Introduction to the West Virginia Executive Branch Privacy Policies Executive Branch Privacy Program Education & the Arts Presented by Heather Butler,

Slides:



Advertisements
Similar presentations
CONFIDENTIALITY / PRIVACY. Federal Laws Privacy Act of 1974 PII (Personally Identifiable Information)….Protection of social security numbers……….
Advertisements

HIPAA and Public Health 2007 Epi Rapid Response Team Conference.
1. As a Florida KidCare community partner families entrust you to not only help them navigate the Florida KidCare system but to keep the information they.
HIPAA. What Why Who How When What Is HIPAA? Health Insurance Portability & Accountability Act of 1996.
HIPAA Basic Training for Privacy & Information Security Vanderbilt University Medical Center VUMC HIPAA Website:
Confidentiality and HIPAA
HIPAA Privacy Rule Training
Increasing public concern about loss of privacy Broad availability of information stored and exchanged in electronic format Concerns about genetic information.
1 HIPAA Education CCAC Professional Development Training September 2006 CCAC Professional Development Training September 2006.
NAU HIPAA Awareness Training
Reviewing the World of HIPAA Stephanie Anderson, CPC October 2006.
HIPAA Privacy Rule Compliance Training for YSU April 9, 2014.
 The Health Insurance Portability and Accountability Act of  Federal Law designed to protect sensitive information.  HIPAA violations are enforced.
HIPAA THE PRIVACY RULE Reviewed December HISTORY In 2000, many patients that were newly diagnosed with depression received free samples of anti-
Are you ready for HIPPO??? Welcome to HIPAA
Professional Nursing Services.  Privacy and Security Training explains:  The requirements of the federal HIPAA/HITEC regulations, state privacy laws.
PIPA PRESENTATION PERSONAL INFORMATION PROTECTION ACT.
Data Protection.
SAFEGUARDING DHS CLIENT DATA PART 2 SAFEGUARDING PHI AND HIPAA Safeguards must: Protect PHI from accidental or intentional unauthorized use/disclosure.
The Privacy Office U.S. Department of Homeland Security Washington, DC t: ; f: Safeguarding.
Copyright © 2014 Merck Sharp & Dohme Corp., a subsidiary of Merck & Co., Inc. All rights reserved. In practice, how do we recognize a potential Privacy.
Data Classification & Privacy Inventory Workshop
Security Controls – What Works
Taking Steps to Protect Privacy A presentation to Hamilton-area Physiotherapy Managers by Bob Spence Communications Co-ordinator Office of the Ontario.
Data Protection Paul Veysey & Bethan Walsh. Introduction Data Protection is about protecting people by responsibly managing their data in ways they expect.
HIPAA Basic Training for Privacy and Information Security Vanderbilt University Medical Center VUMC HIPAA Website: HIPAA Basic.
HIPAA Privacy & Security EVMS Health Services 2004 Training.
Obtaining, Storing and Using Confidential Data October 2, 2014 Georgia Department of Audits and Accounts.
Practical Information Management
HIPAA PRIVACY AND SECURITY AWARENESS.
“ Technology Working For People” Intro to HIPAA and Small Practice Implementation.
Privacy and Security of Protected Health Information NorthPoint Health & Wellness Center 2011.
Arkansas State Law Which Governs Sensitive Information…… Part 3B
Privacy and Information Management ICT Guidelines.
Part 6 – Special Legal Rights and Relationships Chapter 35 – Privacy Law Prepared by Michael Bozzo, Mohawk College © 2015 McGraw-Hill Ryerson Limited 34-1.
OCR Nationals Level 3 Unit 3.  To understand how the Data Protection Act 1998 relates to the data you will be collecting, storing and processing  To.
Watech.wa.gov Records Management In a nutshell. watech.wa.gov What’s a record? A record is anything you create in the course of doing your work – Everything.
Building a Privacy Foundation. Setting the Standard for Privacy Health Insurance Portability and Accountability Act (HIPAA) Patient Bill of Rights Federal.
DATA PROTECTION & FREEDOM OF INFORMATION. What is the difference between Data Protection & Freedom of Information? The Data Protection Act allows you.
Health Insurance Portability and Accountability Act (HIPAA) CCAC.
Health Insurance Portability and Accountability Act of 1996 HIPAA Privacy Training for County Employees.
Mr. Fleming.  Law passed by Congress in  Right to Privacy ◦ Medical information of patient can only be shared with doctor and professionals administering.
© 2013 The McGraw-Hill Companies, Inc. All rights reserved. Ch 8 Privacy Law and HIPAA.
FleetBoston Financial HIPAA Privacy Compliance Agnes Bundy Scanlan Managing Director and Chief Privacy Officer FleetBoston Financial.
HIPAA THE PRIVACY RULE. 2 HISTORY In 2000, many patients that were newly diagnosed with depression received free samples of anti- depressant medications.
The Culture of Healthcare Privacy, Confidentiality, and Security Lecture d This material (Comp2_Unit9d) was developed by Oregon Health and Science University,
Your health record How the local NHS uses and protects the information held about you Other ways that your records may be used Your local NHS services.
1 Privacy Plan of Action © HIPAA Pros 2002 All rights reserved.
Watech.wa.gov Records Management In a nutshell. watech.wa.gov What’s a record? A record is anything you create in the course of doing your work – Everything.
HIPAA Overview Why do we need a federal rule on privacy? Privacy is a fundamental right Privacy can be defined as the ability of the individual to determine.
APEC Privacy Framework “The lack of consumer trust and confidence in the privacy and security of online transactions and information networks is one element.
Introduction to the Australian Privacy Principles & the OAIC’s regulatory approach Privacy Awareness Week 2016.
Data protection—training materials [Name and details of speaker]
Aged and Disabled Waiver (ADW) Health Insurance Portability and Accountability Act (HIPAA) Training 2015 October 2015.
Final HIPAA Rule Special Training What you need to know to remain compliant with the new regulations.
HIPAA Training. What information is considered PHI (Protected Health Information)  Dates- Birthdays, Dates of Admission and Discharge, Date of Death.
HIPAA Privacy What Every Staff Member Needs to Know.
POLICIES & PROCEDURES FOR HANDLING CONFIDENTIAL INFORMATION NOVEMBER 5 TH 2015.
Health Insurance Portability and Accountability Act (HIPAA) Primer for Observers, Volunteers, Medical Students Dr. Michael Palumbo- Privacy Officer/ EVP.
Properly Safeguarding Personally Identifiable Information (PII) Ticket Program Manager (TPM) Social Security’s Ticket to Work Program.
HIPAA Privacy Rule Training
HIPAA Privacy and Security
HIPAA PRIVACY & SECURITY TRAINING
Disability Services Agencies Briefing On HIPAA
Preparing for GDPR Sharing experiences of the process and using the British Canoeing Toolkit bit.ly/BCGDPRToolkit
HIPAA Overview.
IAPP TRUSTe SYMPOSIUM 9-11 JUNE 2004
PRIVACY PRESENTATION TO THE SPRING 2013 CONFERENCE BY HANK MOORLAG
HIPAA Privacy and Security Update - 5 Years After Implementation
Presentation transcript:

Introduction to the West Virginia Executive Branch Privacy Policies Executive Branch Privacy Program Education & the Arts Presented by Heather Butler, Privacy Coordinator, WVDCH May 2009

Welcome to the Privacy Program! Privacy Program consists of six policies Notice Consent Individual Rights Minimum Necessary and Limited Use Security Safeguards Accountability These all take effect on August 1, 2009 Compliance is required for all Executive Branch Agencies, including Education & the Arts

Why Have a Privacy Program? The Privacy Program demonstrates our commitment to respecting people by protecting their information and using it properly Our commitment extends to all our employees as well as our citizens, service providers and other business partners The Privacy Program balances individual privacy with our legitimate needs to collect, use and disclose information for Agency business purposes

Policies Govern “PII” PII = personally identifiable information PII is any information that can be used to identify, locate or contact a person Includes obvious information, such as names and addresses, Social Security numbers And less obvious information, such as addresses, driver’s license numbers, credit card numbers Even regulated information – Protected Health Information (PHI) is part of PII Includes information about citizens, co-workers, vendors and employers – every person you encounter Includes information in every format – computerized or paper

Sensitive PII is a Subset of PII Some PII is classified as “sensitive” Sensitive PII (or SPII) consists of those elements of PII that require greater protection All health information and medical records, including (but not limited to) PHI Social Security numbers, driver’s license numbers Financial account information, including bank account numbers and payment card information

Privacy Program Summary Policies regulate our collection, use, transfer and storage of PII They provide for transparency, using privacy notice, and choice They require that we respect individual rights of access and correction They demonstrate our willingness to accommodate individual privacy concerns They require us to answer questions and respond to complaints

NOTICES What is a Notice? Why is it important? Drafting privacy notice Notice Required for EACH process. Concept of “Layered Notices” How are notices delivered”

The Consent Policy Reflects our commitment to giving people choice about how we collect, use and disclose their PII Recognizes that sometimes choice isn’t possible What is choice? - the ability to specify whether PII will be collected and/or how it will be used or disclosed Opt in vs. opt out

Consent Policy How the Consent Policy Works Sometimes a person’s consent is required before you can use PII – if this is true, you must obtain consent For example, our HIPAA Policy requires consent before a person’s PHI can be shared for fundraising Sometimes you are required to collect PII – if this is true, you may use the PII even if the person objects For example, our Communicable Diseases Policy mandates that you disclose some PHI for public health purposes In most cases, consent is not required – if this is true, you may collect the PII, but you offer individuals choice wherever possible

The Individual Rights Policy Demonstrates our commitment to Collecting PII directly from the individual, where possible Giving individuals the ability to access, copy and amend their PII Answering questions about our use and handling of PII Trying to address individual privacy concerns

Individual Rights Policy Why is Access Important? “Access” is the ability of a person to view the PII held by an organization This ability is usually complemented by an ability to update the information Access rights help ensure accuracy – this is especially important for PII used for substantive decision-making They also improve accountability – by viewing the PII held, individuals can confirm that we are complying with the promises in our privacy notices

Individual Rights Policy Respecting Access Rights We have processes for evaluating access requests and providing access to PII We also have a process for updating PII, if it’s not accurate REFER REQUESTS TO PRIVACY COORDINATOR OR PRIVACY OFFICER

The Minimum Necessary and Limited Use Principle Demonstrates our commitment to only collecting the PII that we really need for Agency business Requires us to give people choice when we collect PII that isn’t strictly necessary for the process at hand

Minimum Necessary Policy Why is Min Necessary Important? Demonstrates respect for privacy by addressing one of the most common concerns, “excessive” collection of PII Forces us to think about the purposes for the processing – and the purposes for each element of PII that we request Helps ensure we keep our privacy promises by limiting the opportunity for mission creep

Minimum Necessary Policy Limit Collection of PII Determine what elements of PII you really need for a process - e.g., the PII you must collect If you wish to collect addition elements of PII, you MAY do so if: You have a specific purpose for the PII, related to legitimate Agency business That purpose is described in the privacy notice, AND You offer individuals choice, so they can decline to provide the PII You may not require an individual to provide more than the minimum necessary PII

Minimum Necessary Policy Limit Collection of PII - Example You run a state campground. To enable camping, you must collect the person’s name and payment information You may collect an emergency contact, in case something bad happens You may collect an address, in case you send happy camper newsletters You may collect demographic data or conduct surveys, in case you want to know more about your customers and what they’d like from your campground You cannot require emergency contacts, addresses or survey responses – but you may certainly ask Your privacy notice must address all the elements

Minimum Necessary Policy Limit Disclosure of PII When disclosing PII to third parties (such as vendors or other agencies), only disclose those elements of PII that are needed by the third party Extract the required elements of PII, and don’t share anything else

The Security Safeguards Policy You cannot respect privacy unless you secure the PII The Security Safeguards Policy requires each Agency to have appropriate controls to protect PII We protect the PII from (i) anticipated threats or hazards, and (ii) unauthorized access, use or disclosure We protect ALL PII, with special attention on sensitive PII We protect PII in all formats – paper or computerized We collaborate with the Office of Technology (OT) on information security requirements

Security Safeguards Policy Comply with OT Policies The most important requirement is that you follow all the OT security rules Take a few moments to review these rules and make sure you understand exactly how they apply to your daily activities Ask questions if you aren’t sure! Also review the Agency Acceptable Use Policy

Security Safeguards Policy Security Incidents A “Security Incident” is any incident that compromises the security, confidentiality, or integrity of PII (with or without SPII) Unauthorized Disclosures of PII are always security incidents Other examples: Lost or stolen laptop or device (PDA, cell phone) Lost or stolen storage media (memory stick, CD-ROM) Lost or stolen paper records Lost or compromised password or access card Presence of viruses, spyware or other malicious code of a computer or devices

Security Safeguards Policy Security Incidents Even the very best organizations have security incidents Workers in the best organizations watch for incidents and report them immediately This allows the Privacy Officer and security teams to manage the risks and limit damage Your job is to report all incidents to your manager, the Privacy Officer or the Helpdesk as soon as you become aware of a problem!

The Accountability Policy Everyone is responsible for privacy and security Everyone has access to lots of PII and SPII – about your co-workers, citizens we serve, our business partners It is your job to understand how the Privacy Policies apply to the PII you have It is your job to forward questions and complaints to your manager or the Privacy Officer It is also your job to tell us about any mistakes that might compromise or expose PII

The Accountability Policy What It Means For You Read the Policies – be sure your understand how they apply to your day-to-day activities Ask questions – if you aren’t sure of something, ask you manager or the Privacy Officer Don’t be afraid to say no – you have the power to question anything that doesn’t seem right! Call the OT Helpdesk if you have any security questions Report complaints, violations and mistakes IMMEDIATELY

The Accountability Policy Names & Numbers to Know OT Helpdesk (304) Agency Privacy Officer WVDCH Heather Butler: (304) Education and the Arts Tiffany Redman: (304)

Questions & Comments