Use of BMC Patient Information Privacy & Security

Slides:



Advertisements
Similar presentations
Independent Contractor Orientation HIPAA What Is HIPAA? Health Insurance Portability and Accountability Act of 1996 The Health Insurance Portability.
Advertisements

And the finer details of patient privacy TCH Confidential Understanding HIPAA.
Health Insurance Portability and Accountability Act HIPAA Education for Volunteers and Students.
HIPAA. What Why Who How When What Is HIPAA? Health Insurance Portability & Accountability Act of 1996.
HIPAA Training for the MDAA Preceptorship Program Health Insurance Portability and Accountability Act.
COBB/DOUGLAS COMMUNITY SERVICES BOARD Confidentiality and Privacy of Consumer Information.
National Health Information Privacy and Security Week Understanding the HIPAA Privacy and Security Rule.
Increasing public concern about loss of privacy Broad availability of information stored and exchanged in electronic format Concerns about genetic information.
WORKFORCE CONFIDENTIALITY HIPAA Reminders. HIPAA 101 The Health Insurance Portability and Accountability Act (HIPAA) protects patient privacy. HIPAA is.
HIPAA Health Insurance Portability and Accountability Act.
What is HIPAA? This presentation was created by The University of Arizona Privacy Office, The Office for the Responsible Conduct of Research on March 5,
1 HIPAA Education CCAC Professional Development Training September 2006 CCAC Professional Development Training September 2006.
Key Changes to HIPAA from the Stimulus Bill (ARRA) Children’s Health System Department Leadership Meeting October 28, 2009 Kathleen Street Privacy Officer/Risk.
NAU HIPAA Awareness Training
1 Louisiana Department of Health and Hospitals Basic HIPAA Privacy Training: Policies and Procedures 01/09/
© 2009 The McGraw-Hill Companies, Inc. All rights reserved 3-1 LEGAL AND ETHICAL ISSUES in Medical Practice, Including HIPAA PowerPoint® presentation.
HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT OF 1996 (HIPAA)
 The Health Insurance Portability and Accountability Act of  Federal Law designed to protect sensitive information.  HIPAA violations are enforced.
HIPAA HIPAA Health Insurance Portability and Accountability Act of 1996.
Professional Nursing Services.  Privacy and Security Training explains:  The requirements of the federal HIPAA/HITEC regulations, state privacy laws.
HEAVEN’S HANDS COMMUNITY SERVICE H.I.P.A.A. What is HIPAA? HIPAA stands for the Health Insurance Portability and Accountability Act, which was passed.
1 Enterprise Security Your Information Security and Privacy Responsibilities © 2008 Providence Health & Services This information may be replicated for.
HIPAA What’s Said Here – Stays Here…. WHAT IS HIPAA  Health Insurance Portability and Accountability Act  Purpose is to protect clients (patients)
HIPAA COMPLIANCE IN YOUR PRACTICE MARIBEL VALENTIN, ESQUIRE.
Columbia University Medical Center Health Insurance Portability and Accountability Act of 1996 (“HIPAA”) Privacy & Information Security Training 2009.
UNIVERSITY OF ALABAMA V HIPAA Privacy and Security Training For Employees Compliance is Everyone’s Job 1 INTERNAL USE ONLY Abbreviated Training.
Next ETCH Confidentiality and HIPAA Annual Review What you need to know. The Privacy Rule 1.
CORPORATE COMPLIANCE PROGRAM The Office of Corporate Integrity
Building a Privacy Foundation. Setting the Standard for Privacy Health Insurance Portability and Accountability Act (HIPAA) Patient Bill of Rights Federal.
LeToia Crozier, Esq., CHC Vice President, Compliance & Regulatory Affairs Corey Wilson Director of Technical Services & Security Officer Interactive Think.
Understanding HIPAA (Health Insurandce Portability and Accountability Act)
Mr. Fleming.  Law passed by Congress in  Right to Privacy ◦ Medical information of patient can only be shared with doctor and professionals administering.
Privacy & Confidentiality
Why Respect Privacy and Confidentiality? Access to Confidential Information (OP ) Protection and Security of Protected Health Information (OP.
HIPAA THE PRIVACY RULE. 2 HISTORY In 2000, many patients that were newly diagnosed with depression received free samples of anti- depressant medications.
A Road Map to Research at Jefferson: HIPAA Privacy and Security Rules for Researchers Presented By: Privacy Officer/Office of Legal Counsel October 2015.
Welcome….!!! CORPORATE COMPLIANCE PROGRAM Presented by The Office of Corporate Integrity 1.
Western Asset Protection
HIPAA: Breach Notification By: Office of University Counsel For: Jefferson IRB Continuing Education September 2014.
HIPAA Overview Why do we need a federal rule on privacy? Privacy is a fundamental right Privacy can be defined as the ability of the individual to determine.
ANNUAL HIPAA AND INFORMATION SECURITY EDUCATION. KEY TERMS  HIPAA - Health Insurance Portability and Accountability Act. The primary goal of the law.
HIPAA TRIVIA Do you know HIPAA?. HIPAA was created by?  The Affordable Care Act  Health Insurance companies  United States Congress  United States.
HIPAA Training. What information is considered PHI (Protected Health Information)  Dates- Birthdays, Dates of Admission and Discharge, Date of Death.
The Medical College of Georgia HIPAA Privacy Rule Orientation.
New Hire HIPAA Orientation. HIPAA Overview HIPAA is an acronym that stands for the Health Insurance Portability and Accountability Act of HIPAA.
Health Insurance Portability and Accountability Act (HIPAA) Primer for Observers, Volunteers, Medical Students Dr. Michael Palumbo- Privacy Officer/ EVP.
Developed for Ridgeview Institute 2015 Hospital Wide Orientation
HIPAA Privacy and Security
Health Insurance Portability and Accountability Act of 1996
Protecting PHI & PII 12/30/2017 6:45 AM
HIPAA PRIVACY & SECURITY TRAINING
UNDERSTANDING WHAT HIPAA IS AND IS NOT
HIPAA THE PRIVACY RULE Reviewed December 2012.
HIPAA Privacy & Security
And the finer details of patient privacy
HIPAA Privacy and Security Training Compliance is Everyone’s Job
HIPAA Basic Training for Privacy and Information Security
HIPAA Privacy and Security Training Compliance is Everyone’s Job
HIPAA PRIVACY AWARENESS, COMPLIANCE and ENFORCEMENT
Disability Services Agencies Briefing On HIPAA
LifeBridge Health Sinai Hospital Orientation.
HIPAA Privacy and Security Training Compliance is Everyone’s Job
HIPAA Privacy & Security
HIPAA Overview.
HIPAA & PHI TRAINING & AWARENESS
Move this to online module slides 11-56
HIPAA Do’s and Don'ts: What is Really Behind Protected Health Information (PHI) and Health Care Privacy Rules Paul Sisler, Director, Information Services;
HIPAA Privacy and Some Research
School of Medicine Orientation Information Security Training
Presentation transcript:

Use of BMC Patient Information Privacy & Security Nickie Braxton, MPH, CHC, CCSI Privacy Officer Boston Medical Center

What Laws Apply The Health Insurance Portability and Accountability Act (HIPAA) American Recovery and Reinvestment Act of 2009 (ARRA) Health Information Technology for Economic and Clinical Health Act (HITECH) Massachusetts statutes and regulations Patients’ Bill of Rights 201 CMR 17.00 Standards for the Protection of Personal Information The Privacy Act of 1974

Guiding Principles Discard confidential information properly ONLY in locked containers or shredders. Never disclose PHI socially or where others might hear. PHI may be disclosed ONLY to authorized individuals who need the information to do their work at BMC. Always protect patients’ paper charts, files or other papers containing PHI. Never leave them unattended in conference rooms, cars, cafeteria, etc. Report loss or improper use of PHI to your supervisor, the BMC Privacy Officer, Compliance or the

Minimum Necessary Standard You may only access patient information when access is necessary to perform the work your are assigned to do Ask yourself: Are you looking at the record for professional or personal reasons? Partnership with QPS department, provides BMC physicians with ‘QI hub’ relevant for faculty and trainees Professional Credits (through project submission) QI Advising/Coaching: via Office Hours with aCQO/QI fellow/QI specialists and via direct feedback on project applications QI Education library: ‘just in time’ style QI educational modules (1 currently available online at bucme.org) Central ‘Searchable’ QI Directory: available to housestaff and faculty recently completed and ongoing projects

Processes for on-boarding and off-boarding QI vs Research Different rules, however, patient information must always be fully protected and secured, no matter the goal QI is an activity of Boston Medical Center - hospital policies must be followed Research may be a BU or BMC activity – all handling of patient information must be careful and secure Processes for on-boarding and off-boarding

Use of BMC Patient Information Treatment of the patient Direct patient care Coordination of care Consultations Referrals to other health care providers who are actively treating shared patient Payment of healthcare bills Operations related to healthcare, i.e., QI when approved Research when approved by an Institutional Review Board (IRB) Required by law (e.g. subpoena, court order, etc.)

Accessing a Medical Record You have been given access to various parts of the medical record based on your job duties and responsibilities. However, you are authorized to access only those medical records needed to perform your assignments. You may not access medical records for any other reason, even your own.

Medical Records Audits “FairWarning” shows the date, time and activity of every person who accesses BMC medical records, by recording the person’s name and access ID – his/her “footprint” in the record. Regularly conducted audits to verify that all employee accesses are for legitimate work-related purposes. Result in investigations when a work-related reason for an access can not be determined.

Consequences of Improper Access Individuals who access the medical record improperly will be investigated by Compliance and Human Resources. If you are found to have accessed the medical record without proper authority, you have violated BMC and BU policy and will be subject to discipline. Policy breaches at BU or BMC can result in substantial disciplinary action.

Consequences of Improper Access A violation of the privacy protections policies of BU and BMC Violations of privacy and security policies can: Endanger the privacy or our patients; Result in an investigation by the Federal and/or State governments; Harm the reputation of our patients and our hospital; Result in large fines against BMC, and Result in fines and/or imprisonment for those who commit them.

Examples of Improper Access Discussing PHI in a public place where it can be overheard by others; Accessing patient information of friends, family members, co-workers, VIPs, etc., without a work-related reason, even if asked by the individual to do so; Losing or misplacing a laptop, iPad, flash drive or any electronic device containing PHI, if the device is not password protected and encrypted. 2017 OCR Settlements: Memorial He4althcare Systems; $5.5M for improper employee access to patient info. Childrens Medical Center of Dallas: $3.2 M unencrypted/nonpassword protected cell phone lost Mapfre Life Insurance Co, Puerto Rico: $2.2M unencrypted flash drive stolen from IT department .

Securing Patient Information Most important – encrypt and password protect every device that holds, receives, accesses or transmits patient information! This includes personal cell phones, tablets, laptops and flash drives. Lock (control, alt., delete) or log off the computer when you step away – even briefly. Never share your password for network access with anyone – ever! You are responsible and accountable for any activity that happens under your ID and password. .

When in doubt, DON’T POST. Social Media Social media includes Facebook, Twitter, Instagram, Snapchat, LinkedIn, etc. Do not share any information about BMC patients (even if you don’t mention the patient’s name) or about BMC confidential business information on social media. When in doubt, DON’T POST. .

Resources for you Ask Questions: BU Privacy Officer BMC Privacy Officer, Nickie Braxton Your Supervising Faculty Member James Moses!