HIPAA COMPLIANCE IN YOUR PRACTICE MARIBEL VALENTIN, ESQUIRE.

Slides:



Advertisements
Similar presentations
HIPAA: An Overview of Transaction, Privacy and Security Regulations Training for Providers and Staff.
Advertisements

Independent Contractor Orientation HIPAA What Is HIPAA? Health Insurance Portability and Accountability Act of 1996 The Health Insurance Portability.
HIPAA Basics Brian Fleetham Dickinson Wright PLLC.
HIPAA Basics November 1, 2014.
HIPAA Privacy Training. 2 HIPAA Background Health Insurance Portability and Accountability Act of 1996 Copyright 2010 MHM Resources LLC.
Health Insurance Portability and Accountability Act HIPAA Education for Volunteers and Students.
HIPAA. What Why Who How When What Is HIPAA? Health Insurance Portability & Accountability Act of 1996.
HIPAA Privacy Rule Training
National Health Information Privacy and Security Week Understanding the HIPAA Privacy and Security Rule.
Increasing public concern about loss of privacy Broad availability of information stored and exchanged in electronic format Concerns about genetic information.
HIPAA What’s New? What Is HIPAA Health Insurance Portability and Accountability Act of 1996 Health Insurance Portability and Accountability Act.
HIPAA PRIVACY REQUIREMENTS Dana L. Thrasher Constangy, Brooks & Smith, LLC (205) ; Victoria Nemerson.
Changes to HIPAA (as they pertain to records management) Health Information Technology for Economic Clinical Health Act (HITECH) – federal regulation included.
What is HIPAA? This presentation was created by The University of Arizona Privacy Office, The Office for the Responsible Conduct of Research on March 5,
Health Insurance Portability and Accountability Act (HIPAA)HIPAA.
Corporate Compliance Program STANDARDS OF CONDUCT HIPAA PRIVACY & SECURITY Temple University Health System Maribel Valentin, Esquire Associate Counsel.
1 HIPAA Education CCAC Professional Development Training September 2006 CCAC Professional Development Training September 2006.
Managing Access to Student Health Information per Federal HIPAA Guidelines Joan M. Kiel, Ph.D., CHPS Duquesne University Pittsburgh, Penna
HIPAA CHANGES: HITECH ACT AND BREACH NOTIFICATION RULES February 3, 2010 Kristen L. Gentry, Esq. Catherine M. Stowers, Esq.
NAU HIPAA Awareness Training
CHAPTER © 2011 The McGraw-Hill Companies, Inc. All rights reserved. 2 The Use of Health Information Technology in Physician Practices.
HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT OF 1996 (HIPAA)
HIPAA: FEDERAL REGULATIONS REGARDING PATIENT SECURITY.
Topics Rule Changes Skagit County, WA HIPAA Magic Bullet HIPAA Culture of Compliance Foundation to HIPAA Privacy and Security Compliance Security Officer.
HIPAA Regulations What do you need to know?.
HIPAA Privacy Rule Compliance Training for YSU April 9, 2014.
COMPLYING WITH HIPAA PRIVACY RULES Presented by: Larry Grudzien, Attorney at Law.
HIPAA THE PRIVACY RULE Reviewed December HISTORY In 2000, many patients that were newly diagnosed with depression received free samples of anti-
2014 HIPAA Refresher Omnibus Rule & HIPAA Security.
Jill Moore April 2013 HIPAA Update: New Rules, New Challenges.
HIPAA HIPAA Health Insurance Portability and Accountability Act of 1996.
Professional Nursing Services.  Privacy and Security Training explains:  The requirements of the federal HIPAA/HITEC regulations, state privacy laws.
© Copyright 2014 Saul Ewing LLP The Coalition for Academic Scientific Computation HIPAA Legal Framework and Breach Analysis Presented by: Bruce D. Armon,
The Use of Health Information Technology in Physician Practices
HIPAA PRIVACY AND SECURITY AWARENESS.
“ Technology Working For People” Intro to HIPAA and Small Practice Implementation.
HIPAA The Privacy Rule Health Insurance Portability and Accountability Act of 1996 (HIPAA) The 104 th Congress passed the Act, Public Law ,
Privacy and Security of Protected Health Information NorthPoint Health & Wellness Center 2011.
Copyright ©2011 by Pearson Education, Inc. Upper Saddle River, New Jersey All rights reserved. Health Information Technology and Management Richard.
HIPAA Michigan Cancer Registrars Association 2005 Annual Educational Conference Sandy Routhier.
Building a Privacy Foundation. Setting the Standard for Privacy Health Insurance Portability and Accountability Act (HIPAA) Patient Bill of Rights Federal.
LeToia Crozier, Esq., CHC Vice President, Compliance & Regulatory Affairs Corey Wilson Director of Technical Services & Security Officer Interactive Think.
Health Insurance Portability and Accountability Act (HIPAA) CCAC.
Copyright © 2009 by The McGraw-Hill Companies, Inc. All Rights Reserved. McGraw-Hill Chapter 6 The Privacy and Security of Electronic Health Information.
Health Insurance Portability and Accountability Act of 1996 HIPAA Privacy Training for County Employees.
© 2013 The McGraw-Hill Companies, Inc. All rights reserved. Ch 8 Privacy Law and HIPAA.
PricewaterhouseCoopers 1 Administrative Simplification: Privacy Audioconference April 14, 2003 William R. Braithwaite, MD, PhD “Doctor HIPAA” HIPAA Today.
HIPAA BASIC TRAINING Presented by Anderson Health Information Systems, Inc.
HIPAA BASIC TRAINING MODULE 1C – Overview (For staff who do not generally create Protected Health Information) Anderson Health Information Systems, Inc.
HIPAA THE PRIVACY RULE. 2 HISTORY In 2000, many patients that were newly diagnosed with depression received free samples of anti- depressant medications.
Copyright ©2014 by Saunders, an imprint of Elsevier Inc. All rights reserved 1 Chapter 02 Compliance, Privacy, Fraud, and Abuse in Insurance Billing Insurance.
C HAPTER 34 Code Blue Health Sciences Edition 4. Confidentiality of sensitive information is an important issue in healthcare. Breaches of confidentiality.
Welcome….!!! CORPORATE COMPLIANCE PROGRAM Presented by The Office of Corporate Integrity 1.
Top 10 Series Changes to HIPAA Devon Bernard AOPA Reimbursement Services Coordinator.
HIPAA Overview Why do we need a federal rule on privacy? Privacy is a fundamental right Privacy can be defined as the ability of the individual to determine.
AND CE-Prof, Inc. January 28, 2011 The Greater Chicago Dental Academy 1 Copyright CE-Prof, Inc
HIPAA TRIVIA Do you know HIPAA?. HIPAA was created by?  The Affordable Care Act  Health Insurance companies  United States Congress  United States.
The Medical College of Georgia HIPAA Privacy Rule Orientation.
Copyright © 2009 by The McGraw-Hill Companies, Inc. All Rights Reserved. McGraw-Hill/Irwin Chapter 6 The Privacy and Security of Electronic Health Information.
Public Health IT Privacy, Confidentiality and Security of Public Health Information This material (Comp13_Unit2) was developed Columbia University, funded.
HIPAA Privacy Rule Training
Health Insurance Portability and Accountability Act of 1996
UNDERSTANDING WHAT HIPAA IS AND IS NOT
Privacy & Information Security Basics
What is HIPAA? HIPAA stands for “Health Insurance Portability & Accountability Act” It was an Act of Congress passed into law in HEALTH INSURANCE.
HIPAA PRIVACY AWARENESS, COMPLIANCE and ENFORCEMENT
Disability Services Agencies Briefing On HIPAA
HIPAA SECURITY RULE Copyright © 2008, 2006, 2004 by Saunders an imprint of Elsevier Inc. All rights reserved.
The Health Insurance Portability and Accountability Act
Presentation transcript:

HIPAA COMPLIANCE IN YOUR PRACTICE MARIBEL VALENTIN, ESQUIRE

OBJECTIVES  To understand the legal requirements under The Health Insurance and Portability and Accountability Act (HIPAA) , The Health Information for Economic and Clinical Health Act (HITECH) and  State Law- Special protections.

DEFINITIONS  Health care provider means a provider of medical or health services, and any other person or organization who furnishes, bills, or is paid for health care in the normal course of business.  A business associate includes: a health information organization, e-prescribing gateway, or other person that provides data transmission services with respect to PHI to a covered entity and that requires access on a routine basis to such PHI; and a person that offers a personal health record (PHR) to one or more individuals on behalf of a covered entity.

DEFINITIONS cont.  The Standards or Code of Conduct establish the practices and ethical rules through which an entity implements a culture of compliance and integrity in the handling of Protected Health Information (PHI).  Covered entity means: (1) A health plan. (2) A health care clearinghouse. (3) A health care provider who transmits any health information in electronic form.

THE HEALTH INSURANCE AND ACCOUNTABILITY ACT (HIPAA)  Federal requirement o Privacy- effective since April 14, 2003 o Security- effective on April 21, 2005 o HITECH- effective on February 11, 2010  Breach Notification Requirements o Requires healthcare organizations to maintain the privacy and security of Protected Health Information (PHI)

HIPAA vs. State Law  When state law is more restrictive than the federal HIPAA Regulations, then state law prevails.  Requires patient authorization prior to release  State law additional requirements may vary from state to state

UNDERSTANDING PHI  PHI is any and all information about a patient’s health that identifies the patient, or information that could identify the patient. As a rule of thumb, any patient information that you see, hear or say must be kept confidential.  PHI is information that can individually identify a patient. PHI can include:  Any type of information found in medical and billing records, for example:  Diagnoses, Test Results, Progress Notes, etc.  Name, Address, Phone, Social Security Number, Photographs,

HIPAA PATIENT PRIVACY RIGHTS  Right to Notice  Right to Amend  Right to Access  Right to an Accounting of Disclosures  Right to Request Restrictions  Right to Request Confidential Communications  Right to Notification of a Security Breach  Right to File a Complaint

HIPAA DISCLOSURES  How much PHI can we share?  All disclosures are subject to a determination that PHI disclosed is the MINIMUM NECESSARY for the lawful purpose.  What is Minimum Necessary?

HIPAA allows the use of PHI for these purposes:  Payment Insurance companies  Treatment Physicians Providers Nursing and ancillary staff  Operations Risk Management Quality Improvement Peer Review

Preventing Unauthorized Disclosures  Discuss patient information in public areas  Position computer screens or leave the computer unattended so that unauthorized persons may view the private data  Leave medical records unattended  Remove records containing PHI from the facility  Disseminate reports containing PHI via unsecured methods  Use FAX preprogramed settings or redial before confirming the number

The Security Rule  Ensure the confidentiality, integrity and availability of all electronic Protected Health Information (ePHI)  Confidentiality: that patient information is not made available or disclosed without proper authorization  Integrity: that patient information has not been altered or destroyed  Availability: that patient information is accessible and usable upon demand by an authorized person

Security Safeguards  Administrative - Developing information security programs designed to protect ePHI and to also manage the conduct of the workforce in the relation to the use of the protected information.  Physical - Ensuring the physical protection of information systems including the protection of related buildings and equipment from natural and environmental hazards and unauthorized intrusion.  Technical - Identifying technology to be utilized and ensuring procedures are in place to protect ePHI and to control access to it.

The Health Information Technology for Economic and Clinical Health Act (HITECH)  HITECH amends HIPAA to create new enforcement provisions and expanded civil and criminal penalties ranging from $100 to $50,000 per violation, and calendar year penalty caps ranging from $25,000 to $1.5 million.  Any unauthorized disclosure is a breach unless the Covered Entity can show by objective proof that there is a low probability that the information was compromised.  Anyone that has regular access to PHI to perform a function on behalf of a Covered Entity is a Business Associate.

Monitoring and Enforcement  The Compliance Program  A compliance program is designed to develop and ensure effective internal controls that promote best practices and adherence to all applicable Federal and State legal or regulatory requirements, including HIPAA Privacy and Security compliance

Elements of a Compliance Program  Standards of Code of Conduct  Designation of a Privacy Officer  Access to a Compliance Hotline  Policies and Procedures (Administrative Safeguards)  Education (training)  Monitoring (oversight)  Enforcement (cons)

Reporting  HIPAA violations should be reported to the Privacy Officer for investigation.  Every covered entity must identify a Privacy Officer

Investigations  If the infraction is confirmed as a security breach then the following must occur:  The patient is notified  The Department of Health and Human Services is notified  An action plan is developed to mitigate harm  Policies are enforced

Enforcement  Enforcement activities should be consistent regardless of who is the person involved in the infraction.  Same facts – Same outcome

Who is a Business Associate?  Any individual or entity that creates maintains or transmits PHI on a regular basis when performing a function on behalf of the covered entity is a business associate.  Another covered entity may be a Business Associate

Conduits  If the information is delivered by courier, the courier is not a business associate because they are not accessing the information; they are acting as a mechanism to transfer data or a “conduit”.

Agents  A Covered Entity may be liable for the acts of an agent.  Independent contractors may be agents If the covered entity has control over the contractor’s activities.

What is a Breach?  A breach is an unauthorized disclosure where the information released is usable, readable and decipherable. This includes data in motion and data at rest.

Breach Notification Procedures  The presumption of a breach may only be rebutted if the covered entity can show through objective evidence that the disclosure posed a low probability that the PHI was compromised.  If you determine that a breach has occurred you must notify, correct the problem, enforce your policies and procedures and make the appropriate notifications.  If the breach involves from patients – notify the patient within 60 days and HHS at the end of the calendar year.  If the breach involves 500 or more patients – notify the patient, HHS and the media within 60 days.

Government Enforcement  The Office of Civil Rights (OCR) is charged with the enforcement of the Privacy, Security and HITECH regulations, including investigations of whether a security breach has occurred.  OCR will also conduct random audits of compliance with the Privacy and Security Rules

Penalties  1ST Tier- Did not know -would not have known  at least $100/violation, not to exceed $25,000 per year  2nd Tier- Reasonable cause (not willful neglect)  at least $1,000/violation, not to exceed $100,000 per year  3rd Tier- Willful neglect – corrected within 30 days  at least $10,000/violation, not to exceed $250,000 per year  4th Tier- Willful neglect- not corrected within 30 days  $50,000/violation, not to exceed $1.5 million per year

Questions ?