Working with HIT Systems Unit 7a Protecting Privacy, Security, and Confidentiality in HIT Systems This material was developed by Johns Hopkins University,

Slides:



Advertisements
Similar presentations
Tamtron Users Group April 2001 Preparing Your Laboratory for HIPAA Compliance.
Advertisements

HIPAA Security Presentation to The American Hospital Association Dianne Faup Office of HIPAA Standards November 5, 2003.
Health Insurance Portability and Accountability Act HIPAA Education for Volunteers and Students.
National Health Information Privacy and Security Week Understanding the HIPAA Privacy and Security Rule.
Health Insurance Portability and Accountability Act (HIPAA)HIPAA.
Managing Access to Student Health Information per Federal HIPAA Guidelines Joan M. Kiel, Ph.D., CHPS Duquesne University Pittsburgh, Penna
NAU HIPAA Awareness Training
HIPAA Security Regulations Jean C. Hemphill Ballard Spahr Andrews & Ingersoll, LLP November 30, 2004.
HIPAA: FEDERAL REGULATIONS REGARDING PATIENT SECURITY.
Topics Rule Changes Skagit County, WA HIPAA Magic Bullet HIPAA Culture of Compliance Foundation to HIPAA Privacy and Security Compliance Security Officer.
HIPAA Privacy Rule Compliance Training for YSU April 9, 2014.
© 2011 The McGraw-Hill Companies, Inc. All rights reserved. 2.5 HIPAA Legislation and its Impact on Physician Practices 2-15 The Health Insurance Portability.
CAMP Med Building a Health Information Infrastructure to Support HIPAA Rick Konopacki, MSBME HIPAA Security Coordinator University of Wisconsin-Madison.
Security Controls – What Works
2 The Use of Health Information Technology in Physician Practices.
Informed Consent and HIPAA Tim Noe Coordinating Center.
HIPAA PRIVACY AND SECURITY AWARENESS.
“ Technology Working For People” Intro to HIPAA and Small Practice Implementation.
Copyright ©2011 by Pearson Education, Inc. Upper Saddle River, New Jersey All rights reserved. Health Information Technology and Management Richard.
Health Insurance Portability and Accountability Act of 1996 (HIPAA) Proposed Rule: Security and Electronic Signature Standards.
How Hospitals Protect Your Health Information. Your Health Information Privacy Rights You can ask to see or get a copy of your medical record and other.
Working with Health IT Systems Protecting Privacy, Security, and Confidentiality in HIT Systems Lecture a This material (Comp7_Unit7a) was developed by.
April 14, A Watershed Date in HIPAA Privacy Compliance: Where Should You Be in HIPAA Security Compliance and How to Get There… John Parmigiani National.
HIPAA Michigan Cancer Registrars Association 2005 Annual Educational Conference Sandy Routhier.
Unit 6b System Security Procedures and Standards Component 8 Installation and Maintenance of Health IT Systems This material was developed by Duke University,
Component 16-Professionalism/Customer Service in the Health Environment Unit 5-Regulatory Issues: HIPAA and Standard Precautions This material was developed.
Unit 9a: The BSI Story HIT Infecting a Patient Safety Culture This material was developed by Johns Hopkins University, funded by the Department of Health.
Unit 1b: Health Care Quality and Meaningful Use Introduction to QI and HIT This material was developed by Johns Hopkins University, funded by the Department.
LeToia Crozier, Esq., CHC Vice President, Compliance & Regulatory Affairs Corey Wilson Director of Technical Services & Security Officer Interactive Think.
Understanding HIPAA (Health Insurandce Portability and Accountability Act)
Eliza de Guzman HTM 520 Health Information Exchange.
Privacy, Confidentiality, and Security Unit 8: Professional Values and Medical Ethics Lecture 2 This material was developed by Oregon Health & Science.
Working with Health IT Systems Protecting Privacy, Security, and Confidentiality in HIT Systems Lecture b This material (Comp7_Unit7b) was developed by.
This material was developed by Oregon Health & Science University, funded by the Department of Health and Human Services, Office of the National Coordinator.
The Culture of Healthcare Privacy, Confidentiality, and Security Lecture d This material (Comp2_Unit9d) was developed by Oregon Health and Science University,
Working with HIT Systems
Component 3-Terminology in Healthcare and Public Health Settings Unit 16-Definitions and Concepts in the EHR This material was developed by The University.
Working with Health IT Systems HIT System Planning, Acquisition, Installation, & Training: Practices to Support & Pitfalls to Avoid Lecture a This material.
Working with HIT Systems Unit 8a: HIT system planning, acquisition, installation, and training: Practices to Support & Pitfalls to Avoid This material.
The IT Vendor: HIPAA Security Savior for Smaller Health Plans?
Unit 4: The Effective HIT System This material was developed by Johns Hopkins University, funded by the Department of Health and Human Services, Office.
Unit 10: Measuring Patient Safety This material was developed by Johns Hopkins University, funded by the Department of Health and Human Services, Office.
Working with HIT Systems Unit 8b: HIT system planning, acquisition, installation, and training: Practices to Support & Pitfalls to Avoid This material.
HIPAA Security Final Rule Overview
Copyright © 2015 by Saunders, an imprint of Elsevier Inc. All rights reserved. Chapter 3 Privacy, Confidentiality, and Security.
Configuring Electronic Health Records Privacy and Security in the US Lecture a This material (Comp11_Unit7a) was developed by Oregon Health & Science University.
Health Insurance Portability and Accountability Act By Bradley Gleich.
HIPAA Security John Parmigiani Director HIPAA Compliance Services CTG HealthCare Solutions, Inc.
Working with Health IT Systems Unit 3: Understanding Information Exchange in HIT Systems This material was developed by Johns Hopkins University, funded.
Unit 9b: Strategies for Adaptive Work HIT Infecting a Patient Safety Culture This material was developed by Johns Hopkins University, funded by the Department.
Configuring Electronic Health Records Privacy and Security in the US Lecture b This material (Comp11_Unit7b) was developed by Oregon Health & Science University.
HIPAA HEALTH INSURANCE PORTABILITY ACOUNTABILITY ACT.
Table of Contents. Lessons 1. Introduction to HIPAA Go Go 2. The Privacy Rule Go Go.
Terminology in Healthcare and Public Health Settings Electronic Health Records Lecture b – Definitions and Concepts in the EHR This material Comp3_Unit15.
HIPAA Security Best Practices Clint Davies Principal BerryDunn
Component 4: Introduction to Information and Computer Science Unit 8: Security Lecture 3 This material was developed by Oregon Health & Science University,
Installation and Maintenance of Health IT Systems System Security Procedures and Standards Lecture a This material Comp8_Unit6a was developed by Duke University,
Junli M. Awit, RN.  Enacted by President Bill Clinton in 1996  Title I of HIPAA protects health insurance coverage for workers and their families when.
The Health Insurance Portability and Accountability Act 
Paul T. Smith Davis Wright Tremaine LLP
Health Insurance Portability and Accountability Act
Component 4: Introduction to Information and Computer Science Unit 2: Internet and the World Wide Web Lecture 4 This material was developed by Oregon.
Final HIPAA Security Rule
Health Insurance Portability and Accountability Act
County HIPAA Review All Rights Reserved 2002.
HIPAA Privacy and Security Summit 2018 HIPAA Privacy Rule: Compliance Plans, Training, Internal Audits and Patient Rights Widener University Delaware.
Lesson 1  7 Basic Components of an Effective Compliance Plan
HIPAA Security Standards Final Rule
HIPAA Compliance Services CTG HealthCare Solutions, Inc.
Introduction to the PACS Security
Presentation transcript:

Working with HIT Systems Unit 7a Protecting Privacy, Security, and Confidentiality in HIT Systems This material was developed by Johns Hopkins University, funded by the Department of Health and Human Services, Office of the National Coordinator for Health Information Technology under Award Number IU24OC

Objectives By the end of this unit the student will be able to: Explain and illustrate privacy, security, and confidentiality in HIT settings. Identify common threats encountered when using HIT. Formulate strategies to minimize threats to privacy, security, and confidentiality in HIT systems. Component 7/Unit 72 Health IT Workforce Curriculum Version 2.0/Spring 2011

Electronic Health Information Risks and Opportunities Access to electronic vs. paper records Public apprehension around digitization of health information Success of HIT systems depends on ensuring patient privacy Security can facilitate patient-centered care Component 7/Unit 7 Health IT Workforce Curriculum Version 2.0/Spring

Privacy, Confidentiality, Security Defined Privacy: patient is in control Confidentiality: only authorized individuals are allowed access Security: controls/safeguards that ensure confidentiality Component 7/Unit 7 Health IT Workforce Curriculum Version 2.0/Spring

Security Management System Standards ISO NIST HIPAA Component 7/Unit 7 Health IT Workforce Curriculum Version 2.0/Spring

HIPAA and PHI Health Insurance Portability and Accountability Act of 1996 Privacy Rule (effective 2003) Security Rule (effective 2005) HITECH Act of 2009 Component 7/Unit 7 Health IT Workforce Curriculum Version 2.0/Spring

Types of Security Safeguards Administrative Safeguards Physical Safeguards Technical Safeguards Component 7/Unit 7 Health IT Workforce Curriculum Version 2.0/Spring Image: MS Clipart

Administrative Safeguards Security Management Process –Risk Analysis –Risk Management –Sanction Policy –System Activity Review Component 7/Unit 7 Health IT Workforce Curriculum Version 2.0/Spring Image:

Administrative Safeguards Assigned Security Responsibility –Security officer Component 7/Unit 7 Health IT Workforce Curriculum Version 2.0/Spring Image: MS Clipart

Administrative Safeguards Workforce Security, Information Access Management –Who can and who cannot have access –Who determines who can have access and how –Employee turnover –Contractors –User roles Component 7/Unit 7 Health IT Workforce Curriculum Version 2.0/Spring Image: MS Clipart

Administrative Safeguards Security Awareness and Training –Training –Security reminders –Log-in monitoring –Password management Component 7/Unit 7 Health IT Workforce Curriculum Version 2.0/Spring Image: MS Clipart

Administrative Safeguards Security Incident Procedures Contingency Plan –Data backup –Disaster recovery –Emergency operation plan Component 7/Unit 7 Health IT Workforce Curriculum Version 2.0/Spring Image: MS Clipart

Administrative Safeguards Evaluation Business Associate Agreements Component 7/Unit 7 Health IT Workforce Curriculum Version 2.0/Spring Image: