Copyright© 2010 WeComply, Inc. All rights reserved. 4/28/2015 HIPAA Privacy and Security.

Slides:



Advertisements
Similar presentations
HIPAA: An Overview of Transaction, Privacy and Security Regulations Training for Providers and Staff.
Advertisements

Presented by Elena Chan, UCSF Pharm.D. Candidate Tiffany Jew, USC Pharm.D. Candidate March 14, 2007 P HARMACEUTICAL C ONSULTANTS, I NC. P RO P HARMA HIPAA.
HIPAA Basics Brian Fleetham Dickinson Wright PLLC.
HIPAA Privacy Training. 2 HIPAA Background Health Insurance Portability and Accountability Act of 1996 Copyright 2010 MHM Resources LLC.
Health Insurance Portability and Accountability Act HIPAA Education for Volunteers and Students.
HIPAA. What Why Who How When What Is HIPAA? Health Insurance Portability & Accountability Act of 1996.
HIPAA Privacy Rule Training
HIPAA Privacy Training Your Name Here. © 2004 MHM Resources Inc.2 HIPAA Background Health Insurance Portability and Accountability Act of 1996.
National Health Information Privacy and Security Week Understanding the HIPAA Privacy and Security Rule.
Increasing public concern about loss of privacy Broad availability of information stored and exchanged in electronic format Concerns about genetic information.
HIPAA PRIVACY REQUIREMENTS Dana L. Thrasher Constangy, Brooks & Smith, LLC (205) ; Victoria Nemerson.
What is HIPAA? This presentation was created by The University of Arizona Privacy Office, The Office for the Responsible Conduct of Research on March 5,
Health Insurance Portability and Accountability Act (HIPAA)HIPAA.
NAU HIPAA Awareness Training
HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT OF 1996 (HIPAA)
HIPAA: FEDERAL REGULATIONS REGARDING PATIENT SECURITY.
HIPAA Privacy Rule Compliance Training for YSU April 9, 2014.
COMPLYING WITH HIPAA PRIVACY RULES Presented by: Larry Grudzien, Attorney at Law.
HIPAA THE PRIVACY RULE Reviewed December HISTORY In 2000, many patients that were newly diagnosed with depression received free samples of anti-
2014 HIPAA Refresher Omnibus Rule & HIPAA Security.
Are you ready for HIPPO??? Welcome to HIPAA
HIPAA HIPAA Health Insurance Portability and Accountability Act of 1996.
Professional Nursing Services.  Privacy and Security Training explains:  The requirements of the federal HIPAA/HITEC regulations, state privacy laws.
Privacy, Security, Confidentiality, and Legal Issues
Copyright© 2011 WeComply, Inc. All rights reserved. 5/17/2015 FERC Standards of Conduct.
© Copyright 2014 Saul Ewing LLP The Coalition for Academic Scientific Computation HIPAA Legal Framework and Breach Analysis Presented by: Bruce D. Armon,
HIPAA COMPLIANCE IN YOUR PRACTICE MARIBEL VALENTIN, ESQUIRE.
Notice of Privacy Practices Nebraska SNIP Privacy Subgroup July 18, 2002 Michael J. Brown, MHA, CPA Vice-President, Administrative & Regulatory Affairs,
HIPAA PRIVACY AND SECURITY AWARENESS.
“ Technology Working For People” Intro to HIPAA and Small Practice Implementation.
Privacy and Security of Protected Health Information NorthPoint Health & Wellness Center 2011.
LAW SEMINARS INTERNATIONAL CLOUD COMPUTING: LAW, RISKS AND OPPORTUNITIES Developing Effective Strategies for Compliance With the HITECH Act and HIPAA’s.
Copyright ©2011 by Pearson Education, Inc. Upper Saddle River, New Jersey All rights reserved. Health Information Technology and Management Richard.
1 Copyright © 2011, 2007, 2003, 1999 by Saunders, an imprint of Elsevier Inc. All rights reserved. Privacy in the Physician’s Office Chapter 17.
How Hospitals Protect Your Health Information. Your Health Information Privacy Rights You can ask to see or get a copy of your medical record and other.
HIPAA Michigan Cancer Registrars Association 2005 Annual Educational Conference Sandy Routhier.
Medical Law and Ethics, Third Edition Bonnie F. Fremgen Copyright ©2009 by Pearson Education, Inc. Upper Saddle River, New Jersey All rights reserved.
Speak HIPAA Like a Native A Guide to Common HIPAA Nomenclature University of Miami Ethics Programs.
Health Insurance Portability and Accountability Act (HIPAA) CCAC.
Copyright © 2009 by The McGraw-Hill Companies, Inc. All Rights Reserved. McGraw-Hill Chapter 6 The Privacy and Security of Electronic Health Information.
Health Insurance Portability and Accountability Act of 1996 HIPAA Privacy Training for County Employees.
Understanding HIPAA (Health Insurandce Portability and Accountability Act)
© 2013 The McGraw-Hill Companies, Inc. All rights reserved. Ch 8 Privacy Law and HIPAA.
Chapter 7—Privacy Law and HIPAA
HIPAA BASIC TRAINING Presented by Anderson Health Information Systems, Inc.
HIPAA THE PRIVACY RULE. 2 HISTORY In 2000, many patients that were newly diagnosed with depression received free samples of anti- depressant medications.
The Culture of Healthcare Privacy, Confidentiality, and Security Lecture d This material (Comp2_Unit9d) was developed by Oregon Health and Science University,
Copyright ©2014 by Saunders, an imprint of Elsevier Inc. All rights reserved 1 Chapter 02 Compliance, Privacy, Fraud, and Abuse in Insurance Billing Insurance.
HIPAA Health Insurance Portability and Accountability Act of 1996.
A Road Map to Research at Jefferson: HIPAA Privacy and Security Rules for Researchers Presented By: Privacy Officer/Office of Legal Counsel October 2015.
1 Privacy Plan of Action © HIPAA Pros 2002 All rights reserved.
Copyright © 2015 by Saunders, an imprint of Elsevier Inc. All rights reserved. Chapter 3 Privacy, Confidentiality, and Security.
HIPAA Overview Why do we need a federal rule on privacy? Privacy is a fundamental right Privacy can be defined as the ability of the individual to determine.
The Health Insurance Portability and Accountability Act of 1996 “HIPAA” Public Law
HIPAA TRIVIA Do you know HIPAA?. HIPAA was created by?  The Affordable Care Act  Health Insurance companies  United States Congress  United States.
The Medical College of Georgia HIPAA Privacy Rule Orientation.
The Health Insurance Portability and Accountability Act (HIPAA) requires Plumas County to train all employees in covered departments about the County’s.
Copyright © 2009 by The McGraw-Hill Companies, Inc. All Rights Reserved. McGraw-Hill/Irwin Chapter 6 The Privacy and Security of Electronic Health Information.
HIPAA Training Workshop #3 Individual Rights Kaye L. Rankin Rankin Healthcare Consultants, Inc.
The Health Insurance Portability and Accountability Act 
HIPAA Privacy Rule Training
HIPAA PRIVACY & SECURITY TRAINING
HIPAA Privacy & Security
What is HIPAA? HIPAA stands for “Health Insurance Portability & Accountability Act” It was an Act of Congress passed into law in HEALTH INSURANCE.
HIPAA.
Disability Services Agencies Briefing On HIPAA
HIPAA Privacy & Security
HIPAA SECURITY RULE Copyright © 2008, 2006, 2004 by Saunders an imprint of Elsevier Inc. All rights reserved.
The Health Insurance Portability and Accountability Act
Presentation transcript:

Copyright© 2010 WeComply, Inc. All rights reserved. 4/28/2015 HIPAA Privacy and Security

Copyright© 2010 WeComply, Inc. All rights reserved. 4/28/2015 HIPAA Privacy and Security

Copyright© 2010 WeComply, Inc. All rights reserved. In the news…

Copyright© 2010 WeComply, Inc. All rights reserved. 8/11/20104 What Is HIPAA? Among HIPAA's primary purposes are — Privacy and security of healthcare information Standardization of healthcare data Simplification of healthcare operations to help reduce costs Insurance portability for individuals who change jobs or become unemployed Preventing discrimination against applicants or businesses Preventing fraud through stiffer penalties and tighter controls We must also comply with more restrictive state laws regarding privacy and security of healthcare information

Copyright© 2010 WeComply, Inc. All rights reserved. 8/11/20105 What Is HIPAA? Among HIPAA's primary purposes are — Privacy and security of healthcare information Standardization of healthcare data Simplification of healthcare operations to help reduce costs Insurance portability for individuals who change jobs or become unemployed Preventing discrimination against applicants or businesses Preventing fraud through stiffer penalties and tighter controls We must also comply with more restrictive state laws regarding privacy and security of healthcare information

Copyright© 2010 WeComply, Inc. All rights reserved. 8/11/20106 What Is HIPAA? (Cont’d) Among HIPAA's primary purposes are — Privacy and security of healthcare information Standardization of healthcare data Simplification of healthcare operations to help reduce costs Insurance portability for individuals who change jobs or become unemployed Preventing discrimination against applicants or businesses Preventing fraud through stiffer penalties and tighter controls We must also comply with more restrictive state laws regarding privacy and security of healthcare information

Copyright© 2010 WeComply, Inc. All rights reserved. 8/11/20107 Who Is Subject to HIPAA? Covered entities include hospitals, insurance companies, self-insured employers and small physician practices Three categories of covered entities: Healthcare plans Health providers Clearinghouses HIPAA applies to companies that offer healthcare and treatment to their employees on-site

Copyright© 2010 WeComply, Inc. All rights reserved. 8/11/20108 Who Is Subject to HIPAA? (cont’d) Business associates are individuals and businesses that help covered entities carry out healthcare activities and functions Auditors, consultants, lawyers Claims-processing firms, pharmacy benefit managers Business associates are subject to HIPAA in two ways: They must provide written assurance that they will use information only for proper purposes, safeguard information from misuse, and help covered entity comply with HIPAA privacy duties They must comply directly with HIPAA regulations requiring administrative, physical and technical safeguards for security of protected information

Copyright© 2010 WeComply, Inc. All rights reserved. 8/11/20109 Pop Quiz! What happens if a business associate of a covered entity violates HIPAA? A.The business associate will be subject to the same HIPAA penalties as the covered entity. B.The business associate will be liable to the covered entity only for breach of contract. C.Nothing – business associates aren't subject to HIPAA.

Copyright© 2010 WeComply, Inc. All rights reserved. 8/11/ Protected Health Information (PHI) Protected health information includes any part of an individual's medical record or payment history PHI concerns — Any past, present or future physical or mental health of an individual Providing healthcare to an individual Payment for healthcare of an individual Any identifiable health information becomes PHI under HIPAA Privacy Rule covers PHI in all forms, while the Security Rule covers only electronic PHI

Copyright© 2010 WeComply, Inc. All rights reserved. 8/11/ HIPAA Privacy A covered entity may use or disclose an individual's PHI only under these conditions: To communicate directly with the individual about his/her PHI With the individual's written authorization or other legal agreement Without the individual's authorization for treatment, payment and operations When using or disclosing PHI we must try to limit our use or disclosure as much as possible

Copyright© 2010 WeComply, Inc. All rights reserved. 8/11/ HIPAA Privacy (Cont’d) A covered entity may use or disclose an individual's PHI only under these conditions: To communicate directly with the individual about his/her PHI With the individual's written authorization or other legal agreement Without the individual's authorization for treatment, payment and operations When using or disclosing PHI we must try to limit our use or disclosure as much as possible

Copyright© 2010 WeComply, Inc. All rights reserved. 8/11/ Notice of Privacy Practices Covered entity must furnish Notice of Privacy Practices to individuals with whom it has direct treatment relationship At enrollment, within 60 days of material revision, and at least every three years To anyone who requests it On any website it maintains for customer-service or benefits information Covered entity must document compliance by retaining copies of issued notices Covered entity must make good-faith effort to obtain patient's written acknowledgment of receiving NPP

Copyright© 2010 WeComply, Inc. All rights reserved. 8/11/ Notice of Privacy Practices (cont’d) Covered entity must furnish Notice of Privacy Practices to individuals with whom it has direct treatment relationship At enrollment, within 60 days of material revision, and at least every three years To anyone who requests it On any website it maintains for customer-service or benefits information Covered entity must document compliance by retaining copies of issued notices Covered entity must make good-faith effort to obtain patient's written acknowledgment of receiving NPP

Copyright© 2010 WeComply, Inc. All rights reserved. 8/11/ Notice of Privacy Practices (cont’d) Covered entity must furnish Notice of Privacy Practices to individuals with whom it has direct treatment relationship At enrollment, within 60 days of material revision, and at least every three years To anyone who requests it On any website it maintains for customer-service or benefits information Covered entity must document compliance by retaining copies of issued notices Covered entity must make good-faith effort to obtain patient's written acknowledgment of receiving NPP

Copyright© 2010 WeComply, Inc. All rights reserved. 8/11/ Reasonable Safeguards Covered entity must use reasonable safeguards to protect confidentiality of PHI Speaking softly when discussing PHI in public spaces Not using name of individual whose PHI is being discussed Reminding employees to keep PHI secure at workstations and in public spaces Isolating and locking filing cabinets containing PHI Equipping computers with password-protected screensavers

Copyright© 2010 WeComply, Inc. All rights reserved. 8/11/ Using PHI for Marketing Covered entities may not disclose PHI for marketing purposes without patient's written authorization Covered entity does not need written authorization to communicate — To describe product or service provided by the covered entity For treatment purposes For case-management, care-coordination, or to recommend alternative therapies/providers For face-to-face communications For other communications that promote health in general manner

Copyright© 2010 WeComply, Inc. All rights reserved. 8/11/ Pop Quiz! PHI may be disclosed without the patient's written authorization in which of the following situations? A.Sending marketing literature about healthcare-related products to the patient. B.Sending marketing literature about non-healthcare-related products to the patient. C.Recommending any products to the patient in a face-to-face conversation.

Copyright© 2010 WeComply, Inc. All rights reserved. 8/11/ HIPAA Security Security Rule addresses creation, receipt, maintenance and transmission of electronic PHI by covered entities and their business associates Primary goals: To maintain confidentiality of stored and transmitted electronic PHI To protect electronic PHI from unauthorized creation, modification and deletion To ensure that electronic PHI is available to authorized individuals/entities when needed Requires administrative, physical and technical safeguards

Copyright© 2010 WeComply, Inc. All rights reserved. 8/11/ Administrative Safeguards Administrative safeguards: Security Officer responsible for the development and implementation of security policies Workforce Security plan for granting employees varying levels of access to PHI Contingency Plan for responding to emergencies and natural disasters Business Associate Contracts to protect confidentiality of PHI exchanged Termination Procedures to prevent terminated employee from having access to confidential information

Copyright© 2010 WeComply, Inc. All rights reserved. In the news…

Copyright© 2010 WeComply, Inc. All rights reserved. 8/11/ Physical Safeguards Physical safeguards: Facility Access Controls that allow only authorized access to places where PHI is kept Workstation Use procedures for PHI displayed on computer screens Workstation Security — secured rooms, curtains, partitions or user IDs/passwords for workstations on which PHI is processed Device and Media Controls for handling computer hardware and software, including proper disposal and storage

Copyright© 2010 WeComply, Inc. All rights reserved. 8/11/ Technical Safeguards Technical safeguards: Access Controls limiting PHI access on need-to-know basis based on roles and context Audit Controls for recording and examining system activity to eliminate unnecessary access to PHI Person or Entity Authentication using passwords, PIN numbers, biometrics or tokens to ensure only authorized access to PHI Transmission Security to protect PHI during transmission over electronic networks, including encryption, firewalls, SSL/TLS protocol and S/MIME support

Copyright© 2010 WeComply, Inc. All rights reserved. 8/11/ Pop Quiz! A pharmaceutical company set up a service to send regular messages to remind people to take their anti-depressant medication. Due to a programming error, each of the people who received an message could see the names and addresses of all of the others to whom reminder messages were sent. Does this present a HIPAA problem? A.Yes. B.Maybe, if the messages were not encrypted. C.No, because it was due to a programming error — not a breach of security.

Copyright© 2010 WeComply, Inc. All rights reserved. 8/11/ Handling PHI Follow these guidelines when handling PHI: Access PHI only to extent necessary to perform job-related functions Obtain authorization whenever using PHI for marketing purposes Destroy PHI once it is no longer needed Take steps to verify proper receipt of transmitted PHI Secure work areas by keeping documents containing PHI in locked cabinet and maintaining strong passwords on electronic systems Take special precautions while working in field or at home to ensure PHI is secured in laptop computers and briefcases

Copyright© 2010 WeComply, Inc. All rights reserved. 8/11/ Security Breach Secure PHI is information that is — Protected by a technology or methodology specified by HHS Rendered "unusable, unreadable, or indecipherable" to unauthorized persons Shredded/destroyed so that it cannot be read or reconstructed If there is a security breach involving unsecured PHI: Notice must be given to affected individuals If breach affects 500 or more individuals, notice must also be given Government and media Report security breach to your supervisor or Privacy Officer immediately

Copyright© 2010 WeComply, Inc. All rights reserved. 8/11/ Security Breach (Cont’d) Secure PHI is information that is — Protected by a technology or methodology specified by HHS Rendered "unusable, unreadable, or indecipherable" to unauthorized persons Shredded/destroyed so that it cannot be read or reconstructed If there is a security breach involving unsecured PHI: Notice must be given to affected individuals If breach affects 500 or more individuals, notice must also be given Government and media Report security breach to your supervisor or Privacy Officer immediately

Copyright© 2010 WeComply, Inc. All rights reserved. 8/11/ PHI Rights of Individuals Individuals have these rights over use and disclosure of their PHI: Covered entities must abide by individual's request not to divulge PHI if he/she is paying for full service cost Individuals are entitled to copies of records that covered entity keeps electronically Individuals have right to request that covered entity correct inaccurate PHI Covered entities maintaining electronic health records must provide accounting of all PHI disclosures during prior three years upon request Fundraisers must notify individuals of right to opt out of future fundraising solicitations

Copyright© 2010 WeComply, Inc. All rights reserved. 8/11/ Enforcement Failure to comply with HIPAA can lead to significant penalties: Civil fines from $100 to $50,000 for each violation up to $1.5 million per year Criminal penalties for basic offense may include fine of up to $50,000 and/or imprisonment for up to one year Criminal penalties for offense committed with intent to use PHI for commercial advantage may include fine up to $250,000 and/or imprisonment for up to ten years

Copyright© 2010 WeComply, Inc. All rights reserved. 8/11/ Enforcement (cont’d) Failure to comply with HIPAA can lead to significant penalties: Civil fines from $100 to $50,000 for each violation up to $1.5 million per year Criminal penalties for basic offense may include fine of up to $50,000 and/or imprisonment for up to one year Criminal penalties for offense committed with intent to use PHI for commercial advantage may include fine up to $250,000 and/or imprisonment for up to ten years

Copyright© 2010 WeComply, Inc. All rights reserved. 4/28/2015 Final Quiz

Copyright© 2010 WeComply, Inc. All rights reserved. 4/28/2015 Questions?

Copyright© 2010 WeComply, Inc. All rights reserved. 4/28/2015 Thank you for participating! This course and the related materials were developed by WeComply, Inc. and the Association of Corporate Counsel.