Virginia Department of Medical Assistance Services Presentation On HIPAA to the Virginia COTS PSA Workgroup Frank G Guinan Craig Goeller November 7, 2000.

Slides:



Advertisements
Similar presentations
Tamtron Users Group April 2001 Preparing Your Laboratory for HIPAA Compliance.
Advertisements

Presented by Elena Chan, UCSF Pharm.D. Candidate Tiffany Jew, USC Pharm.D. Candidate March 14, 2007 P HARMACEUTICAL C ONSULTANTS, I NC. P RO P HARMA HIPAA.
HIPAA Basics Brian Fleetham Dickinson Wright PLLC.
HIPAA Privacy Training. 2 HIPAA Background Health Insurance Portability and Accountability Act of 1996 Copyright 2010 MHM Resources LLC.
HIPAA Privacy Rule Training
HIPAA Privacy Training Your Name Here. © 2004 MHM Resources Inc.2 HIPAA Background Health Insurance Portability and Accountability Act of 1996.
Increasing public concern about loss of privacy Broad availability of information stored and exchanged in electronic format Concerns about genetic information.
The Health Insurance Portability and Accountability Act of 1996– charged the Department of Health and Human Services (DHHS) with creating health information.
© 2009 The McGraw-Hill Companies, Inc. All rights reserved. 1 McGraw-Hill Chapter 1 The Goal of HIPAA: Administrative Simplification HIPAA for Allied Health.
HIPAA PRIVACY REQUIREMENTS Dana L. Thrasher Constangy, Brooks & Smith, LLC (205) ; Victoria Nemerson.
HIPAA Health Insurance Portability and Accountability Act.
What is HIPAA? This presentation was created by The University of Arizona Privacy Office, The Office for the Responsible Conduct of Research on March 5,
Health Insurance Portability and Accountability Act (HIPAA)HIPAA.
HIPAA The Hidden Beast June Kissinger Director, Risk Management Support Services March 12, 2003.
1 HIPAA Education CCAC Professional Development Training September 2006 CCAC Professional Development Training September 2006.
Bringing HIPAA to Hospital Systems HIPAA impact on hospital systems viaMD solution for HIPAA compliance W e b e n a b l i n g Pa t i e n t A d m i t t.
HIPAA Administrative Simplification Final Rule for Transactions Code Sets Stanley Nachimson
Managing Access to Student Health Information per Federal HIPAA Guidelines Joan M. Kiel, Ph.D., CHPS Duquesne University Pittsburgh, Penna
Presented by the Office of the General Counsel An Overview of HIPAA.
TM The HIPAA Privacy Rule: Safeguarding Health Information in Research and Public Health Practice Centers for Disease Control and Prevention Beverly A.
Reviewing the World of HIPAA Stephanie Anderson, CPC October 2006.
HIPAA Privacy Rule Compliance Training for YSU April 9, 2014.
COMPLYING WITH HIPAA PRIVACY RULES Presented by: Larry Grudzien, Attorney at Law.
Are you ready for HIPPO??? Welcome to HIPAA
HIPAA HIPAA Health Insurance Portability and Accountability Act of 1996.
HIPAA Compliance Strategies for Employers, METs, MEWAs and Taft Hartley Union Trust Funds The HIPAA Colloquium at Harvard University Presented by: Melissa.
HIPAA COMPLIANCE IN YOUR PRACTICE MARIBEL VALENTIN, ESQUIRE.
HIPAA – Health Insurance Portability & Accountability Act and the Privacy Act MSgt Nechele M. Chambers Senior Enlisted Liaison TRICARE Area Office-Europe.
Part III – HIPAA Reference
HIPAA PRIVACY AND SECURITY AWARENESS.
“ Technology Working For People” Intro to HIPAA and Small Practice Implementation.
HIPAA The Privacy Rule Health Insurance Portability and Accountability Act of 1996 (HIPAA) The 104 th Congress passed the Act, Public Law ,
S I D L E Y & A U S T I N HIPAA and Your Compliance Program HCCA’s 2000 Compliance Institute New Orleans, Louisiana September 25, 2000.
Health Insurance Portability and Accountability Act (HIPAA)
Copyright ©2011 by Pearson Education, Inc. Upper Saddle River, New Jersey All rights reserved. Health Information Technology and Management Richard.
1 HIPAA Health Insurance Portability and Accountability Act Budgeting Effectively for Good Faith Compliance.
Computerized Networking of HIV Providers Workshop Data Security, Privacy and HIPAA: Focus on Privacy Joy L. Pritts, J.D. Assistant Research Professor Health.
Health Insurance Portability and Accountability Act of 1996 (HIPAA) Proposed Rule: Security and Electronic Signature Standards.
How Hospitals Protect Your Health Information. Your Health Information Privacy Rights You can ask to see or get a copy of your medical record and other.
HIPAA Overview (Health Insurance Portability and Accountability Act 1996) May 2002 VACSB - HIPAA Committee.
HIPAA Michigan Cancer Registrars Association 2005 Annual Educational Conference Sandy Routhier.
Medical Law and Ethics, Third Edition Bonnie F. Fremgen Copyright ©2009 by Pearson Education, Inc. Upper Saddle River, New Jersey All rights reserved.
Health Insurance Portability and Accountability Act (HIPAA) CCAC.
Health Insurance Portability and Accountability Act of 1996 HIPAA Privacy Training for County Employees.
Understanding HIPAA (Health Insurandce Portability and Accountability Act)
Eliza de Guzman HTM 520 Health Information Exchange.
© 2013 The McGraw-Hill Companies, Inc. All rights reserved. Ch 8 Privacy Law and HIPAA.
Chapter 7—Privacy Law and HIPAA
FleetBoston Financial HIPAA Privacy Compliance Agnes Bundy Scanlan Managing Director and Chief Privacy Officer FleetBoston Financial.
HIPAA THE PRIVACY RULE. 2 HISTORY In 2000, many patients that were newly diagnosed with depression received free samples of anti- depressant medications.
HIPAA Health Insurance Portability and Accountability Act of 1996.
Copyright © 2015 by Saunders, an imprint of Elsevier Inc. All rights reserved. Chapter 3 Privacy, Confidentiality, and Security.
HIPAA Health Insurance Portability and Accountability Act.
HIPAA Security John Parmigiani Director HIPAA Compliance Services CTG HealthCare Solutions, Inc.
 Health Insurance and Accountability Act Cornelius Villalon Jr.
The Health Insurance Portability and Accountability Act of 1996 “HIPAA” Public Law
HIPAA TRIVIA Do you know HIPAA?. HIPAA was created by?  The Affordable Care Act  Health Insurance companies  United States Congress  United States.
Public Health IT Privacy, Confidentiality and Security of Public Health Information This material (Comp13_Unit2) was developed Columbia University, funded.
HIPAA Training Workshop #3 Individual Rights Kaye L. Rankin Rankin Healthcare Consultants, Inc.
HIPAA Privacy Rule Training
What is HIPAA? HIPAA stands for “Health Insurance Portability & Accountability Act” It was an Act of Congress passed into law in HEALTH INSURANCE.
HIPAA CONFIDENTIALITY
HIPAA Administrative Simplification
HIPAA PRIVACY AWARENESS, COMPLIANCE and ENFORCEMENT
Disability Services Agencies Briefing On HIPAA
County HIPAA Review All Rights Reserved 2002.
HIPAA Security Standards Final Rule
National Congress on Health Care Compliance
HIPAA Compliance Services CTG HealthCare Solutions, Inc.
HIPAA Compliance Services CTG HealthCare Solutions, Inc.
Presentation transcript:

Virginia Department of Medical Assistance Services Presentation On HIPAA to the Virginia COTS PSA Workgroup Frank G Guinan Craig Goeller November 7, 2000

Agenda Brief Introduction to HIPAA The Four Components of Administrative Simplification Who does HIPAA Apply to? Privacy Standards Security Standards Questions and Answers

Brief Introduction to HIPAA Health Insurance Portability & Accountability Act of 1996 (HIPAA) –Public law Portability: transfer of healthcare when employees change jobs COBRA - Completed Accountability: Fraud/Abuse & Administrative Simplification Electronic Data Interchange (EDI) focus - Implementation In Process

The Four Components of Administrative Simplification Transactions and Code Sets –Examples: Claims, Enrollment, Coordination of Benefits (COB’s) –Signed by the Secretary of HHS –Posted to the Federal Registrar on 8/16/00 –60 Day Review, Congress could have modified –24 months to Comply: 10/17/2002 Transactions Apply to health care organizations using Electronic Transmissions - Any media form (tapes, diskettes, real-time)

Administrative Simplification (cont.) Unique Health Identifiers –Example: National Provider ID, National Employer ID, National Individual ID Privacy –Focus on Policy and Procedures protecting Individuals rights, and audit trails of disclosures –Privacy Officer for Each Organization

Administrative Simplification (con’t) Security Standards –Security and privacy standards for administrative procedures –technical security services against unauthorized access to data (electronic signature usage) –physical safeguards Electronic Signature –Not required, but encouraged –Standards for electronic signature qualification and use are included in the recent published rules

Transaction Sets ASC X12N Specifications for 9 transaction sets –Health Care Claim Dental (837) –Health Care Claim Professional (837) –Health Care Claim Institutional (837) –Eligibility Inquiry and Response (270/271) –Health Care Services Review (278) –Claim Status Request and Response (276/277) –Benefit Enrollment and Maintenance (834) –Health Care Claim Payment Advice (835) –Payroll Deducted and Other group Premiums (820)

Medical Code Sets HIPAA Uses Industry Code Sets for Standards Health Care Providers ICD-9-CM: Diseases, Injuries, Impairments, and Actions Taken by Hospitals for Inpatients NDC: Drugs and Biologics The Code on Dental Procedures and Nomenclature: Dental Services HCPCS and CPT- 4: Physician Services and Other Health Care Services CPT- 4: Other Substances, Equipment, Supplies

Who does HIPAA Apply to? Health Care Providers –All health care providers Payers –Insurance Companies –HCFA (Medicare/Medicaid) –Collection Agencies Prescription Drug Dispensing/Testing –Pharmaceuticals, Drug Stores, Labs Clearinghouse/Donor organizations –CDC, Blood banks, Organ Donors

Privacy Standards Notice of Proposed Rule Making (NPRM) November 3, 1999 Comments received for 60 Days Information Protected by the regulation –Information relating to an individual’s health, health care treatment, or payment for health care. –Protection continues as long as information in the hands of covered entity –Covered entity are encouraged to de-identify health information by removing, encoding, encrypting identifiers.

Privacy Standards Covered Entity –Health care providers who transmit data electronically –Health Plans; and –Healthcare clearinghouses May disclose Protected Health Information(PHI) to contractors, business partners, consultants, claims clearinghouses, and billing firms

Privacy Standards Covered Entity must enter into a contract requiring that identifiable information be kept confidential An exception is when a business partner is providing a referral or treatment consultation Business partners are not permitted to use or disclose health information in ways that the covered entity can not

Privacy Standards Individual Rights –Right to receive written notice of information practices from health plans and providers –Right to access their own health care information –Right to request an amendment or correction of protected health information that is inaccurate or incomplete –Right to receive accounting of when information had been disclosed for purposes other than treatment, payment and health care operations

Privacy Standards Obligations of health care plans and providers –Develop a Notice of Information Practices Providers give to each patient after rule enacted and post at place of business Plans provide notice at enrollment and every 3 years –Allow individuals to access and copy information for a reasonable costs –Develop mechanism for accounting for all disclosures –Accommodate requests for amendments or corrections –Designate a Privacy Officer responsible for privacy activities

Privacy Standards Obligations of health care plans and providers –Provide Training to all staff who have access to PHI –Establish administrative, technical, and physical safeguards –Establish Policies and Procedures –Develop and apply sanctions from re-training to reprimand to termination –Have available documentation with the regulation requirements –Develop methods to disclose minimum amount of PHI –Develop and use contracts with business partners

Privacy Standards Disclosures without patient authorization –Purposes of effecting treatment, payment, and health care operations –Certain federal, state, and other oversight activities, public health, emergencies, judicial proceedings, banking and payment processes, and health research – Disclosure of PHI for research must be approved by an Institutional Review Board or Privacy Board

Privacy Standards Disclosures with patient authorization: –Covered entities could use or disclose PHI with individual’s consent for lawful purposes –Authorizations must specify information to be disclosed, who would receive it, and when it would expire. Individuals could revoke anytime. –Covered entities would be prohibited from conditioning treatment or payment upon an individual’s agreeing to authorize disclosure of information for other purposes

Privacy Standards Guidelines and Costs –Minimum necessary use and disclosure –Scalability –Costs are estimated for covered entities for 5 year compliance to be $3.8 billion Preemption: Provides a “floor” of privacy protection. State laws that are “less protective” of privacy are preempted. States are free to enact “more stringent”statutes.

Privacy Standards Penalties and Enforcement –For each provision violated the Secretary of HHS can penalize up to $25,000 in any calendar year –Criminal penalties are fines up to $50,000 for more if “malicious harm” occurs for selling information –Regulation does not include a “private right of action”, patients cannot sue for privacy violations

Security Standards Background Regulation is expected to be released in Fall 2000 by Federal DHHS Must be implemented within 24 months after effective date Set the minimum level or “Floor” of security for individual identifiable health information maintained in or transmitted by health care organizations Business Impact Analysis Supersedes contrary state laws

Security Standards Five Major Security Categories To Guard Data Integrity, Confidentiality, & Availability 1.Administrative Procedures 2.Physical Safeguards 3.Technical Security Services 4.Technical Security Mechanisms 5.Electronic Signature Requirements (Optional as of initial draft)

Security Standards Business Impact Analysis –Determine magnitude of the regulatory impact on an organization and establish the scope of compliance –Organization Awareness and initial roles/responsibilities –Executive and senior management buy-in –Develop initial awareness program for all affected staff –Establish the HIPAA security implementation team –Baseline Assessment –GAP Analysis: Current Environment versus Regulatory Requirements

Security Standards Administrative Procedures Certification Chain-of-Trust Partner Agreement Contingency PlanFormal Record Processing Mechanisms Internal Audit Information Access Controls Personnel Security Security Configuration Management Termination Procedures Security Incident Procedures TrainingSecurity Management Process

Security Standards Physical Safeguards –Assigned Security Responsibility –Electronic Media Controls –Physical Access Controls –Workstation Use –Workstation Location –Security Awareness Training

Security Standards Technical Security Services –Access Control –Audit Controls –Authorization Control (Role or User-based access) –Data Authentication –Entity Authentication o Unique UID and one of the following –1.Token System –2.Biometric System –3.PIN –4.Password oAutomatic Log Off

Security Standards Technical Security Mechanisms (Transmission over Com Network) –Integrity –Message Authentication –Encryption or Access Controls –Network Communications require Entity Authentication Audit Trails Alarm Event Reporting

Security Standards If Electronic Signature employed, Digital Signature Technology is required! 1.User Authentication 2.Message Integrity 3.Non-repudiation (Non-alterability)

Security Standards Optional Digital Signature Features 1.Multiple Signatures 2.Independent Verifiability 3.Interoperability 4.Ability to add attribute 5. Continuity of signature capability

Q & A Internet References: