EHRs and HIPAA: Steps to Maintain Privacy and Security of Patient Data

Slides:



Advertisements
Similar presentations
Mobile Devices: Know the RISKS. Take the STEPS. PROTECT AND SECURE Health Information.
Advertisements

SCHIE Mission To improve the quality and efficiency of health care for all stakeholders in the Santa Cruz community. To deliver technology assistance,
© 2010 AT&T Intellectual Property. All rights reserved. AT&T and the AT&T logo are trademarks of AT&T Intellectual Property. AT&T Security Consulting Risk.
HIPAA Implementation. Basic HIPAA Requirements Designating a Privacy Officer Notifying patients about their privacy rights and how their information can.
HIPAA Security Regulations Jean C. Hemphill Ballard Spahr Andrews & Ingersoll, LLP November 30, 2004.
HIPAA Regulations What do you need to know?.
Series 1: “Meaningful Use” for Behavioral Health Providers 9/2013 From the CIHS Video Series “Ten Minutes at a Time” Module 10: HIPAA Privacy & Security.
HIT Audit Workshop Jeffrey W. Short 1.
PRIVACY, SECURITY AND MEANINGFUL USE Is your practice compliant?
To improve the quality and efficiency of health care for all stakeholders in the Santa Cruz community. To deliver technology assistance, guidance and.
Georgia Medicaid EHR Incentive Program: Attestations, Documentation and Monitoring Presentation to: Eligible Professionals and Eligible Hospitals Presented.
1 Privacy and Security Tiger Team Meeting Discussion Materials Topics Patient Authentication Hearing Questions for RFC on Meaningful Use Stage 3 October.
HITECH Health Information Technology for Economic and Clinical Health Paul R Richardson.
The Auditing Process: Lessons Learned Florida’s Medicaid EHR Incentive Program July 23, 2015.
Series 1: “Meaningful Use” for Behavioral Health Providers 9/2013 From the CIHS Video Series “Ten Minutes at a Time” Module 3: Core Objectives/Measures.
HIT Standards Committee Privacy and Security Workgroup: Initial Reactions Dixie Baker, SAIC Steven Findlay, Consumers Union June 23, 2009.
Meaningful Use Security Risk Assessment (SRA): Resources for Eligible Professionals (EPs) Kim Bell, MHA, FACHE, PCMH-CCE Executive Director Georgia Health.
April 14, A Watershed Date in HIPAA Privacy Compliance: Where Should You Be in HIPAA Security Compliance and How to Get There… John Parmigiani National.
What to Expect and How to Prepare: Healthcare Security & Privacy Regulation and Enforcement in 2015 and Beyond.
Utilizing the CMS Security Risk Assessment Tool Liz Hansen, PCMH CEC, ICD-10 PMC Special Consultant, GA-HITEC Member Manager, GaHIN
Meaningful Use Security Risk Analysis Passing Your Audit.
Medicaid HIT Program Jon Barley, Ph.D., Chief Bureau of Health Services Research Office of Ohio Health Plans
Privacy and Security Risks to Rural Hospitals John Hoyt, Partner December 6, 2013.
1 Meaningful Use Audits Sarah McIntee, Esq. David Main, Esq. Health TechNet Luncheon May 16, 2014.
Working with HIT Systems
Syndromic Surveillance Data Submission EHR & MU for HIM Professionals Resource Patient Management System.
Patient Electronic Access Configuring RPMS-EHR for Meaningful Use Resource Patient Management System.
HITECH and HIPAA Presented by Rhonda Anderson, RHIA Anderson Health Information Systems, Inc
1 Department Contacts Meeting ONLINE UPDATES November 4, 2015.
Bringing Health Information to Life DAVID BLUMENTHAL, MD, MPP National Coordinator of Health Information Technology US Department of Health & Human Services.
Top 10 Series Changes to HIPAA Devon Bernard AOPA Reimbursement Services Coordinator.
Working with HIT Systems Unit 7a Protecting Privacy, Security, and Confidentiality in HIT Systems This material was developed by Johns Hopkins University,
Preparing to Implement HITECH A New Report from the State Alliance For E-Health Ree Sailors Kentucky e-Health Summit September 16, 2009.
Welcome Update on REC activities September 25, 2012.
© 2014 By Katherine Downing, MA, RHIA, CHPS, PMP.
Health reform in England: commissioning policy update Anthony Kealy Head of Commissioning Policy.
Clinical Decision Support Implementation Victoria Ferguson, COO - Program Manager Christopher Taylor, CIO – Business Owner Monica Kaileh, CMIO – Steering.
HIPAA Audits are Here - Be Ready! Presenter: Diane Evans, PUBLISHER, MyHIPAA Guide Diane Evans: Phone:
CMGT 430 Week 4 Learning Team Presentation Check this A+ tutorial guideline at Week-4-Learning-Team-Presentation.
Select Questions to ask your HIPAA Privacy Officer
Community Health Center Security Risk Management
What is HIPAA in 2016? Presented By: Suze Shaffer, CHSP
In-depth look at the security risk analysis
A Continuous Cycle Prospecting Making The Ask Onboarding Mentorship
Modified Stage 2 Meaningful Use: Objective #1 – Protect Electronic Health Information July 5, 2016 Today’s presenter: Al Wroblewski, PCMH CCE, Client.
COMMUNICATION.
An Individual’s Right to Access and Obtain Their Health Information Under HIPAA.
ICD-10 and Clinical Documentation
مراجعة عامة.
Security Awareness Training: System Owners
Medical Practices as Small Business:
HIPAA Implementation Strategies for Compliance Professionals
ريكاوري (بازگشت به حالت اوليه)
Introduction. Risk Communication With Patients: Your Guide to Resources and Recommendations.
فرایند تسهیلگری در مددکاری جامعه ای
Modified Stage 2 Meaningful Use: Objective #1 – Protect Electronic Health Information July 5, 2016 Today’s presenter: Al Wroblewski, PCMH CCE, Client.
HIPAA Implementation Strategies for Compliance Professionals
Targeting Osteoporosis Therapies to Patients at Highest Risk for Fracture.
Avoiding Opioid Overuse: Guideline-Based Management of Osteoarthritis
Risk Management: why and how to protect your health center
HIPAA Privacy the Morning After - What do we do now?
Lesson 1  7 Basic Components of an Effective Compliance Plan
Training Needs Around EHR
WCCIS Information Governance
Communicating With Your Patients About Major Depressive Disorder
The Rising Crisis of Prediabetes Diagnosis and Management of the Patient With Prediabetes.
Objectives Describe the purposes of the Health Information Technology for Economic and Clinical Health (HITECH) Act of 2009 Explore how the HITECH Act.
Improving Adherence to Antiplatelet Therapy After an ACS Event
Management commitment and responsibility Safety accountability of managers Appointment of key safety personnel SMS Implementation Plan Coordination.
Project Name Here Kick-off Date
Presentation transcript:

EHRs and HIPAA: Steps to Maintain Privacy and Security of Patient Data

Program Goals

Introduction

Introduction (cont)

The EHR Incentive Programs

Meaningful Use and Security

HIPAA and HITECH

Step 2: Provide Leadership

Step 2: Leadership (cont)

Step 3: Document Process, Findings and Actions

Step 3: Documentation (cont)

Step 3: Documentation (cont)

Step 4: Conduct a Risk Analysis

Step 4: Risk Analysis (cont)

Step 5: Develop an Action Plan

Step 6: Managing and Mitigating Risk

Step 6: Managing Risk (cont)

Step 6: Managing Risk (cont)

Step 6: Managing Risk (cont)

Step 7: Education and Training

Step 7: Education and Training (cont)

Step 8: Communicate with Patients

Step 8: Communication (cont)

Step 9: Update Business Associate Agreements

Step 9: Business Associates (cont)

Step 9: Business Associates (cont)

Step 10: Attest for the Security Risk Analysis Meaningful Use Objective

Conclusion

Abbreviations

References

References (cont)