Presented by: Roberta Ward CDHS Privacy Officer Phone: (916) 440-7750 www.dhs.ca.gov/privacyoffice.

Slides:



Advertisements
Similar presentations
Independent Contractor Orientation HIPAA What Is HIPAA? Health Insurance Portability and Accountability Act of 1996 The Health Insurance Portability.
Advertisements

Health Insurance Portability and Accountability Act HIPAA Education for Volunteers and Students.
COBB/DOUGLAS COMMUNITY SERVICES BOARD Confidentiality and Privacy of Consumer Information.
The Health Insurance Portability and Accountability Act Basic HIPAA Training For CMU workforce with access to PHI.
HIPAA – Privacy Rule and Research USCRF Research Educational Series March 19, 2003.
Increasing public concern about loss of privacy Broad availability of information stored and exchanged in electronic format Concerns about genetic information.
Page 1 of 16 DMC HIPAA Privacy and Security DMC’S COMMITMENT TO COMPLIANCE: HIPAA PRIVACY and SECURITY DMC Corporate Audit and Compliance Department Detroit.
WORKFORCE CONFIDENTIALITY HIPAA Reminders. HIPAA 101 The Health Insurance Portability and Accountability Act (HIPAA) protects patient privacy. HIPAA is.
HIPAA Health Insurance Portability and Accountability Act.
1 HIPAA Education CCAC Professional Development Training September 2006 CCAC Professional Development Training September 2006.
Key Changes to HIPAA from the Stimulus Bill (ARRA) Children’s Health System Department Leadership Meeting October 28, 2009 Kathleen Street Privacy Officer/Risk.
Informed Consent.
June 04, 2013 Robin Thomas, NC III, Presenter. PRIVACY BREACHES A privacy breach is an unauthorized disclosure of PHI/PCI violating either Federal or.
 The Health Insurance Portability and Accountability Act of  Federal Law designed to protect sensitive information.  HIPAA violations are enforced.
Health Insurance Portability & Accountability Act “HIPAA” To every patient, every time, we will provide the care that we would want for our own loved ones.
HIPAA THE PRIVACY RULE Reviewed December HISTORY In 2000, many patients that were newly diagnosed with depression received free samples of anti-
Professional Nursing Services.  Privacy and Security Training explains:  The requirements of the federal HIPAA/HITEC regulations, state privacy laws.
Protecting Client Data HIPAA, HITECH and PIPA Part 1A
HIPAA Training Presentation for New Employees How did we get here? HIPAA Police 1.
I.D. Theft Alaska’s New Protection of Personal Information Act Ed Sniffen Senior Assistant Attorney General Alaska Department of Law.
PRIVACY BREACHES A “breach of the security of the system”: –Is the “unauthorized acquisition of computerized data that compromises the security, confidentiality,
Computers, Freedom and Privacy April 23, 2004 Identity Theft: Addressing the Problem in California Joanne McNabb, Chief CA Office of Privacy Protection.
RMG:Red Flags Rule 1 Regal Medical Group Red Flags Rule Identify Theft Training.
HIPAA What’s Said Here – Stays Here…. WHAT IS HIPAA  Health Insurance Portability and Accountability Act  Purpose is to protect clients (patients)
HIPAA: It Doesn’t Only Impact Medical Records Basic HIPAA Stuff and Overall Information Protection 1.
HIPAA Health Insurance Portability & Accountability Act of 1996.
Health Insurance Portability and Accountability Act (HIPAA)
Protecting Sensitive Information PA Turnpike Commission.
Protected Health Information (PHI). Privileged Communication An exchange of information between two individuals in a confidential relationship. (Examples:
Paula Peyrani, MD Medical/Project Director, HIV Program at the 550 Clinic Assistant Director, Research Design and Development Clinical and Translational.
WHO’S IN YOUR “WALLET” WHO’S IN YOUR “WALLET” YOU BETTER “RECOGNIZE” YOU BETTER “RECOGNIZE” STEPPING $200 $200 $300 $400 $500 $400 $300 $200 $500 $400.
HIPAA Privacy & Security Kay Carolin Barbara Ann Karmanos Cancer Center March 2009.
2015 ANNUAL TRAINING By: Denise Goff
HIPAA Business Associates Leadership Group Meeting June 28, 2001.
3.1.G1 © Family Economics & Financial Education – Revised October 2004 – Consumer Protection Unit – Identity Theft Funded by a grant from Take Charge America,
1 Research & Accounting for Disclosures March 12, 2008 Leslie J. Pfeffer, BS, CHP Office of the Vice President for Research Administration Office of Compliance.
Confidentiality, Consents and Disclosure Recent Legal Changes and Current Issues Presented by Pam Beach, Attorney at Law.
1 HIPAA OVERVIEW ETSU. 2 What is HIPAA? Health Insurance Portability and Accountability Act.
Identity Theft  IDENTITY THEFT occurs when someone wrongfully acquires and uses a consumer’s personal identification, credit, or account information.
Privacy and Security Laws for Health Care Organizations Presented by Robert J. Scott Scott & Scott, LLP
Health information that does not identify an individual and with respect to which there is no reasonable basis to believe that the information can be.
Arkansas State Law Which Governs Sensitive Information…… Part 3B
HIPAA Training Developed for Ridgeview Institute 2012 Hospital Wide Orientation.
HIPAA (health insurance portability and accountability act)
Breach vs. Security Incident A security incident is an actual or suspected occurrence of: Damage, destruction, unauthorized access or disclosure of.
© 2009 The McGraw-Hill Companies, Inc. All rights reserved. 1 McGraw-Hill Chapter 2 The HIPAA Privacy Standards HIPAA for Allied Health Careers.
Medical Law and Ethics, Third Edition Bonnie F. Fremgen Copyright ©2009 by Pearson Education, Inc. Upper Saddle River, New Jersey All rights reserved.
Health Insurance Portability and Accountability Act of 1996 HIPAA Privacy Training for County Employees.
HIPAA THE PRIVACY RULE. 2 HISTORY In 2000, many patients that were newly diagnosed with depression received free samples of anti- depressant medications.
A Road Map to Research at Jefferson: HIPAA Privacy and Security Rules for Researchers Presented By: Privacy Officer/Office of Legal Counsel October 2015.
Configuring Electronic Health Records Privacy and Security in the US Lecture b This material (Comp11_Unit7b) was developed by Oregon Health & Science University.
HIPAA: Breach Notification By: Office of University Counsel For: Jefferson IRB Continuing Education September 2014.
HIPAA TRIVIA Do you know HIPAA?. HIPAA was created by?  The Affordable Care Act  Health Insurance companies  United States Congress  United States.
HIPAA Training. What information is considered PHI (Protected Health Information)  Dates- Birthdays, Dates of Admission and Discharge, Date of Death.
Final HIPAA Privacy Rule: The Research Provisions Julie Kaneshiro DHHS Office for Human Research Protections Phone: Fax:
Data Breach ALICAP, the District Insurance Provider, is Now Offering Data Breach Coverage as Part of Our Blanket Coverage Package 1.
Reviewed by: Gunther Kohn Chief Information Officer, UB School of Dental Medicine Date: October 20, 2015 Approved by: Sarah L. Augustynek Compliance Officer,
UC Riverside Health Training and Development
Developed for Ridgeview Institute 2015 Hospital Wide Orientation
ELECTRONIC HEALTH RECORD PRIVACY TRAINING
HIPAA PRIVACY & SECURITY TRAINING
No No, Yes Yes: Simple Privacy & Information Security Tips Krista Barnes, J.D. Senior Legal Officer and Director, Privacy & Information Security, Institutional.
Identity Theft Prevention Program Training
The Health Insurance Portability and Accountability Act Basic HIPAA Training For CMU workforce with access to PHI.
The Health Insurance Portability and Accountability Act
HIPAA Overview.
HIPAA & PHI TRAINING & AWARENESS
The Health Insurance Portability and Accountability Act
The Health Insurance Portability and Accountability Act
Presentation transcript:

Presented by: Roberta Ward CDHS Privacy Officer Phone: (916)

Please write on your paper the following: –Your Name –Your Date Of Birth –Your Height –Your Weight –One Medical Condition that you have (Examples: Allergies, migraines, heart palpitations) Before We Begin…

Privacy Breach A Privacy Breach is an unauthorized disclosure of PHI/PCI that violates either federal or state laws –Federal: HIPAA Privacy Rule –State: Information Practices Act of 1977 Privacy Breaches may be paper or electronic –Electronic breaches when name plus social security number, or DMV, or financial account number are involved require individual notification by law –CDHS is notifying individuals when name and SSN are on paper documents as well

PHI is information that identifies or can be used to identify an individual Information that relates to the: –Past, present or future health condition of that individual –Health care provided to that individual –Payment for that health care Information in any form, including paper, electronic (ePHI), and oral communications What is PHI?

Name Address – Street address, city, county, zip code (more than 3 digits) or other geographic codes Dates directly related to patient (except year), including DOB, admission or discharge date Telephone & FAX Numbers Driver’s License Number Addresses Social Security Number Medical Record Number Health Plan Beneficiary Number Account Number Certificate/License number Any vehicle or device serial number, including license plates Web Addresses (URLs) Internet Protocol (IP) Address Finger or Voice Prints Photographic Images Any other unique identifying number, characteristic, or code Age greater than 89 (as the 90 year old and over population is relatively small) What Constitutes PHI – 18 Identifiers

De-identified data is NOT covered by HIPAA HIPAA does NOT cover: –Employee Records –Workers’ Compensation Records –Records about Providers HOWEVER, CDHS considers all three of these records “personal confidential information” (PCI) and therefore must be safeguarded in the same manner as PHI What is NOT PHI?

Information that is not public which identifies or describes an individual including: –Names –Home Addresses –Home Telephone Numbers –Social Security Numbers –Medical or Employment Histories –Personnel Records –Licensing Records “Personal Confidential Information” (PCI)

Establishes requirements for all state agencies for the collection, maintenance & dissemination of personal information Allowed Disclosures: –To a person/agency where transfer is necessary to perform duties –To a law enforcement/regulatory agency when required for an investigation or for licensing, certification, or regulatory process –To another person/governmental organization for investigation of failure to comply with a law enforced by the agency Information Practices Act (California Civil Code section 1798 et seq.)

Examples of Paper Breaches Misdirected paper faxes with PHI/PCI outside of CDHS Loss or theft of paper documents containing PHI/PCI Mailings to incorrect providers or beneficiaries

Examples of Electronic Breaches Stolen, unencrypted laptops, hard drives, PCs with PHI/PCI Stolen, unencrypted thumb drives with PHI/PCI Stolen briefcases with unencrypted compact discs containing PHI/PCI Misdirected electronic fax with PHI/PCI to person outside of state government

California Anti-Identity Theft Law Senate Bill 1386 (Chapter 915, Statutes of 2002) requires that any breach of security of computerized data that includes personal information must be disclosed to any resident of California –Applies to state agencies, persons or businesses that conduct business in California –personal information was unencrypted and was or is reasonably believed to have been acquired by an unauthorized person

Anti-Identity Theft/ Breach Notification Statute Civil Code sections and Requires notification to California residents when there is a breach of unencrypted electronic data containing the following personal information:  The individual’s first name or first initial and last name in combination with any one or more of the following data elements: Social Security Number Driver’s license or California ID number Account number, credit or debit card number in combination with security code, access code or password

Identity Thief #1 Specialized in cashing phony checks using her victims checking accounts. This highly productive identity thief was arrested with a virtual goody bag of stolen identities indicating a dozen or more recent victims: –15 fraudulent university id cards –12 fraudulent driver licenses –14 checks to be drawn on various accounts –Maps with directions to local area banks Sentence: Over 13 years in prison

When this identity thief was arrested, she had a number of items indicating her specialty was in committing fraud in large volumes: –Several laptop computers –An ID manufacturing machine –ID counterfeiting credit card machine –500 profiles of people (intended victims) When arrested at the Phoenix airport, she had in her possession a plane ticket bought with a stolen credit card and several fake identifications. Sentence: 2.5 years in prison Identity Thief #2

This identity thief used his job at a local area auto dealer to obscure his real cash making endeavor as an identity thief who created fake drivers licenses. Identity thief #3 then would sell them to other employees for $75 apiece. The fake ID’s would then be used to obtain loans on used vehicles on behalf of illegal immigrants. Sentence: 2 years in prison Identity Thief #3

Timing California law requires the notice be made “in the most expedient time possible and without unreasonable delay” Time may be allowed for law enforcement, if the notification would impede a criminal investigation

Reporting Privacy Breaches CDHS employees and business associates must take immediate action and report all Privacy Breaches to: –Your Supervisor –CDHS Privacy Officer –Information Security Officer Privacy Breaches DO NOT include: –Misdirected mail within CDHS – s transmitted from outside CDHS to wrong within CDHS or unencrypted

Internal Reporting Procedures 1.Inform your manager or supervisor of an unauthorized disclosure or potential breach. 2.Send an or call the Privacy Office with the following information: –Brief description of the incident –Date, time, and location of the incident –Name of affected parties/witnesses 3.A written report to the CDHS Privacy Officer is required after the initial or call. –Use the Privacy Breach Reporting Form to describe the incident, identify potential harm & determine a corrective action plan to prevent future occurrences Please see Privacy Breach Reporting Form

Privacy Office Procedures Program Area’s Chief Deputy Director Deputy Director Assistant Deputy Director OLS Deputy Director 1.Upon receipt of a report of a potential breach, the Privacy Office staff is responsible for notifying: 2.A complete investigation is then performed. The investigative team may include but is not limited to members of CDHS Privacy Office, Audit & Investigations Division, & program staff. Privacy Officer ISO Rich Bayquen Person who notified Agency

Privacy Office Procedures cont… 3.Privacy Office will work closely with program staff to perform the following: a.Mitigation activities, including any legally required notification to beneficiaries Notification must be given to individuals in the most expedient time possible and without unreasonable delay b.Formal Corrective Action Plan c.Remediation Efforts d.Follow up to ensure all resolution activities are completed e.Formal Agency Breach Report to close out breach Please see Agency Breach Report

Office of Privacy Protections Notification Recommendations Notification letter: Advise individuals of steps they can take to protect themselves against possibility of identity theft Recommend contacting the three credit reporting agencies: Equifax, Experian, and Trans Union If find suspicious activity on credit reports, call your local police or sheriff and file an identity theft report –Contact DMV (Fraud Hotline: ) to place fraud alert on your driver’s license California Office of Privacy Protection Recommendations available at: Please see Sample Notification Letter

Breach Contacts Privacy Officer Phone: (916) FAX: (916) Information Security Officer Phone: (916) or (800)