HIPAA COMPLIANCE. for Small & Mid-Size Practices

Size: px
Start display at page:

Download "HIPAA COMPLIANCE. for Small & Mid-Size Practices"

Transcription

1 HIPAA COMPLIANCE for Small & Mid-Size Practices Golden State Web Solutions GSWS (4797)

2 INTRODUCTION Most individuals reading this are interested in HIPAA, GSWS, or some combination of the two; and the 2 most common questions asked are usually as follows: WHY SHOULD MY PRACTICE START COMPLYING WITH HIPAA? We could say It s the law and leave it at that, but let s take it a little further and look at what it adds to your practice. Other benefits include: Demonstrating to your patients that you care about their privacy. Incoming doctors (potential successor) will expect compliance. Improving operational procedures, efficiency and accuracy. Significantly reduce your exposure to data breaches and/or fines. WHY SHOULD GSWS BE YOUR CHOICE OF AUDITOR? GSWS has been managing medical practice networks and client data for years in a HIPAA compliant manner. We already know the requirements for getting (and staying) compliant. When clients started getting estimates, the quotes were expensive enough to make the process cost-prohibitive. Running in that wall enough times, we decided to start conducting audits ourselves. GSWS recognizes the need for audit assessment services at a cost that s affordable to small and mid-size healthcare practices. We will explain everything, set you up for success, and provide all the documentation you need if an auditor shows up at your door. SOUND GOOD ENOUGH ALREADY? SPEAK WITH US! To speak with someone, contact us at or Otherwise, we hope you find this document helpful and feel free to contact us with any questions you may have. PLEASE NOTE: This document is intended as an informational guide only, and has been greatly condensed. GSWS is not a law firm, and this is not legal advice. If you are seeking legal advice, you should contact an attorney.

3 HIPAA: WHAT IT IS & WHAT TO KNOW In simplest terms, HIPAA is the Health Insurance Portability and Accountability Act that sets the standard for protecting sensitive patient data. HIPAA regulations address the saving, accessing and sharing of medical and personal information of any individual, as well as outline the security standards to protect health data, also known as PHI (Protected Health Information). Any organization that deals with PHI must ensure that all the required physical, network, and process security measures are in place and followed. This includes covered entities (anyone who provides treatment, payment and operations in healthcare), and business associates (anyone with access to patient information and/or provides support in treatment, payment or operations). Subcontractors, or business associates of business associates, must also adhere to these standards and regulations. The word reasonable appears dozens of times in the HIPAA regulations. HIPAA law requires that CEs and BAs take reasonable steps to protect PHI from reasonably anticipated threats. If you are ever investigated for a HIPAA violation, and you acted in good faith and made reasonable efforts to do what HIPAA requires, your liability will be much lower than if you neglected your HIPAA obligations and/ or did not act in good faith.

4 COMMON QUESTIONS It s important to understand what HIPAA means to better protect your organization and the sensitive data that it holds. We gathered some of the most common questions about HIPAA and broke down what every single healthcare company in the U.S. needs to know. WHAT IS HIPAA? HIPAA, the Health Insurance Portability and Accountability Act, is a federal law that protects the privacy and security of health data. Initially passed in 1996, updated by a law called HITECH in 2009 and in 2013, (under the larger Omnibus rule) rolled the requirements of all 3 legislations into 1 act. For the sake of sanity, HIPAA, HITECH, and the Omnibus Rule all refer to the same concept: the HIPAA regulations. While it does include regulations and standards, it also allows some flexibility in how the regulations and standards can be addressed (i.e. data, data criticality, amount of employees, number of locations, etc.). That s where HIPAA gets more complicated, and we recommend you speak to a cybersecurity and compliance expert. WHO REGULATES HIPAA? HIPAA regulations are enforced by the Office for Civil Rights (OCR) of the U.S. Department of Health and Human Services (HHS). WHO DOES HIPAA AFFECT? In short, everyone. Medical practitioners are responsible for managing client data within HIPAA s compliance regulations. Patients are affected with how their PHI/PII is classified and its levels of privacy. WHAT IS PHI/PII? PHI stands for Protected Health Information and PII stands for Personally Identifiable Information. In its most abbreviated description, PHI/ PII is any data unique to the individual/record. Examples include any information relating to an individual s past, present, or future physical or mental health or condition. Outside of medical information, it expands into information such as name, address, birthdate, and Social Security Number. Your only proof of HIPAA compliance is the paperwork and other evidence you create. For overall HIPAA compliance, it certainly helps to do the right things, and avoid those things HIPAA prohibits. If you cannot show evidence of your actions later, whether in court or in an OCR investigation or audit, all your efforts are in vain. HIPAA requires you to retain HIPAA-related documents for a minimum of six (6) years from the date a document was created or was last in effect, whichever is later. This does not refer to clinical, medical records, but to your HIPAA-related documents. HIPAA does not have a retention requirement for actual medical records, but leaves that issue to state laws and other federal laws.

5 WHAT IS REQUIRED TO BE HIPAA COMPLIANT? The HIPAA framework includes 18 standards and a total of 36 implementation specifications that detail the framework for compliance To see a complete list of standards and regulations, please see the 18 HIPAA Identifiers and HIPAA Security Regulations & Standards sections of this document. HOW CAN I MAKE SURE HIPAA REQUIREMENTS ARE MET? The most common way for your medical practice to ensure requirements are met is to hire a consultant (like us) to navigate you through the process. It can be tricky, and the penalties can be expensive, so it s not something to be taken lightly. Upon completion, your practice will have a complete HIPAA reference manual, fully updated with all the information required from an audit. We give you exactly what a potential HHS HIPAA auditor will be looking for. IF I HIRE YOU FOR AN AUDIT, WILL THIS ALL GO AWAY? Nice thought, but no. Compliance with the HIPAA Security Regulation is an ongoing process with periodic reviews and evaluations required. Best practice includes consistent reviews. Reviews can be based on the calendar year (i.e. every 6 or 12 months) or when there is a significant change to the organization (individuals leave, new hires, changes in technology, etc.). Additionally, part of the HIPAA framework adoption process states someone must be identified as the designated HIPAA Security Officer for the practice. This can be an employee within the organization, or by a third party. Part of the overall process will define what makes best sense for the organization. HOW CAN I START MY HIPAA COMPLIANCE PROCESS? Contact us at or First thing we are going to do is simply get together and discuss how the process works. There is no pressure, requirement to sign up nor any cost for an initial consultation. We look forward to speaking with you. PLEASE NOTE: This document is intended as an informational guide only, and has been greatly condensed. GSWS is not a law firm, and this is not legal advice. If you are seeking legal advice, you should contact an attorney.

6 HIPAA VIOLATIONS & PENALTIES What happens if you violate HIPAA? That depends of the severity of the violation. OCR prefers to resolve HIPAA violations using non-punitive measures, such as with voluntary compliance or issuing technical guidance to help covered entities address areas of non-compliance. However, if the violations are serious, have been allowed to persist for a long time, or if there are multiple areas of noncompliance, financial penalties may be imposed. HIPAA VIOLATION PENALTY TIERS First Tier The covered entity did not know and could not reasonably have known of the breach. The four categories used for the penalty structure are Category 1 A violation that the covered entity was unaware of and could not have realistically avoided, had a reasonable amount of care had been taken to abide by HIPAA Rules Category 2 A violation that the covered entity should have been aware of but could not have avoided even with a reasonable amount of care. (but falling short of willful neglect of HIPAA Rules) Category 3 A violation suffered as a direct result of willful neglect of HIPAA Rules, in cases where an attempt has been made to correct the violation Category 4 A violation of HIPAA Rules constituting willful neglect, where no attempt has been made to correct the violation HIPAA Violation Penalty Structure Each category of violation carries a separate HIPAA penalty. It is up to OCR to determine a financial penalty within the appropriate range. OCR considers a number of factors when determining penalties, such as the length of time a violation was allowed to persist, the number of people affected and the nature of the data exposed. An organization s willingness to assist with an OCR investigation is also taken into account. The general factors that can affect the level of financial penalty also include prior history, the organization s financial condition and the level of harm caused by the violation. Second Tier The covered entity knew, or by exercising reasonable diligence would have known of the violation, though they did not act with willful neglect. Third Tier The covered entity acted with willful neglect and corrected the problem within a 30-day time period. Fourth Tier The covered entity acted with willful neglect and failed to make a timely correction. Category 1: Minimum fine of $100 per violation up to $50,000 Category 2: Minimum fine of $1,000 per violation up to $50,000 Category 3: Minimum fine of $10,000 per violation up to $50,000 Category 4: Minimum fine of $50,000 per violation

7 The fines are issued per violation category, per year that the violation was allowed to persist. The maximum fine per violation category, per year, is $1,500,000. HIPAA Criminal Penalties In addition to civil financial penalties for HIPAA violations, criminal charges can be filed against the individual(s) responsible for a breach of PHI. Criminal penalties for HIPAA violations are divided into three separate tiers, with the term and an accompanying fine decided by a judge based on the facts of each individual case. As with OCR, a number of general factors are considered which will affect the penalty issued. If an individual has profited from the theft, access or disclosure of PHI, it may be necessary for all moneys received to be refunded, in addition to the payment of a fine. The tiers for HIPAA criminal penalties are Tier 1 Reasonable cause or no knowledge of violation. Up to 1 year in jail. Tier 2 Obtaining PHI under false pretenses. Up to 5 years in jail. Tier 3 Obtaining PHI for personal gain or malicious intent. Up to 10 years in jail. If a violation does occur, the investigation that follows will involve research and interviews to determine, among other things, what threats you reasonably anticipated, and what specific steps you took to guard against them. If you did everything right and a violation still happens, your liability is relatively low. If a violation happens and you did not take appropriate steps to guard against reasonably anticipated threats, your liability will be much higher.

8 THE 18 HIPAA IDENTIFIERS The HIPAA privacy rule sets forth policies to protect all individually identifiable health information that is held or transmitted by a covered entity. This information can be used to identify, contact, or locate a single person or can be used with other sources to identify a single individual. When personally identifiable information is used in conjunction with one s physical or mental health or condition, health care, or one s payment for that health care, it becomes Protected Health Information (PHI). These are the 18 HIPAA Identifiers that are considered personally identifiable information: 1. Name 2. Address (all geographic subdivisions smaller than state, including street address, city county, and zip code) 3. All elements (except years) of dates related to an individual (including birthdate, admission date, discharge date, date of death, and exact age if over 89) 4. Telephone numbers 5. Fax number 6. address 7. Social Security Number 8. Medical record number 9. Health plan beneficiary number 10. Account number 11. Certificate or licence number 12. Vehicle identifiers and serial numbers, including license plate numbers 13. Device identifiers and serial numbers 14. Web URL 15. Internet Protocol (IP) Address 16. Biometric identifiers, including finger and voice prints 17. Photographic image (images are not limited to images of the face) 18. Any other characteristic that could uniquely identify the individual DECEDENT RESEARCH Be aware that the HIPAA Privacy rule protects individually identifiable health information of deceased individuals for 50 years following the date of death. If the research will include any identifiers linked to living persons or involves accessing death records maintained by the State Registrar, local registrars, or county recorders, the project must be approved by the IRB in advance. If a communication contains any of these identifiers, or parts of the identifier, such as initials, the data is to be considered identified. To be considered de-identified, ALL of the 18 HIPAA Identifiers must be removed from the data set. This includes all dates, such as surgery dates, all voice recordings, and all photographic images.

9 HIPAA SECURITY REGULATIONS & STANDARDS ADMINISTRATIVE SAFEGUARDS 45 C.F.R Security Management Process a. Risk Analysis (Required) b. Risk Management (Required) c. Sanction Policy (Required) d. Information System Activity Review (Required) 2. Assigned Security Responsibility 3. Workforce Security a. Authorization and/or Supervision Policy (Addressable) b. Workforce Clearance Procedures (Addressable) c. Termination Procedures (Addressable) 4. Information Access Management a. Isolating Healthcare Clearinghouse Function (Required) b. Access Authorization (Addressable) c. Access Establishment and Modification (Addressable) 5. Security Awareness and Training a. Security Reminders (Addressable) b. Protection from Malicious Software (Addressable) c. Log-in Monitoring (Addressable) d. Password Management (Addressable) 6. Security Incident Procedures a. Response and Reporting (Required) 7. Contingency Plan a. Data Backup Plan (Required) b. Disaster Recovery Plan (Required) c. Emergency Mode Operation Plan (Required) d. Testing and Revision Procedures (Addressable) e. Applications and Data Criticality Analysis (Addressable) 8. Evaluation 9. Business Associate Contracts and Other Arrangement a. Written Contracts or Other Arrangement (Required) PREPARE IN ADVANCE! A response plan should be created that defines who does what, in what order, if an audit or investigation happens. Plan for a surprise onsite visit as well as a notifiedin-advance scenario. BE COMPLAINT FRIENDLY Treat each complaint as an opportunity to make someone happy, and build your reputation as a friendly place to do healthcare business. People who file a complaint generally believe a wrong has really occurred, and they want to be treated with dignity and espect. PHYSICAL SAFEGUARDS 45 C.F.R Facility Access Controls a. Contingency Operations (Addressable) a. Facility Security Plan (Addressable) b. Access Control and Validation Procedures (Addressable) c. Maintenance Records (Addressable)

10 11. Workstation Use. 12. Workstation Security. 13. Device and Media Controls. a. Disposal (Required). b. Media Re-use (Required). c. Accountability (Addressable). d. Data Back-up and Storage (Addressable). TECHNICAL SAFEGUARDS 45 C.F.R Access Control. a. Unique User Identification (Required). b. Emergency Access Procedure (Required). c. Automatic Log-Off (Addressable). d. Encryption and Decryption (Addressable). 15. Audit Control. 16. Integrity. a. Mechanism to Authenticate ephi (Addressable). 17. Person or Entity Authentication. 18. Transmission Security. a. Integrity Controls (Addressable). b. Encryption (Addressable). POLICIES, PROCEDURES, AND DOCUMENTATION REQUIREMENTS 45 C.F.R Policies and Procedures 20.Documentation a. Time Limit (Required) b. Availability (Required) c. Updates (Required) ORGANIZATIONAL REQUIREMENTS 45 C.F.R Business Associate Contracts or Other Arrangements a. Business Associate Contracts (Required) b. Other arrangements (Required) c. Business Associate Contracts with Sub-Contractors (Required) SOURCE: AOA HIPAA Security Regulation Compliance Manual

11 ADDITIONAL RESOURCES U.S. Department of Health & Human Services HHS main website: HHS HIPAA information for Professionals: HHS HIPAA information for Individuals: National Institute of Standards & Technology (NIST) An Introductory Resource Guide for Implementing the Health Insurance Portability and Ac countability Act. (HIPAA is based on the NIST Cybersecurity framework). Free downloadable pdf: gov/sites/default/files/ocr/privacy/hipaa/administrative/securityrule/ nist80066.pdf HIPAA details for Optometric Practitioners: AOA HIPAA details for Dental Practitioners: ADA ics/electronic-health-records/health-systemreform-resources/hipaa-privacy-security HIPAA details for Chiropractors: American Chiropractic Association HIPAA Compliance Best Practices: HIPAA Journal Golden State Web Solutions Free Cybersecurity Awareness Training Online, On-Demand resource for educating employees:

12 CERTIFICATIONS AND ORGANIZATIONS ABOUT GSWS (GSWS) opened in 1994 as a startup internet technology company, offering website design, site maintenance, , hosting and domain name registration. Fast forward to today and providing clients with Cybersecurity solutions has become our primary focus. We still provide Managed IT, Web Development and Hosting services as always, but our core focus is on the security and compliance requirements placed upon our client s business needs. This simply means if you are our client, our primary focus is on what is most critical to you. This can be security centered, compliance related and/or just the overall way your organization is using technology to improve processes. Working together in that capacity, the structure and management of technology will inherently fall in order in a way that overall better supports your organization s needs and business objectives. We are a close-knit team of highly skilled (and personable) individuals who work closely together. Whether we are guiding a client through a security assessment report or presenting a tailored cybersecurity solution, our knowledge, skills, respect, quality service and care provides our clients support of their organization s technology needs and requirements. Everything starts with an initial consultation or vulnerability assessment, so we can speak to you as to what specifically affects your organization. Contact us with any questions you may have at or us directly at. We look forward to speaking with you. For additional information, please visit:

HIPAA Compliance Guide

HIPAA Compliance Guide This document provides an overview of the Health Insurance Portability and Accountability Act (HIPAA) compliance requirements. It covers the relevant legislation, required procedures, and ways that your

More information

Hayden W. Shurgar HIPAA: Privacy, Security, Enforcement, HITECH, and HIPAA Omnibus Final Rule

Hayden W. Shurgar HIPAA: Privacy, Security, Enforcement, HITECH, and HIPAA Omnibus Final Rule Hayden W. Shurgar HIPAA: Privacy, Security, Enforcement, HITECH, and HIPAA Omnibus Final Rule 1 IMPORTANCE OF STAFF TRAINING HIPAA staff training is a key, required element in a covered entity's HIPAA

More information

HIPAA Background and History

HIPAA Background and History Agenda Jeffery P. Drummond Lawyers as HIPAA Business Associates: Ethical Obligations and Practical Tips for Compliance Dallas Bar Association January 17, 2018 Jamie Sorley An Overview of HIPAA The Privacy

More information

ARE YOU HIP WITH HIPAA?

ARE YOU HIP WITH HIPAA? ARE YOU HIP WITH HIPAA? Scott C. Thompson 214.651.5075 scott.thompson@haynesboone.com February 11, 2016 HIPAA SECURITY WHY SHOULD I CARE? Health plan fined $1.2 million for HIPAA breach. Health plan fined

More information

Regenstrief Center for Healthcare Engineering HIPAA Compliance Policy

Regenstrief Center for Healthcare Engineering HIPAA Compliance Policy Regenstrief Center for Healthcare Engineering HIPAA Compliance Policy Revised December 6, 2017 Table of Contents Statement of Policy 3 Reason for Policy 3 HIPAA Liaison 3 Individuals and Entities Affected

More information

HIPAA 2014: Recent Changes from HITECH and the Omnibus Rule. Association of Corporate Counsel Houston Chapter October 14, 2014.

HIPAA 2014: Recent Changes from HITECH and the Omnibus Rule. Association of Corporate Counsel Houston Chapter October 14, 2014. HIPAA 2014: Recent Changes from HITECH and the Omnibus Rule Association of Corporate Counsel Houston Chapter October 14, 2014 Jeffery P. Drummond Jackson Walker L.L.P. 901 Main Street, Suite 6000 Dallas,

More information

Auditing for HIPAA Compliance: Evaluating security and privacy compliance in an organization that provides health insurance benefits to employees

Auditing for HIPAA Compliance: Evaluating security and privacy compliance in an organization that provides health insurance benefits to employees Auditing for HIPAA Compliance: Evaluating security and privacy compliance in an organization that provides health insurance benefits to employees San Antonio IIA: I HEART AUDIT CONFERENCE February 24,

More information

North Shore LIJ Health System, Inc. Facility Name. CATEGORY: Effective Date: 8/15/13

North Shore LIJ Health System, Inc. Facility Name. CATEGORY: Effective Date: 8/15/13 North Shore LIJ Health System, Inc. Facility Name POLICY TITLE: HIPAA Marketing and Sale of Protected Health Information Policy ADMINISTRATIVE POLICY AND PROCEDURE MANUAL POLICY #: 800.43 System Approval

More information

HIPAA Privacy & Security. Transportation Providers 2017

HIPAA Privacy & Security. Transportation Providers 2017 HIPAA Privacy & Security Transportation Providers 2017 HIPAA Privacy & Security As a non emergency medical transportation provider, you deal directly with Medicare and Medicaid Members healthcare information

More information

UNDERSTANDING HIPAA & THE HITECH ACT. Heather Deixler, Esq. Associate, Morgan, Lewis & Bockius LLP

UNDERSTANDING HIPAA & THE HITECH ACT. Heather Deixler, Esq. Associate, Morgan, Lewis & Bockius LLP UNDERSTANDING HIPAA & THE HITECH ACT Heather Deixler, Esq. Associate, Morgan, Lewis & Bockius LLP 1 Objectives of Presentation Learn what HIPAA is Learn the purpose of HIPAA Understand who HIPAA regulates

More information

HIPAA Security. ible. isions. Requirements, and their implementation. reader has

HIPAA Security. ible. isions. Requirements, and their implementation. reader has HIPAA Security SERIES Security Topics 1. Security 101 for Covered Entities 2. Security Standards - Administrative Safeguards 3. Security Standards - Physical Safeguards 4. Security Standards - Technical

More information

1 Security 101 for Covered Entities

1 Security 101 for Covered Entities HIPAA SERIES Topics 1. 101 for Covered Entities 2. Standards - Administrative Safeguards 3. Standards - Physical Safeguards 4. Standards - Technical Safeguards 5. Standards - Organizational, Policies &

More information

Effective Date: 08/2013

Effective Date: 08/2013 POLICY/GUIDELINE TITLE: HIPAA Marketing and Sale of Protected Health Information Policy POLICY #: 800.43 System Approval Date: 5/18/18 Site Implementation Date: 6/17/18 Prepared by: ADMINISTRATIVE POLICY

More information

Determining Whether You Are a Business Associate

Determining Whether You Are a Business Associate The HIPAApotamus in the Room: When Lawyers and Law Firms are Subject to HIPAA Enforcement, And How to Comply with the Law by Leslie R. Isaacman, J.D., M.B.A. The Omnibus Final Rule 1 of the Health Information

More information

COUNTY SOCIAL SERVICES POLICIES AND PROCEDURES FOR COMPLIANCE WITH THE HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT OF 1996 HIPAA

COUNTY SOCIAL SERVICES POLICIES AND PROCEDURES FOR COMPLIANCE WITH THE HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT OF 1996 HIPAA COUNTY SOCIAL SERVICES POLICIES AND PROCEDURES FOR COMPLIANCE WITH THE HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT OF 1996 HIPAA 1 Recommended by ISP Committee of CSS on October 22 nd, 2014 Amended

More information

HIPAA 102a. Presented by Jack Kolk President ACR 2 Solutions, Inc.

HIPAA 102a. Presented by Jack Kolk President ACR 2 Solutions, Inc. HIPAA 102a What You Don t Know About HIPAA Privacy and Security Can Really Hurt You! Revision 2015 Presented by Jack Kolk President ACR 2 Solutions, Inc. Todays Agenda: 1) About Myself - Jack Kolk, CEO

More information

ChoiceNet/InterCare Health Plans Getting Your Arms Around HIPAA Compliance

ChoiceNet/InterCare Health Plans Getting Your Arms Around HIPAA Compliance ChoiceNet/InterCare Health Plans Getting Your Arms Around HIPAA Compliance The enclosed packet includes basic HIPAA Privacy Rule information, Amendments for your health care plan, identified action items

More information

HIPAA HEALTH INSURANCE PORTABILITY & ACCOUNTABILITY ACT

HIPAA HEALTH INSURANCE PORTABILITY & ACCOUNTABILITY ACT HIPAA HEALTH INSURANCE PORTABILITY & ACCOUNTABILITY ACT HIPAA OMNIBUS FINAL RULE HITECH GINA TERMINOLOGY OMNIBUS FINAL RULE Issued January 23, 2013 Effective March 26, 2013 Modified HIPAA privacy and security

More information

CROOK COUNTY POLICY AND PROCEDURES FOR COMPLIANCE WITH THE HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT OF

CROOK COUNTY POLICY AND PROCEDURES FOR COMPLIANCE WITH THE HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT OF CROOK COUNTY POLICY AND PROCEDURES FOR COMPLIANCE WITH THE HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT OF 1996 Update 2-17-2016 CROOK COUNTY RECORD OF CHANGES 2 TABLE OF CONTENTS Introduction HIPAA

More information

Effective Date: 4/3/17

Effective Date: 4/3/17 HIPAA AND HITECH ADM 067.4 Attachment D Health Insurance Portability and Accountability Act (HIPAA) Privacy Rule and Security Rule Health Information Technology for Economic and Clinical Health (HITECH)

More information

HIPAA PRIVACY AND SECURITY AWARENESS

HIPAA PRIVACY AND SECURITY AWARENESS HIPAA PRIVACY AND SECURITY AWARENESS Introduction The Health Insurance Portability and Accountability Act (known as HIPAA) was enacted by Congress in 1996. HIPAA serves three main purposes: To protect

More information

HIPAA: Impact on Corporate Compliance

HIPAA: Impact on Corporate Compliance HIPAA: Impact on Corporate Compliance AAPC HEALTHCON April 2014 Stacy Harper, JD, MHSA, CPC Disclaimer The information provided is for educational purposes only and is not intended to be considered legal

More information

HIPAA, 42 CFR PART 2, AND MEDICAID COMPLIANCE STANDARDS POLICIES AND PROCEDURES

HIPAA, 42 CFR PART 2, AND MEDICAID COMPLIANCE STANDARDS POLICIES AND PROCEDURES SALISH BHO HIPAA, 42 CFR PART 2, AND MEDICAID COMPLIANCE STANDARDS POLICIES AND PROCEDURES Policy Name: BREACH NOTIFICATION REQUIREMENTS Policy Number: 5.16 Reference: 45 CFR Parts 164 Effective Date:

More information

Conduct of covered entity or business associate. Did not know and, by exercising reasonable diligence, would not have known of the violation

Conduct of covered entity or business associate. Did not know and, by exercising reasonable diligence, would not have known of the violation HIPAA UPDATE: WHY AND HOW YOU MUST COMPLY 1 In January 2013, the Department of Health and Human Services ( HHS ) issued its long-awaited Omnibus Rule 2 implementing regulations required by the HITECH Act

More information

HTKT.book Page 1 Monday, July 13, :59 PM HIPAA Tool Kit 2017

HTKT.book Page 1 Monday, July 13, :59 PM HIPAA Tool Kit 2017 HIPAA Tool Kit 2017 Contents Introduction...1 About This Manual... 1 A Word About Covered Entities... 1 A Brief Refresher Course on HIPAA... 2 A Brief Update on HIPAA... 2 Progress Report... 4 Ongoing

More information

HIPAA and Lawyers: Your stakes have just been raised

HIPAA and Lawyers: Your stakes have just been raised HIPAA and Lawyers: Your stakes have just been raised October 16, 2013 Presented by: Harry Nelson e: hnelson@fentonnelson.com Claire Marblestone e: cmarblestone@fentonnelson.com AGENDA Statutory & Regulatory

More information

HILLSBOROUGH COUNTY HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT (HIPAA) PROCEDURES

HILLSBOROUGH COUNTY HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT (HIPAA) PROCEDURES HILLSBOROUGH COUNTY HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT (HIPAA) PROCEDURES July 1, 2017 Table of Contents Section 1 - Statement of Commitment to Compliance... 3 Section 2 General Guidelines

More information

UNIVERSITY OF TENNESSEE HEALTH SCIENCE CENTER INSTITUTIONAL REVIEW BOARD USE OF PROTECTED HEALTH INFORMATION WITHOUT SUBJECT AUTHORIZATION

UNIVERSITY OF TENNESSEE HEALTH SCIENCE CENTER INSTITUTIONAL REVIEW BOARD USE OF PROTECTED HEALTH INFORMATION WITHOUT SUBJECT AUTHORIZATION UNIVERSITY OF TENNESSEE HEALTH SCIENCE CENTER INSTITUTIONAL REVIEW BOARD USE OF PROTECTED HEALTH INFORMATION WITHOUT SUBJECT AUTHORIZATION I. PURPOSE To provide guidance to investigators regarding the

More information

HIPAA Redux 2013 Kim Cavitt, AuD Audiology Resources, Inc. Expert e-seminar 4/29/2013. HIPAA Redux Presented by: Kim Cavitt, AuD

HIPAA Redux 2013 Kim Cavitt, AuD Audiology Resources, Inc. Expert e-seminar 4/29/2013. HIPAA Redux Presented by: Kim Cavitt, AuD HIPAA Redux 2013 Presented by: Kim Cavitt, AuD Moderated by: Carolyn Smaka, Au.D., Editor-in-Chief, AudiologyOnline Expert e-seminar TECHNICAL SUPPORT Need technical support during event? Please contact

More information

Title: HP-53 Use and Disclosure of Protected Health Information for Purposes of Research. Department: Research

Title: HP-53 Use and Disclosure of Protected Health Information for Purposes of Research. Department: Research Title: HP-53 Use and Disclosure of Protected Health Information for Purposes of Research Department: Research I. STATEMENT OF POLICY In order for an investigator to use or disclose protected health information

More information

The Audits are coming!

The Audits are coming! HIPAA and Meaningful Use (MU) Governmental Program Audits The Audits are coming! The Audits are coming! 1 Audit Readiness Meaningful Use and HIPAA Both CMS and the Office for Civil Rights (OCR) have been

More information

HIPAA PRIVACY REQUIREMENTS. Dana L. Thrasher Constangy, Brooks & Smith, LLP (205)

HIPAA PRIVACY REQUIREMENTS. Dana L. Thrasher Constangy, Brooks & Smith, LLP (205) HIPAA PRIVACY REQUIREMENTS Dana L. Thrasher Constangy, Brooks & Smith, LLP dthrasher@constangy.com (205) 226-5464 1 REASONS FOR HIPAA PRIVACY RULES Perceived need for protection of individual health information

More information

DELHAIZE AMERICA PHARMACIES AND WELFARE BENEFIT PLAN HIPAA SECURITY POLICY (9/1/2016 VERSION)

DELHAIZE AMERICA PHARMACIES AND WELFARE BENEFIT PLAN HIPAA SECURITY POLICY (9/1/2016 VERSION) DELHAIZE AMERICA PHARMACIES AND WELFARE BENEFIT PLAN HIPAA SECURITY POLICY (9/1/2016 VERSION) Delhaize America, LLC Pharmacies and Welfare Benefit Plan 2013 Health Information Security and Procedures (As

More information

The HIPAA Omnibus Rule and the Enhanced Civil Fine and Criminal Penalty Regime

The HIPAA Omnibus Rule and the Enhanced Civil Fine and Criminal Penalty Regime HIPAA BUSINESS ASSOCIATE AGREEMENT BEST PRACTICES: UPDATE 2015 February 20, 2015 I. Executive Summary HIPAA is a federal law passed by Congress to protect medical patient data privacy from misuse or disclosure

More information

Limited Data Set Data Use Agreement For Research

Limited Data Set Data Use Agreement For Research Limited Data Set Data Use Agreement For Research This Data Use Agreement is dated,, and is between the ( Recipient ) and University of Miami, ( Covered Entity ). This Data Use Agreement is made in accordance

More information

HIPAA Data Breach ITPC

HIPAA Data Breach ITPC HIPAA Data Breach Objectives Overview of Omnibus Rule - Data Breach Suspected Breach - Investigation Audit Risk Assessment Corrective Action Plan Written Notification Elements NYS Rules on Data Breach

More information

2013 HIPAA Omnibus Regulations: New Rules for Healthcare Providers and Collections Partners

2013 HIPAA Omnibus Regulations: New Rules for Healthcare Providers and Collections Partners 2013 HIPAA Omnibus Regulations: New Rules for Healthcare Providers and Collections Partners Providers, and Partners 2 Editor s Foreword What follows are excerpts from the U.S. Department of Health and

More information

Preparing for a HIPAA Audit & Hot Topics in Health Care Reform

Preparing for a HIPAA Audit & Hot Topics in Health Care Reform Preparing for a HIPAA Audit & Hot Topics in Health Care Reform 2013 San Francisco Mid-Sized Retirement & Healthcare Plan Management Conference March 17-20, 2013 Elizabeth Loh, Esq. Copyright Trucker Huss,

More information

HIPAA in the Digital Age. Anisa Kelley and Rachel Procopio Maryan Rawls Law Group Fairfax, Virginia

HIPAA in the Digital Age. Anisa Kelley and Rachel Procopio Maryan Rawls Law Group Fairfax, Virginia HIPAA in the Digital Age Anisa Kelley and Rachel Procopio Maryan Rawls Law Group Fairfax, Virginia Virginia MGMA reminds attendees that the program is not intended to provide legal advice and advises participants

More information

March 1. HIPAA Privacy Policy

March 1. HIPAA Privacy Policy March 1 HIPAA Privacy Policy 2016 1 PRIVACY POLICY STATEMENT Purpose: The following privacy policy is adopted by the Florida College System Risk Management Consortium (FCSRMC) Health Program and its member

More information

HIPAA & The Medical Practice

HIPAA & The Medical Practice HIPAA & The Medical Practice Requirements for Privacy, Security and Breach Notification Gina L. Campanella, JD, MHA, CHA Founder & Principal, Campanella Law Office Of Counsel, The Beinhaker Law Firm BEINHAKER,

More information

HIPAA AND ONLINE BACKUP WHAT YOU NEED TO KNOW ABOUT

HIPAA AND ONLINE BACKUP WHAT YOU NEED TO KNOW ABOUT WHAT YOU NEED TO KNOW ABOUT HIPAA AND ONLINE BACKUP Learn more about how KeepItSafe can help to reduce costs, save time, and provide compliance for online backup, disaster recovery-as-a-service, mobile

More information

It s as AWESOME as You Think It Is!

It s as AWESOME as You Think It Is! It s as AWESOME as You Think It Is! Fine Print This presentation and any materials and/or comments are training and educational in nature only. They do not establish an attorney-client relationship, are

More information

Saturday, April 28 Medical Ethics: HIPAA Privacy and Security Rules

Saturday, April 28 Medical Ethics: HIPAA Privacy and Security Rules Saturday, April 28 Medical Ethics: HIPAA Privacy and Security Rules Gina Campanella, JD HIPAA & The Medical Practice Requirements for Privacy, Security and Breach Notification Gina L. Campanella, Esq.

More information

HIPAA The Health Insurance Portability and Accountability Act of 1996

HIPAA The Health Insurance Portability and Accountability Act of 1996 HIPAA The Health Insurance Portability and Accountability Act of 1996 Results Physiotherapy s policy regarding privacy and security of protected health information (PHI) is a reflection of our commitment

More information

UAMS ADMINISTRATIVE GUIDE NUMBER: 2.1

UAMS ADMINISTRATIVE GUIDE NUMBER: 2.1 UAMS ADMINISTRATIVE GUIDE NUMBER: 2.1.12 DATE: 04/01/2003 REVISION: 3/1/2004; 12/28/2010; 01/02/2013 PAGE: 1 of 18 SECTION: HIPAA AREA: HIPAA PRIVACY/SECURITY POLICIES SUBJECT: HIPAA RESEARCH POLICY PURPOSE

More information

COLUMBIA UNIVERSITY DATA CLASSIFICATION POLICY

COLUMBIA UNIVERSITY DATA CLASSIFICATION POLICY COLUMBIA UNIVERSITY DATA CLASSIFICATION POLICY I. Introduction Published: October 2013 Revised: November 2014, April 2016, October 2017 As indicated in the Columbia University Information Security Charter

More information

What Brown County employees need to know about the Federal legislation entitled the Health Insurance Portability and Accountability Act of 1996.

What Brown County employees need to know about the Federal legislation entitled the Health Insurance Portability and Accountability Act of 1996. What Brown County employees need to know about the Federal legislation entitled the Health Insurance Portability and Accountability Act of 1996. HIPAA stands for Health Insurance Portability and Accountability

More information

University of California Group Health and Welfare Benefit Plans HIPAA Privacy Rule Policies and Procedures (Interim)

University of California Group Health and Welfare Benefit Plans HIPAA Privacy Rule Policies and Procedures (Interim) Group Insurance Regulations Administrative Supplement No. 19 April 2003 University of California Group Health and Welfare Benefit Plans HIPAA Privacy Rule Policies and Procedures (Interim) The University

More information

Privacy Policy Training

Privacy Policy Training Health Insurance Portability and Accountability Act of 1996 (HIPAA) Privacy Policy Training General Information Level I Training HIPAA Project Management Office 1 Your HIPAA Privacy Officer: Name Goes

More information

COMPLIANCE TRAINING 2015 C O M P L I A N C E P R O G R A M - F W A - H I P A A - C O D E O F C O N D U C T

COMPLIANCE TRAINING 2015 C O M P L I A N C E P R O G R A M - F W A - H I P A A - C O D E O F C O N D U C T COMPLIANCE TRAINING 2015 QUALITY MANAGEMENT COMPLIANCE DEPARTMENT 2015 C O M P L I A N C E P R O G R A M - F W A - H I P A A - C O D E O F C O N D U C T Compliance Program why? Ensure ongoing education

More information

HIPAA BUSINESS ASSOCIATE AGREEMENT BEST PRACTICES: A COMPLIANCE SOLUTION FOR THE TICKING CLOCK AND THE DRACONIAN CIVIL AND CRIMINAL PENALTIES

HIPAA BUSINESS ASSOCIATE AGREEMENT BEST PRACTICES: A COMPLIANCE SOLUTION FOR THE TICKING CLOCK AND THE DRACONIAN CIVIL AND CRIMINAL PENALTIES HIPAA BUSINESS ASSOCIATE AGREEMENT BEST PRACTICES: A COMPLIANCE SOLUTION FOR THE TICKING CLOCK AND THE DRACONIAN CIVIL AND CRIMINAL PENALTIES January 23, 2014 I. Executive Summary I: The HIPAA Final Rule

More information

Texas Health and Safety Code, Chapter 181 Medical Records Privacy Law, HB 300

Texas Health and Safety Code, Chapter 181 Medical Records Privacy Law, HB 300 Texas Health and Safety Code, Chapter 181 Medical Records Privacy Law, HB 300 Training Module provided as a component of the Stericycle HIPAA Compliance Program Goals for Training Understand how Texas

More information

HIPAA Service Description

HIPAA Service Description PO Box 8021 Rancho Santa Fe California 92067 858.259.6204 tel 858.259.0309 fax www.practicalsecurity.com HIPAA Service Description February 2003 1 2 3 PSI HIPAA Services Offering The Department of Health

More information

THE CITY AND COUNTY OF SAN FRANCISCO SECTION 125 CAFETERIA PLAN HIPAA PRIVACY POLICIES & PROCEDURES

THE CITY AND COUNTY OF SAN FRANCISCO SECTION 125 CAFETERIA PLAN HIPAA PRIVACY POLICIES & PROCEDURES THE CITY AND COUNTY OF SAN FRANCISCO SECTION 125 CAFETERIA PLAN HIPAA PRIVACY POLICIES & PROCEDURES Effective: November 8, 2012 Terms used, but not otherwise defined, in this Policy and Procedure have

More information

Getting a Grip on HIPAA

Getting a Grip on HIPAA Getting a Grip on HIPAA Privacy and Security of Health Information in the Post-HITECH Age Jean C. Hemphill hemphill@ballardspahr.com 215.864.8539 Edward I. Leeds leeds@ballardspahr.com 215.864.8419 Amy

More information

HIPAA AND YOU 2017 G E R A L D E MELTZER, MD MSHA

HIPAA AND YOU 2017 G E R A L D E MELTZER, MD MSHA HIPAA AND YOU 2017 G E R A L D E MELTZER, MD MSHA ALLISON SHUREN, J D, MSN Financial Disclosure Gerald Meltzer is a consultant for imedicware Allison Shuren co-chairs the Life Sciences and Healthcare Regulatory

More information

LEGAL ISSUES IN HEALTH IT SECURITY

LEGAL ISSUES IN HEALTH IT SECURITY LEGAL ISSUES IN HEALTH IT SECURITY Webinar Hosted by Uluro, a Product of Transformations, Inc. March 28, 2013 Presented by: Kathie McDonald-McClure, Esq. Wyatt, Tarrant & Combs, LLP 500 West Jefferson

More information

HIPAA Privacy Overview

HIPAA Privacy Overview HIPAA Privacy Overview Benefit Advisors Network Stacy H. Barrow sbarrow@marbarlaw.com February 8, 2017 2017 Marathas Barrow Weatherhead Lent LLP. All Rights Reserved. 1 Overview of Presentation HIPAA Overview

More information

Texas Tech University Health Sciences Center El Paso HIPAA Privacy Policies

Texas Tech University Health Sciences Center El Paso HIPAA Privacy Policies Administration Policy 1.1 Glossary of Terms - HIPAA Effective Date: January 15, 2015 References: http://www.hhs.gov/ocr/hipaa TTUHSC El Paso HIPAA website: http://elpaso.ttuhsc.edu/hipaa/ Policy Statement

More information

Texas Tech University Health Sciences Center HIPAA Privacy Policies

Texas Tech University Health Sciences Center HIPAA Privacy Policies Administration Policy 1.1 Glossary of Terms - HIPAA Effective Date: January 15, 2015 Reviewed Date: August 7, 2017 References: http://www.hhs.gov/ocr/hippa HSC HIPAA website http://www.ttuhsc.edu/hipaa/policies_procedures.aspx

More information

HITECH and HIPAA: Highlights for Health Departments. Aimee Wall UNC School of Government

HITECH and HIPAA: Highlights for Health Departments. Aimee Wall UNC School of Government HITECH and HIPAA: Highlights for Health Departments Aimee Wall UNC School of Government When Congress enacted sweeping legislation in February designed to stimulate the nation s economy, it incorporated

More information

MEMORANDUM. Health Care Information Privacy The HIPAA Regulations What Has Changed and What You Need to Know

MEMORANDUM. Health Care Information Privacy The HIPAA Regulations What Has Changed and What You Need to Know 1801 California Street Suite 4900 Denver, CO 80202 303-830-1776 Facsimile 303-894-9239 MEMORANDUM To: Adam Finkel, Assistant Director, Government Relations, NCRA From: Mel Gates Date: December 23, 2013

More information

The Privacy Rule. Health insurance Portability & Accountability Act

The Privacy Rule. Health insurance Portability & Accountability Act The Privacy Rule Health insurance Portability & Accountability Act Enacted on August 21, 1996 to amend the Internal Revenue Code of 1986 To improve portability and continuity of health insurance coverage

More information

Human Research Protection Program (HRPP) HIPAA and Research at Brown

Human Research Protection Program (HRPP) HIPAA and Research at Brown Human Research Protection Program (HRPP) and Research at Brown Version Date: 12/03/2018 I. and Research at Brown A. The Health Insurance Portability and Accountability Act of 1996 () and its regulations,

More information

HIPAA Basic Training for Health & Welfare Plan Administrators

HIPAA Basic Training for Health & Welfare Plan Administrators 2010 Human Resources Seminar HIPAA Basic Training for Health & Welfare Plan Administrators Norbert F. Kugele What We re going to Cover Important basic concepts Who needs to worry about HIPAA? Complying

More information

March 1. HIPAA Privacy Policy. This document includes: HIPAA Privacy Policy Statement, HIPAA Manual and HIPAA Forms

March 1. HIPAA Privacy Policy. This document includes: HIPAA Privacy Policy Statement, HIPAA Manual and HIPAA Forms March 1 2016 HIPAA Privacy Policy This document includes: HIPAA Privacy Policy Statement, HIPAA Manual and HIPAA Forms 1 Table of Contents PRIVACY POLICY STATEMENT... 3 HIPAA PROCEDURES MANUAL... 10 ACCESS

More information

The Impact of Final Omnibus HIPAA/HITECH Rules. Presented by Eileen Coyne Clark Niki McCoy September 19, 2013

The Impact of Final Omnibus HIPAA/HITECH Rules. Presented by Eileen Coyne Clark Niki McCoy September 19, 2013 The Impact of Final Omnibus HIPAA/HITECH Rules Presented by Eileen Coyne Clark Niki McCoy September 19, 2013 0 Disclaimer The material in this presentation is not meant to be construed as legal advice

More information

Highlights of the Omnibus HIPAA/HITECH Final Rule

Highlights of the Omnibus HIPAA/HITECH Final Rule Highlights of the Omnibus HIPAA/HITECH Final Rule Health Law Whitepaper Katherine M. Layman 215.665.2746 klayman@cozen.com Gregory M. Fliszar 215.665.7276 gfliszar@cozen.com Judy Wang Mayer 215.665.4737

More information

8/14/2013. HIPAA Privacy & Security 2013 Omnibus Final Rule update. Highlights from Final Rules January 25, 2013

8/14/2013. HIPAA Privacy & Security 2013 Omnibus Final Rule update. Highlights from Final Rules January 25, 2013 HIPAA Privacy & Security 2013 Omnibus Final Rule update Dan Taylor, Infinisource Copyright 2013 All rights reserved. Highlights from Final Rules January 25, 2013 Made business associates directly liable

More information

True or False? HIPAA Update: Avoiding Penalties. Preliminaries. Kim C. Stanger IHCA (7/15)

True or False? HIPAA Update: Avoiding Penalties. Preliminaries. Kim C. Stanger IHCA (7/15) Protected Health Info HIPAA Update: Avoiding Penalties IHCA (7/15) Preliminaries This presentation is similar to any other legal education materials designed to provide general information on pertinent

More information

HIPAA Overview Health Insurance Portability and Accountability Act. Premier Senior Marketing, Inc

HIPAA Overview Health Insurance Portability and Accountability Act. Premier Senior Marketing, Inc HIPAA Overview Health Insurance Portability and Accountability Act Premier Senior Marketing, Inc HIPAA Defined Acronym that stands for the Health Insurance Portability and Accountability Act, a US law

More information

New HIPAA-HITECH Proposed Regulations Issued

New HIPAA-HITECH Proposed Regulations Issued July 2010 New HIPAA-HITECH Proposed Regulations Issued On Thursday July 14, 2010, the Department of Health and Human Services (HHS) published proposed regulations in the Federal Register on many provisions

More information

University of Mississippi Medical Center Data Use Agreement Protected Health Information

University of Mississippi Medical Center Data Use Agreement Protected Health Information Data Use Agreement Protected Health Information This Data Use Agreement ( DUA ) is effective on the day of, 20, ( Effective Date ) by and between University of Mississippi Medical Center (UMMC) ( Data

More information

SUNY DOWNSTATE MEDICAL CENTER UNIVERSITY HOSPITAL OF BROOKLYN POLICY AND PROCEDURE

SUNY DOWNSTATE MEDICAL CENTER UNIVERSITY HOSPITAL OF BROOKLYN POLICY AND PROCEDURE SUNY DOWNSTATE MEDICAL CENTER UNIVERSITY HOSPITAL OF BROOKLYN POLICY AND PROCEDURE Subject: USE OF LIMITED DATA SETS Page 1 of 3 No. HIPAA-27 Original Issue Date: 12/2003 Prepared by: Shoshana Milstein

More information

HIPAA COMPLIANCE ROADMAP AND CHECKLIST FOR BUSINESS ASSOCIATES

HIPAA COMPLIANCE ROADMAP AND CHECKLIST FOR BUSINESS ASSOCIATES HIPAA COMPLIANCE ROADMAP AND CHECKLIST FOR BUSINESS ASSOCIATES The Health Information Technology for Economic and Clinical Health Act (HITECH Act), enacted as part of the American Recovery and Reinvestment

More information

To: Our Clients and Friends January 25, 2013

To: Our Clients and Friends January 25, 2013 Life Sciences and Health Care Client Service Group To: Our Clients and Friends January 25, 2013 Modifications to the HIPAA Privacy, Security, Enforcement, and Breach Notification Rules under the Health

More information

HIPAA Training. HOPE Health Facility Administrators June 2013 Isaac Willett and Jason Schnabel

HIPAA Training. HOPE Health Facility Administrators June 2013 Isaac Willett and Jason Schnabel HIPAA Training HOPE Health Facility Administrators June 2013 Isaac Willett and Jason Schnabel Agenda HIPAA basics HITECH highlights Questions and discussion HIPAA Basics Legal Basics Health Insurance Portability

More information

HIPAA Omnibus Rule. Critical Changes for Providers Presented by Susan A. Miller, JD. Hosted by

HIPAA Omnibus Rule. Critical Changes for Providers Presented by Susan A. Miller, JD. Hosted by HIPAA Omnibus Rule Critical Changes for Providers Presented by Susan A. Miller, JD Hosted by agenda What the Omnibus Rule includes + Effective and Compliance Dates Security Breach Notification Enforcement

More information

AFTER THE OMNIBUS RULE

AFTER THE OMNIBUS RULE AFTER THE OMNIBUS RULE 1 Agenda Omnibus Rule Business Associates (BAs) Agreement Breach Notification Change Breach Reporting Requirements (Federal and State) Notification to Care1st Health Plan Member

More information

This form cannot act as an authorization to assign commissions. Appointment Form Only. Steps to obtain an Appointment:

This form cannot act as an authorization to assign commissions. Appointment Form Only. Steps to obtain an Appointment: Appointment Form Only Steps to obtain an Appointment: Complete the Personal Information Sheet Entirely The Personal Information Sheet is used to obtain information necessary to establish an appointment

More information

HIPAA. What s New & What Do I Have To Do? Presented by Leslie Canham, CDA, RDA, CSP (Certified Speaking Professional)

HIPAA. What s New & What Do I Have To Do? Presented by Leslie Canham, CDA, RDA, CSP (Certified Speaking Professional) HIPAA Infection Control OSHA Dental Practice Act HIPAA What s New & What Do I Have To Do? Presented by Leslie Canham, CDA, RDA, CSP (Certified Speaking Professional) In the dental field since 1972, Leslie

More information

HIPAA: Final Omnibus Rule is Here Arizona Society for Healthcare Risk Managers November 15, 2013

HIPAA: Final Omnibus Rule is Here Arizona Society for Healthcare Risk Managers November 15, 2013 HIPAA: Final Omnibus Rule is Here Arizona Society for Healthcare Risk Managers November 15, 2013 Pat Henrikson, Banner Health HIPAA Compliance Program Director, Chief Privacy Officer Agenda Background

More information

HIPAA Privacy and Security for Employers in the Age of Common Data Breaches. April 30, 2015

HIPAA Privacy and Security for Employers in the Age of Common Data Breaches. April 30, 2015 HIPAA Privacy and Security for Employers in the Age of Common Data Breaches April 30, 2015 HIPAA Privacy and Security for Employers in the Age of Common Data Breaches Welcome! We will begin at 3 p.m. Eastern

More information

What is HIPAA? (1 of 2)

What is HIPAA? (1 of 2) HIPAA 1 HIPAA On August 21 1996 the federal government passed the Health Information Portability and Accountability Act of 1996 Has been update throughout; with the newest update (Final Rule) going into

More information

UBMD Policy for HIPAA Compliant Subject Recruitment

UBMD Policy for HIPAA Compliant Subject Recruitment UBMD Policy for HIPAA Compliant Subject Recruitment Approved by Executive Committee on December 5, 2016 I. Statement of Purpose This policy is applicable in the situation where the Principle Researcher

More information

HIPAA BUSINESS ASSOCIATE AGREEMENT BEST PRACTICES KURTIN PLLC COMPLIANCE SOLUTION: UPDATE January 3, I. Executive Summary.

HIPAA BUSINESS ASSOCIATE AGREEMENT BEST PRACTICES KURTIN PLLC COMPLIANCE SOLUTION: UPDATE January 3, I. Executive Summary. HIPAA BUSINESS ASSOCIATE AGREEMENT BEST PRACTICES KURTIN PLLC COMPLIANCE SOLUTION: UPDATE 2017 January 3, 2017 I. Executive Summary. The Health Insurance Portability and Accountability Act ( HIPAA ) is

More information

2016 Business Associate Workforce Member HIPAA Training Handbook

2016 Business Associate Workforce Member HIPAA Training Handbook 2016 Business Associate Workforce Member HIPAA Training Handbook Using the Training Handbook The material in this handbook is designed to deliver required initial, and/or annual HIPAA training for all

More information

HIPAA Compliance Under the Magnifying Glass

HIPAA Compliance Under the Magnifying Glass HIPAA Compliance Under the Magnifying Glass July 30, 2013 Stacy Harper, JD, MHSA, CPC A Webinar Provided by Presenter Stacy Harper Lathrop & Gage, LLP sharper@lathropgage.com 913-451-5125 The information

More information

HIPAA Enforcement Under the HITECH Act; The Gloves Come Off

HIPAA Enforcement Under the HITECH Act; The Gloves Come Off HIPAA Enforcement Under the HITECH Act; The Gloves Come Off Leeann Habte, Esq. Michael Scarano, Esq. December 6, 2011 Attorney Advertising Prior results do not guarantee a similar outcome Models used are

More information

HIPAA THE NEW RULES. Highlights of the major changes under the Omnibus Rule

HIPAA THE NEW RULES. Highlights of the major changes under the Omnibus Rule HIPAA THE NEW RULES Highlights of the major changes under the Omnibus Rule AUTHOR Gamelah Palagonia, Founder CIPM, CIPP/IT, CIPP/US, CIPP/G, ARM, RPLU+ PRIVACY PROFESSIONALS LLC gpalagonia@privacyprofessionals.com

More information

HIPAA Security How secure and compliant are you from this 5 letter word?

HIPAA Security How secure and compliant are you from this 5 letter word? HIPAA Security How secure and compliant are you from this 5 letter word? January 29, 2014 www.prnadvisors.com 1 1 About me Over 20 Years in IT as hand-on leader Implemented EMR s of all sizes for Hospitals,

More information

HIPAA Compliance. PART I: HHS Final Omnibus HIPAA Rules

HIPAA Compliance. PART I: HHS Final Omnibus HIPAA Rules HIPAA Compliance PART I: HHS Final Omnibus HIPAA Rules Colin J. Zick Foley Hoag LLP (617) 832-1000 www.foleyhoag.com February 6, 2013 www.securityprivacyandthelaw.com HIPAA Compliance: PART I 1 Finally!

More information

HIPAA HEALTH INSURANCE PORTABILITY & ACCOUNTABILITY ACT

HIPAA HEALTH INSURANCE PORTABILITY & ACCOUNTABILITY ACT HIPAA HEALTH INSURANCE PORTABILITY & ACCOUNTABILITY ACT DEFINITIONS Amend ~ to alter an existing document Civil ~ a type of legal case in which money damages can be awarded Code Set ~ combinations of numbers

More information

Interpreters Associates Inc. Division of Intérpretes Brasil

Interpreters Associates Inc. Division of Intérpretes Brasil Interpreters Associates Inc. Division of Intérpretes Brasil Adherence to HIPAA Agreement Exhibit B INDEPENDENT CONTRACTOR PRIVACY AND SECURITY PROTECTIONS RECITALS The purpose of this Agreement is to enable

More information

HIPAA Privacy Rule Policies and Procedures

HIPAA Privacy Rule Policies and Procedures County of Sacramento Health Insurance Portability and Accountability Act HIPAA Privacy Rule Policies and Procedures Issue Date: April 14, 2003 Effective Date: April 14, 2003 Revised Date: January 2, 2018

More information

UCLA Health System Data Use Agreement

UCLA Health System Data Use Agreement UCLA Health System Data Use Agreement The federal Health Insurance Portability and Accountability Act and the regulations promulgated thereunder (collectively referred to as the Privacy Rule ) permit the

More information

HIPAA vs. GDPR vs. NYDFS - the New Compliance Frontier. March 22, 2018

HIPAA vs. GDPR vs. NYDFS - the New Compliance Frontier. March 22, 2018 1 HIPAA vs. GDPR vs. NYDFS - the New Compliance Frontier March 22, 2018 2 Today s Panel: Kimberly Holmes - Moderator - Vice President, Health Care, Cyber Liability & Emerging Risks, TDC Specialty Underwriters,

More information

The Security Risk Analysis Requirement for MIPS. August 8, 2017, 2:00 p.m. to 3:00 p.m. ET Peter Mercuri, Practice Transformation Specialist

The Security Risk Analysis Requirement for MIPS. August 8, 2017, 2:00 p.m. to 3:00 p.m. ET Peter Mercuri, Practice Transformation Specialist The Security Risk Analysis Requirement for MIPS August 8, 2017, 2:00 p.m. to 3:00 p.m. ET Peter Mercuri, Practice Transformation Specialist Today s Speaker Peter Mercuri Peter Mercuri, MBA, HCISPP, CHSA,CMQP,CEHR,CHTS,CHWP

More information

HIPAA OMNIBUS RULE. The rule makes it easier for parents and others to give permission to share proof of a child s immunization with a school

HIPAA OMNIBUS RULE. The rule makes it easier for parents and others to give permission to share proof of a child s immunization with a school ASPPR The omnibus rule greatly enhances a patient s privacy protections, provides individuals new rights to their health information, and strengthens the government s ability to enforce the law. The changes

More information