ACRONYMS: HIPAA: Health Insurance Portability and Accountability Act PHI: Protected Health Information



Similar documents
8.03 Health Insurance Portability and Accountability Act (HIPAA)

Understanding Health Insurance Portability Accountability Act AND HITECH. HIPAA s Privacy Rule

HIPAA Training for Hospice Staff and Volunteers

HIPAA and Privacy Policy Training

Department of Health and Human Services Policy ADMN 004, Attachment A

HIPAA Education Level One For Volunteers & Observers

PHI- Protected Health Information

CREATIVE SOLUTIONS IN HEALTHCARE, INC. Privacy Policy

HIPAA PRIVACY AND SECURITY AWARENESS. Covering Kids and Families of Indiana April 10, 2014

PROTECTING PATIENT PRIVACY and INFORMATION SECURITY

College of DuPage Information Technology. Information Security Plan

Privacy and Information Security Awareness Training. Health Insurance Portability & Accountability Act of HIPAA

The Basics of HIPAA Privacy and Security and HITECH

Why Lawyers? Why Now?

HIPAA Self-Study Module Patient Privacy at Unity Health Care, Inc HIPAA Hotline

Health Insurance Portability and Accountability Act of 1996 (HIPAA) Contents

HIPAA Update Focus on Breach Prevention

HIPAA PRIVACY AND SECURITY AWARENESS

HIPAA Training for Staff and Volunteers

HIPAA 101: Privacy and Security Basics

HIPAA SELF STUDY TRAINING GUIDE

Patient Privacy and HIPAA/HITECH

HIPAA Overview. Health Insurance Portability and Accountability Act of 1996 (PL )

HIPAA Privacy at SCG...

What is HIPAA? The Health Insurance Portability and Accountability Act of 1996

HIPAA Awareness Training

Policy Scope: The policy applies across the Division to all DPH workgroups who maintain, use, have access to, or come into contact with IIHI.

ACCOUNTABLE HEALTHCARE IPA HIPAA PRIVACY AND SECURITY TRAINING. By: Jerry Jackson Compliance and Privacy Officer

HIPAA BUSINESS ASSOCIATE AGREEMENT

Guadalupe Regional Medical Center

Protecting Patient Privacy It s Everyone s Responsibility

Health Insurance Portability and Accountability Act HIPAA Privacy Standards

HIPAA Policy, Protection, and Pitfalls ARTHUR J. GALLAGHER & CO. BUSINESS WITHOUT BARRIERS

HEALTH INSURANCE PORTABILITY & ACCOUNTABILITY ACT OF 1996 HIPAA

HIPAA The Law Explained. Click here to view the HIPAA information.

CMA BUSINESS ASSOCIATE AGREEMENT WITH CMA MEMBERS

Information Security Policy

HIPAA Training for the MDAA Preceptorship Program. Health Insurance Portability and Accountability Act

HIPAA TRAINING. A training course for Shiawassee County Community Mental Health Authority Employees

Health Insurance Portability and Accountability Act (HIPAA)

SARASOTA COUNTY GOVERNMENT EMPLOYEE MEDICAL BENEFIT PLAN HIPAA PRIVACY POLICY

Community First Health Plans Breach Notification for Unsecured PHI

Frequently Asked Questions About the Privacy Rule Under HIPAA

2014 Core Training 1

MCCP Online Orientation

Protecting. Personal Information A Business Guide. Division of Finance and Corporate Securities

HIPAA and the HITECH Act Privacy and Security of Health Information in 2009

SAMPLE BUSINESS ASSOCIATE AGREEMENT

ELKIN & ASSOCIATES, LLC. HIPAA Privacy Policy and Procedures INTRODUCTION

BUSINESS ASSOCIATE AGREEMENT ( BAA )

HIPAA And Public Health. March 2006 Delaware s Division of Public Health 1

HIPAA. HIPAA and Group Health Plans

Index .700 FORMS - SAMPLE INCIDENT RESPONSE FORM.995 HISTORY

Information Security Policy

HFS DATA SECURITY TRAINING WITH TECHNOLOGY COMES RESPONSIBILITY

Health Insurance Portability and Accountability Act (HIPAA) Overview

Whitefish School District. PERSONNEL 5510 page 1 of 5 HIPAA

The benefits you need... from the name you know and trust

HIPAA Privacy and Security. Rochelle Steimel, HIPAA Privacy Official Judy Smith, Staff Development January 2012

FDOH Information and Privacy Awareness Training Learner Course Guide

MONTSERRAT COLLEGE OF ART WRITTEN INFORMATION SECURITY POLICY (WISP)

HIPAA Employee Training Guide. Revision Date: April 11, 2015

Somerset County Council - Data Protection Policy - Final

Louisiana Department of Health and Hospitals Basic HIPAA Privacy Training: Policies and Procedures

INFORMATION TECHNOLOGY SECURITY POLICY COUNTY OF IMPERIAL

HIPAA Information Security Overview

Client Advisory October Data Security Law MGL Chapter 93H and 201 CMR 17.00

HIPAA Basics. Health Insurance Portability and Accountability Act of 1996

HIPAA Security Training Manual

DATA PROTECTION IT S EVERYONE S RESPONSIBILITY. An Introductory Guide for Health Service Staff

BERKELEY COLLEGE DATA SECURITY POLICY

BUSINESS ASSOCIATE AGREEMENT. Business Associate. Business Associate shall mean.

HIPAA OVERVIEW ETSU 1

HIPAA Auditing Tool. Department: Site Location: Visit Date:

M E M O R A N D U M. Definitions

GLENN COUNTY HEALTH AND HUMAN SERVICES AGENCY. HIPAA Policies and Procedures 06/30/2014

HIPAA: Privacy/Info Security

THE HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT (HIPAA) EMPLOYEE TRAINING MANUAL

Pacific Medical Centers HIPAA Training for Residents, Fellows and Others

HIPAA PRIVACY FOR EMPLOYERS A Comprehensive Introduction. HIPAA Privacy Regulations-General

HIPAA In The Workplace. What Every Employee Should Know and Remember

Health Insurance Portability and Accountability Act of 1996 (HIPAA)

Privacy Training for Harvard Medical Students

HIPAA MANUAL. Most health plans and health care providers that are covered by the new Rule must comply with the new requirements by April 14, 2003.

Scottish Rowing Data Protection Policy

HIPAA Privacy Policy & Notice of Privacy Practices

RONALD V. MCGUCKIN AND ASSOCIATES Post Office Box 2126 Bristol, Pennsylvania (215) (215) (Fax) childproviderlaw.

Introduction. Purpose. Reference. Applicability. HIPAA Policy 7.1. Safeguards to Protect the Privacy of PHI

Career Connection, Inc. Data Privacy. Bringing Talent Together With Opportunity

HIPAA Orientation. Health Insurance Portability and Accountability Act

MONROE COUNTY WATER AUTHORITY IDENTITY THEFT PREVENTION POLICY REVISED MARCH 2014

HIPAA Happenings in Hospital Systems. Donna J Brock, RHIT System HIM Audit & Privacy Coordinator

HIPAA. August 12, 2008

HIPAA Privacy & Security Rules

HIPAA Privacy Overview

HIPAA (Health Insurance Portability and Accountability Act of 1996) Stetson University HIPAA Training

About this Tool Information Security for Residents...

INFORMATION TECHNOLOGY Policy 8400 (Regulation 8400) Data Security

Appendix : Business Associate Agreement

Information Security and Privacy. WHAT is to be done? HOW is it to be done? WHY is it done?

Transcription:

NAMI EASTSIDE - 13 POLICY: Privacy and Security of Protected Health Information (HIPAA Policies and Procedures) DATE APPROVED: Pending INTENT: (At present, none of the activities that NAMI Eastside provides fall under HIPAA as no files are maintained on anyone beyond their contact info, see privacy policy 12). If for any reason that should be changed or be defined otherwise, NAMI Eastside will adhere to the policy as outlined below. To ensure that all communications involving Protected Health Information (PHI) comply with the federal regulations outlined in the Health Insurance Portability and Accountability Act of 1996 (HIPAA), Washington State Administrative Code (WAC), the Revised Code of Washington (RCW), and all other laws and regulations protecting personal information. ACRONYMS: HIPAA: Health Insurance Portability and Accountability Act PHI: Protected Health Information PROCEDURE:

1. Protected Health Information (PHI). 1. Definition. 2. Penalties. 3. Access. 1. Any information, whether oral or recorded, in any form or medium, that is created or received by NAMI Eastside; relates to the past, present, or future physical or mental health or condition of an individual; or the provision of health care to an individual. 2. Any information that identifies the individual or can be used to identify the individual is protected. 3. PHI includes any number or code issued by a government entity for the purpose of personal identification that is protected and is not available to the public. Examples of such information include, but is not limited to, the following: 1. Personal Identification Numbers such as tax identification number, social security number, driver's license number, state identification card number. 2. Financial and Health Information such as account numbers or access codes, credit card numbers, medical history, medical status, donor status. 1. Violations of HIPAA regulations and of this policy may result in disciplinary action. 2. HIPAA also holds violators accountable, with civil and criminal penalties that can be imposed for violations of patients privacy rights. 1. Civil penalties range from $100 per incident up to $25,000 per person, per year, per standard. 2. Federal criminal penalties, including additional monetary penalties and imprisonment, may be imposed for more abusive and egregious violations. These may include knowingly violating patient privacy by improperly obtaining or disclosing PHI; obtaining PHI under false pretenses ; or obtaining or disclosing PHI with the intent to sell, transfer or use it for commercial advantage, personal gain or malicious harm. 1. NAMI Eastside makes internal practices, books and records, including policies and procedures and PHI, relating to the use

and disclosure of PHI received from, or created or received by NAMI Eastside on behalf of King County, available to King County to determine compliance with the privacy rule. 2. The agency shall maintain a list (Access by Job Function) specifying the job categories within the agency having access to PHI necessary to carry out their job duties, the categories or types of PHI needed, and the conditions appropriate to such access. Employees are prohibited access to PHI beyond that specified. (See also NAMI Eastside policy Confidentiality of Mental Health Information and Records, Disclosing Information). 4. Confidentiality/Disclosures. 2. Restricted Areas. 1. Confidentiality requirements apply to all information, oral and recorded, which is compiled, obtained or maintained in the course of providing service, establishing membership or receiving financial support. 2. Oral communications include, but are not limited to, face- to- face conversations, telephone conversations, and discussions in a group setting. Additionally, 1. Caution should be taken when retrieving voice mail messages from your telephone when the speaker is on. 2. Cell phone conversations are subject to interception and should not be regarded as confidential. 3. Employees and volunteers may disclose protected information only if it is appropriate and necessary to the performance of their job responsibilities and/or an exception, as allowed by law, to the confidentiality requirements. All disclosures must limit the PHI disclosed to the minimum necessary to accomplish the purpose of the disclosure. All disclosures must be documented. (See Confidentiality policies.). 1. Rooms/offices are considered to be restricted if they can be locked, with access limited to employees and volunteers with a need to know. Documents containing PHI that are maintained in restricted areas may be considered to be secure, subject to the following: 1. Restricted areas must be kept locked when not occupied or monitored. 2. Non- NAMI Eastside employees and volunteers without a need- to- know must always be accompanied when in restricted areas.

3. Non- restricted Areas. 4. Computers. 1. Non- restricted areas include areas that are accessible by the public, or are regularly used for purposes that involve non- NAMI Eastside employees/volunteers or those with limited need to know. Such areas may include conference rooms, waiting areas, reception areas, copy areas, rooms used for group meetings, shared offices, all off- site locations where services are provided, etc. Materials containing PHI must never be left or stored in non- restricted areas unless in locked cabinets with keys available only to those designated. 1. Information should never be left lying out in the open in plain view.. 2. Internally created documents and lists, created for the purpose of operational necessity, must contain information limited to the purpose for which it is created, must be limited in distribution to those who have a need for the information, must be maintained in secure places, and must be archived in a secure place or destroyed once the purpose has been satisfied. 3. Care should be taken to ensure that oral communications are not overheard in adjacent areas, or by persons without a need to know. 4. Cover sheets or other means of concealment must be used for PHI when left in employee or volunteer mailboxes. 5. PHI may be requested via fax machine only when the recipient who has a need to know is available to accept the information as it is received. PHI should only be sent if the designated recipient will be present to pick up the information as received, verified via real- time telephone contact. 6. Fax copies that contains PHI and are picked up by a person other than the specific person to whom it is addressed must be handled in such a way as to protect the information. If the recipient is identified, the material should be given directly to that person. If the intended recipient is not available, cover sheets or other means of concealment must be used when leaving the information in employee or volunteer mailboxes. If no specific recipient is identified on the fax, the material will be given to the Program Coordinator for assignment. 1. It is acceptable to retain PHI on a local computer hard drive providing the computer is either maintained in a restricted area or is password protected and there is operational need for having access to the information. Once there is no longer operational need, the information

must be deleted from the hard drive, although it may be saved to disk for storage in a locked cabinet/desk if desired for archiving. 2. Hard drive data backed up onto disk must be kept in a locked cabinet/desk. 3. PHI must not be left displayed on a screen when the computer is not in use. Additionally, screens should not display PHI where there is a chance that anyone without a need to know can see it. 5. Handling PHI Off- site 6. Disposal of PHI. 1. Documents containing PHI should never be removed from the worksite unless absolutely necessary to fulfill a job function. When necessary, or when PHI is created off- site, all reasonable precautions shall be made to safeguard the information against potential disclosure, and shall be returned to a secure area as soon as possible when no longer needed to complete a specific job function. 1. Destruction. Careless disposal of PHI poses a significant threat to identity theft, putting an individual's privacy, financial security, and other interests at risk. It is unlawful in the State of Washington to dispose of personal information without making reasonable efforts to destroy that information. The statute requires shredding of the document, or erasing or otherwise modifying this personal information to make it unreadable before discarding the document. Utilize the shredder/shredding bins when possible. At the end of each work day or shift, each employee or volunteer is required to have either destroyed, deposited in the designated shredding container or store in compliance with NAMI Eastside policies and procedures PHI received during that period.