Legal, Regulations, Investigations, and Compliance Chapter 9 Part 2 Pages 1006 to 1022.

Slides:



Advertisements
Similar presentations
IT Security Policy Framework
Advertisements

Health Insurance Portability and Accountability Act HIPAA Education for Volunteers and Students.
Copyright Eastern PA EMS Council February 2003 Health Information Portability and Accountability Act It’s the law.
What is HIPAA? This presentation was created by The University of Arizona Privacy Office, The Office for the Responsible Conduct of Research on March 5,
Privacy Laws & Higher Education. Agenda 1.Five Privacy Laws a.FERPA b.HIPAA c.GLB d.FACTA Disposal Rule e.CAN-SPAM 2.Overview of the Laws a.What does.
NAU HIPAA Awareness Training
1 Louisiana Department of Health and Hospitals Basic HIPAA Privacy Training: Policies and Procedures 01/09/
© 2014 ACA International. All Rights Reserved. Obtaining Optimum Compliance Performance Foundational Training on ACA’s Professional Practices Management.
ITEC 6324 Health Insurance Portability and Accountability (HIPAA) Act of 1996 Instructor: Dr. E. Crowley Name: Victor Wong Date: 2 Sept
HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT OF 1996 (HIPAA)
© 2011 The McGraw-Hill Companies, Inc. All rights reserved. 2.5 HIPAA Legislation and its Impact on Physician Practices 2-15 The Health Insurance Portability.
COMPLYING WITH HIPAA PRIVACY RULES Presented by: Larry Grudzien, Attorney at Law.
HIPAA THE PRIVACY RULE Reviewed December HISTORY In 2000, many patients that were newly diagnosed with depression received free samples of anti-
Are you ready for HIPPO??? Welcome to HIPAA
HIPAA HIPAA Health Insurance Portability and Accountability Act of 1996.
4.00 Understand promotion and intermediate uses of marketing-information Acquire foundational knowledge of marketing-information management to.
Springfield Technical Community College Security Awareness Training.
The Financial Modernization Act of 1999, also known as the Gramm-Leach-Bliley Act (GLBA) UNDERSTANDING AND DEVELOPING A STRATEGIC PLAN TO BECOME COMPLIANT.
The New Rules of F&I with Peter Jones The New Rules of F&I What are the Rules? Red Flag Rule Graham / Leach / Bliley Act Privacy Notice Safeguard Rule.
RMG:Red Flags Rule 1 Regal Medical Group Red Flags Rule Identify Theft Training.
Information & Communication Technologies NMSU All About Discovery! Risk-Based Information Security Program at NMSU presented by Norma Grijalva.
REGULATIONS Dr. Andy Wu BCIS 4630 Fundamentals of IT Security.
Brief Synopsis of Computer Security Standards. Tenets of Information Systems Security Confidentiality Integrity Availability Over the years, standards.
E-Commerce: Legal and Practical Issues Legal Issues: Security – December 2, 2005 Stephen M. Foxman Philadelphia.
Insights on the Legal Landscape for Data Privacy in Higher Education Rodney Petersen, J.D. Government Relations Officer and Security Task Force Coordinator.
New Faculty Orientation to Privacy and Security at UF Susan Blair, Chief Privacy Officer Kathy Bergsma, Information Security.
Chapter 9 Information Systems Controls for System Reliability— Part 2: Confidentiality and Privacy Copyright © 2012 Pearson Education, Inc. publishing.
HIPAA – Health Insurance Portability & Accountability Act and the Privacy Act MSgt Nechele M. Chambers Senior Enlisted Liaison TRICARE Area Office-Europe.
Banks and the Privacy of Medical Information 8 th National HIPAA Summit March 8, 2004 Joy Pritts, JD Health Policy Institute Georgetown University
© 2009 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill Career Education Computers in the Medical Office Chapter 2: Information Technology.
Managing Risk in Cloud Computing Contracts Henry Ward and Todd Taylor April 30, 2015.
© 2009 The McGraw-Hill Companies, Inc. All rights reserved. 1 McGraw-Hill Chapter 5 HIPAA Enforcement HIPAA for Allied Health Careers.
Electronic Records Management: What Management Needs to Know May 2009.
HIPAA PRIVACY AND SECURITY AWARENESS.
“ Technology Working For People” Intro to HIPAA and Small Practice Implementation.
Privacy and Security of Protected Health Information NorthPoint Health & Wellness Center 2011.
Privacy and Security Laws for Health Care Organizations Presented by Robert J. Scott Scott & Scott, LLP
CORPORATE COMPLIANCE PROGRAM The Office of Corporate Integrity
Florida Information Protection Act of 2014 (FIPA).
HIPAA Michigan Cancer Registrars Association 2005 Annual Educational Conference Sandy Routhier.
Information Security Governance and Risk Chapter 2 Part 3 Pages 100 to 141.
Medical Law and Ethics, Third Edition Bonnie F. Fremgen Copyright ©2009 by Pearson Education, Inc. Upper Saddle River, New Jersey All rights reserved.
Health Insurance Portability and Accountability Act (HIPAA) CCAC.
Health Insurance Portability and Accountability Act of 1996 HIPAA Privacy Training for County Employees.
Understanding HIPAA (Health Insurandce Portability and Accountability Act)
© 2013 The McGraw-Hill Companies, Inc. All rights reserved. Ch 8 Privacy Law and HIPAA.
HIPAA THE PRIVACY RULE. 2 HISTORY In 2000, many patients that were newly diagnosed with depression received free samples of anti- depressant medications.
IT Security Policy Framework ● Policies ● Standards ● Procedures ● Guidelines.
Copyright ©2014 by Saunders, an imprint of Elsevier Inc. All rights reserved 1 Chapter 02 Compliance, Privacy, Fraud, and Abuse in Insurance Billing Insurance.
Compliance August 18, Agenda Outline Status Draft of Answers.
Welcome….!!! CORPORATE COMPLIANCE PROGRAM Presented by The Office of Corporate Integrity 1.
Data Security & Privacy: Fundamental Risk Mitigation Tactics 360° of IT Compliance Anthony Perkins, Shareholder Business Law Practice Group Data Security.
Legal framework Look at the legal compliance and framework a business is subject to.
Chapter 4: Laws, Regulations, and Compliance
Copyright © 2012, Big I Advantage®, Inc., and Swiss Re Corporate Solutions. All rights reserved. (Ed. 08/12 -1) E&O RISK MANAGEMENT: MEETING THE CHALLENGE.
The Health Insurance Portability and Accountability Act (HIPAA) requires Plumas County to train all employees in covered departments about the County’s.
HIPAA Privacy & Security
What is HIPAA? HIPAA stands for “Health Insurance Portability & Accountability Act” It was an Act of Congress passed into law in HEALTH INSURANCE.
HIPAA CONFIDENTIALITY
Regulatory Compliance
Florida Information Protection Act of 2014 (FIPA)
E&O Risk Management: Meeting the Challenge of Change
Florida Information Protection Act of 2014 (FIPA)
Presented by Harry A. Strausser III Collections Industry Consultant
Red Flags Rule An Introduction County College of Morris
Disability Services Agencies Briefing On HIPAA
Employee Privacy and Privacy of Employee Information
HIPAA Privacy & Security
Presentation transcript:

Legal, Regulations, Investigations, and Compliance Chapter 9 Part 2 Pages 1006 to 1022

Privacy Privacy is threatened by technology Data collection, storage, and mining Globalization

Personal Identifiable Information (PII) Uniquely identify, contact, or locate a single person Used in identity theft and financial crimes U.S. Office of Budget and Management – List on page 1007 May require protection from improper disclosure – List on page 1007

Federal Privacy Act of 1974 Data collected by government agencies must be done in a fair and lawful manner, used for the purpose it was collected, and held only for a reasonable amount of time.

Chief Privacy Officer Created by many organizations to deal with privacy issues Lawyer

SOX Sarbanes-Oxley The Public Company Accounting Reform and Investor Protection Act of 2002 U.S. Publicly traded company How companies must track, manage and report on financial information.

Privacy Laws In 30 states “As a security professional, you should understand the types of privacy laws your organization deals with and help to ensure that it is meeting all of its legal and regulation requirements pertaining to this type of data.”

Laws and Regulations You are not a lawyer – Get help from legal department Non-compliance – Fines, going out of business, executive in jail

HIPAA Health Insurance Portability and Accountability Act National standards and procedures for the storage, use, and transmission of personal medical and heath care data. Steep federal penalties for non-compliance.

GLBA Gramm-Leach-Bliley of 1999 Financial institutions Financial Privacy Rule – Privacy notice, allow customers to opt out of sharing information with 3 rd parties Board of Directors is responsible for security issues

GLBA Safeguard Rule – Written security plan – Protect clients non-public personal information

Computer Fraud and Abuse Act Federal antihacking statue Protect federal computers Protect illegal access – Fraud and theft – Modification of medical information

PCI DSS Payment Card Industry Data Security Standard Applies to any entity that processes, transmits, stores, or accepts credit card information Industry standard, not a law

FISMA Federal Information Security Management Act Federal agencies must have security programs

Employee Privacy If the state allows it, a company can monitor employees keyboards, s, conversations with customers Must inform employees Employees should sign a document describing the monitoring and reasonable expectation of behavior (REP = Reasonable Expectation of Privacy document)