Breaches. Complying with the HIPAA Omnibus Final Rule. Important Definitions. Protected Health Information Includes HIPAA PRIVACY 3/2/2014

Size: px
Start display at page:

Download "Breaches. Complying with the HIPAA Omnibus Final Rule. Important Definitions. Protected Health Information Includes HIPAA PRIVACY 3/2/2014"

Transcription

1 Breaches Complying with the HIPAA Omnibus Final Rule You Can Be Successful! Advocate Medical Group in Chicago had 4 desktop computers taken in a burglary that contained the personal information of over 4 million patients. A St. Louis orthodontist office was burglarized and company computers were taken with the data for over 10,000 patients. A physician practice at the University of Texas Health Science Center at Houston discovers a laptop has been stolen containing data for nearly 600 patients. Important Definitions Protected Health Information Includes HHS Health and Human Services OCR Office for Civil Rights - Oversee and enforce the Privacy and Security rules CE - Covered Entity Healthcare provider who performs identified transaction electronically. For example, billing electronically for services provided. PHI Protected health information ephi Protected health information stored electronically. BA - Business Associate Performs duties for the CE using patient health or financial information provided by the CE. Updated rules include sub-contractors. HITECH - Health Information Technology for Economic and Clinical Health Health information whether oral or recorded in any form or medium Names All geographical subdivisions smaller than a State, including street address, city, county, precinct, zip code All elements of dates (except year) for dates directly related to an individual, including birth date, admission date, discharge date, date of death Fax numbers Electronic mail addresses Social Security numbers Medical record numbers Health plan beneficiary numbers Account numbers Certificate/license numbers Vehicle identifiers and serial numbers, including license plate numbers Device identifiers and serial numbers Web Universal Resource Locators (URLs) Internet Protocol (IP) address numbers Biometric identifiers, including finger and voice prints Full face photographic images and any comparable images; and Any other unique identifying number, characteristic, or code HIPAA PRIVACY HIPAA, or The Health Insurance and Portability and Accountability Act, sets standards for protection and sharing of individually identifiable health information often referred to as protected health information. o Privacy Rule establishes guidance on how health care providers must protect patient information and outlines certain patient rights. o Security Rule identifies safeguards needed to protect health information stored in an electronic format. Use of Protected Health Information and Patient Rights 1

2 Use or Release Information For treatment, payment and healthcare operations after providing a Notice of Privacy Practices. To the individual or legal representative. To friends and family with informal approval or for emergencies. o May ask the patient for permission to discuss healthcare if accompanied by another person during exam. As authorized by the patient. Based on professional judgment of the healthcare provider which is in the best interest of the patient. Friends and Family Relevant information may be shared with family members or friends involved in the patient s care or payment for your health care, if the patient has provided permission, or if they do not object to sharing of the information. If the patient is not present or unable to give permission, a health care provider may share or discuss health information with family, friends, or others involved in the care or payment of care if the provider believes, in his or her professional judgment, that it is in the patient s best interest. Information should not be shared which is not pertinent to the involvement/situation. True or False Security Healthcare providers may give prescription drugs, medical supplies, x-rays, and other healthcare items to a family True member, friend, or other person the patient sends to pick them up. The doctor may discuss the drugs the patient needs to True take with a health aide who came to the appointment. In the patient s absence or if they cannot provide permission, a healthcare provider may share relevant information IF based on professional judgment, True sharing the information is in the patient s best interest. The doctor may discuss a patient s drugs with their caregiver who calls with a question about the right Truedosage. Protection of Information Stored or Transmitted Electronically ephi Think Broader Than Your Computer Laptops, office PCs, servers Smartphones Thumb or flash drives Back up devices CD/DVD Equipment such as fax or copiers ephi during transmission o o Healthcare providers o Personal health records ARRA Mandated Changes to HIPAA American Recovery and Reinvestment Act (ARRA). Health Information Technology for Economic and Clinical Health Act or the HITECH Act.. Signed into law on February 17, Final regulations to update the Privacy Rules, outline process for breach identification and notification, and provide further definition of business associates published January 25, o Effective date March 26, 2013 o Compliance date September 23,

3 Notice of Privacy Practices Notice of Privacy Practices (NPP) Statement which outlines the types of uses and disclosures which will require authorization. o Release of psychotherapy notes Do not have to include if do not record or maintain this information. o Disclosures for marketing purposes. o Disclosures for any purposes which require the sale of PHI. Statement that other uses and disclosures will not be made without written authorization. Notice of updated rights: o Right to restrict certain disclosures of protected health information to a health plan where the individual pays out of pocket in full for the health care item or service. o Will receive notification in the event of a breach scenario. Notice of fundraising communications and the opportunity to opt out. o Not required to include the opt-out process NPP Direct Care Providers Business Associate Relationships Direct care providers are not required to print and hand out a revised NPP to all individuals seeking treatment. Providers must post the revised NPP in a clear and prominent location and have copies of the NPP at the delivery site for individuals to request to take with them. Providers are only required to give a copy of the NPP to, and obtain a good faith acknowledgment of receipt from new patients. Don t forget to update the NPP on the company website. Business Associate Business Associate Subcontractors Create, receive, maintain, or transmit protected health information on the behalf of a covered entity. Rule has been updated to include the following: o A Health Information Organization, E-prescribing Gateway, or other person that provides data transmission services with respect to protected health information to a covered entity and that requires routine access to such protected health information. o A person who offers a personal health record to one or more individuals on behalf of a covered entity. Entity must obtain satisfactory assurances in the form of a contract or other arrangement that the business associate will appropriately safeguard the information. Create, receive, maintain, or transmit protected health information on the behalf of a business associate. Business associate must obtain satisfactory assurances in the form of a contract or other arrangement that the business associate will appropriately safeguard the information. Subject to same liabilities and responsibilities. o Security Rule compliance o Use and disclosure only as outlined in the written contract CE has NO responsibility to enter into an agreement with subcontractors. 3

4 NOT Considered BAs Business Associate Agreement Couriers. Janitorial services. Banking and financial institutions which respect to payment and processing activities. o Check cashing. o Fund transfer. Dental labs provide a service for a patient and do not bill electronically for the service. Provide the minimum necessary amount of information. Written contract required by law. o Existing BAA may stay in place until September 23, o If updated or modified between now September 23, 2013 must meet published standards. Minimum necessary applies to BA for use/disclosure. Updated contracts to include: o Establish required uses and disclosures. o Provision to comply with the security rule with respect to ephi. o Provision the BA must comply with the elements of the Privacy Rule which apply to the CE. o Breach reporting requirements. Other Clarifications BREACH When information is provided to another health care provider concerning the treatment of an individual, the receiving provider is not considered a business associate. Entities that maintain or store protected health information on behalf of a covered entity are business associates, even if they do not actually view the protected health information. Even if a contract is not in place, but the actions meet the definition of a BA the rules apply. What is a Breach? Breach Exclusions The unauthorized acquisition, access, use, or disclosure of PHI not permitted under the privacy rule, which compromises the security or privacy of such information. An acquisition, access, use, or disclosure of protected health information in a manner not permitted under the privacy rule is presumed to be a breach unless the covered entity or business associate, as applicable, demonstrates that there is a low probability that the protected health information has been compromised. Compliance date September 23, Worker who has the authority to access information accidentally accesses a record in which they are not involved in the care of that patient. Worker who has the authority to access information inadvertently shares the information with another worker who is not involved in the care of the patient. Information is shared with an individual/entity who is not authorized but the unauthorized person to whom the disclosure was made would not reasonably have been able to retain such information. 4

5 Risk Analysis Must Be Completed Breach Notification 1) The nature and extent of the protected health information involved, including the types of identifiers and the likelihood of re-identification. 2) The unauthorized person who used the protected health information or to whom the disclosure was made. 3) Whether the protected health information was actually acquired or viewed. 4) The extent to which the risk to the protected health information has been mitigated. Patients must be notified without reasonable delay and no later than 60 days of the discovery of the breach. Breaches involving 500 or more individuals: Notify prominent media outlets serving the State or jurisdiction with the notification sent to the individual. Notify the Secretary of HHS concurrently with the notification sent to the individual. Breaches involving less than 500 individuals: Maintain a log or other documentation of the breaches and report no later than 60 days after the end of each calendar year in which the breach was discovered. Provide the notification as listed on HHS website. Reporting Breach Information Breach Notification and Business Associates Must provide notice to the covered entity (CE) without reasonable delay and no later than 60 days from the discovery of a breach. MUST address timing of reporting either known breaches or suspect situations in the BA contract. It is the CE ultimate responsibility to report the breach to impacted individuals. o Reporting of the incident may be delegated by contract to the BA. o Does not lessen the responsibility of the CE. o Both parties should NOT report. What Does This Mean? All events must be documented; this includes exclusion events and why they are determined to meet the definition. CE and BA have the burden of proof: To demonstrate that all breach notifications were provided. An impermissible use or disclosure did not constitute a breach such as by demonstrating through a risk assessment that there was a low probability that the protected health information had been compromised. Must maintain documentation sufficient to meet that burden of proof. CRITICAL QUESTION: How will BAs communicate potential breach scenarios? Patient Notification Process Written notice to affected individuals, provided by first class mail or by electronic mail is specified as the preferred method by the individual. o May be provided in one or MORE mailings as information becomes available. o Phone notice is allowed in an urgent situation, but must be followed by written notice. Substitute notice to affected individuals if contact information is insufficient or out-of-date must be provided. This may be provided via . Insufficient contact information for 10 or more individuals, the notice must be a conspicuous posting on the home page of the covered entity s Web site for 90 days or notice in major print or broadcast media in the geographic areas where the affected individuals likely reside. o Toll-free number must be included where individuals can learn whether their information was included in the breach. 5

6 Patient Notification to Include And Now. The Rest of the Story Brief description of what happened. Description of the types of unsecured PHI that were involved in the breach (name, Social Security Number, etc.). Steps individuals should take to protect themselves from potential harm. Brief description of what the covered entity is doing to investigate the breach, mitigate damage, and protect against further breaches. Contact information at the covered entity for questions by patients. Must make a decision on credit monitoring services. Access to PHI Health Information of Deceased Individuals Must provide a copy of their PHI if maintained in an electronic format in the electronic form and format the patient requests if possible. o If not readily producible, must offer in at least one readable electronic format. o Not required to purchase software or hardware to comply, but entity MUST be able to produce the information in a least one readable electronic copy. o If requested must transmit the copy to a third party. o If sent via unencrypted must advise of the risk. Must supply within 30 days with one 30 day extension allowed. The HIPAA Privacy Rule protects the individually identifiable health information about a decedent for 50 years following the date of death of the individual. During the 50-year period of protection, the Privacy Rule generally protects a decedent s health information to the same extent the Rule protects the health information of living individuals but does include a number of special disclosure provisions relevant to deceased individuals. Release of Decedent Information Marketing To alert law enforcement to the death of the individual, when there is a suspicion that death resulted from criminal conduct ( (f)(4). To coroners or medical examiners and funeral directors ( (g). For research that is solely on the protected health information of decedents ( (i)(1)(iii). To organ procurement organizations or other entities engaged in the procurement, banking, or transplantation of cadaveric organs, eyes, or tissue for the purpose of facilitating organ, eye, or tissue donation and transplantation. To a family member, or other person who was involved in the individual s health care or payment for care prior to the individual s death, unless doing so is inconsistent with any prior expressed preference of the deceased individual that is known to the covered entity. Making a communication about a product or service that encourages recipients of the communication to purchase or use the product or service. If financial remuneration (direct or indirect payment from or on behalf of a third party whose product or service is being described) occurs, prior authorization must be obtained. o Direct or indirect payment does not include any payment for treatment of an individual Marketing does not include a communication made: (i) To provide refill reminders or otherwise communicate about a drug or biologic that is currently being prescribed for the individual, only if any financial remuneration received by the covered entity in exchange for making the communication is reasonably related to the covered entity s cost of making the communication. 6

7 Marketing Sale of PHI (ii) For the following treatment and health care operations purposes, except where the covered entity receives financial remuneration in exchange for making the communication: o For treatment of an individual by a health care provider, including case management or care coordination for the individual, or to direct or recommend alternative treatments, therapies, health care providers, or settings of care to the individual; o To describe a health-related product or service (or payment for such product or service) that is provided by, or included in a plan of benefits of, the covered entity making the communication, including communications about: the entities participating in a health care provider network or health plan network; replacement of, or enhancements to, a health plan; and health-related products or services available only to a health plan enrollee that add value to, but are not part of, a plan of benefits; or Prohibited without patient permission except in the following circumstances: o Public health activities o Research o Sale, transfer, merger or consolidation with another Covered Entity o Paying a BA under BAA o Providing copies of information to a patient or personal representative Restriction Request Restriction Request Must agree to the requested restriction of sending PHI to a health plan for the purpose of payment or healthcare operations, unless the disclosure is otherwise required by law, if the restriction applies to information that pertains solely to a health care item or service for which has been paid out of pocket in full. Payment may be by another family member, other persons, even secondary insurance. Does not require creation of a separate medical file, but there must be some sort of flag to denote protection of this information. If filing of a claim is required by law, then law takes precedent. From HHS, we clarify that the responsibility to notify downstream providers of a restriction request in this situation also remains with the individual, and not the provider. However, we do encourage providers to assist individuals as feasible in alerting downstream providers. For follow-up appointments, if restriction is not requested the claim may be filed which may include release of the restricted information to justify medical necessity. o Providers again encouraged to advise patients about this scenario. HHS Guidance Disclosure to Law Enforcement Willful Neglect With the individual s signed HIPAA authorization. Without the individual s signed HIPAA authorization in certain incidents, including: o To report PHI to a law enforcement official reasonably able to prevent or lessen a serious and imminent threat to the health or safety of an individual or the public. o To report PHI that the covered entity in good faith believes to be evidence of a crime that occurred on the premises of the covered entity. o To alert law enforcement to the death of the individual when there is a suspicion that death resulted from criminal conduct. o When responding to an off-site medical emergency, as necessary to alert law enforcement to criminal activity. o To report PHI to law enforcement when required by law to do so (such as reporting gunshots or stab wounds). Fines now range from $100 - $1.5 million Violation was due to willful neglect and was timely corrected, an amount not less than $10,000 or more than $50,000 for each violation. Violation in which it is established that the violation was due to willful neglect and was not timely corrected, an amount not less than $50,000 for each violation. Penalty for violations of the same requirement or prohibition under any of these categories may not exceed $1,500,000 in a calendar year. Secretary of HHS has waiver authority. 7

8 How Much of a Fine and Investigations Nature and extent of the violation. Number of individuals impacted. Nature and extent of harm, including reputational harm. Indications of non-compliance Broadly includes past issues around compliance. Investigations: o Indications of willful neglect will result by law in an investigation. o Civil money penalties will NOT be imposed if the violation is corrected within 30 days from when the entity is aware of the violation UNLESS due to willful neglect. OCR Enforcement Example The Hospice of North Idaho (HONI) has agreed to pay HHS $50,000 to settle potential violations of the HIPAA Security Rule. First settlement involving a breach of unsecured ephi affecting fewer than 500 individuals. Unencrypted laptop computer containing the ephi of 441 patients had been stolen in June OCR discovered that o HONI had not conducted a risk analysis to safeguard ephi. o Did not have in place policies or procedures to address mobile device security as required by the HIPAA Security Rule. Leon Rodriguez This action sends a strong message to the health care industry that, regardless of size, covered entities must take action and will be held accountable for safeguarding their patients health information. Encryption is an easy method for making lost information unusable, unreadable and undecipherable. OCR Enforcement $1.2 million settlement A managed care company impermissibly disclosed PHI by failing to erase the hard drives when returning multiple leased copiers. A mental health center did not provide notice of privacy practices (NPP) to a father or his minor daughter, a patient at the center at their first encounter. A staff member of a medical practice discussed HIV testing procedures with a patient in the waiting room. Also computer screens displaying patient information were easily visible to patients. $150,000 Ouch! Tips to Protect Information Dermatology practice investigated by Office for Civil Rights (OCR) after they received a report that an unencrypted thumb drive containing the electronic protected health information (ephi) of approximately 2,200 individuals was stolen from a vehicle of one its staff members. Investigation revealed: o No risk analysis performed related to potential risks to the confidentiality of ephi as part of its security management process. o No written policies or training of workforce in place to comply with the Breach Notification Rule. First settlement with Health and Human Services related to policies for breach notification. 8

9 How to Begin Training To keep information secure in your environment, you must first understand all of the places it is stored: Written communication Electronic files Business Equipment Fax Machines, copiers/printers, equipment Computers, servers, portable hard drives Thumb Drives - flash drives - smart phones Any transmission of protected health information And don t forget verbal communication Baseline training for all new employees o Train specific job functions on targeted areas of need Priority to train employees regarding breach o Definition Protection strategies o Minimum necessary o Logins/passwords o Computer protections physical security o Social media o Acceptable information sharing sites o Remote access What Can Others See or Hear? Safeguarding ephi Be mindful of hallway conversations which may be overheard. Know what you can discuss with who in patient care areas when others are brought back into the exam area. What information is viewable on your computer screen? Are the appointments for the day posted? Is patient information in the regular trash? When PHI is printed out, double check whose information it is before it is given to a patient (common problem!). Report anything unusual which could indicate improper use, access, or disclosure of protected health information. Access information with personal login and password. o Passwords must not be shared! Log off or lock computer when moving away from work area. Be mindful of the physical security of especially mobile devices containing ephi (laptops, smart phones). Only open /attachments from reliable sources. Access only approved internet sites. Patient information should not be mentioned on personal social media accounts. Data encryption back-up devices, phones, servers, computers. Encryption Must follow National Institute of Standards and Technology guidelines. Dependent on: o Strength of the encryption algorithm o Security of the decryption key or process o Keys that might enable decryption have not been breached Items to consider: o Portable devices Laptops, thumb/flash drives, smart phones o Devices in your office Computers in practice, copiers, scanners, fax o Server need to weigh risk o Information being transmitted o Media being transported o Business Associate data containing PHI must be sent in a secure manner. o This includes ing information for referral purposes. o ing between employees within the practice is acceptable if the system is secure. Means of protection include: o Patient portal. o Encryption. At the patient s request, PHI may be sent unsecured if you have informed the patient of the risk. o Request should be in writing using the Authorization for Release - Compound Release form. 9

10 Risk Analysis and Audits Checklist to Success Risk Analysis required by the Security Rule Audits o Logons outside usual business hours o Remote access report o File update or change reports o Review of daily activity o Review of employees logged in o Record access. o Logon when person is out of office o Change report o Exceptional access or print o VIP record access Ensure an updated NPP is being distributed. Review list of BAs and status of BAA. Review current policies/procedures to ensure the updated standards are reflected. Review current Risk Analysis and address areas of vulnerabilities. o Mobile devices o Copy machines, scanners, fax machines o Encryption TRAIN, TRAIN, TRAIN Thank you! Karen Gregory, RN Director of Compliance and Education Karen@totalmedicalcompliance.com

11 BREACH/ INCIDENT INVESTIGATION REPORT Report Date Incident Date Practice Name Practice Address Description of the incident - Describe the incident/use/disclosure with information relevant to how it happened, how it was detected, individuals involved, how it was reported, etc. Record elements of the investigation Reports reviewed, people talked to, etc. Risk Analysis Answer the following questions to determine status of the incident (Breach or inappropriate use/disclosure). 1. Nature of the event? Types of PHI involved* Include the amount and type of clinical information released and the nature of the service (mental health, infectious disease) *Risk increases when credit card/ss info released due to identity theft. 1

12 2. Who is the unauthorized person/entity on the receiving end? Record who the information was released to or accessed by. Was the recipient another CE or BA covered by HIPAA or other privacy rules or an unknown recipient? 3. Was the information actually viewed or simply exposed to a potential breach? Provide detail on how it was determined which event occurred. For instance audit trail documents access to information in question, mailing returned and unopened or forensic evidence proves data on a computer was never accessed 4. To what extent was the risk mitigated? Mark all that apply. Quick response to the event Information returned Signed confidentiality agreement and PHI being destroyed Additional supporting comments below: 2

13 Was the access, use or disclosure ruled a Breach or not? Describe why the decision was made. The Burden of Proof is on the practice. Determined not to be a breach for the following reason: Data encrypted Meets one of the following exceptions allowed by the Privacy Rule o Unintentional acquisition, access, or use of protected health information by a workforce member or person acting under the authority of a covered entity or a business associate. Information is not further used or disclosed in a manner not permitted under the privacy rule. o Inadvertent disclosure by a person who is authorized to access protected health information at a covered entity or business associate to another person authorized to access protected health information at the same covered entity or business associate, or organized health care arrangement. Information is not further used or disclosed in a manner not permitted under the privacy rule. o Unauthorized person to whom the disclosure was made would not reasonably have been able to retain such information. Signed confidentiality agreement and PHI being destroyed Other reason/additional details: Determined to be a breach for the following reason: For BREACH Date Patients Notified: Date HHS Notified: Date prominent media outlet informed (list media outlet): For Breaches impacting 500 or more patients, HHS and a prominent media outlet MUST be notified at the same time patients are informed. NOTE: Attached all supporting documentation to include copy of patient communication. For Inappropriate Disclosure Date Accounting of Disclosures entries made in the client record: 3

14 Corrective action taken or planned to prevent any reoccurrence - Include in this description procedural or system changes made, policies written or changed, sanctions of workforce members, employee training, etc. The report was prepared by Preparer Signature Date Privacy Officer Signature Date 4

15 HIPAA Compliance Checklist Check items which are implemented in your site. For all unchecked items determine actions necessary to address outstanding issues. HIPAA Administrative Safeguards Do you have an assigned Privacy and Security officer? Can employees identify the person if asked? Do you have written policies on how patient information will be protected? Is there a business associate agreement on file for all business associates? Is access to patient information assigned based on job function? Is there a written Contingency Plan clearly listing actions to take to resume/restore functions in order to provide patient care? Are new patients provided a copy of your Notice of Privacy Practices (NPP)? Is your NPP posted in a prominent area in your practice? On your website? Have employees been trained on processes to protect patient information which is in written, electronic, and verbal format? On the definition of BREACH? Is there a clearly defined process for deletion of access to patient information/access to the building for terminated employees? Technical Safeguards Has your practice completed a Risk Analysis of the electronic environment to identify any vulnerability which may put patient information at risk? Is there a comprehensive inventory of electronic devices which store or allow access to patient information? Includes computers, services, back up devices, thumb drives, printers/copiers, fax machines, patient equipment. Does each user having access to protected health information have an individual user name and password? If utilizing Wi Fi for patient access when in the facility, is it separate from the practice network? Are safeguards in place for any information sharing sites (Dropbox)? Is there a BAA in place for the site? Is encryption utilized to protect patient information which is being stored? Are mobile devices (laptops, smart phones, thumb drives) with PHI encrypted for protection against a breach if lost or stolen? Have you restored data from back up devices to ensure the backup is not corrupted? If ing patient information is a secure method of being utilized? Is there a strong working relationship with an IT company who is in compliance with the HIPAA regulations? Physical Safeguards What physical security measures are in place to protect patient information? Alarm, deadbolt locks, limited access to areas of the practice which house patient information by non employed staff. How is patient information protected after hours? Hard copies of records secured? Placed out of sight? Are visitors accompanied when in areas housing/utilizing patient information?

Everett School Employee Benefit Trust. Reportable Breach Notification Policy HIPAA HITECH Rules and Washington State Law

Everett School Employee Benefit Trust. Reportable Breach Notification Policy HIPAA HITECH Rules and Washington State Law Everett School Employee Benefit Trust Reportable Breach Notification Policy HIPAA HITECH Rules and Washington State Law Introduction The Everett School Employee Benefit Trust ( Trust ) adopts this policy

More information

HHS Issues New HITECH/HIPAA Rule: Implications for Hospice Providers

HHS Issues New HITECH/HIPAA Rule: Implications for Hospice Providers Compliance Tip Sheet National Hospice and Palliative Care Organization www.nhpco.org/regulatory HHS Issues New HITECH/HIPAA Rule: Implications for Hospice Providers Hospice Provider Compliance To Do List

More information

Updated HIPAA Regulations What Optometrists Need to Know Now. HIPAA Overview

Updated HIPAA Regulations What Optometrists Need to Know Now. HIPAA Overview Updated HIPAA Regulations What Optometrists Need to Know Now The U.S. Department of Health & Human Services Office for Civil Rights recently released updated regulations regarding the Health Insurance

More information

CREATIVE SOLUTIONS IN HEALTHCARE, INC. Privacy Policy

CREATIVE SOLUTIONS IN HEALTHCARE, INC. Privacy Policy CREATIVE SOLUTIONS IN HEALTHCARE, INC. Privacy Policy Amended as of February 12, 2010 on the authority of the HIPAA Privacy Officer for Creative Solutions in Healthcare, Inc. TABLE OF CONTENTS ARTICLE

More information

Data Breach, Electronic Health Records and Healthcare Reform

Data Breach, Electronic Health Records and Healthcare Reform Data Breach, Electronic Health Records and Healthcare Reform (This presentation is for informational purposes only and it is not intended, and should not be relied upon, as legal advice.) Overview of HIPAA

More information

COMPLIANCE ALERT 10-12

COMPLIANCE ALERT 10-12 HAWAII HEALTH SYSTEMS C O R P O R A T I O N "Touching Lives Every Day COMPLIANCE ALERT 10-12 HIPAA Expansion under the American Recovery and Reinvestment Act of 2009 The American Recovery and Reinvestment

More information

New HIPAA regulations require action. Are you in compliance?

New HIPAA regulations require action. Are you in compliance? New HIPAA regulations require action. Are you in compliance? Mary Harrison, JD Tami Simon, JD May 22, 2013 Discussion topics Introduction Remembering the HIPAA Basics HIPAA Privacy Rules HIPAA Security

More information

Protecting Patient Information in an Electronic Environment- New HIPAA Requirements

Protecting Patient Information in an Electronic Environment- New HIPAA Requirements Protecting Patient Information in an Electronic Environment- New HIPAA Requirements SD Dental Association Holly Arends, RHIT Clinical Program Manager Meet the Speaker TRUST OBJECTIVES Overview of HIPAA

More information

HIPAA AND MEDICAID COMPLIANCE POLICIES AND PROCEDURES

HIPAA AND MEDICAID COMPLIANCE POLICIES AND PROCEDURES SALISH BHO HIPAA AND MEDICAID COMPLIANCE POLICIES AND PROCEDURES Policy Name: HIPAA BREACH NOTIFICATION REQUIREMENTS Policy Number: 5.16 Reference: 45 CFR Parts 164 Effective Date: 03/2016 Revision Date(s):

More information

HIPAA 101. March 18, 2015 Webinar

HIPAA 101. March 18, 2015 Webinar HIPAA 101 March 18, 2015 Webinar Agenda Acronyms to Know HIPAA Basics What is HIPAA and to whom does it apply? What is protected by HIPAA? Privacy Rule Security Rule HITECH Basics Breaches and Responses

More information

Are You Still HIPAA Compliant? Staying Protected in the Wake of the Omnibus Final Rule Click to edit Master title style.

Are You Still HIPAA Compliant? Staying Protected in the Wake of the Omnibus Final Rule Click to edit Master title style. Are You Still HIPAA Compliant? Staying Protected in the Wake of the Omnibus Final Rule Click to edit Master title style March 27, 2013 www.mcguirewoods.com Introductions Holly Carnell McGuireWoods LLP

More information

HIPAA Omnibus Rule Overview. Presented by: Crystal Stanton MicroMD Marketing Communication Specialist

HIPAA Omnibus Rule Overview. Presented by: Crystal Stanton MicroMD Marketing Communication Specialist HIPAA Omnibus Rule Overview Presented by: Crystal Stanton MicroMD Marketing Communication Specialist 1 HIPAA Omnibus Rule - Agenda History of the Omnibus Rule What is the HIPAA Omnibus Rule and its various

More information

HIPAA in an Omnibus World. Presented by

HIPAA in an Omnibus World. Presented by HIPAA in an Omnibus World Presented by HITECH COMPLIANCE ASSOCIATES IS NOT A LAW FIRM The information given is not intended to be a substitute for legal advice or consultation. As always in legal matters

More information

This presentation focuses on the Healthcare Breach Notification Rule. First published in 2009, the final breach notification rule was finalized in

This presentation focuses on the Healthcare Breach Notification Rule. First published in 2009, the final breach notification rule was finalized in This presentation focuses on the Healthcare Breach Notification Rule. First published in 2009, the final breach notification rule was finalized in the HIPAA Omnibus Rule of 2013. As part of the American

More information

HIPAA Omnibus Rule Practice Impact. Kristen Heffernan MicroMD Director of Prod Mgt and Marketing

HIPAA Omnibus Rule Practice Impact. Kristen Heffernan MicroMD Director of Prod Mgt and Marketing HIPAA Omnibus Rule Practice Impact Kristen Heffernan MicroMD Director of Prod Mgt and Marketing 1 HIPAA Omnibus Rule Agenda History of the Rule HIPAA Stats Rule Overview Use of Personal Health Information

More information

Community First Health Plans Breach Notification for Unsecured PHI

Community First Health Plans Breach Notification for Unsecured PHI Community First Health Plans Breach Notification for Unsecured PHI The presentation is for informational purposes only. It is the responsibility of the Business Associate to ensure awareness and compliance

More information

UNDERSTANDING THE HIPAA/HITECH BREACH NOTIFICATION RULE 2/25/14

UNDERSTANDING THE HIPAA/HITECH BREACH NOTIFICATION RULE 2/25/14 UNDERSTANDING THE HIPAA/HITECH BREACH NOTIFICATION RULE 2/25/14 RULES Issued August 19, 2009 Requires Covered Entities to notify individuals of a breach as well as HHS without reasonable delay or within

More information

OCR UPDATE Breach Notification Rule & Business Associates (BA)

OCR UPDATE Breach Notification Rule & Business Associates (BA) OCR UPDATE Breach Notification Rule & Business Associates (BA) Alicia Galan Supervisory Equal Opportunity Specialist March 7, 2014 HITECH OMNIBUS A Reminder of What s Included: Final Modifications of the

More information

POLICY AND PROCEDURE MANUAL

POLICY AND PROCEDURE MANUAL Pennington Biomedical POLICY NO. 412.22 POLICY AND PROCEDURE MANUAL Origin Date: 02/04/2013 Impacts: ALL PERSONNEL Effective Date: 03/17/2014 Subject: HIPAA BREACH NOTIFICATION Last Revised: Source: LEGAL

More information

Presented by Jack Kolk President ACR 2 Solutions, Inc.

Presented by Jack Kolk President ACR 2 Solutions, Inc. HIPAA 102 : What you don t know about the new changes in the law can hurt you! Presented by Jack Kolk President ACR 2 Solutions, Inc. Todays Agenda: 1) Jack Kolk, CEO of ACR 2 Solutions a information security

More information

HIPAA Privacy Breach Notification Regulations

HIPAA Privacy Breach Notification Regulations Technical Bulletin Issue 8 2009 HIPAA Privacy Breach Notification Regulations On August 24, 2009 Health and Human Services (HHS) issued interim final regulations implementing the HIPAA Privacy Breach Notification

More information

HIPAA BREACH RESPONSE POLICY

HIPAA BREACH RESPONSE POLICY http://dhmh.maryland.gov/sitepages/op02.aspx (OIG) DHMH POLICY 01.03.07 Effective Date: July 22, 2014 I. EXECUTIVE SUMMARY The Department of Health and Mental Hygiene (DHMH) is committed to protecting

More information

HIPAA Compliance Guide

HIPAA Compliance Guide HIPAA Compliance Guide Important Terms Covered Entities (CAs) The HIPAA Privacy Rule refers to three specific groups as covered entities, including health plans, healthcare clearinghouses, and health care

More information

AVE MARIA UNIVERSITY HIPAA PRIVACY NOTICE

AVE MARIA UNIVERSITY HIPAA PRIVACY NOTICE AVE MARIA UNIVERSITY HIPAA PRIVACY NOTICE This Notice of Privacy Practices describes the legal obligations of Ave Maria University, Inc. (the plan ) and your legal rights regarding your protected health

More information

Understanding HIPAA Regulations and How They Impact Your Organization!

Understanding HIPAA Regulations and How They Impact Your Organization! Understanding HIPAA Regulations and How They Impact Your Organization! Presented by: HealthInfoNet & Systems Engineering! April 25 th 2013! Introductions! Todd Rogow Director of IT HealthInfoNet Adam Victor

More information

REPRODUCTIVE ASSOCIATES OF DELAWARE (RAD) NOTICE OF PRIVACY PRACTICES PLEASE REVIEW IT CAREFULLY.

REPRODUCTIVE ASSOCIATES OF DELAWARE (RAD) NOTICE OF PRIVACY PRACTICES PLEASE REVIEW IT CAREFULLY. REPRODUCTIVE ASSOCIATES OF DELAWARE (RAD) NOTICE OF PRIVACY PRACTICES THIS NOTICE DESCRIBES HOW PROTECTED HEALTH INFORMATION (PHI) ABOUT YOU MAY BE USED AND DISCLOSED AND HOW YOU CAN GET ACCESS TO THIS

More information

Statement of Policy. Reason for Policy

Statement of Policy. Reason for Policy Table of Contents Statement of Policy 2 Reason for Policy 2 HIPAA Liaison 2 Individuals and Entities Affected by Policy 2 Who Should Know Policy 3 Exclusions 3 Website Address for Policy 3 Definitions

More information

8/3/2015. Integrating Behavioral Health and HIV Into Electronic Health Records Communities of Practice

8/3/2015. Integrating Behavioral Health and HIV Into Electronic Health Records Communities of Practice Integrating Behavioral Health and HIV Into Electronic Health Records Communities of Practice Monday, August 3, 2015 1 How to ask a question during the webinar If you dialed in to this webinar on your phone

More information

Barnes & Thornburg LLP HIPAA Update: HITECH Act Breach Notification Rule

Barnes & Thornburg LLP HIPAA Update: HITECH Act Breach Notification Rule HEALTHCARE October 2009 Barnes & Thornburg LLP HIPAA Update: HITECH Act Breach Notification Rule This HIPAA Update provides a detailed description of the new breach notification requirements for HIPAA

More information

HIPAA and HITECH Compliance Under the New HIPAA Final Rule. HIPAA Final Omnibus Rule ( Final Rule )

HIPAA and HITECH Compliance Under the New HIPAA Final Rule. HIPAA Final Omnibus Rule ( Final Rule ) HIPAA and HITECH Compliance Under the New HIPAA Final Rule Presented Presented by: by: Barry S. Herrin, Attorney CHPS, Name FACHE Smith Smith Moore Moore Leatherwood Leatherwood LLP LLP Atlanta Address

More information

HIPAA Compliance Guide

HIPAA Compliance Guide HIPAA Compliance Guide Important Terms Covered Entities (CAs) The HIPAA Privacy Rule refers to three specific groups as covered entities, including health plans, healthcare clearinghouses, and health care

More information

CARING HOSPICE SERVICES NOTICE OF PRIVACY PRACTICES

CARING HOSPICE SERVICES NOTICE OF PRIVACY PRACTICES Original effective date: 2003 Effective date of last Revision: July 17, 2013 CARING HOSPICE SERVICES NOTICE OF PRIVACY PRACTICES Caring Hospice Services of Connecticut Caring Hospice Services of New York

More information

12/19/2014. HIPAA More Important Than You Realize. Administrative Simplification Privacy Rule Security Rule

12/19/2014. HIPAA More Important Than You Realize. Administrative Simplification Privacy Rule Security Rule HIPAA More Important Than You Realize J. Ira Bedenbaugh Consulting Shareholder February 20, 2015 This material was used by Elliott Davis Decosimo during an oral presentation; it is not a complete record

More information

HIPAA Update. Presented by: Melissa M. Zambri. June 25, 2014

HIPAA Update. Presented by: Melissa M. Zambri. June 25, 2014 HIPAA Update Presented by: Melissa M. Zambri June 25, 2014 Timeline of New Rules 2/17/09 - Stimulus Package Enacted 8/24/09 - Interim Final Rule on Breach Notification 10/7/09 - Proposed Rule Regarding

More information

Notice of Privacy Practices

Notice of Privacy Practices Notice of Privacy Practices This notice describes how medical information about you may be used and disclosed and how you can get access to this information. Please review it carefully. This practice uses

More information

Why Lawyers? Why Now?

Why Lawyers? Why Now? TODAY S PRESENTERS Why Lawyers? Why Now? New HIPAA regulations go into effect September 23, 2013 Expands HIPAA safeguarding and breach liabilities for business associates (BAs) Lawyer is considered a business

More information

Business Associates and Breach Reporting Under HITECH and the Omnibus Final HIPAA Rule

Business Associates and Breach Reporting Under HITECH and the Omnibus Final HIPAA Rule Business Associates and Breach Reporting Under HITECH and the Omnibus Final HIPAA Rule Patricia D. King, Esq. Associate General Counsel Swedish Covenant Hospital Chicago, IL I. Business Associates under

More information

INFORMATION SECURITY & HIPAA COMPLIANCE MPCA

INFORMATION SECURITY & HIPAA COMPLIANCE MPCA INFORMATION SECURITY & HIPAA COMPLIANCE MPCA Annual Conference August 5, 201 Agenda 1 HIPAA 2 The New Healthcare Paradigm Internal Compliance 4 Conclusion 2 1 HIPAA 1 Earning Their Trust 4 HIPAA 5 Health

More information

HIPAA initially went into effect April 14, 2003. HIPAA is a set of rules that is to be followed by doctors, hospitals and other health care providers.

HIPAA initially went into effect April 14, 2003. HIPAA is a set of rules that is to be followed by doctors, hospitals and other health care providers. HIPAA Health Insurance Portability and Accountability Act HIPAA initially went into effect April 14, 2003 HIPAA is a set of rules that is to be followed by doctors, hospitals and other health care providers.

More information

GUIDE TO PATIENT PRIVACY AND SECURITY RULES

GUIDE TO PATIENT PRIVACY AND SECURITY RULES AMERICAN ASSOCIATION OF ORTHODONTISTS GUIDE TO PATIENT PRIVACY AND SECURITY RULES I. INTRODUCTION The American Association of Orthodontists ( AAO ) has prepared this Guide and the attachment to assist

More information

HHS announces sweeping changes to the HIPAA Privacy and Security Rules in the final HIPAA Omnibus Rule

HHS announces sweeping changes to the HIPAA Privacy and Security Rules in the final HIPAA Omnibus Rule JANUARY 23, 2013 HHS announces sweeping changes to the HIPAA Privacy and Security Rules in the final HIPAA Omnibus Rule By Linn Foster Freedman, Kathryn M. Sylvia, Lindsay Maleson, and Brooke A. Lane On

More information

What Health Care Entities Need to Know about HIPAA and the American Recovery and Reinvestment Act

What Health Care Entities Need to Know about HIPAA and the American Recovery and Reinvestment Act What Health Care Entities Need to Know about HIPAA and the American Recovery and Reinvestment Act by Lane W. Staines and Cheri D. Green On February 17, 2009, The American Recovery and Reinvestment Act

More information

The Basics of HIPAA Privacy and Security and HITECH

The Basics of HIPAA Privacy and Security and HITECH The Basics of HIPAA Privacy and Security and HITECH Protecting Patient Privacy Disclaimer The content of this webinar is to introduce the principles associated with HIPAA and HITECH regulations and is

More information

Trust 9/10/2015. Why Does Privacy and Security Matter? Who Must Comply with HIPAA Rules? HIPAA Breaches, Security Risk Analysis, and Audits

Trust 9/10/2015. Why Does Privacy and Security Matter? Who Must Comply with HIPAA Rules? HIPAA Breaches, Security Risk Analysis, and Audits HIPAA Breaches, Security Risk Analysis, and Audits Derrick Hill Senior Health IT Advisor Kentucky REC Why Does Privacy and Security Matter? Trust Who Must Comply with HIPAA Rules? Covered Entities (CE)

More information

ADMINISTRATIVE REGULATION EFFECTIVE DATE: 1/1/2016

ADMINISTRATIVE REGULATION EFFECTIVE DATE: 1/1/2016 Page 1 of 9 CITY OF CHESAPEAKE, VIRGINIA NUMBER: 2.62 ADMINISTRATIVE REGULATION EFFECTIVE DATE: 1/1/2016 SUPERCEDES: N/A SUBJECT: HUMAN RESOURCES DEPARTMENT CITY OF CHESAPEAKE EMPLOYEE/RETIREE GROUP HEALTH

More information

HIPPA and HITECH NOTIFICATION Effective Date: September 23, 2013

HIPPA and HITECH NOTIFICATION Effective Date: September 23, 2013 HIPPA and HITECH NOTIFICATION Effective Date: September 23, 2013 Orchard Creek Health Care is required by law to maintain the privacy of protected health information (PHI) of our residents. If you feel

More information

Network Security and Data Privacy Insurance for Physician Groups

Network Security and Data Privacy Insurance for Physician Groups Network Security and Data Privacy Insurance for Physician Groups February 2014 Lockton Companies While exposure to medical malpractice remains a principal risk MIKE EGAN, CPCU Senior Vice President Unit

More information

UPDATES FOR MEDICAL PRACTICES: RED FLAGS AND IDENTITY THEFT AND HIPAA PRIVACY CHANGES (FROM HITECH)

UPDATES FOR MEDICAL PRACTICES: RED FLAGS AND IDENTITY THEFT AND HIPAA PRIVACY CHANGES (FROM HITECH) UPDATES FOR MEDICAL PRACTICES: RED FLAGS AND IDENTITY THEFT AND HIPAA PRIVACY CHANGES (FROM HITECH) March 2011 Presentation by Jennifer L. Cox, J.D. Red Flags Rollback Red flags is going going and not

More information

Business Associate Agreement

Business Associate Agreement Business Associate Agreement This Agreement is entered into as of ("Effective Date"), between ( Covered Entity ), and ( Business Associate ). RECITALS WHEREAS, Business Associate provides services on behalf

More information

HIPAA Privacy & Breach Notification Training for System Administration Business Associates

HIPAA Privacy & Breach Notification Training for System Administration Business Associates HIPAA Privacy & Breach Notification Training for System Administration Business Associates Barbara M. Holthaus privacyofficer@utsystem.edu Office of General Counsel University of Texas System April 10,

More information

HIPAA Compliance The Time is Now Changes on the Horizon: The Final Regulations on Privacy and Security. May 7, 2013

HIPAA Compliance The Time is Now Changes on the Horizon: The Final Regulations on Privacy and Security. May 7, 2013 HIPAA Compliance The Time is Now Changes on the Horizon: The Final Regulations on Privacy and Security May 7, 2013 Presenters James Clay President Employee Benefits & HR Consulting The Miller Group jimc@millercares.com

More information

STANDARD ADMINISTRATIVE PROCEDURE

STANDARD ADMINISTRATIVE PROCEDURE STANDARD ADMINISTRATIVE PROCEDURE 16.99.99.M0.26 Investigation and Response to Breach of Unsecured Protected Health Information (HITECH) Approved October 27, 2014 Next scheduled review: October 27, 2019

More information

Health Information Privacy Refresher Training. March 2013

Health Information Privacy Refresher Training. March 2013 Health Information Privacy Refresher Training March 2013 1 Disclosure There are no significant or relevant financial relationships to disclose. 2 Topics for Today State health information privacy law Federal

More information

Breach Notification Policy

Breach Notification Policy 1. Breach Notification Team. Breach Notification Policy Ferris State University ( Ferris State ), a hybrid entity with health care components, has established a Breach Notification Team, which consists

More information

HIPAA Privacy and Security Rules: A Refresher. Marilyn Freeman, RHIA California Area HIPAA Coordinator California Area HIM Consultant

HIPAA Privacy and Security Rules: A Refresher. Marilyn Freeman, RHIA California Area HIPAA Coordinator California Area HIM Consultant HIPAA Privacy and Security Rules: A Refresher Marilyn Freeman, RHIA California Area HIPAA Coordinator California Area HIM Consultant Objectives Provide overview of Health insurance Portability and Accountability

More information

HIPAA Compliance: Are you prepared for the new regulatory changes?

HIPAA Compliance: Are you prepared for the new regulatory changes? HIPAA Compliance: Are you prepared for the new regulatory changes? Baker Tilly CARIS Innovation, Inc. April 30, 2013 Baker Tilly refers to Baker Tilly Virchow Krause, LLP, an independently owned and managed

More information

University Healthcare Physicians Compliance and Privacy Policy

University Healthcare Physicians Compliance and Privacy Policy Page 1 of 11 POLICY University Healthcare Physicians (UHP) will enter into business associate agreements in compliance with the provisions of the Health Insurance Portability and Accountability Act of

More information

Information Privacy and Security Program. Title: EC.PS.01.02

Information Privacy and Security Program. Title: EC.PS.01.02 Page: 1 of 9 I. PURPOSE: The purpose of this standard is to ensure that affected individuals, the media, and the Secretary of Health and Human Services (HHS) are appropriately notified of any Breach of

More information

HIPAA TRAINING. A training course for Shiawassee County Community Mental Health Authority Employees

HIPAA TRAINING. A training course for Shiawassee County Community Mental Health Authority Employees HIPAA TRAINING A training course for Shiawassee County Community Mental Health Authority Employees WHAT IS HIPAA? HIPAA is an acronym that stands for Health Insurance Portability and Accountability Act.

More information

HHS Finalizes HIPAA Privacy and Data Security Rules, Including Stricter Rules for Breaches of Unsecured PHI

HHS Finalizes HIPAA Privacy and Data Security Rules, Including Stricter Rules for Breaches of Unsecured PHI January 23, 2013 HHS Finalizes HIPAA Privacy and Data Security Rules, Including Stricter Rules for Breaches of Unsecured PHI Executive Summary HHS has issued final regulations that address recent legislative

More information

Privacy Officer Job Description 4/28/2014. HIPAA Privacy Officer Orientation. Cathy Montgomery, RN. Presented by:

Privacy Officer Job Description 4/28/2014. HIPAA Privacy Officer Orientation. Cathy Montgomery, RN. Presented by: HIPAA Privacy Officer Orientation Presented by: Cathy Montgomery, RN Privacy Officer Job Description Serve as leader Develop Policies and Procedures Train staff Monitor activities Manage Business Associates

More information

THE HIPAA TANGO CHOREOGRAPHING PRIVACY AND SECURITY UNDER THE FINAL RULE

THE HIPAA TANGO CHOREOGRAPHING PRIVACY AND SECURITY UNDER THE FINAL RULE THE HIPAA TANGO CHOREOGRAPHING PRIVACY AND SECURITY UNDER THE FINAL RULE The Speakers Cinda Velasco Attorney, Manager, Privacy Officer Patient Safety and Risk Management Trish Lugtu Senior Manager MMIC

More information

HIPAA Orientation. Health Insurance Portability and Accountability Act

HIPAA Orientation. Health Insurance Portability and Accountability Act HIPAA Orientation Health Insurance Portability and Accountability Act HIPAA Federal legislation enacted in 1996 to improve the efficiency and effectiveness of electronic information transfers used in the

More information

HIPAA Training Study Guide July 2015 June 2016

HIPAA Training Study Guide July 2015 June 2016 Contents HIPAA Overview... 2 Who must comply?... 2 Privacy Standard... 3 Protected Health Information (PHI)... 3 Minimum Necessary Rule... 4 Requests for PHI... 5 Acceptable PHI Releases... 5 Special Circumstances...

More information

Implementation Business Associates and Breach Notification

Implementation Business Associates and Breach Notification Implementation Business Associates and Breach Notification Tony Brooks, CISA, CRISC, Tony.Brooks@horne-llp.com Clay J. Countryman, Esq., Clay.Countryman@bswllp.com Stephen M. Angelette, Esq., Stephen.Angelette@bswllp.com

More information

FEDERAL AND STATE BREACH NOTIFICATION LAWS FOR CALIFORNIA

FEDERAL AND STATE BREACH NOTIFICATION LAWS FOR CALIFORNIA APPENDIX PR 12-A FEDERAL AND STATE BREACH NOTIFICATION LAWS FOR CALIFORNIA LEGAL CITATION California Civil Code Section 1798.82 California Health and Safety (H&S) Code Section 1280.15 42 U.S.C. Section

More information

Five Rivers Medical Center, Inc. 2801 Medical Center Drive Pocahontas, AR 72455. Notification of Security Breach Policy

Five Rivers Medical Center, Inc. 2801 Medical Center Drive Pocahontas, AR 72455. Notification of Security Breach Policy Five Rivers Medical Center, Inc. 2801 Medical Center Drive Pocahontas, AR 72455 Notification of Security Breach Policy Purpose: This policy has been adopted for the purpose of complying with the Health

More information

Welcome to ChiroCare s Fourth Annual Fall Business Summit. October 3, 2013

Welcome to ChiroCare s Fourth Annual Fall Business Summit. October 3, 2013 Welcome to ChiroCare s Fourth Annual Fall Business Summit October 3, 2013 HIPAA Compliance Regulatory Overview & Implementation Tips for Providers Agenda Green packet Overview of general HIPAA terms and

More information

HIPAA Compliance for Students

HIPAA Compliance for Students HIPAA Compliance for Students The Health Insurance Portability and Accountability Act (HIPAA) was passed in 1996 by the United States Congress. It s intent was to help people obtain health insurance benefits

More information

NOTICE OF THE NATHAN ADELSON HOSPICE PRIVACY PRACTICES

NOTICE OF THE NATHAN ADELSON HOSPICE PRIVACY PRACTICES THIS NOTICE DESCRIBES HOW MEDICAL INFORMATION ABOUT YOU MAY BE USED AND DISCLOSED AND HOW YOU CAN GET ACCESS TO THIS INFORMATION PLEASE REVIEW IT CAREFULLY. DEFINITIONS PROTECTED HEALTH INFORMATION (PHI):

More information

SCHOOL DISTRICT OF BLACK RIVER FALLS HIPAA PRIVACY AND SECURITY POLICY

SCHOOL DISTRICT OF BLACK RIVER FALLS HIPAA PRIVACY AND SECURITY POLICY SCHOOL DISTRICT OF BLACK RIVER FALLS HIPAA PRIVACY AND SECURITY POLICY 1 School Board Policy 523.5 The School District of Black River Falls ( District ) is committed to compliance with the health information

More information

Health Insurance Portability and Accountability Policy 1.8.4

Health Insurance Portability and Accountability Policy 1.8.4 Health Insurance Portability and Accountability Policy 1.8.4 Appendix C Uses and Disclosures of PHI Procedures This Appendix covers procedures related to Uses and Disclosures of PHI. Disclosures to Law

More information

HIPAA/HITECH and Texas Privacy Laws Comparison Tool Updated 2013

HIPAA/HITECH and Texas Privacy Laws Comparison Tool Updated 2013 HIPAA/HITECH and Texas Privacy Laws Comparison Tool Updated 2013 Federal and Texas Privacy & Security Requirements Minimizing Your Risk of Violations DISCLAIMER The information contained in this document

More information

Legislative & Regulatory Information

Legislative & Regulatory Information Americas - U.S. Legislative, Privacy & Projects Jurisdiction Effective Date Author Release Date File No. UFS Topic Citation: Reference: Federal 3/26/13 Michael F. Tietz Louis Enahoro HIPAA, Privacy, Privacy

More information

The ReHabilitation Center. 1439 Buffalo Street. Olean. NY. 14760

The ReHabilitation Center. 1439 Buffalo Street. Olean. NY. 14760 Procedure Name: HITECH Breach Notification The ReHabilitation Center 1439 Buffalo Street. Olean. NY. 14760 Purpose To amend The ReHabilitation Center s HIPAA Policy and Procedure to include mandatory breach

More information

IDAHO STATE UNIVERSITY POLICIES AND PROCEDURES (ISUPP) HIPAA Privacy - Data Breach Notification Policy 10240

IDAHO STATE UNIVERSITY POLICIES AND PROCEDURES (ISUPP) HIPAA Privacy - Data Breach Notification Policy 10240 IDAHO STATE UNIVERSITY POLICIES AND PROCEDURES (ISUPP) HIPAA Privacy - Data Breach Notification Policy 10240 POLICY INFORMATION Major Functional Area (MFA): MFA X - Office of General Counsel & Compliance

More information

Data Security and Integrity of e-phi. MLCHC Annual Clinical Conference Worcester, MA Wednesday, November 12, 2014 2:15pm 3:30pm

Data Security and Integrity of e-phi. MLCHC Annual Clinical Conference Worcester, MA Wednesday, November 12, 2014 2:15pm 3:30pm Electronic Health Records: Data Security and Integrity of e-phi Worcester, MA Wednesday, 2:15pm 3:30pm Agenda Introduction Learning Objectives Overview of HIPAA HIPAA: Privacy and Security HIPAA: The Security

More information

Joseph Suchocki HIPAA Compliance 2015

Joseph Suchocki HIPAA Compliance 2015 Joseph Suchocki HIPAA Compliance 2015 Sponsored by Eagle Associates, Inc. Eagle Associates provides compliance services for over 1,200 practices nation wide. Services provided by Eagle Associates address

More information

2014 Core Training 1

2014 Core Training 1 2014 Core Training 1 Course Agenda Review of Key Privacy Laws/Regulations: Federal HIPAA/HITECH regulations State privacy laws Privacy & Security Policies & Procedures Huntsville Hospital Health System

More information

University of Cincinnati Limited HIPAA Glossary

University of Cincinnati Limited HIPAA Glossary University of Cincinnati Limited HIPAA Glossary ephi System A system that creates accesses, transmits or receives: 1) primary source ephi, 2) ephi critical for treatment, payment or health care operations

More information

HIPAA and the HITECH Act Privacy and Security of Health Information in 2009

HIPAA and the HITECH Act Privacy and Security of Health Information in 2009 HIPAA and the HITECH Act Privacy and Security of Health Information in 2009 What is HIPAA? Health Insurance Portability & Accountability Act of 1996 Effective April 13, 2003 Federal Law HIPAA Purpose:

More information

My Docs Online HIPAA Compliance

My Docs Online HIPAA Compliance My Docs Online HIPAA Compliance Updated 10/02/2013 Using My Docs Online in a HIPAA compliant fashion depends on following proper usage guidelines, which can vary based on a particular use, but have several

More information

FIVE EASY STEPS FOR HANDLING NEW HIPAA REQUIREMENTS & MANAGING YOUR ELECTRONIC COMMUNICATIONS

FIVE EASY STEPS FOR HANDLING NEW HIPAA REQUIREMENTS & MANAGING YOUR ELECTRONIC COMMUNICATIONS FIVE EASY STEPS FOR HANDLING NEW HIPAA REQUIREMENTS & MANAGING YOUR ELECTRONIC COMMUNICATIONS James J. Eischen, Jr., Esq. October 2013 Chicago, Illinois JAMES J. EISCHEN, JR., ESQ. Partner at Higgs, Fletcher

More information

Add a section in the back of your HIPAA Privacy Manual and HIPAA Security Manual.

Add a section in the back of your HIPAA Privacy Manual and HIPAA Security Manual. HIPAA/HITECH Policies and Procedures Please read this in its entirety. Add a section in the back of your HIPAA Privacy Manual and HIPAA Security Manual. Give a copy of this to all staff to read and ask

More information

6/17/2013 PRESENTED BY: Updates on HIPAA, Data, IT and Security Technology. June 25, 2013

6/17/2013 PRESENTED BY: Updates on HIPAA, Data, IT and Security Technology. June 25, 2013 Updates on HIPAA, Data, IT and Security Technology June 25, 2013 1 The material appearing in this presentation is for informational purposes only and should not be construed as advice of any kind, including,

More information

Datto Compliance 101 1

Datto Compliance 101 1 Datto Compliance 101 1 Overview Overview This document provides a general overview of the Health Insurance Portability and Accounting Act (HIPAA) compliance requirements for Managed Service Providers (MSPs)

More information

HIPAA Privacy and Security

HIPAA Privacy and Security HIPAA Privacy and Security Cindy Cummings, RHIT February, 2015 1 HIPAA Privacy and Security The regulation is designed to safeguard Protected Health Information referred to PHI AND electronic Protected

More information

HIPAA Compliance Issues and Mobile App Design

HIPAA Compliance Issues and Mobile App Design HIPAA Compliance Issues and Mobile App Design Washington, D.C. April 22, 2015 Presenter: Shannon Hartsfield Salimone, Holland & Knight LLP, Tallahassee and Jacksonville, Florida Agenda Whether HIPAA applies

More information

HIPAA BUSINESS ASSOCIATE AGREEMENT

HIPAA BUSINESS ASSOCIATE AGREEMENT HIPAA BUSINESS ASSOCIATE AGREEMENT This Business Associate Agreement ( BAA ) is effective ( Effective Date ) by and between ( Covered Entity ) and Egnyte, Inc. ( Egnyte or Business Associate ). RECITALS

More information

Policies and Procedures Audit Checklist for HIPAA Privacy, Security, and Breach Notification

Policies and Procedures Audit Checklist for HIPAA Privacy, Security, and Breach Notification Policies and Procedures Audit Checklist for HIPAA Privacy, Security, and Breach Notification Type of Policy and Procedure Comments Completed Privacy Policy to Maintain and Update Notice of Privacy Practices

More information

Information Security and Privacy. WHAT is to be done? HOW is it to be done? WHY is it done?

Information Security and Privacy. WHAT is to be done? HOW is it to be done? WHY is it done? Information Security and Privacy WHAT is to be done? HOW is it to be done? WHY is it done? 1 WHAT is to be done? O Be in compliance of Federal/State Laws O Federal: O HIPAA O HITECH O State: O WIC 4514

More information

HIPAA Privacy Keys to Success Updated January 2010

HIPAA Privacy Keys to Success Updated January 2010 HIPAA Privacy Keys to Success Updated January 2010 HIPAA Job Specific Education 1 HIPAA and Its Purpose What is HIPAA? Health Insurance Portability and Accountability Act of 1996 Title II Administrative

More information

NOTICE OF PRIVACY PRACTICES

NOTICE OF PRIVACY PRACTICES NOTICE OF PRIVACY PRACTICES THIS NOTICE DESCRIBES HOW MEDICAL INFORMATION ABOUT YOU MAY BE USED AND DISCLOSED AND HOW YOU CAN GET ACCESS TO THIS INFORMATION. PLEASE REVIEW IT CAREFULLY. IF YOU HAVE ANY

More information

White Paper THE HIPAA FINAL OMNIBUS RULE: NEW CHANGES IMPACTING BUSINESS ASSOCIATES

White Paper THE HIPAA FINAL OMNIBUS RULE: NEW CHANGES IMPACTING BUSINESS ASSOCIATES White Paper THE HIPAA FINAL OMNIBUS RULE: NEW CHANGES IMPACTING BUSINESS ASSOCIATES CONTENTS Introduction 3 Brief Overview of HIPPA Final Omnibus Rule 3 Changes to the Definition of Business Associate

More information

HIPAA-P06 Use and Disclosure of De-identified Data and Limited Data Sets

HIPAA-P06 Use and Disclosure of De-identified Data and Limited Data Sets HIPAA-P06 Use and Disclosure of De-identified Data and Limited Data Sets FULL POLICY CONTENTS Scope Policy Statement Reason for Policy Definitions ADDITIONAL DETAILS Web Address Forms Related Information

More information

HIPAA OMNIBUS RULE: EXPANDED COMPLIANCE REQUIREMENTS

HIPAA OMNIBUS RULE: EXPANDED COMPLIANCE REQUIREMENTS HIPAA OMNIBUS RULE: EXPANDED COMPLIANCE REQUIREMENTS James J. Eischen, Jr., Esq. November 2013 San Diego, California JAMES J. EISCHEN, JR., ESQ. Partner at Higgs, Fletcher & Mack, LLP 26+ years of experience

More information

Guidance Specifying Technologies and Methodologies DEPARTMENT OF HEALTH AND HUMAN SERVICES

Guidance Specifying Technologies and Methodologies DEPARTMENT OF HEALTH AND HUMAN SERVICES DEPARTMENT OF HEALTH AND HUMAN SERVICES 45 CFR PARTS 160 and 164 Guidance Specifying the Technologies and Methodologies That Render Protected Health Information Unusable, Unreadable, or Indecipherable

More information

NCHICA HITECH Act Breach Notification Risk Assessment Tool. Prepared by the NCHICA Privacy, Security & Legal Officials Workgroup

NCHICA HITECH Act Breach Notification Risk Assessment Tool. Prepared by the NCHICA Privacy, Security & Legal Officials Workgroup NCHICA HITECH Act Breach Notification Risk Assessment Tool Prepared by the NCHICA Privacy, Security & Legal Officials Workgroup NORTH CAROLINA HEALTHCARE INFORMATION AND COMMUNICATIONS ALLIANCE, INC August

More information

SOUTHLAKE DERMATOLOGY 1170 N. Carroll Ave. Southlake, TX 76092 www.southlakedermatology.com Main 817-251-6500 Fax 817-442-0550

SOUTHLAKE DERMATOLOGY 1170 N. Carroll Ave. Southlake, TX 76092 www.southlakedermatology.com Main 817-251-6500 Fax 817-442-0550 THIS NOTICE DESCRIBES HOW MEDICAL INFORMATION ABOUT YOU MAY BE USED AND DISCLOSED AND HOW YOU CAN GET ACCESS TO THIS INFORMATION. PLEASE REVIEW IT CAREFULLY. EFFECTIVE September 15, 2014 This Notice of

More information

HIPAA 101: Privacy and Security Basics

HIPAA 101: Privacy and Security Basics HIPAA 101: Privacy and Security Basics Purpose This document provides important information about Kaiser Permanente policies and state and federal laws for protecting the privacy and security of individually

More information