Security and Confidentiality Practices - Houston Dept. of Health and Human Services Jerald Harms, MPH, CART and Jeff Meyer, MD, MPH HIV/AIDS Surveillance.

Slides:



Advertisements
Similar presentations
Tips to a Successful Monitoring Visit
Advertisements

HIPAA Security.
CONFIDENTIALITY / PRIVACY. Federal Laws Privacy Act of 1974 PII (Personally Identifiable Information)….Protection of social security numbers……….
HIPAA: An Overview of Transaction, Privacy and Security Regulations Training for Providers and Staff.
Copyright © 2012, Big I Advantage®, Inc., and Swiss Re Corporate Solutions. All rights reserved. (Ed. 08/12 -1) E&O RISK MANAGEMENT: MEETING THE CHALLENGE.
HIPAA Privacy Training. 2 HIPAA Background Health Insurance Portability and Accountability Act of 1996 Copyright 2010 MHM Resources LLC.
HIPAA Basic Training for Privacy & Information Security Vanderbilt University Medical Center VUMC HIPAA Website:
National Health Information Privacy and Security Week Understanding the HIPAA Privacy and Security Rule.
Increasing public concern about loss of privacy Broad availability of information stored and exchanged in electronic format Concerns about genetic information.
The Health Insurance Portability and Accountability Act of 1996– charged the Department of Health and Human Services (DHHS) with creating health information.
 Privacy Act of 1974 PII (Personally Identifiable Information)….Protection of social security numbers……….
What is HIPAA? This presentation was created by The University of Arizona Privacy Office, The Office for the Responsible Conduct of Research on March 5,
HIPAA THE PRIVACY RULE Reviewed December HISTORY In 2000, many patients that were newly diagnosed with depression received free samples of anti-
Randy Benson RHQN Executive Director May, Compliance Issues During Survey Compliance Officers monitor healthcare facilities (hospitals and clinics)
Professional Nursing Services.  Privacy and Security Training explains:  The requirements of the federal HIPAA/HITEC regulations, state privacy laws.
Health Insurance Portability Accountability Act of 1996 HIPAA for Researchers: IRB Related Issues HSC USC IRB.
Complying with Privacy to Enable Innovation & Research
DATA SECURITY Social Security Numbers, Credit Card Numbers, Bank Account Numbers, Personal Health Information, Student and/or Staff Personal Information,
1 Enterprise Security Your Information Security and Privacy Responsibilities © 2008 Providence Health & Services This information may be replicated for.
HIPAA What’s Said Here – Stays Here…. WHAT IS HIPAA  Health Insurance Portability and Accountability Act  Purpose is to protect clients (patients)
HIPAA COMPLIANCE IN YOUR PRACTICE MARIBEL VALENTIN, ESQUIRE.
1 HIPAA Security Overview Centers for Medicare & Medicaid Services (CMS)
Columbia University Medical Center Health Insurance Portability and Accountability Act of 1996 (“HIPAA”) Privacy & Information Security Training 2009.
Introduction to the Data Security and Confidentiality Guidelines for HIV, Viral Hepatitis, Sexually Transmitted Disease, and Tuberculosis Programs CSTE.
Paula Peyrani, MD Medical/Project Director, HIV Program at the 550 Clinic Assistant Director, Research Design and Development Clinical and Translational.
HIPAA PRIVACY AND SECURITY AWARENESS.
“ Technology Working For People” Intro to HIPAA and Small Practice Implementation.
Privacy and Security of Protected Health Information NorthPoint Health & Wellness Center 2011.
Best Practices for Protecting Data. Section Overview Mobile Computing Devices Technical Procedures Data Access and Permissions Verbal Communication Paper.
Health Insurance Portability and Accountability Act (HIPAA)
Confidentiality and Security Issues in ART & MTCT Clinical Monitoring Systems Meade Morgan and Xen Santas Informatics Team Surveillance and Infrastructure.
Health Insurance Portability and Accountability Act of 1996 (HIPAA) Proposed Rule: Security and Electronic Signature Standards.
How Hospitals Protect Your Health Information. Your Health Information Privacy Rights You can ask to see or get a copy of your medical record and other.
Privacy and Information Management ICT Guidelines.
HIPAA (health insurance portability and accountability act)
PRIVACY, SECURITY & ID THEFT PREVENTION - TIPS FOR THE VIGILANT BUSINESS - SMALL BUSINESS & ECONOMIC DEVELOPMENT FORUM October 21, WITH THANKS TO.
Medical Law and Ethics, Third Edition Bonnie F. Fremgen Copyright ©2009 by Pearson Education, Inc. Upper Saddle River, New Jersey All rights reserved.
LeToia Crozier, Esq., CHC Vice President, Compliance & Regulatory Affairs Corey Wilson Director of Technical Services & Security Officer Interactive Think.
Understanding HIPAA (Health Insurandce Portability and Accountability Act)
© 2013 The McGraw-Hill Companies, Inc. All rights reserved. Ch 8 Privacy Law and HIPAA.
Ali Pabrai, CISSP, CSCS ecfirst, chairman & ceo Preparing for a HIPAA Security Audit.
HIPAA BASIC TRAINING Presented by Anderson Health Information Systems, Inc.
1 Craig D. Azoff, Director Administrative Information Systems Bill Luecken, Senior Director Information Systems Eric Steinhardt, Security Manager 13 th.
HIPAA THE PRIVACY RULE. 2 HISTORY In 2000, many patients that were newly diagnosed with depression received free samples of anti- depressant medications.
A Road Map to Research at Jefferson: HIPAA Privacy and Security Rules for Researchers Presented By: Privacy Officer/Office of Legal Counsel October 2015.
Organizing a Privacy Program: Administrative Infrastructure and Reporting Relationships Presented by: Samuel P. Jenkins, Director Defense Privacy Office.
QIP Education Session INFORMATION SECURITY Joseph Zurba Information Security & IT Compliance Officer Harvard Medical School February 16, 2015.
Board of Directors – March 24, 2016 Denise Mannon, AHFI, CHPC Corporate Compliance Officer.
HIPAA Training. What information is considered PHI (Protected Health Information)  Dates- Birthdays, Dates of Admission and Discharge, Date of Death.
The Medical College of Georgia HIPAA Privacy Rule Orientation.
The Health Insurance Portability and Accountability Act (HIPAA) requires Plumas County to train all employees in covered departments about the County’s.
Properly Safeguarding Personally Identifiable Information (PII) Ticket Program Manager (TPM) Social Security’s Ticket to Work Program.
HIPAA PRIVACY & SECURITY TRAINING
HIPAA THE PRIVACY RULE Reviewed December 2012.
East Carolina University
HIPAA Privacy & Security
What is HIPAA? HIPAA stands for “Health Insurance Portability & Accountability Act” It was an Act of Congress passed into law in HEALTH INSURANCE.
Privacy & Confidentiality
Move this to online module slides 11-56
Red Flags Rule An Introduction County College of Morris
HIPAA PRIVACY AWARENESS, COMPLIANCE and ENFORCEMENT
Disability Services Agencies Briefing On HIPAA
Security and Confidentiality Guidelines for HIV/AIDS Surveillance
HIPAA Overview.
Lesson 1: Introduction to HIPAA
Move this to online module slides 11-56
Introduction to the PACS Security
TRACE INITIATIVE: Confidentiality, Data Security, and Procedures for Protocol Violation or Adverse Event.
Presentation transcript:

Security and Confidentiality Practices - Houston Dept. of Health and Human Services Jerald Harms, MPH, CART and Jeff Meyer, MD, MPH HIV/AIDS Surveillance Houston Dept. of Health and Human Services November 1, 2006 The findings and conclusions in this presentation are those of the authors and do not necessarily represent the views of the Centers for Disease Control and Prevention.

Security and Confidentiality  A major concern of HIV/AIDS surveillance staff at HDHHS, DSHS, and CDC.  Our purpose is to have secure and confidential collection, storage, usage, and transmission of sensitive HIV/AIDS case information.

What has to be Reported to the Health Dept?  HIV diagnostic tests  AIDS diagnostic tests and opportunistic infections/malignancies  Patient name, address, sex, race, disease onset, probable source of infection, other requested related information, and treatment/services referrals

Who has to Report to the Health Dept?  Physicians, dentists  Chief administrative officers of a hospital, medical facility, penal institution  Persons in charge of a blood bank, mobile clinic, clinical laboratory  Medical directors of testing and counseling sites, community-based organizations  Class B misdemeanor for failure to report

What comes into the Health Dept?  Electronic lab reports  Hard copies of lab reports, physician/clinic reports, death certificates, HIV medication reports, HIV reports from other surveillance programs – by mail, faxes highly discouraged, no allowed  Telephone reports from physicians

What goes out of the Health Dept?  De-identified aggregate reports  Raw data to DSHS via secure data network using encrypted files. Copies of reports sent by mail to DSHS.  DSHS transfers de-identified data to the CDC

What stays in the Health Dept?  Paper copies in locked cabinets in locked file room with no windows on 4 th floor of a limited access building. Physical access limited to HIV/AIDS Surveillance personnel.  Server in a locked room with no windows on 4 th floor. Computer access limited to HIV/AIDS Surveillance personnel. Can only be accessed on the 4 th floor. No wi-fi access.

Security and Confidentiality  Various legal protections exist, for example: –Federal assurance of confidentiality under section 308(d) of the Public Health Service Act –The federal Health Insurance Portability and Accountability Act (HIPAA) of –Texas Health and Safety Code and the Texas Administrative Code

Program Requirements for Security and Confidentiality  Mandated by CDC as a condition of funding.  Must be certified annually by the Overall Responsible Party (ORP).

Five Guiding Principles 1.Physically secure environment. 2.Maintain electronic data in technically secure environment and minimize staff and locations with access to data and personal identifiers. 3.Individual staff responsibility. 4.Breaches investigated, sanctions imposed 5.Practices and policies updated (quality improvement).

Thoughts to Consider….  Policies and procedures dealing with paper, electronic, or other types of information.  Training is critical.  Limited access to work area.  Paper copies maintained in secure file room.  Physically secure building (1st floor window office?).

More Thoughts to Consider….  Program requirements address IT issues, laptops, “other devices”, communications.  No such thing as a totally secure fax or transmission.  Encrypt files. –Ancillary files with identifiers –Internal data transfers –Electronic line lists

Potential Sources of Risk  Viewing, transmitting or moving identified information (electronically, hard copies, fax, cell camera phones).  Physical access to secure area.  Communications (verbal, electronic, written, , telephones).  Lack of training and/or agreements.

Data Release Policy  One way street!  Provisions to protect against public access to raw data or data tables that include small denominator populations that could be indirectly identifying.

Limit Access  Limit the number of people that can access confidential surveillance information.

Training  Every individual with access to surveillance data must attend initial security training and be retrained annually.  A signed confidentiality statement must be documented in the employee’s personnel file.  IT staff and contractors who require access to data must undergo the same training as surveillance staff and sign the same agreements.

Individual Responsibility  All staff are individually responsible for protecting data.  This responsibility includes protecting keys, passwords, and codes that would allow access to confidential information or data.

Computer monitors should not be observed by unauthorized personnel.

Phone conversations should not be capable of being overheard.

Physical Security  All physical locations containing electronic or paper copies of surveillance data must be enclosed inside a locked, secured area with limited access.

Shredding Paper Documents  Surveillance staff must shred documents containing confidential information before disposing of them.

Electronic Data Transfers  Confidential surveillance data or information must be encrypted before electronic transfer via a secure data network – no transfer.  CDC strongly discourages the use of fax or for electronic transfer of data.

Encrypt, encrypt, encrypt!

Going somewhere?

Carrying Data  Data carried to and from the field must be in a locked briefcase or in data encrypted computer devices and returned to the office at the end of the day.

Data Access Control  Access to raw surveillance data for other than routine surveillance purposes is contingent upon: – Demonstrated need for names – Institutional Review Board (IRB) approval –Signing a confidentiality statement regarding rules of access and final disposition of the information.

Sharing Data with Other Surveillance Programs  ORP must weigh benefits and risk of allowing access to data.  Security of other program must be equivalent.  For example, public health follow-up of HIV cases, TB Control

Laptops, PDAs, & Portable Storage Devices  Laptops and other portable devices (e.g., PDAs, tablet personal computers, floppies, thumb drives) that receive or store surveillance information with personal identifiers must incorporate the use of encryption software.

 Hard disks, diskettes, and thumb drives that contain identifying information must be cleaned before they are to be used for other purposes or they must be destroyed before disposal.

Security Breaches  All staff who are authorized to access surveillance data must be responsible for reporting suspected security breaches.  A breach of confidentiality must be immediately investigated to assess causes and implement remedies.