Marcia Gonzales, JD Compliance Officer & Privacy Officer

Slides:



Advertisements
Similar presentations
Minimum Necessary Standard Version 1.0
Advertisements

1 The HIPAA Privacy Rule and Research This presentation will probably involve audience discussion, which will create action items. Use PowerPoint to keep.
HIPAA Basics Brian Fleetham Dickinson Wright PLLC.
HIPAA Privacy Training. 2 HIPAA Background Health Insurance Portability and Accountability Act of 1996 Copyright 2010 MHM Resources LLC.
Confidentiality and HIPAA
HIPAA Privacy Rule Training
National Health Information Privacy and Security Week Understanding the HIPAA Privacy and Security Rule.
HIPAA – Privacy Rule and Research USCRF Research Educational Series March 19, 2003.
Increasing public concern about loss of privacy Broad availability of information stored and exchanged in electronic format Concerns about genetic information.
1 HIPAA and Research and YOU. 2 INTRODUCTION Rule #1:Don’t Panic Rule #2:Bottom Line for Researchers: HIPAA is Manageable thru Education/Awareness and.
What is HIPAA? This presentation was created by The University of Arizona Privacy Office, The Office for the Responsible Conduct of Research on March 5,
1 HIPAA Education CCAC Professional Development Training September 2006 CCAC Professional Development Training September 2006.
Managing Access to Student Health Information per Federal HIPAA Guidelines Joan M. Kiel, Ph.D., CHPS Duquesne University Pittsburgh, Penna
NAU HIPAA Awareness Training
1 Louisiana Department of Health and Hospitals Basic HIPAA Privacy Training: Policies and Procedures 01/09/
TM The HIPAA Privacy Rule: Safeguarding Health Information in Research and Public Health Practice Centers for Disease Control and Prevention Beverly A.
Are you ready for HIPPO??? Welcome to HIPAA
Health Insurance Portability Accountability Act of 1996 HIPAA for Researchers: IRB Related Issues HSC USC IRB.
Implementation of Privacy Board Reviews at PCMC Mary Thomason, Intermountain Healthcare Privacy Board Chair.
August 10, 2001 NESNIP PRIVACY WORKGROUP HIPAA’s Minimum Necessary Standard Presented by: Mildred L. Johnson, J.D.
Version 6.0 Approved by HIPAA Implementation Team April 14, HIPAA Learning Module The following is an educational Powerpoint presentation on the.
Informed Consent and HIPAA Tim Noe Coordinating Center.
Health Insurance Portability and Accountability Act (HIPAA)
Columbia University Medical Center Health Insurance Portability and Accountability Act of 1996 (“HIPAA”) Privacy & Information Security Training 2009.
1 VUMC Confidentiality Policy and HIPAA Implications for Clinical Research General Clinical Research Center Skills Workshop March 2, 2007 Gaye Smith Privacy.
HIPAA PRIVACY AND SECURITY AWARENESS.
1 Research & Accounting for Disclosures March 12, 2008 Leslie J. Pfeffer, BS, CHP Office of the Vice President for Research Administration Office of Compliance.
Confidentiality, Consents and Disclosure Recent Legal Changes and Current Issues Presented by Pam Beach, Attorney at Law.
Copyright ©2011 by Pearson Education, Inc. Upper Saddle River, New Jersey All rights reserved. Health Information Technology and Management Richard.
HIPAA and Research Basics for IRB Tim Atkinson Director, Research and Sponsored Programs Director, Institutional Review Board Research Privacy Officer.
HIPAA – How Will the Regulations Impact Research?.
HIPAA Michigan Cancer Registrars Association 2005 Annual Educational Conference Sandy Routhier.
H I P A A T R A I N I N G Self Directed Module 7 Research Disclosures For Data Custodians START Click to begin…
Medical Law and Ethics, Third Edition Bonnie F. Fremgen Copyright ©2009 by Pearson Education, Inc. Upper Saddle River, New Jersey All rights reserved.
HIPAA SURVIVAL SKILLS: An Update University of Miami1 Marisabel Davalos, M.S.Ed., CIP Associate Director of Educational Initiatives November, 2008.
Health Insurance Portability and Accountability Act (HIPAA) CCAC.
Health Insurance Portability and Accountability Act of 1996 HIPAA Privacy Training for County Employees.
Understanding HIPAA (Health Insurandce Portability and Accountability Act)
© 2013 The McGraw-Hill Companies, Inc. All rights reserved. Ch 8 Privacy Law and HIPAA.
Chapter 7—Privacy Law and HIPAA
FleetBoston Financial HIPAA Privacy Compliance Agnes Bundy Scanlan Managing Director and Chief Privacy Officer FleetBoston Financial.
HIPAA BASIC TRAINING Presented by Anderson Health Information Systems, Inc.
HIPAA PRACTICAL APPLICATION WORKSHOP Orientation Module 1B Anderson Health Information Systems, Inc.
HIPAA THE PRIVACY RULE. 2 HISTORY In 2000, many patients that were newly diagnosed with depression received free samples of anti- depressant medications.
Rhonda Anderson, RHIA, President  …is a PROCESS, not a PROJECT 2.
Copyright ©2014 by Saunders, an imprint of Elsevier Inc. All rights reserved 1 Chapter 02 Compliance, Privacy, Fraud, and Abuse in Insurance Billing Insurance.
C HAPTER 34 Code Blue Health Sciences Edition 4. Confidentiality of sensitive information is an important issue in healthcare. Breaches of confidentiality.
Copyright © Emerson Strategic Group, Inc. All Rights Reserved 1 Ninth National HIPAA Summit Auditing for Privacy Compliance: A Case Study September.
Health Insurance portability and Accountability Act (HIPAA)‏
1 Privacy Plan of Action © HIPAA Pros 2002 All rights reserved.
HIPAA and Human Subjects Research IRB Member CE May 2014 Slideshow by Sean Horkheimer.
HIPAA Training Workshop #1 Council of Community Clinics – San Diego February 7, 2003 by Kaye L. Rankin Rankin Healthcare Consultants, Inc.
TASFAA 2016 Legacy of Leadership. TASFAA 2016 Legacy of Leadership Family Educational Rights and Privacy Act (FERPA) An Overview Molly Thompson Associate.
The Medical College of Georgia HIPAA Privacy Rule Orientation.
New Hire HIPAA Orientation. HIPAA Overview HIPAA is an acronym that stands for the Health Insurance Portability and Accountability Act of HIPAA.
Disclaimer This presentation is intended only for use by Tulane University faculty, staff, and students. No copy or use of this presentation should occur.
HIPAA and RESEARCH 5 th Thursday May 31, Page 2.
HIPAA Training Workshop #3 Individual Rights Kaye L. Rankin Rankin Healthcare Consultants, Inc.
HIPAA 2017 JHSPH IRB Clarifications and Changes
HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT (HIPAA)
What is HIPAA? HIPAA stands for “Health Insurance Portability & Accountability Act” It was an Act of Congress passed into law in HEALTH INSURANCE.
The HIPAA Privacy Rule: Implications for Medical Research
HIPAA Administrative Simplification
HIPAA PRIVACY AWARENESS, COMPLIANCE and ENFORCEMENT
Disability Services Agencies Briefing On HIPAA
The HIPAA Privacy Rule and Research
HIPAA Policy & Procedure Strategies
Making Your IRBs and Clinical Investigators HIPAA-Ready
The Health Insurance Portability and Accountability Act
Presentation transcript:

3.03 HIPAA Privacy: Practical Approaches and Experiences for Auditing for Privacy Compliance Marcia Gonzales, JD Compliance Officer & Privacy Officer Indiana University School of Medicine Office of Compliance Services

IUSM is the second largest medical school Only School of Medicine in Indiana with 9 sites Indianapolis is main campus MD students - 1,128 Number of residents/fellows - 1,032 Full-time faculty - 1,221 Staff - 2,642 5 hospitals at Indianapolis campus

IUSM Research 19 Research Institutions Some are not covered entities 5 IRBs through the Indiana University Purdue University Indianapolis (IUPUI) and Clarian federal wide assurance Fiscal Year 2002- 2003 Grants awarded - $186,974,090 Awarded research studies - 1,076

Specific Areas to Consider Fundraising Source of their potential or current donor lists Relationships with health care providers Specific guidelines developed Education Type of access is provided for educational purposes ?(beyond usual education of Medical Students & Residents) Who provides the access?

IUSM HIPAA Structure

HIPAA Implementation Process IUSM HIPAA Compliance Plan IUSM is not a health care component of Indiana University Business associate to Physician Practices and Hospitals Faculty - workforce members of several covered entities Access to education for faculty, residents, students and staff Physician Practice Plan Workplan Step by step approach to implementation & tracking milestones Met with Practice Plan administrators every 2 weeks for 6 months Results of Workplan status reported to Deans

Practice Workplan Conduct Assessment Tasks Position Responsible Status LEGEND: REFERENCE TOOLS:   IP - In Progress Attachment B - HIPAA Roles & Responsibilities - Approved by Compliance Committee, and provided by IUSM Office of Compliance Services (OCS) C - Completed Attachment D - HIPAA Key Terms O - Overdue Attachment J - Policies and Procedures Resource Documents NS - Not Started Tasks Position Responsible Status Start Date Due Completion Issues / Barriers Conduct Assessment PPHL Evaluate how your organization measures up to HIPAA regulations using the selected assessment tool (Answer and document responses to each survey question or criteria in the selected tool or check list) Document privacy and security gaps in compliance and the areas that need to be addressed to comply with HIPAA Evaluate level of non-compliance, sensitivity and risk of each compliance gap

Did we do what we said we were going to do? Measuring Compliance Did we do what we said we were going to do?

Measuring Compliance -STAT Storage Where is PHI stored? For what purpose? Is PHI sufficiently safeguarded? Transfer When is PHI being sent electronically? Is the transfer reasonably safeguarded? Access How is this determined? Is legitimate access being denied? Training Have employees been trained? What process is in place to train new employees or to communicate changes in policy?

Polices & Procedures Uses and disclosures of Protected Health Information (PHI) Minimum Necessary Decedents Fundraising Marketing Authorizations Patient Rights Personal Representatives and Others involved in a Patient’s Care Verifying the Identity and Authority of a Person requesting PHI De-Identified Data Limited Data Sets Business Associates Complaints HIPAA Documentation Training Safeguards Notice of Privacy Practices Changes in Law

IUSM Privacy Audit Strategy Will begin Privacy Audits in January 2005 Initial audit will be treated as a “baseline” General Purpose Compliance with HIPAA incorporated in implementation documents Test the effectiveness of IUSM HIPAA Compliance Plan Test the effectiveness of the Practice Plans’ HIPAA Compliance Plan Determine if the Practice Plans were only “going through the motions”, i.e., do the policies and processes address their specific issues.

Privacy Audit Strategy Initially, will audit all departments 12 month process Prior Written notice of the Audit will be provided to the practice plans/departments Will ask each department to submit copy of Policies & Procedures prior to audit Will use developed checklists Subsequent audits will be determined on a risk basis or done randomly.

Item IUSM HIPAA Policy # Requirement Interview Question Risk Value Compliant Needs Improvement Non-Compliant Part 164, Subpart E - Privacy of Individually Identifiable Information   §164.502 Uses and disclosures of protected health information: general rules 1 IUSM - HIPAA Privacy 1.0 Permitted uses and disclosures - §164.502(a)(1) and 164.506. A Covered Entity may not use and disclose except as permitted or required. Covered entities may use and disclose PHI for treatment, payment and healthcare operations. Do you have a documented policy and procedure that explains the uses and disclosures of PHI permitted under HIPAA? 2 IUSM - HIPAA Privacy 16.0 Incidental Disclosures - §164.502(a)(1)(iii) Incidental disclosures permitted as long as the Covered Entity has complied with Minimum Necessary and used reasonable safeguards. Do you have a documented policy and procedure regarding Incidental Disclosures that are permitted under HIPAA? Do Associates understand the difference between an "incidental" disclosure and those that are not permitted? 3 IUSM - HIPAA Privacy 2.0 Minimum Necessary - §164.502(b) and 164.514(d) Limit the amount of data to the minimum needed for a particular purpose Do you have documented policies and procedures that address the minimum amount of PHI needed for routine and recurring uses and disclosures: (NOTE: The practice plan should have procedures that explain the amount of PHI needed for common operational and payment processes - e.g. patient registration, handling requests for information/records, billing, etc.) - Have you identified routine and recurring uses and disclosures of PHI? - Have you defined the minimum amount of PHI needed for these routine and recurring uses and disclosures? - Have you trained Associates on these policies and procedures as it relates to their job functions - i.e. operational-level training? NOTE: General awareness training does not provide sufficient detail for explaining the amount of PHI that is appropriate for a worker to perform their job.

Privacy Audit Strategy Walk through audit What would a patient or visitor see or hear? Evaluation of written policies and current processes Compliance with IUSM policies Compliance with core requirements Notice of Privacy Practices (NPP) Authorizations Disclosures Accounting for Disclosures Complaint Process Employee Interviews Was the employee trained? What is the employee’s understanding of HIPAA? Does the employee understand his/her responsibilities? Does the employee know how to report any concerns involving privacy breaches?

IUSM Privacy Audit Strategy – Who’s on First? Factors to consider: Size of department number of employees Number of practice sites Department location – open or shared areas vs. private or more secure locations Sensitivity of PHI typically handled, i.e., psychotherapy notes, communicable diseases etc. Prior Training Availability of internal resources Existence of any prior complaints Compliance with HIPAA Privacy Workplan initiatives Human Subject Research Number of studies Type of studies Number of databases kept

Research Audit Game Plan IUPUI Research & Sponsored Programs will audit compliance with Research SOPs developed to address HIPAA Privacy Informed Consent and Authorization requirements Data Use Agreements Recruitment Strategies – compliance with recruitment checklists Representation made in IRB applications Summary Safeguards

Item SOP Section Requirement Interview Question Risk Value Compliant Needs Improvement Non-Compliant 1 SOP - 5.5 §164.514 Use of de-identified data for research Do the reviewed studies involve de-identified health information? If so, which de-identification method was used - Safe Harbor or statistical? - If Safe Harbor, were all 18 identifiers removed? (See 5.5.2 in the SOP for details.) - If Statistical, did someone with statistical expertise made this determination? Who? What methodology was used (e.g. what confidence interval) and was this documented? Are re-identification codes used? If so, how are they protected? Are re-identification codes ever stored with the de-identified data or given to a third party? 3   2 SOP - 5.6 §164.514(e) Research using limited data sets for research Do any of the sampled studies involve a Limited Data Set? If so, was a Data Use Agreement obtained with the recipient? Review sample of data and determine whether all direct identifiers were removed. (See Section 5.6.1 in the SOP for details.) SOP - 5.7 §164.512(i) Authorizations How/when do you obtain an authorization from a subject? (Have PI describe at what point they obtain an individual's authorization for the studies you are reviewing.) Has a subject ever refused to sign or asked you to change the authorization? How do you handle these situations? Has a subject ever revoked an authorization? If so, how did you handle and document the request? How/where are authorizations stored? Auditor Notes: Review the Summary Safeguard Statement and recruitment checklist to determine whether an authorization is required for recruitment and enrollment into the study. Does the authorization contain all the required elements? (See Section 5.7.1 of the SOP for details.)

Audit Expectations Mutual educational opportunity Initial Goals Identify areas of vulnerability Determine where areas of assistance are most needed, if additional education is required Provide a forum and opportunity for departments/practices to clarify issues Identify specific areas where targeted training is needed Determine if there are any systemic issues across all practice plans Prepare report for each department and for the IUSM Review findings against Risk Assessment done for Security