HIPAA In The Workplace What Every Employee Should Know and Remember.

Slides:



Advertisements
Similar presentations
Independent Contractor Orientation HIPAA What Is HIPAA? Health Insurance Portability and Accountability Act of 1996 The Health Insurance Portability.
Advertisements

HIPAA Basics Brian Fleetham Dickinson Wright PLLC.
HIPAA: Privacy, Security, and HITECH, Oh My! Presented by Stephanie L. Ganucheau, Special Assistant Attorney General.
What Every Employee Should Know and Remember. What is HIPAA? The Health Insurance Portability and Accountability Act of 1996 Portable Accountable Rules.
1. As a Florida KidCare community partner families entrust you to not only help them navigate the Florida KidCare system but to keep the information they.
HIPAA Privacy Training. 2 HIPAA Background Health Insurance Portability and Accountability Act of 1996 Copyright 2010 MHM Resources LLC.
Health Insurance Portability and Accountability Act HIPAA Education for Volunteers and Students.
HIPAA. What Why Who How When What Is HIPAA? Health Insurance Portability & Accountability Act of 1996.
Confidentiality and HIPAA
HIPAA Privacy Rule Training
COBB/DOUGLAS COMMUNITY SERVICES BOARD Confidentiality and Privacy of Consumer Information.
HIPAA Health Insurance Portability and Accountability Act.
What is HIPAA? This presentation was created by The University of Arizona Privacy Office, The Office for the Responsible Conduct of Research on March 5,
1 HIPAA Education CCAC Professional Development Training September 2006 CCAC Professional Development Training September 2006.
Key Changes to HIPAA from the Stimulus Bill (ARRA) Children’s Health System Department Leadership Meeting October 28, 2009 Kathleen Street Privacy Officer/Risk.
NAU HIPAA Awareness Training
HIPAA Health Insurance Portability and Accountability Act.
Reviewing the World of HIPAA Stephanie Anderson, CPC October 2006.
HIPAA Privacy Rule Compliance Training for YSU April 9, 2014.
 The Health Insurance Portability and Accountability Act of  Federal Law designed to protect sensitive information.  HIPAA violations are enforced.
HIPAA THE PRIVACY RULE Reviewed December HISTORY In 2000, many patients that were newly diagnosed with depression received free samples of anti-
Are you ready for HIPPO??? Welcome to HIPAA
HIPAA HIPAA Health Insurance Portability and Accountability Act of 1996.
HIPAA COMPLIANCE IN YOUR PRACTICE MARIBEL VALENTIN, ESQUIRE.
HIPAA Health Insurance Portability & Accountability Act of 1996.
The University of Kansas Medical Center Shadow Experience Training.
HIPAA PRIVACY AND SECURITY AWARENESS.
“ Technology Working For People” Intro to HIPAA and Small Practice Implementation.
Privacy and Security of Protected Health Information NorthPoint Health & Wellness Center 2011.
1 HIPAA OVERVIEW ETSU. 2 What is HIPAA? Health Insurance Portability and Accountability Act.
Health Insurance Portability and Accountability Act (HIPAA)
Next ETCH Confidentiality and HIPAA Annual Review What you need to know. The Privacy Rule 1.
1 Copyright © 2011, 2007, 2003, 1999 by Saunders, an imprint of Elsevier Inc. All rights reserved. Privacy in the Physician’s Office Chapter 17.
How Hospitals Protect Your Health Information. Your Health Information Privacy Rights You can ask to see or get a copy of your medical record and other.
HIPAA Training Developed for Ridgeview Institute 2012 Hospital Wide Orientation.
HIPAA (health insurance portability and accountability act)
HIPAA Michigan Cancer Registrars Association 2005 Annual Educational Conference Sandy Routhier.
© 2009 The McGraw-Hill Companies, Inc. All rights reserved. 1 McGraw-Hill Chapter 2 The HIPAA Privacy Standards HIPAA for Allied Health Careers.
Building a Privacy Foundation. Setting the Standard for Privacy Health Insurance Portability and Accountability Act (HIPAA) Patient Bill of Rights Federal.
Health Insurance Portability and Accountability Act (HIPAA) CCAC.
Copyright © 2009 by The McGraw-Hill Companies, Inc. All Rights Reserved. McGraw-Hill Chapter 6 The Privacy and Security of Electronic Health Information.
Health Insurance Portability and Accountability Act of 1996 HIPAA Privacy Training for County Employees.
Understanding HIPAA (Health Insurandce Portability and Accountability Act)
© 2013 The McGraw-Hill Companies, Inc. All rights reserved. Ch 8 Privacy Law and HIPAA.
HIPAA BASIC TRAINING Presented by Anderson Health Information Systems, Inc.
HIPAA THE PRIVACY RULE. 2 HISTORY In 2000, many patients that were newly diagnosed with depression received free samples of anti- depressant medications.
HealthBridge is one of the nation’s largest and most successful health information exchange organizations. Tri-State REC: Privacy and Security Issues for.
HITECH and HIPAA Presented by Rhonda Anderson, RHIA Anderson Health Information Systems, Inc
Top 10 Series Changes to HIPAA Devon Bernard AOPA Reimbursement Services Coordinator.
HIPAA Overview Why do we need a federal rule on privacy? Privacy is a fundamental right Privacy can be defined as the ability of the individual to determine.
AND CE-Prof, Inc. January 28, 2011 The Greater Chicago Dental Academy 1 Copyright CE-Prof, Inc
HIPAA/HITECH TRAINING. Why are we here?  HIPAA  HITECH  PHI  Minimum Necessary “Need to Know”  Breaches and Fines.
 Health Insurance and Accountability Act Cornelius Villalon Jr.
The Health Insurance Portability and Accountability Act of 1996 “HIPAA” Public Law
HIPAA TRIVIA Do you know HIPAA?. HIPAA was created by?  The Affordable Care Act  Health Insurance companies  United States Congress  United States.
Board of Directors – March 24, 2016 Denise Mannon, AHFI, CHPC Corporate Compliance Officer.
HIPAA Training. What information is considered PHI (Protected Health Information)  Dates- Birthdays, Dates of Admission and Discharge, Date of Death.
The Medical College of Georgia HIPAA Privacy Rule Orientation.
Developed for Ridgeview Institute 2015 Hospital Wide Orientation
HIPAA Privacy Rule Training
Health Insurance Portability and Accountability Act of 1996
What is HIPAA? HIPAA stands for “Health Insurance Portability & Accountability Act” It was an Act of Congress passed into law in HEALTH INSURANCE.
HIPAA PRIVACY AWARENESS, COMPLIANCE and ENFORCEMENT
Disability Services Agencies Briefing On HIPAA
What Every Employee Should Know and Remember
HIPAA SECURITY RULE Copyright © 2008, 2006, 2004 by Saunders an imprint of Elsevier Inc. All rights reserved.
The Health Insurance Portability and Accountability Act
WELCOME.
Presentation transcript:

HIPAA In The Workplace What Every Employee Should Know and Remember

What is HIPAA? The Health Insurance Portability and Accountability Act of 1996  Portable  Accountable  Rules for Privacy  Rules for Security 

Privacy Effective Dates: April 14, 2003  Privacy Rules effective this date  Compliance Date  Regulations enforced by the Office of Civil Rights

What is the Privacy Regulation? Intention of the regulation is to protect health information from non-medical uses by employer, marketers, etc. Regulate access to individuals health information Information that is not in electronic format is protected under privacy

What is Protected Health Information (PHI)? Any Information, in any medium that:  Relates to the past, present or future physical or mental health or condition or provision of, or payment for health care to an individual AND  created or received by health care provider, health plan, public health authority, employer, life insurer, state agency.

What makes it personally identifiable? Health Information including demographic data collected from an individual that:  Permits identification of the individual or  Could reasonably be used to identify that individual Examples: Name, Address, ID Number, Job Classification, Zip Code, Age, Job Tenure, Photo, Education Level, etc. If it is personally identifiable- IT IS PROTECTED!!

What PHI Will You See? Member Records FMLA Requests Election Forms Change Forms Authorizations AASIS

Who must comply with the HIPAA Regulations? Hospitals, insurance companies, physician offices, private companies and state agencies Employee Benefits Division of the Department of Finance and Administration and their Business Affiliates/Associates

Am I a Business Associate? Yes, if you do business with EBD you are a Business Associate.  Business Associates are now subject to all provisions of HIPAA Privacy and Security.  Business Associates are now subject to the same Civil and Criminal Penalties as Covered Entities

Protected Health Information (PHI) Permitted Uses and Disclosures: You must have a signed authorization in order to disclose PHI You must identify employees who may receive PHI You must only divulge minimum necessary information You must have an effective mechanism to resolve employee non-compliance

Who is responsible for authorization, and when do we need it? Authorization is required for any use or disclosure that is not related to treatment, payment or healthcare operations related activities Entity that has the information must have authorization PRIOR to disclosure

HIPAA Security Effective Dates: Effective April 14, 2005  Security Rules effective this date  Compliance Date  Regulations enforced by the Office of Civil Rights as of August 3, 2009

What is the Security Regulation? Ensure the confidentiality, integrity and availability of all electronic protected health information Protect against any reasonably anticipated threats and uses or disclosures that are not allowed by Privacy regulations Electronic format such as s covered under security

What is the Security Regulation? No permitted “incidental” disclosures or uses under Security Evaluation, review and updating of documentation is required Mitigate these threats by whatever safeguards you believe can be “reasonably and appropriately” be implemented in line with Security regulation

What makes it electronic PHI? Electronic PHI- PHI transmitted or maintained on electronic media:  Electronic storage media, including memory devices in computers, thumb drives, etc.  Transmission media used to exchange information already in electronic storage media, such as  Certain transmissions, including of paper via fax, and voice are not considered transmissions via electronic media

What does HIPAA allow us to do? Treatment Payment Operations (TPO)

Unsecure PHI PHI in any medium (electronic, paper or oral) that is not secured through use of a technology or methodology that renders PHI unusable, unreadable, or indecipherable to unauthorized individuals. Only form of “secure” PHI is encryption or shredding (cross-shredding)

What is a Breach? Anything that compromises the security or privacy of protected health information (PHI) and  Poses a significant risk of financial, reputational, or other harm to the individual  Unauthorized acquisition, access, use, or disclosure of PHI is considered a breach of PHI

What do I do If I think a Breach has Occurred? Contact EBD as soon as you receive notification No later than 24 hours of discovery of breach Must provide identity of each individual whose unsecured PHI has been or is reasonably believed to have been breached

Genetic Information Non-Discrimination Act (GINA) Title I part of Privacy Rule as of October 2009 Can not use Genetic Information to discriminate for basis of health insurance enrollment or underwriting Can not use Genetic Information to discriminate in employment decisions (Title II)

G.I.N.A.: Title II Genetic information includes information about genetic tests of applicants, employees or their family members, family medical history and requests for or receipt of genetic services by applicants, employees or their family members.

G.I.N.A.: Title II Protects applicants and employees against discrimination based on genetic information in hiring, promotion, discharge, pay, fringe benefits, job training, classification, referral and other aspects of employment.

G.I.N.A.: Title II G.I.N.A. also restricts employers’ acquisition of genetic information and limits disclosure of genetic information.

Most Frequent Complaints: Lack of adequate safeguards Disclosures not limited to “minimum necessary” standard Failure to obtain authorization

What Happens with Non-Compliance? Entity did not know (even with reasonable diligence): Minimum penalty $100 up to $50,000 per violation with a maximum of $25,000 for repeat violations Reasonable cause, not willful neglect: Minimum penalty $1,000 up to $50,000 per violation with a maximum of $100,000 for repeat violations Annual maximum $1.5 million of per year

What Happens with Non-Compliance? Willful neglect, but corrected within 30 days: $10,000 to $50,000 per violation; $250,000 for repeat violations. $1.5 million maximum annual penalty Willful neglect, not corrected within 30 days: $50,000 to $1,500,000 per violation. No maximum annual penalty

Criminal Penalties Wrongful disclosure or obtainment: up to $50,000 and up to one (1) year imprisonment or both Offenses committed under false pretenses: up to $100,000 and up to five (5) years imprisonment or both

Criminal Penalties Offenses committed with the intent to sell, transfer or use PHI for commercial advantage or personal gain or malicious harm permit fines of up to $250,000 and up to ten (10) years imprisonment or both

Attorney General Prosecution The State Attorney General has the authority as of 2/2009 to bring civil actions on the behalf of state residents to stop violations and/or obtain damages of $100 per violation not to exceed $25,000 per year for identical violations

Attorney General Prosecution State can recover attorney fees in any civil action to collect damages Upon petition of the Attorney General, the court may order suspension or forfeiture of licenses, permits or authorization to do business in this state

As a Supervisor- What can you do? You can ask (Why are you not coming to work today?) You can request additional information You must protect that information Information can be shared vertically (with your boss, but not your co- workers)

4 ways to secure your workstation Lock up Always Log out of your Systems Disable your drives (done by Tech Support) Make Security a part of your Routine

3 ways to eliminate unauthorized use Use workstation ID’s and passwords Use screen savers Position your monitor away from doorways and windows

If you have any doubt whether HIPAA applies: Don’t say anything, or say the minimum necessary Contact the Compliance Department

Procedural Safeguards: Visits to secured areas should be limited to business purposes only NEVER recycle anything containing PHI- ALWAYS shred PHI Be careful with faxed claims data – it is the most at risk for breach of privacy

Security Examples If I do not object, can my health care provider share or discuss my health information with my family, friends, or others involved in my care or payment for my care?

Security Examples Can my Doctor or Nurse discuss my health information or condition with my brother if I tell them not to?

Security Examples Wal-Mart Anne Presley’s Medical Record (6 Employees dismissed from St. Vincent's) NW AR Nurse received 2 years probation and 100 hours community service

Questions?