1 Demonstration of Health - IT Benefits: Access to PHI in India Presented by Mr. Amitava Chakraborty IPR, Space Law & Health-IT Consultant (India, US,

Slides:



Advertisements
Similar presentations
Protecting Patient Privacy:
Advertisements

HIPAA Basics Brian Fleetham Dickinson Wright PLLC.
HIPAA and Public Health 2007 Epi Rapid Response Team Conference.
HIPAA Privacy Training. 2 HIPAA Background Health Insurance Portability and Accountability Act of 1996 Copyright 2010 MHM Resources LLC.
Health Insurance Portability and Accountability Act HIPAA Education for Volunteers and Students.
Confidentiality and HIPAA
National Health Information Privacy and Security Week Understanding the HIPAA Privacy and Security Rule.
HIPAA – Privacy Rule and Research USCRF Research Educational Series March 19, 2003.
The Health Insurance Portability and Accountability Act of 1996– charged the Department of Health and Human Services (DHHS) with creating health information.
Information Risk Management Key Component for HIPAA Security Compliance Ann Geyer Tunitas Group
Health Insurance Portability and Accountability Act (HIPAA)HIPAA.
HIPAA Governing Board Training September 28, 2006.
Corporate Compliance Program STANDARDS OF CONDUCT HIPAA PRIVACY & SECURITY Temple University Health System Maribel Valentin, Esquire Associate Counsel.
 Original Intent: ◦ Act passed in 1996 with two main goals: 1.Ensure individuals would be able to maintain their health insurance between jobs (the “portability”
Reviewing the World of HIPAA Stephanie Anderson, CPC October 2006.
HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT OF 1996 (HIPAA)
HIPAA THE PRIVACY RULE Reviewed December HISTORY In 2000, many patients that were newly diagnosed with depression received free samples of anti-
Are you ready for HIPPO??? Welcome to HIPAA
Health information security & compliance
Health Insurance Portability and Accountability Act (HIPAA)
August 10, 2001 NESNIP PRIVACY WORKGROUP HIPAA’s Minimum Necessary Standard Presented by: Mildred L. Johnson, J.D.
HIPAA COMPLIANCE IN YOUR PRACTICE MARIBEL VALENTIN, ESQUIRE.
HIPAA Health Insurance Portability & Accountability Act of 1996.
HIPAA – Health Insurance Portability & Accountability Act and the Privacy Act MSgt Nechele M. Chambers Senior Enlisted Liaison TRICARE Area Office-Europe.
HIPAA PRIVACY AND SECURITY AWARENESS.
Privacy and Security of Protected Health Information NorthPoint Health & Wellness Center 2011.
Confidentiality and Security Issues in ART & MTCT Clinical Monitoring Systems Meade Morgan and Xen Santas Informatics Team Surveillance and Infrastructure.
Privacy and Security Laws for Health Care Organizations Presented by Robert J. Scott Scott & Scott, LLP
Copyright ©2011 by Pearson Education, Inc. Upper Saddle River, New Jersey All rights reserved. Health Information Technology and Management Richard.
“HIPAA Beyond April 14, 2003” n “BUILDING HIPAA COMPLIANCE” Beyond April 14, 2003”
Computerized Networking of HIV Providers Workshop Data Security, Privacy and HIPAA: Focus on Privacy Joy L. Pritts, J.D. Assistant Research Professor Health.
HIPAA (health insurance portability and accountability act)
Speak HIPAA Like a Native A Guide to Common HIPAA Nomenclature University of Miami Ethics Programs.
Dr. Ihab Nada DOE, MSKMC.  The information a patient reveals to a health care provider is private and has limits on how and when it can be disclosed.
Health Insurance Portability and Accountability Act (HIPAA) CCAC.
Copyright © 2009 by The McGraw-Hill Companies, Inc. All Rights Reserved. McGraw-Hill Chapter 6 The Privacy and Security of Electronic Health Information.
Understanding HIPAA (Health Insurandce Portability and Accountability Act)
© 2013 The McGraw-Hill Companies, Inc. All rights reserved. Ch 8 Privacy Law and HIPAA.
HIPAA THE PRIVACY RULE. 2 HISTORY In 2000, many patients that were newly diagnosed with depression received free samples of anti- depressant medications.
A Road Map to Research at Jefferson: HIPAA Privacy and Security Rules for Researchers Presented By: Privacy Officer/Office of Legal Counsel October 2015.
Lessons Learned from Recent HIPAA Breaches HHS Office for Civil Rights.
Copyright © 2015 by Saunders, an imprint of Elsevier Inc. All rights reserved. Chapter 3 Privacy, Confidentiality, and Security.
Davis Wright Tremaine LLP The Seventh National HIPAA Summit HIPAA Privacy: Privacy Rule Compliance on Public Health Activities and Research Thomas E. Jeffry,
HIPAA Overview Why do we need a federal rule on privacy? Privacy is a fundamental right Privacy can be defined as the ability of the individual to determine.
HIPAA THE PRIVACY RULE Reviewed 10/ HISTORY In 2000, many patients that were newly diagnosed with depression received free samples of anti- depressant.
HIPAA TRIVIA QUEST December Edition. I’ll ask the questions - and you’ll give the answers.
HIPAA Training. What information is considered PHI (Protected Health Information)  Dates- Birthdays, Dates of Admission and Discharge, Date of Death.
Health Insurance Portability and Accountability Act (HIPAA) © 2013 Project Lead The Way, Inc.Principles of Biomedical Science.
Disclaimer This presentation is intended only for use by Tulane University faculty, staff, and students. No copy or use of this presentation should occur.
Copyright © 2009 by The McGraw-Hill Companies, Inc. All Rights Reserved. McGraw-Hill/Irwin Chapter 6 The Privacy and Security of Electronic Health Information.
HIPAA Training Workshop #2 Trainer: Kaye L. Rankin Rankin Healthcare Consultants, Inc.
Juvenile Legislative Update 2013 Confidential Records and Protected Disclosures.
Health Insurance Portability and Accountability Act
Health Insurance Portability and Accountability Act of 1996
HIPAA THE PRIVACY RULE Reviewed December 2012.
Health Insurance Portability and Accountability Act
HIPAA THE PRIVACY RULE Reviewed 10/2014
Permitted Uses & Disclosures of PHI
Health Insurance Portability and Accountability Act
Confidential Records and Protected Disclosures
Disability Services Agencies Briefing On HIPAA
The Health Insurance Portability and Accountability Act
THE 13TH NATIONAL HIPAA SUMMIT HEALTH INFORMATION PRIVACY & SECURITY IN SHARED HEALTH RECORD SYSTEMS SEPTEMBER 26, 2006 Paul T. Smith, Esq. Partner,
HIPAA Privacy and Security Update - 5 Years After Implementation
Health Insurance Portability and Accountability Act
HIPAA Do’s and Don'ts: What is Really Behind Protected Health Information (PHI) and Health Care Privacy Rules Paul Sisler, Director, Information Services;
Health Insurance Portability and Accountability Act
South Jordan City Fire Department
Presentation transcript:

1 Demonstration of Health - IT Benefits: Access to PHI in India Presented by Mr. Amitava Chakraborty IPR, Space Law & Health-IT Consultant (India, US, EU) & Advocate Bagmisikha Puhan IPR Consultant, India

2 When a patient gives personal health information to a healthcare provider, that becomes Protected Health Information (PHI) PHI Includes: Verbal information Information on paper Recorded information Electronic information (faxes, s) PHI can be used or disclosed for Treatment, payment, and healthcare operations With authorization/agreement from patient For disclosure to patient PHI can be used/disclosed without authorization for the following reasons: To inform appropriate agencies Public health activities related to disease prevention/control, To report victims of abuse, neglect or domestic violence To funeral homes, tissue/organ banks To avert a serious threat to health/safety

3 1 1 Diagnosed with Depression Received free samples of anti-depressant medications via Breach of Confidentiality and Patient Privacy

4 Intended Purpose PHI is sensitive personal information, the flow of which is to be made for an intended purpose, only after valid consent of the individual. The purpose and the usage of the PHI must be clear to the understanding of the individual, and the consent must then be obtained. The covered entities must ensure that the individual is aware of the intended recipients of the PHI. The above are the most the basic security and privacy rules of adherence.

5 Security and Privacy Standards Privacy refers to the authorization of the patient for obtaining, retaining, managing, and transmitting of the data. Security refers to the encryption of the data, while retaining, managing, and transmitting of the same to the intended recipients. The minimum standards of confidentiality requires that the PHI is reduced to de-identified data. – the identity of the owner of the data should not be tied to the information which flows from one stakeholder to the other.

6 Reasonable Measures Sharing and transmitting of the PHI is inevitable in this Health-IT environment. Reasonable efforts to safeguard the identifiable information available with the stakeholders is a mandate and a necessity. – Extends over to the handling of the data, and the transmitting of the data, over a period of time.

7 Solution Includes: e-PHI implementation on a secure channel computer-implemented cloud based EMR management on a heterogeneous health environment Authentication based PHI sharing b/w covered entities Designing of a Risk Adjusted Payment model/system in the healthcare network Implementation of State defined privacy and confidentiality clauses. US US A1

8 US

9 THANK YOU Mr. Amitava Chakraborty IPR, Space Law & Health-IT Consultant (India, US, EU) (CA, USA) & Advocate Bagmisikha Puhan IPR Consultant, India