Reviewed by: Gunther Kohn Chief Information Officer, UB School of Dental Medicine Date: October 20, 2015 Approved by: Sarah L. Augustynek Compliance Officer,

Slides:



Advertisements
Similar presentations
Independent Contractor Orientation HIPAA What Is HIPAA? Health Insurance Portability and Accountability Act of 1996 The Health Insurance Portability.
Advertisements

HIPAA Privacy Rule “Standards for Privacy of Individually Identifiable Health Information” 45 CFR 160 and 164* *
HIPAA and Public Health 2007 Epi Rapid Response Team Conference.
HIPAA Privacy Training. 2 HIPAA Background Health Insurance Portability and Accountability Act of 1996 Copyright 2010 MHM Resources LLC.
Health Insurance Portability and Accountability Act HIPAA Education for Volunteers and Students.
COBB/DOUGLAS COMMUNITY SERVICES BOARD Confidentiality and Privacy of Consumer Information.
The Health Insurance Portability and Accountability Act Basic HIPAA Training For CMU workforce with access to PHI.
HIPAA – Privacy Rule and Research USCRF Research Educational Series March 19, 2003.
Increasing public concern about loss of privacy Broad availability of information stored and exchanged in electronic format Concerns about genetic information.
The Health Insurance Portability and Accountability Act of 1996– charged the Department of Health and Human Services (DHHS) with creating health information.
Page 1 of 16 DMC HIPAA Privacy and Security DMC’S COMMITMENT TO COMPLIANCE: HIPAA PRIVACY and SECURITY DMC Corporate Audit and Compliance Department Detroit.
Basic Privacy and Security HIPAA Training
WORKFORCE CONFIDENTIALITY HIPAA Reminders. HIPAA 101 The Health Insurance Portability and Accountability Act (HIPAA) protects patient privacy. HIPAA is.
HIPAA Health Insurance Portability and Accountability Act.
1 HIPAA Education CCAC Professional Development Training September 2006 CCAC Professional Development Training September 2006.
HIPAA Requirements for Patient Oriented Research
Informed Consent.
 The Health Insurance Portability and Accountability Act of  Federal Law designed to protect sensitive information.  HIPAA violations are enforced.
Health Insurance Portability & Accountability Act “HIPAA” To every patient, every time, we will provide the care that we would want for our own loved ones.
Professional Nursing Services.  Privacy and Security Training explains:  The requirements of the federal HIPAA/HITEC regulations, state privacy laws.
Protecting Client Data HIPAA, HITECH and PIPA Part 1A
Health information security & compliance
CCHAP Practice Manager’s Meeting HIPAA Guidelines and Updates for Primary Care Practices Thursday October 24 th 2013 Noon – 1:00PM Instructions to join.
1 Electronic Information Security – What Researchers Need to Know University of California Office of the President Office of Research May 2005.
1 Enterprise Security Your Information Security and Privacy Responsibilities © 2008 Providence Health & Services This information may be replicated for.
HIPAA What’s Said Here – Stays Here…. WHAT IS HIPAA  Health Insurance Portability and Accountability Act  Purpose is to protect clients (patients)
HIPAA Health Insurance Portability & Accountability Act of 1996.
Health Insurance Portability and Accountability Act (HIPAA)
Health Budgets & Financial Policy Privacy and HIPAA Security 15 December & December, & 1600 Bridge Number:
Paula Peyrani, MD Medical/Project Director, HIV Program at the 550 Clinic Assistant Director, Research Design and Development Clinical and Translational.
HIPAA Privacy & Security Kay Carolin Barbara Ann Karmanos Cancer Center March 2009.
HIPAA Business Associates Leadership Group Meeting June 28, 2001.
1 Research & Accounting for Disclosures March 12, 2008 Leslie J. Pfeffer, BS, CHP Office of the Vice President for Research Administration Office of Compliance.
1 HIPAA OVERVIEW ETSU. 2 What is HIPAA? Health Insurance Portability and Accountability Act.
HIPAA Privacy and Research August 21, 2015
Health information that does not identify an individual and with respect to which there is no reasonable basis to believe that the information can be.
HIPAA Training Developed for Ridgeview Institute 2012 Hospital Wide Orientation.
HIPAA – How Will the Regulations Impact Research?.
A Road Map to Research at Jefferson: HIPAA Privacy and Security Rules for Researchers Presented By: Privacy Officer/Office of Legal Counsel October 2015.
Western Asset Protection
Configuring Electronic Health Records Privacy and Security in the US Lecture b This material (Comp11_Unit7b) was developed by Oregon Health & Science University.
HIPAA Overview Why do we need a federal rule on privacy? Privacy is a fundamental right Privacy can be defined as the ability of the individual to determine.
PwC Issues in HIPAA Research Compliance William R. Braithwaite, MD, PhD “Dr. HIPAA” HIPAA Summit 6 Washington, DC 27 March 2003.
ANNUAL HIPAA AND INFORMATION SECURITY EDUCATION. KEY TERMS  HIPAA - Health Insurance Portability and Accountability Act. The primary goal of the law.
HIPAA Training. What information is considered PHI (Protected Health Information)  Dates- Birthdays, Dates of Admission and Discharge, Date of Death.
Final HIPAA Privacy Rule: The Research Provisions Julie Kaneshiro DHHS Office for Human Research Protections Phone: Fax:
Privacy: HIPAA Emerson Murphy-Hill. Rosie Callender, RHIA, web.msm.edu/hipaa/An%20Introduction%20to%20HIPAA.ppt What is HIPAA? A Federal Law Created in.
HIPAA and RESEARCH 5 th Thursday May 31, Page 2.
The Health Insurance Portability and Accountability Act 
Developed for Ridgeview Institute 2015 Hospital Wide Orientation
ELECTRONIC HEALTH RECORD PRIVACY TRAINING
HIPAA Privacy and Security
Protecting PHI & PII 12/30/2017 6:45 AM
HIPAA PRIVACY & SECURITY TRAINING
HIPAA Privacy & Security
HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT (HIPAA)
HIPAA Definitions What Does PHI Include?
No No, Yes Yes: Simple Privacy & Information Security Tips Krista Barnes, J.D. Senior Legal Officer and Director, Privacy & Information Security, Institutional.
HIPAA PRIVACY AWARENESS, COMPLIANCE and ENFORCEMENT
Disability Services Agencies Briefing On HIPAA
The Health Insurance Portability and Accountability Act Basic HIPAA Training For CMU workforce with access to PHI.
The Health Insurance Portability and Accountability Act
HIPAA Privacy & Security
HIPAA Overview.
HIPAA & PHI TRAINING & AWARENESS
Issues in HIPAA Research Compliance
The Health Insurance Portability and Accountability Act
Introduction to the PACS Security
Office of the Vice President for Research Human Subjects Protection Program IRB Submission Process Module 4 - Health Insurance Portability and Accountability.
The Health Insurance Portability and Accountability Act
Presentation transcript:

Reviewed by: Gunther Kohn Chief Information Officer, UB School of Dental Medicine Date: October 20, 2015 Approved by: Sarah L. Augustynek Compliance Officer, UB School of Dental Medicine Date: October 20, 2015

 SDM HIPAA Privacy Officer:  Sarah L. Augustynek, JD/MPH, SDM Compliance Officer    SDM HIPAA Security Officer:  Gunther Kohn, CIO   2

HIPAA Objectives:  To protect the privacy and security of an individual’s Protected Health Information (PHI).  To use the “Minimum Necessary Standard” when using or disclosing PHI is permissible:  Minimum Necessary Standard: When using or disclosing PHI or when requesting health information from another covered entity (CE) or business associate (BA) a CE or BA must make reasonable efforts to limit PHI to the minimum necessary to accomplish the intended purpose of the use, disclosure, or request.  Business Associate (BA) is a person or entity who on behalf of a covered entity/provider:  Receives PHI  Maintains PHI  Transmits PHI  Creates PHI  Limits disclosures to least amount of information required to convey the necessary information. 3

The inappropriate review of patient medical information without a direct need for diagnosis, treatment or other lawful use as permitted by statutes or regulations governing the lawful access, use or disclosure of medical information is prohibited. 4

We must protect an individual’s personal and health information that… ◦ Is created, received, or maintained by the SDM as a covered provider; ◦ Is written, spoken, or electronic; ◦ And, includes at least one of the 18 personal identifiers in association with health information. Health Information with identifiers = Protected Health Information (PHI) 5

 Name  Postal address  Date of birth  All elements of dates except year  Telephone number  Fax number  address  URL address  IP address  Social security number  Account numbers  License numbers  Medical record number  Health plan beneficiary #  Medical records  Device identifiers and their serial numbers  Vehicle identifiers and serial number  Biometric identifiers- (finger and voice prints)  Full face photos and other comparable images  Billing records  Referral authorizations  Any other unique identifying number, code, or characteristic. 6 PHI include:

What is the difference between HIPAA Privacy and HIPAA Security?  HIPAA regulations cover both security and privacy of protected health information. PRIVACY: ◦ The Privacy rule focuses on the right of an individual to control the use of his or her personal information. The Privacy rule covers the confidentiality of PHI in all formats including electronic, paper and oral. The physical security of PHI in all formats is an element of the Privacy rule. SECURITY ◦ The Security rule focuses on administrative, technical and physical safeguards specifically as they relate to electronic PHI (ePHI). 7

We need to protect the entire lifecycle of information  Intake/creation of PHI  Storage of PHI  Destruction of PHI... For any and all formats of PHI 8

Good Computing Practices: Safeguards for Users: 1. Passwords 2. Lock Your Screen 3. Workstation Security 4. Log Off when away 5. Data Management 6. Portable Device Control 7. Computer Security 8. Secure Only 9. Safe Internet Use 10. Reporting Security Incidents / Breach 9

Be aware that ePHI is everywhere: Business and Personal 10

 Use cryptic passwords that can’t be easily guessed and protect your passwords –  Don’t write them down, Don’t share them!  Use 8 Characters – combination of lower case and capital letters; numbers and symbols 11

Practice safe ing  Don’t open, forward, or reply to suspicious s!!  Don’t open suspicious attachments or click on unknown website addresses  Delete spam  Do not patients. SDM s are not encrypted. Preferred method is fax or USPS. However if the patient requests an with their PHI, it must be in writing and the patient must be informed that SDM is not encrypted. 12

Practice safe internet use:  Accessing patient information electronically can be tracked back to your User ID and computer and defines the documents and time spent accessing the records.  Accessing sites with questionable content often results in spam or release of viruses.

The SDM prohibits the storage or transmission of PHI on Personal Computers or Mobile Devices!!  No ePHI on your laptops, mobile phones, personal computers, flash drives or digital cameras.  All ePHI must be DEIDENITIFIED PRIOR to storage on these devices 14

De-identification of PHI:  The HIPAA Privacy Rule allows for covered entities and other health data users to create and then use and disclose de-identified health information outside the disclosure restrictions on PHI.  De-identification of a patient’s PHI mitigates privacy risks by removing health data that individually identifies the individual to the degree that there is no reasonable basis to believe that the information can be used to identify the individual.  De-identification occurs either by: (1) meeting the safe harbor in removing 18 identifiers and verifying there is no actual knowledge that the residual information can identify the individual; or (2) an expert has documented its statistical or scientific analysis determining that there is a very small risk of an anticipated recipient using such health information with other reasonably available information to identify an individual who is a subject of the information. 15

Shredding Bins Always use them unless the documents are...  Daily gossip  Daily trash  Public 16

Electronic information can also be lost or stolen:  Lost/stolen laptops, cell phones, tablets and digital cameras  Lost/stolen zip disks, CDs, flash drives  Unprotected systems were hacked  sent to the wrong address or wrong person (faxes have same issues)  User not logged off of system 17

Physically secure your area and data when unattended  Secure your files and portable equipment - including flash drives.  Secure laptop computers  Never share your access code, card, or key.  Don’t install unknown or unsolicited programs or download without authorization on your computer. 18

De-identification of PHI:  The HIPAA Privacy Rule allows for covered entities and other health data users to create and then use and disclose de-identified health information outside the disclosure restrictions on PHI.  De-identification of a patient’s PHI mitigates privacy risks by removing health data that individually identifies the individual to the degree that there is no reasonable basis to believe that the information can be used to identify the individual.  De-identification occurs either by: (1) meeting the safe harbor in removing 18 identifiers and verifying there is no actual knowledge that the residual information can identify the individual; or (2) an expert has documented its statistical or scientific analysis determining that there is a very small risk of an anticipated recipient using such health information with other reasonably available information to identify an individual who is a subject of the information. 19

20

De-identification of PHI:  Removal of 18 Specific Identifiers Method ◦ Information is deemed to be de-identified if all of the following identifiers of the individual or of relatives, employers or household members of the individual are removed, and the covered entity does not have actual knowledge that the information could be used alone or in combination with other information to identify an individual who is a subject of the information:  Names  Dates relating to an individual  Telephone, Fax numbers  addresses  Social Security numbers  Medical record numbers  Health plan beneficiary numbers  Account numbers  Certificate/license numbers  Vehicle identifiers and serial numbers, including license plate numbers  Device identifiers and serial numbers  Web Universal Resource Locators (URLs)  Internet Protocol (IP) addresses  Biometric identifiers, including finger and voice prints  Full-face photographic images and any comparable images  Any other unique identifying number, characteristic or code 21

De-identification of PHI:  “Expert Determination” method : A covered entity may determine that health information is not individually identifiable health information only if: ◦ A person with appropriate knowledge of and experience with generally accepted statistical and scientific principles and methods for rendering information not individually identifiable: ◦ Applying such principles and methods, determines that the risk is very small that the information could be used, alone or in combination with other reasonably available information, by an anticipated recipient to identify an individual who is a subject of the information; and ◦ Documents the methods and results of the analysis that justify such determination. 22

 Submit Questions to your HIPAA Officers 23  SDM HIPAA Privacy Officer:  Sarah L. Augustynek, JD/MPH  Compliance Officer    SDM HIPAA Security Officer:  Gunther Kohn, CIO  