ELECTRONIC HEALTH RECORD PRIVACY TRAINING

Slides:



Advertisements
Similar presentations
Independent Contractor Orientation HIPAA What Is HIPAA? Health Insurance Portability and Accountability Act of 1996 The Health Insurance Portability.
Advertisements

HIPAA Privacy Rule “Standards for Privacy of Individually Identifiable Health Information” 45 CFR 160 and 164* *
Confidentiality and HIPAA
COBB/DOUGLAS COMMUNITY SERVICES BOARD Confidentiality and Privacy of Consumer Information.
The Health Insurance Portability and Accountability Act Basic HIPAA Training For CMU workforce with access to PHI.
HIPAA – Privacy Rule and Research USCRF Research Educational Series March 19, 2003.
Increasing public concern about loss of privacy Broad availability of information stored and exchanged in electronic format Concerns about genetic information.
WORKFORCE CONFIDENTIALITY HIPAA Reminders. HIPAA 101 The Health Insurance Portability and Accountability Act (HIPAA) protects patient privacy. HIPAA is.
HIPAA Health Insurance Portability and Accountability Act.
1 HIPAA Education CCAC Professional Development Training September 2006 CCAC Professional Development Training September 2006.
NAU HIPAA Awareness Training
Informed Consent.
 The Health Insurance Portability and Accountability Act of  Federal Law designed to protect sensitive information.  HIPAA violations are enforced.
Health Insurance Portability & Accountability Act “HIPAA” To every patient, every time, we will provide the care that we would want for our own loved ones.
Professional Nursing Services.  Privacy and Security Training explains:  The requirements of the federal HIPAA/HITEC regulations, state privacy laws.
Protecting Client Data HIPAA, HITECH and PIPA Part 1A
HIPAA Training Presentation for New Employees How did we get here? HIPAA Police 1.
Health information security & compliance
HIPAA What’s Said Here – Stays Here…. WHAT IS HIPAA  Health Insurance Portability and Accountability Act  Purpose is to protect clients (patients)
HIPAA COMPLIANCE IN YOUR PRACTICE MARIBEL VALENTIN, ESQUIRE.
HIPAA Health Insurance Portability & Accountability Act of 1996.
Health Insurance Portability and Accountability Act (HIPAA)
East Carolina University HIPAA Privacy
Protected Health Information (PHI). Privileged Communication An exchange of information between two individuals in a confidential relationship. (Examples:
University of Miami1 Privacy, Confidentiality & Security Marisabel Davalos, M.S.Ed., CIP Associate Director of Educational Initiatives November, 2008.
Paula Peyrani, MD Medical/Project Director, HIV Program at the 550 Clinic Assistant Director, Research Design and Development Clinical and Translational.
HIPAA PRIVACY AND SECURITY AWARENESS.
HIPAA Business Associates Leadership Group Meeting June 28, 2001.
1 Research & Accounting for Disclosures March 12, 2008 Leslie J. Pfeffer, BS, CHP Office of the Vice President for Research Administration Office of Compliance.
Privacy and Security of Protected Health Information NorthPoint Health & Wellness Center 2011.
1 HIPAA OVERVIEW ETSU. 2 What is HIPAA? Health Insurance Portability and Accountability Act.
HIPAA Privacy and Research August 21, 2015
HIPAA Training Developed for Ridgeview Institute 2012 Hospital Wide Orientation.
HIPAA (health insurance portability and accountability act)
HIPAA – How Will the Regulations Impact Research?.
Medical Law and Ethics, Third Edition Bonnie F. Fremgen Copyright ©2009 by Pearson Education, Inc. Upper Saddle River, New Jersey All rights reserved.
Health Insurance Portability and Accountability Act of 1996 HIPAA Privacy Training for County Employees.
HIPAA BASIC TRAINING Presented by Anderson Health Information Systems, Inc.
HIPAA THE PRIVACY RULE. 2 HISTORY In 2000, many patients that were newly diagnosed with depression received free samples of anti- depressant medications.
Rhonda Anderson, RHIA, President  …is a PROCESS, not a PROJECT 2.
Configuring Electronic Health Records Privacy and Security in the US Lecture b This material (Comp11_Unit7b) was developed by Oregon Health & Science University.
HIPAA Overview Why do we need a federal rule on privacy? Privacy is a fundamental right Privacy can be defined as the ability of the individual to determine.
HIPAA TRIVIA Do you know HIPAA?. HIPAA was created by?  The Affordable Care Act  Health Insurance companies  United States Congress  United States.
HIPAA Training. What information is considered PHI (Protected Health Information)  Dates- Birthdays, Dates of Admission and Discharge, Date of Death.
Final HIPAA Privacy Rule: The Research Provisions Julie Kaneshiro DHHS Office for Human Research Protections Phone: Fax:
The Health Insurance Portability and Accountability Act (HIPAA) requires Plumas County to train all employees in covered departments about the County’s.
Reviewed by: Gunther Kohn Chief Information Officer, UB School of Dental Medicine Date: October 20, 2015 Approved by: Sarah L. Augustynek Compliance Officer,
The Health Insurance Portability and Accountability Act 
UC Riverside Health Training and Development
Developed for Ridgeview Institute 2015 Hospital Wide Orientation
HIPAA Privacy Rule Training
Health Insurance Portability and Accountability Act of 1996
HIPAA PRIVACY & SECURITY TRAINING
HIPAA Privacy & Security
HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT (HIPAA)
2015 Orientation to HIPAA Privacy Rule Compliance
Privacy & Confidentiality
No No, Yes Yes: Simple Privacy & Information Security Tips Krista Barnes, J.D. Senior Legal Officer and Director, Privacy & Information Security, Institutional.
Disability Services Agencies Briefing On HIPAA
The Health Insurance Portability and Accountability Act Basic HIPAA Training For CMU workforce with access to PHI.
The Health Insurance Portability and Accountability Act
HIPAA Overview.
The Health Insurance Portability and Accountability Act
New School Violence Law; HIPAA Privacy Training
HIPAA & PHI TRAINING & AWARENESS
The Health Insurance Portability and Accountability Act
Office of the Vice President for Research Human Subjects Protection Program IRB Submission Process Module 4 - Health Insurance Portability and Accountability.
The Health Insurance Portability and Accountability Act
From Baby Boomers to Millennials
Presentation transcript:

ELECTRONIC HEALTH RECORD PRIVACY TRAINING

Purpose of this training This training addresses the essential elements of maintaining the privacy and security of consumer protected health information (PHI). During this course you will learn/review: The basics of the privacy requirements The minimum necessary standard for the job related and assigned responsibilities of employee access to the systems and the risk associated with this access. Enforcement actions relative to inappropriate, impermissible access and disclosures; and Expected behaviors related to access to information (for KCMHSAS consumers and others whose information is in the system but who are not consumers in your program)

HIPAA Privacy & Security Rules The Health Insurance Portability and Accountability Act of 1996 (HIPAA) is a federal law designed to protect consumer PHI. Mental Health Code Confidentiality 330.1748 – general requirements and considerations Information in the record of a recipient shall be kept confidential. Information may be disclosed outside of the holder of the record only with customer authorization and/or under specific circumstances.

Privacy Rule The Privacy Regulations went into effect April 14, 2003 Privacy refers to the protection of an individual’s health care data. Defines how participant information is used and disclosed. Gives individuals privacy rights and greater control over their own health information. Outlines ways to safeguard Protected Health Information (PHI).

Protected Health Information Protected Health Information (PHI) – Any individually identifiable health or financial information, whether verbal, written, electronic, or otherwise recorded in any form or medium that is: 1. created or received by KCMHSAS or one of its participating providers or one of their employees, agents or contracted service providers. 2. related to the past, present, or future physical or mental health or condition of an individual, the provision of health care to an individual or the past, present, or future payment for the provision of health care to an individual. Protected Health and Billing Information (PHI) may not be released without a complete and valid written consent or authorization signed by the participant or legally authorized representative unless a release of the PHI is specifically allowed by State and Federal law without valid authorization.

Electronic mail addresses; Social security numbers; The Federal Privacy Regulations specify the following 18 pieces of “Individually Identifiable Information” that, when linked with health or medical information, constitutes PHI (45 CFR 164.514): Names of the individual, and relatives, employees or household members of the individual; Geographic identifiers of the individual, including subdivisions smaller than a street, street addresses, city, county and precinct; Zip code at any level less than the initial three digits; except if the initial three digits cover a geographical area of 20,000 or less people, then zip code is considered an identifier; All elements of dates, except year, or dates directly related to an individual including birth date, admission date, discharge date, date of death and all ages over 89 and all elements of dates (including year) indicative of such age, except that such ages and elements may be aggregated into a single category of age 90 or older; Telephone numbers; Fax numbers; Electronic mail addresses; Social security numbers;

Web Universal Resource Locators (URLs); The Federal Privacy Regulations specify the following 18 pieces of “Individually Identifiable Information” that, when linked with health or medical information, constitutes PHI (45 CFR 164.514): (Cont) Medical record numbers; Health plan beneficiary numbers; Account numbers; Certificate/license numbers; Vehicle identifiers and serial numbers, including license plate numbers; Device identifiers and serial numbers; Web Universal Resource Locators (URLs); Internet Protocol (IP) address numbers; Biometric identifiers, including finger and voice prints; Full-face photographic images and any comparable images; and Any other unique identifying number, characteristic, or code

PHI In All Media The HIPAA Regulations require we protect our consumers’ PHI in all media including, but not limited to, PHI created, stored or transmitted in/on the following media: Verbal discussions (i.e. in person, on the phone, etc.) Written on paper (i.e. referral form, explanation of benefits, prescreen assessments, etc.) In computer applications/systems (i.e. KCMHSAS Office, Streamline SmartCare, Provider Access, and Care Management etc.) In/on computer hardware/equipment (i.e. PCs, laptops, PDAs, fax machines/servers, cell/multifunctional phones, etc.)

Minimum Necessary What does releasing the “minimum necessary” PHI mean? To use or disclose/release only the information minimally necessary to accomplish the intended purposes of the use, disclosure, or request. Requests from employees within KCMHSAS: Identify each workforce member who needs to access to consumer PHI. Limit the PHI provided to a “need to know” basis. Requests from individuals not employed at KCMHSAS: Limit the PHI provided to what is minimally necessary to accomplish the purpose for which the request was made.

Employee Access Employee Access to Consumer PHI is permitted on an as needed basis for the required performance of employee job related and assigned responsibilities and does not allow access to any information that is not part of the specific job duties and responsibilities. (i.e., it is never acceptable for an employee to look at PHI “just out of curiosity,” even if no harm is intended.) Any information acquired or accessed during the performance of work assigned duties will be kept confidential.

Searching & Selecting Consumer Records When your job related duty requires you to search for a consumer record in KCMHSAS Care Management, Provider Access or Smartcare systems, only open the record when you are reasonably assured that it is the correct consumer. Search with more than just the consumer’s name, i.e. search with the dob.

Accidental Violations Mistakes happen. If you mistakenly view or disclose PHI or provide confidential information to an unauthorized person or if you breach the security of confidential data: Acknowledge the mistake and notify your supervisor and/or the Breach Response Team immediately. If the report is made to a supervisor, the supervisor is required to then report to the Breach Response Team immediately. Learn from the error and help revise procedures (when necessary) to prevent it from happening again. Assist in correcting the error only as requested by your manager or the Privacy Officer. Don’t cover up or try to make it “right” by yourself. ***Accidental disclosures are Privacy Incidents and must be reported to the Privacy Officer immediately. We are required to document this type of disclosure.***

Misuse of PHI and Impermissible Disclosures Unauthorized Access to… Using… Taking… Possession of… Release of… Edit of… Destruction of… Consumer PHI without authorization.

Breach An acquisition, access, use, or disclosure of protected health information in a manner not permitted under the Privacy Rule is presumed to be a breach unless the Covered Entity demonstrates that there is a low probability that the PHI has been compromised based on a risk assessment. A breach may occur when information that must be protected is: Lost, stolen or improperly disposed of; Reviewed by individuals who are not authorized to have access, or Sent or communicated to others who are not authorized to receive it.

Disciplinary Action We must be committed to protecting our consumers’ privacy. KCMHSAS is placing trust in you to follow the privacy policies. This is not an option, it is required. Unauthorized or improper release of PHI by an employee may result in disciplinary action up to and including termination of employment, civil fines and/or penalties, and/or criminal sanctions, lawsuits and judgments against the employee and/or KCMHSAS for civil and/or criminal damages (see 45 CFR 164.530 (e)(1)&(2)).

Employees Must Report Employees who believe they have observed a violation of this policy should report it to their immediate supervisor and/or the Privacy Officer. An employee may also report a violation anonymously or confidentially to the KCMHSAS Compliance hotline. Calls received on this line will be investigated consistent with applicable KCMHSAS compliance policies. There will be no retaliation taken against any employee for making such a report in good faith.

Monitoring Employee access and use of KCMHSAS Care Management, Provider Access and Smartcare systems will be monitored by the Privacy & Compliance Officers. Based on access monitoring activities, you may be asked questions regarding your apparent access to consumer records and information. You will be expected to provide an acceptable rationale for access to all consumer information based upon your job related responsibilities.

Questions Any reports of suspected compliance violations, questions or possible concerns may be directed to the Privacy Officer via telephone, verbally or in writing to: Karyn Bouma Ellie DeLeon KCMHSAS Health Information Officer KCMHSAS Compliance Officer 615 E Crosstown Parkway or to 2030 Portage St Kalamazoo, MI 49001 Kalamazoo, MI 49001 Email: kbouma@kazoocmh.org Email: edeleon@kazoocmh.org    Phone: 269-553-7024 Phone: 269-364-6986 Hotline: 1-888-939-4823 Please sign and keep the Electronic Health Record Training Attestation form as part of your agency training records.