Privacy & Security Matters: Protecting Personal Data. Privacy & Security Project



Similar documents
HIPAA PRIVACY AND SECURITY AWARENESS

HIPAA Security Rule Compliance

HIPAA and Mental Health Privacy:

Heather L. Hughes, J.D. HIPAA Privacy Officer U.S. Legal Support, Inc.

MANUAL OF UNIVERSITY POLICIES PROCEDURES AND GUIDELINES. Applies to: faculty staff students student employees visitors contractors

What is HIPAA? The Health Insurance Portability and Accountability Act of 1996

The Impact of HIPAA and HITECH

Executive Memorandum No. 27

HIPAA and HITECH Compliance for Cloud Applications

HIPAA Compliance for Students

Data Security and Integrity of e-phi. MLCHC Annual Clinical Conference Worcester, MA Wednesday, November 12, :15pm 3:30pm

HIPAA Security. 1 Security 101 for Covered Entities. Security Topics

Why Lawyers? Why Now?

12/19/2014. HIPAA More Important Than You Realize. Administrative Simplification Privacy Rule Security Rule

Overview of the HIPAA Security Rule

Our Commitment to Information Security

INDIANA UNIVERSITY SCHOOL OF OPTOMETRY HIPAA COMPLIANCE PLAN TABLE OF CONTENTS. I. Introduction 2. II. Definitions 3

HIPAA Compliance Guide

What Virginia s Free Clinics Need to Know About HIPAA and HITECH

Hosting for Healthcare: ADDRESSING THE UNIQUE ISSUES OF HEALTH IT & ACHIEVING END-TO-END COMPLIANCE

Health Insurance Portability and Accountability Act (HIPAA) and Health Information Technology for Economic and Clinical Health Act (HITECH)

DEPARTMENT OF MENTAL HEALTH AND DEVELOPMENTAL DISABILITIES

HIPAA Compliance Guide

SCDA and SCDA Member Benefits Group

STATE OF NEVADA DEPARTMENT OF HEALTH AND HUMAN SERVICES BUSINESS ASSOCIATE ADDENDUM

HIPAA Privacy Rule Policies

HIPAA. HIPAA and Group Health Plans

The benefits you need... from the name you know and trust

ADMINISTRATIVE REQUIREMENTS OF HIPAA

HIPAA Overview. Darren Skyles, Partner McGinnis Lochridge. Darren S. Skyles

HIPAA Privacy Summary for Fully-insured Employer Groups

How To Protect Your Health Care From Being Hacked

HIPAA Compliance: Are you prepared for the new regulatory changes?

HIPAA: Privacy/Info Security

COMPLIANCE ALERT 10-12

The Practical Guide to HIPAA Privacy and Security Compliance

HIPAA Security. 5 Security Standards: Organizational, Policies. Security Topics. and Procedures and Documentation Requirements

Trust 9/10/2015. Why Does Privacy and Security Matter? Who Must Comply with HIPAA Rules? HIPAA Breaches, Security Risk Analysis, and Audits

Understanding HIPAA Privacy and Security Helping Your Practice Select a HIPAA- Compliant IT Provider A White Paper by CMIT Solutions

Please Read. Apgar & Associates, LLC apgarandassoc.com P. O. Box Portland, OR Fax

Texas Medical Records Privacy Act

Welcome to ChiroCare s Fourth Annual Fall Business Summit. October 3, 2013

HIPAA Compliance and the Protection of Patient Health Information

How To Understand And Understand The Benefits Of A Health Insurance Risk Assessment

HIPAA and Network Security Curriculum

Healthcare Compliance and Hybrid Entity Designation

Building Trust and Confidence in Healthcare Information. How TrustNet Helps

M E M O R A N D U M. Definitions

HIPAA Privacy Overview

Richard Gadsden Information Security Office Office of the CIO Information Services

HIPAA RISKS & STRATEGIES. Health Insurance Portability and Accountability Act of 1996

HIPAA Privacy Summary for Self-insured Employer Groups

The Security Rule of The Health Insurance Portability and Accountability Act (HIPAA) Security Training

efolder White Paper: HIPAA Compliance

Health Care Information Privacy The HIPAA Regulations What Has Changed and What You Need to Know

3/13/2015 HIPAA/HITECH WHAT S YOUR COMPLIANCE STATUS? Daniel B. Mills Pretzel & Stouffer, Chartered WHAT IS HIPAA?

HIPAA Training For Research Investigators and Study Staff

White Paper THE HIPAA FINAL OMNIBUS RULE: NEW CHANGES IMPACTING BUSINESS ASSOCIATES

RUTGERS POLICY. Section Title: Legacy UMDNJ policies associated with Information Technology

HIPAA Requirements for Data Security

SUBJECT: SECURITY OF ELECTRONIC MEDICAL RECORDS COMPLIANCE WITH THE HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT OF 1996 (HIPAA)

The HIPAA Security Rule Primer Compliance Date: April 20, 2005

RUTGERS POLICY. Policy Name: Standards for Privacy of Individually Identifiable Health Information

TABLE OF CONTENTS. University of Northern Colorado

TJ RAI, M.D. THERAPY MEDICATION WELLNESS PRIVACY POLICY STATEMENT

Policies and Procedures Audit Checklist for HIPAA Privacy, Security, and Breach Notification

Nationwide Review of CMS s HIPAA Oversight. Brian C. Johnson, CPA, CISA. Wednesday, January 19, 2011

MYTHS AND FACTS ABOUT THE HIPAA PRIVACY RULE PART 1

Privacy for Beginners: What Every Healthcare Worker Needs to Know About HIPAA and Privacy

787 Wye Road, Akron, Ohio P F

General HIPAA Implementation FAQ

HIPAA 100 Training Manual Table of Contents. V. A Word About Business Associate Agreements 10

The HIPAA Audit Program

Getting Hip to the HIPAA and HITECH Act Compliance

Security Is Everyone s Concern:

what your business needs to do about the new HIPAA rules

HIPAA PRIVACY AND SECURITY FOR EMPLOYERS

HIPAA Self-Study Module Patient Privacy at Unity Health Care, Inc HIPAA Hotline

Bridging the HIPAA/HITECH Compliance Gap

Understanding Health Insurance Portability Accountability Act AND HITECH. HIPAA s Privacy Rule

The HIPAA Security Rule Primer A Guide For Mental Health Practitioners

Guide: Meeting HIPAA Security Rules

HIPAA PRIVACY OVERVIEW

HIPAA Security Alert

HIPAA In The Workplace. What Every Employee Should Know and Remember

C.T. Hellmuth & Associates, Inc.

Datto Compliance 101 1

HIPAA PRIVACY FOR EMPLOYERS A Comprehensive Introduction. HIPAA Privacy Regulations-General

HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT (HIPAA): FACT SHEET FOR NEUROPSYCHOLOGISTS Division 40, American Psychological Association

HIPAA: Understanding The Omnibus Rule and Keeping Your Business Compliant

HIPAA Security. Jeanne Smythe, UNC-CH Jack McCoy, ECU Chad Bebout, UNC-CH Doug Brown, UNC-CH

PRIVACY POLICIES AND FORMS FOR BUSINESS ASSOCIATES

HIPAA OVERVIEW ETSU 1

SECURITY RISK ASSESSMENT SUMMARY

HIPAA Information Security Overview

New HIPAA regulations require action. Are you in compliance?

Sunday March 30, 2014, 9am noon HCCA Conference, San Diego

2/9/ HIPAA Privacy and Security Audit Readiness. Table of contents

HIPAA Orientation. Health Insurance Portability and Accountability Act

ALLINA HOSPITALS & CLINICS System-wide Policy

Transcription:

Privacy & Security Matters: Protecting Personal Data Privacy & Security Project

HIPAA: What it is Health Insurance Portability and Accountability Act of 1996 Also known as Kennedy-Kassebaum Act Legislation had wide regulatory impact Medicare Fraud to Medical Savings Accounts. Department of Health and Human Services Responsible for creating regulations Office of Civil Rights responsible for enforcement

What HIPAA Does 1. Creates standards for protecting the privacy of health information 2. Creates standards for the security of health information 3. Creates standards for electronic exchange of health information 4. Requires action as single entity 5. Privacy rule mandates training 25,000 workforce members on standards and policies

Deadlines for Compliance Privacy Security Transactions & Code Sets Identifiers April 14, 2003! Fall 2004 October 16, 2003 Fall 2004

Key Definitions Individually Identifiable Health Information Related to an individual; the provision of health care to an individual; or payment for health care and that identifies the individual or a reasonable basis to believe the information can be used to identify the individual Protected Health Information (PHI) Individually Identifiable Health Information Electronic, paper, oral Created or received by a health care provider, public health authority, employer, school or university

Definitions Covered Entity Health care provider who transmits any health information in electronic form in connection with HIPAA regulations Health care provider means a provider of medical or health services, and any other person or organization who furnishes, bills, or is paid for health care in the normal course of business.

Impact on the University System Significant financial implications High level of risk to individuals and to institution civil monetary penalties criminal sanctions Requires a change in the way we do business New U-wide policies & procedures Limits access to information

Scope of Impact University-wide -Athletics -Auxiliary Services -Carlson SOM -Ed and Human Devel. -College of Liberal Arts -School of Music -General Counsel -Food Science & Nutrition -MMF -University Foundation -U Health Plan -General College -Student Health Services -Disability Services -Environmental Health -OIT All Coordinate Campuses Business partners: UMP, FUMC, affiliated sites business associates

Operations Impact Education ensure students competencies in privacy & technology. Record keeping curriculum Research Major change to process IRB processes and function Health Care Culture change

University Policies and Procedures Needed Regents policy on privacy, compliance and enforcement Policies for use and disclosures of PHI Privacy policy for patients Administrative forms permitting disclosure Policies for sanctions, mitigation, and monitoring Policies for data security Policies for education and training

Key Components of Compliance with Privacy Rule Policies and procedures Privacy Officer Training Program Complaint Process Internal compliance audit program Sanctions Incident response and corrective action procedures

Privacy and Security Project Organization Education & Training Task Force Privacy and Confidentiality Curriculum for Tech Competencies Curriculum for Policy, Legal, Ethics, and Health Systems Issues Privacy Environment Implementation Competency Assessment Technology Task Force Clinical issues Technical & Security Audit Research Issues

Privacy and Security Project Education Program Model Introduction to HIPAA Privacy And Security Videotape (7 minutes) Safeguarding PHI on Computers (70 minutes) Privacy and Confidentiality in Research (70 minutes) Privacy and Confidentiality in Clinical Settings (55 minutes)

Privacy and Security Project Organization Example of Training Material

Security and the Privacy Rule Must implement appropriate technical safeguards to protect privacy of PHI. Must be able to reasonably safeguard against any intentional or unintentional use or disclosure that is a privacy violation. Should work in conjunction with minimum necessary rule Coordinated with HIPAA security regulations.

HIPAA Security Rule: Implications for University IT Security Rule applies to individually identifiable information that is in electronic form. All health care providers, health plans, or clearinghouses must comply!

Goal of Security Rule To ensure reasonable and appropriate administrative, technical, and physical safeguards that insure the integrity, availability and confidentiality of health care information, and protect against reasonably foreseeable threats to the security or integrity of the information.

Focus of Security Rule Both external and internal threats Prevention of denial of service Theft of private information Integrity of information

Rule has 4 categories 1. Administrative Procedures 2. Physical Safeguards 3. Technical data security services 4. Technical security mechanisms

Administrative Procedures: 12 Requirements 1. Certification 2. Chain of Trust Agreements 3. Contingency Plan 4. Mechanism for processing records 5. Information Access Control 6. Internal Audit 7. Personnel Security 8. Security Configuration Management 9. Security Incident Procedures 10. Security Management Process 11. Termination Procedures 12. Training

Physical Safegaurds: 6 Requirements 1. Assigned Security Responsibility 2. Media Controls 3. Physical Access Controls 4. Policy on Workstation Use 5. Secure Workstation Location 6. Security Awareness Training

Technical Data Security Services: 5 Requirements 1. Access Control 2. Audit Controls 3. Authorization Control 4. Data Authentication 5. Entity Authentication

Technical Security Mechanism: 1 Requirement 1. Protections for health information transmitted over open networks via: Integrity controls, and Message authentication, and Access controls OR encryption

Dash Board For Evaluation # staff - # volunteers - % trained # of clients # of security incidents Have list of systems containing PHI and know location of system and who is data steward -# of items on list Confidence that unit has good physical security

Dash Board For Evaluation Have list of data interfaces -# of data interfaces Have list of contracts/business associates - # of contracts/business associates Allow PHI to be put on personal PCs or in Email or loaded to WEB site

Dash Board For Evaluation Have to do list for securing computer systems - # of items on list Have process to receive/communicate HIPAA compliant risk - # of items on list