SlideShare a Scribd company logo
1 of 1
EmilyMarshall
HIPAA
HIPAA Tittle II
One of the primary areas of regulation is standardization of health care transactions.
Covered entities must be compliant with electronic transactions requirements by October 2002
(October 2003 if the covered entity has requested a one-year extension from the government or if
the covered entity is a small health plan). HIPAA requires every provider who does business
electronically to use the same health care transactions, code sets, and identifiers. Anthem has
filed for, and received, a one-year extension for compliance with the electronic transactions
requirements. Covered entities must be complaint with unique identifiers rules is published.
Unique identifiers rule has three unique identifiers: Standard unique employer identifier used on
an organization’s federal IRS Form W-2. This identifies an employer entity in HIPAA
transactions. Another one is National provider identifier (NPI) which is a unique 10-digit number
used for covered health-care providers in all HIPAA administrative and financial transactions.
The last but not least is national Health plan identifier (NHI), it is a centers of Medicare and
Medicaid services (CMS) proposed identifier to identify health plan and payers.
The second primary controls to protect health information regulations like your privacy
rule and security rule. The major goal of the Privacy Rule is to assure that individuals’ health
information is properly protected while allowing the flow of health information needed to
provide and promote high quality health care and to protect the public’s health and well-being.
The Rule strikes a balance that permits important uses of information, while protecting the
privacy of people who seek care and healing. The security rule means that e-PHI is not available
or disclosed to unauthorized persons. The security rule’s confidentiality requirements support the
privacy rule’s prohibitions against improper uses and disclosures of PHI. The security rule also
promotes the two additional goals of maintaining the integrity and availability of e-PHI. Under
the security rule, “integrity” means that e-PHI is not altered or destroyed in an unauthorized
manner. “Availability” means that e-PHI is accessible and usable on demand by an authorized
person.
http://www.hhs.gov/hipaa/for-professionals/security/laws-regulations/
http://www.hhs.gov/sites/default/files/privacysummary.pdf
https://www.anthem.com/shared/noapplication/f3/s1/t0/pw_035866.pdf
https://www.cms.gov/Regulations-and-Guidance/HIPAA-Administrative-
Simplification/EventsandLatestNews/Downloads/HIPAA101-1.pdf

More Related Content

What's hot

Patient confidentilty
Patient confidentiltyPatient confidentilty
Patient confidentiltySheena705
 
Understanding patient privacy 1
Understanding patient privacy 1Understanding patient privacy 1
Understanding patient privacy 1Jonsie12
 
Week 1 discussion 2 hipaa and privacy training
Week 1 discussion 2 hipaa and privacy trainingWeek 1 discussion 2 hipaa and privacy training
Week 1 discussion 2 hipaa and privacy trainingvrgill22
 
Health insurance portability and act(hipaa)2
Health insurance portability and act(hipaa)2Health insurance portability and act(hipaa)2
Health insurance portability and act(hipaa)29535814851
 
Knowing confidentiality
Knowing confidentialityKnowing confidentiality
Knowing confidentialityjessie66
 
HIPAA Summary for Training
HIPAA Summary for Training HIPAA Summary for Training
HIPAA Summary for Training MDManagement
 
Mha 690 presentation hippa
Mha 690 presentation hippaMha 690 presentation hippa
Mha 690 presentation hippabelle0508
 
HIPPA Compliance
HIPPA ComplianceHIPPA Compliance
HIPPA Compliancedixibee
 
Understanding HIPAA
Understanding HIPAAUnderstanding HIPAA
Understanding HIPAAManas Deep
 
Failure to Execute a HIPAA Business Associate Agreement Results in $1.55 Mill...
Failure to Execute a HIPAA Business Associate Agreement Results in $1.55 Mill...Failure to Execute a HIPAA Business Associate Agreement Results in $1.55 Mill...
Failure to Execute a HIPAA Business Associate Agreement Results in $1.55 Mill...Brian Dickerson
 
HIPAA Training - 2011
HIPAA Training - 2011HIPAA Training - 2011
HIPAA Training - 2011darichardson
 
Confidentiality presentation(1)
Confidentiality presentation(1)Confidentiality presentation(1)
Confidentiality presentation(1)Kimberlin1
 
HIPAA Compliance for Developers
HIPAA Compliance for DevelopersHIPAA Compliance for Developers
HIPAA Compliance for DevelopersTrueVault
 
Hipaa basics pp2
Hipaa basics pp2Hipaa basics pp2
Hipaa basics pp2martykoepke
 
HIPAA 101 for Startups
HIPAA 101 for StartupsHIPAA 101 for Startups
HIPAA 101 for StartupsObaa, Inc.
 

What's hot (19)

Patient confidentilty
Patient confidentiltyPatient confidentilty
Patient confidentilty
 
Understanding patient privacy 1
Understanding patient privacy 1Understanding patient privacy 1
Understanding patient privacy 1
 
Week 1 discussion 2 hipaa and privacy training
Week 1 discussion 2 hipaa and privacy trainingWeek 1 discussion 2 hipaa and privacy training
Week 1 discussion 2 hipaa and privacy training
 
HIPAA Compliance
HIPAA Compliance HIPAA Compliance
HIPAA Compliance
 
Health insurance portability and act(hipaa)2
Health insurance portability and act(hipaa)2Health insurance portability and act(hipaa)2
Health insurance portability and act(hipaa)2
 
Knowing confidentiality
Knowing confidentialityKnowing confidentiality
Knowing confidentiality
 
HIPAA Summary for Training
HIPAA Summary for Training HIPAA Summary for Training
HIPAA Summary for Training
 
Mha 690 presentation hippa
Mha 690 presentation hippaMha 690 presentation hippa
Mha 690 presentation hippa
 
HIPPA Compliance
HIPPA ComplianceHIPPA Compliance
HIPPA Compliance
 
Understanding HIPAA
Understanding HIPAAUnderstanding HIPAA
Understanding HIPAA
 
Failure to Execute a HIPAA Business Associate Agreement Results in $1.55 Mill...
Failure to Execute a HIPAA Business Associate Agreement Results in $1.55 Mill...Failure to Execute a HIPAA Business Associate Agreement Results in $1.55 Mill...
Failure to Execute a HIPAA Business Associate Agreement Results in $1.55 Mill...
 
HIPAA Training - 2011
HIPAA Training - 2011HIPAA Training - 2011
HIPAA Training - 2011
 
Confidentiality presentation(1)
Confidentiality presentation(1)Confidentiality presentation(1)
Confidentiality presentation(1)
 
HIPAA Compliance for Developers
HIPAA Compliance for DevelopersHIPAA Compliance for Developers
HIPAA Compliance for Developers
 
Louise bailey ppt
Louise bailey pptLouise bailey ppt
Louise bailey ppt
 
Hipaa basics pp2
Hipaa basics pp2Hipaa basics pp2
Hipaa basics pp2
 
Hippa laws
Hippa lawsHippa laws
Hippa laws
 
HIPAA and How it Applies to You
HIPAA and How it Applies to YouHIPAA and How it Applies to You
HIPAA and How it Applies to You
 
HIPAA 101 for Startups
HIPAA 101 for StartupsHIPAA 101 for Startups
HIPAA 101 for Startups
 

Viewers also liked

Sandeep marwah designated global cultural minister at international conference
Sandeep marwah designated global cultural minister at international conferenceSandeep marwah designated global cultural minister at international conference
Sandeep marwah designated global cultural minister at international conferenceMarwah Studios
 
Psycho Report. Tittle: First Impression on appearance
Psycho Report. Tittle: First Impression on appearance Psycho Report. Tittle: First Impression on appearance
Psycho Report. Tittle: First Impression on appearance ZIyeeTan
 
Tamed, by MADE, Beyond the Gallery, Sally Robertshaw
Tamed, by MADE, Beyond the Gallery, Sally RobertshawTamed, by MADE, Beyond the Gallery, Sally Robertshaw
Tamed, by MADE, Beyond the Gallery, Sally RobertshawDesign South East
 
Urban Room for Birmingham, David Tittle
Urban Room for Birmingham, David TittleUrban Room for Birmingham, David Tittle
Urban Room for Birmingham, David TittleDesign South East
 
Levels and techniques of evaluation in educational technology
Levels and techniques of evaluation in educational technologyLevels and techniques of evaluation in educational technology
Levels and techniques of evaluation in educational technologyMaster Key
 
Study of awareness level of stem cell banking in the prescribed areas of Pune...
Study of awareness level of stem cell banking in the prescribed areas of Pune...Study of awareness level of stem cell banking in the prescribed areas of Pune...
Study of awareness level of stem cell banking in the prescribed areas of Pune...Rohan Bakshi
 
HIGH SPEED TRAIN
HIGH SPEED TRAINHIGH SPEED TRAIN
HIGH SPEED TRAINFloyCohen
 
Review of related literature
Review of related literatureReview of related literature
Review of related literatureBean Malicse
 
Review of related literature and studies
Review of related literature and studiesReview of related literature and studies
Review of related literature and studiesbantigui
 
Cochin Shipyard Limited -Organisational Study
Cochin Shipyard Limited -Organisational StudyCochin Shipyard Limited -Organisational Study
Cochin Shipyard Limited -Organisational StudyAbhijith Mohanan
 
Chapter 2-Realated literature and Studies
Chapter 2-Realated literature and StudiesChapter 2-Realated literature and Studies
Chapter 2-Realated literature and StudiesMercy Daracan
 
Multistorey building
Multistorey buildingMultistorey building
Multistorey buildingRahul
 

Viewers also liked (16)

Sandeep marwah designated global cultural minister at international conference
Sandeep marwah designated global cultural minister at international conferenceSandeep marwah designated global cultural minister at international conference
Sandeep marwah designated global cultural minister at international conference
 
Romero monsalve7
Romero monsalve7Romero monsalve7
Romero monsalve7
 
Psycho Report. Tittle: First Impression on appearance
Psycho Report. Tittle: First Impression on appearance Psycho Report. Tittle: First Impression on appearance
Psycho Report. Tittle: First Impression on appearance
 
Tamed, by MADE, Beyond the Gallery, Sally Robertshaw
Tamed, by MADE, Beyond the Gallery, Sally RobertshawTamed, by MADE, Beyond the Gallery, Sally Robertshaw
Tamed, by MADE, Beyond the Gallery, Sally Robertshaw
 
Urban Room for Birmingham, David Tittle
Urban Room for Birmingham, David TittleUrban Room for Birmingham, David Tittle
Urban Room for Birmingham, David Tittle
 
Levels and techniques of evaluation in educational technology
Levels and techniques of evaluation in educational technologyLevels and techniques of evaluation in educational technology
Levels and techniques of evaluation in educational technology
 
Study of awareness level of stem cell banking in the prescribed areas of Pune...
Study of awareness level of stem cell banking in the prescribed areas of Pune...Study of awareness level of stem cell banking in the prescribed areas of Pune...
Study of awareness level of stem cell banking in the prescribed areas of Pune...
 
HIGH SPEED TRAIN
HIGH SPEED TRAINHIGH SPEED TRAIN
HIGH SPEED TRAIN
 
First Impression
First ImpressionFirst Impression
First Impression
 
Review of related literature
Review of related literatureReview of related literature
Review of related literature
 
Review of related literature and studies
Review of related literature and studiesReview of related literature and studies
Review of related literature and studies
 
The Righteousness of Christ
The Righteousness of ChristThe Righteousness of Christ
The Righteousness of Christ
 
Chapter 2
Chapter 2Chapter 2
Chapter 2
 
Cochin Shipyard Limited -Organisational Study
Cochin Shipyard Limited -Organisational StudyCochin Shipyard Limited -Organisational Study
Cochin Shipyard Limited -Organisational Study
 
Chapter 2-Realated literature and Studies
Chapter 2-Realated literature and StudiesChapter 2-Realated literature and Studies
Chapter 2-Realated literature and Studies
 
Multistorey building
Multistorey buildingMultistorey building
Multistorey building
 

Similar to HIPAA Regulations for Electronic Transactions, Privacy and Security

HIPAA , REGULATORY AFFAIRS , M.PHARM ...
HIPAA , REGULATORY AFFAIRS , M.PHARM ...HIPAA , REGULATORY AFFAIRS , M.PHARM ...
HIPAA , REGULATORY AFFAIRS , M.PHARM ...susmitaghosh93
 
Welcome to HIPAA Training
Welcome to HIPAA TrainingWelcome to HIPAA Training
Welcome to HIPAA TrainingJonathan Montes
 
Chapter 10 Privacy and Security of Health RecordsLearnin.docx
Chapter 10 Privacy and Security of Health RecordsLearnin.docxChapter 10 Privacy and Security of Health RecordsLearnin.docx
Chapter 10 Privacy and Security of Health RecordsLearnin.docxcravennichole326
 
Describe one safeguard that should be in place to protect the confid.pdf
Describe one safeguard that should be in place to protect the confid.pdfDescribe one safeguard that should be in place to protect the confid.pdf
Describe one safeguard that should be in place to protect the confid.pdfmohammedfootwear
 
Protecting Patient Health Information in the HITECH Era
Protecting Patient Health Information in the HITECH EraProtecting Patient Health Information in the HITECH Era
Protecting Patient Health Information in the HITECH EraRapid7
 
Health Insurance Portability and Accountability Act of 1996.docx
Health Insurance Portability and Accountability Act of 1996.docxHealth Insurance Portability and Accountability Act of 1996.docx
Health Insurance Portability and Accountability Act of 1996.docxAlesandriaPablo
 
Ftc As Enforcer Proposed Data Breach Notification Rule For Personal Health R...
Ftc As Enforcer  Proposed Data Breach Notification Rule For Personal Health R...Ftc As Enforcer  Proposed Data Breach Notification Rule For Personal Health R...
Ftc As Enforcer Proposed Data Breach Notification Rule For Personal Health R...Davis Wright Tremaine LLP
 
HIPAA Final Omnibus Rule Playbook
HIPAA Final Omnibus Rule PlaybookHIPAA Final Omnibus Rule Playbook
HIPAA Final Omnibus Rule PlaybookElizabeth Dimit
 
Does your Mobile App require HIPAA Compliance.pdf
Does your Mobile App require HIPAA Compliance.pdfDoes your Mobile App require HIPAA Compliance.pdf
Does your Mobile App require HIPAA Compliance.pdfShelly Megan
 
HIPAA/HITECH Requirements for FQHCs and the New Omnibus Rule
HIPAA/HITECH Requirements for FQHCs and the New Omnibus RuleHIPAA/HITECH Requirements for FQHCs and the New Omnibus Rule
HIPAA/HITECH Requirements for FQHCs and the New Omnibus RuleMichigan Primary Care Association
 
Mha690 presentation by rachael javidan
Mha690 presentation by rachael javidanMha690 presentation by rachael javidan
Mha690 presentation by rachael javidanRachaelJavidan
 
Explaining the HIPAA Privacy[.docx
Explaining the HIPAA Privacy[.docxExplaining the HIPAA Privacy[.docx
Explaining the HIPAA Privacy[.docxVistaInfosec
 
The Health Insurance Portability And Accountability Act Essay
The Health Insurance Portability And Accountability Act EssayThe Health Insurance Portability And Accountability Act Essay
The Health Insurance Portability And Accountability Act EssayJamie Boyd
 
Health Insurance Portability & Accountability Act (HIPAA).pptx
Health Insurance Portability & Accountability Act (HIPAA).pptxHealth Insurance Portability & Accountability Act (HIPAA).pptx
Health Insurance Portability & Accountability Act (HIPAA).pptxHariomjaiswal14
 

Similar to HIPAA Regulations for Electronic Transactions, Privacy and Security (20)

HIPAA , REGULATORY AFFAIRS , M.PHARM ...
HIPAA , REGULATORY AFFAIRS , M.PHARM ...HIPAA , REGULATORY AFFAIRS , M.PHARM ...
HIPAA , REGULATORY AFFAIRS , M.PHARM ...
 
Welcome to HIPAA Training
Welcome to HIPAA TrainingWelcome to HIPAA Training
Welcome to HIPAA Training
 
Chapter 10 Privacy and Security of Health RecordsLearnin.docx
Chapter 10 Privacy and Security of Health RecordsLearnin.docxChapter 10 Privacy and Security of Health RecordsLearnin.docx
Chapter 10 Privacy and Security of Health RecordsLearnin.docx
 
Hipaa omnibus
Hipaa omnibusHipaa omnibus
Hipaa omnibus
 
Scary acronyms
Scary acronymsScary acronyms
Scary acronyms
 
HIPAA Privacy & Security
HIPAA Privacy & SecurityHIPAA Privacy & Security
HIPAA Privacy & Security
 
Describe one safeguard that should be in place to protect the confid.pdf
Describe one safeguard that should be in place to protect the confid.pdfDescribe one safeguard that should be in place to protect the confid.pdf
Describe one safeguard that should be in place to protect the confid.pdf
 
Protecting Patient Health Information in the HITECH Era
Protecting Patient Health Information in the HITECH EraProtecting Patient Health Information in the HITECH Era
Protecting Patient Health Information in the HITECH Era
 
Hippa training v2
Hippa training v2Hippa training v2
Hippa training v2
 
Health Insurance Portability and Accountability Act of 1996.docx
Health Insurance Portability and Accountability Act of 1996.docxHealth Insurance Portability and Accountability Act of 1996.docx
Health Insurance Portability and Accountability Act of 1996.docx
 
Ftc As Enforcer Proposed Data Breach Notification Rule For Personal Health R...
Ftc As Enforcer  Proposed Data Breach Notification Rule For Personal Health R...Ftc As Enforcer  Proposed Data Breach Notification Rule For Personal Health R...
Ftc As Enforcer Proposed Data Breach Notification Rule For Personal Health R...
 
HIPAA Final Omnibus Rule Playbook
HIPAA Final Omnibus Rule PlaybookHIPAA Final Omnibus Rule Playbook
HIPAA Final Omnibus Rule Playbook
 
Does your Mobile App require HIPAA Compliance.pdf
Does your Mobile App require HIPAA Compliance.pdfDoes your Mobile App require HIPAA Compliance.pdf
Does your Mobile App require HIPAA Compliance.pdf
 
HIPAA/HITECH Requirements for FQHCs and the New Omnibus Rule
HIPAA/HITECH Requirements for FQHCs and the New Omnibus RuleHIPAA/HITECH Requirements for FQHCs and the New Omnibus Rule
HIPAA/HITECH Requirements for FQHCs and the New Omnibus Rule
 
Mha690 presentation by rachael javidan
Mha690 presentation by rachael javidanMha690 presentation by rachael javidan
Mha690 presentation by rachael javidan
 
Explaining the HIPAA Privacy[.docx
Explaining the HIPAA Privacy[.docxExplaining the HIPAA Privacy[.docx
Explaining the HIPAA Privacy[.docx
 
The Health Insurance Portability And Accountability Act Essay
The Health Insurance Portability And Accountability Act EssayThe Health Insurance Portability And Accountability Act Essay
The Health Insurance Portability And Accountability Act Essay
 
Health Insurance Portability & Accountability Act (HIPAA).pptx
Health Insurance Portability & Accountability Act (HIPAA).pptxHealth Insurance Portability & Accountability Act (HIPAA).pptx
Health Insurance Portability & Accountability Act (HIPAA).pptx
 
Chapter 1 the goal of hipaa administrative simplification
Chapter 1 the goal of hipaa   administrative simplificationChapter 1 the goal of hipaa   administrative simplification
Chapter 1 the goal of hipaa administrative simplification
 
Hipaa for business associates simple
Hipaa for business associates   simpleHipaa for business associates   simple
Hipaa for business associates simple
 

HIPAA Regulations for Electronic Transactions, Privacy and Security

  • 1. EmilyMarshall HIPAA HIPAA Tittle II One of the primary areas of regulation is standardization of health care transactions. Covered entities must be compliant with electronic transactions requirements by October 2002 (October 2003 if the covered entity has requested a one-year extension from the government or if the covered entity is a small health plan). HIPAA requires every provider who does business electronically to use the same health care transactions, code sets, and identifiers. Anthem has filed for, and received, a one-year extension for compliance with the electronic transactions requirements. Covered entities must be complaint with unique identifiers rules is published. Unique identifiers rule has three unique identifiers: Standard unique employer identifier used on an organization’s federal IRS Form W-2. This identifies an employer entity in HIPAA transactions. Another one is National provider identifier (NPI) which is a unique 10-digit number used for covered health-care providers in all HIPAA administrative and financial transactions. The last but not least is national Health plan identifier (NHI), it is a centers of Medicare and Medicaid services (CMS) proposed identifier to identify health plan and payers. The second primary controls to protect health information regulations like your privacy rule and security rule. The major goal of the Privacy Rule is to assure that individuals’ health information is properly protected while allowing the flow of health information needed to provide and promote high quality health care and to protect the public’s health and well-being. The Rule strikes a balance that permits important uses of information, while protecting the privacy of people who seek care and healing. The security rule means that e-PHI is not available or disclosed to unauthorized persons. The security rule’s confidentiality requirements support the privacy rule’s prohibitions against improper uses and disclosures of PHI. The security rule also promotes the two additional goals of maintaining the integrity and availability of e-PHI. Under the security rule, “integrity” means that e-PHI is not altered or destroyed in an unauthorized manner. “Availability” means that e-PHI is accessible and usable on demand by an authorized person. http://www.hhs.gov/hipaa/for-professionals/security/laws-regulations/ http://www.hhs.gov/sites/default/files/privacysummary.pdf https://www.anthem.com/shared/noapplication/f3/s1/t0/pw_035866.pdf https://www.cms.gov/Regulations-and-Guidance/HIPAA-Administrative- Simplification/EventsandLatestNews/Downloads/HIPAA101-1.pdf