Open PHI Institute (OPHII)

Slides:



Advertisements
Similar presentations
HIPAA Basics Brian Fleetham Dickinson Wright PLLC.
Advertisements

1. As a Florida KidCare community partner families entrust you to not only help them navigate the Florida KidCare system but to keep the information they.
What is HIPAA? This presentation was created by The University of Arizona Privacy Office, The Office for the Responsible Conduct of Research on March 5,
CHAPTER © 2011 The McGraw-Hill Companies, Inc. All rights reserved. 2 The Use of Health Information Technology in Physician Practices.
HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT OF 1996 (HIPAA)
 The Health Insurance Portability and Accountability Act of  Federal Law designed to protect sensitive information.  HIPAA violations are enforced.
© 2011 The McGraw-Hill Companies, Inc. All rights reserved. 2.5 HIPAA Legislation and its Impact on Physician Practices 2-15 The Health Insurance Portability.
Are you ready for HIPPO??? Welcome to HIPAA
Steps to Compliance: Risk Assessment PRESENTED BY.
HEALTHCARE BREACHES Andrew Kuebler MIS 534 April 15, 2015.
The University of Kansas Medical Center Shadow Experience Training.
Protecting Sensitive Information PA Turnpike Commission.
The Use of Health Information Technology in Physician Practices
HIPAA PRIVACY AND SECURITY AWARENESS.
WHAT EVERY RISK MANAGER NEEDS TO KNOW ABOUT DATA SECURITY RIMS Rocky Mountain Chapter Meeting Thursday, July 25, :30 am – 12:30 pm.
Company LOGO Data Privacy HIPAA Training. Progress Diagram Function in accordance Apply your knowledge Learn the Basics Orientation Evaluation Training.
Affordable Care Act Reporting Seminar August, 2015 The materials and information have been prepared for informational purposes only. This is not legal.
Copyright ©2011 by Pearson Education, Inc. Upper Saddle River, New Jersey All rights reserved. Health Information Technology and Management Richard.
AUGUST 25, 2015 Cyber Insurance:
Chapter 2 Standards for Electronic Health Records McGraw-Hill/Irwin Copyright © 2009 by The McGraw-Hill Companies, Inc. All Rights Reserved.
HIPAA Michigan Cancer Registrars Association 2005 Annual Educational Conference Sandy Routhier.
A Growing Threat Debbie Russ 1/28/2015. What is Ransomware? A type of malware which restricts access to the computer system that it infects, and demands.
GSHRM Conference Cyber Security Education Shri Cockroft, CISO Piedmont Healthcare, Inc. September 21, 2015.
Are You Totally Protected?. USA Benefits Group's Eagle Division has had the honor of insuring over 200,000 families the last three decades! We have witnessed.
Data Security and Payment Card Acceptance Presented by: Brian Ridder Senior Vice President First National September 10, 2009.
HIPAA THE PRIVACY RULE. 2 HISTORY In 2000, many patients that were newly diagnosed with depression received free samples of anti- depressant medications.
Snowe Amendment to the Wired Act William F. Pewen, Ph.D., M.P.H. Office of Senator Olympia J. Snowe, ME (202)
Tamra Pawloski Jeff Miller. The views, information, and content expressed herein are those of the authors and do not necessarily represent the views of.
1 Demonstration of Health - IT Benefits: Access to PHI in India Presented by Mr. Amitava Chakraborty IPR, Space Law & Health-IT Consultant (India, US,
Data Security & Privacy: Fundamental Risk Mitigation Tactics 360° of IT Compliance Anthony Perkins, Shareholder Business Law Practice Group Data Security.
CH 10. Confidentiality A. Confidentiality about sensitive medical information is necessary to preserve the patient’s dignity. B. In order to receive payment.
Medical Record Summarization. What is Medical Record Summarization? An expert review of a wide range of medical documents. A quick guide to the most important.
AND CE-Prof, Inc. January 28, 2011 The Greater Chicago Dental Academy 1 Copyright CE-Prof, Inc
What lessons can we learn from other data breaches? Target Sentry Insurance Dynacare Laboratories 1 INTRODUCTION.
HIPAA/HITECH TRAINING. Why are we here?  HIPAA  HITECH  PHI  Minimum Necessary “Need to Know”  Breaches and Fines.
HIPAA HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT UI EMS Training Dept.
HIPAA TRIVIA Do you know HIPAA?. HIPAA was created by?  The Affordable Care Act  Health Insurance companies  United States Congress  United States.
Mobile Technology and Insurance Employee Benefit Programs By Scott Warner.
HL7 Integration Software Development at Custom Soft regulates data storage very efficiently so that the HL7 data transfer of your health organization.
HIPAA THE PRIVACY RULE Reviewed December HISTORY In 2000, many patients that were newly diagnosed with depression received free samples of anti-
Top Business IT Challenges of 2016
CGL Coverage B and Specific Products Covering Data Breaches Primerus Convocation Amelia Island, FL April 2015.
Data Breach ALICAP, the District Insurance Provider, is Now Offering Data Breach Coverage as Part of Our Blanket Coverage Package 1.
Healthcare Careers II HIPAA-Overview for Healthcare Workers.
Effective Delivery of Small Group Level Funded Plans
Health Insurance Portability and Accountability Act of 1996
HIPAA PRIVACY & SECURITY TRAINING
Encrypted from CDS Office Technologies
BEST PRACTICES FOR AN IT SECURITY ASSESSMENT
What is HIPAA? HIPAA stands for “Health Insurance Portability & Accountability Act” It was an Act of Congress passed into law in HEALTH INSURANCE.
Regulatory Compliance
Smart Health Consulting System by CustomSoft.
Heart Disease Prediction System by CustomSoft.
Common use cases Health care Legal Finance SLED Other
Chapter 3: IRS and FTC Data Security Rules
HIPAA PRIVACY AWARENESS, COMPLIANCE and ENFORCEMENT
MEDICAL SUMMARY | EXAMPLES BY TELEGENISYS INC. Telegenisys is an ISO certified Business Process Outsourcing provider, specializing in healthcare services.
MEDICAL SUMMARY | EXAMPLESBY TELEGENISYS INC. Telegenisys is an ISO certified Business Process Outsourcing provider, specializing in healthcare services.
Improved Processes, Improved Profitability
Customized Secure Backup Software System-By CustomSoft.
MEDICAL SUMMARY | EXAMPLES BY TELEGENISYS INC. Telegenisys is an ISO certified Business Process Outsourcing provider, specializing in healthcare services.
Customized Home Health Care Software
Mayo Clinic Privacy Office
Integration through Legal Hacking Methods
HIPAA Compliance SaaS Platform
No!. [NEXT SLIDE] LOGO HERE.
Anthem Data Breach Group 2: Jing Jiang, Dongjie Wang, Haitao Huang, Binju Gaire, Parneet Toor.
EHR Customization Services by CustomSoft India. Objective EHR customized by CustomSoft offers functionality for charting, problem lists, medication management,
Objective of EHR Customization Services by CustomSoft EHR customized by CustomSoft offers functionality for charting, problem lists, medication management,
Electronic Data Interchange: Transactions and Security
Presentation transcript:

Open PHI Institute (OPHII) ‘Helping IT help patients’

Healthcare Data in a Nutshell Patient Diagnosis Payment Provider Claim Adjustment Visit Treatment Practice Lab Result Denial Location Date

Healthcare Data in a Nutshell (1/3) Patient Provider Practice Location Date Visit

Healthcare Data in a Nutshell (2/3) Visit Diagnosis Treatment Lab Result Claim

Healthcare Data in a Nutshell (3/3) Claim Payment Adjustment Denial

Healthcare Data Processing Problem High barrier to entry into this space $25k / incident / day in federal fines i.e. Anthem has recently had 78.8 M patients’ data hacked Meaning potential fines of ~2T/day, settling for >$100M Poor Risk v. Reward proposition ‘Why innovate here?’ http://www.infoworld.com/article/2983634/security/why-hackers- want-your-health-care-data-breaches-most-of-all.html http://www.forbes.com/sites/danmunro/2015/12/31/data-breaches- in-healthcare-total-over-112-million-records-in-2015/#4a88784d7fd5 https://www.washingtonpost.com/news/the- switch/wp/2015/03/20/2015-is-already-the-year-of-the-health-care- hack-and-its-only-going-to-get-worse/ http://www.hipaajournal.com/anthem-data-breach-expected-cost- 100-million-020/

OPHII Solution The OPHII team has a proprietary method and team that pulls healthcare information from a wide variety of public domain sources and scrubs it to provide 100% safe de-identified data to our subscribing customers in a completely PHI- compliant manner OPHII guarantees its data to be completely unusable to hackers and assumes all legal risks for the content of the data we provide to our subscribing customers.

Uses / Advantages with OPHII Data Test data set for software development where sensitive data is required Safely use in demo reports without the need to redact or encrypt Safely use / transfer data without the need to SFTP, encrypt laptops, etc. ‘Honey-pot’ data for IT security purposes in Healthcare / Pharmaceutical / Biotech / Insurance companies

Our Product De-identified cancer patient data fully covered by OPHII against security breach Flat file format (.csv, .txt, .xls, HL7, etc.)

Our Company and Costs Our team has over 50 years total experience in the healthcare, insurance, pharmaceutical and IT industries We are fully insured against any and all penalties and fines relating to PHI data breaches of our data for our subscribing customers’ Prices as low as $0.39/PHI record MOQ: 500 records Free Sample data 10 records (5 patient level + 5 visit level)