The Health Insurance Portability and Accountability Act

Slides:



Advertisements
Similar presentations
Independent Contractor Orientation HIPAA What Is HIPAA? Health Insurance Portability and Accountability Act of 1996 The Health Insurance Portability.
Advertisements

HIPAA Privacy Rule “Standards for Privacy of Individually Identifiable Health Information” 45 CFR 160 and 164* *
1 The Health Insurance Portability and Accountability Act (HIPAA) A guided tutorial for GVSU employees.
HIPAA and Public Health 2007 Epi Rapid Response Team Conference.
Health Insurance Portability and Accountability Act HIPAA Education for Volunteers and Students.
HIPAA Privacy Rule Training
COBB/DOUGLAS COMMUNITY SERVICES BOARD Confidentiality and Privacy of Consumer Information.
The Health Insurance Portability and Accountability Act Basic HIPAA Training For CMU workforce with access to PHI.
HIPAA – Privacy Rule and Research USCRF Research Educational Series March 19, 2003.
Increasing public concern about loss of privacy Broad availability of information stored and exchanged in electronic format Concerns about genetic information.
WORKFORCE CONFIDENTIALITY HIPAA Reminders. HIPAA 101 The Health Insurance Portability and Accountability Act (HIPAA) protects patient privacy. HIPAA is.
HIPAA Health Insurance Portability and Accountability Act.
1 HIPAA Education CCAC Professional Development Training September 2006 CCAC Professional Development Training September 2006.
Dr. Yaseen Hayajneh Health Insurance Portability and Accountability Act Yaseen HayajnehYaseen Hayajneh RN, MPH, PhD.
NAU HIPAA Awareness Training
HIPAA Requirements for Patient Oriented Research
HIPAA Privacy Keys to Success Education for Nursing and all other Clinical Students Effective January 2010 HIPAA Job Specific Education1.
Informed Consent.
HIPAA Privacy Rule Compliance Training for YSU April 9, 2014.
 The Health Insurance Portability and Accountability Act of  Federal Law designed to protect sensitive information.  HIPAA violations are enforced.
Health Insurance Portability & Accountability Act “HIPAA” To every patient, every time, we will provide the care that we would want for our own loved ones.
Professional Nursing Services.  Privacy and Security Training explains:  The requirements of the federal HIPAA/HITEC regulations, state privacy laws.
Protecting Client Data HIPAA, HITECH and PIPA Part 1A
HIPAA Training Presentation for New Employees How did we get here? HIPAA Police 1.
Health information security & compliance
University of Miami1 HIPAA Survival Skills An Introduction to HIPAA and Research University of Miami Human Subjects Research Office October 31, 2006 Evelyne.
HIPAA What’s Said Here – Stays Here…. WHAT IS HIPAA  Health Insurance Portability and Accountability Act  Purpose is to protect clients (patients)
Health Insurance Portability and Accountability Act of 1996
HIPAA Health Insurance Portability & Accountability Act of 1996.
Health Insurance Portability and Accountability Act (HIPAA)
East Carolina University HIPAA Privacy
Protected Health Information (PHI). Privileged Communication An exchange of information between two individuals in a confidential relationship. (Examples:
Proprietary and confidential and may not be reproduced or distributed without the express consent of Cap Gemini Ernst & Young U.S. LLC and Ernst & Young.
Paula Peyrani, MD Medical/Project Director, HIV Program at the 550 Clinic Assistant Director, Research Design and Development Clinical and Translational.
HIPAA PRIVACY AND SECURITY AWARENESS.
HIPAA Business Associates Leadership Group Meeting June 28, 2001.
1 Research & Accounting for Disclosures March 12, 2008 Leslie J. Pfeffer, BS, CHP Office of the Vice President for Research Administration Office of Compliance.
1 HIPAA OVERVIEW ETSU. 2 What is HIPAA? Health Insurance Portability and Accountability Act.
HIPAA Privacy and Research August 21, 2015
HIPAA Training Developed for Ridgeview Institute 2012 Hospital Wide Orientation.
HIPAA (health insurance portability and accountability act)
Understanding HIPAA (Health Insurandce Portability and Accountability Act)
HIPAA Health Insurance Portability and Accountability Act of 1996.
Configuring Electronic Health Records Privacy and Security in the US Lecture b This material (Comp11_Unit7b) was developed by Oregon Health & Science University.
Final HIPAA Privacy Rule: The Research Provisions Julie Kaneshiro DHHS Office for Human Research Protections Phone: Fax:
What is HIPAA? Health Insurance Portability and Accountability Act of HIPAA is a major law primarily concentrating on the prolongation of health.
The Health Insurance Portability and Accountability Act (HIPAA) requires Plumas County to train all employees in covered departments about the County’s.
Privacy: HIPAA Emerson Murphy-Hill. Rosie Callender, RHIA, web.msm.edu/hipaa/An%20Introduction%20to%20HIPAA.ppt What is HIPAA? A Federal Law Created in.
HIPAA and RESEARCH 5 th Thursday May 31, Page 2.
The Health Insurance Portability and Accountability Act 
UC Riverside Health Training and Development
Developed for Ridgeview Institute 2015 Hospital Wide Orientation
ELECTRONIC HEALTH RECORD PRIVACY TRAINING
HIPAA Privacy Rule Training
HIPAA PRIVACY & SECURITY TRAINING
HIPAA Privacy & Security
The Health Insurance Portability and Accountability Act
No No, Yes Yes: Simple Privacy & Information Security Tips Krista Barnes, J.D. Senior Legal Officer and Director, Privacy & Information Security, Institutional.
Disability Services Agencies Briefing On HIPAA
The Health Insurance Portability and Accountability Act Basic HIPAA Training For CMU workforce with access to PHI.
The Health Insurance Portability and Accountability Act
HIPAA Privacy & Security
HIPAA Overview.
The Health Insurance Portability and Accountability Act
New School Violence Law; HIPAA Privacy Training
HIPAA & PHI TRAINING & AWARENESS
The Health Insurance Portability and Accountability Act
Case Study Template Kerecis Aurora Awards
From Baby Boomers to Millennials
Presentation transcript:

The Health Insurance Portability and Accountability Act Basic HIPAA Training & Understanding For ACi workforce with access to PHI

Who Needs Training and Why Those who come in contact with “Protected Health Information” (PHI) are Federally required to attend training This presentation is designed to Familiarize you with HIPAA regulations Our policies and procedures regarding protected health information Ensure Federal compliance Our policies are posted at https://www.angelscourier.com/training/basic_hipaa

Summary of the Law To establish basic privacy and security protection of health information. To guarantee individuals the right to access their health information and learn how it is used and disclosed To simplify payment for health care.

What Exactly is HIPAA? Public Law 104-191 (1996) Overseen by: Department of Health & Human Services (HHS) and enforced by Office for Civil Rights (OCR) Regulations on: Privacy of health information Security of health information Notification of breaches of confidentiality Penalties for violating HIPAA

What is Protected by HIPAA? Protected Health Information (PHI) Any Individually Identifiable Health Information (IIHI) Created or received by a health care provider, health plan, or health care clearinghouse Relating to the past, present of future physical or mental health or condition of an individual (including information related to payment for health care) Transmitted in any form or medium—paper, electronic and verbal communications

What is Protected by HIPAA? Examples of PHI: Medical charts Problem logs Photographs and videotapes Communications between health care professionals Billing records Health plan claims records Health insurance policy number

What is Protected by HIPAA? Health information protected if it directly or indirectly identifies someone. Direct identifiers: individual’s name, SSN, driver’s license numbers Indirect identifiers: information about an individual that can be matched with other available information to identify the individual.

Direct and Indirect Identifiers Name Geographic subdivisions smaller than a State Street Address City County Precinct Zip Code & their equivalent geocodes, except for the initial three digits Dates, except year Birth date Admission date Discharge date Date of death Telephone numbers Fax number E-Mail Address Social Security numbers Medical record numbers Health plan beneficiary numbers Account numbers Certificate/license numbers Vehicle identifiers and serial numbers, including license plate numbers Device identifiers and serial numbers Web universal resource locations (URLs) Internet Protocol (IP) address numbers Biometric identifiers, including finger and voice prints Full face photographic images and any comparable data Any other unique identifying number, characteristic, or code

What is Protected by HIPAA? If any direct or indirect identifiers are present, the information is PHI and subject to HIPAA protection. Information can be “deidentified” – but HR manager must review to ensure all direct and indirect identifiers have been properly removed.

Who is Subject to HIPAA? Dispatchers Drivers Billing department Independent Contractors Subcontractors and their personnel who provide services on behalf of ACi. Anyone who has access either as part of their job or accidently comes into contact with PHI

How HIPAA Protects PHI Limits who may use or disclose PHI. Limits the purposes for which PHI may be used or disclosed Limits the amount of information that may be used or disclosed (Minimum Necessary rule) Requires use of safeguards over how PHI is used, stored and disclosed

Who May Use PHI? ACi workforce members trained on HIPAA privacy. You are only given access to PHI if you need it in order to perform your job You must agree to protect the confidentiality of the information You are subject to discipline if you violate ACi’s privacy policies and procedures.

How May PHI May Used? General Rule: Workforce members may use or disclose PHI only for permitted uses without an individual’s specific written authorization.

Permitted Uses For PHI Discussion with the pharmacy or other medical personnel to identify that the correct medication(s) are being dispensed to the correct patient. Specified public policy exceptions (public health and law enforcement) Any other use requires individual written authorization

Minimum Necessary Rule The use or disclosure of PHI is limited to the minimum amount necessary to accomplish the purpose Any other purpose, must consider: what is the minimum amount of information needed to perform the task?

Safeguarding PHI People consider health information their most confidential information, and we must protect it accordingly Do not access PHI that you do not need Do not discuss PHI with individuals who do not need to know it. Do not provide PHI to anyone not authorized to receive it Misusing PHI can result in discipline, legal penalties and loss of trust

Safeguarding PHI When using PHI, think about: Where you are Who might overhear Who might see

Safeguarding PHI Avoid: Discussing PHI in front of others who do not need to know. Do not unnecessarily print or copy PHI When faxing PHI, use a fax cover page Do not send PHI in email unless first cleared by your supervisor Properly dispose of PHI when it is no longer needed

Safeguarding PHI Report unusual activity to your supervisor immediately You observe questionable practices You find PHI in inappropriate areas You suspect unauthorized use of your user ID/password

Why should we care about the HIPAA rules? ACi Disciplinary action up to and including termination of employment or contract Civil Penalties Up to $1.5 million per year per violation Criminal Penalties Up to $250,000, imprisonment of up to ten years, or both Lawsuits Invasion of privacy/negligence

Knowledge Assessment Please take some time to complete the knowledge assessment of this presentation. You are required to do so and your completion will be recorded by HR. You may retake the assessment as many times as needed in order to “score” 100%. Any problems with the assessment, please contact the HR manager.