SlideShare a Scribd company logo
Michela Desmond, MD
Ana Turbin, RN
Jann Barham, Office Manager
Jana Barham, Billing
Sonya Steadham, Reception
Joyce Cook, LVN
Protected Health Information and
Electronic Protected Health Information
Safeguarding ePHI
This facility provides psychiatric care for the treatment of
veterans and post traumatic stress disorder.
Services are provided face to face and through electronic
transmission.
Reimbursement is through federal funding, state funding,
private pay insurance and pro bono.
Michela Desmond, MD
Certified by The American Board of Psychiatry and Neurology
The HIPAA Privacy Rule protects the privacy of individually identifiable health information.
Sanctions are required by HIPAA in the event of violations.
HIPAA PRIVACY RULE
Lee Ann Torrans
Covered entities must designate a privacy official responsible for developing and implementing
policies and procedures. Our office manager is our HIPAA Privacy Officer.
HIPAA requires not only that our policies be created and communicated to staff but employees must also
sign documents indicating they understand and will adhere to the policies.
Information created, received, used or maintained by a HIPAA covered entity is included.
The Security Rule requires appropriate administrative, physical and technical safeguards to ensure the
confidentiality, integrity, and security of ePHI.
HIPAA covers both ePHI and PHI (protected health information).
HIPAA SECURITY RULE
Lee Ann Torrans
The HIPAA Security Rule sets national standards for the security of electronic protected health
information (e-PHI).
Protecting patient healthcare information is important for the patient, our facility and legal compliance.
Understanding the broad scope of issues health care providers face and why we engage in these
activities will help you support and improve our service.
It is everyone’s duty to not only observe our policies but to contribute to enhancing our policies to better
address issues of protecting health information of our patients by both this office and our business
associates.
By understanding the scope of our duties you can better contribute and participate in the protection of
health information.
ePHI and PHI Review
Lee Ann Torrans
The HIPAA Security Rule requires covered providers to implement security measures, which help protect
patients’ privacy by creating the conditions for protected health information to be available but not be
improperly used or disclosed.
A breach is, generally, an impermissible use or disclosure under the Privacy Rule that compromises the
security or privacy of PHI such that the use or disclosure poses a significant risk of financial, reputational,
or other harm to the affected individual.
What is a Breach?
Lee Ann Torrans
The “Breach Notification Rule” requires covered providers to promptly notify individuals and the
Secretary of the HHS of the loss, theft, or certain other impermissible uses or disclosures of unsecured
PHI. Health care providers must also promptly notify the Secretary of HHS if there is any breach of
unsecured protected health information if the breach affects 500 or more individuals, and notify the
media if the breach affects more than 500 individuals of a State or jurisdiction.
Business Associates
Healthcare Providers
Who Is a Covered Provider?
Lee Ann Torrans
State Law Expands Definition - Review
Your State
Breaches of unsecured PHI that affect 500 or more individuals are publicly reported on the OCR website.
We are required to notify the media if the breach affects more than 500 individuals of a state or
jurisdiction.
The U.S. Department of Health and Human Services’ Office for Civil Rights (OCR) is responsible for
administering and enforcing the HIPAA Privacy and Security Rules and conducts associated complaint
investigations, compliance reviews, and audits. OCR may impose fines on covered providers for failure
to comply with the HIPAA Rules.
State Attorneys General may also enforce provisions of the HIPAA Rules.
Breach Occurrence?
Lee Ann Torrans
Risk analysis and risk management serve as tools to assist in the development of a covered entity’s
strategy to protect the confidentiality, integrity, and availability of ePHI.
Your feedback and contribution to any potential risk or threat to the security of ePHI is crucial for
success. Always bring concerns to our HIPAA Privacy Officer, our office manager.
We are required as a covered entity to have a sanction policy that reinforces our security policies and
procedures.
The Information System Activity Review implementation specification requires us to promote a continual
awareness of any information system activity that could suggest a security incident.
Organizational Standards
Lee Ann Torrans
The Security Rule defines administrative safeguards as, “administrative actions, and policies and
procedures, to manage the selection, development, implementation, and maintenance of security
measures to protect electronic protected health information and to manage the conduct of the covered
entity’s workforce in relation to the protection of that information.”
“Implement policies and procedures to prevent, detect, contain and correct security violations.”
Risk analysis
Risk management
Security Management
Lee Ann Torrans
Sanction policy
Information system activity
“Implement policies and procedures to ensure that all members of its workforce have appropriate access
to electronic protected health information, as provided under [the Information Access Management
standard], and to prevent those workforce members who do not have access under [the Information
Access Management standard] from obtaining access to electronic protected health information.”
The Authorization and/or Supervision implementation specification provides the necessary checks and
balances to ensure that all members of the workforce have appropriate or limited access to EPHI.
Isolating Health Care Clearinghouse Functions
Access Authorization
Work Force Security
Lee Ann Torrans
Access Establishment and Modification
“Implement policies and procedures for authorizing access to electronic protected health.”
The Information Access Management implementation specifications are closely related to the
implementation specifications under the Workforce Security standard.
Isolating Health Care Clearinghouse Functions
Access Authorization
Information Access
Lee Ann Torrans
Access Establishment and Modification Managing
“Implement policies and procedures to address security incidents.”
Create contingency plans in the event of software / hardware failure or natural disaster.
“Implement procedures for periodic testing and revision of contingency plans.”
“Assess the relative criticality of specific applications and data in support of other contingency plan
components.”
Security Plans
Lee Ann Torrans
“Evaluation: On-going evaluation of security measures is the best way to ensure all EPHI is adequately
protected.”
“Implement a security awareness and training program for all members of its workforce including
management.”
Security Reminders
Protection from Malicious Software
Log-in Monitoring
Security Awareness Training
Lee Ann Torrans
Password Management
We are required to have periodic training for all new employees and associates
Internet and eMail Use
Lee Ann Torrans
Complex passwords are an effective safeguard against unauthorized access of PHI.
HIPAA Security Rule requires that covered entities establish guidelines for creating passwords and
changing them during periodic change cycles.
Password policies require passwords to be changed every 90 days
Passwords must have a length of 8 characters containing a mix of upper- and lowercase letters, special
characters, and numbers.
Never share passwords with co-workers or write them down and leave them in areas that are visible and
accessible to others.
ePHI Electronic Transmission
Lee Ann Torrans
No patient images may be forwarded.
HIPAA allows patients to waive using HIPAA encrypted transmission of patient information. The
Information Privacy Officer must forward and receive the signed waiver before this process may
begin.
Skype, owned my Microsoft is NOT HIPAA compliant. It can never be used. Drop Box must have specific
BA HIPAA compliant agreements. Both require waivers.
Without a patient waiver approved by our Security Officer only our designated email service and text service
can be used.
Phishing Emails
Lee Ann Torrans
Display name do not trust – look at actual senders email address and
source
Phishers often ‘steal’ and reuse legitimate logos
Phishing can introduce malicious software by opening suspicious e-mail attachments, e-mail from unfamiliar
senders, and hoax e-mail. Contact the office manager before you open suspicious email.
Downloading – our system will not allow you to download any thing to your computer that is not on our own servers. This
includes not only the internet but diskettes, CD’s, or DVD’s.
Protections from Malicious Software
Lee Ann Torrans
Malicious software refers to viruses, worms, Trojan horses and backdoor programs
Virus scans and protection are run three times a day on individual computers and our entire system.
Phishing can introduce malicious software by opening suspicious e-mail attachments, e-mail from unfamiliar
senders, and hoax e-mail. Contact the office manager before you open suspicious email.
Downloading – our system will not allow you to download any thing to your computer that is not on our own servers. This
includes not only the internet but diskettes, CD’s, or DVD’s.
Workstation and Info Access
Lee Ann Torrans
Our clear-screen policy means your must either log off or lock your computer when you are away from your desk to
ensure that the information on the computer is protected from unauthorized access.
We use a keyboard shortcuts that allow you to quickly lock your computer:
Control - LO
Users will be locked out after three attempts to login with an incorrect password.
Screen savers which lock are set to automatically turn on after two minutes of no use or computer
inactivity.
Control Access
Lee Ann Torrans
Both the HIPAA Privacy Rule and the Security Rule limit the uses and disclosures of PHI to the "minimum
necessary." This means that access to PHI should be authorized only when it's appropriate based on the
employee's role. Covered entities must also implement technical policies and procedures that allow only
authorized personnel to access e-PHI.
Access to PHI should be authorized only when it's appropriate based on the employee's role
Our technical policies provide access to specific categories of information by specific job functions.
Only authorized personnel can access specific e-PHI.
Lock Up
Lee Ann Torrans
Our clear-screen policy means your must either log off or lock your computer when you are away from your desk to
ensure that the information on the computer is protected from unauthorized access.
We use a keyboard shortcuts that allow you to quickly lock your computer:
Control - LO
Users will be locked out after three attempts to login with an incorrect password.
Screen savers which lock are set to automatically turn on after two minutes of no use or computer
inactivity.
Lee Ann
Breaches
Fines
Report to
OCR
Report to Media
Over 500
Consequence
No Internal
Sanctions for
Violations
No HIPAA
Education
Programs
Sharing
Passwords
Using
another
person’s
workstation
Unlawful Actions
Examples of HIPAA
Violations
Lee Ann
Lee Ann
− Do not text or email ePHI outside of our encrypted system
− Patient waiver of encryption must be approved by security officer / office
manager
− Sharing Passwords
− Sending medical records via email not directed through encrypted
system
− Losing laptop with unencrypted ePHI
− Placing PHI on portable device of any kind that is not encrypted violates
company protocol
Examples of
Violations
Lee Ann
Business
Associates
Lee Ann
TWO POLICIES
Encrypted Email: Our email system has encryption protocols enabled for a high level of secured
transmission between our email system and patients. Complete message can be encrypted by typing [encrypt]
in the subject line. Make sure there is a space before or after [encrypt] for the subject line The [encrypt] text
will be stripped from the email during processing. This is the only email system which accessible on our
system and the only one that may be used for our medical practice.
Unsolicited Receipt of PHI: If you have received inappropriate or misdirected PHI please follow these steps
as required under our HIPAA Compliance program; Reply to the sender of the material that a PHI request was
not made; delete or properly dispose of the PHI and notify the project office manager that this event has
occurred.
Do not open or retain the unsolicited PHI.
Lee Ann
Each workstation or class of workstations have a define purpose and authorization to access EPHI.
Purposes and functions are authorized for workstations and
Workstations cannot be used for unauthorized purposes or to perform unauthorized functions.
report any unauthorized activity at a workstation
Do not to share passwords with others, except to assure business continuity
Suspected misuse of user IDs or passwords should promptly reported
Workstations accessing EPHI are located in physically secure areas and display screens are positioned or
protected, in order to minimize the risk of access by unauthorized individuals and prevent unauthorized
viewing of EPHI.
Locking software should be activated upon leaving workstations unattended for a period which exceeds five
minutes.
Log off from their workstations when shift is complete.
Take reasonable and appropriate steps to ensure that workstations removed from facilities are protected with
security controls equivalent to on-site workstations
Workstation Policies
Lee Ann
Lee Ann
References:
Brodnick, M., Rinehart-Thompson, L., Reynolds, R. (2012). Fundamentals of Law for Health Informatics and Information Management 2nd ed. Edition. Chicago, Il: AHIMA Press.
Amatayakul, K. (2013). Electronic Health Records: A Practical Guide for Professionals and Organizations 5th Edition. Chicago, Il: AHIMA Press.
Castro, A. (2013). Principles of Healthcare Reimbursement 4th Edition. Chicago, Il: AHIMA Press.

More Related Content

What's hot

HIPAA 101 for Startups
HIPAA 101 for StartupsHIPAA 101 for Startups
HIPAA 101 for Startups
Obaa, Inc.
 
Assessing Your Hosting Environment for HIPAA Compliance
Assessing Your Hosting Environment for HIPAA ComplianceAssessing Your Hosting Environment for HIPAA Compliance
Assessing Your Hosting Environment for HIPAA Compliance
Hostway|HOSTING
 
HIPAA Part I the Law Test
HIPAA Part I  the Law TestHIPAA Part I  the Law Test
HIPAA Part I the Law Test
Sachiko Hurst
 
HIPAA Basic Healthcare Guide
HIPAA Basic Healthcare GuideHIPAA Basic Healthcare Guide
HIPAA Basic Healthcare Guide
Wirehead Technology
 
Week Of 2009 08 31
Week Of 2009 08 31Week Of 2009 08 31
Week Of 2009 08 31
mbarreto13
 
HHS Issues HIPAA Cyber Attack Response Checklist
HHS Issues HIPAA Cyber Attack Response ChecklistHHS Issues HIPAA Cyber Attack Response Checklist
HHS Issues HIPAA Cyber Attack Response Checklist
Todd LaRue
 
HIPPA Security Presentation
HIPPA Security PresentationHIPPA Security Presentation
HIPPA Security Presentation
Rebecca Norman
 
Hipaa 1
Hipaa 1Hipaa 1
HIPAA Compliance Checklist
HIPAA Compliance ChecklistHIPAA Compliance Checklist
HIPAA Compliance Checklist
Leigh-Ann Renz
 
HIPAA
HIPAAHIPAA
Blodgett MHA 690 W1 D2
Blodgett MHA 690 W1 D2Blodgett MHA 690 W1 D2
Blodgett MHA 690 W1 D2
Amanda Blodgett
 
Mha690 wk 1 fletcher
Mha690 wk 1   fletcherMha690 wk 1   fletcher
Mha690 wk 1 fletcher
Emed32
 
Training on confidentiality MHA690 Hayden
Training on confidentiality MHA690 HaydenTraining on confidentiality MHA690 Hayden
Training on confidentiality MHA690 Hayden
haydens
 
Simple Steps to HIPAA Compliance
Simple Steps to HIPAA ComplianceSimple Steps to HIPAA Compliance
Simple Steps to HIPAA Compliance
AtMyDeskTraining
 
Hippa breaches
Hippa breachesHippa breaches
Hippa breaches
ViSolve, Inc.
 
Discussion 2
Discussion 2Discussion 2
Discussion 2
Kristin Latham
 
Corporate compliance
Corporate complianceCorporate compliance
Corporate compliance
Christopher Clark
 
HIPAA Breach NotificationRule - What you must do to comply - By Compliance Gl...
HIPAA Breach NotificationRule - What you must do to comply - By Compliance Gl...HIPAA Breach NotificationRule - What you must do to comply - By Compliance Gl...
HIPAA Breach NotificationRule - What you must do to comply - By Compliance Gl...
Compliance Global Inc
 
Confidentiality Rules
Confidentiality RulesConfidentiality Rules
Confidentiality Rules
kholman1
 

What's hot (19)

HIPAA 101 for Startups
HIPAA 101 for StartupsHIPAA 101 for Startups
HIPAA 101 for Startups
 
Assessing Your Hosting Environment for HIPAA Compliance
Assessing Your Hosting Environment for HIPAA ComplianceAssessing Your Hosting Environment for HIPAA Compliance
Assessing Your Hosting Environment for HIPAA Compliance
 
HIPAA Part I the Law Test
HIPAA Part I  the Law TestHIPAA Part I  the Law Test
HIPAA Part I the Law Test
 
HIPAA Basic Healthcare Guide
HIPAA Basic Healthcare GuideHIPAA Basic Healthcare Guide
HIPAA Basic Healthcare Guide
 
Week Of 2009 08 31
Week Of 2009 08 31Week Of 2009 08 31
Week Of 2009 08 31
 
HHS Issues HIPAA Cyber Attack Response Checklist
HHS Issues HIPAA Cyber Attack Response ChecklistHHS Issues HIPAA Cyber Attack Response Checklist
HHS Issues HIPAA Cyber Attack Response Checklist
 
HIPPA Security Presentation
HIPPA Security PresentationHIPPA Security Presentation
HIPPA Security Presentation
 
Hipaa 1
Hipaa 1Hipaa 1
Hipaa 1
 
HIPAA Compliance Checklist
HIPAA Compliance ChecklistHIPAA Compliance Checklist
HIPAA Compliance Checklist
 
HIPAA
HIPAAHIPAA
HIPAA
 
Blodgett MHA 690 W1 D2
Blodgett MHA 690 W1 D2Blodgett MHA 690 W1 D2
Blodgett MHA 690 W1 D2
 
Mha690 wk 1 fletcher
Mha690 wk 1   fletcherMha690 wk 1   fletcher
Mha690 wk 1 fletcher
 
Training on confidentiality MHA690 Hayden
Training on confidentiality MHA690 HaydenTraining on confidentiality MHA690 Hayden
Training on confidentiality MHA690 Hayden
 
Simple Steps to HIPAA Compliance
Simple Steps to HIPAA ComplianceSimple Steps to HIPAA Compliance
Simple Steps to HIPAA Compliance
 
Hippa breaches
Hippa breachesHippa breaches
Hippa breaches
 
Discussion 2
Discussion 2Discussion 2
Discussion 2
 
Corporate compliance
Corporate complianceCorporate compliance
Corporate compliance
 
HIPAA Breach NotificationRule - What you must do to comply - By Compliance Gl...
HIPAA Breach NotificationRule - What you must do to comply - By Compliance Gl...HIPAA Breach NotificationRule - What you must do to comply - By Compliance Gl...
HIPAA Breach NotificationRule - What you must do to comply - By Compliance Gl...
 
Confidentiality Rules
Confidentiality RulesConfidentiality Rules
Confidentiality Rules
 

Similar to HIPAA Compliance Email

Dispelling HIPAA Myths: Texting, Emailing, and BYOD Best Practices
Dispelling HIPAA Myths: Texting, Emailing, and BYOD Best PracticesDispelling HIPAA Myths: Texting, Emailing, and BYOD Best Practices
Dispelling HIPAA Myths: Texting, Emailing, and BYOD Best Practices
Conference Panel
 
CAHU EXPO Grove City, OH 2014
CAHU EXPO Grove City, OH 2014 CAHU EXPO Grove City, OH 2014
CAHU EXPO Grove City, OH 2014
Jason Karn
 
how to really implement hipaa presentation
how to really implement hipaa presentationhow to really implement hipaa presentation
how to really implement hipaa presentation
Provider Resources Group
 
Health care capstone week 1 disk 1 confidentiality
Health care capstone week 1 disk 1 confidentialityHealth care capstone week 1 disk 1 confidentiality
Health care capstone week 1 disk 1 confidentiality
madezir
 
Mha690 confidentiality training-week 1, discussion 2
Mha690 confidentiality training-week 1, discussion 2Mha690 confidentiality training-week 1, discussion 2
Mha690 confidentiality training-week 1, discussion 2
Kristen Zimmer
 
Mha 690 week 1 discussion presentation
Mha 690 week 1 discussion presentationMha 690 week 1 discussion presentation
Mha 690 week 1 discussion presentation
falane
 
HIPAA Compliance For Small Practices
HIPAA Compliance For Small PracticesHIPAA Compliance For Small Practices
HIPAA Compliance For Small Practices
Nisos Health
 
Confidentiality
ConfidentialityConfidentiality
Confidentiality
robyn42
 
C:\Fakepath\Secprimodule
C:\Fakepath\SecprimoduleC:\Fakepath\Secprimodule
C:\Fakepath\Secprimodule
Brenda Kershaw
 
Barbara Silva is the CIO for Peachtree Community Hospital in Atlanta.docx
Barbara Silva is the CIO for Peachtree Community Hospital in Atlanta.docxBarbara Silva is the CIO for Peachtree Community Hospital in Atlanta.docx
Barbara Silva is the CIO for Peachtree Community Hospital in Atlanta.docx
wilcockiris
 
Describe one safeguard that should be in place to protect the confid.pdf
Describe one safeguard that should be in place to protect the confid.pdfDescribe one safeguard that should be in place to protect the confid.pdf
Describe one safeguard that should be in place to protect the confid.pdf
mohammedfootwear
 
Healthcare preparedness 2010
Healthcare preparedness 2010Healthcare preparedness 2010
Healthcare preparedness 2010
DataMotion
 
Healthcare preparedness 2010
Healthcare preparedness 2010Healthcare preparedness 2010
Healthcare preparedness 2010
DataMotion
 
Hipaa overview 073118
Hipaa overview 073118Hipaa overview 073118
Hipaa overview 073118
robint2125
 
Understanding the Importance of HIPAA Compliance in Medical Billing Software.pdf
Understanding the Importance of HIPAA Compliance in Medical Billing Software.pdfUnderstanding the Importance of HIPAA Compliance in Medical Billing Software.pdf
Understanding the Importance of HIPAA Compliance in Medical Billing Software.pdf
OmniMD Healthcare
 
Mbm Hipaa Hitech Ss Compliance Risk Assessment
Mbm Hipaa Hitech Ss Compliance Risk AssessmentMbm Hipaa Hitech Ss Compliance Risk Assessment
Mbm Hipaa Hitech Ss Compliance Risk Assessment
MBMeHealthCareSolutions
 
Medical Data Encryption 101
Medical Data Encryption 101Medical Data Encryption 101
Medical Data Encryption 101
SecurityMetrics
 
Confidentiality & HIPAA Training Week 1 Discussion 2
Confidentiality & HIPAA Training Week 1 Discussion 2Confidentiality & HIPAA Training Week 1 Discussion 2
Confidentiality & HIPAA Training Week 1 Discussion 2
Melissa Morris
 
Explaining the HIPAA Privacy[.docx
Explaining the HIPAA Privacy[.docxExplaining the HIPAA Privacy[.docx
Explaining the HIPAA Privacy[.docx
VistaInfosec
 
Hipaa privacy and security real world cases and breach determinations
Hipaa privacy and security   real world cases and breach determinationsHipaa privacy and security   real world cases and breach determinations
Hipaa privacy and security real world cases and breach determinations
Compliance Trainings
 

Similar to HIPAA Compliance Email (20)

Dispelling HIPAA Myths: Texting, Emailing, and BYOD Best Practices
Dispelling HIPAA Myths: Texting, Emailing, and BYOD Best PracticesDispelling HIPAA Myths: Texting, Emailing, and BYOD Best Practices
Dispelling HIPAA Myths: Texting, Emailing, and BYOD Best Practices
 
CAHU EXPO Grove City, OH 2014
CAHU EXPO Grove City, OH 2014 CAHU EXPO Grove City, OH 2014
CAHU EXPO Grove City, OH 2014
 
how to really implement hipaa presentation
how to really implement hipaa presentationhow to really implement hipaa presentation
how to really implement hipaa presentation
 
Health care capstone week 1 disk 1 confidentiality
Health care capstone week 1 disk 1 confidentialityHealth care capstone week 1 disk 1 confidentiality
Health care capstone week 1 disk 1 confidentiality
 
Mha690 confidentiality training-week 1, discussion 2
Mha690 confidentiality training-week 1, discussion 2Mha690 confidentiality training-week 1, discussion 2
Mha690 confidentiality training-week 1, discussion 2
 
Mha 690 week 1 discussion presentation
Mha 690 week 1 discussion presentationMha 690 week 1 discussion presentation
Mha 690 week 1 discussion presentation
 
HIPAA Compliance For Small Practices
HIPAA Compliance For Small PracticesHIPAA Compliance For Small Practices
HIPAA Compliance For Small Practices
 
Confidentiality
ConfidentialityConfidentiality
Confidentiality
 
C:\Fakepath\Secprimodule
C:\Fakepath\SecprimoduleC:\Fakepath\Secprimodule
C:\Fakepath\Secprimodule
 
Barbara Silva is the CIO for Peachtree Community Hospital in Atlanta.docx
Barbara Silva is the CIO for Peachtree Community Hospital in Atlanta.docxBarbara Silva is the CIO for Peachtree Community Hospital in Atlanta.docx
Barbara Silva is the CIO for Peachtree Community Hospital in Atlanta.docx
 
Describe one safeguard that should be in place to protect the confid.pdf
Describe one safeguard that should be in place to protect the confid.pdfDescribe one safeguard that should be in place to protect the confid.pdf
Describe one safeguard that should be in place to protect the confid.pdf
 
Healthcare preparedness 2010
Healthcare preparedness 2010Healthcare preparedness 2010
Healthcare preparedness 2010
 
Healthcare preparedness 2010
Healthcare preparedness 2010Healthcare preparedness 2010
Healthcare preparedness 2010
 
Hipaa overview 073118
Hipaa overview 073118Hipaa overview 073118
Hipaa overview 073118
 
Understanding the Importance of HIPAA Compliance in Medical Billing Software.pdf
Understanding the Importance of HIPAA Compliance in Medical Billing Software.pdfUnderstanding the Importance of HIPAA Compliance in Medical Billing Software.pdf
Understanding the Importance of HIPAA Compliance in Medical Billing Software.pdf
 
Mbm Hipaa Hitech Ss Compliance Risk Assessment
Mbm Hipaa Hitech Ss Compliance Risk AssessmentMbm Hipaa Hitech Ss Compliance Risk Assessment
Mbm Hipaa Hitech Ss Compliance Risk Assessment
 
Medical Data Encryption 101
Medical Data Encryption 101Medical Data Encryption 101
Medical Data Encryption 101
 
Confidentiality & HIPAA Training Week 1 Discussion 2
Confidentiality & HIPAA Training Week 1 Discussion 2Confidentiality & HIPAA Training Week 1 Discussion 2
Confidentiality & HIPAA Training Week 1 Discussion 2
 
Explaining the HIPAA Privacy[.docx
Explaining the HIPAA Privacy[.docxExplaining the HIPAA Privacy[.docx
Explaining the HIPAA Privacy[.docx
 
Hipaa privacy and security real world cases and breach determinations
Hipaa privacy and security   real world cases and breach determinationsHipaa privacy and security   real world cases and breach determinations
Hipaa privacy and security real world cases and breach determinations
 

Recently uploaded

The Power of Superfoods and Exercise.pdf
The Power of Superfoods and Exercise.pdfThe Power of Superfoods and Exercise.pdf
The Power of Superfoods and Exercise.pdf
Dr Rachana Gujar
 
Unlocking the Secrets to Safe Patient Handling.pdf
Unlocking the Secrets to Safe Patient Handling.pdfUnlocking the Secrets to Safe Patient Handling.pdf
Unlocking the Secrets to Safe Patient Handling.pdf
Lift Ability
 
Stem Cell Solutions: Dr. David Greene's Path to Non-Surgical Cardiac Care
Stem Cell Solutions: Dr. David Greene's Path to Non-Surgical Cardiac CareStem Cell Solutions: Dr. David Greene's Path to Non-Surgical Cardiac Care
Stem Cell Solutions: Dr. David Greene's Path to Non-Surgical Cardiac Care
Dr. David Greene Arizona
 
Feeding plate for a newborn with Cleft Palate.pptx
Feeding plate for a newborn with Cleft Palate.pptxFeeding plate for a newborn with Cleft Palate.pptx
Feeding plate for a newborn with Cleft Palate.pptx
SatvikaPrasad
 
How Effective is Homeopathic Medicine for Anxiety and Stress Relief.pdf
How Effective is Homeopathic Medicine for Anxiety and Stress Relief.pdfHow Effective is Homeopathic Medicine for Anxiety and Stress Relief.pdf
How Effective is Homeopathic Medicine for Anxiety and Stress Relief.pdf
Dharma Homoeopathy
 
Vicarious movements or trick movements_AB.pdf
Vicarious movements or trick movements_AB.pdfVicarious movements or trick movements_AB.pdf
Vicarious movements or trick movements_AB.pdf
Arunima620542
 
CANSA support - Caring for Cancer Patients' Caregivers
CANSA support - Caring for Cancer Patients' CaregiversCANSA support - Caring for Cancer Patients' Caregivers
CANSA support - Caring for Cancer Patients' Caregivers
CANSA The Cancer Association of South Africa
 
MBC Support Group for Black Women – Insights in Genetic Testing.pdf
MBC Support Group for Black Women – Insights in Genetic Testing.pdfMBC Support Group for Black Women – Insights in Genetic Testing.pdf
MBC Support Group for Black Women – Insights in Genetic Testing.pdf
bkling
 
NEEDLE STICK INJURY - JOURNAL CLUB PRESENTATION - DR SHAMIN EABENSON
NEEDLE STICK INJURY - JOURNAL CLUB PRESENTATION - DR SHAMIN EABENSONNEEDLE STICK INJURY - JOURNAL CLUB PRESENTATION - DR SHAMIN EABENSON
NEEDLE STICK INJURY - JOURNAL CLUB PRESENTATION - DR SHAMIN EABENSON
SHAMIN EABENSON
 
Let's Talk About It: Breast Cancer (What is Mindset and Does it Really Matter?)
Let's Talk About It: Breast Cancer (What is Mindset and Does it Really Matter?)Let's Talk About It: Breast Cancer (What is Mindset and Does it Really Matter?)
Let's Talk About It: Breast Cancer (What is Mindset and Does it Really Matter?)
bkling
 
Under Pressure : Kenneth Kruk's Strategy
Under Pressure : Kenneth Kruk's StrategyUnder Pressure : Kenneth Kruk's Strategy
Under Pressure : Kenneth Kruk's Strategy
Kenneth Kruk
 
DRAFT Ventilator Rapid Reference version 2.4.pdf
DRAFT Ventilator Rapid Reference  version  2.4.pdfDRAFT Ventilator Rapid Reference  version  2.4.pdf
DRAFT Ventilator Rapid Reference version 2.4.pdf
Robert Cole
 
Champions of Health Spotlight On Leaders Shaping Germany's Healthcare.pdf
Champions of Health Spotlight On Leaders Shaping Germany's Healthcare.pdfChampions of Health Spotlight On Leaders Shaping Germany's Healthcare.pdf
Champions of Health Spotlight On Leaders Shaping Germany's Healthcare.pdf
eurohealthleaders
 
KEY Points of Leicester travel clinic In London doc.docx
KEY Points of Leicester travel clinic In London doc.docxKEY Points of Leicester travel clinic In London doc.docx
KEY Points of Leicester travel clinic In London doc.docx
NX Healthcare
 
Rate Controlled Drug Delivery Systems.pdf
Rate Controlled Drug Delivery Systems.pdfRate Controlled Drug Delivery Systems.pdf
Rate Controlled Drug Delivery Systems.pdf
Rajarambapu College of Pharmacy Kasegaon Dist Sangli
 
TEST BANK FOR Health Assessment in Nursing 7th Edition by Weber Chapters 1 - ...
TEST BANK FOR Health Assessment in Nursing 7th Edition by Weber Chapters 1 - ...TEST BANK FOR Health Assessment in Nursing 7th Edition by Weber Chapters 1 - ...
TEST BANK FOR Health Assessment in Nursing 7th Edition by Weber Chapters 1 - ...
rightmanforbloodline
 
LGBTQ+ Adults: Unique Opportunities and Inclusive Approaches to Care
LGBTQ+ Adults: Unique Opportunities and Inclusive Approaches to CareLGBTQ+ Adults: Unique Opportunities and Inclusive Approaches to Care
LGBTQ+ Adults: Unique Opportunities and Inclusive Approaches to Care
VITASAuthor
 
Time line.ppQAWSDRFTGYUIOPÑLKIUYTREWASDFTGY
Time line.ppQAWSDRFTGYUIOPÑLKIUYTREWASDFTGYTime line.ppQAWSDRFTGYUIOPÑLKIUYTREWASDFTGY
Time line.ppQAWSDRFTGYUIOPÑLKIUYTREWASDFTGY
DianaRodriguez639773
 
Deep Leg Vein Thrombosis (DVT): Meaning, Causes, Symptoms, Treatment, and Mor...
Deep Leg Vein Thrombosis (DVT): Meaning, Causes, Symptoms, Treatment, and Mor...Deep Leg Vein Thrombosis (DVT): Meaning, Causes, Symptoms, Treatment, and Mor...
Deep Leg Vein Thrombosis (DVT): Meaning, Causes, Symptoms, Treatment, and Mor...
The Lifesciences Magazine
 
DELIRIUM BY DR JAGMOHAN PRAJAPATI.......
DELIRIUM BY DR JAGMOHAN PRAJAPATI.......DELIRIUM BY DR JAGMOHAN PRAJAPATI.......
DELIRIUM BY DR JAGMOHAN PRAJAPATI.......
DR Jag Mohan Prajapati
 

Recently uploaded (20)

The Power of Superfoods and Exercise.pdf
The Power of Superfoods and Exercise.pdfThe Power of Superfoods and Exercise.pdf
The Power of Superfoods and Exercise.pdf
 
Unlocking the Secrets to Safe Patient Handling.pdf
Unlocking the Secrets to Safe Patient Handling.pdfUnlocking the Secrets to Safe Patient Handling.pdf
Unlocking the Secrets to Safe Patient Handling.pdf
 
Stem Cell Solutions: Dr. David Greene's Path to Non-Surgical Cardiac Care
Stem Cell Solutions: Dr. David Greene's Path to Non-Surgical Cardiac CareStem Cell Solutions: Dr. David Greene's Path to Non-Surgical Cardiac Care
Stem Cell Solutions: Dr. David Greene's Path to Non-Surgical Cardiac Care
 
Feeding plate for a newborn with Cleft Palate.pptx
Feeding plate for a newborn with Cleft Palate.pptxFeeding plate for a newborn with Cleft Palate.pptx
Feeding plate for a newborn with Cleft Palate.pptx
 
How Effective is Homeopathic Medicine for Anxiety and Stress Relief.pdf
How Effective is Homeopathic Medicine for Anxiety and Stress Relief.pdfHow Effective is Homeopathic Medicine for Anxiety and Stress Relief.pdf
How Effective is Homeopathic Medicine for Anxiety and Stress Relief.pdf
 
Vicarious movements or trick movements_AB.pdf
Vicarious movements or trick movements_AB.pdfVicarious movements or trick movements_AB.pdf
Vicarious movements or trick movements_AB.pdf
 
CANSA support - Caring for Cancer Patients' Caregivers
CANSA support - Caring for Cancer Patients' CaregiversCANSA support - Caring for Cancer Patients' Caregivers
CANSA support - Caring for Cancer Patients' Caregivers
 
MBC Support Group for Black Women – Insights in Genetic Testing.pdf
MBC Support Group for Black Women – Insights in Genetic Testing.pdfMBC Support Group for Black Women – Insights in Genetic Testing.pdf
MBC Support Group for Black Women – Insights in Genetic Testing.pdf
 
NEEDLE STICK INJURY - JOURNAL CLUB PRESENTATION - DR SHAMIN EABENSON
NEEDLE STICK INJURY - JOURNAL CLUB PRESENTATION - DR SHAMIN EABENSONNEEDLE STICK INJURY - JOURNAL CLUB PRESENTATION - DR SHAMIN EABENSON
NEEDLE STICK INJURY - JOURNAL CLUB PRESENTATION - DR SHAMIN EABENSON
 
Let's Talk About It: Breast Cancer (What is Mindset and Does it Really Matter?)
Let's Talk About It: Breast Cancer (What is Mindset and Does it Really Matter?)Let's Talk About It: Breast Cancer (What is Mindset and Does it Really Matter?)
Let's Talk About It: Breast Cancer (What is Mindset and Does it Really Matter?)
 
Under Pressure : Kenneth Kruk's Strategy
Under Pressure : Kenneth Kruk's StrategyUnder Pressure : Kenneth Kruk's Strategy
Under Pressure : Kenneth Kruk's Strategy
 
DRAFT Ventilator Rapid Reference version 2.4.pdf
DRAFT Ventilator Rapid Reference  version  2.4.pdfDRAFT Ventilator Rapid Reference  version  2.4.pdf
DRAFT Ventilator Rapid Reference version 2.4.pdf
 
Champions of Health Spotlight On Leaders Shaping Germany's Healthcare.pdf
Champions of Health Spotlight On Leaders Shaping Germany's Healthcare.pdfChampions of Health Spotlight On Leaders Shaping Germany's Healthcare.pdf
Champions of Health Spotlight On Leaders Shaping Germany's Healthcare.pdf
 
KEY Points of Leicester travel clinic In London doc.docx
KEY Points of Leicester travel clinic In London doc.docxKEY Points of Leicester travel clinic In London doc.docx
KEY Points of Leicester travel clinic In London doc.docx
 
Rate Controlled Drug Delivery Systems.pdf
Rate Controlled Drug Delivery Systems.pdfRate Controlled Drug Delivery Systems.pdf
Rate Controlled Drug Delivery Systems.pdf
 
TEST BANK FOR Health Assessment in Nursing 7th Edition by Weber Chapters 1 - ...
TEST BANK FOR Health Assessment in Nursing 7th Edition by Weber Chapters 1 - ...TEST BANK FOR Health Assessment in Nursing 7th Edition by Weber Chapters 1 - ...
TEST BANK FOR Health Assessment in Nursing 7th Edition by Weber Chapters 1 - ...
 
LGBTQ+ Adults: Unique Opportunities and Inclusive Approaches to Care
LGBTQ+ Adults: Unique Opportunities and Inclusive Approaches to CareLGBTQ+ Adults: Unique Opportunities and Inclusive Approaches to Care
LGBTQ+ Adults: Unique Opportunities and Inclusive Approaches to Care
 
Time line.ppQAWSDRFTGYUIOPÑLKIUYTREWASDFTGY
Time line.ppQAWSDRFTGYUIOPÑLKIUYTREWASDFTGYTime line.ppQAWSDRFTGYUIOPÑLKIUYTREWASDFTGY
Time line.ppQAWSDRFTGYUIOPÑLKIUYTREWASDFTGY
 
Deep Leg Vein Thrombosis (DVT): Meaning, Causes, Symptoms, Treatment, and Mor...
Deep Leg Vein Thrombosis (DVT): Meaning, Causes, Symptoms, Treatment, and Mor...Deep Leg Vein Thrombosis (DVT): Meaning, Causes, Symptoms, Treatment, and Mor...
Deep Leg Vein Thrombosis (DVT): Meaning, Causes, Symptoms, Treatment, and Mor...
 
DELIRIUM BY DR JAGMOHAN PRAJAPATI.......
DELIRIUM BY DR JAGMOHAN PRAJAPATI.......DELIRIUM BY DR JAGMOHAN PRAJAPATI.......
DELIRIUM BY DR JAGMOHAN PRAJAPATI.......
 

HIPAA Compliance Email

  • 1. Michela Desmond, MD Ana Turbin, RN Jann Barham, Office Manager Jana Barham, Billing Sonya Steadham, Reception Joyce Cook, LVN Protected Health Information and Electronic Protected Health Information Safeguarding ePHI This facility provides psychiatric care for the treatment of veterans and post traumatic stress disorder. Services are provided face to face and through electronic transmission. Reimbursement is through federal funding, state funding, private pay insurance and pro bono.
  • 2. Michela Desmond, MD Certified by The American Board of Psychiatry and Neurology
  • 3. The HIPAA Privacy Rule protects the privacy of individually identifiable health information. Sanctions are required by HIPAA in the event of violations. HIPAA PRIVACY RULE Lee Ann Torrans Covered entities must designate a privacy official responsible for developing and implementing policies and procedures. Our office manager is our HIPAA Privacy Officer. HIPAA requires not only that our policies be created and communicated to staff but employees must also sign documents indicating they understand and will adhere to the policies.
  • 4. Information created, received, used or maintained by a HIPAA covered entity is included. The Security Rule requires appropriate administrative, physical and technical safeguards to ensure the confidentiality, integrity, and security of ePHI. HIPAA covers both ePHI and PHI (protected health information). HIPAA SECURITY RULE Lee Ann Torrans The HIPAA Security Rule sets national standards for the security of electronic protected health information (e-PHI).
  • 5. Protecting patient healthcare information is important for the patient, our facility and legal compliance. Understanding the broad scope of issues health care providers face and why we engage in these activities will help you support and improve our service. It is everyone’s duty to not only observe our policies but to contribute to enhancing our policies to better address issues of protecting health information of our patients by both this office and our business associates. By understanding the scope of our duties you can better contribute and participate in the protection of health information. ePHI and PHI Review Lee Ann Torrans
  • 6. The HIPAA Security Rule requires covered providers to implement security measures, which help protect patients’ privacy by creating the conditions for protected health information to be available but not be improperly used or disclosed. A breach is, generally, an impermissible use or disclosure under the Privacy Rule that compromises the security or privacy of PHI such that the use or disclosure poses a significant risk of financial, reputational, or other harm to the affected individual. What is a Breach? Lee Ann Torrans The “Breach Notification Rule” requires covered providers to promptly notify individuals and the Secretary of the HHS of the loss, theft, or certain other impermissible uses or disclosures of unsecured PHI. Health care providers must also promptly notify the Secretary of HHS if there is any breach of unsecured protected health information if the breach affects 500 or more individuals, and notify the media if the breach affects more than 500 individuals of a State or jurisdiction.
  • 7. Business Associates Healthcare Providers Who Is a Covered Provider? Lee Ann Torrans State Law Expands Definition - Review Your State
  • 8. Breaches of unsecured PHI that affect 500 or more individuals are publicly reported on the OCR website. We are required to notify the media if the breach affects more than 500 individuals of a state or jurisdiction. The U.S. Department of Health and Human Services’ Office for Civil Rights (OCR) is responsible for administering and enforcing the HIPAA Privacy and Security Rules and conducts associated complaint investigations, compliance reviews, and audits. OCR may impose fines on covered providers for failure to comply with the HIPAA Rules. State Attorneys General may also enforce provisions of the HIPAA Rules. Breach Occurrence? Lee Ann Torrans
  • 9. Risk analysis and risk management serve as tools to assist in the development of a covered entity’s strategy to protect the confidentiality, integrity, and availability of ePHI. Your feedback and contribution to any potential risk or threat to the security of ePHI is crucial for success. Always bring concerns to our HIPAA Privacy Officer, our office manager. We are required as a covered entity to have a sanction policy that reinforces our security policies and procedures. The Information System Activity Review implementation specification requires us to promote a continual awareness of any information system activity that could suggest a security incident. Organizational Standards Lee Ann Torrans
  • 10. The Security Rule defines administrative safeguards as, “administrative actions, and policies and procedures, to manage the selection, development, implementation, and maintenance of security measures to protect electronic protected health information and to manage the conduct of the covered entity’s workforce in relation to the protection of that information.” “Implement policies and procedures to prevent, detect, contain and correct security violations.” Risk analysis Risk management Security Management Lee Ann Torrans Sanction policy Information system activity
  • 11. “Implement policies and procedures to ensure that all members of its workforce have appropriate access to electronic protected health information, as provided under [the Information Access Management standard], and to prevent those workforce members who do not have access under [the Information Access Management standard] from obtaining access to electronic protected health information.” The Authorization and/or Supervision implementation specification provides the necessary checks and balances to ensure that all members of the workforce have appropriate or limited access to EPHI. Isolating Health Care Clearinghouse Functions Access Authorization Work Force Security Lee Ann Torrans Access Establishment and Modification
  • 12. “Implement policies and procedures for authorizing access to electronic protected health.” The Information Access Management implementation specifications are closely related to the implementation specifications under the Workforce Security standard. Isolating Health Care Clearinghouse Functions Access Authorization Information Access Lee Ann Torrans Access Establishment and Modification Managing
  • 13. “Implement policies and procedures to address security incidents.” Create contingency plans in the event of software / hardware failure or natural disaster. “Implement procedures for periodic testing and revision of contingency plans.” “Assess the relative criticality of specific applications and data in support of other contingency plan components.” Security Plans Lee Ann Torrans “Evaluation: On-going evaluation of security measures is the best way to ensure all EPHI is adequately protected.”
  • 14. “Implement a security awareness and training program for all members of its workforce including management.” Security Reminders Protection from Malicious Software Log-in Monitoring Security Awareness Training Lee Ann Torrans Password Management We are required to have periodic training for all new employees and associates
  • 15. Internet and eMail Use Lee Ann Torrans Complex passwords are an effective safeguard against unauthorized access of PHI. HIPAA Security Rule requires that covered entities establish guidelines for creating passwords and changing them during periodic change cycles. Password policies require passwords to be changed every 90 days Passwords must have a length of 8 characters containing a mix of upper- and lowercase letters, special characters, and numbers. Never share passwords with co-workers or write them down and leave them in areas that are visible and accessible to others.
  • 16. ePHI Electronic Transmission Lee Ann Torrans No patient images may be forwarded. HIPAA allows patients to waive using HIPAA encrypted transmission of patient information. The Information Privacy Officer must forward and receive the signed waiver before this process may begin. Skype, owned my Microsoft is NOT HIPAA compliant. It can never be used. Drop Box must have specific BA HIPAA compliant agreements. Both require waivers. Without a patient waiver approved by our Security Officer only our designated email service and text service can be used.
  • 17. Phishing Emails Lee Ann Torrans Display name do not trust – look at actual senders email address and source Phishers often ‘steal’ and reuse legitimate logos Phishing can introduce malicious software by opening suspicious e-mail attachments, e-mail from unfamiliar senders, and hoax e-mail. Contact the office manager before you open suspicious email. Downloading – our system will not allow you to download any thing to your computer that is not on our own servers. This includes not only the internet but diskettes, CD’s, or DVD’s.
  • 18. Protections from Malicious Software Lee Ann Torrans Malicious software refers to viruses, worms, Trojan horses and backdoor programs Virus scans and protection are run three times a day on individual computers and our entire system. Phishing can introduce malicious software by opening suspicious e-mail attachments, e-mail from unfamiliar senders, and hoax e-mail. Contact the office manager before you open suspicious email. Downloading – our system will not allow you to download any thing to your computer that is not on our own servers. This includes not only the internet but diskettes, CD’s, or DVD’s.
  • 19. Workstation and Info Access Lee Ann Torrans Our clear-screen policy means your must either log off or lock your computer when you are away from your desk to ensure that the information on the computer is protected from unauthorized access. We use a keyboard shortcuts that allow you to quickly lock your computer: Control - LO Users will be locked out after three attempts to login with an incorrect password. Screen savers which lock are set to automatically turn on after two minutes of no use or computer inactivity.
  • 20. Control Access Lee Ann Torrans Both the HIPAA Privacy Rule and the Security Rule limit the uses and disclosures of PHI to the "minimum necessary." This means that access to PHI should be authorized only when it's appropriate based on the employee's role. Covered entities must also implement technical policies and procedures that allow only authorized personnel to access e-PHI. Access to PHI should be authorized only when it's appropriate based on the employee's role Our technical policies provide access to specific categories of information by specific job functions. Only authorized personnel can access specific e-PHI.
  • 21. Lock Up Lee Ann Torrans Our clear-screen policy means your must either log off or lock your computer when you are away from your desk to ensure that the information on the computer is protected from unauthorized access. We use a keyboard shortcuts that allow you to quickly lock your computer: Control - LO Users will be locked out after three attempts to login with an incorrect password. Screen savers which lock are set to automatically turn on after two minutes of no use or computer inactivity.
  • 22. Lee Ann Breaches Fines Report to OCR Report to Media Over 500 Consequence No Internal Sanctions for Violations No HIPAA Education Programs Sharing Passwords Using another person’s workstation Unlawful Actions Examples of HIPAA Violations Lee Ann
  • 23. Lee Ann − Do not text or email ePHI outside of our encrypted system − Patient waiver of encryption must be approved by security officer / office manager − Sharing Passwords − Sending medical records via email not directed through encrypted system − Losing laptop with unencrypted ePHI − Placing PHI on portable device of any kind that is not encrypted violates company protocol Examples of Violations
  • 25. Lee Ann TWO POLICIES Encrypted Email: Our email system has encryption protocols enabled for a high level of secured transmission between our email system and patients. Complete message can be encrypted by typing [encrypt] in the subject line. Make sure there is a space before or after [encrypt] for the subject line The [encrypt] text will be stripped from the email during processing. This is the only email system which accessible on our system and the only one that may be used for our medical practice. Unsolicited Receipt of PHI: If you have received inappropriate or misdirected PHI please follow these steps as required under our HIPAA Compliance program; Reply to the sender of the material that a PHI request was not made; delete or properly dispose of the PHI and notify the project office manager that this event has occurred. Do not open or retain the unsolicited PHI.
  • 26. Lee Ann Each workstation or class of workstations have a define purpose and authorization to access EPHI. Purposes and functions are authorized for workstations and Workstations cannot be used for unauthorized purposes or to perform unauthorized functions. report any unauthorized activity at a workstation Do not to share passwords with others, except to assure business continuity Suspected misuse of user IDs or passwords should promptly reported Workstations accessing EPHI are located in physically secure areas and display screens are positioned or protected, in order to minimize the risk of access by unauthorized individuals and prevent unauthorized viewing of EPHI. Locking software should be activated upon leaving workstations unattended for a period which exceeds five minutes. Log off from their workstations when shift is complete. Take reasonable and appropriate steps to ensure that workstations removed from facilities are protected with security controls equivalent to on-site workstations Workstation Policies
  • 28. Lee Ann References: Brodnick, M., Rinehart-Thompson, L., Reynolds, R. (2012). Fundamentals of Law for Health Informatics and Information Management 2nd ed. Edition. Chicago, Il: AHIMA Press. Amatayakul, K. (2013). Electronic Health Records: A Practical Guide for Professionals and Organizations 5th Edition. Chicago, Il: AHIMA Press. Castro, A. (2013). Principles of Healthcare Reimbursement 4th Edition. Chicago, Il: AHIMA Press.

Editor's Notes

  1. Find the OIG compliance education requirements on the internet. Make sure all of the required elements are included in your training. Gather the information you would like to present about HIPAA – this should be an overview or reminder to the staff regarding how to safeguard PHI or ePHI. Explain to the staff/physicians why this is important, in other words, why are we doing this training. Remember that simplicity is better than complex. You will be training new employees who may only have a high school diploma and physicians with many years of college education. When writing for a diverse education level audience it is often recommended to document it at an 8th grade reading level. This does not mean you write for a child; keep it professional, explain all acronyms, keep it simple (no one wants to read a novel, including your instructor) and provide hints for remembering important information. Using bullet points is very helpful, try not to cram too much onto one slide.
  2. Presentation title and student name must appear on first slide. Name your physician practice – This must be a physician practice or physician group practice. You may not use any other type of medical facility. List the names of the employees and their position. – Do not forget yourself. Include your physicians, patient care providers, and the people who work “behind the scenes” such as your billers, schedulers, office manager etc. Choose your color background for the presentation – This is important to do at the beginning, as the background you choose may affect how your text is displayed. Describe the type of practice and services that are provided.
  3. Choose two compliance policies to write. – Make sure they pertain to compliance, for example employee dress code is not a compliance policy. Check chapter 15 for some ideas on policy topics. Check the AHIMA website for examples of how policies are formatted. You may place the policies in the slides so they are in the order you are discussing them, or you may make them appendices at the end of your presentation.
  4. Choose two compliance policies to write. – Make sure they pertain to compliance, for example employee dress code is not a compliance policy. Check chapter 15 for some ideas on policy topics. Check the AHIMA website for examples of how policies are formatted. You may place the policies in the slides so they are in the order you are discussing them, or you may make them appendices at the end of your presentation.
  5. Choose two compliance policies to write. – Make sure they pertain to compliance, for example employee dress code is not a compliance policy. Check chapter 15 for some ideas on policy topics. Check the AHIMA website for examples of how policies are formatted. You may place the policies in the slides so they are in the order you are discussing them, or you may make them appendices at the end of your presentation.
  6. Choose two compliance policies to write. – Make sure they pertain to compliance, for example employee dress code is not a compliance policy. Check chapter 15 for some ideas on policy topics. Check the AHIMA website for examples of how policies are formatted. You may place the policies in the slides so they are in the order you are discussing them, or you may make them appendices at the end of your presentation.
  7. Choose two compliance policies to write. – Make sure they pertain to compliance, for example employee dress code is not a compliance policy. Check chapter 15 for some ideas on policy topics. Check the AHIMA website for examples of how policies are formatted. You may place the policies in the slides so they are in the order you are discussing them, or you may make them appendices at the end of your presentation.
  8. Choose two compliance policies to write. – Make sure they pertain to compliance, for example employee dress code is not a compliance policy. Check chapter 15 for some ideas on policy topics. Check the AHIMA website for examples of how policies are formatted. You may place the policies in the slides so they are in the order you are discussing them, or you may make them appendices at the end of your presentation.
  9. Choose two compliance policies to write. – Make sure they pertain to compliance, for example employee dress code is not a compliance policy. Check chapter 15 for some ideas on policy topics. Check the AHIMA website for examples of how policies are formatted. You may place the policies in the slides so they are in the order you are discussing them, or you may make them appendices at the end of your presentation.
  10. Choose two compliance policies to write. – Make sure they pertain to compliance, for example employee dress code is not a compliance policy. Check chapter 15 for some ideas on policy topics. Check the AHIMA website for examples of how policies are formatted. You may place the policies in the slides so they are in the order you are discussing them, or you may make them appendices at the end of your presentation.
  11. Choose two compliance policies to write. – Make sure they pertain to compliance, for example employee dress code is not a compliance policy. Check chapter 15 for some ideas on policy topics. Check the AHIMA website for examples of how policies are formatted. You may place the policies in the slides so they are in the order you are discussing them, or you may make them appendices at the end of your presentation.
  12. Choose two compliance policies to write. – Make sure they pertain to compliance, for example employee dress code is not a compliance policy. Check chapter 15 for some ideas on policy topics. Check the AHIMA website for examples of how policies are formatted. You may place the policies in the slides so they are in the order you are discussing them, or you may make them appendices at the end of your presentation.
  13. Choose two compliance policies to write. – Make sure they pertain to compliance, for example employee dress code is not a compliance policy. Check chapter 15 for some ideas on policy topics. Check the AHIMA website for examples of how policies are formatted. You may place the policies in the slides so they are in the order you are discussing them, or you may make them appendices at the end of your presentation.
  14. Choose two compliance policies to write. – Make sure they pertain to compliance, for example employee dress code is not a compliance policy. Check chapter 15 for some ideas on policy topics. Check the AHIMA website for examples of how policies are formatted. You may place the policies in the slides so they are in the order you are discussing them, or you may make them appendices at the end of your presentation.
  15. Choose two compliance policies to write. – Make sure they pertain to compliance, for example employee dress code is not a compliance policy. Check chapter 15 for some ideas on policy topics. Check the AHIMA website for examples of how policies are formatted. You may place the policies in the slides so they are in the order you are discussing them, or you may make them appendices at the end of your presentation.
  16. Choose two compliance policies to write. – Make sure they pertain to compliance, for example employee dress code is not a compliance policy. Check chapter 15 for some ideas on policy topics. Check the AHIMA website for examples of how policies are formatted. You may place the policies in the slides so they are in the order you are discussing them, or you may make them appendices at the end of your presentation.
  17. Choose two compliance policies to write. – Make sure they pertain to compliance, for example employee dress code is not a compliance policy. Check chapter 15 for some ideas on policy topics. Check the AHIMA website for examples of how policies are formatted. You may place the policies in the slides so they are in the order you are discussing them, or you may make them appendices at the end of your presentation. procedures for guarding against, detecting, and reporting malicious software.  Malicious software refers to viruses, worms, Trojan horses and backdoor programs. Malicious software either has negative behaviors or is used by attackers to further their goals of attacking enterprise networks and systems. The key difference between the types of malicious software is their means of spreading. Entities should utilize policy, education and awareness, and technical prevention and detection controls best suited for their environments, to avoid introduction and exploitation of malicious software in state information systems.
  18. Choose two compliance policies to write. – Make sure they pertain to compliance, for example employee dress code is not a compliance policy. Check chapter 15 for some ideas on policy topics. Check the AHIMA website for examples of how policies are formatted. You may place the policies in the slides so they are in the order you are discussing them, or you may make them appendices at the end of your presentation.
  19. Choose two compliance policies to write. – Make sure they pertain to compliance, for example employee dress code is not a compliance policy. Check chapter 15 for some ideas on policy topics. Check the AHIMA website for examples of how policies are formatted. You may place the policies in the slides so they are in the order you are discussing them, or you may make them appendices at the end of your presentation.
  20. Choose two compliance policies to write. – Make sure they pertain to compliance, for example employee dress code is not a compliance policy. Check chapter 15 for some ideas on policy topics. Check the AHIMA website for examples of how policies are formatted. You may place the policies in the slides so they are in the order you are discussing them, or you may make them appendices at the end of your presentation.
  21. Choose two compliance policies to write. – Make sure they pertain to compliance, for example employee dress code is not a compliance policy. Check chapter 15 for some ideas on policy topics. Check the AHIMA website for examples of how policies are formatted. You may place the policies in the slides so they are in the order you are discussing them, or you may make them appendices at the end of your presentation.
  22. Develop a competency exam for participants to take after viewing the slide presentation. At least 10 questions (please provide answers). Document the “passing” score of the exam at the top of the page.   Keep this document handy to use as a check off sheet. Start early; this assignment cannot be completed in just a few days. If you have any questions, please contact me via email as soon as possible. You are encouraged to use the writing center for questions regarding grammar, APA formatting etc.
  23. Provide a reference page as the last slide in your presentation (APA format). You should not have in-text citations on the slides, as they should be your own thoughts and words. At least three credible sources must be used to conduct your research. Make sure the slide presentation flows smoothly from topic to topic. Check Spelling and Grammar. Number of pages for thorough training with sufficient details to explain content as well as providing content examples is expected.  This is a major assignment. Past students who presented 15 or more slides of non-repetitive content, did well on this assignment.
  24. ePHI Quiz Passing 6 out of 10   What does ePHI stand for? Electronic protected health information   Give an example of a breach of ePHI? Sharing passwords Sending ePHI though carriers with whom there is no B.A. Agreement Losing a lap top with unencrypted ePHI   What should be done if there is a breach of ePHI? Report to office manager.   Who is contacted in case of a breach? OCR website publishes breach information Media alerted over 500 patient’s breached   Who are covered entities? Health care professionals and employees Business Associates Persons designated by state statute in addition to those entities named above   What kind of training must you have to work with ePHI? HIPAA Ongoing security evaluation for ePHI is a stated requirement of HIPAA. What should you do if you observe a security violation of ePHI? Report to office manager.   The business associate must appropriately safeguard the information health care information by the same standards as the covered entity. True or False True   The covered entity must create contingency plans in the event of software / hardware failure or natural disaster. True or False True   As a covered entity we must implement policies and procedures to prevent, detect, contain and correct security violations True or False True
  25. Provide a reference page as the last slide in your presentation (APA format). You should not have in-text citations on the slides, as they should be your own thoughts and words. At least three credible sources must be used to conduct your research. Make sure the slide presentation flows smoothly from topic to topic. Check Spelling and Grammar. Number of pages for thorough training with sufficient details to explain content as well as providing content examples is expected.  This is a major assignment. Past students who presented 15 or more slides of non-repetitive content, did well on this assignment.