Case Study Template Kerecis Aurora Awards

Slides:



Advertisements
Similar presentations
HIPAA Privacy Rule “Standards for Privacy of Individually Identifiable Health Information” 45 CFR 160 and 164* *
Advertisements

HIPAA and Public Health 2007 Epi Rapid Response Team Conference.
COBB/DOUGLAS COMMUNITY SERVICES BOARD Confidentiality and Privacy of Consumer Information.
The Health Insurance Portability and Accountability Act Basic HIPAA Training For CMU workforce with access to PHI.
HIPAA – Privacy Rule and Research USCRF Research Educational Series March 19, 2003.
Increasing public concern about loss of privacy Broad availability of information stored and exchanged in electronic format Concerns about genetic information.
National Cancer Institute Cancer Therapy Evaluation Program (CTEP) presents: How to Obtain Protected Health Information (PHI) from an Outside Healthcare.
WORKFORCE CONFIDENTIALITY HIPAA Reminders. HIPAA 101 The Health Insurance Portability and Accountability Act (HIPAA) protects patient privacy. HIPAA is.
HIPAA Requirements for Patient Oriented Research
Informed Consent.
Health Insurance Portability & Accountability Act “HIPAA” To every patient, every time, we will provide the care that we would want for our own loved ones.
HIPAA Training Presentation for New Employees How did we get here? HIPAA Police 1.
Training In HIPAA Privacy Regulations for Researchers and Research Staff Adapted from a presentation prepared by Human Subjects Division, University of.
Nora B. McCann Privacy Manager Corporate Compliance Fox Chase Cancer Center
What does this form mean? HIPAA Authorization means prior written permission for use and disclosure of protected health information (PHI) from the information’s.
University of Miami1 HIPAA Survival Skills An Introduction to HIPAA and Research University of Miami Human Subjects Research Office October 31, 2006 Evelyne.
1 HIPAA, Researchers and the IRB: Part Two Alan Homans, IRB Chair and Nancy Stalnaker, IRB Administrator.
SPECIAL DIABETES PROGRAM FOR INDIANS Competitive Grant Program Special Diabetes Program for Indians Competitive Grant Program SPECIAL DIABETES PROGRAM.
Registry 201 Excel Registry Training. Registry 201 Excel Registry Training Outline ► Important Information about PHI ► Getting to know you ► Excel Registry.
HIPAA, Researchers and the IRB Alan Homans, IRB Chair and Nancy Stalnaker, IRB Administrator.
Registry 201 Excel Registry Training. Registry 201 Excel Registry Training Outline ► Important Information about PHI ► Getting to know you ► Excel Training.
Public Aggregate Reporting – DHCS Business Reports Overview
Health Insurance Portability and Accountability Act (HIPAA)
East Carolina University HIPAA Privacy
Health Budgets & Financial Policy Privacy and HIPAA Security 15 December & December, & 1600 Bridge Number:
2012 VA Human Research Protection Program Patricia L. Christensen, MS, RHIA, CIPP/G, CHPS, CHPC VHA Privacy Office Common Privacy Findings in Research.
Data Security and Research 101 Completing Required Forms Kimberly Summers, PharmD Assistant Chief for Clinical Research South Texas Veterans Health Care.
MIRC Clinical Trials Software Medical Imaging Resource Center.
Protected Health Information (PHI). Privileged Communication An exchange of information between two individuals in a confidential relationship. (Examples:
University of Miami1 Privacy, Confidentiality & Security Marisabel Davalos, M.S.Ed., CIP Associate Director of Educational Initiatives November, 2008.
Paula Peyrani, MD Medical/Project Director, HIV Program at the 550 Clinic Assistant Director, Research Design and Development Clinical and Translational.
HIPAA Business Associates Leadership Group Meeting June 28, 2001.
1 Research & Accounting for Disclosures March 12, 2008 Leslie J. Pfeffer, BS, CHP Office of the Vice President for Research Administration Office of Compliance.
Example of Medical Record Elements
Revised February 4, Health Insurance Portability and Accountability Act (HIPAA) HIPAA Privacy Rule: UCSF Education Module for Researchers, Research.
1 HIPAA OVERVIEW ETSU. 2 What is HIPAA? Health Insurance Portability and Accountability Act.
14 May Privacy Requirements Phoenix Ambulatory Blood Pressure Monitoring System © 2006 Christopher J. Adams Copying and distribution of this document.
HIPAA Privacy and Research August 21, 2015
De-identifying Pathology Reports for Pathology Informatics
Health information that does not identify an individual and with respect to which there is no reasonable basis to believe that the information can be.
PwC Tissue Banking and Repositories – Human Subject Protections Privacy Protections Medical Research Summit Tom Puglisi, Ph.D. Friday March 7 – 9:15 am.
HIPAA and Research Basics for IRB Tim Atkinson Director, Research and Sponsored Programs Director, Institutional Review Board Research Privacy Officer.
© 2009 The McGraw-Hill Companies, Inc. All rights reserved. 1 McGraw-Hill Chapter 2 The HIPAA Privacy Standards HIPAA for Allied Health Careers.
University of Pennsylvania Health System 1 Session 3.02: Case Studies in Clinical Research Compliance Russell M. Opland, M.P.H., EMT-P Chief Privacy Officer.
Office of Human Research (OHR) Quality Improvement Program Patrick Herbison Heather Krupinski.
EHR & BIG DATA – RISKS AND ADVANTAGES OF AMASSING MEDICAL DATABASES Sandra Gardiner Technology Law Section October 24, 2014.
Configuring Electronic Health Records Privacy and Security in the US Lecture b This material (Comp11_Unit7b) was developed by Oregon Health & Science University.
Office of Human Research (OHR) Quality Improvement Program Patrick Herbison Heather Krupinski.
Teaching & POEMs and DOEs in an Online Classroom Jacob Reider, MD David C Ross Albany Medical College.
Final HIPAA Privacy Rule: The Research Provisions Julie Kaneshiro DHHS Office for Human Research Protections Phone: Fax:
Privacy: HIPAA Emerson Murphy-Hill. Rosie Callender, RHIA, web.msm.edu/hipaa/An%20Introduction%20to%20HIPAA.ppt What is HIPAA? A Federal Law Created in.
HIPAA and RESEARCH 5 th Thursday May 31, Page 2.
UC Riverside Health Training and Development
De-Identified Data: Ethics and Regulation Translational Research Ethics – Applied Topics (TREATs) Bioethics and Subjects Advocacy Program Indiana Clinical.
HIPAA 2017 JHSPH IRB Clarifications and Changes
ELECTRONIC HEALTH RECORD PRIVACY TRAINING
HIPAA PRIVACY & SECURITY TRAINING
HIPAA Definitions What Does PHI Include?
No No, Yes Yes: Simple Privacy & Information Security Tips Krista Barnes, J.D. Senior Legal Officer and Director, Privacy & Information Security, Institutional.
Transfer of Materials, Confidential Information, and Data
Type of wound: ex. Diabetic ulcer
The Health Insurance Portability and Accountability Act Basic HIPAA Training For CMU workforce with access to PHI.
The Health Insurance Portability and Accountability Act
New School Violence Law; HIPAA Privacy Training
HIPAA & PHI TRAINING & AWARENESS
AIA Florida/Caribbean Magazine Project Submission Template
The Health Insurance Portability and Accountability Act
DSHS, Environmental & Injury Epidemiology and Toxicology
Office of the Vice President for Research Human Subjects Protection Program IRB Submission Process Module 4 - Health Insurance Portability and Accountability.
The Health Insurance Portability and Accountability Act
Presentation transcript:

Case Study Template Kerecis Aurora Awards Download case study template and consent form Fill out consent form and obtain appropriate consents Fill in slide 2 with your name, facility, submission category Fill out slide 3 with past wound history and management details Fill out slide 4 for current wound history and management For additional photos, copy slide 4 as many times as necessary to share wound progression When complete, submit case with consent form

Case Study Template Clinician Name and title Contact phone numbers Type of wound: ex. Diabetic ulcer Clinician Name and title Contact phone numbers Email Address Name of Affiliated Facility: Submission category Consent form submitted: Chronic wounds Surgical wounds Burns Resident Award Yes No

Past wound history and management Patient History: Age & sex Past medical and surgical history: Pertinent history to wound: Age of wound: Prior to starting Kerecis Omega3 Wound   Previous treatment: Ex: hydrogel, collagen dressings, NPWT, other cellular tissue base products Wound characteristic: Initial wound description Pain level and management

Name of wound: i.e. DFU- Left leg Current wound history and management Date of wound picture:   Wound measurement in cm : Brief Description: Wound characteristics: slough 10%, bone exposed Pertinent information on wound status and patient’s condition if applicable Pain level Wound progress: ex. Epithelialization, granulation For last slide, include clinical outcome Wound Treatment: ex: Kerecis Omega3 Wound secured with steri-strips covered with contact layer, silver dressing secured with roll gauze. Total contact cast Compression wrap Wound picture Name of wound: i.e. DFU- Left leg Aside from picture of wound, please include pictures of Kerecis on wound, application techniques, etc

THE COMMITTEE ON HUMAN RESEARCH Please ensure all patient identifiers are removed per the HIPPA Guidelines HIPAA-PHI: List of 18 IDENTIFIERS AND DEFINITION of PHI List of 18 identifiers: Names: all geographical subdivisions smaller than a state, including street address, city, precinct, zip code, and their equivalent geocodes, except for the initial three digits of a zip code, if according tot the current publicly available data from the Bureau of the Census: (1) The geographic unit formed by combining all of the zip codes with he same three initial digits contains more than 20,000 people; and The initial three digits of a zip code for all such geographic units containing 20,000 or fewer people is changed to 000. All elements of dates (except year) for dates directly related to an individual, including birth date, admission date, discharge date, date of death; and all ages over 89 and all elements of dates(including year) indicative of such age, except that such ages and elements may be aggregated into a single category of age 90 or older; Phone numbers; Fax numbers; Electronic mail addresses; Social Security numbers; Medical record numbers; Health plan beneficiary numbers; Account numbers; Certificate license numbers; Vehicle identifiers and serial numbers, including license plate numbers; Device identifiers and serial numbers; Web Universal Resource Locators (URLs); Internet Protocol (IP)address numbers; Biometric identifiers, including finger and voice prints; Full face photographic images and any comparable images; and Any other unique identifying number, characteristic, or code (note this does not mean the unique code assigned by the investigator to code data)