Please use your cell phone to access this website: pollev.com/ucsfprivacy



Similar documents
How To Protect Your Health Information At Uni Of California

2014 Core Training 1

HIPAA PRIVACY AND SECURITY AWARENESS. Covering Kids and Families of Indiana April 10, 2014

HIPAA Self-Study Module Patient Privacy at Unity Health Care, Inc HIPAA Hotline

HIPAA Privacy and Security. Rochelle Steimel, HIPAA Privacy Official Judy Smith, Staff Development January 2012

PHI- Protected Health Information

HFS DATA SECURITY TRAINING WITH TECHNOLOGY COMES RESPONSIBILITY

Advanced HIPAA Healthcare Provider

HIPAA Training for Hospice Staff and Volunteers

Policies and Procedures for Electronic Protected Health Information (ephi) and Personally Identifiable Information (PII)

IRB, HIPAA, and Clinical Research

Privacy and Security For Managers

HIPAA Training for Staff and Volunteers

HIPAA Privacy and Security

Page 1. NAOP HIPAA and Privacy Risks 3/11/2014. Privacy means being able to have control over how your information is collected, used, or shared;

Guadalupe Regional Medical Center

HIPAA TRAINING. A training course for Shiawassee County Community Mental Health Authority Employees

Privacy for Beginners: What Every Healthcare Worker Needs to Know About HIPAA and Privacy

Privacy & Security of Patient Information 2010

HIPAA: Bigger and More Annoying

Critical Data Guide. A guide to handling critical information at Indiana University

Protecting Privacy & Security in the Health Care Setting

HIPAA PRIVACY AND SECURITY TRAINING P I E D M O N T COMMUNITY H EA LT H P L A N

PROTECTING PATIENT PRIVACY and INFORMATION SECURITY

HIPAA. Developed by The University of Texas at Dallas Callier Center for Communication Disorders

HIPAA Privacy & Security Rules

Human Subject Research: HIPAA Privacy and Security. Human Research Academy 101

Department of Health and Human Services Policy ADMN 004, Attachment A

University of Cincinnati Limited HIPAA Glossary

HIPAA and Health Information Privacy and Security

By the end of this course you will demonstrate:

HIPAA 101: Privacy and Security Basics

HIPAA (Health Insurance Portability and Accountability Act of 1996) Stetson University HIPAA Training

HIPAA and Privacy Policy Training

HIPAA Compliance Annual Mandatory Education

ACCOUNTABLE HEALTHCARE IPA HIPAA PRIVACY AND SECURITY TRAINING. By: Jerry Jackson Compliance and Privacy Officer

HIPAA Privacy & Breach Notification Training for System Administration Business Associates

Reporting of HIPAA Privacy/Security Breaches. The Breach Notification Rule

Why Lawyers? Why Now?

Other terms are defined in the Providence Privacy and Security Glossary

HIPAA Security Training Manual

ADMINISTRATORS SERIES PRIVACY AND SECURITY AT UF. Cheryl Granto Information Security Manager, UFIT Information Security

HIPAA (Health Insurance Portability and Accountability Act) Awareness Training for Volunteers and Interns

HIPAA PRIVACY DIRECTIONS. HIPAA Privacy/Security Personal Privacy. What is HIPAA? 6/28/2012

SmartHIPAA! 5 simple and inexpensive tips to protect patient information

ACRONYMS: HIPAA: Health Insurance Portability and Accountability Act PHI: Protected Health Information

The Department of Health and Human Services Privacy Awareness Training. Fiscal Year 2015

OF MICHIGAN HEALTH SYSTEM

HIPAA Privacy and Security

Today s Webcast is presented by Michael, also from the DART Team. Michael will provide

INFORMATION SECURITY & HIPAA COMPLIANCE MPCA

HIPAA and the HITECH Act Privacy and Security of Health Information in 2009

HIPAA Security Education. Updated May 2016

HIPAA Privacy and Information Security Management Briefing

U.S. Department of Health and Human Services (HHS) The Office of the National Coordinator for Health Information Technology (ONC)

HIPAA Privacy & Security Health Insurance Portability and Accountability Act

Introduction. Purpose. Reference. Applicability. HIPAA Policy 7.1. Safeguards to Protect the Privacy of PHI

HIPAA Compliance & Privacy. What You Need to Know Now

HIPAA Orientation. Health Insurance Portability and Accountability Act

Donna S. Sheperis, PhD, LPC, NCC, CCMHC, ACS Sue Sadik, PhD, LPC, NCC, BC-HSP Carl Sheperis, PhD, LPC, NCC, MAC, ACS

Information Security and Privacy. WHAT is to be done? HOW is it to be done? WHY is it done?

Information Security It s Everyone s Responsibility

Health Insurance Portability and Accountability Act (HIPAA) Compliance Training

The Security Rule of The Health Insurance Portability and Accountability Act (HIPAA) Security Training

Career Connection, Inc. Data Privacy. Bringing Talent Together With Opportunity

Welcome to the University of Utah Health Sciences HIPAA Privacy and Security Training Program

Advanced HIPAA Security Training Module

HIPAA Compliance for Students

Awareness Training for VIM Volunteers and Staff

HIPAA Privacy. September 21, 2013

Health Insurance Portability and Accountability Act HIPAA Privacy Standards

Laptops, Tablets, Smartphones and HIPAA: An Action Plan to Protect your Practice

HELPFUL TIPS: MOBILE DEVICE SECURITY

Alliance for Clinical Education (ACE) Student HIPAA Training

When HHS Calls, Will Your Plan Be HIPAA Compliant?

Data Security Basics: Helping You Protect You

HIPAA PRIVACY POLICIES & PROCEDURES. Department of Behavioral Health and Developmental Services DBHHDS GENERAL AWARENESS TRAINING

Protecting Patient Privacy It s Everyone s Responsibility

Montclair State University. HIPAA Security Policy

HIPAA Privacy and Security and Research

Annual HIPAA Security & Information Security Competency

HIPAA and Clinical Research

HIPAA AND COMPLIANCE

HIPAA and You The Basics

SHS Annual Information Security Training

Health Insurance Portability and Accountability Act (HIPAA)

PRIVACY AND INFORMATION SECURITY INCIDENT REPORTING

Breaches Happen: Protect Your Patients, Your Research and You

Congregation Data Security Education

Managing Cyber & Privacy Risks

HIPAA Privacy & Security Training for Clinicians

Lessons Learned from Recent HIPAA and Big Data Breaches. Briar Andresen Katie Ilten Ann Ladd

Trust 9/10/2015. Why Does Privacy and Security Matter? Who Must Comply with HIPAA Rules? HIPAA Breaches, Security Risk Analysis, and Audits

HIPAA Update Focus on Breach Prevention

DSHS CA Security For Providers

Louisiana Department of Health and Hospitals Basic HIPAA Privacy Training: Policies and Procedures

HIPAA Compliance (DSHS and HCA) Preamble: This section of the Contract is the Business Associate Agreement as

Information Security It s Everyone s Responsibility

HIPAA Compliance: Efficient Tools to Follow the Rules

Privacy and Security Standards

Transcription:

Please use your cell phone to access this website: pollev.com/ucsfprivacy 1

Privacy and Confidentiality Residents and Fellows Orientation 2015 Deborah Yano-Fong, RN, MS, CHPC Chief Privacy Officer June 19, 2015 June 30, 2015

Overview Why is This Important? State and Federal Privacy Laws and Regulations Five Things To Remember What is Your Responsibility? Privacy Concepts and Best Practices 3

Why Is This Important? Welcome to California. Be Aware: Financial consequence to you, and the hospital/organization Professional license impact 4

State and Federal Privacy Laws and Regulations: Fines Criminal Penalties Civil Penalties State Up to $250,000 Misdemeanor Damages plus $1,000 fine per patient Federal Up to $1.5 million Up to 10 years in prison N/A 5

More Headlines To Avoid Patients Impacted 78.8 Million Patients Anthem Blue Cross 2/4/2015 Largest HIPAA Fine $4.8 Million Columbia Medical Center 9/27/2010 6

Survival Tips For HIPAA Patient Rights For Patient Requests: DO NOT Agree to requests for restriction/amendments DO Refer patient to Patient Relations or HIMS For Research Data: DO NOT DO Harvest research data from any Medical Record source yourself Go to HIMS/Integrated Data Repository. Review Policy 5.01.06 Control of Access to and Release of Info 7

Please use your cell phone to access this website: pollev.com/ucsfprivacy 8

Correct Answer to Scenario #1 is E You should not be accessing the record at all Remember: Accessing APeX is only for UCSF business Accessing your significant other s record is not part of your UCSF duties APeX access is tracked and monitored Consequence for Inappropriate access: Potential disciplinary action, up to and including termination of employment, loss of your professional license, and civil and criminal penalties 12

Five Things To Remember: 1. Minimum Necessary 2. Encrypt Every Electronic Device 3. When in Doubt, call the Privacy Office 4. Electronic Safeguards 5. Physical Security 13

1: Minimum Necessary Standard Applies for all uses and disclosures except for treatment Payment and Healthcare operations Access only what you need to know Share only what you need to disclose 14

Scenario #2 Situation: Resident Personal laptop Check my UCSF email Never save PHI onto my laptop. 16

Correct Answer to Scenario #2 B. Yes, because I access my UCSF email, which may result in files automatically downloading to my laptop without my knowledge Your laptop must be encrypted. Accessing UCSF email from your personal laptop may result in your UCSF data, mail and attachments being automatically downloaded and stored on your device. Thus, encrypt your personal device before using it for UCSF business. If the encrypted device is lost or stolen, the information in it (both personal and UCSF) is secure and inaccessible to thieves. 18

2: You Must Encrypt If you use the computing or electronic devices for UCSF business. Devices include: Desktop computers Laptop computers Smart phones (e.g., iphone, Android, Blackberry) Tablets (e.g., ipad) External drives (e.g., USB flash drives) UCSF business purposes include: Checking UCSF email Accessing the network via VPN Accessing or storing UCSF information FYI: Encryption does not perceptibly slow down your computer 19

3: When In Doubt, Call the Privacy Office UCSF Privacy Office 415-353-2750 20

4: Electronic Safeguards Inventory the devices you are using for UCSF business (even if it s just to check UCSF email) Use the following UCSF guidelines to encrypt your personal devices Desktops/laptops: http://tiny.ucsf.edu/9btkab Smartphones: http://tiny.ucsf.edu/h4mmru Contact the IT Service Desk at (415) 514-4100 for encryption questions 21

Electronic Safeguards: Secure Email How To Use Secure Email at UCSF Include the trigger word followed by a colon in the subject line: Secure: ephi: PHI: Make sure you are sending your message to the correct recipient Do not include PHI in the subject line Remember This protects the information when it leaves our UCSF network environment. It does not encrypt the message within the UCSF network, as our internal network is secure. However, best practice is to always use secure email as this will protect you if someone forwards your message outside of the UCSF network. 22

5: Physical Security Do not take paper documents containing confidential UCSF information offsite, including: Protected health information (PHI) Personal identifiable information (PII) Human subjects research information Instead of taking documents offsite: Login to UCSF systems using VPN on an encrypted device Securely email documents to yourself Save files to an encrypted device 23

Physical Security If you must take hard copy UCSF information offsite: De-identify the information as much as possible Secure and keep it on your body at ALL TIMES Locking documents and devices in your vehicle s trunk or glove compartment is NOT secure and is a target for thieves Destroy the documents as soon as they are not required 24

What Do I Do If Something Goes Wrong? Report incidents immediately: 25

Best Privacy Practice Summary 1. Minimum Necessary Standard 2. ENCRYPT all mobile & electronic devices 3. WHEN IN DOUBT CALL THE PRIVACY OFFICE 26

Best Privacy Practice Summary Cont. 4. Electronic Safeguards a. Do not block software upgrades b. Do not email spreadsheets with patient information 5. Physical Security a. Place paper PHI in confidential shredding bin b. Do not take hard copy PHI off-site; if you must, keep it on your body at all times c. Carefully verify each document you give to patients/families to ensure it is for the correct patient (2 identifier verification for mailing, faxing, etc.) d. Limit discussion in public areas 27

UCSF Privacy and Compliance in a Nutshell This presentation is an overview of privacy and security. For more information refer to: UCSF Confidentiality Handbook Privacy Office Website hipaa.ucsf.edu Call the Privacy Office 353-2750 28

Correct Answer to Scenario #3 D. No, I cannot photograph this patient because I do not have consent to do so. Even without the face, the photo may reveal a unique characteristic (e.g., tattoo), or the patient s traumatic accident made headlines, in which the photo may reveal the patient s identity. You must obtain consent from the patient/patient s representative for any photography or filming of the patient for non-treatment purposes. 32