Confidentiality, Consents and Disclosure Recent Legal Changes and Current Issues Presented by Pam Beach, Attorney at Law.

Slides:



Advertisements
Similar presentations
HIPAA Privacy Practices. Notice A copy of the current DMH Notice must be posted at each service site where persons seeking DMH services will be able to.
Advertisements

Information for Students MGH Institute of Health Professions Use your down arrow or click your mouse to advance through the presentation.
Responding to Subpoenas and Law Enforcement Demands for PHI: An Overview Janet A. Newberg Chair, Health Law Section Felhaber Larson Fenlon & Vogt, P.A.
HITECH ACT Privacy & Security Requirements Cathleen Casagrande Privacy Officer July 23, 2009.
Presented by Elena Chan, UCSF Pharm.D. Candidate Tiffany Jew, USC Pharm.D. Candidate March 14, 2007 P HARMACEUTICAL C ONSULTANTS, I NC. P RO P HARMA HIPAA.
Presented by Jennifer Coughlin Eugene, Oregon April 10, 2013.
HIPAA Privacy Rule Training
HIPAA – Privacy Rule and Research USCRF Research Educational Series March 19, 2003.
Ethics, Confidentiality, and HIPAA! 2006 ASAC Drug Court Confidentiality FMJ Multi- County November 8, 2006.
1 Navigating the Privacy and Security Issues: HITECH Overview Rebecca L. Williams, RN, JD Partner Co-chair of HIT/HIPAA Practice Davis Wright Tremaine.
THE HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT (HIPAA) (known as THE PRIVACY RULE)
NAU HIPAA Awareness Training
North Carolina State University Health Information Privacy 4/16/03.
WHAT IS HIPAA? The Health Insurance Portability and Accountability Act of 1996 (HIPAA) provides certain protections for any of your health information.
Informed Consent.
Health Insurance Portability and Accountability Act (HIPAA) Presented by: APS Healthcare Southwestern PA Health Care Quality Unit (HCQU) December 2010.
THE FOLLOWING SLIDES EXPLAIN THE REQUIRED ELEMENTS THAT MUST BE INCLUDED FOR A HIPAA AUTHORIZATION TO BE VALID HIPAA Authorizations.
HIPAA THE PRIVACY RULE Reviewed December HISTORY In 2000, many patients that were newly diagnosed with depression received free samples of anti-
2014 HIPAA Refresher Omnibus Rule & HIPAA Security.
Health Insurance Portability & Accountability Act (HIPAA)
PRIVACY BREACHES A “breach of the security of the system”: –Is the “unauthorized acquisition of computerized data that compromises the security, confidentiality,
Family Educational Rights and Privacy Act What you need to know...
Walking Through the Breach Notification Process - Beginning to End HIPAA COW Presentation and Panel April 8, 2011.
Your HIPAA rules Ben Burton, JD, MBA, RHIA, CHP, CHC Notice of Privacy Practices.
Confidentiality of MH/DD/SA Records Family Court Conference March 9, 2006 Mark Botts School of Government, UNC.
HIPAA COMPLIANCE IN YOUR PRACTICE MARIBEL VALENTIN, ESQUIRE.
Health Insurance Portability and Accountability Act (HIPAA)
Notice of Privacy Practices Nebraska SNIP Privacy Subgroup July 18, 2002 Michael J. Brown, MHA, CPA Vice-President, Administrative & Regulatory Affairs,
HIPAA PRIVACY AND SECURITY AWARENESS.
1 Research & Accounting for Disclosures March 12, 2008 Leslie J. Pfeffer, BS, CHP Office of the Vice President for Research Administration Office of Compliance.
1 Disclosures © HIPAA Pros 2002 All rights reserved.
Office of the Secretary Office for Civil Rights (OCR) Indian Health Service HIPAA Training Hosted by the Aberdeen Area Office July 24, 2012.
Dealing with Business Associates Business Associates Business Associates are persons or organizations that on behalf of a covered entity: –Perform any.
Arkansas State Law Which Governs Sensitive Information…… Part 3B
HITECH Act and HIPAA: Important Compliance Update Susan E. Ziel Gerald “Jud” DeLoss.
Family Educational Rights and Privacy Act (FERPA) Also known as the Buckley Amendment Statute: 20 U.S.C. § 1232(g) Regulations: 34 CFR Part 99.
Privacy and the Civil Commitment Process Allyson K. Tysinger Assistant Attorney General June 4-5, 2008.
© 2009 The McGraw-Hill Companies, Inc. All rights reserved. 1 McGraw-Hill Chapter 2 The HIPAA Privacy Standards HIPAA for Allied Health Careers.
And Policy on Confidentiality of Records for The University of Alabama.
Health Insurance Portability and Accountability Act (HIPAA) CCAC.
Health Insurance Portability and Accountability Act of 1996 HIPAA Privacy Training for County Employees.
Chapter 7—Privacy Law and HIPAA
HIPAA PRACTICAL APPLICATION WORKSHOP Orientation Module 1B Anderson Health Information Systems, Inc.
PROTECTING CLIENT DATA HIPAA, HITECH AND PIPA PART 1B.
HIPAA THE PRIVACY RULE. 2 HISTORY In 2000, many patients that were newly diagnosed with depression received free samples of anti- depressant medications.
1 CONFIDENTIALITY. 2 Requirement Under IDEA 34 CFR Sec (c) All staff collecting or using personally identifiable information in public education.
HealthBridge is one of the nation’s largest and most successful health information exchange organizations. Tri-State REC: Privacy and Security Issues for.
Rhonda Anderson, RHIA, President  …is a PROCESS, not a PROJECT 2.
HITECH and HIPAA Presented by Rhonda Anderson, RHIA Anderson Health Information Systems, Inc
HIPAA Training Workshop #1 Council of Community Clinics – San Diego February 7, 2003 by Kaye L. Rankin Rankin Healthcare Consultants, Inc.
Top 10 Series Changes to HIPAA Devon Bernard AOPA Reimbursement Services Coordinator.
Sharing Information (FERPA) FY07 REMS Initial Grantee Meeting December 5, 2007, San Diego, CA U.S. Department of Education, Office of Safe and Drug-Free.
FERPA for the Financial Aid Office NCASFAA Fall Conference November 2012.
AND CE-Prof, Inc. January 28, 2011 The Greater Chicago Dental Academy 1 Copyright CE-Prof, Inc
HIPAA Training. What information is considered PHI (Protected Health Information)  Dates- Birthdays, Dates of Admission and Discharge, Date of Death.
HIPAA Training Workshop #2 Trainer: Kaye L. Rankin Rankin Healthcare Consultants, Inc.
Juvenile Legislative Update 2013 Confidential Records and Protected Disclosures.
HIPAA Training Workshop #3 Individual Rights Kaye L. Rankin Rankin Healthcare Consultants, Inc.
Health Insurance Portability and Accountability Act
HIPAA Privacy Rule Training
HIPAA THE PRIVACY RULE Reviewed December 2012.
HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT (HIPAA)
HIPAA Administrative Simplification
HIPPA/HITECH Act Requirements Under the Business Associate Agreement Between CNI and Military Health Services.
Privacy Notice - Requirements
Health Insurance Portability and Accountability Act
HIPAA Pros - Disclosures
Confidential Records and Protected Disclosures
The Health Insurance Portability and Accountability Act
Presentation transcript:

Confidentiality, Consents and Disclosure Recent Legal Changes and Current Issues Presented by Pam Beach, Attorney at Law

§2Definitions (3)Authorization – (4)Business associate (10)Designated record set (15)Health care operations (17)Incidental use or disclosure (20)LAR or legally authorized representative

§2Definitions (con.) (27)Professional (28)PHI or protected health information (29)Psychotherapy notes (30)Public health disaster

§4General Provisions (a) Policies and procedures (b) Retention (d) Safeguarding PHI (e) Disclosing PHI – Verify identity except in emergency – Alcohol and drugs – HIV AIDS

§4General Provisions (con.) (e) Disclosing PHI con. – Records from outside sources – Non disclosure of PHI about third party – Authorization in writing

§9When Authorization is not Required to Use or Disclose PHI (a)When necessary for TPO (b)When required or authorized by law. – CPS – Audits – Abuse/neglect – Advocacy Inc. – HHS – Law enforcement to lessen imminent harm

(b)When required or authorized by law (con.) – Research – Correctional institutions – Entities paying fees – Administrator of estate of deceased – LAR of person with DD

(c)When required by judicial and administrative proceedings Civil subpoenas Criminal subpoenas Court orders Law enforcement

§12Valid Authorization to Use or Disclose Protected Health Information the name of the individual; a description of the information to be used or disclosed that is specific and meaningful; a description of each purpose of the requested use or disclosure. The statement "at the request of the individual" is a sufficient description of the purpose when the individual initiates the authorization and does not, or elects not to, provide a statement of the purpose; the name or other specific identification of the person(s), or class of persons, permitted to make the disclosure;

§12Valid Authorization to Use or Disclose Protected Health Information the name or other specific identification of the person(s), or class of persons, to whom the disclosure may be made; an expiration date or an expiration event that relates to the individual or the purpose of the use or disclosure; a statement that: – the individual may revoke the authorization – the component will comply with the revocation except to the extent that it has acted in reliance on it; – a statement that the component may not withhold treatment, Medicaid benefits, or payment processing if the individual does not to sign the authorization;

§12Valid Authorization to Use or Disclose Protected Health Information a statement that, except for PHI related to alcohol or drug abuse treatment, the potential exists for the PHI described in the authorization to be re-disclosed by the recipient and, therefore, no longer protected by medical privacy laws; the signature of the person who can authorize the use or disclosure (i.e., individual, LAR, or other representative) if the authorization form is signed by the individual's LAR or other representative, a description of the LAR's or other representative's authority to act for the individual; and the date the authorization form was signed.

§16Access to Protected Health Information by Individuals and LARs Denial provide a written denial to the requestor that uses plain language and contains: – the basis for the denial; – the duration of the denial; – if access is denied for a reviewable ground under paragraph (2) of this subsection, a statement of the requestor's right to request a review of the denial of access and the procedures for requesting a review; and – a description of how the requestor may complain to the component pursuant to the component's complaint procedures (as required in §7 (Complaints)), to the Office for Civil Rights, U.S. Department of Health and Human Services, including the contact information;

§16Access to Protected Health Information by Individuals and LARs file a copy of the written denial in the individual's record; to the extent possible, provide access, in accordance with subsection (c) of this section, to any other PHI requested, after excluding the PHI to which the component has reason to deny access; and allow examination and copying of the PHI by another professional if the individual selects the other professional to treat the individual for the same or a related condition as the professional denying access.

Breach Notification Act defines ‘‘breach’’ as the ‘‘unauthorized acquisition, access, use, or disclosure of protected health information which compromises the security or privacy of the protected health information, except where an unauthorized person to whom such information is disclosed would not reasonably have been able to retain such information.’’ Business associates notify the covered entity. Time within 60 days from discovery

Breach Notification (con.) In writing –first class mail to last known address May be multiple mailings May also do electronic Minor to parent If not address, may do phone, public posting or major media Law enforcement may request a delay.

Breach Notification (con.) (1) A brief description of what happened, including the date of the breach and the date of the discovery of the breach, if known; (2) A description of the types of unsecured protected health information that were involved in the breach (such as whether full name, social security number, date of birth, home address, account number, diagnosis, disability code, or other types of information were involved); (3) any steps individuals should take to protect themselves from potential harm resulting from the breach;

Breach Notification (con.) (4) a brief description of what the covered entity involved is doing to investigate the breach, to mitigate harm to individuals, and to protect against any further breaches; and (5) contact procedures for individuals to ask questions or learn additional information, which must include a toll-free telephone number, an address, Web site, or postal address. With respect to indicating in the notification the types of protected health information involved in a breach, we emphasize that this provision requires covered entities to describe only the types of information involved.

Breach Notification (con.) Notification to secretary of HHS Immediately of 500 or more people Less than 500 people, keep a log and submit by year