Health Insurance Portability & Accountability Act “HIPAA” To every patient, every time, we will provide the care that we would want for our own loved ones.

Slides:



Advertisements
Similar presentations
Independent Contractor Orientation HIPAA What Is HIPAA? Health Insurance Portability and Accountability Act of 1996 The Health Insurance Portability.
Advertisements

Privacy and Information Security Training ( ) VUMC Privacy Website
Health Insurance Portability and Accountability Act HIPAA Education for Volunteers and Students.
HIPAA. What Why Who How When What Is HIPAA? Health Insurance Portability & Accountability Act of 1996.
HIPAA Basic Training for Privacy & Information Security Vanderbilt University Medical Center VUMC HIPAA Website:
COBB/DOUGLAS COMMUNITY SERVICES BOARD Confidentiality and Privacy of Consumer Information.
The Health Insurance Portability and Accountability Act Basic HIPAA Training For CMU workforce with access to PHI.
HIPAA – Privacy Rule and Research USCRF Research Educational Series March 19, 2003.
Increasing public concern about loss of privacy Broad availability of information stored and exchanged in electronic format Concerns about genetic information.
The Health Insurance Portability and Accountability Act of 1996– charged the Department of Health and Human Services (DHHS) with creating health information.
Page 1 of 16 DMC HIPAA Privacy and Security DMC’S COMMITMENT TO COMPLIANCE: HIPAA PRIVACY and SECURITY DMC Corporate Audit and Compliance Department Detroit.
GBMC HIPAA Compliance Program
WORKFORCE CONFIDENTIALITY HIPAA Reminders. HIPAA 101 The Health Insurance Portability and Accountability Act (HIPAA) protects patient privacy. HIPAA is.
HIPAA Health Insurance Portability and Accountability Act.
Health Insurance Portability and Accountability Act (HIPAA)HIPAA.
1 HIPAA Education CCAC Professional Development Training September 2006 CCAC Professional Development Training September 2006.
NAU HIPAA Awareness Training
HIPAA Basics A Matter of Integrity. Introduction “A Matter of Integrity” defines HIPAA and protecting patient health information. Success depends on our.
Informed Consent.
 The Health Insurance Portability and Accountability Act of  Federal Law designed to protect sensitive information.  HIPAA violations are enforced.
Are you ready for HIPPO??? Welcome to HIPAA
Professional Nursing Services.  Privacy and Security Training explains:  The requirements of the federal HIPAA/HITEC regulations, state privacy laws.
Protecting Client Data HIPAA, HITECH and PIPA Part 1A
HIPAA Training Presentation for New Employees How did we get here? HIPAA Police 1.
HIPAA What’s Said Here – Stays Here…. WHAT IS HIPAA  Health Insurance Portability and Accountability Act  Purpose is to protect clients (patients)
HIPAA Health Insurance Portability & Accountability Act of 1996.
HIPAA Basic Training for Privacy and Information Security Vanderbilt University Medical Center VUMC HIPAA Website: HIPAA Basic.
HIPAA Privacy & Security EVMS Health Services 2004 Training.
Columbia University Medical Center Health Insurance Portability and Accountability Act of 1996 (“HIPAA”) Privacy & Information Security Training 2009.
Protected Health Information (PHI). Privileged Communication An exchange of information between two individuals in a confidential relationship. (Examples:
Paula Peyrani, MD Medical/Project Director, HIV Program at the 550 Clinic Assistant Director, Research Design and Development Clinical and Translational.
HIPAA Privacy & Security Kay Carolin Barbara Ann Karmanos Cancer Center March 2009.
HIPAA PRIVACY AND SECURITY AWARENESS.
HIPAA Business Associates Leadership Group Meeting June 28, 2001.
1 Research & Accounting for Disclosures March 12, 2008 Leslie J. Pfeffer, BS, CHP Office of the Vice President for Research Administration Office of Compliance.
Privacy and Security of Protected Health Information NorthPoint Health & Wellness Center 2011.
1 HIPAA OVERVIEW ETSU. 2 What is HIPAA? Health Insurance Portability and Accountability Act.
Next ETCH Confidentiality and HIPAA Annual Review What you need to know. The Privacy Rule 1.
Copyright ©2011 by Pearson Education, Inc. Upper Saddle River, New Jersey All rights reserved. Health Information Technology and Management Richard.
HIPAA Training Developed for Ridgeview Institute 2012 Hospital Wide Orientation.
Patient Data Security and Privacy Lecture # 7 PHCL 498 Amar Hijazi, Majed Alameel, Mona AlMehaid.
© 2009 The McGraw-Hill Companies, Inc. All rights reserved. 1 McGraw-Hill Chapter 2 The HIPAA Privacy Standards HIPAA for Allied Health Careers.
HIPAA THE PRIVACY RULE. 2 HISTORY In 2000, many patients that were newly diagnosed with depression received free samples of anti- depressant medications.
Western Asset Protection
Copyright © 2015 by Saunders, an imprint of Elsevier Inc. All rights reserved. Chapter 3 Privacy, Confidentiality, and Security.
Configuring Electronic Health Records Privacy and Security in the US Lecture b This material (Comp11_Unit7b) was developed by Oregon Health & Science University.
HIPAA HEALTH INSURANCE PORTABILITY ACOUNTABILITY ACT.
HIPAA for Students Health Insurance Portability and Accountability Act.
HIPAA TRIVIA Do you know HIPAA?. HIPAA was created by?  The Affordable Care Act  Health Insurance companies  United States Congress  United States.
HIPAA Training. What information is considered PHI (Protected Health Information)  Dates- Birthdays, Dates of Admission and Discharge, Date of Death.
The Medical College of Georgia HIPAA Privacy Rule Orientation.
Final HIPAA Privacy Rule: The Research Provisions Julie Kaneshiro DHHS Office for Human Research Protections Phone: Fax:
The Health Insurance Portability and Accountability Act (HIPAA) requires Plumas County to train all employees in covered departments about the County’s.
Health Insurance Portability and Accountability Act (HIPAA) Primer for Observers, Volunteers, Medical Students Dr. Michael Palumbo- Privacy Officer/ EVP.
Reviewed by: Gunther Kohn Chief Information Officer, UB School of Dental Medicine Date: October 20, 2015 Approved by: Sarah L. Augustynek Compliance Officer,
The Health Insurance Portability and Accountability Act 
Developed for Ridgeview Institute 2015 Hospital Wide Orientation
HIPAA PRIVACY & SECURITY TRAINING
HIPAA Privacy & Security
No No, Yes Yes: Simple Privacy & Information Security Tips Krista Barnes, J.D. Senior Legal Officer and Director, Privacy & Information Security, Institutional.
Disability Services Agencies Briefing On HIPAA
The Health Insurance Portability and Accountability Act Basic HIPAA Training For CMU workforce with access to PHI.
The Health Insurance Portability and Accountability Act
HIPAA Privacy & Security
HIPAA Overview.
The Health Insurance Portability and Accountability Act
HIPAA & PHI TRAINING & AWARENESS
The Health Insurance Portability and Accountability Act
The Health Insurance Portability and Accountability Act
Presentation transcript:

Health Insurance Portability & Accountability Act “HIPAA” To every patient, every time, we will provide the care that we would want for our own loved ones. Health, healing and hope.

The Privacy Rule Protects information known as PROTECTED HEALTH INFORMATION (PHI) that exists in written, oral and electronic formats.

Examples of PHI Name Date of Birth Fax Number Account Number Web Universal Resource Locator (URL) Street Address Electronic mail address Certificate/License Number License Plate Number City Discharge Date Social Security Number Vehicle and Serial Number Device Identifier and Serial Number Precinct Date of Death Medical Record Number Internet Protocol Number Full Face Photographic Images Zip Code Telephone Number Health Plan Beneficiary Number Biometrics Identifiers (i.e. finger prints) Any other Unique Identifying Number, Characteristic, or Code

The Privacy Rule Limits the way in which members of the GBMC workforce may use and disclose (release) PHI. GBMC workforce must have a job-related reason to use or disclose PHI. Requires that all GBMC workforce use only the minimum amount of PHI necessary to get the job done. This is what HIPAA defines as the MINIMUM NECESSARY standard. “Workforce” means employees, volunteers, trainees, and other persons who conduct work for GBMC and are under the direct control of GBMC, whether or not they are paid by GBMC.

The Privacy Rule Provides patients with certain rights – these rights are commonly referred to as the PATIENT PRIVACY RIGHTS. These rights are communicated to the patient in the Notice of Privacy Practices. If a patient wishes to exercise any of these Patient Privacy Rights (which are outlined on the next slide), they must do so in writing. You should contact Medical Records Correspondence Department ( ) for the correct forms.

The Patient Privacy Rights Right to access PHI. Right to request an amendment to PHI. Right to request restrictions on how PHI is used for treatment, payment, and healthcare operations. Right to receive confidential communications. Right to request an accounting of disclosures. Right to complain to the Department of Health and Human Services’ Office for Civil Rights.

HIPAA Privacy The Notice of Privacy Practices The Notice is a useful tool not only for you but also for the patient. The NOPP: * describes how GBMC may use a patient’s PHI * provides a clear and concise description of the patient’s rights * discusses how a patient may opt-out of the facility directory * discusses how the medical staff may interact with the patient’s family

The Privacy Rule Requires that GBMC provide a way for patients and workforce to REPORT PRIVACY CONCERNS or ask privacy questions. Reporting Privacy Concerns Stacey McGreevy, GBMC Privacy Officer HIPAA GroupWise Resource To send an , type in HIPAA the “To” field The Business Ethics Line is now the Privacy Hotline too The Compliance Home Page GBMC Infoweb is your source for HIPAA information

Privacy Compliance Tips Keep all PHI locked and secured when you are away from your work area. Do not include any patient identifiers in the subject line of an . Do not discuss PHI in public or common areas. Make sure to check the fax number for accuracy before sending a fax that contains PHI. All faxes must include a completed GBMC standard fax cover sheet (see fax policy for limited exceptions). If a fax is sent to the wrong recipient in error, you must complete the Accounting of Disclosures log located on the Compliance page of the InfoWeb and send it to Medical Records. Sign-in sheets are allowed as long as we continue to follow the standard protocols that have always been in place at GBMC. Sign-in sheets should be limited to patient name and appointment time.

The Security Rule Requires administrative, physical, and technical safeguards be implemented to address the confidentiality, integrity, and availability of ELECTRONIC PROTECTED HEALTH INFORMATION (ePHI). Security of patient information is EVERYONE’S job! We owe it to our patients! Electronic Protected Health Information

The Security Rule Requires GBMC provide each computer system user with a unique user identity. You user identity is the combination of your user ID and your password – do not share or write down your password where it can be easily retrieved by someone other than you. Your user identity is what is used to monitor your activity on the system (s). Do not leave yourself signed onto a computer and then walk away without signing off. You are responsible for any activity that occurs under your user identity. Your user identity appears on audit reports which are frequently monitored. User Identity

Security Compliance Tips Do not store electronic patient health information (ePHI) on your local drive (C:). If you use mobile media devices such as laptops and USB drives, make sure they are encrypted. Avoid ing PHI but if it is necessary, be sure to encrypt the by typing the word “SECURE” as the first word in the subject line of the . If you believe the PHI in paper or electronic form has been used or released in an unauthorized manner, contact the Privacy Office at

Protecting Your Password In order to protect against unauthorized access to our computers, GBMC has taken appropriate steps to monitor all activity on the network to ensure that people are not trying to break-in to those systems. However, as a user of a GBMC system, it is important that you also take measures to ensure that people cannot access GBMC systems – that is partly accomplished through password management. Password management includes selecting a strong password, protecting your password, as well as frequently changing your password. Password Management

Examples of How to Create a Strong Password 1.Mix upper and lowercase characters ○ 3bLINdmice ○ 5gOLDenrings ○ 4cALLingbirdS 2.Replace letters with numbers ○ Replace “E” with “3” ■ “Sp3cial” or “3l3gant” 3.Combine two words by using a special character ○ Roof^Top ○ Sugar$Daddy ○ 4.Use the first letter from each word of a phrase from a song ○ “Oops! I did it again” becomes “O!idia” In general, passwords should have a minimum length of 6 characters but each application may have other requirements/limitations. Password Management