PROTECTED HEALTH INFORMATION AND THE JHSPH
|
|
|
- Myrtle West
- 10 years ago
- Views:
Transcription
1 PROTECTED HEALTH INFORMATION AND THE JHSPH The Health Insurance Portability and Accountability Act (HIPAA) protects individually identifiable health information, or Protected Health Information ( PHI ), originating from a health care facility in the U.S., including the entities under the Johns Hopkins Health Systems (Johns Hopkins Hospital (JHH), Bayview Medical Center, Johns Hopkins Community Physicians (JHCP), Howard County General Hospital, Suburban Hospital, Sibley Hospital), Centers for Medicine and Medicare Services (CMS) and others. JHSPH investigators seeking to access, obtain, or use PHI from a covered entity, either in identifiable or limited data set form, must follow the rules below. The IRB has the authority to approve the use of these data and to approve an Authorization for the Disclosure of Health Information for Research ( Authorization ), when a participant will authorize the use of the data, and a Waiver of Privacy Authorization ( Waiver ) under appropriate circumstances. A. DEFINITIONS HIPAA: the Health Insurance Portability and Accountability Act of Authorization: Document that gives covered entities permission to use protected health information for specified purposes, which are generally other than treatment, payment, or health care operations, or to disclose protected health information to a third party specified by the individual. An authorization must specify the following: a description of the protected health information to be used and disclosed, the person authorized to make the use or disclosure, the person to whom the covered entity may make the disclosure, an expiration date, and, in some cases, the purpose for which the information may be used or disclosed and the signature of the patient/participant. Disclosure: The release, transfer, provision of, access to, or divulging in any other manner of PHI to persons or entities outside of the Johns Hopkins Covered Entities and Related OHCA Participants. Protected Health Information (PHI): Individually identifiable health information, as defined under the Privacy Regulations promulgated under HIPAA. PHI may include any of the following: Name Geographic information smaller than state Elements of dates (birth date, admission date, date of death, ages greater than or equal to 90 years of age Telephone numbers Fax numbers Electronic mail addresses Social security numbers Medical record numbers Account numbers Certificate or license number Vehicle identifiers and serial numbers including license plate Device identifiers and serial numbers URLs IP address numbers Biometric identifiers Full face photographic images and comparable images Health Plan beneficiary numbers 1
2 Any other unique identifying number, characteristic or code De-identified Data Set: If the HIPAA identifiers or PHI are removed from the research data before the JHSPH researcher accesses it, the data set is considered to be de-identified (see list of identifiers here: Use of this data set requires no authorization, no waiver, and IRB oversight only if collected in association with a previously reviewed study and the proposed use is outside the scope of that original approval. Limited Data Set: A limited collection of PHI, which if obtained from health care providers ( covered entities ), does not require an IRB approved Authorization or a Waiver. The Limited Data Set may include only the following identifiers: dates such as admission, discharge, service, DOB, DOD; city, state, five digit or more zip code; and ages in years, months or days or hours Please note that a limited data set may be obtained only with use of a Data Use Agreement (DUA) between JHSPH and the covered entity. Use: The sharing, employment, application, utilization, examination or analysis of PHI within the Johns Hopkins Covered Entities and Related OHCA Participants. HIPAA "Covered Entities : The HIPAA regulations apply to any entity that is a: Health Plan (self insured/insured, HMOs, health insurance companies, employer health plans and similar arrangements) Health Care Provider (who transmit electronic transactions covered by the HIPAA regulations) Health Care Clearinghouse Medicare Part D Pharmaceutical Providers An entity that is one or more of these types of entities is referred to as a "covered entity." B. HIPAA PRIVACY AUTHORIZATIONS AND EXCEPTIONS FOR USE OF IDENTIFIABLE PROTECTED HEALTH INFORMATION In the United States, organizations which provide, bill for, or are paid for, health care are covered entities under HIPAA. PHI collected and used by a covered entity for treatment, payment, and operations purposes does not require IRB oversight. In general, HIPAA requires that investigators seeking to access, obtain, or use PHI from a HIPAA covered entity for research purposes either request a signed authorization for that use from the patient/study subject, or justify an exception from that requirement. The exceptions to the authorization requirement include: 1. Access to PHI through a partial (for recruitment purposes) or full waiver of the Authorization requirement 2. Access to PHI through creation or use of a limited data set 3. Access to PHI preparatory to research 4. Access to PHI solely of decedents C. WAIVER OF PRIVACY AUTHORIZATION 2
3 Unlike the Common Rule provisions which offer both documented informed consent and consent with a waiver of documentation, HIPAA has no oral HIPAA authorization provision. An authorization requires the signature of the research participant on an IRB approved authorization form. If an investigator seeks to obtain a HIPAA privacy authorization orally from a participant as part of an oral consent script (with no signature on an Authorization document), s/he must submit an HIPAA Application for a Waiver of Privacy Authorization to the IRB. The IRB has the authority to approve waiver all of the HIPAA Authorization requirements, if the conditions on the Waiver application form are met, OR the IRB may waive specific elements of the HIPAA Authorization requirement when appropriate such as a the requirement for a signature, or for a partial waiver, access to PHI for recruitment purposes without an authorization with the understanding that, once identified, a potential participant will sign an authorization as part of study enrollment. 1. Criteria for Waiver The IRB will consider the following criteria prior to approving a full or partial Waiver of Authorization: a. The research/recruitment cannot practicably be conducted without the waiver b. The research/recruitment cannot practicably be conducted without access to and use of the PHI c. The research application must have an adequate plan to protect the PHI from unapproved use/disclosure d. The research application must include a plan to destroy the identifiers at the earliest possible moment. The Application for Waiver requires that the PI attest that the PHI will not be reused or disclosed to any other person or entity, except as required by law, for authorized oversight of the research study, or for other research for which the use or disclosure of protected health information would be permitted under the terms of Privacy Rule. 2. Examples: a. Full Waiver of Privacy Authorization: A researcher wishes to create a de-identified analytic data set of patients who have had pancreatic cancer from a medical records database. The researcher will see the PHI of the selected patients, but will not record the PHI or use it for research purposes. The IRB may conclude that it is impracticable for the researcher to contact and obtain authorization from all the participants, and the research cannot proceed without access and use of the PHI. The PHI will not be recorded, so it will be protected from unapproved use or disclosure. Note: The rules for data abstraction through a Johns Hopkins Covered Entity are a little different; a Business Associate Agreement is required when the JHSPH investigator is performing the records abstraction. See 2A below. b. Partial Waiver of Privacy Authorization for Recruitment: A researcher wishes to identify individuals who have undergone retinal reattachment surgery to conduct a quality of life survey. The researcher proposes to identify the potential participants using medical records, and then will contact them through the patient s clinician. The identifiable information will be used for contact purposes only, and the researcher will retain PHI for only those individuals who agree to participate. The PHI from patients who are not contacted successfully or who decline to participate will be destroyed. D. USE OF DE-IDENTIFIED AND LIMITED DATA SETS 3
4 1. Using Data Sets from a Covered Entity JHSPH is not a covered entity. If a JHSPH faculty member submits a research application to the IRB proposing to use a de-identified data set or a limited data set, the compliance requirements will depend upon: 1) whether the covered entity is a Hopkins entity, and 2) who creates the de-identified data set or limited data set. JHSPH investigators who use PHI in research should take HIPAA training either through CITI or, if the data will come from Johns Hopkins Medicine, through the SOM IRB. a. Hopkins Covered Entity is the Source of the De-Identified, or Limited Data Set To execute the documents referenced below (Business Associate Agreement and Data Use Agreement), please contact the Office of Research Administration. Contact Elizabeth Peterson at [email protected] if you need assistance. i. JHSPH Investigator Creates the De-Identified Data Set or Limited Data Set: Since the JHSPH investigator is performing a service by abstracting the data from the medical records, the investigator is a business associate of the covered entity for that purpose. A Business Associate Agreement ( BAA ) must be executed through Don Bradfield at the Johns Hopkins HIPAA Office. The investigator must submit an IRB application. In this instance, the IRB will not need to approve a Waiver (because the BAA is in place), and the study will likely be Exempt from IRB review under Category 4. a. De-Identified Data Set: If the JHSPH investigator creates a data set that includes no HIPAA identifiers, the PI would need to complete the Business Associate Agreement, but not a Data Use Agreement ( DUA, required for a Limited Data Set, below). The investigator should complete an IRB application, which will likely be determined to be Exempt from IRB review under Category 4. b. Limited Data Set: If the JHSPH investigator creates a limited data set, the PI would need to complete the Business Associate Agreement. Once the limited data set was created, then a DUA would need to be completed. Again, Don Bradfield at the Johns Hopkins HIPAA Office should be contacted. ii. The Hopkins Covered Entity Creates the Limited Data Set or De-Identified Data Set: If the covered entity abstracts the records, or uses another third party business associate to do so, and then discloses (or provides) the de-identified data set or limited data set to the JHSPH faculty member, no Authorization or Waiver is required. The submission to the IRB may receive a Not Human Subjects Research or Exempt determination, depending upon the project description. a. De-Identified Data Set: The JHSPH investigator who will obtain a de-identified data set from the Hopkins covered entity may not need to submit an IRB application, unless the data set includes de-identified information originally collected by the JHSPH investigator. b. Limited Data Set: The PI must sign a Data Use Agreement using the Hopkins DUA template (see: b. A Non-Hopkins Covered Entity is the Source of the Limited Data Set i. JHSPH Investigator Creates the Limited Data Set: The JHSPH investigator must check with the covered entity for its HIPAA policies and procedures. The investigator must submit an application to the IRB, and will ask the IRB to approve a Waiver or an 4
5 Authorization. If the covered entity offers its own Data Use Agreement template, the JHSPH investigator should not sign it until approved by Don Bradfield. The Hopkins DUA may be used without review by Don Bradfield, unless there is a substantive change to it. a. De-Identified Data Set: The JHSPH investigator should submit an IRB application and obtain a Waiver or Authorization, but will not need to sign a Data Use Agreement. ii. The Non-Hopkins Covered Entity Creates the Limited Data Set: If the covered entity is disclosing a limited data set to a JHSPH investigator for use in research, the JHSPH investigator must submit an application to the IRB. The covered entity may or may not require the investigator to sign a data use agreement, but we recommend that the JHSPH investigator offer the Hopkins template as an option. If the covered entity does not want to execute a DUA, the PI should ask the IRB for a Waiver. a. De-Identified Data Set: The JHSPH investigator may not need to submit an IRB application, unless the data set includes de-identified information originally collected by the JHSPH investigator. The investigator does not need to sign a DUA. 2. Examples: a. A JHSPH PI will go to JHCP to interview patients about the quality of care for mental health. The information collected will have the patients names, age, gender, and diagnostic information. The JHSPH PI will need to collaborate with the JHCP clinic to obtain access to names of potential participants. i. If the JHCP provider/researcher (collaborator) contacts the potential participants directly to inform them about the study, there are no HIPAA recruitment implications. The JHCP provider already has the access to the PHI and is only using it for referral purposes. ii. If the JHSPH PI will be given access to the medical records to abstract him/herself, the JHSPH PI is acting as a business associate of the JHCP and will need to complete a business associate agreement. a. If the JHSPH PI will contact the participants to inform them about the study, the IRB would have to approve a HIPAA Waiver of Authorization to permit the PI to use the PHI information for recruitment purposes. b. The JHSPH PI should enter the disclosure information in the tracking database, and check the HIPAA Compliance database to make sure none of the patients on the list have expressed a desire not to be contacted for future research. The JHSPH PI should add to the Compliance database information about any patients whose records include an entry expressing the desire not to be contacted. iii. The JHSPH PI will obtain signed informed consent from the study participant. The consent process should include documentation of the HIPAA Authorization so that the participant can authorize the use of his/her PHI for research purposes. The IRB will approve the HIPAA Authorization language either as part of the consent form, or as an independent document. iv. Oral Consent/Authorization: If the JHSPH investigator will be obtaining informed consent from a person identified through a covered entity, and the consent will be presented orally with no identifiers recorded on the interview form, HIPAA is still implicated. The 5
6 JHSPH researcher will know the identity of the participant while sitting with them face to face. The JHSPH PI should request a Waiver of Privacy Authorization from the IRB, specifically requesting that the requirement for a signature be waived. HIPAA Authorization language should be included in the oral consent script. E. THE COMPLIANCE DATABASE: TRACKING AND RECRUITMENT 1. Waiver involving a JH covered entity : If the IRB approves a Waiver of Privacy Authorization, and the JHSPH investigator obtains PHI disclosed from a JH covered entity (JHH, Bayview, Howard County General, JHCP, etc.), the JHSPH investigator must track this disclosure by creating a new record in the SPH JH HIPAA Compliance System. The Compliance System may be accessed at List the first and last names, and addresses, of participants whose disclosed information will be tracked. 2. If a JHSPH researcher obtains a Waiver of Privacy Authorization for recruitment purposes, with the intent to look into JH patient records to identify possible participants, and sees in the record an entry that an individual does not wish to be contacted for research purposes, the JHSPH investigator must log that information into the Compliance System database. JHSPH investigators who wish to use JH patient records for recruitment purposes must first check the compliance database to identify individuals who have expressed that preference not to be contacted, and honor the person s wishes. 3. Research involving only decedents: If a JHSPH investigator obtains PHI from a covered entity for research involving only decedents, that disclosure must be tracked through the Compliance Database system. F. INTERNATIONAL STUDIES AND HIPAA If your study is collecting PHI from a health care provider overseas, and the data are sent to JHSPH, the study is not covered by HIPAA. However, if the coded, but identifiable PHI from overseas was sent to a JH covered entity, like the School of Medicine or Nursing, the PHI may become subject to HIPAA protections. G. JOHNS HOPKINS COVERED ENTITIES Providers The Johns Hopkins University School of Medicine The Johns Hopkins University School of Nursing The Johns Hopkins Hospital (not including Occupational Health) Johns Hopkins Bayview Medical Center, Inc. (not including Occupational Health) Hopkins ElderPlus (a provider, a health plan and a Part D Provider) Howard County General Hospital, Inc. (not including Employee Health) Sibley Memorial Hospital Suburban Hospital All Children's Hospital The Johns Hopkins Medical Services Corporation Johns Hopkins Community Physicians, Inc. Priority Partners Managed Care Organization, Inc. (a provider and a health plan) 6
7 Johns Hopkins Pharmaquip, Inc. Johns Hopkins Home Health Services, Inc. Johns Hopkins Pediatrics at Home, Inc. Ophthalmology Associates, LLC Creative Alternatives The Central Maryland Heart Center, Inc. The Center for Ambulatory Services, Inc. (TCAS) HCP Venture One Corporation Howard County MRI Limited Partnership Cedar Emergency Services Company, Inc. Ambulatory Blood Gas Services. Inc. JH Ventures, LLC / Howard County Neonatal Services Series JH Ventures, LLC / Frederick County Neonatal Services Series JH Ventures, LLC /HCGH OB/GYN Associates Services (d/b/a Signature OB/GYN) JH Ventures, LLC / JHHC Participating Physician Series JH Ventures, LLC / Johns Hopkins Emergency Medical Services Series JH Ventures, LLC / Wyman Park ASC Series Affected researchers in the following Johns Hopkins Schools: The Whiting School of Engineering The Krieger School of Arts and Sciences The Applied Physics Laboratory Organized health care arrangement The Kennedy Krieger Institute Non-Johns Hopkins Employed Medical Staffs Credentialed at: The Johns Hopkins Hospital Johns Hopkins Bayview Medical Center Howard County General Hospital Health plans The Johns Hopkins University Welfare Plan* Benefit Elections Program Plan* SOM & SPH Student Health Program SOM Dental Insurance Program Student Health Insurance Plan APL Medical and Dental Insurance Plans APL Health Care Spending Account APL Employee Assistance Program The Johns Hopkins Health System Bayview Medical Center: 7
8 Employee Benefits Plan Represented Employee Benefits Plan House Staff Employee Benefits Plan Employee Assistance Plan Long Term Care Insurance Plan Broadway Services EHP Medical Plan Johns Hopkins Health System Corporation/Johns Hopkins Hospital Employee Benefits Plan for Non-Represented Employees* Johns Hopkins Hospital Employee Benefits Plan for Represented Employees* Hopkins ElderPlus (a provider, a health plan and a Part D Provider) Howard County General Hospital: EHP Medical Plan Blue Choice MDIPA CareFirst BC/BS Dental Plan Care First BC/BS Select Vision Plan Flexible Benefit Plan (Medical Reimbursement) Employee Assistance Plan LongTerm Care Insurance Program Priority Partners Managed Care Organization, Inc. (a provider and a health plan) Uniformed Services Family Health Plan at Johns Hopkins * "Wrap" or umbrella plans that may have a variety of component plans encompassed within them, including various insurer offerings, employee assistance plans (EAPs), medical flexible spending accounts (FSAs), etc.. 8
A. HIPAA Privacy Authorizations and Exceptions for Use of Identifiable Protected Health Information
Protected Health Information and the JHSPH The Health Insurance Portability and Accountability Act (HIPAA) protects individually identifiable health information, or Protected Health Information ( PHI ),
HIPAA COMPLIANCE INFORMATION. HIPAA Policy
HIPAA COMPLIANCE INFORMATION HIPAA Policy Use of Protected Health Information for Research Policy University of North Texas Health Science Center at Fort Worth Applicability: All University of North Texas
HIPAA COMPLIANCE. What is HIPAA?
HIPAA COMPLIANCE What is HIPAA? The Health Insurance Portability and Accountability Act (HIPAA) also known as the Privacy Rule specifies the conditions under which protected health information may be used
What is Covered by HIPAA at VCU?
What is Covered by HIPAA at VCU? The Privacy Rule was designed to protect private health information from incidental disclosures. The regulations specifically apply to health care providers, health plans,
Health Insurance Portability & Accountability Act (HIPAA) Compliance Application
Health Insurance Portability & Accountability Act (HIPAA) Compliance Application IRB Office 101 - Altru Psychiatry Center 860 S. Columbia Rd, Grand Forks, North Dakota 58201 Phone: (701) 780-6161 PROJECT
HIPAA-Compliant Research Access to PHI
HIPAA-Compliant Research Access to PHI HIPAA permits the access, disclosure and use of PHI from a HIPAA Covered Entity s or HIPAA Covered Unit s treatment, payment or health care operations records for
Winthrop-University Hospital
Winthrop-University Hospital Use of Patient Information in the Conduct of Research Activities In accordance with 45 CFR 164.512(i), 164.512(a-c) and in connection with the implementation of the HIPAA Compliance
HIPAA OVERVIEW ETSU 1
HIPAA OVERVIEW ETSU 1 What is HIPAA? Health Insurance Portability and Accountability Act. 2 PURPOSE - TITLE II ADMINISTRATIVE SIMPLIFICATION To increase the efficiency and effectiveness of the entire health
What is Covered under the Privacy Rule? Protected Health Information (PHI)
HIPAA & RESEARCH What is Covered under the Privacy Rule? Protected Health Information (PHI) Health information + Identifier = PHI Transmitted or maintained in any form (paper, electronic, forms, web-based,
IRB Application for Medical Records Review Request
Office of Regulatory Research Compliance Institutional Review Board FORM B1 : Medial Records Review Application FORM B1 IRB Application for Medical Records Review Request Principal Investigator: Email:
HIPAA POLICY REGARDING DE-IDENTIFICATION OF PROTECTED HEALTH INFORMATION AND USE OF LIMITED DATA SETS
HIPAA POLICY REGARDING DE-IDENTIFICATION OF PROTECTED HEALTH INFORMATION AND USE OF LIMITED DATA SETS SCOPE OF POLICY: What Units Are Covered by this Policy?: This policy applies to the following units
HIPAA Privacy Board Overview
Defense Health Agency Privacy and Civil Liberties Office HIPAA Privacy Board Overview April 30, 2015 1 Objectives The purpose of this presentation is to: Provide an overview of the DHA Privacy and Civil
Protecting Personal Health Information in Research: Understanding the HIPAA Privacy Rule
AA Privacy RuleP DEPARTMENT OF HE ALTH & HUMAN SERVICES USA Protecting Personal Health Information in Research: Understanding the HIPAA Privacy Rule NIH Publication Number 03-5388 The HI Protecting Personal
How to De-identify Data. Xulei Shirley Liu Department of Biostatistics Vanderbilt University 03/07/2008
How to De-identify Data Xulei Shirley Liu Department of Biostatistics Vanderbilt University 03/07/2008 1 Outline The problem Brief history The solutions Examples with SAS and R code 2 Background The adoption
North Shore LIJ Health System, Inc. Facility Name
North Shore LIJ Health System, Inc. Facility Name POLICY TITLE: The Medical Record POLICY #: 200.10 Approval Date: 2/14/13 Effective Date: Prepared by: Elizabeth Lotito, HIM Project Manager ADMINISTRATIVE
Memorandum. Factual Background
Memorandum TO: FROM: SUBJECT: Chris Ianelli and Jill Mullan, ispecimen, Inc. Kristen Rosati and Ana Christian, Polsinelli, PC ispecimen Regulatory Compliance DATE: January 26, 2014 You have asked us to
Health Insurance Portability and Accountability Policy 1.8.4
Health Insurance Portability and Accountability Policy 1.8.4 Appendix C Uses and Disclosures of PHI Procedures This Appendix covers procedures related to Uses and Disclosures of PHI. Disclosures to Law
HIPAA-G04 Limited Data Set and Data Use Agreement Guidance
HIPAA-G04 Limited Data Set and Data Use Agreement Guidance GUIDANCE CONTENTS Scope Reason for the Guidance Guidance Statement Definitions ADDITIONAL DETAILS Additional Contacts Web Address Forms Related
UPMC POLICY AND PROCEDURE MANUAL
UPMC POLICY AND PROCEDURE MANUAL POLICY: INDEX TITLE: HS-EC1807 Ethics & Compliance SUBJECT: Honest Broker Certification Process Related to the De-identification of Health Information for Research and
HIPAA-P06 Use and Disclosure of De-identified Data and Limited Data Sets
HIPAA-P06 Use and Disclosure of De-identified Data and Limited Data Sets FULL POLICY CONTENTS Scope Policy Statement Reason for Policy Definitions ADDITIONAL DETAILS Web Address Forms Related Information
INDIANA UNIVERSITY SCHOOL OF OPTOMETRY HIPAA COMPLIANCE PLAN TABLE OF CONTENTS. I. Introduction 2. II. Definitions 3
INDIANA UNIVERSITY SCHOOL OF OPTOMETRY HIPAA COMPLIANCE PLAN TABLE OF CONTENTS I. Introduction 2 II. Definitions 3 III. Program Oversight and Responsibilities 4 A. Structure B. Compliance Committee C.
Statement of Policy. Reason for Policy
Table of Contents Statement of Policy 2 Reason for Policy 2 HIPAA Liaison 2 Individuals and Entities Affected by Policy 2 Who Should Know Policy 3 Exclusions 3 Website Address for Policy 3 Definitions
HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT (HIPAA): FACT SHEET FOR NEUROPSYCHOLOGISTS Division 40, American Psychological Association
HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT (HIPAA): FACT SHEET FOR NEUROPSYCHOLOGISTS Division 40, American Psychological Association DISCLAIMER This general information fact sheet is made available
HIPAA. Privacy and Security Frequently Asked Questions for Employers. Gallagher Benefit Services, Inc.
2013 HIPAA Privacy and Security Frequently Asked Questions for Employers Gallagher Benefit Services, Inc. Disclaimer We share this information with our clients and friends for general informational purposes
THE HIPAA PRIVACY RULE AND THE NATIONAL HOSPITAL CARE SURVEY
THE HIPAA PRIVACY RULE AND THE NATIONAL HOSPITAL CARE SURVEY Table of Contents I. Overview... 3 II. Legal Authority for NHCS... 3 III. Requirements of the HIPAA Privacy Rule... 3 IV. Extra Safeguards and
HIPAA Basics for Clinical Research
HIPAA Basics for Clinical Research Audio options: Built-in audio on your computer OR Separate audio dial-in: 415-930-5229 Toll-free: 1-877-309-2074 Access Code: 960-353-248 Audio PIN: Shown after joining
HIPAA and Clinical Research
To Heal. To Teach. To Discover. HIPAA and Clinical Research 2011 Training Jennifer Edlind, UH Privacy Officer Ryan Terry, UH Information Security Officer 1 Agenda Research credentialing overview HIPAA
HIPAA Privacy Rule Primer for the College or University Administrator
HIPAA Privacy Rule Primer for the College or University Administrator On August 14, 2002, the Department of Health and Human Services ( HHS ) issued final medical privacy regulations (the Privacy Rule
Clinician s Guide to HIPAA Privacy. I. Introduction What is HIPAA? Health Information Privacy Protected Health Information
Clinician s Guide to HIPAA Privacy I. Introduction What is HIPAA? Health Information Privacy Protected Health Information II. HIPAA s Impact On Clinical Practice, Treatment, Referrals And Payment How is
Grand Rapids Medical Education Partners Mercy Health Saint Mary s Spectrum Health. Pam Jager, GRMEP Director of Education & Development
Grand Rapids Medical Education Partners Mercy Health Saint Mary s Spectrum Health Pam Jager, GRMEP Director of Education & Development To understand the requirements of the federal Health Information Portability
Standard Operating Procedures for Research Involving Human Subjects
Section I: Introduction v07/2015 Standard Operating Procedures Indiana University and its affiliates are dedicated to protecting the rights and welfare of human participants recruited to participate in
IRB Month Investigator Meeting April 2014
April 2014 AUDITS TRENDS EMR COMPLIANCE PRACTICES EMR FEDERAL REGULATIONS MONITORING REGULATORY SECURITY THREATS ACADEMI CINA BREACHES REVIEW COMPUTING MOBILE CLOUD HIPAA CENTER OPERATION S RESEARCH C
4. No accounting of disclosures is required with respect to disclosures of PHI within a Limited Data Set.
IDAHO STATE UNIVERSITY POLICIES AND PROCEDURES (ISUPP) HIPAA Privacy - Limited Data Sets and Data Use Agreements 10200 POLICY INFORMATION Major Functional Area (MFA): MFA X - Office of General Counsel
YALE UNIVERSITY RESEARCHER S GUIDE TO HIPAA. Health Insurance Portability and Accountability Act of 1996 Handbook
YALE UNIVERSITY RESEARCHER S GUIDE TO HIPAA Health Insurance Portability and Accountability Act of 1996 Handbook Table of Contents I. INTRODUCTION... 2 What is HIPAA?... 2 What is PHI?... 2 II. HIPAA s
A USER S GUIDE TO THE RASCAL HIPAA MODULE
A USER S GUIDE TO THE RASCAL HIPAA MODULE Version: 2.0 Revised: September 2011 Office for HIPAA Compliance 1 P a g e R A S C A L H I P A A G u i d e TABLE OF CONTENTS SUGGESTED USE OF THE MANUAL...3 INTRODUCTION...4
HIPAA 100 Training Manual Table of Contents. V. A Word About Business Associate Agreements 10
HIPAA 100 Training Manual Table of Contents I. Introduction 1 II. Definitions 2 III. Privacy Rule 5 IV. Security Rule 8 V. A Word About Business Associate Agreements 10 CHICAGO DEPARTMENT OF PUBIC HEALTH
IRB, HIPAA, and Clinical Research
IRB, HIPAA, and Clinical Research A presentation by CHS Privacy and Security Offices UAB Institutional Review Board UAB Health System UAB/UABHS HIPAA Operations Team 1 Getting Started HIPAA 2 3 A Quick
UPMC POLICY AND PROCEDURE MANUAL
UPMC POLICY AND PROCEDURE MANUAL POLICY: INDEX TITLE: HS-EC1611 Ethics & Compliance SUBJECT: Use and Disclosure of Protected Health Information (PHI) For Research Purposes Pursuant to the HIPAA Privacy
HIPAA: Open Research Issues Michael L. Blau, Esq. McDermott, Will & Emery
HIPAA: Open Research Issues Michael L. Blau, Esq. McDermott, Will & Emery Research A. General Rules. There are four pathways for covered entities ( CEs ) to obtain permission under the Health Insurance
HIPAA ephi Security Guidance for Researchers
What is ephi? ephi stands for Electronic Protected Health Information (PHI). It is any PHI that is stored, accessed, transmitted or received electronically. 1 PHI under HIPAA means any information that
2013-2014. Johns Hopkins Preferred Lab, Radiology, Ambulatory Surgical Centers and Rehabilitation Centers Directory
2013-2014 Johns Hopkins Preferred Lab, Radiology, Ambulatory Surgical Centers and Rehabilitation Centers Directory Johns Hopkins Employer Health Programs (EHP) For Johns Hopkins Health System Corporation/Johns
Application for an Off-Site Tissue Banking Waiver at a Non-Profit or Academic Institution
Application for an Off-Site Tissue Banking Waiver at a Non-Profit or Academic Institution INSTRUCTIONS This form may be filled in and saved using Adobe Reader version 7.0 or higher. The full version of
Information Privacy and Security Program Title:
1 Page: 1 of 5 I. PURPOSE: 1 The purpose of this standard is to identify and define the standards for implementing contracting provisions related to those individuals and organizations identified as Business
State of Nevada Public Employees Benefits Program. Master Plan Document for the HIPAA Privacy and Security Requirements for PEBP Health Benefits
State of Nevada for the Requirements for PEBP Health Benefits Plan Year 2016 July 1, 2015 June 30, 2016 www.pebp.state.nv.us (775) 684-7000 Or (800) 326-5496 Amendments Amendment Log Any amendments, changes
BUSINESS ASSOCIATE AGREEMENT HIPAA Protected Health Information
BUSINESS ASSOCIATE AGREEMENT HIPAA Protected Health Information I. PREAMBLE ( Covered Entity ) and ( Business Associate ) (jointly the Parties ) wish to enter into an Agreement to comply with the requirements
HIPAA PRIVACY AND EDI RULES
The Health and Human Services (HHS) issued final HIPAA privacy regulations on August 14, 2002. These rules govern how individually identifiable medical information must be protected. HIIPAA also requires
HIPAA SELF STUDY TRAINING GUIDE
HIPAA SELF STUDY TRAINING GUIDE I have received the LifeWays HIPAA SELF STUDY TRAINING GUIDE. I understand that I will be accountable for the information contained in the guide. If I have questions I may
HIPAA Education Level One For Volunteers & Observers
UK HealthCare HIPAA Education Page 1 September 1, 2009 HIPAA Education Level One For Volunteers & Observers ~ What does HIPAA stand for? H Health I Insurance P Portability A And Accountability A - Act
University of Cincinnati Limited HIPAA Glossary
University of Cincinnati Limited HIPAA Glossary ephi System A system that creates accesses, transmits or receives: 1) primary source ephi, 2) ephi critical for treatment, payment or health care operations
Professional Employer Organizations Obligations Under HIPAA A Summary
NAPEO Legal InsightsTM Volume 2, Number 6 November 2009 Professional Employer Organizations Obligations Under HIPAA A Summary Dale R. Vlasek, Esq. Attorney McDonald Hopkins LLC Cleveland, Ohio A PEO is
VENDOR / CONTRACTOR. Privacy Basics
VENDOR / CONTRACTOR Privacy Basics Introduction Premera s mission is to provide our customers with peace of mind about their healthcare. This requires that everyone who works with or for Premera (the Company
HIPAA Handbook for Researchers at UAB
HIPAA Handbook for Researchers at UAB Prepared by the UAB Institutional Review Board for Human Use, UAB Health System Information Services, and the UAB HIPAA Coordinator s Office Date of First Publication:
HIPAA Privacy and Security Rules: A Refresher. Marilyn Freeman, RHIA California Area HIPAA Coordinator California Area HIM Consultant
HIPAA Privacy and Security Rules: A Refresher Marilyn Freeman, RHIA California Area HIPAA Coordinator California Area HIM Consultant Objectives Provide overview of Health insurance Portability and Accountability
CREATIVE SOLUTIONS IN HEALTHCARE, INC. Privacy Policy
CREATIVE SOLUTIONS IN HEALTHCARE, INC. Privacy Policy Amended as of February 12, 2010 on the authority of the HIPAA Privacy Officer for Creative Solutions in Healthcare, Inc. TABLE OF CONTENTS ARTICLE
HIPAA Policies and Procedures
HIPAA Policies and Procedures William T. Chen, MD, Inc. General Rule 164.502 A Covered Entity may not use or disclose PHI except as permitted or required by the privacy regulations. Permitted Disclosures:
De-Identification of Health Data under HIPAA: Regulations and Recent Guidance" " "
De-Identification of Health Data under HIPAA: Regulations and Recent Guidance" " " D even McGraw " Director, Health Privacy Project January 15, 201311 HIPAA Scope Does not cover all health data Applies
BUSINESS ASSOCIATE AND DATA USE AGREEMENT NAME OF COVERED ENTITY: COVERED ENTITY FEIN/TAX ID: COVERED ENTITY ADDRESS:
BUSINESS ASSOCIATE AND DATA USE AGREEMENT NAME OF COVERED ENTITY: COVERED ENTITY FEIN/TAX ID: COVERED ENTITY ADDRESS:, City State Zip This Business Associate and Data Use Agreement ( Agreement ) is effective
Decision Tree: When is a Business Associate Agreement (BAA) Required?
Decision Tree: When is a Business Associate Agreement (BAA) Required? Saint Louis University, a Covered Entity under HIPAA, is required to sign Business Associate Agreements with certain organizations
HIPAA. HIPAA and Group Health Plans
HIPAA HIPAA and Group Health Plans CareFirst BlueCross BlueShield is the business name of CareFirst of Maryland, Inc. and is an independent licensee of the Blue Cross and Blue Shield Association. Registered
HIPAA and Payment Reform ACOs, Medical Home & Bundled Payments
HIPAA and Payment Reform ACOs, Medical Home & Bundled Payments By: Paul T. Smith, Shareholder Hooper, Lundy & Bookman, P.C. [email protected] 21 st National HIPAA Summit Washington, D.C. February 20,
[Insert Name and Address of Data Recipient] Data Use Agreement. Dear :
[Insert Name and Address of Data Recipient] Re: Data Use Agreement Dear : The federal Health Insurance Portability and Accountability Act and the regulations promulgated thereunder (collectively referred
HIPAA PRIVACY FOR EMPLOYERS A Comprehensive Introduction. HIPAA Privacy Regulations-General
HIPAA PRIVACY FOR EMPLOYERS A Comprehensive Introduction HIPAA Privacy Regulations-General The final HIPAA Privacy regulation was released on December 20, 2000 and was effective for compliance on April
HIPAA Compliance for Students
HIPAA Compliance for Students The Health Insurance Portability and Accountability Act (HIPAA) was passed in 1996 by the United States Congress. It s intent was to help people obtain health insurance benefits
BUSINESS ASSOCIATE AGREEMENT
BUSINESS ASSOCIATE AGREEMENT This BUSINESS ASSOCIATE AGREEMENT ( BAA ) is entered into as of ( Effective Date ) by and between ( Covered Entity ) and American Academy of Sleep Medicine ( Business Associate
