HIPAA Privacy & Security EVMS Health Services 2004 Training.

Slides:



Advertisements
Similar presentations
Protect Our Students Protect Ourselves
Advertisements

HIPAA Workforce Training
HIPAA: An Overview of Transaction, Privacy and Security Regulations Training for Providers and Staff.
Independent Contractor Orientation HIPAA What Is HIPAA? Health Insurance Portability and Accountability Act of 1996 The Health Insurance Portability.
Privacy and Information Security Training ( ) VUMC Privacy Website
Health Insurance Portability and Accountability Act HIPAA Education for Volunteers and Students.
HIPAA. What Why Who How When What Is HIPAA? Health Insurance Portability & Accountability Act of 1996.
HIPAA Basic Training for Privacy & Information Security Vanderbilt University Medical Center VUMC HIPAA Website:
COBB/DOUGLAS COMMUNITY SERVICES BOARD Confidentiality and Privacy of Consumer Information.
LMC WHAT IS HIPAA AND HOW TO COMPLY WITH IT? Health Insurance Portability and Accountability Act of 1996.
National Health Information Privacy and Security Week Understanding the HIPAA Privacy and Security Rule.
The Health Insurance Portability and Accountability Act of 1996– charged the Department of Health and Human Services (DHHS) with creating health information.
Your Role in Corporate Compliance and HIPAA Confidentiality
HIPAA Health Insurance Portability and Accountability Act.
1 HIPAA Education CCAC Professional Development Training September 2006 CCAC Professional Development Training September 2006.
Managing Access to Student Health Information per Federal HIPAA Guidelines Joan M. Kiel, Ph.D., CHPS Duquesne University Pittsburgh, Penna
NAU HIPAA Awareness Training
Health Insurance Portability & Accountability Act “HIPAA” To every patient, every time, we will provide the care that we would want for our own loved ones.
Protecting Client Data HIPAA, HITECH and PIPA Part 1A
SAFEGUARDING DHS CLIENT DATA PART 2 SAFEGUARDING PHI AND HIPAA Safeguards must: Protect PHI from accidental or intentional unauthorized use/disclosure.
Electronic Health Records Danielle P. Berthelot, RHIA Director, Health Information Management and Cancer Registry Privacy Officer Woman’s Hospital.
1 Enterprise Security Your Information Security and Privacy Responsibilities © 2008 Providence Health & Services This information may be replicated for.
HIPAA What’s Said Here – Stays Here…. WHAT IS HIPAA  Health Insurance Portability and Accountability Act  Purpose is to protect clients (patients)
HIPAA Basic Training for Privacy and Information Security Vanderbilt University Medical Center VUMC HIPAA Website: HIPAA Basic.
Columbia University Medical Center Health Insurance Portability and Accountability Act of 1996 (“HIPAA”) Privacy & Information Security Training 2009.
Protected Health Information (PHI). Privileged Communication An exchange of information between two individuals in a confidential relationship. (Examples:
HIPAA Privacy & Security Kay Carolin Barbara Ann Karmanos Cancer Center March 2009.
HIPAA PRIVACY AND SECURITY AWARENESS.
“ Technology Working For People” Intro to HIPAA and Small Practice Implementation.
Privacy and Security of Protected Health Information NorthPoint Health & Wellness Center 2011.
Next ETCH Confidentiality and HIPAA Annual Review What you need to know. The Privacy Rule 1.
Privacy and Information Management ICT Guidelines.
University Health Care Computer Systems Fellows, Residents, & Interns.
April 14, A Watershed Date in HIPAA Privacy Compliance: Where Should You Be in HIPAA Security Compliance and How to Get There… John Parmigiani National.
© 2009 The McGraw-Hill Companies, Inc. All rights reserved. 1 McGraw-Hill Chapter 2 The HIPAA Privacy Standards HIPAA for Allied Health Careers.
Medical Law and Ethics, Third Edition Bonnie F. Fremgen Copyright ©2009 by Pearson Education, Inc. Upper Saddle River, New Jersey All rights reserved.
Building a Privacy Foundation. Setting the Standard for Privacy Health Insurance Portability and Accountability Act (HIPAA) Patient Bill of Rights Federal.
Mr. Fleming.  Law passed by Congress in  Right to Privacy ◦ Medical information of patient can only be shared with doctor and professionals administering.
HIPAA BASIC TRAINING Presented by Anderson Health Information Systems, Inc.
HIPAA BASIC TRAINING MODULE 1C – Overview (For staff who do not generally create Protected Health Information) Anderson Health Information Systems, Inc.
HIPAA THE PRIVACY RULE. 2 HISTORY In 2000, many patients that were newly diagnosed with depression received free samples of anti- depressant medications.
HIPAA Health Insurance Portability and Accountability Act of 1996.
1 Privacy Plan of Action © HIPAA Pros 2002 All rights reserved.
Unit 7 Seminar.  According to Sanderson (2009), the problems with the current paper-based health record system have been well documented. The author.
Copyright © 2015 by Saunders, an imprint of Elsevier Inc. All rights reserved. Chapter 3 Privacy, Confidentiality, and Security.
Aged and Disabled Waiver (ADW) Health Insurance Portability and Accountability Act (HIPAA) Training 2015 October 2015.
What is HIPAA? Health Insurance Portability and Accountability Act of HIPAA is a major law primarily concentrating on the prolongation of health.
The Health Insurance Portability and Accountability Act (HIPAA) requires Plumas County to train all employees in covered departments about the County’s.
HIPAA Privacy What Every Staff Member Needs to Know.
POLICIES & PROCEDURES FOR HANDLING CONFIDENTIAL INFORMATION NOVEMBER 5 TH 2015.
Properly Safeguarding Personally Identifiable Information (PII) Ticket Program Manager (TPM) Social Security’s Ticket to Work Program.
Reviewed by: Gunther Kohn Chief Information Officer, UB School of Dental Medicine Date: October 20, 2015 Approved by: Sarah L. Augustynek Compliance Officer,
HIPAA Privacy and Security
East Carolina University
WHAT IS HIPAA AND HOW TO COMPLY WITH IT?
HIPAA Privacy & Security
2015 Orientation to HIPAA Privacy Rule Compliance
HIPAA Online Student Orientation
WHAT IS HIPAA AND HOW TO COMPLY WITH IT?
HIPAA PRIVACY AWARENESS, COMPLIANCE and ENFORCEMENT
Disability Services Agencies Briefing On HIPAA
HIPAA Privacy & Security
HIPAA SECURITY RULE Copyright © 2008, 2006, 2004 by Saunders an imprint of Elsevier Inc. All rights reserved.
HIPAA Overview.
The Health Insurance Portability and Accountability Act
HIPAA & PHI TRAINING & AWARENESS
Move this to online module slides 11-56
HIPAA Do’s and Don'ts: What is Really Behind Protected Health Information (PHI) and Health Care Privacy Rules Paul Sisler, Director, Information Services;
Introduction to the PACS Security
The Health Insurance Portability and Accountability Act
Presentation transcript:

HIPAA Privacy & Security EVMS Health Services 2004 Training

Privacy & Security Privacy –what should be protected Security –how to protect it

Privacy What should be protected? Any health information that can be used to identify the patient

Patient Identifiers Name Date of Birth Date of Visit Social Security # Postal Address (even zip) Telephone/Fax # Medical record/Chart # Address/URL Account # Photographs

Privacy Ways to protect patient information: –Turn computer screens inward –Keep patient schedules covered –Talk quietly – don’t use patient’s name –Shred documents –Verify identity before disclosure –Use security controls

Security Is a process not a product Examples of Security Controls –Set automatic log offs after 20 minutes –Use screensavers w/ password features –Virus protection software –Log-on trails

Security Weakest link in security is people why? Don’t see it as important Laziness Averse to technology Don’t know controls are there

People Controls - management/leadership Don’t assign system passwords until employees have Privacy Training Tell staff how to safeguard work areas Store confidential information on network drive – not hard drive Don’t ever share passwords

People Controls Monitor Behavior  Are staff logging off computers?  Are they accessing information not needed for their job?  Is sensitive information removed whenever possible (minimum necessary rule?)  Are fax cover sheets used?  Are recycling bins used?

People Controls Monitor Actions  Is the Privacy Notice prominently displayed?  Are new patients being asked to initial/sign the privacy notice acknowledgement?  Are accidental disclosures logged in the patient’s disclosure log?  Are privacy complaints being forwarded to the privacy office?

Fax Transmittals - controls Always use a fax cover sheet that lets the recipient know who to contact “just in case” there is a transmission error – If you make a mistake, the “unauthorized” disclosure must be logged in the patient’s medical record.

Disclosure Log - in the medical record We are required by law to “log” the following types of disclosures: Public health Social Services Law enforcement Unauthorized (or accidental) disclosures

Data bases #1 Risk area Do it right Get patient authorization (even for prospective research) Protect data w/ security controls Limit access Don’t store on portable devices Update data fields

EVMS Privacy & Security Manuals It is your responsibility to follow the EVMS HIPAA Privacy & Security Policy & Procedures Each manager is required to review the Privacy & Security procedures with staff Privacy Policy & Procedures: web/ web/ Security Policy & Procedures: /policies_/bov secu/default.htm

Mini Quiz Someone is caught accessing the PHI of a co-worker. How do you handle this situation?  Report person to supervisor/Privacy Office  Tell person that she can get fired, but don’t report to Privacy Office  Find out what person was looking at so you can report it (click mouse for answer) Report person to supervisor/Privacy Office immediately

Mini Quiz What are some ways to protect patient information?  Turn computer screens inward  Keep schedules covered up  Talk quietly, without using the patient’s name  All of the above (click mouse for answer) All of the above

Mini Quiz You use an electronic device to store/use health information. How do you protect the information?  Log off system when not in use  Store information on password protected network drive  Keep portable devices on you or locked up at all time  All of the above (click mouse for answer) All of the above

Mini Quiz The following are patient identifiers: A) Date of birth B) Date of office visit C) Strep throat diagnosis D) A & C E) A & B (click mouse for answer) E) A & B

Mini Quiz A patient does not want to be contacted by EVMS for fundraising purposes. What should be done? A) remove patient’s address & telephone # from IDX B) ask patient to complete an opt-out fundraising form & forward to Privacy Office C) call the EVMS Institutional Advancement office for advice (click mouse for answer) Answer is B!

Mini Quiz Are you allowed to share passwords?  It is ok to give passwords to nurses, but no one else  IDX passwords can be shared but not electronic medical record passwords  No one is allowed to share passwords – ever (click mouse for answer) No one is allowed to share passwords!

Privacy - questions/concerns Contact the Privacy Office: