Stony Brook Health Sciences Center Melissa Pinero HIPAA Privacy Officer 631-444-2148.

Slides:



Advertisements
Similar presentations
Independent Contractor Orientation HIPAA What Is HIPAA? Health Insurance Portability and Accountability Act of 1996 The Health Insurance Portability.
Advertisements

HIPAA Privacy Rule “Standards for Privacy of Individually Identifiable Health Information” 45 CFR 160 and 164* *
HIPAA and Public Health 2007 Epi Rapid Response Team Conference.
Health Insurance Portability and Accountability Act HIPAA Education for Volunteers and Students.
HIPAA. What Why Who How When What Is HIPAA? Health Insurance Portability & Accountability Act of 1996.
HIPAA Privacy Keys to Success Education for Health Care Professionals.
COBB/DOUGLAS COMMUNITY SERVICES BOARD Confidentiality and Privacy of Consumer Information.
The Health Insurance Portability and Accountability Act Basic HIPAA Training For CMU workforce with access to PHI.
HIPAA – Privacy Rule and Research USCRF Research Educational Series March 19, 2003.
Increasing public concern about loss of privacy Broad availability of information stored and exchanged in electronic format Concerns about genetic information.
WORKFORCE CONFIDENTIALITY HIPAA Reminders. HIPAA 101 The Health Insurance Portability and Accountability Act (HIPAA) protects patient privacy. HIPAA is.
HIPAA Health Insurance Portability and Accountability Act.
What is HIPAA? This presentation was created by The University of Arizona Privacy Office, The Office for the Responsible Conduct of Research on March 5,
1 HIPAA Education CCAC Professional Development Training September 2006 CCAC Professional Development Training September 2006.
NAU HIPAA Awareness Training
HIPAA Privacy Keys to Success Education for Nursing and all other Clinical Students Effective January 2010 HIPAA Job Specific Education1.
Informed Consent.
 Health Care Information Portability and Accountability Act  Passed in 1996  2 objectives 1) Ensure people could maintain health insurance between.
 The Health Insurance Portability and Accountability Act of  Federal Law designed to protect sensitive information.  HIPAA violations are enforced.
Health Insurance Portability & Accountability Act “HIPAA” To every patient, every time, we will provide the care that we would want for our own loved ones.
Are you ready for HIPPO??? Welcome to HIPAA
Professional Nursing Services.  Privacy and Security Training explains:  The requirements of the federal HIPAA/HITEC regulations, state privacy laws.
Protecting Client Data HIPAA, HITECH and PIPA Part 1A
HIPAA Training Presentation for New Employees How did we get here? HIPAA Police 1.
HIPAA What’s Said Here – Stays Here…. WHAT IS HIPAA  Health Insurance Portability and Accountability Act  Purpose is to protect clients (patients)
HIPAA COMPLIANCE IN YOUR PRACTICE MARIBEL VALENTIN, ESQUIRE.
HIPAA Health Insurance Portability & Accountability Act of 1996.
Health Insurance Portability and Accountability Act (HIPAA)
East Carolina University HIPAA Privacy
Columbia University Medical Center Health Insurance Portability and Accountability Act of 1996 (“HIPAA”) Privacy & Information Security Training 2009.
Protected Health Information (PHI). Privileged Communication An exchange of information between two individuals in a confidential relationship. (Examples:
University of Miami1 Privacy, Confidentiality & Security Marisabel Davalos, M.S.Ed., CIP Associate Director of Educational Initiatives November, 2008.
Paula Peyrani, MD Medical/Project Director, HIV Program at the 550 Clinic Assistant Director, Research Design and Development Clinical and Translational.
HIPAA PRIVACY AND SECURITY AWARENESS.
HIPAA Business Associates Leadership Group Meeting June 28, 2001.
1 Research & Accounting for Disclosures March 12, 2008 Leslie J. Pfeffer, BS, CHP Office of the Vice President for Research Administration Office of Compliance.
HIPAA OBJECTIVES  Define HIPAA  Define PHI  Use of PHI  Your rights  Your responsibilities.
1 HIPAA OVERVIEW ETSU. 2 What is HIPAA? Health Insurance Portability and Accountability Act.
HIPAA Privacy and Research August 21, 2015
Health information that does not identify an individual and with respect to which there is no reasonable basis to believe that the information can be.
HIPAA Training Developed for Ridgeview Institute 2012 Hospital Wide Orientation.
© 2009 The McGraw-Hill Companies, Inc. All rights reserved. 1 McGraw-Hill Chapter 2 The HIPAA Privacy Standards HIPAA for Allied Health Careers.
Medical Law and Ethics, Third Edition Bonnie F. Fremgen Copyright ©2009 by Pearson Education, Inc. Upper Saddle River, New Jersey All rights reserved.
Health Insurance Portability and Accountability Act of 1996 HIPAA Privacy Training for County Employees.
Copyright ©2014 by Saunders, an imprint of Elsevier Inc. All rights reserved 1 Chapter 02 Compliance, Privacy, Fraud, and Abuse in Insurance Billing Insurance.
Welcome….!!! CORPORATE COMPLIANCE PROGRAM Presented by The Office of Corporate Integrity 1.
Western Asset Protection
Configuring Electronic Health Records Privacy and Security in the US Lecture b This material (Comp11_Unit7b) was developed by Oregon Health & Science University.
Final HIPAA Privacy Rule: The Research Provisions Julie Kaneshiro DHHS Office for Human Research Protections Phone: Fax:
The Health Insurance Portability and Accountability Act (HIPAA) requires Plumas County to train all employees in covered departments about the County’s.
Privacy: HIPAA Emerson Murphy-Hill. Rosie Callender, RHIA, web.msm.edu/hipaa/An%20Introduction%20to%20HIPAA.ppt What is HIPAA? A Federal Law Created in.
HIPAA and RESEARCH 5 th Thursday May 31, Page 2.
Reviewed by: Gunther Kohn Chief Information Officer, UB School of Dental Medicine Date: October 20, 2015 Approved by: Sarah L. Augustynek Compliance Officer,
UC Riverside Health Training and Development
Developed for Ridgeview Institute 2015 Hospital Wide Orientation
ELECTRONIC HEALTH RECORD PRIVACY TRAINING
HIPAA PRIVACY & SECURITY TRAINING
What is HIPAA? HIPAA stands for “Health Insurance Portability & Accountability Act” It was an Act of Congress passed into law in HEALTH INSURANCE.
HIPAA/HITECH Training
No No, Yes Yes: Simple Privacy & Information Security Tips Krista Barnes, J.D. Senior Legal Officer and Director, Privacy & Information Security, Institutional.
HIPAA PRIVACY AWARENESS, COMPLIANCE and ENFORCEMENT
Disability Services Agencies Briefing On HIPAA
The Health Insurance Portability and Accountability Act Basic HIPAA Training For CMU workforce with access to PHI.
Privacy, Security & NYS Confidentiality Laws
The Health Insurance Portability and Accountability Act
New School Violence Law; HIPAA Privacy Training
HIPAA & PHI TRAINING & AWARENESS
The Health Insurance Portability and Accountability Act
The Health Insurance Portability and Accountability Act
Presentation transcript:

Stony Brook Health Sciences Center Melissa Pinero HIPAA Privacy Officer

Health Sciences Center Schools New Employee & Student Training FERPA Family Education Rights & Privacy Act HIPAA Health Insurance Portability & Accountability Act

FERPA The Family Education Rights & Privacy Act (20 U.S.C. §1232g:34 CFR Part 99) is a Federal law that protects the privacy of student education records. The law applies to all schools that receive funds under an applicable program of the US Dept of Education. FERPA gives parents certain rights with respect to their children’s education records. These rights transfer to the student when he or she reaches the age of 18 or attends a school beyond the high school level. Students to whom the rights have transferred are “eligible students.”

HIPAA is…… The Health Insurance Portability and Accountability Act of 1996

Portability Created to ensure access to health coverage Allows for continuity in health coverage Prevents denial due to a pre-existing condition(s)

Accountability Healthcare fraud is a federal crime Fines and / or jail time may apply Individuals and organizations face sanctions

The HIPAA Privacy Rules & HITECH 2010

What is HITECH? On February 17, 2009, the Federal Stimulus Bill or American Recovery and Reinvestment Act (ARRA) was signed into law and included provisions to address Health Information Technology and Economic and Clinical Health Act (HITECH) Purpose is to create a national health information infrastructure and widespread adoption of electronic health records through monetary incentives. Provide enhanced Privacy & Security Protections under HIPAA including increased legal liability for non-compliance and greater enforcement.

PHI is a culmination of data that is specific to individual patients. This data can be used to identify:  A patient  A patient’s health  Health care services received by a patient

Privacy Goals We need to: Maintain our patient’s trust. Educate our patients as to their rights. Safeguard our patient’s PHI.

HIPAA 18 Elements Necessary for De-identification of Patient Data Before Presenting the Case in Class The following data must be removed for de-identification: Name Location; all geographic subdivisions smaller than a state, including street address, city, county, precinct, zip code, and their equivalent geocodes. Dates (all dates related to the subject of the information, e.g. birth dates, admission dates, discharge dates, encounter dates, surgery dates, etc.) Telephone numbers Fax numbers Electronic mail addresses Social security numbers Medical record numbers Health plan beneficiary numbers Account numbers Certificate / license numbers Vehicle identifiers and serial numbers, including license plate numbers Device identifiers and serial numbers Web Universal Resource Locators (URLs) Internet Protocol (IP) address numbers Biometric identifiers, including finger and voice prints Full face photographic images and any comparable images Any other unique identifying number, characteristic, or code The following data may be used: Age (age 90 and over must be aggregated to prevent the identification of older individuals) Race Ethnicity Marital status Codes (a random or fictional code may be used to link cases or re-identify the health information at a later time; codes may not be a derivative of the individual’s social security number or other identifiable numerical codes, e.g. birth date, fax number, etc.)

Authorization Authorization is required when disclosing PHI for purposes other than treatment, payment, or operations.

Patients Rights Under HIPAA request restricted use and disclosure of PHI; inspect and copy their health information; request to amend their medical record; request an accounting of disclosures; and file a complaint.

How is HIPAA Enforced? Civil monetary penalty: Civil penalty for inadvertent violation= fines of $100/per incident up to $25,000/per year for each similar offense. Example: A hospital employee violates HIPAA by misdialing a fax number and sending 100 patient records to Starbucks. The hospital & the employee may have to pay a $10,000 ($100 x 100) fine.

Worse Case Scenario Criminal Penalties: Criminal penalties= large fines + jail time, and increase with the degree of the offense. Example: A hospital employee steals and sells patient information for personal profit. Criminal penalties could be as much as $1.5 million and / or 10 years in jail.

Security Health Insurance Portability and Accountability Act HIPAA Electronic Security to Ensure Privacy, Trust, and Quality Care Edward W. Hines Information Security Officer, SBUMC, HSC, and Dental School

What is Security The Protection of Electronic and Physical Assets Merriam-Webster Measures taken to guard against espionage or sabotage, crime, attack, or escape an organization or department who task is security.

The best way to protect yourself… make your passwords difficult to guess NEVER tell anyone your password NEVER write your password down, such as on a post-it note. Don’t use common info about you or your family, pets, or friends names, Soc. Sec #;birthdates; anniversary, credit card number; telephone number, etc. Don’t use names you have used before, variation of your user ID, or something significant about yourself as a password. Don’t let someone see what you are entering as your password. If you thing there is even a slight chance someone knows your password, CHANGE IT !! Remember if someone logs on as you and does something improper, you can be held responsible.

Removable Media If lost, removable media can allow unscrupulous people access to confidential patient information. Removable drives can also introduce malicious software to the network. USB drives, CD-RW, and any other flash media must be approved by the ISO If you need to take your work home, do it safely from home and request a VPN account…..

1.Understanding Ethics and Compliance

Ethics are based on…… Values Morals Integrity Knowledge of Right vs. Wrong

What is a Compliance Program? A Compliance Program is a system to detect and prevent violations of law or policy. An effective Compliance Program will: -Promote an ethical environment -Reduce risks -Improve operational efficiency -Ensure quality of care -Promote a strong control environment

Ethical Business Practices Refrain from Misrepresentations -Remember to keep it honest (e.g. Falsification of documentation= violation) “Doing the right thing each and every time, even when no one is watching.”

Ethical Business Practices Avoid Conflicts of Interest….  SBU property should never be used for personal business.  Employees should not supervise family members.

Reporting of Possible Violations Where to Report: Immediate Supervisor, Departmental Chain of Command, or Compliance Officer What to Report: An actual or reasonable belief of a violation Consequences of Reporting: No retaliation or discipline for reporting in good faith Investigations of Violations: All allegations of wrongdoing will be assessed and investigated Discipline for Violations: In accordance with labor union contracts, and may include termination.

Call the Compliance HOTLINE (631)