Privacy Sleuths: Solving the Mystery of Wellness Program Privacy Compliance. Agenda. Health Data Exposure National Wellness Conference

Size: px
Start display at page:

Download "Privacy Sleuths: Solving the Mystery of Wellness Program Privacy Compliance. Agenda. Health Data Exposure National Wellness Conference"

Transcription

1 Privacy Sleuths: Solving the Mystery of Wellness Program Privacy Compliance 2015 National Wellness Conference Barbara J. Zabawa, JD, MPH Center for Health Law Equity, LLC Agenda Health Data Exposure ADA, GINA and EEOC Proposed Rules on ADA and Workplace Wellness Privacy/Security Who is Subject to Case Examples Significance of Being Subject to State Privacy Laws Health Data Exposure Anthem, CareFirst Breaches Fitness Tracker Data 1

2 Americans with Disabilities Act (ADA) Prohibits discrimination by employers on basis of disability in regard to terms, conditions and privileges of employment. Discrimination includes: Requiring medical examinations; and Making inquiries as to whether employee has disability unless such exam or inquiry is: Job-related and consistent with business necessity Medical exams = procedures and tests that seek information about an employee s health. ADA Requires confidentiality of medical exam/disability inquiry records. Must use separate forms and keep in separate medical files. Accessing employee health information directly through personnel file no different than asking about health status. GINA Title II Title II generally prohibits employers from discriminating against employees or applicants because of genetic information. Prohibits employers from requesting, requiring or purchasing genetic information. 2

3 GINA Title II Exception for voluntary wellness programs. Individual must provide prior knowing, voluntary and written authorization. Authorization may be electronic; Describes what genetic information will be obtained and the purposes for which it will be obtained; That the individually identifiable information is not accessible to coworkers/supervisors. GINA Title II If employer has genetic information, it must keep this information separate from personnel files. Can maintain in same file as medical information obtained under ADA. ADA & GINA Employee health information should be: SEPARATE & CONFIDENTIAL 3

4 EEOC Proposed ADA Rules Three primary changes: 1. Aligns ADA with ACA by imposing 30% incentive 2. Imposes incentive limit on participatory programs 3. Requires employee notice and privacy/security protections with regard to wellness information EEOC Proposed ADA Rules Programs that collect medical information must provide employees with notice. EEOC Proposed ADA Rules Employers and vendors must protect health information confidentiality 4

5 EEOC Proposed ADA Rules EEOC expects group health plan programs to abide by privacy/security rules Employer certification requirements for those who administer programs Best practice: separate those who handle individually identifiable health information from those who make employment-related decisions Use of a third-party vendor may help EEOC Proposed ADA Rules Employers and Vendors should have clear privacy policies and procedures related to medical information: Collection Storage Disclosure EEOC Proposed ADA Rules Discusses proper training of individuals who handle medical information: ADA Other privacy laws Discipline employees who improperly disclose health information. Terminate vendors responsible for breaches of confidentiality. 5

6 EEOC Proposed ADA Rules Online systems/technology should guard against unauthorized access: Encryption Employers that administer own wellness program need firewalls to prevent unintended disclosures. Report and investigate breaches. EEOC Proposed ADA Rules IF COVERED BY PRIVACY/SECURITY RULE, FOLLOW IT! The Privacy Regulations protect Protected Health Information or PHI. 6

7 PHI is Individually Identifiable Health Information that is transmitted or maintained in any form or medium. PHI excludes: - education records - student medical records - employment records Applies to Covered Entities Covered Entities: Health Plans Providers who conduct one or more of the -defined transactions electronically KEY: does not apply to entities that don t engage in covered electronic transactions Clearinghouses 7

8 Health Plans Individual Group Must provide medical care directly or through insurance. Group health plans must have 50+ participants or be administered by TPA. Excepted benefits are not health plans. What is medical care? Amounts paid for: a. diagnosis, cure, mitigation, treatment, or prevention of disease; b. the purpose of affecting any structure or function of the body; c. transportation primarily for and essential to purposes (a) or (b); or d. insurance covering (a) or (b). Examples of health plans in wellness context: Wellness program offered by health insurer; Wellness program offered by Medicare or Medicaid; Wellness program offered by employer as part of its employee health coverage plan; Wellness program that provides medical care to more than 50 participants. 8

9 Who are Providers? Any person or organization who furnishes, bills, or is paid for health care in the normal course of business, AND Who transmits any health information in electronic form in a covered transaction directly or through a business associate. What is health care? Care, services, or supplies related to the health of an individual, including: Preventive Diagnostic Therapeutic Maintenance Counseling Assessment With respect to the physical or mental condition, functional status of an individual or that affects the structure or function of the body. Covered Transactions Claims for payment Encounter information to report health care Plan eligibility or coverage inquiries Prior authorizations Plan enrollment information Premium payment processing Coordination of benefit determinations 9

10 Possible of health providers in wellness context (Remember: 2 elements): Wellness organization that provides: Flu shots Health Assessments Biometric Screens Coaching Yoga or fitness classes Do these services qualify as health care? If health care, then is there a covered transaction? Likely candidates are: a. Eligibility inquiries to health plan b. Encounter information for reporting health care Example for b : Small employer hires vendor to conduct health assessments of workforce. Asks vendor to names of participants. Covered Entity Provider status will likely hinge on whether you conduct a covered transaction. 10

11 Many parts also apply to: Business Associates What is a Business Associate? Not a member of the CE s workforce who, with respect to a CE: 1. Performs a function or activity using individually identifiable health information involving: Claims processing or administration Data analysis, processing or administration Utilization review QA Billing Benefit management Practice management Repricing Performs any other function or activity regulated by ; or 3. Provides any of the following services to or for the CE (and which involves the disclosure of individually identifiable health information): Legal Actuarial Accounting Consulting Data aggregation Management Administrative Accreditation Financial 33 11

12 BA also includes: Companies that maintain PHI on behalf of a CE Data storage company Patient safety organizations Companies that transmit PHI to a CE 34 More BA examples: PHR vendors Subcontractors to BAs that create, receive, maintain or transmit PHI on behalf of the BA. 35 Wellness vendors most likely subject to either as a: Provider (Covered Entity) Covered transaction key Business Associate Workplace wellness programs most likely health plans. 12

13 Confused? Case Example 1 WECare Plan contracts with WellWays, a wellness vendor, to provide health assessment and biometric screens of plan participants. No follow-up with participant will occur. WellWays will only provide results. Is WellWays subject to, and if so, how? Case Example 2 WellWays contracts with ACME, Inc. to provide diet and fitness services at ACME s onsite clinic. Employees interested in attending just show up; no preregistration is required. Is WellWays subject to and if so, how? 13

14 Case Example 3 ACME, an employer with 25 employees, contracts with WellWays to administer flu shots to its employees. ACME pays WellWays based on the number of shots administered. Employees volunteer to receive the shots (no incentives). WellWays administers the program, and collects and keeps the records of who received the shots. Is WellWays subject to, and if so, how? Case Example 4 A local parochial school contracts with WellWays to provide flu shots to its students (whose parents sign permission slips). WellWays administers the program, and collects and keeps the records. Is WellWays subject to, and if so, how? Case Example 5 St. Mary s Hospital hires WellWays to offer health coaching and fitness classes to its health plan participants who are over a certain BMI. Participants who attend coaching sessions and/or fitness classes will have a lower premium payment. Is WellWays subject to, and if so, how? 14

15 Case Example 6 Law firm allows local massage therapist to offer 15 minute chair massages for $20 to self-paying employees each Friday. Is massage therapist subject to, and if so, how? Subject to So What? Covered Entities: Privacy and Security Policies & Procedures Privacy and Security Official Notice of Privacy Practices Patient Authorizations Business Associate Agreements Minimum Necessary Standards Breach Standards Plan Sponsor Disclosure Standards Subject to - So What? Business Associates must: Comply with the Business Associate Agreement (BAA) Comply with Security Rule Implement Security Policies and Procedures Enter into a BAA with their subcontractors. Cooperate with government investigations into compliance Designate a Security Official Notify CE s of breaches 45 15

16 Subject to So What? What do Privacy and Security Policies Cover? Privacy Passwords Use Access to PHI Employee Training BAAs Employee Discipline Breaches Authorizatons Security Internet Use Use Workforce Access Facility Security Risk Analysis Data Backup BAAs Breaches Subject to So What? CE and BA must: Implement policies and procedures designed to comply with the Breach and Privacy and/or Security Rules. Change policies and procedures as necessary to comply with changes in the law; Document all changes made to policies and procedures and maintain all policies for 6 years; Train employees on changes made to policies and procedures. Subject to So What? CEs and BAs must execute Business Associate Agreements (BAAs). 16

17 Subject to So What? BAA amendments (as of 2013): Require BAs to comply with Security Rule Require BA to report to CE Breach of Unsecured PHI Require BA to enter into BAA with subcontractor Require BA to comply with Privacy Rule to extent BA must carry out a CE s obligation under Privacy rule 49 BAA Examples Software vendor for a Covered Entity BAA required? Disclosures to health plan sponsor (such as employer) by a group health plan BAA required? BAA Examples Good resource: faq/business_associates/index.html 17

18 Subject to - So What? Notice of Privacy Practices (NPP) Summarizes how Covered Entity uses and discloses patient s PHI. Details patient s rights with respect to their PHI. Subject to So What? Usually need patient authorization for uses/disclosures. Exceptions for: Treatment Payment Health care operations Worker s Compensation Other mandatory disclosures by law Subject to So What? minimum necessary standard generally requires that providers and insurers make reasonable efforts to limit uses and disclosures of protected health information to the minimum necessary to accomplish the intended purpose. Exceptions for: treatment disclosures to patient disclosures to DHHS 18

19 Subject to So What? CEs with unsecured PHI to notify an individual, HHS and in some cases the media in the event of a breach. BAs must also notify CEs of a breach 55 Subject to So What? "Breach" is the unauthorized acquisition, access, use or disclosure of PHI which compromises the security or privacy of such information. Subject to So What? PHI is "unsecured" if not rendered unusable, unreadable, or indecipherable to unauthorized persons through the use of a technology or methodology approved by HHS. Encryption and Destruction are the two ways to secure PHI. Access controls and firewalls do not make electronic data secure, and redaction of paper documents does not make them secure

20 Subject to So What? An impermissible use or disclosure of PHI is assumed to be a breach unless the CE or BA demonstrates there is a low probability that PHI has been compromised. No definition of compromised. 58 Subject to So What? To determine low probability that PHI has been compromised, conduct a risk assessment considering the following four factors: Nature and extent of PHI involved Who used the PHI or to whom was it disclosed? Was PHI actually acquired or viewed? To what extent has the risk to the PHI been mitigated? Document risk assessment to demonstrate why no PHI has not been compromised. 59 Subject to So What? Four exceptions for situations when a "breach would otherwise occur: 1. Breach of secured PHI. 2. Unintentional acquisition, access or use of PHI by employee or individual acting under authority of a CE or BA. 3. Inadvertent disclosure of PHI from one person authorized to access PHI at a CE or BA to another person authorized to access PHI at the CE or BA. 4. Unauthorized disclosures in which unauthorized person to whom PHI is disclosed would not reasonably have been able to retain the information

21 Subject to So What? Upon breach, CE must notify each individual whose information has been or is reasonably believed to have been breached within 60 calendar days of the discovery of the breach by the CE. A breach is "discovered" the first day on which the breach is known or should reasonably have been known. If a BA experiences a breach of unsecured PHI, it must notify the CE within 60 days after discovery of a breach and identify the individuals affected so that the CE can timely inform the individuals. 61 Subject to So What? If a breach affects 500 or more individuals, the CE must provide notice to HHS and prominent media outlets within 60 days after discovery of breach. The CE must maintain a log of all breaches during the year and annually submit the log to HHS not later than 60 days after the end of the CY in which breach was discovered. 62 Subject to So What? Plan Sponsor Disclosure Standards CEs may disclose PHI, without patient authorization, to plan sponsor that administers aspects of plan if: Employer certifies to plan it will safeguard PHI and not improperly use or share it. CEs may disclose de-identified, aggregate information from wellness program to employer. 21

22 Subject to So What? Willful Neglect: The conscious, intentional failure or reckless indifference to the obligation to comply with the administrative simplification provision violated. 45 CFR s Know that merely sets a floor of protection. More stringent requirement Allows more stringent state law to govern. More stringent means provides patients with greater rights of access or greater privacy protection of health information. 22

23 State privacy laws tend to be: Entity specific (health care providers); or Condition specific (HIV/Mental Health/Substance Abuse) Wisconsin law example: subpoena insufficient; need court order. Other Privacy Privacy compliance may not be enough. Penn State Take Care of Your Health example. Questions? For more information, contact: Barbara J. Zabawa, JD, MPH The Center for Health Law Equity, LLC Phone:

Determining Whether You Are a Business Associate

Determining Whether You Are a Business Associate The HIPAApotamus in the Room: When Lawyers and Law Firms are Subject to HIPAA Enforcement, And How to Comply with the Law by Leslie R. Isaacman, J.D., M.B.A. The Omnibus Final Rule 1 of the Health Information

More information

HIPAA Training. HOPE Health Facility Administrators June 2013 Isaac Willett and Jason Schnabel

HIPAA Training. HOPE Health Facility Administrators June 2013 Isaac Willett and Jason Schnabel HIPAA Training HOPE Health Facility Administrators June 2013 Isaac Willett and Jason Schnabel Agenda HIPAA basics HITECH highlights Questions and discussion HIPAA Basics Legal Basics Health Insurance Portability

More information

HIPAA Omnibus Rule. Critical Changes for Providers Presented by Susan A. Miller, JD. Hosted by

HIPAA Omnibus Rule. Critical Changes for Providers Presented by Susan A. Miller, JD. Hosted by HIPAA Omnibus Rule Critical Changes for Providers Presented by Susan A. Miller, JD Hosted by agenda What the Omnibus Rule includes + Effective and Compliance Dates Security Breach Notification Enforcement

More information

The wait is over HHS releases final omnibus HIPAA privacy and security regulations

The wait is over HHS releases final omnibus HIPAA privacy and security regulations The wait is over HHS releases final omnibus HIPAA privacy and security regulations The Department of Health and Human Services (HHS) published long-anticipated (and longoverdue) omnibus regulations under

More information

HIPAA Privacy Compliance Checklist

HIPAA Privacy Compliance Checklist HIPAA Privacy Compliance Checklist Task Obtain Education on HIPAA Privacy Requirements 1. HIPAA EDI requirements. 2. HIPAA privacy requirements. Organize the HIPAA Privacy Team and Create a Game Plan 1.

More information

HIPAA: Final Omnibus Rule is Here Arizona Society for Healthcare Risk Managers November 15, 2013

HIPAA: Final Omnibus Rule is Here Arizona Society for Healthcare Risk Managers November 15, 2013 HIPAA: Final Omnibus Rule is Here Arizona Society for Healthcare Risk Managers November 15, 2013 Pat Henrikson, Banner Health HIPAA Compliance Program Director, Chief Privacy Officer Agenda Background

More information

HIPAA PRIVACY REQUIREMENTS. Dana L. Thrasher Robert S. Ellerbrock, III Constangy, Brooks & Smith, LLP

HIPAA PRIVACY REQUIREMENTS. Dana L. Thrasher Robert S. Ellerbrock, III Constangy, Brooks & Smith, LLP HIPAA PRIVACY REQUIREMENTS Dana L. Thrasher Robert S. Ellerbrock, III Constangy, Brooks & Smith, LLP dthrasher@constangy.com (205) 226-5464 1 Reasons for HIPAA Privacy Rules Perceived need for protection

More information

2011 Miller Johnson. All rights reserved. 1. HIPAA Compliance: Privacy and Security Changes under HITECH HITECH. What is HITECH? Mary V.

2011 Miller Johnson. All rights reserved. 1. HIPAA Compliance: Privacy and Security Changes under HITECH HITECH. What is HITECH? Mary V. HIPAA Compliance: Privacy and Security Changes under HITECH Mary V. Bauman www.millerjohnson.com The materials and information have been prepared for informational purposes only. This is not legal advice,

More information

The Impact of Final Omnibus HIPAA/HITECH Rules. Presented by Eileen Coyne Clark Niki McCoy September 19, 2013

The Impact of Final Omnibus HIPAA/HITECH Rules. Presented by Eileen Coyne Clark Niki McCoy September 19, 2013 The Impact of Final Omnibus HIPAA/HITECH Rules Presented by Eileen Coyne Clark Niki McCoy September 19, 2013 0 Disclaimer The material in this presentation is not meant to be construed as legal advice

More information

AFTER THE OMNIBUS RULE

AFTER THE OMNIBUS RULE AFTER THE OMNIBUS RULE 1 Agenda Omnibus Rule Business Associates (BAs) Agreement Breach Notification Change Breach Reporting Requirements (Federal and State) Notification to Care1st Health Plan Member

More information

HITECH and HIPAA: Highlights for Health Departments. Aimee Wall UNC School of Government

HITECH and HIPAA: Highlights for Health Departments. Aimee Wall UNC School of Government HITECH and HIPAA: Highlights for Health Departments Aimee Wall UNC School of Government When Congress enacted sweeping legislation in February designed to stimulate the nation s economy, it incorporated

More information

Compliance Steps for the Final HIPAA Rule

Compliance Steps for the Final HIPAA Rule Brought to you by The Alpha Group for the Final HIPAA Rule On Jan. 25, 2013, the Department of Health and Human Services (HHS) issued a final rule under HIPAA s administrative simplification provisions.

More information

HIPAA Basic Training for Health & Welfare Plan Administrators

HIPAA Basic Training for Health & Welfare Plan Administrators 2010 Human Resources Seminar HIPAA Basic Training for Health & Welfare Plan Administrators Norbert F. Kugele What We re going to Cover Important basic concepts Who needs to worry about HIPAA? Complying

More information

Central Florida Regional Transportation Authority Table of Contents A. Introduction...1 B. Plan s General Policies...4

Central Florida Regional Transportation Authority Table of Contents A. Introduction...1 B. Plan s General Policies...4 Table of Contents A. Introduction...1 1. Purpose...1 2. No Third Party Rights...1 3. Right to Amend without Notice...1 4. Definitions...1 B. Plan s General Policies...4 1. Plan s General Responsibilities...4

More information

Business Associate Agreement

Business Associate Agreement This Business Associate Agreement Is Related To and a Part of the Following Underlying Agreement: Effective Date of Underlying Agreement: Vendor: Business Associate Agreement This Business Associate Agreement

More information

ARRA s Amendments to HIPAA Privacy & Security Rules

ARRA s Amendments to HIPAA Privacy & Security Rules ARRA s Amendments to HIPAA Privacy & Security Rules Georgina L. O Hara Jessica R. Bernanke April 29, 2009 www.morganlewis.com Amended HIPAA Privacy and Security Rules HIPAA Amendments are in The Health

More information

HIPAA, 42 CFR PART 2, AND MEDICAID COMPLIANCE STANDARDS POLICIES AND PROCEDURES

HIPAA, 42 CFR PART 2, AND MEDICAID COMPLIANCE STANDARDS POLICIES AND PROCEDURES SALISH BHO HIPAA, 42 CFR PART 2, AND MEDICAID COMPLIANCE STANDARDS POLICIES AND PROCEDURES Policy Name: BREACH NOTIFICATION REQUIREMENTS Policy Number: 5.16 Reference: 45 CFR Parts 164 Effective Date:

More information

The Guild for Exceptional Children HIPAA Breach Notification Policy and Procedure

The Guild for Exceptional Children HIPAA Breach Notification Policy and Procedure The Guild for Exceptional Children HIPAA Breach Notification Policy and Procedure Purpose To provide for notification in the case of breaches of Unsecured Protected Health Information ( Unsecured PHI )

More information

OCR Phase II Audit Protocol Breach Notification. HIPAA COW Spring Conference 2017 Page 1 Boerner Consulting, LLC

OCR Phase II Audit Protocol Breach Notification. HIPAA COW Spring Conference 2017 Page 1 Boerner Consulting, LLC Audit Type Section Key Activity Established Performance Criteria Audit Inquiry 12 Samples Requested Breach 164.414(a) Administrative 164.414(a) 164.414(a) 5 Inquiry of Mgmt Requirements Administrative

More information

HIPAA COMPLIANCE ROADMAP AND CHECKLIST FOR BUSINESS ASSOCIATES

HIPAA COMPLIANCE ROADMAP AND CHECKLIST FOR BUSINESS ASSOCIATES HIPAA COMPLIANCE ROADMAP AND CHECKLIST FOR BUSINESS ASSOCIATES The Health Information Technology for Economic and Clinical Health Act (HITECH Act), enacted as part of the American Recovery and Reinvestment

More information

HIPAA PRIVACY AND SECURITY RULES APPLY TO YOU! ARE YOU COMPLYING? RHODE ISLAND INTERLOCAL TRUST LINN F. FREEDMAN, ESQ. JANUARY 29, 2015.

HIPAA PRIVACY AND SECURITY RULES APPLY TO YOU! ARE YOU COMPLYING? RHODE ISLAND INTERLOCAL TRUST LINN F. FREEDMAN, ESQ. JANUARY 29, 2015. HIPAA PRIVACY AND SECURITY RULES APPLY TO YOU! ARE YOU COMPLYING? RHODE ISLAND INTERLOCAL TRUST LINN F. FREEDMAN, ESQ. JANUARY 29, 2015. PURPOSE OF PRESENTATION To Discuss Laws Governing Use and Disclosure

More information

HIPAA The Health Insurance Portability and Accountability Act of 1996

HIPAA The Health Insurance Portability and Accountability Act of 1996 HIPAA The Health Insurance Portability and Accountability Act of 1996 Results Physiotherapy s policy regarding privacy and security of protected health information (PHI) is a reflection of our commitment

More information

HIPAA Privacy Overview

HIPAA Privacy Overview HIPAA Privacy Overview Benefit Advisors Network Stacy H. Barrow sbarrow@marbarlaw.com February 8, 2017 2017 Marathas Barrow Weatherhead Lent LLP. All Rights Reserved. 1 Overview of Presentation HIPAA Overview

More information

H E A L T H C A R E L A W U P D A T E

H E A L T H C A R E L A W U P D A T E L O U I S V I L L E. K Y S E P T E M B E R 2 0 0 9 H E A L T H C A R E L A W U P D A T E L E X I N G T O N. K Y B O W L I N G G R E E N. K Y N E W A L B A N Y. I N N A S H V I L L E. T N M E M P H I S.

More information

Workplace Wellness Compliance. Barbara J. Zabawa, JD, MPH The Center for Health and Wellness Law, LLC

Workplace Wellness Compliance. Barbara J. Zabawa, JD, MPH The Center for Health and Wellness Law, LLC Workplace Wellness Compliance Barbara J. Zabawa, JD, MPH The Center for Health and Wellness Law, LLC Agenda Group Health Plan Status HIPAA/ACA EEOC Cases ADA Final Rule GINA Final Rule Other Laws Quiz

More information

Hayden W. Shurgar HIPAA: Privacy, Security, Enforcement, HITECH, and HIPAA Omnibus Final Rule

Hayden W. Shurgar HIPAA: Privacy, Security, Enforcement, HITECH, and HIPAA Omnibus Final Rule Hayden W. Shurgar HIPAA: Privacy, Security, Enforcement, HITECH, and HIPAA Omnibus Final Rule 1 IMPORTANCE OF STAFF TRAINING HIPAA staff training is a key, required element in a covered entity's HIPAA

More information

EEOC Issues Proposed Rule on Employer- Sponsored Wellness Programs

EEOC Issues Proposed Rule on Employer- Sponsored Wellness Programs Issue 2 2015 EEOC Issues Proposed Rule on Employer- Sponsored Wellness Programs On April 20 th, the Equal Employment Opportunity Commission ( EEOC ) published a proposed rule that would amend the regulations

More information

Texas Tech University Health Sciences Center El Paso HIPAA Privacy Policies

Texas Tech University Health Sciences Center El Paso HIPAA Privacy Policies Administration Policy 1.1 Glossary of Terms - HIPAA Effective Date: January 15, 2015 References: http://www.hhs.gov/ocr/hipaa TTUHSC El Paso HIPAA website: http://elpaso.ttuhsc.edu/hipaa/ Policy Statement

More information

HIPAA: Impact on Corporate Compliance

HIPAA: Impact on Corporate Compliance HIPAA: Impact on Corporate Compliance AAPC HEALTHCON April 2014 Stacy Harper, JD, MHSA, CPC Disclaimer The information provided is for educational purposes only and is not intended to be considered legal

More information

Texas Tech University Health Sciences Center HIPAA Privacy Policies

Texas Tech University Health Sciences Center HIPAA Privacy Policies Administration Policy 1.1 Glossary of Terms - HIPAA Effective Date: January 15, 2015 Reviewed Date: August 7, 2017 References: http://www.hhs.gov/ocr/hippa HSC HIPAA website http://www.ttuhsc.edu/hipaa/policies_procedures.aspx

More information

8/14/2013. HIPAA Privacy & Security 2013 Omnibus Final Rule update. Highlights from Final Rules January 25, 2013

8/14/2013. HIPAA Privacy & Security 2013 Omnibus Final Rule update. Highlights from Final Rules January 25, 2013 HIPAA Privacy & Security 2013 Omnibus Final Rule update Dan Taylor, Infinisource Copyright 2013 All rights reserved. Highlights from Final Rules January 25, 2013 Made business associates directly liable

More information

HIPAA Compliance Under the Magnifying Glass

HIPAA Compliance Under the Magnifying Glass HIPAA Compliance Under the Magnifying Glass July 30, 2013 Stacy Harper, JD, MHSA, CPC A Webinar Provided by Presenter Stacy Harper Lathrop & Gage, LLP sharper@lathropgage.com 913-451-5125 The information

More information

DISCRIMINATION. (Equal Opportunity) Legally Incentivizing Health Assessment and Biometric Screen Participation. Agenda. Wellness Program Laws

DISCRIMINATION. (Equal Opportunity) Legally Incentivizing Health Assessment and Biometric Screen Participation. Agenda. Wellness Program Laws Legally Incentivizing Health Assessment and Biometric Screen Participation Barbara J. Zabawa, JD, MPH The Center for Health and Wellness Law, LLC Agenda Importance of Group Health Plan Status HIPAA/ACA

More information

Interim Date: July 21, 2015 Revised: July 1, 2015

Interim Date: July 21, 2015 Revised: July 1, 2015 HIPAA/HITECH Page 1 of 7 Effective Date: September 23, 2009 Interim Date: July 21, 2015 Revised: July 1, 2015 Approved by: James E. K. Hildreth, Ph.D., M.D. President and Chief Executive Officer Subject:

More information

Management Alert Final HIPAA Regulations Issued

Management Alert Final HIPAA Regulations Issued Management Alert Final HIPAA Regulations Issued After much anticipation, the Department of Health and Human Services (HHS) has issued its omnibus set of final regulations modifying and clarifying the privacy,

More information

SUBCONTRACTOR BUSINESS ASSOCIATE AGREEMENT

SUBCONTRACTOR BUSINESS ASSOCIATE AGREEMENT SUBCONTRACTOR BUSINESS ASSOCIATE AGREEMENT (Revised on March 1, 2016) THIS HIPAA SUBCONTRACTOR BUSINESS ASSOCIATE AGREEMENT (the BAA ) is entered into on (the Effective Date ), by and between ( EMR ),

More information

Final Regulations Shed Light on Wellness Programs

Final Regulations Shed Light on Wellness Programs Final Regulations Shed Light on Wellness Programs Issued date: 06/15/16 Background The Americans with Disabilities Act (ADA) generally prohibits employers with at least 15 employees from making disabilityrelated

More information

BREACH NOTIFICATION POLICY

BREACH NOTIFICATION POLICY PRIVACY 2.0 BREACH NOTIFICATION POLICY Scope: All subsidiaries of Universal Health Services, Inc., including facilities and UHS of Delaware Inc. (collectively, UHS ), including UHS covered entities ( Facilities

More information

"HIPAA FOR LAW FIRMS" WHAT EVERY LAW FIRM NEEDS TO KNOW ABOUT HIPAA

HIPAA FOR LAW FIRMS WHAT EVERY LAW FIRM NEEDS TO KNOW ABOUT HIPAA "HIPAA FOR LAW FIRMS" WHAT EVERY LAW FIRM NEEDS TO KNOW ABOUT HIPAA Jeanne M. Born, RN, JD SOUTH CAROLINA ASSOCIATION OF LEGAL ADMINISTRATORS THURSDAY, APRIL 14, 2016 Jborn@nexsenpruet.com What Every Law

More information

Compliance Steps for the Final HIPAA Rule

Compliance Steps for the Final HIPAA Rule Compliance Steps for the Final HIPAA Rule On Jan. 25, 2013, the Department of Health and Human Services (HHS) issued a final rule under HIPAA s administrative simplification provisions. The final rule

More information

AROC 2015 HIPAA PRIVACY AND SECURITY RULES

AROC 2015 HIPAA PRIVACY AND SECURITY RULES AROC 2015 HIPAA PRIVACY AND SECURITY RULES Presented by: Robert A. Paster, Esq. Brach Eichler L.L.C. 101 Eisenhower Parkway Roseland, NJ 07068 973-403-3144 rpaster@bracheichler.com www.bracheichler.com

More information

Legal and Privacy Implications of the HIPAA Final Omnibus Rule

Legal and Privacy Implications of the HIPAA Final Omnibus Rule Legal and Privacy Implications of the HIPAA Final Omnibus Rule February 19, 2013 Pillsbury Winthrop Shaw Pittman LLP Faculty Gerry Hinkley Partner Pillsbury Winthrop Shaw Pittman LLP Deven McGraw Director,

More information

CLIENT UPDATE. HIPAA s Final Rule: The Impact on Covered Entities, Business Associates and Subcontractors

CLIENT UPDATE. HIPAA s Final Rule: The Impact on Covered Entities, Business Associates and Subcontractors CLIENT UPDATE February 20, 2013 HIPAA s Final Rule: The Impact on Covered Entities, Business Associates and Subcontractors On January 25, 2013, the U.S. Department of Health and Human Services ( DHHS )

More information

HHS, Office for Civil Rights. IAPP October 11, 2012

HHS, Office for Civil Rights. IAPP October 11, 2012 HHS, Office for Civil Rights IAPP October 11, 2012 Enforce federal civil rights laws and the HIPAA Privacy and Security Rules HQ and 10 Regional Offices Region IX has jurisdiction over covered entities

More information

Effective Date: March 23, 2016

Effective Date: March 23, 2016 AIG COMPANIES Effective Date: March 23, 2016 HIPAA NOTICE OF PRIVACY PRACTICES THIS NOTICE DESCRIBES HOW MEDICAL INFORMATION ABOUT YOU MAY BE USED AND DISCLOSED AND HOW YOU CAN GET ACCESS TO THIS INFORMATION.

More information

"HIPAA RULES AND COMPLIANCE"

HIPAA RULES AND COMPLIANCE PRESENTER'S GUIDE "HIPAA RULES AND COMPLIANCE" Training for HIPAA REGULATIONS Quality Safety and Health Products, for Today...and Tomorrow OUTLINE OF MAJOR PROGRAM POINTS OUTLINE OF MAJOR PROGRAM POINTS

More information

Do You Want To Know A Secret? HIPAA s Medical Privacy Regulations

Do You Want To Know A Secret? HIPAA s Medical Privacy Regulations Do You Want To Know A Secret? HIPAA s Medical Privacy Regulations 2004 ABA Annual Meeting Section of Labor and Employment Law August 10, 2004 Presented by: Phyllis C. Borzi Of Counsel O Donoghue & O Donoghue

More information

HIPAA HEALTH INSURANCE PORTABILITY & ACCOUNTABILITY ACT

HIPAA HEALTH INSURANCE PORTABILITY & ACCOUNTABILITY ACT HIPAA HEALTH INSURANCE PORTABILITY & ACCOUNTABILITY ACT HIPAA OMNIBUS FINAL RULE HITECH GINA TERMINOLOGY OMNIBUS FINAL RULE Issued January 23, 2013 Effective March 26, 2013 Modified HIPAA privacy and security

More information

Changes to HIPAA Privacy and Security Rules

Changes to HIPAA Privacy and Security Rules Changes to HIPAA Privacy and Security Rules STEPHEN P. POSTALAKIS BLAUGRUND, HERBERT AND MARTIN 300 WEST WILSON BRIDGE ROAD, SUITE 100 WORTHINGTON, OHIO 43085 SPP@BHMLAW.COM PERSONNEL COUNCIL FRANKLIN

More information

BUSINESS POLICY AND PROCEDURE MANUAL

BUSINESS POLICY AND PROCEDURE MANUAL 06/10 1 of 1 01-13 GENERAL STATEMENT OF HIPAA Compliance The Health Insurance Portability and Accountability Act of 1996 (HIPAA regulates health care providers (Covered Entities) that electronically maintain

More information

WELLNESS PROGRAMS UNDER FINAL HIPAA/PPACA, ADA, AND GINA REGULATIONS

WELLNESS PROGRAMS UNDER FINAL HIPAA/PPACA, ADA, AND GINA REGULATIONS WELLNESS PROGRAMS UNDER FINAL, ADA, AND GINA REGULATIONS Wellness programs come in many different shapes and sizes and may be called something other than wellness programs. These programs may provide very

More information

ACC Compliance and Ethics Committee Presentation February 19, 2013

ACC Compliance and Ethics Committee Presentation February 19, 2013 ACC Compliance and Ethics Committee Presentation February 19, 2013 Melinda G. Murray Associate General Counsel, Holy Cross Hospital and Jill M. Girardeau Partner, Womble Carlyle Sandridge & Rice, LLP HIPAA

More information

HIPAA PRIVACY POLICY AND PROCEDURES FOR PROTECTED HEALTH INFORMATION THE APPLICABLE WELFARE BENEFITS PLANS OF MICHIGAN CATHOLIC CONFERENCE

HIPAA PRIVACY POLICY AND PROCEDURES FOR PROTECTED HEALTH INFORMATION THE APPLICABLE WELFARE BENEFITS PLANS OF MICHIGAN CATHOLIC CONFERENCE HIPAA PRIVACY POLICY AND PROCEDURES FOR PROTECTED HEALTH INFORMATION THE APPLICABLE WELFARE BENEFITS PLANS OF MICHIGAN CATHOLIC CONFERENCE Policy Preamble This privacy policy ( Policy ) is designed to

More information

NOTIFICATION OF PRIVACY AND SECURITY BREACHES

NOTIFICATION OF PRIVACY AND SECURITY BREACHES NOTIFICATION OF PRIVACY AND SECURITY BREACHES Overview The UT Health Science Center at San Antonio (Health Science Center) is required to report all breaches of protected health information and personally

More information

HIPAA 2014: Recent Changes from HITECH and the Omnibus Rule. Association of Corporate Counsel Houston Chapter October 14, 2014.

HIPAA 2014: Recent Changes from HITECH and the Omnibus Rule. Association of Corporate Counsel Houston Chapter October 14, 2014. HIPAA 2014: Recent Changes from HITECH and the Omnibus Rule Association of Corporate Counsel Houston Chapter October 14, 2014 Jeffery P. Drummond Jackson Walker L.L.P. 901 Main Street, Suite 6000 Dallas,

More information

HIPAA BUSINESS ASSOCIATE AGREEMENT BUSINESS ASSOCIATES AND SUBCONTRACTORS

HIPAA BUSINESS ASSOCIATE AGREEMENT BUSINESS ASSOCIATES AND SUBCONTRACTORS HIPAA BUSINESS ASSOCIATE AGREEMENT BUSINESS ASSOCIATES AND SUBCONTRACTORS This HIPAA Business Associate Agreement ( BAA ) is entered into on this day of, 20 ( Effective Date ), by and between Allscripts

More information

What Brown County employees need to know about the Federal legislation entitled the Health Insurance Portability and Accountability Act of 1996.

What Brown County employees need to know about the Federal legislation entitled the Health Insurance Portability and Accountability Act of 1996. What Brown County employees need to know about the Federal legislation entitled the Health Insurance Portability and Accountability Act of 1996. HIPAA stands for Health Insurance Portability and Accountability

More information

Saturday, April 28 Medical Ethics: HIPAA Privacy and Security Rules

Saturday, April 28 Medical Ethics: HIPAA Privacy and Security Rules Saturday, April 28 Medical Ethics: HIPAA Privacy and Security Rules Gina Campanella, JD HIPAA & The Medical Practice Requirements for Privacy, Security and Breach Notification Gina L. Campanella, Esq.

More information

UNDERSTANDING HIPAA & THE HITECH ACT. Heather Deixler, Esq. Associate, Morgan, Lewis & Bockius LLP

UNDERSTANDING HIPAA & THE HITECH ACT. Heather Deixler, Esq. Associate, Morgan, Lewis & Bockius LLP UNDERSTANDING HIPAA & THE HITECH ACT Heather Deixler, Esq. Associate, Morgan, Lewis & Bockius LLP 1 Objectives of Presentation Learn what HIPAA is Learn the purpose of HIPAA Understand who HIPAA regulates

More information

Omnibus Components. Not in Omnibus. HIPAA/HITECH Omnibus Final Rule

Omnibus Components. Not in Omnibus. HIPAA/HITECH Omnibus Final Rule Office of the Secretary Office for Civil Rights () HIPAA/HITECH Omnibus Final Rule April 12, 2013 HHS Office for Civil Rights Omnibus Components Final Rule on HITECH Privacy, Security, & Enforcement Provisions

More information

COVERED TRANSACTION means a Transaction for which the Secretary has adopted a standard under HIPAA.

COVERED TRANSACTION means a Transaction for which the Secretary has adopted a standard under HIPAA. UNIVERSITY OF MAINE SYSTEM HIPAA POLICY #1 DEFINITIONS Unless otherwise provided herein, capitalized terms shall have the same meaning as set forth in HIPAA, as amended, and its implementing regulations,

More information

Breach Policy. Applicable Standards from the HITRUST Common Security Framework. Applicable Standards from the HIPAA Security Rule

Breach Policy. Applicable Standards from the HITRUST Common Security Framework. Applicable Standards from the HIPAA Security Rule Breach Policy To provide guidance for breach notification when impressive or unauthorized access, acquisition, use and/or disclosure of the ephi occurs. Breach notification will be carried out in compliance

More information

HIPAA Information. Who does HIPAA apply to? What are Sync.com s responsibilities? What is a Business Associate?

HIPAA Information. Who does HIPAA apply to? What are Sync.com s responsibilities? What is a Business Associate? HIPAA Information Who does HIPAA apply to? HIPAA applies to all Covered Entities (entities that collect, access, use and/or disclose Protected Health Data (PHI) and are subject to HIPAA regulations). What

More information

MONTCLAIR STATE UNIVERSITY HIPAA PRIVACY POLICY. Approved by the Montclair State University Board of Trustees on April 3, 2014

MONTCLAIR STATE UNIVERSITY HIPAA PRIVACY POLICY. Approved by the Montclair State University Board of Trustees on April 3, 2014 MONTCLAIR STATE UNIVERSITY HIPAA PRIVACY POLICY Approved by the Montclair State University Board of Trustees on April 3, 2014 Table of Contents Page I. PURPOSE... 1 II. WHO IS SUBJECT TO THIS POLICY...

More information

Changes to HIPAA Under the Omnibus Final Rule

Changes to HIPAA Under the Omnibus Final Rule Changes to HIPAA Under the Omnibus Final Rule Kimberly J. Kannensohn and Nathan A. Kottkamp, McGuireWoods 1 The Long-Awaited HIPAA Final Rule On Jan. 17, 2013, the Department of Health and Human Services

More information

HIPAA & The Medical Practice

HIPAA & The Medical Practice HIPAA & The Medical Practice Requirements for Privacy, Security and Breach Notification Gina L. Campanella, JD, MHA, CHA Founder & Principal, Campanella Law Office Of Counsel, The Beinhaker Law Firm BEINHAKER,

More information

Fifth National HIPAA Summit West

Fifth National HIPAA Summit West Fifth National HIPAA Summit West Privacy and Security under the HITECH Act W. Reece Hirsch Paul T. Smith, Partner, Partner, Hooper, Lundy & Bookman 1 Developments The Health Information Technology for

More information

HIPAA OMNIBUS FINAL RULE

HIPAA OMNIBUS FINAL RULE HIPAA OMNIBUS FINAL RULE Webinar Series Part 3 Breach Notification April 16, 2013 I. BACKGROUND 2 1 Background > HIPAA Omnibus Final Rule: Announced on January 17, 2013 Published in Federal Register on

More information

HIPAA Privacy and Security for Employers in the Age of Common Data Breaches. April 30, 2015

HIPAA Privacy and Security for Employers in the Age of Common Data Breaches. April 30, 2015 HIPAA Privacy and Security for Employers in the Age of Common Data Breaches April 30, 2015 HIPAA Privacy and Security for Employers in the Age of Common Data Breaches Welcome! We will begin at 3 p.m. Eastern

More information

HIPAA Background and History

HIPAA Background and History Agenda Jeffery P. Drummond Lawyers as HIPAA Business Associates: Ethical Obligations and Practical Tips for Compliance Dallas Bar Association January 17, 2018 Jamie Sorley An Overview of HIPAA The Privacy

More information

HIPAA, Privacy, and Security Oh My!

HIPAA, Privacy, and Security Oh My! 2014 CliftonLarsonAllen LLP HIPAA, Privacy, and Security Oh My! Chad D. Kunze CPA Health Care Principal Phoenix, AZ CLAconnect.com Learning Objectives At the end of this learning session, you will be able

More information

x Major revision of existing policy Reaffirmation of existing policy

x Major revision of existing policy Reaffirmation of existing policy Name of Policy: Reporting of Security Breach of Protected Health Information including Personal Health Information Policy Number: 3364-90-15 Approving Officer: Executive Vice President of Clinical Affairs

More information

HIPAA Privacy & Security. Transportation Providers 2017

HIPAA Privacy & Security. Transportation Providers 2017 HIPAA Privacy & Security Transportation Providers 2017 HIPAA Privacy & Security As a non emergency medical transportation provider, you deal directly with Medicare and Medicaid Members healthcare information

More information

HIPAA Breach Notification Case Studies on What to Do and When to Report

HIPAA Breach Notification Case Studies on What to Do and When to Report HIPAA Breach Notification Case Studies on What to Do and When to Report AHLA Physicians and Physician Organizations and Hospitals and Health Systems Law Institute February 9 and10, 2012 Colleen M. McClorey,

More information

LINKS AND RESOURCES APPLICABLE LAWS EXAMPLES OF MEDICAL CARE. Provided by Ronstadt Insurance, Inc. Workplace Wellness Programs ERISA, COBRA and HIPAA

LINKS AND RESOURCES APPLICABLE LAWS EXAMPLES OF MEDICAL CARE. Provided by Ronstadt Insurance, Inc. Workplace Wellness Programs ERISA, COBRA and HIPAA Provided by Ronstadt Insurance, Inc. Workplace Wellness Programs ERISA, COBRA and HIPAA A workplace wellness program may be subject to a number of different federal laws, depending on how the program is

More information

OVERVIEW OF RECENT CHANGES IN HIPAA AND OHIO PRIVACY LAWS

OVERVIEW OF RECENT CHANGES IN HIPAA AND OHIO PRIVACY LAWS Franklin J. Hickman Janet L. Lowder David A. Myers Elena A. Lidrbauch Judith C. Saltzman Mary B. McKee Amanda M. Buzo Lisa Montoni Garvin Andrea Aycinena Penton Building 1300 East Ninth Street Suite 1020

More information

[Name of Organization] HIPAA Incident/Breach Investigation Procedure 4

[Name of Organization] HIPAA Incident/Breach Investigation Procedure 4 Addendum II [Name of Organization] HIPAA Incident/Breach Investigation Procedure 4 I. Purpose To distinguish between (1) cases in which our HIPAA policy was not correctly followed but such violation did

More information

HIPAA PRIVACY REQUIREMENTS. Dana L. Thrasher Constangy, Brooks & Smith, LLP (205)

HIPAA PRIVACY REQUIREMENTS. Dana L. Thrasher Constangy, Brooks & Smith, LLP (205) HIPAA PRIVACY REQUIREMENTS Dana L. Thrasher Constangy, Brooks & Smith, LLP dthrasher@constangy.com (205) 226-5464 1 REASONS FOR HIPAA PRIVACY RULES Perceived need for protection of individual health information

More information

Effective Date: 4/3/17

Effective Date: 4/3/17 HIPAA AND HITECH ADM 067.4 Attachment D Health Insurance Portability and Accountability Act (HIPAA) Privacy Rule and Security Rule Health Information Technology for Economic and Clinical Health (HITECH)

More information

CROOK COUNTY POLICY AND PROCEDURES FOR COMPLIANCE WITH THE HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT OF

CROOK COUNTY POLICY AND PROCEDURES FOR COMPLIANCE WITH THE HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT OF CROOK COUNTY POLICY AND PROCEDURES FOR COMPLIANCE WITH THE HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT OF 1996 Update 2-17-2016 CROOK COUNTY RECORD OF CHANGES 2 TABLE OF CONTENTS Introduction HIPAA

More information

Georgia Health Information Network, Inc. Georgia ConnectedCare Policies

Georgia Health Information Network, Inc. Georgia ConnectedCare Policies Georgia Health Information Network, Inc. Georgia ConnectedCare Policies Version History Effective Date: August 28, 2013 Revision Date: August 2014 Originating Work Unit: Health Information Technology Health

More information

45 CFR Part 164. Interim Final Rule Breach Notification for Unsecured Protected Health Information

45 CFR Part 164. Interim Final Rule Breach Notification for Unsecured Protected Health Information 45 CFR Part 164 Interim Final Rule Breach Notification for Unsecured Protected Health Information Full Preamble and Rule at http://edocket.access.gpo.gov/2009/pdf/e9-20169.pdf The Interim Final Rule also

More information

OMNIBUS RULE ARRIVES

OMNIBUS RULE ARRIVES AFTER THE OMNIBUS RULE 1 Agenda Omnibus Rule is here Business Associates (BAs) Agreement Breach Notification Change Breach Reporting Requirements (Federal and State) Notification to Care1st Health Plan

More information

GUIDE TO THE OMNIBUS HIPAA RULE: What You Need to Know and Do

GUIDE TO THE OMNIBUS HIPAA RULE: What You Need to Know and Do GUIDE TO THE OMNIBUS HIPAA RULE: What You Need to Know and Do By D Arcy Guerin Gue, Phoenix Health Systems, a division of Medsphere Systems Corporation With Steven J. Fox, Post & Schell Originally commissioned

More information

Preparing for a HIPAA Audit & Hot Topics in Health Care Reform

Preparing for a HIPAA Audit & Hot Topics in Health Care Reform Preparing for a HIPAA Audit & Hot Topics in Health Care Reform 2013 San Francisco Mid-Sized Retirement & Healthcare Plan Management Conference March 17-20, 2013 Elizabeth Loh, Esq. Copyright Trucker Huss,

More information

HIPAA THE NEW RULES. Highlights of the major changes under the Omnibus Rule

HIPAA THE NEW RULES. Highlights of the major changes under the Omnibus Rule HIPAA THE NEW RULES Highlights of the major changes under the Omnibus Rule AUTHOR Gamelah Palagonia, Founder CIPM, CIPP/IT, CIPP/US, CIPP/G, ARM, RPLU+ PRIVACY PROFESSIONALS LLC gpalagonia@privacyprofessionals.com

More information

HIPAA and Lawyers: Your stakes have just been raised

HIPAA and Lawyers: Your stakes have just been raised HIPAA and Lawyers: Your stakes have just been raised October 16, 2013 Presented by: Harry Nelson e: hnelson@fentonnelson.com Claire Marblestone e: cmarblestone@fentonnelson.com AGENDA Statutory & Regulatory

More information

LEGAL ISSUES IN HEALTH IT SECURITY

LEGAL ISSUES IN HEALTH IT SECURITY LEGAL ISSUES IN HEALTH IT SECURITY Webinar Hosted by Uluro, a Product of Transformations, Inc. March 28, 2013 Presented by: Kathie McDonald-McClure, Esq. Wyatt, Tarrant & Combs, LLP 500 West Jefferson

More information

HIPAA Privacy, Breach, & Security Rules

HIPAA Privacy, Breach, & Security Rules HIPAA Privacy, Breach, & Security Rules An Eagle Associates Presentation Eagle Associates, Inc. www.eagleassociates.net info@eagleassociates.net P.O. Box 1356 Ann Arbor, MI 48106 800-777-2337 Eagle Associates,

More information

HIPAA Compliance. PART I: HHS Final Omnibus HIPAA Rules

HIPAA Compliance. PART I: HHS Final Omnibus HIPAA Rules HIPAA Compliance PART I: HHS Final Omnibus HIPAA Rules Colin J. Zick Foley Hoag LLP (617) 832-1000 www.foleyhoag.com February 6, 2013 www.securityprivacyandthelaw.com HIPAA Compliance: PART I 1 Finally!

More information

New. To comply with HIPAA notice requirements, all Providence covered entities shall follow, at a minimum, the specifications described below.

New. To comply with HIPAA notice requirements, all Providence covered entities shall follow, at a minimum, the specifications described below. Subject: Protected Health Information Breach Notification Policy Department: Enterprise Risk Management Services Executive Sponsor: SVP/Chief Risk Officer Approved by: Rod Hochman, MD President/CEO Policy

More information

NO , Chapter 7 TALLAHASSEE, January 6, 2014 HIPAA BREACH NOTIFICATION PROCEDURES

NO , Chapter 7 TALLAHASSEE, January 6, 2014 HIPAA BREACH NOTIFICATION PROCEDURES CFOP 60-17, Chapter 7 STATE OF FLORIDA DEPARTMENT OF CF OPERATING PROCEDURE CHILDREN AND FAMILIES NO. 60-17, Chapter 7 TALLAHASSEE, January 6, 2014 HIPAA BREACH NOTIFICATION PROCEDURES 7-1. Purpose. This

More information

The Impact of the Stimulus Act on HIPAA Privacy and Security

The Impact of the Stimulus Act on HIPAA Privacy and Security The Impact of the Stimulus Act on Webinar March 12, 2009 Practical Tools for Seminar Learning Copyright 2009 American Health Information Management Association. All rights reserved. Disclaimer The American

More information

Palmetto Paralegal Association

Palmetto Paralegal Association Palmetto Paralegal Association What Every Paralegal Needs to Know About HIPAA March 19, 2014 Jeanne M. Born, RN, JD NEXSEN PRUET, LLC What Every Paralegal Needs to Know About HIPAA In August of 1996 Congress

More information

NETWORK PARTICIPATION AGREEMENT

NETWORK PARTICIPATION AGREEMENT NETWORK PARTICIPATION AGREEMENT THIS NETWORK PARTICIPATION AGREEMENT ( Agreement ) is entered into on the date(s) indicated below, by and between the undersigned physician (hereinafter Physician ; and

More information

HIPAA Omnibus Rule Compliance

HIPAA Omnibus Rule Compliance HIPAA Omnibus Rule Compliance Jana Aagaard, JD Senior Counsel, Privacy/HIT Dignity Health Christy Navarro, MS CIPP/US Director, Chief Privacy Officer - Ascendian 1 Overview Background What Should Be Done

More information

HIPAA FUNDAMENTALS For Substance abuse Treatment Industry

HIPAA FUNDAMENTALS For Substance abuse Treatment Industry HIPAA FUNDAMENTALS For Substance abuse Treatment Industry (c)firststepcounselingonline2014 1 At the conclusion of the course/unit/study the student will... ANALYZE THE EFFECTS OF TRANSFERING INFORMATION

More information

New HIPAA Breach Rules NAHU presents the WHAT and WHYs. Agenda

New HIPAA Breach Rules NAHU presents the WHAT and WHYs. Agenda New HIPAA Breach Rules NAHU presents the WHAT and WHYs Presenters: David Smith JD, Vice President, Ebenconcepts Tom Jacobs JD, co-ceo eflexgroup Moderator: Ric Joyner CEBS CFCI, co-ceo, eflexgroup 1 Agenda

More information

MEMORANDUM. Health Care Information Privacy The HIPAA Regulations What Has Changed and What You Need to Know

MEMORANDUM. Health Care Information Privacy The HIPAA Regulations What Has Changed and What You Need to Know 1801 California Street Suite 4900 Denver, CO 80202 303-830-1776 Facsimile 303-894-9239 MEMORANDUM To: Adam Finkel, Assistant Director, Government Relations, NCRA From: Mel Gates Date: December 23, 2013

More information

Coping with, and Taking Advantage of, HIPAA s New Rules!! Deven McGraw Director, Health Privacy Project April 19, 2013!

Coping with, and Taking Advantage of, HIPAA s New Rules!! Deven McGraw Director, Health Privacy Project April 19, 2013! Coping with, and Taking Advantage of, HIPAA s New Rules!!! Deven McGraw Director, Health Privacy Project April 19, 2013! Status of Federal Privacy Regulations! Omnibus Rule (Data Breach, Enforcement, HITECH,

More information