HIPAA COMPLIANCE. What is HIPAA?
|
|
|
- Anna Gray
- 9 years ago
- Views:
Transcription
1 HIPAA COMPLIANCE What is HIPAA? The Health Insurance Portability and Accountability Act (HIPAA) also known as the Privacy Rule specifies the conditions under which protected health information may be used or disclosed by entities that maintain the records containing the protected health information. Protected health information is defined in the regulation (45 CFR Parts 160 and 164) as individually identifiable health information. HIPAA defines health information as any information, whether oral or recorded in any form or medium, that: (1) Is created or received by a health care provider, health plan, public health authority, employer, life insurer, school or university, or health care clearinghouse; and (2) Relates to the past, present, or future physical or mental health or condition of an individual; the provision of health care to an individual; or the past, present, or future payment for the provision of health care to an individual. Who must be compliant with HIPAA? This regulation applies to: (1) health plans; (2) health care clearinghouses; and (3) health care providers who transmit any health information in electronic form in connection with a covered transaction. Typical examples of institutions that must comply with HIPAA would be: insurance companies, insurance services, health maintenance organizations, hospitals, large medical institutions, doctors and dental offices. Because the primary mission of ISU is education, only part of its activities include covered functions according to HIPAA. Based on the regulations, ISU is a hybrid entity. The following ISU departments have been identified as part of the hybrid entity and must comply with HIPAA: Thielen Student Health Center and Pharmacy, ISU Student Counseling, Cyclone Sports Medicine/Physical Therapy, ISU Athletic Training Department, and the ISU Benefits Office that administers the ISU Health Plans covered by HIPAA. HIPAA also requires compliance from the following departments that provide support to the identified departments: Administrative Data Processing, Accounts Receivable, Internal Audit, University Counsel and Risk Management. How does HIPAA affect ISU researchers? All investigators, including faculty, staff or students, conducting human subject research that wish to access protected health information (PHI) for research purposes must comply with the HIPAA regulation. The regulation applies to clinical trials, behavior and social science studies, medical record reviews, epidemiological studies as well as basic science research. The Privacy Rule contains six provisions under which covered entities may use or disclose protected health information to investigators for research purposes. How the Privacy Rule works? In general, investigators wishing to obtain protected health information from a covered entity must have a signed authorization from the individual or patient giving permission for the release of his or her protected health information maintained by that covered entity. The regulations ORC 05/07/03 1
2 allow covered entities to use or disclose protected health information without a signed authorization, but this may be done in only five circumstances. RESEARCH USE AND DISCLOSURE WITH AN AUTHORIZATION Investigators who will obtain PHI with an authorization must use an authorization document that contains core elements and required statements as specified by HIPAA. This authorization may be prepared by the researcher or provided by the entity that maintains the records needed to be accessed by the researcher. The core elements in an authorization for disclosure and use of PHI are different from the elements required for informed consent according to the Common Rule (45 CFR 46). The core elements and required statements are listed below. Required Core Elements of an Authorization [45 CFR (c)(1)] A valid authorization must contain at least the following elements: A description of the information to be used or disclosed that identifies the information in a specific and meaningful fashion. Who may use or disclose the information. Who may receive the information. A description of each purpose of the requested use or disclosure. An expiration date or an expiration event that relates to the individual or the purposes of the use or disclosure. The regulation specifically allows for the expiration date to be end of research study or even none. Signature of the individual and date the authorization is signed. Required Statements of an Authorization [45 CFR (c)(2)] In addition to the core elements, the authorization must contain a statement to inform the individual of the following: The individual s right to revoke the authorization in writing, the exceptions to the right to revoke, and a description of how the individual may revoke the authorization. The right to refuse to sign the authorization and that the individual may be excluded from participation in the research. If the authorization does not contain all of the key elements and required statements it is not in compliance with the federal regulations. Authorizations must be written in plain language. Investigators must provide the individual with a copy of the signed authorization. The informed consent document and the authorization document can be combined according to the regulation; however, at ISU the documents will be kept separate, as the authorization will be reviewed for completeness and accuracy by the covered entity office and not by the IRB. The IRB will continue to review informed consent documents. Prior to use of an authorization, investigators should either submit an authorization template to the covered entity that they wish to obtain information from for their review and approval or request that the covered entity provide a copy of the authorization form used by the covered entity. ORC 05/07/03 2
3 RESEARCH USE AND DISCLOSURE WITHOUT AN AUTHORIZATION As stated above, the Privacy Rule allows covered entities to release PHI to an investigator without a signed authorization in five cases. 1. Reviews Preparatory to Research [45 CFR (i)(1)(ii)] In this case the investigator must assure the covered entity that: (A) Use or disclosure of the PHI is sought solely to review health information as necessary to prepare a research protocol or for similar purposes preparatory to research; (B) No protected health information will be removed from the covered entity by the researcher in the course of the review; and (C) The protected health information for which use or access is sought is necessary for the research purpose. An example for this provision might be to verify the feasibility of conducting a study. 2. Research on Decedent s Information [45 CFR (i)(1)(iii)] A covered entity may use or disclose PHI for research, provided that the covered entity obtains from the researcher: (A) Representation that the use or disclosure is sought solely for research on the PHI of the decedents; (B) Documentation of the death of such individuals, if requested by the covered entity; and (C) Representation that the PHI is necessary for the research purposes. 3. De-identified Health Information [45 CFR (a)(2)(i)] Health information is considered de-identified when it does not identify an individual and the covered entity has no reasonable basis to believe that the information can be used to identify an individual. The information is considered de-identified if the following 18 identifiers are removed and if the remaining health information could not be used alone, or in combination, to identify a subject of the information. 1. Names; 2. All geographic subdivisions smaller than a state, including street address, city, county, precinct, zip code, and their equivalent geocodes, except for the initial three digits of a zip code if, according to the current publicly available data from the Bureau of Census: (a) the geographic unit formed by combining all zip codes with the same three initial digits contains more than 20,000 people; and (b) the initial three ORC 05/07/03 3
4 digits of a zip code for all such geographic units containing 20,000 or fewer people is changed to 000; 3. All elements of dates (except year) for dates directly related to an individual, including birth date, admission date, discharge date, date of death; and all ages over 89 and all elements of dates (including year) indicative of such age, except that such ages and elements may be aggregated into a single category of age 90 or older; 4. Telephone numbers; 5. Fax numbers; 6. addresses; 7. Social security numbers; 8. Medical record numbers; 9. Health plan beneficiary numbers; 10. Account numbers; 11. Certificate/license numbers; 12. Vehicle identifiers and serial number, including license plate numbers; 13. Device identifiers and serial numbers; 14. Web Universal Resource Locators (URLs); 15. Internet Protocol (IP) address numbers; 16. Biometric identifiers, including finger and voice prints; 17. Full face photographic images and comparable images; and 18. Any other unique identifying number, characteristic, or code, except as permitted by paragraph (c) of 45 CFR Limited Data Set [45 CFR 164(e)(1)] A covered entity may enter into a data use agreement with an investigator. The agreement allows the covered entity to use or disclose a limited data set that excludes specific direct identifiers of the individual or individual s relatives, household members or employer. The data use agreement must: 1. Establish the permitted uses and disclosures of the limited data set by the recipient, consistent with the purposes of the research, and which may not include any use or disclosure that would violate the Privacy Rule if done by the covered entity. 2. Establish who is permitted to use or receive the limited data set; and 3. Require the recipient to agree to the following: (a) Not use or further disclose the information other than as permitted by the data use agreement or as otherwise required by law; (b) Use appropriate safeguards to prevent the use or disclosure of the information other than as provided for in the data use agreement; (c) Report to the covered entity any use or disclosure of the information not provided for by its data use agreement that it becomes aware of; (d) Ensure that any agents, including a subcontractor, to whom it provides the limited data set agrees to the same restrictions and conditions that apply to the limited data set recipient with respect to such information; and (e) Not identify the information or contact the individuals. ORC 05/07/03 4
5 The following direct identifiers must also be removed from the information: 1. Names; 2. Postal address information, other than town or city, state and zip code; 3. Telephone numbers; 4. Fax numbers; 5. Electronic mail addresses; 6. Social security numbers; 7. Medical record numbers, 8. Health plan beneficiary numbers; 9. Account numbers; 10. Certificate/license numbers; 11. Vehicle identifiers and serial numbers, including license plate numbers; 12. Device identifiers and serial numbers; 13. Web Universal Resource Locators (URLs); 14. Internet Protocol (IP) address numbers; 15. Biometric identifiers, including finger and voice prints; and 16. Full face photographic images and any comparable images. Waiver of Authorization [45 CFR (i)(1)(ii)] A covered entity may allow use and disclosure of protected health information if a privacy board or an Institutional Review Board waives the requirement for an authorization. The documentation of the waiver of authorization must be submitted to the covered entity from which the investigator wants to receive the PHI. The IRB at ISU will review requests for waiver of authorizations for covered entities at ISU. Investigators who wish to receive a waiver of authorization from a covered entity outside of ISU must contact that entity for information about applying for a waiver. A privacy board or IRB may approve an alteration or waiver of authorization, in whole or in part, if the following criteria is satisfied and documented according to the Privacy Rule. A) The use or disclosure of protected health information involves no more than minimal risk to the privacy of individuals, based on, at least, the presence of the following elements. 1) An adequate plan to protect the identifiers from improper use and disclosure. 2) An adequate plan to destroy the identifiers at the earliest opportunity consistent with conduct of the research, unless there is a health or research justification for retaining the identifiers or such retention is otherwise required by law; and 3) Adequate written assurances that the PHI will not be reused or disclosed to any other person or entity, except as required by law, for authorized oversight of the research study, or for other research for which the use or disclosure of PHI would be permitted by this subpart; ORC 05/07/03 5
6 B) The research could not practicably be conducted without the waiver or alteration; and C) The research could not practicably be conducted without access to and use of the protected health information. Request for use of PHI for reviews preparatory to research, research on decedent information, de-identified health information and limited data sets will be reviewed by the covered entity from which the PHI will be obtained. ORC 05/07/03 6
HIPAA COMPLIANCE INFORMATION. HIPAA Policy
HIPAA COMPLIANCE INFORMATION HIPAA Policy Use of Protected Health Information for Research Policy University of North Texas Health Science Center at Fort Worth Applicability: All University of North Texas
HIPAA-Compliant Research Access to PHI
HIPAA-Compliant Research Access to PHI HIPAA permits the access, disclosure and use of PHI from a HIPAA Covered Entity s or HIPAA Covered Unit s treatment, payment or health care operations records for
Winthrop-University Hospital
Winthrop-University Hospital Use of Patient Information in the Conduct of Research Activities In accordance with 45 CFR 164.512(i), 164.512(a-c) and in connection with the implementation of the HIPAA Compliance
Health Insurance Portability & Accountability Act (HIPAA) Compliance Application
Health Insurance Portability & Accountability Act (HIPAA) Compliance Application IRB Office 101 - Altru Psychiatry Center 860 S. Columbia Rd, Grand Forks, North Dakota 58201 Phone: (701) 780-6161 PROJECT
What is Covered by HIPAA at VCU?
What is Covered by HIPAA at VCU? The Privacy Rule was designed to protect private health information from incidental disclosures. The regulations specifically apply to health care providers, health plans,
HIPAA OVERVIEW ETSU 1
HIPAA OVERVIEW ETSU 1 What is HIPAA? Health Insurance Portability and Accountability Act. 2 PURPOSE - TITLE II ADMINISTRATIVE SIMPLIFICATION To increase the efficiency and effectiveness of the entire health
UPMC POLICY AND PROCEDURE MANUAL
UPMC POLICY AND PROCEDURE MANUAL POLICY: INDEX TITLE: HS-EC1807 Ethics & Compliance SUBJECT: Honest Broker Certification Process Related to the De-identification of Health Information for Research and
4. No accounting of disclosures is required with respect to disclosures of PHI within a Limited Data Set.
IDAHO STATE UNIVERSITY POLICIES AND PROCEDURES (ISUPP) HIPAA Privacy - Limited Data Sets and Data Use Agreements 10200 POLICY INFORMATION Major Functional Area (MFA): MFA X - Office of General Counsel
Statement of Policy. Reason for Policy
Table of Contents Statement of Policy 2 Reason for Policy 2 HIPAA Liaison 2 Individuals and Entities Affected by Policy 2 Who Should Know Policy 3 Exclusions 3 Website Address for Policy 3 Definitions
HIPAA-P06 Use and Disclosure of De-identified Data and Limited Data Sets
HIPAA-P06 Use and Disclosure of De-identified Data and Limited Data Sets FULL POLICY CONTENTS Scope Policy Statement Reason for Policy Definitions ADDITIONAL DETAILS Web Address Forms Related Information
Protecting Personal Health Information in Research: Understanding the HIPAA Privacy Rule
AA Privacy RuleP DEPARTMENT OF HE ALTH & HUMAN SERVICES USA Protecting Personal Health Information in Research: Understanding the HIPAA Privacy Rule NIH Publication Number 03-5388 The HI Protecting Personal
HIPAA POLICY REGARDING DE-IDENTIFICATION OF PROTECTED HEALTH INFORMATION AND USE OF LIMITED DATA SETS
HIPAA POLICY REGARDING DE-IDENTIFICATION OF PROTECTED HEALTH INFORMATION AND USE OF LIMITED DATA SETS SCOPE OF POLICY: What Units Are Covered by this Policy?: This policy applies to the following units
What is Covered under the Privacy Rule? Protected Health Information (PHI)
HIPAA & RESEARCH What is Covered under the Privacy Rule? Protected Health Information (PHI) Health information + Identifier = PHI Transmitted or maintained in any form (paper, electronic, forms, web-based,
How to De-identify Data. Xulei Shirley Liu Department of Biostatistics Vanderbilt University 03/07/2008
How to De-identify Data Xulei Shirley Liu Department of Biostatistics Vanderbilt University 03/07/2008 1 Outline The problem Brief history The solutions Examples with SAS and R code 2 Background The adoption
HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT (HIPAA): FACT SHEET FOR NEUROPSYCHOLOGISTS Division 40, American Psychological Association
HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT (HIPAA): FACT SHEET FOR NEUROPSYCHOLOGISTS Division 40, American Psychological Association DISCLAIMER This general information fact sheet is made available
De-Identification of Health Data under HIPAA: Regulations and Recent Guidance" " "
De-Identification of Health Data under HIPAA: Regulations and Recent Guidance" " " D even McGraw " Director, Health Privacy Project January 15, 201311 HIPAA Scope Does not cover all health data Applies
INDIANA UNIVERSITY SCHOOL OF OPTOMETRY HIPAA COMPLIANCE PLAN TABLE OF CONTENTS. I. Introduction 2. II. Definitions 3
INDIANA UNIVERSITY SCHOOL OF OPTOMETRY HIPAA COMPLIANCE PLAN TABLE OF CONTENTS I. Introduction 2 II. Definitions 3 III. Program Oversight and Responsibilities 4 A. Structure B. Compliance Committee C.
Health Insurance Portability and Accountability Policy 1.8.4
Health Insurance Portability and Accountability Policy 1.8.4 Appendix C Uses and Disclosures of PHI Procedures This Appendix covers procedures related to Uses and Disclosures of PHI. Disclosures to Law
University of Cincinnati Limited HIPAA Glossary
University of Cincinnati Limited HIPAA Glossary ephi System A system that creates accesses, transmits or receives: 1) primary source ephi, 2) ephi critical for treatment, payment or health care operations
BUSINESS ASSOCIATE AGREEMENT HIPAA Protected Health Information
BUSINESS ASSOCIATE AGREEMENT HIPAA Protected Health Information I. PREAMBLE ( Covered Entity ) and ( Business Associate ) (jointly the Parties ) wish to enter into an Agreement to comply with the requirements
HIPAA-G04 Limited Data Set and Data Use Agreement Guidance
HIPAA-G04 Limited Data Set and Data Use Agreement Guidance GUIDANCE CONTENTS Scope Reason for the Guidance Guidance Statement Definitions ADDITIONAL DETAILS Additional Contacts Web Address Forms Related
HIPAA and You The Basics
HIPAA and You The Basics The Purpose of HIPAA Privacy Rules 1. Provide strong federal protections for privacy rights Ensure individual trust in the privacy and security of his or her health information
IRB Application for Medical Records Review Request
Office of Regulatory Research Compliance Institutional Review Board FORM B1 : Medial Records Review Application FORM B1 IRB Application for Medical Records Review Request Principal Investigator: Email:
PROTECTED HEALTH INFORMATION AND THE JHSPH
PROTECTED HEALTH INFORMATION AND THE JHSPH The Health Insurance Portability and Accountability Act (HIPAA) protects individually identifiable health information, or Protected Health Information ( PHI ),
A. HIPAA Privacy Authorizations and Exceptions for Use of Identifiable Protected Health Information
Protected Health Information and the JHSPH The Health Insurance Portability and Accountability Act (HIPAA) protects individually identifiable health information, or Protected Health Information ( PHI ),
LA BioMed Secure Email
INFORMATION SYSTEMS LA BioMed Secure Email Los Angeles Biomedical Research Institute at Harbor-UCLA 1124 W Carson St Bldg E2.5 Phone 310.222.1212 Table of Contents Intended Audience... 1 Purpose... 1 When
Everett School Employee Benefit Trust. Reportable Breach Notification Policy HIPAA HITECH Rules and Washington State Law
Everett School Employee Benefit Trust Reportable Breach Notification Policy HIPAA HITECH Rules and Washington State Law Introduction The Everett School Employee Benefit Trust ( Trust ) adopts this policy
Memorandum. Factual Background
Memorandum TO: FROM: SUBJECT: Chris Ianelli and Jill Mullan, ispecimen, Inc. Kristen Rosati and Ana Christian, Polsinelli, PC ispecimen Regulatory Compliance DATE: January 26, 2014 You have asked us to
Information Privacy and Security Program Title:
1 Page: 1 of 5 I. PURPOSE: 1 The purpose of this standard is to identify and define the standards for implementing contracting provisions related to those individuals and organizations identified as Business
HIPAA ephi Security Guidance for Researchers
What is ephi? ephi stands for Electronic Protected Health Information (PHI). It is any PHI that is stored, accessed, transmitted or received electronically. 1 PHI under HIPAA means any information that
HIPAA 101: Privacy and Security Basics
HIPAA 101: Privacy and Security Basics Purpose This document provides important information about Kaiser Permanente policies and state and federal laws for protecting the privacy and security of individually
Standard Operating Procedures for Research Involving Human Subjects
Section I: Introduction v07/2015 Standard Operating Procedures Indiana University and its affiliates are dedicated to protecting the rights and welfare of human participants recruited to participate in
HIPAA Compliance for Students
HIPAA Compliance for Students The Health Insurance Portability and Accountability Act (HIPAA) was passed in 1996 by the United States Congress. It s intent was to help people obtain health insurance benefits
HIPAA Data Use Agreement Policy R&G Template Updated for Omnibus Rule HIPAA DATE USE AGREEMENT 1
HIPAA DATE USE AGREEMENT 1 This Data Use Agreement (the "Agreement") is effective as of (the "Agreement Effective Date") by and between ("Covered Entity") and ("Data User"). RECITALS WHEREAS, Covered Entity
UPMC POLICY AND PROCEDURE MANUAL
UPMC POLICY AND PROCEDURE MANUAL POLICY: INDEX TITLE: HS-EC1611 Ethics & Compliance SUBJECT: Use and Disclosure of Protected Health Information (PHI) For Research Purposes Pursuant to the HIPAA Privacy
[Insert Name and Address of Data Recipient] Data Use Agreement. Dear :
[Insert Name and Address of Data Recipient] Re: Data Use Agreement Dear : The federal Health Insurance Portability and Accountability Act and the regulations promulgated thereunder (collectively referred
HIPAA means the Health Insurance Portability and Accountability Act of 1996, Public Law 104-191.
HIPAA Data Use Agreement 1 Revision Date: This Data Use Agreement (the Agreement ) is entered into by and between Yale University ( Covered Entity ) and ( Data User ), collectively, the Parties, and shall
HIPAA 100 Training Manual Table of Contents. V. A Word About Business Associate Agreements 10
HIPAA 100 Training Manual Table of Contents I. Introduction 1 II. Definitions 2 III. Privacy Rule 5 IV. Security Rule 8 V. A Word About Business Associate Agreements 10 CHICAGO DEPARTMENT OF PUBIC HEALTH
Business Associate Agreement
Business Associate Agreement This Agreement is entered into as of ("Effective Date"), between ( Covered Entity ), and ( Business Associate ). RECITALS WHEREAS, Business Associate provides services on behalf
DATA USE AGREEMENT RECITALS
DATA USE AGREEMENT This Data Use Agreement (the Agreement ), effective as of the day of, 20, is by and between ( Covered Entity ) and ( Limited Data Set Recipient or Recipient ) (collectively, the Parties
BUSINESS ASSOCIATE AGREEMENT BETWEEN LEWIS & CLARK COLLEGE AND ALLEGIANCE BENEFIT PLAN MANAGEMENT, INC. I. PREAMBLE
BUSINESS ASSOCIATE AGREEMENT BETWEEN LEWIS & CLARK COLLEGE AND ALLEGIANCE BENEFIT PLAN MANAGEMENT, INC. I. PREAMBLE Lewis & Clark College and Allegiance Benefit Plan Management, Inc., (jointly the Parties
HIPAA Privacy and Security Rules: A Refresher. Marilyn Freeman, RHIA California Area HIPAA Coordinator California Area HIM Consultant
HIPAA Privacy and Security Rules: A Refresher Marilyn Freeman, RHIA California Area HIPAA Coordinator California Area HIM Consultant Objectives Provide overview of Health insurance Portability and Accountability
State of Nevada Public Employees Benefits Program. Master Plan Document for the HIPAA Privacy and Security Requirements for PEBP Health Benefits
State of Nevada for the Requirements for PEBP Health Benefits Plan Year 2016 July 1, 2015 June 30, 2016 www.pebp.state.nv.us (775) 684-7000 Or (800) 326-5496 Amendments Amendment Log Any amendments, changes
HIPAA Basics for Clinical Research
HIPAA Basics for Clinical Research Audio options: Built-in audio on your computer OR Separate audio dial-in: 415-930-5229 Toll-free: 1-877-309-2074 Access Code: 960-353-248 Audio PIN: Shown after joining
Gaston County HIPAA Manual
Gaston County HIPAA Manual Includes Gaston County IT Manual Action Date Reviewed and Revised December 2012 Gaston County HIPAA Policy Manual has be updated and combined with the Gaston County IT Manual.
North Shore LIJ Health System, Inc. Facility Name
North Shore LIJ Health System, Inc. Facility Name POLICY TITLE: The Medical Record POLICY #: 200.10 Approval Date: 2/14/13 Effective Date: Prepared by: Elizabeth Lotito, HIM Project Manager ADMINISTRATIVE
Legal Insight. Big Data Analytics Under HIPAA. Kevin Coy and Neil W. Hoffman, Ph.D. Applicability of HIPAA
Big Data Analytics Under HIPAA Kevin Coy and Neil W. Hoffman, Ph.D. Privacy laws and regulations such as the Health Insurance Portability and Accountability Act (HIPAA) Privacy Rule can have a significant
De-Identification of Clinical Data
De-Identification of Clinical Data Sepideh Khosravifar, CISSP Info Security Analyst IV TEPR Conference 2008 Ft. Lauderdale, Florida May 17-21, 2008 1 1 Slide 1 cmw1 Craig M. Winter, 4/25/2008 Background
Presented by Jack Kolk President ACR 2 Solutions, Inc.
HIPAA 102 : What you don t know about the new changes in the law can hurt you! Presented by Jack Kolk President ACR 2 Solutions, Inc. Todays Agenda: 1) Jack Kolk, CEO of ACR 2 Solutions a information security
Texas A&M School of Public Health HIPAA Privacy Compliance Manual For Researchers
Texas A&M School of Public Health HIPAA Privacy Compliance Manual For Researchers Final: Approved by the SPH Executive Committee, 01/12/2016 1 Table of Contents INTRODUCTION... 3 PURPOSE... 4 LEGAL STATUS
2010 i2b2/va Challenge Rules of Conduct
2010i2b2/VAChallengeRulesofConduct The2010i2b2/VAChallengeisasharedtask.Theformatofthesharedtaskandtheprinciples whichbindtheparticipantsofthissharedtaskareasfollows: 1.Inordertosupportthesharedtask,i2b2andVAwillprovidetheparticipantswithdatafrom
VENDOR / CONTRACTOR. Privacy Basics
VENDOR / CONTRACTOR Privacy Basics Introduction Premera s mission is to provide our customers with peace of mind about their healthcare. This requires that everyone who works with or for Premera (the Company
YALE UNIVERSITY RESEARCHER S GUIDE TO HIPAA. Health Insurance Portability and Accountability Act of 1996 Handbook
YALE UNIVERSITY RESEARCHER S GUIDE TO HIPAA Health Insurance Portability and Accountability Act of 1996 Handbook Table of Contents I. INTRODUCTION... 2 What is HIPAA?... 2 What is PHI?... 2 II. HIPAA s
MCDONOUGH CENTER FOR FAMILY DENTISTRY, LLC
MCDONOUGH CENTER FOR FAMILY DENTISTRY, LLC HIPAA Privacy Policies & Procedures & HIPAA Security Policies & Procedures TABLE OF CONTENTS 1. PROTECTED HEALTH INFORMATION (PHI) 2. HIPAA PRIVACY POLICIES &
PEPPERDINE UNIVERSITY HIPAA Policies Procedures and Forms Manual
PEPPERDINE UNIVERSITY HIPAA Policies Procedures and Forms Manual 1 Table of Contents I. INTRODUCTION... 4 A. GENERAL POLICY... 4 B. SCOPE... 4 II. DEFINITIONS... 5 III. GENERAL POLICIES AND PROCEDURES...
THE HIPAA PRIVACY RULE AND THE NATIONAL HOSPITAL CARE SURVEY
THE HIPAA PRIVACY RULE AND THE NATIONAL HOSPITAL CARE SURVEY Table of Contents I. Overview... 3 II. Legal Authority for NHCS... 3 III. Requirements of the HIPAA Privacy Rule... 3 IV. Extra Safeguards and
CREATIVE SOLUTIONS IN HEALTHCARE, INC. Privacy Policy
CREATIVE SOLUTIONS IN HEALTHCARE, INC. Privacy Policy Amended as of February 12, 2010 on the authority of the HIPAA Privacy Officer for Creative Solutions in Healthcare, Inc. TABLE OF CONTENTS ARTICLE
OCR/HHS HIPAA/HITECH Audit Preparation
OCR/HHS HIPAA/HITECH Audit Preparation 1 Who are we EHR 2.0 Mission: To assist healthcare organizations develop and implement practices to secure IT systems and comply with HIPAA/HITECH regulations. Education
HIPAA SELF STUDY TRAINING GUIDE
HIPAA SELF STUDY TRAINING GUIDE I have received the LifeWays HIPAA SELF STUDY TRAINING GUIDE. I understand that I will be accountable for the information contained in the guide. If I have questions I may
BUSINESS ASSOCIATE AGREEMENT
BUSINESS ASSOCIATE AGREEMENT This Business Associate Agreement (the "Agreement") is made and entered into this day of,, by and between Quicktate and idictate ("Business Associate") and ("Covered Entity").
Health Plan Select, Inc. Business Associate Privacy Addendum To The Service Agreement
This (hereinafter referred to as Addendum ) by and between Athens Area Health Plan Select, Inc. (hereinafter referred to as HPS ) a Covered Entity under HIPAA, and INSERT ORG NAME (hereinafter referred
Malpractice Issues for the Radiologic Technologist
Malpractice Issues for the Radiologic Technologist Carol Ann Marunich, Esquire Dinsmore & Shohl LLP 215 Don Knotts Boulevard, Suite 310 Morgantown, West Virginia 26501 304-296-1100 X44 2006 Dinsmore &
Business Associate Agreement
Business Associate Agreement This Business Associate Agreement (the Agreement ) is made by and between Business Associate, [Name of Business Associate], and Covered Entity, The Connecticut Center for Health,
HIPAA Compliance Strategies for Pharmaceutical Manufacturers,
HIPAA Compliance Strategies for Pharmaceutical Manufacturers, PBMs and Pharmacies Jean-Paul Hepp,, Ph.D. Director, Global Privacy HIPAA Colloquium Harvard MA; August 22, 2002 1 Agenda Privacy ~ Definitions
HIPAA Privacy Rule Primer for the College or University Administrator
HIPAA Privacy Rule Primer for the College or University Administrator On August 14, 2002, the Department of Health and Human Services ( HHS ) issued final medical privacy regulations (the Privacy Rule
Pan-American Life Insurance Company Producer Agreement
Pan-American Life Insurance Company Producer Agreement This AGREEMENT is, as applicable, by and between Pan-American Life Insurance Company with offices located at 1778 North Plano Road, Suite 310, Richardson,
Professional Employer Organizations Obligations Under HIPAA A Summary
NAPEO Legal InsightsTM Volume 2, Number 6 November 2009 Professional Employer Organizations Obligations Under HIPAA A Summary Dale R. Vlasek, Esq. Attorney McDonald Hopkins LLC Cleveland, Ohio A PEO is
HIPAA Policies and Procedures
HIPAA Policies and Procedures William T. Chen, MD, Inc. General Rule 164.502 A Covered Entity may not use or disclose PHI except as permitted or required by the privacy regulations. Permitted Disclosures:
