HIPAA Training. What information is considered PHI (Protected Health Information)  Dates- Birthdays, Dates of Admission and Discharge, Date of Death.

Slides:



Advertisements
Similar presentations
Independent Contractor Orientation HIPAA What Is HIPAA? Health Insurance Portability and Accountability Act of 1996 The Health Insurance Portability.
Advertisements

Presented by Elena Chan, UCSF Pharm.D. Candidate Tiffany Jew, USC Pharm.D. Candidate March 14, 2007 P HARMACEUTICAL C ONSULTANTS, I NC. P RO P HARMA HIPAA.
HIPAA Basics Brian Fleetham Dickinson Wright PLLC.
HIPAA Privacy Training. 2 HIPAA Background Health Insurance Portability and Accountability Act of 1996 Copyright 2010 MHM Resources LLC.
Health Insurance Portability and Accountability Act HIPAA Education for Volunteers and Students.
HIPAA. What Why Who How When What Is HIPAA? Health Insurance Portability & Accountability Act of 1996.
HIPAA Basic Training for Privacy & Information Security Vanderbilt University Medical Center VUMC HIPAA Website:
COBB/DOUGLAS COMMUNITY SERVICES BOARD Confidentiality and Privacy of Consumer Information.
National Health Information Privacy and Security Week Understanding the HIPAA Privacy and Security Rule.
HIPAA – Privacy Rule and Research USCRF Research Educational Series March 19, 2003.
Increasing public concern about loss of privacy Broad availability of information stored and exchanged in electronic format Concerns about genetic information.
The Health Insurance Portability and Accountability Act of 1996– charged the Department of Health and Human Services (DHHS) with creating health information.
WORKFORCE CONFIDENTIALITY HIPAA Reminders. HIPAA 101 The Health Insurance Portability and Accountability Act (HIPAA) protects patient privacy. HIPAA is.
HIPAA Health Insurance Portability and Accountability Act.
What is HIPAA? This presentation was created by The University of Arizona Privacy Office, The Office for the Responsible Conduct of Research on March 5,
1 HIPAA Education CCAC Professional Development Training September 2006 CCAC Professional Development Training September 2006.
NAU HIPAA Awareness Training
Informed Consent.
HIPAA Privacy Rule Compliance Training for YSU April 9, 2014.
 The Health Insurance Portability and Accountability Act of  Federal Law designed to protect sensitive information.  HIPAA violations are enforced.
Health Insurance Portability & Accountability Act “HIPAA” To every patient, every time, we will provide the care that we would want for our own loved ones.
Are you ready for HIPPO??? Welcome to HIPAA
HIPAA HIPAA Health Insurance Portability and Accountability Act of 1996.
Professional Nursing Services.  Privacy and Security Training explains:  The requirements of the federal HIPAA/HITEC regulations, state privacy laws.
Health Insurance Portability and Accountability Act (HIPAA)
HEAVEN’S HANDS COMMUNITY SERVICE H.I.P.A.A. What is HIPAA? HIPAA stands for the Health Insurance Portability and Accountability Act, which was passed.
HIPAA COMPLIANCE IN YOUR PRACTICE MARIBEL VALENTIN, ESQUIRE.
Health Insurance Portability and Accountability Act (HIPAA)
Columbia University Medical Center Health Insurance Portability and Accountability Act of 1996 (“HIPAA”) Privacy & Information Security Training 2009.
Protected Health Information (PHI). Privileged Communication An exchange of information between two individuals in a confidential relationship. (Examples:
HIPAA PRIVACY AND SECURITY AWARENESS.
Confidentiality, Consents and Disclosure Recent Legal Changes and Current Issues Presented by Pam Beach, Attorney at Law.
Privacy and Security of Protected Health Information NorthPoint Health & Wellness Center 2011.
Next ETCH Confidentiality and HIPAA Annual Review What you need to know. The Privacy Rule 1.
Copyright ©2011 by Pearson Education, Inc. Upper Saddle River, New Jersey All rights reserved. Health Information Technology and Management Richard.
HIPAA Training Developed for Ridgeview Institute 2012 Hospital Wide Orientation.
HIPAA (health insurance portability and accountability act)
Building a Privacy Foundation. Setting the Standard for Privacy Health Insurance Portability and Accountability Act (HIPAA) Patient Bill of Rights Federal.
Copyright © 2009 by The McGraw-Hill Companies, Inc. All Rights Reserved. McGraw-Hill Chapter 6 The Privacy and Security of Electronic Health Information.
Understanding HIPAA (Health Insurandce Portability and Accountability Act)
© 2013 The McGraw-Hill Companies, Inc. All rights reserved. Ch 8 Privacy Law and HIPAA.
HIPAA BASIC TRAINING Presented by Anderson Health Information Systems, Inc.
HIPAA BASIC TRAINING MODULE 1C – Overview (For staff who do not generally create Protected Health Information) Anderson Health Information Systems, Inc.
HIPAA THE PRIVACY RULE. 2 HISTORY In 2000, many patients that were newly diagnosed with depression received free samples of anti- depressant medications.
C HAPTER 34 Code Blue Health Sciences Edition 4. Confidentiality of sensitive information is an important issue in healthcare. Breaches of confidentiality.
A Road Map to Research at Jefferson: HIPAA Privacy and Security Rules for Researchers Presented By: Privacy Officer/Office of Legal Counsel October 2015.
1 Privacy Plan of Action © HIPAA Pros 2002 All rights reserved.
HIPAA Overview Why do we need a federal rule on privacy? Privacy is a fundamental right Privacy can be defined as the ability of the individual to determine.
HIPAA TRIVIA Do you know HIPAA?. HIPAA was created by?  The Affordable Care Act  Health Insurance companies  United States Congress  United States.
Board of Directors – March 24, 2016 Denise Mannon, AHFI, CHPC Corporate Compliance Officer.
The Medical College of Georgia HIPAA Privacy Rule Orientation.
Health Insurance Portability and Accountability Act (HIPAA) © 2013 Project Lead The Way, Inc.Principles of Biomedical Science.
New Hire HIPAA Orientation. HIPAA Overview HIPAA is an acronym that stands for the Health Insurance Portability and Accountability Act of HIPAA.
What is HIPAA? Health Insurance Portability and Accountability Act of HIPAA is a major law primarily concentrating on the prolongation of health.
The Health Insurance Portability and Accountability Act (HIPAA) requires Plumas County to train all employees in covered departments about the County’s.
Health Insurance Portability and Accountability Act (HIPAA) Primer for Observers, Volunteers, Medical Students Dr. Michael Palumbo- Privacy Officer/ EVP.
Developed for Ridgeview Institute 2015 Hospital Wide Orientation
HIPAA Privacy and Security
Protecting PHI & PII 12/30/2017 6:45 AM
HIPAA PRIVACY & SECURITY TRAINING
HIPAA Privacy & Security
HIPAA PRIVACY AWARENESS, COMPLIANCE and ENFORCEMENT
Disability Services Agencies Briefing On HIPAA
HIPAA Privacy & Security
HIPAA Overview.
The Health Insurance Portability and Accountability Act
HIPAA & PHI TRAINING & AWARENESS
HIPAA Do’s and Don'ts: What is Really Behind Protected Health Information (PHI) and Health Care Privacy Rules Paul Sisler, Director, Information Services;
The Health Insurance Portability and Accountability Act
Presentation transcript:

HIPAA Training

What information is considered PHI (Protected Health Information)  Dates- Birthdays, Dates of Admission and Discharge, Date of Death.  Address, Phone Number, Address, Fax Number.  Social Security Number, Medicaid ID, Medicare ID, Health Insurance ID.  The individual’s past, present or future medical/mental health diagnosis, treatment or condition.  The provision of health care services to the individual  The past, present or future payment for the provision of health care to the individual, and that identifies the individual or for which there is reasonable basis to believe can be used to identify the individual.

ePHI- What is it and how do we protect it?  ePHI is and protected health information (PHI) that is stored or transmitted electronically.  ePHI is stored in our EMR, may be stored on our computer, on JASA servers and may be transmitted via , text or other online portals.  ePHI should be transmitted via with extreme caution. When ing ePHI within JASA use as little information as necessary to get the job done (minimum necessary).  Ensure that your is addressed to the correct recipient.  Any ePHI being ed outside of JASA needs to be encrypted or sent with password protection.

How to Password Protect a Word Document  Require a password to open a document  Open the document that you want to help protect.  On the Word menu, click Preferences.  Under Personal Settings, click Security.  In the Password to open box, type a password, and then click OK.  In the Confirm Password dialog box, type the password again, and then click OK.

How can we protect PHI/ ePHI?  Confirm fax numbers before faxing PHI to another provider.  Carefully address all PHI being sent in the mail.  Password protect and/ or encrypt smart phones and laptops that contain ePHI.  Be mindful of where you discuss an individual’s diagnosis, treatment or condition.  Keep all PHI out of sight and put away in locked draws or chart rooms.  Keep ePHI out of view by positioning monitors in a way that others cannot view information when passing by.  Staff should only view client records, when for business purposes, there is “need to know.”

HIPAA Privacy Rule and Sharing Information Related to Mental Health  The Health Insurance Portability and Accountability Act (HIPAA) Privacy Rule provides consumers with important privacy rights and protections with respect to their health information, including important controls over how their health information is used and disclosed by health plans and health care providers. Ensuring strong privacy protections is critical to maintaining individuals’ trust in their health care providers and willingness to obtain needed health care services, and these protections are especially important where very sensitive information is concerned, such as mental health information. At the same time, the Privacy Rule recognizes circumstances arise where health information may need to be shared to ensure the patient receives the best treatment and for other important purposes, such as for the health and safety of the patient or others. The Rule is carefully balanced to allow uses and disclosures of information— including mental health information—for treatment and these other purposes with appropriate protections.

The proper way to share PHI is with an authorization  What health information will be disclosed  Who will disclose the information  Who will receive the information  The purpose(s) for disclosing the information  A statement informing the patient of (1) his or her right to revoke the authorization in writing, (2) how to revoke the authorization, and (3) any exceptions to the right to revoke  A statement that JASA cannot require the patient to sign the authorization in order to receive treatment or payment or to enroll or be eligible for benefits  A statement that information disclosed pursuant to the authorization may be redisclosed by the recipient and no longer protected by the federal privacy regulations  A statement that the authorization will expire: (1) on a specific date, (2) after a specific amount of time (e.g., 5 years), or (3) upon the occurrence of some event related to the patient  The signature of the patient and the date. Note: If the patient’s personal representative signs the authorization, the authorization also must include a description of that person’s authority to act for the patient.

When can you share information without an authorization?  An authorization is not needed for Treatment, Payment or Operations (TPO)  Examples: The billing department needs information about a client’s diagnosis in order to submit a claim. (Payment, Operations)  A JASA therapist can share important clinical information about a client they treat with another JASA therapist who is providing back-up coverage or crisis coverage (Treatment, Operations). When sharing information for TPO the information shared should be the minimum necessary to get the job done effectively. Information can also be shared without authorization in case of an emergency where the client or others are in danger.

Minimum Necessary  Members of the JASA workforce may not use, request or disclose to others, any PHI that is more than the minimum necessary to accomplish the purpose of the use, request or disclosure;  Members of the workforce are required to comply with specific policies and procedures established to limit uses of, requests for, or disclosures of, PHI to the minimum amount necessary;  JASA workers may not use, disclose or request an entire medical record except when the entire medical record is specifically justified as the amount that is reasonably necessary to accomplish the purpose of the use, disclosure or request;  JASA may rely on a request from a covered entity for PHI as representing the minimum necessary for the stated purpose, if such reliance is reasonable under the circumstances, and if:  The information is requested by another covered entity; or,  The information is requested by a professional who is a member of the JASA workforce or is a JASA business associate; and  The purpose of the request is to provide professional services to the covered entity; and  The professional represents that the information requested is the minimum necessary for the stated purpose(s).

Breaches- How do they occur?  A breach occurs when information that, by law, must be protected is:  Lost, Stolen or Improperly Disposed of (i.e. paper or device upon which the information is recorded cannot be accounted for);  “Hacked” into by people or mechanized programs that are not authorized to have access (e.g. the system in which the information is located is compromised through a “worm”),  Communicated or Sent to others who have no official need to receive it (e.g. gossip about information learned from a medical record).

How Do Breaches Occur?  Most breaches occur by accident- some common ways include:  Sending a fax to the incorrect fax number.  Mailing individual A’s information to individual B.  Placing PHI in the trash rather than in bins for destruction.  Losing or leaving PHI that is unsecured in public areas.  Losing or having stolen a smart phone or laptop that contains ePHI.  Discussing an individual’s diagnosis or treatment in a public place or in place where those not authorized to know the information can overhear.  A chart has gone missing and cannot be located after a thorough search.

What Should I do if a breach has or may have occurred?  As a JASA employee it is your responsibility to notify the correct people if you become aware of a possible or actual breach of PHI/ ePHI.  Notify your supervisor and  Notify the JASA Privacy Officer immediately:  Carly Borenkind, LCSW (212) or