The Health Insurance Portability and Accountability Act

Slides:



Advertisements
Similar presentations
Independent Contractor Orientation HIPAA What Is HIPAA? Health Insurance Portability and Accountability Act of 1996 The Health Insurance Portability.
Advertisements

HIPAA Privacy Rule “Standards for Privacy of Individually Identifiable Health Information” 45 CFR 160 and 164* *
1 The Health Insurance Portability and Accountability Act (HIPAA) A guided tutorial for GVSU employees.
HIPAA and Public Health 2007 Epi Rapid Response Team Conference.
HIPAA Privacy Training. 2 HIPAA Background Health Insurance Portability and Accountability Act of 1996 Copyright 2010 MHM Resources LLC.
Health Insurance Portability and Accountability Act HIPAA Education for Volunteers and Students.
HIPAA Privacy Rule Training
COBB/DOUGLAS COMMUNITY SERVICES BOARD Confidentiality and Privacy of Consumer Information.
The Health Insurance Portability and Accountability Act Basic HIPAA Training For CMU workforce with access to PHI.
HIPAA – Privacy Rule and Research USCRF Research Educational Series March 19, 2003.
Increasing public concern about loss of privacy Broad availability of information stored and exchanged in electronic format Concerns about genetic information.
The Health Insurance Portability and Accountability Act of 1996– charged the Department of Health and Human Services (DHHS) with creating health information.
WORKFORCE CONFIDENTIALITY HIPAA Reminders. HIPAA 101 The Health Insurance Portability and Accountability Act (HIPAA) protects patient privacy. HIPAA is.
HIPAA Health Insurance Portability and Accountability Act.
1 HIPAA Education CCAC Professional Development Training September 2006 CCAC Professional Development Training September 2006.
Dr. Yaseen Hayajneh Health Insurance Portability and Accountability Act Yaseen HayajnehYaseen Hayajneh RN, MPH, PhD.
NAU HIPAA Awareness Training
HIPAA Privacy Keys to Success Education for Nursing and all other Clinical Students Effective January 2010 HIPAA Job Specific Education1.
Informed Consent.
HIPAA Privacy Rule Compliance Training for YSU April 9, 2014.
 The Health Insurance Portability and Accountability Act of  Federal Law designed to protect sensitive information.  HIPAA violations are enforced.
Health Insurance Portability & Accountability Act “HIPAA” To every patient, every time, we will provide the care that we would want for our own loved ones.
Are you ready for HIPPO??? Welcome to HIPAA
Professional Nursing Services.  Privacy and Security Training explains:  The requirements of the federal HIPAA/HITEC regulations, state privacy laws.
Protecting Client Data HIPAA, HITECH and PIPA Part 1A
HIPAA Training Presentation for New Employees How did we get here? HIPAA Police 1.
HIPAA What’s Said Here – Stays Here…. WHAT IS HIPAA  Health Insurance Portability and Accountability Act  Purpose is to protect clients (patients)
HIPAA Health Insurance Portability & Accountability Act of 1996.
Health Insurance Portability and Accountability Act (HIPAA)
East Carolina University HIPAA Privacy
Protected Health Information (PHI). Privileged Communication An exchange of information between two individuals in a confidential relationship. (Examples:
University of Miami1 Privacy, Confidentiality & Security Marisabel Davalos, M.S.Ed., CIP Associate Director of Educational Initiatives November, 2008.
Paula Peyrani, MD Medical/Project Director, HIV Program at the 550 Clinic Assistant Director, Research Design and Development Clinical and Translational.
HIPAA PRIVACY AND SECURITY AWARENESS.
HIPAA Business Associates Leadership Group Meeting June 28, 2001.
1 Research & Accounting for Disclosures March 12, 2008 Leslie J. Pfeffer, BS, CHP Office of the Vice President for Research Administration Office of Compliance.
1 HIPAA OVERVIEW ETSU. 2 What is HIPAA? Health Insurance Portability and Accountability Act.
HIPAA Privacy and Research August 21, 2015
HIPAA Training Developed for Ridgeview Institute 2012 Hospital Wide Orientation.
HIPAA (health insurance portability and accountability act)
HIPAA Michigan Cancer Registrars Association 2005 Annual Educational Conference Sandy Routhier.
Medical Law and Ethics, Third Edition Bonnie F. Fremgen Copyright ©2009 by Pearson Education, Inc. Upper Saddle River, New Jersey All rights reserved.
Understanding HIPAA (Health Insurandce Portability and Accountability Act)
HIPAA Health Insurance Portability and Accountability Act of 1996.
A Road Map to Research at Jefferson: HIPAA Privacy and Security Rules for Researchers Presented By: Privacy Officer/Office of Legal Counsel October 2015.
Configuring Electronic Health Records Privacy and Security in the US Lecture b This material (Comp11_Unit7b) was developed by Oregon Health & Science University.
HIPAA Training. What information is considered PHI (Protected Health Information)  Dates- Birthdays, Dates of Admission and Discharge, Date of Death.
Final HIPAA Privacy Rule: The Research Provisions Julie Kaneshiro DHHS Office for Human Research Protections Phone: Fax:
The Health Insurance Portability and Accountability Act (HIPAA) requires Plumas County to train all employees in covered departments about the County’s.
The Health Insurance Portability and Accountability Act 
Developed for Ridgeview Institute 2015 Hospital Wide Orientation
ELECTRONIC HEALTH RECORD PRIVACY TRAINING
HIPAA Privacy Rule Training
Health Insurance Portability and Accountability Act of 1996
HIPAA PRIVACY & SECURITY TRAINING
HIPAA Privacy & Security
The Health Insurance Portability and Accountability Act
HIPAA PRIVACY AWARENESS, COMPLIANCE and ENFORCEMENT
Disability Services Agencies Briefing On HIPAA
The Health Insurance Portability and Accountability Act Basic HIPAA Training For CMU workforce with access to PHI.
The Health Insurance Portability and Accountability Act
HIPAA Privacy & Security
HIPAA Overview.
The Health Insurance Portability and Accountability Act
New School Violence Law; HIPAA Privacy Training
HIPAA & PHI TRAINING & AWARENESS
The Health Insurance Portability and Accountability Act
From Baby Boomers to Millennials
Presentation transcript:

The Health Insurance Portability and Accountability Act Basic HIPAA Training For Medical Reserve Corps Volunteers who help with the Well Check Program

Who Needs Training and Why MRC volunteers who come in contact with “Protected Health Information” are Federally required to take training This presentation is designed to Familiarize you with HIPAA regulations Policies and procedures regarding protected health information (PHI) Ensure Federal compliance

Summary of the Law To establish basic privacy and security protection of health information. To guarantee individuals the right to access their health information and learn how it is used and disclosed To simplify payment for health care.

What Exactly is HIPAA? Public Law 104-191 (1996) Overseen by: Department of Health & Human Services (HHS) and enforced by Office for Civil Rights (OCR) Regulations on: Privacy of health information Security of health information Notification of breaches of confidentiality Penalties for violating HIPAA

What is Protected by HIPAA? Protected Health Information (PHI) Any Individually Identifiable Health Information (IIHI) Created or received by a health care provider, health plan, or health care clearinghouse Relating to the past, present of future physical or mental health or condition of an individual (including information related to payment for health care) Transmitted in any form or medium—paper, electronic and verbal communications

What is Protected by HIPAA? Examples of PHI: Medical charts Problem logs Photographs and videotapes Communications between health care professionals Billing records Health plan claims records Health insurance policy number

What is Protected by HIPAA? Health information protected if it directly or indirectly identifies someone. Direct identifiers: individual’s name, SSN, driver’s license numbers Indirect identifiers: information about an individual that can be matched with other available information to identify the individual.

Direct and Indirect Identifiers Name Geographic subdivisions smaller than a State Street Address City County Precinct Zip Code & their equivalent geocodes, except for the initial three digits Dates, except year Birth date Admission date Discharge date Date of death Telephone numbers Fax number E-Mail Address Social Security numbers Medical record numbers Health plan beneficiary numbers Account numbers Certificate/license numbers Vehicle identifiers and serial numbers, including license plate numbers Device identifiers and serial numbers Web universal resource locations (URLs) Internet Protocol (IP) address numbers Biometric identifiers, including finger and voice prints Full face photographic images and any comparable data Any other unique identifying number, characteristic, or code

What is Protected by HIPAA? If any direct or indirect identifiers are present, the information is PHI and subject to HIPAA protection. Information can be “deidentified” – but the Privacy Officer must review to ensure all direct and indirect identifiers have been properly removed.

Who is Subject to HIPAA? MRC Well Check “covered entity” components: Referring Town/City Departments Well Check Partners MRC volunteers who volunteer to conduct well check calls

How HIPAA Protects PHI Limits who may use or disclose PHI. Limits the purposes for which PHI may be used or disclosed Limits the amount of information that may be used or disclosed (Minimum Necessary rule) Requires use of safeguards over how PHI is used, stored and disclosed

Who May Use PHI? MRC volunteers trained on HIPAA privacy. You are only given access to PHI if you need it in order to perform your task You must agree to protect the confidentiality of the information You ask the person enrolled in the well check program prior each interview if they agree that you can share the information with the Well Check Team and designated Emergency Contacts.

How May PHI May Used? General Rule: MRC volunteers may use or disclose PHI only for permitted uses without an individual’s specific written authorization that would be on the initial intake form filled out with the person in the Well Check Program by the Town/City official that is referring the person to the Well Check Program.

Permitted Uses For PHI “TPO” Treatment Payment Health care operations Specified public policy exceptions (public health and law enforcement) Any other use requires individual written authorization

Treatment Providing, coordinating & managing health care Includes: Direct treatment of patient Consultation among health care providers Indirect treatment (for example, laboratory testing) Patient referral from one provider to another

Payment Activities by a health care provider to obtain reimbursement for health care Includes: billing, eligibility/coverage determination, medical necessity determinations Activities by health plan to pay claims

Health Care Operations Activities directly related to treatment and payment -- such as credentialing, auditing, utilization review, quality assessment, training programs Supporting activities, such as computer systems support Administrative and managerial activities, such as business planning, resolving complaints, and complying with HIPAA.

Minimum Necessary Rule The use or disclosure of PHI is limited to the minimum amount necessary to accomplish the purpose Does not apply to treatment Can use whatever information you think you need for treatment purposes Any other purpose, must consider: what is the minimum amount of information needed to perform the task?

Safeguarding PHI People consider health information their most confidential information, and we must protect it accordingly Do not access PHI that you do not need Do not discuss PHI with individuals who do not need to know it. Do not provide PHI to anyone not authorized to receive it Misusing PHI can result in discipline, legal penalties and loss of trust

Safeguarding PHI When using PHI, think about: Where you are Who might overhear Who might see

Safeguarding PHI Avoid: Discussing PHI in front of others who do not need to know. Leaving records accessible to patients or others who do need to see them Positioning monitors where others can view them Using printers located in public or unsecured areas

Safeguarding PHI Follow safe practices for your computer system ID and password Use strong passwords—see your area administrator for guidelines Keep your use ID and password confidential and secure if you need to write it down, keep it in your wallet Do not allow anyone else to access the computer system under your ID

Safeguarding PHI Do not engage in risky practices with computers used to access PHI Do not surf the internet Do not open attachments to e-mail unless from a trusted source Do not install applications while providing or tracking information

Safeguarding PHI Do not unnecessarily print or copy PHI When faxing PHI, use a fax cover page Dispose of PHI when it is no longer needed use shredding bins for paper records

Safeguarding PHI Report unusual activity immediately You observe questionable practices You find PHI in inappropriate areas You suspect unauthorized use of your user ID/password A patient/health plan participant complains to you about a privacy issue

Why should we care about the HIPAA rules? CMU Disciplinary action up to and including termination of employment Civil Penalties Up to $1.5 million per year per violation Criminal Penalties Up to $250,000, imprisonment of up to ten years, or both Lawsuits Invasion of privacy/negligence

Knowledge Assessment Please take some time to complete the knowledge assessment of this presentation. You are required to do so and your completion will be recorded automatically. You may retake the assessment as many times as needed in order to “score” 100%. Any problems with the assessment, please contact the site instructor.