HIPAA OVERVIEW ETSU 1



Similar documents
HIPAA COMPLIANCE. What is HIPAA?

HIPAA COMPLIANCE INFORMATION. HIPAA Policy

HIPAA-Compliant Research Access to PHI

INDIANA UNIVERSITY SCHOOL OF OPTOMETRY HIPAA COMPLIANCE PLAN TABLE OF CONTENTS. I. Introduction 2. II. Definitions 3

Patient Privacy and HIPAA/HITECH

HIPAA 100 Training Manual Table of Contents. V. A Word About Business Associate Agreements 10

Health Insurance Portability & Accountability Act (HIPAA) Compliance Application

HIPAA Compliance for Students

HIPAA-P06 Use and Disclosure of De-identified Data and Limited Data Sets

HIPAA Privacy Summary for Fully-insured Employer Groups

Statement of Policy. Reason for Policy

Protecting Personal Health Information in Research: Understanding the HIPAA Privacy Rule

HIPAA Privacy Summary for Self-insured Employer Groups

HIPAA SELF STUDY TRAINING GUIDE

BUSINESS ASSOCIATE AGREEMENT HIPAA Protected Health Information

What is Covered by HIPAA at VCU?

Malpractice Issues for the Radiologic Technologist

Winthrop-University Hospital

Information Security and Privacy. WHAT is to be done? HOW is it to be done? WHY is it done?

HIPAA Education Level One For Volunteers & Observers

HIPAA Orientation. Health Insurance Portability and Accountability Act

State of Connecticut Department of Social Services HIPAA Policies and Procedures Manual

De-Identification of Health Data under HIPAA: Regulations and Recent Guidance" " "

Presented by Jack Kolk President ACR 2 Solutions, Inc.

How to De-identify Data. Xulei Shirley Liu Department of Biostatistics Vanderbilt University 03/07/2008

HIPAA POLICY REGARDING DE-IDENTIFICATION OF PROTECTED HEALTH INFORMATION AND USE OF LIMITED DATA SETS

Everett School Employee Benefit Trust. Reportable Breach Notification Policy HIPAA HITECH Rules and Washington State Law

PEPPERDINE UNIVERSITY HIPAA Policies Procedures and Forms Manual

HIPAA 101: Privacy and Security Basics

HIPAA Privacy and Security Rules: A Refresher. Marilyn Freeman, RHIA California Area HIPAA Coordinator California Area HIM Consultant

UPMC POLICY AND PROCEDURE MANUAL

State of Nevada Public Employees Benefits Program. Master Plan Document for the HIPAA Privacy and Security Requirements for PEBP Health Benefits

HIPAA-G04 Limited Data Set and Data Use Agreement Guidance

HIPAA Happenings in Hospital Systems. Donna J Brock, RHIT System HIM Audit & Privacy Coordinator

HIPAA. Privacy and Security Frequently Asked Questions for Employers. Gallagher Benefit Services, Inc.

8/3/2015. Integrating Behavioral Health and HIV Into Electronic Health Records Communities of Practice

De-Identification of Clinical Data

What is Covered under the Privacy Rule? Protected Health Information (PHI)

LA BioMed Secure

Health Insurance Portability and Accountability Policy 1.8.4

Department of Health and Human Services Policy ADMN 004, Attachment A

HIPAA PRIVACY AND SECURITY AWARENESS

MCDONOUGH CENTER FOR FAMILY DENTISTRY, LLC

Grand Rapids Medical Education Partners Mercy Health Saint Mary s Spectrum Health. Pam Jager, GRMEP Director of Education & Development

IRB Application for Medical Records Review Request

HIPAA The Law Explained. Click here to view the HIPAA information.

OCR/HHS HIPAA/HITECH Audit Preparation

HIPAA. HIPAA and Group Health Plans

University of Cincinnati Limited HIPAA Glossary

Data Security and Integrity of e-phi. MLCHC Annual Clinical Conference Worcester, MA Wednesday, November 12, :15pm 3:30pm

BUSINESS ASSOCIATE AGREEMENT BETWEEN LEWIS & CLARK COLLEGE AND ALLEGIANCE BENEFIT PLAN MANAGEMENT, INC. I. PREAMBLE

Computer Security Incident Response Plan. Date of Approval: 23- FEB- 2015

HIPAA PRIVACY FOR EMPLOYERS A Comprehensive Introduction. HIPAA Privacy Regulations-General

4. No accounting of disclosures is required with respect to disclosures of PHI within a Limited Data Set.

Gaston County HIPAA Manual

North Shore LIJ Health System, Inc. Facility Name

HIPAA means the Health Insurance Portability and Accountability Act of 1996, Public Law

HIPAA Policies and Procedures

HIPAA TRAINING. A training course for Shiawassee County Community Mental Health Authority Employees

A Privacy and Information Security Guide for UCLA Workforce. HIPAA and California Privacy Laws

HENRY COUNTY POLICIES AND PROCEDURES FOR COMPLIANCE WITH THE HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT OF 1996 HIPAA

HIPAA-ACKNOWLEDGEMENT OF RECEIPT Notice of Privacy Practices

Guidelines Relating to Implementation of the Privacy Regulations of the Health Insurance Portability and Accountability Act of 1996 (HIPAA)

HIPAA Data Use Agreement Policy R&G Template Updated for Omnibus Rule HIPAA DATE USE AGREEMENT 1

Transcription:

HIPAA OVERVIEW ETSU 1

What is HIPAA? Health Insurance Portability and Accountability Act. 2

PURPOSE - TITLE II ADMINISTRATIVE SIMPLIFICATION To increase the efficiency and effectiveness of the entire health care system through: The electronic exchange of information The standardization of that information To enhance the security and privacy of Protected Health Information (PHI) throughout the entire health system 3

PRIVACY RULE: WHAT DOES IT DO? HIPAA regulates the use or disclosure of Protected Health Information (PHI) 4

WHAT IS PHI? Health and demographic information about an individual that is transmitted or maintained in any medium where the information: Is created or received by a health care provider, health plan, employer, or health care clearinghouse; and Relates to the past, present, or future Physical or mental health condition of an individual, or Provision of health care to an individual, or Payment for the provision of health care to an individual 5

INDIVIDUAL IDENTIFIERS 1. 2. 3. Name Geographic subdivisions smaller than a State - Street Address City County Precinct Zip Code & their equivalent geocodes, except for the initial three digits Dates, except year - Birth date Admission date Discharge date Date of death Telephone numbers 4. 5. Fax number 18. 6 characteristic, or code 6. 7. 8. 9. 10. 11. 12. 13. 14. 15. 16. 17. E-Mail Address Social security numbers Medical record numbers Health plan beneficiary numbers Account numbers Certificate/license numbers Vehicle identifiers and serial numbers, including license plate numbers Device identifiers and serial numbers Web universal resource locations (URLs) Internet Protocol (IP) address numbers Biometric identifiers, including finger and voice prints Full face photographic images and any comparable images Any other unique identifying number,

PERMITTED USES & DISCLOSURES HIPAA permits the use or disclosure only for the following purposes: Treatment Payment Health Care Operations (These are referred to as TPO ) 7

MANDATED USES & DISCLOSURES HIPAA mandates the disclosure of PHI for certain purposes such as: Health oversight activities Judicial and administrative proceedings Law enforcement purposes Organ donation All other uses or disclosures require an authorization 8

HEALTH CARE OPERATIONS Any of the following activities of a Covered Entity: Quality assessment and improvement and populationbased activities Peer review and credentialing activities Underwriting, premium rating, and other activities related to the creation, renewal, or replacement of a contract of health insurance Medical review, legal services, and auditing Business planning and development Business management and general administrative activities 9

AUTHORIZATION Authorization must be obtained for ALL uses and disclosures other than TPO or those mandated under law Authorizations must include: A description of the information to be disclosed The name of the person or entities to whom the information will be disclosed An expiration date Information regarding right to revoke Date and signature 10

PRIVACY NOTICE 11 Privacy Notices Must: Be in plain language Contain a description and example of TPO Contain a description and example of other uses and disclosures not requiring Authorization Include statements about an individual s rights Include statements about the Covered Entity s duties Describe the complaint process Provide other specific requirements

MINIMUM NECESSARY A requirement that only minimum necessary disclosures may be made to accomplish the intended purpose of the use, disclosure, or request for PHI. 12

MINIMUM NECESSARY Internal Requirements: Identify workforce who need to access PHI For each class, category or person identified, limit access based on need-to-know External Requirements: Limit access to what is needed to accomplish the purpose for which the request was made Each request that is non-routine should be reviewed to determine whether it is reasonably 13 necessary

RESEARCH To use or disclose PHI for research purposes, Covered Entities must obtain either: Written authorization from the research subject. Permission from the Institutional Review Board (IRB) or Privacy Board to waive the authorization. 14

IRB WAIVER OF AUTHORIZATION 15 The following criteria must be met before the IRB can waive the patient authorization requirement for research: Use of PHI will pose minimal risks to the subject s welfare and privacy rights. Research can not practically be conducted without the waiver or access to PHI. Covered entity must protect PHI from inappropriate use or disclosure. Researcher must provide written assurances that PHI will not be reused or disclosed, except as required by law.

INDIVIDUAL RIGHTS Individuals have the right to: Receive written notice of privacy practices Request restrictions on uses & disclosures Access, inspect & copy their PHI Request amendment or correction of their PHI Receive an accounting of disclosures of their PHI (except those related to treatment, payment, & operations) 16

ADMINISTRATIVE REQUIREMENTS Designate a privacy officer with primary responsibility for ensuring compliance with the regulations Establish training programs for all members of the workforce Implement appropriate policies & procedures to prevent intentional and accidental disclosures of PHI 17

ADMINISTRATIVE REQUIREMENTS Establish a system for receiving and responding to complaints regarding the Covered Entity s privacy practices Implement appropriate sanctions for violations of the privacy guidelines Make reasonable efforts to limit information to minimum necessary to accomplish a person s purpose/job 18

ENFORCEMENT The Public. The public will be educated about their privacy rights and will not tolerate violations to their privacy! Expect Class Action lawsuits. Office For Civil Rights (OCR). Designated the enforcement agency concerning privacy regulations. They will provide guidance and monitor compliance. 19 Department of Justice (DOJ). Involved in criminal privacy violations. Expect fines and penalties to be high.

PENALTIES - FAILURE TO COMPLY 20 Civil $100 per violation per person up to a maximum of $25,000 per person per year per standard violated Criminal Up to $50,000, 1 year in prison, or both, for inappropriate use of PHI Up to $100,000, 5 years in prison, or both for using PHI under false pretenses Up to $250,000, 10 years in prison or both, for the intent to sell or use PHI for commercial advantage, personal gain, or malicious harm

HIPAA/Confidentiality Accountability Form Click here for the link to the HIPPAA Accountability Form Print this form, complete it and submit it to the D2L Health Requirement Site. 21

RESOURCES http.//www.cms.hhs.gov/hipaa/hipaa2 - For frequently asked questions, links to other HIPAA sites, and information on the law, regulations, and enforcement http.//www.hhs.gov/ocr/hipaa/ - U.S. Department of Health and Human Services Office for Civil Rights frequently asked questions http.//www.hhs.gov/ocr/moneypenalties.html - Interim final rule: Civil Money Penalties 22