Scarinci Hollenbeck, LLC, LLCScarinci Hollenbeck, LLC, LLC

Firm Insights

What New Jersey Medical Providers Should Know About NJAAA

Author: Scarinci Hollenbeck, LLC

Date: September 22, 2017

Key Contacts

Back

What Medical Providers Should Know About Medical Records Breaches And NJAAA

Over 5 million data records are lost or stolen every day. Hackers are indiscriminate, targeting financial institutions, credit reporting agencies, law firms, and, of course, healthcare providers. In New Jersey, when a healthcare provider has its medical records stolen, the consequences extend beyond the familiar terrain of self-reporting; fines from federal and state agencies; and invasion of privacy lawsuits. New Jersey provides a statutory cause of action under the New Jersey AIDS Assistance Act (NJAAA), N.J.S.A. 26:5C-1 et seq.

What New Jersey Medical Providers Should Know About NJAAA
Photo courtesy of Maarten van den Heuvel (Unsplash.com)

What the NJAAA Protects

The NJAAA was enacted in 1984 and arose from the New Jersey Legislature’s declaration that “it is imperative” to create and implement programs “for diagnosing and treating persons who have been exposed to AIDS, referring AIDS victims and their families to sources of treatment and counseling, and providing an educational program to health care professionals to heighten their awareness of the latest diagnostic procedures and treatment.” N.J.S.A. § 26:5C-2. Aware that the effective diagnosis and treatment of AIDS demands confidentiality, the NJAAA contains strict confidentiality provisions, backed by a robust enforcement mechanism.

The NJAA protects from unauthorized disclosure any record “which contains identifying information about a person who has or is suspected of having AIDS or HIV infection.” N.J.S.A. § 26:5C-7. Such AIDS-related protected health information (“A-PHI”) must be confidentially maintained. Id. What constitutes a person “suspected of” having AIDS is undefined. Arguably, a generic questionnaire asking the patient to check off a box if he has AIDS or an HIV infection would trigger confidentiality obligations under the NJAAA.

The Act does not only apply to health care providers who maintain A-PHI, but also the New Jersey Department of Health; local health departments; laboratories; blood banks; third-party payors and, if that enumerated list isn’t exhaustive enough to capture the universe of A-PHI record keepers, the Act has a catch-all: “any other institution or person” who maintains A-PHI. Id. In addition, where A-PHI is lawfully disclosed to a third-party, that third-party becomes subject to the NJAAA. N.J.S.A. § 26:5C-11.

Private Right of Action for Violations

Unlike the Health Insurance Portability and Accountability Act, the NJAAA permits a private cause of action by any person aggrieved by the wrongful disclosure of A-PHI. Recovery may include “actual damages, equitable relief and reasonable attorney’s fees and court costs.” N.J.S.A. § 26:5C-14. In addition, “[p]unitive damages may be awarded when the violation evidences wantonly reckless or intentionally malicious conduct by the person or institution who committed the violation.” Id. Each disclosure is a separate and actionable offense.

While the Legislature did not include in the law a statute of limitations, a recent Appellate Division decision held that the two-year limitations period for personal injury actions applies. Smith v. Datla, 164 A.3d 1110 (App. Div. 2017). Keep in mind, however, that each disclosure is a separate and actionable offense. N.J.S.A. § 26:5C-14. Because hackers generally extract data over a period of time (sometimes over weeks or even months), identifying the date the plaintiff’s records were stolen may be critical in NJAAA litigation.

Why NJAAA Litigation May Explode in Coming Years

Despite being enacted over 30 years ago, there are few reported cases concerning the NJAAA. These cases generally involve a single patient bringing an NJAAA claim against a healthcare provider. Doe v. Div. of Youth & Family Servs., 148 F. Supp. 2d 462 (D.N.J. 2001)(plaintiff alleged hospital and doctors tested her blood for HIV without her consent and then disclosed the results to the Dep’t of Health and her family); C.W. v. Cooper Health Sys., 388 N.J. Super. 42 (App. Div. 2006)(where healthcare provider failed to notify patient of the results of his positive HIV test, court held provider was liable to patient’s sexual partner and their child who contracted the virus from the patient); Smith, 164 A.3d 1110 (finding NJAAA violation where doctor told plaintiff of his HIV status in the presence of a third-party).

Going forward, healthcare providers should expect that NJAAA litigation will involve thousands of plaintiffs, and be brought as a class action or be consolidated into a multicounty litigation. That is because today’s breaches are not merely confined to a doctor or nurse with loose lips or a penchant for leaving patient charts in publicly-accessible areas. Rather, today’s breaches involve the large-scale theft of electronic medical records, thereby impacting tens of thousands of patients. And because the NJAAA covers not only those with AIDS/HIV but also those “suspected of” having the virus—whatever that means—arguably every patient whose records were stolen could bring a NJAAA claim. Add up the actual damages, punitive damages (at least for those providers with primitive cyber security), and attorney fees (which are not available under common law theories, such as negligence and invasion of privacy), and the financial devastation becomes obvious. But even more importantly, healthcare providers face a steep climb in trying to regain the trust of their patients when it comes to their most sensitive health information.

The NJAAA seeks to create a safe, private environment in which patients and their healthcare providers can discuss the diagnosis and treatment of the AIDS virus. The burden for creating this environment falls upon the healthcare provider. In the digital era, that burden is heavier than ever and the consequences of failing are catastrophic for the healthcare provider and patient. To mitigate the consequences, healthcare providers should adopt and implement effective cybersecurity programs, as well as ensure that their insurance policies provide coverage for electronic data breaches.

Do you have any questions? Would you like to discuss the matter further? If so, please contact me, Roshan Shah, at 201-806-3364.

No Aspect of the advertisement has been approved by the Supreme Court. Results may vary depending on your particular facts and legal circumstances.

Scarinci Hollenbeck, LLC, LLC

Related Posts

See all
Failing to Comply With NJ Rent Control Exemption May Prove Costly post image

Failing to Comply With NJ Rent Control Exemption May Prove Costly

What Developers Need to Know About New Jersey’s Rent Control Exemption Law to Ensure Entitlement to Exemption for Newly Constructed Multi-family Housing.  A property owner in Jersey City is facing a $400 million federal class action lawsuit alleging that the landlord did not follow the procedural steps required to be eligible for exemption from local […]

Author: Patrick T. Conlon

Link to post with title - "Failing to Comply With NJ Rent Control Exemption May Prove Costly"
Crypto Securities Law: When Tokens Become Investment Contracts post image

Crypto Securities Law: When Tokens Become Investment Contracts

The application of traditional federal securities laws to crypto assets continues to evolve. In some cases, the Securities and Exchange Commission (SEC) considers tokens and other digital assets to be securities. This makes them subject to federal securities law, including the Securities Act of 1933 and the Securities Exchange Act of 1934. This classification has […]

Author: Bryce S. Robins

Link to post with title - "Crypto Securities Law: When Tokens Become Investment Contracts"
The Due Diligence Process for NY Condominiums and Cooperatives post image

The Due Diligence Process for NY Condominiums and Cooperatives

While the New York City real estate market can be extremely competitive, moving too quickly often backfires. Before purchasing a condominium or cooperative in New York City, it is important to do you homework. Purchasing property in NYC can involve a dizzying number of legal issues. These include condo and co-op rules, rent restrictions, and […]

Author: Jesse M. Dimitro

Link to post with title - "The Due Diligence Process for NY Condominiums and Cooperatives"
Smart Contract Legal Issues: Drafting Agreements for Blockchain post image

Smart Contract Legal Issues: Drafting Agreements for Blockchain

Smart contracts feature a unique blend of legal agreement and technical code. This innovation has the potential to reshape how business is conducted. At the same time, smart contract legal issues around enforceability, jurisdiction, identity, and compliance are common. The legal framework for these self-executing agreements is still evolving. What Are Smart Contracts? Smart contracts, […]

Author: Bryce S. Robins

Link to post with title - "Smart Contract Legal Issues: Drafting Agreements for Blockchain"
Are Stay Interviews the Key to Retaining Top Talent? post image

Are Stay Interviews the Key to Retaining Top Talent?

Retaining top talent continues to be one of the greatest challenges facing employers today. Even in an employer’s market, the loss of a key employee can disrupt operations and result in significant costs. While compensation plays a role, long-term retention often depends on workplace culture, communication, and employee engagement. One increasingly popular strategy for improving […]

Author: Angela A. Turiano

Link to post with title - "Are Stay Interviews the Key to Retaining Top Talent?"
Why Secured Transactions Are Important post image

Why Secured Transactions Are Important

Secured transactions form the backbone of a wide range of business dealings, including business loans, mortgages, and inventory financing. Because the stakes are often high and relatively minor oversights can have drastic consequences, lenders and borrowers should thoroughly understand how to form an enforceable security agreement that protects their legal rights. What Is a Secured […]

Author: Dan Brecher

Link to post with title - "Why Secured Transactions Are Important"

No Aspect of the advertisement has been approved by the Supreme Court. Results may vary depending on your particular facts and legal circumstances.

Sign up to get the latest from our attorneys!

Explore What Matters Most to You.

Consider subscribing to our Firm Insights mailing list by clicking the button below so you can keep up to date with the firm`s latest articles covering various legal topics.

Stay informed and inspired with the latest updates, insights, and events from Scarinci Hollenbeck. Our resource library provides valuable content across a range of categories to keep you connected and ahead of the curve.

Let`s get in touch!

* The use of the Internet or this form for communication with the firm or any individual member of the firm does not establish an attorney-client relationship. Confidential or time-sensitive information should not be sent through this form. By providing a telephone number and submitting this form you are consenting to be contacted by SMS text message. Message & data rates may apply. Message frequency may vary. You can reply STOP to opt-out of further messaging.

Sign up to get the latest from the Scarinci Hollenbeck, LLC attorneys!