1 HIPAA Privacy and Security Cindy Cummings, RHIT.

Slides:



Advertisements
Similar presentations
HIPAA: An Overview of Transaction, Privacy and Security Regulations Training for Providers and Staff.
Advertisements

HITECH ACT Privacy & Security Requirements Cathleen Casagrande Privacy Officer July 23, 2009.
Privacy and Information Security Training ( ) VUMC Privacy Website
HIPAA Training: Health Insurance Portability and Accountability Act.
And the finer details of patient privacy TCH Confidential Understanding HIPAA.
Health Insurance Portability and Accountability Act HIPAA Education for Volunteers and Students.
HIPAA. What Why Who How When What Is HIPAA? Health Insurance Portability & Accountability Act of 1996.
HIPAA Privacy Keys to Success Education for Health Care Professionals.
HIPAA Basic Training for Privacy & Information Security Vanderbilt University Medical Center VUMC HIPAA Website:
Confidentiality and HIPAA
COBB/DOUGLAS COMMUNITY SERVICES BOARD Confidentiality and Privacy of Consumer Information.
LMC WHAT IS HIPAA AND HOW TO COMPLY WITH IT? Health Insurance Portability and Accountability Act of 1996.
Page 1 of 16 DMC HIPAA Privacy and Security DMC’S COMMITMENT TO COMPLIANCE: HIPAA PRIVACY and SECURITY DMC Corporate Audit and Compliance Department Detroit.
Breach SHOULD Be a Four Letter Word HIPAA Omnibus.
HIPAA Health Insurance Portability & Accountability Act.
HIPAA Health Insurance Portability and Accountability Act.
What is HIPAA? This presentation was created by The University of Arizona Privacy Office, The Office for the Responsible Conduct of Research on March 5,
1 HIPAA Education CCAC Professional Development Training September 2006 CCAC Professional Development Training September 2006.
Key Changes to HIPAA from the Stimulus Bill (ARRA) Children’s Health System Department Leadership Meeting October 28, 2009 Kathleen Street Privacy Officer/Risk.
NAU HIPAA Awareness Training
HIPAA Regulations What do you need to know?.
HIPAA HIPAA Health Insurance Portability and Accountability Act of 1996.
PRIVACY BREACHES A “breach of the security of the system”: –Is the “unauthorized acquisition of computerized data that compromises the security, confidentiality,
Responding to a Data Security Breach
SAFEGUARDING DHS CLIENT DATA PART 2 SAFEGUARDING PHI AND HIPAA Safeguards must: Protect PHI from accidental or intentional unauthorized use/disclosure.
Walking Through the Breach Notification Process - Beginning to End HIPAA COW Presentation and Panel April 8, 2011.
HIPAA What’s Said Here – Stays Here…. WHAT IS HIPAA  Health Insurance Portability and Accountability Act  Purpose is to protect clients (patients)
HIPAA Health Insurance Portability & Accountability Act of 1996.
HIPAA Basic Training for Privacy and Information Security Vanderbilt University Medical Center VUMC HIPAA Website: HIPAA Basic.
Columbia University Medical Center Health Insurance Portability and Accountability Act of 1996 (“HIPAA”) Privacy & Information Security Training 2009.
From HIPAA to HITECH OMH Briefing.
Milada R. Goturi Tonya M. Oliver Thompson Coburn LLP 1.
HIPAA Privacy & Security Kay Carolin Barbara Ann Karmanos Cancer Center March 2009.
HIPAA PRIVACY AND SECURITY AWARENESS.
Confidentiality, Consents and Disclosure Recent Legal Changes and Current Issues Presented by Pam Beach, Attorney at Law.
HIPAA OBJECTIVES  Define HIPAA  Define PHI  Use of PHI  Your rights  Your responsibilities.
Quality Integrity Stewardship Courtesy Care Accountability Medical Records ARMA Florida Gulf Coast Chapter Michael Spake Lakeland Regional Medical Center.
Privacy and Security Laws for Health Care Organizations Presented by Robert J. Scott Scott & Scott, LLP
How Hospitals Protect Your Health Information. Your Health Information Privacy Rights You can ask to see or get a copy of your medical record and other.
Arkansas State Law Which Governs Sensitive Information…… Part 3B
Privacy and Information Management ICT Guidelines.
HIPAA Training Developed for Ridgeview Institute 2012 Hospital Wide Orientation.
Health Insurance Portability and Accountability Act (HIPAA) CCAC.
Health Insurance Portability and Accountability Act of 1996 HIPAA Privacy Training for County Employees.
© 2013 The McGraw-Hill Companies, Inc. All rights reserved. Ch 8 Privacy Law and HIPAA.
HIPAA BASIC TRAINING Presented by Anderson Health Information Systems, Inc.
HIPAA Pre-Clerkship Review Dr. Maryann Skrabal, Pharm.D., CDE.
HIPAA THE PRIVACY RULE. 2 HISTORY In 2000, many patients that were newly diagnosed with depression received free samples of anti- depressant medications.
HealthBridge is one of the nation’s largest and most successful health information exchange organizations. Tri-State REC: Privacy and Security Issues for.
Rhonda Anderson, RHIA, President  …is a PROCESS, not a PROJECT 2.
HITECH and HIPAA Presented by Rhonda Anderson, RHIA Anderson Health Information Systems, Inc
A Road Map to Research at Jefferson: HIPAA Privacy and Security Rules for Researchers Presented By: Privacy Officer/Office of Legal Counsel October 2015.
Lessons Learned from Recent HIPAA Breaches HHS Office for Civil Rights.
We’ve Had A Breach – Now What? Garfunkel Wild, P.C. 411 Hackensack Avenue 6 th Floor Hackensack, New Jersey Broadway Albany,
HIPAA: Breach Notification By: Office of University Counsel For: Jefferson IRB Continuing Education September 2014.
AND CE-Prof, Inc. January 28, 2011 The Greater Chicago Dental Academy 1 Copyright CE-Prof, Inc
HIPAA for Students Health Insurance Portability and Accountability Act.
HIPAA HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT UI EMS Training Dept.
HIPAA TRIVIA Do you know HIPAA?. HIPAA was created by?  The Affordable Care Act  Health Insurance companies  United States Congress  United States.
HIPAA Training. What information is considered PHI (Protected Health Information)  Dates- Birthdays, Dates of Admission and Discharge, Date of Death.
The Health Insurance Portability and Accountability Act (HIPAA) requires Plumas County to train all employees in covered departments about the County’s.
Health Insurance Portability and Accountability Act (HIPAA) Primer for Observers, Volunteers, Medical Students Dr. Michael Palumbo- Privacy Officer/ EVP.
Properly Safeguarding Personally Identifiable Information (PII) Ticket Program Manager (TPM) Social Security’s Ticket to Work Program.
HIPAA Online Student Orientation
Health Insurance Portability and Accountability Act of 1996 (HIPAA)
HIPAA PRIVACY AWARENESS, COMPLIANCE and ENFORCEMENT
Disability Services Agencies Briefing On HIPAA
HIPAA SECURITY RULE Copyright © 2008, 2006, 2004 by Saunders an imprint of Elsevier Inc. All rights reserved.
Move this to online module slides 11-56
HIPAA Do’s and Don'ts: What is Really Behind Protected Health Information (PHI) and Health Care Privacy Rules Paul Sisler, Director, Information Services;
Presentation transcript:

1 HIPAA Privacy and Security Cindy Cummings, RHIT

2 Authorization – STILL NEED IT Facilities must obtain authorization from patients before using or sharing their PHI for reasons other than treatment, payment, or health care operations.

3 What is Confidential? Medical Record # Name Address Telephone Number Age Social Security # address Medical History Diagnosis Medications Observations And More

4 Breach Notification Requirements – This is New 2010 Individual Notices Media Notices Notice to the Secretary Notification of a Business Associate

5 Individual Notice Covered entities… That’s HOB Must notify affected individuals once we discover a breach of unsecured protected health information. Must provide this individual notice in writing by first-class mail, or alternatively, by if the affected individual has agreed to receive that way. If HOB has insufficient/ out-of-date contact information for 10 or more individuals, we must provide substitute individual notice –Post the notice on the home page of its web site –Or provide the notice in major print/ broadcast media to where the affected individuals likely reside. –Must include a toll-free number for individuals to contact HOB to determine if their protected health information was involved in the breach. – If fewer than 10 individuals, HOB may provide substitute notice by an alternative form of written, telephone, or other means.

6 The individual notifications must be provided without unreasonable delay –No later than 60 days following the discovery of a breach –Must include, to the extent possible, a description of the breach, a description of the types of information that were involved in the breach, the steps affected individuals should take to protect themselves from potential harm, a brief description of what the HOB is doing to investigate the breach, mitigate the harm, and prevent further breaches, contact information for the HOB Individual Notice

7 Media Notice IF HOB has a breach affecting more than 500 residents of a State/ jurisdiction/area….. –Besides notifying the affected individuals, HOB is required to.. –Provide notice to prominent media outlets serving the State or jurisdiction. –HOB would likely provide this notification in the form of a press release to appropriate media outlets serving the affected area Like individual notice, this media notification must be provided without unreasonable delay –No case later than 60 days following the discovery of a breach –Must include the same information required for the individual notice Notify the Secretary

8 Notice to the Secretary HHS In addition to notifying affected individuals and the media (where appropriate), HOB must notify the Secretary of breaches of unsecured protected health information. HOB notifies the Secretary by visiting the HHS web site and filling out and electronically submitting a breach report form. If a breach affects 500 or more individuals, covered entities must notify the Secretary without unreasonable delay and in no case later than 60 days following a breach. If, however, a breach affects fewer than 500 individuals, the covered entity may notify the Secretary of such breaches on an annual basis. Reports of breaches affecting fewer than 500 individuals are due to the Secretary no later than 60 days after the end of the calendar year in which the breaches occurred.

9 Notification by a Business Associate If a breach of unsecured protected health information occurs at or by a business associate, the business associate must notify HOB following the discovery of the breach. A business associate must provide notice to HOB without unreasonable delay and no later than 60 days from the discovery of the breach. To the extent possible, the business associate should provide HOB with the identification of each individual affected by the breach as well as any information required to be provided by HOB in its notification to affected individuals.

10 No Big Deal Right? Wrong!!!!!

11 Kentucky Hospital The Bowling Green Medical Center had a hard drive stolen that contained information on 5,418 patients. Information contained on hard drive: –Patient’s name-Weight –Birthdate- Height –Address- Menopause age –MR # –SS #

12 Massachusetts General Hospital The impermissible disclosure of PHI involved the loss of documents consisting of a patient schedule containing names and medical record numbers for a group of 192 patients, and billing encounter forms containing the name, date of birth, medical record number, health insurer and policy number, diagnosis and name of providers for 66 of those patients. These documents were lost on March 9, 2009, when a Mass General employee, while commuting to work, left the documents on the subway train that were never recovered. The General Hospital Corporation and Massachusetts General Physicians Organization Inc. (Mass General) has agreed to pay the U.S. government $1,000,000 to settle potential violations.

13 Federal Penalties for not Complying For the misuse of personally identifiable health information: Fines up to $50,000 and/or imprisonment for a term up to 1 Year For the misuse under false pretenses: Fines up to $100,000 and/or imprisonment for a term up to 5 Years For the misuse with the intent to sell, transfer, or use identifiable health information for commercial advantage, personal gain or malicious harm: Fines up to $250,000 and/or imprisonment for a term up to 10 Years

14 First Person Goes to Jail for HIPAA Violation Researcher from UCLA School of Medicine sentenced to 4 months in federal prison. Accessed confidential medical records without a valid reason.

Breach Notifications 137 breaches occurred for Hospice of the Bluegrass 19 of those breaches required the patient as well as the Secretary for the Dept. of Health and Human services to be notified. So How did HOB do in 2010?

16 Patient Variances 110 variances were related 3 variances involved other patient names included within a mailing 6 variances involved medications sent to wrong patient 12 variances involved a lost pager 2 variances involved staff members allowing non staff members to ride along on patient visits 1 variance involved a page sent to an entire site location rather than supervisor 137 breaches.. The breakdown

17 How to Protect Patient Privacy

18 What is Information Security? All the protections put into place to ensure ePHI is: –Kept confidential –Is not improperly altered or destroyed –And readily available to those who are authorized

19 Protect Patients’ Privacy Do not discuss patients in public areas such as elevators and cafeteria lines Do not leave information about a patient’s health on an answering machine

20 Always close curtains and speak softly when discussing treatments in semi-private rooms Always log off the computer when you’re finished Always dispose of patient information only in locked containers Protect Patients’ Privacy

21 Protecting Patient Information Keep your computer login and passwords a secret.

22 Rules for Using Computers Do not log into the system using someone else’s password Only access patient information that you need to do your job. Keep computer screens pointed away from the public Do not copy PHI onto a removable device such as a thumb drive, disc, etc. Protecting Patient Information

23 Hospice of the Bluegrass DOES NOT have encryption software that is needed to PHI outside of the HOB network. If the address does not end with “hospicebg.org” you CANNOT include PHI.

24 Practice Common Sense Security Keep Laptops and other portable devices locked when not in use Keep cell phones and pagers on your person at all times. Make sure doors and desks are locked as appropriate Physical Security

25 The most frequent risk to using PDAs and laptops is theft. When transporting laptops (or any patient information) it should be stored in the floorboard area or in the trunk. Keep your car locked at all times. X Physical Security

26 Sanctions Hospice of the Bluegrass takes seriously the responsibility of privacy/security of all PHI in its care. Failure to adequately ensure the privacy/security of PHI can result in disciplinary action against you, up to and including: Dismissal Termination of Business Contract Reporting the violation to licensing agencies and law enforcement officials.

27 Scenarios You’re at the grocery store……. You’re at church…….. You’re at the gas station…….. Your cell phone rings at home ……..