Copyright © 2009 by The McGraw-Hill Companies, Inc. All Rights Reserved. McGraw-Hill Chapter 6 The Privacy and Security of Electronic Health Information.

Slides:



Advertisements
Similar presentations
Todd Frech Ocius Medical Informatics 6650 Rivers Ave, Suite 137 North Charleston, SC Health Insurance Portability.
Advertisements

HIPAA Security Standards Emmanuelle Mirsakov USC School of Pharmacy.
Security Vulnerabilities and Conflicts of Interest in the Provider-Clearinghouse*-Payer Model Andy Podgurski and Bret Kiraly EECS Department & Sharona.
HIPAA Privacy Training. 2 HIPAA Background Health Insurance Portability and Accountability Act of 1996 Copyright 2010 MHM Resources LLC.
COBB/DOUGLAS COMMUNITY SERVICES BOARD Confidentiality and Privacy of Consumer Information.
National Health Information Privacy and Security Week Understanding the HIPAA Privacy and Security Rule.
Increasing public concern about loss of privacy Broad availability of information stored and exchanged in electronic format Concerns about genetic information.
The Health Insurance Portability and Accountability Act of 1996– charged the Department of Health and Human Services (DHHS) with creating health information.
Information Risk Management Key Component for HIPAA Security Compliance Ann Geyer Tunitas Group
HIPAA Health Insurance Portability and Accountability Act.
Health Insurance Portability and Accountability Act (HIPAA)HIPAA.
1 HIPAA Education CCAC Professional Development Training September 2006 CCAC Professional Development Training September 2006.
NAU HIPAA Awareness Training
1 Louisiana Department of Health and Hospitals Basic HIPAA Privacy Training: Policies and Procedures 01/09/
CHAPTER © 2011 The McGraw-Hill Companies, Inc. All rights reserved. 2 The Use of Health Information Technology in Physician Practices.
Reviewing the World of HIPAA Stephanie Anderson, CPC October 2006.
HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT OF 1996 (HIPAA)
HIPAA: FEDERAL REGULATIONS REGARDING PATIENT SECURITY.
HIPAA Privacy Rule Compliance Training for YSU April 9, 2014.
© 2011 The McGraw-Hill Companies, Inc. All rights reserved. 2.5 HIPAA Legislation and its Impact on Physician Practices 2-15 The Health Insurance Portability.
Are you ready for HIPPO??? Welcome to HIPAA
HIPAA HIPAA Health Insurance Portability and Accountability Act of 1996.
Privacy, Security, Confidentiality, and Legal Issues
© Copyright 2014 Saul Ewing LLP The Coalition for Academic Scientific Computation HIPAA Legal Framework and Breach Analysis Presented by: Bruce D. Armon,
2 HIPAA, HITECH, and Medical Records. Learning Outcomes When you finish this chapter, you will be able to: 2.1Discuss the importance of medical records.
HIPAA COMPLIANCE FANTASTIC FOUR CASEY FORD MANINDER SINGH RANGER OLSOM Information Security in Real Business.
2 The Use of Health Information Technology in Physician Practices.
HIPAA COMPLIANCE IN YOUR PRACTICE MARIBEL VALENTIN, ESQUIRE.
ELECTRONIC MEDICAL RECORDS By Group 5 members: Kinal Patel David A. Ronca Tolulope Oke.
HIPAA Health Insurance Portability & Accountability Act of 1996.
HIPAA – Health Insurance Portability & Accountability Act and the Privacy Act MSgt Nechele M. Chambers Senior Enlisted Liaison TRICARE Area Office-Europe.
© 2009 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill Career Education Computers in the Medical Office Chapter 2: Information Technology.
The Use of Health Information Technology in Physician Practices
CHAPTER © 2012 The McGraw-Hill Companies, Inc. All rights reserved. 2 HIPAA, HITECH, and Medical Records.
HIPAA PRIVACY AND SECURITY AWARENESS.
“ Technology Working For People” Intro to HIPAA and Small Practice Implementation.
Privacy and Security of Protected Health Information NorthPoint Health & Wellness Center 2011.
Quality Integrity Stewardship Courtesy Care Accountability Medical Records ARMA Florida Gulf Coast Chapter Michael Spake Lakeland Regional Medical Center.
Copyright ©2011 by Pearson Education, Inc. Upper Saddle River, New Jersey All rights reserved. Health Information Technology and Management Richard.
Computerized Networking of HIV Providers Workshop Data Security, Privacy and HIPAA: Focus on Privacy Joy L. Pritts, J.D. Assistant Research Professor Health.
HIPAA Michigan Cancer Registrars Association 2005 Annual Educational Conference Sandy Routhier.
© 2009 The McGraw-Hill Companies, Inc. All rights reserved. 1 McGraw-Hill Chapter 2 The HIPAA Privacy Standards HIPAA for Allied Health Careers.
Medical Law and Ethics, Third Edition Bonnie F. Fremgen Copyright ©2009 by Pearson Education, Inc. Upper Saddle River, New Jersey All rights reserved.
Building a Privacy Foundation. Setting the Standard for Privacy Health Insurance Portability and Accountability Act (HIPAA) Patient Bill of Rights Federal.
LeToia Crozier, Esq., CHC Vice President, Compliance & Regulatory Affairs Corey Wilson Director of Technical Services & Security Officer Interactive Think.
Health Insurance Portability and Accountability Act (HIPAA) CCAC.
Health Insurance Portability and Accountability Act of 1996 HIPAA Privacy Training for County Employees.
Eliza de Guzman HTM 520 Health Information Exchange.
© 2013 The McGraw-Hill Companies, Inc. All rights reserved. Ch 8 Privacy Law and HIPAA.
Chapter 7—Privacy Law and HIPAA
HIPAA THE PRIVACY RULE. 2 HISTORY In 2000, many patients that were newly diagnosed with depression received free samples of anti- depressant medications.
The Culture of Healthcare Privacy, Confidentiality, and Security Lecture d This material (Comp2_Unit9d) was developed by Oregon Health and Science University,
Policies for Information Sharing April 10, 2006 Mark Frisse, MD, MBA, MSc Marcy Wilder, JD Janlori Goldman, JD Joseph Heyman, MD.
Copyright ©2014 by Saunders, an imprint of Elsevier Inc. All rights reserved 1 Chapter 02 Compliance, Privacy, Fraud, and Abuse in Insurance Billing Insurance.
Component 8/Unit 6aHealth IT Workforce Curriculum Version 1.0 Fall Installation and Maintenance of Health IT Systems Unit 6a System Security Procedures.
Unit 7 Seminar.  According to Sanderson (2009), the problems with the current paper-based health record system have been well documented. The author.
Copyright © 2015 by Saunders, an imprint of Elsevier Inc. All rights reserved. Chapter 3 Privacy, Confidentiality, and Security.
Health Insurance Portability and Accountability Act By Bradley Gleich.
HIPAA Overview Why do we need a federal rule on privacy? Privacy is a fundamental right Privacy can be defined as the ability of the individual to determine.
Table of Contents. Lessons 1. Introduction to HIPAA Go Go 2. The Privacy Rule Go Go.
The Health Insurance Portability and Accountability Act of 1996 “HIPAA” Public Law
HIPAA Training. What information is considered PHI (Protected Health Information)  Dates- Birthdays, Dates of Admission and Discharge, Date of Death.
COMMUNITY-WIDE HEALTH INFORMATION EXCHANGE: HIPAA PRIVACY AND SECURITY ISSUES Ninth National HIPAA Summit September 14, 2004 Prepared by: Robert Belfort,
Copyright © 2009 by The McGraw-Hill Companies, Inc. All Rights Reserved. McGraw-Hill/Irwin Chapter 6 The Privacy and Security of Electronic Health Information.
Junli M. Awit, RN.  Enacted by President Bill Clinton in 1996  Title I of HIPAA protects health insurance coverage for workers and their families when.
HIPAA PRIVACY AWARENESS, COMPLIANCE and ENFORCEMENT
Disability Services Agencies Briefing On HIPAA
HIPAA SECURITY RULE Copyright © 2008, 2006, 2004 by Saunders an imprint of Elsevier Inc. All rights reserved.
Lesson 1: Introduction to HIPAA
HIPAA Compliance Services CTG HealthCare Solutions, Inc.
Presentation transcript:

Copyright © 2009 by The McGraw-Hill Companies, Inc. All Rights Reserved. McGraw-Hill Chapter 6 The Privacy and Security of Electronic Health Information Electronic Health Records for Allied Health Careers Cover goes here when ready

6-2 Learning Outcomes After studying this chapter, you should be able to: 1.Describe the purpose of the Administrative Simplification provisions of the Health Insurance Portability and Accountability Act (HIPAA). 2.Discuss how the HIPAA Privacy Rule protects patient health information. 3.Describe when protected health information can be released without patients’ authorization. 4.List three categories of threats to the security of electronic information. 5.Describe the safeguards outlined in the HIPAA Security Rule.

6-3 Learning Outcomes After studying this chapter, you should be able to: 6.Discuss the ways that increased use of information technology places protected health information at greater risks. 7.Explain why the existing HIPAA laws may not be adequate in today’s health care environment. 8.Explain why public trust is key to the development of electronic health records and a nationwide health information network.

6-4 Key Terms administrative safeguards Administrative Simplification antivirus software audit trails authentication authorization availability business associates clearinghouses confidentiality covered entities (CEs) de-identified health information designated record set (DRS) disclosure electronic protected health information (ePHI) encryption firewall

6-5 Key Terms health information exchange health plan HIPAA Privacy Rule HIPAA Security Rule integrity intrusion detection system (IDS) minimum necessary standard Notice of Privacy Practices (NPP) passwords physical safeguards protected health information (PHI) providers role-based authorization technical safeguards treatment, payment, and operations (TPO)

6-6 The Health Insurance Portability and Accountability Act of 1996 (HIPAA) HIPAA is the most significant legislation affecting health care since Medicare and Medicaid in Title I of HIPAA = Health Insurance Reform Title II of HIPAA = Administrative Simplification Standards

6-7 The Privacy Rule Covered entities –Health plans –Providers –Clearinghouses

6-8 The privacy Rule Business Associates –not covered entities, but use PHI for business purposes –covered entities must have contracts with Business Associates stating that they will abide by HIPAA Privacy Rule

6-9 The Privacy Rule Protected Health Information –Individually identifiable health information –Privacy Rule applies to PHI in any form whether it is communicated and/or maintained verbally, on paper, or electronically.

6-10 The Privacy Rule Minimum Necessary Standard –Limiting information to minimum PHI necessary for intended purpose. Designated Record Set (DRS) –A group of records that contains PHI; contents depend on the role of the organization or provider.

6-11 The Privacy Rule Disclosure of Personal Health Information (PHI) Release of Information for Purposes Other Than TPO –An authorization (special permission) must be obtained from the patient for uses and disclosures other than for TPO. –Disclosures must be documented and provided to the patient if requested. –Use and disclosure rules do not apply to de-identified health information which is information that neither identifies nor provides a reasonable basis for identification of an individual.

6-12 The Privacy Rule Notice of Privacy Practices (NPP) Rights of Individuals HIPAA Enforcement

6-13 Threats to the Security of Electronic Health Information The Actions of Individuals Environmental Hazards Computer Hardware, Software, or Network Problems

6-14 The Security Rule Protects the confidentiality, integrity, and availability of electronic protected health information (ePHI) of covered entities

6-15 The Security Rule Administrative Safeguards –Policies and procedures to protect ePHI. Physical Safeguards –Mechanisms to physically protect electronic systems, equipment, and data. Technical Safeguards –Automated processes that protect and control access to ePHI.

6-16 Privacy and Security Risks of Electronic Health Information Exchange Clinical Data Available in Electronic Form Portable Computers and Storage Devices Problems Not Adequately Addressed by Existing Privacy Laws –Private Sector Electronic Networks –Personal Health Records (PHRs) –Overseas Business Associates –Multistate Exchange of Data with Different Laws

6-17 The Importance of Public Trust If people don’t trust that their personal information will be kept confidential, they won’t disclose it; this can lead to a lack of appropriate care.

6-18 The Importance of Public Trust Public Attitudes Toward the Electronic Use of Health Information –Most people believe that the confidentiality of their medical records is very important –The majority of people express concern about the privacy of their information. –Regional or nationwide health information networks will have to be proven to be safe to gain the public’s trust.