SlideShare a Scribd company logo
1 of 7
Philadelphia Center 
N.W. Louisiana AIDS Resource Center 
http://www.hhs.gov/ocr/privacy/
Electronic Health Information Exchange in 
a Networked Environment 
Safeguards 
Health Insurance Portability and Accountability Act of 1996 (“HIPAA”)
Security Rule 
 Security Management 
Process 
 Risk Analysis 
 Risk Management 
 Sanction Policy 
 Information System 
Activity Review 
 Assigned Security 
Responsibility 
 Workforce Security 
 Security Awareness and 
Training 
Administrative Safeguards 
Security Compliance Team
Electronic Health Information Exchange in 
a Networked Environment 
Breach Notification Rule 
for Electronic Health Information
Breach 
 Burden of Proof 
 Breach Notification 
Requirements 
 Individual Notice 
 Health Breach Notification 
Rule 
 Federal Trade Commission 
 Notice to the Secretary of 
Breaches 
A breach is an impermissible use or 
disclosure under the Privacy Rule 
that compromises the security or 
privacy of the Protected Health 
Information
Philadelphia Center 
N.W. Louisiana AIDS Resource Center 
http://www.hhs.gov/ocr/privacy/
Philadelphia Center 
N.W. Louisiana AIDS Resource Center 
http://www.hhs.gov/ocr/privacy/

More Related Content

What's hot

Patient Confidentiality
Patient Confidentiality Patient Confidentiality
Patient Confidentiality Nadia Rowell
 
The importance of hipaa compliance and training
The importance of hipaa compliance and trainingThe importance of hipaa compliance and training
The importance of hipaa compliance and trainingLaDavia Day, MHA, BS
 
Mha690 slideshare [autosaved]
Mha690 slideshare [autosaved]Mha690 slideshare [autosaved]
Mha690 slideshare [autosaved]cvitale613
 
Iadmdhipmkt1.0
Iadmdhipmkt1.0Iadmdhipmkt1.0
Iadmdhipmkt1.0profit10
 
Mha 690 wk 1 dis 3
Mha 690 wk 1 dis 3Mha 690 wk 1 dis 3
Mha 690 wk 1 dis 3akudan
 
Patient Confidentiality
Patient ConfidentialityPatient Confidentiality
Patient ConfidentialityNadia Rowell
 
HIPAA Training (2017)
HIPAA Training (2017) HIPAA Training (2017)
HIPAA Training (2017) Arete-Zoe, LLC
 
Pt hr confidentiality
Pt hr confidentialityPt hr confidentiality
Pt hr confidentialitycorbsan
 
Understanding patient privacy 1
Understanding patient privacy 1Understanding patient privacy 1
Understanding patient privacy 1Jonsie12
 
Hipaa and him security brunelle
Hipaa and him security brunelleHipaa and him security brunelle
Hipaa and him security brunellesjbusnpa
 
Confidentiality pp 7 18-19
Confidentiality pp 7 18-19Confidentiality pp 7 18-19
Confidentiality pp 7 18-19KjvRN
 
Mha 690 presentation hippa
Mha 690 presentation hippaMha 690 presentation hippa
Mha 690 presentation hippabelle0508
 
Week 1 discussion 2-confidentiality training
Week 1 discussion 2-confidentiality trainingWeek 1 discussion 2-confidentiality training
Week 1 discussion 2-confidentiality trainingRonRATIA
 

What's hot (16)

Patient Confidentiality
Patient Confidentiality Patient Confidentiality
Patient Confidentiality
 
The importance of hipaa compliance and training
The importance of hipaa compliance and trainingThe importance of hipaa compliance and training
The importance of hipaa compliance and training
 
Mha690 slideshare [autosaved]
Mha690 slideshare [autosaved]Mha690 slideshare [autosaved]
Mha690 slideshare [autosaved]
 
Iadmdhipmkt1.0
Iadmdhipmkt1.0Iadmdhipmkt1.0
Iadmdhipmkt1.0
 
Mha 690 wk 1 dis 3
Mha 690 wk 1 dis 3Mha 690 wk 1 dis 3
Mha 690 wk 1 dis 3
 
Patient Confidentiality
Patient ConfidentialityPatient Confidentiality
Patient Confidentiality
 
HIPAA Training (2017)
HIPAA Training (2017) HIPAA Training (2017)
HIPAA Training (2017)
 
Pt hr confidentiality
Pt hr confidentialityPt hr confidentiality
Pt hr confidentiality
 
Understanding patient privacy 1
Understanding patient privacy 1Understanding patient privacy 1
Understanding patient privacy 1
 
MHA690 W1D2
MHA690 W1D2MHA690 W1D2
MHA690 W1D2
 
Hipaa and him security brunelle
Hipaa and him security brunelleHipaa and him security brunelle
Hipaa and him security brunelle
 
HIPAA Infographic
HIPAA InfographicHIPAA Infographic
HIPAA Infographic
 
Mhadisc2
Mhadisc2Mhadisc2
Mhadisc2
 
Confidentiality pp 7 18-19
Confidentiality pp 7 18-19Confidentiality pp 7 18-19
Confidentiality pp 7 18-19
 
Mha 690 presentation hippa
Mha 690 presentation hippaMha 690 presentation hippa
Mha 690 presentation hippa
 
Week 1 discussion 2-confidentiality training
Week 1 discussion 2-confidentiality trainingWeek 1 discussion 2-confidentiality training
Week 1 discussion 2-confidentiality training
 

Viewers also liked

Viewers also liked (7)

HIPAApt2-PGM
HIPAApt2-PGMHIPAApt2-PGM
HIPAApt2-PGM
 
DV Brochure
DV BrochureDV Brochure
DV Brochure
 
Win_8_Final Version
Win_8_Final VersionWin_8_Final Version
Win_8_Final Version
 
kjGOOGLE_CLOUD_pt1
kjGOOGLE_CLOUD_pt1kjGOOGLE_CLOUD_pt1
kjGOOGLE_CLOUD_pt1
 
2012SVR Win_7 NETWORK
2012SVR Win_7 NETWORK2012SVR Win_7 NETWORK
2012SVR Win_7 NETWORK
 
kjGOOGLE_CLOUD_PT2
kjGOOGLE_CLOUD_PT2kjGOOGLE_CLOUD_PT2
kjGOOGLE_CLOUD_PT2
 
GOOGLE_CLOUD_PT3
GOOGLE_CLOUD_PT3GOOGLE_CLOUD_PT3
GOOGLE_CLOUD_PT3
 

Similar to HIPAA Security and Breach Rules for Electronic Health Data

Hippa final JU nursing informatics
Hippa final JU nursing informaticsHippa final JU nursing informatics
Hippa final JU nursing informaticskmcanty
 
HIPPA Security Presentation
HIPPA Security PresentationHIPPA Security Presentation
HIPPA Security PresentationRebecca Norman
 
HIPAA Compliance For Small Practices
HIPAA Compliance For Small PracticesHIPAA Compliance For Small Practices
HIPAA Compliance For Small PracticesNisos Health
 
Chapter 5HIPAA and HITECHLearning ObjectivesUnde
Chapter 5HIPAA and HITECHLearning ObjectivesUndeChapter 5HIPAA and HITECHLearning ObjectivesUnde
Chapter 5HIPAA and HITECHLearning ObjectivesUndeWilheminaRossi174
 
HIPAA | HITECH
HIPAA | HITECHHIPAA | HITECH
HIPAA | HITECHrcabarloc
 
THCS Workforce HIPAA Training
THCS Workforce HIPAA TrainingTHCS Workforce HIPAA Training
THCS Workforce HIPAA Trainingkerbertx
 
Healthcare captstone mha690
Healthcare captstone   mha690Healthcare captstone   mha690
Healthcare captstone mha690amiddleton5
 
Healthcare captstone mha690
Healthcare captstone   mha690Healthcare captstone   mha690
Healthcare captstone mha690amiddleton5
 
Describe one safeguard that should be in place to protect the confid.pdf
Describe one safeguard that should be in place to protect the confid.pdfDescribe one safeguard that should be in place to protect the confid.pdf
Describe one safeguard that should be in place to protect the confid.pdfmohammedfootwear
 
Data and Network Security: What You Need to Know
Data and Network Security: What You Need to KnowData and Network Security: What You Need to Know
Data and Network Security: What You Need to KnowPYA, P.C.
 
Health information portability and accountability (hipaa)
Health information portability and accountability (hipaa)Health information portability and accountability (hipaa)
Health information portability and accountability (hipaa)kristinleighclark
 
Sarah Kim HIPAA for Small Providers
Sarah Kim HIPAA for Small ProvidersSarah Kim HIPAA for Small Providers
Sarah Kim HIPAA for Small ProvidersSarah Kim
 
Mha690 wk 1 fletcher
Mha690 wk 1   fletcherMha690 wk 1   fletcher
Mha690 wk 1 fletcherEmed32
 
Mbm Hipaa Hitech Ss Compliance Risk Assessment
Mbm Hipaa Hitech Ss Compliance Risk AssessmentMbm Hipaa Hitech Ss Compliance Risk Assessment
Mbm Hipaa Hitech Ss Compliance Risk AssessmentMBMeHealthCareSolutions
 
Mha690 health care capstone - confidentiality 9-26-2013
Mha690   health care capstone - confidentiality 9-26-2013Mha690   health care capstone - confidentiality 9-26-2013
Mha690 health care capstone - confidentiality 9-26-2013LeRoy Ulibarri
 
Mha690 health care capstone - confidentiality 9-26-2013
Mha690   health care capstone - confidentiality 9-26-2013Mha690   health care capstone - confidentiality 9-26-2013
Mha690 health care capstone - confidentiality 9-26-2013LeRoy Ulibarri
 
Mha690 health care capstone - confidentiality 9-26-2013
Mha690   health care capstone - confidentiality 9-26-2013Mha690   health care capstone - confidentiality 9-26-2013
Mha690 health care capstone - confidentiality 9-26-2013LeRoy Ulibarri
 

Similar to HIPAA Security and Breach Rules for Electronic Health Data (20)

Hippa final JU nursing informatics
Hippa final JU nursing informaticsHippa final JU nursing informatics
Hippa final JU nursing informatics
 
HIPPA Security Presentation
HIPPA Security PresentationHIPPA Security Presentation
HIPPA Security Presentation
 
Hippa breaches
Hippa breachesHippa breaches
Hippa breaches
 
Blodgett MHA 690 W1 D2
Blodgett MHA 690 W1 D2Blodgett MHA 690 W1 D2
Blodgett MHA 690 W1 D2
 
HIPAA Compliance For Small Practices
HIPAA Compliance For Small PracticesHIPAA Compliance For Small Practices
HIPAA Compliance For Small Practices
 
Chapter 5HIPAA and HITECHLearning ObjectivesUnde
Chapter 5HIPAA and HITECHLearning ObjectivesUndeChapter 5HIPAA and HITECHLearning ObjectivesUnde
Chapter 5HIPAA and HITECHLearning ObjectivesUnde
 
HIPAA | HITECH
HIPAA | HITECHHIPAA | HITECH
HIPAA | HITECH
 
THCS Workforce HIPAA Training
THCS Workforce HIPAA TrainingTHCS Workforce HIPAA Training
THCS Workforce HIPAA Training
 
Healthcare captstone mha690
Healthcare captstone   mha690Healthcare captstone   mha690
Healthcare captstone mha690
 
Healthcare captstone mha690
Healthcare captstone   mha690Healthcare captstone   mha690
Healthcare captstone mha690
 
Describe one safeguard that should be in place to protect the confid.pdf
Describe one safeguard that should be in place to protect the confid.pdfDescribe one safeguard that should be in place to protect the confid.pdf
Describe one safeguard that should be in place to protect the confid.pdf
 
Data and Network Security: What You Need to Know
Data and Network Security: What You Need to KnowData and Network Security: What You Need to Know
Data and Network Security: What You Need to Know
 
Health information portability and accountability (hipaa)
Health information portability and accountability (hipaa)Health information portability and accountability (hipaa)
Health information portability and accountability (hipaa)
 
Sarah Kim HIPAA for Small Providers
Sarah Kim HIPAA for Small ProvidersSarah Kim HIPAA for Small Providers
Sarah Kim HIPAA for Small Providers
 
Mha690 wk 1 fletcher
Mha690 wk 1   fletcherMha690 wk 1   fletcher
Mha690 wk 1 fletcher
 
Mbm Hipaa Hitech Ss Compliance Risk Assessment
Mbm Hipaa Hitech Ss Compliance Risk AssessmentMbm Hipaa Hitech Ss Compliance Risk Assessment
Mbm Hipaa Hitech Ss Compliance Risk Assessment
 
Data Breach: It Can Happen To You
Data Breach: It Can Happen To YouData Breach: It Can Happen To You
Data Breach: It Can Happen To You
 
Mha690 health care capstone - confidentiality 9-26-2013
Mha690   health care capstone - confidentiality 9-26-2013Mha690   health care capstone - confidentiality 9-26-2013
Mha690 health care capstone - confidentiality 9-26-2013
 
Mha690 health care capstone - confidentiality 9-26-2013
Mha690   health care capstone - confidentiality 9-26-2013Mha690   health care capstone - confidentiality 9-26-2013
Mha690 health care capstone - confidentiality 9-26-2013
 
Mha690 health care capstone - confidentiality 9-26-2013
Mha690   health care capstone - confidentiality 9-26-2013Mha690   health care capstone - confidentiality 9-26-2013
Mha690 health care capstone - confidentiality 9-26-2013
 

HIPAA Security and Breach Rules for Electronic Health Data

  • 1. Philadelphia Center N.W. Louisiana AIDS Resource Center http://www.hhs.gov/ocr/privacy/
  • 2. Electronic Health Information Exchange in a Networked Environment Safeguards Health Insurance Portability and Accountability Act of 1996 (“HIPAA”)
  • 3. Security Rule  Security Management Process  Risk Analysis  Risk Management  Sanction Policy  Information System Activity Review  Assigned Security Responsibility  Workforce Security  Security Awareness and Training Administrative Safeguards Security Compliance Team
  • 4. Electronic Health Information Exchange in a Networked Environment Breach Notification Rule for Electronic Health Information
  • 5. Breach  Burden of Proof  Breach Notification Requirements  Individual Notice  Health Breach Notification Rule  Federal Trade Commission  Notice to the Secretary of Breaches A breach is an impermissible use or disclosure under the Privacy Rule that compromises the security or privacy of the Protected Health Information
  • 6. Philadelphia Center N.W. Louisiana AIDS Resource Center http://www.hhs.gov/ocr/privacy/
  • 7. Philadelphia Center N.W. Louisiana AIDS Resource Center http://www.hhs.gov/ocr/privacy/