Health Insurance Portability and Accountability Act

Slides:



Advertisements
Similar presentations
Independent Contractor Orientation HIPAA What Is HIPAA? Health Insurance Portability and Accountability Act of 1996 The Health Insurance Portability.
Advertisements

Privacy and Information Security Training ( ) VUMC Privacy Website
System Security & Patient Confidentiality General Lesson 1.
Health Insurance Portability and Accountability Act HIPAA Education for Volunteers and Students.
HIPAA. What Why Who How When What Is HIPAA? Health Insurance Portability & Accountability Act of 1996.
HIPAA Basic Training for Privacy & Information Security Vanderbilt University Medical Center VUMC HIPAA Website:
LMC WHAT IS HIPAA AND HOW TO COMPLY WITH IT? Health Insurance Portability and Accountability Act of 1996.
National Health Information Privacy and Security Week Understanding the HIPAA Privacy and Security Rule.
HIPAA – Privacy Rule and Research USCRF Research Educational Series March 19, 2003.
The Health Insurance Portability and Accountability Act of 1996– charged the Department of Health and Human Services (DHHS) with creating health information.
1 HIPAA Education CCAC Professional Development Training September 2006 CCAC Professional Development Training September 2006.
NAU HIPAA Awareness Training
HIPAA Health Insurance Portability and Accountability Act 1.
HIPAA Privacy Rule Compliance Training for YSU April 9, 2014.
Health Insurance Portability & Accountability Act “HIPAA” To every patient, every time, we will provide the care that we would want for our own loved ones.
Are you ready for HIPPO??? Welcome to HIPAA
HIPAA How can you maintain patient privacy and confidentiality? General Medicine LCCA.
HIPAA HIPAA Health Insurance Portability and Accountability Act of 1996.
Session 3 – Who has access to what? And how do you enter vital signs into an EMR system? ELECTRONIC MEDICAL RECORD SYSTEMS.
Protecting Client Data HIPAA, HITECH and PIPA Part 1A
CCHAP Practice Manager’s Meeting HIPAA Guidelines and Updates for Primary Care Practices Thursday October 24 th 2013 Noon – 1:00PM Instructions to join.
Mr. Caputo Unit #1 Lesson #7
SAFEGUARDING DHS CLIENT DATA PART 2 SAFEGUARDING PHI AND HIPAA Safeguards must: Protect PHI from accidental or intentional unauthorized use/disclosure.
Version 6.0 Approved by HIPAA Implementation Team April 14, HIPAA Learning Module The following is an educational Powerpoint presentation on the.
1 Enterprise Security Your Information Security and Privacy Responsibilities © 2008 Providence Health & Services This information may be replicated for.
HIPAA What’s Said Here – Stays Here…. WHAT IS HIPAA  Health Insurance Portability and Accountability Act  Purpose is to protect clients (patients)
HIPAA Privacy & Security EVMS Health Services 2004 Training.
Columbia University Medical Center Health Insurance Portability and Accountability Act of 1996 (“HIPAA”) Privacy & Information Security Training 2009.
Protected Health Information (PHI). Privileged Communication An exchange of information between two individuals in a confidential relationship. (Examples:
HIPAA PRIVACY AND SECURITY AWARENESS.
Next ETCH Confidentiality and HIPAA Annual Review What you need to know. The Privacy Rule 1.
HIPAA (health insurance portability and accountability act)
Building a Privacy Foundation. Setting the Standard for Privacy Health Insurance Portability and Accountability Act (HIPAA) Patient Bill of Rights Federal.
Mr. Fleming.  Law passed by Congress in  Right to Privacy ◦ Medical information of patient can only be shared with doctor and professionals administering.
HIPAA Pre-Clerkship Review Dr. Maryann Skrabal, Pharm.D., CDE.
HIPAA THE PRIVACY RULE. 2 HISTORY In 2000, many patients that were newly diagnosed with depression received free samples of anti- depressant medications.
A Road Map to Research at Jefferson: HIPAA Privacy and Security Rules for Researchers Presented By: Privacy Officer/Office of Legal Counsel October 2015.
HIPAA and Human Subjects Research IRB Member CE May 2014 Slideshow by Sean Horkheimer.
Aged and Disabled Waiver (ADW) Health Insurance Portability and Accountability Act (HIPAA) Training 2015 October 2015.
HIPAA TRIVIA Do you know HIPAA?. HIPAA was created by?  The Affordable Care Act  Health Insurance companies  United States Congress  United States.
HIPAA Training. What information is considered PHI (Protected Health Information)  Dates- Birthdays, Dates of Admission and Discharge, Date of Death.
Health Insurance Portability and Accountability Act (HIPAA) Primer for Observers, Volunteers, Medical Students Dr. Michael Palumbo- Privacy Officer/ EVP.
UC Riverside Health Training and Development
HIPAA Privacy Rule Training
HIPAA Privacy and Security
HIPAA PRIVACY & SECURITY TRAINING
WHAT IS HIPAA AND HOW TO COMPLY WITH IT?
HIPAA Privacy & Security
HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT (HIPAA)
HIPAA Online Student Orientation
HIPAA Basic Training for Privacy and Information Security
WHAT IS HIPAA AND HOW TO COMPLY WITH IT?
Health Insurance Portability and Accountability Act of 1996 (HIPAA)
HIPAA PRIVACY AWARENESS, COMPLIANCE and ENFORCEMENT
Disability Services Agencies Briefing On HIPAA
Health Insurance Portability and Accountability Act
The new data protection rules
The HIPAA Privacy Rule and Research
Move this to online module slides 11-56
Move this to online module slides 11-56
Privileged Communications
HIPAA Privacy & Security
HIPAA Overview.
The Health Insurance Portability and Accountability Act
HIPAA & PHI TRAINING & AWARENESS
Good Spirit School Division
Lesson 3: Medical Records
HIPAA Do’s and Don'ts: What is Really Behind Protected Health Information (PHI) and Health Care Privacy Rules Paul Sisler, Director, Information Services;
Handling Information Securely
The Health Insurance Portability and Accountability Act
Presentation transcript:

Health Insurance Portability and Accountability Act HIPAA Highlights Health Insurance Portability and Accountability Act

Target Audience: Students Contacts: Privacy Office, privacy1@fairview Target Audience: Students Contacts: Privacy Office, privacy1@fairview.org or 612-672-5647 Estimated Duration and Viewing Instructions The expected time to complete this learning activity is 5 minutes.

On completion of this lesson, learners should be able to: Take reasonable steps to protect patient confidentiality when communicating with patient, family members, other caregivers, physicians and others, both face-to-face and electronically.

Lesson Includes: Minimum Necessary Log off / Secure PHI Communication Telephone Messages Faxes Email Texting Sharing Information Awareness Safeguarding Information Checking names Multi-tasking Click here at any time to return to this slide.

HIPAA (Health Insurance Portability and Accountability Act) HIPAA is a federal regulation requiring us to protect the privacy of patient information. Any health and billing information that is connected with an identifier is considered “protected health information” (PHI) and must be protected.

Do you receive more patient information than you need to do your job?

Do you receive more patient information than you need to do your job? If you answered YES, then we are potentially in violation of HIPAA’s “Minimum Necessary” requirement.

MINIMUM NECESSARY Analyze what you send and receive to do your work. 1 Analyze what you send and receive to do your work. This may involve a discussion with those you communicate with so both the sender and receiver understand what information is required to get the job done. Just because it is easier to send it than remove the unnecessary information does not make it OK to send. We put patient confidentiality at risk to do our jobs, but we can minimize this risk by scrutinizing and limiting the information we send and receive.

MINIMUM NECESSARY Analyze what you send and receive to do your work. 1 Analyze what you send and receive to do your work. This may involve a discussion with those you communicate with so both the sender and receiver understand what information is required to get the job done. Minimum Necessary also must be followed when giving information to our Business Associates (BA). BAs are vendors who need to use PHI when performing services on behalf of Fairview like an external law firm or consulting company. All BAs must have a business associate agreement on file in iManage.

MINIMUM NECESSARY 1 Just because it is easier to send it than remove the unnecessary information does not make it OK to send. We put patient confidentiality at risk to do our jobs, but we can minimize this risk by scrutinizing and limiting the information we send and receive.

LOG OFF / SECURE PHI 2 You are responsible for all accesses that are done under your user ID. Be sure to log off applications when you step away. Do not risk having someone look at records that will be traced back to you for an explanation.

LOG OFF / SECURE PHI 2 Do not take PHI out of Fairview – there are very few employees that are required to transport patient information in order to do their job. If you must transport patient information, your manager needs to approve this practice first.

COMMUNICATION 3 Telephone Messages Obtain patient consent before leaving detailed information on their voicemail. If you do not have verbal or written consent, only leave minimal information such as, “This message is for John Smith. This is Jane from Eden Prairie Clinic. Please return my call at 952-###-#### at your earliest convenience.”

COMMUNICATION 3 Faxes Enter fax numbers very carefully and always use a fax coversheet so recipients will know who to contact with questions or to report faxes that are sent to the wrong location.

COMMUNICATION 3 Email Type the word “SECURE” in an email subject line to securely email confidential information outside of fairview.org. Recipients will receive a link to a secure server where they will log in to retrieve the message.

COMMUNICATION 3 Texting Limit text messages that include patient information to communications necessary for current patient care, and DO NOT include direct identifiers. Fairview only allows indirect identifiers in the message such as room number, patient initials and age. DO NOT include name, date of birth or other identifiers. *Exception: When needed, direct identifiers such as patient name may be sent to dedicated pagers as long as the message is deleted promptly.

COMMUNICATION CORRECT INCORRECT 3 Texting To: --- From: --- Sending 24 yo M in for urgent appy To: --- From: --- Sending Jon Doe 2/15/64 in for urgent appy CORRECT INCORRECT

Delete message promptly COMMUNICATION 3 Pager Jon Doe urgent appy ALLOWED IF NEEDED Delete message promptly

COMMUNICATION 3 Sharing Information with Family Ask for the patient’s permission before sharing information with family/others or in the presence of family/others. Unless a patient is not able to consent, we must allow the patient to agree or object to sharing details other than their general condition.

AWARENESS 4 Safeguarding Patient Information Be aware of your surroundings. Take reasonable steps to prevent unauthorized individuals from seeing, hearing or accessing confidential information (speak softly, lock/secure, destroy in confidential manner, log out of applications).

AWARENESS 4 Checking Names Be sure to page through copies and check the names before mailing or handing documents to patients. A common, but preventable, HIPAA violation at Fairview is when a patient is handed their own documents and are also given the records of another patient who may have been printed next (e.g. After Visit Summary, labs).

AWARENESS 4 Multi-tasking Be mindful of multitasking and validate which patient’s information you are working with to prevent mishandling. We are all busy and juggle multiple tasks. This, however, can lead to mix-ups causing privacy issues.