Health Insurance Portability & Accountability Act (HIPAA) Compliance Application
|
|
|
- Kathleen Carpenter
- 10 years ago
- Views:
Transcription
1 Health Insurance Portability & Accountability Act (HIPAA) Compliance Application IRB Office Altru Psychiatry Center 860 S. Columbia Rd, Grand Forks, North Dakota Phone: (701) PROJECT TITLE & IRB NUMBER FWA /IRB PRINCIPAL INVESTIGATOR Name (First, Last) Please complete this form if you intend to use/disclose protected health information (PHI) in your research. PHI is health information transmitted or maintained in any form or medium that: identifies or could be used to identify an individual; is created or received by a healthcare provider, health plan, employer, or healthcare clearinghouse; and relates to the past, present, or future physical or mental health or condition of an individual; the provision of healthcare to an individual; or the past, present, or future payment for the provision of healthcare to an individual An investigator may access PHI using one or more of the following methods. Unless otherwise noted, you should complete this entire form as applicable. A. Please check the appropriate box(es) for your specific research. 1. De-identified Information: De-identified Information is health information that cannot be linked to an individual. Research which involves the use of de-identified PHI is exempt from HIPAA requirements. The HIPAA Privacy Rule regulations [45 CFR (b)] lists 18 specific identifiers that must be removed from the health information before the researcher obtains the information for it to be considered not identifiable. The list includes: Name/initials; Street address, city, county, precinct, zip code and equivalent geocodes; All elements of dates (except year) directly related to an individual (date of birth, admission date, discharge date, date of death); Elements of date, including year, for persons 90 or older; Telephone number; Fax number; Electronic mail address; Social Security Number; Medical record numbers; Health plan identification numbers; Account numbers Certificate/license numbers; Vehicle identifiers and serial numbers, including license plate numbers; Device identifiers and serial numbers; Web addresses (URLs); Internet IP addresses; Biometric identifiers, including finger and voice prints; Full face photographic images and any comparable images; Any other unique identifying number, characteristic or code. If the research does not include access to any of the above identifiers, sign the certification at the bottom of the page. The HIPAA privacy regulations do not apply and you are not required to complete the rest of the application. (Sign and this section only if the research involves De-Identified Information) I certify the PHI received or reviewed by research personnel for the research referenced above does not include any of the identifiers listed above. Principal Investigator Signature 1
2 2. Limited Data Set: A limited data set is a subset of information (PHI) that only contains the following identifiers linked to the subject: city, state, zip code, or elements of date such as date of birth, death or service. The other specific identifiers included in the list above may not be included in the health information that is being received by the research team. The use of a Limited Data Set requires a Data Use Agreement to be in place. The Data Use Agreement is a legal contract between the covered entity and the recipient. 3. Patient Authorization: A patient authorization is a document, signed by the subject that gives the researcher permission to use/disclose PHI collected during the research study for defined purposes. An Authorization Form needs to be prepared in addition to the Informed Consent Document. The authorization information may also be addressed in the consent form. Please prepare the Authorization Form and submit it with your IRB application. 4. Waiver/Alteration: A waiver/alteration is a request to forgo the authorization requirement based on the fact that the use and/or disclosure of PHI involves minimal risk to the subject s privacy and the research cannot be practically done without this waiver/alteration and access to/use of PHI. Refer to Section H to see if you may qualify for a waiver/alteration. Please designate if a waiver is being sought for initial recruitment purposes or for the entire research protocol. Once a waiver of Authorization is granted, contact your source of PHI (i.e. Health Information Management) to ensure that you follow the accounting procedures established as required by the Privacy Rule. Per the Privacy Rule, the covered entity must receive documentation of the waiver/alteration before PHI can be used or disclosed for the research. The categories listed below are additional opportunities allowed under the HIPAA Privacy Rule to view/record PHI without prior individual authorization. 5. Reviews Preparatory to Research: Preparatory work is when PHI is reviewed for the purpose of designing a research study or identifying potential subjects. No information may be removed from the records. 6. Research on Decedent s Information: Decedent research is when PHI is collected from deceased (prior to the study) patients/subject s records. B. Provide a description of the Protected Health Information (PHI) to be used or disclosed for your research: C. Source and Data Collection 1. Indicate your sources of health information: Data containing no health information* Physician/clinic records Lab, pathology and/or radiology results Biological samples Interviews/Questionnaires Hospital/medical records (in and out patient) Psychotherapy Notes Data previously collected for research purposes Billing records Other (describe below) *If the research does not include PHI, the HIPAA Privacy Rule regulations do not apply to this research study and you do not need to finish this form. Please be sure to note on your initial review protocol application that the research does not include PHI. 2
3 2. Indicate how the research team will access and/or receive health information: With limited identifiers: ZIP codes, geocodes, dates of birth, or other dates only. The study qualifies as a Limited Data Set and requires a Data Use Agreement. With a code that can be linked to the identity of the subject.* The research includes PHI because the research team will have health information with identifiers. With unrestricted identifiers. * *Requires Consent and Authorization from the subject or a Waiver of Consent and Waiver of Authorization from the IRB. 3. Indicate how the research team will record health information: Without any direct or indirect identifiers as a de-identified data set With limited identifiers: ZIP codes, geocodes, dates of birth, or other dates only. With a code that can be linked to the identity of the subject. With unrestricted identifiers D. Summary: Briefly summarize the collection, use and sharing of PHI for this research study. E. Recruitment: Please mark all that apply: 1. PI/collaborators will recruit his/her/their own patients. 2. PI will send an IRB approved letter to colleagues asking for referrals of eligible patients. The treating physician will make initial patient contact. If the patient is interested, the patient will contact the PI. 3. PI will send an IRB approved letter to colleagues asking the physician to send out IRB approved general Dear Patient letters describing the research study. The PI may draft the letter with the treating physicians signature, but may not have access to the patient names or addresses for mailing. If the PI wants the letters to be personalized (Dear Mr. Doe), the personal information would have to be entered by the treating physician. 4. Advertisements/media. All recruitment materials must have IRB approval. 5. The PI requests an initial Waiver of Authorization for the purpose of identifying subjects for recruitment purposes including (with permission of the patient) the treating physician will invite the PI/research team to talk with the patient about enrollment. Be sure and complete section H. 6. Other, please specify: F. PHI Sharing: 1. Indicate who may receive PHI during the course of the research study. Statistician Colleagues (s) / Collaborators Other Research Laboratory (s) Study Data Coordinating Center Other. please specify: Consultants Data, Tissue, Specimen Registry(s) Sponsor / Funding Agency Publication (s) 3
4 2. Indicate how the data will be shared or disclosed. Without any identifiers. With a linked code*. With identifiers*. As a Limited Data Set*. * In this format, Authorization must specifically note who data will be shared or disclosed to. G. Data Security: Describe how the data will be secured. Please mark all that apply. 1. Electronic data: secure network password access coded, with a master list secured and kept separately other (specify): 2. Hardcopy data: locked suite locked office locked file cabinet data coded by PI or research team with a master list secured and kept separately. data de-identified by PI or research team other: (specify) H. Waiver/Alteration of Authorization [Complete this section to request a waiver of authorization for the entire research protocol, for recruitment purposes, or to request an alteration of authorization process such as no signed documentation]. 1. Describe the protected health information (PHI) for which use, access, or disclosure is necessary. Include a detailed list of the PHI and also a list of the sources. 2. Criteria for Waiver/Alteration of Authorization: A. Explain how the use and disclosure of the information presents no more than minimal risk to the privacy of the individual. B. Describe the plan to protect the identifiers from improper use and disclosure (i.e., where will the identifiers will be stored and who will have access). C. Describe the plan to destroy the identifiers at the earliest opportunity consistent with the conduct of the research. If there is a health or research justification for retaining identifiers or if such retention is required by law, please provide this information as well. D. Explain why the research could not be practicably conducted without the alteration or waiver. E. Explain why the research could not be conducted without access to and use of the PHI. 4
5 F. The Privacy Rule requires that when a waiver is granted that only the minimum necessary health information be used/disclosed. Therefore, provide justification that the PHI being requested is the minimum necessary information reasonably necessary to accomplish objectives of the proposed research. STOP Continue to Section I Altru IRB determined that this waiver request satisfies all of the requirements of the HIPAA Privacy Rule in 45 CFR (i)(2)). The proposed research activity will present no more than minimal risk to the privacy of the human subjects. There is an adequate plan to protect the patient identifiers from improper use and disclosure. There is an adequate plan to destroy the patient identifiers at the earliest opportunity and/or by the end of the research study, or there is a health, research or legal justification for retaining the patient identifiers. There are adequate assurances that the requested information will not be reused or disclosed to any other person ore entity, except as required by law, for authorized oversight of this research study, or for other research for which the use or disclosure of the requested information would be permitted by the Privacy Rule. The research could not be practicably conducted without the Waiver for Patient Authorization to access and use the requested PHI. The approval process was conducted by normal review procedures. Signature of IRB Chair or Member I. HIPAA Privacy Rule Assurance The information listed in the application is accurate and all research staff (investigators, key research personnel) that are involved in the research will comply with the HIPAA regulations. I assure that the information obtained as part of this research (including protected health information) will not be reused or disclosed to any other person or entity other than those identified on this form, except as required by law. If at any time I want to reuse this information for other purposes or disclose the information to other individuals or entities I will seek approval by the Altru IRB. Principal Investigator Signature Version date 1/2007 Revised dated 9/2008-2/ /2012 5
HIPAA COMPLIANCE. What is HIPAA?
HIPAA COMPLIANCE What is HIPAA? The Health Insurance Portability and Accountability Act (HIPAA) also known as the Privacy Rule specifies the conditions under which protected health information may be used
HIPAA COMPLIANCE INFORMATION. HIPAA Policy
HIPAA COMPLIANCE INFORMATION HIPAA Policy Use of Protected Health Information for Research Policy University of North Texas Health Science Center at Fort Worth Applicability: All University of North Texas
HIPAA-Compliant Research Access to PHI
HIPAA-Compliant Research Access to PHI HIPAA permits the access, disclosure and use of PHI from a HIPAA Covered Entity s or HIPAA Covered Unit s treatment, payment or health care operations records for
Winthrop-University Hospital
Winthrop-University Hospital Use of Patient Information in the Conduct of Research Activities In accordance with 45 CFR 164.512(i), 164.512(a-c) and in connection with the implementation of the HIPAA Compliance
What is Covered by HIPAA at VCU?
What is Covered by HIPAA at VCU? The Privacy Rule was designed to protect private health information from incidental disclosures. The regulations specifically apply to health care providers, health plans,
What is Covered under the Privacy Rule? Protected Health Information (PHI)
HIPAA & RESEARCH What is Covered under the Privacy Rule? Protected Health Information (PHI) Health information + Identifier = PHI Transmitted or maintained in any form (paper, electronic, forms, web-based,
HIPAA OVERVIEW ETSU 1
HIPAA OVERVIEW ETSU 1 What is HIPAA? Health Insurance Portability and Accountability Act. 2 PURPOSE - TITLE II ADMINISTRATIVE SIMPLIFICATION To increase the efficiency and effectiveness of the entire health
IRB Application for Medical Records Review Request
Office of Regulatory Research Compliance Institutional Review Board FORM B1 : Medial Records Review Application FORM B1 IRB Application for Medical Records Review Request Principal Investigator: Email:
HIPAA POLICY REGARDING DE-IDENTIFICATION OF PROTECTED HEALTH INFORMATION AND USE OF LIMITED DATA SETS
HIPAA POLICY REGARDING DE-IDENTIFICATION OF PROTECTED HEALTH INFORMATION AND USE OF LIMITED DATA SETS SCOPE OF POLICY: What Units Are Covered by this Policy?: This policy applies to the following units
Memorandum. Factual Background
Memorandum TO: FROM: SUBJECT: Chris Ianelli and Jill Mullan, ispecimen, Inc. Kristen Rosati and Ana Christian, Polsinelli, PC ispecimen Regulatory Compliance DATE: January 26, 2014 You have asked us to
UPMC POLICY AND PROCEDURE MANUAL
UPMC POLICY AND PROCEDURE MANUAL POLICY: INDEX TITLE: HS-EC1807 Ethics & Compliance SUBJECT: Honest Broker Certification Process Related to the De-identification of Health Information for Research and
Statement of Policy. Reason for Policy
Table of Contents Statement of Policy 2 Reason for Policy 2 HIPAA Liaison 2 Individuals and Entities Affected by Policy 2 Who Should Know Policy 3 Exclusions 3 Website Address for Policy 3 Definitions
Health Insurance Portability and Accountability Policy 1.8.4
Health Insurance Portability and Accountability Policy 1.8.4 Appendix C Uses and Disclosures of PHI Procedures This Appendix covers procedures related to Uses and Disclosures of PHI. Disclosures to Law
PROTECTED HEALTH INFORMATION AND THE JHSPH
PROTECTED HEALTH INFORMATION AND THE JHSPH The Health Insurance Portability and Accountability Act (HIPAA) protects individually identifiable health information, or Protected Health Information ( PHI ),
HIPAA-G04 Limited Data Set and Data Use Agreement Guidance
HIPAA-G04 Limited Data Set and Data Use Agreement Guidance GUIDANCE CONTENTS Scope Reason for the Guidance Guidance Statement Definitions ADDITIONAL DETAILS Additional Contacts Web Address Forms Related
North Shore LIJ Health System, Inc. Facility Name
North Shore LIJ Health System, Inc. Facility Name POLICY TITLE: The Medical Record POLICY #: 200.10 Approval Date: 2/14/13 Effective Date: Prepared by: Elizabeth Lotito, HIM Project Manager ADMINISTRATIVE
A. HIPAA Privacy Authorizations and Exceptions for Use of Identifiable Protected Health Information
Protected Health Information and the JHSPH The Health Insurance Portability and Accountability Act (HIPAA) protects individually identifiable health information, or Protected Health Information ( PHI ),
How to De-identify Data. Xulei Shirley Liu Department of Biostatistics Vanderbilt University 03/07/2008
How to De-identify Data Xulei Shirley Liu Department of Biostatistics Vanderbilt University 03/07/2008 1 Outline The problem Brief history The solutions Examples with SAS and R code 2 Background The adoption
HIPAA-P06 Use and Disclosure of De-identified Data and Limited Data Sets
HIPAA-P06 Use and Disclosure of De-identified Data and Limited Data Sets FULL POLICY CONTENTS Scope Policy Statement Reason for Policy Definitions ADDITIONAL DETAILS Web Address Forms Related Information
Protecting Personal Health Information in Research: Understanding the HIPAA Privacy Rule
AA Privacy RuleP DEPARTMENT OF HE ALTH & HUMAN SERVICES USA Protecting Personal Health Information in Research: Understanding the HIPAA Privacy Rule NIH Publication Number 03-5388 The HI Protecting Personal
De-Identification of Health Data under HIPAA: Regulations and Recent Guidance" " "
De-Identification of Health Data under HIPAA: Regulations and Recent Guidance" " " D even McGraw " Director, Health Privacy Project January 15, 201311 HIPAA Scope Does not cover all health data Applies
HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT (HIPAA): FACT SHEET FOR NEUROPSYCHOLOGISTS Division 40, American Psychological Association
HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT (HIPAA): FACT SHEET FOR NEUROPSYCHOLOGISTS Division 40, American Psychological Association DISCLAIMER This general information fact sheet is made available
4. No accounting of disclosures is required with respect to disclosures of PHI within a Limited Data Set.
IDAHO STATE UNIVERSITY POLICIES AND PROCEDURES (ISUPP) HIPAA Privacy - Limited Data Sets and Data Use Agreements 10200 POLICY INFORMATION Major Functional Area (MFA): MFA X - Office of General Counsel
Standard Operating Procedures for Research Involving Human Subjects
Section I: Introduction v07/2015 Standard Operating Procedures Indiana University and its affiliates are dedicated to protecting the rights and welfare of human participants recruited to participate in
YALE UNIVERSITY RESEARCHER S GUIDE TO HIPAA. Health Insurance Portability and Accountability Act of 1996 Handbook
YALE UNIVERSITY RESEARCHER S GUIDE TO HIPAA Health Insurance Portability and Accountability Act of 1996 Handbook Table of Contents I. INTRODUCTION... 2 What is HIPAA?... 2 What is PHI?... 2 II. HIPAA s
HIPAA 101: Privacy and Security Basics
HIPAA 101: Privacy and Security Basics Purpose This document provides important information about Kaiser Permanente policies and state and federal laws for protecting the privacy and security of individually
INDIANA UNIVERSITY SCHOOL OF OPTOMETRY HIPAA COMPLIANCE PLAN TABLE OF CONTENTS. I. Introduction 2. II. Definitions 3
INDIANA UNIVERSITY SCHOOL OF OPTOMETRY HIPAA COMPLIANCE PLAN TABLE OF CONTENTS I. Introduction 2 II. Definitions 3 III. Program Oversight and Responsibilities 4 A. Structure B. Compliance Committee C.
Everett School Employee Benefit Trust. Reportable Breach Notification Policy HIPAA HITECH Rules and Washington State Law
Everett School Employee Benefit Trust Reportable Breach Notification Policy HIPAA HITECH Rules and Washington State Law Introduction The Everett School Employee Benefit Trust ( Trust ) adopts this policy
Grand Rapids Medical Education Partners Mercy Health Saint Mary s Spectrum Health. Pam Jager, GRMEP Director of Education & Development
Grand Rapids Medical Education Partners Mercy Health Saint Mary s Spectrum Health Pam Jager, GRMEP Director of Education & Development To understand the requirements of the federal Health Information Portability
BUSINESS ASSOCIATE AGREEMENT HIPAA Protected Health Information
BUSINESS ASSOCIATE AGREEMENT HIPAA Protected Health Information I. PREAMBLE ( Covered Entity ) and ( Business Associate ) (jointly the Parties ) wish to enter into an Agreement to comply with the requirements
HIPAA Basics for Clinical Research
HIPAA Basics for Clinical Research Audio options: Built-in audio on your computer OR Separate audio dial-in: 415-930-5229 Toll-free: 1-877-309-2074 Access Code: 960-353-248 Audio PIN: Shown after joining
Application for an Off-Site Tissue Banking Waiver at a Non-Profit or Academic Institution
Application for an Off-Site Tissue Banking Waiver at a Non-Profit or Academic Institution INSTRUCTIONS This form may be filled in and saved using Adobe Reader version 7.0 or higher. The full version of
HIPAA ephi Security Guidance for Researchers
What is ephi? ephi stands for Electronic Protected Health Information (PHI). It is any PHI that is stored, accessed, transmitted or received electronically. 1 PHI under HIPAA means any information that
HIPAA and You The Basics
HIPAA and You The Basics The Purpose of HIPAA Privacy Rules 1. Provide strong federal protections for privacy rights Ensure individual trust in the privacy and security of his or her health information
University of Cincinnati Limited HIPAA Glossary
University of Cincinnati Limited HIPAA Glossary ephi System A system that creates accesses, transmits or receives: 1) primary source ephi, 2) ephi critical for treatment, payment or health care operations
De-Identification of Clinical Data
De-Identification of Clinical Data Sepideh Khosravifar, CISSP Info Security Analyst IV TEPR Conference 2008 Ft. Lauderdale, Florida May 17-21, 2008 1 1 Slide 1 cmw1 Craig M. Winter, 4/25/2008 Background
HIPAA Compliance for Students
HIPAA Compliance for Students The Health Insurance Portability and Accountability Act (HIPAA) was passed in 1996 by the United States Congress. It s intent was to help people obtain health insurance benefits
LA BioMed Secure Email
INFORMATION SYSTEMS LA BioMed Secure Email Los Angeles Biomedical Research Institute at Harbor-UCLA 1124 W Carson St Bldg E2.5 Phone 310.222.1212 Table of Contents Intended Audience... 1 Purpose... 1 When
VENDOR / CONTRACTOR. Privacy Basics
VENDOR / CONTRACTOR Privacy Basics Introduction Premera s mission is to provide our customers with peace of mind about their healthcare. This requires that everyone who works with or for Premera (the Company
A USER S GUIDE TO THE RASCAL HIPAA MODULE
A USER S GUIDE TO THE RASCAL HIPAA MODULE Version: 2.0 Revised: September 2011 Office for HIPAA Compliance 1 P a g e R A S C A L H I P A A G u i d e TABLE OF CONTENTS SUGGESTED USE OF THE MANUAL...3 INTRODUCTION...4
HIPAA 100 Training Manual Table of Contents. V. A Word About Business Associate Agreements 10
HIPAA 100 Training Manual Table of Contents I. Introduction 1 II. Definitions 2 III. Privacy Rule 5 IV. Security Rule 8 V. A Word About Business Associate Agreements 10 CHICAGO DEPARTMENT OF PUBIC HEALTH
Clinician s Guide to HIPAA Privacy. I. Introduction What is HIPAA? Health Information Privacy Protected Health Information
Clinician s Guide to HIPAA Privacy I. Introduction What is HIPAA? Health Information Privacy Protected Health Information II. HIPAA s Impact On Clinical Practice, Treatment, Referrals And Payment How is
IRB Month Investigator Meeting April 2014
April 2014 AUDITS TRENDS EMR COMPLIANCE PRACTICES EMR FEDERAL REGULATIONS MONITORING REGULATORY SECURITY THREATS ACADEMI CINA BREACHES REVIEW COMPUTING MOBILE CLOUD HIPAA CENTER OPERATION S RESEARCH C
UPMC POLICY AND PROCEDURE MANUAL
UPMC POLICY AND PROCEDURE MANUAL POLICY: INDEX TITLE: HS-EC1611 Ethics & Compliance SUBJECT: Use and Disclosure of Protected Health Information (PHI) For Research Purposes Pursuant to the HIPAA Privacy
IRB, HIPAA, and Clinical Research
IRB, HIPAA, and Clinical Research A presentation by CHS Privacy and Security Offices UAB Institutional Review Board UAB Health System UAB/UABHS HIPAA Operations Team 1 Getting Started HIPAA 2 3 A Quick
Information Privacy and Security Program Title:
1 Page: 1 of 5 I. PURPOSE: 1 The purpose of this standard is to identify and define the standards for implementing contracting provisions related to those individuals and organizations identified as Business
Donna S. Sheperis, PhD, LPC, NCC, CCMHC, ACS Sue Sadik, PhD, LPC, NCC, BC-HSP Carl Sheperis, PhD, LPC, NCC, MAC, ACS
Donna S. Sheperis, PhD, LPC, NCC, CCMHC, ACS Sue Sadik, PhD, LPC, NCC, BC-HSP Carl Sheperis, PhD, LPC, NCC, MAC, ACS 1 DISCLAIMER Please review your own documentation with your attorney. This information
PEPPERDINE UNIVERSITY HIPAA Policies Procedures and Forms Manual
PEPPERDINE UNIVERSITY HIPAA Policies Procedures and Forms Manual 1 Table of Contents I. INTRODUCTION... 4 A. GENERAL POLICY... 4 B. SCOPE... 4 II. DEFINITIONS... 5 III. GENERAL POLICIES AND PROCEDURES...
HIPAA SELF STUDY TRAINING GUIDE
HIPAA SELF STUDY TRAINING GUIDE I have received the LifeWays HIPAA SELF STUDY TRAINING GUIDE. I understand that I will be accountable for the information contained in the guide. If I have questions I may
Background, Definitions, and Requirements for Protecting VA Research Information
Appendix A Background, Definitions, and Requirements for Protecting VA Research Information 1. Additional Background. The ability of investigators to conduct research within the Department of Veterans
HIPAA Privacy Board Overview
Defense Health Agency Privacy and Civil Liberties Office HIPAA Privacy Board Overview April 30, 2015 1 Objectives The purpose of this presentation is to: Provide an overview of the DHA Privacy and Civil
State of Nevada Public Employees Benefits Program. Master Plan Document for the HIPAA Privacy and Security Requirements for PEBP Health Benefits
State of Nevada for the Requirements for PEBP Health Benefits Plan Year 2016 July 1, 2015 June 30, 2016 www.pebp.state.nv.us (775) 684-7000 Or (800) 326-5496 Amendments Amendment Log Any amendments, changes
[Insert Name and Address of Data Recipient] Data Use Agreement. Dear :
[Insert Name and Address of Data Recipient] Re: Data Use Agreement Dear : The federal Health Insurance Portability and Accountability Act and the regulations promulgated thereunder (collectively referred
HIPAA Privacy and Security Rules: A Refresher. Marilyn Freeman, RHIA California Area HIPAA Coordinator California Area HIM Consultant
HIPAA Privacy and Security Rules: A Refresher Marilyn Freeman, RHIA California Area HIPAA Coordinator California Area HIM Consultant Objectives Provide overview of Health insurance Portability and Accountability
Malpractice Issues for the Radiologic Technologist
Malpractice Issues for the Radiologic Technologist Carol Ann Marunich, Esquire Dinsmore & Shohl LLP 215 Don Knotts Boulevard, Suite 310 Morgantown, West Virginia 26501 304-296-1100 X44 2006 Dinsmore &
HIPAA: Open Research Issues Michael L. Blau, Esq. McDermott, Will & Emery
HIPAA: Open Research Issues Michael L. Blau, Esq. McDermott, Will & Emery Research A. General Rules. There are four pathways for covered entities ( CEs ) to obtain permission under the Health Insurance
HIPAA Employee Training Guide. Revision Date: April 11, 2015
HIPAA Employee Training Guide Revision Date: April 11, 2015 What is HIPAA? The Health Insurance Portability and Accountability Act of 1996 (also known as Kennedy- Kassebaum Act ). HIPAA regulations address
8/3/2015. Integrating Behavioral Health and HIV Into Electronic Health Records Communities of Practice
Integrating Behavioral Health and HIV Into Electronic Health Records Communities of Practice Monday, August 3, 2015 1 How to ask a question during the webinar If you dialed in to this webinar on your phone
ColumbiaDoctors, the Physicians and Surgeons of Columbia University define the health record as follows:
Definition ColumbiaDoctors, the Physicians and Surgeons of Columbia University define the health record as follows: A hybrid health record for patients seen in the private practice setting that includes
The Health and Benefit Trust Fund of the International Union of Operating Engineers Local Union No. 94-94A-94B, AFL-CIO. Notice of Privacy Practices
The Health and Benefit Trust Fund of the International Union of Operating Section 1: Purpose of This Notice Notice of Privacy Practices Effective as of September 23, 2013 THIS NOTICE DESCRIBES HOW MEDICAL
BUSINESS ASSOCIATE AGREEMENT BETWEEN LEWIS & CLARK COLLEGE AND ALLEGIANCE BENEFIT PLAN MANAGEMENT, INC. I. PREAMBLE
BUSINESS ASSOCIATE AGREEMENT BETWEEN LEWIS & CLARK COLLEGE AND ALLEGIANCE BENEFIT PLAN MANAGEMENT, INC. I. PREAMBLE Lewis & Clark College and Allegiance Benefit Plan Management, Inc., (jointly the Parties
HIPAA Privacy Rule Primer for the College or University Administrator
HIPAA Privacy Rule Primer for the College or University Administrator On August 14, 2002, the Department of Health and Human Services ( HHS ) issued final medical privacy regulations (the Privacy Rule
HIPAA and Clinical Research
To Heal. To Teach. To Discover. HIPAA and Clinical Research 2011 Training Jennifer Edlind, UH Privacy Officer Ryan Terry, UH Information Security Officer 1 Agenda Research credentialing overview HIPAA
Legal Insight. Big Data Analytics Under HIPAA. Kevin Coy and Neil W. Hoffman, Ph.D. Applicability of HIPAA
Big Data Analytics Under HIPAA Kevin Coy and Neil W. Hoffman, Ph.D. Privacy laws and regulations such as the Health Insurance Portability and Accountability Act (HIPAA) Privacy Rule can have a significant
Business Associate Agreement
Business Associate Agreement This Agreement is entered into as of ("Effective Date"), between ( Covered Entity ), and ( Business Associate ). RECITALS WHEREAS, Business Associate provides services on behalf
Computer Security Incident Response Plan. Date of Approval: 23- FEB- 2015
Name of Approver: Mary Ann Blair Date of Approval: 23- FEB- 2015 Date of Review: 22- FEB- 2015 Effective Date: 23- FEB- 2015 Name of Reviewer: John Lerchey Table of Contents Table of Contents... 2 Introduction...
RESEARCH INVOLVING DATA AND/OR BIOLOGICAL SPECIMENS
RESEARCH INVOLVING DATA AND/OR BIOLOGICAL SPECIMENS 1. Overview IRB approval and participant informed consent are required to collect biological specimens for research purposes. Similarly, IRB approval
