Privacy and Security For Managers



Similar documents
Target Audience: All Non-Management CHS Employees, Students, Volunteers, and Physicians

2014 Core Training 1

HIPAA and Privacy Policy Training

HIPAA Privacy and Security. Rochelle Steimel, HIPAA Privacy Official Judy Smith, Staff Development January 2012

Annual Compliance Training. HITECH/HIPAA Refresher

PCI Data Security. Information Services & Cash Management. Contents

HIPAA Privacy & Security Training for Clinicians

HIPAA 101: Privacy and Security Basics

HIPAA AND COMPLIANCE

PHI- Protected Health Information

HIPAA PRIVACY AND SECURITY AWARENESS. Covering Kids and Families of Indiana April 10, 2014

Alliance for Clinical Education (ACE) Student HIPAA Training

Protecting Patient Privacy It s Everyone s Responsibility

Privacy & Security Standards to Protect Patient Information

HIPAA PRIVACY AND SECURITY TRAINING P I E D M O N T COMMUNITY H EA LT H P L A N

Department of Health and Human Services Policy ADMN 004, Attachment A

HIPAA Education Level One For Volunteers & Observers

LEARNING MODULE: HIPAA AND COMPLIANCE. For Clinical Students and Instructors Greater Green Bay Healthcare Alliance Updated June 27, 2014

HIPAA Privacy and Security

HIPAA Privacy & Security Rules

HIPAA Orientation. Health Insurance Portability and Accountability Act

HIPAA Training for Staff and Volunteers

The Basics of HIPAA Privacy and Security and HITECH

Clinical Solutions. 2 Hour CEU

HIPAA Privacy. September 21, 2013

OF MICHIGAN HEALTH SYSTEM

Guadalupe Regional Medical Center

Louisiana Department of Health and Hospitals Basic HIPAA Privacy Training: Policies and Procedures

HIPAA Training for Hospice Staff and Volunteers

MCCP Online Orientation

By the end of this course you will demonstrate:

HEALTH INSURANCE PORTABILITY & ACCOUNTABILITY ACT OF 1996 HIPAA

Patient Privacy and HIPAA/HITECH

Topics. What are privacy and security all about? How can I protect confidential information? What should I do if I see a problem?

HIPAA (Health Insurance Portability and Accountability Act) Awareness Training for Volunteers and Interns

HIPAA Compliance Annual Mandatory Education

HIPAA Self-Study Module Patient Privacy at Unity Health Care, Inc HIPAA Hotline

PROTECTING PATIENT PRIVACY and INFORMATION SECURITY

HIPAA TRAINING. A training course for Shiawassee County Community Mental Health Authority Employees

HIPAA and You The Basics

HIPAA: Privacy/Info Security

HIPAA Privacy & Security Health Insurance Portability and Accountability Act

Privacy Training for Harvard Medical Students

Health Insurance Portability and Accountability Act (HIPAA)

HIPAA PRIVACY POLICIES & PROCEDURES. Department of Behavioral Health and Developmental Services DBHHDS GENERAL AWARENESS TRAINING

HIPAA and Health Information Privacy and Security

Section 5 Identify Theft Red Flags and Address Discrepancy Procedures Index

Privacy for Beginners: What Every Healthcare Worker Needs to Know About HIPAA and Privacy

HIPPA Goes HITECH. Data Protection for Agents

HIPAA. Developed by The University of Texas at Dallas Callier Center for Communication Disorders

Awareness Training for VIM Volunteers and Staff

Please use your cell phone to access this website: pollev.com/ucsfprivacy

Health Insurance Portability and Accountability Act HIPAA Privacy Standards

Health Insurance Portability and Accountability Act (HIPAA) Overview

Protecting Privacy & Security in the Health Care Setting

Donna S. Sheperis, PhD, LPC, NCC, CCMHC, ACS Sue Sadik, PhD, LPC, NCC, BC-HSP Carl Sheperis, PhD, LPC, NCC, MAC, ACS

Guide to INFORMATION SECURITY FOR THE HEALTH CARE SECTOR

Page 1. NAOP HIPAA and Privacy Risks 3/11/2014. Privacy means being able to have control over how your information is collected, used, or shared;

HIPAA Privacy & Breach Notification Training for System Administration Business Associates

HIPAA, COMPLIANCE & PROFESSIONALISM

HIPAA PRIVACY AND SECURITY AWARENESS

HFS DATA SECURITY TRAINING WITH TECHNOLOGY COMES RESPONSIBILITY

8.03 Health Insurance Portability and Accountability Act (HIPAA)

How To Ensure Your Office Meets The Privacy And Security Requirements Of The Health Insurance Portability And Accountability Act (Hipaa)

Compliance HIPAA Training. Steve M. McCarty, Esq. General Counsel Sound Physicians

How To Protect Your Health Information At Uni Of California

Identity Theft Prevention Program Compliance Model

SELF-LEARNING MODULE (SLM) 2012 HIPAA Education Privacy Basics and Intermediate Modules

Annual HIPAA Security & Information Security Competency

HIPAA PRIVACY DIRECTIONS. HIPAA Privacy/Security Personal Privacy. What is HIPAA? 6/28/2012

HIPAA Privacy Keys to Success Updated January 2010

HIPAA/ HITECH HEALTH INSURANCE PORTABILITY ACCOUNTABILITY ACT. and. Health Information Technology for Economic and Clinical Health Act.

The Department of Health and Human Services Privacy Awareness Training. Fiscal Year 2015

HIPAA PRIVACY OVERVIEW

General Compliance. General Compliance Training. Course Overview. General Compliance. The intent of the Compliance Program is to:

HIPAA Compliance for Students

Why Lawyers? Why Now?

Identity Theft and Data Protection

HIPAA: Bigger and More Annoying

HIPAA Policy, Protection, and Pitfalls ARTHUR J. GALLAGHER & CO. BUSINESS WITHOUT BARRIERS

DATA PROTECTION IT S EVERYONE S RESPONSIBILITY. An Introductory Guide for Health Service Staff

PRIVACY AND INFORMATION SECURITY INCIDENT REPORTING

HIPAA Happenings in Hospital Systems. Donna J Brock, RHIT System HIM Audit & Privacy Coordinator

Statement of Policy. Reason for Policy

PRIVACY AND SECURITY SURVIVAL TRAINING

HIPAA initially went into effect April 14, HIPAA is a set of rules that is to be followed by doctors, hospitals and other health care providers.

HIPAA Privacy Overview

AUBURN WATER SYSTEM. Identity Theft Prevention Program. Effective October 20, 2008

HIPAA and Mental Health Privacy:

HIPAA Basic Training for Privacy & Information Security

NC DPH: Computer Security Basic Awareness Training

Written Information Security Plan (WISP) for. HR Knowledge, Inc. This document has been approved for general distribution.

The University of Toledo. Corporate Compliance and HIPAA Training

ANNUAL SECURITY RESPONSIBILITY REVIEW

ACRONYMS: HIPAA: Health Insurance Portability and Accountability Act PHI: Protected Health Information

Health Insurance Portability and Accountability Act of 1996 (HIPAA)

Advanced HIPAA Security Training Module

ACCOUNTABLE HEALTHCARE IPA HIPAA PRIVACY AND SECURITY TRAINING. By: Jerry Jackson Compliance and Privacy Officer

HIPAA Training: Ensuring Privacy for our Patients

Privacy Compliance Health Occupations Students

Transcription:

Privacy and Security For Managers This self directed learning module contains information all CHS Teammates are expected to know in order to protect our patients, our guests, and ourselves. Target Audience: All Management CHS Teammates 1

Instructions Read this module and complete the post test. If you have questions about the material, ask your supervisor. If you are completing the post test manually, please include your signature and the date and give it to your supervisor. Record the date of completion on your Teammate Annual Continuing Education Record. Learning Objectives When you finish this module, you should be able to: Understand patient privacy rights Understand how patient information is kept private and confidential in a work setting Know how to use and disclose patient information Know how to safeguard patient information Know how to report a privacy concern Know how to properly use Chain of Command when you have a privacy question or concern Investigate privacy issues, incidents, and complaints Educate workforce on privacy policies and procedures Manage Business Associate Agreements 2

Patient Privacy is a law! The Health Insurance Portability & Accountability Act, better known as HIPAA, gives patients important rights regarding their patient information. Patient Information Any information that is created or received by CHS about an individual Information that is related to treatment, billing, or healthcare operations Can be electronic, written, or oral Patient Information Elements Name Address Birth date Health Plan Beneficiary Number Account and other identifying numbers NOTE: ALL CHS WORKFORCE MEMBERS (TEAMMATES, STUDENTS, VOLUNTEERS, PHYSICIANS, ETC.) ARE REQUIRED TO PROTECT THE PRIVACY AND SECURITY OF OUR PATIENTS PROTECTED HEALTH INFORMATION!! Patient Information is Everywhere! It s not just in the paper or electronic records! Here are some examples of other places you might find patient information: Telephone numbers Fax numbers Email addresses Social Security Number Medical Record Number Biometric identifiers (fingerprints, voice) Photographic images Characteristics which may identify the person (e.g., tattoos) Other unique identifiers These must all be removed before something is deidentified Patient status boards Financial records Fax sheets Data used for research purposes Patient identification bracelets Prescription bottle labels Detailed appointment reminders left on voicemail Photograph or video recordings of a patient 3

The Privacy Rule grants patients the following rights: Notice of Privacy Practices: Patients have the right to receive a copy of Carolinas HealthCare System s Notice of Privacy Practices. Copies are available on the CHS internet website, each facility s website, and at every point of patient entry at each of the CHS facilities/practices. Restrictions and Confidential Communications: Patients can restrict the use or disclosure of their information and request confidential communications. Inspect & Copy: Patients can inspect and/or receive a copy of their healthcare records. Amendments: Patients can request an amendment (correction) to their healthcare records. Accounting of Disclosures: Patients can request a list showing when and with whom their information has been shared. Complaints: Patients can file a complaint with a healthcare provider, insurer, and the U.S. Government if the patient believes his or her rights have been violated. Breach Notification: Patients are notified when their patient information has been compromised. Paid in Full: Patients can pay for their services in full and request that their healthcare provider not share information with their health plan. CHS must agree to a request to restrict the disclosure of patient information to his/her health plan for a health care item or service for which the patient has paid in full out of pocket, unless otherwise required by law. NOTE: CHS HIPAA Policies and Procedures are available on the HIPAA SharePoint Site, accessible via PeopleConnect. 4

CHS s Notice of Privacy Practices Must be available prominently in patient check in/registration area English and Spanish versions Proper version has a Modified date of August 28, 2013 Did You Know? AcopyoftheCHSNoticeofPrivacyPractices is available on the CHS internet website, each facility s website, and at every point of patient entry at each of the CHS facilities. Policy Reference: PR.PHI 145.06 Receipt & Acknowledgement of Notice of Privacy Practices 5

TREATMENT, PAYMENT, OPERATIONS TPO Patient information should only be accessed for legitimate treatment, payment, or health care operation reasons (quality, education, risk management, etc.). All other uses or disclosures require an Authorization or a law! DO NOT: Access patient information because you are curious regardless of the reason Access patient information as a favor to family and friends Access your own information through CHS resources Use someone else s login and password Resist Curiosity It s Not Worth It Every access to the patient record is tracked and can be audited Using someone else s login is a violation of policy and will subject you to disciplinary action Unauthorized access, including physicians, will be sanctioned 6

Dispose of Patient Information Properly! Dispose anything that contains patient information in a confidential shred bin, crosscut shredder, or medical waste receptacle. Paper All paper containing patient information must be deposited in a locked shred bin. Labels Removable labels containing patient information should be discarded in a locked shred bin or regulated medical waste receptacle. ID Bracelets ID bracelets removed by a workforce member should be disposed of in a locked shred bin. Electronic PHI (e PHI) Items containing electronic patient information should be disposed of in accordance with IS Policy IS.PHI 600.06 (available on PeopleConnect) Policy Reference: PR.PHI 145.15 Disposal Procedures for Patient Information Be on the lookout! Look for discarded patient information in areas that patients may leave their personal information (such as examination rooms, trash cans in the lobby, etc.) Post warning signs around trash/recycle cans to properly dispose patient information 7

Avoid Incidental Disclosures Incidental Disclosures happen when you are properly using and sharing patient information as part of your job, but it is inadvertently overheard or seen by someone who does not have permission to do so. Examples: discussions with patients in semiprivate rooms or ED bays, calling a patient name in the waiting room (but not discussing their medical condition), whiteboards or computers on wheels in treatment areas Avoid releasing too much information! Reasonable Safeguards Only use and disclose the minimum patient information requested or required. Avoid conversations about a patient in front of other patients, visitors, families. Lower your voice when discussing patient information in person or over the phone. Avoid conversations about patients in public places (hallways, waiting areas, elevators, cafeteria) 8

Sometimes it s okay to talk to friends and family They must be involved in the patient s care or payment, and you can only share what they need to know. The patient s friend comes with the patient into the treatment room, and the patient doesn t object to them hearing the conversation The patient s daughter is present and has questions about the charges You need to tell the patient s husband how to take care of her after surgery There s an emergency and you need to talk to the family to make healthcare decisions A friend comes to pick up the prescription for the patient Sometimes, it s not okay The patient tells us not to talk to their family about their condition A family member wants a copy of the patient s medical record (this requires a written Authorization from the patient) A neighbor is calling in curious to know what s going on (only friends and family indicated by the patient are allowed to get information) CLEAR THE ROOM You don t need written consent to share in these situations, but try to make sure the patient doesn t object: If possible, clear the room before you start talking about the patient s personal condition, and make sure the patient is okay with everyone coming back in to hear the information. If the patient is unconscious or not available, use your professional judgment to decide if it is in the patient s best interests to share the information. 9

ALWAYS VERIFY YOU HAVE THE RIGHT PATIENT! Always check at least two (2) patient identifiers (ex: name, DOB, address) to make sure you have the right patient, especially when handing out patient information. Best Practices When Mailing Patient Information: Double check mailing address. Make sure documents only contain that patient s information. Pay particular attention to: Medical records Receipts Depart summaries Discharge instructions Lab results Prescriptions Verify Someone s Identity Before You Disclose Patient Information Remember to make sure people asking for patient information are who they say they are before you disclose. Review PR.PHI 145.07 Verifying the Identity of a Person Requesting Pt Info. Best Practices When Faxing Patient Information: Double check the fax number before faxing every time. Use HIPAA compliant fax cover sheet. Check the confirmation page. 10

If you take it, you must protect it youare responsible for all patient information in your possession! First ask yourself: can I access this information online through secure CHS approved portals, instead of taking it offsite? Only take the minimum patient information necessary to do the work. Always secure bags or briefcases. Remove any confidential and patient information from your vehicle or lock in your trunk. Never leave information in view or unattended! Inventory what patient information you take to make sure you return all patient information as soon as possible. Never take patient information into a public place, such as a restaurant or coffee shop. Always secure patient information in your house do not let others (including your family and friends) view or access it. If patient information or confidential information in any form is lost or stolen, notify your management or Corporate Privacy immediately! Workstation on Wheels NEVER leave a workstation on wheels unattended in the hallway or in a patient s room with patient information showing! NEVER let anyone use your login it will show up as you in the medical record. Lock the workstation every time you walk away! 11

NEVER share your user ID and password with anyone. (CHS Information Services will never ask you for your password)! DO NOT open, forward, or reply to email messages from unknown or suspicious senders. Use different passwords for different accounts. Pick strong passwords (8 characters: upper case, lower case and numbers). Reboot or shut down your computer at the end of your day to ensure security patches are properly applied. Contact the CHS Support Center at (704) 446 6161 immediately IF: You click on a suspicious link You suspect someone is using your login and password You receive unusual error messages or pop up boxes You lose your laptop, smartphone, or other mobile device used to store CHS data or access the CHS network. (Contact CHS Support Center before you cancel your wireless or phone service if your device is lost or stolen!) CHS s Acceptable Use Policy: IS.PHI 600.01 outlines appropriate use of CHS Resources. Review this policy before taking the post test. 12

Security Pointers Any personally owned laptops, desktops, or mobile devices used to access or store CHS data that have received prior approval from CHS Information Services, must be encrypted, have anti virus software, and Good or BigFix for receiving security patches. Call (704) 446 6161 for information. Do not store patient information on hard drives. Use confidential CHS shared drives behind our firewall. Use only encrypted flash drives approved by CHS Information Services for patient information or other confidential information. Do not text identifiable patient information. Do not use personal cloud storage (such as ICloud, DropBox) for patient information this is not secure! Be cautious of auto sync settings on devices to store photos, videos, documents, etc. CAUTION: AVOID SENDING EMAILS WITH PATIENT INFORMATION Only send the absolute minimum patient information needed. If sending to an email address that does not end in @carolinas.org or @carolinashealthcare.org, you have to SEND CERTIFIED so that the email will be encrypted. Sending without encrypting will be subject to disciplinary action. 13

Phishing: Sending a false email to gain personal information, such as a request for login or personal information through email or texting. Did you know that email phishing is the easiest way for criminals to steal information? Never give out your password to anyone, including Information Services! Examples of Phishing Messages "We suspect an unauthorized transaction on your account. To ensure that your account is not compromised, please click the link below. "During our regular verification of accounts, we couldn't verify your information. Please click here to update and verify your information." Our records indicate that your account was overcharged. You must complete the following form within 7 days to receive your refund. 14

Social media is a great tool that allows people to communicate by networking sites. Remember! The internet is a public domain and information posted on social media is not private! Communicating patient information is strictly prohibited and will subject you to sanctions. You should never post identifying information about patients OR THEIR IMAGES, etc. (Removing a patient s name is not enough to make the patient anonymous). Look at the background! A photograph taken in the hospital or office environment may inadvertently have a patient, computer screens, or whiteboards in the background with patient or internal information visible. Do not friend patients on social media have a professional and personal page, if you want. HR 5.08 Social Media Policy IS.PHI 600.01 Communications Environment Acceptable Use Policy 15

CHS HIPAA Sanctions When CHS workforce members use, access, or disclose patient information inappropriately, regardless of intent, the privacy of a patient s information may be compromised. Workforce members who inappropriately use, access, or disclose patient information are subject to disciplinary action, which may include the following: Verbal Counseling Written Counseling Final Written Counseling Termination Policy Reference: PR.PHI 145.13 HIPAA Privacy & Security Sanctions A breach of patient information can cause harm to the reputation of CHS with our patients and potentially subject CHS (and you) to serious penalties! Civil and Federal Enforcements! Individuals can be found criminally liable under HIPAA Civil and criminal penalties at the State and Federal level Penalties of $100 to $1.5 million Termination dollars Institutions can be fined for failure to act 16

Manager = Privacy Official Each department/practice manager functions as a deputy privacy official Educate Workforce On. Privacy and Security Policies, Procedures and Forms, including: Use & Disclosure of Patient Information Patient Rights Social Media HIPAA Sanctions Policy Communications Acceptable Use Policy Manage Business Associate Agreements (see page 19) Conduct any required self assessments Report Issues / Monitor & Assess Compliance Report privacy concerns Departmental Self Assessments Ensure all employees complete Privacy ACE module Report lost or stolen devices immediately Investigate Complaints Incidents User Access Audit Requests 17

Use Huddles and Staff/Provider Meetings to Discuss Privacy Remind staff/providers that privacy is part of the Patient Experience (and required by law) Discuss educational notices from Corporate Privacy and IS Security in meetings, and post them around the department/practice Educate staff/providers on use of secure email, etc. Review CHS HIPAA Privacy and Security Policies and Procedures with staff/providers Discuss how to report issues and concerns Ensure staff/providers are knowledgeable about Patient Rights under HIPAA, such as access to records Educate staff/providers about use of social media Educate staff/providers on use of personal and organizationissued mobile devices and other security measures Provide education on privacy and security at least twice a year Visit the HIPAA Privacy & Security Share Point site http://teams.carolinas.org/sites/hipaaprivacy/default.aspx News and Meeting Topics Education Ask a Question Access HIPAA Privacy & Security Tools, etc. 18

Definition: A business associate is a person or entity who accesses, uses, or discloses patient information to provide services for Carolinas HealthCare System. Examples of Business Associates A consultant who performs utilization reviews for a hospital An independent medical transcriptionist transcription services to a physician that provides A medical record copy or storage service A document shredding company A surveyor who conducts patient satisfaction surveys Your Responsibility: Ensure contracts with all business associates have been approved by Office of General and contain appropriate regulation language. (Tip: keep a signed copy of Business Associate Agreements on file) See Business Associate Privacy Practice Guidelines on Office of General Counsel Legal Lighthouse SharePoint Site 19

Manager Responsibilities: Report any and all privacy incidents, misuses, and wrongful disclosures as soon as possible the clock is ticking once we are aware! Examples include: Faxing patient information to an incorrect number Releasing the incorrect discharge papers to the patient Providing another patient s prescription to wrong patient Leaving a detailed message with patient information on an incorrect phone number Disposal of patient information in a dumpster Conduct, cooperate with, and support privacy investigations for: Complaints Incidents User Access Audits Use the Complaint Investigation Report form located on the HIPAA Privacy & Security SharePoint site Reference PR.PHI 145.13 HIPAA Privacy Sanctions Provide disciplinary action after consultation with Human Resources and Corporate Privacy, as needed Report a Privacy Concern (New Form) 20

To report a privacy issue, or if you have a question or concern regarding privacy, you should follow the options below. You will not be penalized for reporting a potential privacy issue. Contact Your Supervisor Contact Your Facility Privacy Officer CHS Corporate Privacy Department 704 512 5900 Chief Privacy Officer: Sara Herron, Senior Vice President Information Security Official: Robert Pierce, Assistant Vice President CHS PeopleConnect: Concern & Incident Reporting link http://peopleconnect.carolinas.org/reporting tools HIPAA SharePoint Report a Privacy Concern Reporting Non Privacy Concerns? Contact the Customer Care Line (704) 355 8363 21

Questions about Privacy and Security: Contact your Supervisor Contact your Facility Privacy Officer (FPO)* Privacy Questions: call 704 512 5900 Security Questions: call 704 446 6161 HIPAA Privacy and Security SharePoint Site: http://sharepoint.carolinas.org/hipaaprivacy HIPAA Policies and Procedures can be found on PeopleConnect: HIPAA Policies are located in the Patient Rights and Privacy Policies Sections of the Administrative Policy and Procedure Manual http://peopleconnect.carolinas.org/policies Who is my FPO? Each CHS facility has a Facility Privacy Officer (FPO) who serves as the privacy representative for that facility. *A list of FPO s is available on PeopleConnect: http://peopleconnect.carolinas.org/hipaa 22