PROTECTING PATIENT PRIVACY and INFORMATION SECURITY



Similar documents
HIPAA and Health Information Privacy and Security

PHI- Protected Health Information

HIPAA Privacy and Security. Rochelle Steimel, HIPAA Privacy Official Judy Smith, Staff Development January 2012

HIPAA Privacy & Security Rules

HIPAA Privacy & Security Training for Clinicians

HIPAA Compliance Annual Mandatory Education

HIPAA Happenings in Hospital Systems. Donna J Brock, RHIT System HIM Audit & Privacy Coordinator

HIPAA Security Training Manual

Patient Privacy and HIPAA/HITECH

HIPAA: Privacy/Info Security

Annual Compliance Training. HITECH/HIPAA Refresher

2014 Core Training 1

Department of Health and Human Services Policy ADMN 004, Attachment A

HIPAA PRIVACY POLICIES & PROCEDURES. Department of Behavioral Health and Developmental Services DBHHDS GENERAL AWARENESS TRAINING

HIPAA and Privacy Policy Training

HIPAA Education Level One For Volunteers & Observers

ACRONYMS: HIPAA: Health Insurance Portability and Accountability Act PHI: Protected Health Information

The Basics of HIPAA Privacy and Security and HITECH

Privacy for Beginners: What Every Healthcare Worker Needs to Know About HIPAA and Privacy

Heather L. Hughes, J.D. HIPAA Privacy Officer U.S. Legal Support, Inc.

HIPAA Orientation. Health Insurance Portability and Accountability Act

Health Insurance Portability and Accountability Act of 1996 (HIPAA) Contents

HIPAA Training for Hospice Staff and Volunteers

HIPAA Security Rule Compliance

Health Insurance Portability and Accountability Act (HIPAA)

Annual HIPAA Security & Information Security Competency

HIPAA Compliance for Students

Privacy Compliance Health Occupations Students

HIPAA 101: Privacy and Security Basics

Health Insurance Portability and Accountability Act (HIPAA) and Health Information Technology for Economic and Clinical Health Act (HITECH)

Compliance Training for Medicare Programs Version 1.0 2/22/2013

ACCOUNTABLE HEALTHCARE IPA HIPAA PRIVACY AND SECURITY TRAINING. By: Jerry Jackson Compliance and Privacy Officer

HIPAA TRAINING. A training course for Shiawassee County Community Mental Health Authority Employees

HIPAA and Mental Health Privacy:

PRIVACY AND SECURITY SURVIVAL TRAINING

Health Insurance Portability and Accountability Act (HIPAA) Compliance Training

Building Trust and Confidence in Healthcare Information. How TrustNet Helps

2. Begin gathering necessary documents for student (refer to Record Acknowledgement Form)

HIPAA The Law Explained. Click here to view the HIPAA information.

HFS DATA SECURITY TRAINING WITH TECHNOLOGY COMES RESPONSIBILITY

SUBJECT: SECURITY OF ELECTRONIC MEDICAL RECORDS COMPLIANCE WITH THE HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT OF 1996 (HIPAA)

HIPAA Privacy and Security

MONTSERRAT COLLEGE OF ART WRITTEN INFORMATION SECURITY POLICY (WISP)

Protecting Patient Privacy It s Everyone s Responsibility

8.03 Health Insurance Portability and Accountability Act (HIPAA)

Somansa Data Security and Regulatory Compliance for Healthcare

HIPAA Self-Study Module Patient Privacy at Unity Health Care, Inc HIPAA Hotline

HIPAA And Public Health. March 2006 Delaware s Division of Public Health 1

HIPAA Awareness Training

ELECTRONIC HEALTH RECORDS

HIPAA Training for Staff and Volunteers

C.T. Hellmuth & Associates, Inc.

HIPAA Security Alert

The HIPAA Security Rule Primer A Guide For Mental Health Practitioners

Please Read. Apgar & Associates, LLC apgarandassoc.com P. O. Box Portland, OR Fax

Oregon Prescription Drug Monitoring Program. Terms & Conditions of Account Use Agreement. Statutory Authority:

CHIS, Inc. Privacy General Guidelines

HIPAA Employee Compliance Program TRAINING MANUAL

HIPAA Security Education. Updated May 2016

Network and Workstation Acceptable Use Policy

Securing the FOSS VistA Stack HIPAA Baseline Discussion. Jack L. Shaffer, Jr. Chief Operations Officer

General Compliance. General Compliance Training. Course Overview. General Compliance. The intent of the Compliance Program is to:

HFS DATA SECURITY TRAINING

Donna S. Sheperis, PhD, LPC, NCC, CCMHC, ACS Sue Sadik, PhD, LPC, NCC, BC-HSP Carl Sheperis, PhD, LPC, NCC, MAC, ACS

Compliance HIPAA Training. Steve M. McCarty, Esq. General Counsel Sound Physicians

HIPAA PRIVACY AND SECURITY TRAINING P I E D M O N T COMMUNITY H EA LT H P L A N

Clinician s Guide to HIPAA Privacy. I. Introduction What is HIPAA? Health Information Privacy Protected Health Information

HIPAA. For General Workforce. What you need to know. HIPAA Training Presentation for Management Workforce

Transcription:

PROTECTING PATIENT PRIVACY and INFORMATION SECURITY

2 PROTECTING PATIENT PRIVACY AND INFORMATION SECURITY

PROTECTING PATIENT PRIVACY AND INFORMATION SECURITY 3 INTRODUCTION As an agency employee, student, or volunteer of SUNY Upstate Medical University, you may see and hear confidential patient health information. We are committed to protecting the privacy of patients and the security of the health information they entrust to us. Under both State and Federal law patients have a right to the privacy and security of their health information. A new Federal law, the Health Insurance Portability and Accountability Act Privacy Rule (HIPAA) became effective April 14th, 2003, and establishes the requirements for use and disclosure of patient information. The HIPAA Security rule became effective on April 21, 2005, and defines the information security requirements for access to patient information. In this booklet, we will explain the HIPAA Privacy Rule, the HIPAA Security Rule, and SUNY Upstate Medical University s privacy and security practices.

4 PROTECTING PATIENT PRIVACY AND INFORMATION SECURITY WHAT IS HIPAA? HIPAA = The Health Insurance Portability and Accountability Act A Federal Law Created in 1996 Protects health information from unauthorized access & misuse Puts safeguards in place for health information collected, maintained, used or transmitted It is everyone s responsibility to secure and protect patient health information.

PROTECTING PATIENT PRIVACY AND INFORMATION SECURITY 5 WHAT IS PROTECTED HEALTH INFORMATION? All information about a patient is considered confidential, including information that: Is received, maintained or transmitted in ANY format Relates to the patient s past, present or future medical condition, treatment or payment for care Identifies the patient or could be used to identify the patient

6 PROTECTING PATIENT PRIVACY AND INFORMATION SECURITY HOW CAN CONFIDENTIAL HEALTH INFORMATION BE SHARED? To protect a patient s privacy, confidential health information should be limited to the minimum necessary and only be accessible or shared with those who need to know in order to care for the patient or do their job. Use: The sharing of confidential health information within the organization Disclosure: The sharing of confidential health information with others outside the organization

PROTECTING PATIENT PRIVACY AND INFORMATION SECURITY 7 PRIVACY SAFEGUARDS Shred all paper containing confidential health information or place in closed receptacles When faxing, verify the fax number before sending Close doors or privacy curtains and lower your voice when having discussions of confidential health information Do not leave medical records unattended or in open areas Keep confidential health information you hear or see to yourself Before looking at patient information ask yourself Do I need to know this to do my job? and if not, don t look at anything Respect the privacy rights of employees who come here for care by affording their information the utmost confidentiality it deserves

8 PROTECTING PATIENT PRIVACY AND INFORMATION SECURITY SECURITY SAFEGUARDS Some examples of security safeguards include: Do not use or attempt to use another staff member s user ID and password to gain access to ephi Never leave a workstation signed on/unattended with access to ephi Writing down or posting passwords on equipment for login purposes is not permitted Properly dispose of ephi on CDs, DVDs, or thumb drives Prevent theft of equipment housing ephi Never disable or remove virus detection software It is your responsibility to be aware of these safeguards and follow them in everyday practices.

PROTECTING PATIENT PRIVACY AND INFORMATION SECURITY 9 WHAT DO YOU NEED ACCESS TO? Dependent on your position and job responsibilities Your supervisor will identify and approve the systems you need access to Contact the IMT Help Desk with any questions

10 PROTECTING PATIENT PRIVACY AND INFORMATION SECURITY PASSWORD MANAGEMENT You are responsible for the management of all your passwords used to access ephi. The sharing of user accounts and/or passwords is prohibited on Upstate computer systems and could result in disciplinary actions. Some best practices for password selection include: Select a password that cannot be easily guessed Passwords must include a combination of number and letters (upper and lower case) Passwords must be at least 6 characters in length Passwords must be changed at least every 180 days Be sure your passwords meet the requirements outlined above!

PROTECTING PATIENT PRIVACY AND INFORMATION SECURITY 11 WORKSTATION USE AND SECURITY In order to access ephi, you will need to login using a workstation. Workstation use and security are crucial to the security and access to information. Workstation use and security practices include: Lock workstations when not in use, either using a password protected screen saver or logging off the workstation Workstations must be positioned or located in secure areas You are responsible for securing our workstations and protecting our ephi.

12 PROTECTING PATIENT PRIVACY AND INFORMATION SECURITY SECURITY AUDITS AND MONITORING All systems at SUNY Upstate record all your activity. The information you view and access using your account leaves a digital trail of information where you go and what you do. SUNY Upstate audits and monitors access to ephi systems on a regular basis, therefore only access information that you need to do your job. If you have inappropriately accessed information, you have breached our security policies and practices!

PROTECTING PATIENT PRIVACY AND INFORMATION SECURITY 13 THE SHARING OF SOME CONFIDENTIAL HEALTH INFORMATION REQUIRES EXTRA CAUTION! The sharing of confidential health information related to certain treatments and services are afforded a higher level of protection under New York State Laws, for example: Alcohol/Substance Abuse Child Abuse Mental Health Genetics HIV-Related Information Oral Disclosure Requires Written Authorization Do not share any confidential health information of this nature, unless you have checked with your immediate supervisor!

14 PROTECTING PATIENT PRIVACY AND INFORMATION SECURITY PERSONAL CONSEQUENCES FOR INAPPROPRIATE ACCESS The penalties that can be levied against an individual for violating these rights can be severe, and include: Termination of employment at SUNY Upstate Charges of professional misconduct and loss of licensure by the NYS Education Department [NYS Education Law 6530(23)] Criminal and civil monetary penalties imposed by the Department of Justice Criminal and civil monetary penalties imposed by the New York State Attorney General

PROTECTING PATIENT PRIVACY AND INFORMATION SECURITY 15 INDIVIDUAL CIVIL MONETARY AND CRIMINAL PENALTIES UNDER HITECH FOR VIOLATING PATIENT PRIVACY Knowingly or wrongful uses or disclosures of PHI $50,000 and 1 year prison fined up to Offense committed under false pretenses fined up to $100,000 and 5 years prison Offense committed with intent to sell, transfer or use PHI for personal gain $500,000 and 10 years prison

16 PROTECTING PATIENT PRIVACY AND INFORMATION SECURITY 3 UMC Workers Fired for Records Access Stephanie Innes, Arizona Daily Star Posted: Wednesday, January 12, 2011 1:39 pm Three employees at Tucson's University Medical Center have been fired for violating patient privacy in connection with accessing confidential medical records in the high-profile shooting rampage that killed six people and left Congresswoman Gabrielle Giffords in critical condition, hospital officials said. All the remaining injured patients from the shootings, including Giffords, are at UMC. "The hospital has terminated three clinical support staff members this week for inappropriately accessing confidential electronic medical records, in accordance with UMC's zero-tolerance policy on patient privacy violations," says a statement issued by UMC officials this morning. A contracted nurse also was terminated by the nurse's employer, officials say, and the families of the affected patients were notified.

PROTECTING PATIENT PRIVACY AND INFORMATION SECURITY 17 SOCIAL NETWORKING SITES Confidential Health Information about a patient should never be posted on a social networking site such as Facebook, MySpace, Twitter, etc. for personal use even if the patient may be the only person who may be able to identify him or herself based on the description. Access to confidential patient information of SUNY Upstate is permitted so care and treatment can be provided to the patient, not for personal use!

18 PROTECTING PATIENT PRIVACY AND INFORMATION SECURITY WHO DO I CALL? Each organization must have a Privacy and Security Official to ensure compliance with privacy and security policies. If you observe or suspect that the confidentiality or security of a patient s health information has been violated, you must report it to your supervisor, or the SUNY Upstate Privacy Official or the SUNY Upstate Security Official at: E-mail: nappac@upstate.edu (Privacy Official) Phone: 464-6135 E-mail: oreillys@upstate.edu (Security Official) Phone: 464-4093 Hotline: 464-6444 (for anonymous reports) We cannot punish you for reporting suspected violations incidents, and in fact, it is considered your responsibility to make such a report!

PROTECTING PATIENT PRIVACY AND INFORMATION SECURITY 19 The relationship between a patient and a healthcare provider is based on trust. The healthcare provider must trust the patient to give full and truthful information and the patient must trust the healthcare provider to respect the privacy of such information.

F84037 Rev. 12/2013