U NDERSTANDING HIPAA C OMPLIANCE I N 2014: E THICS, T ECHNOLOGY, H EALTHCARE & LIFE J ULIE M EADOWS -K EEFE G ROSSMAN, F URLOW, AND B AYÓ, LLC 2022-2 R.

Slides:



Advertisements
Similar presentations
Property Inventory Valuation Replacement Cost Value The amount it would take to replace property with like property of the same quality and construction.
Advertisements

HITECH ACT Privacy & Security Requirements Cathleen Casagrande Privacy Officer July 23, 2009.
“Reaching across Arizona to provide comprehensive quality health care for those in need” Our first care is your health care Arizona Health Care Cost Containment.
HIPAA Basics Brian Fleetham Dickinson Wright PLLC.
HIPAA Basics November 1, 2014.
HIPAA Privacy Training. 2 HIPAA Background Health Insurance Portability and Accountability Act of 1996 Copyright 2010 MHM Resources LLC.
Health Insurance Portability and Accountability Act HIPAA Education for Volunteers and Students.
What is HIPAA? This presentation was created by The University of Arizona Privacy Office, The Office for the Responsible Conduct of Research on March 5,
Key Changes to HIPAA from the Stimulus Bill (ARRA) Children’s Health System Department Leadership Meeting October 28, 2009 Kathleen Street Privacy Officer/Risk.
1 Louisiana Department of Health and Hospitals Basic HIPAA Privacy Training: Policies and Procedures 01/09/
HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT OF 1996 (HIPAA)
HIPAA Regulations What do you need to know?.
 The Health Insurance Portability and Accountability Act of  Federal Law designed to protect sensitive information.  HIPAA violations are enforced.
COMPLYING WITH HIPAA PRIVACY RULES Presented by: Larry Grudzien, Attorney at Law.
HIPAA THE PRIVACY RULE Reviewed December HISTORY In 2000, many patients that were newly diagnosed with depression received free samples of anti-
2014 HIPAA Refresher Omnibus Rule & HIPAA Security.
Jill Moore April 2013 HIPAA Update: New Rules, New Challenges.
Are you ready for HIPPO??? Welcome to HIPAA
Privacy, Security and Compliance Concerns for Management and Boards November 15, 2013 Carolyn Heyman-Layne, Esq. 1.
Health information security & compliance
Health Insurance Portability & Accountability Act (HIPAA)
PRIVACY BREACHES A “breach of the security of the system”: –Is the “unauthorized acquisition of computerized data that compromises the security, confidentiality,
RMG:Red Flags Rule 1 Regal Medical Group Red Flags Rule Identify Theft Training.
March 19, 2009 Changes to HIPAA Privacy and Security Requirements Joel T. Kopperud Scott A. Sinder Rhonda M. Bolton.
Walking Through the Breach Notification Process - Beginning to End HIPAA COW Presentation and Panel April 8, 2011.
© Copyright 2014 Saul Ewing LLP The Coalition for Academic Scientific Computation HIPAA Legal Framework and Breach Analysis Presented by: Bruce D. Armon,
Version 6.0 Approved by HIPAA Implementation Team April 14, HIPAA Learning Module The following is an educational Powerpoint presentation on the.
HIPAA COMPLIANCE IN YOUR PRACTICE MARIBEL VALENTIN, ESQUIRE.
Columbia University Medical Center Health Insurance Portability and Accountability Act of 1996 (“HIPAA”) Privacy & Information Security Training 2009.
Health Information Technology for Economic and Clinical Health Act (HITECH)
HIPAA PRIVACY AND SECURITY AWARENESS.
Confidentiality, Consents and Disclosure Recent Legal Changes and Current Issues Presented by Pam Beach, Attorney at Law.
Dealing with Business Associates Business Associates Business Associates are persons or organizations that on behalf of a covered entity: –Perform any.
Quality Integrity Stewardship Courtesy Care Accountability Medical Records ARMA Florida Gulf Coast Chapter Michael Spake Lakeland Regional Medical Center.
The New HIPAA Era: What's New, What's Different and What's Actually Important Kirk J. Nahra Wiley Rein LLP Washington, D.C
Copyright ©2011 by Pearson Education, Inc. Upper Saddle River, New Jersey All rights reserved. Health Information Technology and Management Richard.
HIPAA Michigan Cancer Registrars Association 2005 Annual Educational Conference Sandy Routhier.
Understanding HIPAA (Health Insurandce Portability and Accountability Act)
A PRACTICAL GUIDE TO RESPONDING TO A HEALTHCARE DATA SECURITY BREACH May 19, 2011 | State College, PA Matthew H. Meade Stephanie Winer-Schreiber.
© 2013 The McGraw-Hill Companies, Inc. All rights reserved. Ch 8 Privacy Law and HIPAA.
HIPAA BASIC TRAINING Presented by Anderson Health Information Systems, Inc.
HIPAA PRACTICAL APPLICATION WORKSHOP Orientation Module 1B Anderson Health Information Systems, Inc.
HIPAA THE PRIVACY RULE. 2 HISTORY In 2000, many patients that were newly diagnosed with depression received free samples of anti- depressant medications.
HealthBridge is one of the nation’s largest and most successful health information exchange organizations. Tri-State REC: Privacy and Security Issues for.
Rhonda Anderson, RHIA, President  …is a PROCESS, not a PROJECT 2.
C HAPTER 34 Code Blue Health Sciences Edition 4. Confidentiality of sensitive information is an important issue in healthcare. Breaches of confidentiality.
Snowe Amendment to the Wired Act William F. Pewen, Ph.D., M.P.H. Office of Senator Olympia J. Snowe, ME (202)
A Road Map to Research at Jefferson: HIPAA Privacy and Security Rules for Researchers Presented By: Privacy Officer/Office of Legal Counsel October 2015.
Welcome….!!! CORPORATE COMPLIANCE PROGRAM Presented by The Office of Corporate Integrity 1.
Lessons Learned from Recent HIPAA Breaches HHS Office for Civil Rights.
Copyright © 2015 by Saunders, an imprint of Elsevier Inc. All rights reserved. Chapter 3 Privacy, Confidentiality, and Security.
1 Changes to Privacy Regulations under ARRA May 4, 2009 Melissa Goldstein, J.D. The George Washington University School of Public Health and Health Services.
Top 10 Series Changes to HIPAA Devon Bernard AOPA Reimbursement Services Coordinator.
HIPAA: Breach Notification By: Office of University Counsel For: Jefferson IRB Continuing Education September 2014.
AND CE-Prof, Inc. January 28, 2011 The Greater Chicago Dental Academy 1 Copyright CE-Prof, Inc
HIPAA/HITECH TRAINING. Why are we here?  HIPAA  HITECH  PHI  Minimum Necessary “Need to Know”  Breaches and Fines.
HIPAA TRIVIA Do you know HIPAA?. HIPAA was created by?  The Affordable Care Act  Health Insurance companies  United States Congress  United States.
HIPAA Training. What information is considered PHI (Protected Health Information)  Dates- Birthdays, Dates of Admission and Discharge, Date of Death.
PHASE II OF HIPAA AUDIT PROGRAM June 2016 Presented by John P. Murdoch II, Esq. of Wilentz, Goldman & Spitzer, P.A. Two Industrial Way West Two Industrial.
BlueCross BlueShield of Tennessee, Inc., an Independent Licensee of the BlueCross BlueShield Association. This document has been classified as public Information.
HIPAA: So You Think You’re Compliant September 1, 2011 Carolyn Heyman-Layne, J.D.
PHI Breach PHI Breach Dealing Breach With HIPAA Guidelines Guidelines.
HIPAA THE PRIVACY RULE Reviewed December 2012.
Privacy & Information Security Basics
Enforcement, Business Associates and Breach Notification. Oh my!
HIPAA PRIVACY AWARENESS, COMPLIANCE and ENFORCEMENT
Disability Services Agencies Briefing On HIPAA
The Health Insurance Portability and Accountability Act
School of Medicine Orientation Information Security Training
Presentation transcript:

U NDERSTANDING HIPAA C OMPLIANCE I N 2014: E THICS, T ECHNOLOGY, H EALTHCARE & LIFE J ULIE M EADOWS -K EEFE G ROSSMAN, F URLOW, AND B AYÓ, LLC R AYMOND D IEHL R D. T ALLAHASSEE, FL (850) J. MEADOWS - GFBLAWFIRM. COM

D OES IT P UT Y OU I N A B AD M OOD ?

H OW M UCH P RIVACY D O Y OU H AVE ? How Much Privacy Are You Willing To Give Up?

P ERCEIVED B ARRIERS ?

W IRED M AGAZINE  The age of the password has come to an end; we just haven’t realized it yet. And no one has figured out what will take its place. What we can say for sure is this: Access to our data can no longer hinge on secrets—a string of characters, 10 strings of characters, the answers to 50 questions—that only we’re supposed to know. The Internet doesn’t do secrets. Everyone is a few clicks away from knowing everything.

S O W E R ECOGNIZE W E A RE A LL V ULNERABLE

 “A stolen medical identity has a $50 street value – whereas a stolen social security number, on the other hand, only sells for $1.00” said Kirk Herath, Nationwide Chief Privacy Officer.

F ACTS A BOUT M EDICAL I DENTITY T HEFT  1.5 Million American Affected  Average cost to restore identity is over $20,000.  Medical identity theft comprises 3% of all identity thefts  Nearly half of victims lose their coverage  Can take a year to discover  Healthcare was most breached industry in 2011

S O W HAT D OES HIPAA D O ?  HIPAA sets a national standard for accessing and handling medical information  Access to your own medical records, prior to HIPAA, was not guaranteed by federal law.  Notice of privacy practices about how your medical information is used and disclosed must now be given to you.  An accounting of disclosures

HIPAA 1996

1996 M AC

P OPULAR S ONG & D ANCE IN 1996

I N 1996  Google.com didn’t exist yet.  In January 1996 there were only 100,000 websites, compared to more than 160 million in  The web browser of choice was Netscape Navigator, followed by Microsoft Internet Explorer as a distant second (Microsoft launched IE 3 in 1996).  Most people used dial-up Internet connections

ARRA  February 17, ARRA Signed into Law. Also known as the “Stimulus” $ 25.8 Billion for Health IT  Increased Regulation of Organizations Contracting with Covered Entities  Covered Entities Must Carefully Monitor Disclosures of PHI  Increased Limitations on use of PHI  Increased Penalties and Enforcement Mechanisms  Breach notification and reporting requirements.

E VIDENCE B ASED M EDICINE  Conscientious, explicit and judicious use of current best evidence in making decisions about the care of individual patients  Use of mathematical estimates of the risk of benefit and harm, derived from high-quality research on population samples, to inform clinical decision- making in the diagnosis, investigation or management of individual patients."

B IG D ATA How much regulation is needed for electronic health records and systems? How much is too much? Does technology harm patients? How much risk do patients face in the era of "big data?“ Can data reach level of necessary granularity to only show minimum amount of data necessary to provide a particular treatment?

E XPRESS S CRIPTS H AS B IG D ATA  Provides Pharmacy Benefits to over 100 million people.  They see 1.4 billion prescriptions a year, each one of which generates adds a little more data to their pile.  They now have 100 people sorting through that information trying to detect fraud. They've got nurses and pharmacists and forensic accountants, along with a group of data nerds investigating thousands of cases of shady dealings a year.

S OME F EAR

W HAT IS A “B REACH ?”  A breach is, generally, an impermissible use or disclosure under the Privacy Rule that compromises the security or privacy of the protected health information such that the use or disclosure poses a significant risk of financial, reputational, or other harm to the affected individual.  There are three exceptions to the definition of “breach.” The first exception applies to the unintentional acquisition, access, or use of protected health information by a workforce member acting under the authority of a covered entity or business associate. The second exception applies to the inadvertent disclosure of protected health information from a person authorized to access protected health information at a covered entity or business associate to another person authorized to access protected health information at the covered entity or business associate. In both cases, the information cannot be further used or disclosed in a manner not permitted by the Privacy Rule. The final exception to breach applies if the covered entity or business associate has a good faith belief that the unauthorized individual, to whom the impermissible disclosure was made, would not have been able to retain the information.

T AKE -A WAY  PLEASE MAKE SURE ALL STAFF ARE UTILIZING ENCRYPTION FOR TRANSMISSION OF PHI.

B REACHES B IG IN O MNIBUS  the nature and extent of the protected health information involved, including the types of identifiers and the likelihood of re-identification  the unauthorized person who used the protected health information or to whom the disclosure was made  whether the protected health information was actually acquired or viewed  the extent to which the risk to the protected health information has been mitigated

B REACHES S O F AR  January, 2013-First HIPAA breach settlement involving less than 500 patients (Idaho Hospice)  April 2012 HHS settles case with Phoenix Cardiac Surgery for lack of HIPAA safeguards

A LASKA D EPARTMENT OF H EALTH AND H UMAN S ERVICES  Settled for 1.7 million dollars.  One lost unencrypted flash drive from an employee’s car led to extensive HHS investigation.  Insufficient training and risk assessment.

2013 V ERIZON B REACH R EPORT  THREAT ACTORS  External 92%  Internal 14%  Partners 1%

T HREAT A CTIONS  Malware10%  Hacking52%  Social29%  Misuse13%  Physical35%  Error2%

A TTACKED ENTITIES  Financial Organizations37%  Utilities24%  Manufacturing, transportation20%  Healthcare organizations0.90%

B USINESS A SSOCIATE R EQUIREMENTS Extends HIPAA’s requirements, not just to business associates, but to subcontractors that handle protected health information on behalf of business associates

N OTICE OF P RIVACY P RACTICES  Need to revise to reflect patient’s right to receive breach notifications.

R EQUEST FOR R ESTRICTIONS  Specifically, covered entities must agree to restrict disclosures of protected health information about the individual if the disclosure is for payment or healthcare operations purposes, is not required by law, and the protected health information pertains solely to a healthcare item or service for which the individual, or someone on the individual's behalf other than the health plan, has paid the covered entity in full.

J ULIE ’ S S TORY  Real-life experience with too much data being included in an EHR.  y5j9Q

L ICENSURE  Licensure involves providing a full explanation and record documenting any affirmative responses to health questions, including emotional/mental illness, chemical dependency.

J ULIE M EADOWS -K EEFE G ROSSMAN, F URLOW, AND B AYÓ R AYMOND D IEHL RD. T ALLAHASSEE, FL (850) J. MEADOWS - GFBLAWFIRM. COM THANK YOU