Privacy, Confidentiality, Security, and HIPAA

Slides:



Advertisements
Similar presentations
Presented by Elena Chan, UCSF Pharm.D. Candidate Tiffany Jew, USC Pharm.D. Candidate March 14, 2007 P HARMACEUTICAL C ONSULTANTS, I NC. P RO P HARMA HIPAA.
Advertisements

Security Vulnerabilities and Conflicts of Interest in the Provider-Clearinghouse*-Payer Model Andy Podgurski and Bret Kiraly EECS Department & Sharona.
HIPAA Basics Brian Fleetham Dickinson Wright PLLC.
HIPAA Privacy Training. 2 HIPAA Background Health Insurance Portability and Accountability Act of 1996 Copyright 2010 MHM Resources LLC.
HIPAA Basic Training for Privacy & Information Security Vanderbilt University Medical Center VUMC HIPAA Website:
HIPAA Privacy Rule Training
HIPAA Privacy Training Your Name Here. © 2004 MHM Resources Inc.2 HIPAA Background Health Insurance Portability and Accountability Act of 1996.
Increasing public concern about loss of privacy Broad availability of information stored and exchanged in electronic format Concerns about genetic information.
The Health Insurance Portability and Accountability Act of 1996– charged the Department of Health and Human Services (DHHS) with creating health information.
Information Risk Management Key Component for HIPAA Security Compliance Ann Geyer Tunitas Group
Health Insurance Portability and Accountability Act (HIPAA)HIPAA.
NAU HIPAA Awareness Training
TM The HIPAA Privacy Rule: Safeguarding Health Information in Research and Public Health Practice Centers for Disease Control and Prevention Beverly A.
CHAPTER © 2011 The McGraw-Hill Companies, Inc. All rights reserved. 2 The Use of Health Information Technology in Physician Practices.
Reviewing the World of HIPAA Stephanie Anderson, CPC October 2006.
HIPAA: FEDERAL REGULATIONS REGARDING PATIENT SECURITY.
HIPAA Privacy Rule Compliance Training for YSU April 9, 2014.
© 2011 The McGraw-Hill Companies, Inc. All rights reserved. 2.5 HIPAA Legislation and its Impact on Physician Practices 2-15 The Health Insurance Portability.
HIPAA HIPAA Health Insurance Portability and Accountability Act of 1996.
Privacy, Security and Compliance Concerns for Management and Boards November 15, 2013 Carolyn Heyman-Layne, Esq. 1.
© Copyright 2014 Saul Ewing LLP The Coalition for Academic Scientific Computation HIPAA Legal Framework and Breach Analysis Presented by: Bruce D. Armon,
ELECTRONIC MEDICAL RECORDS By Group 5 members: Kinal Patel David A. Ronca Tolulope Oke.
The Use of Health Information Technology in Physician Practices
HIPAA PRIVACY AND SECURITY AWARENESS.
“ Technology Working For People” Intro to HIPAA and Small Practice Implementation.
Copyright ©2011 by Pearson Education, Inc. Upper Saddle River, New Jersey All rights reserved. Health Information Technology and Management Richard.
Health Insurance Portability and Accountability Act of 1996 (HIPAA) Proposed Rule: Security and Electronic Signature Standards.
How Hospitals Protect Your Health Information. Your Health Information Privacy Rights You can ask to see or get a copy of your medical record and other.
Patient Data Security and Privacy Lecture # 7 PHCL 498 Amar Hijazi, Majed Alameel, Mona AlMehaid.
HIPAA Michigan Cancer Registrars Association 2005 Annual Educational Conference Sandy Routhier.
Unit 6b System Security Procedures and Standards Component 8 Installation and Maintenance of Health IT Systems This material was developed by Duke University,
Medical Law and Ethics, Third Edition Bonnie F. Fremgen Copyright ©2009 by Pearson Education, Inc. Upper Saddle River, New Jersey All rights reserved.
LeToia Crozier, Esq., CHC Vice President, Compliance & Regulatory Affairs Corey Wilson Director of Technical Services & Security Officer Interactive Think.
Copyright © 2009 by The McGraw-Hill Companies, Inc. All Rights Reserved. McGraw-Hill Chapter 6 The Privacy and Security of Electronic Health Information.
Health Insurance Portability and Accountability Act of 1996 HIPAA Privacy Training for County Employees.
Eliza de Guzman HTM 520 Health Information Exchange.
© 2013 The McGraw-Hill Companies, Inc. All rights reserved. Ch 8 Privacy Law and HIPAA.
MU and HIPAA Compliance 101 Robert Morris VP Business Services Ion IT Group, Inc
Unit 6a System Security Procedures and Standards Component 8 Installation and Maintenance of Health IT Systems This material was developed by Duke University,
The Culture of Healthcare Privacy, Confidentiality, and Security Lecture d This material (Comp2_Unit9d) was developed by Oregon Health and Science University,
Working with HIT Systems
Component 8/Unit 6aHealth IT Workforce Curriculum Version 1.0 Fall Installation and Maintenance of Health IT Systems Unit 6a System Security Procedures.
Health Insurance portability and Accountability Act (HIPAA)‏
1 Privacy Plan of Action © HIPAA Pros 2002 All rights reserved.
Copyright © 2015 by Saunders, an imprint of Elsevier Inc. All rights reserved. Chapter 3 Privacy, Confidentiality, and Security.
Configuring Electronic Health Records Privacy and Security in the US Lecture b This material (Comp11_Unit7b) was developed by Oregon Health & Science University.
 Health Insurance and Accountability Act Cornelius Villalon Jr.
The Health Insurance Portability and Accountability Act of 1996 “HIPAA” Public Law
Copyright © 2009 by The McGraw-Hill Companies, Inc. All Rights Reserved. McGraw-Hill/Irwin Chapter 6 The Privacy and Security of Electronic Health Information.
Component 4: Introduction to Information and Computer Science Unit 8: Security Lecture 3 This material was developed by Oregon Health & Science University,
Installation and Maintenance of Health IT Systems System Security Procedures and Standards Lecture a This material Comp8_Unit6a was developed by Duke University,
Junli M. Awit, RN.  Enacted by President Bill Clinton in 1996  Title I of HIPAA protects health insurance coverage for workers and their families when.
HIPAA Privacy Rule Training
Privacy & Information Security Basics
HIPAA CONFIDENTIALITY
HIPAA Administrative Simplification
Electronic Data Interchange (EDI)
Health Insurance Portability and Accountability Act
Move this to online module slides 11-56
HIPAA PRIVACY AWARENESS, COMPLIANCE and ENFORCEMENT
Disability Services Agencies Briefing On HIPAA
Final HIPAA Security Rule
Health Insurance Portability and Accountability Act
County HIPAA Review All Rights Reserved 2002.
HIPAA Privacy and Security Summit 2018 HIPAA Privacy Rule: Compliance Plans, Training, Internal Audits and Patient Rights Widener University Delaware.
Accreditation, Regulation, and HIPAA
HIPAA SECURITY RULE Copyright © 2008, 2006, 2004 by Saunders an imprint of Elsevier Inc. All rights reserved.
Introduction to the PACS Security
WELCOME.
Presentation transcript:

Privacy, Confidentiality, Security, and HIPAA NURS 737: Concepts in Nursing Informatics Module 2, Subtopic 3 Privacy, Confidentiality, Security, and HIPAA This document is intended solely for the use of N737. Not for distribution

Privacy, Confidentiality, and Security “Privacy is the control over the extent, timing, and circumstances of sharing oneself (physically, behaviorally, or intellectually) with others.” Example: Persons may not want to be seen entering a place that might stigmatize them, such as a pregnancy counseling center clearly identified by signs on the front of the building “Confidentiality pertains to the treatment of information/data that an individual has disclosed in a relationship of trust and with the expectation that it will not be divulged to others without permission in ways that are inconsistent with the understanding of the original disclosure.” (https://www.research.uci.edu/compliance/human-research-protections/researchers/privacy-and-confidentiality.html#privacy) Security - measures taken to guard against espionage or sabotage, crime, attack, or escape 2

The Health Insurance Portability and Accountability Act (HIPAA) The HIPAA law has evolved over time. The Health Insurance Portability and Accountability Act (HIPAA) of 1996 Title II of HIPAA, known as the Administrative Simplification (AS) provisions, requires the Department of Health and Human Services (HHS) to adopt national standards for electronic health care transactions and national identifiers for providers, health plans, and employers. The AS provisions also address the Security and Privacy of health data. (https://www.hhs.gov/hipaa/for-professionals/index.html) 3

How HIPAA Affects Whom HIPAA is NOT JUST about Privacy of patient data! IT also includes: Employer Identifier gives a unique code to your employer for Medicare/Medicaid/FICA purposes Privacy and Confidentiality Standards and Security Standards affect the entire healthcare continuum Transactions and Code Sets Standards require specific coding criteria for all electronic transactions with CMS 4

The Health Insurance Portability and Accountability Act (HIPAA) Under the Affordable Care Act of 2010, provisions to HIPAA of 1996 further increase use of electronic data interchange and include requirements to adopt: operating rules for each of the HIPAA covered transactions a unique, standard Health Plan Identifier (HPID) standard and operating rules for electronic funds transfer (EFT), electronic remittance advice (RA), and claims attachments. In addition, health plans will be required to certify their compliance. 5

HIPAA Omnibus Rule Much has changed in health care since HIPAA was enacted over fifteen years ago. HHS announces a final rule that implements a number of provisions of the HITECH Act to strengthen the privacy and security protections for health information established under HIPAA (2009) The new rule will help protect patient privacy and safeguard patients’ health information (http://www.hhs.gov/ocr/privacy/hipaa/administrative/omnibus/index.html)

Administrative Simplification The purpose of this law is to “mandate new security standards to protect an individual’s health information, while permitting the appropriate access and use of that information by health care providers, clearinghouses, and health plans.” 7

Administrative Simplification Electronic transactions and code sets standards requirements Privacy requirements Security requirements National identifier requirements 8

HIPAA: Electronic transactions and code sets standards Transaction Standards (ANSI X12N or NCPDP) A transaction is an electronic exchange of information between two parties to carry out financial or administrative activities related to health care. Under HIPAA, HHS adopted certain standard transactions for the electronic exchange of health care data. These transactions include: Claims and encounter information Payment and remittance advice Claims status Eligibility Enrollment and disenrollment Referrals and authorizations Coordination of benefits Premium payment (https://www.cms.gov/Regulations-and-Guidance/Administrative-Simplification/Transactions/TransactionsOverview.html) 9

HIPAA: Electronic transactions and code sets standards Under HIPAA, HHS adopted specific code sets for diagnoses and procedures used in all transactions. Code sets classify medical: Diagnoses; Procedures; Diagnostic tests; Treatments; Equipment and supplies They inform diverse health care functions, from billing to tracking public health. Code sets outlined in HIPAA include: ICD-10 – International Classification of Diseases, 10th edition Health Care Common Procedure Coding System (HCPCS) CPT-Current Procedure Terminology CDT – Code on Dental Procedures and Nomenclature NDC – National Drug Codes (https://www.cms.gov/Regulations-and-Guidance/Administrative-Simplification/Code-Sets/index.html) 10

HIPAA: Electronic transactions and code sets standards Unique Identifiers: HIPAA establishes and requires unique identifiers for: Health plans – HPID, or Health Plan Identifier, is a standard, unique identifier for health plans  Employers – EIN, or Employer Identification Number, is issued by the Internal Revenue Service and is used to identify employers in electronic transactions  Providers – NPI, or National Provider Identifier, is a unique 10-digit number used to identify health care providers Patients – There is no adopted standard to identify patients NPIs and EINs must be used on all HIPAA transactions. (https://www.cms.gov/Regulations-and-Guidance/Administrative-Simplification/Unique-Identifier/UniqueIdentifiersOverview.html) 11

Privacy Rules The HIPAA Privacy Rule establishes national standards to protect individuals’ medical records and other personal health information (PHI) and applies to health plans, health care clearinghouses, and those health care providers that conduct certain health care transactions electronically.  The Rule requires appropriate safeguards to protect the privacy of PHI, and sets limits and conditions on the uses and disclosures that may be made of such information without patient authorization. The Rule also gives patients rights over their health information, including rights to examine and obtain a copy of their health records, and to request corrections. (https://www.hhs.gov/hipaa/for-professionals/privacy/index.html) 12

The HIPAA Privacy Rules Business Associates By law, the HIPAA Privacy Rule applies only to covered entities – health plans, health care clearinghouses, and certain health care providers. Health care providers and health plans often use the services of other persons or businesses. The Privacy Rule allows covered providers and health plans to disclose PHI to these “business associates” (BA) if they obtain satisfactory assurances that the BA will use the information only for the purposes for which it was engaged by the covered entity, will safeguard the information and will help the covered entity comply with some of the covered entity’s duties under the Privacy Rule. Covered entities may not disclose PHI for the business associate’s independent use or purposes, except as needed for the proper management and administration of the business associate. (https://www.hhs.gov/hipaa/for-professionals/privacy/guidance/business-associates/index.html) 13

The HIPAA Security Rules The HIPAA Security Rule establishes national standards to protect individuals’ ePHI that is created, received, used, or maintained by a covered entity. The Security Rule requires the following appropriate safeguards to ensure the confidentiality, integrity, and security of electronic protected health information:   Administrative safeguards Physical safeguards Technical safeguards Organizational requirements

Common Security Breaches Examples: Inside jobs, social engineering Brute force Eavesdropping, sniffing, snooping Data modification Identity spoofing Password-based attacks Denial of service attacks Man in the middle attacks Application layer attacks

Administrative Safeguards Address process of security management in your organization. Risk analysis Evaluating likelihood and impact of potential risks to ePHI Implementing appropriate security measures to address identified risks Documenting security measures chosen, with rationale Maintaining continuous, reasonable, appropriate protections Ongoing process, with regular reviews Presenter 2012-08-20 12:17:02 -------------------------------------------- Administrative safeguards address the process you have put into place in your organization to administer security of the ePHI system. Each organization is required to identify and analyze potential risks to its ePHI, and it must implement security measures that reduce those risks and vulnerabilities to a reasonable and appropriate level. This is done using a risk analysis. A risk analysis process includes, but is not limited to, the following activities: Evaluate the likelihood and impact of potential risks to ePHI; Implement appropriate security measures to address the risks identified in the risk analysis; Document the chosen security measures and, where required, the rationale for adopting those measures; and Maintain continuous, reasonable, and appropriate security protections. This should be an ongoing process. Regular reviews should be performed to evaluate the effectiveness of the security measures put in place, and newly identified potential risks to ePHI should be addressed in an ongoing fashion.

Administrative Safeguards (cont.) (For the tools and guidance, click on the links below.) Security Risk Assessment Tools HHS Security Risk Assessment Tool NIST HIPAA Security Rule Toolkit  Risk Analysis Guidance: Read the Guidance on Risk Analysis requirements under the Security Rule.

Administrative Safeguards (cont’d) Designated security official Responsible for developing and implementing security policies and procedures. Knowledge of good HIPAA practices Familiarity with established IT security standards Ability to interface well with all levels of management and staff Policies & procedures for authorizing access to ePHI only when appropriate for one’s role (role-based access). Who gets access to ePHI data? What level of access is needed? Who is the agent authorizing the access? Is this authorization adequately documented? Is the access periodically reviewed?

Administrative Safeguards (cont’d) Processes for appropriate authorization and supervision of workforce members who work with ePHI. Well-documented training of all workforce members in security policies and procedures Appropriate sanctions against violators.

Physical Safeguards: Access Limit physical access to facilities, while ensuring that authorized access is allowed. Server rooms where ePHI is stored Work areas where ePHI is accessed Back-up media storage potentially containing ePHI Inventory hardware and software. Know where inventory is kept. Know value of hardware, software, equipment.

Physical Safeguards: Access Limit physical access to facilities, while ensuring that authorized access is allowed. Server rooms where ePHI is stored Work areas where ePHI is accessed Back-up media storage potentially containing ePHI Inventory hardware and software. Know where inventory is kept. Know value of hardware, software, equipment. Presenter 2012-08-20 12:17:02 -------------------------------------------- Physical safeguards are written to address issues regarding facility access control, workstation use, workstation security, and device and media controls. This includes limiting physical access to work facilities without impeding access to those requiring access. This is particularly true in areas where ePHI may be present including work areas, server rooms, back-up media storage units, and the like. These areas require an extra level of protection to limit access to authorized users only and, whenever possible, create a structure for logging access, particularly any irregularities such as for maintenance staff, etc, who may require entry into these locations but are not considered routine in nature. Additionally, keeping a reliable hardware inventory – along with its value and locations – is also an important safeguard to preventing theft of a system which may inadvertently contain ePHI data. http://en.wikipedia.org/wiki/Strong_password#Examples_that_follow_guidelines Component 8/Unit 6a Health IT Workforce Curriculum Version 2.0 Spring 2011

Physical Safeguards: Access (cont’d) Policies and procedures for proper use of & access to workstations & electronic media, including transfer, removal, disposal, re-use. Lock down publicly-accessible systems potentially containing ePHI. Strong passwords (8-14 characters with variety of letters, symbols, numbers) changed regularly. At least 256-bit encryption, especially for wireless, backups, & offsite data. Media destroyed after being thoroughly wiped.

Technical Safeguards: Access Control Access controls, audit controls, integrity, person, user/entity authentication, transmission security Most effective: layered approach. Multiple technologies employed concurrently. Adequate access controls include: AD (Active Directory), LDAP (Lightweight Directory Access Protocol) Vendor-specific controls usually part of EHR

Technical Safeguards: Firewall Inspects incoming network traffic; permits or denies access based on criteria. Hardware- or software-driven. Blocks ports through which intruders can gain access (e.g., port 80, which regulates web traffic). Most commonly placed on network perimeter (network-based) or network device (host- based). EHR will require certain ports to remain open.

Firewalls Blocked Allowed Blocked Allowed Allowed NETWORK FIREWALL COMPUTER FIREWALL Health IT Workforce Curriculum Version 2.0 Spring 2011