Privacy and Security of Health Information Information in New York State

Size: px
Start display at page:

Download "Privacy and Security of Health Information Information in New York State"

Transcription

1 Privacy and Security of Health Information Information in New York State 2015

2 Privacy and Security of Health Information in New York State Welcome Hello, my name is Roger, and I'm here to talk with you about privacy laws that protect health information. You have probably already heard of HIPAA or other privacy laws, but you may not know how they affect your day to day work activities

3 Privacy and Security Laws in NYS HIPAA/HITECH, 42 CFR Part 2, Public Health Law, Mental Hygiene Law, Information Security Breach and Notification Act, Personal Privacy Protection Law These are the names of different privacy and security laws that protect patient health information in New York. Some are federal and some are New York State laws. Some protect all types of health and behavioral health information, and some are specific to mental health, HIV, developmental disabilities, or alcohol/substance abuse information. The important thing for you to know, though, is how they affect the way you do your job. These laws exist to ensure that when people seek treatment for either mental or physical health conditions, they can expect that, with limited exceptions, only the people involved in helping them will know details related to their care. Detailed descriptions of these laws can be found in the RESOURCES section at the end of this document NOTE - some of the laws listed may apply to certain agencies or facilities only. Your agency will provide training on the specific laws and regulations you need to know in order to do your job

4 Health Insurance Portability and Accountability Act The most far-reaching of the privacy laws is the Health Insurance Portability and Accountability Act, or HIPAA. This training focuses on the privacy and security rules in the federal HIPAA regulations. HIPAA in effect since 2003 amended in 2009 by the HITECH Act found in 45 CFR Parts 160 & 164 Health Information Terms Before we begin our discussion of HIPAA and other privacy laws, let's review a few general health terms. Privacy The right of individuals to determine for themselves when, how, and to what extent information about them is communicated to others Security The safeguarding of information from loss or misuse Health Physical health Behavioral Health Mental health, alcoholism/substance abuse, or developmental disabilities Health Information Any information, whether verbal or recorded in any form, about a person s past, present, or future physical or behavioral health care, including payment for that care. To be covered by HIPAA, information has to be kept by a Covered Entity or a covered entity's business associate

5 Individually Identifiable Health Information A combination of health information with something that identifies, or could reasonably identify, the person who is the subject of the information (such as the person's name, address, telephone number, or Social Security number) Covered Entities A Covered Entity is a term used in HIPAA to define who is responsible for complying with its provisions. It includes: Health Plans Insurance companies, HMOs, company health plans, dental or vision plans, or government programs that pay for health care, such as New York State's Medicaid program. Health Care Providers Physicians, hospitals, or any other provider of health or behavioral health care who transmits health information in electronic form in connection with a HIPAA standard transaction. Health Care Clearinghouses Billing companies that help health care providers engage in electronic transactions under HIPAA. A number of New York State Agencies are Covered Entities or have covered functions because they either provide health care or pay for health care. Business Associates As a Covered Entity, your agency may have contracts with outside vendors that provide services involving the use and disclosure of Protected Health Information on behalf of the agency. These contractors are called Business Associates and are required to protect health care information in the same manner that your agency protects it. HIPAA requires that Covered Entities and Business Associates enter into contracts to ensure that the Business Associates will properly safeguard PHI

6 Protected Health Information Any health information that could identify a particular individual is Protected Health Information, or PHI. Protected Health Information can be spoken, written or entered into a computer. For example, the fact that a patient has a particular diagnosis, received a particular treatment or is enrolled in a particular health insurance program is PHI. Even if the information does not contain an individual's name, if it contains other identifying information, such as a date of birth, or a date of admission to a specific hospital, it is still PHI under HIPAA. You are taking this training because you may need to use or disclose Protected Health Information to do your job. The HIPAA rules allow you to use and disclose PHI for the purpose of treatment, payment or health care operations, which is just another way of saying you are allowed to use and disclose PHI as needed to do your job. Notice of Privacy Practices When you visit a doctor for the first time, you will most likely receive a HIPAA Notice of Privacy Practices. Health plans and covered health care providers are required to give you a notice that describes how the doctor may use and disclose your Protected Health Information and how you can get access to this information. Notices of Privacy Practices are made available to the patients and health insurance enrollees served by your agency. HIPAA-covered entities must post Notices of Privacy Practices on their websites. Inspect and Copy HIPAA gives individuals a number of specific rights which are spelled out in the Notice of Privacy Practices. For example, patients and health plan enrollees have a right to see or get an electronic or paper copy of their medical records and other health information

7 Restricted Use and Disclosure of PHI Patients can ask that health information not be shared with certain people, groups, or companies. When visiting a clinic, for example, a patient may ask the doctor not to share medical records with other doctors or nurses at the clinic. A covered entity may not agree to do so if it could affect the patient s care. Patients have the right to restrict disclosures of health information to a health plan when they pay out of pocket in full for the health care. Amendment HIPAA also gives people the right to request an amendment to their health information. For example, a patient may see a specialist for a second opinion and request that information be included in his health information. A Covered Entity is not required to make the amendment if the existing information is believed to be accurate. In this case, the individual requesting an amendment is entitled to add to the record a statement indicating why he or she believes the record should be amended. Confidential Communications Individuals can request to be contacted in a specific way. For example, patients can request to be called on an office, home, or cell phone or have mail sent to a mailing address different from their home address. This makes it possible to get treatment without others finding out about it

8 Disclosure Accounting/Complaints Disclosure Accounting Individuals have a right to an accounting of disclosures that are not for treatment, payment, or health care operations. Complaints Individuals can file a complaint with an agency if they feel the agency is not following HIPAA rules. Report any such complaints to your supervisor so the complaints can be investigated and handled properly. Complaints about an organization other than a state agency or its Business Associates should be filed with the U.S. Department of Health and Human Services. Contact information for this federal agency can be found at the end of this document. Handling Patient Requests Your agency may have specific procedures for handling patient requests. Be sure to ask your supervisor for the guidelines you are required to follow. Following the Rules We talked about Protected Health Information (PHI), what it is, and the rights individuals have with respect to their own PHI. Next we'll discuss the specific rules Covered Entities must follow when using and disclosing PHI. Authorizations As we mentioned earlier, HIPAA rules allow you to use and disclose Protected Health Information for the purpose of treatment, payment or health care operations. But HIPAA prohibits you from using or disclosing PHI for any other purpose unless you have a written, signed authorization from the individual whose information you are using or disclosing. For example, you are not allowed to access information about your neighbor or a local celebrity if it's not something you are doing as part of your normal job responsibilities. Minimum Necessary Your agency s policies and procedures allow access to Protected Health Information only to those members of the workforce who need it. Once you are given access (unless you are a health care provider accessing the information for the purpose of treating a patient) you are only allowed to use and share the minimum necessary amount of PHI required to do your job

9 This is just another way of saying that you should use and disclose PHI on a "need to know" basis. Remember PHI can be verbal. Do not disclose PHI in places where people who do not need the information can overhear you, such as in an elevator. Verification When you are disclosing Protected Health Information to do your job you must make sure that the person you are disclosing information to is authorized to receive the PHI. Before disclosing information to a person you have not dealt with before you will need to verify the individual's identity. Your agency has policies and procedures in place to identify the people or groups of people who need access to PHI to do their jobs. Check with your supervisor for the proper way to verify the person is authorized to receive PHI. Incidental Disclosures In a health care setting such as a hospital providing treatment to a patient, other patients and visitors will inevitably see and hear certain things that provide some information about the patient s diagnosis and treatment, such as the very fact that the person is a patient at that hospital. HIPAA recognizes this reality and allows disclosures that are incidental to normal health care operations, so long as the Covered Entity takes reasonable measures to keep such disclosures to the minimum necessary

10 Breaches If you learn that someone in your agency has disclosed Protected Health Information to a person not authorized to receive it, tell your supervisor immediately so that appropriate steps can be taken to protect information and systems. This is important whether the disclosure was intentional or not. Your agency will investigate the possible breach and determine what steps to take next. If the breach may have compromised the security or privacy of the information, the agency may have to notify the individuals and the U.S. Department of Health and Human Services of the breach or unauthorized disclosure. In addition, the agency and members of the workforce may face fines and criminal charges. But even more than that, keeping people's health information private and secure is just the right thing to do. Security of PHI Most breaches are not intentional but are often due to carelessness. Following these best practices will help you maintain the security of Protected Health Information and avoid breaches. Work Stations Do not write your password down or give it to other people. Lock your computer when you leave your work station. Do not leave Protected Health Information out in an unlocked office. Do not put PHI in the trash or recycle bin. Instead, make sure it is shredded. Position your computer so your screen is not visible to others

11 Portable Electronic Media Devices Don't save Protected Health Information onto a laptop, flash drive or other portable electronic media device unless you have to. If you do have to, make sure the device is encrypted. Just because your laptop s operating system prompts you to enter a password, that does not mean that your laptop is encrypted. Speak with your supervisor and IT support to make sure your laptop or other device is encrypted and not merely password protected. Do not leave a laptop or other media device unattended. Personal Electronic Devices DO NOT store Protected Health Information on personal electronic devices, such as your mobile phone or tablet. Course Title Voic /Faxes Do not include Protected Health Information when you leave a voic message. Do not include PHI in faxes unless you have to. Be sure to check your agency s policies regarding sending PHI in faxes. When PHI is in a fax, make sure the intended recipient knows the fax is being sent and takes it out of the machine on the other end. This will prevent other people from viewing the PHI

12 Check your agency s policies regarding sending Protected Health Information in messages. If you do send an with PHI, limit the amount of PHI to the minimum necessary and don't include PHI in the subject line. The preferred method for sending PHI in is to put the PHI in an attachment that is encrypted. Then send the password to unencrypt the attachment in a second, separate communication. Always verify the address before hitting "Send." Many systems auto fill the address based on the first few letters typed. Sanctions HIPAA is a federal law. Even if you accidentally break the rules, you can be subject to discipline or other administrative action, the same as if you were to break other rules of the workplace. If you purposely break the HIPAA rules, you could face criminal prosecution. The most important thing to remember is that you should only use or disclose health information as needed to do your job. If you have questions about the privacy and security laws that apply to your work environment, be sure to talk to your supervisor. Training HIPAA requires all members of the workforce who handle Protected Health Information receive HIPAA training. In addition to this training, your agency may provide training on the privacy laws and policies and procedures you are required to follow as well as the specific security measures used by your agency. Your supervisor will also give you information about ways that HIPAA applies to your particular job

13 Real-Life Examples Now that you have the basics down, we re going to look at some real-life examples of how health information privacy laws relate to your work. Not all of them will be situations you will encounter every day, but all of them will help you learn how to apply privacy laws at work. Scenario 1 You receive an from Sue, a coworker, asking you to send her all the records you have on Mr. Kattan, a patient. You know that Sue is authorized to receive Mr. Kattan's Protected Health Information. What should you do? A. Forward all records you have for Mr. Kattan. B. Forward all records for Mr. Kattan since the diagnosis was made. C. Call your coworker and make sure that she really needs all the records; depending on the purpose behind her request, you may be able to limit the amount of information that needs to be shared (by date, diagnosis, etc.). D. Refuse the request. Feedback: The correct option is C. Sharing of PHI with a coworker is acceptable use and is permissible. However, by taking the extra step of clarifying her request, you will ensure that only the minimum necessary amount of information needed will be given to Sue

14 Scenario 2 You receive an that is intended for a coworker that has the same first name as you. The contains Protected Health Information. What should you do? A. Delete the and go back to work. B. Forward the to your supervisor, with a copy to the person who sent it to you, explaining that you should not have received the original . C. Reply to the person that sent it to you, removing the Protected Health Information from the body of the and letting the sender know that you received the message in error. Finally, delete the original . D. Forward the to the person you think it was intended for. Feedback: The correct option is C. By deleting the PHI and then advising the sender that you received the in error, you ensure that there is no further privacy violation. Deleting the original further ensures privacy. When handled appropriately in this manner, this type of unintended disclosure would not be considered a breach that compromises the privacy or security of the PHI

15 Scenario 3 NYS Freedom of Information Law (FOIL) grants citizens the right to know how government operates. It provides rights of access to records reflective of governmental decisions and policies that affect the lives of every New Yorker. An attorney submits a request under FOIL to Rita Timonen, the agency's Records Access Officer, requesting the clinical record of a patient who his client is suing. What should Rita do? A. She should release all of the information the attorney is seeking. B. She should not release any information, on the grounds that clinical records are confidential and are not subject to disclosure under the Freedom of Information Law. C. She should release only the part of the clinical record that seems to pertain to the lawsuit. D. She should release the entire clinical record, but should scratch out or remove the patient's name wherever it appears in the record. Feedback: The correct option is B. She should not release any information because the Personal Privacy Protection Law prohibits disclosure when it would be an unwarranted invasion of personal privacy. The agency should give no information about whether they have the individual s records at all

16 Scenario 4 Dr. Shen from your facility, who you work with and know well, needs to enter clinical information about a patient into your facility's computer system, but has forgotten her password. You are not personally involved with this patient in any way. After several attempts to access the system, Dr. Shen gets locked out. The Information Technology department staff members have left for the day, so Dr. Shen cannot contact them for assistance. While the information is not critical to patient care, she would like to enter the information as soon as possible. She asks for your password. You have been authorized with the same access into the system as Dr. Shen, so she can enter what she needs to by being logged in as you. What should you do? A. Since you know and trust Dr. Shen, give her your password to access the site. B. Tell her you cannot give her your password, but you will access the system using your password and then allow the physician to directly enter the information into the system. C. Tell Dr. Shen you cannot give her your password, but offer to enter the information into the system for her. D. Tell Dr. Shen you cannot give her your password and advise her to use the facility s emergency contact procedures to have her password reset. Feedback: The correct option is D. Never let anyone use your password to obtain access to the network

17 Scenario 5 You are in a hospital common area with two of your hospital coworkers, who both work together on a different ward than you do. They begin to casually discuss an incident that happened that day with one of their patients. Because you work in a different ward, you do not know the patient and you are not involved in that patient's care. During the course of their conversation, they mention the patient's name and that he was diagnosed as being schizophrenic. What should you do? A. Advise your two coworkers to please stop discussing the patient and the incident while you are with them. Remind them that they should not be discussing Protected Health Information and other confidential information with you or with others who are not authorized to have this. B. Since you all work at the same hospital, tell your coworkers that they can continue their discussion, but should be quieter since others in the area may not be employees and may overhear what they are saying about the patient. C. Continue what you re doing and don t say anything. D. Since a similar type of incident could happen with patients on your ward, ask for more details from the two coworkers because it would be a good learning experience for you. Feedback: The correct option is A. When discussing PHI or other confidential information with others (in person or on the phone), this information should be shared with only those people who are authorized to receive the information and have a need to know status

18 Scenario 6 While you are providing services to a patient in a hospital, a doctor is talking quietly to another patient in another hospital bed in the same room. You, your patient, and your patient's visitors overhear parts of the conversation. What should you do? A. Nothing. B. Speak to the doctor after you both leave the room, reminding him of his patient s right to privacy. C. Speak loudly while you are in the room so that your patient and his visitors cannot overhear the other conversation. D. Interrupt the doctor to remind him of his patient s protection under privacy laws. Feedback: The correct option is A. Incidental disclosures are allowed, so long as the Covered Entity takes reasonable measures to keep the disclosures to the minimum necessary

19 Scenario 7 You have a number of patient case files to update, and you will not be able to complete them by the end of the week. If the files are not updated, information about the changes in the patients' medications will not be available to direct care staff when they report to work on Monday. You would like to bring your laptop home to work over the weekend. You've recently changed your password and still have trouble remembering it from time to time. What should you do? A. Write the password on a sticky note and paste it on the laptop so you don t have to remember it, take the laptop home, and work on the files over the weekend. B. Before you take Protected Health Information home, contact your IT department to make the data in the laptop is encrypted. If you take the laptop home, make sure that you take all reasonable safeguards to prevent it from being lost or stolen. C. Tell your supervisor that you are unable to update your case files in a timely manner, and then go home and enjoy your weekend. Feedback: The correct option is B. Before you take PHI home, contact your IT department to make sure the data in the laptop is encrypted. Encrypting the data will make it less likely that anyone will be able to access it if it is lost or stolen. (Agencies should encrypt all laptops that contain confidential information.) Do not write down your password, especially not where somebody else who gained access to your device could see it

20 Scenario 8 After working for many years at a mental health clinic, you start a new job at a substance abuse clinic. You receive a call from an insurance company asking for information about one of your patients in order to pay for care. You used to answer questions like this all the time at the mental health clinic and know that it is okay to disclose Protected Health Information for payment purposes. What should you do? A. Disclose the information, because you know it was okay to disclose this information at the mental health clinic. B. Check with your supervisor to make sure the laws that protect the information at the substance abuse clinic are the same as the laws that protect the information at the mental health clinic. C. Refuse to disclose the information and do nothing further. Feedback: The correct option is B. In this case, disclosures for payment purposes without patient authorization are permitted under HIPAA and New York s Mental Hygiene Law, so it was appropriate to disclose the information in the mental health clinic. However, disclosures for payment purposes without patient authorization are NOT permitted for alcohol and substance abuse treatment records under federal regulations in 42 CFR Part 2. Following the same practice under these circumstances would violate this privacy regulation

21 Scenario 9 You receive a voice message from Patricia, who says she is researching her genealogy and thinks that her great-aunt, Shirley, was a patient in a State hospital just before she died 25 years ago. She gives you Shirley's full name and asks you to send her the entire medical record. You run a search on the name and find that there is a person of that name in your files. What should you do? A. Contact Patricia and explain that because HIPAA protects the records of deceased individuals, you are unable to simply release any records you may have to her. B. Because the records are over 25 years old, they are no longer protected by HIPAA. Contact the person requesting the information, verify her identity, and send her the entire record. C. Put together five questions from the record, such as, 'What was your greataunt's maiden name? When was her birthday? Did she have any children?' Contact the person requesting the records and ask her the five questions. If she gets three out of five correct, send her the entire medical record. D. Release only a limited amount of information from the record, including the patient's name, date of birth, diagnosis, and date of death, but withhold the rest of the medical record. Feedback: The correct option is A. Under HIPAA, a person s right to confidentiality of his/her clinical information continues for a period of 50 years following the death of the individual

22 Scenario 10 You find a portion of a patient's record left on the glass of a copy machine in a public area of your office. No one else is around. What should you do? A. Call the patient and notify them that their Protected Health Information was left out in the open. B. Shred the document. C. Leave it by the copier. The person who left it will most likely come back. D. Secure the document by putting it in a folder or envelope and report it to your supervisor. Feedback: The correct option is D. Securing the document prevents further unintentional disclosure, and a supervisor can make sure the incident is properly documented. Be sure to cover the information appropriately at all times while delivering it

23 Information Sources - Privacy and Security of Health Information Complaints If you believe that your health information privacy rights have been violated, you may file a complaint with: US Department of Health and Human Services (HHS) Office for Civil Rights (OCR) Model Notices of Privacy Practices Several formats, in both English and Spanish, are available on the HHS website

24 Privacy and Security Law Descriptions HIPAA The Health Insurance Portability and Accountability Act of 1996 (this is a federal law) HITECH The Health Information Technology for Economic and Clinical Health Act, which made some amendments to HIPAA (this is a federal law) Public Health Law New York State laws that protect the privacy of health information, including special protections for information about HIV or AIDS Mental Hygiene Law New York State laws that protect the privacy of clinical records created by mental health providers under the jurisdiction of the Office of Mental Health, and of clinical records created by providers of services for persons with developmental disabilities under the jurisdiction of the Office for People With Developmental Disabilities 42 CFR Part 2 Federal regulations that protect the confidentiality of records created by federally funded alcoholism/substance abuse providers (providers under the jurisdiction of the Office of Alcoholism and Substance Abuse Services) Information Security Breach and Notification Act New York State laws found in the State Technology Law and General Business Law which require state agencies or businesses conducting business in NY who own or license computerized data which includes private information to disclose any breach of the data to NY residents Personal Privacy Protection Law Public Officer s Law Article 6-A prohibits disclosing information when it would be an unwarranted invasion of personal privacy

HIPAA RULES AND REGULATIONS

HIPAA RULES AND REGULATIONS HIPAA RULES AND REGULATIONS INTRODUCTION Everyone who works in or around health care has heard about the HIPAA, the Health Insurance Portability and Accountability Act. And certainly, everyone who is in

More information

PHI- Protected Health Information

PHI- Protected Health Information HIPAA Policy 2014 The Health Insurance Portability and Accountability Act is a federal law that protects the privacy and security of patients health information and grants certain rights to patients. Clarkson

More information

HIPAA and Privacy Policy Training

HIPAA and Privacy Policy Training HIPAA and Privacy Policy Training July 2015 1 This training addresses the requirements for maintaining the privacy of confidential information received from HFS and DHS (the Agencies). During this training

More information

Health Insurance Portability and Accountability Act (HIPAA)

Health Insurance Portability and Accountability Act (HIPAA) Health Insurance Portability and Accountability Act (HIPAA) General Education Presented by: Bureau of Personnel Department of Health Department of Human Services Department of Social Services Bureau of

More information

By the end of this course you will demonstrate:

By the end of this course you will demonstrate: 1 By the end of this course you will demonstrate: 1. that HIPAA privacy rules protect privacy and security of confidential information. 2. your responsibility for use and protection of protected health

More information

Louisiana Department of Health and Hospitals Basic HIPAA Privacy Training: Policies and Procedures

Louisiana Department of Health and Hospitals Basic HIPAA Privacy Training: Policies and Procedures Louisiana Department of Health and Hospitals Basic HIPAA Privacy Training: Policies and Procedures 1 What Is HIPAA? HIPAA (pronounced hippa) is a federal law. It s a set of rules and regulations that affect

More information

HIPAA. Developed by The University of Texas at Dallas Callier Center for Communication Disorders

HIPAA. Developed by The University of Texas at Dallas Callier Center for Communication Disorders HIPAA Developed by The University of Texas at Dallas Callier Center for Communication Disorders Purpose of this training Everyone with access to Protected Health Information (PHI) must comply with HIPAA

More information

HIPAA In The Workplace. What Every Employee Should Know and Remember

HIPAA In The Workplace. What Every Employee Should Know and Remember HIPAA In The Workplace What Every Employee Should Know and Remember What is HIPAA? The Health Insurance Portability and Accountability Act of 1996 Portable Accountable Rules for Privacy Rules for Security

More information

HIPAA PRIVACY AND SECURITY TRAINING P I E D M O N T COMMUNITY H EA LT H P L A N

HIPAA PRIVACY AND SECURITY TRAINING P I E D M O N T COMMUNITY H EA LT H P L A N HIPAA PRIVACY AND SECURITY TRAINING P I E D M O N T COMMUNITY H EA LT H P L A N 1 COURSE OVERVIEW This course is broken down into 4 modules: Module 1: HIPAA Omnibus Rule - What you need to know to remain

More information

Department of Health and Human Services Policy ADMN 004, Attachment A

Department of Health and Human Services Policy ADMN 004, Attachment A WASHINGTON COUNTY Department of Health and Human Services Policy ADMN 004, Attachment A HHS Confidentiality Agreement Including HIPAA (Health Information Portability and Accessibility Act of 1996) OREGON

More information

HIPAA Privacy & Security Training for Clinicians

HIPAA Privacy & Security Training for Clinicians HIPAA Privacy & Security Training for Clinicians Agenda This training will cover the following information: Overview of Privacy Rule and Security Rules Using and disclosing Protected Health Information

More information

Page 1. NAOP HIPAA and Privacy Risks 3/11/2014. Privacy means being able to have control over how your information is collected, used, or shared;

Page 1. NAOP HIPAA and Privacy Risks 3/11/2014. Privacy means being able to have control over how your information is collected, used, or shared; Page 1 National Organization of Alternative Programs 2014 NOAP Educational Conference HIPAA and Privacy Risks Ira J Rothman, CPHIMS, CIPP/US/IT/E/G Senior Vice President - Privacy Official March 26, 2014

More information

2014 Core Training 1

2014 Core Training 1 2014 Core Training 1 Course Agenda Review of Key Privacy Laws/Regulations: Federal HIPAA/HITECH regulations State privacy laws Privacy & Security Policies & Procedures Huntsville Hospital Health System

More information

HIPAA Privacy and Security. Rochelle Steimel, HIPAA Privacy Official Judy Smith, Staff Development January 2012

HIPAA Privacy and Security. Rochelle Steimel, HIPAA Privacy Official Judy Smith, Staff Development January 2012 HIPAA Privacy and Security Rochelle Steimel, HIPAA Privacy Official Judy Smith, Staff Development January 2012 Goals and Objectives Course Goal: To introduce the staff of Munson Healthcare to the concepts

More information

Privacy & Security Standards to Protect Patient Information

Privacy & Security Standards to Protect Patient Information Privacy & Security Standards to Protect Patient Information Health Insurance Portability & Accountability Act (HIPAA) 12/16/10 Topics An An Introduction to to HIPAA HIPAA Patient Rights Rights Routine

More information

HIPAA Happenings in Hospital Systems. Donna J Brock, RHIT System HIM Audit & Privacy Coordinator

HIPAA Happenings in Hospital Systems. Donna J Brock, RHIT System HIM Audit & Privacy Coordinator HIPAA Happenings in Hospital Systems Donna J Brock, RHIT System HIM Audit & Privacy Coordinator HIPAA Health Insurance Portability and Accountability Act of 1996 Title 1 Title II Title III Title IV Title

More information

HIPAA Training: Ensuring Privacy for our Patients

HIPAA Training: Ensuring Privacy for our Patients HIPAA Training: Ensuring Privacy for our Patients The purpose of the HIPAA Privacy Rule is to prevent inappropriate use and disclosure of individual health information, most commonly referred to as protected

More information

OF MICHIGAN HEALTH SYSTEM

OF MICHIGAN HEALTH SYSTEM 1 PHI - Protected Health Information UNIVERSITY OF MICHIGAN HEALTH SYSTEM Updated 09/23/2013 2 Q: Is PHI the same as the medical record? A: No. protects more than the official medical record. Lots of other

More information

HIPAA 101: Privacy and Security Basics

HIPAA 101: Privacy and Security Basics HIPAA 101: Privacy and Security Basics Purpose This document provides important information about Kaiser Permanente policies and state and federal laws for protecting the privacy and security of individually

More information

HFS DATA SECURITY TRAINING WITH TECHNOLOGY COMES RESPONSIBILITY

HFS DATA SECURITY TRAINING WITH TECHNOLOGY COMES RESPONSIBILITY HFS DATA SECURITY TRAINING WITH TECHNOLOGY COMES RESPONSIBILITY Illinois Department of Healthcare and Family Services Training Outline: Training Goals What is the HIPAA Security Rule? What is the HFS Identity

More information

HIPAA Policy, Protection, and Pitfalls ARTHUR J. GALLAGHER & CO. BUSINESS WITHOUT BARRIERS

HIPAA Policy, Protection, and Pitfalls ARTHUR J. GALLAGHER & CO. BUSINESS WITHOUT BARRIERS HIPAA Policy, Protection, and Pitfalls Overview HIPAA Privacy Basics What s covered by HIPAA privacy rules, and what isn t? Interlude on the Hands-Off Group Health Plan When does this exception apply,

More information

HIPAA Education Level One For Volunteers & Observers

HIPAA Education Level One For Volunteers & Observers UK HealthCare HIPAA Education Page 1 September 1, 2009 HIPAA Education Level One For Volunteers & Observers ~ What does HIPAA stand for? H Health I Insurance P Portability A And Accountability A - Act

More information

The Basics of HIPAA Privacy and Security and HITECH

The Basics of HIPAA Privacy and Security and HITECH The Basics of HIPAA Privacy and Security and HITECH Protecting Patient Privacy Disclaimer The content of this webinar is to introduce the principles associated with HIPAA and HITECH regulations and is

More information

HIPAA Training for Staff and Volunteers

HIPAA Training for Staff and Volunteers HIPAA Training for Staff and Volunteers Objectives Explain the purpose of the HIPAA privacy, security and breach notification regulations Name three patient privacy rights Discuss what you can do to help

More information

Privacy Training for Harvard Medical Students

Privacy Training for Harvard Medical Students HIPAA Training: i Ensuring Privacy for our Patients Privacy Training for Harvard Medical Students Goals By the end of this program you will be able to Explain the basic principles of the Privacy Rule Understand

More information

HIPAA Privacy. September 21, 2013

HIPAA Privacy. September 21, 2013 HIPAA Privacy September 21, 2013 HIPAA Privacy Workforce Training The Health Insurance Portability & Accountability Act (HIPAA) requires that the University train all workforce members (faculty, staff,

More information

HIPAA PRIVACY AND SECURITY FOR EMPLOYERS

HIPAA PRIVACY AND SECURITY FOR EMPLOYERS HIPAA PRIVACY AND SECURITY FOR EMPLOYERS Agenda Background and Enforcement HIPAA Privacy and Security Rules Breach Notification Rules HPID Number Why Does it Matter HIPAA History HIPAA Title II Administrative

More information

UNDERSTANDING THE HIPAA/HITECH BREACH NOTIFICATION RULE 2/25/14

UNDERSTANDING THE HIPAA/HITECH BREACH NOTIFICATION RULE 2/25/14 UNDERSTANDING THE HIPAA/HITECH BREACH NOTIFICATION RULE 2/25/14 RULES Issued August 19, 2009 Requires Covered Entities to notify individuals of a breach as well as HHS without reasonable delay or within

More information

CREATIVE SOLUTIONS IN HEALTHCARE, INC. Privacy Policy

CREATIVE SOLUTIONS IN HEALTHCARE, INC. Privacy Policy CREATIVE SOLUTIONS IN HEALTHCARE, INC. Privacy Policy Amended as of February 12, 2010 on the authority of the HIPAA Privacy Officer for Creative Solutions in Healthcare, Inc. TABLE OF CONTENTS ARTICLE

More information

Privacy Compliance Health Occupations Students

Privacy Compliance Health Occupations Students Privacy Compliance Health Occupations Students Health Occupations Students The information in this power point is the same information provided to new SCHS caregivers at their orientation. We cannot stress

More information

Clinical Solutions. 2 Hour CEU

Clinical Solutions. 2 Hour CEU 1 2 Hour CEU 2 Course Objectives The purpose of this program is to provide nurses with information about the Health Insurance Portability and Accountability Act (HIPAA), especially as it relates to protected

More information

APPENDIX 1: Frequently Asked Questions

APPENDIX 1: Frequently Asked Questions APPENDIX 1: Frequently Asked Questions Practice Name Q: What is the HIPAA Privacy Rule? A: The HIPAA Privacy Rule controls the use and disclosure of what is known as Protected Health Information (PHI).

More information

HIPAA Training for Hospice Staff and Volunteers

HIPAA Training for Hospice Staff and Volunteers HIPAA Training for Hospice Staff and Volunteers Hospice Education Network Objectives Explain the purpose of the HIPAA privacy and security regulations Name three patient privacy rights Discuss what you

More information

TJ RAI, M.D. THERAPY MEDICATION WELLNESS PRIVACY POLICY STATEMENT

TJ RAI, M.D. THERAPY MEDICATION WELLNESS PRIVACY POLICY STATEMENT PRIVACY POLICY STATEMENT Purpose: It is the policy of this Physician Practice that we will adopt, maintain and comply with our Notice of Privacy Practices, which shall be consistent with HIPAA and California

More information

Health Insurance Portability and Accountability Act of 1996 (HIPAA) Contents

Health Insurance Portability and Accountability Act of 1996 (HIPAA) Contents Health Insurance Portability and Accountability Act of 1996 (HIPAA) Contents Health Insurance Portability and Accountability Act of 1996 (HIPAA)... 1 Welcome to HIPAA Awareness Training Content... 3 HIPAA

More information

Protecting Patient Privacy It s Everyone s Responsibility

Protecting Patient Privacy It s Everyone s Responsibility Protecting Patient Privacy It s Everyone s Responsibility Observation & Student Learning Packet 1. Read packet Instructions for Self-Study Module 2. Complete post-test. A score of 80% must be achieved.

More information

PRIVACY AND INFORMATION SECURITY INCIDENT REPORTING

PRIVACY AND INFORMATION SECURITY INCIDENT REPORTING PRIVACY AND INFORMATION SECURITY INCIDENT REPORTING PURPOSE The purpose of this policy is to describe the procedures by which Workforce members of UCLA Health System and David Geffen School of Medicine

More information

Privacy and Information Security Awareness Training. Health Insurance Portability & Accountability Act of 1996 -- HIPAA

Privacy and Information Security Awareness Training. Health Insurance Portability & Accountability Act of 1996 -- HIPAA Privacy and Information Security Awareness Training Health Insurance Portability & Accountability Act of 1996 -- HIPAA Objectives Understand basic HIPAA requirements Understand how the MCG Health System

More information

Patient Privacy and HIPAA/HITECH

Patient Privacy and HIPAA/HITECH Patient Privacy and HIPAA/HITECH What is HIPAA? Health Insurance Portability and Accountability Act of 1996 Implemented in 2003 Title II Administrative Simplification It s a federal law HIPAA is mandatory,

More information

HIPAA POLICY PROCEDURE GUIDE

HIPAA POLICY PROCEDURE GUIDE HIPAA POLICY & PROCEDURE GUIDE FRONT END AREAS Office of Compliance & Audit Services - 1 - Table of Contents I. Notice of Privacy Practices: Page 3 II. Disclosing Downstate Directory Information: Page

More information

Annual Compliance Training. HITECH/HIPAA Refresher

Annual Compliance Training. HITECH/HIPAA Refresher Annual Compliance Training HITECH/HIPAA Refresher January 2015 Sisters of Charity of Leavenworth Health System, Inc. All rights reserved. 1 Annual Refresher Training Welcome to the SCL Health System Compliance

More information

HIPAA MANUAL. Most health plans and health care providers that are covered by the new Rule must comply with the new requirements by April 14, 2003.

HIPAA MANUAL. Most health plans and health care providers that are covered by the new Rule must comply with the new requirements by April 14, 2003. HIPAA MANUAL What is HIPAA? Health Insurance Portability and Accountability Act. The Health Insurance Portability and Accountability Act (HIPAA) provides rights and protections for participants and beneficiaries

More information

Reproductive Medicine Associates of New Jersey, LLC

Reproductive Medicine Associates of New Jersey, LLC NOTICE OF PRIVACY PRACTICES Effective Date: September 20, 2013 Last Modified: May 12, 2013 THIS NOTICE DESCRIBES HOW MEDICAL INFORMATION ABOUT YOU MAY BE USED AND DISCLOSED AND HOW YOU CAN GET ACCESS TO

More information

Privacy and Security For Managers

Privacy and Security For Managers Privacy and Security For Managers This self directed learning module contains information all CHS Teammates are expected to know in order to protect our patients, our guests, and ourselves. Target Audience:

More information

HIPAA Privacy & Security Rules

HIPAA Privacy & Security Rules HIPAA Privacy & Security Rules HITECH Act Applicability If you are part of any of the HIPAA Affected Areas, this training is required under the IU HIPAA Privacy and Security Compliance Plan pursuant to

More information

Evolution of HB 300. HIPAA passed in 1996 Originally, HIPAA only directly impacted certain covered entities :

Evolution of HB 300. HIPAA passed in 1996 Originally, HIPAA only directly impacted certain covered entities : Texas HB 300 HB 300: Background Texas House Research Organizational Bill Analysis for HB 300 shows state legislators believed HIPAA did not provide enough protection for private health information (PHI)

More information

HIPAA: Bigger and More Annoying

HIPAA: Bigger and More Annoying HIPAA: Bigger and More Annoying Instructor: Laney Kay, JD Contact information: 4640 Hunting Hound Lane Marietta, GA 30062 (770) 312-6257 (770) 998-9204 (fax) laney@laneykay.com www.laneykay.com OFFICIAL

More information

HIPAA Training for the MDAA Preceptorship Program. Health Insurance Portability and Accountability Act

HIPAA Training for the MDAA Preceptorship Program. Health Insurance Portability and Accountability Act HIPAA Training for the MDAA Preceptorship Program Health Insurance Portability and Accountability Act Objectives Understand what information must be protected under the HIPAA privacy laws Understand the

More information

Compliance HIPAA Training. Steve M. McCarty, Esq. General Counsel Sound Physicians

Compliance HIPAA Training. Steve M. McCarty, Esq. General Counsel Sound Physicians Compliance HIPAA Training Steve M. McCarty, Esq. General Counsel Sound Physicians 1 Overview of HIPAA HIPAA contains provisions that address: The privacy of protected health information or PHI The security

More information

HIPAA PRIVACY AND SECURITY AWARENESS. Covering Kids and Families of Indiana April 10, 2014

HIPAA PRIVACY AND SECURITY AWARENESS. Covering Kids and Families of Indiana April 10, 2014 HIPAA PRIVACY AND SECURITY AWARENESS Covering Kids and Families of Indiana April 10, 2014 GOALS AND OBJECTIVES The goal is to provide information to you to promote personal responsibility and behaviors

More information

HIPAA Privacy and Security

HIPAA Privacy and Security HIPAA Privacy and Security Course ID: 1020 - Credit Hours: 2 Author(s) Kevin Arnold, RN, BSN Accreditation KLA Education Services LLC is accredited by the State of California Board of Registered Nursing,

More information

Health Insurance Portability and Accountability Act HIPAA Privacy Standards

Health Insurance Portability and Accountability Act HIPAA Privacy Standards Health Insurance Portability and Accountability Act HIPAA Privacy Standards Healthcare Provider Training Module Copyright 2003 University of California Click the arrow to start the YouTube video in a separate

More information

Guadalupe Regional Medical Center

Guadalupe Regional Medical Center Guadalupe Regional Medical Center Health Insurance Portability & Accountability Act (HIPAA) By Debby Hernandez, Compliance/HIPAA Officer HIPAA Privacy & Security Training Module 1 This module will address

More information

MCCP Online Orientation

MCCP Online Orientation Objectives At the conclusion of this presentation, students will be able to: Describe the federal requirements of the HIPAA/HITECH regulations that protect the privacy and security of confidential data.

More information

HIPAA Compliance. 2013 Annual Mandatory Education

HIPAA Compliance. 2013 Annual Mandatory Education HIPAA Compliance 2013 Annual Mandatory Education What is HIPAA? Health Insurance Portability and Accountability Act Federal Law enacted in 1996 that mandates adoption of Privacy protections for health

More information

Can Your Diocese Afford to Fail a HIPAA Audit?

Can Your Diocese Afford to Fail a HIPAA Audit? Can Your Diocese Afford to Fail a HIPAA Audit? PETULA WORKMAN & PHIL BUSHNELL MAY 2016 2016 ARTHUR J. GALLAGHER & CO. BUSINESS WITHOUT BARRIERS Agenda Overview Privacy Security Breach Notification Miscellaneous

More information

HIPAA and You The Basics

HIPAA and You The Basics HIPAA and You The Basics The Purpose of HIPAA Privacy Rules 1. Provide strong federal protections for privacy rights Ensure individual trust in the privacy and security of his or her health information

More information

Violation Become a Privacy Breach? Agenda

Violation Become a Privacy Breach? Agenda How Does a HIPAA Violation Become a Privacy Breach? Karen Voiles, MBA, CHC, CHPC, CHRC Senior Managing Consultant, Compliance Agenda Differentiating between HIPAA violation and reportable breach Best practices

More information

Harris County - Texas HIPAA Notice of Privacy Practices

Harris County - Texas HIPAA Notice of Privacy Practices Harris County - Texas HIPAA Notice of Privacy Practices Effective Date: September 23, 2013. THIS NOTICE DESCRIBES HOW MEDICAL INFORMATION ABOUT YOU MAY BE USED AND DISCLOSED AND HOW YOU CAN GET ACCESS

More information

HIPAA PRIVACY POLICIES & PROCEDURES. Department of Behavioral Health and Developmental Services DBHHDS GENERAL AWARENESS TRAINING

HIPAA PRIVACY POLICIES & PROCEDURES. Department of Behavioral Health and Developmental Services DBHHDS GENERAL AWARENESS TRAINING HIPAA PRIVACY POLICIES & PROCEDURES Department of Behavioral Health and Developmental Services DBHHDS GENERAL AWARENESS TRAINING March 2012 HIPAA Humor (North Dakota Dept of Health) 2 HIPAA-Ectomy - the

More information

NOTICE OF PRIVACY PRACTICES

NOTICE OF PRIVACY PRACTICES Page 1 of 6 NOTICE OF PRIVACY PRACTICES Revised: June 15, 2014 THIS NOTICE DESCRIBES HOW MEDICAL INFORMATION ABOUT YOU MAY BE USED AND DISCLOSED AND HOW YOU CAN GET ACCESS TO THIS INFORMATION. PLEASE REVIEW

More information

Alliance for Clinical Education (ACE) Student HIPAA Training

Alliance for Clinical Education (ACE) Student HIPAA Training Alliance for Clinical Education (ACE) Student HIPAA Training Health Insurance Portability and Accountability Act of 1996 October 2003 1 Objectives Understand the HIPAA Privacy rules and regulations Understand

More information

HIPAA. For General Workforce. What you need to know. HIPAA Training Presentation for Management Workforce

HIPAA. For General Workforce. What you need to know. HIPAA Training Presentation for Management Workforce HIPAA For General Workforce What you need to know HIPAA Training Presentation for Management Workforce 1 The Catholic Health Initiatives Mission Catholic Health Initiatives continues the journey begun

More information

SCHOOL DISTRICT OF BLACK RIVER FALLS HIPAA PRIVACY AND SECURITY POLICY

SCHOOL DISTRICT OF BLACK RIVER FALLS HIPAA PRIVACY AND SECURITY POLICY SCHOOL DISTRICT OF BLACK RIVER FALLS HIPAA PRIVACY AND SECURITY POLICY School Board Policy 523.5 The School District of Black River Falls ( District ) is committed to compliance with the health information

More information

HIPAA Orientation. Health Insurance Portability and Accountability Act

HIPAA Orientation. Health Insurance Portability and Accountability Act HIPAA Orientation Health Insurance Portability and Accountability Act HIPAA Federal legislation enacted in 1996 to improve the efficiency and effectiveness of electronic information transfers used in the

More information

8.03 Health Insurance Portability and Accountability Act (HIPAA)

8.03 Health Insurance Portability and Accountability Act (HIPAA) Human Resource/Miscellaneous Page 1 of 5 8.03 Health Insurance Portability and Accountability Act (HIPAA) Policy: It is the policy of Licking/Knox Goodwill Industries, Inc., to maintain the privacy of

More information

Sarasota Personal Medicine 1250 S. Tamiami Trail, Suite 202 Sarasota, FL 34239 Phone 941.954.9990 Fax 941.954.9995

Sarasota Personal Medicine 1250 S. Tamiami Trail, Suite 202 Sarasota, FL 34239 Phone 941.954.9990 Fax 941.954.9995 Sarasota Personal Medicine 1250 S. Tamiami Trail, Suite 202 Sarasota, FL 34239 Phone 941.954.9990 Fax 941.954.9995 NOTICE OF PRIVACY PRACTICES THIS NOTICE DESCRIBES HOW MEDICAL INFORMATION ABOUT YOU MAY

More information

Donna S. Sheperis, PhD, LPC, NCC, CCMHC, ACS Sue Sadik, PhD, LPC, NCC, BC-HSP Carl Sheperis, PhD, LPC, NCC, MAC, ACS

Donna S. Sheperis, PhD, LPC, NCC, CCMHC, ACS Sue Sadik, PhD, LPC, NCC, BC-HSP Carl Sheperis, PhD, LPC, NCC, MAC, ACS Donna S. Sheperis, PhD, LPC, NCC, CCMHC, ACS Sue Sadik, PhD, LPC, NCC, BC-HSP Carl Sheperis, PhD, LPC, NCC, MAC, ACS 1 DISCLAIMER Please review your own documentation with your attorney. This information

More information

HEALTH INSURANCE PORTABILITY & ACCOUNTABILITY ACT OF 1996 HIPAA

HEALTH INSURANCE PORTABILITY & ACCOUNTABILITY ACT OF 1996 HIPAA TRAINING MANUAL HEALTH INSURANCE PORTABILITY & ACCOUNTABILITY ACT OF 1996 HIPAA Table of Contents INTRODUCTION 3 What is HIPAA? Privacy Security Transactions and Code Sets What is covered ADMINISTRATIVE

More information

HIPAA and the HITECH Act Privacy and Security of Health Information in 2009

HIPAA and the HITECH Act Privacy and Security of Health Information in 2009 HIPAA and the HITECH Act Privacy and Security of Health Information in 2009 What is HIPAA? Health Insurance Portability & Accountability Act of 1996 Effective April 13, 2003 Federal Law HIPAA Purpose:

More information

Guidelines Relating to Implementation of the Privacy Regulations of the Health Insurance Portability and Accountability Act of 1996 (HIPAA)

Guidelines Relating to Implementation of the Privacy Regulations of the Health Insurance Portability and Accountability Act of 1996 (HIPAA) HUMAN RESOURCES Index No. VI-35 PROCEDURES MEMORANDUMS TO: FROM: SUBJECT: MCC Personnel Office of the President Guidelines Relating to Implementation of the Privacy Regulations of the Health Insurance

More information

HIPAA Basic Training for Privacy & Information Security

HIPAA Basic Training for Privacy & Information Security HIPAA Basic Training for Privacy & Information Security Vanderbilt University Medical Center VUMC HIPAA Website: www.mc.vanderbilt.edu/hipaa Vanderbilt Credo We treat others as we wish to be treated Vanderbilt

More information

Why Lawyers? Why Now?

Why Lawyers? Why Now? TODAY S PRESENTERS Why Lawyers? Why Now? New HIPAA regulations go into effect September 23, 2013 Expands HIPAA safeguarding and breach liabilities for business associates (BAs) Lawyer is considered a business

More information

HIPAA POLICY PROCEDURE GUIDE

HIPAA POLICY PROCEDURE GUIDE HIPAA POLICY & PROCEDURE GUIDE HEALTH INFORMATION MANAGEMENT DEPARTMENT Office of Compliance & Audit Services - 1 - Table of Contents I. Patient Requests for Medical Records: Page 3 II. Other Requests

More information

HIPAA Awareness Training

HIPAA Awareness Training New York State Office of Mental Health Bureau of Education and Workforce Development HIPAA Awareness Training This training material was prepared for internal use by the New York State Office of Mental

More information

Privacy & Information Security Training. For Health Science Workforce Members

Privacy & Information Security Training. For Health Science Workforce Members Privacy & Information Security Training For Health Science Workforce Members Privacy Program, 4/6/2015 Objectives Understand what information must be protected under state and federal privacy laws Understand

More information

Information Security and Privacy. WHAT is to be done? HOW is it to be done? WHY is it done?

Information Security and Privacy. WHAT is to be done? HOW is it to be done? WHY is it done? Information Security and Privacy WHAT is to be done? HOW is it to be done? WHY is it done? 1 WHAT is to be done? O Be in compliance of Federal/State Laws O Federal: O HIPAA O HITECH O State: O WIC 4514

More information

HIPPA and HITECH NOTIFICATION Effective Date: September 23, 2013

HIPPA and HITECH NOTIFICATION Effective Date: September 23, 2013 HIPPA and HITECH NOTIFICATION Effective Date: September 23, 2013 Orchard Creek Health Care is required by law to maintain the privacy of protected health information (PHI) of our residents. If you feel

More information

HIPAA. New Breach Notification Risk Assessment and Sanctions Policy. Incident Management Policy. Focus on: For breaches affecting 1 3 individuals

HIPAA. New Breach Notification Risk Assessment and Sanctions Policy. Incident Management Policy. Focus on: For breaches affecting 1 3 individuals HIPAA New Breach Notification Risk Assessment and Sanctions Policy Incident Management Policy For breaches affecting 1 3 individuals +25 individuals + 500 individuals Focus on: analysis documentation PHI

More information

HIPAA: Privacy/Info Security

HIPAA: Privacy/Info Security HIPAA: Privacy/Info Security Jeff Jones HIPAA Privacy Officer HIPAA Information Security Officer KY Region What you should know Discussion Topics Protected Health Security Awareness Information(PHI) Disclosure

More information

HIPAA PRIVACY AND SECURITY AWARENESS

HIPAA PRIVACY AND SECURITY AWARENESS HIPAA PRIVACY AND SECURITY AWARENESS Introduction The Health Insurance Portability and Accountability Act (known as HIPAA) was enacted by Congress in 1996. HIPAA serves three main purposes: To protect

More information

Reporting of HIPAA Privacy/Security Breaches. The Breach Notification Rule

Reporting of HIPAA Privacy/Security Breaches. The Breach Notification Rule Reporting of HIPAA Privacy/Security Breaches The Breach Notification Rule Objectives What is the HITECH Act? An overview-what is Protected Health Information (PHI) and can I protect patient s PHI? What

More information

Data Breach, Electronic Health Records and Healthcare Reform

Data Breach, Electronic Health Records and Healthcare Reform Data Breach, Electronic Health Records and Healthcare Reform (This presentation is for informational purposes only and it is not intended, and should not be relied upon, as legal advice.) Overview of HIPAA

More information

HIPAA for Business Associates

HIPAA for Business Associates HIPAA for Business Associates February 11, 2015 Teresa D. Locke This presentation is similar to any other legal education materials designed to provide general information on pertinent legal topics. The

More information

Updated HIPAA Regulations What Optometrists Need to Know Now. HIPAA Overview

Updated HIPAA Regulations What Optometrists Need to Know Now. HIPAA Overview Updated HIPAA Regulations What Optometrists Need to Know Now The U.S. Department of Health & Human Services Office for Civil Rights recently released updated regulations regarding the Health Insurance

More information

HIPAA (Health Insurance Portability and Accountability Act of 1996) Stetson University HIPAA Training

HIPAA (Health Insurance Portability and Accountability Act of 1996) Stetson University HIPAA Training HIPAA (Health Insurance Portability and Accountability Act of 1996) Stetson University HIPAA Training Objectives of this Training l To help you understand: l What HIPAA privacy rule is l Why it is important

More information

HIPAA Privacy Overview

HIPAA Privacy Overview May 21, 2003 HIPAA Privacy Overview Presented to the California State University Agenda Introduction HIPAA privacy regulations HIPAA privacy impact on CSU Next steps/action items Mercer Human Resource

More information

HIPAA SECURITY AWARENESS

HIPAA SECURITY AWARENESS April, 2005 HIPAA SECURITY AWARENESS Department of Mental Health, Mental Retardation, and Substance Abuse Services What is HIPAA? HIPAA means Health Insurance Portability and Accountability Act It is a

More information

Today s Webcast is presented by Michael, also from the DART Team. Michael will provide

Today s Webcast is presented by Michael, also from the DART Team. Michael will provide Welcome to today s Webcast. Thank you so much for joining us today! My name is Ellie Coombs. I m a member of the DART Team, one of several groups engaged by HAB to provide training and technical assistance

More information

HIPAA Basics. Health Insurance Portability and Accountability Act of 1996

HIPAA Basics. Health Insurance Portability and Accountability Act of 1996 HIPAA Basics Health Insurance Portability and Accountability Act of 1996 HIPAA: What Is HIPAA? Protects the privacy of healthcare informa@on for all Americans, including the individuals you support Protects

More information

Notice of Privacy Practices for Protected Health Information (PHI)

Notice of Privacy Practices for Protected Health Information (PHI) Notice of Privacy Practices for Protected Health Information (PHI) Arapahoe Sports Medicine and Rehabilitation THIS NOTICE DESCRIBES HOW MEDICAL INFORMATION ABOUT YOU MAY BE USED AND DISCLOSED AND HOW

More information

Pacific Medical Centers HIPAA Training for Residents, Fellows and Others

Pacific Medical Centers HIPAA Training for Residents, Fellows and Others Pacific Medical Centers HIPAA Training for Residents, Fellows and Others Summary of Critical Pacific Medical Centers (PMC) HIPAA Policies and Procedures For additional information or questions, please

More information

HIPAA Privacy Policy & Notice of Privacy Practices

HIPAA Privacy Policy & Notice of Privacy Practices HIPAA Privacy Policy & Notice of Privacy Practices 1. PURPOSE 1 The purpose of this policy is to comply with patient personal health information security rights and privacy regulations as outlined in the

More information

Office of Mental Health HIPAA Training Program

Office of Mental Health HIPAA Training Program Office of Mental Health HIPAA Training Program VIDEO SCRIPT (Text Only) Final Developed by New York Wired for Education, Inc. in conjunction with the NYS Office of Mental Health Bureau of Education and

More information

HIPAA and Health Information Privacy and Security

HIPAA and Health Information Privacy and Security HIPAA and Health Information Privacy and Security Revised 7/2014 What Is HIPAA? H Health I Insurance P Portability & A Accountability A - Act HIPAA Privacy and Security Rules were passed to protect patient

More information

The Family Counseling Center of Fulton County NOTICE OF PRIVACY PRACTICES

The Family Counseling Center of Fulton County NOTICE OF PRIVACY PRACTICES The Family Counseling Center of Fulton County NOTICE OF PRIVACY PRACTICES This notice describes the privacy practices of The Family Counseling Center of Fulton County and the privacy rights of the people

More information

Health Insurance Portability and Accountability Act (HIPAA) Overview

Health Insurance Portability and Accountability Act (HIPAA) Overview Health Insurance Portability and Accountability Act (HIPAA) Overview Agency, Contract and Temporary Staff Orientation Initiated: 5/04, Reviewed: 7/10, Revised: 10/10 Prepared by SHS Administration & Samaritan

More information

HIPAA/ HITECH HEALTH INSURANCE PORTABILITY ACCOUNTABILITY ACT. and. Health Information Technology for Economic and Clinical Health Act.

HIPAA/ HITECH HEALTH INSURANCE PORTABILITY ACCOUNTABILITY ACT. and. Health Information Technology for Economic and Clinical Health Act. HIPAA/ HITECH HEALTH INSURANCE PORTABILITY and ACCOUNTABILITY ACT Health Information Technology for Economic and Clinical Health Act Revised 4/4/14 1 Your Accountability Quality Care Compliance Reputation

More information

Health Insurance Portability and Accountability Act of 1996 (HIPAA)

Health Insurance Portability and Accountability Act of 1996 (HIPAA) HIPAA Privacy Rule Health Insurance Portability and Accountability Act of 1996 (HIPAA) Transactions Standards 1. Health claims 2. Health claim attachments 3. Healthcare payment and remittance advice 4.

More information

ELECTRONIC HEALTH RECORDS

ELECTRONIC HEALTH RECORDS ELECTRONIC HEALTH RECORDS Understanding and Using Computerized Medical Records CHAPTER TEN LESSON ONE Privacy and Security of Health Records Understanding HIPAA HIPAA: acronym for Health Insurance Portability

More information