HMIS (HOMELESS MANAGEMENT INFORMATION SYSTEM) SECURITY AWARENESS TRAINING Revised: 05/11/2016 Created By :

Slides:



Advertisements
Similar presentations
And the finer details of patient privacy TCH Confidential Understanding HIPAA.
Advertisements

HIPAA Basic Training for Privacy & Information Security Vanderbilt University Medical Center VUMC HIPAA Website:
Copyright Eastern PA EMS Council February 2003 Health Information Portability and Accountability Act It’s the law.
COBB/DOUGLAS COMMUNITY SERVICES BOARD Confidentiality and Privacy of Consumer Information.
HIPAA – Privacy Rule and Research USCRF Research Educational Series March 19, 2003.
Increasing public concern about loss of privacy Broad availability of information stored and exchanged in electronic format Concerns about genetic information.
The Health Insurance Portability and Accountability Act of 1996– charged the Department of Health and Human Services (DHHS) with creating health information.
Ethics, Confidentiality, and HIPAA! 2006 ASAC Drug Court Confidentiality FMJ Multi- County November 8, 2006.
HIPAA Health Insurance Portability and Accountability Act.
1 HIPAA Education CCAC Professional Development Training September 2006 CCAC Professional Development Training September 2006.
NAU HIPAA Awareness Training
1 Louisiana Department of Health and Hospitals Basic HIPAA Privacy Training: Policies and Procedures 01/09/
 The Health Insurance Portability and Accountability Act of  Federal Law designed to protect sensitive information.  HIPAA violations are enforced.
HIPAA THE PRIVACY RULE Reviewed December HISTORY In 2000, many patients that were newly diagnosed with depression received free samples of anti-
Are you ready for HIPPO??? Welcome to HIPAA
HIPAA HIPAA Health Insurance Portability and Accountability Act of 1996.
Professional Nursing Services.  Privacy and Security Training explains:  The requirements of the federal HIPAA/HITEC regulations, state privacy laws.
Protecting Client Data HIPAA, HITECH and PIPA Part 1A
HIPAA Training Presentation for New Employees How did we get here? HIPAA Police 1.
Health Insurance Portability and Accountability Act (HIPAA)
CREATED BY: HMIS Security Awareness Approved 1/10/2012 Revised 1/29/2013 Revised 3/15/2013.
Supportive Services for Veteran Families (SSVF) Data Bigger Picture Updated 5/22/14.
HIPAA What’s Said Here – Stays Here…. WHAT IS HIPAA  Health Insurance Portability and Accountability Act  Purpose is to protect clients (patients)
HIPAA Health Insurance Portability & Accountability Act of 1996.
Health Insurance Portability and Accountability Act (HIPAA)
HIPAA Basic Training for Privacy and Information Security Vanderbilt University Medical Center VUMC HIPAA Website: HIPAA Basic.
Paula Peyrani, MD Medical/Project Director, HIV Program at the 550 Clinic Assistant Director, Research Design and Development Clinical and Translational.
HIPAA PRIVACY AND SECURITY AWARENESS.
HIPAA Business Associates Leadership Group Meeting June 28, 2001.
1 Research & Accounting for Disclosures March 12, 2008 Leslie J. Pfeffer, BS, CHP Office of the Vice President for Research Administration Office of Compliance.
1 Disclosures © HIPAA Pros 2002 All rights reserved.
Confidentiality, Consents and Disclosure Recent Legal Changes and Current Issues Presented by Pam Beach, Attorney at Law.
Privacy and Security of Protected Health Information NorthPoint Health & Wellness Center 2011.
1 HIPAA OVERVIEW ETSU. 2 What is HIPAA? Health Insurance Portability and Accountability Act.
Copyright ©2011 by Pearson Education, Inc. Upper Saddle River, New Jersey All rights reserved. Health Information Technology and Management Richard.
How Hospitals Protect Your Health Information. Your Health Information Privacy Rights You can ask to see or get a copy of your medical record and other.
HIPAA Training Developed for Ridgeview Institute 2012 Hospital Wide Orientation.
© 2009 The McGraw-Hill Companies, Inc. All rights reserved. 1 McGraw-Hill Chapter 2 The HIPAA Privacy Standards HIPAA for Allied Health Careers.
Health Insurance Portability and Accountability Act of 1996 HIPAA Privacy Training for County Employees.
Understanding HIPAA (Health Insurandce Portability and Accountability Act)
© 2013 The McGraw-Hill Companies, Inc. All rights reserved. Ch 8 Privacy Law and HIPAA.
HIPAA THE PRIVACY RULE. 2 HISTORY In 2000, many patients that were newly diagnosed with depression received free samples of anti- depressant medications.
Rhonda Anderson, RHIA, President  …is a PROCESS, not a PROJECT 2.
A Road Map to Research at Jefferson: HIPAA Privacy and Security Rules for Researchers Presented By: Privacy Officer/Office of Legal Counsel October 2015.
1 Privacy Plan of Action © HIPAA Pros 2002 All rights reserved.
HIPAA Overview Why do we need a federal rule on privacy? Privacy is a fundamental right Privacy can be defined as the ability of the individual to determine.
HIPAA for Students Health Insurance Portability and Accountability Act.
HIPAA Training. What information is considered PHI (Protected Health Information)  Dates- Birthdays, Dates of Admission and Discharge, Date of Death.
Health Insurance Portability and Accountability Act (HIPAA) © 2013 Project Lead The Way, Inc.Principles of Biomedical Science.
Final HIPAA Privacy Rule: The Research Provisions Julie Kaneshiro DHHS Office for Human Research Protections Phone: Fax:
The Health Insurance Portability and Accountability Act (HIPAA) requires Plumas County to train all employees in covered departments about the County’s.
UC Riverside Health Training and Development
HMIS (Homeless Management Information System) Security Awareness Training Created By: Revised: 05/11/2016.
Developed for Ridgeview Institute 2015 Hospital Wide Orientation
HIPAA Privacy and Security
HIPAA PRIVACY & SECURITY TRAINING
HIPAA Privacy & Security
HMIS (Homeless Management Information System) Security Awareness Training Created By: Revised: 10/20/2017.
HMIS (Homeless Management Information System) Security Awareness Training Created By: Revised: 12/15/2017.
HIPAA Pros - Disclosures
Disability Services Agencies Briefing On HIPAA
HIPAA Privacy & Security
HIPAA Overview.
The Health Insurance Portability and Accountability Act
HIPAA & PHI TRAINING & AWARENESS
The Health Insurance Portability and Accountability Act
Office of the Vice President for Research Human Subjects Protection Program IRB Submission Process Module 4 - Health Insurance Portability and Accountability.
The Health Insurance Portability and Accountability Act
Presentation transcript:

HMIS (HOMELESS MANAGEMENT INFORMATION SYSTEM) SECURITY AWARENESS TRAINING Revised: 05/11/2016 Created By :

Overview  The purpose of this presentation is to emphasize the importance of security when using HMIS. Client information is confidential and should always be treated as such. This presentation provides an overview for the following topics:  HUD HMIS Data Standards  Basic Requirements  User Authentication/Access  Defining Security  Client Confidentiality  HIPPA Revised: 05/11/2016

HUD’s HMIS Data Standards  The purpose of the data standards are to “ensure that every HMIS captures the information necessary to fulfill HUD reporting requirements while protecting the privacy and informational security of all homeless individuals.”  The most recent version is August  You may access these data standards at: Revised: 05/11/2016

Basic Security Requirements  HMIS Users Need:  Unique username and password  Signed Electronic Security Awareness Agreement (digital copy in HMIS)  Security Awareness valid for 365 days  Each Computer/Network Needs:  A secure location  Anti-virus software  Individual or network firewall Revised: 05/11/2016

Username and Password  Every user accessing HMIS must have a unique username and password  A unique password includes:  At least 1 number  At least 1 lowercase letter  At least 1 capital letter  At least 6 characters long  At least 1 $pecial character  Good: [Na$car#39]  Bad: bobclark99  Ugly: hmis Revised: 05/11/2016

HMIS access  Users are assigned a role in the HMIS application. A role defines how much information and the type of information you can access. Your agency and the HMIS Manager will determine your role access.  HMIS is built to automatically log you out if there is inactivity beyond 15 minutes.  Log out of HMIS when away from the workstation  Do not share your login information with anyone Revised: 05/11/2016

Physical Access / Location  Secure workstations  (It your responsibility for good computer practices)  Lock offices  Place computer monitors away from others’ view  Use a privacy screen when necessary  Lock computer screens when away from the workstation (windows logo key + L) Revised: 05/11/2016

Uses of HMIS  HMIS should not be used for:  Personal gain  Bias opinions  Stalking  Sharing with others outside of service providers  Curiosity  HMIS should be used for:  Tracking enrollments/assessments  Referring clients  Creating case notes  Coordinating services for a client Revised: 05/11//2016

Defining Security  Security refers to the protection of clients’ personal protected information and sensitive program information from unauthorized access, disclosure, use, or modification. Revised: 05/11//2016

Client Confidentiality  Agencies and Individual Users of HMIS are required to comply with federal, state, and local confidentiality laws  Agencies and Users are required to comply with limits to data collection (relevant, appropriate, lawful)  Agencies are required to post sign at intake or comparable location with general reasons for information collection and reference to privacy policy  Agencies may infer consent for uses in the posted sign and written privacy policy Revised: 05/11/2016

Protecting Clients Privacy  Client information should only be shared/searched on a need-to-know basis.  Need-to-know:  1. The legitimate requirement of a person to access sensitive information that is critical to the performance of an authorized, assigned mission in connection with services to a client.  2. The necessity for access to specific information required to carry out official duties.  HMIS Team monitors individual HMIS use. User must be able to support access to client’s file.  Violations must be reported to the Security Manager, Haven for Hope HIPPA Officer, in some cases, to government agencies and the Client.  Violations may result in termination of use rights, disciplinary action, and in extreme cases, prosecution. Revised: 05/11//2016

Privacy and Security Laws Revised: 05/11/2016  Federal Health Insurance Portability and Accountability Act (HIPAA,1996)  Texas Medical Records Privacy Act (MRPA, 2012)  42 CFR Part 2 Confidentiality of Alcohol and Drug Abuse Patient Records (HHS)

WHAT IS HIPAA? Revised: 05/11//2016  The Health Insurance Portability and Accountability Act of 1996 (HIPAA)  The HIPAA Rules apply to “Covered Entities” and “Business Associates”.  Covered Entities include certain health care providers, health plans, and health care clearing houses.  Hospitals & Health Clinics  Some mental health & substance abuse treatment programs  A Business Associate is any person or entity that:  Performs an activity or function on behalf of a covered entity that involves Protected Health Information (PHI), OR  Provides legal, accounting, management, administrative, financial, or other services for a covered entity that involves PHI.

What Information Must Be Protected?  You must protect an individual’s Protected Health Information (PHI) which is collected or created as a consequence of providing care. These rules apply to you when you view, use, and share PHI.  PHI:  Is information related to a patient’s past, present or future physical and/or mental health condition  Can be in any form: written, spoken, or electronic  Includes at least one of the 18 identifiers: Revised: 05/11/2016

Protected Health Information (PHI) Identifiers Revised: 05/11/2016  The 18 Identifiers defined by HIPPA are:  Name  Postal Address  All elements of dates except year  Telephone number  address  URL address  IP address  Social Security number  Account numbers  License number  Medical record number  Health care beneficiary #  Device identifiers and their serial numbers  Vehicle identifiers & serial numbers  Biometric identifiers (finger & voice prints)  Full face photos & other comparable images  Any other unique identifying number, code, or characteristic

Disclosures of PHI May be disclosed:  With written consent, or  If required by court order, or  In a medical emergency, or  For research, audit, or program evaluation  To another health care provider for purposes of Treatment, Payment, or health care Operations (TPO) (e.g. to a partner, physician, or hospital) Revised: 05/11/2016

Disclosures of PHI Revised: 05/11/2016  To the client  In accordance with client’s written authorization  To a client’s legal representative or a family member involved in client care  To report child abuse or neglect, abuse of an adult, or domestic violence  Haven for Hope considers that other disclosure is non-routine and requires approval by the Haven for Hope HIPPA Officer

Keep in Mind  Use PHI only as necessary to perform your job duties  Use & disclose the minimum necessary to perform job duties  If you need to use or disclose PHI outside of routine uses/disclosures, please consult the Haven for Hope Attorney or Haven for Hope HIPPA Officer first Haven for Hope Attorney: Haven for Hope HIPPA Officer: Gene Ann Herrin Sam Samani Revised: 05/11/2016

Read & Sign Digital Copy AGENCY/ORGANIZATION NAME: ________________________________________________________________ LOCATION: ___________________________________________________________________________________ San Antonio Homeless Management Information System (HMIS) USER CONFIDENTIALITY AGREEMENT I understand that I will be allowed access to confidential information and/or records in order to perform my specific job duties. I further understand and agree that I am not to disclose such confidential information and/or records without the prior consent of the appropriate authority(s). I understand that all USERID/ Passwords to access the HMIS are issued on an individual basis. I further understand that I am solely responsible for all information obtained, through system access, using my unique identification. At no time will I allow any other person to use of my USERID/Password to logon to the HMIS. I understand that accessing or releasing confidential information and/or records, or causing confidential information and/or records to be accessed or released except as allowed in the HMIS Security Awareness training, outside the scope of my assigned job duties would constitute a violation of this agreement. I understand my supervisor will be notified immediately of any violation and disciplinary action will be taken, up to termination of employment. By affixing my signature to this document I acknowledge that I have been apprised of the relevant laws concerning access, use, maintenance and disclosure of confidential information and/or records available to me through my use of the HMIS. I further agree that it is my responsibility to assure the confidentiality of all information I access through use of HMIS, even after my access to HMIS has ended. Pursuant to this agreement I certify that I have read and understand the laws concerning confidential information and/or records and the HMIS Security Awareness Training materials. User Signature ____________________________ Date _________________ Job Title ______________________ Print User Name ___________________________ ______________________________________________ Revised: 05/11/2016