Series 1: “Meaningful Use” for Behavioral Health Providers 9/2013 From the CIHS Video Series “Ten Minutes at a Time” Module 10: HIPAA Privacy & Security.

Slides:



Advertisements
Similar presentations
Tamtron Users Group April 2001 Preparing Your Laboratory for HIPAA Compliance.
Advertisements

Todd Frech Ocius Medical Informatics 6650 Rivers Ave, Suite 137 North Charleston, SC Health Insurance Portability.
Series 1: Meaningful Use for Behavioral Health Providers From the CIHS Video Series Ten Minutes at a Time Module 1: What is Meaningful Use? 9/2013.
A Plan for a Sustainable Community Behavioral Health Information Network Western States Health-e Connection Summit & Trade Show September 10, 2013.
Series 2: Project Management Understanding and Using 6 Basic Tools 9/2013 From the CIHS Video Series Ten Minutes at a Time.
HIPAA Basics Brian Fleetham Dickinson Wright PLLC.
1. As a Florida KidCare community partner families entrust you to not only help them navigate the Florida KidCare system but to keep the information they.
Understanding Meaningful Use Presented by: Allison Bryan MS, CHES December 7, 2012 Purdue Research Foundation 2012 Review of Stage 1 and Stage 2.
EHR Privacy & Security. Missouri’s Federally-designated Regional Extension Center  University of Missouri:  Department of Health Management and Informatics.
Series 2: Project Management Understanding and Using 6 Basic Tools 9/2013 From the CIHS Video Series “Ten Minutes at a Time”
Series 2: Project Management Understanding and Using 6 Basic Tools 9/2013 From the CIHS Video Series “Ten Minutes at a Time”
Health IT Privacy and Security Policy Jodi Daniel, J.D., M.P.H. Director, Office of Policy and Research, Office of the National Coordinator for Health.
Implementing the American Reinvestment & Recovery Act of 2009.
Series 2: Project Management Advanced Project Management for Behavioral Health Electronic Health Records (EHRs) 9/2013 From the CIHS Video Series “Ten.
KENTUCKY GOVERNOR’S OFFICE OF ELECTRONIC HEALTH INFORMATION HIE-SDE SUB AWARDEE Presented by Karen Chrisman Staff Attorney.
Series 1: “Meaningful Use” for Behavioral Health Providers 9/2013 From the CIHS Video Series “Ten Minutes at a Time” Module 7: Meeting the PBHCI Grant.
Series 1: “Meaningful Use” for Behavioral Health Providers 9/2013 From the CIHS Video Series “Ten Minutes at a Time” Module 3: Core Objectives/Measures.
Series 1: “Meaningful Use” for Behavioral Health Providers 9/2013 From the CIHS Video Series “Ten Minutes at a Time” Module 9: A Closer Look at Exchanging.
Informed Consent and HIPAA Tim Noe Coordinating Center.
Series 2: Project Management Understanding and Using 6 Basic Tools 9/2013 From the CIHS Video Series “Ten Minutes at a Time”
Series 2: Project Management Understanding and Using 6 Basic Tools 9/2013 From the CIHS Video Series “Ten Minutes at a Time”
Series 2: Project Management Advanced Project Management for Behavioral Health Electronic Health Records (EHRs) 9/2013 From the CIHS Video Series “Ten.
Series 1: Meaningful Use for Behavioral Health Providers 9/2013 From the CIHS Video Series “Ten Minutes at a Time” Module 5: Clinical Quality Measures.
Series 2: Project Management Advanced Project Management for Behavioral Health Electronic Health Records (EHRs) 9/2013 From the CIHS Video Series “Ten.
Series 1: Meaningful Use for Behavioral Health Providers From the CIHS Video Series “Ten Minutes at a Time” Module 2: The Role of the Certified Complete.
Series 2: Project Management Advanced Project Management for Behavioral Health Electronic Health Records (EHRs) 9/2013 From the CIHS Video Series “Ten.
Navigating Privacy and Security Issues for HIE: A Consumer Perspective Deven McGraw Chief Operating Officer National Partnership for Women & Families
Series 1: Meaningful Use for Behavioral Health Providers From the CIHS Video Series “Ten Minutes at a Time” Module 2: The Role of the Certified Complete.
August 10, 2011 A Leading Provider of Consulting and Systems Engineering Services to Public Health Organizations.
“ Technology Working For People” Intro to HIPAA and Small Practice Implementation.
JCAHO UPDATE June The Bureau of Primary Health Care is continuing to encourage Community Health Centers to be JCAHO accredited. JCAHO’s new focus.
Dealing with Business Associates Business Associates Business Associates are persons or organizations that on behalf of a covered entity: –Perform any.
Series 1: “Meaningful Use” for Behavioral Health Providers 9/2013 From the CIHS Video Series “Ten Minutes at a Time” Module 3: Core Objectives/Measures.
Update on Federal HIT Legislation Kirsten Beronio Mental Health America.
What Did I Work on in Washington? John Glaser April 16, 2010.
Series 1: “Meaningful Use” for Behavioral Health Providers 9/2013 From the CIHS Video Series “Ten Minutes at a Time” Module 7: Meeting the PBHCI Grant.
HIT Standards Committee Privacy and Security Workgroup: Initial Reactions Dixie Baker, SAIC Steven Findlay, Consumers Union June 23, 2009.
Working with Health IT Systems Protecting Privacy, Security, and Confidentiality in HIT Systems Lecture a This material (Comp7_Unit7a) was developed by.
Meaningful Use Security Risk Assessment (SRA): Resources for Eligible Professionals (EPs) Kim Bell, MHA, FACHE, PCMH-CCE Executive Director Georgia Health.
Governor’s Office of Electronic Health Information The National Council for Community Behavioral Healthcare.
HIPAA Michigan Cancer Registrars Association 2005 Annual Educational Conference Sandy Routhier.
State HIE Program Chris Muir Program Manager for Western/Mid-western States.
Privacy in Healthcare Challenges Associated with Implementing Privacy in an Electronic Health Records Environment John P. Houston, J.D. Vice President,
The Culture of Healthcare Privacy, Confidentiality, and Security Lecture d This material (Comp2_Unit9d) was developed by Oregon Health and Science University,
Policies for Information Sharing April 10, 2006 Mark Frisse, MD, MBA, MSc Marcy Wilder, JD Janlori Goldman, JD Joseph Heyman, MD.
Series 1: “Meaningful Use” for Behavioral Health Providers 1/2014 Changes to Stage 1: Core Objectives 1 through 7 (updates generally required for Stage.
Working with HIT Systems
Your Answer to All Things EHR.  Federally-designated Regional Extension Center for the State of Missouri  University of Missouri:  Department of Health.
1 Changes to Privacy Regulations under ARRA May 4, 2009 Melissa Goldstein, J.D. The George Washington University School of Public Health and Health Services.
Bringing Health Information to Life DAVID BLUMENTHAL, MD, MPP National Coordinator of Health Information Technology US Department of Health & Human Services.
Overview of ONC Report to Congress on Health Information Blocking Presented to the Health IT Policy Committee, Task Force on Clinical, Technical, Organizational,
Series 1: “Meaningful Use” for Behavioral Health Providers 1/2014 Changes to Stage 1: Core Objective #10 Clinical Quality Measures (required for Stage.
Configuring Electronic Health Records Privacy and Security in the US Lecture b This material (Comp11_Unit7b) was developed by Oregon Health & Science University.
Electronic Exchange of Clinical Information Configuring RPMS-EHR for Meaningful Use Resource Patient Management System.
Kentucky eHealth Summit Michael R. Lardiere, LCSW Vice President Health Information Technology and Strategic Development The National Council for Community.
© 2014 By Katherine Downing, MA, RHIA, CHPS, PMP.
COMMUNITY-WIDE HEALTH INFORMATION EXCHANGE: HIPAA PRIVACY AND SECURITY ISSUES Ninth National HIPAA Summit September 14, 2004 Prepared by: Robert Belfort,
Juvenile Legislative Update 2013 Confidential Records and Protected Disclosures.
Overview Introduction Meaningful Use Objective for Security Key Security Areas and Measures Best Practices Security Risk Analysis (SRA) Action Plan Demonstration.
Modified Stage 2 Meaningful Use: Objective #1 – Protect Electronic Health Information July 5, 2016 Today’s presenter: Al Wroblewski, PCMH CCE, Client.
Refuah Community Health Collaborative (RCHC) PPS
Confidential Records and Protected Disclosures
Modified Stage 2 Meaningful Use: Objective #1 – Protect Electronic Health Information July 5, 2016 Today’s presenter: Al Wroblewski, PCMH CCE, Client.
American Health Information Management Association
Enforcement and Policy Challenges in Health Information Privacy
HIPAA Compliance Services CTG HealthCare Solutions, Inc.
Objectives Describe the purposes of the Health Information Technology for Economic and Clinical Health (HITECH) Act of 2009 Explore how the HITECH Act.
HIPAA Compliance Services CTG HealthCare Solutions, Inc.
“One Connection For A Healthier Missouri”
Presentation transcript:

Series 1: “Meaningful Use” for Behavioral Health Providers 9/2013 From the CIHS Video Series “Ten Minutes at a Time” Module 10: HIPAA Privacy & Security and 42 CFR Part 2 (Confidentiality)

Overview Differences between privacy, security and confidentiality Meaningful Use and HIPAA Privacy and Security Understanding and applying 42 CFR Part 2 in Meaningful Use Resources for implementation

HIPAA and 42 CFR Part 2 are intended to support (not impede) the appropriate exchange of patient information Exchange of patient information is central to Meaningful Use Ensure understanding of the data sets to be exchanged (Module 9) and what the rules REALLY say about when and how personal health information may be shared among providers What HIPAA really says: usesanddisclosuresfortpo.html What 42 CFR Part 2 really says: A Note on Sharing Patient Information

Privacy, Security and Confidentiality Privacy and Security Health Information Protection and Accountability Act (HIPAA) Privacy rules identify national standards (45 CFR Part 160 and Subparts A and E of Part 164)Part 160Part 164 Security rules operationalize these standards (Subparts A and C of Part 164)Part 164 Patient information protected by HIPAA can be exchanged between covered entities in the coordination of patient care without additional consent Protected by DHS Office of Civil Rights, increased penalties in Stage 1 Confidentiality Confidentiality of Alcohol and Drug Abuse Patient Records Act (42 CFR Part 2)42 CFR Part 2 Identifies and operationalizes standards Patient information cannot be exchanged without patient consent Protected be federal law, otherwise, no penalties

Core Objective/Measure #15 More about this Objective

When Conducted CMS Guidance says “EPs must conduct or review a security risk analysis of certified EHR technology and implement updates as necessary at least once prior to the end of the EHR reporting period and attest to that conduct or review Stage 1, Year 1 “Acquire, Implement, Use” for 90 days – conduct during this 90 days To meet the grant requirement – prior to health information exchange

Starting Points – HIPAA and Meaningful Use “ Core Measure 15 - Protect Electronic Health Information” comprehensive ONC resource (National Learning Consortium) measures/protect-electronic-health-information Health Information Privacy and Security 10 Step Plan Nationwide Privacy and Security Framework ty_frame-work/1173 Workflow redesign templates professionals/workflow-redesign-templateshttp:// professionals/workflow-redesign-templates

Confidentiality Ensure HIPAA Privacy and Security Objective has been met Apply 42 CFR Part 2 only to patient information that emerges from a “treatment provider” (record should be flagged in EHR) To meet the Meaningful Use standard for the grant, apply strategy to PBHCI enrollees Majority of states cannot use state HIEs to exchange patient record that contains confidential information Almost all states are using Nationwide Health Information Network Direct as part of their statewide HIE plan

SAMHSA- Federal Initiatives Related to Data Sharing Office of the National Coordinator for Health Information Technology – Behavioral Health Roundtable report_0.pdf Center for Integrated Health Solutions (includes links to SAMHSA 42 CFR Part 2 FAQs) Starting Points – 42 CFR Part 2 and Meaningful Use

Summary Privacy, Security and Confidentiality mean different things, especially in Behavioral Health Meet the Objective 15 Measure sooner rather than later to ensure a baseline of quality in the exchange of patient information Privacy and Security allow the exchange of patient information for the coordination of care between HIPAA covered entities without additional consent – check state regulations and then policies and procedures to ensure this barrier to integration are not in place For the exchange of confidential patient health information use Nationwide Health Information Network (NwHIN) Direct NwHIN Direct can be used to meet all HIT-related grant requirements (see Module 8)

We Have Solutions for Integrating Primary and Behavioral Healthcare Contact CIHS for all types of primary and behavioral health care integration technical assistance and training needs 1701 K Street NW, Ste 400 Washington DC Web: Phone: Prepared and presented by Colleen O’Donnell, MSW, PMP, CHTS-IM for the Center for Integrated Health Solutions