HMIS Privacy and Security

Slides:



Advertisements
Similar presentations
HIPAA. What Why Who How When What Is HIPAA? Health Insurance Portability & Accountability Act of 1996.
Advertisements

Ohio Balance of State Continuum of Care Introduction to the 2014 HUD Data Standards July 17, 2014.
Genelle Denzin, Matt Dicks, Rhonda Taylor from Coalition on Homelessness and Housing in Ohio.
CREATED BY: HMIS Security Awareness Approved 1/10/2012 Revised 1/29/2013 Revised 3/15/2013.
HMIS Homeless Management Information System. MISSION To provide standardized and timely information to improve access to housing and services, and strengthen.
1 EqualityCare LT101 On-Line Inquiry Benefit Specialist Training.
Supportive Services for Veteran Families (SSVF) Data Bigger Picture Updated 5/22/14.
HMIS Fundamentals HMIS Data Standards for VA Community Contract Programs.
Supportive Services for Veteran Families (SSVF) Data HMIS Beyond Data Collection Updated 9/14.
Electronic EDI e-EDI. The EDI has been in use since 1999 using a paper-based system and computerized spreadsheets to collect and manage EDI data. Over.
HIPAA Privacy & Security EVMS Health Services 2004 Training.
CSP Annual Security Training Miranda Gregory, CSP Analyst Carroll County Department of Citizen Services.
DIRECT CERTIFICATION Patricia Winders Director’s Conference July 29, 2015.
BHSD Service Tracking and Reporting Basic System Functions
Copyright © 2008 Rockwell Automation, Inc. All rights reserved. Rockwell Automation Knowledgebase Notification Signup PSAs, Product Notices, etc.
Federal Student Aid Identification username and password – this is how students and parents will sign the FAFSA application. The FSA ID process replaced.
Use of U.T. Austin Property Computers: Security & Acceptable Use The University of Texas at Austin General Compliance Training Program.
HPRP Reporting Training For Quarterly Reporting Nov. 20 th wilderresearch.org.
A New Way to Work For the New Century. As a result of several years’ work by you and your co-workers, we have...
Supportive Services for Veteran Families (SSVF) Data Data Collection & Reporting Basics.
Incident Security & Confidentiality Integrity Availability.
Evaluation Web Rekha Damaraju May 07, Yes No DHSTS sends registration of new staff to CDC Staff receives SAMS-NO- REPLY s from CDC Staff Respond.
Incident Security & Confidentiality Integrity Availability.
Emergency Shelter and Housing Assistance Program Data Requirements 12/3/2015.
HIPAA Privacy What Every Staff Member Needs to Know.
FERPA & HIPAA: Maintaining Student Confidentiality.
POLICIES & PROCEDURES FOR HANDLING CONFIDENTIAL INFORMATION NOVEMBER 5 TH 2015.
Properly Safeguarding Personally Identifiable Information (PII) Ticket Program Manager (TPM) Social Security’s Ticket to Work Program.
Computer Maintenance Software Configuration: Evaluating Software Packages, Software Licensing, and Computer Protection through the Installation and Maintenance.
HMIS (Homeless Management Information System) Security Awareness Training Created By: Revised: 05/11/2016.
Nassau Association of School Technologists
Norm Suchar Director, Office of Special Needs Assistance Programs
Account Management Demonstration.
Testing Irregularities Web Application System (TIWAS)
Privacy & Confidentiality
HMIS (Homeless Management Information System) Security Awareness Training Created By: Revised: 10/20/2017.
MDHI and BOS User Group August HMIS User Group MDHI and BOS User Group
Protecting Client Confidentiality for Volunteers and Agency Staff
Dining with Diabetes IRB Training 2017.
eKiDs PowerChart Basics
Test Administration & The TA Sites.
HMIS (Homeless Management Information System) Security Awareness Training Created By: Revised: 12/15/2017.
Protecting Your Identity:
Computer Maintenance Software Configuration: Evaluating Software Packages, Software Licensing, and Computer Protection through the Installation and Maintenance.
Move this to online module slides 11-56
The Smarter Balanced Assessment Consortium
The Smarter Balanced Assessment Consortium
2017 TCS SMT Training - Dallas
Disability Services Agencies Briefing On HIPAA
Client Privacy and Client Security
County HIPAA Review All Rights Reserved 2002.
Think outside the Box: Not your ordinary HMIS Program
NORTHEASTERNERS, INC. IRS 990 filing instructions presentation
KC METRO HMIS Training PATH.
International Scholar Dossier Training
District Test Coordinators Training
HIPAA SECURITY RULE Copyright © 2008, 2006, 2004 by Saunders an imprint of Elsevier Inc. All rights reserved.
Confidentiality, Privacy & Security Annual Training
The Smarter Balanced Assessment Consortium
The Smarter Balanced Assessment Consortium
Welcome Effective May 13, 2019 the following services will require an authorization through the KEPRO Atrezzo Portal: Code Modifier Description T1017 HF.
Move this to online module slides 11-56
FitnessGram® 2015 Student Information System (SIS) Extract Import Training for Georgia School Year.
Types of HMIS Open: All agencies share client level data. Benefits: More effective coordination of services within CoC. Reduced data entry. Better unduplication.
Scott Miller TSM Team Lead Ray Mah Architect, Foundation
Scott Miller TSM Team Lead Ray Mah Architect, Foundation
Protecting Student Data
Kyrene Student Acceptable Use Policy Technology Guidelines
Presentation transcript:

HMIS Privacy and Security prepared by COHHIO June 2017 Updated July 2017

Introduction Purpose of training Inform users of current HMIS Privacy and Security Policy Prepare users for Security Quiz Review standards for annual retesting

HMIS Background HUD – HMIS from concept to implementation Data Collection was already being done agency by agency in dBase, Excel, Access, homegrown systems Standardize Data Collection Rules Enforce Uniform Security Methods Reduce Client Duplication

HMIS Background Data Standards 2003 HMIS Data Standards 2004 VAWA Amendment 2009 DSA VAWA Decision 2010 HMIS Data Standards 2014 HMIS Data Standards 2015 Critical Updates 2016 Critical Updates 2017 HMIS Data Standards

Ohio Balance of State Policy and Procedures Manual Reiterate HUD Standards and also clarify COHHIO and DSA specific rules Data Quality Standards Manual Identify Reporting and Performance requirements of HMIS Program Data

Client Data Protection Personally Identifying Information Name, DOB, SSN, Race, Ethnicity, Gender Additional Collected Data Homeless Assessment; Income, Benefits, Services Informed Consent Client preference Ability to refuse data collection

Client PII Why do we collect Name/DOB/SSN How PII is used/shared To uniquely identify client and reduce duplicates How PII is used/shared PII data is only used for deduplication and coordination of services Who has access Case Managers, DSA Housing Staff, COHHIO HMIS Staff, Bowman Systems tech support staff

Data Collection Rules Posted Notice HMIS Data Privacy Notice & Consent Required in a visible place at client intake HMIS Data Privacy Notice & Consent Inferred consent only acceptable for SSVF and RHY clients Client can still refuse to provide data This may make client ineligible for certain services in certain programs

Data Collection Rules (cont’d) HMIS Release of Information Client can still refuse to have certain information input into HMIS This may make client ineligible for certain services in certain programs

Informed Consent Consent to data collection AND Release of Information When both of these documents are signed, information is shared throughout the HMIS The exception is HOPWA and RHY clients Consent to data collection ONLY When only this document is signed, client record must be locked Client refuses to sign either form Data is entered anonymously SSVF and RHY clients DO NOT have the choice to be entered anonymously. Anonymous really means unnamed. Enter all PII as client refused except DOB- enter year designating client as adult or child and put partial DOB reported.

Higher quality PDF image available separately

Don’t Know/Refused Don’t Know Refused All clients can respond Don’t Know if they can’t answer the question. Refused All clients can refuse to answer specific data elements. Refusal may impact eligibility for certain programs Don’t know/refused data is considered missing for the purposes of state and federal reporting

Protecting Client PII Handling client files Always keep secured from unauthorized eyes Handling client data via email/fax/phone Fax of client PII may be appropriate between some agencies Emailing of client PII is not appropriate Discussing client PII may be appropriate between certain agencies Computer Access Computer Access needs to be private or supervised during Data Entry Login Access Login Access must be secured for only HMIS authorized users

Protecting Client PII No account sharing Login access between authorized users should never occur No client information leaving the building via contractors, visitors No information or data about clients being served should ever be taken out of the agency and shared in the community without client consent Notify COHHIO when users leave or stop working with HMIS COHHIO must be notified when an HMIS user leaves and agency or ceases to work with HMIS. Access must be terminated immediately

Computer / Network Security Mandatory Firewall Anti-virus software No password saving/ no auto-login Optional Use Firefox or Chrome browser Anti-malware software

Computer Security Do not write down password to HMIS On monitor, under keyboard, in desk drawer Computer in a publicly visible area (area must be monitored by Supervisor if used for HMIS) Ideally a computer should be private and not be visible by passing foot traffic If not, data entry must be done while area is supervised

Computer Security Web browser must not remember password or automatically log user into ServicePoint Do not use Wallet or Password Robot software Browser should stop at login to await user input

Computer Security Logout when walking away from desk Lock desktop with password protected screen- saver

Security Breach Protocol Can be viewed in full at http://hmis.cohhio.org/index.php?pg=kb.page& id=54 Most common are sharing username & password and emailing PII Account will be inactivated until Security Breach Quiz is passed and Security Breach Acknowledgement Form submitted

Questions Email hmis@cohhio.org