The EHR: Benefits for Privacy and Security How the EHR Protects Health Information.

Slides:



Advertisements
Similar presentations
HIPAA Security Presentation to The American Hospital Association Dianne Faup Office of HIPAA Standards November 5, 2003.
Advertisements

INADEQUATE SECURITY POLICIES Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA standards.
Information Security Is for Everyone By Jill Burrington-Brown, MS, RHIA.
HIPAA Security Standards Emmanuelle Mirsakov USC School of Pharmacy.
David Assee BBA, MCSE Florida International University
Presented by Elena Chan, UCSF Pharm.D. Candidate Tiffany Jew, USC Pharm.D. Candidate March 14, 2007 P HARMACEUTICAL C ONSULTANTS, I NC. P RO P HARMA HIPAA.
Chapter 10. Understand the importance of establishing a health care organization-wide security program. Identify significant threats—internal, external,
National Health Information Privacy and Security Week Understanding the HIPAA Privacy and Security Rule.
HIPAA Security NWOAHU Presented by Barb Gerken 11/12/2013.
HIPAA Security Training 2005
HIPAA, Computer Security, and Domino/Notes Chuck Connell,
Health Insurance Portability and Accountability Act (HIPAA)HIPAA.
Bringing HIPAA to Hospital Systems HIPAA impact on hospital systems viaMD solution for HIPAA compliance W e b e n a b l i n g Pa t i e n t A d m i t t.
HIPAA: FEDERAL REGULATIONS REGARDING PATIENT SECURITY.
Privacy, Security and Compliance Concerns for Management and Boards November 15, 2013 Carolyn Heyman-Layne, Esq. 1.
Privacy, Security, Confidentiality, and Legal Issues
Probabilistic Risk Analysis Farrokh Alemi, Ph.D. April 12, 2004.
Security Controls – What Works
Information Security Policies and Standards
Privacy, Confidentiality, and Security M8120 Fall 2001.
Computer Security: Principles and Practice
Session 3 – Information Security Policies
ELECTRONIC MEDICAL RECORDS By Group 5 members: Kinal Patel David A. Ronca Tolulope Oke.
CAMP Med Mapping HIPAA to the Middleware Layer Sandra Senti Biological Sciences Division University of Chicago C opyright Sandra Senti,
 Review the security rule as it pertains to ›Physical Safeguards ♦ How to protect the ePHI in the work environment ♦ Implementation ideas for your office.
Information Security Technological Security Implementation and Privacy Protection.
Ch15QQ 1. Hardware theft includes the theft of portable computers as well as desktop computers. 2. A surge suppressor can be used to protect a computer.
HIPAA PRIVACY AND SECURITY AWARENESS.
“ Technology Working For People” Intro to HIPAA and Small Practice Implementation.
Copyright ©2011 by Pearson Education, Inc. Upper Saddle River, New Jersey All rights reserved. Health Information Technology and Management Richard.
Health Insurance Portability and Accountability Act of 1996 (HIPAA) Proposed Rule: Security and Electronic Signature Standards.
How Hospitals Protect Your Health Information. Your Health Information Privacy Rights You can ask to see or get a copy of your medical record and other.
Security Architecture
Security Mark A. Magumba. Definitions Security implies the minimization of threats and vulnerabilities A security threat is a harmful event or object.
Sample Security Model. Security Model Secure: Identity management & Authentication Filtering and Stateful Inspection Encryption and VPN’s Monitor: Intrusion.
April 14, A Watershed Date in HIPAA Privacy Compliance: Where Should You Be in HIPAA Security Compliance and How to Get There… John Parmigiani National.
Lesson 5-Legal Issues in Information Security. Overview U.S. criminal law. State laws. Laws of other countries. Issues with prosecution. Civil issues.
CAN I GET IN TROUBLE USING A... COMPUTER? Or do computers solve all of life’s problems?
Eliza de Guzman HTM 520 Health Information Exchange.
Why Respect Privacy and Confidentiality? Access to Confidential Information (OP ) Protection and Security of Protected Health Information (OP.
Ali Pabrai, CISSP, CSCS ecfirst, chairman & ceo Preparing for a HIPAA Security Audit.
Design of Health Technologies lecture 22 John Canny 11/28/05.
Working with Health IT Systems Protecting Privacy, Security, and Confidentiality in HIT Systems Lecture b This material (Comp7_Unit7b) was developed by.
The Culture of Healthcare Privacy, Confidentiality, and Security Lecture d This material (Comp2_Unit9d) was developed by Oregon Health and Science University,
Database Security and Auditing: Protecting Data Integrity and Accessibility Chapter 1 Security Architecture.
Working with HIT Systems
Component 8/Unit 6aHealth IT Workforce Curriculum Version 1.0 Fall Installation and Maintenance of Health IT Systems Unit 6a System Security Procedures.
Last Minute Security Compliance - Tips for Those Just Starting 10 th National HIPAA Summit April 7, 2005 Chris Apgar, CISSP – President Apgar &
The IT Vendor: HIPAA Security Savior for Smaller Health Plans?
Database Security and Auditing: Protecting Data Integrity and Accessibility Chapter 1 Security Architecture.
Copyright © 2015 by Saunders, an imprint of Elsevier Inc. All rights reserved. Chapter 3 Privacy, Confidentiality, and Security.
Security and Ethics Safeguards and Codes of Conduct.
Working with HIT Systems Unit 7a Protecting Privacy, Security, and Confidentiality in HIT Systems This material was developed by Johns Hopkins University,
The Health Insurance Portability and Accountability Act (HIPAA) requires Plumas County to train all employees in covered departments about the County’s.
Monsour Roi M. Monzon, RN.  What is Electronic Health Record?  Electronic Medical Record (EMR) vs Electronic Health Record (EHR)  Comparison with Paper-based.
Public Health IT Privacy, Confidentiality and Security of Public Health Information This material (Comp13_Unit2) was developed Columbia University, funded.
Installation and Maintenance of Health IT Systems System Security Procedures and Standards Lecture a This material Comp8_Unit6a was developed by Duke University,
© 2016 Health Information Management Technology: An Applied Approach Chapter 10 Data Security.
Junli M. Awit, RN.  Enacted by President Bill Clinton in 1996  Title I of HIPAA protects health insurance coverage for workers and their families when.
The Health Insurance Portability and Accountability Act 
Privacy, Confidentiality, and Security
iSecurity Compliance with HIPAA
Understanding HIPAA Dr. Jennifer Lu.
HIPAA.
Final HIPAA Security Rule
County HIPAA Review All Rights Reserved 2002.
Thursday, June 5 10: :45 AM Session 1.01 Tom Walsh, CISSP
HIPAA Security Standards Final Rule
HIPAA SECURITY RULE Copyright © 2008, 2006, 2004 by Saunders an imprint of Elsevier Inc. All rights reserved.
Move this to online module slides 11-56
Presentation transcript:

The EHR: Benefits for Privacy and Security How the EHR Protects Health Information

National Initiative “By computerizing health records, we can avoid dangerous medical mistakes, reduce costs and improve care.” George W. Bush, State of the Union Address January 20, 2004

What Else Can the EHR Offer? Computerizing health records will also enhance the privacy and security of protected health information (PHI).

How Can the EHR Enhance Privacy and Security? It can: Control Physical and System Access Monitor Workstation Use and Security Audit access and need-to-know Enhance Device and Media Controls Employ Transmission Security

Administrative Controls Policies and procedures Employee training –Privacy training –Security training Background checks

Managing Physical Access Systems are physically inaccessible to unauthorized users A Security Plan addresses safeguards against tampering and theft Contingencies in place to recover or restore lost data in case of a disaster or emergency

Managing Technical/System Access Identification and authentication Access control lists Automatic log-off

Workstation Use and Security Some job functions might only be available at certain workstations –Volunteer might see only census information –Some printing functions available only in certain areas or workstations Physical attributes of workstation –Privacy filters –Screen unable to be viewed by casual observer

Monitoring and Audit Controls Intrusion detection Audit users for authorized use of PHI Apply sanctions for failure to comply with policies and procedures

Device and Media Controls Must address disposal of information and hardware If hardware is reused, information must be removed Hardware must be tracked as it is reused Data must be backed up for retrieval prior to hardware being moved

Transmission Security Encryption The transformation of plain text into an unreadable cipher text

Conclusion The EHR will soon be reality… We will have better privacy and security protections. Our information will be available when we need it.

Your HIM Professionals Are a Valuable Resource! Working together we can realize all the benefits of EHR!