Children’s Hospital Requirements for Remote Access.

Slides:



Advertisements
Similar presentations
HIPAA Health Insurance Portability and Accountability Act of 1996
Advertisements

CONFIDENTIALITY / PRIVACY. Federal Laws Privacy Act of 1974 PII (Personally Identifiable Information)….Protection of social security numbers……….
Mobile Devices: Know the RISKS. Take the STEPS. PROTECT AND SECURE Health Information.
Copyright © 2012, Big I Advantage®, Inc., and Swiss Re Corporate Solutions. All rights reserved. (Ed. 08/12 -1) E&O RISK MANAGEMENT: MEETING THE CHALLENGE.
Privacy and Information Security Training ( ) VUMC Privacy Website
HIPAA Training: Health Insurance Portability and Accountability Act.
System Security & Patient Confidentiality General Lesson 1.
1. As a Florida KidCare community partner families entrust you to not only help them navigate the Florida KidCare system but to keep the information they.
Health Insurance Portability and Accountability Act HIPAA Education for Volunteers and Students.
HIPAA. What Why Who How When What Is HIPAA? Health Insurance Portability & Accountability Act of 1996.
HIPAA Basic Training for Privacy & Information Security Vanderbilt University Medical Center VUMC HIPAA Website:
National Health Information Privacy and Security Week Understanding the HIPAA Privacy and Security Rule.
The Health Insurance Portability and Accountability Act of 1996– charged the Department of Health and Human Services (DHHS) with creating health information.
HIPAA Security Training 2005
 Privacy Act of 1974 PII (Personally Identifiable Information)….Protection of social security numbers……….
WORKFORCE CONFIDENTIALITY HIPAA Reminders. HIPAA 101 The Health Insurance Portability and Accountability Act (HIPAA) protects patient privacy. HIPAA is.
HIPAA Health Insurance Portability and Accountability Act.
What is HIPAA? This presentation was created by The University of Arizona Privacy Office, The Office for the Responsible Conduct of Research on March 5,
Health Insurance Portability and Accountability Act (HIPAA)HIPAA.
HIPAA Governing Board Training September 28, 2006.
Corporate Compliance Program STANDARDS OF CONDUCT HIPAA PRIVACY & SECURITY Temple University Health System Maribel Valentin, Esquire Associate Counsel.
NAU HIPAA Awareness Training
 The Health Insurance Portability and Accountability Act of  Federal Law designed to protect sensitive information.  HIPAA violations are enforced.
Health Insurance Portability & Accountability Act “HIPAA” To every patient, every time, we will provide the care that we would want for our own loved ones.
HIPAA THE PRIVACY RULE Reviewed December HISTORY In 2000, many patients that were newly diagnosed with depression received free samples of anti-
1 Electronic Information Security – What Researchers Need to Know University of California Office of the President Office of Research May 2005.
Copyright © 2014 Merck Sharp & Dohme Corp., a subsidiary of Merck & Co., Inc. All rights reserved. In practice, how do we recognize a potential Privacy.
Electronic Health Records Danielle P. Berthelot, RHIA Director, Health Information Management and Cancer Registry Privacy Officer Woman’s Hospital.
DHS SECURITY INCIDENT REPORTING AND RESPONSE SECURITY INCIDENT REPORTING AND RESPONSE DHS managers, employees, and other authorized information users.
1 Enterprise Security Your Information Security and Privacy Responsibilities © 2008 Providence Health & Services This information may be replicated for.
HIPAA COMPLIANCE IN YOUR PRACTICE MARIBEL VALENTIN, ESQUIRE.
10 Essential Security Measures PA Turnpike Commission.
HIPAA Basic Training for Privacy and Information Security Vanderbilt University Medical Center VUMC HIPAA Website: HIPAA Basic.
New Data Regulation Law 201 CMR TJX Video.
Columbia University Medical Center Health Insurance Portability and Accountability Act of 1996 (“HIPAA”) Privacy & Information Security Training 2009.
Protecting Sensitive Information PA Turnpike Commission.
HIPAA PRIVACY AND SECURITY AWARENESS.
“ Technology Working For People” Intro to HIPAA and Small Practice Implementation.
ESCCO Data Security Training David Dixon September 2014.
Privacy and Security of Protected Health Information NorthPoint Health & Wellness Center 2011.
Ames Laboratory Privacy and Personally Identifiable Information (PII) Training Welcome to the Ames Laboratory’s training on Personally Identifiable Information.
Privacy and Information Management ICT Guidelines.
University Health Care Computer Systems Fellows, Residents, & Interns.
HIPAA THE PRIVACY RULE. 2 HISTORY In 2000, many patients that were newly diagnosed with depression received free samples of anti- depressant medications.
HIPAA Health Insurance Portability and Accountability Act of 1996.
ONE® Pages Training Presentation North York General Hospital.
A Road Map to Research at Jefferson: HIPAA Privacy and Security Rules for Researchers Presented By: Privacy Officer/Office of Legal Counsel October 2015.
Western Asset Protection
ANNUAL HIPAA AND INFORMATION SECURITY EDUCATION. KEY TERMS  HIPAA - Health Insurance Portability and Accountability Act. The primary goal of the law.
Final HIPAA Rule Special Training What you need to know to remain compliant with the new regulations.
HIPAA TRIVIA Do you know HIPAA?. HIPAA was created by?  The Affordable Care Act  Health Insurance companies  United States Congress  United States.
HIPAA Training. What information is considered PHI (Protected Health Information)  Dates- Birthdays, Dates of Admission and Discharge, Date of Death.
The Medical College of Georgia HIPAA Privacy Rule Orientation.
New Hire HIPAA Orientation. HIPAA Overview HIPAA is an acronym that stands for the Health Insurance Portability and Accountability Act of HIPAA.
The Health Insurance Portability and Accountability Act (HIPAA) requires Plumas County to train all employees in covered departments about the County’s.
Table of Contents  Protect patients and their personal health information  Became law in 1996.
Properly Safeguarding Personally Identifiable Information (PII) Ticket Program Manager (TPM) Social Security’s Ticket to Work Program.
Protecting PHI & PII 12/30/2017 6:45 AM
East Carolina University
HIPAA Privacy & Security
2015 Orientation to HIPAA Privacy Rule Compliance
Use of BMC Patient Information Privacy & Security
Data Protection Scenarios
Health Insurance Portability and Accountability Act of 1996 (HIPAA)
ONE® Pages Training Presentation
HIPAA PRIVACY AWARENESS, COMPLIANCE and ENFORCEMENT
CompTIA Security+ Study Guide (SY0-401)
HIPAA Privacy & Security
HIPAA SECURITY RULE Copyright © 2008, 2006, 2004 by Saunders an imprint of Elsevier Inc. All rights reserved.
Move this to online module slides 11-56
Presentation transcript:

Children’s Hospital Requirements for Remote Access

Children’s Hospital is committed to protecting the privacy of patient health information and securing access from unauthorized users. As part of our commitment, Children’s Hospital has developed this training for all individuals with remote access to hospital information systems.

Responsibility to Protect Advancing technologies have resulted in greater accessibility to electronic patient health information (EPHI). This in turn requires Children’s Hospital to continually improve our systems to ensure privacy and security of patient information. WHY? Spot Light on EPHI  Nationally, healthcare is becoming:  More automated, which increases the need to share patient information in an electronic format  More mobile as staff begin to utilize portable devices, both within the hospital and remotely for care purposes  As usage increases, regulatory and accrediting organizations are developing security standards for healthcare organizations.

All Remote Access Users Hospital Employees oAll hospital employees who have remote access. For example, employees with remote access and home-based employees. o All hospital employees who utilize portable devices (ie. including lap tops, smart phones, and PDAs) to access EPHI remotely. Non-Hospital Employees oIndividuals and entities provided remote access to EPHI, including vendors, physicians, residents, business partners, and business associates. WHO?

All Users Must Be Responsible All users must: Access only EPHI to which they are entitled Report any known or suspected misuse of access to the IT Service Desk Report any lost or stolen portable media device to the IT Service Desk Not share passwords Contact the IT Department Service Desk at immediately if you no longer need remote access. HOW?

Offsite Portable Device Users Children’s laptops have system settings that protect the security of the device. All returned laptops will be examined for system settings tampering. Disciplinary action can be taken if the system settings have been changed. Do not leave portable devices in unattended vehicles or public thoroughfares. Do not download EPHI to portable devices. Prior to returning portable devices, you should search and delete files intentionally or unintentionally saved to the devices. HOW?

Remote Access Users Do not download Children’s Hospital’s EPHI onto your remote system or device. Children’s Hospital employees must use SAFE IT when transmitting EPHI through . Only print records containing EPHI if you are authorized to do so. Properly shred and dispose of printed EPHI per HIPAA guidelines. IF EPHI is displayed on your computer monitor, do not leave your computer unattended. Others should not be able to view the EPHI in your absence. HOW?

In Review Why… to insure privacy and security of electronic patient health information. Who… hospital employees with remote access or remote devices accessing EPHI; and non-hospital employees with remote access. How… only access authorized data report misuse, loss or lack of need for remote access or devices do not tamper with portable device system settings appropriately transmit, download, and print EPHI. If you have any questions, send an to Kirk Larson, VP & Chief Information Officersend an to Kirk Larson, VP & Chief Information Officer