Health information security & compliance

Slides:



Advertisements
Similar presentations
Todd Frech Ocius Medical Informatics 6650 Rivers Ave, Suite 137 North Charleston, SC Health Insurance Portability.
Advertisements

Independent Contractor Orientation HIPAA What Is HIPAA? Health Insurance Portability and Accountability Act of 1996 The Health Insurance Portability.
HIPAA Basics Brian Fleetham Dickinson Wright PLLC.
HIPAA Privacy Training. 2 HIPAA Background Health Insurance Portability and Accountability Act of 1996 Copyright 2010 MHM Resources LLC.
HIPAA. What Why Who How When What Is HIPAA? Health Insurance Portability & Accountability Act of 1996.
The Health Insurance Portability and Accountability Act Basic HIPAA Training For CMU workforce with access to PHI.
HIPAA – Privacy Rule and Research USCRF Research Educational Series March 19, 2003.
Increasing public concern about loss of privacy Broad availability of information stored and exchanged in electronic format Concerns about genetic information.
Information Risk Management Key Component for HIPAA Security Compliance Ann Geyer Tunitas Group
HIPAA Health Insurance Portability and Accountability Act.
Health Insurance Portability and Accountability Act (HIPAA)HIPAA.
1 HIPAA Education CCAC Professional Development Training September 2006 CCAC Professional Development Training September 2006.
NAU HIPAA Awareness Training
HIPAA Security Regulations Jean C. Hemphill Ballard Spahr Andrews & Ingersoll, LLP November 30, 2004.
HIPAA Regulations What do you need to know?.
 The Health Insurance Portability and Accountability Act of  Federal Law designed to protect sensitive information.  HIPAA violations are enforced.
Jill Moore April 2013 HIPAA Update: New Rules, New Challenges.
Hot Topics Legal Update Jill D. Moore, JD, MPH University of North Carolina School of Government September 2014.
Professional Nursing Services.  Privacy and Security Training explains:  The requirements of the federal HIPAA/HITEC regulations, state privacy laws.
Privacy, Security and Compliance Concerns for Management and Boards November 15, 2013 Carolyn Heyman-Layne, Esq. 1.
Protecting Client Data HIPAA, HITECH and PIPA Part 1A
1 HIPAA Privacy & Security Overview Know HIPAA Presents.
© Copyright 2014 Saul Ewing LLP The Coalition for Academic Scientific Computation HIPAA Legal Framework and Breach Analysis Presented by: Bruce D. Armon,
HIPAA COMPLIANCE IN YOUR PRACTICE MARIBEL VALENTIN, ESQUIRE.
HIPAA Health Insurance Portability & Accountability Act of 1996.
Health Insurance Portability and Accountability Act (HIPAA)
East Carolina University HIPAA Privacy
Protected Health Information (PHI). Privileged Communication An exchange of information between two individuals in a confidential relationship. (Examples:
From HIPAA to HITECH OMH Briefing.
Paula Peyrani, MD Medical/Project Director, HIV Program at the 550 Clinic Assistant Director, Research Design and Development Clinical and Translational.
HIPAA PRIVACY AND SECURITY AWARENESS.
“ Technology Working For People” Intro to HIPAA and Small Practice Implementation.
1 Research & Accounting for Disclosures March 12, 2008 Leslie J. Pfeffer, BS, CHP Office of the Vice President for Research Administration Office of Compliance.
1 HIPAA OVERVIEW ETSU. 2 What is HIPAA? Health Insurance Portability and Accountability Act.
Privacy and Security Laws for Health Care Organizations Presented by Robert J. Scott Scott & Scott, LLP
Copyright ©2011 by Pearson Education, Inc. Upper Saddle River, New Jersey All rights reserved. Health Information Technology and Management Richard.
HIPAA Training Developed for Ridgeview Institute 2012 Hospital Wide Orientation.
HIPAA Michigan Cancer Registrars Association 2005 Annual Educational Conference Sandy Routhier.
Medical Law and Ethics, Third Edition Bonnie F. Fremgen Copyright ©2009 by Pearson Education, Inc. Upper Saddle River, New Jersey All rights reserved.
LeToia Crozier, Esq., CHC Vice President, Compliance & Regulatory Affairs Corey Wilson Director of Technical Services & Security Officer Interactive Think.
Health Insurance Portability and Accountability Act of 1996 HIPAA Privacy Training for County Employees.
Understanding HIPAA (Health Insurandce Portability and Accountability Act)
Eliza de Guzman HTM 520 Health Information Exchange.
HIPAA BASIC TRAINING Presented by Anderson Health Information Systems, Inc.
HIPAA THE PRIVACY RULE. 2 HISTORY In 2000, many patients that were newly diagnosed with depression received free samples of anti- depressant medications.
Working with HIT Systems
Copyright ©2014 by Saunders, an imprint of Elsevier Inc. All rights reserved 1 Chapter 02 Compliance, Privacy, Fraud, and Abuse in Insurance Billing Insurance.
Component 8/Unit 6aHealth IT Workforce Curriculum Version 1.0 Fall Installation and Maintenance of Health IT Systems Unit 6a System Security Procedures.
Configuring Electronic Health Records Privacy and Security in the US Lecture b This material (Comp11_Unit7b) was developed by Oregon Health & Science University.
HIPAA: Breach Notification By: Office of University Counsel For: Jefferson IRB Continuing Education September 2014.
HIPAA HEALTH INSURANCE PORTABILITY ACOUNTABILITY ACT.
HIPAA TRIVIA Do you know HIPAA?. HIPAA was created by?  The Affordable Care Act  Health Insurance companies  United States Congress  United States.
Final HIPAA Privacy Rule: The Research Provisions Julie Kaneshiro DHHS Office for Human Research Protections Phone: Fax:
The Health Insurance Portability and Accountability Act (HIPAA) requires Plumas County to train all employees in covered departments about the County’s.
Privacy: HIPAA Emerson Murphy-Hill. Rosie Callender, RHIA, web.msm.edu/hipaa/An%20Introduction%20to%20HIPAA.ppt What is HIPAA? A Federal Law Created in.
HIPAA: So You Think You’re Compliant September 1, 2011 Carolyn Heyman-Layne, J.D.
Installation and Maintenance of Health IT Systems System Security Procedures and Standards Lecture a This material Comp8_Unit6a was developed by Duke University,
Developed for Ridgeview Institute 2015 Hospital Wide Orientation
ELECTRONIC HEALTH RECORD PRIVACY TRAINING
HIPAA PRIVACY & SECURITY TRAINING
2015 Orientation to HIPAA Privacy Rule Compliance
HIPAA PRIVACY AWARENESS, COMPLIANCE and ENFORCEMENT
Disability Services Agencies Briefing On HIPAA
HIPAA Privacy and Security Summit 2018 HIPAA Privacy Rule: Compliance Plans, Training, Internal Audits and Patient Rights Widener University Delaware.
The Health Insurance Portability and Accountability Act
Mayo Clinic Privacy Office
HIPAA & PHI TRAINING & AWARENESS
The Health Insurance Portability and Accountability Act
The Health Insurance Portability and Accountability Act
Presentation transcript:

Health information security & compliance Charles Nwasor, Xcellent Technologies

The New Healthcare Paradigm Agenda HIPAA 1 2 The New Healthcare Paradigm Internal Compliance 3 Conclusion 4

HIPAA 1

HIPAA – Overview Sets standards to assure the Confidentiality, Integrity, and Availability of PHI Health Insurance Portability & Accountability Act (HIPAA) Privacy – individuals’ rights of privacy and standards Security – security of ePHI Breach Notification – reporting breach information Limits the use and disclosure of confidential information: Protected Health Information (PHI) Electronic Protected Health Information (ePHI)

HIPAA – PHI PHI and Personally Identifiable Information Any information (verbal, electronic, or written) that relates to a person’s physical or mental health or payment information Name Postal Address All elements of Date Telephone Number Fax Number Email Address URL IP Address Social Security Number Account Numbers License Number Medical Record Number Health Plan Number Device Identifier Vehicle Identifier Biometric Identifier Full-face Photos Any other unique identifying number Genetic information

HIPAA – CIA Triad Confidentiality – keeping information from unauthorized access Integrity – safeguarding against unauthorized modification Availability – assuring the constant availability of information

HIPAA – Privacy Rule Establishes rights of privacy and standards for disclosure Permitted Disclosures Personal Representatives Treatment, Payment and Healthcare Operations Written Authorization/Verbal Consent De-identified Data Required Disclosures Public Health Activities Law Enforcement Verification Requirements Notice of Privacy Practices

HIPAA – Security Rule Requires control measures to safeguard the confidentiality, integrity and availability of electronic Protected Health Information (ePHI) Organizational Requirements – Business Associate Agreements (BAAs) Security Standards Administrative Physical Technical Security Management Process Information Access Management Security Awareness and Training

HIPAA – Breach Notification Rule Requires notifications to authorities and/or patients when unsecured PHI has been breached Defines Breach as the inappropriate use or disclosure that compromises the security and privacy of PHI Exceptions Unintentional Acquisition by a workforce member Inadvertent Disclosure between workforce members Recipient can not reasonably retain the information Unsecured PHI – is PHI that has not been rendered unreadable or indecipherable to unauthorized persons

The New Healthcare Paradigm 2 The New Healthcare Paradigm

The New Healthcare Paradigm

Internal Compliance 3

Internal Compliance Framework Assess Risk Security Risk Assessment Plan Corrective Action Prioritize Controls Create & Implement Control Measures Remediate

Internal Compliance Framework Information Security Policy & Technical Controls Acceptable Use Access controls & Physical Security Secure Software & Malicious Code Security Incident Management Sanctions Breach Notification Workforce Security Security Awareness and Training Proper Conduct and Authorized Disclosures

Internal Compliance Framework

Impacts of Non-Compliance Regulatory Fines Lawsuits and Liability Loss of Business Professional Sanctions

Current Examples Hospice of North Idaho - $50,000 Massachusetts Eye and Ear Associates Inc. - $1.5 Million River Falls Medical Clinic – 2,400 Patient Records stolen Shands Jacksonville Clinic – 261 Patient Records photographed Goldthwait Associates, a Billing Service Provider - $140,000 Phoenix Cardiac Surgery, P.C. - $100,000

Conclusion 4

Assuring the Privacy and Security of Patients’ Information is a vital component of providing healthcare.

Questions ----- Meeting Notes (12/21/12 13:43) ----- Review the system (Technical, Business, Implementation and Training Review Contract Pressed the company on Modernizing Medicine EMA Investigate the 4 Products

Xcellent Technologies 43155 Main Street Suite 2210-D Novi, MI 48375 (248) 956.0538 info@xcellenttechnologies.com http://www.xcellenttechnologies.com