Privacy and Security of Protected Health Information NorthPoint Health & Wellness Center 2011.

Slides:



Advertisements
Similar presentations
CONFIDENTIALITY / PRIVACY. Federal Laws Privacy Act of 1974 PII (Personally Identifiable Information)….Protection of social security numbers……….
Advertisements

Independent Contractor Orientation HIPAA What Is HIPAA? Health Insurance Portability and Accountability Act of 1996 The Health Insurance Portability.
HIPAA Basics Brian Fleetham Dickinson Wright PLLC.
1. As a Florida KidCare community partner families entrust you to not only help them navigate the Florida KidCare system but to keep the information they.
Health Insurance Portability and Accountability Act HIPAA Education for Volunteers and Students.
HIPAA. What Why Who How When What Is HIPAA? Health Insurance Portability & Accountability Act of 1996.
HIPAA Basic Training for Privacy & Information Security Vanderbilt University Medical Center VUMC HIPAA Website:
HIPAA Privacy Rule Training
COBB/DOUGLAS COMMUNITY SERVICES BOARD Confidentiality and Privacy of Consumer Information.
National Health Information Privacy and Security Week Understanding the HIPAA Privacy and Security Rule.
The Health Insurance Portability and Accountability Act of 1996– charged the Department of Health and Human Services (DHHS) with creating health information.
HIPAA PRIVACY REQUIREMENTS Dana L. Thrasher Constangy, Brooks & Smith, LLC (205) ; Victoria Nemerson.
HIPAA Health Insurance Portability and Accountability Act.
What is HIPAA? This presentation was created by The University of Arizona Privacy Office, The Office for the Responsible Conduct of Research on March 5,
1 HIPAA Education CCAC Professional Development Training September 2006 CCAC Professional Development Training September 2006.
Copyright 2003 Page, Wolfberg, & Wirth, LLC. All Rights Reserved.
NAU HIPAA Awareness Training
 Original Intent: ◦ Act passed in 1996 with two main goals: 1.Ensure individuals would be able to maintain their health insurance between jobs (the “portability”
HIPAA Privacy Rule Compliance Training for YSU April 9, 2014.
Are you ready for HIPPO??? Welcome to HIPAA
School-Based Health Centers & Confidentiality: Understanding FERPA & HIPAA Laurie Mesibov & Jill Moore UNC School of Government December 2012.
Health Insurance Portability and Accountability Act (HIPAA)
HEAVEN’S HANDS COMMUNITY SERVICE H.I.P.A.A. What is HIPAA? HIPAA stands for the Health Insurance Portability and Accountability Act, which was passed.
Medical Records in Court: Life after HIPAA North Carolina Conference of Superior Court Judges, October 2003 Presented by Jill Moore, UNC School of Government.
HIPAA COMPLIANCE IN YOUR PRACTICE MARIBEL VALENTIN, ESQUIRE.
HIPAA – Health Insurance Portability & Accountability Act and the Privacy Act MSgt Nechele M. Chambers Senior Enlisted Liaison TRICARE Area Office-Europe.
HIPAA Basic Training for Privacy and Information Security Vanderbilt University Medical Center VUMC HIPAA Website: HIPAA Basic.
HIPAA PRIVACY AND SECURITY AWARENESS.
Next ETCH Confidentiality and HIPAA Annual Review What you need to know. The Privacy Rule 1.
Copyright ©2011 by Pearson Education, Inc. Upper Saddle River, New Jersey All rights reserved. Health Information Technology and Management Richard.
Computerized Networking of HIV Providers Workshop Data Security, Privacy and HIPAA: Focus on Privacy Joy L. Pritts, J.D. Assistant Research Professor Health.
HIPAA (health insurance portability and accountability act)
Medical Law and Ethics, Third Edition Bonnie F. Fremgen Copyright ©2009 by Pearson Education, Inc. Upper Saddle River, New Jersey All rights reserved.
Building a Privacy Foundation. Setting the Standard for Privacy Health Insurance Portability and Accountability Act (HIPAA) Patient Bill of Rights Federal.
Health Insurance Portability and Accountability Act (HIPAA) CCAC.
Copyright © 2009 by The McGraw-Hill Companies, Inc. All Rights Reserved. McGraw-Hill Chapter 6 The Privacy and Security of Electronic Health Information.
Health Insurance Portability and Accountability Act of 1996 HIPAA Privacy Training for County Employees.
Understanding HIPAA (Health Insurandce Portability and Accountability Act)
Mr. Fleming.  Law passed by Congress in  Right to Privacy ◦ Medical information of patient can only be shared with doctor and professionals administering.
© 2013 The McGraw-Hill Companies, Inc. All rights reserved. Ch 8 Privacy Law and HIPAA.
FleetBoston Financial HIPAA Privacy Compliance Agnes Bundy Scanlan Managing Director and Chief Privacy Officer FleetBoston Financial.
HIPAA BASIC TRAINING Presented by Anderson Health Information Systems, Inc.
HIPAA BASIC TRAINING MODULE 1C – Overview (For staff who do not generally create Protected Health Information) Anderson Health Information Systems, Inc.
HIPAA THE PRIVACY RULE. 2 HISTORY In 2000, many patients that were newly diagnosed with depression received free samples of anti- depressant medications.
1 Privacy Plan of Action © HIPAA Pros 2002 All rights reserved.
Copyright © 2015 by Saunders, an imprint of Elsevier Inc. All rights reserved. Chapter 3 Privacy, Confidentiality, and Security.
HIPAA Overview Why do we need a federal rule on privacy? Privacy is a fundamental right Privacy can be defined as the ability of the individual to determine.
Table of Contents. Lessons 1. Introduction to HIPAA Go Go 2. The Privacy Rule Go Go.
Board of Directors – March 24, 2016 Denise Mannon, AHFI, CHPC Corporate Compliance Officer.
HIPAA Training. What information is considered PHI (Protected Health Information)  Dates- Birthdays, Dates of Admission and Discharge, Date of Death.
The Medical College of Georgia HIPAA Privacy Rule Orientation.
New Hire HIPAA Orientation. HIPAA Overview HIPAA is an acronym that stands for the Health Insurance Portability and Accountability Act of HIPAA.
The Health Insurance Portability and Accountability Act (HIPAA) requires Plumas County to train all employees in covered departments about the County’s.
HIPAA Privacy What Every Staff Member Needs to Know.
Health Insurance Portability and Accountability Act (HIPAA) Primer for Observers, Volunteers, Medical Students Dr. Michael Palumbo- Privacy Officer/ EVP.
Health Insurance Portability and Accountability Act of 1996
HIPAA Privacy & Security
What is HIPAA? HIPAA stands for “Health Insurance Portability & Accountability Act” It was an Act of Congress passed into law in HEALTH INSURANCE.
Privacy & Confidentiality
Move this to online module slides 11-56
HIPAA PRIVACY AWARENESS, COMPLIANCE and ENFORCEMENT
Disability Services Agencies Briefing On HIPAA
Employee Privacy and Privacy of Employee Information
HIPAA Privacy & Security
HIPAA SECURITY RULE Copyright © 2008, 2006, 2004 by Saunders an imprint of Elsevier Inc. All rights reserved.
HIPAA Overview.
The Health Insurance Portability and Accountability Act
HIPAA Do’s and Don'ts: What is Really Behind Protected Health Information (PHI) and Health Care Privacy Rules Paul Sisler, Director, Information Services;
The Health Insurance Portability and Accountability Act
Presentation transcript:

Privacy and Security of Protected Health Information NorthPoint Health & Wellness Center 2011

Privacy and Security of Protected Health Information This presentation is intended to provide general background information regarding the privacy and security of protected health information. This presentation is intended to provide general background information regarding the privacy and security of protected health information. Questions regarding the protection, use or disclosure of protected health information should be resolved consistent with Chapter 4 of the NorthPoint Master Policy Manual. Questions regarding the protection, use or disclosure of protected health information should be resolved consistent with Chapter 4 of the NorthPoint Master Policy Manual. Employee issues/concerns about the protection, use or disclosure of protected health information can be reported to either your immediate supervisor or the NorthPoint Compliance Officer. Employee issues/concerns about the protection, use or disclosure of protected health information can be reported to either your immediate supervisor or the NorthPoint Compliance Officer.

What is Protected Health Information? Protected Health Information (PHI) is individually identifiable health information that is: Protected Health Information (PHI) is individually identifiable health information that is: Transmitted by electronic media; Transmitted by electronic media; Maintained in any electronic medium Maintained in any electronic medium Transmitted or maintained in any other form or medium Transmitted or maintained in any other form or medium

Okay, So What is Individually Identifiable Health Information? Individually Identifiable Health Information is any information, including demographic information, that: Individually Identifiable Health Information is any information, including demographic information, that: Relates to the past, present or future physical or mental health of an individual; Relates to the past, present or future physical or mental health of an individual; Relates to the provision of health care to an individual Relates to the provision of health care to an individual Relates to the past, present or future payment for the provision of health care to an individual Relates to the past, present or future payment for the provision of health care to an individual And that identifies the individual or there is reason to believe that the information can be used to identify the individual And that identifies the individual or there is reason to believe that the information can be used to identify the individual

Why Do We Protect Health Information? Our patients expect that their medical and health information will be treated confidentially Our patients expect that their medical and health information will be treated confidentially We want to build trust in our relationships with our patients We want to build trust in our relationships with our patients It’s the right thing to do It’s the right thing to do Federal and state law require it Federal and state law require it

Privacy and Security Under Law Health Insurance Portability and Accountability Act of 1996 (HIPAA): Health Insurance Portability and Accountability Act of 1996 (HIPAA): Sets a baseline for safeguarding the privacy and security of protected health information; Sets a baseline for safeguarding the privacy and security of protected health information; Preempts state law unless the state law is more stringent on its protection of the individual Preempts state law unless the state law is more stringent on its protection of the individual State and other laws may provide more protection to the individual, e.g. issues of reproductive health, the provision of mental health services, services to minors, services to students, etc. State and other laws may provide more protection to the individual, e.g. issues of reproductive health, the provision of mental health services, services to minors, services to students, etc.

What are Patient Expectations Regarding Their Protected Health Information? Health information will be treated confidentially Health information will be treated confidentially The information will be used only for authorized purposes The information will be used only for authorized purposes I will have access to my health information (with some restrictions) I will have access to my health information (with some restrictions) I will consent to the release, disclosure and use of my health information I will consent to the release, disclosure and use of my health information I can restrict the release, disclosure and use of my health information in certain circumstances I can restrict the release, disclosure and use of my health information in certain circumstances Only the minimum necessary amount of my health information will be released, disclosed or used to accomplish a legitimate and intended purpose Only the minimum necessary amount of my health information will be released, disclosed or used to accomplish a legitimate and intended purpose Any unauthorized release, disclosure or use of my health information will be noted and steps will be taken to mitigate any damage Any unauthorized release, disclosure or use of my health information will be noted and steps will be taken to mitigate any damage I am entitled to an accounting of any unauthorized release, disclosure or use of my health information I am entitled to an accounting of any unauthorized release, disclosure or use of my health information

What Does This Mean for NorthPoint? We provide patients a notice of our privacy practices We provide patients a notice of our privacy practices We treat their health information with respect, as if it were our own We treat their health information with respect, as if it were our own We ask patients for their consent to release their health information We ask patients for their consent to release their health information We take practical and effective steps to protect the privacy and security of health information We take practical and effective steps to protect the privacy and security of health information When requested and consistent with our own policies and procedures, we provide patients with access to their health information; we correct any discrepancies in their health information When requested and consistent with our own policies and procedures, we provide patients with access to their health information; we correct any discrepancies in their health information If protected health information is improperly released, used or disclosed, we take steps to mitigate any possible damage If protected health information is improperly released, used or disclosed, we take steps to mitigate any possible damage We need to be able to account for any improper release, use or disclosure to patients We need to be able to account for any improper release, use or disclosure to patients We constantly seek to improve our own actions and processes as they relate to the privacy and security of protected health information We constantly seek to improve our own actions and processes as they relate to the privacy and security of protected health information We work with our supervisors and the Chief Compliance Officer to solve problems which may arise We work with our supervisors and the Chief Compliance Officer to solve problems which may arise

Practical and Effective Steps to Protect the Privacy and Security of Protected Health Information What does our Department do to protect the privacy and security of protected health information? What does our Department do to protect the privacy and security of protected health information?  Periodically assess the risk of improper use, disclosure or release of information  Periodically review our own processes and behaviors as they relate to the use, disclosure or release of information  Orient computer screens so that staff and patients cannot view protected health information  Use privacy screens on our computers  Comply with password and security rules for the use of our computers  Close open computer programs when we will be away form our desks or work stations more than momentarily  Store written materials securely when we are away from our desks for more than a few minutes…or at the end of the work day  Take special care to ensure accurate use of the fax machine in the transmission and receipt of patient information

Practical and Effective Steps to Protect the Privacy and Security of Protected Health Information What does our Department do to protect the privacy and security of protected health information? What does our Department do to protect the privacy and security of protected health information?  Discuss patient specific information quietly and, as appropriate, behind closed doors  Take special care in the use of the copy machine to ensure that patient information is not left behind, nor left unattended for more than a few minutes  Use secure fax and copying machines where available  Adhere to guidelines on the use of and the transmission of protected health information  Shred paper/dispose of electronic media in the appropriate fashion  Secure our work stations  Lock file cabinets  Other ?

Practical and Effective Steps to Protect the Privacy and Security of Protected health Information What will our Department do in 2012 to improve how we protect the privacy and security of protected health information? What will our Department do in 2012 to improve how we protect the privacy and security of protected health information? 1.? 2.? 3.? 4.?