Health Insurance Portability and Accountability Act (HIPAA) Compliance Training



Similar documents
Health Information Privacy Refresher Training. March 2013

HIPAA and Privacy Policy Training

HIPAA Happenings in Hospital Systems. Donna J Brock, RHIT System HIM Audit & Privacy Coordinator

HEALTH INSURANCE PORTABILITY & ACCOUNTABILITY ACT OF 1996 HIPAA

PHI- Protected Health Information

HIPAA PRIVACY AND SECURITY AWARENESS

HIPAA Compliance Annual Mandatory Education

Heather L. Hughes, J.D. HIPAA Privacy Officer U.S. Legal Support, Inc.

Notice of Privacy Practices

HIPAA PRIVACY POLICIES & PROCEDURES. Department of Behavioral Health and Developmental Services DBHHDS GENERAL AWARENESS TRAINING

Health Insurance Portability and Accountability Act (HIPAA)

The HIPAA privacy rule established federal law to help protect the use and disclosure of patient information. The privacy rule prohibits a covered

Metropolitan Living, LLC 151 W. Burnsville Parkway, Suite 101 Burnsville, MN Ph: (952) Fax: (651)

Northwest Cardiology Associates 400 W. Northwest Hwy Barrington, IL Fax HIPAA Notice of Privacy Practices ( Notice )

HIPAA: Privacy/Info Security

The Basics of HIPAA Privacy and Security and HITECH

Department of Health and Human Services Policy ADMN 004, Attachment A

Population Health Management Program Notice of Privacy Practices from Evolent Health

Population Health Management Program Notice of Privacy Practices

PROTECTING PATIENT PRIVACY and INFORMATION SECURITY

River Valley Therapy & Sports Medicine, Inc. Notice of Privacy Practices

COMPLIANCE ALERT 10-12

HIPAA PRIVACY AND SECURITY TRAINING P I E D M O N T COMMUNITY H EA LT H P L A N

Population Health Management Program Notice of Privacy Practices from Piedmont WellStar HealthPlans, Inc.

New HIPAA Breach Notification Rule: Know Your Responsibilities. Loudoun Medical Group Spring 2010

AVE MARIA UNIVERSITY HIPAA PRIVACY NOTICE

HIPAA Notice of Patient Privacy Practices

HIPAA Omnibus Notice of Privacy Practices Effective Date: March 03, 2012 Revised on: July 1, 2015

HIPAA Compliance and the Protection of Patient Health Information

Dr. Adam Apfelblat 5140 Highland Road Waterford Phone: (248) Fax: (248)

ACCOUNTABLE HEALTHCARE IPA HIPAA PRIVACY AND SECURITY TRAINING. By: Jerry Jackson Compliance and Privacy Officer

Accounting for Disclosure Requirements Summary of Changes Included in the Proposed Rule 76 Federal Register May 31, 2011

UNITED CEREBRAL PALSY OF NORTHWEST MISSOURI NOTICE OF PRIVACY PRACTICES EFFECTIVE DATE: OCTOBER 22, 2014

Reporting of HIPAA Privacy/Security Breaches. The Breach Notification Rule

Privacy Notice Document (HIPAA)

HIPAA Self-Study Module Patient Privacy at Unity Health Care, Inc HIPAA Hotline

This presentation focuses on the Healthcare Breach Notification Rule. First published in 2009, the final breach notification rule was finalized in

8/3/2015. Integrating Behavioral Health and HIV Into Electronic Health Records Communities of Practice

2014 Core Training 1

Presented by Jack Kolk President ACR 2 Solutions, Inc.

HIPAA Training for the MDAA Preceptorship Program. Health Insurance Portability and Accountability Act

Pulmonary Associates of Richmond, Inc. Notice of Privacy Practices Page 1 of 6

Notice of Privacy Practices

HENRY COUNTY POLICIES AND PROCEDURES FOR COMPLIANCE WITH THE HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT OF 1996 HIPAA

HIPAA Awareness Training

HIPAA Privacy & Security Training for Clinicians

HIPAA and the HITECH Act Privacy and Security of Health Information in 2009

SDC-League Health Fund

The Health and Benefit Trust Fund of the International Union of Operating Engineers Local Union No A-94B, AFL-CIO. Notice of Privacy Practices

Annual Compliance Training. HITECH/HIPAA Refresher

NOTICE OF PRIVACY PRACTICES Allergy Treatment Center of New Jersey, P.C. Effective Date: April 14, 2003

Welcome to the University of Utah Health Sciences HIPAA Privacy and Security Training Program

HomeCare Rehab and Nursing, LLC (HCRN) (DBA - Baker Rehab Group) Notice of Privacy Practice

Notice of Privacy Practices

HIPAA Compliance: Are you prepared for the new regulatory changes?

Patient Privacy and HIPAA/HITECH

ELECTRONIC HEALTH RECORDS

Effective Date of This Notice: September 1, 2013

University Healthcare Physicians Compliance and Privacy Policy

Page 1. NAOP HIPAA and Privacy Risks 3/11/2014. Privacy means being able to have control over how your information is collected, used, or shared;

Notice of Privacy Practices

HIPAA Privacy and Security. Rochelle Steimel, HIPAA Privacy Official Judy Smith, Staff Development January 2012

Protected Health Information. Notice Information. Notice of Privacy Practices. Nystrom & Associates, Ltd Family Support Services, Inc.

HIPAA and Clinical Research

SOUTHLAKE DERMATOLOGY 1170 N. Carroll Ave. Southlake, TX Main Fax

KESWICK MULTI-CARE CENTER, INC. NOTICE OF PRIVACY PRACTICES

NOTICE OF PRIVACY PRACTICES

ELKIN & ASSOCIATES, LLC. HIPAA Privacy Policy and Procedures INTRODUCTION

Transcription:

Health Insurance Portability and Accountability Act (HIPAA) Compliance Training 1

Objectives By the end of this lesson, you should be able to: Define protected health information (PHI) covered under HIPAA regulations Recall patients rights regarding PHI information maintenance, sharing and disclosure. Examine how UTHealth uses patient information in providing care to our patients and communicating with health care providers and others. Recognize employees responsibilities in upholding these rights and protecting our patients PHI confidentiality and privacy.

Health Insurance Portability & Accountability Act (HIPAA) was designed to improve efficiency and effectiveness of health care systems by standardizing the electronic exchange of administrative and financial data. 3

The Health Information Technology for Economic and Clinical Health (HITECH) Act, part of the American Recovery and Reinvestment Act of 2009, promote the adoption and meaningful use of health information technology. 4

What is HIPAA? The HIPAA Privacy Rule provides federal protections for personal health information held by covered entities and gives patients an array of rights with respect to that information. At the same time, the Privacy Rule is balanced so that it permits the disclosure of personal health information needed for patient care and other important purposes. 5

Six Patient Rights 6

Six Patient Rights 7

Six Patient Rights 8

Six Patient Rights 9

Six Patient Rights 10

Six Patient Rights 11

Six Patient Rights 12

Use and Disclosure of PHI Protected Health Information (PHI) may only be used and disclosed under certain circumstances, following specific guidelines: 1 2 3 Treatment, Payment or Healthcare Operations Some Public Policy exceptions, including the waiver of authorization granted by the Institutional Review Board (IRB) for research purposes Authorization of the patient 13

Use Sharing PHI Within UTHealth Point 1 PHI may be used to treat patients, obtain payment for services, educate UTHealth students and residents, and conduct normal health care business. Point 2 UTHealth may share information inside the institution only while following the privacy law and the privacy policies of the institution. Point 3 Point 4 That means we must ensure that the person to whom we give information is part of treatment, payment or healthcare operations or has an authorization signed by the patient. If the person is a researcher, even a UT researcher, they must present either an authorization signed by the patient or a waiver of authorization prepared by the IRB.

Disclosure Sharing Outside of UTHealth Disclosure means: To release or transfer PHI outside of UTHealth, which includes giving access to or divulging information in any way. Any entity: That provides services to UTHealth to whom we disclose information under contract must also sign a business associate agreement which details the parameters under which they must use and disclose the PHI that they receive. Before giving information: To others outside UTHealth, double check to ensure that the information is going to the right place and the person who says he has a right to the information, in fact, does so. In any setting: Where health care services are provided, a certain amount of incidental disclosure of PHI is unavoidable. Health care providers are required, under HIPAA, to take precautions to ensure that reasonable safeguards to protect incidental disclosures are in place. 15

Disclosure Continued If reasonable safeguards are in place, the following activities are permitted: Using patient sign-in logs Calling out the patient s name in the waiting room Disclosing PHI in group or family therapy sessions Disclosing PHI to family members or other person involved in the patient s care Discussing a patient s treatment among care providers, and posting patient schedules in treatment areas

Authorization Disclosing Patient Information The Authorization Form: Valid Authorization Form: There are occasions when we must disclose the patients information for purposes other than treatment, payment, or operations. The patient must sign a specific authorization to give UTHealth the authority to disclose information for such purposes. Must contain nine specific elements, and forms that outline these elements are available in the records departments. Please ask for assistance from the Privacy Office if you need to develop or fill out an authorization form. If you are not sure if an authorization form is valid, check with the Privacy Office before making a use or disclosure pursuant to the form. 17

PROPERTIES Allow user to leave interaction: Show Next Slide Button: Completion Button Label: After viewing all the steps Don't show Next Slide

Treatment, Payment, Operations 19

Treatment, Payment, Operations 20

Treatment, Payment, Operations 21

Treatment, Payment, Operations 22

Authorization Exceptions Sometimes it is okay to use or disclose PHI outside of TPO. Only the minimum necessary should be shared. These very specific cases are: For public health activities such as disease reporting About victims of abuse, neglect or domestic violence Where permitted by an IRB waiver, for research To avert a serious, imminent threat to public safety For health oversight activities, like the FDA or a licensure board For judicial or administrative proceedings For some law enforcement activities Certain government functions Anything else required by law Consult the UTHealth Privacy Handbook and/or the Privacy Officer for guidance

PROPERTIES Allow user to leave interaction: Show Next Slide Button: Completion Button Label: After viewing all the steps Don't show Next Slide

Accidental Release or Breach 25

Accidental Release or Breach 26

Accidental Release or Breach 27

Accidental Release or Breach 28

Accidental Release or Breach 29

Protocol If you discover that Protected Health Information is accidentally released, you need to act immediately to minimize risk and damage. Accidental release can be anything from calling the wrong patient to distributing a spreadsheet, to losing a portable device. You must report as soon as you discover the potential breach, as there is a limited time frame to respond. Inform your supervisor in writing. Notify the Office of Legal Affairs, UCT 1477 at (713) 500-3258. If IT resources are involved send an e-mail to its@uth.tmc.edu or call (713) 486-4848. Breaches of the HIPAA Privacy and Security Rules have serious ramifications for all involved. In addition to sanctions imposed by UTHealth, such breaches may result in civil and criminal penalties.

In The News In the News Published February 2014 Compliance Training In 2010, a former UCLA Health System employee became the first person in the United States to receive jail time in a federal prison for a misdemeanor HIPAA offense. The employee used his employee access to the University s electronic medical records system to view the medical records of his supervisors, co-workers, and high-profile patients. While none of the information was used or sold, the access was nonetheless illegal because the employee lacked a valid reason for looking at the records.

PHI and E-mail All emails Digital IDs Digital IDs Disposal of PHI All emails containing PHI, including those sent to other University email addresses, must be digitally signed and encrypted. If the recipient does not have a digital ID, you must find an alternate way to send the information. Remove PHI from unencrypted emails that you receive, before you reply or forward the email. Double check all email addresses when you send PHI. DO NOT RELY upon auto-complete to find the e-mail addresses for you. Remember that people using PDAs and Smart phones, or people moving from computer to computer, will not have the ability to install a Digital ID on their device and cannot read encrypted emails. This DOES NOT mean that you should send unencrypted emails with PHI. When disposing of documents that contain PHI follow the records retention schedule, archive records according to University policy and procedure, and shred all documents containing PHI.

Contact Information If you have questions about information contained in this module, please contact: Christina Solis, JD UTC 1447 (713) 500-3305 Christina.F.Solis@uth.tmc.edu Office of Legal Affairs 47