WORKSHOP IV Integrating Ethics, Compliance, Privacy and Security into a Single Organizational Initiative Geralyn Kidera JD Senior Vice President Council.

Slides:



Advertisements
Similar presentations
Electronic Medical Records: Implications of HIPAA for Selecting and Implementing an EMR Todd Frech Senior Partner
Advertisements

Independent Contractor Orientation HIPAA What Is HIPAA? Health Insurance Portability and Accountability Act of 1996 The Health Insurance Portability.
HIPAA SCENARIOS Unit 7 Seminar ©
Health Insurance Portability and Accountability Act HIPAA Education for Volunteers and Students.
HIPAA. What Why Who How When What Is HIPAA? Health Insurance Portability & Accountability Act of 1996.
National Health Information Privacy and Security Week Understanding the HIPAA Privacy and Security Rule.
Increasing public concern about loss of privacy Broad availability of information stored and exchanged in electronic format Concerns about genetic information.
Information Risk Management Key Component for HIPAA Security Compliance Ann Geyer Tunitas Group
Health Insurance Portability and Accountability Act (HIPAA)HIPAA.
1 HIPAA Education CCAC Professional Development Training September 2006 CCAC Professional Development Training September 2006.
NAU HIPAA Awareness Training
HIPAA Health Insurance Portability and Accountability Act 1.
1 Louisiana Department of Health and Hospitals Basic HIPAA Privacy Training: Policies and Procedures 01/09/
Health Insurance Portability & Accountability Act “HIPAA” To every patient, every time, we will provide the care that we would want for our own loved ones.
Randy Benson RHQN Executive Director May, Compliance Issues During Survey Compliance Officers monitor healthcare facilities (hospitals and clinics)
Building a Medical Records Compliance Program for Your Office: Charles B. Brownlow, OD, FAAO December 17, 2012.
1 INTERNAL CONTROLS A PRACTICAL GUIDE TO HELP ENSURE FINANCIAL INTEGRITY.
Environmental Management Systems An Overview With Practical Applications.
Michigan Medical Home.
Absence Management To be used in conjunction with the 1st Class HR ‘Absence Management’ Management Guide available at
Achieving our mission Presented to Line Staff. INTERNAL CONTROLS What are they?
Have You Read Your Medical Record? Peggy Beck, RHIA, CMT, FAAMT.
Development of a Road Map to Controlled Substance Diversion Prevention Rene Cronquist, RN, J.D. Director of Practice and Policy Minnesota Board of Nursing.
Information Security Compliance System Owner Training Richard Gadsden Information Security Office Office of the CIO – Information Services Sharon Knowles.
© 2009 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill Career Education Computers in the Medical Office Chapter 2: Information Technology.
Global Quality Operations Sustaining Quality ^ : Why is Quality Good for Business? Diane E. Bergeron Vice President Global Quality Operations Schering-Plough.
Component 2: The Culture of Health Care Unit 3: Health Care Settings— The Places Where Care Is Delivered Lecture 3 This material was developed by Oregon.
HIPAA PRIVACY AND SECURITY AWARENESS.
CORPORATE COMPLIANCE Tim Timmons Vice President Compliance and Regulatory Services Health Future, LLC.
Integrating HIPAA Into Your Compliance Program Fifth Annual National Congress on Health Care Compliance February 7, 2002 Glenna S. Jackson Vice President.
Copyright ©2011 by Pearson Education, Inc. Upper Saddle River, New Jersey All rights reserved. Health Information Technology and Management Richard.
How Hospitals Protect Your Health Information. Your Health Information Privacy Rights You can ask to see or get a copy of your medical record and other.
1 Secure Commonwealth Panel Health and Medical Subpanel Debbie Condrey - Chief Information Officer Virginia Department of Health December 16, 2013 Virginia.
Making IT Meaningful Christine Bechtel Vice President National Partnership for Women & Families Making IT Meaningful: How Consumers Value and Trust Health.
Steps for Success in EHR Planning Bill French, VP eHealth Strategies Wisconsin Office of Rural Health HIT Implementation Workshop Stevens Point, WI August.
For Pharmacy Tech Training. Goal 1 Assist the pharmacist in collecting, organizing and evaluating information for direct patient care, medication use.
April 14, A Watershed Date in HIPAA Privacy Compliance: Where Should You Be in HIPAA Security Compliance and How to Get There… John Parmigiani National.
Privacy Project Framework & Structure HIPAA Summit Brent Saunders
Page 1 of 23 DMC’S COMMITMENT TO COMPLIANCE: COMPLIANCE PROGRAM CODE OF CONDUCT 2009 DMC Corporate Audit and Compliance Department Detroit Medical Center©
1.Summary of Needs Analysis 2.Summary of Action Plan 3.Systems Analysis between Microsoft SharePoint® and OpenText Content Server 4.System Recommendation.
© 2013 The McGraw-Hill Companies, Inc. All rights reserved. Ch 8 Privacy Law and HIPAA.
HIPAA LAWS.  Under the privacy rule, the patient must give consent to use his or her Protected Health Information.  Examples in which consent must be.
Implementing EHR in Home Health Care Component 11/Unit 9d An example on the Implementation of a Point of Care System.
1 Privacy Plan of Action © HIPAA Pros 2002 All rights reserved.
Safety Training for Senior Leaders October 2013
ISAM Spring 2007 Patient Care Online A New Approach to Quality Patient Care Prepared by Hani Bismar.
Component 1: Introduction to Health Care and Public Health in the U.S. 1.9: Unit 9: The evolution and reform of healthcare in the US 1.9d: The Patient.
HIT Policy Committee NHIN Workgroup HIE Trust Framework: HIE Trust Framework: Essential Components for Trust April 21, 2010 David Lansky, Chair Farzad.
Office of Human Research Protection Georgia Health Sciences University.
Regional Dental Consultants’ Meeting Presented by Emerson Robinson, DDS, MPH Region II and V Dental Consultant.
PATIENT & FAMILY RIGHTS AT DOHMS. Fully understand and practice all your rights. You will receive a written copy of these rights from the Reception, Registration.
INTRODUCTION TO HEALTH SCIENCE LAW AND ETHICS. MEDICAL LAW Medical law is the branch of law which concerns the rights and responsibilities of medical.
Computer Security and the “H” word Glen Klinkhart, CEO Mike Messick, CTO.
Summary of Major Points Quarantine / Isolation Planning Process Accomplishments Continuing Projects Where we go from here... SUMMARY Isolation / Quarantine.
Slide No. Topic 3 Introduction 4 Definition 5-8 Process and Procedures 9-10 Benefits 11 Suitability and Safety Technology to be Used I C T.
Understanding HIPAA Dr. Jennifer Lu.
Paul T. Smith Davis Wright Tremaine LLP
Health Insurance Portability and Accountability Act
Legal, Regulatory & Compliance
Privacy Project Framework & Structure
Health Insurance Portability and Accountability Act
Risk Management: why and how to protect your health center
Wootton Medical Centre High Street, Wootton Northampton NN4 6LW
The Elements of appropriate Internal Controls
The Health Insurance Portability and Accountability Act
Our Values at Work: Code of Conduct and Core Values
Lesson 1: Introduction to HIPAA
Our Values at Work: Code of Conduct and Core Values
Auditing Compliance with the Privacy Rule
Nursing informatics Lecture (11).
Presentation transcript:

WORKSHOP IV Integrating Ethics, Compliance, Privacy and Security into a Single Organizational Initiative Geralyn Kidera JD Senior Vice President Council of Ethical Organizations/Health Ethics Trust © 2002 Council of Ethical Organizations

Discussion Point What are your expectations for this workshop? What would you like to learn, discuss, share?

What Do Ethics, Compliance, Privacy and Security Have To Do With Each Other? 1. The role of ethics in compliance >going beyond the ‘rules’ >focusing on shared values >rewarding ethical decision-making

2.Privacy - a fundamental concept in healthcare >values-driven or rule driven? >Patient focused or provider/payer focused? >Why now?

3. Security - how does this relate to our compliance program? >IT’s problem?

Case Study In a small physician office, the nurse sits behind the window in the back of the patient waiting area. The window is open so that she can easily talk with patients as they come in for their appointments. One of her responsibilities is to call patients to remind them of appointments, or to discuss the results of blood tests or x-rays taken when the patient was in the office. She calls a patient to discuss the need to schedule additional visits to the physician’s office as a result of some preliminary tests that were taken. When she calls the patient she calls her by name (to verify she is indeed speaking with the patient) and proceeds to discuss the test results. Several patients sit in the waiting area. They can hear the nurse’s side of the telephone conversation. Are there any privacy compliance issues here? How do you address the ethical issues? What is the appropriate way for the nurse to do her job?

Discussion Point A. How did your organization develop its compliance program? –Who was involved? –Who drove the process? –Who ended up as CCO….and why?

B. What is your organization’s approach to implementing a HIPAA privacy and/or security initiative?

Elements of a Single Initiative 1. What is role of compliance/integrity program?  Setting expectations  Defining organizational values  Providing tools to enable employees to meet expectations within those values  Prevent and deter wrongdoing  Respond promptly and responsibly to problems  Internally driven initiative?

2. How do your privacy and security initiatives impact compliance efforts?  Setting expectations  Defining organizational values  Providing tools  Responding to problems  Externally driven mandate?

3. How does “ethics” help to shape that initiative?

Discussion Point How do you resolve conflicts between operational needs and organizational values? How do you demonstrate your organization’s values through systems, protocols, processes?

Role of Compliance Officer 1. Should CCO also assume role of Privacy Officer? >compatible goals >wide area of responsibilities >high level position? >clearly defined role(s)?

Policies & Procedures 1. Privacy - >driven by regulatory requirements (and state law) >reconciling patient needs and operational concerns >need for ‘team’ to create/implement >who ‘owns’ them?

2. Security >technical component - requires IT input >equipment needs - dictate process >human element - protocols to be followed >transaction issues - driven by government/payer requirements

Case Study A number of physicians on staff at the hospital are able to access the hospital electronic medical record system from their medical offices. This allows them to review test results and other information concerning their patients and provide immediate information concerning treatment changes to the hospital staff. One of the physicians wishes to have the same remote access from his home office, so that he can check on his patients when he is at home. He has a computer and high speed internet access and wants to be able to access the hospital system whenever he can. His computer is located in his den at home. While his kids do occasionally use the computer, he assures the hospital that only he will ever access the hospital’s records. What are the hospital’s obligations here? What are the doctor’s responsibilities? How do you view this issue from an ethical/values-driven basis?

Privacy/security and Your Reporting Process Are you prepared to address hotline calls (or other reports) concerning privacy and/or security issues? >What procedures are in place? >Who conducts investigation and follow up?

Training Privacy training of ‘workforce’ - how will that be accomplished? >Who will conduct it? >How will it be given? >Who will be required to attend?

What will be your ‘message’? >Will it incorporate your organization’s shared & stated values? >How will you articulate them?

What about security training? >How do you make sure your organization’s security protocols are understood and followed? >Who needs to be trained? Why?

What about your compliance training efforts? Do they get lost or put on hold? >How do you deal with limited resources and multiple priorities? >Are these efforts mutually exclusive?

Case Study A large physician group practice is struggling with its HIPAA compliance program implementation. The practice has decided to use new computer software and terminals to manage access to archived and ongoing healthcare information about its patients. The practice has decided that all physicians will have to learn how to use the computer terminals in order to view lab and other test results, and to review patient histories. The practice manager knows that he will not be able to convince all of the physicians to adopt a totally electronic medical record, but believes these changes are a good first step into the use of electronic data management, and in achieving compliance with HIPAA requirements. In addition, the practice’s IT department believes that the new technologies will result in more efficient use of physician and staff time, assure secure data collection and storage and allow the practice to monitor access to all protected health information. Most of the staff is very supportive and enthusiastic about the new system enhancements. However there are several older physicians who aren’t interested in learning about computers or how to use them in their own practice. They have been totally resistant to taking any time to learn about the electronic data system, or the use of any “new-fangled” stuff.

Several of the physicians have told their own staff members to “take care of this stuff” for them, and believe that will be sufficient to meet any requirements. The physicians understand that HIPAA will apply to the group practice; however, they believe things would be a whole lot simpler if the practice didn’t get into use of computers and other electronic data processes. They are very vocal in complaining about having to take staff time (not to mention their own time away from patients) to learn about the new systems. Can the practice rely on training the physicians’ staff members? How do you deal with physicians who resist any training programs? How do you incorporate shared values into hard-subject training like this?