Utah Health Information Network A Community-Based HIPAA Implementation

Slides:



Advertisements
Similar presentations
Tamtron Users Group April 2001 Preparing Your Laboratory for HIPAA Compliance.
Advertisements

Electronic Medical Records: Implications of HIPAA for Selecting and Implementing an EMR Todd Frech Senior Partner
HIPAA Security Regulations Jean C. Hemphill Ballard Spahr Andrews & Ingersoll, LLP November 30, 2004.
Are you ready for HIPPO??? Welcome to HIPAA
© 2003, EDUCAUSE Information Privacy: Public Policy and Institutional Policies Rodney J. Petersen Policy Analyst, EDUCAUSE EDUCAUSE/Internet2 Security.
5 TH National HIPAA Summit HIPAA Vendor Readiness SIEMENS/HDX Presentation 1 November 2002 Don Bechtel HDX Compliance Officer Co-chair WEDI SNIP Transactions.
© by Seclarity Inc. 2005, Slide: 1 Seclarity, Inc Lightfall Court Columbia, MD A Blumberg Capital, Valley Ventures and Intel Capital Funded.
HIPAA PRIVACY AND SECURITY AWARENESS.
Privacy Codes of Conduct as a self- regulatory approach to cope with restrictions on transborder data flow Dr. Anja Miedbrodt Exemplified with the help.
Privacy, Confidentiality, Security, and Integrity of Electronic Data
HIPAA Update Randy Snyder. Topics Today  Security Primer  Electronic Transactions Clearinghouse Update  Secure Certificates.
TUESDAY, 4:00 – 4:20PM WEDNESDAY, 4:00 – 4:20PM Douglas Hill, NHIN Implementation Lead (Contractor), Office of the National Coordinator for Health IT Vanessa.
Olof Nilsson.  Ex: Facebook, MySpace, LinkedIn ◦ Allows users to create web pages or profiles that provide information about themselves and are available.
Created by McLure-Moynihan Inc. © 2002 MMI All rights reserved. Case Studies in HIPAA Compliance Critical Factors in Success or Failure Jim Moynihan McLure-Moynihan.
Organizational and Legal Issues -- Developing organization and governance models for HIE Day 2 -Track 5 – SECOND SESSION – PRIVACY AND SECURITY CONNECTING.
Utah Health Information Network A Community-Based HIPAA Implementation Jan Root, Ph.D. Standards Manager UHIN uhin.
1 National Audioconference Sponsored by the HIPAA Summit June 6, 2002 Chris Apgar, CISSP Data Security & HIPAA Compliance Officer Providence Health Plan.
Information Asset Classification Community of Practicerev. 10/24/2007 Information Asset Classification What it means to employees.
HIPAA Vendor Readiness Siemens/HDX Audio Telecast July 24, 2002.
Energize Your Workflow! ©2006 Merge eMed. All Rights Reserved User Group Meeting “Energize Your Workflow” May 7-9, Security.
Confidential 1 HIPAA Compliance at Blue Cross Blue Shield of Minnesota: A Case Study Tim Wittenburg Director of Corporate Architecture & Data Management.
HIPAA Security Final Rule Overview
Configuring Electronic Health Records Privacy and Security in the US Lecture a This material (Comp11_Unit7a) was developed by Oregon Health & Science University.
HIPAA Security John Parmigiani Director HIPAA Compliance Services CTG HealthCare Solutions, Inc.
E-Authentication October Objectives Provide a flexible, easy to implement authentication system that meets the needs of AES and its clients. Ensure.
Using Technology to Manage Information Chapter 13.
EDI Y2K Readiness Survey Results Survey conducted at the ECR Technology Seminar Montreal June 18, 1998 Sponsored by the Electronic Commerce Council of.
29 th EUGridPMA meeting, September 2013, Bucharest AEGIS Certification Authority Dušan Radovanović University of Belgrade Computer Centre.
© 2007 Open Grid Forum Authentication Service Profile Christos Kanellopoulos 14 th EUGridPMA, Lisbon, PT October 7 th, 2008.
Electronic Business Systems
RECORDS MANAGEMENT Judith Read and Mary Lea Ginn
HIPAA Layered Privacy Notices
Corporate Responsibility
AEGIS Certification Authority
Computer Literacy – Grade 8
E&O Risk Management: Meeting the Challenge of Change
Chapter 2: Introduction to Electronic Commerce
Health Information Exchange: Alaska’s Health Pipeline
Paul T. Smith Davis Wright Tremaine LLP
CMS HIPAA Transaction Implementation Status Checklist
Health Insurance Portability and Accountability Act
HIPAA Implementation Strategies for Compliance Professionals
Case Study: Vendor Readiness for HIPAA Compliance
Final HIPAA Security Rule
ROB PROW MIPI/MCMI ALTERNATIVE SOLUTIONS LIMITED
Health Insurance Portability and Accountability Act
Model Contract for Health
The International Family Forestry Alliance (IFFA) is the global voice of family forestry, representing more than 25 million forest owners worldwide. National.
HIPAA Implementation Strategies for Compliance Professionals
Health Care: Privacy in a Digital Age
The Centers for Medicare & Medicaid Services
Computer Literacy – Grade 8
Connecting Europe Facility eSignature
Data and Interoperability:
e-Commission Communication
The Centers for Medicare & Medicaid Services
HIPAA Security Standards Final Rule
Paul T. Smith, Esq. Partner, Davis Wright Tremaine LLP
HIPAA SECURITY RULE Copyright © 2008, 2006, 2004 by Saunders an imprint of Elsevier Inc. All rights reserved.
EDI Y2K Readiness Survey Results
HIPAA Compliance Services CTG HealthCare Solutions, Inc.
HIPAA Compliance Services CTG HealthCare Solutions, Inc.
Natura 2000 Preparatory Actions Designation and management of SACs
TECHNOLOGY PROTECTION
Outline Background: development of the Commission’s position
Richard Hill Partner, Hill & Associates
LO1 - Know about aspects of cyber security
Introduction to the PACS Security
Transaction, Code Sets and Identifier Update
Colorado “Protections For Consumer Data Privacy” Law
Presentation transcript:

Utah Health Information Network A Community-Based HIPAA Implementation Jan Root, Ph.D. Standards Manager UHIN janroot@uhin.com

Legal UHIN created a community-wide electronic commerce agreement Signing UHIN’s ECA satisfies privacy requirement for all trading partners in UHIN. UHIN One ECA Many ECAs

UHIN Standards Community-based EDI standards for www.uhin.com All transactions Security www.uhin.com Re-writing all UHIN standards to compliant with HIPAA Emphasis is on being implementable

UHIN Provider Software Generic Based on the HIPAA Standards not on any one member’s needs (Theoretically) Anyone could use UHIN’s software: One size fits all Software handles all HIPAA transactions (and then some)

Security and the Small Provider Help!? Security and the Small Provider UHIN is a community resource Obligation to serve small providers USET = UHIN Security Education Tool Walks user through all requirements of Security NPRM Help in writing security policy and procedures Goal: Raise awareness of the importance of security Reasonable and appropriate security makes good business sense

Community Implementation Coordinated implementation of the various transactions Community testing Sharing problems and solutions UHIN members do not compete on EDI

UHIN Utah Health Information Network Community-based, State not-for-profit More information: www.uhin.com Jan Root 801-466-7795 x202