This rule establishes guidelines for regulating access to the confidential personal information that is maintained by the Ohio department of developmental disabilities.
For the purposes of this rule, the following definitions apply:
(1) "Access," when used in this rule as a noun, means an opportunity to copy, view, or otherwise perceive.
(2) "Access," when used in this rule as a verb, means to copy, view, or otherwise perceive.
(3) "Computer system" means a "system," as defined in section 1347.01 of the Revised Code, that stores, maintains, or retrieves personal information using electronic data processing equipment.
(4) "Confidential personal information" has the same meaning as defined in division (A)(1) of section 1347.15 of the Revised Code and identified by rules promulgated by the department in accordance with division (B)(3) of section 1347.15 of the Revised Code that reference the federal or state statutes or administrative rules that make personal information maintained by the department confidential.
(5) "Department" means the Ohio department of developmental disabilities.
(6) "Employee" means each employee of the department regardless of whether he or she holds an elected or appointed office or position within the department.
(7) "Incidental contact" means contact with the information that is secondary or tangential to the primary purpose of the activity that resulted in the contact.
(8) "Individual" means a natural person or the natural person's authorized representative, legal counsel, legal custodian, or legal guardian.
(9) "Information owner" means the individual appointed in accordance with division (A) of section 1347.05 of the Revised Code to be directly responsible for a system.
(10) "Person" means a natural person.
(11) "Personal information" has the same meaning as defined in division (E) of section 1347.01 of the Revised Code.
(12) "Personal information system" means a "system" that "maintains" "personal information" as those terms are defined in section 1347.01 of the Revised Code. "System" includes manual and computer systems.
(13) "Research" means a methodical investigation into a subject.
(14) "Routine" means common place, regular, habitual, or ordinary.
(15) "System" has the same meaning as defined in division (F) of section 1347.01 of the Revised Code.
(16) "Upgrade" means a substantial redesign of an existing system for the purpose of providing a substantial amount of new application functionality, or application modifications that would involve substantial administrative or fiscal resources to implement, but would not include maintenance, minor updates and patches, or modifications that entail a limited addition of functionality due to changes in business or legal requirements.
(C) Criteria for accessing confidential personal information
Personal information systems of the department are managed on a "need-to-know" basis whereby the information owner determines the level of access required for an employee of the department to fulfill his or her job duties. The determination of access to confidential personal information shall be approved by the employee's supervisor and the information owner prior to providing the employee with access to confidential personal information within a personal information system. The department shall establish procedures for determining a revision to an employee's access to confidential personal information upon a change to that employee's job duties including, but not limited to, transfer or termination. Whenever an employee's job duties no longer require access to confidential personal information in a personal information system, the employee's access to confidential personal information shall be removed.
(D) Individual's request for a list of confidential personal information
Upon the signed written request of any individual for a list of confidential personal information about the individual maintained by the department, the department shall:
(1) Verify the identity of the individual by a method that provides safeguards commensurate with the risk associated with the confidential personal information.
(2) Provide to the individual the list of confidential personal information that does not relate to an investigation about the individual or is otherwise not excluded from the scope of Chapter 1347. of the Revised Code.
(3) If all information relates to an investigation about that individual, inform the individual that the department has no confidential personal information about the individual that is responsive to the individual's request.
(E) Notice of invalid access
(1) Upon discovery or notification that confidential personal information of a person has been accessed by an employee for an invalid reason, the department shall notify the person whose information was invalidly accessed as soon as practical and to the extent known at the time. However, the department shall delay notification for a period of time necessary to ensure that the notification would not delay or impede an investigation or jeopardize homeland or national security. Additionally, the department may delay the notification consistent with any measures necessary to determine the scope of the invalid access, including which individuals' confidential personal information was accessed invalidly, and to restore the reasonable integrity of the system. Once the department determines that notification would not delay or impede an investigation, the department shall disclose the access to confidential personal information made for an invalid reason to the person. "Investigation" as used in this paragraph means the investigation of the circumstances and involvement of an employee surrounding the invalid access of the confidential personal information.
(2) Notification provided by the department shall inform the person of the type of confidential personal information accessed and the date of the invalid access.
(3) Notification may be made by any method reasonably designed to accurately inform the person of the invalid access, including written, electronic, or telephone notice.
(F) Appointment of a data privacy point of contact and completion of a privacy impact assessment
(1) The director of the department shall designate an employee of the department to serve as the data privacy point of contact.
(2) The data privacy point of contact shall work with the chief privacy officer within the Ohio department of administrative services office of information technology to assist the department with both the implementation of privacy protections for the confidential personal information that the department maintains and compliance with section 1347.15 of the Revised Code and the rules adopted pursuant to the authority provided by that chapter.
(3) The data privacy point of contact shall timely complete the privacy impact assessment form developed by the Ohio department of administrative services office of information technology.
(G) Valid reasons for authorized employees to access confidential personal information
Performing the following functions constitutes valid reasons for authorized employees to access confidential personal information:
(1) Responding to a public records request.
(2) Responding to a request from an individual for the list of confidential personal information the department maintains on that individual.
(3) Administering a constitutional provision or duty.
(4) Administering a statutory provision or duty.
(5) Administering an administrative rule provision or duty.
(6) Complying with any state or federal program requirements.
(7) Processing or payment of claims or otherwise administering a program with individual participants or beneficiaries.
(8) Auditing purposes.
(9) Licensure, certification, and accreditation processes.
(10) Investigation or law enforcement purposes.
(11) Administrative hearings.
(12) Litigation, complying with an order of the court or subpoena.
(13) Human resources matters (e.g., hiring, promotion, demotion, discharge, salary/ compensation issues, leave requests/issues, timekeeping approvals/issues).
(14) Complying with an executive order or policy.
(15) Complying with a department policy or a state administrative policy issued by the Ohio department of administrative services, the office of budget and management, or other similar state agency.
(16) Complying with a collective bargaining agreement provision.
(17) Research in furtherance of agency-specific programs as permitted by statute.
(H) Regulations that make personal information confidential
The following regulations are the most widely applicable legal provisions that make personal information maintained by the department confidential. Other provisions may apply under particular circumstances.
(1) Division (D) of section 5101.46 of the Revised Code (social services plan pursuant to Title XX of the Social Security Act).
(2) Division (G) of section 5123.51 of the Revised Code (major unusual incident files and records).
(3) Division (T) of section 5123.62 of the Revised Code (rights of persons with a developmental disability).
(4) Section 5123.89 of the Revised Code (developmental center records).
(5) Section 5126.044 of the Revised Code (general confidentiality).
(6) 5 U.S.C. 552a as in effect on the effective date of this rule (social security numbers).
(7) 20 U.S.C. 1232g as in effect on the effective date of this rule (Family Educational Rights and Privacy Act statutes).
(8) 42 U.S.C. 1320d as in effect on the effective date of this rule (Health Insurance Portability and Accountability Act statutes).
(9) 42 U.S.C. 1396a (a)(5) as in effect on the effective date of this rule (medicaid records).
(10) 45 C.F.R. parts 160 to 164 as in effect on the effective date of this rule (Health Insurance Portability and Accountability Act rules).
(I) Personal information systems that are computer systems
For personal information systems that are computer systems and contain confidential personal information, the department shall:
(1) Restrict access to confidential personal information that is kept electronically by requiring a password or other authentication measure.
(2) When the department acquires a new computer system that stores, manages, or contains confidential personal information, include a mechanism for recording specific access by employees to confidential personal information in the system.
(3) When the department modifies an existing computer system that stores, manages, or contains confidential personal information, make a determination whether the modification constitutes an upgrade. Any upgrades to a computer system shall include a mechanism for recording specific access by department employees to confidential personal information in the system.
(J) Logging requirements
(1) The department shall require employees who access confidential personal information within computer systems to maintain a log that records that access. The department may choose the form or forms of logging, whether in electronic or paper formats.
(2) Access to confidential personal information is not required to be entered into the log under the following circumstances:
(a) The employee is accessing confidential personal information for official department purposes, including research, and the access is not directed toward a specifically named individual or a group of specifically named individuals.
(b) The employee is accessing confidential personal information for routine office procedures and the access is not directed toward a specifically named individual or a group of specifically named individuals.
(c) The employee comes into incidental contact with confidential personal information and the access of the information is not directed toward a specifically named individual or a group of specifically named individuals.
(d) The employee accesses confidential personal information about an individual based upon a request made by an individual requesting confidential personal information about himself/herself or the individual makes a request that the department take some action on that individual's behalf that requires accessing confidential personal information in order to process that request.
(3) The department shall issue a log management policy that specifies:
(a) Who shall maintain the log.
(b) What information shall be captured in the log.
(c) How the log is to be stored.
(d) How long information kept in the log is to be retained.
(4) Nothing in this rule limits the department from requiring logging in any circumstance that it deems necessary.
Last updated September 18, 2021 at 6:17 PM