Raymond: Beyond Basic HIPAA - GSHA Convention HIPAA HIPAA HIPAA. Financial. Carol Ann Raymond, MBA, Ed.S., CCC-SLP

Size: px
Start display at page:

Download "Raymond: Beyond Basic HIPAA - GSHA Convention 2-28-15 1 HIPAA HIPAA HIPAA. Financial. Carol Ann Raymond, MBA, Ed.S., CCC-SLP"

Transcription

1 Carol Ann Raymond, MBA, Ed.S., CCC-SLP Associate Clinical Professor/Clinic Director Department of Communication Sciences and Disorders Financial o Employed by the University of Georgia o Non-Financial o Member, GSHA Convention and Finance Committees The University of Georgia February 28, GSHA Convention 2 Type of provider and organization Your responsibility related to HIPAA o Healthcare provider o HIPAA Privacy or Security Officer o Administrator o Other Knowledge level about HIPAA on a scale of PHI means Private Health Information. 2. A written authorization is required to use and disclose PHI unless it is for treatment, payment, or healthcare operations (TPO). 3. A covered entity and business associate must enter into a Business Associate Agreement ( BAA ). 4. The HIPAA Privacy Rule applies only to electronic PHI. 5. Patient rights are stated in the Notice of Privacy Practices. 6. A risk assessment is a required standard under the HIPAA Security Rule. 7. Providers must notify the media when there is a breach affecting more than 500 individuals 3 4 HIPAA HIPAA HIPAA Health Insurance Portability and Accountability Act of 1996 Administration Simplification (Title II) Electronic Data Transactions and Code Sets 2002 Privacy Rule 2003 Electronic Data National Provider Identifier Security Rule 2005 HITECH ACT OMNIBUS American Recovery and Reinvestment Act of 2009 (ARRA) Health Information Technology for Economic and Clinical Health (HITECH) HIPAA Omnibus Final Rule - 9/23/13 Strengthens privacy, security and patient rights Regulated by the U.S. Department of Health and Human Services 5 6 Raymond: Beyond Basic HIPAA - GSHA Convention

2 138 percent increase in breaches Breaches since 2009: o 35 % - theft or loss of encrypted devices or computers o 22 % - unauthorized access o 6 % - hacking Since 6/2013, OCR has levied more than $10M in fines As for 1/31/2015 OCR enforcement: Privacy (since 4/2003) o OCR has received over 109,722 complaints o 1,191 initiated compliance reviews o 23, 366 cases resolved by requiring changes, and corrective actions, and technical assistance Security (since 2009) o 940 complaints o 689 investigated and closed after corrective action o 316 under review as of 8/31/14 percent 7 8 HIPAA Penalties Civil Penalties Up to $100/person/violation, up to $25,000/year Criminal Penalties Knowing misuse of PHI - up to $50,000 and/or up to one year imprisonment Under false pretenses - up to $100,000 and/or up to five years imprisonment Personal gain/malicious harm - up to $250,000 and/or up to 10 years imprisonment Tiers A HITECH /Omnibus Penalties Description Minimum / Violation Maximum*/ violation Did not know (would have known by reasonable diligence) $100 $50,000 B Reasonable cause - not willful neglect C Willful neglect - corrected w/in required time period $1,000 $50,000 $10,000 $50,000 D Willful neglect - not corrected w/in required period $50,000 $50,000 *$1.5 million annual max 9 Required to take corrective action to achieve voluntary compliance (in order of frequency): o Private Practices o General Hospitals o Outpatient Facilities o Pharmacies o Health Plans (group health plans and health insurance issuers) 10 In order of frequency o Impermissible uses and disclosures of protected health information; o Lack of safeguards of protected health information; o Lack of patient access to their protected health information; o Lack of administrative safeguards of electronic protected health information; and o Use or disclosure of more than the minimum necessary protected health information. 11 HIPAA Settlement Underscores the Vulnerability of Unpatched and Unsupported Software Anchorage Community Mental Health Services - $150,000 $800,000 HIPAA Settlement in Medical Records Dumping Case Parkview, 6/23/14 Data Breach Results in $4.8 Million HIPAA Settlements New York & Presbyterian Hospital, 5/7/14 Concentra Settles HIPAA Case for $1,725,220, 4/22/14 QCA Settles HIPAA Case for $250,000, 4/22/14 County Government Settles Potential HIPAA Violations - $215,000, 3/7/14 Resolution Agreement with Adult & Pediatric Dermatology, P.C. of Massachusetts - $150,000, 12/20/13 HHS Settles with Health Plan in Photocopier Breach Case - $1,215,780, 8/14/13 12 Raymond: Beyond Basic HIPAA - GSHA Convention

3 WellPoint Settles HIPAA Security Case for $1,700,000, 7/11/13 Shasta Regional Medical Center Settles HIPAA Privacy Case for $275,000, 6/13/13 Idaho State University Settles HIPAA Security Case for $400,000, 5/21/13 HHS announces first HIPAA breach settlement involving less than 500 patients (Hospice)- $50,000, 12/31/12 Massachusetts Provider Settles HIPAA Case for $1.5 Million September 17, 2012 Alaska DHSS Settles HIPAA Security Case for $1,700,000 June 26, 2012 HHS Settles Case with Phoenix Cardiac Surgery for Lack of HIPAA Safeguards - April 13, 2012 HHS settles HIPAA case with BCBST for $1.5 million - March 13, 2012 The $50,000 settlement with a non-profit Hospice of North Idaho, which involved the theft of an unencrypted laptop computer from the non-profit Hospice of North Idaho. A $1.7 million settlement with the Alaska Department of Health and Human Services related to a stolen USB storage drive containing data on possibly 500 or more Medicaid beneficiaries, which led to OCR finding a variety of other HIPAA non-compliance issues at the agency, including insufficient risk management A $1.5 million settlement with Massachusetts Eye and Ear Infirmary after the theft of an unencrypted laptop containing data on about 3,500 patients. HIPAA non-compliance issues included failure to conduct a thorough risk analysis for protecting information stored on mobile devices. A $1.5 settlement with Blue Cross Blue Shield of Tennessee related to the theft of 57 unencrypted disk drives containing data on about 1 million patients. The corrective action plan as part of the settlement instructed Blue Cross Blue Shield of Tennessee, among other things, to conduct thorough assessment or risks involved when data is created, received, maintained, used or transmitted on-site or off-site. A $100,000 settlement with Phoenix Cardiac Surgery. That case involved the posting of clinical and surgical appointments for an unspecified number of its patients on an Internet-based calendar that was publicly accessible. Other non-compliance issues discovered by OCR during its investigation include insufficient staff training. 15 Covered Entity (CE) Business Associate (BA) Workforce Protected Health Information (PHI) Treatment, Payment, Healthcare Operations (TPO) Minimum Necessary Written Authorization o Required to use and disclose PHI if not for TPO purposes Notice of Privacy Practices (NPP) Privacy Rule Security Rule 16 Are you a covered entity or do you work for a covered entity? 1. Health care provider who transmits any health information in electronic form in connection with a covered transaction Directly or through a business associate Covered transaction - Insurance claims, eligibility, etc. 2. Health plans 3. Health care clearinghouses Hybrid Entity CE that does both covered and non-covered functions Organization designates Health Care Component (HCC) - perform CE functions Disclosures from HCC to others in organization that are not part of HCC are treated as outside disclosure 45 CFR , Provide services on behalf of the covered entity, involving the use or disclosure of protected health information (PHI) o E.g., consultants, legal services, etc. Requires contract between CE and BA o BA must sign agreement to comply with HIPAA o Includes subcontractors of BA HITECH Act - Must now comply same as CE and also subcontractors 45 CFR (e), (e), (d) and (e) 18 Raymond: Beyond Basic HIPAA - GSHA Convention

4 Protected Health Information (PHI) Persons whose conduct, in the performance of work for the CE, is under the direct control of the CE o Regardless of whether they are paid by the CE Includes: o Employees o Volunteers o Students CE is required to train all members of its workforce, appropriate for the level of staff and their duties on all existing and new policies o Must keep records for six years Individually identifiable health information Identifies the individual (on a reasonable basis) Relates to any physical or mental health or condition in the past, present, or future Oral, electronic or paper records Received, created, or transmitted by provider Exception FERPA education and employment records Social Security number Health plan beneficiary numbers and other identifying information Account numbers Certificate of license numbers Vehicle identifiers and serial numbers to include license plate numbers Device identifiers and serial numbers Web Universal Resource Locators (URLs) Internet Protocol (IP) address numbers Full face photographic images and other comparable images Name Medical record numbers Geographic subdivision smaller than a state, including street address, city, county, precinct, zip code Any and all dates (except the year), including birth date, encounter date, and date of death Ages greater than 89 Telephone numbers Fax numbers Electronic mail addresses Any other unique identifying number, characteristic or codes Includes - relatives, employers, household members identifiers 21 Provider Requirements: o Inform patients of rights and provider s privacy practices for use and disclosure of PHI (in plain language) o Provide to clients at first date of service delivery (or as soon as reasonable for emergencies) o Make good faith effort to obtain written acknowledgement of receipt of notice Or document efforts and reason why not Except in emergencies o State effective date o Post in clear and prominent location and on web-site o Must have been updated as of September 23, 2013 See free, customizable templates at o 45 CFR To receive written notice of the covered entity's duties with respect to PHI, the uses and disclosures it may make or be required to make, and the individual's rights (i.e., NPP); To receive PHI by alternative means or at alternative locations to protect confidentiality; To review and obtain a copy of their protected health information; To request amendments of protected health information; To request that uses and disclosures of health information be restricted; and To request an accounting of certain disclosures of their PHI for purposes other than TPO. Privacy Rule Restricts the use & disclosure of All PHI Electronic, Paper, & Oral What will be kept confidential Includes patient s rights Security Rule Applies only to Electronic PHI (ephi) How PHI will be kept confidential 23 Enforced by the Office of Civil Rights 24 Raymond: Beyond Basic HIPAA - GSHA Convention

5 Privacy Rule Privacy Officer Policies and Procedures Safeguards Security Rule Security Officer Policies and Procedures Safeguards Enforced by the Office of Civil Rights 25 Requires administrative, physical, and technical safeguards to ensure confidentiality, integrity, and availability of ephi Must protect against any reasonably anticipated threats or hazards to the security or integrity of ephi Must protect against any reasonably anticipated uses or disclosures that are not permitted by privacy rules Must have designated security officer Must include all standards in policies and procedures Must ensure compliance with workforce 45 CFR 160, 162, and Required o Specification must be implemented as stated Addressable (Does not mean optional ) o Covered entity must assess whether each specification is reasonable and appropriate for its environment to protect ephi. Must: A. Implement specification as stated, if reasonable and appropriate; or B. If not reasonable and appropriate, Document rationale, and Implement an equivalent alternative measure, if reasonable and appropriate Raymond: Beyond Basic HIPAA - GSHA Convention

6 Identify, evaluate, and eliminate or reduce risk. Address administrative, physical, and technical safeguards o Asset inventory and prioritization o Threat and vulnerability identification o Examination of existing security controls associated with addressing identified threats and vulnerabilities o Determining the likelihood of exposure to identified threats and vulnerabilities o Determining the impact (fiscal, workflow, etc.) associated with the exercise of a threat or vulnerability exploitation o Determining, prioritizing, and mitigating identified risks p?ddocname=bok1_ CFR (a)(1)(ii)(A Security Risk Assessment Tool Downloadable SRA Tool at HealthIT.gov o Developed by he Office of the National Coordinator for Health Information Technology (ONC) with the HHS Office for Civil Rights (OCR) and the HHS Office of the General Counsel (OGC), o Not required to use this tool; does not guarantee compliance o 156 Questions to guide you through process o Data stored locally (does not go to HHS) Some experts do not think it is adequate! NIST National Institute of Standards and Technology o Voluntary guidelines and best practices/hhs used for HIPAA o Guide for Conducting Risk Assessments rev1 HIPAA Security Rule Toolkit o Sample HIPAA Security Risk Assessment For a Small Physician Practice o - ask permission - see copyright HIPAA COW Risk Analysis & Risk Management Toolkit (uses NIST and SRA Toolkit) can use if provide reference o HIPAA Survival Guide o Clearwater Compliance o 35 Risk of misdirected , hacking, unauthorized disclosure o Use business account no free for healthcare use o Use encryption whenever possible o Avoid PHI in unless encrypted or with written permission from patient o Obtain written consent to use electronic communications state risks in consent o Use confidentiality statement after auto signature 36 Raymond: Beyond Basic HIPAA - GSHA Convention

7 Passwords o Use strong passwords o Unique user ID and login - No group logins o Change on regular basis o Don t use same password for all accounts o Don t post near PC Auto Log off of PC with PHI Encryption for any PHI at rest or in motion - laptops, PCs, tablets, etc. o 37 Breach notification Business associate requirements Accounting of disclosures (2016 deadline) Performance measures for electronic health record EHR (TBA) Incentives for EHR systems among providers Patient's right to restrict disclosures to health plans Limited data set as satisfying the minimum necessary standard Patient's right to electronic access to, and an electronic copy of, health record Prohibition on sale of PHI without authorization Marketing communications restrictions Opt-out for fund raising communications o Same as for HIPAA Periodic audits of business associates and covered entities 38 Unauthorized uses and disclosures of unsecured PHI o Unsecured PHI - PHI that is not secured through: 1) Encryption; and/or 2) Destruction as provided by HHS guidance Shredding o Secured - Methods must render PHI unusable, unreadable, or indecipherable to unauthorized individuals 13402(h) Affects data in motion, at rest, in use, disposed 39 Breach notification required except when CE or BA demonstrates a low probability that the PHI has been compromised. To determine if there is a low probability that PHI has been compromised, risk assessment: The nature and extent of the PHI involved, including the types of identifiers and the likelihood of re-identification. The unauthorized person who used the PHI or to whom the disclosure was made. Whether the PHI was actually acquired or viewed. The extent to which the risk to the PHI has been mitigated. 40 Breach of electronic unsecured PHI o Triggers HITECH Act Breach Requirements If more than 500 affected Must notify HHS immediately Posting will be on HHS Public Website Must notify prominent media outlets If less than 500 affected Annual notification to HHS U.S. Department of Health & Human Services o As required by section 13402(e)(4) of the HITECH Act, the Secretary must post a list of breaches of unsecured protected health information affecting 500 or more individuals. o See list at o Raymond: Beyond Basic HIPAA - GSHA Convention

8 Develop policies and procedures to comply with regulations regarding a breach of unsecured PHI. Sample policies: o ms/general/breachnotificationpolicy.pdf o o ncident_response_plan_procedures_ pdf Patients may now opt to restrict disclosure of the PHI to health plans Must pay out-of-pocket for goods or services Providers must provide this option to patients Patients have a right to see and obtain a copy of their record o Includes electronic records held in EHR o Within 30 days of request o Certain parts may not be made available, like psychotherapy notes Providers must make available all patient information in the record, including materials from other providers o Providers may charge for printing or mailing records Georgia state law sets a threshold for printing fees o May not charge for search or retrieval o May not withhold access because of nonpayment Can require use of provider s mobile media (not patient s flashdrive) 45 OCR Audits o Pilot audit program for 115 audits of CEs completed 11% were issue free o Plans to audit 200 CEs10, then 400 audits of BAs Web portal for pre-audit survey first o Focus on device encryption, media controls, data transmission security protocols, privacy: safeguards, staff training, policy implementation, risk analysis See Sample Interview and Document Request for HIPAA Security Onsite Investigations and Compliance Reviews Compliance-Audit-checklist_document-by-DHHS.pdf 46 Requires modifications to, and redistribution of, a covered entity's notice of privacy practices. o Must inform patients will be notified if PHI is subject to breach o Must inform that CE may contact them to raise funds and the individual has right to opt out Business Associate agreements must also include these expanded rights Penalties for noncompliance based on levels of negligence o Maximum penalty $1.5 million / violation 47 Makes business associates of covered entities directly liable for compliance with certain of the HIPAA Privacy and Security Rules' requirements. Strengthens the limitations on the use and disclosure of protected health information for marketing and fundraising purposes o Prohibits sale of protected health information without individual authorization. Expands individuals' rights to receive electronic copies of their health information Restricts disclosures to a health plan concerning treatment for which the individual has paid out of pocket in full. 48 Raymond: Beyond Basic HIPAA - GSHA Convention

9 Electronic Health Records Cloud Vendors Mobile Devices BYOD Encryption Cloud file sharing Google Drive, Dropbox, Evernote, etc. Social Media Teleconferencing HHS Audits Increase in cyber attacks Increase in breaches Increase in fines and penalties Cyber insurance 1. PHI means Private Health Information. 2. A written authorization is required to use and disclose PHI unless it is for treatment, payment, or healthcare operations (TPO). 3. A covered entity and business associate must enter into a Business Associate Agreement ( BAA ). 4. The HIPAA Privacy Rule applies only to electronic PHI. 5. Patient rights are stated in the Notice of Privacy Practices. 6. A risk assessment is a required standard under the HIPAA Security Rule. 7. Providers must notify the media when there is a breach affecting more than 500 individuals HIPAA Privacy Rule o HIPAA Security Rule (45 CFR Part 160 & Subparts A and C of Part 164) o HITECH Act (Div. A, Title XIII and Div. B, Title IV of ARRA) o o Rodriguez, L., & Johnson, M. (n.d.). Patient Privacy: A Guide for Providers. Medscape. Retrieved from CMS HIPAA Information - Medicaid and Medicare HIPAA Complaints HIPAA Survival Guide National Institutes of Standards & Technology (NIST) Research Regulations Lions Publishing, Inc: 001pRmNkNNhb3_e7PkDwKFTAQ%3D%3D Bridgefront: a.php Clearwater Compliance: HCPro: (HIM-HIPAA Insider) 54 Raymond: Beyond Basic HIPAA - GSHA Convention

10 Healthcare Info Security: lthcareinfosecurity.com/myaccount&utm_source=silverpopmailing&utm_medium= &utm_campaig n=enews-his %20(1)&utm_content=&spMailingID= &spUserID=NTQ5M zm0mzy3mzys1&spjobid= &spreportid=ndgxmtkxnjqys0 HHS: o HHS.gov updates o HHS Health care Blog o Stop Medicare Fraud o HHS-OIG News McGuire Woods: News-Registration.aspx The information provided in this presentation is for educational purposes only. Please consult an attorney for specific legal advice related to HIPAA, HITECH, or Omnibus Rule regulations Carol Ann Raymond, MBA, Ed.S., CCC-SLP Associate Clinical Professor Speech and Hearing Clinic Director HIPAA Privacy Officer raymond1@uga.edu Department of Communication Sciences & Special Education 57 Raymond: Beyond Basic HIPAA - GSHA Convention

HIPAA Omnibus Rule Overview. Presented by: Crystal Stanton MicroMD Marketing Communication Specialist

HIPAA Omnibus Rule Overview. Presented by: Crystal Stanton MicroMD Marketing Communication Specialist HIPAA Omnibus Rule Overview Presented by: Crystal Stanton MicroMD Marketing Communication Specialist 1 HIPAA Omnibus Rule - Agenda History of the Omnibus Rule What is the HIPAA Omnibus Rule and its various

More information

HIPAA Omnibus Rule Practice Impact. Kristen Heffernan MicroMD Director of Prod Mgt and Marketing

HIPAA Omnibus Rule Practice Impact. Kristen Heffernan MicroMD Director of Prod Mgt and Marketing HIPAA Omnibus Rule Practice Impact Kristen Heffernan MicroMD Director of Prod Mgt and Marketing 1 HIPAA Omnibus Rule Agenda History of the Rule HIPAA Stats Rule Overview Use of Personal Health Information

More information

What do you need to know?

What do you need to know? What do you need to know? DISCLAIMER Please note that the information provided is to inform our clients and friends of recent HIPAA and HITECH act developments. It is not intended, nor should it be used,

More information

Are You Still HIPAA Compliant? Staying Protected in the Wake of the Omnibus Final Rule Click to edit Master title style.

Are You Still HIPAA Compliant? Staying Protected in the Wake of the Omnibus Final Rule Click to edit Master title style. Are You Still HIPAA Compliant? Staying Protected in the Wake of the Omnibus Final Rule Click to edit Master title style March 27, 2013 www.mcguirewoods.com Introductions Holly Carnell McGuireWoods LLP

More information

Presented by Jack Kolk President ACR 2 Solutions, Inc.

Presented by Jack Kolk President ACR 2 Solutions, Inc. HIPAA 102 : What you don t know about the new changes in the law can hurt you! Presented by Jack Kolk President ACR 2 Solutions, Inc. Todays Agenda: 1) Jack Kolk, CEO of ACR 2 Solutions a information security

More information

OCR Reports on the Enforcement. Learning Objectives 4/1/2013. HIPAA Compliance/Enforcement (As of December 31, 2012) HCCA Compliance Institute

OCR Reports on the Enforcement. Learning Objectives 4/1/2013. HIPAA Compliance/Enforcement (As of December 31, 2012) HCCA Compliance Institute OCR Reports on the Enforcement of the HIPAA Rules HCCA Compliance Institute April 22, 2013 David Holtzman Sr. Health IT & Privacy Specialist U.S. Department of Health and Human Services Office for Civil

More information

OCR Reports on the Enforcement. Learning Objectives

OCR Reports on the Enforcement. Learning Objectives OCR Reports on the Enforcement of the HIPAA Rules HCCA Compliance Institute April 22, 2013 David Holtzman Sr. Health IT & Privacy Specialist U.S. Department of Health and Human Services Office for Civil

More information

INFORMATION SECURITY & HIPAA COMPLIANCE MPCA

INFORMATION SECURITY & HIPAA COMPLIANCE MPCA INFORMATION SECURITY & HIPAA COMPLIANCE MPCA Annual Conference August 5, 201 Agenda 1 HIPAA 2 The New Healthcare Paradigm Internal Compliance 4 Conclusion 2 1 HIPAA 1 Earning Their Trust 4 HIPAA 5 Health

More information

FIVE EASY STEPS FOR HANDLING NEW HIPAA REQUIREMENTS & MANAGING YOUR ELECTRONIC COMMUNICATIONS

FIVE EASY STEPS FOR HANDLING NEW HIPAA REQUIREMENTS & MANAGING YOUR ELECTRONIC COMMUNICATIONS FIVE EASY STEPS FOR HANDLING NEW HIPAA REQUIREMENTS & MANAGING YOUR ELECTRONIC COMMUNICATIONS James J. Eischen, Jr., Esq. October 2013 Chicago, Illinois JAMES J. EISCHEN, JR., ESQ. Partner at Higgs, Fletcher

More information

Data Breach, Electronic Health Records and Healthcare Reform

Data Breach, Electronic Health Records and Healthcare Reform Data Breach, Electronic Health Records and Healthcare Reform (This presentation is for informational purposes only and it is not intended, and should not be relied upon, as legal advice.) Overview of HIPAA

More information

HIPAA Enforcement. Emily Prehm, J.D. Office for Civil Rights U.S. Department of Health and Human Services. December 18, 2013

HIPAA Enforcement. Emily Prehm, J.D. Office for Civil Rights U.S. Department of Health and Human Services. December 18, 2013 Office of the Secretary Office for Civil Rights () HIPAA Enforcement Emily Prehm, J.D. Office for Civil Rights U.S. Department of Health and Human Services December 18, 2013 Presentation Overview s investigative

More information

OCR/HHS HIPAA/HITECH Audit Preparation

OCR/HHS HIPAA/HITECH Audit Preparation OCR/HHS HIPAA/HITECH Audit Preparation 1 Who are we EHR 2.0 Mission: To assist healthcare organizations develop and implement practices to secure IT systems and comply with HIPAA/HITECH regulations. Education

More information

HIPAA Privacy and Security Rules: A Refresher. Marilyn Freeman, RHIA California Area HIPAA Coordinator California Area HIM Consultant

HIPAA Privacy and Security Rules: A Refresher. Marilyn Freeman, RHIA California Area HIPAA Coordinator California Area HIM Consultant HIPAA Privacy and Security Rules: A Refresher Marilyn Freeman, RHIA California Area HIPAA Coordinator California Area HIM Consultant Objectives Provide overview of Health insurance Portability and Accountability

More information

HIPAA and the HITECH Act Privacy and Security of Health Information in 2009

HIPAA and the HITECH Act Privacy and Security of Health Information in 2009 HIPAA and the HITECH Act Privacy and Security of Health Information in 2009 What is HIPAA? Health Insurance Portability & Accountability Act of 1996 Effective April 13, 2003 Federal Law HIPAA Purpose:

More information

Trust 9/10/2015. Why Does Privacy and Security Matter? Who Must Comply with HIPAA Rules? HIPAA Breaches, Security Risk Analysis, and Audits

Trust 9/10/2015. Why Does Privacy and Security Matter? Who Must Comply with HIPAA Rules? HIPAA Breaches, Security Risk Analysis, and Audits HIPAA Breaches, Security Risk Analysis, and Audits Derrick Hill Senior Health IT Advisor Kentucky REC Why Does Privacy and Security Matter? Trust Who Must Comply with HIPAA Rules? Covered Entities (CE)

More information

Understanding HIPAA Privacy and Security Helping Your Practice Select a HIPAA- Compliant IT Provider A White Paper by CMIT Solutions

Understanding HIPAA Privacy and Security Helping Your Practice Select a HIPAA- Compliant IT Provider A White Paper by CMIT Solutions Understanding HIPAA Privacy and Security Helping Your Practice Select a HIPAA- Compliant IT Provider A White Paper by CMIT Solutions Table of Contents Understanding HIPAA Privacy and Security... 1 What

More information

THE HIPAA TANGO CHOREOGRAPHING PRIVACY AND SECURITY UNDER THE FINAL RULE

THE HIPAA TANGO CHOREOGRAPHING PRIVACY AND SECURITY UNDER THE FINAL RULE THE HIPAA TANGO CHOREOGRAPHING PRIVACY AND SECURITY UNDER THE FINAL RULE The Speakers Cinda Velasco Attorney, Manager, Privacy Officer Patient Safety and Risk Management Trish Lugtu Senior Manager MMIC

More information

HIPAA Update. Presented by: Melissa M. Zambri. June 25, 2014

HIPAA Update. Presented by: Melissa M. Zambri. June 25, 2014 HIPAA Update Presented by: Melissa M. Zambri June 25, 2014 Timeline of New Rules 2/17/09 - Stimulus Package Enacted 8/24/09 - Interim Final Rule on Breach Notification 10/7/09 - Proposed Rule Regarding

More information

Why Lawyers? Why Now?

Why Lawyers? Why Now? TODAY S PRESENTERS Why Lawyers? Why Now? New HIPAA regulations go into effect September 23, 2013 Expands HIPAA safeguarding and breach liabilities for business associates (BAs) Lawyer is considered a business

More information

HIPAA in an Omnibus World. Presented by

HIPAA in an Omnibus World. Presented by HIPAA in an Omnibus World Presented by HITECH COMPLIANCE ASSOCIATES IS NOT A LAW FIRM The information given is not intended to be a substitute for legal advice or consultation. As always in legal matters

More information

HIPAA Privacy & Breach Notification Training for System Administration Business Associates

HIPAA Privacy & Breach Notification Training for System Administration Business Associates HIPAA Privacy & Breach Notification Training for System Administration Business Associates Barbara M. Holthaus privacyofficer@utsystem.edu Office of General Counsel University of Texas System April 10,

More information

This presentation focuses on the Healthcare Breach Notification Rule. First published in 2009, the final breach notification rule was finalized in

This presentation focuses on the Healthcare Breach Notification Rule. First published in 2009, the final breach notification rule was finalized in This presentation focuses on the Healthcare Breach Notification Rule. First published in 2009, the final breach notification rule was finalized in the HIPAA Omnibus Rule of 2013. As part of the American

More information

HIPAA LIAISON MEETING PRESENTAITON. August 11, 2015 Leslie J. Pfeffer, BS, CHP University HIPAA Privacy Officer

HIPAA LIAISON MEETING PRESENTAITON. August 11, 2015 Leslie J. Pfeffer, BS, CHP University HIPAA Privacy Officer HIPAA LIAISON MEETING PRESENTAITON August 11, 2015 Leslie J. Pfeffer, BS, CHP University HIPAA Privacy Officer Current State of HIPAA Enforcement Content Contributor Abby Bonjean, Investigator Office for

More information

HIPAA Compliance: Are you prepared for the new regulatory changes?

HIPAA Compliance: Are you prepared for the new regulatory changes? HIPAA Compliance: Are you prepared for the new regulatory changes? Baker Tilly CARIS Innovation, Inc. April 30, 2013 Baker Tilly refers to Baker Tilly Virchow Krause, LLP, an independently owned and managed

More information

University Healthcare Physicians Compliance and Privacy Policy

University Healthcare Physicians Compliance and Privacy Policy Page 1 of 11 POLICY University Healthcare Physicians (UHP) will enter into business associate agreements in compliance with the provisions of the Health Insurance Portability and Accountability Act of

More information

HHS Issues New HITECH/HIPAA Rule: Implications for Hospice Providers

HHS Issues New HITECH/HIPAA Rule: Implications for Hospice Providers Compliance Tip Sheet National Hospice and Palliative Care Organization www.nhpco.org/regulatory HHS Issues New HITECH/HIPAA Rule: Implications for Hospice Providers Hospice Provider Compliance To Do List

More information

New HIPAA regulations require action. Are you in compliance?

New HIPAA regulations require action. Are you in compliance? New HIPAA regulations require action. Are you in compliance? Mary Harrison, JD Tami Simon, JD May 22, 2013 Discussion topics Introduction Remembering the HIPAA Basics HIPAA Privacy Rules HIPAA Security

More information

Understanding HIPAA Regulations and How They Impact Your Organization!

Understanding HIPAA Regulations and How They Impact Your Organization! Understanding HIPAA Regulations and How They Impact Your Organization! Presented by: HealthInfoNet & Systems Engineering! April 25 th 2013! Introductions! Todd Rogow Director of IT HealthInfoNet Adam Victor

More information

UNDERSTANDING THE HIPAA/HITECH BREACH NOTIFICATION RULE 2/25/14

UNDERSTANDING THE HIPAA/HITECH BREACH NOTIFICATION RULE 2/25/14 UNDERSTANDING THE HIPAA/HITECH BREACH NOTIFICATION RULE 2/25/14 RULES Issued August 19, 2009 Requires Covered Entities to notify individuals of a breach as well as HHS without reasonable delay or within

More information

12/19/2014. HIPAA More Important Than You Realize. Administrative Simplification Privacy Rule Security Rule

12/19/2014. HIPAA More Important Than You Realize. Administrative Simplification Privacy Rule Security Rule HIPAA More Important Than You Realize J. Ira Bedenbaugh Consulting Shareholder February 20, 2015 This material was used by Elliott Davis Decosimo during an oral presentation; it is not a complete record

More information

HIPAA Hot Topics. Audits, the Latest on Enforcement and the Impact of Breaches. September 2012. Nashville Knoxville Memphis Washington, D.C.

HIPAA Hot Topics. Audits, the Latest on Enforcement and the Impact of Breaches. September 2012. Nashville Knoxville Memphis Washington, D.C. HIPAA Hot Topics Audits, the Latest on Enforcement and the Impact of Breaches September 2012 Nashville Knoxville Memphis Washington, D.C. Overview HITECH Act HIPAA Audit Program: update and initial results

More information

The Basics of HIPAA Privacy and Security and HITECH

The Basics of HIPAA Privacy and Security and HITECH The Basics of HIPAA Privacy and Security and HITECH Protecting Patient Privacy Disclaimer The content of this webinar is to introduce the principles associated with HIPAA and HITECH regulations and is

More information

HIPAA and HITECH Compliance Under the New HIPAA Final Rule. HIPAA Final Omnibus Rule ( Final Rule )

HIPAA and HITECH Compliance Under the New HIPAA Final Rule. HIPAA Final Omnibus Rule ( Final Rule ) HIPAA and HITECH Compliance Under the New HIPAA Final Rule Presented Presented by: by: Barry S. Herrin, Attorney CHPS, Name FACHE Smith Smith Moore Moore Leatherwood Leatherwood LLP LLP Atlanta Address

More information

Heather L. Hughes, J.D. HIPAA Privacy Officer U.S. Legal Support, Inc. hhughes@uslegalsupport.com www.uslegalsupport.com

Heather L. Hughes, J.D. HIPAA Privacy Officer U.S. Legal Support, Inc. hhughes@uslegalsupport.com www.uslegalsupport.com Heather L. Hughes, J.D. HIPAA Privacy Officer U.S. Legal Support, Inc. hhughes@uslegalsupport.com www.uslegalsupport.com HIPAA Privacy Rule Sets standards for confidentiality and privacy of individually

More information

COMPLIANCE ALERT 10-12

COMPLIANCE ALERT 10-12 HAWAII HEALTH SYSTEMS C O R P O R A T I O N "Touching Lives Every Day COMPLIANCE ALERT 10-12 HIPAA Expansion under the American Recovery and Reinvestment Act of 2009 The American Recovery and Reinvestment

More information

Legislative & Regulatory Information

Legislative & Regulatory Information Americas - U.S. Legislative, Privacy & Projects Jurisdiction Effective Date Author Release Date File No. UFS Topic Citation: Reference: Federal 3/26/13 Michael F. Tietz Louis Enahoro HIPAA, Privacy, Privacy

More information

HIPAA Compliance Guide

HIPAA Compliance Guide HIPAA Compliance Guide Important Terms Covered Entities (CAs) The HIPAA Privacy Rule refers to three specific groups as covered entities, including health plans, healthcare clearinghouses, and health care

More information

Data Security and Integrity of e-phi. MLCHC Annual Clinical Conference Worcester, MA Wednesday, November 12, 2014 2:15pm 3:30pm

Data Security and Integrity of e-phi. MLCHC Annual Clinical Conference Worcester, MA Wednesday, November 12, 2014 2:15pm 3:30pm Electronic Health Records: Data Security and Integrity of e-phi Worcester, MA Wednesday, 2:15pm 3:30pm Agenda Introduction Learning Objectives Overview of HIPAA HIPAA: Privacy and Security HIPAA: The Security

More information

HIPAA AND MEDICAID COMPLIANCE POLICIES AND PROCEDURES

HIPAA AND MEDICAID COMPLIANCE POLICIES AND PROCEDURES SALISH BHO HIPAA AND MEDICAID COMPLIANCE POLICIES AND PROCEDURES Policy Name: HIPAA BREACH NOTIFICATION REQUIREMENTS Policy Number: 5.16 Reference: 45 CFR Parts 164 Effective Date: 03/2016 Revision Date(s):

More information

HIPAA Compliance Guide

HIPAA Compliance Guide HIPAA Compliance Guide Important Terms Covered Entities (CAs) The HIPAA Privacy Rule refers to three specific groups as covered entities, including health plans, healthcare clearinghouses, and health care

More information

Updated HIPAA Regulations What Optometrists Need to Know Now. HIPAA Overview

Updated HIPAA Regulations What Optometrists Need to Know Now. HIPAA Overview Updated HIPAA Regulations What Optometrists Need to Know Now The U.S. Department of Health & Human Services Office for Civil Rights recently released updated regulations regarding the Health Insurance

More information

HIPAA: Breach Notification By: Office of University Counsel For: Jefferson IRB Continuing Education. September 2014

HIPAA: Breach Notification By: Office of University Counsel For: Jefferson IRB Continuing Education. September 2014 HIPAA: Breach Notification By: Office of University Counsel For: Jefferson IRB Continuing Education September 2014 Introduction The HIPAA Privacy Rule establishes the conditions under which Covered Entities

More information

Everett School Employee Benefit Trust. Reportable Breach Notification Policy HIPAA HITECH Rules and Washington State Law

Everett School Employee Benefit Trust. Reportable Breach Notification Policy HIPAA HITECH Rules and Washington State Law Everett School Employee Benefit Trust Reportable Breach Notification Policy HIPAA HITECH Rules and Washington State Law Introduction The Everett School Employee Benefit Trust ( Trust ) adopts this policy

More information

Outline. Outline. What is HIPAA? I. HIPAA Compliance II. Why Should You Care? III. What Should You Do Now?

Outline. Outline. What is HIPAA? I. HIPAA Compliance II. Why Should You Care? III. What Should You Do Now? Outline MOR-OF Education and Medical Expo August 23, 2014 Tatiana Melnik Melnik Legal PLLC tatiana@melniklegal.com 734-358-4201 Tampa, FL I. HIPAA Compliance II. Why Should You Care? A. Market Pressure

More information

What Health Care Entities Need to Know about HIPAA and the American Recovery and Reinvestment Act

What Health Care Entities Need to Know about HIPAA and the American Recovery and Reinvestment Act What Health Care Entities Need to Know about HIPAA and the American Recovery and Reinvestment Act by Lane W. Staines and Cheri D. Green On February 17, 2009, The American Recovery and Reinvestment Act

More information

Network Security and Data Privacy Insurance for Physician Groups

Network Security and Data Privacy Insurance for Physician Groups Network Security and Data Privacy Insurance for Physician Groups February 2014 Lockton Companies While exposure to medical malpractice remains a principal risk MIKE EGAN, CPCU Senior Vice President Unit

More information

The benefits you need... from the name you know and trust

The benefits you need... from the name you know and trust The benefits you need... Privacy and Security Best at Practices the price you can afford... Guide from the name you know and trust The Independence Blue Cross (IBC) Privacy and Security Best Practices

More information

Breaches. Complying with the HIPAA Omnibus Final Rule. Important Definitions. Protected Health Information Includes HIPAA PRIVACY 3/2/2014

Breaches. Complying with the HIPAA Omnibus Final Rule. Important Definitions. Protected Health Information Includes HIPAA PRIVACY 3/2/2014 Breaches Complying with the HIPAA Omnibus Final Rule You Can Be Successful! Advocate Medical Group in Chicago had 4 desktop computers taken in a burglary that contained the personal information of over

More information

How To Write A Report On The Health Care Privacy And Security Rules Of Health Care For A Patient

How To Write A Report On The Health Care Privacy And Security Rules Of Health Care For A Patient Annual Report to Congress on HIPAA Privacy, Security, and Breach Notification Rule Compliance For Calendar Years 2011 and 2012 As Required by the Health Information Technology for Economic and Clinical

More information

HIPAA Happenings in Hospital Systems. Donna J Brock, RHIT System HIM Audit & Privacy Coordinator

HIPAA Happenings in Hospital Systems. Donna J Brock, RHIT System HIM Audit & Privacy Coordinator HIPAA Happenings in Hospital Systems Donna J Brock, RHIT System HIM Audit & Privacy Coordinator HIPAA Health Insurance Portability and Accountability Act of 1996 Title 1 Title II Title III Title IV Title

More information

HIPAA 101. March 18, 2015 Webinar

HIPAA 101. March 18, 2015 Webinar HIPAA 101 March 18, 2015 Webinar Agenda Acronyms to Know HIPAA Basics What is HIPAA and to whom does it apply? What is protected by HIPAA? Privacy Rule Security Rule HITECH Basics Breaches and Responses

More information

Lessons Learned from Recent HIPAA and Big Data Breaches. Briar Andresen Katie Ilten Ann Ladd

Lessons Learned from Recent HIPAA and Big Data Breaches. Briar Andresen Katie Ilten Ann Ladd Lessons Learned from Recent HIPAA and Big Data Breaches Briar Andresen Katie Ilten Ann Ladd Recent health care breaches Breach reports to OCR as of February 2015 1,144 breaches involving 500 or more individual

More information

Lessons Learned from HIPAA Audits

Lessons Learned from HIPAA Audits Lessons Learned from HIPAA Audits October 29, 2012 Tony Brooks, CISA, CRISC Partner - IT Assurance and Risk Services HORNE LLP AGENDA HIPAA/HITECH Regulations Breaches and Fines OCR HIPAA/HITECH Compliance

More information

Patient Privacy and HIPAA/HITECH

Patient Privacy and HIPAA/HITECH Patient Privacy and HIPAA/HITECH What is HIPAA? Health Insurance Portability and Accountability Act of 1996 Implemented in 2003 Title II Administrative Simplification It s a federal law HIPAA is mandatory,

More information

Overview of the HIPAA Security Rule

Overview of the HIPAA Security Rule Office of the Secretary Office for Civil Rights () Overview of the HIPAA Security Rule Office for Civil Rights Region IX Alicia Cornish, EOS Sheila Fischer, Supervisory EOS Topics Upon completion of this

More information

8/3/2015. Integrating Behavioral Health and HIV Into Electronic Health Records Communities of Practice

8/3/2015. Integrating Behavioral Health and HIV Into Electronic Health Records Communities of Practice Integrating Behavioral Health and HIV Into Electronic Health Records Communities of Practice Monday, August 3, 2015 1 How to ask a question during the webinar If you dialed in to this webinar on your phone

More information

HIPAA Policy, Protection, and Pitfalls ARTHUR J. GALLAGHER & CO. BUSINESS WITHOUT BARRIERS

HIPAA Policy, Protection, and Pitfalls ARTHUR J. GALLAGHER & CO. BUSINESS WITHOUT BARRIERS HIPAA Policy, Protection, and Pitfalls Overview HIPAA Privacy Basics What s covered by HIPAA privacy rules, and what isn t? Interlude on the Hands-Off Group Health Plan When does this exception apply,

More information

You Probably Don t Even Know

You Probably Don t Even Know You Probably Don t Even Know That You Need To Comply With HIPAA In Collaboration With: About ERM About The Speaker Stephen Siegel, Esq., Of Counsel, Broad and Cassel Board Certified Health Law Over 25

More information

Protecting Patient Information in an Electronic Environment- New HIPAA Requirements

Protecting Patient Information in an Electronic Environment- New HIPAA Requirements Protecting Patient Information in an Electronic Environment- New HIPAA Requirements SD Dental Association Holly Arends, RHIT Clinical Program Manager Meet the Speaker TRUST OBJECTIVES Overview of HIPAA

More information

The ReHabilitation Center. 1439 Buffalo Street. Olean. NY. 14760

The ReHabilitation Center. 1439 Buffalo Street. Olean. NY. 14760 Procedure Name: HITECH Breach Notification The ReHabilitation Center 1439 Buffalo Street. Olean. NY. 14760 Purpose To amend The ReHabilitation Center s HIPAA Policy and Procedure to include mandatory breach

More information

BREVIUM HIPAA BUSINESS ASSOCIATE TERMS AND CONDITIONS

BREVIUM HIPAA BUSINESS ASSOCIATE TERMS AND CONDITIONS BREVIUM HIPAA BUSINESS ASSOCIATE TERMS AND CONDITIONS The following HIPAA Business Associate Terms and Conditions (referred to hereafter as the HIPAA Agreement ) are part of the Brevium Software License

More information

New HIPAA Breach Notification Rule: Know Your Responsibilities. Loudoun Medical Group Spring 2010

New HIPAA Breach Notification Rule: Know Your Responsibilities. Loudoun Medical Group Spring 2010 New HIPAA Breach Notification Rule: Know Your Responsibilities Loudoun Medical Group Spring 2010 Health Information Technology for Economic and Clinical Health Act (HITECH) As part of the Recovery Act,

More information

Community First Health Plans Breach Notification for Unsecured PHI

Community First Health Plans Breach Notification for Unsecured PHI Community First Health Plans Breach Notification for Unsecured PHI The presentation is for informational purposes only. It is the responsibility of the Business Associate to ensure awareness and compliance

More information

HIPAA OMNIBUS RULE: EXPANDED COMPLIANCE REQUIREMENTS

HIPAA OMNIBUS RULE: EXPANDED COMPLIANCE REQUIREMENTS HIPAA OMNIBUS RULE: EXPANDED COMPLIANCE REQUIREMENTS James J. Eischen, Jr., Esq. November 2013 San Diego, California JAMES J. EISCHEN, JR., ESQ. Partner at Higgs, Fletcher & Mack, LLP 26+ years of experience

More information

By Ross C. D Emanuele, John T. Soshnik, and Kari Bomash, Dorsey & Whitney LLP Minneapolis, MN

By Ross C. D Emanuele, John T. Soshnik, and Kari Bomash, Dorsey & Whitney LLP Minneapolis, MN Major Changes to HIPAA Security and Privacy Rules Enacted in Economic Stimulus Package By Ross C. D Emanuele, John T. Soshnik, and Kari Bomash, Dorsey & Whitney LLP Minneapolis, MN The HITECH Act is the

More information

HIPAA Compliance in 2013:

HIPAA Compliance in 2013: HIPAA Compliance in 2013: National Association for Home Care & Hospice March on Washington March 18, 2013 1 Marcia Augsburger Partner, DLA Piper, LLP (US) Firm HIPAA Officer and HIPAA Working Group Co-Chair

More information

Business Associate Management Methodology

Business Associate Management Methodology Methodology auxilioinc.com 844.874.0684 Table of Contents Methodology Overview 3 Use Case 1: Upstream of s I manage business associates 4 System 5 Use Case 2: Eco System of s I manage business associates

More information

Business Associates, HITECH & the Omnibus HIPAA Final Rule

Business Associates, HITECH & the Omnibus HIPAA Final Rule Business Associates, HITECH & the Omnibus HIPAA Final Rule HIPAA Omnibus Final Rule Changes Business Associates Marissa Gordon-Nguyen, JD, MPH Health Information Privacy Specialist Office for Civil Rights/HHS

More information

Information Security and Privacy. WHAT is to be done? HOW is it to be done? WHY is it done?

Information Security and Privacy. WHAT is to be done? HOW is it to be done? WHY is it done? Information Security and Privacy WHAT is to be done? HOW is it to be done? WHY is it done? 1 WHAT is to be done? O Be in compliance of Federal/State Laws O Federal: O HIPAA O HITECH O State: O WIC 4514

More information

HIPAA Omnibus & HITECH Rules: Key Provisions and a Simple Checklist. www.riskwatch.com

HIPAA Omnibus & HITECH Rules: Key Provisions and a Simple Checklist. www.riskwatch.com HIPAA Omnibus & HITECH Rules: Key Provisions and a Simple Checklist www.riskwatch.com Introduction Last year, the federal government published its long awaited final regulations implementing the Health

More information

HIPAA Compliance, Notification & Enforcement After The HITECH Act. Presenter: Radha Chanderraj, Esq.

HIPAA Compliance, Notification & Enforcement After The HITECH Act. Presenter: Radha Chanderraj, Esq. HIPAA Compliance, Notification & Enforcement After The HITECH Act Presenter: Radha Chanderraj, Esq. Key Dates Publication date January 25, 2013 Effective date - March 26, 2013 Compliance date - September

More information

HIPAA Security Rule Compliance

HIPAA Security Rule Compliance HIPAA Security Rule Compliance Caryn Reiker MAXIS360 HIPAA Security Rule Compliance what is it and why you should be concerned about it Table of Contents About HIPAA... 2 Who Must Comply... 2 The HIPAA

More information

SAMPLE BUSINESS ASSOCIATE AGREEMENT

SAMPLE BUSINESS ASSOCIATE AGREEMENT SAMPLE BUSINESS ASSOCIATE AGREEMENT THIS AGREEMENT IS TO BE USED ONLY AS A SAMPLE IN DEVELOPING YOUR OWN BUSINESS ASSOCIATE AGREEMENT. ANYONE USING THIS DOCUMENT AS GUIDANCE SHOULD DO SO ONLY IN CONSULT

More information

What s New with HIPAA? Policy and Enforcement Update

What s New with HIPAA? Policy and Enforcement Update What s New with HIPAA? Policy and Enforcement Update HHS Office for Civil Rights New Initiatives Precision Medicine Initiative (PMI), including Access Guidance Cybersecurity Developer portal NICS Final

More information

HHS Finalizes HIPAA Privacy and Data Security Rules, Including Stricter Rules for Breaches of Unsecured PHI

HHS Finalizes HIPAA Privacy and Data Security Rules, Including Stricter Rules for Breaches of Unsecured PHI January 23, 2013 HHS Finalizes HIPAA Privacy and Data Security Rules, Including Stricter Rules for Breaches of Unsecured PHI Executive Summary HHS has issued final regulations that address recent legislative

More information

HIPAA BREACH RESPONSE POLICY

HIPAA BREACH RESPONSE POLICY http://dhmh.maryland.gov/sitepages/op02.aspx (OIG) DHMH POLICY 01.03.07 Effective Date: July 22, 2014 I. EXECUTIVE SUMMARY The Department of Health and Mental Hygiene (DHMH) is committed to protecting

More information

CREATIVE SOLUTIONS IN HEALTHCARE, INC. Privacy Policy

CREATIVE SOLUTIONS IN HEALTHCARE, INC. Privacy Policy CREATIVE SOLUTIONS IN HEALTHCARE, INC. Privacy Policy Amended as of February 12, 2010 on the authority of the HIPAA Privacy Officer for Creative Solutions in Healthcare, Inc. TABLE OF CONTENTS ARTICLE

More information

ADMINISTRATIVE REGULATION EFFECTIVE DATE: 1/1/2016

ADMINISTRATIVE REGULATION EFFECTIVE DATE: 1/1/2016 Page 1 of 9 CITY OF CHESAPEAKE, VIRGINIA NUMBER: 2.62 ADMINISTRATIVE REGULATION EFFECTIVE DATE: 1/1/2016 SUPERCEDES: N/A SUBJECT: HUMAN RESOURCES DEPARTMENT CITY OF CHESAPEAKE EMPLOYEE/RETIREE GROUP HEALTH

More information

HIPAA and Mental Health Privacy:

HIPAA and Mental Health Privacy: HIPAA and Mental Health Privacy: What Social Workers Need to Know Presenter: Sherri Morgan, JD, MSW Associate Counsel, NASW Legal Defense Fund and Office of Ethics & Professional Review 2010 National Association

More information

HHS announces sweeping changes to the HIPAA Privacy and Security Rules in the final HIPAA Omnibus Rule

HHS announces sweeping changes to the HIPAA Privacy and Security Rules in the final HIPAA Omnibus Rule JANUARY 23, 2013 HHS announces sweeping changes to the HIPAA Privacy and Security Rules in the final HIPAA Omnibus Rule By Linn Foster Freedman, Kathryn M. Sylvia, Lindsay Maleson, and Brooke A. Lane On

More information

Ethics, Privilege, and Practical Issues in Cloud Computing, Privacy, and Data Protection: HIPAA February 13, 2015

Ethics, Privilege, and Practical Issues in Cloud Computing, Privacy, and Data Protection: HIPAA February 13, 2015 Ethics, Privilege, and Practical Issues in Cloud Computing, Privacy, and Data Protection: HIPAA February 13, 2015 Katherine M. Layman Cozen O Connor 1900 Market Street Philadelphia, PA 19103 (215) 665-2746

More information

Business Associates and Breach Reporting Under HITECH and the Omnibus Final HIPAA Rule

Business Associates and Breach Reporting Under HITECH and the Omnibus Final HIPAA Rule Business Associates and Breach Reporting Under HITECH and the Omnibus Final HIPAA Rule Patricia D. King, Esq. Associate General Counsel Swedish Covenant Hospital Chicago, IL I. Business Associates under

More information

HIPAA: Protecting Your. Ericka L. Adler. Practice and Your Patients

HIPAA: Protecting Your. Ericka L. Adler. Practice and Your Patients HIPAA: Protecting Your Ericka L. Adler Practice and Your Patients Rachel V. Rose Fallout from the Omnibus Rule Compliance strategies for medical practices 1. Know / manage your business associates and

More information

The HIPAA Audit Program

The HIPAA Audit Program The HIPAA Audit Program Anna C. Watterson Davis Wright Tremaine LLP The U.S. Department of Health and Human Services (HHS) was given authority, and a mandate, to conduct periodic audits of HIPAA 1 compliance

More information

ACCOUNTABLE HEALTHCARE IPA HIPAA PRIVACY AND SECURITY TRAINING. By: Jerry Jackson Compliance and Privacy Officer

ACCOUNTABLE HEALTHCARE IPA HIPAA PRIVACY AND SECURITY TRAINING. By: Jerry Jackson Compliance and Privacy Officer ACCOUNTABLE HEALTHCARE IPA HIPAA PRIVACY AND SECURITY TRAINING By: Jerry Jackson Compliance and Privacy Officer 1 1 Introduction Welcome to Privacy and Security Training course. This course will help you

More information

Use & Disclosure of Protected Health Information by Business Associates

Use & Disclosure of Protected Health Information by Business Associates Applicability: Policy Title: Policy Number: Use & Disclosure of Protected Health Information by Business Associates PP-12 Superseded Policy(ies) or Entity Policy: N/A Date Established: January 31, 2003

More information

How To Understand And Understand The Benefits Of A Health Insurance Risk Assessment

How To Understand And Understand The Benefits Of A Health Insurance Risk Assessment 4547 The Case For HIPAA Risk Assessment Leader s Guide IMPORTANT INFORMATION FOR EDUCATION COORDINATORS & PROGRAM FACILITATORS PLEASE NOTE: In order for this program to meet Florida course requirements,

More information

HIPAA, HIPAA Hi-TECH and HIPAA Omnibus Rule

HIPAA, HIPAA Hi-TECH and HIPAA Omnibus Rule HIPAA, HIPAA Hi-TECH and HIPAA Omnibus Rule NYCR-245157 HIPPA, HIPAA HiTECH& the Omnibus Rule A. HIPAA IIHI and PHI Privacy & Security Rule Covered Entities and Business Associates B. HIPAA Hi-TECH Why

More information

HIPAA Omnibus Final Rule Changes Breach Notification & Enforcement Plus An Audit Update

HIPAA Omnibus Final Rule Changes Breach Notification & Enforcement Plus An Audit Update HIPAA Omnibus Final Rule Changes Breach Notification & Enforcement Plus An Audit Update OCR / WEDI Webinar Series July 17, 2013 Today s Speakers Verne Rinker, JD, MPH Health Information Privacy Specialist

More information

OCR UPDATE Breach Notification Rule & Business Associates (BA)

OCR UPDATE Breach Notification Rule & Business Associates (BA) OCR UPDATE Breach Notification Rule & Business Associates (BA) Alicia Galan Supervisory Equal Opportunity Specialist March 7, 2014 HITECH OMNIBUS A Reminder of What s Included: Final Modifications of the

More information

HIPAA/HITECH and Texas Privacy Laws Comparison Tool Updated 2013

HIPAA/HITECH and Texas Privacy Laws Comparison Tool Updated 2013 HIPAA/HITECH and Texas Privacy Laws Comparison Tool Updated 2013 Federal and Texas Privacy & Security Requirements Minimizing Your Risk of Violations DISCLAIMER The information contained in this document

More information

Privacy Officer Job Description 4/28/2014. HIPAA Privacy Officer Orientation. Cathy Montgomery, RN. Presented by:

Privacy Officer Job Description 4/28/2014. HIPAA Privacy Officer Orientation. Cathy Montgomery, RN. Presented by: HIPAA Privacy Officer Orientation Presented by: Cathy Montgomery, RN Privacy Officer Job Description Serve as leader Develop Policies and Procedures Train staff Monitor activities Manage Business Associates

More information

HIPAA Compliance: Efficient Tools to Follow the Rules

HIPAA Compliance: Efficient Tools to Follow the Rules Bank of America Merrill Lynch White Paper HIPAA Compliance: Efficient Tools to Follow the Rules Executive summary Contents The stakes have never been higher for compliance with the Health Insurance Portability

More information

HIPAA and HITECH Compliance for Cloud Applications

HIPAA and HITECH Compliance for Cloud Applications What Is HIPAA? The healthcare industry is rapidly moving towards increasing use of electronic information systems - including public and private cloud services - to provide electronic protected health

More information

BUSINESS ASSOCIATE AGREEMENT. Business Associate. Business Associate shall mean.

BUSINESS ASSOCIATE AGREEMENT. Business Associate. Business Associate shall mean. BUSINESS ASSOCIATE AGREEMENT This Business Associate Agreement is made as of the day of, 2010, by and between Methodist Lebonheur Healthcare, on behalf of itself and all of its affiliates ( Covered Entity

More information

Texas Medical Records Privacy Act (a.k.a. Texas House Bill 300)

Texas Medical Records Privacy Act (a.k.a. Texas House Bill 300) Texas Medical Records Privacy Act (a.k.a. Texas House Bill 300) Ricky Link, Coalfire ISACA North Texas and IIA Fort Worth Chapters The Petroleum Club of Fort Worth March 4, 2014 1 About Coalfire Coalfire

More information

Disclaimer 8/8/2014. Current Developments in Privacy and Security Rule Enforcement

Disclaimer 8/8/2014. Current Developments in Privacy and Security Rule Enforcement Office of the Secretary Office for Civil Rights () Current Developments in Privacy and Security Rule Enforcement Michigan Medical Billers Association Andrew C. Kruley, J.D. Equal Opportunity Specialist

More information

The MC Academy The Employee Benefits and Executive Compensation Series. HIPAA PRIVACY AND SECURITY The New Final Regulations

The MC Academy The Employee Benefits and Executive Compensation Series. HIPAA PRIVACY AND SECURITY The New Final Regulations The MC Academy The Employee Benefits and Executive Compensation Series HIPAA PRIVACY AND SECURITY The New Final Regulations June 18, 2013 Overview Background Recent Changes to HIPAA Identifying Business

More information

Donna S. Sheperis, PhD, LPC, NCC, CCMHC, ACS Sue Sadik, PhD, LPC, NCC, BC-HSP Carl Sheperis, PhD, LPC, NCC, MAC, ACS

Donna S. Sheperis, PhD, LPC, NCC, CCMHC, ACS Sue Sadik, PhD, LPC, NCC, BC-HSP Carl Sheperis, PhD, LPC, NCC, MAC, ACS Donna S. Sheperis, PhD, LPC, NCC, CCMHC, ACS Sue Sadik, PhD, LPC, NCC, BC-HSP Carl Sheperis, PhD, LPC, NCC, MAC, ACS 1 DISCLAIMER Please review your own documentation with your attorney. This information

More information

HIPAA BREACH NOTIFICATION REQUIREMENTS. Heman A. Marshall, III July 25, 2014

HIPAA BREACH NOTIFICATION REQUIREMENTS. Heman A. Marshall, III July 25, 2014 1 HIPAA BREACH NOTIFICATION REQUIREMENTS Heman A. Marshall, III July 25, 2014 2 SCENARIO FOR VBA SUMMER MEETING The Medical Marijuana Growers Association (MMGA) Health Plan, which is a self-fund plan,

More information