A USER S GUIDE TO THE RASCAL HIPAA MODULE
|
|
|
- Arleen Morton
- 10 years ago
- Views:
Transcription
1 A USER S GUIDE TO THE RASCAL HIPAA MODULE Version: 2.0 Revised: September 2011 Office for HIPAA Compliance 1 P a g e R A S C A L H I P A A G u i d e
2 TABLE OF CONTENTS SUGGESTED USE OF THE MANUAL...3 INTRODUCTION...4 HIPAA FORMS USED AT CUMC 5 FORM A HIPAA Clinical Research Authorization..5 FORM B HIPAA Application for a Waiver of Authorization..5 FORM C Request for Recruitment Waiver of Authorization...5 FORM D Investigator s Certification for Reviews Preparatory to Research...6 FORM E Investigator s Certification for Research with Decedent Information..6 FORM F Data Use Agreement for Disclosure of a Limited Data Set..6 FORM G Investigator Certification for Research with De-Identified Data...7 USING THE RASCAL HIPAA MODULE 7 Select Form Template...9 Which form to choose?..10 Form Identifier (not displayed on form).10 Authorize Access: Answer Questions:...11 SUBMITTING THE FORM (S)...15 Stand Alone Forms.15 Non-Stand Alone (Attached) Forms...16 Forms for new protocols...16 Forms for existing protocols.17 MODIFYING FORMS...18 Add/Edit Form Text...18 Layout...20 *This manual was originally developed by John Ennever, M.D., Ph.D, Medical Director; Clinical Trials A special thanks to John for all of his work in the development of the Manual. 2 P a g e R A S C A L H I P A A G u i d e
3 A new module in the RASCAL system was introduced on November 30, This manual describes the use of this functionality the ability to electronically create and submit HIPAA Forms for research protocols. In April 2008 the IRB assumed primary responsibility for the review of IRB submitted protocols to evaluate the HIPAA requirements for research protocols with pre-review by the Office of HIPAA Compliance. When a new protocol is submitted for the first time and there are no HIPAA forms attached (described within), a dialogue box pops up in RASCAL with a warning that all IRB protocols should have at least one HIPAA form attached. However, a HIPAA Form is not a requirement for submitting a protocol. In addition, when you click to submit your protocol (initial submission, renewal or modification); the RASCAL system does a check to make sure certain elements are included. If any of the required elements are missing, RASCAL will give you a prompt that states at the top: You cannot submit protocol IRB-AAABXXXX until the following information is completed: This is followed by a list of missing elements, all of which are REQUIRED before the system lets you submit the protocol. If you choose not to use the HIPAA module for example in a renewal or modification for a study for which you have an already approved HIPAA form, this prompt will remind users to verify that the correct HIPAA form is attached: Investigators are required to use this system to generate and submit HIPAA forms even if you have an already approved HIPAA form for your study. Changes to protocols may require additional HIPAA forms. SUGGESTED USE OF THE MANUAL The manual is designed to be used as an electronic document. There are imbedded links throughout that allow you to quickly jump to a referenced section. These links are present everywhere in the text where see page and see Figure is followed by a number. The cursor will change from an open hand to a pointing finger when you are on a link. By clicking your left mouse button you will be taken to the referenced section. You can quickly move back to your original position by using the combination of ALT key and the left arrow ( ) key. (These links only work within this document, so references to the RASCAL IRB manual are not linked). Questions about this manual or HIPAA Compliance for research protocols can be directed to the Office of HIPAA Compliance at [email protected] or (212) P a g e R A S C A L H I P A A G u i d e
4 INTRODUCTION In 1996, Congress passed a law called the Health Insurance Portability and Accountability Act (HIPAA). One of the major purposes of this legislation was to render health insurance more portable by protecting health insurance coverage for workers and their families when they change or lose their jobs. A part of this law also included a mandate to the Department of Health and Human Services (HHS) to develop national standards for electronic healthcare transactions. The goal of the part of HIPAA was to standardize the way health care entities speak electronically to Medicare and Medicaid across the U.S. a necessary first step in moving towards a fully electronic medical record. At the same time, Congress recognized that advances in electronic technology could erode the privacy health information. Consequently, Congress incorporated into HIPAA provisions a mandate for the adoption of Federal privacy protections for individually identifiable health information. In response to this mandate, HHS published a final regulation in the form of the Privacy Rule with an effective date of April This Privacy Rule set national standards for the protection of health information, as applied to the three types of covered entities : health plans, health care clearinghouses, and health care providers who conduct certain health care transactions electronically. By the compliance date of April 14, 2003, covered entities were required to implement standards to protect and guard against the misuse of individually identifiable health information or protected health information (PHI). Failure to comply with these standards may, under certain circumstances, trigger the imposition of civil or criminal penalties. HIPAA regulations apply to research at Columbia University Medical Center (CUMC) because faculty submit healthcare claims electronically and, as the employing entity, CUMC is thereby considered the covered entity required to protect PHI from unauthorized use or disclosure. Because virtually all clinical research involves the collection and use of PHI, the use and disclosure of this information falls under the HIPAA regulations. Even to the extent patient information is de-identified, HIPAA applies and requires certification that the de-identification is done properly (further discussed below). HIPAA does not forbid the use of PHI in clinical studies, but does require subjects to be asked for their explicit authorization for its use. Therefore, in all clinical studies where identified health information will be used to conduct research, a research subject will have to sign an authorization permitting such use and any further disclosure (e.g., to the Sponsor) of their PHI. This authorization is granted by use of a form that the subject reads, understands and then signs it is titled Form A Clinical Research Authorization. The administrative responsibility for assuring compliance with the HIPAA regulations for research comes under the function of the IRB. The Office of HIPAA Compliance provides guidance and review of the HIPAA elements of a research protocol. The HIPAA module within RASCAL allows you to generate the appropriate HIPAA authorization form and submit it along with your RASCAL IRB submission. Essentially all protocols submitted to the IRB should have at least one (and many will have more than one) HIPAA form. 4 P a g e R A S C A L H I P A A G u i d e
5 HIPAA FORMS USED FOR RESEARCH AT CUMC At CUMC there are 7 different HIPAA Research forms, Form A through Form G. There is one authorization (Form A), two waivers (Form B and C), three certifications (Forms D, E, and G) and one agreement (Form F). FORM A HIPAA Research Authorization If the researcher is obtaining written informed consent, you will almost always need a HIPAA Form A. This is the only HIPAA form that is signed by study participants. It provides permission from the study participant to their providers and to the investigator to disclose and use PHI for research purposes. This form is available in the HIPAA module in two versions, one for research that has an external sponsor who will be receiving PHI, labeled: Form A: Clinical Research Authorization Sponsored. The other is for studies with no external sponsored labeled: Form A: Clinical Research Authorization Non-Sponsored. The term sponsor refers to the entity sponsoring the study the obvious sponsors would be the NIH, CDC or a pharmaceutical company. A less obvious sponsor could be a colleague at another institution who initiated a multi-centered study in which you are participating. In this case, the colleague is the sponsor (even if he/she is not giving you any money to do the study). In addition, because these two Form A s are signed by participants, the HIPAA module has both English and Spanish versions. FORM B Application for a Waiver of Authorization. This is the form you need to submit if you are doing a type of research in which you will not have any direct contact with the study subject, for example, many types of medical records research. You need this waiver approved by the IRB before you can have access to medical records that are not part of your own practice. This applies to both the paper and electronic medical records. Studies that use a Form B do not have a form A, and vice versa. FORM C Request for Recruitment Waiver of Authorization. This is similar to, but very different from, Form B. It is a request to use a patients contact information from medical records that were obtained under Form D to directly contact potential subjects. You are asking the IRB to give you permission to directly approach the potential subjects that you identified under Form D without having their physician serve as an intermediary. The IRB will usually not allow such a recruitment strategy and generally requires recruitment to be done only after the subject has had an opportunity to discuss the research with their provider with whom they have a treatment relationship. Permission for a recruitment waiver is granted by the IRB only under rare occasions e.g., public health research using PHI from patients with many different providers who cannot all be contacted to speak to 5 P a g e R A S C A L H I P A A G u i d e
6 patients about the study. Before you submit one of these forms the researchers should discuss the situation with the Privacy Officer at FORM D Investigator s Certification for Reviews Preparatory to Research. This form has two distinct purposes: 1. To determine whether or not there are sufficient potential subjects for a research project you are developing. For example, if you are thinking about a study of men between the age of 45 and 50 who have had a stroke and have anemia and a creatinine above 4, you could query the Clinical Data Warehouse (see: to determine how many subjects seen at the medical center in the last year meet these criteria. Before you can do this database search, you would have to file a Form D and have it approved by the IRB. In this case, where you have not yet developed an IRB protocol, you would use the Stand Alone version. 2. After you have developed a protocol, you can use the same database tool to help you identify potential subjects for study. In this case you would use the Form D that is not stand alone but is linked to a protocol. How is this different from Form C? The answer is that you are not going to use the PHI you obtained through this process to directly contact the potential subject. Rather, what you would do is contact the potential subject s physician and ask him/her to make the initial contact with his/her patient about the study. Even if you identify potential subjects the old fashioned way, by going on the inpatient floors and reviewing charts or talking to treating physicians, you need to have filed a HIPAA Form D in order to be compliant with the Federal regulations. A clinical study for which you are requesting use of PHI to identify study subjects would have both a HIPAA Form D and a Form A. FORM E Investigator Certification for Research with Decedent Information. Decedent is a term used principally in law. It means people who are no longer alive. HIPAA protections extend to the PHI of people who have died. HIPAA permits research using decedent PHI if the investigator files a certification (Form E). This form is not linked to a human subject protocol (the IRB does not regulate research on non-living people), thus the designation stand alone. This form does not apply for subjects from whom you obtained a signed Form A (when they entered your study) and they subsequently died. The disclosure of their PHI for the study falls under the original authorization. FORM F Data Use Agreement for Disclosure of a Limited Data Set. This form is used if you need to share data with an outside group for some collaborative research purpose, but the information cannot be totally de-identified, the limited data use agreement would permit 6 P a g e R A S C A L H I P A A G u i d e
7 disclosure of limited demographics and dates if an agreement between CUMC and the other entity was put in place. Review by the Privacy Officer is required along with signatures by the Principal Investigator, the recipient of the limited data set and Research Administration (SPA). FORM G Investigator Certification for Research with De-Identified Data. This is a form where the researcher attests that the data collected for your research is completely deidentified. The form contains the list of things you cannot have in your data set and still have it qualify as de-identified. In other words, if any of the items on this list are in your data set, you are not using deidentified data (according to HIPAA). This form may be used in medical record research where you are generally conducting retrospective reviews that don t require the patient s identity to do the research. This form may also be used in addition to questionnaires or surveys where PHI is not collected. It is extremely helpful exception since it removes this type of research from the restrictions of HIPAA. This form cannot be used when a code or link back to the source where the records is maintained. This form maybe used for International research where direct identifiers will not be brought back to CUMC. USING THE RASCAL HIPAA MODULE LIST OF FIGURES Figure 1. The Rascal Home Page. 8 Figure 2. HIPAA Page.8 Figure 3. HIPAA Form General Information page (prior to hitting save button)...9 Figure 4. HIPAA Form General Information page. (after hitting Save button).11 Figure 5. HIPAA Form Attachment Screen (in Human Subjects Module)...16 Figure 6. Protocol Overview Page...17 Figure 7. Attach HIPAA page after IRB submission...17 Figure 8. HIPAA Form Text page...18 Figure 9. Text Edit box..29 Figure 10. HIPAA Form Layout page.21 The structure of the HIPAA module within RASCAL is analogous to the Consent Form Module. That is, a document is produced in the HIPAA module and then attached to the appropriate RASCAL protocol, prior to submission. This process allows certain information (e.g., the study title and the Principal Investigator s name) to be pulled from the Protocol and automatically entered into the HIPAA form. The HIPAA module is structured in a way that is parallel to that used in the Consent Form module. You begin from the RASCAL Home page (Figure 1). 7 P a g e R A S C A L H I P A A G u i d e
8 Figure 1. The Rascal Home Page. From the home page, you select HIPAA Forms and after logging in you are brought to the main HIPAA page. Figure 2. HIPAA Page From this menu, select Create HIPAA Authorization / Waiver Form. This brings up the HIPAA Form General Information Page shown in Figure 3. 8 P a g e R A S C A L H I P A A G u i d e
9 Figure 3. HIPAA Form General Information page (prior to hitting save button). Select Form Template From this drop-down menu you choose which form you want to create. The types of forms are explained in detailed starting on page 5. The choices are: Form A: Clinical Research Authorization Non-Sponsored (English version) Form A: Clinical Research Authorization Non-Sponsored (Spanish version) Form A: Clinical Research Authorization Sponsored (English version) Form A: Clinical Research Authorization Sponsored (Spanish version) Form B: Application for Waiver of Authorization Form C: Request for Recruitment Waiver of Authorization Form D: Investigator Certification for Reviews Preparatory to Research Form D: Investigator Certification for Reviews Preparatory to Research (stand alone) Form E: Investigator Certification for Research with Decedent Information Form E: Investigator Certification for Research with Decedent Information (stand alone) Form F: Data Use Agreement for Disclosure of a Limited Data Set Form G: Investigator Certification for Research with De-Identified Data 9 P a g e R A S C A L H I P A A G u i d e
10 Selection of the correct HIPAA Form: Most protocols at the Medical Center will have at least one HIPAA form attached. Many will have both English and Spanish versions of a Clinical Research Authorization. You will not have both a Non- Sponsored and Sponsored version for the same protocol. If you have a Form A, and want to use any clinical information (Protected Health Information or PHI) that is not from your own practice in order to recruit subjects, you will also need to create a Form D. If you are thinking about identifying potential subjects from a search of PHI (authorized by form D) and directly contacting the potential subject without going through the potential subject s healthcare provider, you will need approval of a Form C (as well as approval by the IRB for this recruitment strategy). In this scenario, you would have one or two Form A s (English and Spanish), one Form D and one Form C. Studies for which Form B is used do not usually have additional forms. These are typically medical records research. These are studies in which you are not going to have any direct contact with any subjects; therefore you have no need for any Form A. Similarly, Forms F and G are usually submitted with a protocol without any additional HIPAA forms Form Identifier (not displayed on form) You must enter a name in the text box. It is important to give this form a name which has meaning to you so that you know which form is which. The reason that you need a meaningful name as the Form Identifier is so that when you need to Attach the form to a Rascal IRB submission you can quickly find it among your myriad of HIPAA Forms. The type of Form (e.g., Form A sponsored English, Form B, etc) is automatically added. At the very least, you should include the name of (or abbreviation for) the study to which you are going to attach this HIPAA form. After entering the name you must hit the SAVE button. Hitting the save button, brings up the next screen (Figure 4) 10 P a g e R A S C A L H I P A A G u i d e
11 Figure 4. HIPAA Form General Information page. (after hitting save button) As with both the Human Subjects and the Consent Form modules, this initial saving brings up additional menu items on the left side of the page. It also gives your form a unique number, with the prefix HIP followed by the familiar RASCAL numbering system. The menu items on the left include: Authorize Access: This is the same as with the consent form (see Rascal IRB Manual) where you add people using their UNI and give them edit or view only privileges. Answer Questions: This is a unique feature of the HIPAA module. Depending upon the particular form (see below) there may be one or more items to fill in to complete the form. All of the forms with the exception of the Form G have questions that need to be answered. The answers to these questions will be incorporated into the HIPAA forms that RASCAL will generate. The questions are identical to the questions that needed to be answered in the HIPAA forms that were in use in the paper-based system. The only difference is now they are entered into RASCAL. Form A questions: The Form A for sponsored studies has two questions to fill out: 1. The name of the Sponsor of the research 11 P a g e R A S C A L H I P A A G u i d e
12 Enter the name of the Sponsor of the study, e.g., Pfizer, National Heart, Lung and Blood Institute. 2. List of any medical history of a potentially sensitive matter that you will be collecting and potentially sharing with others. The instructions state: If your study will be collecting medical history that may include sensitive information, such as HIV status, history of drug or alcohol abuse, list these items in this box. If none, enter Not Applicable. in the box. The Form A for non-sponsored research has only the second question about sensitive information. Form B questions: Please note that next to each question there is a text box where your answers should be added and remember to click on the save button after each response. In addition this page also has a blue and white (?) next to each question with sample text. 1. If applicable describe the plan to protect subject identifiers from improper use and disclosure. For example: we will maintain appropriate security measures for the subject identifiers, including: (a) storing physical files in a locked cabinet to which only study staff can access with a key or combination lock; and / or (b) maintaining a secure database to which only the PI or key study staff can access with a password.) Alternatively: The data in this study will contain no identifiers. 2. If applicable describe the plan to destroy the subject identifiers or justify their retention. For example, the identifiers are listed on a sheet that matches the identifier with the patient name. This sheet will be destroyed at the conclusion of the research. Alternatively: The identifiers will not be destroyed at the earliest opportunity because there is a health justification for retaining the identifier. The lab test may produce information that should be reported to the patient. Alternatively: The data in this study will contain no identifiers. 3. Describe your plan regarding reuse of Protected Health Information. For example, only study staff will have access to the PHI. Appropriate security measures will be maintained for the subject identifiers, including storing physical files in a locked cabinet and / or maintaining a secure database to which only the PI or key study staff can access with a password. Alternatively: This research study may require reporting of PHI to the following public health authorities, e.g., New York State Department of Health, 4. Explain why your research could not practicably be conducted with the waiver or alteration. 12 P a g e R A S C A L H I P A A G u i d e
13 For example, the number of charts may be too numerous this retrospective medical chart research involves reviewing 2000 charts of patients some of whom were seen many years ago. 5. Explain why your research could not practicably be conducted without access to and use of Protected Health Information. For example, the study requires the use of identifiable patient information in order to be a scientifically valid study. Form C questions: 1. Describe the nature and scope of the patient information to which access is sought. This should be as complete as is feasible. 2a. Why would it be impractical to rely on Columbia University, or on a Columbia University-affiliated clinician with whom the potential participants have a treatment relationship, to contact the potential participants on your behalf? This is the key argument you need to make as to why you need this waiver: that you cannot practically contact a health care provider that has a treatment relationship with the patient in order to have him / her either talk to the subject or give you permission to contact the subject. 2b. Describe your plan to safeguard the patient information from improper use and disclosure while it is in your possession. See Form B, item number1. 2c. Describe your plan to destroy or return the patient information at the conclusion of the record review / recruitment activity. See Form B, item number As a condition of accessing patient information for the purpose(s) indicated in (1), I agree not to use or to disclose to a third party any of the information for any other purpose. This is answered by checking the box to affirm this statement. Form D questions: 1. Purpose(s) for which access to records maintained by or on behalf of Columbia University Medical Center is (are) sought (check all that apply): The choices are: Access sought for Protocol Development and / or Access sought for Identification of potential Research Participants You check one or both. 2. Describe the nature and scope of the patient information to which access is sought. 13 P a g e R A S C A L H I P A A G u i d e
14 If this form is to be attached to a Protocol (in other words, not the stand alone version, an example of what you could enter here is: The hospital charts on the Medicine floors of the Milstein Hospital will be reviewed to determine whether or not a patient meets the eligibility requirements of this study Instead of hospital charts, you could be reviewing the logs in the Emergency Department, or querying the Clinical Data Warehouse. Form D Stand Alone If you are submitting a stand alone version (not attached to a protocol), then you need to describe as completely as possible, the nature and scope of information to which you are requesting access. (You can t refer to a protocol, because there isn t one, yet) In addition the stand alone version of Form D requires that you enter the Principal Investigator s name and the title of the study. (In the non stand alone version, this information is pulled from the Rascal IRB protocol when it is attached) and then submit form for approval. Form E questions: Describe the nature and scope of the deceased patients information to which access is sought. Form F questions: Please note that you must answer the two questions on the form and click on the save button after each response. The HIPAA Form should be printed and forwarded to the Office of HIPAA Compliance for review and approval. 1. Recipient 14 P a g e R A S C A L H I P A A G u i d e
15 This is the name of the person, or organization with whom you are proposing to share a limited data set. 2. Effective Date This is the start date for this agreement Form G questions: This is even easier than Form F, there are no questions. This is the end of the answer question section. The item below are found on the left side of the HIPAA Module after the form has been created. View Form: This generates a pdf version of your HIPAA form. For all the forms with the exception of the stand alone forms, when you view the form, there will be three items that remain unfilled on top of form until you attach this form to a RASCAL protocol. Protocol Number, Name of the Study, and Principal Investigator. All three are taken from the RASCAL protocol to which the form is attached and entered at the top of the form. In addition, the name of the Principal Investigator is added in the first paragraph in place of [Principal Investigator]. The next two menu items (Add / Edit Form Text and Form Layout) are only necessary if you have a sponsor that requires specific language in the HIPAA authorization form that is not included in the RASCAL templates. Add / Edit Form Text: Changes to the form(s) will have to be reviewed and approved by the IRB / HIPAA Compliance. STOP: YOUR FORM IS NOW DONE Once you have filled in the required questions for your form, you are done. RASCAL will automatically generate the final HIPAA form(s). The next step is submitting the form. How this is done is described in the next section. SUBMITTING THE FORM(S) Stand Alone Form Form D: Investigator Certification for Reviews Preparatory to Research (stand alone), and Form E: Investigator Certification for Research with Decedent Information (stand alone) These two forms have a menu item submit form in the left hand menu. The other forms which require being attached to a RASCAL Protocol do not have this menu item (see figure 4). To submit these stand alone forms to the Privacy Office simply click the Submit menu item in the left hand menu. 15 P a g e R A S C A L H I P A A G u i d e
16 Non-Stand Alone (Attached) Forms The other forms are all associated with a specific IRB protocol and need to be linked ( attached ) to the protocol in order to submit them. The attaching of the form to a Rascal IRB Protocol is done within the Human Subjects module. How this is done depends on whether or not your protocol has been submitted to the IRB yet. Forms for new protocols For new protocols that have not yet been submitted to the IRB, the HIPAA forms are attached using the Attach HIPAA forms menu item on the Human Subjects module, (between Attach Hazmats and Attach Documents). See Figure 5 if your protocol has already been submitted to the IRB, even if it is still pending or has been returned to you, you need to follow the directions in the next section, Forms for Existing Protocols, see page below. Clicking on this menu item brings up the following screen: Figure 5. HIPAA Form Attachment Screen (in Human Subjects Module). By clicking on the blue attach button (2 nd column from the left), all of your unattached HIPAA forms of the particular type you selected are displayed. You select the one you want to be attached to this protocol and you are done with that form. RASCAL TIP Here is where a meaningful (at least to you) form identifier, is extremely useful. A meaningful identifier will help you when you are at the point of attaching the Form to the protocol, to select the correct form. When the RASCAL IRB protocol is sent to the IRB, the attached HIPAA forms are routed to the Privacy Office. 16 P a g e R A S C A L H I P A A G u i d e
17 Forms for Existing Protocols If you need to add a HIPAA form after you have initially submitted the IRB protocol, you go to the Protocol Overview Page in the Human Subjects section (Figure 6). NOTE: It doesn t matter whether the protocol is approved or not, you submit HIPAA forms using this method once you have submitted the IRB protocol to the IRB for the first time. Figure 6. Protocol Overview Page. The last menu in the center panel is Manage HIPAA Forms. This brings up a page (Figure 7) that is very similar to that shown in Figure 5, but has a new functionality that allows you to add new or remove already attached HIPAA forms. Figure 7. Attach HIPAA page after IRB submission. 17 P a g e R A S C A L H I P A A G u i d e
18 Using this page, you attach the new HIPAA form to your already submitted (or approved or returned) IRB protocol. As shown in Figure 7, the Form A has been approved, and the Form D has just been added. If you needed to change a approved form A, you could Detach it and Attach a new (revised) Form A. Pressing the button labeled Submit HIPAA Forms sends your newly attached forms to the Privacy Office. Once the form is approved by the Privacy Office, the status will change to approved a watermark stating: Privacy Office Approved MM DD YYYY will be added to the bottom of each page. The approved HIPAA form(s) can be printed from the Rascal along with the approved consent forms. Modifying HIPAA Forms Add/Edit Form Text Selecting this menu from the left hand menu in Figure 4, bring up the following page (for a Form A for Sponsored Research): Figure 8. HIPAA Form Text page. 18 P a g e R A S C A L H I P A A G u i d e
19 Each block of text or question in each form has a unique ID. This number has no significance; the order in which the lines appear in the form is set in the Form Layout section (see below). Some lines have a parent ID to which they are associated. These children move when their parent is moved. A parent can have zero, one or more children. (These are all single parent households). Some lines can be edited or deleted and others cannot. Only those lines that have a trash can icon in the right hand column can be deleted (obviously). In addition, only those with a trash can icon can be edited (less obviously). As indicated in the menu item you can add new text or you can edit existing text. The general help states: Added items will display in a table on this page. To edit or view an existing item, click the blue button in the Edit column of the item. If you wish to delete the item, click on the trash can icon (if the icon is present) for that item. The template from which this form was created determines whether paragraphs or questions can be edited or deleted. As you add or edit items you may display the form in PDF format at any time by clicking the View Form link on the left. The order of the items on the page may be changed on the Form Layout page. Again, only those items that have a trash can icon associated with them can be edited or deleted. All the other items are unchangeable and cannot be deleted. Selecting one of the editable items brings up the text box shown in the next figure. Figure 9. Text Edit box. 19 P a g e R A S C A L H I P A A G u i d e
20 If you select Add Text from the top menu in Figure 8, you get the same text box as shown in Figure 9, however it is blank. The RASCAL instructions are quite good but somewhat technical. Parent Item s ID if this text or question is to be indented, bulleted and subordinate to another item, enter that item s ID here. You can find the ID of the item to which the text is to be subordinated in the first column of the table displaying the text and questions. Item Text enter here the text as you want it to appear on the form. If this is an indented, subordinate item it will automatically be bulleted unless you begin the text with some other kind of enumerator such as a., 1 ), 1, etc. Rascal will automatically recognize the combination of any non-alphanumeric character (other than a comma or an asterisk) followed by the first space in the string as the terminator of an enumerator. The phrase terminator of an enumerator could be the next Schwarzenegger movie. Any items that you add, you can also edit or delete. LAYOUT The finale ordering of the text is done in the Layout menu. This is a functionality that is analogous to, but somewhat more advanced than, that found in the Layout function found in the Consent form builder (see RASCAL IRB manual). 20 P a g e R A S C A L H I P A A G u i d e
21 Figure 10. HIPAA Form Layout page. This is where the final ordering of form is established. Here the relationship between parent and child is more apparent. If you put a 0 in the sequence (first column) the item will not appear on the final form. (In this example, the two blank lines are not included). Because certain elements are required (e.g., you could not delete them in the Add/Edit Text function), you cannot assign them a 0 in this functionality. If at all possible, you should use the HIPAA templates as provided. If you are required (for example by the Sponsor) to add certain language to the HIPAA form, you will not be able to use the provided Spanish language version of the Form. This will need to be translated as well. Karen Pagliaro-Meyer Privacy Officer, Office of HIPAA Compliance Columbia University Medical Center Tel: (212) Fax: (212) [email protected] [email protected] 21 P a g e R A S C A L H I P A A G u i d e
Health Insurance Portability & Accountability Act (HIPAA) Compliance Application
Health Insurance Portability & Accountability Act (HIPAA) Compliance Application IRB Office 101 - Altru Psychiatry Center 860 S. Columbia Rd, Grand Forks, North Dakota 58201 Phone: (701) 780-6161 PROJECT
HIPAA COMPLIANCE. What is HIPAA?
HIPAA COMPLIANCE What is HIPAA? The Health Insurance Portability and Accountability Act (HIPAA) also known as the Privacy Rule specifies the conditions under which protected health information may be used
HIPAA COMPLIANCE INFORMATION. HIPAA Policy
HIPAA COMPLIANCE INFORMATION HIPAA Policy Use of Protected Health Information for Research Policy University of North Texas Health Science Center at Fort Worth Applicability: All University of North Texas
Winthrop-University Hospital
Winthrop-University Hospital Use of Patient Information in the Conduct of Research Activities In accordance with 45 CFR 164.512(i), 164.512(a-c) and in connection with the implementation of the HIPAA Compliance
HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT (HIPAA): FACT SHEET FOR NEUROPSYCHOLOGISTS Division 40, American Psychological Association
HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT (HIPAA): FACT SHEET FOR NEUROPSYCHOLOGISTS Division 40, American Psychological Association DISCLAIMER This general information fact sheet is made available
IRB Month Investigator Meeting April 2014
April 2014 AUDITS TRENDS EMR COMPLIANCE PRACTICES EMR FEDERAL REGULATIONS MONITORING REGULATORY SECURITY THREATS ACADEMI CINA BREACHES REVIEW COMPUTING MOBILE CLOUD HIPAA CENTER OPERATION S RESEARCH C
What is Covered by HIPAA at VCU?
What is Covered by HIPAA at VCU? The Privacy Rule was designed to protect private health information from incidental disclosures. The regulations specifically apply to health care providers, health plans,
HIPAA-Compliant Research Access to PHI
HIPAA-Compliant Research Access to PHI HIPAA permits the access, disclosure and use of PHI from a HIPAA Covered Entity s or HIPAA Covered Unit s treatment, payment or health care operations records for
What is Covered under the Privacy Rule? Protected Health Information (PHI)
HIPAA & RESEARCH What is Covered under the Privacy Rule? Protected Health Information (PHI) Health information + Identifier = PHI Transmitted or maintained in any form (paper, electronic, forms, web-based,
HIPAA Basics for Clinical Research
HIPAA Basics for Clinical Research Audio options: Built-in audio on your computer OR Separate audio dial-in: 415-930-5229 Toll-free: 1-877-309-2074 Access Code: 960-353-248 Audio PIN: Shown after joining
Guidance for Industry. IRB Review of Stand-Alone HIPAA Authorizations Under FDA Regulations
Guidance for Industry IRB Review of Stand-Alone HIPAA Authorizations Under FDA Regulations FINAL This guidance is being distributed GUIDANCE for immediate implementation. FDA is issuing this guidance for
Health Insurance Portability and Accountability Policy 1.8.4
Health Insurance Portability and Accountability Policy 1.8.4 Appendix C Uses and Disclosures of PHI Procedures This Appendix covers procedures related to Uses and Disclosures of PHI. Disclosures to Law
HIPAA: Open Research Issues Michael L. Blau, Esq. McDermott, Will & Emery
HIPAA: Open Research Issues Michael L. Blau, Esq. McDermott, Will & Emery Research A. General Rules. There are four pathways for covered entities ( CEs ) to obtain permission under the Health Insurance
Protecting Personal Health Information in Research: Understanding the HIPAA Privacy Rule
AA Privacy RuleP DEPARTMENT OF HE ALTH & HUMAN SERVICES USA Protecting Personal Health Information in Research: Understanding the HIPAA Privacy Rule NIH Publication Number 03-5388 The HI Protecting Personal
ClinicalConnect EMR Download Training Guide
ClinicalConnect EMR Download Training Guide The information contained in this reference guide reflects upgrades in functionality as of February 17th, 2011 P a g e 2 Table of Contents About the EMR Download:...
HIPAA. HIPAA and Group Health Plans
HIPAA HIPAA and Group Health Plans CareFirst BlueCross BlueShield is the business name of CareFirst of Maryland, Inc. and is an independent licensee of the Blue Cross and Blue Shield Association. Registered
THE HIPAA PRIVACY RULE AND THE NATIONAL HOSPITAL CARE SURVEY
THE HIPAA PRIVACY RULE AND THE NATIONAL HOSPITAL CARE SURVEY Table of Contents I. Overview... 3 II. Legal Authority for NHCS... 3 III. Requirements of the HIPAA Privacy Rule... 3 IV. Extra Safeguards and
Health Insurance Portability and Accountability Act (HIPAA)
Health Insurance Portability and Accountability Act (HIPAA) General Education Presented by: Bureau of Personnel Department of Health Department of Human Services Department of Social Services Bureau of
A. HIPAA Privacy Authorizations and Exceptions for Use of Identifiable Protected Health Information
Protected Health Information and the JHSPH The Health Insurance Portability and Accountability Act (HIPAA) protects individually identifiable health information, or Protected Health Information ( PHI ),
HIPAA Privacy & Security Training for Clinicians
HIPAA Privacy & Security Training for Clinicians Agenda This training will cover the following information: Overview of Privacy Rule and Security Rules Using and disclosing Protected Health Information
NYS OCFS CMS Manual CHAPTER 1...1-1 CHAPTER 2...2-1 CHAPTER 3...3-1 CHAPTER 4...4-1. Contract Management System
NYS OCFS CMS Manual C O N T E N T S CHAPTER 1...1-1 Chapter 1: Introduction to the Contract Management System...1-2 Using the Contract Management System... 1-2 Accessing the Contract Management System...
RONALD V. MCGUCKIN AND ASSOCIATES Post Office Box 2126 Bristol, Pennsylvania 19007 (215) 785-3400 (215) 785-3401 (Fax) childproviderlaw.
RONALD V. MCGUCKIN AND ASSOCIATES Post Office Box 2126 Bristol, Pennsylvania 19007 (215) 785-3400 (215) 785-3401 (Fax) childproviderlaw.com HIPAA The Health Insurance Portability and Accountability Act
PROTECTED HEALTH INFORMATION AND THE JHSPH
PROTECTED HEALTH INFORMATION AND THE JHSPH The Health Insurance Portability and Accountability Act (HIPAA) protects individually identifiable health information, or Protected Health Information ( PHI ),
HIPAA 100 Training Manual Table of Contents. V. A Word About Business Associate Agreements 10
HIPAA 100 Training Manual Table of Contents I. Introduction 1 II. Definitions 2 III. Privacy Rule 5 IV. Security Rule 8 V. A Word About Business Associate Agreements 10 CHICAGO DEPARTMENT OF PUBIC HEALTH
Memorandum. Factual Background
Memorandum TO: FROM: SUBJECT: Chris Ianelli and Jill Mullan, ispecimen, Inc. Kristen Rosati and Ana Christian, Polsinelli, PC ispecimen Regulatory Compliance DATE: January 26, 2014 You have asked us to
Lesson 1. Introduction to Computers in the Medical Office ASSIGNMENT 1: INSTALLING THE MEDISOFT SOFTWARE. Introduction. Loading the Software
Introduction to Computers in the Medical Office ASSIGNMENT 1: INSTALLING THE MEDISOFT SOFTWARE There s no corresponding textbook reading for this section. Introduction Medisoft is one of many practice
HIPAA Compliance for Students
HIPAA Compliance for Students The Health Insurance Portability and Accountability Act (HIPAA) was passed in 1996 by the United States Congress. It s intent was to help people obtain health insurance benefits
Self-Evaluation Platform on Information Technology in Education
Self-Evaluation Platform on Information Technology in Education (ITED) for Schools User Manual Amendment History Change Revision Description Pages Affected Revision Date Approval Number Number Reference
APPENDIX 1: Frequently Asked Questions
APPENDIX 1: Frequently Asked Questions Practice Name Q: What is the HIPAA Privacy Rule? A: The HIPAA Privacy Rule controls the use and disclosure of what is known as Protected Health Information (PHI).
HHS Issues New HITECH/HIPAA Rule: Implications for Hospice Providers
Compliance Tip Sheet National Hospice and Palliative Care Organization www.nhpco.org/regulatory HHS Issues New HITECH/HIPAA Rule: Implications for Hospice Providers Hospice Provider Compliance To Do List
HIPAA PRIVACY AND SECURITY AWARENESS
HIPAA PRIVACY AND SECURITY AWARENESS Introduction The Health Insurance Portability and Accountability Act (known as HIPAA) was enacted by Congress in 1996. HIPAA serves three main purposes: To protect
HIPAA Security Rule Compliance
HIPAA Security Rule Compliance Caryn Reiker MAXIS360 HIPAA Security Rule Compliance what is it and why you should be concerned about it Table of Contents About HIPAA... 2 Who Must Comply... 2 The HIPAA
EXPRESSPATH PROVIDER PORTAL USER GUIDE AUGUST 2013
EXPRESSPATH PROVIDER PORTAL USER GUIDE AUGUST 2013 2013-2020 Express Scripts, Inc. All rights reserved. No part of this publication may be reproduced or transmitted in any form or by any means, electronic
Grand Rapids Medical Education Partners Mercy Health Saint Mary s Spectrum Health. Pam Jager, GRMEP Director of Education & Development
Grand Rapids Medical Education Partners Mercy Health Saint Mary s Spectrum Health Pam Jager, GRMEP Director of Education & Development To understand the requirements of the federal Health Information Portability
Principal Investigator Responsibilities for Education and Social/Behavioral Researchers
Principal Investigator Responsibilities for Education and Social/Behavioral Researchers Introduction The purpose of this module is to provide a basic understanding of the responsibilities of the principal
BUSINESS ASSOCIATES [45 CFR 164.502(e), 164.504(e), 164.532(d) and (e)]
BUSINESS ASSOCIATES [45 CFR 164.502(e), 164.504(e), 164.532(d) and (e)] Background By law, the HIPAA Privacy Rule applies only to covered entities health plans, health care clearinghouses, and certain
HIPAA Self-Study Module Patient Privacy at Unity Health Care, Inc [email protected] 202-667-0016 - HIPAA Hotline
HIPAA Self-Study Module Patient Privacy at Unity Health Care, Inc [email protected] 202-667-0016 - HIPAA Hotline Self-Study Module Requirements Read all program slides and complete test. Complete
HIPAA Privacy and Security. Rochelle Steimel, HIPAA Privacy Official Judy Smith, Staff Development January 2012
HIPAA Privacy and Security Rochelle Steimel, HIPAA Privacy Official Judy Smith, Staff Development January 2012 Goals and Objectives Course Goal: To introduce the staff of Munson Healthcare to the concepts
Procedure Guide: Daily Use Cyber Recruiter 6.6 December 2007
Procedure Guide: Daily Use Cyber Recruiter 6.6 December 2007 Visibility Software Procedure Guide: Daily Use Page 1 of 17 Table of Contents PURPOSE...3 FLOW CHART...4 REQUISITION POSTING PROCEDURE (R)...5
Beacon Health Strategies. eservices. Provider Manual
eservices Provider Manual Revised: February 2, 2009 eservices Provider Manual Table of Contents INTRODUCTION... 3 BEACON HEALTH STRATEGIES... 3 BEACON ESERVICES... 3 ELECTRONIC DATA INTERCHANGE... 4 EDI
Department of Veterans Affairs VHA HANDBOOK 1200.12. Washington, DC 20420 March 9, 2009 USE OF DATA AND DATA REPOSITORIES IN VHA RESEARCH
Department of Veterans Affairs VHA HANDBOOK 1200.12 Veterans Health Administration Transmittal Sheet Washington, DC 20420 March 9, 2009 USE OF DATA AND DATA REPOSITORIES IN VHA RESEARCH 1. REASON FOR ISSUE.
4. No accounting of disclosures is required with respect to disclosures of PHI within a Limited Data Set.
IDAHO STATE UNIVERSITY POLICIES AND PROCEDURES (ISUPP) HIPAA Privacy - Limited Data Sets and Data Use Agreements 10200 POLICY INFORMATION Major Functional Area (MFA): MFA X - Office of General Counsel
HIPAA Privacy Board Overview
Defense Health Agency Privacy and Civil Liberties Office HIPAA Privacy Board Overview April 30, 2015 1 Objectives The purpose of this presentation is to: Provide an overview of the DHA Privacy and Civil
National Institute of Standards and Technology. HIPAA Security Rule Toolkit. User Guide
National Institute of Standards and Technology HIPAA Security Rule Toolkit User Guide October 31, 2011 Table of Contents Background... 1 Purpose... 1 Audience... 1 Intended Use of the HSR Toolkit... 1
DEPARTMENTAL POLICY. Northwestern Memorial Hospital
Northwestern Memorial Hospital DEPARTMENTAL POLICY Subject: DEPARTMENTAL ADMINISTRATION Title: 1 of 11 Revision of: NEW Effective Date: 01/09/03 I. PURPOSE: This policy defines general behavioral guidelines
Research and the HIPAA Security Rule Prepared for the Association of American Medical Colleges by Daniel Masys, M.D. Professor and Chairman,
Research and the HIPAA Security Rule Prepared for the Association of American Medical Colleges by Daniel Masys, M.D. Professor and Chairman, Department of Biomedical Informatics Vanderbilt University School
Instructions of ClinicalTrials.gov Protocol Registration
Instructions of ClinicalTrials.gov Protocol Registration STEP I: Getting Started 1. Create an account: contact RU ClinicalTrials.gov Protocol Registration System (PRS) Administrator Rebecca Chen (973-972.1149
BUSINESS ASSOCIATE AGREEMENT
BUSINESS ASSOCIATE AGREEMENT THIS BUSINESS ASSOCIATE AGREEMENT ( Agreement ) by and between OUR LADY OF LOURDES HEALTH CARE SERVICES, INC., hereinafter referred to as Covered Entity, and hereinafter referred
Health Insurance Portability and Accountability Act (HIPAA) Compliance Training
Health Insurance Portability and Accountability Act (HIPAA) Compliance Training 1 Objectives By the end of this lesson, you should be able to: Define protected health information (PHI) covered under HIPAA
Nursing Home Facility Implementation Overview
DrConnect Improved Communication; Improved Care Nursing Home Facility Implementation Overview clevelandclinic.org/drconnect Cleveland Clinic 1995-2013. All Rights Reserved. Table of Contents Table of Contents...2
SELF-LEARNING MODULE (SLM) 2012 HIPAA Education Privacy Basics and Intermediate Modules
SELF-LEARNING MODULE (SLM) 2012 HIPAA Education Privacy Basics and Intermediate Modules Page 2 Index Privacy 101 and Intermediate Privacy Self-Learning Module 2012 HIPAA Education 3 Instructions Index
AVE MARIA UNIVERSITY HIPAA PRIVACY NOTICE
AVE MARIA UNIVERSITY HIPAA PRIVACY NOTICE This Notice of Privacy Practices describes the legal obligations of Ave Maria University, Inc. (the plan ) and your legal rights regarding your protected health
SuccessFactors Onboarding Phase 1 Verification Team Reference Guide Last revised 12.8.15
SuccessFactors Onboarding Phase 1 Verification Team Reference Guide Last revised 12.8.15 Table of Contents Overview... 2 The Onboarding Dashboard... 2 Locating the Hire in the Onboarding System... 5 Completing
ELECTRONIC HEALTH RECORDS
ELECTRONIC HEALTH RECORDS Understanding and Using Computerized Medical Records CHAPTER TEN LESSON ONE Privacy and Security of Health Records Understanding HIPAA HIPAA: acronym for Health Insurance Portability
UPMC POLICY AND PROCEDURE MANUAL
UPMC POLICY AND PROCEDURE MANUAL POLICY: INDEX TITLE: HS-EC1611 Ethics & Compliance SUBJECT: Use and Disclosure of Protected Health Information (PHI) For Research Purposes Pursuant to the HIPAA Privacy
Blue Cross Blue Shield of Michigan and Blue Care Network
Blue Cross Blue Shield of Michigan and Blue Care Network Provider Enrollment and Change Self-Service User Guide January 2011 Blue Cross Blue Shield of Michigan and Blue Care Network of Michigan are nonprofit
The Health and Benefit Trust Fund of the International Union of Operating Engineers Local Union No. 94-94A-94B, AFL-CIO. Notice of Privacy Practices
The Health and Benefit Trust Fund of the International Union of Operating Section 1: Purpose of This Notice Notice of Privacy Practices Effective as of September 23, 2013 THIS NOTICE DESCRIBES HOW MEDICAL
Instructions for Application Submission National MS Society-American Academy of Neurology (AAN) Clinician Scientist Development Award 2016
Instructions for Application Submission National MS Society-American Academy of Neurology (AAN) Clinician Scientist Development Award 2016 INTRODUCTION Please read these instructions and follow them carefully.
HIPAA 101: Privacy and Security Basics
HIPAA 101: Privacy and Security Basics Purpose This document provides important information about Kaiser Permanente policies and state and federal laws for protecting the privacy and security of individually
Individuals Authorized Access to the CMS Computer Services (IACS) User Guide for the Help Desk
Individuals Authorized Access to the CMS Computer Services (IACS) User Guide for the Help Desk Document Version 5.0 Document No.: IACS.UG.5.0 Contract No.: HHSM-500-2007-00024I Prepared for: Centers for
CAQH ProView. Practice Manager Module User Guide
CAQH ProView Practice Manager Module User Guide Table of Contents Chapter 1: Introduction... 1 CAQH ProView Overview... 1 System Security... 2 Chapter 2: Registration... 3 Existing Practice Managers...
Tips and Tricks SAGE ACCPAC INTELLIGENCE
Tips and Tricks SAGE ACCPAC INTELLIGENCE 1 Table of Contents Auto e-mailing reports... 4 Automatically Running Macros... 7 Creating new Macros from Excel... 8 Compact Metadata Functionality... 9 Copying,
UPMC POLICY AND PROCEDURE MANUAL
UPMC POLICY AND PROCEDURE MANUAL POLICY: INDEX TITLE: HS-EC1807 Ethics & Compliance SUBJECT: Honest Broker Certification Process Related to the De-identification of Health Information for Research and
HIPAA Employee Training Guide. Revision Date: April 11, 2015
HIPAA Employee Training Guide Revision Date: April 11, 2015 What is HIPAA? The Health Insurance Portability and Accountability Act of 1996 (also known as Kennedy- Kassebaum Act ). HIPAA regulations address
E-FILE. Universal Service Administrative Company (USAC) Last Updated: September 2015
E-FILE USER GUIDE This document providers E-File users with an overview of E-File account management, managing entitlements, and instructions on how to submit forms, such as the FCC Form 498, FCC Form
North Carolina Medicaid Electronic Health Record Incentive Program
North Carolina Medicaid Electronic Health Record Incentive Program Eligible Professional Stage 1 (2014) Meaningful Use Attestation Guide NC MIPS 2.0 Issue Number 1.8 November 19, 2014 The North Carolina
Donna S. Sheperis, PhD, LPC, NCC, CCMHC, ACS Sue Sadik, PhD, LPC, NCC, BC-HSP Carl Sheperis, PhD, LPC, NCC, MAC, ACS
Donna S. Sheperis, PhD, LPC, NCC, CCMHC, ACS Sue Sadik, PhD, LPC, NCC, BC-HSP Carl Sheperis, PhD, LPC, NCC, MAC, ACS 1 DISCLAIMER Please review your own documentation with your attorney. This information
itrust Medical Records System: Requirements for Technical Safeguards
itrust Medical Records System: Requirements for Technical Safeguards Physicians and healthcare practitioners use Electronic Health Records (EHR) systems to obtain, manage, and share patient information.
Dissecting New HIPAA Rules and What Compliance Means For You
Dissecting New HIPAA Rules and What Compliance Means For You A White Paper by Cindy Phillips of CMIT Solutions and Kelly McClendon of CompliancePro Solutions TABLE OF CONTENTS Introduction 3 What Are the
EMR DOCUMENTATION LYNX. Instructor Script
EMR DOCUMENTATION LYNX Instructor Script Table of Contents TABLE OF CONTENTS INFORMATION SECURITY AND CONFIDENTIALITY... 4 OVERVIEW... 5 LEARNING OBJECTIVES... 5 TIPS AND TRICKS... 5 SOLUTION ICONS...
HIPAA Policies and Procedures
HIPAA Policies and Procedures William T. Chen, MD, Inc. General Rule 164.502 A Covered Entity may not use or disclose PHI except as permitted or required by the privacy regulations. Permitted Disclosures:
HIPAA Privacy Rule Primer for the College or University Administrator
HIPAA Privacy Rule Primer for the College or University Administrator On August 14, 2002, the Department of Health and Human Services ( HHS ) issued final medical privacy regulations (the Privacy Rule
HIPAA Employee Compliance Program TRAINING MANUAL
HIPAA Employee Compliance Program TRAINING MANUAL Training Manual to Assist Employees in HIPAA Compliance January 2013 Program For HIPAA Compliance Plan Goal The purpose of this manual is to instruct our
Broward ASQ Online User Guide
Broward ASQ Online User Guide 6301 NW 5 th Way, Suite 3400 Fort Lauderdale, FL 33309 (954) 377-2188 Fax (954) 377-2192 www.elcbroward.org Table of Contents Part I: Program Administrator (Owner or Designee)
DISCLOSURE OF ALCOHOL AND SUBSTANCE/DRUG ABUSE RECORDS. This Policy describes permissible disclosures of Alcohol and Substance/Drug Abuse Records.
PRIVACY 11.0 DISCLOSURE OF ALCOHOL AND SUBSTANCE/DRUG ABUSE RECORDS Scope: Purpose: All workforce members (employees and non-employees), including employed medical staff, management, and others who have
The HIPAA Security Rule Primer A Guide For Mental Health Practitioners
The HIPAA Security Rule Primer A Guide For Mental Health Practitioners Distributed by NASW Printer-friendly PDF 2006 APAPO 1 Contents Click on any title below to jump to that page. 1 What is HIPAA? 3 2
Page 1. NAOP HIPAA and Privacy Risks 3/11/2014. Privacy means being able to have control over how your information is collected, used, or shared;
Page 1 National Organization of Alternative Programs 2014 NOAP Educational Conference HIPAA and Privacy Risks Ira J Rothman, CPHIMS, CIPP/US/IT/E/G Senior Vice President - Privacy Official March 26, 2014
BILLING INFORMATION AND ASSIGNMENT OF BENEFITS
BILLING INFORMATION AND ASSIGNMENT OF BENEFITS Facility: Northpoint Radiation Center Pro Physicians Clinic PA Physician: Timothy D. Nichols, M.D. PA, Board Certified Radiation Oncology Wilhelm J. Lubbe,
The Basics of HIPAA Privacy and Security and HITECH
The Basics of HIPAA Privacy and Security and HITECH Protecting Patient Privacy Disclaimer The content of this webinar is to introduce the principles associated with HIPAA and HITECH regulations and is
