April 14, 2003 – HIPAA Privacy Audioconference The Importance of April 14, 2003: Where you should be regarding HIPAA privacy policies and procedures and.

Slides:



Advertisements
Similar presentations
HIPAA Security Presentation to The American Hospital Association Dianne Faup Office of HIPAA Standards November 5, 2003.
Advertisements

Copyright Eastern PA EMS Council February 2003 Health Information Portability and Accountability Act It’s the law.
National Health Information Privacy and Security Week Understanding the HIPAA Privacy and Security Rule.
Increasing public concern about loss of privacy Broad availability of information stored and exchanged in electronic format Concerns about genetic information.
HIPAA PRIVACY REQUIREMENTS Dana L. Thrasher Constangy, Brooks & Smith, LLC (205) ; Victoria Nemerson.
Information Risk Management Key Component for HIPAA Security Compliance Ann Geyer Tunitas Group
Where to start Ben Burton, JD, MBA, RHIA, CHP, CHC.
NAU HIPAA Awareness Training
Topics Rule Changes Skagit County, WA HIPAA Magic Bullet HIPAA Culture of Compliance Foundation to HIPAA Privacy and Security Compliance Security Officer.
COMPLYING WITH HIPAA PRIVACY RULES Presented by: Larry Grudzien, Attorney at Law.
Are you ready for HIPPO??? Welcome to HIPAA
Improving Efficiency and Increasing Patient Satisfaction by Leveraging HIPAA Standards, Including Privacy and Transactions and Data Code Sets Presented.
Version 6.0 Approved by HIPAA Implementation Team April 14, HIPAA Learning Module The following is an educational Powerpoint presentation on the.
HIPAA PRIVACY AND SECURITY AWARENESS.
“ Technology Working For People” Intro to HIPAA and Small Practice Implementation.
Approaches to Implementation of the Transactions and Codes Sets Addendum Presented by: Steven S. Lazarus, PhD, FHIMSS President Boundary Information Group.
2012 Audits of Covered Entity Compliance with HIPAA Privacy, Security and Breach Notification Rules Initial Analysis February 2013.
STEVEN S. LAZARUS, PHD, CPEHR, CPHIT, FHIMSS PRESIDENT, BOUNDARY INFORMATION GROUP AUGUST 20, – The Twelve Year Journey is Not Over.
HIPAA Policies, Procedures and Training Margret Amatayakul, RHIA, CHPS, FHIMSS President, Margret\A Consulting, LLC Steven S. Lazarus, PhD, FHIMSS Boundary.
HIPAA Michigan Cancer Registrars Association 2005 Annual Educational Conference Sandy Routhier.
© 2009 The McGraw-Hill Companies, Inc. All rights reserved. 1 McGraw-Hill Chapter 2 The HIPAA Privacy Standards HIPAA for Allied Health Careers.
Medical Law and Ethics, Third Edition Bonnie F. Fremgen Copyright ©2009 by Pearson Education, Inc. Upper Saddle River, New Jersey All rights reserved.
Copyright Boundary Information Group 2002 HIPAA CASE STUDIES: A SURVEY OF 10 HEALTH SYSTEMS’ HIPAA COMPLIANCE EFFORTS Steven S. Lazarus, PhD, FHIMSS President,
Health Insurance Portability and Accountability Act (HIPAA) CCAC.
Understanding HIPAA (Health Insurandce Portability and Accountability Act)
Eliza de Guzman HTM 520 Health Information Exchange.
Chapter 7—Privacy Law and HIPAA
The Fifth National HIPAA Summit – October 30, 2002 What to Do Now: Operational Implementation of HIPAA Privacy and Security Training Presented by: Steven.
PricewaterhouseCoopers 1 Administrative Simplification: Privacy Audioconference April 14, 2003 William R. Braithwaite, MD, PhD “Doctor HIPAA” HIPAA Today.
Copyright ©2014 by Saunders, an imprint of Elsevier Inc. All rights reserved 1 Chapter 02 Compliance, Privacy, Fraud, and Abuse in Insurance Billing Insurance.
1 Privacy Plan of Action © HIPAA Pros 2002 All rights reserved.
Vendor and Clearinghouse Requirements for HIPAA Compliance HIPAA Summit Audio Conference Presented By: Steven S. Lazarus, PhD, FHIMSS Boundary Information.
March 19, 2003 Audioconference Approaches to Compliance with the HIPAA Privacy and Security Workforce Training Requirements Presented by: Steven S. Lazarus,
HIPAA Transactions and Code Sets U.S. Healthcare Industry at a Tipping Point Steven S. Lazarus, PhD, CPHIT, CPEHR, FHIMSS April 7, :30 pm –
HIPAA HEALTH INSURANCE PORTABILITY ACOUNTABILITY ACT.
Functioning as a Business Associate Under HIPAA William F. Tulloch Director, PCBA March 9, 2004.
ASCA Transaction Extension and Resources to Help Extending Your Compliance Deadline for Transactions & Code Sets April 19, 2002 Steven S. Lazarus, PhD,
The Health Insurance Portability and Accountability Act of 1996 “HIPAA” Public Law
The Medical College of Georgia HIPAA Privacy Rule Orientation.
New Hire HIPAA Orientation. HIPAA Overview HIPAA is an acronym that stands for the Health Insurance Portability and Accountability Act of HIPAA.
The Fourth National HIPAA Summit, April 26, 2002 A SURVEY OF 10 HEALTH SYSTEMS’ HIPAA COMPLIANCE STRATEGIES Presented by: Margret Amatayakul, RHIA, FHIMSS.
HIPAA Privacy Rule Training
HIPAA PRIVACY & SECURITY TRAINING
Acknowledgement The presenters acknowledge the contributions and suggestions of Margret Amatayakul, RHIA, CHPS, FHIMSS, President, Margret\A Consulting,
Enforcement, Business Associates and Breach Notification. Oh my!
What is HIPAA? HIPAA stands for “Health Insurance Portability & Accountability Act” It was an Act of Congress passed into law in HEALTH INSURANCE.
HIPAA CONFIDENTIALITY
HIPAA Administrative Simplification
Moderated by: Steven S. Lazarus, PhD, FHIMSS President
Paul T. Smith Davis Wright Tremaine LLP
EMPLOYER HIPAA COMPLIANCE STRATEGIES HIPAA Summit Audio Conference
Transactions and Code Sets and the National Provider Identifier (NPI) – Getting Value From the HIPAA Standards Presented by: Steven S. Lazarus, PhD, CPEHR,
Red Flags Rule An Introduction County College of Morris
Electronic Health Records: Overview, Acquisition and Implementation
Disability Services Agencies Briefing On HIPAA
Employee Privacy and Privacy of Employee Information
HIPAA Transactions and Code Sets Implementation June 6, 2003
Presented by: Steven S. Lazarus, PhD, FHIMSS
HIPAA Privacy and Security Summit 2018 HIPAA Privacy Rule: Compliance Plans, Training, Internal Audits and Patient Rights Widener University Delaware.
OVERVIEW OF CMS GUIDANCE
HIPAA Security Standards Final Rule
HIPAA Policy & Procedure Strategies
Making Your IRBs and Clinical Investigators HIPAA-Ready
THE 13TH NATIONAL HIPAA SUMMIT HEALTH INFORMATION PRIVACY & SECURITY IN SHARED HEALTH RECORD SYSTEMS SEPTEMBER 26, 2006 Paul T. Smith, Esq. Partner,
National HIPAA Audioconference: update on Crucial HIPAA Privacy and Security Developments – 5 Years After Implementation Steven S. Lazarus, PhD, CPEHR,
The Importance of April 16, 2003: Where You Should be in HIPAA Data Code Sets/Transactions Testing and Compliance Presented by: Steven S. Lazarus, PhD,
Steven S. Lazarus, PhD, CPEHR, CPHIT, FHIMSS President
HIPAA Privacy and Security Update - 5 Years After Implementation
Strategies to Comply with the HPAA Privacy Rule Before the HIPAA Security and Enforcement Rules are Final Presented by: Steven S. Lazarus, PhD, FHIMSS.
Part II Objectives Describe how policies and procedures are used
Presentation transcript:

April 14, 2003 – HIPAA Privacy Audioconference The Importance of April 14, 2003: Where you should be regarding HIPAA privacy policies and procedures and training Presented by: Steven S. Lazarus, PhD, FHIMSS Boundary Information Group, President Train for Compliance, Inc., Vice Chair Workgroup for Electronic Data Interchange (WEDI), Past Chair

Copyright © Boundary Information Group Boundary Information Group  Virtual consortium of health care information systems consulting firms founded in 1995  Company website:  BIG HIPAA Resources:  Senior Consultants with HIPAA leadership experience since 1992; administrative and clinical system experience  Services include: –Strategic planning –Systems selection and implementation management –Workflow improvement –EMR, clinical and financial IS selection and operating improvement –HIPAA policies, procedures, and forms –Expert witness

Copyright © Boundary Information Group  Nonprofit Trade Association, founded 1991  190 organizational members –Consumers, Government, Mixed Payer/Providers, Payers, Providers, Standards Organizations, Vendors  Named in 1996 HIPAA Legislation as an Advisor to the Secretary of DHHS  Website:  Strategic National Implementation Process (SNIP) – snip.wedi.org  WEDI Foundation formed in 2001  Steven Lazarus, WEDI Past Chair and Foundation Trustee Workgroup on Electronic Data Interchange

Copyright © Boundary Information Group Where Should we be Today on our Privacy Policies and Procedures?  Before April 14, 2003, Privacy policies and procedures should: –Be drafted –Take into account state pre-emption –Approved/revised for operational reasonableness –Approved by all administrative and governance steps required in your organization –Have a legal review for HIPAA and other Federal and State Laws –Be published and accessible to all members of the workforce

Copyright © Boundary Information Group Policies and Procedures  Privacy Administration  § (i) and (b)  Process for developing, adopting and amending of privacy policies and procedures, making any necessary changes to the Notice of Privacy Practices, and retaining copies

Copyright © Boundary Information Group Policies and Procedures  Including overriding principles (policy)  Detail practices –Identify responsible individual or department –Define specific operational processes –Require enough detail so that the workforce knows what to do –Develop to fit the clinical and business operations of the covered entity  Must not just repeat or summarize the Regulations  Privacy policies and procedures must reflect state laws that are more restrictive

Copyright © Boundary Information Group Privacy Policies and Procedures  Must address every aspect of HIPAA Privacy  Must be consistent with the Notice of Privacy Practice  Must replace previous policies and procedures which were in conflict, incomplete, or unclear

Copyright © Boundary Information Group Privacy Policies and Procedures  Common Shortcomings –The procedures must be operational – the workforce must know what to do –PHI must be safeguarded – Security –Incidental disclosures are not incidental if they are routine for you –Private patient action in State court may be more damaging than OCR’s penalties – consider how the patient views your policies and procedures –Too little “training” for effectiveness

Copyright © Boundary Information Group Training for Privacy: General  Must be on your policies and procedures  Must be completed by the entire workforce  Must be documented  Must include safeguards for PHI - Security

Copyright © Boundary Information Group Training Issues and Options  Media –Videotape –Workbooks –Classroom with live instructor –E-learning – Internet or Intranet –May utilize multiple media approaches

Copyright © Boundary Information Group Training Goals  Compliance – No OCR actions  Effective –Workforce knows what to do –Receive few patient complaints –All OCR or private actions resolved without penalties or court action –Gaps are routinely identified and addressed  Privacy incidents are categorized and reported in the “internal” annual HIPAA compliance report

Copyright © Boundary Information Group Training Issues and Options  Define workforce categories –Few workforce categories Easy to administer –Assign workforce to courses Less customization to create and maintain –Many workforce categories May be difficult to administer –Complex management of workforce to training content choices Potential to highly customize content to workforce categories

Copyright © Boundary Information Group Training Issues and Options –Practical Issues Identify source of workforce lists, identifications and passwords Include employees, physicians, volunteers, long-term contract renewal (e.g., Medical Director in a health plan) Use Human Resource application if capable –Names –Job categories –Identifications and passwords from another source Keep passwords and identifications secure

Copyright © Boundary Information Group Training Issues and Options  Tests –Use to document learning for compliance –Set passing score  Consider Continuing Education credits (can not change content significantly and maintain credits)

Copyright © Boundary Information Group Achieving Effective Privacy  Need good Security to achieve Privacy  Privacy Regulation requires Security  Reminders, periodic training, and “incident monitoring” reporting and management will be needed to achieve effective Privacy

Copyright © Boundary Information Group Recommended Actions if not Fully Ready on April 14, 2003  Complete compliance readiness ASAP to 60 days  Redo Privacy policies and procedures, and training, for operations effectiveness (if needed)  Revise Privacy polices and procedures, and training, in light of Security final rule  Measure and report training completeness –Set goal at 100% –Make executives, department heads and supervisors accountable –Include a training administration system in your training management resources

Copyright © Boundary Information Group HIPAA READINESS Steve Lazarus Company website: HIPAA website: HIPAA training: HIPAA Regulations and Policies and Procedures: