SlideShare a Scribd company logo
1 of 25
Ā© 2013 Copyright Health Compliance Consultants, LLC. All rights reserved.
HIPAA / HITECH
PRIVACY AND SECURITY
TRAINING
Health Compliance Consultants
Ā© 2013 Copyright Health Compliance Consultants, LLC. All rights reserved.
Ā© 2013 Copyright Health Compliance Consultants, LLC. All rights reserved.
LEGAL STATEMENT
ļ‚§ No Part of this presentation may be
copied or reproduced, modified or
adapted, without the prior written consent
of Health Compliance Consultants, LLC.
ļ‚§ Commercial use and distribution of the
contents of this presentation in not
permitted without express and prior written
consent of Health Compliance
Consultants, LLC.
Ā© 2013 Copyright Health Compliance Consultants, LLC. All rights reserved.
Ā© 2013 Copyright Health Compliance Consultants, LLC. All rights reserved.
HIPAA OVERVIEW
Health Information Portability and Accountability Act (HIPAA) - 1996
Administrative
Simplification
Transactions/Code
Sets/Identifiers
(10/16/02-10/16/03)
Privacy
(4/14/2003)
Security
(4/20/2005)
HITECH (2009)
Health Information Technology for
Economic and Clinical Health
Insurance
Reform
Fraud and
Abuse
Ā© 2013 Copyright Health Compliance Consultants, LLC. All rights reserved.
DO I NEED HIPAA TRAINING?
ā€¢ All Staff working at [Practice Name] should receive HIPAA (Privacy and
Security training) at the time of hiring, and at least once every year
thereafter.
ā€¢ HIPAA Training is not job specific and is mandatory for all Staff.
ā€¢ All staff have to complete the training, attain a passing grade in the training
quiz and submit a completion certificate to Human Resources for record.
ā€¢ Staff may be required to get additional training if a significant change in
company infrastructure, administrative or operational environment takes
place during the year.
Ā© 2013 Copyright Health Compliance Consultants, LLC. All rights reserved.
WHAT ARE THE PRIVACY AND
SECURITY CONCERNS
ā€¢ Theft of Patient Data
ā€¢ Identity Theft
ā€¢ Stolen laptop
ā€¢ Loss of Patient Data
ā€¢ Incorrect disposal
ā€¢ USB Drives
ā€¢ Misuse of Patient Data
ā€¢ Privacy Breach
Ā© 2013 Copyright Health Compliance Consultants, LLC. All rights reserved.
SHOULD I BE WORRIED
(SOME REAL LIFE EXAMPLES)
THEFT
ā€¢ An employee from the Admissions Department at a prestigious NYC
hospital has been accused of stealing and selling information of
nearly 50,000 patients
LOSS
ā€¢ CVS Caremark Corp. paid $2.25 million to settle allegations that it
dumped credit-card data, Social Security numbers and customer
medical records into garbage containers outside a number of its
stores.
MISUSE
ā€¢ 27 employees were disciplined for a privacy breach related to the
Octomom. Two were fired, nine were disciplined, and 16 resigned.
The LA Hospital was also fined $250,000.
Ā© 2013 Copyright Health Compliance Consultants, LLC. All rights reserved.
SOME BASIC HIPAA GUIDELINES
ā€¢ Provide patients with the Notice of Privacy Practices
ā€¢ Shred protected health information (PHI)
ā€¢ Fax patient information utilizing a cover sheet
ā€¢ Telephone Guidance ā€“ leaving messages and caller requests for info
ā€¢ Verify patient at the time of new registration
ā€¢ Avoid unintentional disclosure (telephone /privacy screens/ email / mail)
ā€¢ Report Privacy Breaches & Complaints
Ā© 2013 Copyright Health Compliance Consultants, LLC. All rights reserved.
DEALING WITH PATIENTS
ā€¢ Notice of Privacy Practices (NOPP) must be offered to the
patient at the time of their first visit.
ļƒ¼On first visit only, not every visit.
ļƒ¼Whenever the NOPP is revised / updated.
ā€¢ Tells patients their specific rights regarding their health
information. This information is included in the NOPP.
ā€¢ A signed acknowledgement must be placed in the patientā€™s
medical record, this can be recorded electronically and
inserted directly into the EMR.
Ā© 2013 Copyright Health Compliance Consultants, LLC. All rights reserved.
WHATā€™S IN THE NOPP
ā€¢ Patients have the right to:
ļƒ¼Request restrictions on release of their PHI
ļƒ¼Receive confidential communications
ļƒ¼Inspect and copy medical records (access)
ļƒ¼Request amendment to medical records
ļƒ¼Make a complaint
ļƒ¼Receive an accounting of any external releases.
ļƒ¼Obtain a paper copy of the Notice of Privacy Practices on request
Ā© 2013 Copyright Health Compliance Consultants, LLC. All rights reserved.
USING OR DISCLOSING PHI
ā€¢ Written Authorization required to release medical
information
ā€¢ Physician may share information with referring physician
ā€œpatient in commonā€ without an authorization
ā€¢ Emergency request for medical information should be
documented in the medical record.
ā€¢ All access to or sharing of PHI must be documented /
recorded in the patientā€™s medical records.
Ā© 2013 Copyright Health Compliance Consultants, LLC. All rights reserved.
EMR AND PHI CONSIDERATIONS
ā€¢ Information Security
ā€¢ Access, Use and Disclosure
ā€¢ Release & Disclosure
ā€¢ Printing Medical Information
ā€¢ Loss or theft
ā€¢ Research
ā€¢ Copies
Ā© 2013 Copyright Health Compliance Consultants, LLC. All rights reserved.
MEDICAL RECORDS PRIVACY
ISSUES
ā€¢ Medical Record sent to wrong person
ā€¢ Medical Record mailed to wrong address
ā€¢ Medical Record given to wrong person
ā€¢ Information sent is not consistent with the
authorization signed by patient.
Ā© 2013 Copyright Health Compliance Consultants, LLC. All rights reserved.
5 IMPORTANT CONSIDERATIONS
REGARDING HIPAA SECURITY
1. Never share your password
2. Assure that you sign out of EMR after use, and lock
you computer screen before leaving your station.
3. Secure (encrypt) portable electronic devices, if
authorized, with patient, financial or research
information.
4. Promptly Report loss or theft of electronic devices
with protected health information and inform
Privacy Officer of improper use/ privacy breach.
5. SS# number should not be used when not required.
Ā© 2013 Copyright Health Compliance Consultants, LLC. All rights reserved.
PASSWORD SECURITY
ā€¢ Passwords are like underwear:
ā€¢ Change them often
ā€¢ Donā€™t share with friends
ā€¢ Be mysterious
ā€¢ Longer the better
ā€¢ Donā€™t leave yours lying around
Ā© 2013 Copyright Health Compliance Consultants, LLC. All rights reserved.
USE OF PORTABLE STORAGE
HIPAA SECURITY
ā€¢ Examples: USB thumb drives, external hard drives, SD cards,
CDs/DVDs.
ā€¢ Use only if authorized.
ā€¢ All PHI stored on these devices should be encrypted.
ā€¢ Report immediately if a portable device containing PHI is
misplaced or lost.
ā€¢ Wipe off PHI before discarding or loaning.
Ā© 2013 Copyright Health Compliance Consultants, LLC. All rights reserved.
ACCESSING EMRS
HIPAA PRIVACY
ā€¢ Your access to EMR is recorded and
subject to audit
ā€¢ Periodic audits are done and
access is monitored
ā€¢ If you access medical information
without a legitimate business
purpose you will be disciplined
ā€¢ Do not access the medical records of
friends, family members coworkers or
anyone else.
Ā© 2013 Copyright Health Compliance Consultants, LLC. All rights reserved.
SECURING DOCUMENTS
CONTAINING PHI
ā€¢ If you are using Microsoft Office programs and include any PHI in a
document, then make sure you encrypt the file:
Ā© 2013 Copyright Health Compliance Consultants, LLC. All rights reserved.
EMAIL USAGE
HIPAA SECURITY
E-Mail is like a ā€œpostcard.ā€ It may pass through several post
offices and are readable.
ā€¢ Use secure, encrypted E-Mail software officially provided
to you.
ā€¢ If you send an attachment with PHI: Encrypt the file
or do not send the attachment via e-mail!
ā€¢ Do not use individual names, medical record numbers or
account numbers in unencrypted e-mails
ā€¢ Forwarding or consolidating email with PHI on 3rd party
sites such as Google, Yahoo, or Hotmail is explicitly
prohibited.
Ā© 2013 Copyright Health Compliance Consultants, LLC. All rights reserved.
USE OF 3RD PARTY CALENDARS FOR
SCHEDULING
ā€¢ Use of 3rd party online calendars, such as Google
Calendars, leads to the risk of PHI disclosure.
ā€¢ Do not use these calendar systems for official
purposes.
ā€¢ Insteadā€¦use an internal calendar / scheduling
system built into our EMR application.
Ā© 2013 Copyright Health Compliance Consultants, LLC. All rights reserved.
WHAT IS PHI?
ā€¢ With a couple of exceptions, protected health information (PHI) includes
all individually identifiable health information that is transmitted or
maintained in any form or medium. This includes demographic
information that ties the identity of the individual to his or her health
record. Examples are names, addresses, geographic codes smaller than
state, all dates (except year) elements related to the person, telephone
numbers, fax numbers, license numbers, social security numbers, etc. The
information is protected if it can possibly identify the person.
ā€¢ One notable exception involves disclosures of patient information that
are required by law. For example, we are required by law to report
communicable diseases to the appropriate authorities.
Ā© 2013 Copyright Health Compliance Consultants, LLC. All rights reserved.
PHI SECURITY - REVISITED
Reminder:
ā€¢ Only share PHI in accordance with company policies.
ā€¢ Do not share PHI through unauthenticated websites.
ā€¢ Do not email PHI unencrypted.
ā€¢ Do not send PHI through unencrypted channels:
ā€¢ Examples include FTP, Telnet and HTTP
ā€¢ Use secure alternatives, such as sFTP , SSH and HTTPS
ā€¢ Do not store PHI on online storage sites:
ā€¢ Examples include Dropbox, One Drive, iCloud, Google
Drive, etc.
Ā© 2013 Copyright Health Compliance Consultants, LLC. All rights reserved.
NOW YOU KNOW HIPAA, BUT
WHAT IS HITECH?
HITECH Act (ARRA): Health Information Technology for Economic and
Clinical Health
ā€¢ New Federal Breach Notification Law ā€“ Effective Sept 2009
ā€¢ Applies to all electronic PHI or ePHI
ā€¢ Requires immediate notification to the Federal Government if more than
500 individuals effected
ā€¢ Annual notification if less that 500 individuals effected
ā€¢ Requires notification to a major media outlet
ā€¢ Breach will be listed on a public website
ā€¢ Requires individual notification to patients
ā€¢ Criminal penalties - apply to individual or employee of a covered entity
ā€¢ Increased Enforcement & Fines for Breaches
Ā© 2013 Copyright Health Compliance Consultants, LLC. All rights reserved.
INFORMATION SECURITY REVISITED
ā€¢ Password protect all data and computer workstations
ā€¢ Dispose off PHI properly
ā€¢ Keep work area properly secured, no unauthorized person permitted
ā€¢ Only use officially authorized messaging/email system for communicating
patient information
ā€¢ Only use officially authorized scheduling/calendar system
ā€¢ Be wary of visiting unauthorized websites that may introduce viruses,
spam ware and malware to your system
ā€¢ Do not copy PHI onto portable storage media without proper
authorization and without encryption
ā€¢ Do not share your password with anyone. It is used to audit your activities.
Ā© 2013 Copyright Health Compliance Consultants, LLC. All rights reserved.
AND THEN THERE IS OMNI BUS RULE
EFFECTIVE 3/26/2013ā€¢ Main highlights:
ā€¢ Business Associates are now Covered Entities, and requires update
Business Associates Agreements.
ā€¢ Breach Notification standards revised: Each breach evaluated for:
ā€¢ What information breached
ā€¢ To whom was the information exposed
ā€¢ Was the information actually accessed, used or disclosed
ā€¢ Any mitigation steps required and taken
ā€¢ Patients right to access PHI revised:
ā€¢ If patient requests their PHI to be transmitted in an unsecure way,
they should be warned and transmitted as per their request if they
still persist. This applies only to the individual whose PHI is being
transmitted.
Ā© 2013 Copyright Health Compliance Consultants, LLC. All rights reserved.
NEED MORE INFORMATION
ā€¢ Contact Company Privacy Security Officer:
ā€¢ Name:
ā€¢ Phone:
ā€¢ Email:
ā€¢ Mailing Address:

More Related Content

What's hot

Do You Know How to Handle a HIPAA Breach?
Do You Know How to Handle a HIPAA Breach?Do You Know How to Handle a HIPAA Breach?
Do You Know How to Handle a HIPAA Breach?Compliancy Group
Ā 
HIPPA Compliance
HIPPA ComplianceHIPPA Compliance
HIPPA Compliancedixibee
Ā 
Welcome to the hippa, privacy and security
Welcome to the hippa, privacy and securityWelcome to the hippa, privacy and security
Welcome to the hippa, privacy and securityveve1728
Ā 
Hippa training on confidentiality
Hippa training on confidentialityHippa training on confidentiality
Hippa training on confidentialitycraig45365
Ā 
Hippa laws
Hippa lawsHippa laws
Hippa lawsBecky Bauer
Ā 
Understanding hipaa
Understanding hipaaUnderstanding hipaa
Understanding hipaaSharon Nemecek
Ā 
HIPAA 101 for Startups
HIPAA 101 for StartupsHIPAA 101 for Startups
HIPAA 101 for StartupsObaa, Inc.
Ā 
HIPAA presentation GAHU v7
HIPAA presentation GAHU v7HIPAA presentation GAHU v7
HIPAA presentation GAHU v7Jason Karn
Ā 
Protecting ePHI: What Providers and Business Associates Need to Know
Protecting ePHI: What Providers and Business Associates Need to KnowProtecting ePHI: What Providers and Business Associates Need to Know
Protecting ePHI: What Providers and Business Associates Need to KnowNetwork 1 Consulting
Ā 
Mha690 wk 1 fletcher
Mha690 wk 1   fletcherMha690 wk 1   fletcher
Mha690 wk 1 fletcherEmed32
Ā 
Geek Sync | Keep your Healthcare Databases Secure and Compliant
Geek Sync | Keep your Healthcare Databases Secure and CompliantGeek Sync | Keep your Healthcare Databases Secure and Compliant
Geek Sync | Keep your Healthcare Databases Secure and CompliantIDERA Software
Ā 
HIPAA and Privacy for Researchers
HIPAA and Privacy for ResearchersHIPAA and Privacy for Researchers
HIPAA and Privacy for ResearchersJason Karn
Ā 
HIPAA | HITECH
HIPAA | HITECHHIPAA | HITECH
HIPAA | HITECHrcabarloc
Ā 
HIPAA Audit Implementation
HIPAA Audit ImplementationHIPAA Audit Implementation
HIPAA Audit ImplementationValency Networks
Ā 
HIPAA HiTech Regulations: What Non-Medical Companies Need to Know
HIPAA HiTech Regulations: What Non-Medical Companies Need to KnowHIPAA HiTech Regulations: What Non-Medical Companies Need to Know
HIPAA HiTech Regulations: What Non-Medical Companies Need to KnowNetwork 1 Consulting
Ā 
11 Most Common HIPAA Violations
11 Most Common HIPAA Violations 11 Most Common HIPAA Violations
11 Most Common HIPAA Violations MariaClark32
Ā 
Hippa Powerpoint
Hippa PowerpointHippa Powerpoint
Hippa Powerpointkvanrandall
Ā 

What's hot (20)

Do You Know How to Handle a HIPAA Breach?
Do You Know How to Handle a HIPAA Breach?Do You Know How to Handle a HIPAA Breach?
Do You Know How to Handle a HIPAA Breach?
Ā 
HIPPA Compliance
HIPPA ComplianceHIPPA Compliance
HIPPA Compliance
Ā 
Welcome to the hippa, privacy and security
Welcome to the hippa, privacy and securityWelcome to the hippa, privacy and security
Welcome to the hippa, privacy and security
Ā 
Hippa training on confidentiality
Hippa training on confidentialityHippa training on confidentiality
Hippa training on confidentiality
Ā 
Hippa laws
Hippa lawsHippa laws
Hippa laws
Ā 
Understanding hipaa
Understanding hipaaUnderstanding hipaa
Understanding hipaa
Ā 
HIPAA 101 for Startups
HIPAA 101 for StartupsHIPAA 101 for Startups
HIPAA 101 for Startups
Ā 
HIPAA presentation GAHU v7
HIPAA presentation GAHU v7HIPAA presentation GAHU v7
HIPAA presentation GAHU v7
Ā 
Hipaa basics
Hipaa basicsHipaa basics
Hipaa basics
Ā 
Protecting ePHI: What Providers and Business Associates Need to Know
Protecting ePHI: What Providers and Business Associates Need to KnowProtecting ePHI: What Providers and Business Associates Need to Know
Protecting ePHI: What Providers and Business Associates Need to Know
Ā 
Hippa
HippaHippa
Hippa
Ā 
Mha690 wk 1 fletcher
Mha690 wk 1   fletcherMha690 wk 1   fletcher
Mha690 wk 1 fletcher
Ā 
Geek Sync | Keep your Healthcare Databases Secure and Compliant
Geek Sync | Keep your Healthcare Databases Secure and CompliantGeek Sync | Keep your Healthcare Databases Secure and Compliant
Geek Sync | Keep your Healthcare Databases Secure and Compliant
Ā 
HIPAA and Privacy for Researchers
HIPAA and Privacy for ResearchersHIPAA and Privacy for Researchers
HIPAA and Privacy for Researchers
Ā 
HIPAA | HITECH
HIPAA | HITECHHIPAA | HITECH
HIPAA | HITECH
Ā 
Hipaa 1
Hipaa 1Hipaa 1
Hipaa 1
Ā 
HIPAA Audit Implementation
HIPAA Audit ImplementationHIPAA Audit Implementation
HIPAA Audit Implementation
Ā 
HIPAA HiTech Regulations: What Non-Medical Companies Need to Know
HIPAA HiTech Regulations: What Non-Medical Companies Need to KnowHIPAA HiTech Regulations: What Non-Medical Companies Need to Know
HIPAA HiTech Regulations: What Non-Medical Companies Need to Know
Ā 
11 Most Common HIPAA Violations
11 Most Common HIPAA Violations 11 Most Common HIPAA Violations
11 Most Common HIPAA Violations
Ā 
Hippa Powerpoint
Hippa PowerpointHippa Powerpoint
Hippa Powerpoint
Ā 

Viewers also liked

Tech week 1 assignment
Tech week 1 assignmentTech week 1 assignment
Tech week 1 assignmentsierra98
Ā 
Customized HIPAA Training Based on the Job Role of the Individuals
Customized HIPAA Training Based on the Job Role of the IndividualsCustomized HIPAA Training Based on the Job Role of the Individuals
Customized HIPAA Training Based on the Job Role of the IndividualsHIPAA Training
Ā 
Confidentiality security week 1 assignment
Confidentiality security week 1 assignmentConfidentiality security week 1 assignment
Confidentiality security week 1 assignmentDIKRIS4595
Ā 
Patient Privacy Training
Patient Privacy TrainingPatient Privacy Training
Patient Privacy Trainingcarenanichole
Ā 
Hippa compliance training
Hippa compliance trainingHippa compliance training
Hippa compliance trainingscapoccia
Ā 
Hipaa101 updated
Hipaa101 updatedHipaa101 updated
Hipaa101 updatedkkurapat
Ā 
Hippa slide show
Hippa slide showHippa slide show
Hippa slide showheathercool
Ā 
HIPAA - Understanding the Basics of Compliance
HIPAA - Understanding the Basics of ComplianceHIPAA - Understanding the Basics of Compliance
HIPAA - Understanding the Basics of ComplianceJay Hodes
Ā 
HIPAA Basics
HIPAA BasicsHIPAA Basics
HIPAA BasicsKarna *
Ā 
Mandatory hippa and information security
Mandatory hippa and information securityMandatory hippa and information security
Mandatory hippa and information securityHiggi123
Ā 
Application Developers Guide to HIPAA Compliance
Application Developers Guide to HIPAA ComplianceApplication Developers Guide to HIPAA Compliance
Application Developers Guide to HIPAA ComplianceTrueVault
Ā 

Viewers also liked (11)

Tech week 1 assignment
Tech week 1 assignmentTech week 1 assignment
Tech week 1 assignment
Ā 
Customized HIPAA Training Based on the Job Role of the Individuals
Customized HIPAA Training Based on the Job Role of the IndividualsCustomized HIPAA Training Based on the Job Role of the Individuals
Customized HIPAA Training Based on the Job Role of the Individuals
Ā 
Confidentiality security week 1 assignment
Confidentiality security week 1 assignmentConfidentiality security week 1 assignment
Confidentiality security week 1 assignment
Ā 
Patient Privacy Training
Patient Privacy TrainingPatient Privacy Training
Patient Privacy Training
Ā 
Hippa compliance training
Hippa compliance trainingHippa compliance training
Hippa compliance training
Ā 
Hipaa101 updated
Hipaa101 updatedHipaa101 updated
Hipaa101 updated
Ā 
Hippa slide show
Hippa slide showHippa slide show
Hippa slide show
Ā 
HIPAA - Understanding the Basics of Compliance
HIPAA - Understanding the Basics of ComplianceHIPAA - Understanding the Basics of Compliance
HIPAA - Understanding the Basics of Compliance
Ā 
HIPAA Basics
HIPAA BasicsHIPAA Basics
HIPAA Basics
Ā 
Mandatory hippa and information security
Mandatory hippa and information securityMandatory hippa and information security
Mandatory hippa and information security
Ā 
Application Developers Guide to HIPAA Compliance
Application Developers Guide to HIPAA ComplianceApplication Developers Guide to HIPAA Compliance
Application Developers Guide to HIPAA Compliance
Ā 

Similar to Hcc_hipaa hitech training_Basic www.hcctecnologies.com

Are You HIPAA Safe?
Are You HIPAA Safe?Are You HIPAA Safe?
Are You HIPAA Safe?TriageLogic
Ā 
Patient confidentiality.ppt
Patient confidentiality.pptPatient confidentiality.ppt
Patient confidentiality.pptchwiso8418
Ā 
Patient confidentiality power point
Patient confidentiality power pointPatient confidentiality power point
Patient confidentiality power pointchwiso8418
Ā 
Patient confidentiality
Patient confidentialityPatient confidentiality
Patient confidentialitychwiso8418
Ā 
Patient confidentiality power point
Patient confidentiality power pointPatient confidentiality power point
Patient confidentiality power pointchwiso8418
Ā 
Hipaa overview 073118
Hipaa overview 073118Hipaa overview 073118
Hipaa overview 073118robint2125
Ā 
CAHU EXPO Grove City, OH 2014
CAHU EXPO Grove City, OH 2014 CAHU EXPO Grove City, OH 2014
CAHU EXPO Grove City, OH 2014 Jason Karn
Ā 
How to avoid being caught out by HIPAA compliance?
How to avoid being caught out by HIPAA compliance?How to avoid being caught out by HIPAA compliance?
How to avoid being caught out by HIPAA compliance?Lepide USA Inc
Ā 
Hipaa-2015
Hipaa-2015Hipaa-2015
Hipaa-2015pssurgery
Ā 
Data Security and Privacy Practices
Data Security and Privacy PracticesData Security and Privacy Practices
Data Security and Privacy PracticesSpringfield Clinic
Ā 
HIPAA Presentation
HIPAA PresentationHIPAA Presentation
HIPAA PresentationLyubovKarnaukh
Ā 
Hot materials hippa
Hot materials hippaHot materials hippa
Hot materials hippaWork Aholic
Ā 
C. Gibbs MHA 690 week 1 discussion 2
C. Gibbs MHA 690 week 1 discussion 2C. Gibbs MHA 690 week 1 discussion 2
C. Gibbs MHA 690 week 1 discussion 2CGibbs3121
Ā 
HIPAA and Privacy Training
HIPAA and Privacy TrainingHIPAA and Privacy Training
HIPAA and Privacy TrainingJasAmataga
Ā 
Medical Data Encryption 101
Medical Data Encryption 101Medical Data Encryption 101
Medical Data Encryption 101SecurityMetrics
Ā 

Similar to Hcc_hipaa hitech training_Basic www.hcctecnologies.com (20)

Are You HIPAA Safe?
Are You HIPAA Safe?Are You HIPAA Safe?
Are You HIPAA Safe?
Ā 
Patient confidentiality.ppt
Patient confidentiality.pptPatient confidentiality.ppt
Patient confidentiality.ppt
Ā 
Patient confidentiality power point
Patient confidentiality power pointPatient confidentiality power point
Patient confidentiality power point
Ā 
Patient confidentiality
Patient confidentialityPatient confidentiality
Patient confidentiality
Ā 
Patient confidentiality power point
Patient confidentiality power pointPatient confidentiality power point
Patient confidentiality power point
Ā 
Hipaa overview 073118
Hipaa overview 073118Hipaa overview 073118
Hipaa overview 073118
Ā 
CAHU EXPO Grove City, OH 2014
CAHU EXPO Grove City, OH 2014 CAHU EXPO Grove City, OH 2014
CAHU EXPO Grove City, OH 2014
Ā 
How to avoid being caught out by HIPAA compliance?
How to avoid being caught out by HIPAA compliance?How to avoid being caught out by HIPAA compliance?
How to avoid being caught out by HIPAA compliance?
Ā 
Hipaa-2015
Hipaa-2015Hipaa-2015
Hipaa-2015
Ā 
Data Security and Privacy Practices
Data Security and Privacy PracticesData Security and Privacy Practices
Data Security and Privacy Practices
Ā 
Dustin HIPAA
Dustin HIPAADustin HIPAA
Dustin HIPAA
Ā 
HIPAA Presentation
HIPAA PresentationHIPAA Presentation
HIPAA Presentation
Ā 
5 hipaa training
5 hipaa training5 hipaa training
5 hipaa training
Ā 
Hot materials hippa
Hot materials hippaHot materials hippa
Hot materials hippa
Ā 
C. Gibbs MHA 690 week 1 discussion 2
C. Gibbs MHA 690 week 1 discussion 2C. Gibbs MHA 690 week 1 discussion 2
C. Gibbs MHA 690 week 1 discussion 2
Ā 
5 hipaa training
5 hipaa training5 hipaa training
5 hipaa training
Ā 
HIPAA and Privacy Training
HIPAA and Privacy TrainingHIPAA and Privacy Training
HIPAA and Privacy Training
Ā 
Medical Data Encryption 101
Medical Data Encryption 101Medical Data Encryption 101
Medical Data Encryption 101
Ā 
Hippa powerpoint 92613
Hippa powerpoint 92613Hippa powerpoint 92613
Hippa powerpoint 92613
Ā 
Hippa powerpoint 92613
Hippa powerpoint 92613Hippa powerpoint 92613
Hippa powerpoint 92613
Ā 

Recently uploaded

Call Girls Thane Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Thane Just Call 9907093804 Top Class Call Girl Service AvailableCall Girls Thane Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Thane Just Call 9907093804 Top Class Call Girl Service AvailableDipal Arora
Ā 
Krishnagiri call girls Tamil aunty 7877702510
Krishnagiri call girls Tamil aunty 7877702510Krishnagiri call girls Tamil aunty 7877702510
Krishnagiri call girls Tamil aunty 7877702510Vipesco
Ā 
Nanded Call Girls šŸ‘™ 6297143586 šŸ‘™ Genuine WhatsApp Number for Real Meet
Nanded Call Girls šŸ‘™ 6297143586 šŸ‘™ Genuine WhatsApp Number for Real MeetNanded Call Girls šŸ‘™ 6297143586 šŸ‘™ Genuine WhatsApp Number for Real Meet
Nanded Call Girls šŸ‘™ 6297143586 šŸ‘™ Genuine WhatsApp Number for Real MeetCall Girls Service
Ā 
Call Girl In Zirakpur ā¤ļøā™€ļø@ 9988299661 Zirakpur Call Girls Near Me ā¤ļøā™€ļø@ Sexy...
Call Girl In Zirakpur ā¤ļøā™€ļø@ 9988299661 Zirakpur Call Girls Near Me ā¤ļøā™€ļø@ Sexy...Call Girl In Zirakpur ā¤ļøā™€ļø@ 9988299661 Zirakpur Call Girls Near Me ā¤ļøā™€ļø@ Sexy...
Call Girl In Zirakpur ā¤ļøā™€ļø@ 9988299661 Zirakpur Call Girls Near Me ā¤ļøā™€ļø@ Sexy...Sheetaleventcompany
Ā 
Call Girls Hyderabad Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Hyderabad Just Call 9907093804 Top Class Call Girl Service AvailableCall Girls Hyderabad Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Hyderabad Just Call 9907093804 Top Class Call Girl Service AvailableDipal Arora
Ā 
VIP Call Girls Noida Jhanvi 9711199171 Best VIP Call Girls Near Me
VIP Call Girls Noida Jhanvi 9711199171 Best VIP Call Girls Near MeVIP Call Girls Noida Jhanvi 9711199171 Best VIP Call Girls Near Me
VIP Call Girls Noida Jhanvi 9711199171 Best VIP Call Girls Near Memriyagarg453
Ā 
Dehradun Call Girls Service ā¤ļøšŸ‘ 8854095900 šŸ‘„šŸ«¦Independent Escort Service Dehradun
Dehradun Call Girls Service ā¤ļøšŸ‘ 8854095900 šŸ‘„šŸ«¦Independent Escort Service DehradunDehradun Call Girls Service ā¤ļøšŸ‘ 8854095900 šŸ‘„šŸ«¦Independent Escort Service Dehradun
Dehradun Call Girls Service ā¤ļøšŸ‘ 8854095900 šŸ‘„šŸ«¦Independent Escort Service DehradunNiamh verma
Ā 
Ozhukarai Call Girls šŸ‘™ 6297143586 šŸ‘™ Genuine WhatsApp Number for Real Meet
Ozhukarai Call Girls šŸ‘™ 6297143586 šŸ‘™ Genuine WhatsApp Number for Real MeetOzhukarai Call Girls šŸ‘™ 6297143586 šŸ‘™ Genuine WhatsApp Number for Real Meet
Ozhukarai Call Girls šŸ‘™ 6297143586 šŸ‘™ Genuine WhatsApp Number for Real MeetCall Girls Service
Ā 
VIP Call Girl Sector 88 Gurgaon Delhi Just Call Me 9899900591
VIP Call Girl Sector 88 Gurgaon Delhi Just Call Me 9899900591VIP Call Girl Sector 88 Gurgaon Delhi Just Call Me 9899900591
VIP Call Girl Sector 88 Gurgaon Delhi Just Call Me 9899900591adityaroy0215
Ā 
Russian Call Girls Lucknow ā‚¹7.5k Pick Up & Drop With Cash Payment 8923113531 ...
Russian Call Girls Lucknow ā‚¹7.5k Pick Up & Drop With Cash Payment 8923113531 ...Russian Call Girls Lucknow ā‚¹7.5k Pick Up & Drop With Cash Payment 8923113531 ...
Russian Call Girls Lucknow ā‚¹7.5k Pick Up & Drop With Cash Payment 8923113531 ...gurkirankumar98700
Ā 
Udaipur Call Girls šŸ“² 9999965857 Call Girl in Udaipur
Udaipur Call Girls šŸ“² 9999965857 Call Girl in UdaipurUdaipur Call Girls šŸ“² 9999965857 Call Girl in Udaipur
Udaipur Call Girls šŸ“² 9999965857 Call Girl in Udaipurseemahedar019
Ā 
VIP Kolkata Call Girl New Town šŸ‘‰ 8250192130 Available With Room
VIP Kolkata Call Girl New Town šŸ‘‰ 8250192130  Available With RoomVIP Kolkata Call Girl New Town šŸ‘‰ 8250192130  Available With Room
VIP Kolkata Call Girl New Town šŸ‘‰ 8250192130 Available With Roomdivyansh0kumar0
Ā 
Dehradun Call Girls Service 08854095900 Real Russian Girls Looking Models
Dehradun Call Girls Service 08854095900 Real Russian Girls Looking ModelsDehradun Call Girls Service 08854095900 Real Russian Girls Looking Models
Dehradun Call Girls Service 08854095900 Real Russian Girls Looking Modelsindiancallgirl4rent
Ā 
šŸ’ššŸ˜‹Kolkata Escort Service Call Girls, ā‚¹5000 To 25K With ACšŸ’ššŸ˜‹
šŸ’ššŸ˜‹Kolkata Escort Service Call Girls, ā‚¹5000 To 25K With ACšŸ’ššŸ˜‹šŸ’ššŸ˜‹Kolkata Escort Service Call Girls, ā‚¹5000 To 25K With ACšŸ’ššŸ˜‹
šŸ’ššŸ˜‹Kolkata Escort Service Call Girls, ā‚¹5000 To 25K With ACšŸ’ššŸ˜‹Sheetaleventcompany
Ā 
Call Girl Price Amritsar ā¤ļøšŸ‘ 9053900678 Call Girls in Amritsar Suman
Call Girl Price Amritsar ā¤ļøšŸ‘ 9053900678 Call Girls in Amritsar SumanCall Girl Price Amritsar ā¤ļøšŸ‘ 9053900678 Call Girls in Amritsar Suman
Call Girl Price Amritsar ā¤ļøšŸ‘ 9053900678 Call Girls in Amritsar SumanCall Girls Service Chandigarh Ayushi
Ā 
Hot Call Girl In Ludhiana šŸ‘…šŸ„µ 9053'900678 Call Girls Service In Ludhiana
Hot  Call Girl In Ludhiana šŸ‘…šŸ„µ 9053'900678 Call Girls Service In LudhianaHot  Call Girl In Ludhiana šŸ‘…šŸ„µ 9053'900678 Call Girls Service In Ludhiana
Hot Call Girl In Ludhiana šŸ‘…šŸ„µ 9053'900678 Call Girls Service In LudhianaRussian Call Girls in Ludhiana
Ā 
VIP Call Girl Sector 32 Noida Just Book Me 9711199171
VIP Call Girl Sector 32 Noida Just Book Me 9711199171VIP Call Girl Sector 32 Noida Just Book Me 9711199171
VIP Call Girl Sector 32 Noida Just Book Me 9711199171Call Girls Service Gurgaon
Ā 
VIP Call Girls Sector 67 Gurgaon Just Call Me 9711199012
VIP Call Girls Sector 67 Gurgaon Just Call Me 9711199012VIP Call Girls Sector 67 Gurgaon Just Call Me 9711199012
VIP Call Girls Sector 67 Gurgaon Just Call Me 9711199012Call Girls Service Gurgaon
Ā 
Nepali Escort Girl * 9999965857 Naughty Call Girls Service in Faridabad
Nepali Escort Girl * 9999965857 Naughty Call Girls Service in FaridabadNepali Escort Girl * 9999965857 Naughty Call Girls Service in Faridabad
Nepali Escort Girl * 9999965857 Naughty Call Girls Service in Faridabadgragteena
Ā 
Jalandhar Female Call Girls Contact Number 9053900678 šŸ’šJalandhar Female Call...
Jalandhar  Female Call Girls Contact Number 9053900678 šŸ’šJalandhar Female Call...Jalandhar  Female Call Girls Contact Number 9053900678 šŸ’šJalandhar Female Call...
Jalandhar Female Call Girls Contact Number 9053900678 šŸ’šJalandhar Female Call...Call Girls Service Chandigarh Ayushi
Ā 

Recently uploaded (20)

Call Girls Thane Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Thane Just Call 9907093804 Top Class Call Girl Service AvailableCall Girls Thane Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Thane Just Call 9907093804 Top Class Call Girl Service Available
Ā 
Krishnagiri call girls Tamil aunty 7877702510
Krishnagiri call girls Tamil aunty 7877702510Krishnagiri call girls Tamil aunty 7877702510
Krishnagiri call girls Tamil aunty 7877702510
Ā 
Nanded Call Girls šŸ‘™ 6297143586 šŸ‘™ Genuine WhatsApp Number for Real Meet
Nanded Call Girls šŸ‘™ 6297143586 šŸ‘™ Genuine WhatsApp Number for Real MeetNanded Call Girls šŸ‘™ 6297143586 šŸ‘™ Genuine WhatsApp Number for Real Meet
Nanded Call Girls šŸ‘™ 6297143586 šŸ‘™ Genuine WhatsApp Number for Real Meet
Ā 
Call Girl In Zirakpur ā¤ļøā™€ļø@ 9988299661 Zirakpur Call Girls Near Me ā¤ļøā™€ļø@ Sexy...
Call Girl In Zirakpur ā¤ļøā™€ļø@ 9988299661 Zirakpur Call Girls Near Me ā¤ļøā™€ļø@ Sexy...Call Girl In Zirakpur ā¤ļøā™€ļø@ 9988299661 Zirakpur Call Girls Near Me ā¤ļøā™€ļø@ Sexy...
Call Girl In Zirakpur ā¤ļøā™€ļø@ 9988299661 Zirakpur Call Girls Near Me ā¤ļøā™€ļø@ Sexy...
Ā 
Call Girls Hyderabad Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Hyderabad Just Call 9907093804 Top Class Call Girl Service AvailableCall Girls Hyderabad Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Hyderabad Just Call 9907093804 Top Class Call Girl Service Available
Ā 
VIP Call Girls Noida Jhanvi 9711199171 Best VIP Call Girls Near Me
VIP Call Girls Noida Jhanvi 9711199171 Best VIP Call Girls Near MeVIP Call Girls Noida Jhanvi 9711199171 Best VIP Call Girls Near Me
VIP Call Girls Noida Jhanvi 9711199171 Best VIP Call Girls Near Me
Ā 
Dehradun Call Girls Service ā¤ļøšŸ‘ 8854095900 šŸ‘„šŸ«¦Independent Escort Service Dehradun
Dehradun Call Girls Service ā¤ļøšŸ‘ 8854095900 šŸ‘„šŸ«¦Independent Escort Service DehradunDehradun Call Girls Service ā¤ļøšŸ‘ 8854095900 šŸ‘„šŸ«¦Independent Escort Service Dehradun
Dehradun Call Girls Service ā¤ļøšŸ‘ 8854095900 šŸ‘„šŸ«¦Independent Escort Service Dehradun
Ā 
Ozhukarai Call Girls šŸ‘™ 6297143586 šŸ‘™ Genuine WhatsApp Number for Real Meet
Ozhukarai Call Girls šŸ‘™ 6297143586 šŸ‘™ Genuine WhatsApp Number for Real MeetOzhukarai Call Girls šŸ‘™ 6297143586 šŸ‘™ Genuine WhatsApp Number for Real Meet
Ozhukarai Call Girls šŸ‘™ 6297143586 šŸ‘™ Genuine WhatsApp Number for Real Meet
Ā 
VIP Call Girl Sector 88 Gurgaon Delhi Just Call Me 9899900591
VIP Call Girl Sector 88 Gurgaon Delhi Just Call Me 9899900591VIP Call Girl Sector 88 Gurgaon Delhi Just Call Me 9899900591
VIP Call Girl Sector 88 Gurgaon Delhi Just Call Me 9899900591
Ā 
Russian Call Girls Lucknow ā‚¹7.5k Pick Up & Drop With Cash Payment 8923113531 ...
Russian Call Girls Lucknow ā‚¹7.5k Pick Up & Drop With Cash Payment 8923113531 ...Russian Call Girls Lucknow ā‚¹7.5k Pick Up & Drop With Cash Payment 8923113531 ...
Russian Call Girls Lucknow ā‚¹7.5k Pick Up & Drop With Cash Payment 8923113531 ...
Ā 
Udaipur Call Girls šŸ“² 9999965857 Call Girl in Udaipur
Udaipur Call Girls šŸ“² 9999965857 Call Girl in UdaipurUdaipur Call Girls šŸ“² 9999965857 Call Girl in Udaipur
Udaipur Call Girls šŸ“² 9999965857 Call Girl in Udaipur
Ā 
VIP Kolkata Call Girl New Town šŸ‘‰ 8250192130 Available With Room
VIP Kolkata Call Girl New Town šŸ‘‰ 8250192130  Available With RoomVIP Kolkata Call Girl New Town šŸ‘‰ 8250192130  Available With Room
VIP Kolkata Call Girl New Town šŸ‘‰ 8250192130 Available With Room
Ā 
Dehradun Call Girls Service 08854095900 Real Russian Girls Looking Models
Dehradun Call Girls Service 08854095900 Real Russian Girls Looking ModelsDehradun Call Girls Service 08854095900 Real Russian Girls Looking Models
Dehradun Call Girls Service 08854095900 Real Russian Girls Looking Models
Ā 
šŸ’ššŸ˜‹Kolkata Escort Service Call Girls, ā‚¹5000 To 25K With ACšŸ’ššŸ˜‹
šŸ’ššŸ˜‹Kolkata Escort Service Call Girls, ā‚¹5000 To 25K With ACšŸ’ššŸ˜‹šŸ’ššŸ˜‹Kolkata Escort Service Call Girls, ā‚¹5000 To 25K With ACšŸ’ššŸ˜‹
šŸ’ššŸ˜‹Kolkata Escort Service Call Girls, ā‚¹5000 To 25K With ACšŸ’ššŸ˜‹
Ā 
Call Girl Price Amritsar ā¤ļøšŸ‘ 9053900678 Call Girls in Amritsar Suman
Call Girl Price Amritsar ā¤ļøšŸ‘ 9053900678 Call Girls in Amritsar SumanCall Girl Price Amritsar ā¤ļøšŸ‘ 9053900678 Call Girls in Amritsar Suman
Call Girl Price Amritsar ā¤ļøšŸ‘ 9053900678 Call Girls in Amritsar Suman
Ā 
Hot Call Girl In Ludhiana šŸ‘…šŸ„µ 9053'900678 Call Girls Service In Ludhiana
Hot  Call Girl In Ludhiana šŸ‘…šŸ„µ 9053'900678 Call Girls Service In LudhianaHot  Call Girl In Ludhiana šŸ‘…šŸ„µ 9053'900678 Call Girls Service In Ludhiana
Hot Call Girl In Ludhiana šŸ‘…šŸ„µ 9053'900678 Call Girls Service In Ludhiana
Ā 
VIP Call Girl Sector 32 Noida Just Book Me 9711199171
VIP Call Girl Sector 32 Noida Just Book Me 9711199171VIP Call Girl Sector 32 Noida Just Book Me 9711199171
VIP Call Girl Sector 32 Noida Just Book Me 9711199171
Ā 
VIP Call Girls Sector 67 Gurgaon Just Call Me 9711199012
VIP Call Girls Sector 67 Gurgaon Just Call Me 9711199012VIP Call Girls Sector 67 Gurgaon Just Call Me 9711199012
VIP Call Girls Sector 67 Gurgaon Just Call Me 9711199012
Ā 
Nepali Escort Girl * 9999965857 Naughty Call Girls Service in Faridabad
Nepali Escort Girl * 9999965857 Naughty Call Girls Service in FaridabadNepali Escort Girl * 9999965857 Naughty Call Girls Service in Faridabad
Nepali Escort Girl * 9999965857 Naughty Call Girls Service in Faridabad
Ā 
Jalandhar Female Call Girls Contact Number 9053900678 šŸ’šJalandhar Female Call...
Jalandhar  Female Call Girls Contact Number 9053900678 šŸ’šJalandhar Female Call...Jalandhar  Female Call Girls Contact Number 9053900678 šŸ’šJalandhar Female Call...
Jalandhar Female Call Girls Contact Number 9053900678 šŸ’šJalandhar Female Call...
Ā 

Hcc_hipaa hitech training_Basic www.hcctecnologies.com

  • 1. Ā© 2013 Copyright Health Compliance Consultants, LLC. All rights reserved. HIPAA / HITECH PRIVACY AND SECURITY TRAINING Health Compliance Consultants Ā© 2013 Copyright Health Compliance Consultants, LLC. All rights reserved.
  • 2. Ā© 2013 Copyright Health Compliance Consultants, LLC. All rights reserved. LEGAL STATEMENT ļ‚§ No Part of this presentation may be copied or reproduced, modified or adapted, without the prior written consent of Health Compliance Consultants, LLC. ļ‚§ Commercial use and distribution of the contents of this presentation in not permitted without express and prior written consent of Health Compliance Consultants, LLC. Ā© 2013 Copyright Health Compliance Consultants, LLC. All rights reserved.
  • 3. Ā© 2013 Copyright Health Compliance Consultants, LLC. All rights reserved. HIPAA OVERVIEW Health Information Portability and Accountability Act (HIPAA) - 1996 Administrative Simplification Transactions/Code Sets/Identifiers (10/16/02-10/16/03) Privacy (4/14/2003) Security (4/20/2005) HITECH (2009) Health Information Technology for Economic and Clinical Health Insurance Reform Fraud and Abuse
  • 4. Ā© 2013 Copyright Health Compliance Consultants, LLC. All rights reserved. DO I NEED HIPAA TRAINING? ā€¢ All Staff working at [Practice Name] should receive HIPAA (Privacy and Security training) at the time of hiring, and at least once every year thereafter. ā€¢ HIPAA Training is not job specific and is mandatory for all Staff. ā€¢ All staff have to complete the training, attain a passing grade in the training quiz and submit a completion certificate to Human Resources for record. ā€¢ Staff may be required to get additional training if a significant change in company infrastructure, administrative or operational environment takes place during the year.
  • 5. Ā© 2013 Copyright Health Compliance Consultants, LLC. All rights reserved. WHAT ARE THE PRIVACY AND SECURITY CONCERNS ā€¢ Theft of Patient Data ā€¢ Identity Theft ā€¢ Stolen laptop ā€¢ Loss of Patient Data ā€¢ Incorrect disposal ā€¢ USB Drives ā€¢ Misuse of Patient Data ā€¢ Privacy Breach
  • 6. Ā© 2013 Copyright Health Compliance Consultants, LLC. All rights reserved. SHOULD I BE WORRIED (SOME REAL LIFE EXAMPLES) THEFT ā€¢ An employee from the Admissions Department at a prestigious NYC hospital has been accused of stealing and selling information of nearly 50,000 patients LOSS ā€¢ CVS Caremark Corp. paid $2.25 million to settle allegations that it dumped credit-card data, Social Security numbers and customer medical records into garbage containers outside a number of its stores. MISUSE ā€¢ 27 employees were disciplined for a privacy breach related to the Octomom. Two were fired, nine were disciplined, and 16 resigned. The LA Hospital was also fined $250,000.
  • 7. Ā© 2013 Copyright Health Compliance Consultants, LLC. All rights reserved. SOME BASIC HIPAA GUIDELINES ā€¢ Provide patients with the Notice of Privacy Practices ā€¢ Shred protected health information (PHI) ā€¢ Fax patient information utilizing a cover sheet ā€¢ Telephone Guidance ā€“ leaving messages and caller requests for info ā€¢ Verify patient at the time of new registration ā€¢ Avoid unintentional disclosure (telephone /privacy screens/ email / mail) ā€¢ Report Privacy Breaches & Complaints
  • 8. Ā© 2013 Copyright Health Compliance Consultants, LLC. All rights reserved. DEALING WITH PATIENTS ā€¢ Notice of Privacy Practices (NOPP) must be offered to the patient at the time of their first visit. ļƒ¼On first visit only, not every visit. ļƒ¼Whenever the NOPP is revised / updated. ā€¢ Tells patients their specific rights regarding their health information. This information is included in the NOPP. ā€¢ A signed acknowledgement must be placed in the patientā€™s medical record, this can be recorded electronically and inserted directly into the EMR.
  • 9. Ā© 2013 Copyright Health Compliance Consultants, LLC. All rights reserved. WHATā€™S IN THE NOPP ā€¢ Patients have the right to: ļƒ¼Request restrictions on release of their PHI ļƒ¼Receive confidential communications ļƒ¼Inspect and copy medical records (access) ļƒ¼Request amendment to medical records ļƒ¼Make a complaint ļƒ¼Receive an accounting of any external releases. ļƒ¼Obtain a paper copy of the Notice of Privacy Practices on request
  • 10. Ā© 2013 Copyright Health Compliance Consultants, LLC. All rights reserved. USING OR DISCLOSING PHI ā€¢ Written Authorization required to release medical information ā€¢ Physician may share information with referring physician ā€œpatient in commonā€ without an authorization ā€¢ Emergency request for medical information should be documented in the medical record. ā€¢ All access to or sharing of PHI must be documented / recorded in the patientā€™s medical records.
  • 11. Ā© 2013 Copyright Health Compliance Consultants, LLC. All rights reserved. EMR AND PHI CONSIDERATIONS ā€¢ Information Security ā€¢ Access, Use and Disclosure ā€¢ Release & Disclosure ā€¢ Printing Medical Information ā€¢ Loss or theft ā€¢ Research ā€¢ Copies
  • 12. Ā© 2013 Copyright Health Compliance Consultants, LLC. All rights reserved. MEDICAL RECORDS PRIVACY ISSUES ā€¢ Medical Record sent to wrong person ā€¢ Medical Record mailed to wrong address ā€¢ Medical Record given to wrong person ā€¢ Information sent is not consistent with the authorization signed by patient.
  • 13. Ā© 2013 Copyright Health Compliance Consultants, LLC. All rights reserved. 5 IMPORTANT CONSIDERATIONS REGARDING HIPAA SECURITY 1. Never share your password 2. Assure that you sign out of EMR after use, and lock you computer screen before leaving your station. 3. Secure (encrypt) portable electronic devices, if authorized, with patient, financial or research information. 4. Promptly Report loss or theft of electronic devices with protected health information and inform Privacy Officer of improper use/ privacy breach. 5. SS# number should not be used when not required.
  • 14. Ā© 2013 Copyright Health Compliance Consultants, LLC. All rights reserved. PASSWORD SECURITY ā€¢ Passwords are like underwear: ā€¢ Change them often ā€¢ Donā€™t share with friends ā€¢ Be mysterious ā€¢ Longer the better ā€¢ Donā€™t leave yours lying around
  • 15. Ā© 2013 Copyright Health Compliance Consultants, LLC. All rights reserved. USE OF PORTABLE STORAGE HIPAA SECURITY ā€¢ Examples: USB thumb drives, external hard drives, SD cards, CDs/DVDs. ā€¢ Use only if authorized. ā€¢ All PHI stored on these devices should be encrypted. ā€¢ Report immediately if a portable device containing PHI is misplaced or lost. ā€¢ Wipe off PHI before discarding or loaning.
  • 16. Ā© 2013 Copyright Health Compliance Consultants, LLC. All rights reserved. ACCESSING EMRS HIPAA PRIVACY ā€¢ Your access to EMR is recorded and subject to audit ā€¢ Periodic audits are done and access is monitored ā€¢ If you access medical information without a legitimate business purpose you will be disciplined ā€¢ Do not access the medical records of friends, family members coworkers or anyone else.
  • 17. Ā© 2013 Copyright Health Compliance Consultants, LLC. All rights reserved. SECURING DOCUMENTS CONTAINING PHI ā€¢ If you are using Microsoft Office programs and include any PHI in a document, then make sure you encrypt the file:
  • 18. Ā© 2013 Copyright Health Compliance Consultants, LLC. All rights reserved. EMAIL USAGE HIPAA SECURITY E-Mail is like a ā€œpostcard.ā€ It may pass through several post offices and are readable. ā€¢ Use secure, encrypted E-Mail software officially provided to you. ā€¢ If you send an attachment with PHI: Encrypt the file or do not send the attachment via e-mail! ā€¢ Do not use individual names, medical record numbers or account numbers in unencrypted e-mails ā€¢ Forwarding or consolidating email with PHI on 3rd party sites such as Google, Yahoo, or Hotmail is explicitly prohibited.
  • 19. Ā© 2013 Copyright Health Compliance Consultants, LLC. All rights reserved. USE OF 3RD PARTY CALENDARS FOR SCHEDULING ā€¢ Use of 3rd party online calendars, such as Google Calendars, leads to the risk of PHI disclosure. ā€¢ Do not use these calendar systems for official purposes. ā€¢ Insteadā€¦use an internal calendar / scheduling system built into our EMR application.
  • 20. Ā© 2013 Copyright Health Compliance Consultants, LLC. All rights reserved. WHAT IS PHI? ā€¢ With a couple of exceptions, protected health information (PHI) includes all individually identifiable health information that is transmitted or maintained in any form or medium. This includes demographic information that ties the identity of the individual to his or her health record. Examples are names, addresses, geographic codes smaller than state, all dates (except year) elements related to the person, telephone numbers, fax numbers, license numbers, social security numbers, etc. The information is protected if it can possibly identify the person. ā€¢ One notable exception involves disclosures of patient information that are required by law. For example, we are required by law to report communicable diseases to the appropriate authorities.
  • 21. Ā© 2013 Copyright Health Compliance Consultants, LLC. All rights reserved. PHI SECURITY - REVISITED Reminder: ā€¢ Only share PHI in accordance with company policies. ā€¢ Do not share PHI through unauthenticated websites. ā€¢ Do not email PHI unencrypted. ā€¢ Do not send PHI through unencrypted channels: ā€¢ Examples include FTP, Telnet and HTTP ā€¢ Use secure alternatives, such as sFTP , SSH and HTTPS ā€¢ Do not store PHI on online storage sites: ā€¢ Examples include Dropbox, One Drive, iCloud, Google Drive, etc.
  • 22. Ā© 2013 Copyright Health Compliance Consultants, LLC. All rights reserved. NOW YOU KNOW HIPAA, BUT WHAT IS HITECH? HITECH Act (ARRA): Health Information Technology for Economic and Clinical Health ā€¢ New Federal Breach Notification Law ā€“ Effective Sept 2009 ā€¢ Applies to all electronic PHI or ePHI ā€¢ Requires immediate notification to the Federal Government if more than 500 individuals effected ā€¢ Annual notification if less that 500 individuals effected ā€¢ Requires notification to a major media outlet ā€¢ Breach will be listed on a public website ā€¢ Requires individual notification to patients ā€¢ Criminal penalties - apply to individual or employee of a covered entity ā€¢ Increased Enforcement & Fines for Breaches
  • 23. Ā© 2013 Copyright Health Compliance Consultants, LLC. All rights reserved. INFORMATION SECURITY REVISITED ā€¢ Password protect all data and computer workstations ā€¢ Dispose off PHI properly ā€¢ Keep work area properly secured, no unauthorized person permitted ā€¢ Only use officially authorized messaging/email system for communicating patient information ā€¢ Only use officially authorized scheduling/calendar system ā€¢ Be wary of visiting unauthorized websites that may introduce viruses, spam ware and malware to your system ā€¢ Do not copy PHI onto portable storage media without proper authorization and without encryption ā€¢ Do not share your password with anyone. It is used to audit your activities.
  • 24. Ā© 2013 Copyright Health Compliance Consultants, LLC. All rights reserved. AND THEN THERE IS OMNI BUS RULE EFFECTIVE 3/26/2013ā€¢ Main highlights: ā€¢ Business Associates are now Covered Entities, and requires update Business Associates Agreements. ā€¢ Breach Notification standards revised: Each breach evaluated for: ā€¢ What information breached ā€¢ To whom was the information exposed ā€¢ Was the information actually accessed, used or disclosed ā€¢ Any mitigation steps required and taken ā€¢ Patients right to access PHI revised: ā€¢ If patient requests their PHI to be transmitted in an unsecure way, they should be warned and transmitted as per their request if they still persist. This applies only to the individual whose PHI is being transmitted.
  • 25. Ā© 2013 Copyright Health Compliance Consultants, LLC. All rights reserved. NEED MORE INFORMATION ā€¢ Contact Company Privacy Security Officer: ā€¢ Name: ā€¢ Phone: ā€¢ Email: ā€¢ Mailing Address: