HIPAA Policies, Procedures and Training Margret Amatayakul, RHIA, CHPS, FHIMSS President, Margret\A Consulting, LLC Steven S. Lazarus, PhD, FHIMSS Boundary.

Slides:



Advertisements
Similar presentations
HIPAA Security Presentation to The American Hospital Association Dianne Faup Office of HIPAA Standards November 5, 2003.
Advertisements

HIPAA Privacy Training. 2 HIPAA Background Health Insurance Portability and Accountability Act of 1996 Copyright 2010 MHM Resources LLC.
HIPAA. What Why Who How When What Is HIPAA? Health Insurance Portability & Accountability Act of 1996.
HIPAA Basic Training for Privacy & Information Security Vanderbilt University Medical Center VUMC HIPAA Website:
HIPAA Privacy Rule Training
Copyright Eastern PA EMS Council February 2003 Health Information Portability and Accountability Act It’s the law.
National Health Information Privacy and Security Week Understanding the HIPAA Privacy and Security Rule.
HIPAA PRIVACY REQUIREMENTS Dana L. Thrasher Constangy, Brooks & Smith, LLC (205) ; Victoria Nemerson.
Information Risk Management Key Component for HIPAA Security Compliance Ann Geyer Tunitas Group
Health Insurance Portability and Accountability Act (HIPAA)HIPAA.
1 HIPAA Education CCAC Professional Development Training September 2006 CCAC Professional Development Training September 2006.
Managing Access to Student Health Information per Federal HIPAA Guidelines Joan M. Kiel, Ph.D., CHPS Duquesne University Pittsburgh, Penna
NAU HIPAA Awareness Training
WHAT IS HIPAA? The Health Insurance Portability and Accountability Act of 1996 (HIPAA) provides certain protections for any of your health information.
Are you ready for HIPPO??? Welcome to HIPAA
Chapter 7 Control and AIS Copyright © 2012 Pearson Education, Inc. publishing as Prentice Hall 7-1.
Version 6.0 Approved by HIPAA Implementation Team April 14, HIPAA Learning Module The following is an educational Powerpoint presentation on the.
COMPLYING WITH HIPAA BUSINESS ASSOCIATE REQUIREMENTS Quick, Cost Effective Solutions for HIPAA Compliance: Business Associate Agreements.
Information Security Compliance System Owner Training Richard Gadsden Information Security Office Office of the CIO – Information Services Sharon Knowles.
© 2009 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill Career Education Computers in the Medical Office Chapter 2: Information Technology.
Notice of Privacy Practices Nebraska SNIP Privacy Subgroup July 18, 2002 Michael J. Brown, MHA, CPA Vice-President, Administrative & Regulatory Affairs,
HIPAA PRIVACY AND SECURITY AWARENESS.
“ Technology Working For People” Intro to HIPAA and Small Practice Implementation.
Health Insurance Portability and Accountability Act (HIPAA)
Copyright ©2011 by Pearson Education, Inc. Upper Saddle River, New Jersey All rights reserved. Health Information Technology and Management Richard.
How Hospitals Protect Your Health Information. Your Health Information Privacy Rights You can ask to see or get a copy of your medical record and other.
© 2009 The McGraw-Hill Companies, Inc. All rights reserved. 1 McGraw-Hill Chapter 2 The HIPAA Privacy Standards HIPAA for Allied Health Careers.
Health Insurance Portability and Accountability Act (HIPAA) CCAC.
Security Policies and Procedures. cs490ns-cotter2 Objectives Define the security policy cycle Explain risk identification Design a security policy –Define.
Davis Wright Tremaine LLP Case Study: Small Group Health Plan HIPAA Privacy Compliance for Employers September 15, 2003 Speaker Jason Froggatt Becky Williams.
Copyright © 2009 by The McGraw-Hill Companies, Inc. All Rights Reserved. McGraw-Hill Chapter 6 The Privacy and Security of Electronic Health Information.
Health Insurance Portability and Accountability Act of 1996 HIPAA Privacy Training for County Employees.
Understanding HIPAA (Health Insurandce Portability and Accountability Act)
Eliza de Guzman HTM 520 Health Information Exchange.
September 12, 2004 Simplifying the Administration of HIPAA Security Angel Hoffman, RN, MSN Director, Corporate Compliance University of Pittsburgh Medical.
© 2013 The McGraw-Hill Companies, Inc. All rights reserved. Ch 8 Privacy Law and HIPAA.
Chapter 7—Privacy Law and HIPAA
The Fifth National HIPAA Summit – October 30, 2002 What to Do Now: Operational Implementation of HIPAA Privacy and Security Training Presented by: Steven.
FleetBoston Financial HIPAA Privacy Compliance Agnes Bundy Scanlan Managing Director and Chief Privacy Officer FleetBoston Financial.
HIPAA BASIC TRAINING Presented by Anderson Health Information Systems, Inc.
HIPAA PRACTICAL APPLICATION WORKSHOP Orientation Module 1B Anderson Health Information Systems, Inc.
The Culture of Healthcare Privacy, Confidentiality, and Security Lecture d This material (Comp2_Unit9d) was developed by Oregon Health and Science University,
OHCAs, ACEs and Hybrid Entities Paul Smith Davis Wright Tremaine LLP One Embarcadero Center Suite 600 San Francisco, CA (415)
Rhonda Anderson, RHIA, President  …is a PROCESS, not a PROJECT 2.
Copyright © Emerson Strategic Group, Inc. All Rights Reserved 1 Ninth National HIPAA Summit Auditing for Privacy Compliance: A Case Study September.
1 Privacy Plan of Action © HIPAA Pros 2002 All rights reserved.
Copyright © 2015 by Saunders, an imprint of Elsevier Inc. All rights reserved. Chapter 3 Privacy, Confidentiality, and Security.
March 19, 2003 Audioconference Approaches to Compliance with the HIPAA Privacy and Security Workforce Training Requirements Presented by: Steven S. Lazarus,
Functioning as a Business Associate Under HIPAA William F. Tulloch Director, PCBA March 9, 2004.
The Health Insurance Portability and Accountability Act of 1996 “HIPAA” Public Law
Internal Audit Section. Authorized in Section , Florida Statutes Section , Florida Statutes (F.S.), authorizes the Inspector General to review.
The Medical College of Georgia HIPAA Privacy Rule Orientation.
New Hire HIPAA Orientation. HIPAA Overview HIPAA is an acronym that stands for the Health Insurance Portability and Accountability Act of HIPAA.
Lecture 5 Control and AIS Copyright © 2012 Pearson Education 7-1.
The Health Insurance Portability and Accountability Act (HIPAA) requires Plumas County to train all employees in covered departments about the County’s.
April 14, 2003 – HIPAA Privacy Audioconference The Importance of April 14, 2003: Where you should be regarding HIPAA privacy policies and procedures and.
HIPAA Privacy Rule Training
Acknowledgement The presenters acknowledge the contributions and suggestions of Margret Amatayakul, RHIA, CHPS, FHIMSS, President, Margret\A Consulting,
HIPAA Administrative Simplification
Paul T. Smith Davis Wright Tremaine LLP
Red Flags Rule An Introduction County College of Morris
Disability Services Agencies Briefing On HIPAA
Presented by: Steven S. Lazarus, PhD, FHIMSS
HIPAA Privacy and Security Summit 2018 HIPAA Privacy Rule: Compliance Plans, Training, Internal Audits and Patient Rights Widener University Delaware.
HIPAA Security Standards Final Rule
The Health Insurance Portability and Accountability Act
THE 13TH NATIONAL HIPAA SUMMIT HEALTH INFORMATION PRIVACY & SECURITY IN SHARED HEALTH RECORD SYSTEMS SEPTEMBER 26, 2006 Paul T. Smith, Esq. Partner,
Strategies to Comply with the HPAA Privacy Rule Before the HIPAA Security and Enforcement Rules are Final Presented by: Steven S. Lazarus, PhD, FHIMSS.
Introduction to the PACS Security
Presentation transcript:

HIPAA Policies, Procedures and Training Margret Amatayakul, RHIA, CHPS, FHIMSS President, Margret\A Consulting, LLC Steven S. Lazarus, PhD, FHIMSS Boundary Information Group, President Margret Amatayakul, RHIA, CHPS, FHIMSS President, Margret\A Consulting, LLC Steven S. Lazarus, PhD, FHIMSS Boundary Information Group, President Paul T. Smith Davis Wright Tremaine LLP The Sixth National HIPAA Summit

1 Privacy Training The Regulation “A covered entity must train all members of its workforce on the policies and procedures with respect to PHI required by this subpart, as necessary and appropriate for the members of the workforce to carry out their function.” (45 CFR (b)) The Regulation “A covered entity must train all members of its workforce on the policies and procedures with respect to PHI required by this subpart, as necessary and appropriate for the members of the workforce to carry out their function.” (45 CFR (b))

2 Deadlines  Training must be provided:  No later than April 14, 2003 (2004 for small health plans)  To new hires within a reasonable period  Retraining must be provided  After change in job functions  After change in policies and procedures  Training must be provided:  No later than April 14, 2003 (2004 for small health plans)  To new hires within a reasonable period  Retraining must be provided  After change in job functions  After change in policies and procedures

3 Documentation  Training must be documented--  Maintained in written or electronic form for 6 years.  What is not required  Employee acknowledgment or certification  Refresher training  Training must be documented--  Maintained in written or electronic form for 6 years.  What is not required  Employee acknowledgment or certification  Refresher training

4 What The Regulation Requires  The security requires security awareness and training for all personnel, including management, with the following “addressable” implementation specifications:  Periodic security reminders  Education on virus (“malicious software”) protection  Log-in monitoring  Password management  (45 CFR (a)(5))  The security requires security awareness and training for all personnel, including management, with the following “addressable” implementation specifications:  Periodic security reminders  Education on virus (“malicious software”) protection  Log-in monitoring  Password management  (45 CFR (a)(5))

5 Who Must be Trained?  Privacy  Workforce must be trained Employees Volunteers Students Independent contractors with assigned workstations (if CE chooses) Occasional workers  What about others? Medical staff Business associates  Privacy  Workforce must be trained Employees Volunteers Students Independent contractors with assigned workstations (if CE chooses) Occasional workers  What about others? Medical staff Business associates

6 Who Must be Trained?  Security  Was employees, agents and contractors, now just workforce (including management).  Role-based training optional.  Contractors must be aware of security policies, but do not need training.  Security  Was employees, agents and contractors, now just workforce (including management).  Role-based training optional.  Contractors must be aware of security policies, but do not need training.

7 Policy and Procedure Training  Responsibility of Privacy Official is “development and implementation of the policies and procedures of the entity.”  Cover—  Privacy administration  Physical protection  Technical safeguards  Use and disclosure  Sanctions and mitigation  Individual rights  Responsibility of Privacy Official is “development and implementation of the policies and procedures of the entity.”  Cover—  Privacy administration  Physical protection  Technical safeguards  Use and disclosure  Sanctions and mitigation  Individual rights

8 Policy and Procedure Development Business Rules More stringent state law Organizational Ethics Policies and Procedures Workforce Training HIPAA

9 Policy and Procedure Development  A HIPAA-Based Policy: “We restrict the use and disclosure of all individually identifiable health information. Individually identifiable health information is information that identifies or could be used to identify an individual, and that contains information about the individual’s health condition or health care, including payment for health care.”  An Alternative: “We treat all health care related information as confidential, whether or not it identifies an individual, or could be used to identify an individual.”  A HIPAA-Based Policy: “We restrict the use and disclosure of all individually identifiable health information. Individually identifiable health information is information that identifies or could be used to identify an individual, and that contains information about the individual’s health condition or health care, including payment for health care.”  An Alternative: “We treat all health care related information as confidential, whether or not it identifies an individual, or could be used to identify an individual.”

10 Policy and Procedure Training HIPAA Education Privacy Awareness Training Role-Based Policy and Procedure Training

11 Requirements  Flexible and scalable  You decide content and delivery  Classroom instruction  Videos  On-line training  Handbooks  HHS says one hour per employee, on average  Flexible and scalable  You decide content and delivery  Classroom instruction  Videos  On-line training  Handbooks  HHS says one hour per employee, on average

Training Case Studies: What Works and What To Watch Out For Margret Amatayakul, RHIA, CHPS, FHIMSS President, Margret\A Consulting, LLC Margret Amatayakul, RHIA, CHPS, FHIMSS President, Margret\A Consulting, LLC

13 Organization  Senior Management Oversight  Delivery Network Oversight  Focused Committees:  Privacy  Security  EDI  Education  Coordination through central project manager  Monthly meetings to address issues  Senior Management Oversight  Delivery Network Oversight  Focused Committees:  Privacy  Security  EDI  Education  Coordination through central project manager  Monthly meetings to address issues

14 Monthly Reporting  Project Status Summary  Task  Due Date  Percentage Complete*  On Target (Y/N)  Accomplishments  Next Steps  Issues/Concerns/Barriers  Project Status Summary  Task  Due Date  Percentage Complete*  On Target (Y/N)  Accomplishments  Next Steps  Issues/Concerns/Barriers

15 * Percentage Complete 100% = Final Draft Approved 95% = Summary to Education Committee 90% = Operational Issues Resolved and Second Draft Completed 75% = Work Flow and Forms Developed 50% = First Draft Completed 35% = First Draft Submitted for Review 25% = Document Template Reviewed and Questions Generated 10% = Document Template Received 0 = Not Started

16 Policy & Procedure Templates Make Operational Decisions Educational Summary

17 Forms “For Office Use Only” Structure Options

18 Mis-directed Fax Work Flow Accounting for Disclosures Disclosures Public Health Oversight Preparatory to Research Subpoena

19 Examples MarketingNot Marketing Communication A communication about product or service that encourages recipients to purchase or use product, unless... Covered entity describes health-related product or service, or makes a face-to- face communication/ provides promotional gift of nominal value. Provider allows diaper company sales rep to visit new mothers. Provider distributes diaper samples and/or coupons to new mothers. Provider gives list of patients on certain medications to pharmaceutical company for them to market drugs Providers gives sample drug, tells patient about certain drug, or sends brochure about certain drug to patients who would benefit from taking drug Provider sells list of patients to a local community college for them to sell smoking cessation and weight loss programs. Provider sends information about smoking cessation program it is providing to patients who are determined to be smokers.

20 Anticipate and Script  If:  Patient refuses to sign  Patient refuses to accept  Patient asks what this is  Patient asks for restrictions  If:  Patient refuses to sign  Patient refuses to accept  Patient asks what this is  Patient asks for restrictions  Then:  Check “no sign” in computer  Check “refused” in computer  Explain that this is …  Provide Request for Restrictions Form and refer to Supervisor

21 Gaining Approval Policy Name: Type: Number: Executive Sponsor: Status:  New  Revision Date: Summary: Essence of policy and procedure in two to three sentences. Impact: Affected Components: Identifies classes of workers/units most impacted. Operations: Critical elements that positively and/or negatively change the way the organization functions. Financial: Operational and capital cash outlays required as well as any return on investment and/or loss avoidance that can be quantified. Risk Assessment: Briefly describes the risk of not implementing the policy and procedure, and the residual risk after implementation. Reason: Describes why the policy and procedure is created/revised.

22 Decision Table Request for Restriction YesNoDocument Mail EOB to alternative address XBilling System Appointment Reminder XPMS Restrict Use to Dr. Smith Staff XEMR Restrict Use by Dr. Smith Nurse X Self PayRefer to Bus Mgr Billing System

23 Target Training Categorize by: Keywords or Policies & Procedures

24 Organize Training  Standards  Integrate policies and procedures  Refer to/link to policies and procedures  Notice of Privacy Practices  Topics  Categories  General Topics  Avoid focusing too much on HIPAA  And not enough on your operations  Standards  Integrate policies and procedures  Refer to/link to policies and procedures  Notice of Privacy Practices  Topics  Categories  General Topics  Avoid focusing too much on HIPAA  And not enough on your operations

25 Training Examples Based on NOPP Explains Specific Policy Incorporates Provider’s Own Values (Privacy is not new!)

26 What to Watch Out For!  It is easy to create policies and procedures that reflect the rules,  It is more difficult to create policies and procedures that reflect how things will actually work in your environment  It is easy to buy, or even develop, training materials that are generic,  It is more difficult to efficiently and effectively incorporate your specific policies and procedures into the training  It is easy to plan a massive training roll out,  It is more difficult to achieve full compliance on training,  Let alone get everyone to understand what to do,  It is even more difficult to ensure that compliance lasts  Although the Privacy Rule does not require awareness building or reminders, this is critical for ongoing compliance  It is easy to create policies and procedures that reflect the rules,  It is more difficult to create policies and procedures that reflect how things will actually work in your environment  It is easy to buy, or even develop, training materials that are generic,  It is more difficult to efficiently and effectively incorporate your specific policies and procedures into the training  It is easy to plan a massive training roll out,  It is more difficult to achieve full compliance on training,  Let alone get everyone to understand what to do,  It is even more difficult to ensure that compliance lasts  Although the Privacy Rule does not require awareness building or reminders, this is critical for ongoing compliance Does every one need to be trained in every thing? But don’t leave out critical staff!

Advanced Strategies in Complying with the HIPAA Workforce Training Requirement Steven S. Lazarus, PhD, FHIMSS Boundary Information Group, President Train for Compliance, Inc., Vice Chair Workgroup for Electronic Data Interchange (WEDI), Past Chair Steven S. Lazarus, PhD, FHIMSS Boundary Information Group, President Train for Compliance, Inc., Vice Chair Workgroup for Electronic Data Interchange (WEDI), Past Chair

28 Achieving Effective Privacy and Security  Need good Security to achieve Privacy  Privacy Regulation requires Security  Reminders, periodic training, and “breach monitoring” reporting and management will be needed to achieve effective Privacy  Need to train the workforce on the organization’s policies and procedures for Privacy and Security  Need good Security to achieve Privacy  Privacy Regulation requires Security  Reminders, periodic training, and “breach monitoring” reporting and management will be needed to achieve effective Privacy  Need to train the workforce on the organization’s policies and procedures for Privacy and Security

29 Policies and Procedures  Privacy Administration  § (i) and (b)  Process for developing, adopting and amending of privacy policies and procedures, making any necessary changes to the Notice of Privacy Practices, and retaining copies  Privacy Administration  § (i) and (b)  Process for developing, adopting and amending of privacy policies and procedures, making any necessary changes to the Notice of Privacy Practices, and retaining copies

30 Policies and Procedures  Including overriding principles (policy)  Detail practices  Identify responsible individual or department  Define specific operational processes  Require enough detail so that the workforce knows what to do  Develop to fit the clinical and business operations of the covered entity  Must not just repeat or summarize the Regulations  Privacy policies and procedures must reflect state laws that are more restrictive  Including overriding principles (policy)  Detail practices  Identify responsible individual or department  Define specific operational processes  Require enough detail so that the workforce knows what to do  Develop to fit the clinical and business operations of the covered entity  Must not just repeat or summarize the Regulations  Privacy policies and procedures must reflect state laws that are more restrictive

31 Examples of Forms for Policies and Procedures  Notice of Privacy Practice acknowledgement form  Notice of Privacy Practice non-acceptance form  Inventory of Business Associates  Patient Authorization  Certificate for completing training  Incident Report  Notice of Privacy Practice acknowledgement form  Notice of Privacy Practice non-acceptance form  Inventory of Business Associates  Patient Authorization  Certificate for completing training  Incident Report

32 Organizing Policy and Procedure Development and Revision  Chief Information Privacy Official  Chief Information Security Official  Workgroups  Privacy  Security  Transactions, Code Sets and Identifiers  Education/training  Chief Information Privacy Official  Chief Information Security Official  Workgroups  Privacy  Security  Transactions, Code Sets and Identifiers  Education/training

33 Policy and Procedure Development Process  Gap analysis of existing policies and procedures  Identify needed changes  Develop new/revised policies and procedures  Approve policies and procedures  Replace former policies and procedures  Train the workforce on the policies and procedures  Gap analysis of existing policies and procedures  Identify needed changes  Develop new/revised policies and procedures  Approve policies and procedures  Replace former policies and procedures  Train the workforce on the policies and procedures

34 Training Issues and Options  Define workforce categories  Few workforce categories Easy to administer  Assign workforce to courses Less customization to create and maintain  Many workforce categories May be difficult to administer  Complex management of workforce to training content choices Potential to highly customize content to workforce categories  Define workforce categories  Few workforce categories Easy to administer  Assign workforce to courses Less customization to create and maintain  Many workforce categories May be difficult to administer  Complex management of workforce to training content choices Potential to highly customize content to workforce categories

35 Training Issues and Options  Practical Issues  Identify source of workforce lists, identifications and passwords  Include employees, physicians, volunteers, long-term contract renewal (e.g., Medical Director in a health plan)  Use Human Resource application if capable Names Job categories Identifications and passwords from another source  Keep passwords and identifications secure  Practical Issues  Identify source of workforce lists, identifications and passwords  Include employees, physicians, volunteers, long-term contract renewal (e.g., Medical Director in a health plan)  Use Human Resource application if capable Names Job categories Identifications and passwords from another source  Keep passwords and identifications secure

36 Training Issues and Options  Tests  Use to document learning for compliance  Set passing score  Consider Continuing Education credits (can not change content significantly and maintain credits)  Tests  Use to document learning for compliance  Set passing score  Consider Continuing Education credits (can not change content significantly and maintain credits)

37 Training Issues and Options  Training Options  In person – classroom Can customize Questions and answers addressed by trainer Difficult to schedule for new workforce members Can use paper or automated testing  Training Options  In person – classroom Can customize Questions and answers addressed by trainer Difficult to schedule for new workforce members Can use paper or automated testing

38 Training Issues and Options  Video or Workbooks  Can not customize  No questions and answers  Need VCRs and/or supply of Workbooks  Video or Workbooks  Can not customize  No questions and answers  Need VCRs and/or supply of Workbooks

39 Training Issues and Options  E Learning  May be able to customize  Limited questions and answers  Flexible schedule for training for current and new workforce  Can integrate training with organization’s policies and procedures  There may be technological barriers depending on delivery mode  Automated testing and learning reinforcement  E Learning  May be able to customize  Limited questions and answers  Flexible schedule for training for current and new workforce  Can integrate training with organization’s policies and procedures  There may be technological barriers depending on delivery mode  Automated testing and learning reinforcement

40 Training Cost  Cost/Budget  Product Fixed price Per course per person Maintenance  Customized setup Policies and Procedures State Law pre-emption for Privacy CEs Assign courses to individuals  Cost/Budget  Product Fixed price Per course per person Maintenance  Customized setup Policies and Procedures State Law pre-emption for Privacy CEs Assign courses to individuals

41 Training Cost  Workforce training time  Salaries and benefits  CE offset  CE value/budget  Technology  Several VCRs, monitors, and rooms, website  Support – internal and external  Administrative  Record keeping  Management  Workforce training time  Salaries and benefits  CE offset  CE value/budget  Technology  Several VCRs, monitors, and rooms, website  Support – internal and external  Administrative  Record keeping  Management

42 Setup Issues  Setup Time and Resources  Assignment of internal staff/outsource  Initially may require dedicated staff, rooms, and equipment  Pilot Training  Evaluate learning  Setup Time and Resources  Assignment of internal staff/outsource  Initially may require dedicated staff, rooms, and equipment  Pilot Training  Evaluate learning

43 Achieving Effective Privacy  Need good Security to achieve Privacy  Privacy Regulation requires Security  Reminders, periodic training, and incident monitoring” reporting and management will be needed to achieve effective Privacy  Need good Security to achieve Privacy  Privacy Regulation requires Security  Reminders, periodic training, and incident monitoring” reporting and management will be needed to achieve effective Privacy

Contact Information  Paul Smith  Davis Wright Tremaine, LLP  Tel    Margret Amatayakul, RHIA, CHPS, FHIMSS  Margret\A Consulting, LLC  Tel   www. Margret-A.com  Steve Lazarus, PhD, FHIMSS  Boundary Information Group  Tel    Paul Smith  Davis Wright Tremaine, LLP  Tel    Margret Amatayakul, RHIA, CHPS, FHIMSS  Margret\A Consulting, LLC  Tel   www. Margret-A.com  Steve Lazarus, PhD, FHIMSS  Boundary Information Group  Tel  