SlideShare a Scribd company logo
1 of 23
Download to read offline
Notification of Breach
                          Release of Information Discussion
                         Presented By: Janine Akers from DataFile Technologies



Technical Doctor, Inc.
Connecting Technology & Professionals
About DataFile Technologies
                                        •Privately Held Kansas City Company

                                        •Work with Major EMRs

                                        •National Partnership with Multiple Companies




Technical Doctor, Inc.
Connecting Technology & Professionals
Overview

                      • HITECH Act Changes to HIPAA
                                           g
                        Notification of Breach


                      • Release of Information Best Practice
                        Resources

                       • How our eROI Services can work for
                         You.




Technical Doctor, Inc.
Connecting Technology & Professionals
Notification of Breach



       Do we need
        to notify a
         patient?




Technical Doctor, Inc.
Connecting Technology & Professionals
HITECH Historical View
                     Brief History of HITECH Act
                     Subtitle D—13400’s Section


                      August 2009
                    1st Set of Proposed Rules for HIPAA Privacy
                                                        Privacy,
                    Security and Enforcement Rules

                      February 2010
                      F b
                    Above proposed rules are finalized

                      July 2010
                    Above final was recalled and 2nd set of
                    proposed rules were published
                            d l            bli h d
Technical Doctor, Inc.
Connecting Technology & Professionals
HITECH Proposed Changes

                    Changes Proposed in Current Comment Period


                          Notice of Privacy Practices


                          Changes to definition of medical necessity


                          Immunization records & deceased records


                          Definitions of electronic media

                          Breaches – Guidance for Significant Risk
Technical Doctor, Inc.
Connecting Technology & Professionals
What is a Breach?
                 How does HITECH Act define a breach?


                       Was the protected health information secure?

                       Do one of the exclusions apply?


                       Is there a significant risk of financial,
                       reputational, or other harm to the individual?




Technical Doctor, Inc.
Connecting Technology & Professionals
The Exclusions

                 What are the exclusions provided by HITECH?
                  Workforce use
                         •     Unintentional acquisition, access or use of PHI by a
                               workforce member if the PHI is not further used or
                               disclosed in a manner that violates the Privacy Rule
                       Workforce disclosure
                         •     Unintentional disclosure of PHI by a workforce member to
                               another workforce member if the PHI is not further used or
                               disclosed in a manner that violates the Privacy Rule
                       No way to retain the information
                         •     Unauthorized di l
                               U     th i d disclosure t which th CE or BA h a good
                                                          to hi h the          has       d
                               faith belief that the unauthorized person to whom the PHI is
                               disclosed would not reasonably have been able to retain
                               info.

Technical Doctor, Inc.
Connecting Technology & Professionals
Guidance for Significant Risk

                  What guidance is provided by HITECH?


                        Covered Entity to Covered Entity
                          •     Inadvertent disclosure of PHI from one covered entity or BA
                                                                                     y
                                employee to another similarly situated covered entity or BA
                                employee, provided that PHI is not further used or
                                disclosed in any manner that violates the Privacy Rule.
                        Immediate steps to mitigate
                          •     Were immediate steps taken to mitigate the harm including
                                return or destruction of the information and a written
                                confidentiality agreement ?
                        Types of information included
                          •     Was the information disclosed limited to the name of the
                                individual
                                indi id al or a limited data set?
Technical Doctor, Inc.
Connecting Technology & Professionals
Notification Components

                  What are the required notification components?


                        A description of what happened including the
                        date of breach and date of discovery y
                        A description of the types of PHI involved
                        Steps the individual should take to protect
                        themselves
                        Steps taken by the provider to investigate,
                        mitigate and protect against further disclosure
                        Contact information for questions including a
                        toll-free telephone number, email address,
                        website or postal address
                            b it        t l dd
Technical Doctor, Inc.
Connecting Technology & Professionals
Example Letter of Notification




Technical Doctor, Inc.
Connecting Technology & Professionals
Penalties & Reporting

                    What are the penalties & reporting obligations?
                     Defined d
                     D fi d and enacted b k i F b
                                        t d back in February 2009 i in
                     original ARRA/HITECH Act - HIPAA Section to
                     apply to both the Breach and the Notification

Nature of Violation Fine Per Violation                        Annual
                                                              Maximum
Unknowing                                 $100                $25,000
Reasonable Cause                          $1,000              $100,000
Willful Neglect                           $10,000
                                          $10 000             $250,000
                                                              $250 000
Willful Neglect Not                       $50,000             $1,500,000
Corrected


  Technical Doctor, Inc.
  Connecting Technology & Professionals
Reporting Reference

                   Records 
                               Authorized                                                                                                                  Proactive approach for preventive 
Date   Patient   Originated                   Incident           How mistake happened            Mistake discovered   Mistake rectified and Notification
                                Recipient                                                                                                                              measures
                 from Clinic




                                                          After it has been brought to our 
                                                                                                                         Starting with date and 
                                                          attention that there has been an                                                                Starting with date and 
                                                                                                                            name of employee 
                                                            oversight, mistake, or HIPAA                                                              supervisor’s name, document 
                                                                                                                          initiating report and 
                                                         violation (regardless of how big or  Starting with date and                                 how we will use this occurrence 
     Patient                             Description of                                                                  correcting the problem, 
              Medical                                    small)‐ we will document, research  resource, describe in                                  to train the entire staff regarding 
Date Name &                    Requestor the unique                                                                     describe in detail actions 
              Practice                                     and come to understand what  detail how this mistake                                      our best practice procedures to 
                                                                                                                                                               p        p
      DOB                                 occurrence.                                                                      taken to correct the 
                                                                                                                           t k t            t th
                                                        happened and describe in detail how  was discovered.                                            prevent the possibility of a 
                                                                                                                        problem and how patient 
                                                          this occurred.  Include date and                                                            similar occurrence happening 
                                                                                                                        and covered entity were 
                                                          employee names involved in the                                                                          again.  
                                                                                                                                 notified.  
                                                                communication trail.




                 Technical Doctor, Inc.
                 Connecting Technology & Professionals
Limit Your Liability



                                           • Staff training

                                           • Process
                                             improvement

                                           • Transfer the
                                             liability
                                                     y




Technical Doctor, Inc.
Connecting Technology & Professionals
Why DataFile?




                                   Improve customer service
                                   Improve customer service
                                   Mitigate risk
                                   Offer rapid response
                                           p      p
                                   Eliminate training expenses
                                   Take fewer calls

Technical Doctor, Inc.
Connecting Technology & Professionals
DataFile Technologies eROI



How do our services work?




 Technical Doctor, Inc.
 Connecting Technology & Professionals
How It Works: Step 1
1. Establish HIPAA secure network connection




  Technical Doctor, Inc.
  Connecting Technology & Professionals
How It Works: Step 2
2. Set up a User in the EMR for “DataFile”




   Technical Doctor, Inc.
   Connecting Technology & Professionals
How It Works: Step 3
3. Scan/attach appropriate Patient and Task or Message to user 
   “DataFile”




   Technical Doctor, Inc.
   Connecting Technology & Professionals
Start a Request to DataFile




Technical Doctor, Inc.
Connecting Technology & Professionals
Status Update on Request




Technical Doctor, Inc.
Connecting Technology & Professionals
The Brass Tacks

                                        What is the cost for eROI services?
                                        • T i ll
                                          Typically… NONE

                                        • The variables involved in eROI
                                          include
                                           – Specialty
                                           – Number of Providers
                                           – State
                                        • Providers can maximize service while
                                          eliminating costs with eROI services


Technical Doctor, Inc.
Connecting Technology & Professionals
Questions & Thank You


                              Janine B. Akers, MBA
                              DataFile Technologies, LLC




                    janine.akers@datafiletechnologies.com
                                816‐437‐9134




Technical Doctor, Inc.
Connecting Technology & Professionals

More Related Content

Viewers also liked

Joomla User Experience: Look Back & Forward
Joomla User Experience: Look Back & ForwardJoomla User Experience: Look Back & Forward
Joomla User Experience: Look Back & ForwardRon Severdia
 
Final presentation
Final presentationFinal presentation
Final presentationLGuntherberg
 
Dragon Training by Technical Dr
Dragon Training by Technical DrDragon Training by Technical Dr
Dragon Training by Technical DrTechnical Doctors
 
Global warming
Global warmingGlobal warming
Global warmingdan241996
 
Vehicle technology impacts on rescue (v.1.2)
Vehicle technology impacts on rescue (v.1.2)Vehicle technology impacts on rescue (v.1.2)
Vehicle technology impacts on rescue (v.1.2)Harry Burch
 
Preparing for ePub 3
Preparing for ePub 3Preparing for ePub 3
Preparing for ePub 3Ron Severdia
 
Patient Portal Training by Technical Doctor
Patient Portal Training by Technical DoctorPatient Portal Training by Technical Doctor
Patient Portal Training by Technical DoctorTechnical Doctors
 
Shakespeare Passport: Shakespeare Theatre Association Conference 2015
Shakespeare Passport: Shakespeare Theatre Association Conference 2015Shakespeare Passport: Shakespeare Theatre Association Conference 2015
Shakespeare Passport: Shakespeare Theatre Association Conference 2015Ron Severdia
 

Viewers also liked (8)

Joomla User Experience: Look Back & Forward
Joomla User Experience: Look Back & ForwardJoomla User Experience: Look Back & Forward
Joomla User Experience: Look Back & Forward
 
Final presentation
Final presentationFinal presentation
Final presentation
 
Dragon Training by Technical Dr
Dragon Training by Technical DrDragon Training by Technical Dr
Dragon Training by Technical Dr
 
Global warming
Global warmingGlobal warming
Global warming
 
Vehicle technology impacts on rescue (v.1.2)
Vehicle technology impacts on rescue (v.1.2)Vehicle technology impacts on rescue (v.1.2)
Vehicle technology impacts on rescue (v.1.2)
 
Preparing for ePub 3
Preparing for ePub 3Preparing for ePub 3
Preparing for ePub 3
 
Patient Portal Training by Technical Doctor
Patient Portal Training by Technical DoctorPatient Portal Training by Technical Doctor
Patient Portal Training by Technical Doctor
 
Shakespeare Passport: Shakespeare Theatre Association Conference 2015
Shakespeare Passport: Shakespeare Theatre Association Conference 2015Shakespeare Passport: Shakespeare Theatre Association Conference 2015
Shakespeare Passport: Shakespeare Theatre Association Conference 2015
 

Similar to Data file.technical drs.hipaa presentation may 2011

Assuring regulatory compliance, ePHI protection, and secure healthcare delivery
Assuring regulatory compliance, ePHI protection, and secure healthcare deliveryAssuring regulatory compliance, ePHI protection, and secure healthcare delivery
Assuring regulatory compliance, ePHI protection, and secure healthcare deliveryTrend Micro
 
Keynote Presentation "Building a Culture of Privacy and Security into Your Or...
Keynote Presentation "Building a Culture of Privacy and Security into Your Or...Keynote Presentation "Building a Culture of Privacy and Security into Your Or...
Keynote Presentation "Building a Culture of Privacy and Security into Your Or...Health IT Conference – iHT2
 
20190523 Breach Notification Wizard: Lessons in Knowledge Management!
20190523 Breach Notification Wizard: Lessons in Knowledge Management!20190523 Breach Notification Wizard: Lessons in Knowledge Management!
20190523 Breach Notification Wizard: Lessons in Knowledge Management!3Lions Publishing, Inc.
 
What Is Security Risk Analysis? By: MedSafe
What Is Security Risk Analysis? By: MedSafeWhat Is Security Risk Analysis? By: MedSafe
What Is Security Risk Analysis? By: MedSafeMedSafe
 
Business Associate Assurance: What Covered Entities Need to Know
Business Associate Assurance: What Covered Entities Need to KnowBusiness Associate Assurance: What Covered Entities Need to Know
Business Associate Assurance: What Covered Entities Need to Knowdata brackets
 
Interconnected Health 2012 Hitech 3 Years Later
Interconnected Health 2012 Hitech 3 Years LaterInterconnected Health 2012 Hitech 3 Years Later
Interconnected Health 2012 Hitech 3 Years Laterprivacypros
 
Your healthy practice July/August 2011
Your healthy practice July/August 2011Your healthy practice July/August 2011
Your healthy practice July/August 2011Kushner LaGraize, LLC
 
HIPAA Part I the Law Test
HIPAA Part I  the Law TestHIPAA Part I  the Law Test
HIPAA Part I the Law TestSachiko Hurst
 
Hitech changes-to-hipaa
Hitech changes-to-hipaaHitech changes-to-hipaa
Hitech changes-to-hipaageeksikh
 
HIPAA Compliance For Small Practices
HIPAA Compliance For Small PracticesHIPAA Compliance For Small Practices
HIPAA Compliance For Small PracticesNisos Health
 
Protecting ePHI: What Providers and Business Associates Need to Know
Protecting ePHI: What Providers and Business Associates Need to KnowProtecting ePHI: What Providers and Business Associates Need to Know
Protecting ePHI: What Providers and Business Associates Need to KnowNetwork 1 Consulting
 
how to really implement hipaa presentation
how to really implement hipaa presentationhow to really implement hipaa presentation
how to really implement hipaa presentationProvider Resources Group
 
Patient Privacy Provisions of the HITECH Act Implications for Patients and Sm...
Patient Privacy Provisions of the HITECH Act Implications for Patients and Sm...Patient Privacy Provisions of the HITECH Act Implications for Patients and Sm...
Patient Privacy Provisions of the HITECH Act Implications for Patients and Sm...Xiaoming Zeng
 
Telehealth Clinical Best Practices Workshop I 5 23-2020
Telehealth Clinical Best Practices Workshop I 5 23-2020Telehealth Clinical Best Practices Workshop I 5 23-2020
Telehealth Clinical Best Practices Workshop I 5 23-2020Marlene Maheu
 
Business Associate Assessment, Agreement and Requirements
Business Associate Assessment, Agreement and RequirementsBusiness Associate Assessment, Agreement and Requirements
Business Associate Assessment, Agreement and Requirementsdata brackets
 
Protecting PHI with encryption for HIPAA compliance
Protecting PHI with encryption for HIPAA complianceProtecting PHI with encryption for HIPAA compliance
Protecting PHI with encryption for HIPAA complianceTodd Merrill
 
Presentation hippa
Presentation hippaPresentation hippa
Presentation hippamaggie_Platt
 

Similar to Data file.technical drs.hipaa presentation may 2011 (20)

Healthcare Cyber Security Webinar
Healthcare Cyber Security WebinarHealthcare Cyber Security Webinar
Healthcare Cyber Security Webinar
 
Assuring regulatory compliance, ePHI protection, and secure healthcare delivery
Assuring regulatory compliance, ePHI protection, and secure healthcare deliveryAssuring regulatory compliance, ePHI protection, and secure healthcare delivery
Assuring regulatory compliance, ePHI protection, and secure healthcare delivery
 
Audit Reality Webinar
Audit Reality WebinarAudit Reality Webinar
Audit Reality Webinar
 
Keynote Presentation "Building a Culture of Privacy and Security into Your Or...
Keynote Presentation "Building a Culture of Privacy and Security into Your Or...Keynote Presentation "Building a Culture of Privacy and Security into Your Or...
Keynote Presentation "Building a Culture of Privacy and Security into Your Or...
 
20190523 Breach Notification Wizard: Lessons in Knowledge Management!
20190523 Breach Notification Wizard: Lessons in Knowledge Management!20190523 Breach Notification Wizard: Lessons in Knowledge Management!
20190523 Breach Notification Wizard: Lessons in Knowledge Management!
 
What Is Security Risk Analysis? By: MedSafe
What Is Security Risk Analysis? By: MedSafeWhat Is Security Risk Analysis? By: MedSafe
What Is Security Risk Analysis? By: MedSafe
 
Business Associate Assurance: What Covered Entities Need to Know
Business Associate Assurance: What Covered Entities Need to KnowBusiness Associate Assurance: What Covered Entities Need to Know
Business Associate Assurance: What Covered Entities Need to Know
 
Interconnected Health 2012 Hitech 3 Years Later
Interconnected Health 2012 Hitech 3 Years LaterInterconnected Health 2012 Hitech 3 Years Later
Interconnected Health 2012 Hitech 3 Years Later
 
Your healthy practice July/August 2011
Your healthy practice July/August 2011Your healthy practice July/August 2011
Your healthy practice July/August 2011
 
HIPAA Part I the Law Test
HIPAA Part I  the Law TestHIPAA Part I  the Law Test
HIPAA Part I the Law Test
 
Hitech changes-to-hipaa
Hitech changes-to-hipaaHitech changes-to-hipaa
Hitech changes-to-hipaa
 
HIPAA Compliance For Small Practices
HIPAA Compliance For Small PracticesHIPAA Compliance For Small Practices
HIPAA Compliance For Small Practices
 
Protecting ePHI: What Providers and Business Associates Need to Know
Protecting ePHI: What Providers and Business Associates Need to KnowProtecting ePHI: What Providers and Business Associates Need to Know
Protecting ePHI: What Providers and Business Associates Need to Know
 
2010 Hipaa Rules 011310
2010 Hipaa Rules 0113102010 Hipaa Rules 011310
2010 Hipaa Rules 011310
 
how to really implement hipaa presentation
how to really implement hipaa presentationhow to really implement hipaa presentation
how to really implement hipaa presentation
 
Patient Privacy Provisions of the HITECH Act Implications for Patients and Sm...
Patient Privacy Provisions of the HITECH Act Implications for Patients and Sm...Patient Privacy Provisions of the HITECH Act Implications for Patients and Sm...
Patient Privacy Provisions of the HITECH Act Implications for Patients and Sm...
 
Telehealth Clinical Best Practices Workshop I 5 23-2020
Telehealth Clinical Best Practices Workshop I 5 23-2020Telehealth Clinical Best Practices Workshop I 5 23-2020
Telehealth Clinical Best Practices Workshop I 5 23-2020
 
Business Associate Assessment, Agreement and Requirements
Business Associate Assessment, Agreement and RequirementsBusiness Associate Assessment, Agreement and Requirements
Business Associate Assessment, Agreement and Requirements
 
Protecting PHI with encryption for HIPAA compliance
Protecting PHI with encryption for HIPAA complianceProtecting PHI with encryption for HIPAA compliance
Protecting PHI with encryption for HIPAA compliance
 
Presentation hippa
Presentation hippaPresentation hippa
Presentation hippa
 

Recently uploaded

Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxnull - The Open Security Community
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsHyundai Motor Group
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 

Recently uploaded (20)

Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 

Data file.technical drs.hipaa presentation may 2011

  • 1. Notification of Breach Release of Information Discussion Presented By: Janine Akers from DataFile Technologies Technical Doctor, Inc. Connecting Technology & Professionals
  • 2. About DataFile Technologies •Privately Held Kansas City Company •Work with Major EMRs •National Partnership with Multiple Companies Technical Doctor, Inc. Connecting Technology & Professionals
  • 3. Overview • HITECH Act Changes to HIPAA g Notification of Breach • Release of Information Best Practice Resources • How our eROI Services can work for You. Technical Doctor, Inc. Connecting Technology & Professionals
  • 4. Notification of Breach Do we need to notify a patient? Technical Doctor, Inc. Connecting Technology & Professionals
  • 5. HITECH Historical View Brief History of HITECH Act Subtitle D—13400’s Section August 2009 1st Set of Proposed Rules for HIPAA Privacy Privacy, Security and Enforcement Rules February 2010 F b Above proposed rules are finalized July 2010 Above final was recalled and 2nd set of proposed rules were published d l bli h d Technical Doctor, Inc. Connecting Technology & Professionals
  • 6. HITECH Proposed Changes Changes Proposed in Current Comment Period Notice of Privacy Practices Changes to definition of medical necessity Immunization records & deceased records Definitions of electronic media Breaches – Guidance for Significant Risk Technical Doctor, Inc. Connecting Technology & Professionals
  • 7. What is a Breach? How does HITECH Act define a breach? Was the protected health information secure? Do one of the exclusions apply? Is there a significant risk of financial, reputational, or other harm to the individual? Technical Doctor, Inc. Connecting Technology & Professionals
  • 8. The Exclusions What are the exclusions provided by HITECH? Workforce use • Unintentional acquisition, access or use of PHI by a workforce member if the PHI is not further used or disclosed in a manner that violates the Privacy Rule Workforce disclosure • Unintentional disclosure of PHI by a workforce member to another workforce member if the PHI is not further used or disclosed in a manner that violates the Privacy Rule No way to retain the information • Unauthorized di l U th i d disclosure t which th CE or BA h a good to hi h the has d faith belief that the unauthorized person to whom the PHI is disclosed would not reasonably have been able to retain info. Technical Doctor, Inc. Connecting Technology & Professionals
  • 9. Guidance for Significant Risk What guidance is provided by HITECH? Covered Entity to Covered Entity • Inadvertent disclosure of PHI from one covered entity or BA y employee to another similarly situated covered entity or BA employee, provided that PHI is not further used or disclosed in any manner that violates the Privacy Rule. Immediate steps to mitigate • Were immediate steps taken to mitigate the harm including return or destruction of the information and a written confidentiality agreement ? Types of information included • Was the information disclosed limited to the name of the individual indi id al or a limited data set? Technical Doctor, Inc. Connecting Technology & Professionals
  • 10. Notification Components What are the required notification components? A description of what happened including the date of breach and date of discovery y A description of the types of PHI involved Steps the individual should take to protect themselves Steps taken by the provider to investigate, mitigate and protect against further disclosure Contact information for questions including a toll-free telephone number, email address, website or postal address b it t l dd Technical Doctor, Inc. Connecting Technology & Professionals
  • 12. Penalties & Reporting What are the penalties & reporting obligations? Defined d D fi d and enacted b k i F b t d back in February 2009 i in original ARRA/HITECH Act - HIPAA Section to apply to both the Breach and the Notification Nature of Violation Fine Per Violation Annual Maximum Unknowing $100 $25,000 Reasonable Cause $1,000 $100,000 Willful Neglect $10,000 $10 000 $250,000 $250 000 Willful Neglect Not $50,000 $1,500,000 Corrected Technical Doctor, Inc. Connecting Technology & Professionals
  • 13. Reporting Reference Records  Authorized  Proactive approach for preventive  Date Patient Originated  Incident How mistake happened Mistake discovered Mistake rectified and Notification Recipient measures from Clinic After it has been brought to our  Starting with date and  attention that there has been an  Starting with date and  name of employee  oversight, mistake, or HIPAA  supervisor’s name, document  initiating report and  violation (regardless of how big or  Starting with date and  how we will use this occurrence  Patient  Description of  correcting the problem,  Medical  small)‐ we will document, research  resource, describe in  to train the entire staff regarding  Date Name &  Requestor the unique  describe in detail actions  Practice and come to understand what  detail how this mistake  our best practice procedures to  p p DOB occurrence.  taken to correct the  t k t t th happened and describe in detail how  was discovered. prevent the possibility of a  problem and how patient  this occurred.  Include date and  similar occurrence happening  and covered entity were  employee names involved in the  again.   notified.   communication trail. Technical Doctor, Inc. Connecting Technology & Professionals
  • 14. Limit Your Liability • Staff training • Process improvement • Transfer the liability y Technical Doctor, Inc. Connecting Technology & Professionals
  • 15. Why DataFile? Improve customer service Improve customer service Mitigate risk Offer rapid response p p Eliminate training expenses Take fewer calls Technical Doctor, Inc. Connecting Technology & Professionals
  • 17. How It Works: Step 1 1. Establish HIPAA secure network connection Technical Doctor, Inc. Connecting Technology & Professionals
  • 18. How It Works: Step 2 2. Set up a User in the EMR for “DataFile” Technical Doctor, Inc. Connecting Technology & Professionals
  • 19. How It Works: Step 3 3. Scan/attach appropriate Patient and Task or Message to user  “DataFile” Technical Doctor, Inc. Connecting Technology & Professionals
  • 22. The Brass Tacks What is the cost for eROI services? • T i ll Typically… NONE • The variables involved in eROI include – Specialty – Number of Providers – State • Providers can maximize service while eliminating costs with eROI services Technical Doctor, Inc. Connecting Technology & Professionals
  • 23. Questions & Thank You Janine B. Akers, MBA DataFile Technologies, LLC janine.akers@datafiletechnologies.com 816‐437‐9134 Technical Doctor, Inc. Connecting Technology & Professionals