HIPAA Privacy Training

Slides:



Advertisements
Similar presentations
Independent Contractor Orientation HIPAA What Is HIPAA? Health Insurance Portability and Accountability Act of 1996 The Health Insurance Portability.
Advertisements

HIPAA Basics Brian Fleetham Dickinson Wright PLLC.
HIPAA: Privacy, Security, and HITECH, Oh My! Presented by Stephanie L. Ganucheau, Special Assistant Attorney General.
1. As a Florida KidCare community partner families entrust you to not only help them navigate the Florida KidCare system but to keep the information they.
HIPAA Privacy Training. 2 HIPAA Background Health Insurance Portability and Accountability Act of 1996 Copyright 2010 MHM Resources LLC.
Health Insurance Portability and Accountability Act HIPAA Education for Volunteers and Students.
Protecting Enrollees’ Health Information under HIPAA Presented by the Michigan Department of Civil Service Employee Benefits Division Employee Benefits.
HIPAA Privacy Rule Training
Copyright Eastern PA EMS Council February 2003 Health Information Portability and Accountability Act It’s the law.
HIPAA Privacy Training Your Name Here. © 2004 MHM Resources Inc.2 HIPAA Background Health Insurance Portability and Accountability Act of 1996.
Increasing public concern about loss of privacy Broad availability of information stored and exchanged in electronic format Concerns about genetic information.
The Health Insurance Portability and Accountability Act of 1996– charged the Department of Health and Human Services (DHHS) with creating health information.
P E N N S Y L V A N I A C O A L I T I O N A G A I N S T D O M E S T I C V I O L E N C E P E N N S Y L V A N I A C O A L I T I O N A G A I N S T RAPE HIPAA.
HIPAA PRIVACY REQUIREMENTS Dana L. Thrasher Constangy, Brooks & Smith, LLC (205) ; Victoria Nemerson.
What is HIPAA? This presentation was created by The University of Arizona Privacy Office, The Office for the Responsible Conduct of Research on March 5,
1 HIPAA Education CCAC Professional Development Training September 2006 CCAC Professional Development Training September 2006.
NAU HIPAA Awareness Training
HIPAA Health Insurance Portability and Accountability Act.
HIPAA Privacy Rule Compliance Training for YSU April 9, 2014.
 The Health Insurance Portability and Accountability Act of  Federal Law designed to protect sensitive information.  HIPAA violations are enforced.
COMPLYING WITH HIPAA PRIVACY RULES Presented by: Larry Grudzien, Attorney at Law.
HIPAA THE PRIVACY RULE Reviewed December HISTORY In 2000, many patients that were newly diagnosed with depression received free samples of anti-
Jill Moore April 2013 HIPAA Update: New Rules, New Challenges.
Are you ready for HIPPO??? Welcome to HIPAA
HIPAA HIPAA Health Insurance Portability and Accountability Act of 1996.
HIPAA Compliance Strategies for Employers, METs, MEWAs and Taft Hartley Union Trust Funds The HIPAA Colloquium at Harvard University Presented by: Melissa.
HIPAA COMPLIANCE IN YOUR PRACTICE MARIBEL VALENTIN, ESQUIRE.
HIPAA Health Insurance Portability & Accountability Act of 1996.
HIPAA PRIVACY AND SECURITY AWARENESS.
“ Technology Working For People” Intro to HIPAA and Small Practice Implementation.
HIPAA The Privacy Rule Health Insurance Portability and Accountability Act of 1996 (HIPAA) The 104 th Congress passed the Act, Public Law ,
Privacy and Security of Protected Health Information NorthPoint Health & Wellness Center 2011.
Health Insurance Portability and Accountability Act (HIPAA)
Copyright ©2011 by Pearson Education, Inc. Upper Saddle River, New Jersey All rights reserved. Health Information Technology and Management Richard.
HIPAA Michigan Cancer Registrars Association 2005 Annual Educational Conference Sandy Routhier.
Medical Law and Ethics, Third Edition Bonnie F. Fremgen Copyright ©2009 by Pearson Education, Inc. Upper Saddle River, New Jersey All rights reserved.
Health Insurance Portability and Accountability Act (HIPAA) CCAC.
Health Insurance Portability and Accountability Act of 1996 HIPAA Privacy Training for County Employees.
Understanding HIPAA (Health Insurandce Portability and Accountability Act)
© 2013 The McGraw-Hill Companies, Inc. All rights reserved. Ch 8 Privacy Law and HIPAA.
FleetBoston Financial HIPAA Privacy Compliance Agnes Bundy Scanlan Managing Director and Chief Privacy Officer FleetBoston Financial.
HIPAA BASIC TRAINING Presented by Anderson Health Information Systems, Inc.
HIPAA THE PRIVACY RULE. 2 HISTORY In 2000, many patients that were newly diagnosed with depression received free samples of anti- depressant medications.
A Road Map to Research at Jefferson: HIPAA Privacy and Security Rules for Researchers Presented By: Privacy Officer/Office of Legal Counsel October 2015.
1 Privacy Plan of Action © HIPAA Pros 2002 All rights reserved.
Copyright © 2015 by Saunders, an imprint of Elsevier Inc. All rights reserved. Chapter 3 Privacy, Confidentiality, and Security.
HIPAA Overview Why do we need a federal rule on privacy? Privacy is a fundamental right Privacy can be defined as the ability of the individual to determine.
 Health Insurance and Accountability Act Cornelius Villalon Jr.
HIPAA Training. What information is considered PHI (Protected Health Information)  Dates- Birthdays, Dates of Admission and Discharge, Date of Death.
What is HIPAA? Health Insurance Portability and Accountability Act of HIPAA is a major law primarily concentrating on the prolongation of health.
The Health Insurance Portability and Accountability Act (HIPAA) requires Plumas County to train all employees in covered departments about the County’s.
HIPAA Training Workshop #3 Individual Rights Kaye L. Rankin Rankin Healthcare Consultants, Inc.
HIPAA Privacy Rule Training
Health Insurance Portability and Accountability Act of 1996
HIPAA Privacy & Security
HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT (HIPAA)
What is HIPAA? HIPAA stands for “Health Insurance Portability & Accountability Act” It was an Act of Congress passed into law in HEALTH INSURANCE.
HIPAA CONFIDENTIALITY
HIPAA Administrative Simplification
HIPAA PRIVACY AWARENESS, COMPLIANCE and ENFORCEMENT
Disability Services Agencies Briefing On HIPAA
The HIPAA Privacy Rule and Research
HIPAA Privacy & Security
HIPAA SECURITY RULE Copyright © 2008, 2006, 2004 by Saunders an imprint of Elsevier Inc. All rights reserved.
The Health Insurance Portability and Accountability Act
HIPAA Do’s and Don'ts: What is Really Behind Protected Health Information (PHI) and Health Care Privacy Rules Paul Sisler, Director, Information Services;
Introduction to the PACS Security
WELCOME.
The Health Insurance Portability and Accountability Act
Presentation transcript:

HIPAA Privacy Training HIPAA Privacy Training – This presentation is not an exhaustive explanation of all HIPAA regulations, but just a quick course of HIPAA as it applies to Flexible Benefit Plans. Copyright 2010 MHM Resources LLC

HIPAA Privacy Training Background Health Insurance Portability and Accountability Act of 1996 The Health Insurance Portability and Accountability Act of 1996 (HIPAA) was created out of the Health Insurance and Welfare Acts of 1996. The Act broke the portability and accountability process into several pieces. And each piece has its own compliance deadline that unfolds over several years. Copyright 2010 MHM Resources LLC Copyright 2010 MHM Resources LLC

HIPAA Privacy Training Portability Part One – Portability, access, and renewability requirements Part one of HIPAA was the portability, access, and renewability requirements for group health plans. Among other directives, it outlined the need for portability of coverage. This didn't necessarily mean individuals could retain their current health insurance when changing employment. But instead, established rules to ensure a smoother transition from one plan to another. Copyright 2010 MHM Resources LLC Copyright 2010 MHM Resources LLC

Administrative Simplification HIPAA Privacy Training Administrative Simplification Part Two – Administrative Simplification Standards for maintenance and transmission of health information Part two is called "Administrative Simplification." The Department of Health and Human Services (DHHS) was charged with developing standards for maintenance and transmission of health information that identifies individual patients. In the ever-increasing world of electronic data transfer and storage, the need for individual privacy is a priority. It’s also imperative that different systems exchange information easily. The Administrative Simplification rules take on these significant tasks. You may be subject to the Electronic Data Interchange (EDI) HIPAA rules if you exchange electronic information directly with a healthcare provider or a health plan. Copyright 2010 MHM Resources LLC Copyright 2010 MHM Resources LLC

HIPAA Privacy Training Part Three – Privacy The privacy regulations govern how individually identifiable medical information must be protected. The DHHS published privacy final regulations in December of 2000. A barrage of questions and concerns led to the regulations being amended and refined. Post-final regulations were issued in August 2002. The privacy regulations govern how individually identifiable medical information may be protected. Specific rights for individuals regarding protected health information (PHI) and obligations of healthcare providers, health plans, and healthcare clearinghouses. Copyright 2010 MHM Resources LLC Copyright 2010 MHM Resources LLC

HIPAA Privacy Training Security Part Four – Security Regulates how health plans and other covered entities that electronically maintain or transmit PHI implement reasonable and appropriate safeguards for the availability and protection of electronic protected health information (PHI) The security regulations requires health plans and other covered entities that electronically maintain or transmit PHI to implement reasonable and appropriate safeguards for the availability and protection of electronic PHI. Copyright 2010 MHM Resources LLC Copyright 2010 MHM Resources LLC

HIPAA Privacy Training Breach Notification Part Five – Breach Notification Health Information Technology for Economic and Clinical Health (HITECH) Act Outlines how affected individuals must be notified if there is a breach of their “unsecured” PHI Disclosure Log Effective September 23, 2009 Any incident where unsecured PHI experiences unauthorized access, use or disclosure must be revealed to the individual. The HITECH Act outlines the definition of unsecured PHI, how to determine harm to the individual and the notification process. Copyright 2010 MHM Resources LLC Copyright 2010 MHM Resources LLC

Flexible Benefit Plans HIPAA Privacy Training Flexible Benefit Plans The Health Flexible Spending Account (FSA), or unreimbursed medical portion of a cafeteria plan; or a Health Reimbursement Arrangement (HRA) are considered to be health and welfare benefit plans. Why are flexible benefits – such as Section 125 Cafeteria Plans – mixed up in the HIPAA hoopla? The Health FSA, or unreimbursed medical portion of a cafeteria plan; or a Health Reimbursement Arrangement (HRA) are considered to be health and welfare benefit plans. Health FSAs and HRAs are just like any other health insurance product offered through an independent carrier or a self-funded insurance plan sponsored and administered by the employer. Therefore, Health FSAs and HRAs must comply with all HIPAA regulations. Copyright 2010 MHM Resources LLC Copyright 2010 MHM Resources LLC

HIPAA Privacy Training HIPAA Definitions Covered Entity A healthcare provider that conducts certain transactions in electronic form A healthcare clearinghouse A health plan - includes all the employer's welfare benefit plans like health insurance, a Health FSA within a cafeteria plan, and any HRAs. Before we get started on the nuts and bolts of the privacy act, we need to define a few key words and phrases. A “Covered Entity” can be the healthcare provider, a healthcare clearinghouse that transmits information for a provider, and the actual health plan. Health plans include all the employer’s welfare benefit plans like health insurance, a Health FSA, and Health Reimbursement Arrangements (HRAs). Copyright 2010 MHM Resources LLC Copyright 2010 MHM Resources LLC

HIPAA Privacy Training HIPAA Definitions If you are an employer, you are generally not a covered entity. Employees, the plan, and its Business Associates may not freely share information with the employer unless firewalls exist to contain the information. However, the employer is not a covered entity and the plan may not freely share information with the employer. The employer must erect “firewalls” around anyone who views protected health information (PHI). Copyright 2010 MHM Resources LLC Copyright 2010 MHM Resources LLC

HIPAA Privacy Training HIPAA Definitions Covered Transactions Healthcare or dental claims administration Healthcare eligibility Benefits enrollment and maintenance Payroll deduction and group premium payment Retail pharmacy transactions “Covered Transactions” are any exchange of information that deals with claims administration, eligibility in the plan, and enrollment and dis-enrollment information. Payroll deduction and premium payments information are considered covered transactions, along with any pharmacy information on an individual. Copyright 2010 MHM Resources LLC Copyright 2010 MHM Resources LLC

HIPAA Privacy Training HIPAA Definitions Business Associate A person, business, or agency that conducts covered transactions for another legal entity. An example of a Business Associate would be a plan service provider who performs claims adjudication on behalf of an employer’s plan. Copyright 2010 MHM Resources LLC Copyright 2010 MHM Resources LLC

HIPAA Privacy Training HIPAA Definitions Business Associate Agreement The health plan must engage in a Business Associate Agreement with all Business Associates. This Business Associate Agreement is a written document spelling out the requirement of the Business Associate to comply with all HIPAA regulations. This agreement is between the vendor (Business Associate) and the plan, facilitated by the employer. Copyright 2010 MHM Resources LLC Copyright 2010 MHM Resources LLC

HIPAA Privacy Training HIPAA Definitions Protected Health Information (PHI) Individually identifiable medical information in any form, including oral communication that is created or received by a covered entity or employer. PHI relates to an individual's past, present, or future physical or mental condition, the provision of healthcare services, or anything that identifies the individual as it relates to such information. Even enrollment and dis-enrollment information may be considered PHI if it includes information about covered dependents. Copyright 2010 MHM Resources LLC Copyright 2010 MHM Resources LLC

HIPAA Privacy Training HIPAA Definitions Breach of Unsecured PHI A breach is the unauthorized access, use or disclosure of unsecured PHI. PHI must be encrypted or destroyed In motion, in use, at rest Access controls do not make PHI secure Breach is the unauthorized access, use or disclosure of unsecured PHI. Unsecured PHI is information that is not secured by encryption or destruction and could be interpreted by unauthorized individuals. PHI must be encrypted to be considered secure while in motion (e-mails), in use, at rest (residing on a data server) or it must be destroyed. Access controls or firewalls are not adequate protection. PHI this is secured by passwords or firewalls would be considered unsecured PHI. Copyright 2010 MHM Resources LLC Copyright 2010 MHM Resources LLC

HIPAA Privacy Training HIPAA Definitions Significant risk of harm to individual Immediate steps were taken to obtain guarantee that PHI will not be used or disclosed PHI returned prior to be accessed Determine type or amount of PHI disclosed To qualify as a breach that requires notification, there must be significant risk of harm to the individual. Facts and circumstances determine if there is significant risk of harm arising from a breach. Were immediate steps taken to obtain an oath or guarantee that the information would be not used or disclosed in violation of HIPAA privacy laws? Was the PHI returned prior to being accessed, such as an unopened explanation of benefit statement returned to the health carrier? A determination is made as to the type or amount of PHI disclosed and if it would cause significant harm to the individual. Copyright 2010 MHM Resources LLC Copyright 2010 MHM Resources LLC

HIPAA Privacy Training HIPAA Overview Individuals “own” their PHI HIPAA defines what PHI is Privacy notice tells employees how their PHI will be used and disclosed. No other notice is required Privacy notice gives employees certain rights to their PHI In a nutshell, HIPAA recognizes that PHI is owned by each individual. So HIPAA defines what PHI is, in what instances it can be used without prior permission, and access rights for individuals. What does this mean to you? Copyright 2010 MHM Resources LLC Copyright 2010 MHM Resources LLC

Where does PHI Come From? HIPAA Privacy Training Where does PHI Come From? Mail Fax Front desk Phones Electronically Orally, in person Protected Health Information (PHI) can enter your environment through many different avenues. Plan service providers certainly receive PHI through the mail system as they receive claims for reimbursement. The actual claim form may contain PHI – such as the participant’s social security number, the healthcare provider’s name, or the name of the dependent for which health services were provided. Claims are also received via fax machines. And participants may drop off information or claims to your receptionist. Also, phone calls and e-mails from participants might reveal information that is considered PHI. So what should you do with all this information that is seemingly floating around? Copyright 2010 MHM Resources LLC Copyright 2010 MHM Resources LLC

HIPAA Privacy Training Who Can See PHI? Covered entities with privacy policies in place Business Associates that have signed Business Associate Agreements in place with the covered entities and also have privacy policies in place Individual employees may review and change their own PHI Who may see the protected health information of others? If you are an employer, you are not a covered entity. Employees, the plan, and its Business Associates may not freely share information with the employer unless firewalls exist to contain the information. If you are a plan service provider and have a Business Associate Agreement with the plan, you may view individual PHI and share the information with other covered entities. Participants may call to discuss their claims and eligible expenses. The plan service provider needs rules in place to identify the individual before discussing PHI. Even disclosing PHI to a spouse can be unlawful. The employer and all vendors need rules in place to identify the individual who is calling before discussing PHI. Copyright 2010 MHM Resources LLC Copyright 2010 MHM Resources LLC

HIPAA Privacy Training When Can You Reveal PHI? Healthcare operations Payment Treatment As permitted or required by law Pursuant to an authorization The HIPAA Notice of Privacy Practices must be distributed to all employees, and spells out all the uses and disclosure of PHI that may be made without further notice. The notice generally deals with operation of the healthcare plan, payment to the healthcare provider, treatment, or as required by law. PHI may also be discussed with a non-covered entity, such as the employer, when the participant has signed a written authorization form. Copyright 2010 MHM Resources LLC Copyright 2010 MHM Resources LLC

HIPAA Privacy Training When Can You Reveal PHI? Identify individual with whom you are speaking Verify SSN, gender, birth date, and/or address Authorization signed by participant “Minimum Necessary” standard Reveal the minimum necessary information when releasing information Before discussing a participant’s claim form or revealing specific information from an enrollment or claim form, the identity of the participant must be verified. Verify their social security number, gender, and ask for their date of birth or address. Compare the information received to stored information. Only reveal the absolute “minimum necessary” information to answer any inquiry. Copyright 2010 MHM Resources LLC Copyright 2010 MHM Resources LLC

Applies to All Covered Entities HIPAA Privacy Training Applies to All Covered Entities Employers are generally not covered entities A covered entity may not freely share an individual's PHI with the employer or a non-health plan. HIPAA privacy applies to all covered entities. Employers themselves are not covered entities; thus a covered entity may not freely share an individual's PHI with the employer or a non-health plan. However, a group health plan may disclose PHI to its plan sponsor for "plan administration functions." This type of disclosure might take place during the claims appeal process. Enrollment and dis-enrollment information can be disclosed to the plan sponsor. The information revealed to the plan sponsor may not be used for any other purpose - such as in hiring or dismissal decisions. Therefore, it’s best for the employer to create a "firewall" within the organization to protect and contain sensitive information. Copyright 2010 MHM Resources LLC Copyright 2010 MHM Resources LLC

Protect PHI in Your Office HIPAA Privacy Training Protect PHI in Your Office Train all workers with access to PHI Don’t enter PHI into a software system or program unless information encrypted while at rest or in transit Create a “clean desk” policy Store PHI under lock and key Don’t discuss an individual’s health information in public Identify callers Take steps to protect PHI in your office. Make sure that all workers with access to PHI are HIPPA trained. Avoid entering PHI into software systems or programs. For instance, customer service representatives may inadvertently enter an individual's protected health information while logging a call. A “clean desk” policy means that claims, or other information pertaining to an individual’s health, must be properly stored before your employees leave their work area. And again, identify callers before giving out any protected information. Copyright 2010 MHM Resources LLC Copyright 2010 MHM Resources LLC

Protect PHI in Your Office HIPAA Privacy Training Protect PHI in Your Office Letters to participants should not contain their SSNs Offsite storage Retain complete list of claim forms, etc. offsite Use security tape on boxes to reveal unauthorized entry. Trash Shredding Here are some ways you can protect PHI in your office: Don’t place social security numbers on correspondence going out to participants. Use offsite storage for storing paid claim forms, or information that is no longer needed. Remember, you must keep all PHI for at least six years. And finally, when it’s time to dispose of any materials that contain Protected Health Information – it must be shredded and disposed of properly. You should not leave any opening for PHI to fall into the wrong hands. Copyright 2010 MHM Resources LLC Copyright 2010 MHM Resources LLC

Protect Participant’s Privacy HIPAA Privacy Training Protect Participant’s Privacy Right to inspect and copy Accounting of disclosures Amend Request restrictions Request confidential communications Right to receive a paper copy of the privacy notice Employees have the right to inspect, get a copy of, and/or amend their personal information. You must keep an accounting of certain disclosures that you make. And employees may request certain restrictions to disclosures, confidential communications, and a right to your privacy policy. Copyright 2010 MHM Resources LLC Copyright 2010 MHM Resources LLC

HIPAA Privacy Training Employers Employer puts in place HIPAA privacy policies and procedures Plan documents and Summary Plan Descriptions for all employer-sponsored health plans Assign a HIPAA Compliance Official Employer must certify to plan that HIPAA privacy rules are being followed The health plan must adopt a notice of privacy practices. This notice contains what PHI is, who is authorized to access PHI, the individual's rights, and how this information is to be used. It must retain the right of the individual to review and make any changes to medical records. And, if requested, the information must be made available to certain law enforcement groups or the Secretary of DHHS. Plan documents for all health plans sponsored by the employer must contain the permitted and required uses and disclosure of PHI. Assign a HIPAA Compliance Official to track training efforts, notifications and requests from individuals, and complete the certification to the health plan. Copyright 2010 MHM Resources LLC Copyright 2010 MHM Resources LLC

HIPAA Privacy Training Employers The health plan must distribute a notice of privacy practices for employees Business Associate Agreements must be in place Train workforce on HIPPA compliance Train workforce on breach reporting HIPAA privacy notices are generally contained in the Summary Plan Description. Make sure these are distributed to all employees. Business Associate Agreements must be in place between the vendors (Business Associates) and the plan. And lastly, train your workforce on HIPAA compliance and how to report a breach to your designated HIPAA Compliance Official. Copyright 2010 MHM Resources LLC Copyright 2010 MHM Resources LLC

HIPAA Privacy Training Breach Notification Accounting for Disclosures of PHI PHI may be disclosed for public policy and safety reasons and other mandatory disclosures listed below without an individual’s authorization These disclosures must be logged since they were disclosed without the individual’s knowledge. The disclosure log must be made available to the individual upon request. The HIPPA Compliance Official is also in charge of accounting for disclosures of PHI. Any disclosures for public policy and safety reason and other mandatory disclosures listed below without an individual’s authorization must be logged. The individual may request their disclosure log. Copyright 2010 MHM Resources LLC Copyright 2010 MHM Resources LLC

HIPAA Privacy Training Breach Notification Individuals must be notified if their PHI has been disclosed and the information is unsecured PHI Safe harbor to avoid breach notification: Encryption whether PHI is at rest, in use or in transit Destruction http://www.hhs.gov/ocr/privacy/hipaa/administrative/breachnotificationrule/ Notification of unauthorized access, use or disclosure must be made to individuals if the information accessed was “unsecured.” You can get more information at: http://www.hhs.gov/ocr/privacy/hipaa/administrative/breachnotificationrule/ To avoid breach notifications, make sure that PHI is either encrypted or completely destroyed when no longer needed for plan administration purposes. Copyright 2010 MHM Resources LLC Copyright 2010 MHM Resources LLC

HIPAA Privacy Training Plan Service Provider HIPAA privacy policies and procedures Business Associate Agreements must be in place between the plan service provider (Business Associate) and the plan. Covered entities like plan service providers who are Business Associates of the plan must have HIPAA privacy policies and procedures in place and a signed Business Associate Agreement in place with the plan. And don’t forget – plan service providers are employers also. They must adhere to all the employer rules for their health plans. Copyright 2010 MHM Resources LLC Copyright 2010 MHM Resources LLC

Exception to Compliance HIPAA Privacy Training Exception to Compliance Self-administered health plans with fewer than 50 participants are exempt from privacy compliance All healthcare plans were to have their privacy procedures and forms in place by April 14, 2003. Breach notification requirements were effective September 23, 2009. If you are an employer and administer your own healthcare plan that has fewer than 50 participants, then HIPAA does not apply to you. Copyright 2010 MHM Resources LLC Copyright 2010 MHM Resources LLC

Civil and Criminal Penalties HIPAA Privacy Training Civil and Criminal Penalties Substantial civil and criminal penalties apply to noncompliance of HIPAA regulations Be aware of your state laws Get legal counsel If you think you can escape the burdens of HIPAA, think again. Substantial civil and criminal penalties apply to noncompliance of HIPPA regulations. Anyone associated with health care must be aware of the rules and apply them to their unique situation. And remember, state laws may be more stringent than federal regulations. Employers should seek legal counsel to determine their level of compliance needs and the level of compliance to expect from plan providers and vendors. Copyright 2010 MHM Resources LLC Copyright 2010 MHM Resources LLC

HIPAA Privacy Training Privacy – Your business depends on it This presentation is not an exhaustive explanation of all HIPAA regulations, but just a quick course of HIPAA as it applies to Flexible Benefit Plans. Copyright 2010 MHM Resources LLC