310 0.000000
2.199000 0.600992 0.000000
2.200000 0.606018 0.000000
2.201000 0.610405 0.000000
2.202000 0.614178 0.000000
2.203000 0.617370 0.000000
2.204000 0.620027 0.000000
2.205000 0.622196 0.000000
2.206000 0.623951 0.000000
2.207000 0.625379 0.000000
2.208000 0.626556 0.000000
2.209000 0.627500 0.000000
2.210000 0.628212 0.000000
2.211000 0.628702 0.000000
2.212000 0.629028 0.000000
2.213000 0.629262 0.000000
2.214000 0.629474 0.000000
2.215000 0.629723 0.000000
2.216000 0.630063 0.000000
2.217000 0.630544 0.000000
2.218000 0.631199 0.000000
2.219000 0.632050 0.000000
2.220000 0.633120 0.000000
2.221000 0.634411 0.000000
2.222000 0.635922 0.000000
2.223000 0.637636 0.000000
2.224000 0.639470 0.000000
2.225000 0.641331 0.000000
2.226000 0.643136 0.000000
2.227000 0.644857 0.000000
2.228000 0.646477 0.000000
2.229000 0.647979 0.000000
2.230000 0.649349 0.000000
2.231000 0.650570 0.000000
2.232000 0.651633 0.000000
2.233000 0.652535 0.000000
2.234000 0.653275 0.000000
2.235000 0.653851 0.000000
2.236000 0.654256 0.000000
2.237000 0.654483 0.000000
2.238000 0.654517 0.000000
2.239000 0.654325 0.000000
2.240000 0.653872 0.000000
2.241000 0.653140 0.000000
2.242000 0.652149 0.000000
2.243000 0.650928 0.000000
2.244000 0.649515 0.000000
2.245000 0.647982 0.000000
2.246000 0.646405 0.000000
2.247000 0.644849 0.000000
2.248000 0.643361 0.000000
2.249000 0.641982 0.000000
2.250000 0.640759 0.000000
2.251000 0.639737 0.000000
2.252000 0.638964 0.000000
2.253000 0.638449 0.000000
2.254000 0.638130 0.000000
2.255000 0.637940 0.000000
2.256000 0.637808 0.000000
2.257000 0.637658 0.000000
2.258000 0.637417 0.000000
2.259000 0.637028 0.000000
2.260000 0.636469 0.000000
2.261000 0.635719 0.000000
2.262000 0.634757 0.000000
2.263000 0.633566 0.000000
2.264000 0.632126 0.000000
2.265000 0.630439 0.000000
2.266000 0.628533 0.000000
2.267000 0.626433 0.000000
2.268000 0.624150 0.000000
2.269000 0.621673 0.000000
2.270000 0.618990 0.000000
2.271000 0.616115 0.000000
2.272000 0.613091 0.000000
2.273000 0.609963 0.000000
2.274000 0.606758 0.000000
2.275000 0.603482 0.000000
2.276000 0.600142 0.000000
2.277000 0.596737 0.000000
2.278000 0.593258 0.000000
2.279000 0.589698 0.000000
2.280000 0.586056 0.000000
2.281000 0.582334 0.000000
2.282000 0.578532 0.000000
2.283000 0.574653 0.000000
2.284000 0.570689 0.000000
2.285000 0.566637 0.000000
2.286000 0.562515 0.000000
2.287000 0.558358 0.000000
2.288000 0.554204 0.000000
2.289000 0.550076 0.000000
2.290000 0.545997 0.000000
2.291000 0.541985 0.000000
2.292000 0.538062 0.000000
2.293000 0.534258 0.000000
2.294000 0.530598 0.000000
2.295000 0.527100 0.000000
2.296000 0.523779 0.000000
2.297000 0.520649 0.000000
2.298000 0.517724 0.000000
2.299000 0.515015 0.000000
2.300000 0.512538 0.000000
2.301000 0.510320 0.000000
2.302000 0.508394 0.000000
2.303000 0.506796 0.000000
2.304000 0.505568 0.000000
2.305000 0.504760 0.000000
2.306000 0.504422 0.000000
2.307000 0.504601 0.000000
2.308000 0.505346 0.000000
2.309000 0.506701 0.000000
2.310000 0.508659 0.000000
2.311000 0.511193 0.000000
2.312000 0.514264 0.000000
2.313000 0.517762 0.000000
2.314000 0.521547 0.000000
2.315000 0.525479 0.000000
2.316000 0.529422 0.000000
2.317000 0.533244 0.000000
2.318000 0.536813 0.000000
2.319000 0.539998 0.000000
2.320000 0.542668 0.000000
2.321000 0.544710 0.000000
2.322000 0.546090 0.000000
2.323000 0.546805 0.000000
2.324000 0.546857 0.000000
2.325000 0.546274 0.000000
2.326000 0.545094 0.000000
2.327000 0.543353 0.000000
2.328000 0.541088 0.000000
2.329000 0.538334 0.000000
2.330000 0.535133 0.000000
2.331000 0.531549 0.000000
2.332000 0.527648 0.000000
2.333000 0.523498 0.000000
2.334000 0.519136 0.000000
2.335000 0.514597 0.000000
2.336000 0.509918 0.000000
2.337000 0.505129 0.000000
2.338000 0.500262 0.000000
2.339000 0.495350 0.000000
2.340000 0.490441 0.000000
2.341000 0.485580 0.000000
2.342000 0.480816 0.000000
2.343000 0.476192 0.000000
2.344000 0.471752 0.000000
2.345000 0.467541 0.000000
2.346000 0.463617 0.000000
2.347000 0.460039 0.000000
2.348000 0.456861 0.000000
2.349000 0.454123 0.000000
2.350000 0.451857 0.000000
2.351000 0.450089 0.000000
2.352000 0.448810 0.000000
2.353000 0.448002 0.000000
2.354000 0.447637 0.000000
2.355000 0.447645 0.000000
2.356000 0.447944 0.000000
2.357000 0.448459 0.000000
2.358000 0.449151 0.000000
2.359000 0.449989 0.000000
2.360000 0.450936 0.000000
2.361000 0.451932 0.000000
2.362000 0.452913 0.000000
2.363000 0.453820 0.000000
2.364000 0.454616 0.000000
2.365000 0.455270 0.000000
2.366000 0.455764 0.000000
2.367000 0.456134 0.000000
2.368000 0.456427 0.000000
2.369000 0.456692 0.000000
2.370000 0.456965 0.000000
2.371000 0.457285 0.000000
2.372000 0.457687 0.000000
2.373000 0.458200 0.000000
2.374000 0.458853 0.000000
2.375000 0.459674 0.000000
2.376000 0.460686 0.000000
2.377000 0.461913 0.000000
2.378000 0.463372 0.000000
2.379000 0.465058 0.000000
2.380000 0.466962 0.000000
2.381000 0.469063 0.000000
2.382000 0.471307 0.000000
2.383000 0.473627 0.000000
2.384000 0.475962 0.000000
2.385000 0.478261 0.000000
2.386000 0.480476 0.000000
2.387000 0.482569 0.000000
2.388000 0.484543 0.000000
2.389000 0.486414 0.000000
2.390000 0.488196 0.000000
2.391000 0.489914 0.000000
2.392000 0.491597 0.000000
2.393000 0.493263 0.000000
2.394000 0.494907 0.000000
2.395000 0.496515 0.000000
2.396000 0.498070 0.000000
2.397000 0.499547 0.000000
2.398000 0.500915 0.000000
2.399000 0.502145 0.000000
2.400000 0.503207 0.000000
2.401000 0.504070 0.000000
2.402000 0.504714 0.000000
2.403000 0.505159 0.000000
2.404000 0.505436 0.000000
2.405000 0.505571 0.000000
2.406000 0.505587 0.000000
2.407000 0.505502 0.000000
2.408000 0.505322 0.000000
2.409000 0.505010 0.000000
2.410000 0.504515 0.000000
2.411000 0.503800 0.000000
2.412000 0.502875 0.000000
2.413000 0.501765 0.000000
2.414000 0.500487 0.000000
2.415000 0.499044 0.000000
2.416000 0.497435 0.000000
2.417000 0.495661 0.000000
2.418000 0.493741 0.000000
2.419000 0.491696 0.000000
2.420000 0.489553 0.000000
2.421000 0.487355 0.000000
2.422000 0.485147 0.000000
2.423000 0.482968 0.000000
2.424000 0.480818 0.000000
2.425000 0.478689 0.000000
2.426000 0.476580 0.000000
2.427000 0.474510 0.000000
2.428000 0.472503 0.000000
2.429000 0.470575 0.000000
2.430000 0.468721 0.000000
2.431000 0.466925 0.000000
2.432000 0.465172 0.000000
2.433000 0.463439 0.000000
2.434000 0.461702 0.000000
2.435000 0.459934 0.000000
2.436000 0.458096 0.000000
2.437000 0.456143 0.000000
2.438000 0.454035 0.000000
2.439000 0.451741 0.000000
2.440000 0.449236 0.000000
2.441000 0.446495 0.000000
2.442000 0.443500 0.000000
2.443000 0.440238 0.000000
2.444000 0.436688 0.000000
2.445000 0.432824 0.000000
2.446000 0.428615 0.000000
2.447000 0.424038 0.000000
2.448000 0.419103 0.000000
2.449000 0.413826 0.000000
2.450000 0.408231 0.000000
2.451000 0.402350 0.000000
2.452000 0.396221 0.000000
2.453000 0.389890 0.000000
2.454000 0.383427 0.000000
2.455000 0.376904 0.000000
2.456000 0.370400 0.000000
2.457000 0.363996 0.000000
2.458000 0.357770 0.000000
2.459000 0.351810 0.000000
2.460000 0.346228 0.000000
2.461000 0.341142 0.000000
2.462000 0.336644 0.000000
2.463000 0.332733 0.000000
2.464000 0.329383 0.000000
2.465000 0.326562 0.000000
2.466000 0.324216 0.000000
2.467000 0.322288 0.000000
2.468000 0.320719 0.000000
2.469000 0.319457 0.000000
2.470000 0.318449 0.000000
2.471000 0.317669 0.000000
2.472000 0.317202 0.000000
2.473000 0.317159 0.000000
2.474000 0.317632 0.000000
2.475000 0.318648 0.000000
2.476000 0.320215 0.000000
2.477000 0.322349 0.000000
2.478000 0.325097 0.000000
2.479000 0.328513 0.000000
2.480000 0.332670 0.000000
2.481000 0.337722 0.000000
2.482000 0.343847 0.000000
2.483000 0.351141 0.000000
2.484000 0.359402 0.000000
2.485000 0.368357 0.000000
2.486000 0.377735 0.000000
2.487000 0.387317 0.000000
2.488000 0.396895 0.000000
2.489000 0.406271 0.000000
2.490000 0.415285 0.000000
2.491000 0.423792 0.000000
2.492000 0.431615 0.000000
2.493000 0.438448 0.000000
2.494000 0.443961 0.000000
2.495000 0.447990 0.000000
2.496000 0.451055 0.000000
2.497000 0.453846 0.000000
2.498000 0.456916 0.000000
2.499000 0.460265 0.000000
2.500000 0.463751 0.000000
|
en
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.