Hello and welcome. I am here to discuss the Health

Size: px
Start display at page:

Download "Hello and welcome. I am here to discuss the Health"

Transcription

1 The University of Texas at Austin University Compliance Services Hello and welcome. I am here to discuss the Health Insurance Portability and Accountability Act (HIPAA) and the conforming Texas Law (Texas Health & Safety Code, Chapter 181) which strengthens HIPAA and makes it applicable to more areas of The University of Texas at Austin. 1

2 General HIPAA Privacy Training is an introductory course designed to educate the University of Texas at Austin personnel regarding regulations related to the Health Insurance Portability and Accountability Act (HIPAA). 2

3 This course has been designed to provide you with an understanding of the Privacy Regulations of the Health Portability and Accountability Act of 1996 (HIPAA) as well as the conforming Texas Law (Texas Health & Safety Code, Chapter 181) and their impact on UT Austin and its employees. Our goal in this course is to: Provide you with an overview of the HIPAA requirements on maintaining the privacy and confidentiality of Protected Health Information (PHI) Enable you to begin thinking about how the HIPAA rules may affect your work routine; and Explain how you and UT Austin may be fined for violating HIPAA rules. 3

4 After successfully completing this course, you will be able to: Understand what the HIPAA Privacy Regulations are and what they do; Know who the Privacy Regulations apply to and when you must be in compliance; Know what constitutes PHI and what this term means; and, Understand the penalties for failure to comply with the Privacy Regulations. 4

5 The University of Texas at Austin University Compliance Services Sept HIPAA, the Health Insurance Portability and Accountability Act of 1996, was passed to simplify claims processing and payment in the health care industry. Congress delegated to the Department of Health and Human Services (DHHS) the responsibility of establishing mandatory privacy and security standards to comply with the requirements of the federal law. In response, DHHS has issued federal regulations for: Simplifying of payment transactions, known as Electronic Data Interchange (EDI); Security; and Privacy. 5

6 HIPAA is one of the most far reaching pieces of federal health care legislation ever enacted... HIPAA affects: Health Plans, Health Care Clearinghouses, Health Care Providers that transmit health information in an electronic form (i.e. covered entities ); Business Associates of covered entities; and Employers (self-funded f d groups). 6

7 HIPAA also affects other entities that come into possession of health information, such as universities. These entities are called hybrid entities. The University of Texas at Austin is a hybrid entity and the University and its employees must comply with HIPAA. 7

8 Texas Law ( 181) affects: Any person who for commercial, financial or professional gain, monetary fees, or dues, or on a cooperative, nonprofit, or pro bono basis, engages, in whole or in part, and with real or constructive knowledge, in the practice of assembling, collecting, analyzing, using, evaluating, storing, or transmitting protected t health information. The term includes a business associate, health care payer, governmental unit, information or computer management entity, school, health researcher, health care facility, clinic, health care provider, or person who maintains an Internet site. All of the above processes would make an entity a Covered Entity under Texas Law ( 181). 8

9 Protected health information (PHI) means individually identifiable health information: Transmitted by electronic media; Maintained in electronic media; or Transmitted or maintained in any other form or medium. (paper, oral) Protected health information excludes individually identifiable health information in: Education records covered by the Family Educational Rights and Privacy Act (FERPA); and Employment records held by a covered entity in its role as an employer, such as HRS records showing an employee s ADA status. 9

10 Regardless of where you work in the University, it s important to understand what privacy and confidentiality mean when protecting personal health information. PHI is identifiable health information transmitted or maintained in any form or medium, including oral, written, and electronic communications. Persons have the right to control who has access to their PHI. PHI is private and limited to those who need the information for treatment, payment, and healthcare operations. Only those people who are authorized to use and disclose PHI will have access to PHI. Disclosures should be limited to the Minimum Necessary for the recipient to do the job. For example, if a physician is treating a patient for a current broken ankle, University Health Services shouldn t release records on the patient s measles last year. Hospitals, healthcare organizations and universities have always upheld strict privacy and confidentiality policies. However, in response to situations in which private medical information has ended up in the wrong hands, the U.S. government has strengthened the laws protecting privacy and confidentiality. 10

11 The HIPAA Privacy Regulations were written in response to patient concerns that their medical information was not being protected. The following factors led to the creation of HIPAA Privacy Regulations: - The increased use of electronic information technology; - Advances in genetic research and availability of individuals genetic information; and, - Increased efforts to market health care products to consumers. Government representatives especially wanted to address the issue of electronic data transmissions. The Department of Health and Human Services ended up creating the Privacy Regulations with the permission of the legislative bodies. 11

12 What objectives do the Privacy Regulations accomplish? They give people more control over their health information. They set boundaries on the use and disclosure of health records. They establish appropriate p safeguards that all people who participate in or are associated with the provision of healthcare must achieve to protect the privacy of health information. They hold violators accountable, with civil and criminal penalties that can be imposed if they violate people s privacy rights. They strike a balance when public responsibility requires disclosure of some forms of data for example, to protect public health. 12

13 How does HIPAA achieve these objectives? The Privacy Regulations prohibit UT Austin and its employees from using or disclosing an individual s PHI without an authorization from the individual, unless the use or disclosure of PHI is for Treatment, Payment, Healthcare Operations, or in other specialized and limited situations. ti Additionally, UT Austin must investigate violations, sanction wrongful conduct, and make process changes when required. 13

14 Why is confidentiality important? People have a right to control who will see their medical information. Trust is an essential part of our work. Health information is among the most sensitive data collected on individuals. 14

15 A person has the right to receive a notice of UT Austin s privacy practices. In order to satisfy the HIPAA regulations UT Austin must: Make available its notice of privacy practices to all persons whose PHI The University maintains. Provide the notice prior to the treatment of the patient, or their participation in a study, or other program. UT Austin must obtain a written acknowledgment of the person s receipt of the Notice of Privacy Practices. UT Austin is only required to provide the Notice of Privacy Practices to the person one time. The written acknowledgement must be obtained once after April 14, For emergency situations, UT Austin personnel must provide the notice and obtain the person s signature as soon as it is practical to do so. This means UT Austin must obtain a signature from the person as evidence the person received a copy of the notice or document that t the person refused to sign and why. These individuals will also be required to document the receipt of the notice or refusal in our records. 15

16 Under the privacy regulations, UT Austin and its employees may use and disclose PHI for: - Treatment, - Payment, - Healthcare operations, - Certain permitted uses or disclosures, or - As required by law. However, if UT Austin or UT Austin employees have been asked to release PHI for any other reason than those above, the person must complete UT Austin s Authorization for the Use and Disclosure of PHI by UT Austin. This form must be maintained in our records. People also have the right to revoke their authorization at any time and UT Austin can no longer rely upon the authorization to release information. 16

17 HIPAA allows people the limited ability to control the use and disclosure of their PHI. People can request a restriction of uses and disclosures or confidential communications. Requests for restrictions or confidential communications must be retained in our records. The following is an example of restrictions of uses and disclosures. A person knows that her sister-in-law works in the speech and language clinic where the patient has an appointment. The patient may request that the sister-in-law not have any access to her medical record or information. For confidential communications a person can request that UT Austin not call him or her at home or a patient may request, on a per visit basis, that test results, etc., be sent to a different address. 17

18 HIPAA assures people the right to access their PHI (for inspection or copying). Guidelines for granting a person s request for PHI include the following: A person may request a copy of his or her medical records, except for psychotherapy notes. A reasonable charge for this service is allowed by law. 18

19 HIPAA allows people the right to request amendment, or an addendum to, their medical record. Any change to a medical record requires the approval of the physician and/or institution and may be denied. For example: A person may disagree with what is in his/her medical record and request that the information be amended. d The physician/researcher asked to make the amendment may refuse to do so, but must review the request. If the physician/researcher agrees to make the amendment, no changes are made to the original record. Instead, an amendment page is added to the record. 19

20 HIPAA allows people the right to receive an accounting of disclosures of their PHI that have been made within the previous six years (other than those made for treatment, payment or healthcare operations or as a result of an authorization). Records of each disclosure for purposes other than treatment, t t payment, or health care operation must be kept so that this information is available to the person upon request. If you disclose PHI for purposes other that treatment, payment of health care operations, you must record the disclosure. 20

21 HIPAA guarantees a person the right to file a privacy complaint at any time. A person or employee may file a complaint by contacting the Office of Institutional Compliance at (512) or may file an anonymous report by calling (877) You may also file a complaint with the Institutional Privacy Officer, Jeff Graves, at (512) Contact information for the Privacy Officer is available on the HIPAA page of the Institutional Compliance website. After a complaint has been filed, a formal investigation will take place. 21

22 Printers and copiers used for printing of PHI should be in secure, non-public locations. If the equipment is in a public location, the information being printed or copied is required to be strictly monitored. Printed versions of PHI must not be left unattended and open to compromise. PHI printed to a shared printer must be promptly removed. Remember, PHI is very personal health information and should be treated as such. 22

23 At UT Austin, the responsibility to protect the confidentiality and integrity of protected health information is a shared responsibility by staff, faculty, volunteers, students, administrators, business associates, and others. This responsibility has always been a part of the UT Austin culture. Not only is it required by law, professional ethics, and accreditation requirements; but it is the responsible thing to do. 23

24 These kinds of privacy breaches have led to new Federal Regulations: In the introduction to new Federal standards governing the confidentiality and disclosure of health information, the Department of Health and Human Services (DHHS) cited a number of examples of privacy breaches that have occurred within healthcare organizations. These are the kinds of breaches that led to new Federal regulations governing the privacy of health information. The health insurance claims forms of thousands of patients blew out of a truck on its way to a recycling center in East Hartford, Connecticut. A Michigan-based health center accidentally posted the medical records of thousands of patients on the Internet. A Nevada woman who purchased a used computer discovered that the computer still contained the prescription records of the customers of the pharmacy that had previously owned the computer. A banker who also sat on a county health board gained access to patients records and identified several people with cancer and called in their mortgages. These examples of deliberate and accidental disclosures of information underscore the importance of establishing and maintaining effective processes for handling patient information. Source: Pew Internet & American Life Project

25 PHI includes any paper or electronic file which contains personally identifiable health information. One of the largest issues at UT Austin is the amount of stored paper PHI we maintain. Security measures, to safeguard stored PHI in files, documents, letters, invoices, etc. should be established. Some of these measures include: Ensuring that doors to storage rooms are locked, Assisting departments in establishing procedures to control access to rooms or file cabinets where PHI is stored, and Adding physical security measures such as doors, locks, etc. to ensure that PHI is safeguarded. 25

26 Outside of regular working hours, keep your desk and work area clean and be sure to keep any PHI locked in filing cabinets, unless the immediate area can be secured from unauthorized access. When not in use, PHI must always be protected from unauthorized access. When left in an unattended room, such information must be appropriately secured. If PHI is stored on diskettes, CD-ROM or other removable data storage media, it cannot be combined with other electronic information. Stored PHI must be stored separately from non- PHI data. PHI stored in medical equipment (e.g. EKG, Ultrasound, etc.) must be kept secure and disposed of correctly. HIPAA regulations require PHI documents be retained for a minimum of six years. 26

27 An end-of-day checklist is a great way to remember the steps necessary to secure your work area before you head out the door. Even airline pilots would not consider leaving the cockpit without their shut down checklist. It s the smart way to ensure your work area is PHI secure. Check around your work area for files, notes, records, documents, CDs, diskettes, etc. which may contain PHI. Secure files containing PHI through the following methods: lock it in a filing cabinet lock the door to your office, and lock the storage room. Check the printer, fax, copy machine, and meeting room to be sure no PHI has been unintentionally left. Check for post-it notes, phone messages, or reminders of things to do which contain PHI and place in a locked cabinet. Lock up your Day Timer, calendar, or scheduling book if entries have been made which contain PHI. Make sure there is no PHI accidentally discarded in the waste basket. Secure your computer by requiring password access. (Never share your password with anyone. You are personally responsible for the usage and access attributed to your password.) Check things you are taking home to make sure you haven t accidentally picked up a file containing PHI. 27

28 All personnel must strictly observe the following standards relating to disposal of PHI. Paper or hardcopy PHI must not be discarded in trash bins. Instead, this information must be personally shredded or placed in a secured recycle bag or recycle bin. Printed material containing PHI shall be disposed of in a manner that ensures confidentiality. If paper records containing PHI are in your possession, it is your responsibility to make sure they are discarded properly. 28

29 Electronic files containing PHI can create a potential breach in the HIPAA privacy rule if they are not properly removed or deleted. A privacy breach can occur if the device is sold or transferred to another department and the PHI remains on the hard drive. Fortunately, if the device is updated and maintained through normal UT Austin channels, the IT personnel will wipe the hard drive of its contents prior to returning it to the leasing depot. However, if you are using your own laptop or a device not obtained through normal UT Austin channels, you are personally responsible for managing the content t on that t device and should use a wipe utility to remove any old files prior to selling or passing your computer along to a family member or friend. 29

30 UT Austin should protect the facsimile (fax) transmittal of PHI and hold individuals responsible for following the proper procedure when PHI is sent via facsimile. Personnel must make reasonable efforts to ensure that they send the fax transmission to the correct destination including: Preprogramming frequently used numbers into the machine to prevent misdialing errors. Periodically and/or randomly checking all speed-dial numbers to ensure their currency, validity, accuracy, and authorization to receive confidential information. For a new recipient, the sender must verify the fax number by requesting the recipient submit a faxed or request for PHI, which would include the fax number of the recipient. Periodically reminding those who are frequent recipients of PHI to notify UT Austin if their fax number is to change. When faxing PHI, UT Austin personnel must use an official UT Austin Fax Cover Sheet. 30

31 Manage PHI received via fax as confidential. Fax machines used for PHI shall not be located in areas accessible to the general public but rather must be in secure areas, and the department director or designee is responsible for limiting access to them. Each department is responsible for ensuring the incoming faxes are properly handled. Immediately remove the fax transmission from the fax machine and deliver it to the recipient. 31

32 PDAs, Palms, and other Portable Electronic Devices pose a significant security risk because they may contain confidential patient information and are portable. As a result, they are more at risk for loss, theft, or other unauthorized access. Keep the following guidelines in mind when using a PDA that contains PHI: Don t leave your PDA unattended unless it is locked up. Keep your PDA in its proper carrying case when transporting it from location to location. Don t let anyone else use the PDA for any purpose, including your family and/or associates, patients, patient families, or unauthorized employees or agents of UT Austin. Password protect and secure your PDA. Immediately report any lost, damaged, malfunctioning, or stolen equipment or any breach of security to the Information Privacy Officer. To the extent possible, PDAs must have virus protection software installed and operational and you must update the virus protection software regularly. 32

33 Sending containing PHI requires special consideration and safeguards. For example: ing of PHI is only allowed within your department. containing PHI must be treated confidentially. When using , UT Austin faculty and employees must limit the information transmitted to the minimum necessary to meet the requester s needs and use de-identified PHI whenever applicable. All employees should frequently review the policy, because the policy may be subject to change based on pending federal regulations. 33

34 If you witness activity that you believe is improper regarding PHI privacy, you should report such activity to the UT Austin Office of Institutional Compliance or the Institutional Privacy Officer. You may contact the Institutional Compliance Office by either calling the direct number or by anonymously reporting the activity through the Fraud/Abuse and Privacy Hotline. The phone number to the Office of Institutional Compliance is (512) The phone number to the Fraud/Abuse and Privacy Hotline is (877) The phone number for Jeff Graves, the Institutional Privacy Officer, is (512) Contact information is on the HIPAA page of the Institutional Compliance website. 34

35 Once the Office of Institutional Compliance or Institutional Privacy Officer receives a complaint, it will be reviewed and any and all required actions will be taken to fully investigate the matter. Information gathered through the Office of Institutional Compliance or the Institutional Privacy Officer investigation shall remain confidential to the extent necessary to comply with UT Austin s policies and procedures. Any privacy-related complaint made by a patient, faculty member, employee, student, or volunteer at anytime must be forwarded to the Office of Institutional Compliance or Institutional Privacy Officer. 35

36 No UT Austin employee shall intimidate, coerce, or threaten any person when that person reveals, in good faith, and through the proper channels, action that the person believes is improper. UT Austin s non-retaliation policy ensures that all employees shall be allowed to freely discuss and raise questions to managers or to the appropriate personnel about situations they feel are in violation of federal and state law, UT Austin and UT System policy, and/or accreditation and regulatory requirements. Note: The Office of Institutional Compliance will review any allegation of retaliation and assure that a proper investigation is conducted as appropriate. Anyone found to have retaliated against an employee or patient will be subject to adverse employment action, up to, and including, termination. 36

37 UT Austin has a duty to mitigate privacy violations of the University s policies and procedures, and state and federal privacy laws. One aspect of mitigation includes UT Austin s privacy rules. 37

38 Mitigation may include, but is not limited to, the following: Retraining of employees who violate UT Austin s policies, procedures, and mission; Taking operational and procedural corrective measures; Taking employment actions to retrain, reprimand, or discipline employees as necessary, up to and including termination; Addressing problems with business associates; Incorporating mitigation solutions into the University s HOPPM (Handbook of Operating Procedures and Policy Memoranda) policies; Addressing faculty, staff, volunteer and student violations. 38

39 There are large civil and criminal penalties for failure to comply with HIPAA. These penalties apply to individual employees, as well as UT Austin as an institution. Criminal Penalties (based on criminal intent: knew better, but did it anyway) Civil fines (based on negligence: accident & situations where you should have known better) $100 per violation/day, up to $25,000 per violation/year $50,000 plus up to 1 year imprisonment for a knowing violation $100, plus up to 5 years imprisonment for an offense under false pretenses $250,000 plus up to 19 years imprisonment for an offense with the intent to profit, gain, or harm Exclusion from the Medicare provider list 39

40 Failure to comply with HIPAA also violates UT Austin policies. Any employee who violates these policies may be subject to disciplinary action. In addition to HIPAA s civil and criminal penalties, violations of HIPAA may lead to UT Austin disciplinary action including: Verbal warnings Written warnings Suspension Termination 40

41 Now that we have defined HIPAA and its objectives, let s take a look as some everyday examples of privacy violations. Dr. Too Loud is a popular professor in Clinical Psychology. Dr. Loud s boisterous personality, however, tends to penetrate through the walls of the office. On one occasion, he was talking to a colleague over the phone and described d Mrs. Jones PHI in detail. This conversation was heard by everyone down the hall. Another day, he was heard in the cafeteria talking to Mr. Smith, a patient, about his condition. Dr. Loud has created verbal violations of the HIPAA rules in both of these examples. He probably bl has no idea how his voice carries from his office to the other rooms. What should you do if you work with someone like Dr. Loud? If you suspect a verbal violation is taking place, alert the person to the fact that their voice carries and that others can hear what is being said, or notify your immediate supervisor. HIPAA compliance is a team effort. Unintentional violations can be easily avoided with a heightened sense of awareness. 41

42 A new faculty member has fully embraced technology because she received a Palm pilot as a Ph.D. graduation present. Dr. Technology has been hot-synching/downloading her Palm pilot to her computer at home. She has never questioned this practice because one of her buddies who is a professor in the Department of Communication Sciences and Disorders views records on his home computer all the time. Dr. Technology decides to upgrade her home computer and donates her old home computer to her church. However, Dr. Technology does not know that information regarding her patients has been circulating through the church administrative offices and Bible study groups because Dr. Technology did not remove the information from her home computer prior to donating it. 42

43 Ms. O. So Helpful has worked for University Health Services for over ten years and is considered a highly valued employee. She seems to know exactly what the doctors need, even before they ask. It s her job to keep things moving smoothly and to avoid delays if possible. She neatly places each patient s medical record at the counter for the doctor to pick up as he enters the room. She also places a Post-it note on top of each chart alerting the doctor as to the reason for the visit. These charts are in plain view of other patients who are paying out and scheduling appointments at the counter. Ms. O. So Helpful s good intentions are creating an environment of written violations. Any patient or even a delivery person could read a patient s personal medical history while waiting at the counter. What should you do if you observe this type of activity? The best approach is to talk to your immediate supervisor and allow them to work with Ms. O. So Helpful to come up with an alternative approach. Or, if you have a good rapport with Ms. Helpful, you could alert her to the violation and suggest a strategy session at the next staff meeting for alternative solutions. Whichever course you choose, the behavior must stop immediately. Again, HIPAA compliance is everyone s responsibility. 43

44 This concludes our presentation on General HIPAA Privacy Training. Just review the questions at the back of this book and answer all questions to receive credit for the training. 44

General Compliance. General Compliance Training. Course Overview. General Compliance. The intent of the Compliance Program is to:

General Compliance. General Compliance Training. Course Overview. General Compliance. The intent of the Compliance Program is to: General Compliance Training General Compliance Training i The University of Texas Medical Branch at Galveston Course Overview General Compliance The intent of the Compliance Program is to: Promote compliance

More information

HIPAA Orientation. Health Insurance Portability and Accountability Act

HIPAA Orientation. Health Insurance Portability and Accountability Act HIPAA Orientation Health Insurance Portability and Accountability Act HIPAA Federal legislation enacted in 1996 to improve the efficiency and effectiveness of electronic information transfers used in the

More information

Department of Health and Human Services Policy ADMN 004, Attachment A

Department of Health and Human Services Policy ADMN 004, Attachment A WASHINGTON COUNTY Department of Health and Human Services Policy ADMN 004, Attachment A HHS Confidentiality Agreement Including HIPAA (Health Information Portability and Accessibility Act of 1996) OREGON

More information

HIPAA and Privacy Policy Training

HIPAA and Privacy Policy Training HIPAA and Privacy Policy Training July 2015 1 This training addresses the requirements for maintaining the privacy of confidential information received from HFS and DHS (the Agencies). During this training

More information

Reporting of HIPAA Privacy/Security Breaches. The Breach Notification Rule

Reporting of HIPAA Privacy/Security Breaches. The Breach Notification Rule Reporting of HIPAA Privacy/Security Breaches The Breach Notification Rule Objectives What is the HITECH Act? An overview-what is Protected Health Information (PHI) and can I protect patient s PHI? What

More information

PHI- Protected Health Information

PHI- Protected Health Information HIPAA Policy 2014 The Health Insurance Portability and Accountability Act is a federal law that protects the privacy and security of patients health information and grants certain rights to patients. Clarkson

More information

ACRONYMS: HIPAA: Health Insurance Portability and Accountability Act PHI: Protected Health Information

ACRONYMS: HIPAA: Health Insurance Portability and Accountability Act PHI: Protected Health Information NAMI EASTSIDE - 13 POLICY: Privacy and Security of Protected Health Information (HIPAA Policies and Procedures) DATE APPROVED: Pending INTENT: (At present, none of the activities that NAMI Eastside provides

More information

HIPAA Education Level One For Volunteers & Observers

HIPAA Education Level One For Volunteers & Observers UK HealthCare HIPAA Education Page 1 September 1, 2009 HIPAA Education Level One For Volunteers & Observers ~ What does HIPAA stand for? H Health I Insurance P Portability A And Accountability A - Act

More information

Health Insurance Portability and Accountability Act of 1996 (HIPAA) Contents

Health Insurance Portability and Accountability Act of 1996 (HIPAA) Contents Health Insurance Portability and Accountability Act of 1996 (HIPAA) Contents Health Insurance Portability and Accountability Act of 1996 (HIPAA)... 1 Welcome to HIPAA Awareness Training Content... 3 HIPAA

More information

HIPAA Privacy & Security Training for Clinicians

HIPAA Privacy & Security Training for Clinicians HIPAA Privacy & Security Training for Clinicians Agenda This training will cover the following information: Overview of Privacy Rule and Security Rules Using and disclosing Protected Health Information

More information

Whitefish School District. PERSONNEL 5510 page 1 of 5 HIPAA

Whitefish School District. PERSONNEL 5510 page 1 of 5 HIPAA Whitefish School District R PERSONNEL 5510 page 1 of 5 HIPAA Note: (1) Any school district offering a group health care plan for its employees is affected by HIPAA. School districts offering health plans

More information

HIPAA PRIVACY AND SECURITY AWARENESS

HIPAA PRIVACY AND SECURITY AWARENESS HIPAA PRIVACY AND SECURITY AWARENESS Introduction The Health Insurance Portability and Accountability Act (known as HIPAA) was enacted by Congress in 1996. HIPAA serves three main purposes: To protect

More information

HIPAA Training for Staff and Volunteers

HIPAA Training for Staff and Volunteers HIPAA Training for Staff and Volunteers Objectives Explain the purpose of the HIPAA privacy, security and breach notification regulations Name three patient privacy rights Discuss what you can do to help

More information

By the end of this course you will demonstrate:

By the end of this course you will demonstrate: 1 By the end of this course you will demonstrate: 1. that HIPAA privacy rules protect privacy and security of confidential information. 2. your responsibility for use and protection of protected health

More information

Patient Privacy and HIPAA/HITECH

Patient Privacy and HIPAA/HITECH Patient Privacy and HIPAA/HITECH What is HIPAA? Health Insurance Portability and Accountability Act of 1996 Implemented in 2003 Title II Administrative Simplification It s a federal law HIPAA is mandatory,

More information

Guadalupe Regional Medical Center

Guadalupe Regional Medical Center Guadalupe Regional Medical Center Health Insurance Portability & Accountability Act (HIPAA) By Debby Hernandez, Compliance/HIPAA Officer HIPAA Privacy & Security Training Module 1 This module will address

More information

HIPAA Compliance. 2013 Annual Mandatory Education

HIPAA Compliance. 2013 Annual Mandatory Education HIPAA Compliance 2013 Annual Mandatory Education What is HIPAA? Health Insurance Portability and Accountability Act Federal Law enacted in 1996 that mandates adoption of Privacy protections for health

More information

The Basics of HIPAA Privacy and Security and HITECH

The Basics of HIPAA Privacy and Security and HITECH The Basics of HIPAA Privacy and Security and HITECH Protecting Patient Privacy Disclaimer The content of this webinar is to introduce the principles associated with HIPAA and HITECH regulations and is

More information

THE HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT (HIPAA) EMPLOYEE TRAINING MANUAL

THE HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT (HIPAA) EMPLOYEE TRAINING MANUAL THE HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT (HIPAA) EMPLOYEE TRAINING MANUAL What is HIPAA? Comprehensive federal legislation regarding health insurance which is comprised of four key areas:

More information

HIPAA Training for Hospice Staff and Volunteers

HIPAA Training for Hospice Staff and Volunteers HIPAA Training for Hospice Staff and Volunteers Hospice Education Network Objectives Explain the purpose of the HIPAA privacy and security regulations Name three patient privacy rights Discuss what you

More information

Healthcare Compliance and Hybrid Entity Designation

Healthcare Compliance and Hybrid Entity Designation [New OP initial posting 8/28/14] Operating Policy and Procedure : Healthcare Compliance and Hybrid Entity Designation DATE: August 28, 2014 PURPOSE: The purpose of this Texas Tech Operating Policy and

More information

PROTECTING PATIENT PRIVACY and INFORMATION SECURITY

PROTECTING PATIENT PRIVACY and INFORMATION SECURITY PROTECTING PATIENT PRIVACY and INFORMATION SECURITY 2 PROTECTING PATIENT PRIVACY AND INFORMATION SECURITY PROTECTING PATIENT PRIVACY AND INFORMATION SECURITY 3 INTRODUCTION As an agency employee, student,

More information

Health Insurance Portability and Accountability Act (HIPAA)

Health Insurance Portability and Accountability Act (HIPAA) Health Insurance Portability and Accountability Act (HIPAA) General Education Presented by: Bureau of Personnel Department of Health Department of Human Services Department of Social Services Bureau of

More information

2014 Core Training 1

2014 Core Training 1 2014 Core Training 1 Course Agenda Review of Key Privacy Laws/Regulations: Federal HIPAA/HITECH regulations State privacy laws Privacy & Security Policies & Procedures Huntsville Hospital Health System

More information

SELF-LEARNING MODULE (SLM) 2012 HIPAA Education Privacy Basics and Intermediate Modules

SELF-LEARNING MODULE (SLM) 2012 HIPAA Education Privacy Basics and Intermediate Modules SELF-LEARNING MODULE (SLM) 2012 HIPAA Education Privacy Basics and Intermediate Modules Page 2 Index Privacy 101 and Intermediate Privacy Self-Learning Module 2012 HIPAA Education 3 Instructions Index

More information

HEALTH INSURANCE PORTABILITY & ACCOUNTABILITY ACT OF 1996 HIPAA

HEALTH INSURANCE PORTABILITY & ACCOUNTABILITY ACT OF 1996 HIPAA TRAINING MANUAL HEALTH INSURANCE PORTABILITY & ACCOUNTABILITY ACT OF 1996 HIPAA Table of Contents INTRODUCTION 3 What is HIPAA? Privacy Security Transactions and Code Sets What is covered ADMINISTRATIVE

More information

HIPAA. Developed by The University of Texas at Dallas Callier Center for Communication Disorders

HIPAA. Developed by The University of Texas at Dallas Callier Center for Communication Disorders HIPAA Developed by The University of Texas at Dallas Callier Center for Communication Disorders Purpose of this training Everyone with access to Protected Health Information (PHI) must comply with HIPAA

More information

Why Lawyers? Why Now?

Why Lawyers? Why Now? TODAY S PRESENTERS Why Lawyers? Why Now? New HIPAA regulations go into effect September 23, 2013 Expands HIPAA safeguarding and breach liabilities for business associates (BAs) Lawyer is considered a business

More information

TABLE OF CONTENTS. University of Northern Colorado

TABLE OF CONTENTS. University of Northern Colorado TABLE OF CONTENTS University of Northern Colorado HIPAA Policies and Procedures Page # Development and Maintenance of HIPAA Policies and Procedures... 1 Procedures for Updating HIPAA Policies and Procedures...

More information

HIPAA Privacy & Security Rules

HIPAA Privacy & Security Rules HIPAA Privacy & Security Rules HITECH Act Applicability If you are part of any of the HIPAA Affected Areas, this training is required under the IU HIPAA Privacy and Security Compliance Plan pursuant to

More information

HIPAA Security Training Manual

HIPAA Security Training Manual HIPAA Security Training Manual The final HIPAA Security Rule for Montrose Memorial Hospital went into effect in February 2005. The Security Rule includes 3 categories of compliance; Administrative Safeguards,

More information

Clinical Solutions. 2 Hour CEU

Clinical Solutions. 2 Hour CEU 1 2 Hour CEU 2 Course Objectives The purpose of this program is to provide nurses with information about the Health Insurance Portability and Accountability Act (HIPAA), especially as it relates to protected

More information

Gaston County HIPAA Manual

Gaston County HIPAA Manual Gaston County HIPAA Manual Includes Gaston County IT Manual Action Date Reviewed and Revised December 2012 Gaston County HIPAA Policy Manual has be updated and combined with the Gaston County IT Manual.

More information

Understanding Health Insurance Portability Accountability Act AND HITECH. HIPAA s Privacy Rule

Understanding Health Insurance Portability Accountability Act AND HITECH. HIPAA s Privacy Rule Understanding Health Insurance Portability Accountability Act AND HITECH HIPAA s Privacy Rule 1 What Is HIPAA s Privacy Rule The privacy rule is a component of the Health Insurance Portability and Accountability

More information

Health Insurance Portability and Accountability Act HIPAA Privacy Standards

Health Insurance Portability and Accountability Act HIPAA Privacy Standards Health Insurance Portability and Accountability Act HIPAA Privacy Standards Healthcare Provider Training Module Copyright 2003 University of California Click the arrow to start the YouTube video in a separate

More information

HIPAA Employee Training Guide. Revision Date: April 11, 2015

HIPAA Employee Training Guide. Revision Date: April 11, 2015 HIPAA Employee Training Guide Revision Date: April 11, 2015 What is HIPAA? The Health Insurance Portability and Accountability Act of 1996 (also known as Kennedy- Kassebaum Act ). HIPAA regulations address

More information

Alliance for Clinical Education (ACE) Student HIPAA Training

Alliance for Clinical Education (ACE) Student HIPAA Training Alliance for Clinical Education (ACE) Student HIPAA Training Health Insurance Portability and Accountability Act of 1996 October 2003 1 Objectives Understand the HIPAA Privacy rules and regulations Understand

More information

Health Insurance Portability and Accountability Act (HIPAA) Overview

Health Insurance Portability and Accountability Act (HIPAA) Overview Health Insurance Portability and Accountability Act (HIPAA) Overview Agency, Contract and Temporary Staff Orientation Initiated: 5/04, Reviewed: 7/10, Revised: 10/10 Prepared by SHS Administration & Samaritan

More information

MCCP Online Orientation

MCCP Online Orientation Objectives At the conclusion of this presentation, students will be able to: Describe the federal requirements of the HIPAA/HITECH regulations that protect the privacy and security of confidential data.

More information

HIPAA Self-Study Module Patient Privacy at Unity Health Care, Inc hipaa@unityhealthcare.org 202-667-0016 - HIPAA Hotline

HIPAA Self-Study Module Patient Privacy at Unity Health Care, Inc hipaa@unityhealthcare.org 202-667-0016 - HIPAA Hotline HIPAA Self-Study Module Patient Privacy at Unity Health Care, Inc hipaa@unityhealthcare.org 202-667-0016 - HIPAA Hotline Self-Study Module Requirements Read all program slides and complete test. Complete

More information

Privacy Compliance Health Occupations Students

Privacy Compliance Health Occupations Students Privacy Compliance Health Occupations Students Health Occupations Students The information in this power point is the same information provided to new SCHS caregivers at their orientation. We cannot stress

More information

8.03 Health Insurance Portability and Accountability Act (HIPAA)

8.03 Health Insurance Portability and Accountability Act (HIPAA) Human Resource/Miscellaneous Page 1 of 5 8.03 Health Insurance Portability and Accountability Act (HIPAA) Policy: It is the policy of Licking/Knox Goodwill Industries, Inc., to maintain the privacy of

More information

Annual Compliance Training. HITECH/HIPAA Refresher

Annual Compliance Training. HITECH/HIPAA Refresher Annual Compliance Training HITECH/HIPAA Refresher January 2015 Sisters of Charity of Leavenworth Health System, Inc. All rights reserved. 1 Annual Refresher Training Welcome to the SCL Health System Compliance

More information

CREATIVE SOLUTIONS IN HEALTHCARE, INC. Privacy Policy

CREATIVE SOLUTIONS IN HEALTHCARE, INC. Privacy Policy CREATIVE SOLUTIONS IN HEALTHCARE, INC. Privacy Policy Amended as of February 12, 2010 on the authority of the HIPAA Privacy Officer for Creative Solutions in Healthcare, Inc. TABLE OF CONTENTS ARTICLE

More information

Pacific Medical Centers HIPAA Training for Residents, Fellows and Others

Pacific Medical Centers HIPAA Training for Residents, Fellows and Others Pacific Medical Centers HIPAA Training for Residents, Fellows and Others Summary of Critical Pacific Medical Centers (PMC) HIPAA Policies and Procedures For additional information or questions, please

More information

HIPAA 101: Privacy and Security Basics

HIPAA 101: Privacy and Security Basics HIPAA 101: Privacy and Security Basics Purpose This document provides important information about Kaiser Permanente policies and state and federal laws for protecting the privacy and security of individually

More information

HIPAA TRAINING. A training course for Shiawassee County Community Mental Health Authority Employees

HIPAA TRAINING. A training course for Shiawassee County Community Mental Health Authority Employees HIPAA TRAINING A training course for Shiawassee County Community Mental Health Authority Employees WHAT IS HIPAA? HIPAA is an acronym that stands for Health Insurance Portability and Accountability Act.

More information

HIPAA (Health Insurance Portability and Accountability Act of 1996) Stetson University HIPAA Training

HIPAA (Health Insurance Portability and Accountability Act of 1996) Stetson University HIPAA Training HIPAA (Health Insurance Portability and Accountability Act of 1996) Stetson University HIPAA Training Objectives of this Training l To help you understand: l What HIPAA privacy rule is l Why it is important

More information

HIPAA: Privacy/Info Security

HIPAA: Privacy/Info Security HIPAA: Privacy/Info Security Jeff Jones HIPAA Privacy Officer HIPAA Information Security Officer KY Region What you should know Discussion Topics Protected Health Security Awareness Information(PHI) Disclosure

More information

Health Information Privacy Refresher Training. March 2013

Health Information Privacy Refresher Training. March 2013 Health Information Privacy Refresher Training March 2013 1 Disclosure There are no significant or relevant financial relationships to disclose. 2 Topics for Today State health information privacy law Federal

More information

HIPAA Privacy. September 21, 2013

HIPAA Privacy. September 21, 2013 HIPAA Privacy September 21, 2013 HIPAA Privacy Workforce Training The Health Insurance Portability & Accountability Act (HIPAA) requires that the University train all workforce members (faculty, staff,

More information

HIPPA Goes HITECH. Data Protection for Agents

HIPPA Goes HITECH. Data Protection for Agents HIPPA Goes HITECH Data Protection for Agents For agent information only. this material should not be distributed to the public or used in any solicitation. 13-0127 Course objectives Agents will be able

More information

SCHOOL DISTRICT OF BLACK RIVER FALLS HIPAA PRIVACY AND SECURITY POLICY

SCHOOL DISTRICT OF BLACK RIVER FALLS HIPAA PRIVACY AND SECURITY POLICY SCHOOL DISTRICT OF BLACK RIVER FALLS HIPAA PRIVACY AND SECURITY POLICY School Board Policy 523.5 The School District of Black River Falls ( District ) is committed to compliance with the health information

More information

Compliance Training for Medicare Programs Version 1.0 2/22/2013

Compliance Training for Medicare Programs Version 1.0 2/22/2013 Compliance Training for Medicare Programs Version 1.0 2/22/2013 Independence Blue Cross is an independent licensee of the Blue Cross and Blue Shield Association. 1 The Compliance Program Setting standards

More information

HIPAA Awareness Training

HIPAA Awareness Training New York State Office of Mental Health Bureau of Education and Workforce Development HIPAA Awareness Training This training material was prepared for internal use by the New York State Office of Mental

More information

MONTSERRAT COLLEGE OF ART WRITTEN INFORMATION SECURITY POLICY (WISP)

MONTSERRAT COLLEGE OF ART WRITTEN INFORMATION SECURITY POLICY (WISP) MONTSERRAT COLLEGE OF ART WRITTEN INFORMATION SECURITY POLICY (WISP) 201 CMR 17.00 Standards for the Protection of Personal Information Of Residents of the Commonwealth of Massachusetts Revised April 28,

More information

HIPAA PRIVACY AND SECURITY AWARENESS. Covering Kids and Families of Indiana April 10, 2014

HIPAA PRIVACY AND SECURITY AWARENESS. Covering Kids and Families of Indiana April 10, 2014 HIPAA PRIVACY AND SECURITY AWARENESS Covering Kids and Families of Indiana April 10, 2014 GOALS AND OBJECTIVES The goal is to provide information to you to promote personal responsibility and behaviors

More information

HIPAA and You The Basics

HIPAA and You The Basics HIPAA and You The Basics The Purpose of HIPAA Privacy Rules 1. Provide strong federal protections for privacy rights Ensure individual trust in the privacy and security of his or her health information

More information

GLENN COUNTY HEALTH AND HUMAN SERVICES AGENCY. HIPAA Policies and Procedures 06/30/2014

GLENN COUNTY HEALTH AND HUMAN SERVICES AGENCY. HIPAA Policies and Procedures 06/30/2014 GLENN COUNTY HEALTH AND HUMAN SERVICES AGENCY HIPAA Policies and Procedures 06/30/2014 Glenn County Health and Human Services Agency HIPAA Policies and Procedures TABLE OF CONTENTS HIPAA Policy Number

More information

Table of Contents INTRODUCTION AND PURPOSE 1

Table of Contents INTRODUCTION AND PURPOSE 1 HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT OF 1996 ( HIPAA ) COMPLIANCE PROGRAM Adopted December 2008: Revised February 2009, May, 2012, and August 2013 Table of Contents INTRODUCTION AND PURPOSE

More information

Are You Still HIPAA Compliant? Staying Protected in the Wake of the Omnibus Final Rule Click to edit Master title style.

Are You Still HIPAA Compliant? Staying Protected in the Wake of the Omnibus Final Rule Click to edit Master title style. Are You Still HIPAA Compliant? Staying Protected in the Wake of the Omnibus Final Rule Click to edit Master title style March 27, 2013 www.mcguirewoods.com Introductions Holly Carnell McGuireWoods LLP

More information

HIPAA Privacy and Security. Rochelle Steimel, HIPAA Privacy Official Judy Smith, Staff Development January 2012

HIPAA Privacy and Security. Rochelle Steimel, HIPAA Privacy Official Judy Smith, Staff Development January 2012 HIPAA Privacy and Security Rochelle Steimel, HIPAA Privacy Official Judy Smith, Staff Development January 2012 Goals and Objectives Course Goal: To introduce the staff of Munson Healthcare to the concepts

More information

HIPAA Privacy Keys to Success Updated January 2010

HIPAA Privacy Keys to Success Updated January 2010 HIPAA Privacy Keys to Success Updated January 2010 HIPAA Job Specific Education 1 HIPAA and Its Purpose What is HIPAA? Health Insurance Portability and Accountability Act of 1996 Title II Administrative

More information

Introduction to HIPAA Privacy

Introduction to HIPAA Privacy Introduction to HIPAA Privacy is published by HCPro, Inc. Copyright 2003 HCPro, Inc. All rights reserved. Printed in the United States of America. No part of this publication may be reproduced, in any

More information

HIPAA Auditing Tool. Department: Site Location: Visit Date:

HIPAA Auditing Tool. Department: Site Location: Visit Date: HIPAA Auditing Tool Department: Site Location: Visit Date: Auditor: Staff Interviewed: Notice of Privacy Practice 164.520(c) A covered entity must make the notice required by this section available on

More information

Protecting Privacy & Security in the Health Care Setting

Protecting Privacy & Security in the Health Care Setting 2013 Compliance Training for Contractors and Vendors Module 3 Protecting Privacy & Security in the Health Care Setting For Internal Training Purposes Only. After completing this training, learners will

More information

About this Tool Information Security for Residents...

About this Tool Information Security for Residents... About this Tool Information Security for Residents... Purpose: Provide materials to inform and educate Residents in order to reach compliance regarding information security. Audience: New Residents Information

More information

Health Insurance Portability and Accountability Act of 1996 (HIPAA)

Health Insurance Portability and Accountability Act of 1996 (HIPAA) HIPAA Privacy Rule Health Insurance Portability and Accountability Act of 1996 (HIPAA) Transactions Standards 1. Health claims 2. Health claim attachments 3. Healthcare payment and remittance advice 4.

More information

Privacy Training for Harvard Medical Students

Privacy Training for Harvard Medical Students HIPAA Training: i Ensuring Privacy for our Patients Privacy Training for Harvard Medical Students Goals By the end of this program you will be able to Explain the basic principles of the Privacy Rule Understand

More information

Privacy & Security Standards to Protect Patient Information

Privacy & Security Standards to Protect Patient Information Privacy & Security Standards to Protect Patient Information Health Insurance Portability & Accountability Act (HIPAA) 12/16/10 Topics An An Introduction to to HIPAA HIPAA Patient Rights Rights Routine

More information

ACCOUNTABLE HEALTHCARE IPA HIPAA PRIVACY AND SECURITY TRAINING. By: Jerry Jackson Compliance and Privacy Officer

ACCOUNTABLE HEALTHCARE IPA HIPAA PRIVACY AND SECURITY TRAINING. By: Jerry Jackson Compliance and Privacy Officer ACCOUNTABLE HEALTHCARE IPA HIPAA PRIVACY AND SECURITY TRAINING By: Jerry Jackson Compliance and Privacy Officer 1 1 Introduction Welcome to Privacy and Security Training course. This course will help you

More information

HIPAA COMPLIANCE PLAN. For. CHARLES RETINA INSTITUTE (Practice Name)

HIPAA COMPLIANCE PLAN. For. CHARLES RETINA INSTITUTE (Practice Name) HIPAA COMPLIANCE PLAN For CHARLES RETINA INSTITUTE (Practice Name) Date of Adoption 1/02/2003 Review/Update 10/25/2012 Review/Update 4/01/2014 I. COMPLIANCE PLAN A. Introduction This HIPAA Compliance Plan

More information

HIPAA Employee Compliance Program TRAINING MANUAL

HIPAA Employee Compliance Program TRAINING MANUAL HIPAA Employee Compliance Program TRAINING MANUAL Training Manual to Assist Employees in HIPAA Compliance January 2013 Program For HIPAA Compliance Plan Goal The purpose of this manual is to instruct our

More information

HIPAA Privacy & Breach Notification Training for System Administration Business Associates

HIPAA Privacy & Breach Notification Training for System Administration Business Associates HIPAA Privacy & Breach Notification Training for System Administration Business Associates Barbara M. Holthaus privacyofficer@utsystem.edu Office of General Counsel University of Texas System April 10,

More information

EAA Policy for Accepting and Handling Credit and Debit Card Payments ( Policy )

EAA Policy for Accepting and Handling Credit and Debit Card Payments ( Policy ) EAA Policy for Accepting and Handling Credit and Debit Card Payments ( Policy ) Background Due to increased threat of identity theft, fraudulent credit card activity and other instances where cardholder

More information

Privacy and Security For Managers

Privacy and Security For Managers Privacy and Security For Managers This self directed learning module contains information all CHS Teammates are expected to know in order to protect our patients, our guests, and ourselves. Target Audience:

More information

Privacy and Information Security Awareness Training. Health Insurance Portability & Accountability Act of 1996 -- HIPAA

Privacy and Information Security Awareness Training. Health Insurance Portability & Accountability Act of 1996 -- HIPAA Privacy and Information Security Awareness Training Health Insurance Portability & Accountability Act of 1996 -- HIPAA Objectives Understand basic HIPAA requirements Understand how the MCG Health System

More information

Donna S. Sheperis, PhD, LPC, NCC, CCMHC, ACS Sue Sadik, PhD, LPC, NCC, BC-HSP Carl Sheperis, PhD, LPC, NCC, MAC, ACS

Donna S. Sheperis, PhD, LPC, NCC, CCMHC, ACS Sue Sadik, PhD, LPC, NCC, BC-HSP Carl Sheperis, PhD, LPC, NCC, MAC, ACS Donna S. Sheperis, PhD, LPC, NCC, CCMHC, ACS Sue Sadik, PhD, LPC, NCC, BC-HSP Carl Sheperis, PhD, LPC, NCC, MAC, ACS 1 DISCLAIMER Please review your own documentation with your attorney. This information

More information

HIPAA PRIVACY SELF-STUDY MATERIALS

HIPAA PRIVACY SELF-STUDY MATERIALS HIPAA PRIVACY SELF-STUDY MATERIALS This self-study packet serves as a review of important Health Insurance Portability and Accountability Act (HIPAA) requirements. Many of these requirements are included

More information

HIPAA Privacy Overview

HIPAA Privacy Overview May 21, 2003 HIPAA Privacy Overview Presented to the California State University Agenda Introduction HIPAA privacy regulations HIPAA privacy impact on CSU Next steps/action items Mercer Human Resource

More information

SARASOTA COUNTY GOVERNMENT EMPLOYEE MEDICAL BENEFIT PLAN HIPAA PRIVACY POLICY

SARASOTA COUNTY GOVERNMENT EMPLOYEE MEDICAL BENEFIT PLAN HIPAA PRIVACY POLICY SARASOTA COUNTY GOVERNMENT EMPLOYEE MEDICAL BENEFIT PLAN HIPAA PRIVACY POLICY Purpose: The following privacy policy is adopted to ensure that the Sarasota County Government Employee Medical Benefit Plan

More information

EASTERN OKLAHOMA STATE COLLEGE ACCEPTING AND HANDLING CREDIT AND DEBIT CARD PAYMENTS POLICIES AND PROCEDURES

EASTERN OKLAHOMA STATE COLLEGE ACCEPTING AND HANDLING CREDIT AND DEBIT CARD PAYMENTS POLICIES AND PROCEDURES EASTERN OKLAHOMA STATE COLLEGE ACCEPTING AND HANDLING CREDIT AND DEBIT CARD PAYMENTS POLICIES AND PROCEDURES This document describes Eastern Oklahoma State College s policy and procedures for the proper

More information

HIPAA Privacy Overview

HIPAA Privacy Overview HIPAA Privacy Overview General HIPAA stands for a federal law called the Health Insurance Portability and Accountability Act. This law, among other purposes, was created to protect the privacy and security

More information

Protecting Patient Privacy It s Everyone s Responsibility

Protecting Patient Privacy It s Everyone s Responsibility Protecting Patient Privacy It s Everyone s Responsibility Observation & Student Learning Packet 1. Read packet Instructions for Self-Study Module 2. Complete post-test. A score of 80% must be achieved.

More information

HIPAA PRIVACY POLICIES & PROCEDURES. Department of Behavioral Health and Developmental Services DBHHDS GENERAL AWARENESS TRAINING

HIPAA PRIVACY POLICIES & PROCEDURES. Department of Behavioral Health and Developmental Services DBHHDS GENERAL AWARENESS TRAINING HIPAA PRIVACY POLICIES & PROCEDURES Department of Behavioral Health and Developmental Services DBHHDS GENERAL AWARENESS TRAINING March 2012 HIPAA Humor (North Dakota Dept of Health) 2 HIPAA-Ectomy - the

More information

12/19/2014. HIPAA More Important Than You Realize. Administrative Simplification Privacy Rule Security Rule

12/19/2014. HIPAA More Important Than You Realize. Administrative Simplification Privacy Rule Security Rule HIPAA More Important Than You Realize J. Ira Bedenbaugh Consulting Shareholder February 20, 2015 This material was used by Elliott Davis Decosimo during an oral presentation; it is not a complete record

More information

HIPAA CHECKLISTS DEVELOPING YOUR HIPAA DOCUMENTS PRACTICAL TOOLS AND RESOURCES. MASSACHUSETTS MEDICAL SOCIETY Getting Ready for

HIPAA CHECKLISTS DEVELOPING YOUR HIPAA DOCUMENTS PRACTICAL TOOLS AND RESOURCES. MASSACHUSETTS MEDICAL SOCIETY Getting Ready for MASSACHUSETTS MEDICAL SOCIETY Getting Ready for HIPAA BASIC ELEMENTS FOR COMPLIANCE WITH THE PRIVACY REGULATIONS CHECKLISTS Assess and Begin Your HIPAA Compliance Efforts DEVELOPING YOUR HIPAA DOCUMENTS

More information

Louisiana Department of Health and Hospitals Basic HIPAA Privacy Training: Policies and Procedures

Louisiana Department of Health and Hospitals Basic HIPAA Privacy Training: Policies and Procedures Louisiana Department of Health and Hospitals Basic HIPAA Privacy Training: Policies and Procedures 1 What Is HIPAA? HIPAA (pronounced hippa) is a federal law. It s a set of rules and regulations that affect

More information

Compliance HIPAA Training. Steve M. McCarty, Esq. General Counsel Sound Physicians

Compliance HIPAA Training. Steve M. McCarty, Esq. General Counsel Sound Physicians Compliance HIPAA Training Steve M. McCarty, Esq. General Counsel Sound Physicians 1 Overview of HIPAA HIPAA contains provisions that address: The privacy of protected health information or PHI The security

More information

Policy Scope: The policy applies across the Division to all DPH workgroups who maintain, use, have access to, or come into contact with IIHI.

Policy Scope: The policy applies across the Division to all DPH workgroups who maintain, use, have access to, or come into contact with IIHI. Title: DPH Current Effective Date: September 22, 2003 Original Effective Date: April 14, 2003 Revision History: April 22, 2004 May 1, 2011 January, 2014 Purpose The purpose of the Division of Public Health

More information

HIPAA Compliance for Students

HIPAA Compliance for Students HIPAA Compliance for Students The Health Insurance Portability and Accountability Act (HIPAA) was passed in 1996 by the United States Congress. It s intent was to help people obtain health insurance benefits

More information

HIPAA and Health Information Privacy and Security

HIPAA and Health Information Privacy and Security HIPAA and Health Information Privacy and Security Revised 7/2014 What Is HIPAA? H Health I Insurance P Portability & A Accountability A - Act HIPAA Privacy and Security Rules were passed to protect patient

More information

INDIANA UNIVERSITY SCHOOL OF OPTOMETRY HIPAA COMPLIANCE PLAN TABLE OF CONTENTS. I. Introduction 2. II. Definitions 3

INDIANA UNIVERSITY SCHOOL OF OPTOMETRY HIPAA COMPLIANCE PLAN TABLE OF CONTENTS. I. Introduction 2. II. Definitions 3 INDIANA UNIVERSITY SCHOOL OF OPTOMETRY HIPAA COMPLIANCE PLAN TABLE OF CONTENTS I. Introduction 2 II. Definitions 3 III. Program Oversight and Responsibilities 4 A. Structure B. Compliance Committee C.

More information

Target Audience: All Non-Management CHS Employees, Students, Volunteers, and Physicians

Target Audience: All Non-Management CHS Employees, Students, Volunteers, and Physicians This self-directed learning module contains information all CHS employees are expected to know in order to protect our patients protected health information. Target Audience: All Non-Management CHS Employees,

More information

Topics. What are privacy and security all about? How can I protect confidential information? What should I do if I see a problem?

Topics. What are privacy and security all about? How can I protect confidential information? What should I do if I see a problem? Federal: Privacy And Security 1 Topics What are privacy and security all about? What s confidential here? How can I protect confidential information? What should I do if I see a problem? How can I get

More information

HIPAA PRIVACY AND EDI RULES

HIPAA PRIVACY AND EDI RULES The Health and Human Services (HHS) issued final HIPAA privacy regulations on August 14, 2002. These rules govern how individually identifiable medical information must be protected. HIIPAA also requires

More information

Responsible Use of Technology and Information Resources

Responsible Use of Technology and Information Resources Responsible Use of Technology and Information Resources Introduction: The policies and guidelines outlined in this document apply to the entire Wagner College community: students, faculty, staff, alumni

More information

APPENDIX 1: Frequently Asked Questions

APPENDIX 1: Frequently Asked Questions APPENDIX 1: Frequently Asked Questions Practice Name Q: What is the HIPAA Privacy Rule? A: The HIPAA Privacy Rule controls the use and disclosure of what is known as Protected Health Information (PHI).

More information

DATA PROTECTION IT S EVERYONE S RESPONSIBILITY. An Introductory Guide for Health Service Staff

DATA PROTECTION IT S EVERYONE S RESPONSIBILITY. An Introductory Guide for Health Service Staff DATA PROTECTION IT S EVERYONE S RESPONSIBILITY An Introductory Guide for Health Service Staff 1 Message from Director General Dear Colleagues The safeguarding of and access to personal information has

More information

HIPAA Happenings in Hospital Systems. Donna J Brock, RHIT System HIM Audit & Privacy Coordinator

HIPAA Happenings in Hospital Systems. Donna J Brock, RHIT System HIM Audit & Privacy Coordinator HIPAA Happenings in Hospital Systems Donna J Brock, RHIT System HIM Audit & Privacy Coordinator HIPAA Health Insurance Portability and Accountability Act of 1996 Title 1 Title II Title III Title IV Title

More information