Download presentation
Presentation is loading. Please wait.
Published byCecilia Harrell Modified over 9 years ago
1
Health Insurance Portability and Accountability Act By Bradley Gleich
2
Pre-HIPAA Over 400 different insurance forms Over 400 different insurance forms System to System differences System to System differences ‘Professionalism’ ‘Professionalism’ Lack of Audits Lack of Audits Lack of Protection Lack of Protection
3
Title I: Health Care Access, Portability, and Renewability Protects against discrimination of service of public insurance based on preexisting conditions Protects against discrimination of service of public insurance based on preexisting conditions Prohibits premiums changes on group policies based on prior individual conditions Prohibits premiums changes on group policies based on prior individual conditions Allows for exception as to when a person can apply for health coverage Allows for exception as to when a person can apply for health coverage
4
Title II: Administrative Requirements EDI/Code standardization EDI/Code standardization ICD-9/10 ICD-9/10 CPT-4 CPT-4 NDC NDC HLC HLC Insurance Claim Reform Insurance Claim Reform Form Simplification Form Simplification Form Reduction Form Reduction
5
Title II: Privacy Requirements Protected Healthcare Information (PHI) Protected Healthcare Information (PHI) Any information that can identify the patient Any information that can identify the patient “Need to Know” “Need to Know” Patient’s right to know medical record Patient’s right to know medical record Patient’s right to correct medical record Patient’s right to correct medical record Patient’s right to know how record used Patient’s right to know how record used
6
Title II: Security Requirements Physical Safeguards Physical Safeguards Access to equipment containing PHI Access to equipment containing PHI Timed Software Lockout Timed Software Lockout Computer Locks Computer Locks Facility Security Facility Security Guest Escort Rules Guest Escort Rules PHI discreetness PHI discreetness Adjusted Monitors Adjusted Monitors Protect Patient Charts Protect Patient Charts Protected/Vague Phone Calls Protected/Vague Phone Calls Vague Electronic Communication Vague Electronic Communication
7
Title II: Security Requirements Technical Safeguards Technical Safeguards Passwords Passwords Data Encryption Data Encryption Data integrity – NO RE-WRITE or DELETE Data integrity – NO RE-WRITE or DELETE Network Security Network Security Rights Management Rights Management
8
Title II: Security Requirements Paper Trail Paper Trail Documentation of all Security Standards Documentation of all Security Standards Documentation of all Security Implementations Documentation of all Security Implementations Documentation of Disaster Recovery Documentation of Disaster Recovery Documentation of Standard Practices Documentation of Standard Practices Documentation of Risk Analysis and Management Documentation of Risk Analysis and Management
9
Sources http://www.dol.gov/ebsa/newsroom/fshipaa.html http://www.dol.gov/ebsa/newsroom/fshipaa.html http://www.dol.gov/ebsa/newsroom/fshipaa.html http://www.hhs.gov/news/facts/privacy.html http://www.hhs.gov/news/facts/privacy.html http://www.hhs.gov/news/facts/privacy.html http://www.hhs.gov/ocr/hipaa/ http://www.hhs.gov/ocr/hipaa/ http://www.hhs.gov/ocr/hipaa/ http://en.wikipedia.org/wiki/HIPAA http://en.wikipedia.org/wiki/HIPAA http://en.wikipedia.org/wiki/HIPAA
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.