HIPAA Basics November 1, 2014.

Slides:



Advertisements
Similar presentations
The Department has declared itself to be a single covered entity. Thus, each and every one of our divisions is a covered entity and must comply with.
Advertisements

HIPAA: An Overview of Transaction, Privacy and Security Regulations Training for Providers and Staff.
An Overview for In-Home Service Providers Legal advice must be tailored to specific circumstances. Information provided in this presentation should not.
HIPAA Training: Health Insurance Portability and Accountability Act.
Presented by Elena Chan, UCSF Pharm.D. Candidate Tiffany Jew, USC Pharm.D. Candidate March 14, 2007 P HARMACEUTICAL C ONSULTANTS, I NC. P RO P HARMA HIPAA.
HIPAA Basics Brian Fleetham Dickinson Wright PLLC.
HIPAA: Privacy, Security, and HITECH, Oh My! Presented by Stephanie L. Ganucheau, Special Assistant Attorney General.
HIPAA Privacy Training. 2 HIPAA Background Health Insurance Portability and Accountability Act of 1996 Copyright 2010 MHM Resources LLC.
HIPAA. What Why Who How When What Is HIPAA? Health Insurance Portability & Accountability Act of 1996.
HIPAA Privacy Rule Training
The Health Insurance Portability and Accountability Act of 1996– charged the Department of Health and Human Services (DHHS) with creating health information.
What is HIPAA? This presentation was created by The University of Arizona Privacy Office, The Office for the Responsible Conduct of Research on March 5,
CHAPTER © 2012 The McGraw-Hill Companies, Inc. All rights reserved. 2 HIPAA, HITECH, and Medical Records.
1 Navigating the Privacy and Security Issues: HITECH Overview Rebecca L. Williams, RN, JD Partner Co-chair of HIT/HIPAA Practice Davis Wright Tremaine.
1 TECO ENERGY, INC. HIPAA PRIVACY AND SECURITY REQUIREMENTS April 29, 2014 Dana L. Thrasher Constangy, Brooks & Smith, LLP (205)
Key Changes to HIPAA from the Stimulus Bill (ARRA) Children’s Health System Department Leadership Meeting October 28, 2009 Kathleen Street Privacy Officer/Risk.
HIPAA CHANGES: HITECH ACT AND BREACH NOTIFICATION RULES February 3, 2010 Kristen L. Gentry, Esq. Catherine M. Stowers, Esq.
Topics Rule Changes Skagit County, WA HIPAA Magic Bullet HIPAA Culture of Compliance Foundation to HIPAA Privacy and Security Compliance Security Officer.
H IPAA PRIVACY WORK GROUP FOR EYE BANKS EBAA HIPAA PRIVACY WORK GROUP Christina W. Strong, Esq., Facilitator.
© 2011 The McGraw-Hill Companies, Inc. All rights reserved. 2.5 HIPAA Legislation and its Impact on Physician Practices 2-15 The Health Insurance Portability.
COMPLYING WITH HIPAA PRIVACY RULES Presented by: Larry Grudzien, Attorney at Law.
2014 HIPAA Refresher Omnibus Rule & HIPAA Security.
Are you ready for HIPPO??? Welcome to HIPAA
What You Don’t Know Can Cost You HIPAA in a HITECH World Alaina N. Crislip, Esq. October 10, 2013.
HIPAA HIPAA Health Insurance Portability and Accountability Act of 1996.
Privacy, Security and Compliance Concerns for Management and Boards November 15, 2013 Carolyn Heyman-Layne, Esq. 1.
OCR HITECH Enforcement Tips: Prevent, Detect and Quickly Correct HIPAA COW 2010 Spring Conference Privacy/Security Session 1 HIPAA Privacy Best Practices:
March 19, 2009 Changes to HIPAA Privacy and Security Requirements Joel T. Kopperud Scott A. Sinder Rhonda M. Bolton.
© Copyright 2014 Saul Ewing LLP The Coalition for Academic Scientific Computation HIPAA Legal Framework and Breach Analysis Presented by: Bruce D. Armon,
Version 6.0 Approved by HIPAA Implementation Team April 14, HIPAA Learning Module The following is an educational Powerpoint presentation on the.
HIPAA COMPLIANCE IN YOUR PRACTICE MARIBEL VALENTIN, ESQUIRE.
HIPAA Health Insurance Portability & Accountability Act of 1996.
HIPAA PRIVACY AND SECURITY AWARENESS.
Privacy and Security of Protected Health Information NorthPoint Health & Wellness Center 2011.
Dealing with Business Associates Business Associates Business Associates are persons or organizations that on behalf of a covered entity: –Perform any.
Copyright ©2011 by Pearson Education, Inc. Upper Saddle River, New Jersey All rights reserved. Health Information Technology and Management Richard.
HIPAA Michigan Cancer Registrars Association 2005 Annual Educational Conference Sandy Routhier.
LeToia Crozier, Esq., CHC Vice President, Compliance & Regulatory Affairs Corey Wilson Director of Technical Services & Security Officer Interactive Think.
Copyright © 2009 by The McGraw-Hill Companies, Inc. All Rights Reserved. McGraw-Hill Chapter 6 The Privacy and Security of Electronic Health Information.
Understanding HIPAA (Health Insurandce Portability and Accountability Act)
HIPAA BASIC TRAINING Presented by Anderson Health Information Systems, Inc.
The Culture of Healthcare Privacy, Confidentiality, and Security Lecture d This material (Comp2_Unit9d) was developed by Oregon Health and Science University,
HealthBridge is one of the nation’s largest and most successful health information exchange organizations. Tri-State REC: Privacy and Security Issues for.
Copyright ©2014 by Saunders, an imprint of Elsevier Inc. All rights reserved 1 Chapter 02 Compliance, Privacy, Fraud, and Abuse in Insurance Billing Insurance.
HITECH and HIPAA Presented by Rhonda Anderson, RHIA Anderson Health Information Systems, Inc
A Road Map to Research at Jefferson: HIPAA Privacy and Security Rules for Researchers Presented By: Privacy Officer/Office of Legal Counsel October 2015.
HIPAA History March 3, HIPAA Ruling Health Insurance Portability Accountability Act Health Insurance Portability Accountability Act Passed by Congress.
Western Asset Protection
Top 10 Series Changes to HIPAA Devon Bernard AOPA Reimbursement Services Coordinator.
Finally, the Final HIPAA/HITECH Regulations are Here! By LYNDA M. JOHNSON Friday, Eldredge & Clark.
Configuring Electronic Health Records Privacy and Security in the US Lecture b This material (Comp11_Unit7b) was developed by Oregon Health & Science University.
HIPAA: Breach Notification By: Office of University Counsel For: Jefferson IRB Continuing Education September 2014.
HIPAA Overview Why do we need a federal rule on privacy? Privacy is a fundamental right Privacy can be defined as the ability of the individual to determine.
AND CE-Prof, Inc. January 28, 2011 The Greater Chicago Dental Academy 1 Copyright CE-Prof, Inc
HIPAA/HITECH TRAINING. Why are we here?  HIPAA  HITECH  PHI  Minimum Necessary “Need to Know”  Breaches and Fines.
The Health Insurance Portability and Accountability Act of 1996 “HIPAA” Public Law
HIPAA TRIVIA Do you know HIPAA?. HIPAA was created by?  The Affordable Care Act  Health Insurance companies  United States Congress  United States.
Board of Directors – March 24, 2016 Denise Mannon, AHFI, CHPC Corporate Compliance Officer.
Copyright © 2009 by The McGraw-Hill Companies, Inc. All Rights Reserved. McGraw-Hill/Irwin Chapter 6 The Privacy and Security of Electronic Health Information.
Juvenile Legislative Update 2013 Confidential Records and Protected Disclosures.
Health Insurance Portability and Accountability Act of 1996
UNDERSTANDING WHAT HIPAA IS AND IS NOT
Privacy & Information Security Basics
Enforcement, Business Associates and Breach Notification. Oh my!
Health Information Privacy & Security
What is HIPAA? HIPAA stands for “Health Insurance Portability & Accountability Act” It was an Act of Congress passed into law in HEALTH INSURANCE.
HIPAA.
HIPAA PRIVACY AWARENESS, COMPLIANCE and ENFORCEMENT
Disability Services Agencies Briefing On HIPAA
The Health Insurance Portability and Accountability Act
Presentation transcript:

HIPAA Basics November 1, 2014

Contents Fields & Associates Policy Terms & Definitions HIPAA Timeline Review of Basics Privacy Security Breach Enforcement References

F&A Policy It is the policy of Fields & Associates, Inc. to comply with all applicable laws rules and regulations governing the privacy and security of patient information. Anyone connected with Fields and Associates who has access to protected health information (PHI) is required to read and agree to the F&A HIPAA Privacy & Security Policy posted at www.fieldsinc.com.

Terms & Definitions ARRA – American Recovery an Reinvestment Act of 2009 BA – Business Associate CE – Covered Entity CMP – Civil Monetary Penalty CMS – Centers for Medicare and Medicaid Services EPHI – Electronic Protected Health Information HHS – Department of Health and Human Services HIPAA – Health Insurance Portability and Accountability Act HITECH – Health Information Technology for Economic & Clinical Health ONC – Office of the National Coordinator OCR – Office for Civil Rights PHI – Protected Health Information

Terms & Definitions Covered Entity is defined as: A health plan; A health care clearinghouse A health care provider who transmits any health information in electronic form in connection with a covered transaction Business Associate is defined as: a person who creates, receives, maintains, or transmits PHI for a function or activity on behalf of a covered entity. The BA provides, other than in the capacity of a member of the CE’s workforce, such services as legal, actuarial, accounting, consulting, data aggregation, management, administrative, accreditation or financial.

Terms & Definitions The definition of a business associate includes a “subcontractor that creates, receives, maintains, or transmits protected health information on behalf of the business associate.” Subcontractor means: “a person to whom a business associate delegates a function, activity, or service, other than in the capacity of a member of the workforce of such business associate.” Therefore, all subcontractors of F&A who have access to PHI are required to abide by the same HIPAA requirements as F&A and are responsible for same.

HIPAA Timeline August 21, 1996 - The Health Insurance Portability and Accountability Act (HIPAA) was signed into law. April 14, 2003 - Deadline for Covered Entities to comply with the Privacy Rule. October 16, 2003 - Deadline for Covered Entities to comply with the Transactions and Code Sets Rule. April 20, 2005 - Deadline for Covered Entities to comply with the Security Rule. March 13, 2006 - The Enforcement Rule goes into effect.  February 17, 2009 - The American Recovery and Reinvestment Act of 2009 (ARRA) was signed into law. ARRA includes the Health Information Technology for Economic and Clinical Health (HITECH) Act, which mandates the US Department of Health and Human Services to develop new regulations related to the HIPAA provisions.

HIPAA Timeline cont’d September 23, 2010 - The Interim Final Rule goes into effect requiring Covered Entities to notify patients when a breach of their unsecured, protected health information occurs. January 17, 2013, the U.S. Department of Health and Human Services (HHS) releases the Omnibus Final Rule, implementing the changes required by the Health Information Technology for Economic and Clinical Health (HITECH) Act of 2009.  March 26, 2013 – The Omnibus Final Rule takes effect. September 23, 2013 – Covered Entities, Business Associates, and subcontractors must be in compliance with most provisions under the Final Rule.

The Basics Privacy Security Breach Enforcement We will touch on the following topics: Privacy Security Breach Enforcement

Privacy The Privacy Rule covers protected health information (PHI) that: Relates to the individuals’ past, present or future physical or mental health condition; the provision of health care to an individual; or to the past, present, or future payment for the provision of health care to the individual; And Either identifies the individual, or for which there is a reasonable basis to believe it can be used to identify the individual

Privacy There is an expectation that disclosures and release of information of any kind are kept to the “minimum necessary”. Minimum necessary refers to the practice of limiting disclosure of information to that information reasonably necessary to accomplish the purpose for which disclosure is sought. For example, if there was a request for a patient’s diagnosis, then you should only release the diagnosis and would NOT release a copy of a document such as a discharge summary that contains the diagnosis AND other information. This might require taking extra steps such as abstracting information or redacting information from a document, but it is absolutely necessary in order to comply with the “minimum necessary” provision.

Privacy Associates, contractors and sub-contractors of F&A: Will only use PHI/EPHI as permitted and/or outlined in the business associate contract and/or F&A Project Agreement. Will not share PHI/EPHI with unauthorized individuals Will not leave PHI/EPHI where it can be easily seen/accessed Will secure all PHI/EPHI when not in use Will return to F&A or destroy PHI/EPHI upon the completion of the project or engagement Will take appropriate safeguards (such as encryption) when transmitting PHI/EPHI electronically

Security The HIPAA Security Rule establishes national standards to protect individuals’ electronic personal health information that is created, received, used, or maintained by a covered entity or business associate. The Security Rule requires appropriate administrative, physical and technical safeguards to ensure the confidentiality, integrity, and security of electronic protected health information.

Security Administrative Safeguards are: administrative actions, and policies and procedures to manage the selection, development, implementation and maintenance of security measures to protect electronic protected health information and to manage the conduct of the covered entity’s or business associate’s workforce in relation to the protection of that information. Physical Safeguards are: physical measures, policies, and procedures to protect a covered entity’s or business associate’s electronic information systems and related buildings and equipment from natural and environmental hazards and unauthorized intrusion.

Security Technical Safeguards are: the technology and the policy and procedures for its use that protect electronic protected health information and control access to it.

Security So what does this mean? There must be: Written policies and procedures Physical safeguards such as locked doors, locked file cabinets and access control to physical locations Restricted access to electronically stored data by use of things such a passwords Use of encryption or other secured means for transmitting PHI

Breach Breach means The acquisition, access, use or disclosure of protected health information in a manner not permitted by the Privacy/Security Rules that compromises the security or privacy of the PHI. Exceptions: Unintentional acquisition, access or use by CE or BA staff as long as it doesn’t result in further use or disclosure Inadvertent disclosure within a CE or BA organization that is not further used or disclosed A disclosure where a CE or BA has a good faith belief that the unauthorized person to whom the disclosure was made would not reasonably have been able to retain such information.

Breach Breach Notification A business associate is required to notify the covered entity no later than 60 days after the discovery of a breach of protected health information. Therefore, any contractor working for F&A who has knowledge of a breach of PHI, must report the details of the breach to the CEO, Richard Fields, MD as soon as the breach is discovered.

Breach Breach Notification A BA is required to conduct a risk assessment whenever a breach occurs. Documentation of the breach report and risk assessment must be created and maintained.

Enforcement Civil Monetary Penalties (CMP) will be imposed for violations of HIPAA based on a tiered structure with 4 levels which distinguishes the level of culpability as follows: Unknowing. The covered entity or business associate did not know and reasonably should not have known of the violation. Reasonable Cause. The covered entity or business associate knew, or by exercising reasonable diligence would have known, that the act or omission was a violation, but the covered entity or business associate did not act with willful neglect. Continued on next slide

Enforcement Willful Neglect – Corrected. The violation was the result of conscious, intentional failure or reckless indifference to fulfill the obligation to comply with HIPAA. However, the covered entity or business associate corrected the violation within 30 days of discovery. Willful Neglect – Uncorrected. The violation was the result of conscious, intentional failure or reckless indifference to fulfill the obligation to comply with HIPAA, and the covered entity or business associate did not correct the violation within 30 days of discovery.

Total CMP for Violations of an Identical Provision in a Calendar Year Enforcement Below are the monetary penalties for each tier: Violation Category Each Violation Total CMP for Violations of an Identical Provision in a Calendar Year Unknowing $100 – $50,000 $1,500,000 Reasonable Cause $1,000 – $50,000 Willful Neglect – Corrected $10,000 – $50,000 Willful Neglect – Not Corrected At least $50,000

Closing The purpose of this training is to provide you with a basic understanding of the key concepts and requirements of business associates under the HIPAA regulations. In no way is it intended to provide you with a comprehensive or complete review of the federal regulations regarding healthcare privacy, security, breach and enforcement. As a contractor of Fields and Associates, you agree to comply with all applicable laws, rules and regulations governing the privacy and security of patient information.

References HIPAA Privacy Rules are contained in 45 CFR Part 160 and Part 164 subparts A&E HIPAA Security Rules are contained in 45 CFR Part 160 and Part 164 subparts A&C HIPAA Enforcement Rules are contained at 45 CFR Part 160 Subparts C-E You may search for these regulations at the link below: http://www.gpo.gov/fdsys/granule/CFR-2011-title45-vol1/CFR-2011- title45-vol1-sec164-304

References Security Risk Assessment HIPAA Privacy - HHS HITECH Act http://www.healthit.gov/providers-professionals/security-risk-assessment-tool HIPAA Privacy - HHS http://www.hhs.gov/ocr/privacy/ HITECH Act http://www.hhs.gov/ocr/privacy/hipaa/administrative/enforcementrule/hitechenf orcementifr.html OMNIBUS Final Rule (pdf) http://www.gpo.gov/fdsys/pkg/FR-2013-01-25/pdf/2013-01073.pdf

Make sure you complete the form at www. fieldsinc Make sure you complete the form at www.fieldsinc.com to document your completion of this training.