PRIVACY BREACHES A “breach of the security of the system”: –Is the “unauthorized acquisition of computerized data that compromises the security, confidentiality,

Slides:



Advertisements
Similar presentations
HIPAA Privacy Practices. Notice A copy of the current DMH Notice must be posted at each service site where persons seeking DMH services will be able to.
Advertisements

Fair Credit Reporting Act You must be told if information in your file has been used against you You can find out what is in your file You can dispute.
HIPAA: An Overview of Transaction, Privacy and Security Regulations Training for Providers and Staff.
HITECH ACT Privacy & Security Requirements Cathleen Casagrande Privacy Officer July 23, 2009.
Health Insurance Portability and Accountability Act HIPAA Education for Volunteers and Students.
Confidentiality and HIPAA
The Health Insurance Portability and Accountability Act of 1996– charged the Department of Health and Human Services (DHHS) with creating health information.
HIPAA What’s New? What Is HIPAA Health Insurance Portability and Accountability Act of 1996 Health Insurance Portability and Accountability Act.
Changes to HIPAA (as they pertain to records management) Health Information Technology for Economic Clinical Health Act (HITECH) – federal regulation included.
Key Changes to HIPAA from the Stimulus Bill (ARRA) Children’s Health System Department Leadership Meeting October 28, 2009 Kathleen Street Privacy Officer/Risk.
June 04, 2013 Robin Thomas, NC III, Presenter. PRIVACY BREACHES A privacy breach is an unauthorized disclosure of PHI/PCI violating either Federal or.
HIPAA Regulations What do you need to know?.
HIPAA THE PRIVACY RULE Reviewed December HISTORY In 2000, many patients that were newly diagnosed with depression received free samples of anti-
I.D. Theft Alaska’s New Protection of Personal Information Act Ed Sniffen Senior Assistant Attorney General Alaska Department of Law.
Helping you protect your customers against fraud Division of Finance and Corporate Securities.
Health Insurance Portability & Accountability Act (HIPAA)
Presented by: Roberta Ward CDHS Privacy Officer Phone: (916)
Computers, Freedom and Privacy April 23, 2004 Identity Theft: Addressing the Problem in California Joanne McNabb, Chief CA Office of Privacy Protection.
RMG:Red Flags Rule 1 Regal Medical Group Red Flags Rule Identify Theft Training.
Walking Through the Breach Notification Process - Beginning to End HIPAA COW Presentation and Panel April 8, 2011.
Financial Data Protection and Consumer Notification of Data Security Breach Act of 2006 Sara Juster, JD Vice President/Corporate Compliance Officer Nebraska.
Data Classification & Privacy Inventory Workshop
HIPAA COMPLIANCE IN YOUR PRACTICE MARIBEL VALENTIN, ESQUIRE.
Columbia University Medical Center Health Insurance Portability and Accountability Act of 1996 (“HIPAA”) Privacy & Information Security Training 2009.
From HIPAA to HITECH OMH Briefing.
Milada R. Goturi Tonya M. Oliver Thompson Coburn LLP 1.
2015 ANNUAL TRAINING By: Denise Goff
Understanding the Fair and Accurate Credit Transaction Act, the “Red Flag” Regulations, and their impact on Health Care Providers Raising a “Red Flag”
Confidentiality, Consents and Disclosure Recent Legal Changes and Current Issues Presented by Pam Beach, Attorney at Law.
Enterprise data (decentralized control, data security and privacy) Incident Response: State and Federal Law Rodney Petersen Security Task Force Coordinator.
Dealing with Business Associates Business Associates Business Associates are persons or organizations that on behalf of a covered entity: –Perform any.
Quality Integrity Stewardship Courtesy Care Accountability Medical Records ARMA Florida Gulf Coast Chapter Michael Spake Lakeland Regional Medical Center.
LAW SEMINARS INTERNATIONAL CLOUD COMPUTING: LAW, RISKS AND OPPORTUNITIES Developing Effective Strategies for Compliance With the HITECH Act and HIPAA’s.
Privacy and Security Laws for Health Care Organizations Presented by Robert J. Scott Scott & Scott, LLP
Arkansas State Law Which Governs Sensitive Information…… Part 3B
IDENTITY THEFT. RHONDA L. ANDERSON, RHIA, PRESIDENT ANDERSON HEALTH INFORMATION SYSTEMS, INC.
Breach vs. Security Incident A security incident is an actual or suspected occurrence of: Damage, destruction, unauthorized access or disclosure of.
Available from BankersOnline.com/tools 1 FACT ACT RED FLAG GUIDELINES.
Health Insurance Portability and Accountability Act of 1996 HIPAA Privacy Training for County Employees.
HIPAA BASIC TRAINING Presented by Anderson Health Information Systems, Inc.
HIPAA THE PRIVACY RULE. 2 HISTORY In 2000, many patients that were newly diagnosed with depression received free samples of anti- depressant medications.
Configuring Electronic Health Records Privacy and Security in the US Lecture c This material (Comp11_Unit7c) was developed by Oregon Health & Science University.
HealthBridge is one of the nation’s largest and most successful health information exchange organizations. Tri-State REC: Privacy and Security Issues for.
Copyright ©2014 by Saunders, an imprint of Elsevier Inc. All rights reserved 1 Chapter 02 Compliance, Privacy, Fraud, and Abuse in Insurance Billing Insurance.
C HAPTER 34 Code Blue Health Sciences Edition 4. Confidentiality of sensitive information is an important issue in healthcare. Breaches of confidentiality.
HITECH and HIPAA Presented by Rhonda Anderson, RHIA Anderson Health Information Systems, Inc
A Road Map to Research at Jefferson: HIPAA Privacy and Security Rules for Researchers Presented By: Privacy Officer/Office of Legal Counsel October 2015.
Welcome….!!! CORPORATE COMPLIANCE PROGRAM Presented by The Office of Corporate Integrity 1.
HOW TO RESPOND TO A DATA BREACH: IT’S NOT JUST ABOUT HIPAA ANYMORE The Thirteenth National HIPAA Summit  September 26, 2006 Renee H. Martin, JD, RN, MSN.
We’ve Had A Breach – Now What? Garfunkel Wild, P.C. 411 Hackensack Avenue 6 th Floor Hackensack, New Jersey Broadway Albany,
Top 10 Series Changes to HIPAA Devon Bernard AOPA Reimbursement Services Coordinator.
Configuring Electronic Health Records Privacy and Security in the US Lecture b This material (Comp11_Unit7b) was developed by Oregon Health & Science University.
HIPAA: Breach Notification By: Office of University Counsel For: Jefferson IRB Continuing Education September 2014.
AND CE-Prof, Inc. January 28, 2011 The Greater Chicago Dental Academy 1 Copyright CE-Prof, Inc
HIPAA/HITECH TRAINING. Why are we here?  HIPAA  HITECH  PHI  Minimum Necessary “Need to Know”  Breaches and Fines.
 Health Insurance and Accountability Act Cornelius Villalon Jr.
HIPAA TRIVIA Do you know HIPAA?. HIPAA was created by?  The Affordable Care Act  Health Insurance companies  United States Congress  United States.
HIPAA Training. What information is considered PHI (Protected Health Information)  Dates- Birthdays, Dates of Admission and Discharge, Date of Death.
Data Breach ALICAP, the District Insurance Provider, is Now Offering Data Breach Coverage as Part of Our Blanket Coverage Package 1.
HIPAA Training Workshop #3 Individual Rights Kaye L. Rankin Rankin Healthcare Consultants, Inc.
PHI Breach PHI Breach Dealing Breach With HIPAA Guidelines Guidelines.
HIPAA THE PRIVACY RULE Reviewed December 2012.
Responding to a Data Breach 360° of IT Compliance
HIPPA/HITECH Act Requirements Under the Business Associate Agreement Between CNI and Military Health Services.
Alabama Data Breach Notification Act: What 911 Districts Need to Know
Disability Services Agencies Briefing On HIPAA
Data Breaches in Employee Benefits
HITECH’s Impact on Research
National HIPAA Audioconferences
Presentation transcript:

PRIVACY BREACHES

A “breach of the security of the system”: –Is the “unauthorized acquisition of computerized data that compromises the security, confidentiality, or integrity of personal information maintained by the person or business.” AND –Must be disclosed to any resident of the state whose unencrypted personal information was, or is reasonably believed to have been, acquired by an unauthorized person. What is a Breach?

The Department of Health Care Services (DHCS) investigates all alleged breaches reported by its employees, staff of its business associates, individual program beneficiaries or other persons and will work to resolve the issues raised in order to safeguard individuals' confidential information and improve the DHCS business systems and practices. The Privacy Officer determines the appropriate level of response to mitigate potential harm and corrective action necessary when the DHCS is made aware of a privacy breach. Privacy Investigations

Misdirected paper faxes with PHI/PCI outside of Department of Health Care Services (DHCS) Loss or theft of paper documents containing PHI/PCI Mailings to incorrect providers or beneficiaries Examples of Paper Breaches

Stolen, unencrypted laptops, hard drives, PCs with PHI/PCI Stolen, unencrypted thumb drives with PHI/PCI Stolen briefcases with unencrypted compact discs containing PHI/PCI Misdirected electronic fax with PHI/PCI to person outside of state government Examples of Electronic Breaches

LEGISLATIVE HISTORY Senate Bill 1386 (Peace; Chapter 915, Statutes of 2002) otherwise known as the California Security Breach Notification Act requires state agencies and other entities that maintain personal information in computerized form to notify residents of California in the event of an unauthorized acquisition of computerized data. California Anti-Identity Theft Law (Civil Code section )

LEGISLATIVE HISTORY (continued) California Adds Medical Identity Theft to the State Breach Notification Law Assembly Bill 1298 (Jones; Chapter 699, Statutes of 2007) expands California’s Security Breach Notification Act from a financial identity theft law to a medical identity law effective January 1, AB 1298 adds two new categories of breach triggering information: –Medical information: defined as the individual’s medical history, treatment or diagnosis; mental or physical health condition –Health information: health insurance policy or subscriber number, application and claims history, as well as appeals records California Anti-Identity Theft Law

California law requires the notice be made “in the most expedient time possible and without unreasonable delay.” Time may be allowed for needs of law enforcement, if the notification would impede a criminal investigation Timing

Office of Privacy Protection Notification Recommendations Notification letter: Advise individuals of steps they can take to protect themselves against possibility of identity theft. Recommend contacting the three credit reporting agencies: Equifax, Experian, and Trans Union. If find suspicious activity on credit reports, call your local police or sheriff and file an identity theft report. –Contact DMV (Fraud Hotline: ) to place fraud alert on your driver’s license. California Office of Privacy Protection Recommendations available at: Office of Privacy Protection Notification Requirements

CONSUMER PROTECTION

Free Credit Report One of the best ways to protect from identity theft is to monitor your credit history. The federal Fair Credit Reporting Act (FCRA) requires the nationwide credit reporting agencies to provide a free copy of their credit report upon request every 12 months. You may obtain your free copy of your credit report by: –Calling toll free at: –The three credit bureaus have set up one central website at: Note: beware of other sites that may offer “free” credit reports that may charge for other products. Free Credit Report

Fraud Alerts! Civil Code Section SB 168 (Bowen; Chapter 720; Statutes of 2001) established fraud alert to warn banks/potential creditors that person may be victim of Identity Theft. –Requires credit bureau fraud/security alert within 5 business days of consumer request at no cost to consumer. –Contact three credit reporting agencies: Equifax, Experian, and Trans Union at toll-free number available 24/7. –Fraud alert lasts 90 days with right to request a renewal. –Business must take reasonable steps to verify identity of consumer by contacting consumer before extending credit Fraud Alerts (Civil Code section )

Credit Freeze Civil Code Section Fraud alerts may be ignored by some creditors. To further guard against identity theft, California law allows consumers to place a security “freeze” so the credit file cannot be shared with potential creditors. –No cost with a police report filed for victim of identity theft, otherwise $10 for each credit bureau ($30). –Freeze may be lifted to obtain credit with a specific creditor while the freeze is in place. –Credit bureau must respond within three business days. –Credit freeze is in place until consumer requests that it be removed. –Freeze may be temporarily lifted by a consumer. Credit Freeze (Civil Code section )

American Recovery and Reinvestment Act of 2009 (AARA); H.R. 1; Public Law 111-5; Signed into law by President Obama on 2/17/09 Title XIII of AARA, under provisions of the HITECH ACT, Subtitle D: Privacy – Sec entitled, “Notification in the case of Breach” contains new privacy breach notification requirements for covered entities under HIPAA: –Requires notification within 60 days for a privacy breach involving HIPAA covered PHI. –Requires notification to the U.S. Department of Health & Human Services and media outlets for privacy breaches impacting 500 or more individuals. –Breaches of less than 500 must be logged and provided to HHS annually. –Authorizes state attorney generals to bring suit for HIPAA violations. Federal Stimulus Bill Includes New Mandatory Breach Notifications

Breach/Unauthorized Disclosures Contacts Privacy Officer Phone: (916) FAX: (916) Information Security Officer Phone: (916) or (800) Breach Contacts