HIPAA Overview (Health Insurance Portability and Accountability Act 1996) May 2002 VACSB - HIPAA Committee.

Slides:



Advertisements
Similar presentations
HIPAA Privacy Practices. Notice A copy of the current DMH Notice must be posted at each service site where persons seeking DMH services will be able to.
Advertisements

Presented by Elena Chan, UCSF Pharm.D. Candidate Tiffany Jew, USC Pharm.D. Candidate March 14, 2007 P HARMACEUTICAL C ONSULTANTS, I NC. P RO P HARMA HIPAA.
1 Health Insurance Portability and Accountability Act of 1996 IS&C Expo October 16 & 17, 2002 John Wagner Governor’s Office of Technology.
HIPAA Basics Brian Fleetham Dickinson Wright PLLC.
HIPAA and Public Health 2007 Epi Rapid Response Team Conference.
HIPAA and Privacy An Overview of the New Federal Requirements of the Health Insurance Portability and Accountability Act (HIPAA) Reid Cushman, UM Ethics.
HIPAA Privacy Rule Training
Copyright Eastern PA EMS Council February 2003 Health Information Portability and Accountability Act It’s the law.
COBB/DOUGLAS COMMUNITY SERVICES BOARD Confidentiality and Privacy of Consumer Information.
HIPAA Privacy Training Your Name Here. © 2004 MHM Resources Inc.2 HIPAA Background Health Insurance Portability and Accountability Act of 1996.
HIPAA – Privacy Rule and Research USCRF Research Educational Series March 19, 2003.
Increasing public concern about loss of privacy Broad availability of information stored and exchanged in electronic format Concerns about genetic information.
The Health Insurance Portability and Accountability Act of 1996– charged the Department of Health and Human Services (DHHS) with creating health information.
HIPAA PRIVACY REQUIREMENTS Dana L. Thrasher Constangy, Brooks & Smith, LLC (205) ; Victoria Nemerson.
HIPAA Health Insurance Portability and Accountability Act.
What is HIPAA? This presentation was created by The University of Arizona Privacy Office, The Office for the Responsible Conduct of Research on March 5,
HIPAA The Hidden Beast June Kissinger Director, Risk Management Support Services March 12, 2003.
1 HIPAA Education CCAC Professional Development Training September 2006 CCAC Professional Development Training September 2006.
HIPAA Overview (Health Insurance Portability and Accountability Act 1996) PCS HIPAA Privacy Rule Training - 4/28/2015.
Managing Access to Student Health Information per Federal HIPAA Guidelines Joan M. Kiel, Ph.D., CHPS Duquesne University Pittsburgh, Penna
Presented by the Office of the General Counsel An Overview of HIPAA.
Presents: Weekly HIPAA Teleconference Revised
NAU HIPAA Awareness Training
TM The HIPAA Privacy Rule: Safeguarding Health Information in Research and Public Health Practice Centers for Disease Control and Prevention Beverly A.
Reviewing the World of HIPAA Stephanie Anderson, CPC October 2006.
HIPAA Privacy Rule Compliance Training for YSU April 9, 2014.
 The Health Insurance Portability and Accountability Act of  Federal Law designed to protect sensitive information.  HIPAA violations are enforced.
COMPLYING WITH HIPAA PRIVACY RULES Presented by: Larry Grudzien, Attorney at Law.
Are you ready for HIPPO??? Welcome to HIPAA
HIPAA HIPAA Health Insurance Portability and Accountability Act of 1996.
Professional Nursing Services.  Privacy and Security Training explains:  The requirements of the federal HIPAA/HITEC regulations, state privacy laws.
Overview of HIPAA Administrative Simplification and Privacy Regulations Darrel J. Grinstead, Partner Amy B. Kiesel, Associate Hogan & Hartson L.L.P.
Health Insurance Portability Accountability Act of 1996 HIPAA for Researchers: IRB Related Issues HSC USC IRB.
HIPAA Compliance Strategies for Employers, METs, MEWAs and Taft Hartley Union Trust Funds The HIPAA Colloquium at Harvard University Presented by: Melissa.
HIPAA Health Insurance Portability & Accountability Act of 1996.
HIPAA PRIVACY AND SECURITY AWARENESS.
“ Technology Working For People” Intro to HIPAA and Small Practice Implementation.
HIPAA Business Associates Leadership Group Meeting June 28, 2001.
1 Research & Accounting for Disclosures March 12, 2008 Leslie J. Pfeffer, BS, CHP Office of the Vice President for Research Administration Office of Compliance.
HIPAA The Privacy Rule Health Insurance Portability and Accountability Act of 1996 (HIPAA) The 104 th Congress passed the Act, Public Law ,
1 HIPAA OVERVIEW ETSU. 2 What is HIPAA? Health Insurance Portability and Accountability Act.
Copyright Fleisher & Associates A HIPAA PRIMER FOR PUBLIC HEALTH PEOPLE CPHA-N Conference 2003 January 30, 2003 Presented by: Steven M. Fleisher,
Health Insurance Portability and Accountability Act (HIPAA)
HIPAA – Developing an Understanding
“HIPAA Beyond April 14, 2003” n “BUILDING HIPAA COMPLIANCE” Beyond April 14, 2003”
1 HIPAA Health Insurance Portability and Accountability Act Budgeting Effectively for Good Faith Compliance.
Computerized Networking of HIV Providers Workshop Data Security, Privacy and HIPAA: Focus on Privacy Joy L. Pritts, J.D. Assistant Research Professor Health.
HIPAA Michigan Cancer Registrars Association 2005 Annual Educational Conference Sandy Routhier.
© 2009 The McGraw-Hill Companies, Inc. All rights reserved. 1 McGraw-Hill Chapter 2 The HIPAA Privacy Standards HIPAA for Allied Health Careers.
Medical Law and Ethics, Third Edition Bonnie F. Fremgen Copyright ©2009 by Pearson Education, Inc. Upper Saddle River, New Jersey All rights reserved.
Speak HIPAA Like a Native A Guide to Common HIPAA Nomenclature University of Miami Ethics Programs.
Health Insurance Portability and Accountability Act (HIPAA) CCAC.
Health Insurance Portability and Accountability Act of 1996 HIPAA Privacy Training for County Employees.
Understanding HIPAA (Health Insurandce Portability and Accountability Act)
© 2013 The McGraw-Hill Companies, Inc. All rights reserved. Ch 8 Privacy Law and HIPAA.
Chapter 7—Privacy Law and HIPAA
HIPAA Health Insurance Portability and Accountability Act of 1996.
Welcome….!!! CORPORATE COMPLIANCE PROGRAM Presented by The Office of Corporate Integrity 1.
HIPAA Overview Why do we need a federal rule on privacy? Privacy is a fundamental right Privacy can be defined as the ability of the individual to determine.
The Health Insurance Portability and Accountability Act of 1996 “HIPAA” Public Law
HIPAA Privacy Rule Training
10 Patient Confidentiality and HIPAA
What is HIPAA? HIPAA stands for “Health Insurance Portability & Accountability Act” It was an Act of Congress passed into law in HEALTH INSURANCE.
HIPAA CONFIDENTIALITY
Reid Cushman, UM Ethics Programs
HIPAA Administrative Simplification
HIPAA PRIVACY AWARENESS, COMPLIANCE and ENFORCEMENT
Disability Services Agencies Briefing On HIPAA
National Congress on Health Care Compliance
Presentation transcript:

HIPAA Overview (Health Insurance Portability and Accountability Act 1996) May 2002 VACSB - HIPAA Committee

Training Objectives  Provide an overview of HIPAA regulations.  Review Privacy Rule requirements.  Review Security Rule requirements.  Review Administrative requirements.  Provide HIPAA Committee “draft” templates.  Summarize most current proposed changes.  Learn how to insert a Hippo into your next presentation.

What is HIPAA? Fed. Regulation/law - Kennedy & Kassebaum  Improve “portability and continuity” of health insurance coverage.  Provide administrative simplification and consistency - Standard Code Sets and Transactions.  Assure privacy and security of confidential protected health care information (PHI).  Increase provider accountability - PHI.  Increase consumer rights - PHI.

What is the purpose of HIPAA ?  Identify provider responsibilities around PHI.  Reduce health care costs.  Reduce health care fraud and abuse.  Control use and disclosure of “protected health information” (PHI).  Regulate how PHI is transferred and managed by technology, individuals, and agencies.

Covered Entities Who Must Comply Health care organizations that capture & maintain individually identifiable health care data. Three categories:  Providers - conduct certain administrative and electronic transactions  Health care Plans  Clearinghouses

Covered Entities Plan i.e., Medicaid, Blue Cross/ Shield Provider i.e., CSB Clearinghouse i.e., Billing Company

Timelines for Compliance  Transactions and Code Sets - October 2003 (With Extension)  Privacy Regulations - April 2003  Security Regulations - Final regs. pending (Spring 2004?)

HIPAA Regulations  Electronic Transaction/Code Sets - Sets uniform standards (Administrative Simplification.)  Privacy Regulations - Identifies what health care information is protected.  Security Regulations - Identifies how information is to be protected.  Identifiers - Employer, Payer, National.

Health Care Operations Includes “general administrative and business functions” necessary for a covered entity to remain a viable business (i.e., audits, quality improvement functions, assessments.)

Health Information Any information recorded in any form or medium which:  Is created/received by a Covered Entity that creates, receives, uses, or transmits PHI,  Relates to the past, present, or future physical/mental health condition of an individual, their participation in, or payment for such services, and  Identifies the individual.

Protected Health Information (PHI) All individually identifiable health data or information collected, maintained, or transferred by a Covered Entity.

Protected Health Information (PHI)  Name  Address  Social Security #  Birth Date  Demographic info.  Medical Record #  address  Account numbers  License/Certificate #  Vehicle identifiers  Bio-metric identifiers  Telephone numbers  Place of employment  Full face photograph  Fax number  Health Plan number

De-identified information  Health information which is stripped of individual identifying elements.  In this form, remaining data would not be sufficient to identify the consumer.

Privacy Notice *  Written document - plain language.  Posted & shared with consumers.  Explains how PHI will be used/disclosed by provider.  Identifies consumer rights.  Lists provider duties to protect PHI.

Use vs. Disclosure Use Sharing, utilization, examination, & analysis of PHI maintained internally within the provider. Disclosure Release, transfer, access to, or sharing in any manner PHI outside the entity maintaining the information.

Minimum Necessary Rule Rule applies to Uses/Disclosures  Essential element of privacy protections.  Covered Entities must make reasonable efforts to limit use, disclosure, and request for PHI to the “minimum necessary” to accomplish the intended purpose.

Minimum Necessary Rule Asks - How much information is needed to achieve your purpose?  Applies to all forms of communication.  Use - Requires policies & procedures (P&P) classifying staff by role/position.  Disclosure - Requires P&P addressing criteria to limit disclosure & reviewing of requests.  With request - Must limit request to that which is necessary.

Access to PHI (Protected Health Info.)  Opportunity to approach, inspect, review, and make use of data or information.  Actions by a consumer or health care provider with appropriate authorization.

Consent and Authorization Consent  Document gives provider consent to carry out treatment, payment, or health care operations (TPO). Authorization *  AKA - “Release of Information.”  Document used for purposes other than TPO.

Electronic Transaction & Code Set Standards  National Electronic Standards - provides automated transfer of certain health care data between health care payers, plans, and providers.  Replaces nonstandard formats and code sets - with standard electronic transactions and codes sets.

Which Administrative & Financial Transactions?  Health claim or encounter information.  Eligibility for a health plan inquiry.  Referral certification & authorization.  Health care claim status.  Health care payment and remittance advice.  Health plan premium payments.  Enrollment & dis-enrollment in a health plan.  First report of injury.  Health claim attachments. And - Coordination of Benefits

Transaction/Code Sets Standards Code Sets Examples:  ICD - 9  CPT - 4  HCPCS  DSM IV Compliance Deadline with Extension: October 15, 2003

Benefits of Standardization of Electronic Transactions/Code Sets  Standardized Formats – Will reduce number of formats used for health care administrative and financial transactions nation-wide.  Billing becomes more efficient.  Internal administrative savings related to staffing, response to complaint calls, and billing reconciliation.

Privacy Rule  Applies to all protected health information (PHI).  Does not prohibit the exchange of PHI for treatment, payment, or health care operations (TPO) within agency.  Written Consent is required.

Privacy Rule Impacts  HR - employee PHI  Consents/Authorization  Privacy Notifications  Uses & Disclosures  Health care operations  Consumer access to & amendment of PHI  Business Associate Agreements  Provider responsibilities

Privacy Rule Highlights Protects privacy of medical records and covers:  Electronic records & printouts of records  Written records  Oral communications Consumers give Consent for routine PHI release purposes (TPO). Privacy Notice - documents consumer’s rights and the provider’s responsibilities.

Consumers Rights under HIPAA  Inspect/copy information (medical record).  Request to amend information if inaccurate or incomplete.  If request is denied - consumers may file a complaint with CSB or federal government.  Consumers may request Disclosure History - Disclosure other than those covered by TPO

Business Associate Agreements  Business Associates - Those entities that do things on our behalf with whom we share/give access to PHI.  Business Associate Agreements - Establish permitted uses, disclosures, and safeguards for PHI.

Privacy Compliance Will  Allow flow of PHI for treatment, payment, and related health care operations (TPO).  Prohibit flow of PHI unless voluntarily authorized by the consumer.  Allow consumers to know who is accessing their PHI outside of TPO use.  Allow consumers to obtain access to their records & request amendment of records if inaccurate or incomplete.

Provider Responsibilities  Provide formal complaint handling system.  Allow use of de-identified data.  Follow “minimum necessary” requirements.  Establish Business Associate Agreements.  Duty to mitigate damage if violations occur.  Establish sanctions for HIPAA violations.

Privacy Penalties Civil Penalty: $100 -$25,000 maximum/year/person/same/violation. Criminal Penalty: $50,000 - $250,000 Fines and 1-10 years in prison. Commercial Advantage/Personal Gain: $250,000 and 10 years in prison.

Consent Exceptions Consents not required for:  Indirect treatment relationships.  Inmates.  When required by law to treat (i.e., Court Ordered).  In case of substantial communication barriers.  In cases of emergencies.

Privacy Preemption HIPAA Will preempt state laws relating to PHI Except for those contrary to & more stringent than HIPAA.

Organizational Practices - Security  Staff training.  Role based access.  Remote access site security issues.  Electronic/wireless devices (i.e., laptops).  Gap Assessment. *  Authentication of users.

Organizational Practices - Security  Policies/procedures for workstation use.  Security of workstation locations.  Security Incident Reporting.  Termination procedures.  Media controls.  Audit trails.  Encryption.

Security Rule Deals with how PHI is secured:  Access to PHI.  Minimum Disclosure Rule.  Encryption/digital signatures.  Background checks.  Physical (facility) security. Final Security Rule – Pending.

HIPAA Identifier Standards Pending HIPAA Regulation  Employer ID  Provider ID  Payor ID Final Identifier Rule: Pending in HHS

Required Administrative Procedures  Designate Privacy & Security Officers.  Complete gap analysis. *  Develop a plan for HIPAA compliance.  Identify Business Associates and establish agreements.  Revise/develop P&P for HIPAA.  Provide & document HIPAA training.  Address access control issues.  Have internal audit processes in place.

Required Administrative Procedures  Develop formal Consumer Complaint Syst.  File - Extension: Code Sets/Transactions.  HIPAA Compliance Certification (IT)  Develop Disaster/Contingency Plans.  Identify security incident procedures.  Meet personnel security requirements.  Develop a security management system.  Identify Sanctions for violations.  Test your system.

Summary: Vocabulary  Covered Entity  PHI  TPO  Privacy Notice *  Consent  Authorization *  Minimum Necessary  Business Associate Agreement  De-identification of PHI

Proposed Changes  Strengthen Privacy Notice provisions.  Eliminate Consent - Acknowledge receipt of Privacy Notice.  Maintain “minimum necessary rule” while allowing treatment-related conversations.  Assure appropriate parental access to their children’s records. (state law will govern)  Prohibits use of records for marketing.  Assure privacy without impeding research.  Provide model business associate provisions.

Resources     

Resources     

For more information or questions on HIPAA please contact: Demetrios Peratsakis Executive Director Western Tidewater CSB or

HIPAA Committee Deliverables Drafts - Pending Attn.General’s Review  Policy  Fax Policy  Privacy Notice  Authorization Form  Extension Template –Trans./Code Sets  Internet Policy  Gap Analysis Survey Tools (3)  Glossary of HIPAA Terms

HIPAA Committee Deliverables Future Documents to be Released  Minimum Necessary Policy  Compliance Process Policy  Business Associate Agreement Template

Remember!!! Together we are making a difference... 8 May-02

As promised - How to insert a Hippo in your next PowerPoint Presentation: In MS PowerPoint  Go to “Insert”  Choose “Picture/Clip Art”  Type - “Hippopotamus.”  Pick your hippo and choose “Insert.”