Your SlideShare is downloading. ×
Week 1 discussion 2 hipaa and privacy training
Week 1 discussion 2 hipaa and privacy training
Week 1 discussion 2 hipaa and privacy training
Week 1 discussion 2 hipaa and privacy training
Week 1 discussion 2 hipaa and privacy training
Week 1 discussion 2 hipaa and privacy training
Week 1 discussion 2 hipaa and privacy training
Week 1 discussion 2 hipaa and privacy training
Week 1 discussion 2 hipaa and privacy training
Week 1 discussion 2 hipaa and privacy training
Week 1 discussion 2 hipaa and privacy training
Week 1 discussion 2 hipaa and privacy training
Week 1 discussion 2 hipaa and privacy training
Week 1 discussion 2 hipaa and privacy training
Week 1 discussion 2 hipaa and privacy training
Week 1 discussion 2 hipaa and privacy training
Week 1 discussion 2 hipaa and privacy training
Week 1 discussion 2 hipaa and privacy training
Week 1 discussion 2 hipaa and privacy training
Week 1 discussion 2 hipaa and privacy training
Week 1 discussion 2 hipaa and privacy training
Week 1 discussion 2 hipaa and privacy training
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

×
Saving this for later? Get the SlideShare app to save on your phone or tablet. Read anywhere, anytime – even offline.
Text the download link to your phone
Standard text messaging rates apply

Week 1 discussion 2 hipaa and privacy training

1,157

Published on

0 Comments
1 Like
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total Views
1,157
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
21
Comments
0
Likes
1
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
No notes for slide

Transcript

  • 1. HIPAA & Privacy Training Veronica Gill MHA 690 November 3, 2011
  • 2. What is HIPAA?
    • Health Insurance Portability and Accountability Act of 1996
    • Contains five provisions designed to: assure portability of health insurance, decrease healthcare fraud and abuse, guarantee security and privacy of patient health information, enforce standards for health information, set standards for EDI transactions
    • Administered by Department of Health and Human Services.
  • 3. HIPAA Privacy Rule
    • Title II of HIPAA required DHHS to establish national standards for:
      • Transaction standards
      • Standard code sets
      • Unique health identifiers
      • Security
      • Privacy
  • 4.
    • HIPAA was created due to the misuse of identifiable health information, such as:
    • A person stole computer disks with lists of HIV patients
    • A trustee/banker gained access to patients’ medical records and called in mortgages for those with cancer
    • The press gained access to psychiatric records about famous people and published these facts
  • 5. Accountability
    • Accountability is also known as Fraud Enforcement.
    • Federal Government has increased authority to penalize people and entities that violate the HIPAA regulations
    • Individuals and organizations will be subject to the full extent of the HIPAA sanctions
  • 6. HIPAA Focus Areas
    • Electronica Data Interchange
    • Privacy
    • Security
  • 7. Electronic Data Interchange (EDI)
    • Focuses on establishing national standards for electronic transfer of healthcare information, including the creation of uniform transaction standards, code sets and national identifiers for providers, health plans and employers.
  • 8. Privacy
    • Focuses on defining boundaries on medical record use and release, penalties for misuse of patient information, appropriate and inappropriate disclosures of information and appropriate access for information about self.
  • 9. Security
    • Focuses on administrative, physical and technical safeguards that keep patient information safe
  • 10. What does this mean?
    • Providers, health plans and certain other organizations may not use or disclose your health information for purposes unrelated to providing you healthcare, managing their obligations under state and federal law or unless you specifically authorize them to do so.
  • 11.
    • HIPAA standards apply only to:
    • Health care providers who transmit any health information electronically in connection with certain transactions
    • Health plans
    • Health care clearinghouses
  • 12. What is protected by Privacy Rule?
    • Protected Health Information (PHI) defined as:
    • Individually identifiable health information that is transmitted or maintained in any form or medium by a Covered Entity or its Business Associate
  • 13. Who is a Covered Entity?
    • Health care providers who transmit any health information electronically in connection with certain transactions
    • Health plans
    • Health care clearinghouses
  • 14. Who is a Business Associate?
    • A person who performs a function or activity on behalf of, or provides services to, a Covered Entity that involves Individually Identifiable Health Information
  • 15. What is Individually Identifiable Health Information?
    • Health information, including demographic information
    • Relates to an individual’s physical or mental health or the provision of or payment for health care
    • Identifies the individual
  • 16. Uses & Disclosures of PHI
    • The General Rule is that a Covered Entity may not use or disclose PHI, except as permitted or required by Privacy Rule
  • 17. Permitted Uses and Disclosures
    • To the individual
    • For treatment, payment and health care options (TPHO)
    • Give the individual opportunity to agree or object to disclosure of name, location, general condition, religious affiliation
  • 18.
    • For Public Policy purposes
    • “ Incident to” rule permits uses/disclosures incident to an otherwise permitted use or disclosure if minimum necessary & safeguard standards are met
  • 19. What is Minimum Necessary?
    • Covered entities must make reasonable efforts to limit the use or disclosure of, and requests for, PHI to minimum amount necessary to accomplish intended purpose
  • 20. How to stay compliant
    • Determine if you are a covered entity
    • Identify Business Associate (BA) relationships and enter BA agreements
    • Review current PHI practices and determine if any changes are needed
    • Develop an authorization form for future use
  • 21.
    • Develop and provide a Notice and Acknowledgement form
    • Develop a system to track and account for disclosures
    • Designate a Privacy Officer and contact person or office
    • Design and implement Policies and Procedures
  • 22.
    • Develop and implement systems to safeguard PHI
    • Train workforce
    • Check the Rule for particular requirements to continue to remain compliant

×