PRIVACY AND SECURITY SURVIVAL TRAINING
|
|
|
- Walter Norris
- 10 years ago
- Views:
Transcription
1 PRIVACY AND SECURITY SURVIVAL TRAINING 1.Typeorcutandpastethislinkintothe addressbar: 2.Clickthe downarrow 3.Select 2013Privacyand SecuritySurvivalHandbook Page1of6
2 4.Click Next 5.Readtheinstructions aboveandclick Privacyand SecuritySurvival Guide Page2of6
3 6.Afterreadingtheinformation inthetraininghandbook,you mayneedtominimizethescreen toviewthetest. 7.Reviewandanswerthetest questions.ifyouareunsureof theanswer,click Hint,for assistance. Page3of6
4 8.Uponcompletionofthetest,click CheckIt.Ifanswersweremissingor incorrect,makethecorrectionsandclick CheckIt again. Attestation 9.Afterreadingtheattestationand reviewingthepolicies,clickthe workforcegroupyoubelongtoandyou willbetakentoanotherscreen. Page4of6
5 COUNTYWORKFORCESCREEN 10.Countyworkforce:Enteryour employeenumber(numberonly,do notincludean e ). 11.Countyworkforce:Click Lookup Info andtherequiredfieldswill populateforyou.ifthe Lookup Info doesnotpopulate,enteryour informationinthefields. 12.Click Submit attestingcompliance andyourcertificatewillappear. NONCOUNTYWORKFORCESCREEN 10.NonCountyworkforce:Enter yourcontractidentificationnumber andcompletetherequiredfields. 11.Click Submit attestingcompliance andyourcertificatewillappear. Page5of6
6 Printthecertificate, andprovideacopyto yoursupervisor. Workforcemembernameand identificationnumber Dateandtime Page6of6
7 PRIVACY & SECURITY SURVIVAL TRAINING: PROTECTING PATIENT INFORMATION ASSESSMENT QUESTIONS 1. As a workforce member of this facility, you may access a patient s protected health information: a. whenever you want to do so b. if your co-worker or supervisor asks you to do so c. only if your job duties require you to do so d. in an emergency even if you re not authorized 2. It is your responsibility to immediately report any suspected privacy or security breach, such as any theft of computer equipment or unauthorized or inappropriate access, use, disclosure, or destruction of patient or confidential information: 3. Patient or confidential information should not be viewed, accessed, or disclosed without a need to know. Which of the following forms of confidential information would be protected under HIPAA? a. A paper-to-paper fax b. Verbal conversations c. Information written solely on paper d. All of the above 4. You only need to contact your facility Information Technology Help Desk to obtain authorization to PHI. 5. If you are only going to be away from your desk for a few minutes you do not need to lock or log off your workstation. Page 41 of 45 Privacy & Security Survival Training: Protecting Patient Information
8 6. Jason s supervisor wants access to his computer when he is away from the office. The supervisor has a right to know his username and password. 7. DHS may log, review, or monitor any data you have created, stored, sent, or received using County Information Systems (e.g., computer, laptop, etc.). 8. What is the Notice of Privacy Practices (NPP)? a. It is a tool to enable patients to express their concerns about misuse of PHI b. It informs the patient of services the facility does not provide c. It is a tool that allows patients to select the type of information that they would like to have sent back to their provider d. It describes patient rights and the provider s responsibilities regarding PHI 9. Which of the following are authorized to release patient information when requested by a patient, law enforcement, etc.? a. Physicians b. Nursing staff c. Health Information Management staff d. Employee Health Services staff 10. A password on a portable storage device is sufficient to protect PHI in case of loss or theft of the device. 11. Which of the following disclosures of PHI is not a privacy breach and/or security breach? a. Mary has access to the patient information system and decides to check her health records to see what is in it b. Walter works in HIM and provided a patient s medical information to the United States Department of Health and Human Services c. Janice, a law enforcement officer, is friends with the hospital receptionist and asks her to look up her ex-husband s records to check which medicines were prescribed at his last visit d. All are allowable under HIPAA Page 42 of 45 Privacy & Security Survival Training: Protecting Patient Information
9 12. Mary has been out sick. Her supervisor finds out from their Human Resources Return-to-Work Unit that Mary has cancer, and tells Mary s coworkers about it. It is okay for Mary s supervisor to let her coworkers know about Mary s cancer since the coworkers all care about her well-being. 13. You may be subject to fines and penalties under State and federal laws and/or disciplinary action if you fail to comply with patient privacy laws or County, DHS, or facility policies and procedures. 14. If the State determines you have violated the State privacy laws, they may report you to the appropriate licensing, registration, certification, or permit board/agency for possible disciplinary action. 15. A patient or individual can report a suspected privacy or security breach to the following entities: a. Supervisor b. Facility Privacy Coordinator or Information Security Coordinator c. County Fraud Hotline d. DHS Compliance Hotline e. Any of the above 16. There will be no retaliation against a workforce member who, in good faith, reports any actual or suspected privacy breaches or HIPAA violation 17. In addition to medical records, PHI may be found in written communications, electronic forms, verbal conversations, s and memos, IV and medication labels, X-rays, monitors, EKGs, etc. and must be protected. Page 43 of 45 Privacy & Security Survival Training: Protecting Patient Information
10 18. While working the 9pm 6am shift at the hospital, you see some patient information in a trash can. What should you do? a. Remove it from the trash can, if safe to do so, and take it to the shredder bin. b. Remove it from the trash can, if safe to do so, or secure the trash can and immediately notify your supervisor. c. Immediately report it to the facility Chief Financial Officer d. Call the toll-free hotline and report it 19. An employee mistakenly receives a fax containing PHI from an outside healthcare agency. What should the employee do? a. Contact the person on the cover sheet b. Throw the FAX in the shredder bin c. Contact the facility Privacy Officer d. All of the above 20. When you have a patient s prior written permission to videotape them, it is permissible to use your own video camera. Page 44 of 45 Privacy & Security Survival Training: Protecting Patient Information
HIPAA Privacy and Security. Rochelle Steimel, HIPAA Privacy Official Judy Smith, Staff Development January 2012
HIPAA Privacy and Security Rochelle Steimel, HIPAA Privacy Official Judy Smith, Staff Development January 2012 Goals and Objectives Course Goal: To introduce the staff of Munson Healthcare to the concepts
Annual Compliance Training. HITECH/HIPAA Refresher
Annual Compliance Training HITECH/HIPAA Refresher January 2015 Sisters of Charity of Leavenworth Health System, Inc. All rights reserved. 1 Annual Refresher Training Welcome to the SCL Health System Compliance
HIPAA Compliance. 2013 Annual Mandatory Education
HIPAA Compliance 2013 Annual Mandatory Education What is HIPAA? Health Insurance Portability and Accountability Act Federal Law enacted in 1996 that mandates adoption of Privacy protections for health
Health Insurance Portability and Accountability Act (HIPAA)
Health Insurance Portability and Accountability Act (HIPAA) General Education Presented by: Bureau of Personnel Department of Health Department of Human Services Department of Social Services Bureau of
HIPAA Awareness Training
New York State Office of Mental Health Bureau of Education and Workforce Development HIPAA Awareness Training This training material was prepared for internal use by the New York State Office of Mental
2014 Core Training 1
2014 Core Training 1 Course Agenda Review of Key Privacy Laws/Regulations: Federal HIPAA/HITECH regulations State privacy laws Privacy & Security Policies & Procedures Huntsville Hospital Health System
Protecting Patient Privacy It s Everyone s Responsibility
Protecting Patient Privacy It s Everyone s Responsibility Observation & Student Learning Packet 1. Read packet Instructions for Self-Study Module 2. Complete post-test. A score of 80% must be achieved.
PROTECTING PATIENT PRIVACY and INFORMATION SECURITY
PROTECTING PATIENT PRIVACY and INFORMATION SECURITY 2 PROTECTING PATIENT PRIVACY AND INFORMATION SECURITY PROTECTING PATIENT PRIVACY AND INFORMATION SECURITY 3 INTRODUCTION As an agency employee, student,
HIPAA Privacy & Security Training for Clinicians
HIPAA Privacy & Security Training for Clinicians Agenda This training will cover the following information: Overview of Privacy Rule and Security Rules Using and disclosing Protected Health Information
Privacy for Beginners: What Every Healthcare Worker Needs to Know About HIPAA and Privacy
Privacy for Beginners: What Every Healthcare Worker Needs to Know About HIPAA and Privacy What is HIPAA? Health Insurance Portability and Accountability Act (HIPAA) is broad federal legislation that includes
PRIVACY AND INFORMATION SECURITY INCIDENT REPORTING
PRIVACY AND INFORMATION SECURITY INCIDENT REPORTING PURPOSE The purpose of this policy is to describe the procedures by which Workforce members of UCLA Health System and David Geffen School of Medicine
HIPAA and Privacy Policy Training
HIPAA and Privacy Policy Training July 2015 1 This training addresses the requirements for maintaining the privacy of confidential information received from HFS and DHS (the Agencies). During this training
HIPAA Employee Compliance Program TRAINING MANUAL
HIPAA Employee Compliance Program TRAINING MANUAL Training Manual to Assist Employees in HIPAA Compliance January 2013 Program For HIPAA Compliance Plan Goal The purpose of this manual is to instruct our
HIPAA Education Level One For Volunteers & Observers
UK HealthCare HIPAA Education Page 1 September 1, 2009 HIPAA Education Level One For Volunteers & Observers ~ What does HIPAA stand for? H Health I Insurance P Portability A And Accountability A - Act
HIPAA Training for Hospice Staff and Volunteers
HIPAA Training for Hospice Staff and Volunteers Hospice Education Network Objectives Explain the purpose of the HIPAA privacy and security regulations Name three patient privacy rights Discuss what you
HIPAA 101: Privacy and Security Basics
HIPAA 101: Privacy and Security Basics Purpose This document provides important information about Kaiser Permanente policies and state and federal laws for protecting the privacy and security of individually
HIPAA PRIVACY AND SECURITY AWARENESS
HIPAA PRIVACY AND SECURITY AWARENESS Introduction The Health Insurance Portability and Accountability Act (known as HIPAA) was enacted by Congress in 1996. HIPAA serves three main purposes: To protect
SCDA and SCDA Member Benefits Group
SCDA and SCDA Member Benefits Group HIPAA Privacy Policy 1. PURPOSE The purpose of this policy is to protect personal health information (PHI) and other personally identifiable information for all individuals
HIPAA and Health Information Privacy and Security
HIPAA and Health Information Privacy and Security Revised 7/2014 What Is HIPAA? H Health I Insurance P Portability & A Accountability A - Act HIPAA Privacy and Security Rules were passed to protect patient
HIPAA Privacy & Security Rules
HIPAA Privacy & Security Rules HITECH Act Applicability If you are part of any of the HIPAA Affected Areas, this training is required under the IU HIPAA Privacy and Security Compliance Plan pursuant to
HIPAA and You The Basics
HIPAA and You The Basics The Purpose of HIPAA Privacy Rules 1. Provide strong federal protections for privacy rights Ensure individual trust in the privacy and security of his or her health information
Department of Health and Human Services Policy ADMN 004, Attachment A
WASHINGTON COUNTY Department of Health and Human Services Policy ADMN 004, Attachment A HHS Confidentiality Agreement Including HIPAA (Health Information Portability and Accessibility Act of 1996) OREGON
SELF-LEARNING MODULE (SLM) 2012 HIPAA Education Privacy Basics and Intermediate Modules
SELF-LEARNING MODULE (SLM) 2012 HIPAA Education Privacy Basics and Intermediate Modules Page 2 Index Privacy 101 and Intermediate Privacy Self-Learning Module 2012 HIPAA Education 3 Instructions Index
HFS DATA SECURITY TRAINING WITH TECHNOLOGY COMES RESPONSIBILITY
HFS DATA SECURITY TRAINING WITH TECHNOLOGY COMES RESPONSIBILITY Illinois Department of Healthcare and Family Services Training Outline: Training Goals What is the HIPAA Security Rule? What is the HFS Identity
HIPAA Self-Study Module Patient Privacy at Unity Health Care, Inc [email protected] 202-667-0016 - HIPAA Hotline
HIPAA Self-Study Module Patient Privacy at Unity Health Care, Inc [email protected] 202-667-0016 - HIPAA Hotline Self-Study Module Requirements Read all program slides and complete test. Complete
8.03 Health Insurance Portability and Accountability Act (HIPAA)
Human Resource/Miscellaneous Page 1 of 5 8.03 Health Insurance Portability and Accountability Act (HIPAA) Policy: It is the policy of Licking/Knox Goodwill Industries, Inc., to maintain the privacy of
Louisiana Department of Health and Hospitals Basic HIPAA Privacy Training: Policies and Procedures
Louisiana Department of Health and Hospitals Basic HIPAA Privacy Training: Policies and Procedures 1 What Is HIPAA? HIPAA (pronounced hippa) is a federal law. It s a set of rules and regulations that affect
HIPAA Privacy Overview
HIPAA Privacy Overview General HIPAA stands for a federal law called the Health Insurance Portability and Accountability Act. This law, among other purposes, was created to protect the privacy and security
HIPAA (Health Insurance Portability and Accountability Act) Awareness Training for Volunteers and Interns
HIPAA (Health Insurance Portability and Accountability Act) Awareness Training for Volunteers and Interns Boulder County Public Health Volunteer/Intern Services 3450 Broadway Boulder, CO 80304 1 Boulder
HIPAA PRIVACY AND SECURITY TRAINING P I E D M O N T COMMUNITY H EA LT H P L A N
HIPAA PRIVACY AND SECURITY TRAINING P I E D M O N T COMMUNITY H EA LT H P L A N 1 COURSE OVERVIEW This course is broken down into 4 modules: Module 1: HIPAA Omnibus Rule - What you need to know to remain
PHI- Protected Health Information
HIPAA Policy 2014 The Health Insurance Portability and Accountability Act is a federal law that protects the privacy and security of patients health information and grants certain rights to patients. Clarkson
How To Protect Your Health Information At Uni Of California
HIPAA 101 Privacy and Security Training Privacy and Security Training Privacy and Security for New UCSF Workforce Faculty Post Docs Residents / Fellows Staff Students Trainees Volunteers Contractors /
HIPAA TRAINING. A training course for Shiawassee County Community Mental Health Authority Employees
HIPAA TRAINING A training course for Shiawassee County Community Mental Health Authority Employees WHAT IS HIPAA? HIPAA is an acronym that stands for Health Insurance Portability and Accountability Act.
HIPAA Training for Staff and Volunteers
HIPAA Training for Staff and Volunteers Objectives Explain the purpose of the HIPAA privacy, security and breach notification regulations Name three patient privacy rights Discuss what you can do to help
HIPAA: Privacy/Info Security
HIPAA: Privacy/Info Security Jeff Jones HIPAA Privacy Officer HIPAA Information Security Officer KY Region What you should know Discussion Topics Protected Health Security Awareness Information(PHI) Disclosure
STANDARD ADMINISTRATIVE PROCEDURE
STANDARD ADMINISTRATIVE PROCEDURE 16.99.99.M0.26 Investigation and Response to Breach of Unsecured Protected Health Information (HITECH) Approved October 27, 2014 Next scheduled review: October 27, 2019
General Compliance. General Compliance Training. Course Overview. General Compliance. The intent of the Compliance Program is to:
General Compliance Training General Compliance Training i The University of Texas Medical Branch at Galveston Course Overview General Compliance The intent of the Compliance Program is to: Promote compliance
The Basics of HIPAA Privacy and Security and HITECH
The Basics of HIPAA Privacy and Security and HITECH Protecting Patient Privacy Disclaimer The content of this webinar is to introduce the principles associated with HIPAA and HITECH regulations and is
Target Audience: All Non-Management CHS Employees, Students, Volunteers, and Physicians
This self-directed learning module contains information all CHS employees are expected to know in order to protect our patients protected health information. Target Audience: All Non-Management CHS Employees,
Are you in the correct place?
1 Are you in the correct place? This is a training module on the HIPAA Privacy and Security rules. Did you access this module through Mlearning? If yes: Continue with this module If not: If you are associated
HIPAA Privacy and Security
HIPAA Privacy and Security Cindy Cummings, RHIT February, 2015 1 HIPAA Privacy and Security The regulation is designed to safeguard Protected Health Information referred to PHI AND electronic Protected
COMPLIANCE ALERT 10-12
HAWAII HEALTH SYSTEMS C O R P O R A T I O N "Touching Lives Every Day COMPLIANCE ALERT 10-12 HIPAA Expansion under the American Recovery and Reinvestment Act of 2009 The American Recovery and Reinvestment
HEALTH INSURANCE PORTABILITY & ACCOUNTABILITY ACT OF 1996 HIPAA
TRAINING MANUAL HEALTH INSURANCE PORTABILITY & ACCOUNTABILITY ACT OF 1996 HIPAA Table of Contents INTRODUCTION 3 What is HIPAA? Privacy Security Transactions and Code Sets What is covered ADMINISTRATIVE
HIPAA RULES AND REGULATIONS
HIPAA RULES AND REGULATIONS INTRODUCTION Everyone who works in or around health care has heard about the HIPAA, the Health Insurance Portability and Accountability Act. And certainly, everyone who is in
Patient Privacy and HIPAA/HITECH
Patient Privacy and HIPAA/HITECH What is HIPAA? Health Insurance Portability and Accountability Act of 1996 Implemented in 2003 Title II Administrative Simplification It s a federal law HIPAA is mandatory,
HIPAA PRIVACY POLICIES & PROCEDURES. Department of Behavioral Health and Developmental Services DBHHDS GENERAL AWARENESS TRAINING
HIPAA PRIVACY POLICIES & PROCEDURES Department of Behavioral Health and Developmental Services DBHHDS GENERAL AWARENESS TRAINING March 2012 HIPAA Humor (North Dakota Dept of Health) 2 HIPAA-Ectomy - the
HIPAA Orientation. Health Insurance Portability and Accountability Act
HIPAA Orientation Health Insurance Portability and Accountability Act HIPAA Federal legislation enacted in 1996 to improve the efficiency and effectiveness of electronic information transfers used in the
HIPAA Information Security Overview
HIPAA Information Security Overview Security Overview HIPAA Security Regulations establish safeguards for protected health information (PHI) in electronic format. The security rules apply to PHI that is
HIPAA Security Training Manual
HIPAA Security Training Manual The final HIPAA Security Rule for Montrose Memorial Hospital went into effect in February 2005. The Security Rule includes 3 categories of compliance; Administrative Safeguards,
12/19/2014. HIPAA More Important Than You Realize. Administrative Simplification Privacy Rule Security Rule
HIPAA More Important Than You Realize J. Ira Bedenbaugh Consulting Shareholder February 20, 2015 This material was used by Elliott Davis Decosimo during an oral presentation; it is not a complete record
MIT s Information Security Program for Protecting Personal Information Requiring Notification. (Revision date: 2/26/10)
MIT s Information Security Program for Protecting Personal Information Requiring Notification (Revision date: 2/26/10) Table of Contents 1. Program Summary... 3 2. Definitions... 4 2.1 Identity Theft...
HIPAA: Practical Application from a Non-Lawyer s. Jim Kelly HIPAA Privacy Officer (Ret.) Chesterfield Fire & EMS
HIPAA: Practical Application from a Non-Lawyer s Perspective Jim Kelly HIPAA Privacy Officer (Ret.) Chesterfield Fire & EMS Disclaimer: I am not a lawyer! Although I assume everyone will think the information
Annual HIPAA Security & Information Security Competency
Annual HIPAA Security & Information Security Competency 1 General Information FISO- What is a FISO? Facility Information Security Officer Responsible for the physical protection and recovery of all electronic
Privacy & Security Survival Training. Information
Privacy & Security Survival Training Protecting Patient Information June 1, 2013 INTRODUCTION A component of the DHS Compliance Program requires you to be trained on the privacy and confidentiality laws
HIPAA Security Education. Updated May 2016
HIPAA Security Education Updated May 2016 Course Objectives v This computer-based learning course covers the HIPAA, HITECH, and MSHA Privacy and Security Program which includes relevant Information Technology(IT)
Oregon Prescription Drug Monitoring Program. Terms & Conditions of Account Use Agreement. Statutory Authority:
Oregon Prescription Drug Monitoring Program Terms & Conditions of Account Use Agreement Statutory Authority: The Oregon Health Authority (OHA) was given authority under ORS 431.962 to establish and maintain
Who Should Know This Policy 2 Definitions 2 Contacts 3 Procedures 3 Forms 5 Related Documents 5 Revision History 5 FAQs 5
Information Security Policy Type: Administrative Responsible Office: Office of Technology Services Initial Policy Approved: 09/30/2009 Current Revision Approved: 08/10/2015 Policy Statement and Purpose
HIPAA Compliance for Students
HIPAA Compliance for Students The Health Insurance Portability and Accountability Act (HIPAA) was passed in 1996 by the United States Congress. It s intent was to help people obtain health insurance benefits
HIPAA AND COMPLIANCE
HIPAA AND COMPLIANCE LEARNING MODULE #2 For Clinical Students and Instructors HWCA- South Central- Southwest Member Clinical Sites HEALTH CARE WORKFORCE ALLIANCE Revised August 2011 Objectives 2 At the
HIPAA Basic Training for Privacy & Information Security
HIPAA Basic Training for Privacy & Information Security Vanderbilt University Medical Center VUMC HIPAA Website: www.mc.vanderbilt.edu/hipaa Vanderbilt Credo We treat others as we wish to be treated Vanderbilt
Compliance HIPAA Training. Steve M. McCarty, Esq. General Counsel Sound Physicians
Compliance HIPAA Training Steve M. McCarty, Esq. General Counsel Sound Physicians 1 Overview of HIPAA HIPAA contains provisions that address: The privacy of protected health information or PHI The security
The Impact of HIPAA and HITECH
The Health Insurance Portability & Accountability Act (HIPAA), enacted 8/21/96, was created to protect the use, storage and transmission of patients healthcare information. This protects all forms of patients
2. Begin gathering necessary documents for student (refer to Record Acknowledgement Form)
Dear Colleague, This notice is to share some recent changes we ve made with our Student Onboarding Process. Effective October 1, 2014, our onboarding process is migrating from Public Safety to our Human
Standard Operating Procedure Information Security Compliance Requirements under the cabig Program
Page 1 of 9 Pages Standard Operating Procedure Information Security Compliance Requirements under the cabig Program This cover sheet controls the layout and components of the entire document. Issued Date:
Clinician s Guide to HIPAA Privacy. I. Introduction What is HIPAA? Health Information Privacy Protected Health Information
Clinician s Guide to HIPAA Privacy I. Introduction What is HIPAA? Health Information Privacy Protected Health Information II. HIPAA s Impact On Clinical Practice, Treatment, Referrals And Payment How is
GLENN COUNTY HEALTH AND HUMAN SERVICES AGENCY. HIPAA Policies and Procedures 06/30/2014
GLENN COUNTY HEALTH AND HUMAN SERVICES AGENCY HIPAA Policies and Procedures 06/30/2014 Glenn County Health and Human Services Agency HIPAA Policies and Procedures TABLE OF CONTENTS HIPAA Policy Number
Privacy Compliance Health Occupations Students
Privacy Compliance Health Occupations Students Health Occupations Students The information in this power point is the same information provided to new SCHS caregivers at their orientation. We cannot stress
HIPAA. New Breach Notification Risk Assessment and Sanctions Policy. Incident Management Policy. Focus on: For breaches affecting 1 3 individuals
HIPAA New Breach Notification Risk Assessment and Sanctions Policy Incident Management Policy For breaches affecting 1 3 individuals +25 individuals + 500 individuals Focus on: analysis documentation PHI
