HIPAA PRIVACY AND SECURITY AWARENESS

Similar documents
Heather L. Hughes, J.D. HIPAA Privacy Officer U.S. Legal Support, Inc.

Health Care Information Privacy The HIPAA Regulations What Has Changed and What You Need to Know

HIPAA Security Rule Compliance

HIPAA Orientation. Health Insurance Portability and Accountability Act

HIPAA: In Plain English

HIPAA Compliance and the Protection of Patient Health Information

12/19/2014. HIPAA More Important Than You Realize. Administrative Simplification Privacy Rule Security Rule

Health Insurance Portability and Accountability Act (HIPAA) and Health Information Technology for Economic and Clinical Health Act (HITECH)

HIPAA MANUAL. Most health plans and health care providers that are covered by the new Rule must comply with the new requirements by April 14, 2003.

White Paper THE HIPAA FINAL OMNIBUS RULE: NEW CHANGES IMPACTING BUSINESS ASSOCIATES

HIPAA Information Security Overview

The Basics of HIPAA Privacy and Security and HITECH

USES AND DISCLOSURES OF HEALTH INFORMATION

HIPAA Compliance Guide

How To Understand And Understand The Benefits Of A Health Insurance Risk Assessment

Understanding HIPAA Privacy and Security Helping Your Practice Select a HIPAA- Compliant IT Provider A White Paper by CMIT Solutions

The HIPAA Security Rule Primer A Guide For Mental Health Practitioners

What Virginia s Free Clinics Need to Know About HIPAA and HITECH

C.T. Hellmuth & Associates, Inc.

SCHOOL DISTRICT OF BLACK RIVER FALLS HIPAA PRIVACY AND SECURITY POLICY

The HIPAA Security Rule Primer Compliance Date: April 20, 2005

Privacy & Security Matters: Protecting Personal Data. Privacy & Security Project

Data Security and Integrity of e-phi. MLCHC Annual Clinical Conference Worcester, MA Wednesday, November 12, :15pm 3:30pm

HEALTH INSURANCE PORTABILITY & ACCOUNTABILITY ACT OF 1996 HIPAA

COMPLIANCE ALERT 10-12

OCRA Spring Convention ~ 2014 Phyllis Craver Lykken, RPR, CLR, CCR Court Reporters and HIPAA

SCDA and SCDA Member Benefits Group

HIPAA Privacy Overview

Use & Disclosure of Protected Health Information by Business Associates

M E M O R A N D U M. Definitions

PRIVACY POLICIES AND FORMS FOR BUSINESS ASSOCIATES

There are three sections to HIPAA the Privacy Rule, the Security Rule, and the Transaction Rule.

HIPAA and Mental Health Privacy:

Health Information Privacy Refresher Training. March 2013

HIPAA Happenings in Hospital Systems. Donna J Brock, RHIT System HIM Audit & Privacy Coordinator

HIPAA The Law Explained. Click here to view the HIPAA information.

HIPAA Privacy & Security Training for Clinicians

HIPAA Compliance for Students

HIPAA Compliance The Time is Now Changes on the Horizon: The Final Regulations on Privacy and Security. May 7, 2013

HHS Issues New HITECH/HIPAA Rule: Implications for Hospice Providers

Datto Compliance 101 1

HIPAA Privacy Summary for Self-insured Employer Groups

HIPAA Privacy Summary for Fully-insured Employer Groups

HIPAA Compliance Guide

HIPAA Employee Training Guide. Revision Date: April 11, 2015

Neither You Nor Your Business Associates Can Afford to be Lax About Complying with HIPAA Requirements

what your business needs to do about the new HIPAA rules

8.03 Health Insurance Portability and Accountability Act (HIPAA)

Policies and Procedures Audit Checklist for HIPAA Privacy, Security, and Breach Notification

HFS DATA SECURITY TRAINING WITH TECHNOLOGY COMES RESPONSIBILITY

HIPAA Security. 5 Security Standards: Organizational, Policies. Security Topics. and Procedures and Documentation Requirements

HIPAA CHECKLISTS DEVELOPING YOUR HIPAA DOCUMENTS PRACTICAL TOOLS AND RESOURCES. MASSACHUSETTS MEDICAL SOCIETY Getting Ready for

INDIANA UNIVERSITY SCHOOL OF OPTOMETRY HIPAA COMPLIANCE PLAN TABLE OF CONTENTS. I. Introduction 2. II. Definitions 3

Updated HIPAA Regulations What Optometrists Need to Know Now. HIPAA Overview

HIPAA Security. 4 Security Standards: Technical Safeguards. Security Topics

HIPAA Employee Compliance Program TRAINING MANUAL

HIPAA: Privacy/Info Security

HIPAA SELF STUDY TRAINING GUIDE

Protecting Patient Privacy It s Everyone s Responsibility

HIPAA, PHI and . How to Ensure your and Other ephi are HIPAA Compliant.

HIPAA/HITECH: A Guide for IT Service Providers

HIPAA Self-Study Module Patient Privacy at Unity Health Care, Inc HIPAA Hotline

HIPAA BUSINESS ASSOCIATE AGREEMENT

SECURITY RISK ASSESSMENT SUMMARY

HIPAA Security. 2 Security Standards: Administrative Safeguards. Security Topics

HIPAA Security. 1 Security 101 for Covered Entities. Security Topics

ACKNOWLEDGMENT OF RECEIPT OF NOTICE OF PRIVACY PRACTICES

HIPAA Compliance: Are you prepared for the new regulatory changes?

Building Trust and Confidence in Healthcare Information. How TrustNet Helps

UNIVERSITY OF MAINE SYSTEM STANDARDS FOR SAFEGUARDING INFORMATION ATTACHMENT C

Healthcare Compliance Solutions

Securing the FOSS VistA Stack HIPAA Baseline Discussion. Jack L. Shaffer, Jr. Chief Operations Officer

HIPAA/HITECH PRIVACY & SECURITY CHECKLIST SELF ASSESSMENT INSTRUCTIONS

HIPAA COMPLIANCE AND DATA PROTECTION Page 1

The Practical Guide to HIPAA Privacy and Security Compliance

HIPAA and HITECH Compliance for Cloud Applications

HIPAA Compliance Annual Mandatory Education

Transcription:

HIPAA PRIVACY AND SECURITY AWARENESS

Introduction The Health Insurance Portability and Accountability Act (known as HIPAA) was enacted by Congress in 1996. HIPAA serves three main purposes: To protect people from losing their health insurance if they change jobs or have pre-existing health conditions. To reduce the costs and administrative burdens of healthcare by creating standard electronic formats for many administrative transactions that were previously carried out on paper. To develop standards and requirements to protect the privacy and security of personal health information.

Entities covered by the Privacy and Security Rules include: Healthcare plans Introduction Healthcare providers Healthcare clearinghouses Business associates of covered entities, which include auditors, consultants, lawyers, data and billing firms and others with whom the covered entities have agreements involving the use of protected health information.

Protected Health Information No matter what form it takes, notes on a medical chart, health information entered into a computer or discussions about a patient s condition, any identifiable health information becomes protected health information (PHI) under HIPAA. A covered entity may not use or disclose protected health information except: As the individual authorizes in writing; or As the HIPAA Privacy Rule permits or requires.

Protected Health Information PHI can be disclosed: To the individual or their authorized representative. For treatment, payment or healthcare operations. When the individual has the opportunity to agree or object, such as when the patient brings another person into the exam room for their office visit. Incidental to an otherwise permitted use. For the purposes of research or public health. Professional ethics and good judgment should also be relied upon in deciding which of these permissive uses and disclosures to make.

Protected Health Information Covered entities are required to provide patients with a Notice of Privacy Practices and make a good faith effort to obtain a patient s written acknowledgment of receiving the notice. The notice must inform patients of (1) the uses and disclosures of PHI that may be made, (2) the patient s right to access and amend their medical information, and (3) the covered entity s responsibilities with respect to PHI. The entity may use PHI for its own treatment, payment or healthcare operations and may disclose PHI to other covered entities. Reasonable efforts to limit PHI to the minimum necessary should be taken when using or requesting PHI.

Patient Access Except in certain circumstances, individuals have the right to review and obtain copies of their protected health information. Personal representatives, parents of minors and others may also be legally authorized to make healthcare decisions on behalf of patients. Covered entities may impose reasonable, cost-based fees (postage and cost of copying) for PHI request.

Other Uses of PHI As a general rule, covered entities may not use or disclose PHI for any purpose other than treatment, payment and healthcare operations without the patient s written authorization. The Privacy Rule does allow for incidental disclosure of PHI as long as the covered entity used reasonable safeguards and adheres to the minimum necessary standard. For example, the use of waiting room sign-in sheets would be considered incidental disclosure of PHI.

Administrative Safeguards Since many employees receive, store and transmit PHI as part of their daily routine, the Privacy Rule requires the following safeguards: A Privacy Officer must be designated for the purpose of developing and implementing privacy policies and the receiving of complaints. All workforce members must be trained on privacy policies and procedures.

Administrative Safeguards Requires all business associates must confirm that they will protect PHI. A system must be developed to track who accessed what information. Rules must be implemented for addressing violations of privacy, security and transaction regulations, and establish a process for making complaints and preventing retaliation against anyone who reports a HIPAA violation.

Safeguards for Security Administrative Safeguards Requirements include: Designating a Security Officer in charge of developing, implementing and evaluating security policies. This may be the same person as the Privacy Officer. Ensuring computers are secure from intrusion. Applying appropriate sanctions against employees who fail to comply with HIPAA policies.

Safeguards for Security Implementing procedures to regularly review records of information system activity. Developing a plan for granting and limiting different levels of access to PHI, including clearance and termination procedures. This includes security checks and special training for all employees with access to sensitive information. Providing a contingency plan for responding to system emergencies. Implementing procedures for reporting and dealing with security breaches.

Physical Safeguards Safeguards for Security The Security Rule also requires a number of physical steps to ensure that PHI contained in computers is protected. A facility security plan should be developed that deters intruders from accessing areas where PHI resides. Guidelines should be established on how to handle sensitive information that may be displayed on computer screens. The safeguarding of information on hardware and software must also be utilized, as well as, procedures for off-site data backup.

Safeguards for Security Technical Safeguards The Security Rule requires certain technical safeguards for PHI. Controls to ensure that access to sensitive information is available on a need-to-know basis must be established. Audit controls to record and examine system activity. Controls to help ensure that health data has not been altered in an unauthorized manner.

Safeguards for Security Controls to ensure that data is sent to the intended recipient and received by the intended party ( including the use of passwords, PIN numbers and encryption). Controls to protect PHI sent via e-mail and fax. According to the Security Rule, it is permissible to use the internet to transmit PHI. An acceptable method of encryption must be used and appropriate authentication procedures followed to ensure correct identification of the sender and receiver. Faxes are not considered to be covered transactions by the Security Rule. They may be sent as authorized by your company s privacy policy.

Compliance and Enforcement The HIPAA regulations are now completely in effect and failure to comply with the HIPAA Privacy or Security Rules can lead to significant financial and other penalties. Civil and criminal penalties, to both individuals and companies, may be enforced and include fines up to $1.5 million and ten years of imprisonment. It is important that all who may come into contact with PHI understand and carry out their responsibilities under these rules, as outlined in this training program.