Copyright © 2015 by Saunders, an imprint of Elsevier Inc. All rights reserved. Chapter 3 Privacy, Confidentiality, and Security.

Slides:



Advertisements
Similar presentations
Presented by Elena Chan, UCSF Pharm.D. Candidate Tiffany Jew, USC Pharm.D. Candidate March 14, 2007 P HARMACEUTICAL C ONSULTANTS, I NC. P RO P HARMA HIPAA.
Advertisements

1 The Health Insurance Portability and Accountability Act (HIPAA) A guided tutorial for GVSU employees.
HIPAA Basics Brian Fleetham Dickinson Wright PLLC.
1. As a Florida KidCare community partner families entrust you to not only help them navigate the Florida KidCare system but to keep the information they.
HIPAA Privacy Training. 2 HIPAA Background Health Insurance Portability and Accountability Act of 1996 Copyright 2010 MHM Resources LLC.
Health Insurance Portability and Accountability Act HIPAA Education for Volunteers and Students.
Confidentiality and HIPAA
HIPAA Privacy Rule Training
Copyright Eastern PA EMS Council February 2003 Health Information Portability and Accountability Act It’s the law.
National Health Information Privacy and Security Week Understanding the HIPAA Privacy and Security Rule.
Increasing public concern about loss of privacy Broad availability of information stored and exchanged in electronic format Concerns about genetic information.
The Health Insurance Portability and Accountability Act of 1996– charged the Department of Health and Human Services (DHHS) with creating health information.
HIPAA Health Insurance Portability and Accountability Act.
What is HIPAA? This presentation was created by The University of Arizona Privacy Office, The Office for the Responsible Conduct of Research on March 5,
Health Insurance Portability and Accountability Act (HIPAA)HIPAA.
1 HIPAA Education CCAC Professional Development Training September 2006 CCAC Professional Development Training September 2006.
Managing Access to Student Health Information per Federal HIPAA Guidelines Joan M. Kiel, Ph.D., CHPS Duquesne University Pittsburgh, Penna
NAU HIPAA Awareness Training
CHAPTER © 2011 The McGraw-Hill Companies, Inc. All rights reserved. 2 The Use of Health Information Technology in Physician Practices.
Reviewing the World of HIPAA Stephanie Anderson, CPC October 2006.
HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT OF 1996 (HIPAA)
HIPAA Privacy Rule Compliance Training for YSU April 9, 2014.
COMPLYING WITH HIPAA PRIVACY RULES Presented by: Larry Grudzien, Attorney at Law.
Are you ready for HIPPO??? Welcome to HIPAA
Privacy, Security, Confidentiality, and Legal Issues
HIPAA COMPLIANCE IN YOUR PRACTICE MARIBEL VALENTIN, ESQUIRE.
Copyright © 2015 by Saunders, an imprint of Elsevier Inc. All rights reserved. Chapter 8 The Personal Health Record.
The Use of Health Information Technology in Physician Practices
HIPAA PRIVACY AND SECURITY AWARENESS.
“ Technology Working For People” Intro to HIPAA and Small Practice Implementation.
Privacy and Security of Protected Health Information NorthPoint Health & Wellness Center 2011.
Copyright ©2011 by Pearson Education, Inc. Upper Saddle River, New Jersey All rights reserved. Health Information Technology and Management Richard.
1 Copyright © 2011, 2007, 2003, 1999 by Saunders, an imprint of Elsevier Inc. All rights reserved. Privacy in the Physician’s Office Chapter 17.
Computerized Networking of HIV Providers Workshop Data Security, Privacy and HIPAA: Focus on Privacy Joy L. Pritts, J.D. Assistant Research Professor Health.
How Hospitals Protect Your Health Information. Your Health Information Privacy Rights You can ask to see or get a copy of your medical record and other.
HIPAA Michigan Cancer Registrars Association 2005 Annual Educational Conference Sandy Routhier.
© 2009 The McGraw-Hill Companies, Inc. All rights reserved. 1 McGraw-Hill Chapter 2 The HIPAA Privacy Standards HIPAA for Allied Health Careers.
Medical Law and Ethics, Third Edition Bonnie F. Fremgen Copyright ©2009 by Pearson Education, Inc. Upper Saddle River, New Jersey All rights reserved.
Building a Privacy Foundation. Setting the Standard for Privacy Health Insurance Portability and Accountability Act (HIPAA) Patient Bill of Rights Federal.
Copyright © 2009 by The McGraw-Hill Companies, Inc. All Rights Reserved. McGraw-Hill Chapter 6 The Privacy and Security of Electronic Health Information.
Health Insurance Portability and Accountability Act of 1996 HIPAA Privacy Training for County Employees.
Eliza de Guzman HTM 520 Health Information Exchange.
© 2013 The McGraw-Hill Companies, Inc. All rights reserved. Ch 8 Privacy Law and HIPAA.
Chapter 7—Privacy Law and HIPAA
HIPAA BASIC TRAINING Presented by Anderson Health Information Systems, Inc.
HIPAA THE PRIVACY RULE. 2 HISTORY In 2000, many patients that were newly diagnosed with depression received free samples of anti- depressant medications.
The Culture of Healthcare Privacy, Confidentiality, and Security Lecture d This material (Comp2_Unit9d) was developed by Oregon Health and Science University,
Rhonda Anderson, RHIA, President  …is a PROCESS, not a PROJECT 2.
Working with HIT Systems
Copyright ©2014 by Saunders, an imprint of Elsevier Inc. All rights reserved 1 Chapter 02 Compliance, Privacy, Fraud, and Abuse in Insurance Billing Insurance.
C HAPTER 34 Code Blue Health Sciences Edition 4. Confidentiality of sensitive information is an important issue in healthcare. Breaches of confidentiality.
HIPAA Health Insurance Portability and Accountability Act.
HIPAA Overview Why do we need a federal rule on privacy? Privacy is a fundamental right Privacy can be defined as the ability of the individual to determine.
AND CE-Prof, Inc. January 28, 2011 The Greater Chicago Dental Academy 1 Copyright CE-Prof, Inc
The Health Insurance Portability and Accountability Act of 1996 “HIPAA” Public Law
What is HIPAA? Health Insurance Portability and Accountability Act of HIPAA is a major law primarily concentrating on the prolongation of health.
Copyright © 2009 by The McGraw-Hill Companies, Inc. All Rights Reserved. McGraw-Hill/Irwin Chapter 6 The Privacy and Security of Electronic Health Information.
HIPAA Training Workshop #3 Individual Rights Kaye L. Rankin Rankin Healthcare Consultants, Inc.
HIPAA Privacy Rule Training
Health Insurance Portability and Accountability Act of 1996
Privacy & Information Security Basics
Understanding HIPAA Dr. Jennifer Lu.
Move this to online module slides 11-56
HIPAA PRIVACY AWARENESS, COMPLIANCE and ENFORCEMENT
Disability Services Agencies Briefing On HIPAA
HIPAA Security Standards Final Rule
HIPAA SECURITY RULE Copyright © 2008, 2006, 2004 by Saunders an imprint of Elsevier Inc. All rights reserved.
Enforcement and Policy Challenges in Health Information Privacy
The Health Insurance Portability and Accountability Act
Presentation transcript:

Copyright © 2015 by Saunders, an imprint of Elsevier Inc. All rights reserved. Chapter 3 Privacy, Confidentiality, and Security

Copyright © 2015 by Saunders, an imprint of Elsevier Inc. All rights reserved. Privacy, Confidentiality, and Security 1. Discuss privacy as both a philosophic and legal concept. 2. Explore the history and scope of HIPAA. 3. List the four implementation specifications required by the administrative safeguards outlined in the HIPAA Security Rule, and explore ways in which they might apply to a small to medium-size medical practice. 4. Assess and complete forms related to patient privacy and security in the electronic health record (EHR). 2 Lesson 3.1

Copyright © 2015 by Saunders, an imprint of Elsevier Inc. All rights reserved. Privacy, Confidentiality, and Security 5. Become familiar with patients' rights under HIPAA, and explore how they affect the EHR. 6. Identify organizations aimed at securing EHR systems. 7. Identify who is allowed access to the information in a patient's EHR and under what circumstances. 8. Describe the role of consumer reporting agencies and prescription database tools, and explain how they are regulated. 9. Discuss ways patients can protect their health information. 3 Lesson 3.1

Copyright © 2015 by Saunders, an imprint of Elsevier Inc. All rights reserved. What Is Privacy?  Ethics  Set of the rules and standards of conduct that grow out of our shared understanding of right and wrong and govern our professional behavior  Laws  Formal, enforceable rules and policies based on community standards of conduct  Privacy  Patient’s freedom to determine when, how much, and under what circumstances his or her medical information may be disclosed 4

Copyright © 2015 by Saunders, an imprint of Elsevier Inc. All rights reserved. Confidential versus Anonymous  Confidentiality  Refers to how the recipient of the information handles information that a patient does not wish to share  Anonymity  Information cannot be linked back to the patient Example: Performing lab tests using an ID number instead of a patient name 5

Copyright © 2015 by Saunders, an imprint of Elsevier Inc. All rights reserved. Health Insurance Portability & Accountability Act  Privacy Rule  Security Rule  Portability of insurance 6

Copyright © 2015 by Saunders, an imprint of Elsevier Inc. All rights reserved. Privacy Rule  Establishes privacy standards for use of IIHI  Helps patients control ways their health information is disclosed  Requires disclosure of health information to be logged 7

Copyright © 2015 by Saunders, an imprint of Elsevier Inc. All rights reserved. Disclosures Documentation  Patients are permitted to request a log of disclosures of their PHI, which must include the following for each disclosure:  The date of the disclosure  The name and address, if known, of the entity or person who received the IIHI  A description of the IIHI disclosed  An explanation of the purpose of the disclosure or a copy of the patient’s written authorization  A copy of a written request for a disclosure 8

Copyright © 2015 by Saunders, an imprint of Elsevier Inc. All rights reserved. Disclosures Documentation (Cont.)  Entities/providers are required to:  Distribute NPP  Designate a privacy officer  Provider authorization forms for release of PHI  Implement policies to protect PHI  Develop procedures for correcting errors in the EHR  Provide privacy training for staff 9

Copyright © 2015 by Saunders, an imprint of Elsevier Inc. All rights reserved. Covered Entities and Business Associates  Healthcare provider  Health plan  Healthcare clearinghouse 10

Copyright © 2015 by Saunders, an imprint of Elsevier Inc. All rights reserved. Minimum Necessary Standard  When a covered entity makes an allowed disclosure, it should include only a minimum necessary amount of information to accomplish the purpose 11

Copyright © 2015 by Saunders, an imprint of Elsevier Inc. All rights reserved. Consent  Individual choice principle  Patients should have a reasonable opportunity to make informed decisions about the collection, use, and disclosure of their PHI  In order for records to be released, an authorization form must be completed 12

Copyright © 2015 by Saunders, an imprint of Elsevier Inc. All rights reserved. Authorization Forms 13

Copyright © 2015 by Saunders, an imprint of Elsevier Inc. All rights reserved. Security Rule  The HIPAA Security Rule gives each covered entity four broad goals to meet:  Protect the integrity and confidentiality of electronic healthcare information created, received, maintained, or transmitted  Shield against anticipated security threats  Shelter PHI against unauthorized use and disclosure  Ensure that all employees comply with the provisions of the Security Rule 14

Copyright © 2015 by Saunders, an imprint of Elsevier Inc. All rights reserved. Security Safeguards in the Medical Practice  Designed to avert security breaches  Provide contingency plans  Safeguards fall into three areas:  Administrative  Physical  Technical 15

Copyright © 2015 by Saunders, an imprint of Elsevier Inc. All rights reserved. Administrative Safeguards  Four implementation specifications:  Risk analysis  Risk management  Sanction (penalties) policy  Information system activity review 16

Copyright © 2015 by Saunders, an imprint of Elsevier Inc. All rights reserved. Physical Safeguards  Ensure security of:  Electronic data  Buildings  Equipment  Sample methods:  Screen saver  Login and password 17

Copyright © 2015 by Saunders, an imprint of Elsevier Inc. All rights reserved. Tips for Choosing a Strong Password 18

Copyright © 2015 by Saunders, an imprint of Elsevier Inc. All rights reserved. Technical Safeguards  Performed to protect and control access of technology  Controlled access of employees  Automatic logoff  Encryption  Decryption 19

Copyright © 2015 by Saunders, an imprint of Elsevier Inc. All rights reserved. Assigning Employee Privileges 20

Copyright © 2015 by Saunders, an imprint of Elsevier Inc. All rights reserved. Designing Auditing Procedures  Systems link a person’s username to reveal an electronic breadcrumb trail  Required as part of security procedures 21

Copyright © 2015 by Saunders, an imprint of Elsevier Inc. All rights reserved. Patient's Rights Under HIPAA  View or receive copies  Have inaccurate information corrected  Receive NPP  Opt out of sharing certain information  Have certain information withheld from certain payers  Receive list of disclosures  File a complaint 22

Copyright © 2015 by Saunders, an imprint of Elsevier Inc. All rights reserved. The Office for Civil Rights Complaint Process 23

Copyright © 2015 by Saunders, an imprint of Elsevier Inc. All rights reserved. Other Security Initiatives  The Certification Commission for Healthcare Information Technology (CCHIT) accelerates EHR certifications for:  EHRs for office-based ambulatory care providers and specialists (particularly cardiovascular and emergency medicine)  Inpatient EHRs  Health networks that exchange EHR data  EHRs within specific populations (such as behavioral health) in a range of care settings 24

Copyright © 2015 by Saunders, an imprint of Elsevier Inc. All rights reserved. Access to Protected Health Information  Financial institutions  Insurance companies  Government agencies  Consumer reporting  Medical Information Bureau  Prescription database  Schools  Employers  Family and friends  Internet communities  Researchers  Direct marketing firms 25

Copyright © 2015 by Saunders, an imprint of Elsevier Inc. All rights reserved. How Can Patients Protect Themselves?  Review medical, dental, and prescription drug records for accuracy  Request a disclosure log  Request restrictions on disclosure of sensitive information  Ask to receive correspondence at alternative locations  Pay out-of-pocket  Opt for online versus paper statements and read them carefully 26

Copyright © 2015 by Saunders, an imprint of Elsevier Inc. All rights reserved. Questions? 27