2015 Privacy & Security Refresher. Presenters  Dana Williams  Privacy Officer  (501) 202-6776  Stephen Yarberry  Chief Information Security Officer.

Slides:



Advertisements
Similar presentations
HIPAA Privacy Practices. Notice A copy of the current DMH Notice must be posted at each service site where persons seeking DMH services will be able to.
Advertisements

Privacy and Information Security Training ( ) VUMC Privacy Website
1. As a Florida KidCare community partner families entrust you to not only help them navigate the Florida KidCare system but to keep the information they.
HIPAA Privacy Training. 2 HIPAA Background Health Insurance Portability and Accountability Act of 1996 Copyright 2010 MHM Resources LLC.
Health Insurance Portability and Accountability Act HIPAA Education for Volunteers and Students.
HIPAA. What Why Who How When What Is HIPAA? Health Insurance Portability & Accountability Act of 1996.
HIPAA Basic Training for Privacy & Information Security Vanderbilt University Medical Center VUMC HIPAA Website:
Confidentiality and HIPAA
COBB/DOUGLAS COMMUNITY SERVICES BOARD Confidentiality and Privacy of Consumer Information.
National Health Information Privacy and Security Week Understanding the HIPAA Privacy and Security Rule.
Increasing public concern about loss of privacy Broad availability of information stored and exchanged in electronic format Concerns about genetic information.
The Health Insurance Portability and Accountability Act of 1996– charged the Department of Health and Human Services (DHHS) with creating health information.
HIPAA What’s New? What Is HIPAA Health Insurance Portability and Accountability Act of 1996 Health Insurance Portability and Accountability Act.
Changes to HIPAA (as they pertain to records management) Health Information Technology for Economic Clinical Health Act (HITECH) – federal regulation included.
What is HIPAA? This presentation was created by The University of Arizona Privacy Office, The Office for the Responsible Conduct of Research on March 5,
1 HIPAA Education CCAC Professional Development Training September 2006 CCAC Professional Development Training September 2006.
NAU HIPAA Awareness Training
1 Louisiana Department of Health and Hospitals Basic HIPAA Privacy Training: Policies and Procedures 01/09/
Before reviewing the following presentation click on the links below and print off the documents: NAM-43 The Bair Foundation HIPAA Policy NAM- 89 HIPAA.
Topics Rule Changes Skagit County, WA HIPAA Magic Bullet HIPAA Culture of Compliance Foundation to HIPAA Privacy and Security Compliance Security Officer.
HIPAA Regulations What do you need to know?.
COMPLYING WITH HIPAA PRIVACY RULES Presented by: Larry Grudzien, Attorney at Law.
Health Insurance Portability & Accountability Act “HIPAA” To every patient, every time, we will provide the care that we would want for our own loved ones.
2014 HIPAA Refresher Omnibus Rule & HIPAA Security.
Jill Moore April 2013 HIPAA Update: New Rules, New Challenges.
Are you ready for HIPPO??? Welcome to HIPAA
Professional Nursing Services.  Privacy and Security Training explains:  The requirements of the federal HIPAA/HITEC regulations, state privacy laws.
Privacy, Security and Compliance Concerns for Management and Boards November 15, 2013 Carolyn Heyman-Layne, Esq. 1.
Copyright © 2014 Merck Sharp & Dohme Corp., a subsidiary of Merck & Co., Inc. All rights reserved. In practice, how do we recognize a potential Privacy.
© Copyright 2014 Saul Ewing LLP The Coalition for Academic Scientific Computation HIPAA Legal Framework and Breach Analysis Presented by: Bruce D. Armon,
Version 6.0 Approved by HIPAA Implementation Team April 14, HIPAA Learning Module The following is an educational Powerpoint presentation on the.
HIPAA COMPLIANCE IN YOUR PRACTICE MARIBEL VALENTIN, ESQUIRE.
HIPAA Basic Training for Privacy and Information Security Vanderbilt University Medical Center VUMC HIPAA Website: HIPAA Basic.
Columbia University Medical Center Health Insurance Portability and Accountability Act of 1996 (“HIPAA”) Privacy & Information Security Training 2009.
HIPAA PRIVACY AND SECURITY AWARENESS.
“ Technology Working For People” Intro to HIPAA and Small Practice Implementation.
HIPAA Training Developed for Ridgeview Institute 2012 Hospital Wide Orientation.
HIPAA Michigan Cancer Registrars Association 2005 Annual Educational Conference Sandy Routhier.
© 2009 The McGraw-Hill Companies, Inc. All rights reserved. 1 McGraw-Hill Chapter 2 The HIPAA Privacy Standards HIPAA for Allied Health Careers.
Copyright © 2009 by The McGraw-Hill Companies, Inc. All Rights Reserved. McGraw-Hill Chapter 6 The Privacy and Security of Electronic Health Information.
Health Insurance Portability and Accountability Act of 1996 HIPAA Privacy Training for County Employees.
Mr. Fleming.  Law passed by Congress in  Right to Privacy ◦ Medical information of patient can only be shared with doctor and professionals administering.
HIPAA BASIC TRAINING Presented by Anderson Health Information Systems, Inc.
Copyright ©2014 by Saunders, an imprint of Elsevier Inc. All rights reserved 1 Chapter 02 Compliance, Privacy, Fraud, and Abuse in Insurance Billing Insurance.
HIPAA Health Insurance Portability and Accountability Act of 1996.
A Road Map to Research at Jefferson: HIPAA Privacy and Security Rules for Researchers Presented By: Privacy Officer/Office of Legal Counsel October 2015.
1 Privacy Plan of Action © HIPAA Pros 2002 All rights reserved.
Top 10 Series Changes to HIPAA Devon Bernard AOPA Reimbursement Services Coordinator.
HIPAA Overview Why do we need a federal rule on privacy? Privacy is a fundamental right Privacy can be defined as the ability of the individual to determine.
AND CE-Prof, Inc. January 28, 2011 The Greater Chicago Dental Academy 1 Copyright CE-Prof, Inc
HIPAA TRIVIA Do you know HIPAA?. HIPAA was created by?  The Affordable Care Act  Health Insurance companies  United States Congress  United States.
An Introduction to Compliance and HIPAA Privacy RVHIMA Spring 2016 Meeting Joshua A. Lenavitt, MHA Regional Director of Compliance and Privacy Baptist.
HIPAA Training. What information is considered PHI (Protected Health Information)  Dates- Birthdays, Dates of Admission and Discharge, Date of Death.
The Medical College of Georgia HIPAA Privacy Rule Orientation.
New Hire HIPAA Orientation. HIPAA Overview HIPAA is an acronym that stands for the Health Insurance Portability and Accountability Act of HIPAA.
HIPAA: So You Think You’re Compliant September 1, 2011 Carolyn Heyman-Layne, J.D.
Health Insurance Portability and Accountability Act (HIPAA) Primer for Observers, Volunteers, Medical Students Dr. Michael Palumbo- Privacy Officer/ EVP.
Developed for Ridgeview Institute 2015 Hospital Wide Orientation
Privacy & Security Inservice Protected Health Information, Personal Electronic Devices & Social Media.
HIPAA PRIVACY & SECURITY TRAINING
HIPAA Privacy & Security
Health Insurance Portability and Accountability Act of 1996 (HIPAA)
HIPAA PRIVACY AWARENESS, COMPLIANCE and ENFORCEMENT
Disability Services Agencies Briefing On HIPAA
HIPAA Privacy and Security Summit 2018 HIPAA Privacy Rule: Compliance Plans, Training, Internal Audits and Patient Rights Widener University Delaware.
HIPAA Privacy & Security
HIPAA SECURITY RULE Copyright © 2008, 2006, 2004 by Saunders an imprint of Elsevier Inc. All rights reserved.
Move this to online module slides 11-56
HIPAA Do’s and Don'ts: What is Really Behind Protected Health Information (PHI) and Health Care Privacy Rules Paul Sisler, Director, Information Services;
Presentation transcript:

2015 Privacy & Security Refresher

Presenters  Dana Williams  Privacy Officer  (501)  Stephen Yarberry  Chief Information Security Officer  (501)

Definitions  HIPAA  Health Insurance Portability and Accountability Act of 1996  HITECH  Health Information Technology for Economic and Clinical Health  PHI  Protected health information  IIHI  Individually identifiable health information “If you can identify, HIPAA applies!”

Notice of Privacy Practices  Core document that informs patients about HIPAA  Given at first admission  Posted on website  Patients can request an additional copy

Patient Rights  Receive Notice of Privacy Practices  Opt out of facility directory (confidential)  Inspect and obtain a copy  Request restriction  Receive confidential communication  Request an amendment  Accounting of disclosures  Receive breach notification  Right to file a complaint

Patient Awareness

Use and Disclosure  Treatment  Payment  Healthcare operations  Required by law  Authorized by the patient  Any use/access or disclosure outside of this is a violation  Remember your role!!!

Interested vs Involved Chicken  Interested in patient’s condition and/or prognosis  “Concerned”  No real commitment Pig  Involved in patient’s care prior to arrival, discharge plan, etc  “Committed”  Does not have to be a family member Unless the patient objects……

Personal Electronic Devices & Social Media  HR policy V-45 recently updated  Social Media Violation Examples  Patients posts negative information about ER visit on FB. Employee sends patient a “message” to dispute posting.  L&D employee posts pics to FB and tags her friend/our patient.  Students take video of patients/visitors walking in hallway (from the neck down) and posts to social media

Violation Examples  Fax to wrong #, fax with no cover sheet  Discharge instructions (AVS) to wrong patient  RX to wrong patient  Second letter/form included in patient’s  Letters/envelopes mixed up  Schedule/work list lost (left in bathroom)  Employee accesses family/friend record  sent without Safe!

Breach Notification  Required to provide notification following a breach of unsecured PHI  Must notify patient in writing within 60 days of discovery of the breach  If breach involves more than 500 people, media must be notified  All breaches must be reported to OCR annually

Disciplinary Action  Not eligible for verbal counseling  Written counseling  Written warning  Suspension  Termination  Employees terminated for privacy violations are NOT eligible for rehire and will NOT be issued an external ID

Discipline Policy OLD  Written Counseling  Accident  Written Warning  Deliberate NEW  Written Counseling  No breach notify  Written Warning  Breach notify

Office for Civil Rights  Enforces  HIPAA Privacy Rule  HIPAA Security Rule  HIPAA Breach Notification Rule  Was historically complaint driven  Moving to a new era of proactive auditing  Able to leverage fines  Maintains webpage of all breaches affecting 500 or more individuals  eport.jsf

Office for Civil Rights cont’d  Maintains webpage of all breaches affecting 500 or more individuals   University of Arkansas for Medical Sciences,10/18/2010, Theft Other Portable Electronic Device  Health Resources of Arkansas, 08/05/2013, Theft Laptop  Health Resources of Arkansas, 5/23/2013, Theft, Unauthorized Access/Disclosure Other  Health Advantage, 12/20/2012, Other Paper/Films  University of Arkansas for Medical Sciences, 4/20/2012, Unauthorized Access/Disclosure Other  Conway Regional Medical Center, 10/21/2011, Loss Other  NEA Baptist Clinic, 09/07/2011, Hacking/IT Incident Network Server

Best Practice Advice - Privacy  Talk with the patient  Document patient’s wishes  Be careful with social media  Patients can post almost anything they want (but not employees)

Security Measures  Combination of Administrative, Technical & Physical Controls  Keep Abreast of Policy Changes (e.g., General Responsibilities of Computer Users)  Make sure to use Technical Controls when appropriate e.g., Safe! On an subject line  Be aware of Physical Controls e.g., locking cabinets on Epic Business Continuity workstations

Business Associates  HIPAA holds BAs to the same privacy and security standards as Baptist Health, but breach notification is still our responsibility even if they are the ones with a breach  Vendors usually know about HIPAA, but are often unaware of the HITECH safe harbor provisions  Involve Information Security early on in the contracting and procurement processes

Auditing and Monitoring  All EPHI systems require an approved audit plan  Audit results must be reported to Corporate Compliance on a quarterly basis  Failure to adhere to these requirements must be explained in detail to the Routine Audit subcommittee of the Board and presented along with a mitigation plan

Best Practice Advice - Security  Don’t text PHI  Use Safe! for to external addresses  Be cautious of photos and video  Don’t store data on any personal device/media  Be wary of s soliciting confidential information (regardless of what it look like)  Information Security is a tool for all to use, please don’t hesitate to call or any questions

Questions?