SlideShare a Scribd company logo
1 of 40
HIPAA Basics
Brian Fleetham
Dickinson Wright PLLC
HIPAA Overview
General prohibition: a “covered entity”
cannot disclose “protected health
information” unless an exception
applies.
HIPAA Overview
Translation: treat patient information as
confidential.
HIPAA Overview
Two main parts: privacy rule and
security rule.
HIPAA – Key Definitions
“Covered Entity” means (1) health plans,
(2) healthcare clearinghouses, and (3)
health care providers that transmit
protected health information in an
electronic format.
HIPAA – Key Definitions
“Protected Health Information” or “PHI”
means individually identifiable
information that is transmitted by
electronic media; maintained in any
electronic media; or transmitted or
maintained in any other form or medium.
HIPAA – Key Definitions
“Individually Identifiable Health
Information” means information collected
from an individual that (1) is created or
received by a health plan, a health
provider, an employer, or a health care
clearinghouse;
HIPAA – Key Definitions
“Individually Identifiable Health
Information” (continued) (2) relates to the
past, present, or future mental or physical
health of an individual, the care provided
to an individual, or the past, present, or
future payment for the care of an
individual; and
HIPAA – Key Definitions
“Individually Identifiable Health
Information” (continued) (3) identifies the
individual or there is a reasonable belief
that the information could be used to
identify the individual.
HIPAA – Key Definitions
Common identifiers of health information
include names, social security numbers,
addresses, and birth dates.
HIPAA – Key Definitions
A key concept under HIPAA is “minimum
necessary.” Most uses and disclosures of
PHI, even internally, must use or disclose
PHI only as minimally necessary to
accomplish the use or disclosure.
HIPAA – Privacy Standards
The HIPAA Privacy Standards generally
prohibit a covered entity from using or
disclosing PHI, unless the use or
disclosure fits within a particular
exception.
HIPAA – Key Exceptions to the Privacy
Standards
Among other uses or disclosures,
covered entities may use or disclose
PHI:
• For payment, treatment, or
healthcare operations.
HIPAA – Key Exceptions to the Privacy
Standards (continued)
• To the individual that the PHI
pertains to or to his or her
designated representative.
• As directed by an individual’s
written authorization.
• As required by law.
• To a business associate.
HIPAA – Business Associates
A business associate is a person or entity
that performs services for a covered entity
which involve PHI.
HIPAA - Business Associates
PHI can be provided to a “business
associate” only if the PHI is a necessary
component of the services provided by
the business associate to the covered
entity and an appropriate business
associate agreement is in place.
HIPAA - Business Associates
Business associates can include billing
companies, IT providers, consultants,
attorneys, etc. Other covered entities
are not business associate unless non-
clinical services are involved.
HIPAA – Business Associates
With the HITECH Act, business associates
now have direct liability under HIPAA.
Covered entities remain liable for the
actions of their business associates.
HIPAA – Individual Rights
The HIPAA Privacy Standards establish
several individual rights relating to PHI,
such as the following:
• Notice of privacy practices from a
covered entity
• Request for restrictions on use of PHI
HIPAA – Individual Rights (continued)
• Request for reasonable handling of
the manner of communications
• Access and amendments to PHI
• Accounting of disclosures of PHI
HIPAA – Security Standards
The HIPAA Security Standards apply to all
PHI maintained or used electronically
(known as “ePHI”). A covered entity must
evaluate each Security Standard and
determine the extent to which each must
be implemented, based on various
factors.
HIPAA – Risk Assessment
This process is known as conducting a risk
assessment.
• Must be performed regularly.
• Also a “core requirement” for
meaningful use payments.
HIPAA – Risk Assessment (continued)
• A covered entity risks a mandatory
repayment or loss of future
meaningful use payments if it cannot
produce written risk assessments for
each year that meaningful use
payments are claimed.
HIPAA – Security Standards
The Security Standards fall under three
main categories:
• Administrative Safeguards (e.g., plans,
policies, protocols, training, etc.)
HIPAA – Security Standards (continued)
• Physical Safeguards (e.g., media and
physical access controls, workstation
requirements, etc.)
• Technical Safeguards (e.g., data and
entity authentication, network
control, etc.)
HIPAA – Data Breaches
A data breach consists of the
impermissible acquisition, access, use, or
disclosure of unprotected (i.e.,
unencrypted) PHI (whether electronic or
otherwise).
HIPAA – Data Breach
The prior harm standard has been
replaced with a test of whether PHI has
been “compromised.” The regulations
create a general presumption that the
data has been compromised.
HIPAA – Data Breach
Upon a suspected data breach, a covered
entity must, within 60 days, either
immediately notify affected individuals
and DHHS (and possibly the media) or
undertake an analysis of whether an
actual breach has occurred and then
notify as necessary.
HIPAA – State Law Preemption
State law provisions that are more
stringent preempt applicable HIPAA
requirements.
HIPAA – Applicable Michigan Law
Under Michigan law, physicians are
broadly prohibited from disclosing
treatment information. Disclosure thus
requires consent, court order, or a specific
legal mandate.
HIPAA - Enforcement
Prior to HITECH, enforcement was
complaint-driven with limited penalties
except for intentional violations, with the
main goal being compliance. HITECH
authorized HIPAA enforcement audits and
increased the amount of fines for
violations.
HIPAA - Penalties
Penalties for HIPAA violations fall under
four tiers:
• Tier A – Did not know of the violation
– fines between $100 and $50,000 for
each violation
HIPAA – Penalties (continued)
• Tier B – Reasonable cause for
violation rather than willful neglect –
fines between $1,000 and $50,000 for
each violation
HIPAA – Penalties (continued)
• Tier C – Violation due to willful
neglect but corrected – fines
between $10,000 and $50,000 for
each violation
• Tier D – Violations due to willful
neglect but not corrected – fines of
$50,000 for each violation.
HIPAA – Penalties (continued)
Cap of $50,000 fine per violation and
$1.5 million annually for the same type
of violation.
• Updated notice of privacy practices
• Updated business associate
agreements in place
• Appropriate policies and procedures
• Regular workforce education
HIPAA – Main Compliance Steps
• Encryption protection for electronic
PHI
• Other electronic and physical
safeguards
• Risk assessment
• Appointment of HIPAA privacy and
security officer
HIPAA – Main Compliance Steps
(continued)
• Model privacy notice from DHHS:
http://www.hhs.gov/ocr/privacy/hip
aa/modelnotices.html
• Sample business associate
agreement provision from DHHS:
http://www.hhs.gov/ocr/privacy/hip
aa/understanding/coveredentities/c
ontractprov.html
HIPAA - Resources
• AMA toolkit: http://www.ama-
assn.org/ama/pub/physician-
resources/solutions-managing-your-
practice/coding-billing-
insurance/hipaahealth-insurance-
portability-accountability-act.page
HIPAA – Resources (continued)
HIPAA – Resources (continued)
• DHHS risk assessment tool:
http://www.healthit.gov/providers-
professionals/security-risk-assessment-
tool

More Related Content

What's hot

Privacy in India: Legal issues
Privacy in India: Legal issuesPrivacy in India: Legal issues
Privacy in India: Legal issuesSagar Rahurkar
 
HIPPA Security Presentation
HIPPA Security PresentationHIPPA Security Presentation
HIPPA Security PresentationRebecca Norman
 
HIPAA Basics
HIPAA BasicsHIPAA Basics
HIPAA BasicsKarna *
 
Urgensi RUU Perlindungan Data Pribadi
Urgensi RUU Perlindungan Data PribadiUrgensi RUU Perlindungan Data Pribadi
Urgensi RUU Perlindungan Data PribadiEryk Budi Pratama
 
CIA Triad in Data Governance, Information Security, and Privacy: Its Role and...
CIA Triad in Data Governance, Information Security, and Privacy: Its Role and...CIA Triad in Data Governance, Information Security, and Privacy: Its Role and...
CIA Triad in Data Governance, Information Security, and Privacy: Its Role and...PECB
 
hitech act
hitech acthitech act
hitech actpadler01
 
HIPAA AND INFORMATION TECHNOLOGY
HIPAA AND INFORMATION TECHNOLOGYHIPAA AND INFORMATION TECHNOLOGY
HIPAA AND INFORMATION TECHNOLOGYmariaradziminski
 
Welcome to HIPAA Training
Welcome to HIPAA TrainingWelcome to HIPAA Training
Welcome to HIPAA TrainingJonathan Montes
 
Hipaa overview 073118
Hipaa overview 073118Hipaa overview 073118
Hipaa overview 073118robint2125
 
HealthCare Compliance - HIPAA and HITRUST
HealthCare Compliance - HIPAA and HITRUSTHealthCare Compliance - HIPAA and HITRUST
HealthCare Compliance - HIPAA and HITRUSTKimberly Simon MBA
 
Personal Data Protection in Indonesia
Personal Data Protection in IndonesiaPersonal Data Protection in Indonesia
Personal Data Protection in IndonesiaEryk Budi Pratama
 
A brief introduction to hipaa compliance
A brief introduction to hipaa complianceA brief introduction to hipaa compliance
A brief introduction to hipaa compliancePrince George
 
Cybersecurity 101 - Auditing Cyber Security
Cybersecurity 101 - Auditing Cyber SecurityCybersecurity 101 - Auditing Cyber Security
Cybersecurity 101 - Auditing Cyber SecurityEryk Budi Pratama
 

What's hot (20)

Privacy in India: Legal issues
Privacy in India: Legal issuesPrivacy in India: Legal issues
Privacy in India: Legal issues
 
HIPPA Security Presentation
HIPPA Security PresentationHIPPA Security Presentation
HIPPA Security Presentation
 
How to Build a Winning Cybersecurity Team
How to Build a Winning Cybersecurity TeamHow to Build a Winning Cybersecurity Team
How to Build a Winning Cybersecurity Team
 
HIPAA Basics
HIPAA BasicsHIPAA Basics
HIPAA Basics
 
Basic HIPAA Training by CMU
Basic HIPAA Training by CMUBasic HIPAA Training by CMU
Basic HIPAA Training by CMU
 
Urgensi RUU Perlindungan Data Pribadi
Urgensi RUU Perlindungan Data PribadiUrgensi RUU Perlindungan Data Pribadi
Urgensi RUU Perlindungan Data Pribadi
 
HIPAA Complaince
HIPAA ComplainceHIPAA Complaince
HIPAA Complaince
 
CIA Triad in Data Governance, Information Security, and Privacy: Its Role and...
CIA Triad in Data Governance, Information Security, and Privacy: Its Role and...CIA Triad in Data Governance, Information Security, and Privacy: Its Role and...
CIA Triad in Data Governance, Information Security, and Privacy: Its Role and...
 
hitech act
hitech acthitech act
hitech act
 
HIPAA AND INFORMATION TECHNOLOGY
HIPAA AND INFORMATION TECHNOLOGYHIPAA AND INFORMATION TECHNOLOGY
HIPAA AND INFORMATION TECHNOLOGY
 
Welcome to HIPAA Training
Welcome to HIPAA TrainingWelcome to HIPAA Training
Welcome to HIPAA Training
 
Annual HIPAA Training
Annual HIPAA TrainingAnnual HIPAA Training
Annual HIPAA Training
 
HIPAA & PHI Training
HIPAA & PHI TrainingHIPAA & PHI Training
HIPAA & PHI Training
 
Hipaa overview 073118
Hipaa overview 073118Hipaa overview 073118
Hipaa overview 073118
 
Hipaa para proveedores rev (final)
Hipaa para proveedores  rev (final)Hipaa para proveedores  rev (final)
Hipaa para proveedores rev (final)
 
HealthCare Compliance - HIPAA and HITRUST
HealthCare Compliance - HIPAA and HITRUSTHealthCare Compliance - HIPAA and HITRUST
HealthCare Compliance - HIPAA and HITRUST
 
HIPAA and How it Applies to You
HIPAA and How it Applies to YouHIPAA and How it Applies to You
HIPAA and How it Applies to You
 
Personal Data Protection in Indonesia
Personal Data Protection in IndonesiaPersonal Data Protection in Indonesia
Personal Data Protection in Indonesia
 
A brief introduction to hipaa compliance
A brief introduction to hipaa complianceA brief introduction to hipaa compliance
A brief introduction to hipaa compliance
 
Cybersecurity 101 - Auditing Cyber Security
Cybersecurity 101 - Auditing Cyber SecurityCybersecurity 101 - Auditing Cyber Security
Cybersecurity 101 - Auditing Cyber Security
 

Similar to HIPAA Basics by Brian Fleetham

Understanding HIPAA
Understanding HIPAAUnderstanding HIPAA
Understanding HIPAAManas Deep
 
The Startup Path to HIPAA Compliance
The Startup Path to HIPAA ComplianceThe Startup Path to HIPAA Compliance
The Startup Path to HIPAA ComplianceJim Anfield
 
HIPAA Panel Discussion
HIPAA Panel Discussion HIPAA Panel Discussion
HIPAA Panel Discussion Dan Wellisch
 
HIPAA Compliance For Small Practices
HIPAA Compliance For Small PracticesHIPAA Compliance For Small Practices
HIPAA Compliance For Small PracticesNisos Health
 
HIPAA Part I the Law Test
HIPAA Part I  the Law TestHIPAA Part I  the Law Test
HIPAA Part I the Law TestSachiko Hurst
 
Navigating Healthcare Compliance: A Guide to HIPAA Certification
Navigating Healthcare Compliance: A Guide to HIPAA CertificationNavigating Healthcare Compliance: A Guide to HIPAA Certification
Navigating Healthcare Compliance: A Guide to HIPAA CertificationShyamMishra72
 
Hitech changes-to-hipaa
Hitech changes-to-hipaaHitech changes-to-hipaa
Hitech changes-to-hipaageeksikh
 
Week 1 discussion 2 hipaa and privacy training
Week 1 discussion 2 hipaa and privacy trainingWeek 1 discussion 2 hipaa and privacy training
Week 1 discussion 2 hipaa and privacy trainingvrgill22
 
HIPAA Boot Camp: A Step-by-Step Guide to Achieving Compliance
HIPAA Boot Camp: A Step-by-Step Guide to Achieving ComplianceHIPAA Boot Camp: A Step-by-Step Guide to Achieving Compliance
HIPAA Boot Camp: A Step-by-Step Guide to Achieving ComplianceConference Panel
 
Connectria Hosting- HIPAA Compliant Hosting Services
Connectria Hosting- HIPAA Compliant Hosting ServicesConnectria Hosting- HIPAA Compliant Hosting Services
Connectria Hosting- HIPAA Compliant Hosting ServicesConnectria
 
Mha 690 week one discussion ii
Mha 690 week one discussion iiMha 690 week one discussion ii
Mha 690 week one discussion iibeleza1669
 
Mha 690 week one discussion ii
Mha 690 week one discussion iiMha 690 week one discussion ii
Mha 690 week one discussion iibeleza1669
 
PACT Cybersecurity Series Event, speaker Gregory M. Fliszar, Esq. of Cozen O'...
PACT Cybersecurity Series Event, speaker Gregory M. Fliszar, Esq. of Cozen O'...PACT Cybersecurity Series Event, speaker Gregory M. Fliszar, Esq. of Cozen O'...
PACT Cybersecurity Series Event, speaker Gregory M. Fliszar, Esq. of Cozen O'...eringold
 
Knowing confidentiality
Knowing confidentialityKnowing confidentiality
Knowing confidentialityjessie66
 
2017 HIPAA Clinical Research Training
2017 HIPAA Clinical Research Training2017 HIPAA Clinical Research Training
2017 HIPAA Clinical Research TrainingCynthia Holland
 
HIPAA Compliance: What Medical Practices and Their Business Associates Need t...
HIPAA Compliance: What Medical Practices and Their Business Associates Need t...HIPAA Compliance: What Medical Practices and Their Business Associates Need t...
HIPAA Compliance: What Medical Practices and Their Business Associates Need t...Skoda Minotti
 

Similar to HIPAA Basics by Brian Fleetham (20)

Understanding HIPAA
Understanding HIPAAUnderstanding HIPAA
Understanding HIPAA
 
Hipaa for business associates simple
Hipaa for business associates   simpleHipaa for business associates   simple
Hipaa for business associates simple
 
The Startup Path to HIPAA Compliance
The Startup Path to HIPAA ComplianceThe Startup Path to HIPAA Compliance
The Startup Path to HIPAA Compliance
 
HIPAA Panel Discussion
HIPAA Panel Discussion HIPAA Panel Discussion
HIPAA Panel Discussion
 
HIPAA Compliance For Small Practices
HIPAA Compliance For Small PracticesHIPAA Compliance For Small Practices
HIPAA Compliance For Small Practices
 
What You Don’t Know About the HIPAA Security Rule
What You Don’t Know About the HIPAA Security RuleWhat You Don’t Know About the HIPAA Security Rule
What You Don’t Know About the HIPAA Security Rule
 
HIPAA Part I the Law Test
HIPAA Part I  the Law TestHIPAA Part I  the Law Test
HIPAA Part I the Law Test
 
Navigating Healthcare Compliance: A Guide to HIPAA Certification
Navigating Healthcare Compliance: A Guide to HIPAA CertificationNavigating Healthcare Compliance: A Guide to HIPAA Certification
Navigating Healthcare Compliance: A Guide to HIPAA Certification
 
Hitech changes-to-hipaa
Hitech changes-to-hipaaHitech changes-to-hipaa
Hitech changes-to-hipaa
 
Week 1 discussion 2 hipaa and privacy training
Week 1 discussion 2 hipaa and privacy trainingWeek 1 discussion 2 hipaa and privacy training
Week 1 discussion 2 hipaa and privacy training
 
HIPAA Boot Camp: A Step-by-Step Guide to Achieving Compliance
HIPAA Boot Camp: A Step-by-Step Guide to Achieving ComplianceHIPAA Boot Camp: A Step-by-Step Guide to Achieving Compliance
HIPAA Boot Camp: A Step-by-Step Guide to Achieving Compliance
 
Hipaa basics
Hipaa basicsHipaa basics
Hipaa basics
 
Connectria Hosting- HIPAA Compliant Hosting Services
Connectria Hosting- HIPAA Compliant Hosting ServicesConnectria Hosting- HIPAA Compliant Hosting Services
Connectria Hosting- HIPAA Compliant Hosting Services
 
Mha 690 week one discussion ii
Mha 690 week one discussion iiMha 690 week one discussion ii
Mha 690 week one discussion ii
 
Mha 690 week one discussion ii
Mha 690 week one discussion iiMha 690 week one discussion ii
Mha 690 week one discussion ii
 
PACT Cybersecurity Series Event, speaker Gregory M. Fliszar, Esq. of Cozen O'...
PACT Cybersecurity Series Event, speaker Gregory M. Fliszar, Esq. of Cozen O'...PACT Cybersecurity Series Event, speaker Gregory M. Fliszar, Esq. of Cozen O'...
PACT Cybersecurity Series Event, speaker Gregory M. Fliszar, Esq. of Cozen O'...
 
Hippa training v2
Hippa training v2Hippa training v2
Hippa training v2
 
Knowing confidentiality
Knowing confidentialityKnowing confidentiality
Knowing confidentiality
 
2017 HIPAA Clinical Research Training
2017 HIPAA Clinical Research Training2017 HIPAA Clinical Research Training
2017 HIPAA Clinical Research Training
 
HIPAA Compliance: What Medical Practices and Their Business Associates Need t...
HIPAA Compliance: What Medical Practices and Their Business Associates Need t...HIPAA Compliance: What Medical Practices and Their Business Associates Need t...
HIPAA Compliance: What Medical Practices and Their Business Associates Need t...
 

More from Atlantic Training, LLC.

Stress and Worker Safety by Pennsylvania L&I
Stress and Worker Safety by Pennsylvania L&IStress and Worker Safety by Pennsylvania L&I
Stress and Worker Safety by Pennsylvania L&IAtlantic Training, LLC.
 
Workplace Harassment Prevention by UT EAP
Workplace Harassment Prevention by  UT EAPWorkplace Harassment Prevention by  UT EAP
Workplace Harassment Prevention by UT EAPAtlantic Training, LLC.
 
Preventing Falls, Slips and Trips by MGSU
Preventing Falls, Slips and Trips by MGSUPreventing Falls, Slips and Trips by MGSU
Preventing Falls, Slips and Trips by MGSUAtlantic Training, LLC.
 
Preventing Workplace Harassment by Pennsylvania L&I
Preventing Workplace Harassment by Pennsylvania L&IPreventing Workplace Harassment by Pennsylvania L&I
Preventing Workplace Harassment by Pennsylvania L&IAtlantic Training, LLC.
 
Warehouses In Emergencies by WFP Logistics
Warehouses In Emergencies by WFP LogisticsWarehouses In Emergencies by WFP Logistics
Warehouses In Emergencies by WFP LogisticsAtlantic Training, LLC.
 
Sexual Harassment in the Workplace Training by Shumaker
Sexual Harassment in the Workplace Training by ShumakerSexual Harassment in the Workplace Training by Shumaker
Sexual Harassment in the Workplace Training by ShumakerAtlantic Training, LLC.
 
New Employee Safety Orientation by Oregon State University
New Employee Safety Orientation by Oregon State UniversityNew Employee Safety Orientation by Oregon State University
New Employee Safety Orientation by Oregon State UniversityAtlantic Training, LLC.
 

More from Atlantic Training, LLC. (20)

Wellness for Supervisors by SWOSU
Wellness for Supervisors by SWOSUWellness for Supervisors by SWOSU
Wellness for Supervisors by SWOSU
 
Workplace Wellness by PHA
Workplace Wellness by PHAWorkplace Wellness by PHA
Workplace Wellness by PHA
 
Stress Management Training by SG
Stress Management Training by  SGStress Management Training by  SG
Stress Management Training by SG
 
Stress Management Training by SW
Stress Management Training by SWStress Management Training by SW
Stress Management Training by SW
 
Stress and Worker Safety by Pennsylvania L&I
Stress and Worker Safety by Pennsylvania L&IStress and Worker Safety by Pennsylvania L&I
Stress and Worker Safety by Pennsylvania L&I
 
Respectful Workplace by RDTC
Respectful Workplace by RDTCRespectful Workplace by RDTC
Respectful Workplace by RDTC
 
Workplace Harassment by CLGW
Workplace Harassment by CLGWWorkplace Harassment by CLGW
Workplace Harassment by CLGW
 
Workplace Harassment Prevention by UT EAP
Workplace Harassment Prevention by  UT EAPWorkplace Harassment Prevention by  UT EAP
Workplace Harassment Prevention by UT EAP
 
Welding Safety by Pennsylvania L&I
Welding Safety by Pennsylvania L&IWelding Safety by Pennsylvania L&I
Welding Safety by Pennsylvania L&I
 
Slips Trips & Falls Training by Signal
Slips Trips & Falls Training by SignalSlips Trips & Falls Training by Signal
Slips Trips & Falls Training by Signal
 
Preventing Falls, Slips and Trips by MGSU
Preventing Falls, Slips and Trips by MGSUPreventing Falls, Slips and Trips by MGSU
Preventing Falls, Slips and Trips by MGSU
 
Preventing Workplace Harassment by Pennsylvania L&I
Preventing Workplace Harassment by Pennsylvania L&IPreventing Workplace Harassment by Pennsylvania L&I
Preventing Workplace Harassment by Pennsylvania L&I
 
Warehouses In Emergencies by WFP Logistics
Warehouses In Emergencies by WFP LogisticsWarehouses In Emergencies by WFP Logistics
Warehouses In Emergencies by WFP Logistics
 
Prevention of Sexual Harassment by USMC
Prevention of Sexual Harassment by USMCPrevention of Sexual Harassment by USMC
Prevention of Sexual Harassment by USMC
 
Sexual Harassment by DEOMI
Sexual Harassment by DEOMISexual Harassment by DEOMI
Sexual Harassment by DEOMI
 
Sexual Harassment in the Workplace Training by Shumaker
Sexual Harassment in the Workplace Training by ShumakerSexual Harassment in the Workplace Training by Shumaker
Sexual Harassment in the Workplace Training by Shumaker
 
Sexual Harassment Training by NAP
Sexual Harassment Training by NAPSexual Harassment Training by NAP
Sexual Harassment Training by NAP
 
Scaffolds Training by Pennsylvania L&I
Scaffolds Training by Pennsylvania L&IScaffolds Training by Pennsylvania L&I
Scaffolds Training by Pennsylvania L&I
 
Supervision
SupervisionSupervision
Supervision
 
New Employee Safety Orientation by Oregon State University
New Employee Safety Orientation by Oregon State UniversityNew Employee Safety Orientation by Oregon State University
New Employee Safety Orientation by Oregon State University
 

Recently uploaded

2024 Numerator Consumer Study of Cannabis Usage
2024 Numerator Consumer Study of Cannabis Usage2024 Numerator Consumer Study of Cannabis Usage
2024 Numerator Consumer Study of Cannabis UsageNeil Kimberley
 
/:Call Girls In Indirapuram Ghaziabad ➥9990211544 Independent Best Escorts In...
/:Call Girls In Indirapuram Ghaziabad ➥9990211544 Independent Best Escorts In.../:Call Girls In Indirapuram Ghaziabad ➥9990211544 Independent Best Escorts In...
/:Call Girls In Indirapuram Ghaziabad ➥9990211544 Independent Best Escorts In...lizamodels9
 
Intro to BCG's Carbon Emissions Benchmark_vF.pdf
Intro to BCG's Carbon Emissions Benchmark_vF.pdfIntro to BCG's Carbon Emissions Benchmark_vF.pdf
Intro to BCG's Carbon Emissions Benchmark_vF.pdfpollardmorgan
 
FULL ENJOY Call girls in Paharganj Delhi | 8377087607
FULL ENJOY Call girls in Paharganj Delhi | 8377087607FULL ENJOY Call girls in Paharganj Delhi | 8377087607
FULL ENJOY Call girls in Paharganj Delhi | 8377087607dollysharma2066
 
Islamabad Escorts | Call 03274100048 | Escort Service in Islamabad
Islamabad Escorts | Call 03274100048 | Escort Service in IslamabadIslamabad Escorts | Call 03274100048 | Escort Service in Islamabad
Islamabad Escorts | Call 03274100048 | Escort Service in IslamabadAyesha Khan
 
Investment in The Coconut Industry by Nancy Cheruiyot
Investment in The Coconut Industry by Nancy CheruiyotInvestment in The Coconut Industry by Nancy Cheruiyot
Investment in The Coconut Industry by Nancy Cheruiyotictsugar
 
Global Scenario On Sustainable and Resilient Coconut Industry by Dr. Jelfina...
Global Scenario On Sustainable  and Resilient Coconut Industry by Dr. Jelfina...Global Scenario On Sustainable  and Resilient Coconut Industry by Dr. Jelfina...
Global Scenario On Sustainable and Resilient Coconut Industry by Dr. Jelfina...ictsugar
 
Case study on tata clothing brand zudio in detail
Case study on tata clothing brand zudio in detailCase study on tata clothing brand zudio in detail
Case study on tata clothing brand zudio in detailAriel592675
 
Youth Involvement in an Innovative Coconut Value Chain by Mwalimu Menza
Youth Involvement in an Innovative Coconut Value Chain by Mwalimu MenzaYouth Involvement in an Innovative Coconut Value Chain by Mwalimu Menza
Youth Involvement in an Innovative Coconut Value Chain by Mwalimu Menzaictsugar
 
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607dollysharma2066
 
MAHA Global and IPR: Do Actions Speak Louder Than Words?
MAHA Global and IPR: Do Actions Speak Louder Than Words?MAHA Global and IPR: Do Actions Speak Louder Than Words?
MAHA Global and IPR: Do Actions Speak Louder Than Words?Olivia Kresic
 
8447779800, Low rate Call girls in Uttam Nagar Delhi NCR
8447779800, Low rate Call girls in Uttam Nagar Delhi NCR8447779800, Low rate Call girls in Uttam Nagar Delhi NCR
8447779800, Low rate Call girls in Uttam Nagar Delhi NCRashishs7044
 
Ten Organizational Design Models to align structure and operations to busines...
Ten Organizational Design Models to align structure and operations to busines...Ten Organizational Design Models to align structure and operations to busines...
Ten Organizational Design Models to align structure and operations to busines...Seta Wicaksana
 
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...lizamodels9
 
The CMO Survey - Highlights and Insights Report - Spring 2024
The CMO Survey - Highlights and Insights Report - Spring 2024The CMO Survey - Highlights and Insights Report - Spring 2024
The CMO Survey - Highlights and Insights Report - Spring 2024christinemoorman
 
Lean: From Theory to Practice — One City’s (and Library’s) Lean Story… Abridged
Lean: From Theory to Practice — One City’s (and Library’s) Lean Story… AbridgedLean: From Theory to Practice — One City’s (and Library’s) Lean Story… Abridged
Lean: From Theory to Practice — One City’s (and Library’s) Lean Story… AbridgedKaiNexus
 
Keppel Ltd. 1Q 2024 Business Update Presentation Slides
Keppel Ltd. 1Q 2024 Business Update  Presentation SlidesKeppel Ltd. 1Q 2024 Business Update  Presentation Slides
Keppel Ltd. 1Q 2024 Business Update Presentation SlidesKeppelCorporation
 
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...lizamodels9
 
Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...
Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...
Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...lizamodels9
 

Recently uploaded (20)

2024 Numerator Consumer Study of Cannabis Usage
2024 Numerator Consumer Study of Cannabis Usage2024 Numerator Consumer Study of Cannabis Usage
2024 Numerator Consumer Study of Cannabis Usage
 
/:Call Girls In Indirapuram Ghaziabad ➥9990211544 Independent Best Escorts In...
/:Call Girls In Indirapuram Ghaziabad ➥9990211544 Independent Best Escorts In.../:Call Girls In Indirapuram Ghaziabad ➥9990211544 Independent Best Escorts In...
/:Call Girls In Indirapuram Ghaziabad ➥9990211544 Independent Best Escorts In...
 
Intro to BCG's Carbon Emissions Benchmark_vF.pdf
Intro to BCG's Carbon Emissions Benchmark_vF.pdfIntro to BCG's Carbon Emissions Benchmark_vF.pdf
Intro to BCG's Carbon Emissions Benchmark_vF.pdf
 
FULL ENJOY Call girls in Paharganj Delhi | 8377087607
FULL ENJOY Call girls in Paharganj Delhi | 8377087607FULL ENJOY Call girls in Paharganj Delhi | 8377087607
FULL ENJOY Call girls in Paharganj Delhi | 8377087607
 
Islamabad Escorts | Call 03274100048 | Escort Service in Islamabad
Islamabad Escorts | Call 03274100048 | Escort Service in IslamabadIslamabad Escorts | Call 03274100048 | Escort Service in Islamabad
Islamabad Escorts | Call 03274100048 | Escort Service in Islamabad
 
Investment in The Coconut Industry by Nancy Cheruiyot
Investment in The Coconut Industry by Nancy CheruiyotInvestment in The Coconut Industry by Nancy Cheruiyot
Investment in The Coconut Industry by Nancy Cheruiyot
 
Global Scenario On Sustainable and Resilient Coconut Industry by Dr. Jelfina...
Global Scenario On Sustainable  and Resilient Coconut Industry by Dr. Jelfina...Global Scenario On Sustainable  and Resilient Coconut Industry by Dr. Jelfina...
Global Scenario On Sustainable and Resilient Coconut Industry by Dr. Jelfina...
 
Case study on tata clothing brand zudio in detail
Case study on tata clothing brand zudio in detailCase study on tata clothing brand zudio in detail
Case study on tata clothing brand zudio in detail
 
Youth Involvement in an Innovative Coconut Value Chain by Mwalimu Menza
Youth Involvement in an Innovative Coconut Value Chain by Mwalimu MenzaYouth Involvement in an Innovative Coconut Value Chain by Mwalimu Menza
Youth Involvement in an Innovative Coconut Value Chain by Mwalimu Menza
 
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
 
MAHA Global and IPR: Do Actions Speak Louder Than Words?
MAHA Global and IPR: Do Actions Speak Louder Than Words?MAHA Global and IPR: Do Actions Speak Louder Than Words?
MAHA Global and IPR: Do Actions Speak Louder Than Words?
 
8447779800, Low rate Call girls in Uttam Nagar Delhi NCR
8447779800, Low rate Call girls in Uttam Nagar Delhi NCR8447779800, Low rate Call girls in Uttam Nagar Delhi NCR
8447779800, Low rate Call girls in Uttam Nagar Delhi NCR
 
Japan IT Week 2024 Brochure by 47Billion (English)
Japan IT Week 2024 Brochure by 47Billion (English)Japan IT Week 2024 Brochure by 47Billion (English)
Japan IT Week 2024 Brochure by 47Billion (English)
 
Ten Organizational Design Models to align structure and operations to busines...
Ten Organizational Design Models to align structure and operations to busines...Ten Organizational Design Models to align structure and operations to busines...
Ten Organizational Design Models to align structure and operations to busines...
 
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
 
The CMO Survey - Highlights and Insights Report - Spring 2024
The CMO Survey - Highlights and Insights Report - Spring 2024The CMO Survey - Highlights and Insights Report - Spring 2024
The CMO Survey - Highlights and Insights Report - Spring 2024
 
Lean: From Theory to Practice — One City’s (and Library’s) Lean Story… Abridged
Lean: From Theory to Practice — One City’s (and Library’s) Lean Story… AbridgedLean: From Theory to Practice — One City’s (and Library’s) Lean Story… Abridged
Lean: From Theory to Practice — One City’s (and Library’s) Lean Story… Abridged
 
Keppel Ltd. 1Q 2024 Business Update Presentation Slides
Keppel Ltd. 1Q 2024 Business Update  Presentation SlidesKeppel Ltd. 1Q 2024 Business Update  Presentation Slides
Keppel Ltd. 1Q 2024 Business Update Presentation Slides
 
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
 
Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...
Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...
Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...
 

HIPAA Basics by Brian Fleetham

  • 2. HIPAA Overview General prohibition: a “covered entity” cannot disclose “protected health information” unless an exception applies.
  • 3. HIPAA Overview Translation: treat patient information as confidential.
  • 4. HIPAA Overview Two main parts: privacy rule and security rule.
  • 5. HIPAA – Key Definitions “Covered Entity” means (1) health plans, (2) healthcare clearinghouses, and (3) health care providers that transmit protected health information in an electronic format.
  • 6. HIPAA – Key Definitions “Protected Health Information” or “PHI” means individually identifiable information that is transmitted by electronic media; maintained in any electronic media; or transmitted or maintained in any other form or medium.
  • 7. HIPAA – Key Definitions “Individually Identifiable Health Information” means information collected from an individual that (1) is created or received by a health plan, a health provider, an employer, or a health care clearinghouse;
  • 8. HIPAA – Key Definitions “Individually Identifiable Health Information” (continued) (2) relates to the past, present, or future mental or physical health of an individual, the care provided to an individual, or the past, present, or future payment for the care of an individual; and
  • 9. HIPAA – Key Definitions “Individually Identifiable Health Information” (continued) (3) identifies the individual or there is a reasonable belief that the information could be used to identify the individual.
  • 10. HIPAA – Key Definitions Common identifiers of health information include names, social security numbers, addresses, and birth dates.
  • 11. HIPAA – Key Definitions A key concept under HIPAA is “minimum necessary.” Most uses and disclosures of PHI, even internally, must use or disclose PHI only as minimally necessary to accomplish the use or disclosure.
  • 12. HIPAA – Privacy Standards The HIPAA Privacy Standards generally prohibit a covered entity from using or disclosing PHI, unless the use or disclosure fits within a particular exception.
  • 13. HIPAA – Key Exceptions to the Privacy Standards Among other uses or disclosures, covered entities may use or disclose PHI: • For payment, treatment, or healthcare operations.
  • 14. HIPAA – Key Exceptions to the Privacy Standards (continued) • To the individual that the PHI pertains to or to his or her designated representative. • As directed by an individual’s written authorization. • As required by law. • To a business associate.
  • 15. HIPAA – Business Associates A business associate is a person or entity that performs services for a covered entity which involve PHI.
  • 16. HIPAA - Business Associates PHI can be provided to a “business associate” only if the PHI is a necessary component of the services provided by the business associate to the covered entity and an appropriate business associate agreement is in place.
  • 17. HIPAA - Business Associates Business associates can include billing companies, IT providers, consultants, attorneys, etc. Other covered entities are not business associate unless non- clinical services are involved.
  • 18. HIPAA – Business Associates With the HITECH Act, business associates now have direct liability under HIPAA. Covered entities remain liable for the actions of their business associates.
  • 19. HIPAA – Individual Rights The HIPAA Privacy Standards establish several individual rights relating to PHI, such as the following: • Notice of privacy practices from a covered entity • Request for restrictions on use of PHI
  • 20. HIPAA – Individual Rights (continued) • Request for reasonable handling of the manner of communications • Access and amendments to PHI • Accounting of disclosures of PHI
  • 21. HIPAA – Security Standards The HIPAA Security Standards apply to all PHI maintained or used electronically (known as “ePHI”). A covered entity must evaluate each Security Standard and determine the extent to which each must be implemented, based on various factors.
  • 22. HIPAA – Risk Assessment This process is known as conducting a risk assessment. • Must be performed regularly. • Also a “core requirement” for meaningful use payments.
  • 23. HIPAA – Risk Assessment (continued) • A covered entity risks a mandatory repayment or loss of future meaningful use payments if it cannot produce written risk assessments for each year that meaningful use payments are claimed.
  • 24. HIPAA – Security Standards The Security Standards fall under three main categories: • Administrative Safeguards (e.g., plans, policies, protocols, training, etc.)
  • 25. HIPAA – Security Standards (continued) • Physical Safeguards (e.g., media and physical access controls, workstation requirements, etc.) • Technical Safeguards (e.g., data and entity authentication, network control, etc.)
  • 26. HIPAA – Data Breaches A data breach consists of the impermissible acquisition, access, use, or disclosure of unprotected (i.e., unencrypted) PHI (whether electronic or otherwise).
  • 27. HIPAA – Data Breach The prior harm standard has been replaced with a test of whether PHI has been “compromised.” The regulations create a general presumption that the data has been compromised.
  • 28. HIPAA – Data Breach Upon a suspected data breach, a covered entity must, within 60 days, either immediately notify affected individuals and DHHS (and possibly the media) or undertake an analysis of whether an actual breach has occurred and then notify as necessary.
  • 29. HIPAA – State Law Preemption State law provisions that are more stringent preempt applicable HIPAA requirements.
  • 30. HIPAA – Applicable Michigan Law Under Michigan law, physicians are broadly prohibited from disclosing treatment information. Disclosure thus requires consent, court order, or a specific legal mandate.
  • 31. HIPAA - Enforcement Prior to HITECH, enforcement was complaint-driven with limited penalties except for intentional violations, with the main goal being compliance. HITECH authorized HIPAA enforcement audits and increased the amount of fines for violations.
  • 32. HIPAA - Penalties Penalties for HIPAA violations fall under four tiers: • Tier A – Did not know of the violation – fines between $100 and $50,000 for each violation
  • 33. HIPAA – Penalties (continued) • Tier B – Reasonable cause for violation rather than willful neglect – fines between $1,000 and $50,000 for each violation
  • 34. HIPAA – Penalties (continued) • Tier C – Violation due to willful neglect but corrected – fines between $10,000 and $50,000 for each violation • Tier D – Violations due to willful neglect but not corrected – fines of $50,000 for each violation.
  • 35. HIPAA – Penalties (continued) Cap of $50,000 fine per violation and $1.5 million annually for the same type of violation.
  • 36. • Updated notice of privacy practices • Updated business associate agreements in place • Appropriate policies and procedures • Regular workforce education HIPAA – Main Compliance Steps
  • 37. • Encryption protection for electronic PHI • Other electronic and physical safeguards • Risk assessment • Appointment of HIPAA privacy and security officer HIPAA – Main Compliance Steps (continued)
  • 38. • Model privacy notice from DHHS: http://www.hhs.gov/ocr/privacy/hip aa/modelnotices.html • Sample business associate agreement provision from DHHS: http://www.hhs.gov/ocr/privacy/hip aa/understanding/coveredentities/c ontractprov.html HIPAA - Resources
  • 39. • AMA toolkit: http://www.ama- assn.org/ama/pub/physician- resources/solutions-managing-your- practice/coding-billing- insurance/hipaahealth-insurance- portability-accountability-act.page HIPAA – Resources (continued)
  • 40. HIPAA – Resources (continued) • DHHS risk assessment tool: http://www.healthit.gov/providers- professionals/security-risk-assessment- tool