HIPAA Health Insurance Portability and Accountability Act of 1996

Slides:



Advertisements
Similar presentations
The Department has declared itself to be a single covered entity. Thus, each and every one of our divisions is a covered entity and must comply with.
Advertisements

HIPAA: An Overview of Transaction, Privacy and Security Regulations Training for Providers and Staff.
Independent Contractor Orientation HIPAA What Is HIPAA? Health Insurance Portability and Accountability Act of 1996 The Health Insurance Portability.
“Reaching across Arizona to provide comprehensive quality health care for those in need” Our first care is your health care Arizona Health Care Cost Containment.
HIPAA Training: Health Insurance Portability and Accountability Act.
1. As a Florida KidCare community partner families entrust you to not only help them navigate the Florida KidCare system but to keep the information they.
HIPAA Privacy Training. 2 HIPAA Background Health Insurance Portability and Accountability Act of 1996 Copyright 2010 MHM Resources LLC.
Health Insurance Portability and Accountability Act HIPAA Education for Volunteers and Students.
HIPAA. What Why Who How When What Is HIPAA? Health Insurance Portability & Accountability Act of 1996.
The Health Insurance Portability and Accountability Act of 1996– charged the Department of Health and Human Services (DHHS) with creating health information.
HIPAA What’s New? What Is HIPAA Health Insurance Portability and Accountability Act of 1996 Health Insurance Portability and Accountability Act.
Changes to HIPAA (as they pertain to records management) Health Information Technology for Economic Clinical Health Act (HITECH) – federal regulation included.
What is HIPAA? This presentation was created by The University of Arizona Privacy Office, The Office for the Responsible Conduct of Research on March 5,
1 HIPAA Education CCAC Professional Development Training September 2006 CCAC Professional Development Training September 2006.
Key Changes to HIPAA from the Stimulus Bill (ARRA) Children’s Health System Department Leadership Meeting October 28, 2009 Kathleen Street Privacy Officer/Risk.
HIPAA CHANGES: HITECH ACT AND BREACH NOTIFICATION RULES February 3, 2010 Kristen L. Gentry, Esq. Catherine M. Stowers, Esq.
NAU HIPAA Awareness Training
 Health Care Information Portability and Accountability Act  Passed in 1996  2 objectives 1) Ensure people could maintain health insurance between.
HIPAA Regulations What do you need to know?.
HIPAA THE PRIVACY RULE Reviewed December HISTORY In 2000, many patients that were newly diagnosed with depression received free samples of anti-
2014 HIPAA Refresher Omnibus Rule & HIPAA Security.
Jill Moore April 2013 HIPAA Update: New Rules, New Challenges.
Health Insurance Portability & Accountability Act (HIPAA)
SAFEGUARDING DHS CLIENT DATA PART 2 SAFEGUARDING PHI AND HIPAA Safeguards must: Protect PHI from accidental or intentional unauthorized use/disclosure.
HIPAA What’s Said Here – Stays Here…. WHAT IS HIPAA  Health Insurance Portability and Accountability Act  Purpose is to protect clients (patients)
HIPAA COMPLIANCE IN YOUR PRACTICE MARIBEL VALENTIN, ESQUIRE.
Columbia University Medical Center Health Insurance Portability and Accountability Act of 1996 (“HIPAA”) Privacy & Information Security Training 2009.
Protecting Sensitive Information PA Turnpike Commission.
From HIPAA to HITECH OMH Briefing.
Health Information Technology for Economic and Clinical Health Act (HITECH)
“ Technology Working For People” Intro to HIPAA and Small Practice Implementation.
Next ETCH Confidentiality and HIPAA Annual Review What you need to know. The Privacy Rule 1.
Quality Integrity Stewardship Courtesy Care Accountability Medical Records ARMA Florida Gulf Coast Chapter Michael Spake Lakeland Regional Medical Center.
LAW SEMINARS INTERNATIONAL CLOUD COMPUTING: LAW, RISKS AND OPPORTUNITIES Developing Effective Strategies for Compliance With the HITECH Act and HIPAA’s.
HIPAA Training Developed for Ridgeview Institute 2012 Hospital Wide Orientation.
HIPAA Michigan Cancer Registrars Association 2005 Annual Educational Conference Sandy Routhier.
Understanding HIPAA (Health Insurandce Portability and Accountability Act)
HIPAA BASIC TRAINING Presented by Anderson Health Information Systems, Inc.
HIPAA THE PRIVACY RULE. 2 HISTORY In 2000, many patients that were newly diagnosed with depression received free samples of anti- depressant medications.
HealthBridge is one of the nation’s largest and most successful health information exchange organizations. Tri-State REC: Privacy and Security Issues for.
HITECH and HIPAA Presented by Rhonda Anderson, RHIA Anderson Health Information Systems, Inc
A Road Map to Research at Jefferson: HIPAA Privacy and Security Rules for Researchers Presented By: Privacy Officer/Office of Legal Counsel October 2015.
Lessons Learned from Recent HIPAA Breaches HHS Office for Civil Rights.
Western Asset Protection
Top 10 Series Changes to HIPAA Devon Bernard AOPA Reimbursement Services Coordinator.
HIPAA: Breach Notification By: Office of University Counsel For: Jefferson IRB Continuing Education September 2014.
HIPAA Overview Why do we need a federal rule on privacy? Privacy is a fundamental right Privacy can be defined as the ability of the individual to determine.
ANNUAL HIPAA AND INFORMATION SECURITY EDUCATION. KEY TERMS  HIPAA - Health Insurance Portability and Accountability Act. The primary goal of the law.
AND CE-Prof, Inc. January 28, 2011 The Greater Chicago Dental Academy 1 Copyright CE-Prof, Inc
HIPAA TRIVIA Do you know HIPAA?. HIPAA was created by?  The Affordable Care Act  Health Insurance companies  United States Congress  United States.
HIPAA Training. What information is considered PHI (Protected Health Information)  Dates- Birthdays, Dates of Admission and Discharge, Date of Death.
The Health Insurance Portability and Accountability Act (HIPAA) requires Plumas County to train all employees in covered departments about the County’s.
HIPAA Privacy What Every Staff Member Needs to Know.
Health Insurance Portability and Accountability Act (HIPAA) Primer for Observers, Volunteers, Medical Students Dr. Michael Palumbo- Privacy Officer/ EVP.
Properly Safeguarding Personally Identifiable Information (PII) Ticket Program Manager (TPM) Social Security’s Ticket to Work Program.
Reviewed by: Gunther Kohn Chief Information Officer, UB School of Dental Medicine Date: October 20, 2015 Approved by: Sarah L. Augustynek Compliance Officer,
PHI Breach PHI Breach Dealing Breach With HIPAA Guidelines Guidelines.
Developed for Ridgeview Institute 2015 Hospital Wide Orientation
Protecting PHI & PII 12/30/2017 6:45 AM
HIPAA THE PRIVACY RULE Reviewed December 2012.
HIPAA Privacy & Security
Privacy & Confidentiality
Health Insurance Portability and Accountability Act of 1996 (HIPAA)
HIPAA PRIVACY AWARENESS, COMPLIANCE and ENFORCEMENT
Disability Services Agencies Briefing On HIPAA
Privacy, Security & NYS Confidentiality Laws
HIPAA Privacy & Security
HIPAA SECURITY RULE Copyright © 2008, 2006, 2004 by Saunders an imprint of Elsevier Inc. All rights reserved.
Move this to online module slides 11-56
The Health Insurance Portability and Accountability Act
Presentation transcript:

HIPAA Health Insurance Portability and Accountability Act of 1996 Sales Agent Training

HIPAA Federal Regulation issued by Department of Health and Human Services (HHS), Standards for Privacy of Individually Identifiable Health Information Effective April 14, 2003 Designed to protect an individual’s information from being improperly used or disclosed to unauthorized entities or individuals Enforced by the Office for Civil Rights

Health Information Technology for Economic and Clinical Health Act (HITECH) American Recovery and Reinvestment Act of 2009 (ARRA) and Health Information Technology for Clinical and Economic Health Act (HITECH) Added new marketing and fundraising restrictions and prohibition on sale of PHI Set higher standards and penalties for Business Associates (BA’s) Increased penalties for HIPAA violations Added data breach notification requirements

Who is covered by HIPAA? Covered Entities and their Business Associates (BAs) BAs are entities that perform functions or provide services to PUP and create, use or have access to a PUP Member’s PHI PUP is a Covered Entity FMOs/sales agencies are PUP’s BAs Note: Under HITECH, BAs are held to same standards as Covered Entities.

Business Associates (BAs) Entities that perform a function on PUP’s behalf, or provide a service to PUP and create, use or have access to a PUP member’s PHI BAs must comply with the HIPAA Privacy and Security Rule BAs must protect the PHI that PUP provides or the PHI they create/collect BAs must sign a HIPAA BA Agreement BAs must provide HIPAA training to their own employees, agents and subcontractors BAs must report data breaches to PUP BAs are subject to civil and criminal penalties

HIPAA Privacy & Security Officers HIPAA requires PUP to appoint a HIPAA Privacy and Security Officer to: ensure that PUP complies with the HIPAA Privacy and Security Rule ensure PUP has safeguards in place to prevent members’ PHI (including ePHI) from inadvertent uses and disclosures. PUP’s HIPAA Privacy Officer is: Lakesia Mosley PUP’s HIPAA Security Officer is: Satya Tottappillil

Member Rights under HIPAA HIPAA gives patients a right to: File a Privacy complaint Access to their records Ask for an Amendment to their records Special Restriction on disclosure/use of PHI Accounting of Disclosure of their PHI (to whom we disclosed their PHI) *If you receive any of these requests, immediately forward these requests to PUP’s Privacy Officer.

Protected Health Information (PHI) Any information (e.g., information on an enrollment application) PUP collects from a member that is transmitted or maintained in any form (verbally, electronically or paper). Relates to the past, present or future physical or mental health or condition of an individual Identifies the individual Examples of PHI: Member’s name, address, telephone number, e-mail address, policy number, HIC number, date of birth, etc.

Disclosures of PHI If a member asks you for claims, enrollment, prior authorization, etc. information, or If someone other than member (e.g., member’s son or neighbor) asks for information about the member Ask them to call PUP’s Member Services at 1-(866) 571-0693.

Fax Transmissions Fax machines may be used to transmit and receive PHI Best Practices to safeguard PHI: Pre-program destination numbers to reduce potential errors in misdialing Confirm the accuracy of the fax number before pressing start/send Print a confirmation page for each fax transmission Include a completed fax cover page with every fax Do not let faxes sit at a shared fax machine unattended

Emails All emails must be encrypted. Practice Safe Email Do not open, forward, or reply to suspicious emails Do not open suspicious email attachments or click on unknown website addresses NEVER provide your username and password to an email request Delete spam and empty the “Deleted Items” folder

Proper Disposal of PHI Best practices for disposing of PHI: Paper: shredding, burning, pulping, or pulverizing the records so that PHI is rendered essentially unreadable, indecipherable, and otherwise cannot be reconstructed All documents containing PHI must be shredded

Equipment Security Do Not leave your laptop, iPad or phone in your automobile USB memory sticks must be encrypted Laptops, iPads, phones must be guarded at all times Never share Company equipment with family or friends Lock your portable device with an access code. Report loss or theft of equipment immediately to PUP

Password Security Use a Str0ng Pa55w0rd Don’t use familiar dates, names, dictionary words. Use symbols, numbers, caps (think vanity plate) “1-hat3-Mean-pe0pl3” Don’t share passwords or use the same password across applications Change your passwords often

Remote Access Security When using your home/shared PC, you must: Have up-to-date security patches and anti-virus software Not share passwords Log off computer when not in use Restart a shared PC (i.e. at a hotel/conference) Be careful of “Public” networks Watch for shoulder surfing Never download ePHI

A Data Breach is… An impermissible use or disclosure under the Privacy Rule that compromises the security or privacy of the PHI such that the use or disclosure poses a significant risk of financial, reputational, or other harm to the affected individual.

Breach Notification Covered Entities must notify each person whose unsecured PHI is disclosed in a breach ASAP/within 60 days If an inadvertent data breach involves >500 Members, PUP has to notify the media and report to HHS If an inadvertent data breach involves <500 Members, PUP has to file an annual report with HHS

Breach Statistics Over 450 breach incidents listed on HHS website. Most involve theft or loss of laptops and portable devices. http://www.hhs.gov/ocr/privacy/hipaa/administrative/breachnotificationrule/breachtool.html

Reporting a Privacy Violation or Potential Breach PUP’s policy requires all PUP employees and BA’s to report all privacy violations and potential breaches to the PUP Privacy Officer immediately.

Federal Sanctions Tier A (offenders did not realize they violated the Act) Minimum per violation: $100 Maximum per calendar year: $25,000 Tier B (violations due to “reasonable cause”) Minimum per violation: $1,000 Maximum per calendar year: $50,000 Tier C (violations due to willful neglect but the company corrected) Minimum per violation: $10,000 Maximum per calendar year: $250,000 Tier D (violations due to willful neglect and the company did not correct) Minimum per violation: $50,000 Maximum per calendar year: $1.5 million

State Sanctions HITECH also gave states the authority to sue companies for HIPAA violations Connecticut Attorney-General sued Health Net of Connecticut in 2009 after it lost a computer disk drive with PHI of 446,000 members and delayed notifying members for 6 months

Recent Cases March 2012: Blue Cross Blue Shield of Tennessee fined $1.5 million for 57 unencrypted computer hard drives stolen from a leased facility. The drives contained PHI for over 1 million individuals. January 2012: Georgia Health Sciences University had to notify 513 patients of a laptop theft that contained PHI. The laptop was not secured in accordance with HITECH. April 2011: Mass. General Hospital paid $1 million because an employee took work home and left documents on a subway train that included billing and medical records of 192 patients.

Reporting HIPAA Violations HIPAA Privacy Officer: Lakesia Mosley Via Telephone: Office: 407-209-1010 ext. 12107 Cell: 407-495-7494 Via Email: compliance@pupcorp.com To report anonymously to PUP Hotline: 1 -866-461-5705

Scenario 1 I faxed an Enrollment Application to the wrong fax number. What should I do? Immediately report the incident to PUP’s Privacy Officer. Via telephone: Office: 407-209-1010 ext. 12107 Cell: 407-495-7494 Via email: compliance@pupcorp.com

Scenario 2 I had some completed applications in my car and my car was stolen. Who should I report this to? Immediately report the incident to the PUP Privacy Officer (and the police). Office: 407-209-1010 ext. 12107 Cell: 407-495-7494 Via email: compliance@pupcorp.com

Scenario 3 I received a phone call from a member’s daughter requesting a copy of her mother’s claim. What should I do? Give the daughter PUP’s Member Services Department telephone number to call (866) 571-0693.

Scenario 4 I use my iPad and laptop to store PUP member information and they were stolen. What should I do? Immediately report the incident to the PUP Privacy Officer. Via telephone: Office: 407-209-1010 ext. 12107 Cell: 407-495-7494 Via email: compliance@pupcorp.com

Acting Compliance Officer Questions? Lakesia Mosley HIPAA Privacy Officer Acting Compliance Officer 407-209-1010 ext. 12107 (Office) 407-495-7494 (Cell) 407-226-1951 (Fax)

Resources http://www.hhs.gov/hipaafaq/ (DHHS FAQs) http://www.cms.hhs.gov/HIPAAGenInfo (CMS FAQs) http://www.hhs.gov/ocr/hipaa (Office for Civil Rights) Office for Civil Rights, DHHS toll free number 800-368-1019 www.ahima.org (American Health Information Management Association)