Download presentation
Presentation is loading. Please wait.
Published byRey Jemmott Modified over 10 years ago
2
Presented by the Office of the General Counsel An Overview of HIPAA
3
HIPAAHIPAA Health Health Insurance Insurance Portability and Portability and Accountability Accountability Act Act
4
HIPAA’s Goals Simplify the Administration of Electronic Health Information Simplify the Administration of Electronic Health Information Protect an Individual’s Privacy Rights with regard to Health Information Protect an Individual’s Privacy Rights with regard to Health Information
5
When is HIPAA effective? First Deadline: October 2002 First Deadline: October 2002 – Possible Extension until Oct. 2003 – AU must have Compliance plan Privacy Regulations: April 2003 Privacy Regulations: April 2003 – AU target date for compliance
6
Who Must Comply? “ Each Covered Entity who maintains or transmits health information” Health Plans Health Plans Health Care Clearinghouse Health Care Clearinghouse Health Care Providers Health Care Providers
7
Who is a Provider? “Any person or entity that furnishes, bills, or is paid for health care in the normal course of business.” – Health Care = any “care, services, or supplies related to the health of an individual”
8
Examples of Providers / Plans Student Health Center Student Health Center Psychology Clinics Psychology Clinics EAP EAP Athletic Department Hearing / Eye Clinics Self – Insurance Health Plans
9
4 Key HIPAA Elements Electronic Transaction & Code Set Standards Electronic Transaction & Code Set Standards Security Standards Security Standards Privacy Regulations Privacy Regulations National Identifiers National Identifiers
10
Electronic Transaction & Code Set Standards General Rule: General Rule: “If a covered entity (either itself or through an agent) conducts a Covered Transaction electronically, the transaction must be conducted using the HIPAA form.”
11
Electronic Transaction & Code Set Standards Required Elements 1.Covered Entity 2.Electronically transmits 3.Covered Transaction
12
Covered Transactions Submission of Claims for payment Submission of Claims for payment Checking eligibility Checking eligibility Enrollment & Disenrollment Enrollment & Disenrollment Referrals and pre- certification Claims attachments Payment & claims remittance Coordination of Benefits Checking claims’ status
13
Electronic Transaction & Code Set Standards Requirements of ETS Standard Formats Standard Formats Standard Data Content Standard Data Content Standard Codes Standard Codes
14
Electronic Transaction & Code Set Standards Where to find the ETS standards: http://aspe.hhs.gov/admnsimp http://aspe.hhs.gov/admnsimp www.wpc-edi.com/HIPAA www.wpc-edi.com/HIPAA www.wpc-edi.com/HIPAA www.afehct.org www.afehct.org
15
Security Standards Intended to protect against Intended to protect against Unauthorized access Unauthorized access Accidental / Intentional disclosure to unauthorized persons Accidental / Intentional disclosure to unauthorized persons Alteration, destruction, or loss Alteration, destruction, or loss
16
Security Standards Who is Covered? Any covered entity Any covered entity That Stores information electronically That Stores information electronically Does not have to be a covered transaction Does not have to be a covered transaction
17
Security Standards - Elements - Administrative Procedures Administrative Procedures – Protects health info – Manages personnel Conduct Physical Safeguards Physical Safeguards – Protects physical systems / buildings Technical Security Technical Security – Controls access to health information
18
Administrative Procedures Security Analysis Security Analysis Information access privileges Information access privileges Password & Authentication policies Password & Authentication policies Plans for disasters & security breaches Plans for disasters & security breaches Disciplinary process & penalties Disciplinary process & penalties Employee & Vendor Training Employee & Vendor Training Security Officer Security Officer
19
Physical Safeguards Document ways computer & physical records are protected Document ways computer & physical records are protected Use of keys, locks, etc. to control access to computers Use of keys, locks, etc. to control access to computers Restriction of access to authorized persons Restriction of access to authorized persons Tracking of medical records Tracking of medical records Workstation location policy Workstation location policy
20
Technical Security Single sign-on technology Single sign-on technology New user ID’s, passwords New user ID’s, passwords Audit trails for health info Audit trails for health info
21
Security Standards General Comments Still in proposed form Still in proposed form Not technically specific Not technically specific Amount of security required is scalable based on dept. size and resources Amount of security required is scalable based on dept. size and resources
22
Privacy Regulations General Rule: General Rule: “A covered entity may not use “A covered entity may not use or disclose Protected Health or disclose Protected Health Information (PHI) except as Information (PHI) except as permitted by the privacy permitted by the privacy regulations.” regulations.”
23
Privacy Regulations PHI – Protected Health Information PHI – Protected Health Information – Individually Identifiable – Any form or medium Electronic, Oral, or Written Electronic, Oral, or Written – Created or Received – Relates to past, present, future condition or payment of individual – Exception: FERPA records
24
Privacy Regulations General Requirement: General Requirement: “Must make reasonable efforts to limit the use and disclosure of PHI to the minimum necessary to accomplish intended purpose.”
25
Privacy Regulations Main Elements Rules for Use & Disclosure of PHI Rules for Use & Disclosure of PHI Patient’s Rights to Health Info Patient’s Rights to Health Info Administrative Procedures Administrative Procedures Business Partner Requirement Business Partner Requirement
26
Rules for Use & Disclosure Consent vs. Authorization Consent: If a general written consent is obtained, a provider may use/disclose PHI for “TPO” Authorization: If use/disclosure is not for “TPO”, use/disclosure forbidden without a more specific authorization “TPO” = Treatment/Payment/Health Care Operations
27
Rules for Use & Disclosure “TPO” = Treatment / Payment / Health Care Operations Health Care Operations Treatment: Provision, coordination, management of healthcare management of healthcare Payment: Actions to obtain payment Operations: Internal day-to-day business Ex: QA, Peer Review, Customer Service
28
Rules for Use & Disclosure Consent Must be in plain language Must be in plain language Must specify use of PHI Must specify use of PHI Can make a prerequisite to treatment (Can refuse treatment) Can make a prerequisite to treatment (Can refuse treatment) Exceptions: Emergency, Required by Law, Communication barriers, Exceptions: Emergency, Required by Law, Communication barriers,
29
Rules for Use & Disclosure Authorization Cannot be a condition of treatment Cannot be a condition of treatment Must Inform about specific use and right to refuse, revoke, and inspect Must Inform about specific use and right to refuse, revoke, and inspect Psychotherapy Notes require Authorization Psychotherapy Notes require Authorization Examples Examples Research Research Marketing Marketing Fundraising Fundraising
30
Patient’s Rights Right to Notice of Privacy Practices Right to Notice of Privacy Practices Right of Access to PHI Right of Access to PHI Right to Accounting of Disclosures for 6 years Right to Accounting of Disclosures for 6 years Right to request restriction of TPO use to family members Right to request restriction of TPO use to family members – Not required to agree if TPO
31
Administrative Procedures Document policies, procedures, & systems to achieve compliance Document policies, procedures, & systems to achieve compliance Complaint Mechanisms Complaint Mechanisms Employee Sanctions Employee Sanctions Documented training of employees Documented training of employees Mitigation of harmful effects Mitigation of harmful effects Designated Privacy officer Designated Privacy officer
32
Business Associates General Rule: General Rule: – A covered entity must have a business associate contract to ensure that its business associates also are in compliance with HIPAA’s protection of PHI.
33
Business Associates Business Associates… Business Associates… – Perform a function involving use / disclosure of PHI on behalf of the covered entity – Perform legal, accounting, consulting, data aggregation, administrative, management, or financial services involving PHI for the covered entity
34
Business Associates Examples: Examples: – Billing companies – Computer Vendors – Attorneys, Accountants, Auditors – Consultants – Document storage / destruction companies
35
Business Associates Business Associate Contracts: Business Associate Contracts: – Restrict use & disclosure of PHI – Require appropriate safeguards – Require similar requirements of subcontractors – Require B.A. to disclose breaches – Require B.A. to remedy breaches or risk termination of contract
37
Hybrid Entity Requirements Requirements – Single Legal Entity – Primary business is not healthcare Advantages Advantages – Only “Healthcare Components” must comply with HIPAA Disadvantage Disadvantage – Firewall between HC Components and Non-Components
38
Hybrid Entity Auburn must… Auburn must… – Identify Healthcare Components – Identify Business Associates of the HC Components – Erect the ‘firewalls’ between HC Components & Non-Components
39
Penalties for Non-Compliance ** Both Individuals & Entities can incur criminal and/or civil penalties Civil Penalties: $100 - $25,000 Criminal Penalties: Max 10 yrs. Prison Max $250,000 fine Max $250,000 fine
40
HIPAA Timeline ETS Standards : October 16, 2002 ETS Standards : October 16, 2002 – Extended to Oct. 2003 w/ University extension Privacy Regs: April 14, 2003 Privacy Regs: April 14, 2003 Security Regs: Date expected by August 2002 Security Regs: Date expected by August 2002
41
Next Steps toward Compliance 1.Fill out the AU HIPAA Survey 2.Review how PHI is stored, accessed, protected, & destroyed 3.Think about easy steps to better protect PHI 4.Designate 1+ person to review specific HIPAA policies
42
For more HIPAA info… www.hipaa.org www.hipaa.org www.hipaa.org – Links to complete final rules & proposed rules www.hipaadvisory.com www.hipaadvisory.com www.hipaadvisory.com – News, primers, and complete rules www.hrm.uab.edu/HIPAA www.hrm.uab.edu/HIPAA www.hrm.uab.edu/HIPAA – UAB’s training site
43
Additional Questions? Contact the Provost’s Office
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.