HIPAA Privacy and Security. Rochelle Steimel, HIPAA Privacy Official Judy Smith, Staff Development January 2012

Similar documents
PHI- Protected Health Information

2014 Core Training 1

HIPAA Privacy & Security Training for Clinicians

PROTECTING PATIENT PRIVACY and INFORMATION SECURITY

HIPAA and Privacy Policy Training

HIPAA Compliance Annual Mandatory Education

PRIVACY AND SECURITY SURVIVAL TRAINING

Department of Health and Human Services Policy ADMN 004, Attachment A

HIPAA Self-Study Module Patient Privacy at Unity Health Care, Inc HIPAA Hotline

HIPAA Education Level One For Volunteers & Observers

Annual Compliance Training. HITECH/HIPAA Refresher

HIPAA. New Breach Notification Risk Assessment and Sanctions Policy. Incident Management Policy. Focus on: For breaches affecting 1 3 individuals

HIPAA Training for Hospice Staff and Volunteers

Louisiana Department of Health and Hospitals Basic HIPAA Privacy Training: Policies and Procedures

Protecting Patient Privacy It s Everyone s Responsibility

HIPAA and Health Information Privacy and Security

HIPAA Awareness Training

Patient Privacy and HIPAA/HITECH

Heather L. Hughes, J.D. HIPAA Privacy Officer U.S. Legal Support, Inc.

The Department of Health and Human Services Privacy Awareness Training. Fiscal Year 2015

HIPAA (Health Insurance Portability and Accountability Act) Awareness Training for Volunteers and Interns

MCCP Online Orientation

HFS DATA SECURITY TRAINING WITH TECHNOLOGY COMES RESPONSIBILITY

HIPAA 101: Privacy and Security Basics

8.03 Health Insurance Portability and Accountability Act (HIPAA)

Health Insurance Portability and Accountability Act (HIPAA)

HIPAA Happenings in Hospital Systems. Donna J Brock, RHIT System HIM Audit & Privacy Coordinator

SELF-LEARNING MODULE (SLM) 2012 HIPAA Education Privacy Basics and Intermediate Modules

Privacy for Beginners: What Every Healthcare Worker Needs to Know About HIPAA and Privacy

Let s Talk About Privacy

HIPAA Privacy & Security Rules

HIPAA PRIVACY POLICIES & PROCEDURES. Department of Behavioral Health and Developmental Services DBHHDS GENERAL AWARENESS TRAINING

Compliance HIPAA Training. Steve M. McCarty, Esq. General Counsel Sound Physicians

HIPAA Compliance for Students

HIPAA Privacy and Security

How To Protect Your Health Information At Uni Of California

PRIVACY AND INFORMATION SECURITY INCIDENT REPORTING

HIPAA Information Security Overview

HIPAA and You The Basics

A Privacy and Information Security Guide for UCLA Workforce. HIPAA and California Privacy Laws

Topics. What are privacy and security all about? How can I protect confidential information? What should I do if I see a problem?

HIPAA Basic Training for Privacy & Information Security

Please use your cell phone to access this website: pollev.com/ucsfprivacy

HIPAA Security Education. Updated May 2016

HIPAA PRIVACY AND SECURITY AWARENESS

HEALTH INSURANCE PORTABILITY & ACCOUNTABILITY ACT OF 1996 HIPAA

HIPAA PRIVACY AND SECURITY TRAINING P I E D M O N T COMMUNITY H EA LT H P L A N

HIPAA Training for Staff and Volunteers

HIPAA Policy, Protection, and Pitfalls ARTHUR J. GALLAGHER & CO. BUSINESS WITHOUT BARRIERS

Annual HIPAA Security & Information Security Competency

Donna S. Sheperis, PhD, LPC, NCC, CCMHC, ACS Sue Sadik, PhD, LPC, NCC, BC-HSP Carl Sheperis, PhD, LPC, NCC, MAC, ACS

HIPAA Privacy and Security

Grand Rapids Medical Education Partners Mercy Health Saint Mary s Spectrum Health. Pam Jager, GRMEP Director of Education & Development

Page 1. NAOP HIPAA and Privacy Risks 3/11/2014. Privacy means being able to have control over how your information is collected, used, or shared;

General Compliance. General Compliance Training. Course Overview. General Compliance. The intent of the Compliance Program is to:

HIPAA Orientation. Health Insurance Portability and Accountability Act

HIPAA PRIVACY OVERVIEW

CREATIVE SOLUTIONS IN HEALTHCARE, INC. Privacy Policy

HIPAA: Privacy/Info Security

Privacy Compliance Health Occupations Students

Approved By: Agency Name Management

LEARNING MODULE: HIPAA AND COMPLIANCE. For Clinical Students and Instructors Greater Green Bay Healthcare Alliance Updated June 27, 2014

DEPARTMENTAL POLICY. Northwestern Memorial Hospital

HIPAA Security Training Manual

HIPAA AND COMPLIANCE

Section 5 Identify Theft Red Flags and Address Discrepancy Procedures Index

ACRONYMS: HIPAA: Health Insurance Portability and Accountability Act PHI: Protected Health Information

HIPAA Notice of Privacy Practices

Texas House Bill 300 & HIPAA. A MainNerve Whitepaper

Client Advisory October Data Security Law MGL Chapter 93H and 201 CMR 17.00

Are you in the correct place?

Transcription:

HIPAA Privacy and Security Rochelle Steimel, HIPAA Privacy Official Judy Smith, Staff Development January 2012

Goals and Objectives Course Goal: To introduce the staff of Munson Healthcare to the concepts of protecting patient confidentiality according to Munson policy and HIPAA federal law. Course Objectives: After completing this course, the participant will be able to: 1. Comply with MHC policies related to HIPAA. 2. Describe disciplinary action related to HIPAA violations. 3. Identify how users can help protect the security of information within the Munson/Mercy network. 4. State how to report privacy and security incidents.

Patient Privacy Strict Federal HIPAA laws mandate patient privacy and computer security: To protect against inappropriate access to medical records. To prevent verbal breaches. To avoid any invasion of privacy.

Avoid Privacy Complaints Share and access information only if there is a specific job-related need to know. Do not access a chart due to curiosity or concern. Avoid discussing patient care where it can be overheard and avoid discussing patient information with other staff who have no job-related need to know.

Keep Good Professional Boundaries Do NOT access the electronic medical record of: Your children or step-children Your spouse or ex-spouse Victims in the news Your neighbors Your friends Your family Celebrities And especially your co-workers Unless there is a job-related need to know!

Job-Related Need to Know Before accessing a medical record, ask yourself: Do I need this to do my job? Will your supervisor agree with you? If no, then STOP!

Job-Related Need to Know When do I have a job-related need to know? Only when it is for: Patient treatment Continuity of care Patient safety Payment Operations (e.g., quality assurance, peer review, reporting to the State of Michigan)

What Patient Information is Protected? Protected Health Information (PHI) includes: Patient name and address Phone number, DOB Social security number All medical information Lab and test results Mental health history Alcohol and drug history STD information Surgery and medications Patient presence in the hospital All information learned from seeing or treating patients is protected!

Business Information Munson s business information is also confidential. Business information includes any information pertaining to: Physicians Financial operations Quality assurance Risk management Research Utilization review And more

Why is Privacy So Important? Strict privacy rules protect against identity theft and fraud related to: Diagnoses Social histories Personal information Social security numbers We all may be patients one day!

Why is Privacy So Important? (cont.) Patients have the right to opt out or restrict callers. This will keep a person s presence in the hospital confidential. If the patient is not opted out, ask callers if they have the patient s privacy code before you give them information beyond a general status report. Example of a privacy code slip:

Why is Privacy So Important? (cont.) Not all patients want visitors or co-workers to visit. Let patients invite you first, or check with the family, or the nurse. Keep lists of patients scheduled for surgery confidential. Don t ask! Don t pry!

HIPAA Privacy Breaches A privacy breach is a disclosure of any past, present or future medical information to people who do not have a job-related need to know. Privacy breaches: Harm patient trust. Are against federal HIPAA laws. Violate Munson policy. If you are sharing patient information, get a signed release from the patient, unless it is for treatment, payment, or operations.

Consequences of HIPAA Privacy Breaches If you violate privacy and work for Munson, you may face big consequences: You may get a written warning. You may be fined. Munson may be fined. You may be sued. You may be jailed. You may lose your job. You may lose future access to PowerChart. You may lose your professional license in Michigan. You may be reported to the Office of Civil Rights.

Examples: Civil/Criminal Fines and Penalties In California, employees in five hospitals were fined six fines totaling $675,000 for unauthorized access to sensitive information in patients' electronic medical records. In Arizona, three employees were fired for inappropriately accessing the electronic medical records of victims of a shooting spree. In Massachusetts, a hospital was fined $1 million after an employee took a chart home with her and left it on the subway train. In other national cases, 4 employees faced criminal prosecutions for looking in medical records out of curiosity.

It Happens Here! It Happens Here! Several Munson employees have been fired for inappropriately accessing medical records of patients.

Report all Privacy Breaches If you suspect or see a privacy breach: Tell your manager, or Email or call the Privacy Officer listed in the employee directory. Fill out an occurrence report. Do not be the person who tells the patient about the privacy breach. By law, breaches must be disclosed to the patient by letter. The Privacy Officer will investigate and compose the letter.

HIPAA Computer Security Computer security is as important as patient privacy issues. Computer security must be maintained on: Computers (at work and home) Thumb drives Cell phones Cameras Laptops ipads CDs Maintain computer security while: Texting Emailing Using the Internet Do not post information learned at work to any social networking site! (Facebook, Twitter, etc.) If devices hold or send protected health information, call the Help Desk at 55053 for assistance with encryption.

Audits Computer Security Your work computer may be audited, per Munson policy. Your name and the date is electronically recorded every time you enter a medical record. Audits on chart access are done daily within PowerChart, STAR, and other applications. Emails sent from Munson equipment may also be audited.

Best Practices Computer Security Lock or log off your computer every time you step away. If you have your own computer: Lock your computer: Press the and the L key at the same time. or Press these 3 keys at once: Ctrl + Alt + Delete and then select the Lock Computer option. If you share a computer: Log Off: Press the button and then choose Log off (user ID) followed by the Log Off button. or Press these 3 keys at once: Ctrl + Alt + Delete and then select the Log Off option.

Best Practices Computer Security Never allow someone to use your password or your personal login! Your login is your electronic signature. You are responsible for everything entered on your computer while you are logged in. Letting someone else use your computer while you are logged in attaches your name to everything that person does. Log off before you let someone use your computer. Do not share your passwords.

Best Practices Computer Security (cont.) Do not download software to your work computer. Call the Help Desk for assistance with software at 56053. Software may contain viruses.

Best Practices Computer Security (cont.) Media disposal: Contact the Help Desk at 56053 when you need to dispose of media containing Protected Health Information (PHI). Examples of media include: CDs Thumb drives Computers Fax machines Copiers

Best Practices Computer Security (cont.) Encrypt and protect emails sent from your laptops, cell phone, and ipads. Never transmit confidential information over the Internet (outside of the Munson network) without first encrypting it. Encryption methods vary per device. Please call the Help Desk at 56053 for specific advice. To encrypt an email sent from a Munson computer: Add [secure] to the subject line of your message. Be sure to use the square brackets only. The recipient will get this message: You have received a SECURE message from (your email address) at Munson Healthcare. Click the link to view the secure web delivery. In order to unlock the message, the recipient will have to create an account on the Secure Web Mail system. Tip: See the Secure Email Usage link in the In The Know section on the MHC Intranet for more information.

Best Practices Computer Security (cont.) Faxes Always use a cover sheet for every fax. This cover sheet should have the Munson Confidentiality Statement printed on it. Access the fax cover sheet from Microsoft Word. Go to File>New>My templates>fax Munson Healthcare.dotx or FAX Munson Medical Center.dotx Click below to get a printable copy of the FAX cover sheet: MHC MMC

Best Practices Disposal of PHI Gray Trash Bins Always shred or dispose of paper containing a patient s protected health information (PHI) into the gray trash bins. Examples of papers that may contain patient names or medical information: Labels Lab reports Census sheets Hand written notes Printouts from charts Financial documents Patient registration documents All papers put into the gray bins get shredded.

Verify Identity and Share Minimum Necessary Information Only Always verify the identity of the person who is requesting patient information: Do you know to whom you are talking? When disclosing patient information: Check with the patient for approval. Disclose only minimum necessary information.

Law Enforcement and HIPAA HIPAA allows certain disclosures to Law Enforcement. Please call Risk Management or the Privacy Officer for consultation regarding disclosures to law enforcement.

Good Documentation In complex cases, it may be necessary to document your disclosures: To give an explanation, especially if it is not a simple black and white situation. When patient safety takes precedence over patient privacy. Call Risk Management for assistance in documentation of complex cases. When in doubt about a disclosure and/or patient privacy issue, document your rationale. Be sure to note how actions were in the best interest of the patient.

Confidentiality and Systems Usage Agreement Upon hire, employees sign the Confidentiality and Systems Usage Agreement. This agreement outlines the employee s responsibilities for privacy and security. Employees are expected to know and follow all aspects of the agreement.

Questions? Munson offers many resources to guide you through any privacy and security questions or problems: Your manager Privacy Officer I.T. Manager of Privacy and Security Risk Management Administrative Supervisor Legal counsel