1 HIPAA AND COMPLIANCE LEARNING MODULE #2 For Clinical Students and Instructors HWCA- South Central- Southwest Member Clinical Sites HEALTH CARE WORKFORCE ALLIANCE Revised August 2011
2 Objectives 2 At the completion of this module, you should be able to: ü Define HIPAA; ü Identify methods to maintain the privacy and confidentiality of personal protected health information; ü Identify how HIPAA impacts your role; and ü Indicate compliance and regulatory issues that may impact your role.
3 Objectives, continued: 3 At the completion of this module, you should be able to: ü All students and instructors who participate in clinical activities are deemed workforce members at the various healthcare systems. ü All policies and procedures are applicable to workforce members, just as they would be for employees. ü This includes policies and procedures related to HIPAA, Confidentiality and other Compliance or Regulatory requirements.
4 REMINDER 4 When reading this module, please know that you are accountable for understanding the information that is presented and if you have any questions, you will need to talk to your instructor/school/facility and find out the answer before going any further.
5 What is HIPAA? In 1996, the federal government passed a law named HIPAA (Health Insurance Portability and Accountability Act). The original and primary intent of the law was to provide continuous insurance coverage for employees who changed jobs. When writing the law, the authors became aware of how much personal health information was shared between health care providers and insurance companies. Because of this, additional sections were added to the law, requiring healthcare providers to adopt standards in the areas of privacy, security and electronic transfer of data or billing. 5
6 What is HIPAA? 6 The law defines protected health information (PHI) and sets standards for health care providers to protect that information. All healthcare systems have policies in place to ensure that PHI is available, private and secure in order to promote quality care and treatment.
7 What happens to those that don t comply? If not, the law also defines stiff penalties (fines and even imprisonment) for violating any privacy provisions. These penalties apply to any member of the workforce team. 7 Some Wisconsin State laws also protect the privacy of patient information.
8 Patient Privacy Rights 8 Under HIPAA, patients have certain rights: Right to access their health information. Right to request an amendment to their PHI if they feel the information is incomplete or inaccurate. Right to request a place to receive PHI. Right to request restrictions on what PHI can be disclosed. Right to request an accounting of what PHI has been disclosed.
9 What is Confidential? Any information that we collect, create, store, etc., that relates to an individual s health and identifies that patient, client or resident is confidential. This is called Protected Health Information(PHI). PHI includes any information we create. PHI includes any personal information we ask the patient, client or resident to provide. 9
10 Examples of PHI 10 Protected Health Information (PHI): Medical Record Number Billing Information Medical Information Personal Information Name Address Date of Birth (DOB) Phone Number Insurance and Social Security Numbers Medical History
11 Forms of PHI Protected Health Information can be seen in different forms. Be aware of these examples: Spoken information Paper, documents, charts Computer screens White boards (surgery schedules, patient boards) Photos, videos Medical container labels (prescription bottles, IV labels, packages, specimen labels, etc.) 11
12 Be aware of ephi 12 The e in ephi stands for electronic. ephi is any information that is accessed or stored electronically using computers or other equipment. These electronic devices or computers include: Desktop computers Laptop computers PDA (personal digital assistants) Smart phones or Blackberries Computer discs or flash drives And others
13 Caution: Technology/Social Media 13 In addition, confidential information should not be transferred to or from, or stored within, any form of personal technology (e.g. personal computers, cell phones, etc) It should never be shared in any form of social media outlet such as Facebook, YouTube, etc.
14 The HIPPA Security Rule 14 The HIPAA security rule was also developed and now paired with the privacy rule. The HIPAA security rule has additional requirements regarding how ephi is accessed, stored, displayed, and transferred electronically. The security rule requires healthcare providers to make sure health information is available when needed and we ensure the integrity of the information. Integrity this means we must make sure the information is not altered or changed by anyone who does not have the authority to do so.
15 The HIPPA Security Rule 15 The security rule also has requirements regarding how information is accessed. All healthcare systems have special safeguards in place to protect ephi. As part of the workforce team in a healthcare system, you may or may not be provided with computer access. HIPAA and Healthcare Systems require unique identifiers to access computer applications or systems that contain patient, client or resident information.
16 ALWAYS REMEMBER! 16 YOU MUST SAFEGUARD THE PRIVACY AND SECURITY OF PHI.
17 For Students and Instructors with Computer Access 17 If you are provided computer access with an assigned user ID and password, you must protect the privacy and security of patients PHI at all times. Also, protect your password and keep it secure. Do not share it with others on the workforce team. Do not write it or store it in a place accessible by others. And use a strong password (avoid pet names, sports team names or phone numbers, etc.).
18 Access to PHI Each healthcare system has specific policies governing how information is accessed and who may access it. Please be aware of system policies surrounding the minimum necessary information you may be allowed to access. 18 This information may be found in the healthcare system site links.
19 19 YOUR ROLE IN CONFIDENTIALITY, PRIVACY AND SECURITY OF PHI
20 Physical Privacy and Security 20 Do not leave PHI in an area that is public or where unauthorized individuals may come in contact with it. Dispose of printed PHI in secure recycling/ shredding bins. Labels (bottles, IV bags, other) containing PHI should be discarded in privacy bins or blackened out prior to discarding. The sharing of patient/resident PHI should be done in a private and secure manner (not in the hallway, break room, cafeteria, elevator, etc.)
21 Physical Privacy and Security 21 Workstations (computers) should be logged off when not in use. Turn screens away from public view, use privacy screens. Use screen savers when user has stepped away from computer. E- mails may not contain ephi unless the information is encrypted or safeguarded in some other manner.
22 Physical Privacy and Security 22 Report suspicious behavior by others to security or information services departments. Each healthcare system has procedures for disposing of documents or media (CDs, flash drives, PDAs, etc.) containing patient PHI. Please follow these when indicated.
23 Tips for Students/Instructors 23 Be cautious of where you hold conversations, especially about patients and their families. Never leave medical records/films in an open area, including census print outs, or other documents. Don t share passwords with others. Don t share information about friends or family (in the facility) with others. Do not discuss cases or PHI of patients you are not directly involved with.
24 Tips for Students/Instructors 24 For example, if a friend says, I heard that Mary Smith is in the hospital. Did you see her there? You should respond something like, I have no information about that. The easiest way to remember how to implement this law is the saying; What you see here, or hear here, must stay here.
25 Compliance 25 Each healthcare system or facility abides by specific policies, procedures and regulatory standards. When we trust that facilities are doing this, it is referred to as corporate integrity. Corporate integrity or corporate compliance means that an organization is abiding by high moral principles and standards set out by that organization.
26 Compliance 26 The HIPAA Privacy and Security rules are an example of an area of compliance for healthcare systems and facilities. Each healthcare system may have different codes of conduct or compliance manuals. You may find this information in the facility link on the FVHCA website.
27 Compliance Plans 27 Healthcare systems include the following in their compliance plans: General standards of workforce conduct are established. Background checks on all workforce team members including students and instructors must be completed. Rules and regulations that healthcare systems must follow.
28 Compliance Plans 28 The rules that healthcare systems must follow are: Health Insurance Portability and Accountability Act (HIPAA) False Claims Act (FCA) Anti- Kickback Statute (AKS) Physician Self- Referral Prohibition (also called the Stark Law) Emergency Medical Treatment and Active Labor Act (EMTALA) Fraud and Abuse in Billing
29 False Claims Act (FCA) 29 Any organization that makes a false claim to the government (Medicare/Medicaid) for payment is in violation of the FCA. Example; sending a bill for a service that was not done. If an organization is found guilty of doing this, they may be prohibited from participating in any Medicare/Medicaid or other federally funded healthcare program.
30 Anti- Kickback Statute The federal law forbids anyone to offer, pay, ask for, or receive something of value in return for referring Medicare or Medicaid patients. 30 There are fines up to $25,000 associated with this violation.
31 The Physician Self- Referral Law 31 This law is only related to physicians. The government forbids physicians from referring patients to an entity where a physician has a financial relationship with that entity. There are, however, many complicated exceptions to this law.
32 Emergency Medical Treatment and Active Labor Act (EMTALA) NOTE: This EMTALA law pertains only to those facilities who have a designated Emergency Department. EMTALA was created during a time when hospitals often refused to treat uninsured patients who arrived by ambulance. 32 The hospital must perform a medical screening exam to determine if an emergency condition exists for anyone who comes to the emergency department (regardless of their ability to pay).
33 EMTALA If there is an emergency medical condition: The hospital must stabilize the medical condition OR Transfer that person to another facility, if the hospital cannot treat the person. 33
34 Fraud and Abuse in Billing 34 This refers to knowingly billing for services provided, submitting inaccurate or misleading claims or actual services provided or making false statements to obtain payment. Fraud is an intentional act. In other words, the person knows they are doing something wrong. The government (Federal Office of the Inspector General OIG) investigates and targets different health care areas to assure this is not happening.
35 Reporting Compliance Issues 35 If you see things that may not be lawful, ethical or do not protect the privacy and security of the patient, client or resident, please notify your instructor, the supervisor, or department manager at the facility.
36 Following discovery of a breach in privacy: An investigation will take place based on a facility s policy. 36 The Secretary of the Department of Health and Human Services, the news media, and law enforcement officials may be notified.
37 A final reminder 37 Remember, as a member of the healthcare workforce team, you have an obligation to keep protected health information confidential, private, and secure. For additional information regarding privacy policies and compliance plans, please refer to the healthcare site s policies and procedures.
38 38 THE IMPORTANCE OF PROFESSIONALISM IN THE WORKPLACE
39 Professionalism 39 Acting professionally is an important part of any work environment and is a major part of your career growth. Professional behavior and attitudes often play a critical role in who gets hired and promoted, as well as in who gets ﬁred or demoted. If you want to have a successful career you MUST know how to act professionally!
40 Professional Behavior, continued: 40 Be ready at all times- being a professional is being on time and ready to work. Never speak badly about a patient, co- worker, or supervisor. Your comment will eventually reach the person you spoke about. Lying being deceitful or dishonest will tarnish your reputation for life if you get caught. It s just not worth it!
41 Professional Dress 41 If you come to work sloppily dressed, your looks will portray an image of a disorganized employee. Keep yourself covered (keep your undergarments under your garments) Moderate jewelry (limit piercings to ear lobes- one earring in each ear only) Nicely styled hair and moderate makeup No perfumes or potentially offensive smells (cigarette smoke, etc.) No visible tattoos
42 42 COMPLETING YOUR ONLINE ORIENTATION MODULES
43 Congratulations, you are almost done! 43 After completing both learning modules (#1: Infection Control, Bloodborne Pathogens and Safety) AND (#2: HIPAA & Compliance), to show that you know you are responsible for comprehending the information and to receive credit for completing the orientation modules; 1. Print off the Orientation Module Completion Form and the Clinical Facility- Specific Orientation Completion Form. (Click links to access forms.) 1. Read the forms thoroughly, and 2. Sign and date the forms. Turn forms in to school coordinator or faculty, NOT the healthcare facility. (Note: These forms will be retained in your student record).
LEARNING MODULE: HIPAA AND COMPLIANCE For Clinical Students and Instructors Greater Green Bay Healthcare Alliance www.ggbha.org Updated June 27, 2014 This learning module must be reviewed by students and
ORIENTATION MODULE #2 HIPAA, COMPLIANCE & PROFESSIONALISM For Clinical Students and Instructors FVHCA Member Clinical Sites Revised May 8, 2014 1 Objectives 2 At the completion of this orientation module,
HIPAA Self-Study Module Patient Privacy at Unity Health Care, Inc email@example.com 202-667-0016 - HIPAA Hotline Self-Study Module Requirements Read all program slides and complete test. Complete
Privacy and Security For Managers This self directed learning module contains information all CHS Teammates are expected to know in order to protect our patients, our guests, and ourselves. Target Audience:
Objectives At the conclusion of this presentation, students will be able to: Describe the federal requirements of the HIPAA/HITECH regulations that protect the privacy and security of confidential data.
HIPAA TRAINING A training course for Shiawassee County Community Mental Health Authority Employees WHAT IS HIPAA? HIPAA is an acronym that stands for Health Insurance Portability and Accountability Act.
HIPAA and Health Information Privacy and Security Revised 7/2014 What Is HIPAA? H Health I Insurance P Portability & A Accountability A - Act HIPAA Privacy and Security Rules were passed to protect patient
HIPAA Privacy and Security Rochelle Steimel, HIPAA Privacy Official Judy Smith, Staff Development January 2012 Goals and Objectives Course Goal: To introduce the staff of Munson Healthcare to the concepts
HIPAA Privacy September 21, 2013 HIPAA Privacy Workforce Training The Health Insurance Portability & Accountability Act (HIPAA) requires that the University train all workforce members (faculty, staff,
HIPAA Privacy & Security Training for Clinicians Agenda This training will cover the following information: Overview of Privacy Rule and Security Rules Using and disclosing Protected Health Information
2012-2013 MEDICARE COMPLIANCE TRAINING EMPLOYEES & FDR S 2012 Revised 1 Introduction CMS Requirements As of January 1, 2011, Federal Regulations require that Medicare Advantage Organizations (MAOs) and
HIPAA Happenings in Hospital Systems Donna J Brock, RHIT System HIM Audit & Privacy Coordinator HIPAA Health Insurance Portability and Accountability Act of 1996 Title 1 Title II Title III Title IV Title
2014 Core Training 1 Course Agenda Review of Key Privacy Laws/Regulations: Federal HIPAA/HITECH regulations State privacy laws Privacy & Security Policies & Procedures Huntsville Hospital Health System
HIPAA Policy 2014 The Health Insurance Portability and Accountability Act is a federal law that protects the privacy and security of patients health information and grants certain rights to patients. Clarkson
HIPAA Training for Hospice Staff and Volunteers Hospice Education Network Objectives Explain the purpose of the HIPAA privacy and security regulations Name three patient privacy rights Discuss what you
Compliance Training for Medicare Programs Version 1.0 2/22/2013 Independence Blue Cross is an independent licensee of the Blue Cross and Blue Shield Association. 1 The Compliance Program Setting standards
HIPAA Orientation Health Insurance Portability and Accountability Act HIPAA Federal legislation enacted in 1996 to improve the efficiency and effectiveness of electronic information transfers used in the
1 2 Hour CEU 2 Course Objectives The purpose of this program is to provide nurses with information about the Health Insurance Portability and Accountability Act (HIPAA), especially as it relates to protected
HIPAA Privacy & Security Rules HITECH Act Applicability If you are part of any of the HIPAA Affected Areas, this training is required under the IU HIPAA Privacy and Security Compliance Plan pursuant to
Protecting Patient Privacy It s Everyone s Responsibility Observation & Student Learning Packet 1. Read packet Instructions for Self-Study Module 2. Complete post-test. A score of 80% must be achieved.
HIPAA PRIVACY AND SECURITY AWARENESS Covering Kids and Families of Indiana April 10, 2014 GOALS AND OBJECTIVES The goal is to provide information to you to promote personal responsibility and behaviors
HIPAA (Health Insurance Portability and Accountability Act) Awareness Training for Volunteers and Interns Boulder County Public Health Volunteer/Intern Services 3450 Broadway Boulder, CO 80304 1 Boulder
Disclaimer This document is not intended to be copied, reproduced, altered, or disseminated for training purposes on the departmental level. It is only intended to be used as a resource. ALL HIPAA training
Privacy for Beginners: What Every Healthcare Worker Needs to Know About HIPAA and Privacy What is HIPAA? Health Insurance Portability and Accountability Act (HIPAA) is broad federal legislation that includes
PROTECTING PATIENT PRIVACY and INFORMATION SECURITY 2 PROTECTING PATIENT PRIVACY AND INFORMATION SECURITY PROTECTING PATIENT PRIVACY AND INFORMATION SECURITY 3 INTRODUCTION As an agency employee, student,
Health Insurance Portability and Accountability Act HIPAA Privacy Standards Healthcare Provider Training Module Copyright 2003 University of California Click the arrow to start the YouTube video in a separate
TODAY S PRESENTERS Why Lawyers? Why Now? New HIPAA regulations go into effect September 23, 2013 Expands HIPAA safeguarding and breach liabilities for business associates (BAs) Lawyer is considered a business
HIPAA Training for Staff and Volunteers Objectives Explain the purpose of the HIPAA privacy, security and breach notification regulations Name three patient privacy rights Discuss what you can do to help
Guadalupe Regional Medical Center Health Insurance Portability & Accountability Act (HIPAA) By Debby Hernandez, Compliance/HIPAA Officer HIPAA Privacy & Security Training Module 1 This module will address
1 By the end of this course you will demonstrate: 1. that HIPAA privacy rules protect privacy and security of confidential information. 2. your responsibility for use and protection of protected health
TRAINING MANUAL HEALTH INSURANCE PORTABILITY & ACCOUNTABILITY ACT OF 1996 HIPAA Table of Contents INTRODUCTION 3 What is HIPAA? Privacy Security Transactions and Code Sets What is covered ADMINISTRATIVE
WASHINGTON COUNTY Department of Health and Human Services Policy ADMN 004, Attachment A HHS Confidentiality Agreement Including HIPAA (Health Information Portability and Accessibility Act of 1996) OREGON
Dear Colleague, This notice is to share some recent changes we ve made with our Student Onboarding Process. Effective October 1, 2014, our onboarding process is migrating from Public Safety to our Human
Page 1 National Organization of Alternative Programs 2014 NOAP Educational Conference HIPAA and Privacy Risks Ira J Rothman, CPHIMS, CIPP/US/IT/E/G Senior Vice President - Privacy Official March 26, 2014
Annual Compliance Training HITECH/HIPAA Refresher January 2015 Sisters of Charity of Leavenworth Health System, Inc. All rights reserved. 1 Annual Refresher Training Welcome to the SCL Health System Compliance
This self-directed learning module contains information all CHS employees are expected to know in order to protect our patients protected health information. Target Audience: All Non-Management CHS Employees,
Health Insurance Portability and Accountability Act (HIPAA) General Education Presented by: Bureau of Personnel Department of Health Department of Human Services Department of Social Services Bureau of
HIPAA and Mental Health Privacy: What Social Workers Need to Know Presenter: Sherri Morgan, JD, MSW Associate Counsel, NASW Legal Defense Fund and Office of Ethics & Professional Review 2010 National Association
Alliance for Clinical Education (ACE) Student HIPAA Training Health Insurance Portability and Accountability Act of 1996 October 2003 1 Objectives Understand the HIPAA Privacy rules and regulations Understand
HIPAA PRIVACY AND SECURITY TRAINING P I E D M O N T COMMUNITY H EA LT H P L A N 1 COURSE OVERVIEW This course is broken down into 4 modules: Module 1: HIPAA Omnibus Rule - What you need to know to remain
HIPAA Compliance for Students The Health Insurance Portability and Accountability Act (HIPAA) was passed in 1996 by the United States Congress. It s intent was to help people obtain health insurance benefits
Fraud, Waste and Abuse Training 1 Why Do I Need Training? Every year millions of dollars are improperly spent because of fraud, waste and abuse. It affects everyone, Including YOU. This training will help
Donna S. Sheperis, PhD, LPC, NCC, CCMHC, ACS Sue Sadik, PhD, LPC, NCC, BC-HSP Carl Sheperis, PhD, LPC, NCC, MAC, ACS 1 DISCLAIMER Please review your own documentation with your attorney. This information
HIPAA/ HITECH HEALTH INSURANCE PORTABILITY and ACCOUNTABILITY ACT Health Information Technology for Economic and Clinical Health Act Revised 4/4/14 1 Your Accountability Quality Care Compliance Reputation
Coventry Privacy and Security Protecting Everyone s Privacy Module Purpose Consider this scenario: A large hospital intended to have outdated patient files securely destroyed. An employee decided to save
HOW TO REALLY IMPLEMENT HIPAA Presented by: Melissa Skaggs Provider Resources Group WHAT IS HIPAA The Health Insurance Portability and Accountability Act of 1996 (HIPAA; Pub.L. 104 191, 110 Stat. 1936,
HIPAA In The Workplace What Every Employee Should Know and Remember What is HIPAA? The Health Insurance Portability and Accountability Act of 1996 Portable Accountable Rules for Privacy Rules for Security
HIPAA Privacy Keys to Success Updated January 2010 HIPAA Job Specific Education 1 HIPAA and Its Purpose What is HIPAA? Health Insurance Portability and Accountability Act of 1996 Title II Administrative
HFS DATA SECURITY TRAINING WITH TECHNOLOGY COMES RESPONSIBILITY Illinois Department of Healthcare and Family Services Training Outline: Training Goals What is the HIPAA Security Rule? What is the HFS Identity
HIPAA Privacy Rule Health Insurance Portability and Accountability Act of 1996 (HIPAA) Transactions Standards 1. Health claims 2. Health claim attachments 3. Healthcare payment and remittance advice 4.
Office of the Secretary Office for Civil Rights () HIPAA Enforcement Emily Prehm, J.D. Office for Civil Rights U.S. Department of Health and Human Services December 18, 2013 Presentation Overview s investigative
HIPAA: Privacy/Info Security Jeff Jones HIPAA Privacy Officer HIPAA Information Security Officer KY Region What you should know Discussion Topics Protected Health Security Awareness Information(PHI) Disclosure
Technical Monograph C.T. Hellmuth & Associates, Inc. Technical Monographs usually are limited to only one subject which is treated in considerably more depth than is possible in our Executive Newsletter.
HIPAA Privacy and Security Cindy Cummings, RHIT February, 2015 1 HIPAA Privacy and Security The regulation is designed to safeguard Protected Health Information referred to PHI AND electronic Protected
Standards of Conduct It is the policy of Security Health Plan that all its business be conducted honestly, ethically, and with integrity. Security Health Plan s relationships with members, hospitals, clinics,
Data Security Breaches: Learn more about two new regulations and how to help reduce your risks By Susan Salpeter, Vice President, Zurich Healthcare Risk Management News stories about data security breaches
Louisiana Department of Health and Hospitals Basic HIPAA Privacy Training: Policies and Procedures 1 What Is HIPAA? HIPAA (pronounced hippa) is a federal law. It s a set of rules and regulations that affect
Fraud Waste and Abuse Training First Tier, Downstream and Related Entities ONECare by Care1st Health Plan Arizona, Inc. (HMO) Revised: 10/2009 Overview Purpose Care1st/ ONECare Compliance Program Definitions
HIPAA Security Training Manual The final HIPAA Security Rule for Montrose Memorial Hospital went into effect in February 2005. The Security Rule includes 3 categories of compliance; Administrative Safeguards,
Compliance, Code of Conduct & Ethics Program Cantex Continuing Care Network Contents Compliance, Code of Conduct & Ethics Program 1 What is the CCCN Code of Conduct? 2 Operating Philosophies 2 Employee
GENERAL COMPLIANCE TRAINING CIA YEAR ONE REVIEW AND CERTIFICATION INTRODUCTION Supporting the mission and vision of Broward Health requires commitment to compliance, integrity and dedication to the highest
Scope: Organizationwide Page 1 of 9 I. Purpose The purpose of this policy is to provide direction to staff members to assist in carrying out daily activities within appropriate ethical and legal standards.
HIPAA Security Education Updated May 2016 Course Objectives v This computer-based learning course covers the HIPAA, HITECH, and MSHA Privacy and Security Program which includes relevant Information Technology(IT)
CERTIFIED NURSING ASSISTANT School of Nursing and Allied Health INFORMATION PACKAGE 2015 May 2014 1 Dear Nurse Aide Applicant, Thank you for your interest in the Nurse Aide Program. Caring for others is
These training materials are divided into three topics to meet the responsibilities stated on the previous pages: Fraud, Waste, Compliance Program Standards of Conduct Although the information contained
HIPAA 101 March 18, 2015 Webinar Agenda Acronyms to Know HIPAA Basics What is HIPAA and to whom does it apply? What is protected by HIPAA? Privacy Rule Security Rule HITECH Basics Breaches and Responses
Reporting of HIPAA Privacy/Security Breaches The Breach Notification Rule Objectives What is the HITECH Act? An overview-what is Protected Health Information (PHI) and can I protect patient s PHI? What
2013 Compliance Training for Contractors and Vendors Module 3 Protecting Privacy & Security in the Health Care Setting For Internal Training Purposes Only. After completing this training, learners will
HIPAA And Public Health March 2006 Delaware s Division of Public Health 1 HIPAA The purpose for HIPAA (Health Insurance Portability & Accountability Act) is to protect the confidentiality, integrity, and
Health Insurance Portability and Accountability Act (HIPAA) Compliance Training 1 Objectives By the end of this lesson, you should be able to: Define protected health information (PHI) covered under HIPAA
General Compliance Training General Compliance Training i The University of Texas Medical Branch at Galveston Course Overview General Compliance The intent of the Compliance Program is to: Promote compliance
HIPAA Employee Compliance Program TRAINING MANUAL Training Manual to Assist Employees in HIPAA Compliance January 2013 Program For HIPAA Compliance Plan Goal The purpose of this manual is to instruct our
HIPAA RULES AND REGULATIONS INTRODUCTION Everyone who works in or around health care has heard about the HIPAA, the Health Insurance Portability and Accountability Act. And certainly, everyone who is in
HIPAA Training for the MDAA Preceptorship Program Health Insurance Portability and Accountability Act Objectives Understand what information must be protected under the HIPAA privacy laws Understand the
Health Insurance Portability and Accountability Act of 1996 (HIPAA) Contents Health Insurance Portability and Accountability Act of 1996 (HIPAA)... 1 Welcome to HIPAA Awareness Training Content... 3 HIPAA
What is HIPAA? The Health Insurance Portability and Accountability Act of 1996 BASIC QUESTIONS AND ANSWERS What Does HIPAA do? Creates national standards to protect individuals' medical records and other
Health Information Privacy Refresher Training March 2013 1 Disclosure There are no significant or relevant financial relationships to disclose. 2 Topics for Today State health information privacy law Federal
Privacy & Security of Patient Information 2010 S&W PRIVACY UPDATE This module is intended to review the policies and procedures of Scott and White that address the HIPAA Privacy Regulations. The module
ANNUAL SECURITY RESPONSIBILITY REVIEW For Faculty and Staff Who Use Computers Minimally in their work May 2012 Training Topics What is Information Security? Review Security Vulnerabilities Phishing email
HIPPA and HITECH NOTIFICATION Effective Date: September 23, 2013 Orchard Creek Health Care is required by law to maintain the privacy of protected health information (PHI) of our residents. If you feel
Getting Hip to the HIPAA and HITECH Act Compliance NaNotchka M. Chumley, D.O., M.P.H. Family Medicine Physician Los Angeles, CA Integrating Global Trade & Logistic and Cybersecurity Westin St. Francis,
Understanding HIPAA Privacy and Security Helping Your Practice Select a HIPAA- Compliant IT Provider A White Paper by CMIT Solutions Table of Contents Understanding HIPAA Privacy and Security... 1 What