HIPAA PRIVACY AND SECURITY AWARENESS

Similar documents
HIPAA Privacy & Security. Transportation Providers 2017

HIPAA Compliance Guide

MEMORANDUM. Health Care Information Privacy The HIPAA Regulations What Has Changed and What You Need to Know

"HIPAA RULES AND COMPLIANCE"

LIMITED DATA SET REQUEST AND DATA USE AGREEMENT

HIPAA The Health Insurance Portability and Accountability Act of 1996

The Health Insurance Portability and Accountability Act (HIPAA) A guided tutorial for GVSU employees

Effective Date: 4/3/17

Determining Whether You Are a Business Associate

AMA Practice Management Center, What you need to know about the new health privacy and security requirements

ARE YOU HIP WITH HIPAA?

1 Security 101 for Covered Entities

Frequently Asked Questions About the HIPAA Privacy Rule

CHAPTER 33 HIPAA PRIVACY REGULATIONS

Saturday, April 28 Medical Ethics: HIPAA Privacy and Security Rules

Health Insurance Portability and Accountability Act - HIPAA

HIPAA & HITECH Privacy & Security. Volunteer Annual Review 2017

2016 Business Associate Workforce Member HIPAA Training Handbook

HIPAA FUNDAMENTALS For Substance abuse Treatment Industry

HIPAA and Lawyers: Your stakes have just been raised

DELHAIZE AMERICA PHARMACIES AND WELFARE BENEFIT PLAN HIPAA SECURITY POLICY (9/1/2016 VERSION)

HIPAA & The Medical Practice

HIPAA Privacy, Breach, & Security Rules

University of California Group Health and Welfare Benefit Plans HIPAA Privacy Rule Policies and Procedures (Interim)

HIPAA Redux 2013 Kim Cavitt, AuD Audiology Resources, Inc. Expert e-seminar 4/29/2013. HIPAA Redux Presented by: Kim Cavitt, AuD

March 1. HIPAA Privacy Policy

2011 Miller Johnson. All rights reserved. 1. HIPAA Compliance: Privacy and Security Changes under HITECH HITECH. What is HITECH? Mary V.

OMNIBUS COMPLIANT BUSINESS ASSOCIATE AGREEMENT RECITALS

[Name of Organization] HIPAA Incident/Breach Investigation Procedure 4

The Privacy Rule. Health insurance Portability & Accountability Act

HIPAA 2014: Recent Changes from HITECH and the Omnibus Rule. Association of Corporate Counsel Houston Chapter October 14, 2014.

HITECH and HIPAA: Highlights for Health Departments. Aimee Wall UNC School of Government

HIPAA COMPLIANCE. for Small & Mid-Size Practices

HIPAA Security How secure and compliant are you from this 5 letter word?

LEGAL ISSUES IN HEALTH IT SECURITY

AGREEMENT FOR ACCESS TO PROTECTED HEALTH INFORMATION

HIPAA Business Associate Agreement

HIPAA Background and History

GUIDE TO PATIENT PRIVACY AND SECURITY RULES

JEFFERSON HEALTH CARE LINK ACCESS AGREEMENT

Preparing for a HIPAA Audit & Hot Topics in Health Care Reform

Getting a Grip on HIPAA

NOTICE OF PRIVACY PRACTICES

NOTIFICATION OF PRIVACY AND SECURITY BREACHES

HIPAA HEALTH INSURANCE PORTABILITY & ACCOUNTABILITY ACT

Privacy Policy Training

HIPAA PRIVACY REQUIREMENTS. Dana L. Thrasher Constangy, Brooks & Smith, LLP (205)

EGYPTIAN ELECTRIC COOPERATIVE ASSOCIATION POLICY BULLETIN NO. 214A

HIPAA Basics: IMPORTANT HIPAA CONCEPTS. What We re going to Cover. Training for Employee Benefits Staff

HIPAA HEALTH INSURANCE PORTABILITY & ACCOUNTABILITY ACT

EXCERPT. Do the Right Thing R1112 P1112

HIPAA s Medical Privacy Standards:

HIPAA: Impact on Corporate Compliance

HIPAA Basic Training for Health & Welfare Plan Administrators

The wait is over HHS releases final omnibus HIPAA privacy and security regulations

HIPAA PRIVACY REQUIREMENTS. Dana L. Thrasher Robert S. Ellerbrock, III Constangy, Brooks & Smith, LLP

THE HIPAA PRIVACY RULE: Minimally Necessary Disclosure of Protected Health Information

Hayden W. Shurgar HIPAA: Privacy, Security, Enforcement, HITECH, and HIPAA Omnibus Final Rule

Conduct of covered entity or business associate. Did not know and, by exercising reasonable diligence, would not have known of the violation

What Brown County employees need to know about the Federal legislation entitled the Health Insurance Portability and Accountability Act of 1996.

Texas Health and Safety Code, Chapter 181 Medical Records Privacy Law, HB 300

The HIPAA Omnibus Rule and the Enhanced Civil Fine and Criminal Penalty Regime

HIPAA Service Description

IACT Medical Trust. June 28, Jim Hamilton (317) HIPAA Privacy Training Bose McKinney & Evans LLP

8/14/2013. HIPAA Privacy & Security 2013 Omnibus Final Rule update. Highlights from Final Rules January 25, 2013

HIPAA Security. ible. isions. Requirements, and their implementation. reader has

HEALTH INFORMATION PRIVACY POLICIES & PROCEDURES

HIPAA Overview Health Insurance Portability and Accountability Act. Premier Senior Marketing, Inc

Privacy and Data Breach Protection Modular application form

HIPAA AND YOU 2017 G E R A L D E MELTZER, MD MSHA

COUNTY SOCIAL SERVICES POLICIES AND PROCEDURES FOR COMPLIANCE WITH THE HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT OF 1996 HIPAA

HIPAA Compliance Under the Magnifying Glass

Cyber, Data Risk and Media Insurance Application form

Upper Bay Counseling & Support Services, Inc. (Administration)

Privacy and Security Laws Beyond HIPAA: Protecting Consumer Information. Webinar Presented by Laura Bird January 29, 2014

HIPAA BUSINESS ASSOCIATE AGREEMENT BUSINESS ASSOCIATES AND SUBCONTRACTORS

CROOK COUNTY POLICY AND PROCEDURES FOR COMPLIANCE WITH THE HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT OF

March 1. HIPAA Privacy Policy. This document includes: HIPAA Privacy Policy Statement, HIPAA Manual and HIPAA Forms

Business Associate Agreement For Protected Healthcare Information

Regenstrief Center for Healthcare Engineering HIPAA Compliance Policy

HIPAA AND LANGUAGE SERVICES IN HEALTH CARE 1

BUSINESS ASSOCIATE AGREEMENT

SDM Health Insurance Portability and Accountability Act (HIPAA) Terms and Conditions For Business Associates

HIPAA HEALTH INSURANCE PORTABILITY & ACCOUNTABILITY ACT

HIPAA in the Digital Age. Anisa Kelley and Rachel Procopio Maryan Rawls Law Group Fairfax, Virginia

HIPAA THE NEW RULES. Highlights of the major changes under the Omnibus Rule

NPRM: Modifications to the HIPAA Privacy, Security, and Enforcement Rules under HITECH

HIPAA Privacy Policy and Procedures Supplement for KP-IT

CREDIT CARD PROCESSING AND SECURITY

ALERT. November 20, 2009

Locus Health Privacy Policies and Procedures Rev

SECURITY POLICY 1. Security of Services. 2. Subscriber Security Administration. User Clearance User Authorization User Access Limitations

It s as AWESOME as You Think It Is!

HTKT.book Page 1 Monday, July 13, :59 PM HIPAA Tool Kit 2017

H 7789 S T A T E O F R H O D E I S L A N D

Notice of Privacy Policies

HIPAA AND ONLINE BACKUP WHAT YOU NEED TO KNOW ABOUT

The Guild for Exceptional Children HIPAA Breach Notification Policy and Procedure

Privacy in Health Care

HIPAA Omnibus Final Rule Has Important Changes for Business Associates and Covered Entities

Transcription:

HIPAA PRIVACY AND SECURITY AWARENESS

Introduction The Health Insurance Portability and Accountability Act (known as HIPAA) was enacted by Congress in 1996. HIPAA serves three main purposes: To protect people from losing their health insurance if they change jobs or have pre-existing health conditions. To reduce the costs and administrative burdens of healthcare by creating standard electronic formats for many administrative transactions that were previously carried out on paper. To develop standards and requirements to protect the privacy and security of personal health information.

Entities covered by the Privacy and Security Rules include: Healthcare plans Introduction Healthcare providers Healthcare clearinghouses Business associates of covered entities, which include auditors, consultants, lawyers, data and billing firms and others with whom the covered entities have agreements involving the use of protected health information.

Protected Health Information No matter what form it takes, notes on a medical chart, health information entered into a computer or discussions about a patient s condition, any identifiable health information becomes protected health information (PHI) under HIPAA. A covered entity may not use or disclose protected health information except: As the individual authorizes in writing; or As the HIPAA Privacy Rule permits or requires.

Protected Health Information PHI can be disclosed: To the individual or their authorized representative. For treatment, payment or healthcare operations. When the individual has the opportunity to agree or object, such as when the patient brings another person into the exam room for their office visit. Incidental to an otherwise permitted use. For the purposes of research or public health. Professional ethics and good judgment should also be relied upon in deciding which of these permissive uses and disclosures to make.

Protected Health Information Covered entities are required to provide patients with a Notice of Privacy Practices and make a good faith effort to obtain a patient s written acknowledgment of receiving the notice. The notice must inform patients of (1) the uses and disclosures of PHI that may be made, (2) the patient s right to access and amend their medical information, and (3) the covered entity s responsibilities with respect to PHI. The entity may use PHI for its own treatment, payment or healthcare operations and may disclose PHI to other covered entities. Reasonable efforts to limit PHI to the minimum necessary should be taken when using or requesting PHI.

Patient Access Except in certain circumstances, individuals have the right to review and obtain copies of their protected health information. Personal representatives, parents of minors and others may also be legally authorized to make healthcare decisions on behalf of patients. Covered entities may impose reasonable, cost-based fees (postage and cost of copying) for PHI request.

Other Uses of PHI As a general rule, covered entities may not use or disclose PHI for any purpose other than treatment, payment and healthcare operations without the patient s written authorization. The Privacy Rule does allow for incidental disclosure of PHI as long as the covered entity used reasonable safeguards and adheres to the minimum necessary standard. For example, the use of waiting room sign-in sheets would be considered incidental disclosure of PHI.

Administrative Safeguards Since many employees receive, store and transmit PHI as part of their daily routine, the Privacy Rule requires the following safeguards: A Privacy Officer must be designated for the purpose of developing and implementing privacy policies and the receiving of complaints. All workforce members must be trained on privacy policies and procedures.

Administrative Safeguards Requires all business associates must confirm that they will protect PHI. A system must be developed to track who accessed what information. Rules must be implemented for addressing violations of privacy, security and transaction regulations, and establish a process for making complaints and preventing retaliation against anyone who reports a HIPAA violation.

Safeguards for Security Administrative Safeguards Requirements include: Designating a Security Officer in charge of developing, implementing and evaluating security policies. This may be the same person as the Privacy Officer. Ensuring computers are secure from intrusion. Applying appropriate sanctions against employees who fail to comply with HIPAA policies.

Safeguards for Security Implementing procedures to regularly review records of information system activity. Developing a plan for granting and limiting different levels of access to PHI, including clearance and termination procedures. This includes security checks and special training for all employees with access to sensitive information. Providing a contingency plan for responding to system emergencies. Implementing procedures for reporting and dealing with security breaches.

Physical Safeguards Safeguards for Security The Security Rule also requires a number of physical steps to ensure that PHI contained in computers is protected. A facility security plan should be developed that deters intruders from accessing areas where PHI resides. Guidelines should be established on how to handle sensitive information that may be displayed on computer screens. The safeguarding of information on hardware and software must also be utilized, as well as, procedures for off-site data backup.

Safeguards for Security Technical Safeguards The Security Rule requires certain technical safeguards for PHI. Controls to ensure that access to sensitive information is available on a need-to-know basis must be established. Audit controls to record and examine system activity. Controls to help ensure that health data has not been altered in an unauthorized manner.

Safeguards for Security Controls to ensure that data is sent to the intended recipient and received by the intended party ( including the use of passwords, PIN numbers and encryption). Controls to protect PHI sent via e-mail and fax. According to the Security Rule, it is permissible to use the internet to transmit PHI. An acceptable method of encryption must be used and appropriate authentication procedures followed to ensure correct identification of the sender and receiver. Faxes are not considered to be covered transactions by the Security Rule. They may be sent as authorized by your company s privacy policy.

Compliance and Enforcement The HIPAA regulations are now completely in effect and failure to comply with the HIPAA Privacy or Security Rules can lead to significant financial and other penalties. Civil and criminal penalties, to both individuals and companies, may be enforced and include fines up to $1.5 million and ten years of imprisonment. It is important that all who may come into contact with PHI understand and carry out their responsibilities under these rules, as outlined in this training program.