Protecting Client Data HIPAA, HITECH and PIPA Part 1A

Slides:



Advertisements
Similar presentations
Independent Contractor Orientation HIPAA What Is HIPAA? Health Insurance Portability and Accountability Act of 1996 The Health Insurance Portability.
Advertisements

Health Insurance Portability and Accountability Act HIPAA Education for Volunteers and Students.
HIPAA. What Why Who How When What Is HIPAA? Health Insurance Portability & Accountability Act of 1996.
Copyright Eastern PA EMS Council February 2003 Health Information Portability and Accountability Act It’s the law.
COBB/DOUGLAS COMMUNITY SERVICES BOARD Confidentiality and Privacy of Consumer Information.
The Health Insurance Portability and Accountability Act Basic HIPAA Training For CMU workforce with access to PHI.
HIPAA – Privacy Rule and Research USCRF Research Educational Series March 19, 2003.
Increasing public concern about loss of privacy Broad availability of information stored and exchanged in electronic format Concerns about genetic information.
The Health Insurance Portability and Accountability Act of 1996– charged the Department of Health and Human Services (DHHS) with creating health information.
HIPAA Health Insurance Portability and Accountability Act.
1 HIPAA Education CCAC Professional Development Training September 2006 CCAC Professional Development Training September 2006.
NAU HIPAA Awareness Training
HIPAA Health Insurance Portability and Accountability Act 1.
1 Louisiana Department of Health and Hospitals Basic HIPAA Privacy Training: Policies and Procedures 01/09/
 The Health Insurance Portability and Accountability Act of  Federal Law designed to protect sensitive information.  HIPAA violations are enforced.
Health Insurance Portability & Accountability Act “HIPAA” To every patient, every time, we will provide the care that we would want for our own loved ones.
Are you ready for HIPPO??? Welcome to HIPAA
Professional Nursing Services.  Privacy and Security Training explains:  The requirements of the federal HIPAA/HITEC regulations, state privacy laws.
HIPAA Training Presentation for New Employees How did we get here? HIPAA Police 1.
HIPAA What’s Said Here – Stays Here…. WHAT IS HIPAA  Health Insurance Portability and Accountability Act  Purpose is to protect clients (patients)
HIPAA Health Insurance Portability & Accountability Act of 1996.
Health Insurance Portability and Accountability Act (HIPAA)
Protected Health Information (PHI). Privileged Communication An exchange of information between two individuals in a confidential relationship. (Examples:
Paula Peyrani, MD Medical/Project Director, HIV Program at the 550 Clinic Assistant Director, Research Design and Development Clinical and Translational.
HIPAA PRIVACY AND SECURITY AWARENESS.
HIPAA Business Associates Leadership Group Meeting June 28, 2001.
1 Research & Accounting for Disclosures March 12, 2008 Leslie J. Pfeffer, BS, CHP Office of the Vice President for Research Administration Office of Compliance.
Privacy and Security of Protected Health Information NorthPoint Health & Wellness Center 2011.
1 HIPAA OVERVIEW ETSU. 2 What is HIPAA? Health Insurance Portability and Accountability Act.
HIPAA Privacy and Research August 21, 2015
August 8, 2011 Leslie J. Pfeffer, BS, CHP. Health Insurance Portability and Accountability Act HIPAA Privacy Rule April 14, 2003 HIPAA Security Rule April.
Arkansas State Law Which Governs Sensitive Information…… Part 3B
HIPAA Training Developed for Ridgeview Institute 2012 Hospital Wide Orientation.
HIPAA (health insurance portability and accountability act)
© 2009 The McGraw-Hill Companies, Inc. All rights reserved. 1 McGraw-Hill Chapter 2 The HIPAA Privacy Standards HIPAA for Allied Health Careers.
Medical Law and Ethics, Third Edition Bonnie F. Fremgen Copyright ©2009 by Pearson Education, Inc. Upper Saddle River, New Jersey All rights reserved.
Building a Privacy Foundation. Setting the Standard for Privacy Health Insurance Portability and Accountability Act (HIPAA) Patient Bill of Rights Federal.
Copyright © 2009 by The McGraw-Hill Companies, Inc. All Rights Reserved. McGraw-Hill Chapter 6 The Privacy and Security of Electronic Health Information.
Health Insurance Portability and Accountability Act of 1996 HIPAA Privacy Training for County Employees.
Understanding HIPAA (Health Insurandce Portability and Accountability Act)
PROTECTING CLIENT DATA HIPAA, HITECH AND PIPA PART 1B.
HIPAA THE PRIVACY RULE. 2 HISTORY In 2000, many patients that were newly diagnosed with depression received free samples of anti- depressant medications.
A Road Map to Research at Jefferson: HIPAA Privacy and Security Rules for Researchers Presented By: Privacy Officer/Office of Legal Counsel October 2015.
Configuring Electronic Health Records Privacy and Security in the US Lecture b This material (Comp11_Unit7b) was developed by Oregon Health & Science University.
HIPAA Overview Why do we need a federal rule on privacy? Privacy is a fundamental right Privacy can be defined as the ability of the individual to determine.
Table of Contents. Lessons 1. Introduction to HIPAA Go Go 2. The Privacy Rule Go Go.
Aged and Disabled Waiver (ADW) Health Insurance Portability and Accountability Act (HIPAA) Training 2015 October 2015.
HIPAA for Students Health Insurance Portability and Accountability Act.
HIPAA TRIVIA Do you know HIPAA?. HIPAA was created by?  The Affordable Care Act  Health Insurance companies  United States Congress  United States.
The Health Insurance Portability and Accountability Act (HIPAA) requires Plumas County to train all employees in covered departments about the County’s.
Privacy: HIPAA Emerson Murphy-Hill. Rosie Callender, RHIA, web.msm.edu/hipaa/An%20Introduction%20to%20HIPAA.ppt What is HIPAA? A Federal Law Created in.
HIPAA Privacy What Every Staff Member Needs to Know.
Reviewed by: Gunther Kohn Chief Information Officer, UB School of Dental Medicine Date: October 20, 2015 Approved by: Sarah L. Augustynek Compliance Officer,
Developed for Ridgeview Institute 2015 Hospital Wide Orientation
ELECTRONIC HEALTH RECORD PRIVACY TRAINING
HIPAA PRIVACY & SECURITY TRAINING
HIPAA Privacy & Security
2015 Orientation to HIPAA Privacy Rule Compliance
HIPAA Definitions What Does PHI Include?
Disability Services Agencies Briefing On HIPAA
The Health Insurance Portability and Accountability Act Basic HIPAA Training For CMU workforce with access to PHI.
The Health Insurance Portability and Accountability Act
HIPAA Privacy & Security
HIPAA Overview.
HIPAA & PHI TRAINING & AWARENESS
The Health Insurance Portability and Accountability Act
HIPAA Do’s and Don'ts: What is Really Behind Protected Health Information (PHI) and Health Care Privacy Rules Paul Sisler, Director, Information Services;
The Health Insurance Portability and Accountability Act
Presentation transcript:

Protecting Client Data HIPAA, HITECH and PIPA Part 1A 2014 DHS IT Security & Privacy Training

Module #1A Will Cover…. What is HIPAA? HIPAA & Privacy Security Rule Who does HIPAA apply to? HIPAA Terms Release of Information/Identity Verification Documenting Disclosure 2014 DHS IT Security & Privacy Training

Topics Continued…. Safeguarding Protective Health Information(PHI) and Personally Identifying Information (PII) Breach Notification Enforcement under HITECH Act Arkansas Personal Information Protection Act State Law Act 1526 2014 DHS IT Security & Privacy Training

What is HIPAA? HIPAA is a federal law named the Health Insurance Portability and Accountability Act. Its purpose is to provide a national standard for the protection of health information. State or other Federal laws may provide greater protections than HIPAA. 2014 DHS IT Security & Privacy Training

What is HIPAA Continued…. HIPAA applies to both: Privacy of confidential information Security of confidential information Privacy and Security of confidential information must work together. If you do not use one, the other will not work. 2014 DHS IT Security & Privacy Training

HIPAA and the Privacy Rule Protects individual health care data Defines how PHI may be used or disclosed Gives clients privacy rights and the right to access their health information Outlines ways to safeguard PHI Works with PIPA or Act 1526 The HIPAA Security Rule works with the Privacy Rule protecting electronic forms of PHI 2014 DHS IT Security & Privacy Training

Who Does HIPAA Apply to? DHS is a hybrid entity – meaning it has both covered and non-covered functions under HIPAA. Health Plans (DMS/Medicaid) Providers (DAAS, DBHS, DDS, DYS) health care providers who conduct one or more of the HIPAA-defined transactions electronically Business Associates: contractors who work for the divisions listed above. 2014 DHS IT Security & Privacy Training

Important HIPAA Terms Protected health information (PHI) is information which identifies an individual or offers a reasonable basis for identification and is created or received by a health plan or health care provider. It relates to past, present, or future physical or mental health, the provision of health care, or payment for health care. 2014 DHS IT Security & Privacy Training

HIPAA Terms Continued….. Use: When you review or use PHI within your division -- for example: for internal audits, training, customer service, quality improvement; Disclosure: When you release or provide PHI to someone outside your division -- for example: giving data to OCC or to an outside attorney or to another provider. 2014 DHS IT Security & Privacy Training

HIPAA Terms Continued…. Minimum Necessary: To use or disclose only the minimum necessary to accomplish the intended purposes of the use, disclosure or request. Employees must be given only the access to PHI needed to do their jobs; Outside organizations must only be given the PHI needed to accomplish the purpose for which the request was made; the exception is treatment requests. 2014 DHS IT Security & Privacy Training

Example Sally works in a DHS county office and sees one of her fellow caseworker’s file on the desk. She notices the name on the folder is her soon-to-be ex-husband’s girlfriend. Sally looks in the file and sees that she has applied for Medicaid and ARKids First. Sally is going through a bitter divorce along with a custody battle and thinks any information that she can give to her attorney will help her case. Sally makes copies of the file and takes it home with her and plans to show it to her attorney. Would this be a Permissible Use or Disclosure? 2014 DHS IT Security & Privacy Training

No – this is an impermissible disclosure under HIPAA. If you do not need PHI to do your job, then you should not access it. This is a HIPAA violation and may result in discipline and even termination. Never let anyone talk you into accessing information on a family member, friend, cousin, etc. If you are aware of someone who is accessing DHS data outside of the scope of their job, report it immediately. https://dhs.arkansas.gov/reporting 2014 DHS IT Security & Privacy Training

Where is PHI Found? PHI can in be found in: Client Folders Medical Records Invoices E-mails Letters 2014 DHS IT Security & Privacy Training

You May Be Asked To Disclose Information Containing PHI…. Often, PHI must be redacted or blacked out so that it is not visible before disclosing it. How do you know what to redact? On the next two slides we will go over what is considered the PHI Identifiers. These elements need to be redacted before disclosing PHI. 2014 DHS IT Security & Privacy Training

PHI Identifiers Names Medical Record Numbers Social Security Numbers Account Numbers License/Certification numbers Vehicle Identifiers/Serial numbers/License plate numbers Internet protocol addresses Health plan numbers 2014 DHS IT Security & Privacy Training

PHI Identifiers Continued… Full-face photographic images and any comparable images Any dates related to any individual (date of birth, telephone numbers) Fax numbers Email addresses Biometric identifiers including finger and voice prints Any other unique identifying number, characteristic or code that could reasonably be used to identify the owner of the PHI. 2014 DHS IT Security & Privacy Training

What is De-Identified Data? Under HIPAA's "safe harbor" standard, information is considered de-identified if all of the PHI Identifiers in the previous two slides have been removed, and there is no reasonable basis to believe that the remaining information could be used to identify a person. 2014 DHS IT Security & Privacy Training