SlideShare a Scribd company logo
1 of 34
Created 5/2017
HIPAA and the Security of
Electronic Protected Health
Information in Research
May 23, 2017
1
USA is a HIPAA Hybrid
Entity
A Hybrid Entity performs both covered and non-covered
functions under the HIPAA Rules.
• Healthcare components and components of USA that perform
Business Associate type of functions (such as: legal or computer
services)within USA are required to comply with HIPAA .
• Individuals who perform support services for both USA HIPAA
healthcare components and USA non-covered functions (such
as: non-healthcare academic departments) are prohibited from
using or sharing PHI obtained in the course of furnishing services
for HIPAA covered healthcare components.
• HIPAA treats the covered and non-covered functions as legally
separate entities and no PHI may be shared or disclosed without
the patient’s written authorization.
• USA Health- Organized Health Care Arrangement (OHCA)
2
Overview of Topics
This presentation addresses items that are pertinent to HIPAA Privacy and
Security for those conducting research within USA.
• What is Protected Health Information (PHI);
• Unauthorized accesses, Breaches, Disclosures;
• HIPAA identifiers that create protected health information (PHI);
• HIPAA Security;
• Institutional Review Board (IRB) research;
• IRB approval process;
• Data access and retrieval process;
• IRB cloud storage drive;
• OCR Audits and recent HIPAA Breaches.
3
PHI
definedPHI is generally defined as:
Any information that can be used to identify a patient – whether
living or deceased – that relates to the patient’s past, present,
or future physical or mental health or condition, including
healthcare services provided and payment for those services.
Employees may access the minimal necessary PHI
to perform their job-related duties.
4
Forms of Protected Health Information
(PHI)
It is the responsibility of every employee to
protect the privacy and security of protected health information
inALL forms.
printe
d
spoke
n
Electronic (data in motion or at rest)
Protected Health Information exists in various
forms…
5
Examples of
Protected Health Information(PHI)
• Social Security
numbers
• credit card numbers
• driver’s license
numbers
• patient clinical information
• research data
• computer passwords
• Individually identifiable
health information
The improper use or disclosure of protected health
information presents the risk of identify theft, invasion of
privacy, and can cause harm and embarrassment to
students, faculty, staff, patients, and USA Health. Breaches
of information privacy can also result in criminal and civil
penalties for both USA Health and those individuals who
improperly access or disclose protected health information,
as well as, disciplinary actions for responsible USA
employees.
Every employee must
protect the privacy and security of PHI.
6
Covered Entities
Have a Duty to Protect
PHI
A covered entity is any person or organization that
furnishes, bills, or is paid for health care services in
the normal course of business and electronically
transmits any health information in connection with
electronic standard transactions. Pursuant to HIPAA,
individually identifiable health information collected
or created by a covered entity is considered
protected health information or PHI. Departments
that use or disclose PHI are governed by HIPAA
requirements.
7
For PHI to be considered de-identified, the
following identifiers must be removed:
• Patient names
• Geographic subdivisions
(smaller than state)
• Telephone numbers
• Fax numbers
• Social Security Numbers(SSN)
• Vehicle identifiers
• E-mail addresses
• Web URLs and IP addresses
• Dates (except year)
• Names of relatives
8
• Full face photographs
or identifiable images
• Healthcare record numbers
• Account numbers
• Biometric identifiers
(fingerprints or
voiceprints)
• Device identifiers
• Health plan
beneficiary numbers
• Certificate/license
numbers
• Any other unique number,
code, or characteristic that
can be linked to an
individual.
Access Must be
Authorized
Except in very limited circumstances, if an employee
accesses or discloses PHI without a patient’s written
authorization or without a job-related reason for doing so, the
employee violates USA Health HIPAA Policies and
Procedures.
An employee may only access or disclose a
patient’s PHI when this access is part of the
employee’s job duties.
9
Unauthorized Access
It is never acceptable for an employee to look at
PHI “just out of curiosity,” even if no harm is
intended (i.e., retrieving an address to send a get
well card).
It also makes no difference if the information
relates to a “high profile” person or a close
friend or family member –ALL information is
entitled to the same protection and must be
kept private.
These rules apply to all employees, including
health care professionals.
Be aware that accessing PHI of someone involved in a divorce,
separation, break-up, or custody dispute may be an indication of
intent to use information for personal advantage, unless the access
is required for the individual to do his job. Such improper behavior
will be considered by USA Health when determining disciplinary
10
Breaches
A breach occurs when information that, by
law, must be protected is:
• lost, stolen or improperly disposed of (i.e.
paper or device upon which the
information is recorded cannot be
accounted for);
• “hacked” into by people or mechanized
programs that are not authorized to have
access (e.g. the system in which the
information is located is compromised
through a Virus, or Malware); or
• communicated or sent to others who
have no official need to receive it
(e.g. gossip about information
learned from a medical record).
11
Types of
Breaches
reported
(as of 5/2016) Percent
Theft 46%
Unauthorized
Access/
Disclosure
24%
Hacking/IT 12%
Loss 9%
Improper
Disposal
3%
Other/
Unknown
7%
Penalties for Breaches
Breaches of the HIPAA Privacy and Security Rules have serious
ramifications for all involved. In addition to sanctions imposed by
USA Health, such breaches may result in civil and criminal penalties.
Multiple types of HIPAA violations can result in penalties exceeding
$1.5 million.
12
Employees Must Report
BreachesPart of your responsibility as an employee is to report privacy or security
breaches involving PHI to your supervisor AND the HIPAA Compliance
Office. Even if you are not sure whether an incident or action involves
a breach, it is your responsibility to notify so that it
can be investigated.
Employees, volunteers,students,or contractors of USA may
not threaten or take any retaliatory action against an
individual for exercising his or her rights under HIPAA or for
filing a HIPAA report or complaint, including notifying of a privacy or security breach.
Reports may be made via telephone by calling the
Compliance Hotline 251- 445-9192, 24 hours a day,
365 days a year. You may choose to remain
anonymous.
13
Breach
Notification
RequirementsAny impermissible use or disclosure that compromises PHI or
other sensitive information may trigger breach notification
requirements. Depending upon the results of a risk analysis of the
impermissible use or disclosure, breach notification may have to be
made to:
• the Department of Health and Human
Services, Office of Civil Rights (OCR);
• all individuals whose information was breached or disclosed;
and
• the media.
Letters of explanation describing the circumstances may have to be
sent to responsible parties. Abreach can significantly impact both the
economic and human resources of USA. The estimated average cost
in a data breach can exceed $200 per compromised record. In
addition, a breach has great potential to harm the reputation of USA. 14
Disclosures of PHI
HIPAA regulations permit use or disclosure of PHI for:
• providing medical treatment
• processing healthcare payments
• conducting healthcare business operations
• public health purposes as required by law
Employees may not otherwise access or disclose PHI unless:
• the patient has given written permission
• it is within the scope of an employee’s job duties
• proper procedures are followed for using data in
research
• required or permitted by law
Note: the Final Rule now protects the PHI of a deceased
individual
for period of 50 years following the death of that individual. 15
HIPAA Security Rule
The HIPAA Security Rule concentrates on safeguarding
PHI by focusing on the confidentiality, integrity, and
availability of PHI.
Confidentiality means that data or information is not
made available or disclosed to unauthorized persons or
processes.
Integrity means that data or information has not been
altered or destroyed in an unauthorized manner.
Availability means that data or information is
accessible and useable upon demand only by an
authorized person.
16
Security
Standards/SafeguardsUSA Health is required to have administrative, technical, and
physical safeguards in place to protect the privacy of PHI.
Safeguards
must:
Protect PHI from accidental or intentional
unauthorized use/disclosure in computer
systems (including social media networking
sites such as Facebook, Twitter and others) and
work areas;
Limit accidental disclosures (such as PHI
discussions in waiting rooms and hallways); and
Include practices such as encryption,
document shredding, locking doors and file
17
Malicious
Software
Viruses, worms, spyware, ransomware, and spam are examples of
malicious software, sometimes known as “malware.”
Antivirus and anti-spyware software can be utilized for protection.
These should be updated regularly with patches.
Safe Internet browsing habits can also reduce the likelihood of an
infection; do not open email or click on embedded links from an
unknown or untrusted site.
If the computer or mobile device you are using is approved for storage
of work-related sensitive information, personal use of the web is not
recommended.
18
Viruses
Another major threat to USA’s
information system and to your data
is computer viruses.
• Viruses “infect” your computer by modifying how it operates
and, in many cases, destroying data.
• Viruses spread to other machines by the actions of users,
such as opening infected email attachments.
• Viruses can forward PHI to unauthorized persons by
attaching themselves to documents, which are then
emailed by the virus.
• Newer viruses have their own email engines, enabling them to
send email without having to use an email client or server.
• Many viruses also install a “backdoor” on affected computer
systems allowing for unauthorized access and collection of
PHI.
19
Ransomware
Ransomware is a type of malicious software designed to encrypt
data, which then blocks access to a computer system until a sum of
money is paid.
20
• Fastest growing malware threat – on average there are 4,000
attacks daily
• Ransomware can be downloaded onto systems when
unsuspecting users visit malicious or compromised websites.
However, most ransomware arrives in some sort of email
attachment, along with a message that encourages you to open
the file and look at it.
Spam and
PhishingSpam is an unsolicited or “junk” electronic mail
message, regardless of content.
Spam usually takes the form of bulk advertising
and may contain viruses, spyware, inappropriate
material, or “scams.”
Spam also clogs email
systems.
Phishing is a particularly dangerous form of spam that seeks
to trick users into revealing sensitive information, such as
passwords.
REMEMBER: USA will never ask you to disclose
passwords, social security numbers, or other sensitive
information via email.
Questions?
Call HSIS at 445-9123 or
the Office of HIPAA Compliance (OHC) at 445-9192
21
Safe Computing and Email
Use
See USA Health Privacy Policy # 5- Safeguarding Protected Health
Information and HIPAA Security Policy # 25- Use of Mobile Devices
for Computing and Data Storage
 Mobile Devices are not approved for storage of PHI without prior
Administrative approval unless they are part of a designated Health
System Information System.
 Encryption is required when a USA Health employee sends or receives
PHI to a destination address outside the USA Health network. Always use
#secure in the subject line.
 When traveling, working from home, or using a mobile device, an
employee whose work involves the transmission of PHI must encrypt the
data UNLESS the employee uses a VPN connection AND transmits data
only to a destination within the secure network.
 Do not open email attachments if the message looks the least bit
suspicious, even if you recognize the sender. “When in doubt, throw it out.”
 Do not respond to “spam” – simply discard or delete it, even if it
has an “unsubscribe” feature.
22
Password Control
Many security breaches come from within
an organization and many of these occur
because of bad password habits.
• Use strong passwords where possible (at least 7 characters,
containing a combination of letters, numbers, and special
characters).
• Change your passwords frequently (90 days) to prevent hackers
from using automated tools to guess your password.
• It is a violation of USA Health Policy to share your password with
anyone.
• Electronic audit records track information based on activity
associated with user IDs .
23
Employee
Responsibiliti
es
 Avoid storing sensitive information on mobile devices and portable
media, but if you must, use encryption.
 Always keep portable devices physically secure (under lock
and key) to prevent theft and unauthorized access.
 Access information only as necessary for your
authorized job responsibilities.
 Keep your passwords confidential.
 Comply with USA Health’s HIPAA Security and Privacy policies.
 Report to your supervisor and the USA Office of HIPAA Compliance
the loss or misuse of devices storing PHI or other Sensitive
Information promptly.
24
Appropriate Disposal of
DataObserve the following procedures for the
appropriate disposal of Sensitive Information,
including PHI.
• Hard copy materials such as paper or microfiche must be properly
shredded or placed in a secured bin for shredding later.
• Magnetic media such as diskettes, tapes, or hard drives must be
physically destroyed or “wiped” using approved software and procedures.
Contact HSIS or the Office of HIPAA Compliance for more information.
• CDs and DVDs must be rendered unreadable by shredding, defacing the
recording surface, or breaking.
25
Sensitive information and PHI should
never be placed in the regular trash!
What if there is a breach of
confidentiality?
Breaches of USA Health HIPAA policies or an
individual’s confidentiality must be reported to the
employee’s supervisor AND the Office of HIPAA
Compliance as soon as possible.
USA Health is required to take reasonable steps to lessen harmful
effects of a confirmed breach involving compromised PHI.
This includes notifying individuals whose information has been
breached. USA Health must report breaches to the Secretary of Health
and Human Services.
26
Disciplinary
Actions
Individuals who violate USA Health’s
HIPAA Policies will be subject to
appropriate disciplinary action, up to
and including termination, as outlined
in USA Health Human Resources and
HIPAA policies, as well as subject to
possible criminal or civil penalties.
27
Research Data
HIPAA regulates how PHI may be obtained and
used for research. This is true whether the PHI
is completely identifiable or partially “de-identified”
in a limited data set.
A researcher or healthcare provider is not entitled to use PHI in
research without the appropriate HIPAA documentation, including an
individual patient authorization
or
an institutionally approved waiver of authorization.
HIPAA requirements for accessing and using PHI in
research are explained on USA Office of Research
Compliance and Assurance webpage under Human
Subjects.
28
IRB Approval Process
• Submission of research application
• Research registration form
• HIPAA waiver
• HIPAA acknowledgement of research
application
• IRB approval (required for research to
begin.)
29
Data AccessRetrieval
Process
• Hospitals- Medical Records process
• Ambulatory clinics- Clinic operations
• Lack of Compliance
• Researchers requesting more PHI than what has been
approved
• EMR review not permitted unless approval granted
30
IRB Cloud Storage Drive
Where should research data be stored?
• All research data
• Intellectual property
IRB Cloud storage includes:
• Free storage
• Back-up protection
• Access from anywhere
• Secure encrypted connection
31
32
Office of Civil Rights(OCR) Audit
• The audit program is an important part of OCR’s overall health
information privacy, security, and breach notification compliance
activities.
• After completion of audit, the OCR will review and analyze
information from the final reports.
• The OCR may apply a penalty on the Covered Entity (CE) if the
findings show the CE is violating HIPAA rules.
33
Recent HIPAA Breaches
• Advocate Health Care Network
In 2013, 4 unencrypted laptops were stolen from Advocate,
the largest health care system in Illinois. The combined
breaches affected the ePHI of approximately 4 million
individuals. This settlement is the largest to-date against a
single entity - $5.55 million.
• St. Joseph Health
PHI of 31,800 individuals was publicly accessible on the
internet due to a server setting that was not securely
configured. The resolution agreement of this breach was
$2.14 million.
• University of Mississippi Medical Center
OCR leveled a $2.75 million fine against the medical center
when a password-protected laptop went missing. The
breach impacted about 10,000 patients. Investigators
discovered UMMC was aware of risks and vulnerabilities to
its systems as far back as April 2005, yet took no action to
avoid it.
34
HIPAA Resources
USA Office of HIPAA Compliance
Linda Hudson, Chief HIPAA Compliance Officer
470-5802 lhudson@health.southalabama.edu
Thad Phillips, Asst Chief, HIPAA Comp/Security
410-4550 tphillips@health.southalabama.edu
Cynthia Holland, HIPAA Audit Coordinator
471-7621 cholland@health.southalabama.edu
MCI
Cindy Nelson, Mgr, MCI Clin & Res Systems
445-9849 crnelson@health.southalabama.edu

More Related Content

What's hot

HIPAA Basics
HIPAA BasicsHIPAA Basics
HIPAA BasicsKarna *
 
HIPAA AND INFORMATION TECHNOLOGY
HIPAA AND INFORMATION TECHNOLOGYHIPAA AND INFORMATION TECHNOLOGY
HIPAA AND INFORMATION TECHNOLOGYmariaradziminski
 
Keys To HIPAA Compliance
Keys To HIPAA ComplianceKeys To HIPAA Compliance
Keys To HIPAA ComplianceCBIZ, Inc.
 
505 b2 submissions
505 b2 submissions505 b2 submissions
505 b2 submissionsASHISH SUTAR
 
HIPAA 101- What all Doctors NEED to know
HIPAA 101- What all Doctors NEED to knowHIPAA 101- What all Doctors NEED to know
HIPAA 101- What all Doctors NEED to knowCompliancy Group
 
Seeking Drug Approval via the 505(b)(2) NDA Option
Seeking Drug Approval via the 505(b)(2) NDA OptionSeeking Drug Approval via the 505(b)(2) NDA Option
Seeking Drug Approval via the 505(b)(2) NDA OptionQPS Holdings, LLC
 
Protocol development
Protocol developmentProtocol development
Protocol developmentAlisha Bansal
 
Hitrust: Navigating to 2017, Your Map to HITRUST Certification
Hitrust: Navigating to 2017, Your Map to HITRUST CertificationHitrust: Navigating to 2017, Your Map to HITRUST Certification
Hitrust: Navigating to 2017, Your Map to HITRUST CertificationSchellman & Company
 
HIPPA Compliance
HIPPA ComplianceHIPPA Compliance
HIPPA Compliancedixibee
 
Introduction to HIPAA for Healthcare Professionals by OUP
Introduction to HIPAA for Healthcare Professionals by OUPIntroduction to HIPAA for Healthcare Professionals by OUP
Introduction to HIPAA for Healthcare Professionals by OUPAtlantic Training, LLC.
 
Financial Disclosure –Duties and Strategies for Clinical Studies
Financial Disclosure –Duties and Strategies for Clinical StudiesFinancial Disclosure –Duties and Strategies for Clinical Studies
Financial Disclosure –Duties and Strategies for Clinical StudiesMichael Swit
 
Institutional review board/Independent ethics Committee
Institutional review board/Independent ethics CommitteeInstitutional review board/Independent ethics Committee
Institutional review board/Independent ethics CommitteeChintamBaladattaSai
 

What's hot (20)

HIPAA Basics
HIPAA BasicsHIPAA Basics
HIPAA Basics
 
HIPAA
HIPAAHIPAA
HIPAA
 
HIPAA
HIPAAHIPAA
HIPAA
 
HIPAA AND INFORMATION TECHNOLOGY
HIPAA AND INFORMATION TECHNOLOGYHIPAA AND INFORMATION TECHNOLOGY
HIPAA AND INFORMATION TECHNOLOGY
 
Keys To HIPAA Compliance
Keys To HIPAA ComplianceKeys To HIPAA Compliance
Keys To HIPAA Compliance
 
505 b2 submissions
505 b2 submissions505 b2 submissions
505 b2 submissions
 
Hitech Act
Hitech ActHitech Act
Hitech Act
 
Hipaa slideshow
Hipaa slideshowHipaa slideshow
Hipaa slideshow
 
HIPAA 101- What all Doctors NEED to know
HIPAA 101- What all Doctors NEED to knowHIPAA 101- What all Doctors NEED to know
HIPAA 101- What all Doctors NEED to know
 
Seeking Drug Approval via the 505(b)(2) NDA Option
Seeking Drug Approval via the 505(b)(2) NDA OptionSeeking Drug Approval via the 505(b)(2) NDA Option
Seeking Drug Approval via the 505(b)(2) NDA Option
 
Protocol development
Protocol developmentProtocol development
Protocol development
 
Hatch Waxman Act
Hatch Waxman ActHatch Waxman Act
Hatch Waxman Act
 
HIPAA and How it Applies to You
HIPAA and How it Applies to YouHIPAA and How it Applies to You
HIPAA and How it Applies to You
 
Hitrust: Navigating to 2017, Your Map to HITRUST Certification
Hitrust: Navigating to 2017, Your Map to HITRUST CertificationHitrust: Navigating to 2017, Your Map to HITRUST Certification
Hitrust: Navigating to 2017, Your Map to HITRUST Certification
 
HIPPA Compliance
HIPPA ComplianceHIPPA Compliance
HIPPA Compliance
 
HIPAA Complaince
HIPAA ComplainceHIPAA Complaince
HIPAA Complaince
 
HIPAA Privacy & Security
HIPAA Privacy & SecurityHIPAA Privacy & Security
HIPAA Privacy & Security
 
Introduction to HIPAA for Healthcare Professionals by OUP
Introduction to HIPAA for Healthcare Professionals by OUPIntroduction to HIPAA for Healthcare Professionals by OUP
Introduction to HIPAA for Healthcare Professionals by OUP
 
Financial Disclosure –Duties and Strategies for Clinical Studies
Financial Disclosure –Duties and Strategies for Clinical StudiesFinancial Disclosure –Duties and Strategies for Clinical Studies
Financial Disclosure –Duties and Strategies for Clinical Studies
 
Institutional review board/Independent ethics Committee
Institutional review board/Independent ethics CommitteeInstitutional review board/Independent ethics Committee
Institutional review board/Independent ethics Committee
 

Similar to 2017 HIPAA Clinical Research Training

Introduction to HIPAA and Confidentiality for Employees
Introduction to HIPAA and Confidentiality for EmployeesIntroduction to HIPAA and Confidentiality for Employees
Introduction to HIPAA and Confidentiality for EmployeesHouse of New Hope
 
HIPAA and Privacy Training
HIPAA and Privacy TrainingHIPAA and Privacy Training
HIPAA and Privacy TrainingJasAmataga
 
Mha690 wk 1 fletcher
Mha690 wk 1   fletcherMha690 wk 1   fletcher
Mha690 wk 1 fletcherEmed32
 
health insurance portability and accountability act.pptx
health insurance portability and accountability act.pptxhealth insurance portability and accountability act.pptx
health insurance portability and accountability act.pptxamartya2087
 
Marc etienne week1 discussion2 presentation
Marc etienne week1 discussion2 presentationMarc etienne week1 discussion2 presentation
Marc etienne week1 discussion2 presentationMarcEtienne6
 
2018-HIPAA-Renewal-Training.pptx
2018-HIPAA-Renewal-Training.pptx2018-HIPAA-Renewal-Training.pptx
2018-HIPAA-Renewal-Training.pptxFariida Osman
 
Health Insurance Portability and Accountability Act (HIPPA) - Kloudlearn
Health Insurance Portability and Accountability Act (HIPPA) - KloudlearnHealth Insurance Portability and Accountability Act (HIPPA) - Kloudlearn
Health Insurance Portability and Accountability Act (HIPPA) - KloudlearnKloudLearn
 
Chapter 5HIPAA and HITECHLearning ObjectivesUnde
Chapter 5HIPAA and HITECHLearning ObjectivesUndeChapter 5HIPAA and HITECHLearning ObjectivesUnde
Chapter 5HIPAA and HITECHLearning ObjectivesUndeWilheminaRossi174
 
Hipaa training new_staff_december 2018 - compatibility mode
Hipaa training new_staff_december 2018  -  compatibility modeHipaa training new_staff_december 2018  -  compatibility mode
Hipaa training new_staff_december 2018 - compatibility moderobint2125
 
Ruggiero.hipaa training
Ruggiero.hipaa trainingRuggiero.hipaa training
Ruggiero.hipaa trainingGina Ruggiero
 
Patient confidentiality MHA 690
Patient confidentiality MHA 690Patient confidentiality MHA 690
Patient confidentiality MHA 690AMSIMM9932
 
HIPAA Compliance For Small Practices
HIPAA Compliance For Small PracticesHIPAA Compliance For Small Practices
HIPAA Compliance For Small PracticesNisos Health
 
Confidentiality
ConfidentialityConfidentiality
ConfidentialityDeniseMHA
 
How to avoid being caught out by HIPAA compliance?
How to avoid being caught out by HIPAA compliance?How to avoid being caught out by HIPAA compliance?
How to avoid being caught out by HIPAA compliance?Lepide USA Inc
 
Protected health information
Protected health informationProtected health information
Protected health informationmiszkeeta
 
HIPPA COMPLIANCE (SANJEEV.S.BHARWAN)
HIPPA COMPLIANCE (SANJEEV.S.BHARWAN)HIPPA COMPLIANCE (SANJEEV.S.BHARWAN)
HIPPA COMPLIANCE (SANJEEV.S.BHARWAN)Sanjeev Bharwan
 
Knowing confidentiality
Knowing confidentialityKnowing confidentiality
Knowing confidentialityjessie66
 

Similar to 2017 HIPAA Clinical Research Training (20)

Annual HIPAA Training
Annual HIPAA TrainingAnnual HIPAA Training
Annual HIPAA Training
 
Introduction to HIPAA and Confidentiality for Employees
Introduction to HIPAA and Confidentiality for EmployeesIntroduction to HIPAA and Confidentiality for Employees
Introduction to HIPAA and Confidentiality for Employees
 
HIPAA and Privacy Training
HIPAA and Privacy TrainingHIPAA and Privacy Training
HIPAA and Privacy Training
 
Mha690 wk 1 fletcher
Mha690 wk 1   fletcherMha690 wk 1   fletcher
Mha690 wk 1 fletcher
 
health insurance portability and accountability act.pptx
health insurance portability and accountability act.pptxhealth insurance portability and accountability act.pptx
health insurance portability and accountability act.pptx
 
Marc etienne week1 discussion2 presentation
Marc etienne week1 discussion2 presentationMarc etienne week1 discussion2 presentation
Marc etienne week1 discussion2 presentation
 
2018-HIPAA-Renewal-Training.pptx
2018-HIPAA-Renewal-Training.pptx2018-HIPAA-Renewal-Training.pptx
2018-HIPAA-Renewal-Training.pptx
 
Health Insurance Portability and Accountability Act (HIPPA) - Kloudlearn
Health Insurance Portability and Accountability Act (HIPPA) - KloudlearnHealth Insurance Portability and Accountability Act (HIPPA) - Kloudlearn
Health Insurance Portability and Accountability Act (HIPPA) - Kloudlearn
 
Chapter 5HIPAA and HITECHLearning ObjectivesUnde
Chapter 5HIPAA and HITECHLearning ObjectivesUndeChapter 5HIPAA and HITECHLearning ObjectivesUnde
Chapter 5HIPAA and HITECHLearning ObjectivesUnde
 
Hipaa training new_staff_december 2018 - compatibility mode
Hipaa training new_staff_december 2018  -  compatibility modeHipaa training new_staff_december 2018  -  compatibility mode
Hipaa training new_staff_december 2018 - compatibility mode
 
Ruggiero.hipaa training
Ruggiero.hipaa trainingRuggiero.hipaa training
Ruggiero.hipaa training
 
Patient confidentiality MHA 690
Patient confidentiality MHA 690Patient confidentiality MHA 690
Patient confidentiality MHA 690
 
HIPAA Audio Presentation
HIPAA  Audio PresentationHIPAA  Audio Presentation
HIPAA Audio Presentation
 
HIPAA Compliance For Small Practices
HIPAA Compliance For Small PracticesHIPAA Compliance For Small Practices
HIPAA Compliance For Small Practices
 
Confidentiality
ConfidentialityConfidentiality
Confidentiality
 
How to avoid being caught out by HIPAA compliance?
How to avoid being caught out by HIPAA compliance?How to avoid being caught out by HIPAA compliance?
How to avoid being caught out by HIPAA compliance?
 
Protected health information
Protected health informationProtected health information
Protected health information
 
HIPPA COMPLIANCE (SANJEEV.S.BHARWAN)
HIPPA COMPLIANCE (SANJEEV.S.BHARWAN)HIPPA COMPLIANCE (SANJEEV.S.BHARWAN)
HIPPA COMPLIANCE (SANJEEV.S.BHARWAN)
 
Knowing confidentiality
Knowing confidentialityKnowing confidentiality
Knowing confidentiality
 
Hipaa and social media using new
Hipaa and social media using newHipaa and social media using new
Hipaa and social media using new
 

Recently uploaded

Call Girls Madhapur 7001305949 all area service COD available Any Time
Call Girls Madhapur 7001305949 all area service COD available Any TimeCall Girls Madhapur 7001305949 all area service COD available Any Time
Call Girls Madhapur 7001305949 all area service COD available Any Timedelhimodelshub1
 
Russian Escorts Delhi | 9711199171 | all area service available
Russian Escorts Delhi | 9711199171 | all area service availableRussian Escorts Delhi | 9711199171 | all area service available
Russian Escorts Delhi | 9711199171 | all area service availablesandeepkumar69420
 
Leading transformational change: inner and outer skills
Leading transformational change: inner and outer skillsLeading transformational change: inner and outer skills
Leading transformational change: inner and outer skillsHelenBevan4
 
Russian Call Girls in Chandigarh Ojaswi ❤️🍑 9907093804 👄🫦 Independent Escort ...
Russian Call Girls in Chandigarh Ojaswi ❤️🍑 9907093804 👄🫦 Independent Escort ...Russian Call Girls in Chandigarh Ojaswi ❤️🍑 9907093804 👄🫦 Independent Escort ...
Russian Call Girls in Chandigarh Ojaswi ❤️🍑 9907093804 👄🫦 Independent Escort ...High Profile Call Girls Chandigarh Aarushi
 
VIP Call Girls Sector 67 Gurgaon Just Call Me 9711199012
VIP Call Girls Sector 67 Gurgaon Just Call Me 9711199012VIP Call Girls Sector 67 Gurgaon Just Call Me 9711199012
VIP Call Girls Sector 67 Gurgaon Just Call Me 9711199012Call Girls Service Gurgaon
 
indian Call Girl Panchkula ❤️🍑 9907093804 Low Rate Call Girls Ludhiana Tulsi
indian Call Girl Panchkula ❤️🍑 9907093804 Low Rate Call Girls Ludhiana Tulsiindian Call Girl Panchkula ❤️🍑 9907093804 Low Rate Call Girls Ludhiana Tulsi
indian Call Girl Panchkula ❤️🍑 9907093804 Low Rate Call Girls Ludhiana TulsiHigh Profile Call Girls Chandigarh Aarushi
 
Call Girls LB Nagar 7001305949 all area service COD available Any Time
Call Girls LB Nagar 7001305949 all area service COD available Any TimeCall Girls LB Nagar 7001305949 all area service COD available Any Time
Call Girls LB Nagar 7001305949 all area service COD available Any Timedelhimodelshub1
 
Call Girl Gurgaon Saloni 9711199012 Independent Escort Service Gurgaon
Call Girl Gurgaon Saloni 9711199012 Independent Escort Service GurgaonCall Girl Gurgaon Saloni 9711199012 Independent Escort Service Gurgaon
Call Girl Gurgaon Saloni 9711199012 Independent Escort Service GurgaonCall Girls Service Gurgaon
 
Call Girls in Hyderabad Lavanya 9907093804 Independent Escort Service Hyderabad
Call Girls in Hyderabad Lavanya 9907093804 Independent Escort Service HyderabadCall Girls in Hyderabad Lavanya 9907093804 Independent Escort Service Hyderabad
Call Girls in Hyderabad Lavanya 9907093804 Independent Escort Service Hyderabaddelhimodelshub1
 
No Advance 9053900678 Chandigarh Call Girls , Indian Call Girls For Full Ni...
No Advance 9053900678 Chandigarh  Call Girls , Indian Call Girls  For Full Ni...No Advance 9053900678 Chandigarh  Call Girls , Indian Call Girls  For Full Ni...
No Advance 9053900678 Chandigarh Call Girls , Indian Call Girls For Full Ni...Vip call girls In Chandigarh
 
Call Girl Hyderabad Madhuri 9907093804 Independent Escort Service Hyderabad
Call Girl Hyderabad Madhuri 9907093804 Independent Escort Service HyderabadCall Girl Hyderabad Madhuri 9907093804 Independent Escort Service Hyderabad
Call Girl Hyderabad Madhuri 9907093804 Independent Escort Service Hyderabaddelhimodelshub1
 
Call Girls Service Chandigarh Grishma ❤️🍑 9907093804 👄🫦 Independent Escort Se...
Call Girls Service Chandigarh Grishma ❤️🍑 9907093804 👄🫦 Independent Escort Se...Call Girls Service Chandigarh Grishma ❤️🍑 9907093804 👄🫦 Independent Escort Se...
Call Girls Service Chandigarh Grishma ❤️🍑 9907093804 👄🫦 Independent Escort Se...High Profile Call Girls Chandigarh Aarushi
 
Russian Call Girls Hyderabad Indira 9907093804 Independent Escort Service Hyd...
Russian Call Girls Hyderabad Indira 9907093804 Independent Escort Service Hyd...Russian Call Girls Hyderabad Indira 9907093804 Independent Escort Service Hyd...
Russian Call Girls Hyderabad Indira 9907093804 Independent Escort Service Hyd...delhimodelshub1
 
Russian Call Girls Hyderabad Saloni 9907093804 Independent Escort Service Hyd...
Russian Call Girls Hyderabad Saloni 9907093804 Independent Escort Service Hyd...Russian Call Girls Hyderabad Saloni 9907093804 Independent Escort Service Hyd...
Russian Call Girls Hyderabad Saloni 9907093804 Independent Escort Service Hyd...delhimodelshub1
 
Gurgaon Sector 90 Call Girls ( 9873940964 ) Book Hot And Sexy Girls In A Few ...
Gurgaon Sector 90 Call Girls ( 9873940964 ) Book Hot And Sexy Girls In A Few ...Gurgaon Sector 90 Call Girls ( 9873940964 ) Book Hot And Sexy Girls In A Few ...
Gurgaon Sector 90 Call Girls ( 9873940964 ) Book Hot And Sexy Girls In A Few ...ggsonu500
 
Call Girl Chandigarh Mallika ❤️🍑 9907093804 👄🫦 Independent Escort Service Cha...
Call Girl Chandigarh Mallika ❤️🍑 9907093804 👄🫦 Independent Escort Service Cha...Call Girl Chandigarh Mallika ❤️🍑 9907093804 👄🫦 Independent Escort Service Cha...
Call Girl Chandigarh Mallika ❤️🍑 9907093804 👄🫦 Independent Escort Service Cha...High Profile Call Girls Chandigarh Aarushi
 

Recently uploaded (20)

Call Girls Madhapur 7001305949 all area service COD available Any Time
Call Girls Madhapur 7001305949 all area service COD available Any TimeCall Girls Madhapur 7001305949 all area service COD available Any Time
Call Girls Madhapur 7001305949 all area service COD available Any Time
 
Russian Escorts Delhi | 9711199171 | all area service available
Russian Escorts Delhi | 9711199171 | all area service availableRussian Escorts Delhi | 9711199171 | all area service available
Russian Escorts Delhi | 9711199171 | all area service available
 
Leading transformational change: inner and outer skills
Leading transformational change: inner and outer skillsLeading transformational change: inner and outer skills
Leading transformational change: inner and outer skills
 
Call Girl Lucknow Gauri 🔝 8923113531 🔝 🎶 Independent Escort Service Lucknow
Call Girl Lucknow Gauri 🔝 8923113531  🔝 🎶 Independent Escort Service LucknowCall Girl Lucknow Gauri 🔝 8923113531  🔝 🎶 Independent Escort Service Lucknow
Call Girl Lucknow Gauri 🔝 8923113531 🔝 🎶 Independent Escort Service Lucknow
 
Russian Call Girls in Chandigarh Ojaswi ❤️🍑 9907093804 👄🫦 Independent Escort ...
Russian Call Girls in Chandigarh Ojaswi ❤️🍑 9907093804 👄🫦 Independent Escort ...Russian Call Girls in Chandigarh Ojaswi ❤️🍑 9907093804 👄🫦 Independent Escort ...
Russian Call Girls in Chandigarh Ojaswi ❤️🍑 9907093804 👄🫦 Independent Escort ...
 
VIP Call Girls Sector 67 Gurgaon Just Call Me 9711199012
VIP Call Girls Sector 67 Gurgaon Just Call Me 9711199012VIP Call Girls Sector 67 Gurgaon Just Call Me 9711199012
VIP Call Girls Sector 67 Gurgaon Just Call Me 9711199012
 
indian Call Girl Panchkula ❤️🍑 9907093804 Low Rate Call Girls Ludhiana Tulsi
indian Call Girl Panchkula ❤️🍑 9907093804 Low Rate Call Girls Ludhiana Tulsiindian Call Girl Panchkula ❤️🍑 9907093804 Low Rate Call Girls Ludhiana Tulsi
indian Call Girl Panchkula ❤️🍑 9907093804 Low Rate Call Girls Ludhiana Tulsi
 
Call Girls LB Nagar 7001305949 all area service COD available Any Time
Call Girls LB Nagar 7001305949 all area service COD available Any TimeCall Girls LB Nagar 7001305949 all area service COD available Any Time
Call Girls LB Nagar 7001305949 all area service COD available Any Time
 
Call Girl Gurgaon Saloni 9711199012 Independent Escort Service Gurgaon
Call Girl Gurgaon Saloni 9711199012 Independent Escort Service GurgaonCall Girl Gurgaon Saloni 9711199012 Independent Escort Service Gurgaon
Call Girl Gurgaon Saloni 9711199012 Independent Escort Service Gurgaon
 
Call Girls in Hyderabad Lavanya 9907093804 Independent Escort Service Hyderabad
Call Girls in Hyderabad Lavanya 9907093804 Independent Escort Service HyderabadCall Girls in Hyderabad Lavanya 9907093804 Independent Escort Service Hyderabad
Call Girls in Hyderabad Lavanya 9907093804 Independent Escort Service Hyderabad
 
No Advance 9053900678 Chandigarh Call Girls , Indian Call Girls For Full Ni...
No Advance 9053900678 Chandigarh  Call Girls , Indian Call Girls  For Full Ni...No Advance 9053900678 Chandigarh  Call Girls , Indian Call Girls  For Full Ni...
No Advance 9053900678 Chandigarh Call Girls , Indian Call Girls For Full Ni...
 
Call Girl Hyderabad Madhuri 9907093804 Independent Escort Service Hyderabad
Call Girl Hyderabad Madhuri 9907093804 Independent Escort Service HyderabadCall Girl Hyderabad Madhuri 9907093804 Independent Escort Service Hyderabad
Call Girl Hyderabad Madhuri 9907093804 Independent Escort Service Hyderabad
 
Russian Call Girls South Delhi 9711199171 discount on your booking
Russian Call Girls South Delhi 9711199171 discount on your bookingRussian Call Girls South Delhi 9711199171 discount on your booking
Russian Call Girls South Delhi 9711199171 discount on your booking
 
Call Girls Service Chandigarh Grishma ❤️🍑 9907093804 👄🫦 Independent Escort Se...
Call Girls Service Chandigarh Grishma ❤️🍑 9907093804 👄🫦 Independent Escort Se...Call Girls Service Chandigarh Grishma ❤️🍑 9907093804 👄🫦 Independent Escort Se...
Call Girls Service Chandigarh Grishma ❤️🍑 9907093804 👄🫦 Independent Escort Se...
 
Russian Call Girls Hyderabad Indira 9907093804 Independent Escort Service Hyd...
Russian Call Girls Hyderabad Indira 9907093804 Independent Escort Service Hyd...Russian Call Girls Hyderabad Indira 9907093804 Independent Escort Service Hyd...
Russian Call Girls Hyderabad Indira 9907093804 Independent Escort Service Hyd...
 
College Call Girls Dehradun Kavya 🔝 7001305949 🔝 📍 Independent Escort Service...
College Call Girls Dehradun Kavya 🔝 7001305949 🔝 📍 Independent Escort Service...College Call Girls Dehradun Kavya 🔝 7001305949 🔝 📍 Independent Escort Service...
College Call Girls Dehradun Kavya 🔝 7001305949 🔝 📍 Independent Escort Service...
 
Russian Call Girls Hyderabad Saloni 9907093804 Independent Escort Service Hyd...
Russian Call Girls Hyderabad Saloni 9907093804 Independent Escort Service Hyd...Russian Call Girls Hyderabad Saloni 9907093804 Independent Escort Service Hyd...
Russian Call Girls Hyderabad Saloni 9907093804 Independent Escort Service Hyd...
 
Gurgaon Sector 90 Call Girls ( 9873940964 ) Book Hot And Sexy Girls In A Few ...
Gurgaon Sector 90 Call Girls ( 9873940964 ) Book Hot And Sexy Girls In A Few ...Gurgaon Sector 90 Call Girls ( 9873940964 ) Book Hot And Sexy Girls In A Few ...
Gurgaon Sector 90 Call Girls ( 9873940964 ) Book Hot And Sexy Girls In A Few ...
 
Call Girl Guwahati Aashi 👉 7001305949 👈 🔝 Independent Escort Service Guwahati
Call Girl Guwahati Aashi 👉 7001305949 👈 🔝 Independent Escort Service GuwahatiCall Girl Guwahati Aashi 👉 7001305949 👈 🔝 Independent Escort Service Guwahati
Call Girl Guwahati Aashi 👉 7001305949 👈 🔝 Independent Escort Service Guwahati
 
Call Girl Chandigarh Mallika ❤️🍑 9907093804 👄🫦 Independent Escort Service Cha...
Call Girl Chandigarh Mallika ❤️🍑 9907093804 👄🫦 Independent Escort Service Cha...Call Girl Chandigarh Mallika ❤️🍑 9907093804 👄🫦 Independent Escort Service Cha...
Call Girl Chandigarh Mallika ❤️🍑 9907093804 👄🫦 Independent Escort Service Cha...
 

2017 HIPAA Clinical Research Training

  • 1. Created 5/2017 HIPAA and the Security of Electronic Protected Health Information in Research May 23, 2017 1
  • 2. USA is a HIPAA Hybrid Entity A Hybrid Entity performs both covered and non-covered functions under the HIPAA Rules. • Healthcare components and components of USA that perform Business Associate type of functions (such as: legal or computer services)within USA are required to comply with HIPAA . • Individuals who perform support services for both USA HIPAA healthcare components and USA non-covered functions (such as: non-healthcare academic departments) are prohibited from using or sharing PHI obtained in the course of furnishing services for HIPAA covered healthcare components. • HIPAA treats the covered and non-covered functions as legally separate entities and no PHI may be shared or disclosed without the patient’s written authorization. • USA Health- Organized Health Care Arrangement (OHCA) 2
  • 3. Overview of Topics This presentation addresses items that are pertinent to HIPAA Privacy and Security for those conducting research within USA. • What is Protected Health Information (PHI); • Unauthorized accesses, Breaches, Disclosures; • HIPAA identifiers that create protected health information (PHI); • HIPAA Security; • Institutional Review Board (IRB) research; • IRB approval process; • Data access and retrieval process; • IRB cloud storage drive; • OCR Audits and recent HIPAA Breaches. 3
  • 4. PHI definedPHI is generally defined as: Any information that can be used to identify a patient – whether living or deceased – that relates to the patient’s past, present, or future physical or mental health or condition, including healthcare services provided and payment for those services. Employees may access the minimal necessary PHI to perform their job-related duties. 4
  • 5. Forms of Protected Health Information (PHI) It is the responsibility of every employee to protect the privacy and security of protected health information inALL forms. printe d spoke n Electronic (data in motion or at rest) Protected Health Information exists in various forms… 5
  • 6. Examples of Protected Health Information(PHI) • Social Security numbers • credit card numbers • driver’s license numbers • patient clinical information • research data • computer passwords • Individually identifiable health information The improper use or disclosure of protected health information presents the risk of identify theft, invasion of privacy, and can cause harm and embarrassment to students, faculty, staff, patients, and USA Health. Breaches of information privacy can also result in criminal and civil penalties for both USA Health and those individuals who improperly access or disclose protected health information, as well as, disciplinary actions for responsible USA employees. Every employee must protect the privacy and security of PHI. 6
  • 7. Covered Entities Have a Duty to Protect PHI A covered entity is any person or organization that furnishes, bills, or is paid for health care services in the normal course of business and electronically transmits any health information in connection with electronic standard transactions. Pursuant to HIPAA, individually identifiable health information collected or created by a covered entity is considered protected health information or PHI. Departments that use or disclose PHI are governed by HIPAA requirements. 7
  • 8. For PHI to be considered de-identified, the following identifiers must be removed: • Patient names • Geographic subdivisions (smaller than state) • Telephone numbers • Fax numbers • Social Security Numbers(SSN) • Vehicle identifiers • E-mail addresses • Web URLs and IP addresses • Dates (except year) • Names of relatives 8 • Full face photographs or identifiable images • Healthcare record numbers • Account numbers • Biometric identifiers (fingerprints or voiceprints) • Device identifiers • Health plan beneficiary numbers • Certificate/license numbers • Any other unique number, code, or characteristic that can be linked to an individual.
  • 9. Access Must be Authorized Except in very limited circumstances, if an employee accesses or discloses PHI without a patient’s written authorization or without a job-related reason for doing so, the employee violates USA Health HIPAA Policies and Procedures. An employee may only access or disclose a patient’s PHI when this access is part of the employee’s job duties. 9
  • 10. Unauthorized Access It is never acceptable for an employee to look at PHI “just out of curiosity,” even if no harm is intended (i.e., retrieving an address to send a get well card). It also makes no difference if the information relates to a “high profile” person or a close friend or family member –ALL information is entitled to the same protection and must be kept private. These rules apply to all employees, including health care professionals. Be aware that accessing PHI of someone involved in a divorce, separation, break-up, or custody dispute may be an indication of intent to use information for personal advantage, unless the access is required for the individual to do his job. Such improper behavior will be considered by USA Health when determining disciplinary 10
  • 11. Breaches A breach occurs when information that, by law, must be protected is: • lost, stolen or improperly disposed of (i.e. paper or device upon which the information is recorded cannot be accounted for); • “hacked” into by people or mechanized programs that are not authorized to have access (e.g. the system in which the information is located is compromised through a Virus, or Malware); or • communicated or sent to others who have no official need to receive it (e.g. gossip about information learned from a medical record). 11 Types of Breaches reported (as of 5/2016) Percent Theft 46% Unauthorized Access/ Disclosure 24% Hacking/IT 12% Loss 9% Improper Disposal 3% Other/ Unknown 7%
  • 12. Penalties for Breaches Breaches of the HIPAA Privacy and Security Rules have serious ramifications for all involved. In addition to sanctions imposed by USA Health, such breaches may result in civil and criminal penalties. Multiple types of HIPAA violations can result in penalties exceeding $1.5 million. 12
  • 13. Employees Must Report BreachesPart of your responsibility as an employee is to report privacy or security breaches involving PHI to your supervisor AND the HIPAA Compliance Office. Even if you are not sure whether an incident or action involves a breach, it is your responsibility to notify so that it can be investigated. Employees, volunteers,students,or contractors of USA may not threaten or take any retaliatory action against an individual for exercising his or her rights under HIPAA or for filing a HIPAA report or complaint, including notifying of a privacy or security breach. Reports may be made via telephone by calling the Compliance Hotline 251- 445-9192, 24 hours a day, 365 days a year. You may choose to remain anonymous. 13
  • 14. Breach Notification RequirementsAny impermissible use or disclosure that compromises PHI or other sensitive information may trigger breach notification requirements. Depending upon the results of a risk analysis of the impermissible use or disclosure, breach notification may have to be made to: • the Department of Health and Human Services, Office of Civil Rights (OCR); • all individuals whose information was breached or disclosed; and • the media. Letters of explanation describing the circumstances may have to be sent to responsible parties. Abreach can significantly impact both the economic and human resources of USA. The estimated average cost in a data breach can exceed $200 per compromised record. In addition, a breach has great potential to harm the reputation of USA. 14
  • 15. Disclosures of PHI HIPAA regulations permit use or disclosure of PHI for: • providing medical treatment • processing healthcare payments • conducting healthcare business operations • public health purposes as required by law Employees may not otherwise access or disclose PHI unless: • the patient has given written permission • it is within the scope of an employee’s job duties • proper procedures are followed for using data in research • required or permitted by law Note: the Final Rule now protects the PHI of a deceased individual for period of 50 years following the death of that individual. 15
  • 16. HIPAA Security Rule The HIPAA Security Rule concentrates on safeguarding PHI by focusing on the confidentiality, integrity, and availability of PHI. Confidentiality means that data or information is not made available or disclosed to unauthorized persons or processes. Integrity means that data or information has not been altered or destroyed in an unauthorized manner. Availability means that data or information is accessible and useable upon demand only by an authorized person. 16
  • 17. Security Standards/SafeguardsUSA Health is required to have administrative, technical, and physical safeguards in place to protect the privacy of PHI. Safeguards must: Protect PHI from accidental or intentional unauthorized use/disclosure in computer systems (including social media networking sites such as Facebook, Twitter and others) and work areas; Limit accidental disclosures (such as PHI discussions in waiting rooms and hallways); and Include practices such as encryption, document shredding, locking doors and file 17
  • 18. Malicious Software Viruses, worms, spyware, ransomware, and spam are examples of malicious software, sometimes known as “malware.” Antivirus and anti-spyware software can be utilized for protection. These should be updated regularly with patches. Safe Internet browsing habits can also reduce the likelihood of an infection; do not open email or click on embedded links from an unknown or untrusted site. If the computer or mobile device you are using is approved for storage of work-related sensitive information, personal use of the web is not recommended. 18
  • 19. Viruses Another major threat to USA’s information system and to your data is computer viruses. • Viruses “infect” your computer by modifying how it operates and, in many cases, destroying data. • Viruses spread to other machines by the actions of users, such as opening infected email attachments. • Viruses can forward PHI to unauthorized persons by attaching themselves to documents, which are then emailed by the virus. • Newer viruses have their own email engines, enabling them to send email without having to use an email client or server. • Many viruses also install a “backdoor” on affected computer systems allowing for unauthorized access and collection of PHI. 19
  • 20. Ransomware Ransomware is a type of malicious software designed to encrypt data, which then blocks access to a computer system until a sum of money is paid. 20 • Fastest growing malware threat – on average there are 4,000 attacks daily • Ransomware can be downloaded onto systems when unsuspecting users visit malicious or compromised websites. However, most ransomware arrives in some sort of email attachment, along with a message that encourages you to open the file and look at it.
  • 21. Spam and PhishingSpam is an unsolicited or “junk” electronic mail message, regardless of content. Spam usually takes the form of bulk advertising and may contain viruses, spyware, inappropriate material, or “scams.” Spam also clogs email systems. Phishing is a particularly dangerous form of spam that seeks to trick users into revealing sensitive information, such as passwords. REMEMBER: USA will never ask you to disclose passwords, social security numbers, or other sensitive information via email. Questions? Call HSIS at 445-9123 or the Office of HIPAA Compliance (OHC) at 445-9192 21
  • 22. Safe Computing and Email Use See USA Health Privacy Policy # 5- Safeguarding Protected Health Information and HIPAA Security Policy # 25- Use of Mobile Devices for Computing and Data Storage  Mobile Devices are not approved for storage of PHI without prior Administrative approval unless they are part of a designated Health System Information System.  Encryption is required when a USA Health employee sends or receives PHI to a destination address outside the USA Health network. Always use #secure in the subject line.  When traveling, working from home, or using a mobile device, an employee whose work involves the transmission of PHI must encrypt the data UNLESS the employee uses a VPN connection AND transmits data only to a destination within the secure network.  Do not open email attachments if the message looks the least bit suspicious, even if you recognize the sender. “When in doubt, throw it out.”  Do not respond to “spam” – simply discard or delete it, even if it has an “unsubscribe” feature. 22
  • 23. Password Control Many security breaches come from within an organization and many of these occur because of bad password habits. • Use strong passwords where possible (at least 7 characters, containing a combination of letters, numbers, and special characters). • Change your passwords frequently (90 days) to prevent hackers from using automated tools to guess your password. • It is a violation of USA Health Policy to share your password with anyone. • Electronic audit records track information based on activity associated with user IDs . 23
  • 24. Employee Responsibiliti es  Avoid storing sensitive information on mobile devices and portable media, but if you must, use encryption.  Always keep portable devices physically secure (under lock and key) to prevent theft and unauthorized access.  Access information only as necessary for your authorized job responsibilities.  Keep your passwords confidential.  Comply with USA Health’s HIPAA Security and Privacy policies.  Report to your supervisor and the USA Office of HIPAA Compliance the loss or misuse of devices storing PHI or other Sensitive Information promptly. 24
  • 25. Appropriate Disposal of DataObserve the following procedures for the appropriate disposal of Sensitive Information, including PHI. • Hard copy materials such as paper or microfiche must be properly shredded or placed in a secured bin for shredding later. • Magnetic media such as diskettes, tapes, or hard drives must be physically destroyed or “wiped” using approved software and procedures. Contact HSIS or the Office of HIPAA Compliance for more information. • CDs and DVDs must be rendered unreadable by shredding, defacing the recording surface, or breaking. 25 Sensitive information and PHI should never be placed in the regular trash!
  • 26. What if there is a breach of confidentiality? Breaches of USA Health HIPAA policies or an individual’s confidentiality must be reported to the employee’s supervisor AND the Office of HIPAA Compliance as soon as possible. USA Health is required to take reasonable steps to lessen harmful effects of a confirmed breach involving compromised PHI. This includes notifying individuals whose information has been breached. USA Health must report breaches to the Secretary of Health and Human Services. 26
  • 27. Disciplinary Actions Individuals who violate USA Health’s HIPAA Policies will be subject to appropriate disciplinary action, up to and including termination, as outlined in USA Health Human Resources and HIPAA policies, as well as subject to possible criminal or civil penalties. 27
  • 28. Research Data HIPAA regulates how PHI may be obtained and used for research. This is true whether the PHI is completely identifiable or partially “de-identified” in a limited data set. A researcher or healthcare provider is not entitled to use PHI in research without the appropriate HIPAA documentation, including an individual patient authorization or an institutionally approved waiver of authorization. HIPAA requirements for accessing and using PHI in research are explained on USA Office of Research Compliance and Assurance webpage under Human Subjects. 28
  • 29. IRB Approval Process • Submission of research application • Research registration form • HIPAA waiver • HIPAA acknowledgement of research application • IRB approval (required for research to begin.) 29
  • 30. Data AccessRetrieval Process • Hospitals- Medical Records process • Ambulatory clinics- Clinic operations • Lack of Compliance • Researchers requesting more PHI than what has been approved • EMR review not permitted unless approval granted 30
  • 31. IRB Cloud Storage Drive Where should research data be stored? • All research data • Intellectual property IRB Cloud storage includes: • Free storage • Back-up protection • Access from anywhere • Secure encrypted connection 31
  • 32. 32 Office of Civil Rights(OCR) Audit • The audit program is an important part of OCR’s overall health information privacy, security, and breach notification compliance activities. • After completion of audit, the OCR will review and analyze information from the final reports. • The OCR may apply a penalty on the Covered Entity (CE) if the findings show the CE is violating HIPAA rules.
  • 33. 33 Recent HIPAA Breaches • Advocate Health Care Network In 2013, 4 unencrypted laptops were stolen from Advocate, the largest health care system in Illinois. The combined breaches affected the ePHI of approximately 4 million individuals. This settlement is the largest to-date against a single entity - $5.55 million. • St. Joseph Health PHI of 31,800 individuals was publicly accessible on the internet due to a server setting that was not securely configured. The resolution agreement of this breach was $2.14 million. • University of Mississippi Medical Center OCR leveled a $2.75 million fine against the medical center when a password-protected laptop went missing. The breach impacted about 10,000 patients. Investigators discovered UMMC was aware of risks and vulnerabilities to its systems as far back as April 2005, yet took no action to avoid it.
  • 34. 34 HIPAA Resources USA Office of HIPAA Compliance Linda Hudson, Chief HIPAA Compliance Officer 470-5802 lhudson@health.southalabama.edu Thad Phillips, Asst Chief, HIPAA Comp/Security 410-4550 tphillips@health.southalabama.edu Cynthia Holland, HIPAA Audit Coordinator 471-7621 cholland@health.southalabama.edu MCI Cindy Nelson, Mgr, MCI Clin & Res Systems 445-9849 crnelson@health.southalabama.edu

Editor's Notes

  1. Sensitive information and PHI should never be placed in the regular trash!