SlideShare a Scribd company logo
1 of 11
Patient Confidentiality
And
HIPAA: What You Need to Know
Sarah McIntyre
MHA 690 Health Care Capstone
Instructor: David Cole
6/12/14
HIPAA
Health Insurance Portability
and Accountability Act (1996)
This act is meant to protect patients, reduce fraud, improve quality of
health care, and set strict standards for how private information about
patients is transmitted (the widespread use of electronic data transmissions
made things faster but is considered risky; HIPAA, 1996).
Some Acronyms you will need to know.
 PHI - stands for Protected Health Information.
 PHI may be shared among health care providers and
payors Covered Entities for purposes of treatment,
payment and operations (TPO) without asking patients
for permission. Any other use or disclosure of PHI
requires patient consent. Every CE is required to give
patients a Notice of Privacy Practices (NPP)
 TPO - stands for Treatment, Payment and Operations.
CE – Covered Entities
BA – Business Associates are held to the
same strict standards as Covered
Entities
Business Associates are contractors that
store and touch PHI — including
document storage companies and other
contractors that “maintain” PHI, even
if they do not actually view the
information in their possession.
The Final Rule
September 23, 2013 – Hospitals and physicians must comply with
the HIPAA Omnibus Final Rule
 The Next 7 Points were taken from the article titled:
 15 Things to Know About the HIPAA Omnibus Final Rule before Sept. 23
 1. The final rule expands patient rights by allowing them to ask for a
copy of their electronic medical record in electronic form.
 2. Under the final rule, when patients pay out of pocket in full, they can
instruct their provider to refrain from sharing information about their
treatment with their health plan.
 3. If a Medicare beneficiary requests a restriction on the disclosure of
PHI to Medicare for a covered service and pays out of pocket for the
service, the provider must also restrict the disclosure of PHI regarding
the service to Medicare.
 4. The final rule sets new limits on how information can be used and
disclosed for marketing and fundraising purposes, and it prohibits the sale of
an individuals' health information without their permission.
 5. Penalties for noncompliance with the final rule are based on the level of
negligence with a maximum penalty of $1.5 million per violation.
 6. The breach notification final rule was amended with a requirement to
determine the breach's "risk of compromise" rather than harm. "Compromise"
was considered a more objective test than harm. Thus, breach notification is
necessary in all situations except those in which the covered entity or
business associate demonstrates a low probability that the PHI has been
compromised.
 7. To determine whether there is a low probability that PHI has been
compromised, the covered entity or business associate must conduct a risk
assessment that considers at least each of the following factors:
 • The nature and extent of the PHI involved, including the types of
identifiers and the likelihood of re-identification. • The unauthorized person
who used the PHI or to whom the disclosure was made. • Whether the PHI
was actually acquired or viewed. • The extent to which the risk to the PHI
has been mitigated.
 Do list for HIPAA
 Treat patients’ personal information as you would like your
own information to be treated: Keep it secure and respect
their right to privacy.
 Use passwords that are not obvious (password is not a
password; neither is 12345), keep them in a secure place that
is also password protected, and change them regularly.
 If you need to be in patient areas, be discreet. If you work in
a surgery center, wear the uniform so that patients are not
uncomfortable with a stranger in street clothes.
 Keep your voice down when discussing patient finances, both
in person and over the phone.
 Be professional at all times.
 Taken from Do’s and Don’ts of HIPPA Compliance for a
Medical Biller/Coder
All health care employees must be trained when hired
Training for HIPAA is done annually
Employees will be trained with a HIPAA video
Ways to Protect The Patient’s Privacy
Utilize the minimum necessary standard with
protected health information.
Do not talk about a patient’s information in a
public discussion.
Do not leave a patient’s health record open on the
computer.
References
Gamble, M. (2013, August 13). 15 things to know about the HIPAA omnibus final
rule before Sept. 23. Retrieved from
http://www.beckershospitalreview.com/legal-regulatory-issues/15-things-to-
know-about-the-hipaa-omnibus-final-rule-before-sept-23.html
Smiley, K. (N.D.). The do’s and don’ts of HIPAA compliance for a medical
biller/coder. Retrieved from http://www.beckershospitalreview.com/legal-
regulatory-issues/15-things-to-know-about-the-hipaa-omnibus-final-rule-before-
sept-23.html

More Related Content

What's hot

Welcome to the hippa, privacy and security
Welcome to the hippa, privacy and securityWelcome to the hippa, privacy and security
Welcome to the hippa, privacy and securityveve1728
 
Hippa training on confidentiality
Hippa training on confidentialityHippa training on confidentiality
Hippa training on confidentialitycraig45365
 
Hipaa Refresher Training
Hipaa Refresher TrainingHipaa Refresher Training
Hipaa Refresher TrainingBrian
 
Confidentiality in Healthcare
Confidentiality in HealthcareConfidentiality in Healthcare
Confidentiality in Healthcarekmasterson
 
This training program is designed to introduce staff
This training program is designed to introduce staffThis training program is designed to introduce staff
This training program is designed to introduce staffsawanda
 
Upholding confidentiality
Upholding confidentialityUpholding confidentiality
Upholding confidentialityTheresa Tapley
 
Health care confidentiality and privacy
Health care confidentiality and privacyHealth care confidentiality and privacy
Health care confidentiality and privacysawanda
 
Confidentiality slide
Confidentiality slideConfidentiality slide
Confidentiality slidewongy12
 
Marc etienne week1 discussion2 presentation
Marc etienne week1 discussion2 presentationMarc etienne week1 discussion2 presentation
Marc etienne week1 discussion2 presentationMarcEtienne6
 
confidentiality in the workplace
confidentiality in the workplaceconfidentiality in the workplace
confidentiality in the workplaceNova Zamora
 
HIPAA Basics
HIPAA BasicsHIPAA Basics
HIPAA BasicsKarna *
 
The importance of patient privacy
The importance of patient privacyThe importance of patient privacy
The importance of patient privacytbella
 
Corporate Compliance (Physicians)
Corporate Compliance (Physicians)Corporate Compliance (Physicians)
Corporate Compliance (Physicians)justinschreiber
 
Hippa slide show
Hippa slide showHippa slide show
Hippa slide showheathercool
 
Presentation hippa
Presentation hippaPresentation hippa
Presentation hippamaggie_Platt
 
Mha 690 week one discussion ii
Mha 690 week one discussion iiMha 690 week one discussion ii
Mha 690 week one discussion iibeleza1669
 

What's hot (20)

Welcome to the hippa, privacy and security
Welcome to the hippa, privacy and securityWelcome to the hippa, privacy and security
Welcome to the hippa, privacy and security
 
Hippa training 2017
Hippa training 2017Hippa training 2017
Hippa training 2017
 
Hippa training on confidentiality
Hippa training on confidentialityHippa training on confidentiality
Hippa training on confidentiality
 
HIPAA
HIPAAHIPAA
HIPAA
 
Mha wk 1 dis 2
Mha wk 1 dis 2Mha wk 1 dis 2
Mha wk 1 dis 2
 
Hipaa Refresher Training
Hipaa Refresher TrainingHipaa Refresher Training
Hipaa Refresher Training
 
Confidentiality in Healthcare
Confidentiality in HealthcareConfidentiality in Healthcare
Confidentiality in Healthcare
 
This training program is designed to introduce staff
This training program is designed to introduce staffThis training program is designed to introduce staff
This training program is designed to introduce staff
 
Upholding confidentiality
Upholding confidentialityUpholding confidentiality
Upholding confidentiality
 
Health care confidentiality and privacy
Health care confidentiality and privacyHealth care confidentiality and privacy
Health care confidentiality and privacy
 
Confidentiality slide
Confidentiality slideConfidentiality slide
Confidentiality slide
 
HIPAA Audio Presentation
HIPAA  Audio PresentationHIPAA  Audio Presentation
HIPAA Audio Presentation
 
Marc etienne week1 discussion2 presentation
Marc etienne week1 discussion2 presentationMarc etienne week1 discussion2 presentation
Marc etienne week1 discussion2 presentation
 
confidentiality in the workplace
confidentiality in the workplaceconfidentiality in the workplace
confidentiality in the workplace
 
HIPAA Basics
HIPAA BasicsHIPAA Basics
HIPAA Basics
 
The importance of patient privacy
The importance of patient privacyThe importance of patient privacy
The importance of patient privacy
 
Corporate Compliance (Physicians)
Corporate Compliance (Physicians)Corporate Compliance (Physicians)
Corporate Compliance (Physicians)
 
Hippa slide show
Hippa slide showHippa slide show
Hippa slide show
 
Presentation hippa
Presentation hippaPresentation hippa
Presentation hippa
 
Mha 690 week one discussion ii
Mha 690 week one discussion iiMha 690 week one discussion ii
Mha 690 week one discussion ii
 

Similar to Hipaa

Mha690 health care capstone - confidentiality 9-26-2013
Mha690   health care capstone - confidentiality 9-26-2013Mha690   health care capstone - confidentiality 9-26-2013
Mha690 health care capstone - confidentiality 9-26-2013LeRoy Ulibarri
 
Mha690 health care capstone - confidentiality 9-26-2013
Mha690   health care capstone - confidentiality 9-26-2013Mha690   health care capstone - confidentiality 9-26-2013
Mha690 health care capstone - confidentiality 9-26-2013LeRoy Ulibarri
 
Mha690 health care capstone - confidentiality 9-26-2013
Mha690   health care capstone - confidentiality 9-26-2013Mha690   health care capstone - confidentiality 9-26-2013
Mha690 health care capstone - confidentiality 9-26-2013LeRoy Ulibarri
 
Health Insurance and Portability and Accountability Act
Health Insurance and Portability and Accountability ActHealth Insurance and Portability and Accountability Act
Health Insurance and Portability and Accountability Actসারন দাস
 
Healthcare confidentiality training.2013bev
Healthcare confidentiality training.2013bevHealthcare confidentiality training.2013bev
Healthcare confidentiality training.2013bevblk70130
 
HIPAA INSERVICE 2017
HIPAA INSERVICE 2017 HIPAA INSERVICE 2017
HIPAA INSERVICE 2017 Meg Oser
 
Mha 690 week one discussion ii
Mha 690 week one discussion iiMha 690 week one discussion ii
Mha 690 week one discussion iibeleza1669
 
HIPAA Privacy Training by University of Hawaii
HIPAA Privacy Training by University of HawaiiHIPAA Privacy Training by University of Hawaii
HIPAA Privacy Training by University of HawaiiAtlantic Training, LLC.
 
The importance of confidentiality
The importance of confidentialityThe importance of confidentiality
The importance of confidentialityswilson0050
 
Introduction to HIPAA for Healthcare Professionals by OUP
Introduction to HIPAA for Healthcare Professionals by OUPIntroduction to HIPAA for Healthcare Professionals by OUP
Introduction to HIPAA for Healthcare Professionals by OUPAtlantic Training, LLC.
 
Confidentiality & privacy
Confidentiality & privacyConfidentiality & privacy
Confidentiality & privacykendale
 
Confidentiality & privacy
Confidentiality & privacyConfidentiality & privacy
Confidentiality & privacykendale
 

Similar to Hipaa (20)

Mha690 health care capstone - confidentiality 9-26-2013
Mha690   health care capstone - confidentiality 9-26-2013Mha690   health care capstone - confidentiality 9-26-2013
Mha690 health care capstone - confidentiality 9-26-2013
 
Mha690 health care capstone - confidentiality 9-26-2013
Mha690   health care capstone - confidentiality 9-26-2013Mha690   health care capstone - confidentiality 9-26-2013
Mha690 health care capstone - confidentiality 9-26-2013
 
Mha690 health care capstone - confidentiality 9-26-2013
Mha690   health care capstone - confidentiality 9-26-2013Mha690   health care capstone - confidentiality 9-26-2013
Mha690 health care capstone - confidentiality 9-26-2013
 
Health Insurance and Portability and Accountability Act
Health Insurance and Portability and Accountability ActHealth Insurance and Portability and Accountability Act
Health Insurance and Portability and Accountability Act
 
Hipaa inservice
Hipaa inserviceHipaa inservice
Hipaa inservice
 
Healthcare confidentiality training.2013bev
Healthcare confidentiality training.2013bevHealthcare confidentiality training.2013bev
Healthcare confidentiality training.2013bev
 
HIPAA INSERVICE 2017
HIPAA INSERVICE 2017 HIPAA INSERVICE 2017
HIPAA INSERVICE 2017
 
Mha 690 week one discussion ii
Mha 690 week one discussion iiMha 690 week one discussion ii
Mha 690 week one discussion ii
 
HIPAA Privacy Training by University of Hawaii
HIPAA Privacy Training by University of HawaiiHIPAA Privacy Training by University of Hawaii
HIPAA Privacy Training by University of Hawaii
 
Dustin HIPAA
Dustin HIPAADustin HIPAA
Dustin HIPAA
 
CONFIDENTIALITYANDHIPAA.ppt
CONFIDENTIALITYANDHIPAA.pptCONFIDENTIALITYANDHIPAA.ppt
CONFIDENTIALITYANDHIPAA.ppt
 
HIPAA for Dummies
HIPAA for DummiesHIPAA for Dummies
HIPAA for Dummies
 
Annual HIPAA Training
Annual HIPAA TrainingAnnual HIPAA Training
Annual HIPAA Training
 
The importance of confidentiality
The importance of confidentialityThe importance of confidentiality
The importance of confidentiality
 
Confidentiality
ConfidentialityConfidentiality
Confidentiality
 
Confidentiality
ConfidentialityConfidentiality
Confidentiality
 
Introduction to HIPAA for Healthcare Professionals by OUP
Introduction to HIPAA for Healthcare Professionals by OUPIntroduction to HIPAA for Healthcare Professionals by OUP
Introduction to HIPAA for Healthcare Professionals by OUP
 
Hipaa training
Hipaa trainingHipaa training
Hipaa training
 
Confidentiality & privacy
Confidentiality & privacyConfidentiality & privacy
Confidentiality & privacy
 
Confidentiality & privacy
Confidentiality & privacyConfidentiality & privacy
Confidentiality & privacy
 

Recently uploaded

Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 

Recently uploaded (20)

Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 

Hipaa

  • 1. Patient Confidentiality And HIPAA: What You Need to Know Sarah McIntyre MHA 690 Health Care Capstone Instructor: David Cole 6/12/14
  • 2. HIPAA Health Insurance Portability and Accountability Act (1996)
  • 3. This act is meant to protect patients, reduce fraud, improve quality of health care, and set strict standards for how private information about patients is transmitted (the widespread use of electronic data transmissions made things faster but is considered risky; HIPAA, 1996).
  • 4. Some Acronyms you will need to know.  PHI - stands for Protected Health Information.  PHI may be shared among health care providers and payors Covered Entities for purposes of treatment, payment and operations (TPO) without asking patients for permission. Any other use or disclosure of PHI requires patient consent. Every CE is required to give patients a Notice of Privacy Practices (NPP)  TPO - stands for Treatment, Payment and Operations.
  • 5. CE – Covered Entities BA – Business Associates are held to the same strict standards as Covered Entities Business Associates are contractors that store and touch PHI — including document storage companies and other contractors that “maintain” PHI, even if they do not actually view the information in their possession.
  • 6. The Final Rule September 23, 2013 – Hospitals and physicians must comply with the HIPAA Omnibus Final Rule  The Next 7 Points were taken from the article titled:  15 Things to Know About the HIPAA Omnibus Final Rule before Sept. 23  1. The final rule expands patient rights by allowing them to ask for a copy of their electronic medical record in electronic form.  2. Under the final rule, when patients pay out of pocket in full, they can instruct their provider to refrain from sharing information about their treatment with their health plan.  3. If a Medicare beneficiary requests a restriction on the disclosure of PHI to Medicare for a covered service and pays out of pocket for the service, the provider must also restrict the disclosure of PHI regarding the service to Medicare.
  • 7.  4. The final rule sets new limits on how information can be used and disclosed for marketing and fundraising purposes, and it prohibits the sale of an individuals' health information without their permission.  5. Penalties for noncompliance with the final rule are based on the level of negligence with a maximum penalty of $1.5 million per violation.  6. The breach notification final rule was amended with a requirement to determine the breach's "risk of compromise" rather than harm. "Compromise" was considered a more objective test than harm. Thus, breach notification is necessary in all situations except those in which the covered entity or business associate demonstrates a low probability that the PHI has been compromised.  7. To determine whether there is a low probability that PHI has been compromised, the covered entity or business associate must conduct a risk assessment that considers at least each of the following factors:  • The nature and extent of the PHI involved, including the types of identifiers and the likelihood of re-identification. • The unauthorized person who used the PHI or to whom the disclosure was made. • Whether the PHI was actually acquired or viewed. • The extent to which the risk to the PHI has been mitigated.
  • 8.  Do list for HIPAA  Treat patients’ personal information as you would like your own information to be treated: Keep it secure and respect their right to privacy.  Use passwords that are not obvious (password is not a password; neither is 12345), keep them in a secure place that is also password protected, and change them regularly.  If you need to be in patient areas, be discreet. If you work in a surgery center, wear the uniform so that patients are not uncomfortable with a stranger in street clothes.  Keep your voice down when discussing patient finances, both in person and over the phone.  Be professional at all times.  Taken from Do’s and Don’ts of HIPPA Compliance for a Medical Biller/Coder
  • 9. All health care employees must be trained when hired Training for HIPAA is done annually Employees will be trained with a HIPAA video
  • 10. Ways to Protect The Patient’s Privacy Utilize the minimum necessary standard with protected health information. Do not talk about a patient’s information in a public discussion. Do not leave a patient’s health record open on the computer.
  • 11. References Gamble, M. (2013, August 13). 15 things to know about the HIPAA omnibus final rule before Sept. 23. Retrieved from http://www.beckershospitalreview.com/legal-regulatory-issues/15-things-to- know-about-the-hipaa-omnibus-final-rule-before-sept-23.html Smiley, K. (N.D.). The do’s and don’ts of HIPAA compliance for a medical biller/coder. Retrieved from http://www.beckershospitalreview.com/legal- regulatory-issues/15-things-to-know-about-the-hipaa-omnibus-final-rule-before- sept-23.html