Hipaa privacy and Security

Slides:



Advertisements
Similar presentations
HIPAA Security.
Advertisements

INADEQUATE SECURITY POLICIES Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA standards.
HIPAA: An Overview of Transaction, Privacy and Security Regulations Training for Providers and Staff.
HIPAA Security Standards Emmanuelle Mirsakov USC School of Pharmacy.
Independent Contractor Orientation HIPAA What Is HIPAA? Health Insurance Portability and Accountability Act of 1996 The Health Insurance Portability.
HIPAA Basics Brian Fleetham Dickinson Wright PLLC.
Health Insurance Portability and Accountability Act HIPAA Education for Volunteers and Students.
HIPAA. What Why Who How When What Is HIPAA? Health Insurance Portability & Accountability Act of 1996.
HIPAA Basic Training for Privacy & Information Security Vanderbilt University Medical Center VUMC HIPAA Website:
HIPAA Privacy Rule Training
National Health Information Privacy and Security Week Understanding the HIPAA Privacy and Security Rule.
Increasing public concern about loss of privacy Broad availability of information stored and exchanged in electronic format Concerns about genetic information.
The Health Insurance Portability and Accountability Act of 1996– charged the Department of Health and Human Services (DHHS) with creating health information.
WORKFORCE CONFIDENTIALITY HIPAA Reminders. HIPAA 101 The Health Insurance Portability and Accountability Act (HIPAA) protects patient privacy. HIPAA is.
What is HIPAA? This presentation was created by The University of Arizona Privacy Office, The Office for the Responsible Conduct of Research on March 5,
Health Insurance Portability and Accountability Act (HIPAA)HIPAA.
1 HIPAA Education CCAC Professional Development Training September 2006 CCAC Professional Development Training September 2006.
NAU HIPAA Awareness Training
Reviewing the World of HIPAA Stephanie Anderson, CPC October 2006.
HIPAA: FEDERAL REGULATIONS REGARDING PATIENT SECURITY.
Topics Rule Changes Skagit County, WA HIPAA Magic Bullet HIPAA Culture of Compliance Foundation to HIPAA Privacy and Security Compliance Security Officer.
Health Insurance Portability & Accountability Act “HIPAA” To every patient, every time, we will provide the care that we would want for our own loved ones.
Are you ready for HIPPO??? Welcome to HIPAA
HIPAA HIPAA Health Insurance Portability and Accountability Act of 1996.
Electronic Health Records Danielle P. Berthelot, RHIA Director, Health Information Management and Cancer Registry Privacy Officer Woman’s Hospital.
HIPAA COMPLIANCE IN YOUR PRACTICE MARIBEL VALENTIN, ESQUIRE.
HIPAA PRIVACY AND SECURITY AWARENESS.
“ Technology Working For People” Intro to HIPAA and Small Practice Implementation.
Copyright ©2011 by Pearson Education, Inc. Upper Saddle River, New Jersey All rights reserved. Health Information Technology and Management Richard.
How Hospitals Protect Your Health Information. Your Health Information Privacy Rights You can ask to see or get a copy of your medical record and other.
Group 3 Angela, Rachael, Misty, Kayelee, and Krysta.
HIPAA Michigan Cancer Registrars Association 2005 Annual Educational Conference Sandy Routhier.
Building a Privacy Foundation. Setting the Standard for Privacy Health Insurance Portability and Accountability Act (HIPAA) Patient Bill of Rights Federal.
LeToia Crozier, Esq., CHC Vice President, Compliance & Regulatory Affairs Corey Wilson Director of Technical Services & Security Officer Interactive Think.
Copyright © 2009 by The McGraw-Hill Companies, Inc. All Rights Reserved. McGraw-Hill Chapter 6 The Privacy and Security of Electronic Health Information.
Eliza de Guzman HTM 520 Health Information Exchange.
HIPAA BASIC TRAINING Presented by Anderson Health Information Systems, Inc.
HIPAA THE PRIVACY RULE. 2 HISTORY In 2000, many patients that were newly diagnosed with depression received free samples of anti- depressant medications.
The Culture of Healthcare Privacy, Confidentiality, and Security Lecture d This material (Comp2_Unit9d) was developed by Oregon Health and Science University,
Component 8/Unit 6aHealth IT Workforce Curriculum Version 1.0 Fall Installation and Maintenance of Health IT Systems Unit 6a System Security Procedures.
HIPAA Health Insurance Portability and Accountability Act of 1996.
A Road Map to Research at Jefferson: HIPAA Privacy and Security Rules for Researchers Presented By: Privacy Officer/Office of Legal Counsel October 2015.
1 Privacy Plan of Action © HIPAA Pros 2002 All rights reserved.
Welcome….!!! CORPORATE COMPLIANCE PROGRAM Presented by The Office of Corporate Integrity 1.
Western Asset Protection
Copyright © 2015 by Saunders, an imprint of Elsevier Inc. All rights reserved. Chapter 3 Privacy, Confidentiality, and Security.
HIPAA Overview Why do we need a federal rule on privacy? Privacy is a fundamental right Privacy can be defined as the ability of the individual to determine.
The Health Insurance Portability and Accountability Act of 1996 “HIPAA” Public Law
HIPAA TRIVIA Do you know HIPAA?. HIPAA was created by?  The Affordable Care Act  Health Insurance companies  United States Congress  United States.
HIPAA Training. What information is considered PHI (Protected Health Information)  Dates- Birthdays, Dates of Admission and Discharge, Date of Death.
The Medical College of Georgia HIPAA Privacy Rule Orientation.
New Hire HIPAA Orientation. HIPAA Overview HIPAA is an acronym that stands for the Health Insurance Portability and Accountability Act of HIPAA.
PHASE II OF HIPAA AUDIT PROGRAM June 2016 Presented by John P. Murdoch II, Esq. of Wilentz, Goldman & Spitzer, P.A. Two Industrial Way West Two Industrial.
Copyright © 2009 by The McGraw-Hill Companies, Inc. All Rights Reserved. McGraw-Hill/Irwin Chapter 6 The Privacy and Security of Electronic Health Information.
Installation and Maintenance of Health IT Systems System Security Procedures and Standards Lecture a This material Comp8_Unit6a was developed by Duke University,
Protecting PHI & PII 12/30/2017 6:45 AM
Privacy & Information Security Basics
East Carolina University
HIPAA Privacy & Security
What is HIPAA? HIPAA stands for “Health Insurance Portability & Accountability Act” It was an Act of Congress passed into law in HEALTH INSURANCE.
HIPAA.
Move this to online module slides 11-56
HIPAA PRIVACY AWARENESS, COMPLIANCE and ENFORCEMENT
Disability Services Agencies Briefing On HIPAA
HIPAA Privacy & Security
HIPAA SECURITY RULE Copyright © 2008, 2006, 2004 by Saunders an imprint of Elsevier Inc. All rights reserved.
HIPAA Do’s and Don'ts: What is Really Behind Protected Health Information (PHI) and Health Care Privacy Rules Paul Sisler, Director, Information Services;
Introduction to the PACS Security
The Health Insurance Portability and Accountability Act
Presentation transcript:

Hipaa privacy and Security Community Health NetworK, Inc. On-Line Mandatory Training

Objectives of Training HIPAA Fundamentals Privacy Rule Basics Security Rule Basics Security Components Security Policies and Procedures Instructions: On-line mandatory training

What does HIPAA stand for? Health Insurance Portability Accountability Act

Hipaa Policies CHN has 25 policies that relate to HIPAA they can be found on the CHN Intranet. CHN HIPAA policies are updated on an ongoing basis in order to satisfy changing compliance requirements and industry best practice. “Policies & Procedures” – Section 20 – Information Technology “CHN Manuals & General Info – HIPAA” “Policies & Procedures” – Section 37 – Corporate Compliance

HIPAA overview HIPAA originally passed in 1996 and finalized in January of 2013. The Rule is meant to: Standardize Records- Transaction coding and compliance more simple thereby saving money in the long-term. Provide Portability- Allows for easy transfer of medical information. Promote Accountability- The responsibility piece, keeping the information private and secure. Within HIPAA there are two rules that we need to comply with: The Privacy Rule The Security Rule

HIPAA: Privacy rule Privacy Rule: Restricts what information can be disclosed and who should have access to it. Specifically in relation to: Individually Identifiable Information Protected Health Information (PHI)

Hipaa: Privacy Rule Individually Identifiable Information: A subset of health information, created or received by a Covered Entity, like CHN, relating to a condition, treatment, or payment which could be used to identify a client. Any information that can be traced back to a specific person is then considered Individually Identifiable Information.

Hipaa: Privacy Rule Protected Health Information (PHI): Any health or individually identifiable information given to a covered Entity, like CHN, whether verbal, written or electronic needs to remain confidential. This includes information that can connect the patient to the medical record: Name Address Social Security Number & Other ID Numbers Medical Record Number (MRN) Physician’s Notes Billing Information

HIPAA: Privacy Rule Covered Entity: Any health plan, clearinghouse, or provider who transmits health information (CHN). Covered entities MUST: Allow patients to see and receive copies of their PHI and do so electronically. Designate a Privacy Officer and a means to contact him/her. Develop a Notice of Privacy Practice document for patients. Provide training to new employees and affiliates. Develop and utilize a complaints process. Ensure Business Associates also comply with the privacy regulations.

Hipaa: Privacy rule Business Associate: A person or organization that performs a function on behalf of a Covered Entity using individually identifiable information. Business Associates are required to sign a Business Associate Agreement. If the Business Associate should need to share information with another organization or subcontractor they must continue the same process of establishing the Business Associate Agreement. The chain on private information cannot be broken. Patients can file a grievance if they think their rights have been violated.

Hipaa: Privacy Rule Corrective action for HIPAA Privacy violation: CHN has a ZERO TOLERANCE POLICY for non-compliance in relation to Privacy Breaches, the non-compliant individual will be immediately dismissed. Violations of a severe nature may result in notification to law enforcement officials as well as regulating, accrediting, and/or licensing organizations.

HiPAA: PRIVACY OFFICER Privacy Officer-Director of Health Info Services Develops a Notice of Privacy Practice document. Investigates complaints and violations related to Privacy Breaches. Works with Compliance Officer to make sure Business Associates also comply with the privacy ruling. Ensures CHN and it’s employees are compliant in regards to the privacy rule. Ensures privacy standards comply with statutory and regulatory requirements. Maintains HIPAA privacy policies and procedures.

Hipaa: Security Rule Ensures that electronic information is kept private. Four Requirements of Security: Ensures confidentiality, integrity, and availability of electronic PHI. Protects against possible threats and hazards to the information. Hackers, viruses, natural disasters or system failures. Protects against unauthorized uses or disclosures. Ensures compliance by the workforce through security regulations and policies/procedures. Three Components of Security: Administrative Safeguards Physical Safeguards Technical Safeguards

HIPAA: Security Rule Administrative Safeguards: Documentation kept for 6 years. Corrective action for HIPAA security violation: Violations of a severe nature may result in notification to law enforcement officials as well as regulating, accrediting, and/or licensing organizations. Internal system audits minimize security violations. Logins, file accesses, and or security incidents. Information access management: Access to PHI based on what is needed to preform the job. Once computer access is requested, it will take 48-72 hours to implement due to complexity of security system. Security awareness and training: Security updates, incident reporting, log-in, and password management. Security incidents will be reported if suspected or if there is an actual breach. Name and phone number of person reporting the incident Date and time the incident was discovered Observed behaviors that led to the incident being suspected Any unusual circumstances surrounding the event

Hipaa: Security Rule Physical Safeguards: Safeguard the facility and equipment, from unauthorized physical access, tampering, and theft. Workstations positioned so monitor screens/ keyboards are not directly visible to unauthorized persons. Use of privacy screens when applicable. Physical access to the server room limited to key IT personnel. Staff complies with appropriate workstation access/use. Log on as themselves. Log off prior to leaving the workstation. Comply with all applicable password policies and procedures. Close files not in use.

Hipaa: Security Rule Physical Safeguards (Continued): Exercise caution when saving any files that may contain PHI or proprietary business information: Avoid saving such information whenever possible. If files containing EPHI must be saved, only store on CHN shared drives. NEVER save files containing EPHI or proprietary business information to a flash drive, laptop, or local PC harddrive If you have questions, or would like assistance properly securing files, please call the IT helpdesk (x6600) Report any concerns regarding data security to CHN’s IT Security Officer, Privacy Officer, or The Corporate Compliance Officer.

HIPAA: Security Rule Technical Safeguards: Access controls: User password setup is for one-time use initially. Allowing the individual to choose their own unique password for future access. User passwords reset every 180 days. Citrix sessions automatically close after 60 minutes of inactivity. Electronic “patient charts” will automatically close at different intervals depending on place within the program. Initial log-on screens close within seconds of inactivity. Screens further into specific modules, close and back up to the previous screen, ranging from seconds to minutes of inactivity. No downloading to laptops, tablets, or PC’s.

Hipaa security officer Security Officer- IT Manager Maintains appropriate security measures to guard against unauthorized access to electronically stored and/or transmitted patient data and protect against reasonably anticipated threats and hazards. Oversees and/or performs on-going security monitoring of organization information systems. Ensures compliance through adequate training programs and periodic security audits. Ensures security standards comply with statutory and regulatory requirements. Maintains HIPAA security policies and procedures.

Hipaa: Corporate Compliance HIPAA regulations are also overseen by the Corporate Compliance Officer as part of the CHN Corporate Compliance Plan. The Corporate Compliance Officer works with both the Privacy and Security Officer to ensure processes are in place to maintain compliance with HIPAA regulations. The Corporate Compliance Officer aids both the Privacy and Security Officer in investigating actual or suspected HIPAA violations. Privacy and Security breaches can be reported to the Corporate Compliance Officer

Hipaa violations Significant issues beyond CHN jurisdiction can be reported to : Centers for Medicare & Medicaid Services (CMS) Office for Civil Rights (OCR) Department of Justice (DOJ) Attorney General HIPAA violations can and do result in civil and criminal penalties, which could be faced individually : May range from a $100 civil penalty up to a maximum of $1,000,000 per year for each standard violated. May become a criminal penalty for knowingly disclosing PHI, a penalty that could escalate to a maximum of $25,000 for visibly malice offenses.

Who is responsible for HIPaa? EVERYONE at CHN (including our affiliates) has an obligation to maintain privacy and security, for example: IT Managers/Staff: Implement safeguards for the computer systems. Medical Professionals: Create and access the majority of patient information. Managers and Supervisors: Develop and implement policies and procedures that relate to security and ensure their staff are trained properly. Clerical Staff: Create and access patient information. Volunteers: Have access to patient information in various setting such as lobbies and waiting rooms.

Tips for Hipaa compliance Log on and off the network appropriately. Never let others use your ID or work under your ID. Do NOT write your password down. Do NOT disable anti-virus software or install unapproved software. Never introduce new hardware or media. E-mail may be, but is not always, a secure form of data transmission. Do NOT e-mail PHI outside of CHN unless entering “@encrypt” in the subject line to send encrypted. Only access PHI if you need it to preform your job. Be aware of, and report, security threats to the Security Officer. Put security safeguards on your mobile devices. Be careful and aware of who is around you when PHI is being discussed. Report lost or stolen laptops, tablets, or cell phones ASAP.

Following the presentation Be sure to complete the two required forms as documentation of completion. Successful completion of this on-line mandatory training is required to receive your computer access privileges. CHN HIPAA Security Quiz Policy – Internet/Intranet Acceptable Use **Complete both items and return them to the applicable Department (HR or Education) PRIOR to your first day.**