Privacy & Security of Patient Information 2010



Similar documents
HIPAA Training for Hospice Staff and Volunteers

HIPAA Training for Staff and Volunteers

Guadalupe Regional Medical Center

HIPAA 101: Privacy and Security Basics

Patient Privacy and HIPAA/HITECH

HIPAA Policy, Protection, and Pitfalls ARTHUR J. GALLAGHER & CO. BUSINESS WITHOUT BARRIERS

HIPAA Privacy & Security Training for Clinicians

PHI- Protected Health Information

2014 Core Training 1

HIPAA and Health Information Privacy and Security

Department of Health and Human Services Policy ADMN 004, Attachment A

HIPAA Privacy and Security. Rochelle Steimel, HIPAA Privacy Official Judy Smith, Staff Development January 2012

8.03 Health Insurance Portability and Accountability Act (HIPAA)

Annual Compliance Training. HITECH/HIPAA Refresher

HIPAA and Privacy Policy Training

Health Insurance Portability and Accountability Act of 1996 (HIPAA)

By the end of this course you will demonstrate:

Privacy & Security Standards to Protect Patient Information

HIPAA Self-Study Module Patient Privacy at Unity Health Care, Inc HIPAA Hotline

HIPAA PRIVACY AND SECURITY AWARENESS. Covering Kids and Families of Indiana April 10, 2014

HIPAA Privacy Keys to Success Updated January 2010

HIPAA initially went into effect April 14, HIPAA is a set of rules that is to be followed by doctors, hospitals and other health care providers.

HIPAA Compliance Annual Mandatory Education

HIPAA Happenings in Hospital Systems. Donna J Brock, RHIT System HIM Audit & Privacy Coordinator

Health Insurance Portability and Accountability Act (HIPAA)

HIPAA Privacy & Security Rules

SELF-LEARNING MODULE (SLM) 2012 HIPAA Education Privacy Basics and Intermediate Modules

Protecting Patient Privacy It s Everyone s Responsibility

HIPAA Awareness Training

Privacy and Information Security Awareness Training. Health Insurance Portability & Accountability Act of HIPAA

HIPAA Education Level One For Volunteers & Observers

HIPAA Training Study Guide July 2015 June 2016

CREATIVE SOLUTIONS IN HEALTHCARE, INC. Privacy Policy

HIPAA Privacy Policy & Notice of Privacy Practices

General Compliance. General Compliance Training. Course Overview. General Compliance. The intent of the Compliance Program is to:

MCCP Online Orientation

This presentation focuses on the Healthcare Breach Notification Rule. First published in 2009, the final breach notification rule was finalized in

Target Audience: All Non-Management CHS Employees, Students, Volunteers, and Physicians

MONTSERRAT COLLEGE OF ART WRITTEN INFORMATION SECURITY POLICY (WISP)

Page 1. NAOP HIPAA and Privacy Risks 3/11/2014. Privacy means being able to have control over how your information is collected, used, or shared;

HIPAA Privacy and Security

A Privacy and Information Security Guide for UCLA Workforce. HIPAA and California Privacy Laws

HIPAA In The Workplace. What Every Employee Should Know and Remember

HFS DATA SECURITY TRAINING WITH TECHNOLOGY COMES RESPONSIBILITY

Why Lawyers? Why Now?

HIPAA Compliance for Students

Statement of Policy. Reason for Policy

Clinical Solutions. 2 Hour CEU

MEDICAL OFFICE COMPLIANCE TOOLKIT. The Complete Medical Practice Compliance Resource HIPAA HITECH OSHA CLIA

ALTA OFFICE SECURITY AND PRIVACY GUIDELINES ALTA

Privacy and Security For Managers

ACRONYMS: HIPAA: Health Insurance Portability and Accountability Act PHI: Protected Health Information

THE HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT (HIPAA) EMPLOYEE TRAINING MANUAL

Guide to INFORMATION SECURITY FOR THE HEALTH CARE SECTOR

PROTECTING PATIENT PRIVACY and INFORMATION SECURITY

ACCOUNTABLE HEALTHCARE IPA HIPAA PRIVACY AND SECURITY TRAINING. By: Jerry Jackson Compliance and Privacy Officer

HIPAA PRIVACY AND SECURITY TRAINING P I E D M O N T COMMUNITY H EA LT H P L A N

Protecting Privacy & Security in the Health Care Setting

Compliance HIPAA Training. Steve M. McCarty, Esq. General Counsel Sound Physicians

GLENN COUNTY HEALTH AND HUMAN SERVICES AGENCY. HIPAA Policies and Procedures 06/30/2014

HIPAA TRAINING. A training course for Shiawassee County Community Mental Health Authority Employees

HIPAA Privacy and Security

HIPAA POLICY PROCEDURE GUIDE

Health Insurance Portability and Accountability Act of 1996 (HIPAA) Contents

St. Elizabeth Healthcare

SOUTHLAKE DERMATOLOGY 1170 N. Carroll Ave. Southlake, TX Main Fax

LEARNING MODULE: HIPAA AND COMPLIANCE. For Clinical Students and Instructors Greater Green Bay Healthcare Alliance Updated June 27, 2014

Annual Continuing Education (ACE) (Print version) Information Privacy and I.T. Security and Compliance

When HHS Calls, Will Your Plan Be HIPAA Compliant?

HIPAA: Bigger and More Annoying

State of Connecticut Department of Social Services HIPAA Policies and Procedures Manual

HIPAA And Public Health. March 2006 Delaware s Division of Public Health 1

Please use your cell phone to access this website: pollev.com/ucsfprivacy

HIPAA Compliance (DSHS and HCA) Preamble: This section of the Contract is the Business Associate Agreement as

HIPAA: Privacy/Info Security

Catholic Health HIPAA/ HITECH

Heather L. Hughes, J.D. HIPAA Privacy Officer U.S. Legal Support, Inc.

OF MICHIGAN HEALTH SYSTEM

HIPAA Security Training Manual

MIT s Information Security Program for Protecting Personal Information Requiring Notification. (Revision date: 2/26/10)

APPLETREE PEDIATRICS, PA NOTICE OF PRIVACY PRACTICES

HIPAA Privacy & Security Health Insurance Portability and Accountability Act

Detailed Notice of Privacy Practices Effective Date: September 20, 2013

HIPAA AND COMPLIANCE

HIPAA. For General Workforce. What you need to know. HIPAA Training Presentation for Management Workforce

HEALTH INSURANCE PORTABILITY & ACCOUNTABILITY ACT OF 1996 HIPAA

Privacy Compliance Health Occupations Students

Welcome to the University of Utah Health Sciences HIPAA Privacy and Security Training Program

Welcome to ChiroCare s Fourth Annual Fall Business Summit. October 3, 2013

HIPAA Privacy Overview

HIPAA and the HITECH Act Privacy and Security of Health Information in 2009

Spracklin Chiropractic Andrew Spracklin D.C.

Pacific Medical Centers HIPAA Training for Residents, Fellows and Others

How To Protect Your Health Information At Uni Of California

HIPAA Security Education. Updated May 2016

Identity Theft Prevention Program Compliance Model

Health Insurance Portability and Accountability Act HIPAA Privacy Standards

DATA PROTECTION IT S EVERYONE S RESPONSIBILITY. An Introductory Guide for Health Service Staff

AVE MARIA UNIVERSITY HIPAA PRIVACY NOTICE

Transcription:

Privacy & Security of Patient Information 2010

S&W PRIVACY UPDATE This module is intended to review the policies and procedures of Scott and White that address the HIPAA Privacy Regulations. The module is organized to address the following topics; Introductory information on HIPAA Organizational Responsibilities Guidance for Staff Patient s Rights Reporting Concerns 2

What is HIPAA? HIPAA stands for the Health Insurance Portability and Accountability Act. It covers three areas. Insurance Portability (Ensures continuity of coverage when changing health plans) Accountability (Fraud Enforcement) ADMINISTRATIVE SIMPLIFICATION includes these three provisions EDI (Electronic Data Interchange) is standardization of Electronic transactions. Security is the protection of electronic health information. Privacy addresses protecting the patient s privacy of Protected Health Information (PHI) 3

: Privacy & Security of Patient Information What is Protected Health Information (PHI)? PHI is individually identifiable information that is maintained or transmitted in any form by S&W. PHI is any information, verbal or recorded, relating to the health, healthcare or payment for health care provided. The information does not have to be created by our organization to be considered PHI. 4

: Privacy & Security of Patient Information PHI comes in many forms: Electronic (computer, mobile device, fax, email) Paper Verbal Photography, filming & recordings PHI is not limited to a patient s clinical information. It includes any information that can identify the patient. Examples: Name, MRN, Address, SS#, Date of Birth, Billing Information, Photos, Telephone # 5

Organizational Responsibilities Treatment, Payment & Health Care Operations (TPO) S&W is allowed to use and/or disclose PHI in the normal course of providing health care and related business. Treatment is the coordination of health care or other services. Payment includes billing, claims management, medical necessity, utilization review activities, determination of coverage. Health Care Operations includes quality improvement activities, credentialing, training, underwriting, compliance services, business planning and development, business management and general administration. 6

Organizational Responsibilities Notice of Privacy Practices A S&W document given to each patient at the first point of service Details how S&W uses, discloses and protects PHI for purposes of treatment, payment and health care operations. Defines the patient s rights under HIPAA Explains how S&W uses PHI for Marketing, Fundraising and Research Explains how to file a complaint at S&W or with the Department of Health and Human Services. 7

Organizational Responsibilities S&W Marketing and Fundraising Activities The privacy regulations permit using demographic information without the patient s authorization for certain marketing and fundraising efforts. Any uses outside these exceptions require a patient s authorization. Fundraising - an organization is allowed to use name, address, phone #, age, gender and insurance status for fundraising efforts but S&W must provide patient information on how they can opt-out of any fundraising communications. S&W will not target fundraising based on a diagnosis or medical condition. Marketing Communications that do not require an authorization Communications about benefits/services available to the patient Communications that are part of treatment/ treatment alternatives Communications that involve products of nominal value 8

Organizational Responsibilities Business Associate Agreements A business associate is any external individual, business or vendor that Perform a service on behalf of Scott & White and The Service requires the use/disclosure of patient s Protected Health Information Business Associate Agreement is required to assure that the business associate will protect and secure PHI as required by HIPAA standards. It is important for all contracts/agreements to go through legal department and purchasing department. Business Associates will be responsible for reporting any breach Business Associates will b of privacy or security to Scott & White immediately 9

Patient Rights HIPAA gives specific rights to patients. These rights give patients more control over how their health information is used/disclosed. Right to Access PHI- A patient can request to review or obtain copies of their PHI. S&W follows STATE LAW and HIPAA for review and release of PHI. Patients requesting access to their records should be directed to Medical Records Release of Information Department (ROI). If information is released from other areas the patient should complete the S&W authorization form and this form should be sent to the Health Information Management Department with documentation of what was released and when. A patient may revoke an authorization, in writing, at anytime. Employees should access PHI for personal use through the ROI department or their attending/treating physician. Right to Request an Amendment to PHI A patient has the right to request an amendment to their medical record. Requests for amendments will be reviewed by the physician responsible for the documentation. Patients must submit a written request (S&W Request for Amendment of Protected Health Information) to the Patient Relations Department or contact them at 724-3035. 10

Patient Rights Right to Request Restrictions A patient has the right to request restrictions on the use and disclosure of their PHI. Such requests will be reviewed on a case-by-case basis. HIPAA does not require S&W to accommodate all requests. Patients should submit a written request (SW Request for Restrictions on Medical Information) to the Patient Relations Department or contact them at 724-3035. Right to Request Confidential Communications A patient can request that we communicate with them by an alternate means or at an alternate location. S&W must accommodate reasonable requests for the communications. Examples might be requests that information be sent to a work address/phone # rather than a home address/phone #. Patients must submit a written request (S&W Request for Confidential Communications) to the Patient Relations Department or contact them at 724-3035. 11

Patient Rights Right to an Accounting of PHI Disclosures A patient has a right to an accounting of the disclosures of their PHI that S&W has made without an authorization. There are exceptions for the accounting. Disclosures that will NOT be listed in the accounting include disclosures for treatment, payment, health care operations or PHI released with a signed authorization. Patients must submit a written request (S&W Request for Accounting of Disclosures) to the Patient Relations Department or contact them at 724-3035. Right to File a Complaint A patient has the right to file a complaint if they believe their privacy rights have been violated. To file a complaint with S&W contact Patient Relations, (254) 724-3035 To file a complaint with the US Dept of Health and Human Services, Office of Civil Rights (OCR), call toll free 1-800-368-1019. 12

Penalties Enforcement of Privacy Regulations by OCR Enforcement will be the responsibility of the Office of Civil Rights (OCR) under the US Dept of Health and Human Services. There are severe civil and criminal penalties for improper disclosure, disclosure under false pretenses, and disclosure made out of malice or commercial purposes. Privacy & Security violations must now be reported to the patient and the OCR penalties will increase to up to $1.5 million civil and criminal penalties may be imposed including up to 10 years in Prison Physicians and employees can be held personally liable of violating a patient s privacy. Sanctions within S&W HIPAA requires S&W to establish disciplinary sanctions for staff who fail to comply with its privacy policies and procedures, and ensure that those sanctions be applied consistently at all levels of the organization.\ Violations of privacy or security can result in disciplinary action up to and including termination. 13

Privacy & Security Breach Notification Effective September 2009 Unsecured PHI that is breached (intentionally or inadvertently) - Scott & White Must notify patients & Office of Civil Rights (OCR) of unauthorized Access (internal & external) Acquisition Use Disclosure If unable to identify patients or more than 500 patients affected must report in local media and on Scott & White Internet Site Unsecured PHI is defined as any Electronic PHI that has not been secured by encryption Paper that has not been rendered unusable, unreadable, or indecipherable (i.e. cross-cut shredded or handled in secure manner through confidential waste procedures) Includes all forms of PHI Electronic Paper Verbal Photography, filming & recordings 14

Privacy & Security Breach Notification What S&W Staff can do to secure PHI Do not save patient information to laptop, computer, mobile devices, CD, DVD, external drives, USB (flash) drives (unless encrypted) Use only encrypted mobile devices laptops,usb (flash) drives, etc Delete information off of cell phones, pagers, etc immediately Verify Faxes received appropriately by outside recipients Do not automatically forward email Encrypt any outgoing email known to contain PHI Type Secure: (the word secure and a colon) in first of subject line of email Dispose of paper in the appropriate blue recycle containers or locked containers Protect visibility of documents and computer screens Avoid carrying paper PHI outside of a S&W facility Log off or Lock down your computer before walking away Notify Corporate Compliance Department immediately of any lost or stolen computers or devices, any inadvertent disclosures, and any potential breaches (i.e. via fax, email, paper, verbal, etc) 15

Breach Examples that must be reported (not inclusive) Lost or stolen Laptop, Desktops Lost or stolen mobile devices (blackberry, IPhone, flash (USB) drives, CDs, etc) Paper PHI left unsecured (regular trash, left in the cafeteria, in public access areas, etc) Paper PHI that has been lost or stolen Photos, filming, recordings on cell phones or cameras by staff, residents, etc Faxes to wrong numbers Mail containing PHI sent to wrong address Email containing PHI sent to wrong email address Unauthorized access by staff Discussion of patient s on social media sites (facebook, twitter, MySpace, etc) Verbal communication about patient shared inappropriately with someone other than patient PHI accessed appropriately for business purposes but disclosed beyond business purposes 16

Guidance for Staff Disclosure Concerns Implied Consent We may make verbal disclosures to family or close friends, if we can infer from the circumstances (i.e. they are in the treatment room) that the patient would not object to the disclosure. The patient should be given the opportunity to object to the disclosure. Patients with Dementia - We may disclose health information about the patient to someone who has Medical Power of Attny, cares for the patient or has an established legal right. Minors HIPAA regulations direct us to STATE LAW. There are no changes from current requirements under state law. Emergency Situations -If the patient is unconscious or in an emergency situation and is unable to opt-out, use your best judgment about disclosures. Use Professional Judgment Make a decision that is in the patient s best interest. 17

Guidance for Staff Verifying the Requestor Before providing patient information, we must take reasonable and appropriate measures to verify that the requestor has a right to that information. Suggestions on information that can be used to verify the identity and authority of an individuals requesting information are Date of Birth SS# Address or Phone Number Caution There are some instances when a family member or ex-family member may know the appropriate information and may not have a right to patient information without the patient s authorization. (spouse, parent of adult child) Use Professional Judgment Contact your Supervisor 18

Minimum Necessary HIPAA Guidance for Staff You should ONLY access and use the information you need to perform your job. Minimum Necessary also applies to when we are requesting or disclosing information to other health care providers. Minimum Necessary does NOT apply in the treatment setting. 19

Guidance for Staff Opting-Out of the Facility Directory HIPAA allows only the following information to be included in the facility s inpatient directory Patient s Name Location (Room #) Condition, in general terms Religious Affiliation A patient may opt out and request their stay at S&W remain confidential. Patients who have opted-out of the facility directory will not receive calls, flower/gift deliveries, and family/friends asking for their room location will not be given any information. 20

Guidance for Staff Law Enforcement and Other Officials Requesting PHI S&W may disclose health information to law enforcement officials without the patient s authorization BUT we must ensure that the disclosures are appropriate and follow HIPAA and STATE LAW. Therefore, Refer all law enforcement individuals, calls and/or requests for patient information to Legal or Risk Management, 724-4127 50 Nurse 21

Guidance for Staff Use & Disclosure of PHI for Research Purposes All Research activities must be conducted in accordance with the rules of an approved Institutional Review Board (IRB). All Research studies must be approved by an IRB before study can be conducted. In order to use or disclose PHI to others during research, the researcher must have a signed research authorization from the patient or participant. In the absence of a signed research authorization, any information that could identify the patient or participant must be removed (de-identified) before a researcher can use it. 22

Guidance for Staff Photography, Filming, & Recording of Patients Permitted Only for Treatment, Identification or Diagnosis Photography, Filming, Recording Consent needed for nonpatient care purposes (identified or de-identified) for S&W Education/Training Quality Improvement Activities Marketing Purposes External Purposes that will be seen or heard by the public Separate marketing consent required S&W Policy SW.051 Guidance for Photography, Recording or Filming Must have documented reason for Photography, Recording or Filming that complies with permitted uses 23

Personal Use of Patient Information HIPAA Staff Responsibility S&W Staff are given access to the minimum amount of patient information necessary to perform the duties associated with their jobs. Staff can ONLY access, review or use/disclose information as it pertains to their specific job responsibilities. As S&W employees, we should never access patient information for personal reasons. This includes paper records and all information systems available to you at Scott & White. As employees we must remember: Access to S&W records & information systems are for the business of Scott & White only. Under No Circumstances should patient information be used or reviewed for personal use about you, a family member, an acquaintance, co-worker, employee, friend, etc. Violations of Privacy are very serious and will result in disciplinary action up to and including termination. 24

Staff Responsibility Examples of Personal (Inappropriate) Use The following is not meant to be inclusive, but to give examples of misuse of Patient Information for personal reasons. Do not: Access your own health information Access your family, friends, ex-family member s patient information Review patient information out of concern or curiosity Look up a staff member s medical or financial information for personal interest Do not post information about patients or work issues related to patients on social media sites (Facebook, MySpace, Twitter, YouTube, etc.) Look up birth dates, addresses, appointments, test results for family, friends, neighbors Review patient information to use in personal relationship Discuss patient information with family, friends, other staff when it is not related to the business of Scott & White Compile a mailing list from Scott & White records for any reason, except as defined by your job duties 25

Staff Responsibility Business Purpose Use in Scott & White There are times when accessing patient information for the business of Scott & White would involve accessing our own or families information in these instances it is best to refer this responsibility to someone not involved on a personal basis (supervisor, co-worker, etc). Even friends or ex-family may be uncomfortable with an employee accessing their patient information and referring this patient to a co-worker may help avoid any conflicts. 26

Staff Responsibility Handling of Paper PHI & Other Confidential Documents Paper documents should be handled in a secure manner. The following guidelines should be followed: Handle documents securely do not leave visible to the public or other staff who do not have a business reason to view information Do not leave documents unattended in a public area Dispose of documents in the appropriate confidential waste containers not the regular trash Do not leave documents unattended in your vehicle Avoid taking documents containing PHI off the S&W premises IV Bags, Med Bags, Prescription Bottles also contain confidential patient information and these should be disposed of in red hazardous waste bags. 27

Staff Responsibility Transportation of PHI Between S&W Facilities Only transport when absolutely necessary Do not transport documents that can be viewed electronically or printed at the location involved Only for S&W business purposes Transport information electronically on an encrypted device laptop USB drive external drive If for educational purposes de-identify If you must transport paper documents, slides, photos, etc with PHI Keep in an enclosed envelope or folder Do not carry around in a folder where documents can fall or blow out Do not leave unattended in a public area Do not leave unattended in your vehicle to go shopping, visit a friend, etc. or over- night in your vehicle at home (unless locked in your garage) If you must take to your home keep secure within your home do not allow other family, friends, etc. access to documents If at all possible bring back to a S&W facility immediately not the next day. Photography, Film, & Recordings must have proper patient consent and follow all requirements of the Photo, Filming & Recording Policy. 28

Security Security of Electronic Information Three Components to HIPAA Security Administrative Safeguards Physical Safeguards Technical Safeguards We all have responsibility to control access to sensitive data and Patient Information. 29

Guidance for Staff Physical Security Secure rooms, work stations, mailrooms Place printers, fax machines, copiers in secure locations away from public Secure file cabinets, drawers, mailboxes that hold protected information Keep protected information from public view Do not play voice messages or hold sensitive conversations on a speaker phone 30

Guidance for Staff Controlling Who Has Access Assign staff access only to the systems they need to do their job according to policy. When staff transfer access should be reevaluated & updated according to policy. When staff leave Scott & White access should be terminated according to policy. If unsure verify that staff &/or visitors have a right be in the area don t assume Role-Based Access You are given access to certain systems that are required to do your job this should be on a need to know basis and only access what is necessary to do your job. You should not attempt to view information that you have not been given authorization to access. 31

Guidance for Staff Computer Security Never leave patient information displayed on your computer Log out or lock down your computer if you step away Protect your Passwords Change your password at regular intervals Never write down your password Do not share your password Create a strong password Minimum of 8 characters in length Does not include the User ID. Does not include the same character 3 or more repeated times (e.g. AAA). Composed of at least 1 character from the following classes: Alphabetic: Upper Case (A - Z) Alphabetic: Lower Case (a - z) Numeric: 0-9 32

Guidance for Staff E-mail Never automatically forward your email to an outside email account Email sent outside Scott & White (non-groupwise) that contains sensitive data or patient information should be encrypted through our secure email system. Type secure: (the word secure and a colon) in the first of the subject line of the email to encrypt email When emailing information internally only send the minimum patient information necessary and avoid mass emails to large # of staff when sensitive data or patient information is included. Report any instances of unsecured confidential email being sent outside of S&W System 33

Guidance for Staff Faxes Use a cover sheet that shows your contact information and a confidentiality disclaimer Confirm the recipient s contact information, including fax and telephone When sending a fax with sensitive data or patient information call receiver to confirm that fax was received Immediately remove confidential information Effective September 2009 Any faxes inadvertently sent to the wrong # should be reported to Corporate Compliance Faxes sent to wrong phone number (outside of S&W) must be reported to the patient and to the OCR 34

Staff Responsibility Laptop & Desktop Computer Use & Security Use of Scott & White Laptops and Desktop computers should be limited to Scott & White business purposes only. Most Laptops and some desktops have been encrypted. Avoid saving patient or other confidential data to a laptop or desktop computer that is not encrypted Use network storage instead of hard drive on computer this can set up by sending an request for service to Information Systems. If you have a S&W computer that you must save PHI or other confidential information to contact IS Security and request encryption if the device is not already encrypted. Report lost or stolen devices immediately Contact I.S. for proper scrubbing of data, email, etc from mobile devices no longer being used just deleting files in not sufficient Personal Laptops and other devices that contain any PHI, business or other confidential information must meet S&W security standards (encryption, etc) 35

Staff Responsibility Mobile Devices Mobile devices include all of the following (not inclusive): Cell Phones, IPhones, Blackberries, IPaqs Netbooks USB (jump, flash) drives CD/DVD External hard drives Pagers with texting capabilities Avoid using phones, PDA s to share PHI Protect PHI or other confidential information on mobile devices by: Keep the device in your immediate possession or in a secure place. Password protect devices. Use encryption software (if available for that device). Use only encrypted USB Drives Delete confidential information from device immediately Protect the data: Data should be encrypted to protect it. Depending on the device holding the data, there are different acceptable ways to encrypt the data. Contact Information Systems (by calling the Helpdesk at 724-2501) for assistance in encrypting data on mobile devices. 36

Guidance for Staff Outside Data Storage S&W data and documents should only be saved to S&W encrypted computers or servers Never copy and paste patient medical record information and save to a computer (S&W or personal) Only use S&W encrpyted computers, network or servers to save S&W data or documents - Never use an outside storage source Strongly encouraged to save to Network Drive (Home drive or other drive can be set up by Information Systems. If computer is lost, stolen or crashes data will be secure on network drive not computer hard drive. 37

Staff Responsibility Disposal or Scrubbing of Electronic Media Simply deleting files from a device does not clean the confidential data completely off the device. Some electronic media can be cleaned ( scrubbed ) by magnetic degaussing. Erasing is an insufficient method of cleaning data from electronic media. Cell Phones, Blackberries, IPhones, IPaq, PDAs, etc. should have all files deleted and you should perform a manufacturer s hard reset to reset the device back to its factory default settings. Physical disposal of electronic media is accomplished by shredding, pulverizing, incinerating or otherwise physically destroying the electronic media so it can not be reconstructed. If you have a device that needs to be cleaned ( scrubbed ) contact the Information Systems Department Help Desk at 724-2501 38

Non-Retaliation Policy Scott & White has a non-retribution & non-retaliation policy. This means no action of retaliation or reprisal shall be taken against anyone who reports issues to their supervisor, Corporate Compliance, external organizations or for calling the hotline to make a report, complaint or inquiry. Any concern of retaliation should be reported to Human Resources or Corporate Compliance immediately. 39

Examples of Retaliation Whether an act is retaliatory depends upon the circumstances of each case. Examples of retaliatory actions, depending on the specific circumstances, might include (not all-inclusive): Termination, demotion, denial of promotion or transfer A material change in job duties to less desirable duties Threats, unjustified negative evaluations, unjustified negative references, or increased surveillance Temporary suspension (even if later reimbursed) could well dissuade an employee from complaining Schedule changes that might not impact all employees, but may matter to a mother with school age children Instructing employees not to report issues to Corporate Compliance or Human Resources Exclusion from important meetings. Exclusion from lunch would normally be considered trivial; however, exclusion from a weekly training lunch that contributes significantly to the employee s professional advancement might be considered retaliation 40

Resources S&W Privacy & Security Handbook Available on the S&W Intranet (Insite) HIPAA Page S&W has policies and procedures in place that define how to protect the privacy and confidentiality of patient information at Scott and White. These procedures are available on the S&W intranet, InSite HIPAA Intranet site It is expected that questions will arise about privacy of health information and the policies and procedures for these requirements. Questions/concerns may be addressed to The Privacy Officer, Frank Anderson (724-4386) or The Privacy Office, 724-7600 Email: HIPAA HIPAA 41

Reporting Concerns If you have questions or concerns regarding any of the privacy policies/procedures, you should contact the Privacy Officer, Frank Anderson: 724-4386 Privacy Office: 724-7600 Email: HIPAA HIPAA Serious concerns about suspected or known instance of potential violations of applicable law or regulations may also be reported through the Scott and White Compliance Hotline at 1-888-800-1096. 42