1 Craig D. Azoff, Director Administrative Information Systems Bill Luecken, Senior Director Information Systems Eric Steinhardt, Security Manager 13 th.

Slides:



Advertisements
Similar presentations
Creating HIPAA-Compliant Medical Data Applications with Amazon Web Services Presented by, Tulika Srivastava Purdue University.
Advertisements

Health Insurance Portability and Accountability Act HIPAA Education for Volunteers and Students.
HIPAA. What Why Who How When What Is HIPAA? Health Insurance Portability & Accountability Act of 1996.
HIPAA Privacy Rule Training
Copyright Eastern PA EMS Council February 2003 Health Information Portability and Accountability Act It’s the law.
National Health Information Privacy and Security Week Understanding the HIPAA Privacy and Security Rule.
Increasing public concern about loss of privacy Broad availability of information stored and exchanged in electronic format Concerns about genetic information.
The Health Insurance Portability and Accountability Act of 1996– charged the Department of Health and Human Services (DHHS) with creating health information.
Health Insurance Portability and Accountability Act (HIPAA)HIPAA.
Managing Access to Student Health Information per Federal HIPAA Guidelines Joan M. Kiel, Ph.D., CHPS Duquesne University Pittsburgh, Penna
Westbrook Technologies from Document Management’s Role in HIPAA.
HIPAA How It Is Affecting Information Systems Within Companies Around Us.
CHAPTER © 2011 The McGraw-Hill Companies, Inc. All rights reserved. 2 The Use of Health Information Technology in Physician Practices.
Reviewing the World of HIPAA Stephanie Anderson, CPC October 2006.
HIPAA: FEDERAL REGULATIONS REGARDING PATIENT SECURITY.
© 2011 The McGraw-Hill Companies, Inc. All rights reserved. 2.5 HIPAA Legislation and its Impact on Physician Practices 2-15 The Health Insurance Portability.
Are you ready for HIPPO??? Welcome to HIPAA
Free HIPAA Training BCI Computers Free HIPAA Training (c) 2014 BCI Computers all rights reserved.
2 The Use of Health Information Technology in Physician Practices.
DATA SECURITY Social Security Numbers, Credit Card Numbers, Bank Account Numbers, Personal Health Information, Student and/or Staff Personal Information,
HIPAA What’s Said Here – Stays Here…. WHAT IS HIPAA  Health Insurance Portability and Accountability Act  Purpose is to protect clients (patients)
Beyond HIPAA, Protecting Data Key Points from the HIPAA Security Rule.
ELECTRONIC MEDICAL RECORDS By Group 5 members: Kinal Patel David A. Ronca Tolulope Oke.
Security and Confidentiality Practices - Houston Dept. of Health and Human Services Jerald Harms, MPH, CART and Jeff Meyer, MD, MPH HIV/AIDS Surveillance.
HIPAA Basic Training for Privacy and Information Security Vanderbilt University Medical Center VUMC HIPAA Website: HIPAA Basic.
SECURITY: Personal Health Information Protection Act, 2004 this 5 min. course covers: changing landscape of electronic health records security threats.
Information Security Technological Security Implementation and Privacy Protection.
The Use of Health Information Technology in Physician Practices
HIPAA PRIVACY AND SECURITY AWARENESS.
“ Technology Working For People” Intro to HIPAA and Small Practice Implementation.
Public Employees Retirement System October 31, 2007 Eric Sokol, CSD Administrator Jeffrey Marecic, ISD Administrator Senate Bill 583 Implementation.
Health Insurance Portability and Accountability Act (HIPAA)
Copyright ©2011 by Pearson Education, Inc. Upper Saddle River, New Jersey All rights reserved. Health Information Technology and Management Richard.
HIPAA Presentation Washington D.C April 26, 2002 Presenter: Alice Polley, Vice President Clinical Services, Integrity Officer.
Working with Health IT Systems Protecting Privacy, Security, and Confidentiality in HIT Systems Lecture a This material (Comp7_Unit7a) was developed by.
Group 3 Angela, Rachael, Misty, Kayelee, and Krysta.
HIPAA Michigan Cancer Registrars Association 2005 Annual Educational Conference Sandy Routhier.
LeToia Crozier, Esq., CHC Vice President, Compliance & Regulatory Affairs Corey Wilson Director of Technical Services & Security Officer Interactive Think.
Understanding HIPAA (Health Insurandce Portability and Accountability Act)
© 2013 The McGraw-Hill Companies, Inc. All rights reserved. Ch 8 Privacy Law and HIPAA.
Chapter 7—Privacy Law and HIPAA
The Fifth National HIPAA Summit – October 30, 2002 What to Do Now: Operational Implementation of HIPAA Privacy and Security Training Presented by: Steven.
Ali Pabrai, CISSP, CSCS ecfirst, chairman & ceo Preparing for a HIPAA Security Audit.
HIPAA BASIC TRAINING Presented by Anderson Health Information Systems, Inc.
HIPAA BASIC TRAINING MODULE 1C – Overview (For staff who do not generally create Protected Health Information) Anderson Health Information Systems, Inc.
Patient Confidentiality and Electronic Medical Records Ann J. Olsen, MBA, MA Information Security Officer and Director, Information Management Planning.
HIPAA THE PRIVACY RULE. 2 HISTORY In 2000, many patients that were newly diagnosed with depression received free samples of anti- depressant medications.
Rhonda Anderson, RHIA, President  …is a PROCESS, not a PROJECT 2.
Working with HIT Systems
Medical Manager Unit 9 ICBS 170. Medical Manager Electronic Data Interchange (EDI)  Ability to request, receive, transfer and integrate information electronically.
HIPAA Health Insurance Portability and Accountability Act of 1996.
Component 3-Terminology in Healthcare and Public Health Settings Unit 16-Definitions and Concepts in the EHR This material was developed by The University.
Standard Unique Health Identifier for Health Care Providers April 9, th Annual HIPAA Summit Gail Kocher Highmark.
Welcome….!!! CORPORATE COMPLIANCE PROGRAM Presented by The Office of Corporate Integrity 1.
HIPAA History March 3, HIPAA Ruling Health Insurance Portability Accountability Act Health Insurance Portability Accountability Act Passed by Congress.
Working with HIT Systems Unit 7a Protecting Privacy, Security, and Confidentiality in HIT Systems This material was developed by Johns Hopkins University,
Final HIPAA Rule Special Training What you need to know to remain compliant with the new regulations.
HIPAA TRIVIA Do you know HIPAA?. HIPAA was created by?  The Affordable Care Act  Health Insurance companies  United States Congress  United States.
HIPAA Training. What information is considered PHI (Protected Health Information)  Dates- Birthdays, Dates of Admission and Discharge, Date of Death.
COMMUNITY-WIDE HEALTH INFORMATION EXCHANGE: HIPAA PRIVACY AND SECURITY ISSUES Ninth National HIPAA Summit September 14, 2004 Prepared by: Robert Belfort,
The Health Insurance Portability and Accountability Act 
Hidden HIPAA Weaknesses: How to Tackle Them and Prevent a Breach
Electronic Health Records (EHR)
HIPAA.
HIPAA PRIVACY AWARENESS, COMPLIANCE and ENFORCEMENT
Disability Services Agencies Briefing On HIPAA
Arizona House Calls CareLink
The Health Insurance Portability and Accountability Act
Introduction to the PACS Security
Colorado “Protections For Consumer Data Privacy” Law
Presentation transcript:

1 Craig D. Azoff, Director Administrative Information Systems Bill Luecken, Senior Director Information Systems Eric Steinhardt, Security Manager 13 th Annual HIPAA Summit September 26, 2006

2 Most HIPAA seminars and lectures tend to favor topics relating to acute hospitals or doctors’ offices. Non-acute facilities, like MJHS, face separate challenges. In this lecture we talk about: Acute vs. Non-Acute MJHS as a non-acute facility “Unique” Challenges MJHS Approach to Compliance

3  “Operational” Definition  Acute = Doctor’s Office, Hospital, Emergency Room  Non-Acute = Long-Term Care Facility, Hospice, Homecare, Palliative Care, HMOs  Dictionary Definition  Acute (Merriam-Webster On-Line) = having a sudden onset, sharp rise, and short course OR being, providing, or requiring short-term medical care (as for serious illness or traumatic injury)  Non-Acute = obviously, the opposite of acute; long term medical care

4

5  Corporate Issues  PHI on Tablet PCs  Home Health Aide Vendors  Wound Care Pictures

6  All Employees of MJHS; encryption needed?  Various Reporting Requirements  secure transmission vitally important  837s and 835s  BAAs amongst entities  NPI – multiple core applications  Corporate-wide Disaster Recovery Plan  Lack of funding – little $ in corporate budget for HIPAA  Users lack of technical expertise

7  PHI “floating around” on tablet PCs  80 current users – eventually 450 across 5 agencies  Data usually does not “leave the building” in acute care environment  Minimum necessary issues  Protecting PHI and securing network access  Easy user access to data

8  Home Health Aide Vendors  Desire to have HHA vendor submit electronic invoice  Some vendors are small with limited technical resources  File format – need to meet EDI transaction rules?

9  Field Nurses take pictures of patient wounds to send to a consultant  Pictures put on disk then handed to consultant; delays treatment decisions  Only a few shared cameras resulting in availability and pick-up issues  Request to provide nurses with ability to take pictures and transmit securely to consultant

10

11

12

13

14  FIRST RESPONSE – use login IDs and passwords  Windows, VPN, Groupwise, Network, Application, Disk encryption passwords  Secure policy, but Help Desk nightmare  FINAL COMPROMISE  Policy – no ePHI stored locally  No Microsoft Office apps on mobile devices, just viewer only  VPN accounts – specific to device, not user  VPN password specific to device; easy to remember, difficult to guess  Encryption of data at rest built-in to apps  No Groupwise or Windows login  Network and Application logins & passwords required for access to network & and to protect patient data

15  Vendor files are contractor invoices, not claims – may use proprietary format, not EDI  Vendors invoices using PGP encryption  MJHS technical operations assists with set-up of PGP keys  No need for MJHS to maintain FTP site and vendor log-in accounts

16  Nurses given cameras  Pictures saved on a disc  Disc information copied to the network  without the PHI sent to consultant  Consultant given access to the application where information resides

17  Do not spend on technology for technology sake  Compliance via strong policy and procedure  Thorough risk analysis  IT disaster recovery  Lots and lots of training  HR handled face-to-face training  On-line product shared across GNYHA  Lots and lots of documentation

18  Data exchanged between staff across entities – no encryption needed  MJHS companies signed BAAs with each other  NPI  Corporate-wide committee formed  Application NPI Readiness Analysis  Each entity responsible for enumeration

19