PHI Breach PHI Breach Dealing Breach With HIPAA Guidelines Guidelines.

Slides:



Advertisements
Similar presentations
HIPAA Health Insurance Portability and Accountability Act of 1996
Advertisements

The Department has declared itself to be a single covered entity. Thus, each and every one of our divisions is a covered entity and must comply with.
HIPAA: An Overview of Transaction, Privacy and Security Regulations Training for Providers and Staff.
HITECH ACT Privacy & Security Requirements Cathleen Casagrande Privacy Officer July 23, 2009.
“Reaching across Arizona to provide comprehensive quality health care for those in need” Our first care is your health care Arizona Health Care Cost Containment.
HIPAA Basics Brian Fleetham Dickinson Wright PLLC.
HIPAA Privacy Training. 2 HIPAA Background Health Insurance Portability and Accountability Act of 1996 Copyright 2010 MHM Resources LLC.
Confidentiality and HIPAA
1 Navigating the Privacy and Security Issues: HITECH Overview Rebecca L. Williams, RN, JD Partner Co-chair of HIT/HIPAA Practice Davis Wright Tremaine.
Key Changes to HIPAA from the Stimulus Bill (ARRA) Children’s Health System Department Leadership Meeting October 28, 2009 Kathleen Street Privacy Officer/Risk.
HIPAA CHANGES: HITECH ACT AND BREACH NOTIFICATION RULES February 3, 2010 Kristen L. Gentry, Esq. Catherine M. Stowers, Esq.
 July 10, 2013 Richard D. Sanders T HE S ANDERS L AW F IRM, P.C. 7 Piedmont Center, Suite Piedmont Road Atlanta, Georgia (404)
Thank You For Your Participation Kansas City   Omaha  Overland Park St. Louis  Jefferson City This Employer.
HIPAA Update: So what’s new with HIPAA?? And, what does it have to do with you? Ellen Cannon, WV DHHR HIPAA Privacy Officer WV Attorney General’s Office.
W W W. L E C L A I R R Y A N. C O M Revisiting the PHI Breach Under HIPAA and HITECH and Considerations for Ophthalmologists Neil H. Ekblom, Esq. 885 Third.
HIPAA Regulations What do you need to know?.
© 2011 The McGraw-Hill Companies, Inc. All rights reserved. 2.5 HIPAA Legislation and its Impact on Physician Practices 2-15 The Health Insurance Portability.
2014 HIPAA Refresher Omnibus Rule & HIPAA Security.
Jill Moore April 2013 HIPAA Update: New Rules, New Challenges.
What You Don’t Know Can Cost You HIPAA in a HITECH World Alaina N. Crislip, Esq. October 10, 2013.
Hot Topics Legal Update Jill D. Moore, JD, MPH University of North Carolina School of Government September 2014.
Privacy, Security and Compliance Concerns for Management and Boards November 15, 2013 Carolyn Heyman-Layne, Esq. 1.
Health information security & compliance
Health Insurance Portability & Accountability Act (HIPAA)
PRIVACY BREACHES A “breach of the security of the system”: –Is the “unauthorized acquisition of computerized data that compromises the security, confidentiality,
Walking Through the Breach Notification Process - Beginning to End HIPAA COW Presentation and Panel April 8, 2011.
American Recovery and Reinvestment Act of 2009
© Copyright 2014 Saul Ewing LLP The Coalition for Academic Scientific Computation HIPAA Legal Framework and Breach Analysis Presented by: Bruce D. Armon,
HIPAA What’s Said Here – Stays Here…. WHAT IS HIPAA  Health Insurance Portability and Accountability Act  Purpose is to protect clients (patients)
HIPAA COMPLIANCE IN YOUR PRACTICE MARIBEL VALENTIN, ESQUIRE.
HIPAA Health Insurance Portability & Accountability Act of 1996.
ARRA/HITECH Update HIPAA COW Webinar February 23, 2010 Welcome! Everyone please mute your phone at this time by pressing *6 This session is being recorded.
From HIPAA to HITECH OMH Briefing.
Breach Notification Protected Health Information Under ARRA/HITECH HIPAA COW Fall Meeting September 11, 2009.
Health Information Technology for Economic and Clinical Health Act (HITECH)
HIPAA PRIVACY AND SECURITY AWARENESS.
Confidentiality, Consents and Disclosure Recent Legal Changes and Current Issues Presented by Pam Beach, Attorney at Law.
Dealing with Business Associates Business Associates Business Associates are persons or organizations that on behalf of a covered entity: –Perform any.
Polsinelli Shughart PC In California, Polsinelli Shughart LLP Final HIPAA Omnibus Rule Highlights Presented to the Colorado Bar Association, Health Law.
Quality Integrity Stewardship Courtesy Care Accountability Medical Records ARMA Florida Gulf Coast Chapter Michael Spake Lakeland Regional Medical Center.
LAW SEMINARS INTERNATIONAL CLOUD COMPUTING: LAW, RISKS AND OPPORTUNITIES Developing Effective Strategies for Compliance With the HITECH Act and HIPAA’s.
Privacy and Security Laws for Health Care Organizations Presented by Robert J. Scott Scott & Scott, LLP
American Recovery and Reinvestment Act of 2009 Changes to HIPAA and the Impact to YOU American Recovery and Reinvestment Act of 2009 Changes to HIPAA and.
Compliance Education Tulane University ( For Staff assigned to TUMG HIPAA Clinics ONLY )
HIPAA Training Developed for Ridgeview Institute 2012 Hospital Wide Orientation.
A PRACTICAL GUIDE TO RESPONDING TO A HEALTHCARE DATA SECURITY BREACH May 19, 2011 | State College, PA Matthew H. Meade Stephanie Winer-Schreiber.
Configuring Electronic Health Records Privacy and Security in the US Lecture c This material (Comp11_Unit7c) was developed by Oregon Health & Science University.
HealthBridge is one of the nation’s largest and most successful health information exchange organizations. Tri-State REC: Privacy and Security Issues for.
HITECH and HIPAA Presented by Rhonda Anderson, RHIA Anderson Health Information Systems, Inc
A Road Map to Research at Jefferson: HIPAA Privacy and Security Rules for Researchers Presented By: Privacy Officer/Office of Legal Counsel October 2015.
Lessons Learned from Recent HIPAA Breaches HHS Office for Civil Rights.
We’ve Had A Breach – Now What? Garfunkel Wild, P.C. 411 Hackensack Avenue 6 th Floor Hackensack, New Jersey Broadway Albany,
Top 10 Series Changes to HIPAA Devon Bernard AOPA Reimbursement Services Coordinator.
HIPAA: Breach Notification By: Office of University Counsel For: Jefferson IRB Continuing Education September 2014.
AND CE-Prof, Inc. January 28, 2011 The Greater Chicago Dental Academy 1 Copyright CE-Prof, Inc
HIPAA TRIVIA Do you know HIPAA?. HIPAA was created by?  The Affordable Care Act  Health Insurance companies  United States Congress  United States.
Company Proprietary and Confidential Texas Association of Community Health Centers - Proprietary and Confidential Fourth and Goal: Score with Meaningful.
HIPAA: So You Think You’re Compliant September 1, 2011 Carolyn Heyman-Layne, J.D.
ELECTRONIC HEALTH RECORD PRIVACY TRAINING
Health Insurance Portability and Accountability Act of 1996
Enforcement, Business Associates and Breach Notification. Oh my!
Health Information Privacy & Security
WELCOME TO HIPAA & HITECH TRAINING
HIPAA PRIVACY AWARENESS, COMPLIANCE and ENFORCEMENT
Data Breaches in Employee Benefits
HITECH’s Impact on Research
The Health Insurance Portability and Accountability Act
Move this to online module slides 11-56
HIPAA WORKFORCE TRAINING
The Health Insurance Portability and Accountability Act
Presentation transcript:

PHI Breach PHI Breach Dealing Breach With HIPAA Guidelines Guidelines

2 BREACH A Breach is, generally, an impermissible use or disclosure of protected health information compromises the security or privacy of the protected health information. HIPAA defines breach as as the acquisition, access, use, or disclosure of unsecured PHI, in a manner not permitted by HIPAA, which poses a significant risk of financial, reputational, or other harm to the affected individual. Risk assessment is done for any breach under following considerations: 1. Nature and extent of PHI involved. 2. Authority of the person to whom disclosure is made. 3. Whether the PHI is acquired or viewed. 4. Extent to which the risk to the protected health information has been mitigated. Both covered entities and business associates have discretion to provide the required breach notification.

Exceptions There Are Three Exceptions: 1. Unintentional acquisition, access or use of protected health information by a workforce member or person acting under the authority of a covered entity or business associate-Within scope of authority. 2. Inadvertent disclosure of the protected health information by a person authorized to access protected health information at a covered entity or business associate to another person authorized to access PHI, where the information will not be further disclosed or used. 3. If the covered entity or business associate has a good fait or belief that the unauthorized person to whom the disclosure is made has not retained the information.

Notification Of Breach 1. Responsible are covered entities and business associates. 2. Covered entities will notify to individual or next of kin affected by breach. 3. For business associate, they have to inform it to covered entities. 4. Breach affecting more than 500 individual should be informed to Office OF Civic Rights. 5. Breach affecting less than 500 individual, not required to be informed to Office OF Civic Rights 6. If the Covered Entities Business Associate has a breach, they must report it within 60 days.

5 Examples Of Possible Breach 1. Faxing patient information to the wrong fax number. 2. Losing a laptop, flash drive, or CD containing patient information. 3. Having improper website security that exposes an internal part of the website containing PHI to the public. 4. Using a computer infected with a virus or malware. 5. Improperly disposing electronic equipment containing PHI.

6 Countermeasures Against HIPAA Violation 1. Verbal warning 2. Notice of disciplinary action placed in personal files 3. Removal of access privileges 4. Termination 5. Contract penalties 6. Report to low enforcement for suspected criminal activity 7. Civil action