1 This self-directed learning module contains information all CHS employees are expected to know in order to protect our patients protected health information. Target Audience: All Non-Management CHS Employees, Students, Volunteers, and Physicians
2 What is HIPAA? HIPAA (the Health Insurance Portability and Accountability Act) is a civil rights law passed in 1996 that gives patients important rights with regard to their protected health information. THE PRIVACY RULEprovides federal protections for protected health information held by covered entities (CHS) and gives patients an array of rights with respect to that information. At the same time, the privacy rule is balanced so that it permits the disclosure of protected health information needed for patient care (treatment) and other purposes such as payment and healthcare operations. THE SECURITY RULE specifies a series of administrative, physical, and technical safeguards for covered entities to use to assure the confidentiality, integrity, and availability of electronic protected health information For more information, visit ALL CHS workforce members (employees, students, volunteers, physicians, etc.) are required to ensure the privacy and security of our patients protected health information!
3 What is Protected Health Information? PHI (commonly referred to as patient information ) can be contained in electronic, written, and oral communications. It includes any information that is created or received while a health care worker is providing treatment, processing payment, or performing other healthcare operations. PHI relates to the past, present or future physical or mental health or condition of a patient.
4 PHI: Patient Identifiers A patient s identity can be discovered without knowing his/her name. HIPAA protects information that alone or combined may identify apatient, the patient s relatives, employer or household members. Health information that includes even ONE patient identifier is PHI and is protected under HIPAA. Name Address Birth date Telephone numbers Fax Numbers addresses Social Security Number Medical Record Number Health plan beneficiary number Account number Voice recordings Photographic images Other characteristics which may identify the person *HIPAA Reference: 45 C.F.R (b)(2)(i) **Policy Reference: PR.PHI
5 Where Can You Find PHI? Hint: It s not just in the paper or electronic medical records. Here are some examples of other places you might find patient information: Patient status boards Financial records Fax sheets Data used for research purposes Patient s identification bracelet Prescription bottle labels Detailed appointment reminder left on voic Photograph or video recording of a patient
6 Appropriate Access to PHI Three HIPAA Recognized Purposes* Treatment Payment Healthcare Operations The provision, coordination, or management of healthcare and related services among healthcare providers or by a healthcare provider with a third party, consultation between healthcare providers regarding a patient, or the referral of a patient from one healthcare provider to another. Various activities of healthcare providers to obtain payment or be reimbursed for their services and of a health plan to obtain premiums, fulfill coverage responsibilities, and provide benefits under the plan and to obtain or provide reimbursement for the provision of healthcare Certain administrative, financial, legal, and quality improvement activities of a covered entity that are necessary to run its business and to support the core functions of treatment and payment. *HIPAA Reference: 45 C.F.R
7 Do You Have a TPO Need to Know? You should not access PHI unless it is your job to do so. Here are some examples of TPO work-related reasons to access PHI: Sending PHI from one department to another within the same facility so that a procedure can be performed Providers/Physicians sharing information between themselves regarding a patient they both treat Referring a patient to a specialist Determining eligibility or coverage under a plan Billing and collection activities Reviewing healthcare services for medical necessity, coverage, justification of charges, etc. ASK YOURSELF: Do I need to know this information to do my job? Conducting quality assessment and improvement activities Reviewing the competence or qualifications of healthcare professionals Conducting or arranging for medical review, legal, and auditing services, including fraud and abuse detection and compliance programs
8 Inappropriate Uses of PHI: Common Non-compliant Practices Viewing medical information belonging to yourself, your family, friends, co-workers, and patients when you are not a member of the health team treating the patient. Accidentally handing a patient another patient s prescription or discharge instructions. Informing a friend of a patient s presence at the hospital Sharing or allowing easy access to your passwords. ing patient information to the wrong address or faxing patient information to the wrong number
9 More Inappropriate Uses of PHI Discussion of PHI in a public location where others are likely to overhear, such as an elevator or the cafeteria Unattended work stations with PHI NOTE: PHI in any form should notbe left unattended. Sign-in sheets that reveal a patient s diagnosis Improper disposal of PHI
10 COMMUNICATIONS WHEN FAMILY MEMBERS, FRIENDS OR OTHERS ARE PRESENT Question If a patient has a family member or friend with them while in the exam room, triage area, or other treatment area, can we assume that the patient wants that person there during discussions of their test results or other health information? General. If the patient is present and has the capacity to make health care decisions, providers may generally discuss the patient s health information with family, friends and others involved in the patients care if the patient agrees or when given the opportunity, does not object. A provider may also share information if in their professional judgment they decide the patient does not object. See 45 CFR (b). Best Practice. We should not assume a patient consents to having visitor/family members present during patientprovider communications. Patients should be given an opportunity to object. Suggested steps to ensure that we protect our patients privacy rights include : 1. Ask the visitor(s) to step outside the room or away from the area where the conversation will take place ; 2. Ask the patient if he/she wants the visitor(s) or friend(s) to be present during the discussion. Be sure to give a review of the topics to be discussed. If highly confidential information such as HIV, mental health, genetic testing, etc. will be discussed, then be sure to notify the patient of the specific topic in private; 3. After the patient has given permission, you may invite the family member(s)/friend(s) back into the room/area; and document in the patient s medical record that the patient gave permission for others to be present.
11 Proper Disposal of PHI: What s s In Your Trash? Dispose of of any any physical material that that contains PHI PHI using the the appropriate method: CONFIDENTIAL BIN, BIN, SHREDDER, OR OR REGULATED MEDICAL WASTE RECEPTACLE. Reference Policy Policy PR.PHI PR.PHI ELECTRONIC PATIENT INFORMATION Items containing electronic patient information should be disposed of in accordance with IS Policy Reference Policy IS.PHI PAPER All paper containing patient information must be deposited in a locked confidential shred bin. LABELS Removable labels containing patient information should be removed from the container and rendered unreadable before discarding in the regular trash. If the label cannot be removed or destroyed, discard the label or empty container in the regulated medical waste receptacle. ID BRACELETS ID Bracelets removed by a workforce member should be disposed of in a locked confidential shred bin FOR MORE INFORMATION, SEE DISPOSAL PROCEDURES FOR PATIENT INFORMATION, CHS POLICY PR.PHI
12 Appropriate Uses of PHI: Incidental Disclosures The following practices are permissible under the Privacy Rule if reasonable precautions are taken to minimize the incidental disclosures to others who may be nearby. In these cases, reasonable precautions would include lowered voices or talking apart from others. Healthcare staff may communicate and coordinate services at hospital nursing stations. Healthcare professionals may discuss lab test results in a joint treatment area. A physician may discuss a patient s condition QUIETLY in a semi-private room or a waiting room. Healthcare professionals may discuss a patient s condition during training rounds in an academic or training institution. A pharmacist may discuss a prescription with a patient over the pharmacy counter or with a physician or patient over the phone. Note: In emergency situations, loud emergency rooms, or where a patient is hearing impaired, precautions may not be practical. In these cases, health care staff are free to engage in communications as required for quick, effective, and high quality health care. *HIPAA Reference: 45 CFR (a)(1)(iii)
13 Access to PHI Requiring Patient s s Authorization Uses and disclosures of PHI that fall outside of TPO purposes typically require the patient s s written AUTHORIZATION. CHS has a standard process and form for authorization. HIPAA allows for limited exceptions to the TPO and Authorization rules. These exceptions are outlined in the Release/Review of Medical Information Policy (PR.PHI ) Examples include: Medical Emergencies Threat to the Health or Safety of the Patient Certain Law Enforcement Activities Court Order
14 Education - HIPAA: Patient Rights HIPAA grants patient rights with regard to Protected Health Information (PHI): Rights Accept/Deny: We are not obligated to agree, but we are obligated to respond in a timely manner with an explanation of denial. 1. Inspect and Copy Barring some specific restrictions (e.g. psychotherapy notes), patients have a right to inspect and obtain a copy of their medical record information 2. Amendment Your obligation is to review the request; no mandate to agree & make change Make the change only if the record is inaccurate or incomplete The best documentation is that made at or near the time of the event 3. Accounting of Disclosures Right to know who has seen patient s information without their authorization Currently applicable only to uses and disclosures outside of Treatment, Payment, or Healthcare Operations (TPO) 4. Restrictions Right to request restriction or limitation on information we use or disclose for TPO Right to request a limit on information we disclose to a family member or friend 5. Confidential Communications Right to request communication about medical matters in a specific format or location Request may be denied due to logistical obstacles to implementing them HIPAA Policies: See Administrative Policy Manual on Synapse
15 CHS Notice of Privacy Practices NOTICE OF PRIVACY PRACTICES Carolinas HealthCare System A copy of this Notice is also available in Spanish. EVERY patient has the right to receive a copy of the CHS Notice of Privacy Practices, which describes how his or her health information may be obtained, used and disclosed. The Notice also explains to the patient how he/she can get access to that information. A copy of CHS current Notice of Privacy Practices is available on the CHS internet website, each facility s website, and at every point of patient entry at each of the CHS facilities For more information, refer to Policy PR.PHI Receipt & Acknowledgement of Notice of Privacy Practices
16 Identity Theft Alert: RED FLAGS The term Red Flag has been adopted by the FTC to mean a pattern, practice, or specific activity that indicates the possible existence of IDENTITY THEFT CLINICAL SETTING Patient s medical condition doesn t match the medical record. Records are inconsistent with the physical state of the patient or his/her medical history. Records show substantial discrepancies in age, race, sex, or other physical descriptions. NON-CLINICAL SETTING Inconsistent information on employment records, medical records, or registration information Documents that appear to be forged or altered (including driver s license, etc.) Missing laptops, security codes, equipment with patient or employee information, etc. Alerts from consumer reporting or fraud detection agencies Employees are required to report red flags. If you suspect identity theft or any patient misidentification, talk to your manager, follow your department s procedure for handling red flags, and contact the Customer Care Line at Policy Reference: ADM.PHI
17 Taking Data Offsite You should not take patient information, in any form, offsite without proper permission and unless your job specifically requires you to do so. If you must take patient information offsite, be sure to safeguard with these important security measures. When using a laptop or PDA offsite that contains patient information, store patient information on the device ONLY if the device is encrypted. To make sure your device is properly encrypted, contact Information Services. Papers containing patient information are even more vulnerable than electronic devices storing PHI. Anyone who comes in contact with those papers can see the information. If you have to take paperwork out of your work setting, please take steps to protect it. Do not leave your bag or briefcase unattended. If papers containing PHI are lost or stolen, you should immediately report it to your supervisor.
18 Using CHS Resources Individual passwords should NOT be printed, stored online, stored on any electronic device, or given to others. REMEMBER: Anything accessed on a computer using your network information will be traced back to you. Use caution when sending patient information via Send only the minimum information needed. If sending to an address that does not you need to Send Certified so that the will be encrypted.
19 Spotlight on Social Networking In an age where social networking websites, such as Facebook, MySpace, and Twitter, are a popular way to communicate, it is important to remember that the internet is a public domain. You have an obligation to safeguard PHI regardless of the setting. Do not post identifying information about patients or their images, etc. A photograph taken in the hospital or office environment may inadvertently have a patient in the background.
20 Social Media is: A great new tool Public domain Permanent and can have a broadcasting effect Social Networking Questions to ask yourself: Will my posted comments have a harmful or perceived harmful effect on another human being or organization? Is the media I am using public or private Who does the information I am about to share belong to? Do I have permission to share the information in the media in which I am about to share it? Is there a more appropriate media for the communication I wish to make? Could this post get me in trouble at work? (Is that the desired outcome?) Guidelines when accessing social networking sites: Do not engage in purely personal matters during business hours. When identifying yourself as a member of CHS, state that comments are those of your own, not CHS. Only use your CHS address when acting in your official role at CHS. All data submitted on the Internet is outside of your control once posted. Communicating patient information is strictly prohibited and subject to sanctions. See Pages 10 and 11 of the AUP for more details regarding this subject. Resources: 1) Link to policy: /CHS-IS pdf 2) IS Security Bulletin August:
21 CHS HIPAA Sanctions Workforce members using PHI inappropriately will be subject to disciplinary action which may include Disciplinary action will be determined based on the severity of the violation.
22 Reporting Potential Privacy Issues To report a potential privacy issue or if you have a question orconcern about privacy, you should follow the Chain of Command. I have a privacy question, concern, or potential issue. Contact your SUPERVISOR I am uncomfortable talking to my supervisor. Contact your SUPERVISOR S SUPERVISOR I am uncomfortable talking to my supervisor s supervisor. Contact your FACILITY PRIVACY DIRECTOR Contact CHS CORPORATE PRIVACY DEPARTMENT Contact the CUSTOMER CARE LINE
23 Reporting Potential HIPAA Issues Questions About HIPAA: 1. Contact your Supervisor. 2. Contact your Facility Privacy Director (FPD) 3. Privacy Questions: Corporate Privacy 4. Security Questions Robert Pierce, AVP of Information Security 5. HIPAA Privacy and Security SharePoint Site: HIPAA POLICIES HIPAA Policies can be found on the CHS Intranet. Who is My FPD? Each CHS facility has a Facility Privacy Director (FPD) who serves as the privacy representative for that facility. A list of FPDsis available on the CHS Intranet. search='fpd
25 Question #1 The HIPAA privacy and security provisions cover communications which may contain PHI. Which form(s) of communication is/are covered by HIPAA? a) Oral communications b) Written communications c) Electronic communications d) All of the above
26 Question # 2 One of your friends recently had a biopsy at the CHS facility where you work. You are worried about her and want to find out the results of the biopsy. What should you do? a) Use your logon information to access your friend s medical record even though you have no TPO work-related need to know. b) Ask a friend who works in the department to access the results for you. c) Wait for your friend to tell you the results if she chooses to do so.
27 Question #3 True or False? Paper containing patient information may be disposed of either in a confidential locked shred bin or you may take it home and throw it in your garbage can. a) True b) False
28 Question # 4 A physician refers a patient to a specialist for consultation. The specialist s office requests the patient s medical records and insurance information. The referring physician s office refuses to disclose this information for fear of violating HIPAA. What is wrong with the referring physician s understanding of HIPAA? a) HIPAA does not cover oral communication. b) The specialist s office should not receive this information without signed authorization by the patient. c) The request by the specialist s office is for treatment purposes, so the referring physician s office is permitted to release the information without a signed authorization form. d) Nothing. The referring physician s office is correct in refusing to disclose the information.
29 Question # 5 What should you do if you are about to tell a patient his/her test results but his/her family and friends are in the room? a) Just tell the patient the results with the others in the room because you are in a hurry. b) Ask the others to leave the room so you can talk with the patient in private. c) Invite the others back in the room to hear the results if the patient requests they return and knows what is to be discussed d) All of the above e) Both b and c
30 Question #6 True or False? Employees who inappropriately use PHI will be subject to disciplinary action up to and including termination. a) True b) False
31 Question #7 You are a nurse in a CHS Emergency Department. During one of your shifts, a well-known public figure comes to the Emergency Department for treatment. True or False: It is okay to tell your friends about the public figure s appearance at the Emergency Department as long as they promise to keep it a secret. a) True b) False
32 Question #8 A new employee at your clinic has not received her logon information. You really need her help scheduling appointments, but without logon information, she cannot access the appointment system. You know that one of your coworkers keeps his password on a post-it note underneath his keyboard. What do you do? a) Allow the new employee to use your logon information. b) Tell the new employee where your coworker keeps his information. He won t mind if she uses it until she has her own. c) Do not share your password or allow the new employee to use your coworker s. Notify your supervisor that the new employee needs access to CHS systems to perform his/her job.
33 Question #9 I attest I have reviewed and am familiar with the CHS Communications Environment Acceptable Use Policy (AUP). I understand that failure to comply with the AUP may lead to disciplinary action, up through termination of employment. The AUP is located on Synapse in the Administrative Policy and Procedure Manual, [IS.PHI ]. Please check the Yes box (or sign if taken manually) before submitting the test to receive your score. An affirmative answer is required for the successful completion of the HIPAA Privacy and Security Post Test. Yes
Privacy and Security For Managers This self directed learning module contains information all CHS Teammates are expected to know in order to protect our patients, our guests, and ourselves. Target Audience:
Health Insurance Portability and Accountability Act (HIPAA) General Education Presented by: Bureau of Personnel Department of Health Department of Human Services Department of Social Services Bureau of
Patient Privacy and HIPAA/HITECH What is HIPAA? Health Insurance Portability and Accountability Act of 1996 Implemented in 2003 Title II Administrative Simplification It s a federal law HIPAA is mandatory,
2014 Core Training 1 Course Agenda Review of Key Privacy Laws/Regulations: Federal HIPAA/HITECH regulations State privacy laws Privacy & Security Policies & Procedures Huntsville Hospital Health System
WASHINGTON COUNTY Department of Health and Human Services Policy ADMN 004, Attachment A HHS Confidentiality Agreement Including HIPAA (Health Information Portability and Accessibility Act of 1996) OREGON
Annual Compliance Training HITECH/HIPAA Refresher January 2015 Sisters of Charity of Leavenworth Health System, Inc. All rights reserved. 1 Annual Refresher Training Welcome to the SCL Health System Compliance
HIPAA 101: Privacy and Security Basics Purpose This document provides important information about Kaiser Permanente policies and state and federal laws for protecting the privacy and security of individually
TRAINING MANUAL HEALTH INSURANCE PORTABILITY & ACCOUNTABILITY ACT OF 1996 HIPAA Table of Contents INTRODUCTION 3 What is HIPAA? Privacy Security Transactions and Code Sets What is covered ADMINISTRATIVE
HIPAA Privacy & Security Rules HITECH Act Applicability If you are part of any of the HIPAA Affected Areas, this training is required under the IU HIPAA Privacy and Security Compliance Plan pursuant to
HIPAA Policy 2014 The Health Insurance Portability and Accountability Act is a federal law that protects the privacy and security of patients health information and grants certain rights to patients. Clarkson
HIPAA Orientation Health Insurance Portability and Accountability Act HIPAA Federal legislation enacted in 1996 to improve the efficiency and effectiveness of electronic information transfers used in the
Alliance for Clinical Education (ACE) Student HIPAA Training Health Insurance Portability and Accountability Act of 1996 October 2003 1 Objectives Understand the HIPAA Privacy rules and regulations Understand
1 By the end of this course you will demonstrate: 1. that HIPAA privacy rules protect privacy and security of confidential information. 2. your responsibility for use and protection of protected health
Guadalupe Regional Medical Center Health Insurance Portability & Accountability Act (HIPAA) By Debby Hernandez, Compliance/HIPAA Officer HIPAA Privacy & Security Training Module 1 This module will address
Health Insurance Portability and Accountability Act HIPAA Privacy Standards Healthcare Provider Training Module Copyright 2003 University of California Click the arrow to start the YouTube video in a separate
HIPAA TRAINING A training course for Shiawassee County Community Mental Health Authority Employees WHAT IS HIPAA? HIPAA is an acronym that stands for Health Insurance Portability and Accountability Act.
Privacy for Beginners: What Every Healthcare Worker Needs to Know About HIPAA and Privacy What is HIPAA? Health Insurance Portability and Accountability Act (HIPAA) is broad federal legislation that includes
HIPAA Privacy & Security Training for Clinicians Agenda This training will cover the following information: Overview of Privacy Rule and Security Rules Using and disclosing Protected Health Information
LEARNING MODULE: HIPAA AND COMPLIANCE For Clinical Students and Instructors Greater Green Bay Healthcare Alliance www.ggbha.org Updated June 27, 2014 This learning module must be reviewed by students and
Objectives At the conclusion of this presentation, students will be able to: Describe the federal requirements of the HIPAA/HITECH regulations that protect the privacy and security of confidential data.
HIPAA PRIVACY POLICIES & PROCEDURES Department of Behavioral Health and Developmental Services DBHHDS GENERAL AWARENESS TRAINING March 2012 HIPAA Humor (North Dakota Dept of Health) 2 HIPAA-Ectomy - the
HIPAA Privacy and Security Course ID: 1020 - Credit Hours: 2 Author(s) Kevin Arnold, RN, BSN Accreditation KLA Education Services LLC is accredited by the State of California Board of Registered Nursing,
PCI Data Security Information Services & Cash Management This self-directed learning module contains information you are expected to know to protect yourself, our patients, and our guests. Target Audience:
HIPAA PRIVACY AND SECURITY AWARENESS Covering Kids and Families of Indiana April 10, 2014 GOALS AND OBJECTIVES The goal is to provide information to you to promote personal responsibility and behaviors
HIPAA Self-Study Module Patient Privacy at Unity Health Care, Inc email@example.com 202-667-0016 - HIPAA Hotline Self-Study Module Requirements Read all program slides and complete test. Complete
Protecting Patient Privacy It s Everyone s Responsibility Observation & Student Learning Packet 1. Read packet Instructions for Self-Study Module 2. Complete post-test. A score of 80% must be achieved.
HIPAA AND COMPLIANCE LEARNING MODULE #2 For Clinical Students and Instructors HWCA- South Central- Southwest Member Clinical Sites HEALTH CARE WORKFORCE ALLIANCE Revised August 2011 Objectives 2 At the
HIPAA PRIVACY FOR NON-EMPLOYEES 2010 Edition Introduction The HIPAA Privacy Standards have been in effect since April 14, 2003. The purpose of the HIPAA Privacy Standards is to protect the privacy of what
HIPAA Privacy and Security Rochelle Steimel, HIPAA Privacy Official Judy Smith, Staff Development January 2012 Goals and Objectives Course Goal: To introduce the staff of Munson Healthcare to the concepts
Health Insurance Portability and Accountability Act of 1996 (HIPAA) Contents Health Insurance Portability and Accountability Act of 1996 (HIPAA)... 1 Welcome to HIPAA Awareness Training Content... 3 HIPAA
HIPAA (Health Insurance Portability and Accountability Act) Awareness Training for Volunteers and Interns Boulder County Public Health Volunteer/Intern Services 3450 Broadway Boulder, CO 80304 1 Boulder
HIPAA Happenings in Hospital Systems Donna J Brock, RHIT System HIM Audit & Privacy Coordinator HIPAA Health Insurance Portability and Accountability Act of 1996 Title 1 Title II Title III Title IV Title
HIPAA: Privacy/Info Security Jeff Jones HIPAA Privacy Officer HIPAA Information Security Officer KY Region What you should know Discussion Topics Protected Health Security Awareness Information(PHI) Disclosure
Welcome to ChiroCare s Fourth Annual Fall Business Summit October 3, 2013 HIPAA Compliance Regulatory Overview & Implementation Tips for Providers Agenda Green packet Overview of general HIPAA terms and
HIPAA and You The Basics The Purpose of HIPAA Privacy Rules 1. Provide strong federal protections for privacy rights Ensure individual trust in the privacy and security of his or her health information
The Health Insurance Portability and Accountability Act (HIPAA) and Client Privacy Statement This notice describes how your medical information may be used and disclosed and how you can get access to this
NAMI EASTSIDE - 13 POLICY: Privacy and Security of Protected Health Information (HIPAA Policies and Procedures) DATE APPROVED: Pending INTENT: (At present, none of the activities that NAMI Eastside provides
Neera Agarwal-Antal, M.D. HIPAA Policies and Procedures HIPAA POLICIES & PROCEDURES This packet includes the following HIPAA policies, procedures and model forms: HIPAA General Operating Policy...1 Authorization
Health Information Privacy Refresher Training March 2013 1 Disclosure There are no significant or relevant financial relationships to disclose. 2 Topics for Today State health information privacy law Federal
HIPAA Privacy Keys to Success Updated January 2010 HIPAA Job Specific Education 1 HIPAA and Its Purpose What is HIPAA? Health Insurance Portability and Accountability Act of 1996 Title II Administrative
SCHOOL DISTRICT OF BLACK RIVER FALLS HIPAA PRIVACY AND SECURITY POLICY School Board Policy 523.5 The School District of Black River Falls ( District ) is committed to compliance with the health information
HIPAA 100 Training Manual Table of Contents I. Introduction 1 II. Definitions 2 III. Privacy Rule 5 IV. Security Rule 8 V. A Word About Business Associate Agreements 10 CHICAGO DEPARTMENT OF PUBIC HEALTH
HIPAA Training for the MDAA Preceptorship Program Health Insurance Portability and Accountability Act Objectives Understand what information must be protected under the HIPAA privacy laws Understand the
HIPAA Training: i Ensuring Privacy for our Patients Privacy Training for Harvard Medical Students Goals By the end of this program you will be able to Explain the basic principles of the Privacy Rule Understand
1 2 Hour CEU 2 Course Objectives The purpose of this program is to provide nurses with information about the Health Insurance Portability and Accountability Act (HIPAA), especially as it relates to protected
Privacy and Information Security Awareness Training Health Insurance Portability & Accountability Act of 1996 -- HIPAA Objectives Understand basic HIPAA requirements Understand how the MCG Health System
Red Flag Policy and Procedures for Alexander Orthopaedic Associates The Identify Theft Prevention Program developed by Alexander Medical Group LLC dba Alexander Orthopaedic Associates referred throughout
Disclaimer This document is not intended to be copied, reproduced, altered, or disseminated for training purposes on the departmental level. It is only intended to be used as a resource. ALL HIPAA training
The Health and Benefit Trust Fund of the International Union of Operating Section 1: Purpose of This Notice Notice of Privacy Practices Effective as of September 23, 2013 THIS NOTICE DESCRIBES HOW MEDICAL
PROTECTING PATIENT PRIVACY and INFORMATION SECURITY 2 PROTECTING PATIENT PRIVACY AND INFORMATION SECURITY PROTECTING PATIENT PRIVACY AND INFORMATION SECURITY 3 INTRODUCTION As an agency employee, student,
THIS NOTICE DESCRIBES HOW HEALTH INFORMATION ABOUT YOU MAY BE USED AND DISCLOSED AND HOW YOU CAN GET ACCESS TO THIS INFORMATION. PLEASE REVIEW IT CAREFULLY. Date: June 1, 2014 Salt Lake Community College
SDC-League Health Fund 1501 Broadway, 17 th Floor New York, NY 10036 Tel: 212-869-8129 Fax: 212-302-6195 E-mail: firstname.lastname@example.org NOTICE OF PRIVACY PRACTICES THIS NOTICE DESCRIBES HOW MEDICAL INFORMATION
Compliance Training for Medicare Programs Version 1.0 2/22/2013 Independence Blue Cross is an independent licensee of the Blue Cross and Blue Shield Association. 1 The Compliance Program Setting standards
HIPPA Goes HITECH Data Protection for Agents For agent information only. this material should not be distributed to the public or used in any solicitation. 13-0127 Course objectives Agents will be able
-4539 Telephone: (973) 397-6500 Mail Address: P.O. Box 1935 Morristown, NJ 07962-1935 NOTICE OF PRIVACY PRACTICES FOR PROTECTED HEALTH INFORMATION THIS NOTICE DESCRIBES HOW MEDICAL INFORMATION ABOUT YOU
HIPAA Privacy Rule Health Insurance Portability and Accountability Act of 1996 (HIPAA) Transactions Standards 1. Health claims 2. Health claim attachments 3. Healthcare payment and remittance advice 4.
HIPAA/ HITECH HEALTH INSURANCE PORTABILITY and ACCOUNTABILITY ACT Health Information Technology for Economic and Clinical Health Act Revised 4/4/14 1 Your Accountability Quality Care Compliance Reputation
Awareness Training for VIM Volunteers and Staff To have every volunteer: Understand what HIPAA is. Know the meaning of Protected Health Information (PHI). Understand the significance of Treatment, Payment,
HIPAA Compliance for Students The Health Insurance Portability and Accountability Act (HIPAA) was passed in 1996 by the United States Congress. It s intent was to help people obtain health insurance benefits
SCHOOL DISTRICT OF BLACK RIVER FALLS 523.5 Exhibit NOTICE OF HIPAA PRIVACY AND SECURITY PRACTICES PRIVACY NOTICE This notice describes how medical information about you may be used and disclosed and how
HIPAA Privacy Overview General HIPAA stands for a federal law called the Health Insurance Portability and Accountability Act. This law, among other purposes, was created to protect the privacy and security
NOTICE OF HEALTH INFORMATION PRIVACY PRACTICES (HIPAA) THIS NOTICE OF PRIVACY PRACTICES DESCRIBES HOW HEALTH INFORMATION ABOUT YOU MAY BE USED AND DISCLOSED AND HOW YOU CAN GET ACCESS TO THIS INFORMATION.
HIPAA Privacy and Security Cindy Cummings, RHIT February, 2015 1 HIPAA Privacy and Security The regulation is designed to safeguard Protected Health Information referred to PHI AND electronic Protected
1 PHI - Protected Health Information UNIVERSITY OF MICHIGAN HEALTH SYSTEM Updated 09/23/2013 2 Q: Is PHI the same as the medical record? A: No. protects more than the official medical record. Lots of other
HIPAA Developed by The University of Texas at Dallas Callier Center for Communication Disorders Purpose of this training Everyone with access to Protected Health Information (PHI) must comply with HIPAA
HIPAA and Health Information Privacy and Security Revised 7/2014 What Is HIPAA? H Health I Insurance P Portability & A Accountability A - Act HIPAA Privacy and Security Rules were passed to protect patient
A Privacy and Information Security Guide for UCLA Workforce HIPAA and California Privacy Laws A Privacy and Information Security Guide for UCLA Workforce HIPAA and California Privacy Laws Table of Contents
NOTICE OF PRIVACY PRACTICES FOR THE NORTH CENTRAL NURSING CLINICS This notice describes how medical information about you may be used and disclosed, and how you can get access to this information. Please
5/23/2011 31-R-11 A RESOLUTION ADOPTING THE CITY OF EVANSTON IDENTITY PROTECTION POLICY WHEREAS, The Fair and Accurate Credit Transactions Act of 2003, Public Law 108-159, requires municipalities to promulgate
HIPAA Privacy FAQ s 1. What is the HIPAA privacy regulation? Until Congress passed HIPAA in 1996, personal health information (PHI) was protected by a patchwork of federal and state laws. Patients health
Donna S. Sheperis, PhD, LPC, NCC, CCMHC, ACS Sue Sadik, PhD, LPC, NCC, BC-HSP Carl Sheperis, PhD, LPC, NCC, MAC, ACS 1 DISCLAIMER Please review your own documentation with your attorney. This information
Notice of Privacy Practices Section 1: Purpose of This Notice and Effective Date THIS NOTICE DESCRIBES HOW MEDICAL INFORMATION ABOUT YOU MAY BE USED AND DISCLOSED AND HOW YOU CAN GET ACCESS TO THIS INFORMATION.
Identity Theft and Data Protection As keepers of student, faculty, and staff information, we as an institution are obligated and regulated by state and federal laws to protect certain pieces of information.
APPLETREE PEDIATRICS, PA NOTICE OF PRIVACY PRACTICES THIS NOTICE DESCRIBES HOW MEDICAL INFORMATION ABOUT YOU MAY BE USED AND DISCLOSED AND HOW YOU CAN GET ACCESS TO THIS INFORMATION. PLEASE REVIEW IT CAREFULLY.
: / / Client Name: _ SSN: / / of Birth: Age: Sex: Male Female Address: City/State/Zip: Home Phone Number Is it okay to leave a message here? Y/N Work Number Is it okay to leave a message here? Y/N Cell
HIPAA Policies and Procedures William T. Chen, MD, Inc. General Rule 164.502 A Covered Entity may not use or disclose PHI except as permitted or required by the privacy regulations. Permitted Disclosures:
Bradley D. Powell, PhD NOTICE OF PRIVACY PRACTICES: Effective June 1, 2004 A Summary of the Provisions of the Health Insurance Portability and Accountability Act ( HIPAA ) Privacy Rule (45 C.F.R. parts