HIPAA CASE STUDY- BREACHES OF PHI IN HEALTHCARE Amanda Foster Erin Frankenberger.

Slides:



Advertisements
Similar presentations
HIPAA: An Overview of Transaction, Privacy and Security Regulations Training for Providers and Staff.
Advertisements

HITECH ACT Privacy & Security Requirements Cathleen Casagrande Privacy Officer July 23, 2009.
HIPAA and Public Health 2007 Epi Rapid Response Team Conference.
1. As a Florida KidCare community partner families entrust you to not only help them navigate the Florida KidCare system but to keep the information they.
Health Insurance Portability and Accountability Act HIPAA Education for Volunteers and Students.
HIPAA – Privacy Rule and Research USCRF Research Educational Series March 19, 2003.
Increasing public concern about loss of privacy Broad availability of information stored and exchanged in electronic format Concerns about genetic information.
HIPAA What’s New? What Is HIPAA Health Insurance Portability and Accountability Act of 1996 Health Insurance Portability and Accountability Act.
WORKFORCE CONFIDENTIALITY HIPAA Reminders. HIPAA 101 The Health Insurance Portability and Accountability Act (HIPAA) protects patient privacy. HIPAA is.
HIPAA Health Insurance Portability and Accountability Act.
Changes to HIPAA (as they pertain to records management) Health Information Technology for Economic Clinical Health Act (HITECH) – federal regulation included.
What is HIPAA? This presentation was created by The University of Arizona Privacy Office, The Office for the Responsible Conduct of Research on March 5,
Health Insurance Portability and Accountability Act (HIPAA)HIPAA.
Key Changes to HIPAA from the Stimulus Bill (ARRA) Children’s Health System Department Leadership Meeting October 28, 2009 Kathleen Street Privacy Officer/Risk.
NAU HIPAA Awareness Training
Informed Consent.
 Health Care Information Portability and Accountability Act  Passed in 1996  2 objectives 1) Ensure people could maintain health insurance between.
HIPAA Regulations What do you need to know?.
 The Health Insurance Portability and Accountability Act of  Federal Law designed to protect sensitive information.  HIPAA violations are enforced.
Health Insurance Portability & Accountability Act “HIPAA” To every patient, every time, we will provide the care that we would want for our own loved ones.
HIPAA THE PRIVACY RULE Reviewed December HISTORY In 2000, many patients that were newly diagnosed with depression received free samples of anti-
Jill Moore April 2013 HIPAA Update: New Rules, New Challenges.
Free HIPAA Training BCI Computers Free HIPAA Training (c) 2014 BCI Computers all rights reserved.
Professional Nursing Services.  Privacy and Security Training explains:  The requirements of the federal HIPAA/HITEC regulations, state privacy laws.
HIPAA Training Presentation for New Employees How did we get here? HIPAA Police 1.
Health information security & compliance
CCHAP Practice Manager’s Meeting HIPAA Guidelines and Updates for Primary Care Practices Thursday October 24 th 2013 Noon – 1:00PM Instructions to join.
Health Insurance Portability & Accountability Act (HIPAA)
March 19, 2009 Changes to HIPAA Privacy and Security Requirements Joel T. Kopperud Scott A. Sinder Rhonda M. Bolton.
Walking Through the Breach Notification Process - Beginning to End HIPAA COW Presentation and Panel April 8, 2011.
© Copyright 2014 Saul Ewing LLP The Coalition for Academic Scientific Computation HIPAA Legal Framework and Breach Analysis Presented by: Bruce D. Armon,
HIPAA What’s Said Here – Stays Here…. WHAT IS HIPAA  Health Insurance Portability and Accountability Act  Purpose is to protect clients (patients)
HIPAA: It Doesn’t Only Impact Medical Records Basic HIPAA Stuff and Overall Information Protection 1.
HIPAA COMPLIANCE IN YOUR PRACTICE MARIBEL VALENTIN, ESQUIRE.
HIPAA Health Insurance Portability & Accountability Act of 1996.
East Carolina University HIPAA Privacy
Columbia University Medical Center Health Insurance Portability and Accountability Act of 1996 (“HIPAA”) Privacy & Information Security Training 2009.
Protected Health Information (PHI). Privileged Communication An exchange of information between two individuals in a confidential relationship. (Examples:
Paula Peyrani, MD Medical/Project Director, HIV Program at the 550 Clinic Assistant Director, Research Design and Development Clinical and Translational.
HIPAA PRIVACY AND SECURITY AWARENESS.
HIPAA Business Associates Leadership Group Meeting June 28, 2001.
1 Research & Accounting for Disclosures March 12, 2008 Leslie J. Pfeffer, BS, CHP Office of the Vice President for Research Administration Office of Compliance.
1 HIPAA OVERVIEW ETSU. 2 What is HIPAA? Health Insurance Portability and Accountability Act.
HIPAA Privacy and Research August 21, 2015
HIPAA Training Developed for Ridgeview Institute 2012 Hospital Wide Orientation.
Medical Law and Ethics, Third Edition Bonnie F. Fremgen Copyright ©2009 by Pearson Education, Inc. Upper Saddle River, New Jersey All rights reserved.
HIPAA THE PRIVACY RULE. 2 HISTORY In 2000, many patients that were newly diagnosed with depression received free samples of anti- depressant medications.
HealthBridge is one of the nation’s largest and most successful health information exchange organizations. Tri-State REC: Privacy and Security Issues for.
HIPAA Health Insurance Portability and Accountability Act of 1996.
HITECH and HIPAA Presented by Rhonda Anderson, RHIA Anderson Health Information Systems, Inc
Snowe Amendment to the Wired Act William F. Pewen, Ph.D., M.P.H. Office of Senator Olympia J. Snowe, ME (202)
Welcome….!!! CORPORATE COMPLIANCE PROGRAM Presented by The Office of Corporate Integrity 1.
Western Asset Protection
Top 10 Series Changes to HIPAA Devon Bernard AOPA Reimbursement Services Coordinator.
Configuring Electronic Health Records Privacy and Security in the US Lecture b This material (Comp11_Unit7b) was developed by Oregon Health & Science University.
HIPAA Overview Why do we need a federal rule on privacy? Privacy is a fundamental right Privacy can be defined as the ability of the individual to determine.
CH 10. Confidentiality A. Confidentiality about sensitive medical information is necessary to preserve the patient’s dignity. B. In order to receive payment.
AND CE-Prof, Inc. January 28, 2011 The Greater Chicago Dental Academy 1 Copyright CE-Prof, Inc
HIPAA TRIVIA Do you know HIPAA?. HIPAA was created by?  The Affordable Care Act  Health Insurance companies  United States Congress  United States.
Reviewed by: Gunther Kohn Chief Information Officer, UB School of Dental Medicine Date: October 20, 2015 Approved by: Sarah L. Augustynek Compliance Officer,
The Health Insurance Portability and Accountability Act 
Developed for Ridgeview Institute 2015 Hospital Wide Orientation
ELECTRONIC HEALTH RECORD PRIVACY TRAINING
HIPAA PRIVACY & SECURITY TRAINING
What is HIPAA? HIPAA stands for “Health Insurance Portability & Accountability Act” It was an Act of Congress passed into law in HEALTH INSURANCE.
HIPAA & PHI TRAINING & AWARENESS
The Health Insurance Portability and Accountability Act
From Baby Boomers to Millennials
Presentation transcript:

HIPAA CASE STUDY- BREACHES OF PHI IN HEALTHCARE Amanda Foster Erin Frankenberger

Healthcare Security Breach Facts 61% of organizations are not confident of where PHI is physically located 69% of hospitals don’t have the proper controls or policies to detect and respond to breaches 29% of hospitals feel that protection of PHI is a priority Between over 18 million patient records were breached Between there was an increase of 32% in the amount of records breached. Laptops and other portable devices (tablets, smartphones etc.) are the number one cause for PHI breaches. (Redspin, 2011)

Case study: HHS Settlement 2010 a Physician’s laptop was stole while abroad Computer contained PHI Information was not encrypted Massachusetts Hospital reported the incident to HHS HHS found six areas of noncompliance with HIPAA privacy and security rules. Hospital did not have to admit guilt HHS was paid $1.5 million in a settlement

What is HIPAA? The Health Portability and Accountability Act of 1996 Provides continuity of care Control’s fraud Assists in controlling abuse in healthcare Reduce healthcare costs Guarantee security and privacy of health information

What is PHI? Names Geographical identifiers Dates directly related to the individual Phone numbers Fax numbers addresses Social security numbers MR numbers Health Insurance beneficiary numbers Account numbers Certificate/license numbers Vehicle identifiers (license plate, serial numbers...) Device identifiers URL’s IP address numbers Biometric identifiers (finger prints, retinal and voice prints) Full face photographic images Any other unique identifying code or characteristic

What is considered a Breach? Unauthorized use or disclosure of PHI Anything that may compromise the security or privacy of PHI If the disclosure poses a significant risk to the individual Some exceptions: a) unintentional access by an employee b) case of inadvertent disclosure of PHI

What is the Main Cause of PHI Breaches in the Healthcare Industry? Main cause is lost or stolen laptops. A growing concern is ‘BYOD’ or bring your own device includes the use of: a) Smart phones b) Tablets c) Any other high tech data collecting device

What is encryption of data? Encryption technology uses cryptography to code digital data and information.(LaTour, 2010) Information can be transmitted over communications media, and the sender will know that only the recipient can make sense of the information There is symmetric or single-key encryption, where the computer software assigns a secret key or code For the encryption to work, both the sending computer and the receiving computer must have the same key The second type of encryption is asymmetric also known as public key infrastructure (PKI) in which both computers are not required to have the same key to decode messages There is a private key that belongs to one computer and a public key is given to the desired computer in which it wants to exchange the encrypted data

What other protective measures can be implemented to prevent PHI breaches from occurring? Firewalls are hardware and software security devices situated between the routers of a private and public network(LaTour, 2010) They protect computer networks from any unauthorized outside users and they can also protect entities within a single network Audit trails are another preventative measure which can provide evidence of computer system utilization These chronological sets of records can assist in determining if there were any security violations, and can often identify areas for improvement Some suggested data elements that are tracked in healthcare information systems audit trails are: date and time of event,patient ID, user ID, access device used, type of action (read, print, update, or add), source of access, software application used, reason for access (patient care, research, billing, etc)

Are there any regulations or legislation in place for the use of mobile devices? Mobile Health Applications (mHealth apps) are coming under the microscope in legislation There is no formal regulation regarding how PHI is collected through mobile devices Hank Johnson, a representative from Georgia proposed the Application Privacy, Protection and Security Act of 2013 (APPS) It is only in the draft phase, but if it were to be approved developers would have to disclose how they collect personal data and what other parties would have access to this data

What are the repurcussions of breaching PHI? Civil: $50,000 per incident, up to$1.5 million per calendar year for violations that are not corrected Criminal: $50,000 to $250,000 in fines and up to 10 years in prison In addition, institutions that fail to correct a HIPAA violation may be fined up to $50,000 per violation.

When must a breach be reported and to whom? The HHS website states that once a breach has been identified, the covered entities must inform the affected individuals A written notice by first class mail or if the individual elected to receive notices electronically The notifications have to be provided no later than 60 days following the breach discovery The written notice must include a description of the breach and the steps the individuals must take to protect themselves from harm There should also be included, information regarding what the covered entity is doing to investigate the breech, and how they will prevent future breaches After notifying the media, they must contact the Secretary through the HHS website, and they must fill out a breach report form. If more than 500 individuals are involved, then the covered entities are required to provide notice to media outlets serving the State or jurisdiction (usually done in a press release) Then they must notify the Secretary within 60 days If there were less than 500 patients affected they would then report the breach on an annual basis If the breach happens due to a business associate, they must notify the covered entity following the discovery of the breech.

To improve the situation... There should be tighter standards for the use of electronic devices The use of personal devices should be prohibited Office devices (laptops) should not be allowed outside of the facility Organizations should stritly adhere to policies and procedures involving electronics

References Breaches Affecting 500 or More Individuals. (2013, February 7). United States Department of Health and Human Services. Retrieved from Dolan, P. L. (2012, September 28). Large settlement for data breach sends message to lock up laptops and smartphones - amednews.com. American Medical News. Retrieved from assn.org/amednews/2012/09/24/bisg0928.htm Latour, K.M., & Eichenwald, S. (2010). Health information management: concepts, principles, and practice (3rd ed). Chicago, Ill.: AHIMA.

References Low-Tech Security Risks Still Leading Cause of Breaches. (2011, July 19). Journal of AHIMA. Retrieved February 18, 2013, from tech-security-risks-still-leading-cause-of- breaches/?mobile_switch=mobile Nordqvist, C. (2012, December 7). Data Breaches - A Growing Problem In Healthcare Organizations. Medical News Today: Health News. Retrieved from Redspin. (n.d.). Breach Report 2011 Protected Health Information. Retrieved from