INFORMATION SECURITY TRAINING: CONTRACT PROVIDERS Designed for Pathways Community Mental Health 2015.

Slides:



Advertisements
Similar presentations
HIPAA: An Overview of Transaction, Privacy and Security Regulations Training for Providers and Staff.
Advertisements

HITECH ACT Privacy & Security Requirements Cathleen Casagrande Privacy Officer July 23, 2009.
HIPAA Basics Brian Fleetham Dickinson Wright PLLC.
HIPAA Basics November 1, 2014.
1. As a Florida KidCare community partner families entrust you to not only help them navigate the Florida KidCare system but to keep the information they.
HIPAA Privacy Training. 2 HIPAA Background Health Insurance Portability and Accountability Act of 1996 Copyright 2010 MHM Resources LLC.
Health Insurance Portability and Accountability Act HIPAA Education for Volunteers and Students.
HIPAA. What Why Who How When What Is HIPAA? Health Insurance Portability & Accountability Act of 1996.
HIPAA Basic Training for Privacy & Information Security Vanderbilt University Medical Center VUMC HIPAA Website:
Confidentiality and HIPAA
The Health Insurance Portability and Accountability Act of 1996– charged the Department of Health and Human Services (DHHS) with creating health information.
HIPAA What’s New? What Is HIPAA Health Insurance Portability and Accountability Act of 1996 Health Insurance Portability and Accountability Act.
What is HIPAA? This presentation was created by The University of Arizona Privacy Office, The Office for the Responsible Conduct of Research on March 5,
1 HIPAA Education CCAC Professional Development Training September 2006 CCAC Professional Development Training September 2006.
Key Changes to HIPAA from the Stimulus Bill (ARRA) Children’s Health System Department Leadership Meeting October 28, 2009 Kathleen Street Privacy Officer/Risk.
NAU HIPAA Awareness Training
HIPAA Basics A Matter of Integrity. Introduction “A Matter of Integrity” defines HIPAA and protecting patient health information. Success depends on our.
CHAPTER © 2011 The McGraw-Hill Companies, Inc. All rights reserved. 2 The Use of Health Information Technology in Physician Practices.
HIPAA: FEDERAL REGULATIONS REGARDING PATIENT SECURITY.
HIPAA Regulations What do you need to know?.
© 2011 The McGraw-Hill Companies, Inc. All rights reserved. 2.5 HIPAA Legislation and its Impact on Physician Practices 2-15 The Health Insurance Portability.
COMPLYING WITH HIPAA PRIVACY RULES Presented by: Larry Grudzien, Attorney at Law.
Health Insurance Portability & Accountability Act “HIPAA” To every patient, every time, we will provide the care that we would want for our own loved ones.
2014 HIPAA Refresher Omnibus Rule & HIPAA Security.
Are you ready for HIPPO??? Welcome to HIPAA
Professional Nursing Services.  Privacy and Security Training explains:  The requirements of the federal HIPAA/HITEC regulations, state privacy laws.
1 Electronic Information Security – What Researchers Need to Know University of California Office of the President Office of Research May 2005.
© Copyright 2014 Saul Ewing LLP The Coalition for Academic Scientific Computation HIPAA Legal Framework and Breach Analysis Presented by: Bruce D. Armon,
HIPAA What’s Said Here – Stays Here…. WHAT IS HIPAA  Health Insurance Portability and Accountability Act  Purpose is to protect clients (patients)
HIPAA COMPLIANCE IN YOUR PRACTICE MARIBEL VALENTIN, ESQUIRE.
HIPAA Health Insurance Portability & Accountability Act of 1996.
HIPAA – Health Insurance Portability & Accountability Act and the Privacy Act MSgt Nechele M. Chambers Senior Enlisted Liaison TRICARE Area Office-Europe.
HIPAA Basic Training for Privacy and Information Security Vanderbilt University Medical Center VUMC HIPAA Website: HIPAA Basic.
The University of Kansas Medical Center Shadow Experience Training.
The Use of Health Information Technology in Physician Practices
HIPAA PRIVACY AND SECURITY AWARENESS.
“ Technology Working For People” Intro to HIPAA and Small Practice Implementation.
How Hospitals Protect Your Health Information. Your Health Information Privacy Rights You can ask to see or get a copy of your medical record and other.
HIPAA Training Developed for Ridgeview Institute 2012 Hospital Wide Orientation.
HIPAA Michigan Cancer Registrars Association 2005 Annual Educational Conference Sandy Routhier.
LeToia Crozier, Esq., CHC Vice President, Compliance & Regulatory Affairs Corey Wilson Director of Technical Services & Security Officer Interactive Think.
Health Insurance Portability and Accountability Act of 1996 HIPAA Privacy Training for County Employees.
Understanding HIPAA (Health Insurandce Portability and Accountability Act)
HIPAA BASIC TRAINING Presented by Anderson Health Information Systems, Inc.
The Culture of Healthcare Privacy, Confidentiality, and Security Lecture d This material (Comp2_Unit9d) was developed by Oregon Health and Science University,
Copyright ©2014 by Saunders, an imprint of Elsevier Inc. All rights reserved 1 Chapter 02 Compliance, Privacy, Fraud, and Abuse in Insurance Billing Insurance.
HITECH and HIPAA Presented by Rhonda Anderson, RHIA Anderson Health Information Systems, Inc
A Road Map to Research at Jefferson: HIPAA Privacy and Security Rules for Researchers Presented By: Privacy Officer/Office of Legal Counsel October 2015.
Welcome….!!! CORPORATE COMPLIANCE PROGRAM Presented by The Office of Corporate Integrity 1.
Western Asset Protection
Copyright © 2015 by Saunders, an imprint of Elsevier Inc. All rights reserved. Chapter 3 Privacy, Confidentiality, and Security.
Top 10 Series Changes to HIPAA Devon Bernard AOPA Reimbursement Services Coordinator.
Configuring Electronic Health Records Privacy and Security in the US Lecture b This material (Comp11_Unit7b) was developed by Oregon Health & Science University.
HIPAA Overview Why do we need a federal rule on privacy? Privacy is a fundamental right Privacy can be defined as the ability of the individual to determine.
 Health Insurance and Accountability Act Cornelius Villalon Jr.
The Health Insurance Portability and Accountability Act of 1996 “HIPAA” Public Law
The Health Insurance Portability and Accountability Act (HIPAA) requires Plumas County to train all employees in covered departments about the County’s.
1 HIPAA’s Impact on Depository Financial Institutions 2 nd National Medical Banking Institute Rick Morrison, CEO Remettra, Inc.
Health Insurance Portability and Accountability Act of 1996
UNDERSTANDING WHAT HIPAA IS AND IS NOT
HIPAA Privacy & Security
What is HIPAA? HIPAA stands for “Health Insurance Portability & Accountability Act” It was an Act of Congress passed into law in HEALTH INSURANCE.
HIPAA.
By: Eamon Callahan and Wilston Johnston
HIPAA PRIVACY AWARENESS, COMPLIANCE and ENFORCEMENT
Disability Services Agencies Briefing On HIPAA
HIPAA Privacy & Security
HIPAA SECURITY RULE Copyright © 2008, 2006, 2004 by Saunders an imprint of Elsevier Inc. All rights reserved.
The Health Insurance Portability and Accountability Act
Introduction to the PACS Security
Presentation transcript:

INFORMATION SECURITY TRAINING: CONTRACT PROVIDERS Designed for Pathways Community Mental Health 2015

Passwords and Pass Phrases ELMER Security Reporting Security Incidents HIPAA & HITECH The topics of this training include: The goal of this training is to acquaint you with the basics of information security and the HIPAA Security Rule.

Health Insurance Portability and Accountability Act of 1996 (HIPAA) HIPAA is a federal mandate dealing with a variety of issues. The original goal was to make transferring from one health insurance plan to another easier as people changed jobs or became unemployed. To make it easier to share information between healthcare providers, HIPAA required healthcare providers and payers to submit transactions (e.g. patient claims) in a standardized electronic format. As information becomes easier to transmit, it also becomes easier for the information to be lost, stolen or abused. Digitizing patient records allows for efficient transmission of information but comes with associated risks. HIPAA requirements for reasonable and appropriate security of patient information are critical to maintaining the confidentiality, integrity and availability of this information. Virtually all healthcare organizations that engage in electronic transactions are required to comply with HIPAA. These organizations are referred to as “covered entities” under HIPAA. Pathways meets the criteria to be considered a covered entity. Contractors that performs certain functions or activities that involve the use or disclosure of protected health information on behalf of, or provides services to, a covered entity are considered a Business Associate. The organization you work for is considered a Business Associate of Pathways. Administrative Simplification [Accountability] Insurance Reform [Portability] Health Insurance Portability and Accountability Act (HIPAA) Transactions, Code Sets, & Identifiers Privacy Rule Security Rule

On February 17, 2009, President Obama signed the American Recovery and Reinvestment Act of A portion of the bill created the Health Information Technology for Economic and Clinical Health Act (HITECH). The HITECH Act substantially expanded the HIPAA Privacy and Security Rules and increases the penalties for violations of HIPAA. Three important HITECH requirements are: 1.HITECH established mandatory federal security breach reporting requirements for HIPAA Covered Entities and their Business Associates. Covered entities now must notify each person whose unsecured PHI is disclosed in a breach. Under certain circumstances, a breach may involve notifying the local newspapers and television broadcasters of the incident. The U.S. Department of Health and Human Services has established a list of breaches of unsecured protected health information affecting 500 or more individuals. The list has been nicknamed the “Wall of Shame”. You can view the list here: 2.Under the HITECH Act, Business Associates are directly subject to the administrative, physical and technical safeguard requirements of the Security Rule, as well as the requirements to maintain policies, procedures, and documentation of security activities in the same manner that such sections apply to the covered entity. 3. Establish new criminal and civil penalties for noncompliance. The act provides a four tiered system for assessing the level and penalty of each violation. Penalties quickly escalate from a minimum of $100 per violation with a $25,000 max per calendar year to $50,000 per violation and $1.5 million for the calendar year. The Feds appear to be very serious about issuing penalties under HITECH. Civil and criminal penalties for violation of the HIPAA security rule apply to a Business Associates in the same manner as they apply to a Covered Entities. Pathways has always upheld strict privacy and security policies. It is critical that Pathways’ Business Associates also be vigilant in protecting the confidentiality of consumer information.

Don’t use a word that can easily be found in a dictionary. Words commonly found in a dictionary can be cracked in minutes. Don’t share your password – protect it the same as you would the key to your residence. After all, it is a “key” to your identity. Use eight characters at a minimum which should contain Uppercase letters (A-Z), lowercase letters (a-z), and numbers (0-9). Your personal passwords (e.g. hotmail, Myspace, Facebook, on-line banking) should be different than the passwords you use at your job. To safeguard YOUR computing account, YOU need to take steps to protect YOUR password. When choosing a password: Each user is assigned a unique user ID and password. The credentials are assigned to the individual and that individual ONLY. It may seem like a good idea to share credentials with a co-worker that has not been assigned access to an application. However, that would undermine the key security principle of accountability. The computer system’s auditing would indicate all activity conducted under your user ID to be attributed to you. In other words, you may take the blame for their conduct.

A Pass Phrase is a good alternative to complex password A pass phrase uses words to create a sentence—like phrase. For example, “UP summers r great” is an 18 character (including spaces) pass phrase containing upper and lower characters. Unlike passwords, pass phrases can’t be found in the dictionary and are much harder to guess. Tips for Pass Phrases: Misspelling or abbreviating words adds complexity to the pass phrase Pass phrases should not contain famous quotations from literature, movies, etc. The Pathways’ Information Security Team recommends using pass phrases or complex passwords in all Pathways systems, including ELMER.

Read more here:

ELMER In the age of electronic health records, maintaining the security of ELMER is imperative. Here are a few rules to follow: NEVER share your username and password! Sharing your user -name and password may result in falsification of clinical documentation. Make sure you log out of ELMER when you leave your PC unattended. Do not allow Internet Explorer to remember your username and password. Remember to choose a location which will maintain confidentiality. Safe and Secure ELMER Only access consumer charts you have been authorized to access!

When users log into the Pathways network or ELMER with someone else’s username and password. A privacy or security breach to consumer information. A breach is considered discovered on the first day a covered entity or Business Associate knows or should have known about it. Covered entities and BAs must notify individuals about a breach as soon as possible but no later than 60 days following discovery of the breach. A delay in reporting a breach may result in penalties by the U.S. Health and Human Services. Here are a couple events that require reporting to Pathways: Reporting security incidents is important so that security problems can be detect, mitigated and prevent You are responsible for reporting security incidents as soon as possible. All reports need to be communicated to Pathways. Please refer to the Business Associate Agreement for details on how and what to report.

Pathways’ Business Associates need to be vigilant in protecting the privacy and security of Protected Health Information. Here are a few resources to help guide your security program:

Do you have questions on the material contained in this training? If so, please contact either Matt Maskart or Faye Witte for clarification. Matt Maskart Pathways HIPAA Security Officer Phone #: Faye Witte Pathways HIPAA Privacy Officer Phone #: