Ensure Your Patients Are Not Charged For Forensic-Medical Exams, Including Forensic Photos

0
977

By Ward Allen, Forensic Digital Imaging Consultant,
Diana Faugno, MSN, RN, CPN, SANE-A, SANE-P, DF-IAFN, FAAFS,
Val Sievers MSN, RN, CNS, SANE-A, SANE-P,
Brijida Rodarte, Deputy District Attorney of Riverside, California and member of the Sexual Assault & Child Abuse Team.

It is a difficult part of the process of serving an abused child: documenting the evidence of abuse to ensure justice for a child. That’s why the NCA’s latest edition of the “Standards for Accredited Members” mandate that to achieve this high level of practice in serving children, Children’s Advocacy Centers (CACs) must collect “diagnostic-quality photographic documentation” of exam findings, and protect, store, and release these images in a secure, sensitive way. *1

Here are a few common questions and their answers informed by our years of working with CACs to implement our photo documentation systems.

How can I ensure my images are “diagnostic-quality?”

How can you meet this all-important definition, take diagnostic-quality photos, and select a photo documentation system that empowers a CAC to build a solid body of evidence and achieve justice for kids? We have developed some tips for CACs on how to ensure their evidentiary imaging is up to the Standards—and stands up in court.

1. Know how to tell a good photo from a bad photo.

First, make sure the image shown is at 100% (1 screen pixel to 1 image pixel also shown as “original size”) and not scaled down to your screen’s resolution on your secure evidence computer. This is the only way to evaluate the quality of the image. (Most basic Windows computers offer a photo-viewing program, a free tool that allows you to view your image at 100% size). Now, look at the photo and ask yourself these questions:

a. Does the image represent the subject matter?
b. Is the image clear and in focus?
c. Is the image properly exposed, not too light or too dark?
d. Is the image straight and aligned, not twisted and/or skewed? *2

If the answer is “Yes” to all of these, then your images are diagnostic-quality and the photo documentation system is capable of delivering the image quality you need. If not, it may be time to examine your practices or find a new photo documentation system.

2. Determine whether your existing or prospective system is easy to use.

Medical personnel are obviously patient-centered, so it is important that you can easily pick up a photo documentation system and capture diagnostic quality pictures, quickly and effectively. It needs to be compact, portable, and easy to operate.

3. Think about a situation when you bring a JPG to court.

What will happen if the defense team questions the photo’s validity? Think of any way the defense team might challenge your images and get them thrown out of court. Proving in court that a JPG has not been manipulated requires a review of the Federal Rules of Evidence, Article X, Contents of Writings, Recordings, and Photographs Rule 1003, Admissibility of Duplicates. It states, “A duplicate is admissible to the same extent as the original unless a genuine question is raised about the original’s authenticity or the circumstances make it unfair to admit the duplicate.”*3

4. Ensure your CAC has saved a RAW file for each JPG captured.

If the defense attorney or their expert witness mathematically proves that your JPG is not original—and they can—the court may determine it unfair to admit the duplicate JPG image, so be sure you are ready with that RAW file. Smart defense attorneys know this, and may use this argument to have evidence ruled out.

Some may wonder what the differences are between a RAW file, a JPG file and their role in forensic photo documentation. Simply, a RAW file is a digital negative, a data file format, not an image file format. RAW data cannot be manipulated in any way, shape, or form because it is technically not an image. RAW files also hold metadata. Metadata passed along to the JPG image file format includes date, time and camera-setting details. Digital cameras create JPG’s from RAW data inside digital cameras. JPG files can be easily changed and manipulated via image management software, whereas RAW files cannot. In order for you to create a RAW file, you should use a DSLR high-resolution camera. See here for more information.

Who pays for the photos and video captured during a forensic medical exam?

If your state accepts STOP Grant Funds*4 and every state in the nation does*5, then “the state or territory or another governmental entity incurs the full out-of-pocket cost of forensic medical exams for victims of sexual assault.” *6 NOTE: The target of the STOP Program is adult and youth victims. “A person who is 11 to 24 years old” defines a youth.

Title 34 U.S.C. 10449 *7, reads as follows: “A State, Indian tribal government, or unit of local government shall not be entitled to funds under this subchapter 1 unless the State, Indian tribal government, unit of local government, or another governmental entity- (A) Incurs the full out-of-pocket cost of forensic medical exams…

NOTE: Title 34 U.S.C. 10449, Sub-section (A), above, is not limited by a person’s age. That means that under Title 34 U.S.C. 10449, all living victims of sexual assault are covered.

The Federal Department of Justice, under 28 CFR, Part 90 – Violence Against Woman, Subpart A – General Provisions, Section 90.2 – Definitions *8, is clear on this subject and states the following:
(a) In addition to the definitions in this section, the definitions in 42 U.S.C. 13925
(b) apply to all grants awarded by the Office on Violence Against Women and all subgrants made under such awards.
(c) The term ‘‘forensic medical examination’’ means an examination provided to a victim of sexual assault by medical personnel to gather evidence of a sexual assault in a manner suitable for use in a court of law.

Charging or billing a patient for a forensic medical exam could lead to the loss of DOJ federal funding for your entire state.

The updated October 2017 “FAQs About STOP Formula Grants” *9 published by the United States Department of Justice, Office on Violence Against Women repeats the definition and the specific purpose of a forensic medical examination. To see how to be reimbursed for forensic exams *10,

Click the link and scroll to your state.

Are the photos and video captured during a forensic exam, forensic evidence or part of the medical record?

If photography and video capture is part of the forensic exam offered, then the state pays for it and the photos and video are forensic evidence and part of the forensic record. If your organization, through a state law, a policy or a protocol, normally captures ano-genital photographs/videos of children as part of your everyday medical practice and your organization charges that patient, their health care insurance and/or your organization processes the cost of capturing those photographs/videos through a “health care clearinghouse” *11, then the photos and related video are medical.

How long do we need to keep our photos?

If the photos you captured during the forensic exam were paid for by the state, then State Criminal Statutes of Limitations apply. See “State Criminal Statutes of Limitations in Sexual Abuse Crimes” *12.  Any case could go Federal. If it does, then “any time without limitation” *13.

If medical photos were captured during a forensic exam, as described above see, State Medical Record Laws. *14

Either way, photos and video captured during an exam must have a secure, sustainable and backed-up storage system to protect the photos and videos.

How can we securely store our photos?

Do not store forensic evidence in a medical record. Medical Break Glass Policy is not compatible with a Legal Chain of Custody. See the seven-minute video on this
specific subject.

Hacking is indeed a big concern with all the data “out there” and rightfully so. In May of 2017, it was globally reported that 150 countries had been hacked. Here in the U.S., the HHS Breach Portal reported over 4.5 million medical record breaches in 2017. Between January 1st, 2018 and April 25th, 2018, there were over 1.7 million breaches. Both reports only include breaches affecting 500 or more individuals.

Also refer to the Ponemon Institute’s Sixth Annual Benchmark Study on Privacy & Security of Healthcare Data*15. They report healthcare-related breaches constituted $6.2B in cost. According to identity fraud experts, more than 140 million individuals in the United States—roughly 50% of the population—have had their healthcare records lost, breached or stolen. In 2015, IBM noted that healthcare had the highest rate of data breaches compared to any other industry.

The safest and easiest way for you to protect your forensic evidence, including pictures and video—paid for and belonging to the state—is to sequester your forensic photos and video away from medical records. Ensure that nested, end-end encryption is used, such as the 256-Bit Advanced Encryption Standard, when you store and release photos.

Beware of the Cloud

Store encrypted storage volumes on your own network and on your own network computer—not in the cloud or on a desktop computer. Neither are a safe place. Cloud storage, like real clouds, drifts and moves like the wind. Like real clouds in the sky, computer clouds can dissipate or merge with other clouds that are located in other countries who do not have the same data protection laws we do. Using cloud-computing means that you do not have control of your data. More important, if you miss a cloud storage payment, you may lose all of your data. *16

When you use cloud services, like most cellphone and tablet apps do, the service and the app usually requires your authorization to collect data, including personal data, usage data, patient data and your photographs. Do NOT Do It!

Always read your user agreements!

Make sure you know what you are getting into by storing your data with these services. Many cloud services and apps that utilize secure mobile colposcopes, iPads, iPhones, Android, secure storage on major data providers, require user agreement terms that are untenable for CACs. Before you sign up for a service, take the time to read the language and determine whether you are really willing or able to abide by the terms offered. Below are samples of text from real consent agreements for “secure” cellphone based colposcopes—with language that may make it impossible to keep your data secure, sequestered, and accessible. “YOU AGREE TO THE TERMS AND CONDITIONS SET FORTH IN THIS PRIVACY POLICY, INCLUDING TO THE POSSIBLE COLLECTION AND PROCESSING, MONITORING, STORING AND SHARING OF THE INFORMATION […]”

“Each Session may include the Clinician’s name, the patient’s ID (actual or made-up), the clinical image, image date, Clinician’s diagnosis, general geolocation of Clinician’s mobile device […]”

“[…] may transfer and disclose Non-personal Information to third parties at its sole discretion and without restriction.”

“[…] we cannot guarantee that unauthorized access or use will never occur[…]”

“Cancelling your Account may cause inability to access your Account and/or the loss of certain information (including, without limitation, the Sessions and/or clinical images or any Personal Information).”

“We may transfer information collected about you, including Personal Information, to affiliated entities, or to other third-party service provides[…]across borders.[…]you consent to such transfer of information.”

Take the steps to ensure that your patients are not charged for forensic-medical exams and use the information here along with the references below to protect the forensic evidence that is gathered on behalf of your patients.

Reference Links: (All links were current and working as of April 25th, 2018)
*1 http://www.nationalchildrensalliance.org/ncas-standards-accredited-members
*2 https://www.ncbi.nlm.nih.gov/pubmed/22123038
*3 http://www.uscourts.gov/sites/default/files/evidence-rules-procedure-dec2017_0.pdf
*4 https://www.justice.gov/ovw/page/file/967326/download
*5 https://www.justice.gov/ovw/awards/fy-2017-ovw-grant-awards-by-state
*6 https://www.justice.gov/ovw/page/file/1008816/download
*7 http://uscode.house.gov
*8 https://www.gpo.gov/fdsys/search/pagedetails.action?collectionCode=CFR&searchPath=Title+28%2F Chapter+I%2FPart+90%2FSubpart+A&granuleId=CFR-2012-title28-vol2-sec115-21&packageId=CFR-2012-title28-vol2&oldPath=Title+28%2FChapter+I%2FPart+90&fromPageDetails=true&collapse=true&ycord=3769
*9 https://www.justice.gov/ovw/page/file/1008816/download
*10 http://www.sdfi.com/Exams.asp
*11 http://www.sdfi.com/downloads/Forensic_Exams_and_HIPAA.pdf
*12 http://www.sdfi.com/Statutes.asp
*13 https://www.gpo.gov/fdsys/search/pagedetails.action?collectionCode=USCODE&browsePath=Title+18%2FPart+II%2FChapter+213%2FSec.+3299&granuleId=USCODE-2015-title18-partII-chap213-sec3299&packageId=USCODE-2015-title18&collapse=true&fromBrowse=true
*14 https://www.healthit.gov/sites/default/files/appa7-1.pdf
*15 https://www.ponemon.org/blog/sixth-annual-benchmark-study-on-privacy-security-of-healthcaredata-1
*16 https://downloads.cloudsecurityalliance.org/assets/research/top-threats/Treacherous-12_Cloud-Computing_Top-Threats.pdf