SlideShare a Scribd company logo
Introduction to
Health Insurance Portability and
Accountability Act (HIPAA)
Privacy and Security Rules
Speaker: Chenyu Lee
1
HIPAA Background
• 1996. Health Insurance Portability and Accountability Act (HIPAA), Public
Law 104-191.
– Department of Health and Human Services (HHS) adopts national standards for
electronic health care transactions and code sets, unique health identifiers, and security.
• 2009. Health Information Technology for Economic and Clinical Health Act
(HITECH) enacted as part of the American Recovery and Reinvestment Act
of 2009 (ARRA).
• 2010. Patient Protection and Affordable Care Act of 2010 (ACA).
• 2013. HIPAA Omnibus Rule makes changes to existing privacy, security and
breach notification requirements.
2
HIPAA Regulations
• CFR 45 PART 160: General administrative requirements
• CFR 45 PART 162: Administrative requirements
• CFR 45 PART 164: Security and privacy rules
3
DEFINITIONS
§ 160.103
4
Business Associate
• Business Associate includes the partners that may provide
legal, actuarial, accounting, consulting, data aggregation,
management, administration or financial services wherein the
services require the disclosure of individually identifiable
health information.
• A key concern, among many, is that some software vendors
almost certainly will be categorized as Business Associates.
5
Covered Entity & Electronic Media
• Covered Entity means:
– A health plan
– A health care clearinghouse
– A health care provider who transmits any health information in electronic
form in connection with a transaction covered by this subchapter.
• Electronic media means:
– Electronic storage material on which data is or may be recorded electronically.
– Transmission media used to exchange information already in electronic
storage media.
6
Health Care & Health Care Provider
& Health information
• Health care means:
– Care, services, or supplies related to the health of an individual.
• Health care provider means:
– A provider of medical or health services, and any other person or organization
who furnishes, bills, or is paid for health care in the normal course of business.
• Health information means:
– Any information, whether oral or recorded in any form or medium.
7
Individual &
Individually Identifiable Health Information &
Protected Health Information (PHI)
• Individual means:
– The person who is the subject of protected health information.
• Individually identifiable health information that
– Identifies the individual
– Or with respect to which there is a reasonable basis to believe the information
can be used to identify the individual.
• Protected health information means:
– Individually identifiable health information that is
• Transmitted by electronic media
• Maintained in electronic media
• Transmitted or maintained in any other form or medium
8
PHI Includes One or More of Identifiers
(§164.514(b)(2)(i))
– Names
– Addresses including Zip
Codes
– All Dates
– Telephone & Fax Numbers
– Email Addresses
– Social Security Numbers
– Medical Record Numbers
– Health Plan Numbers
– License Numbers
– Vehicle Identification
Numbers
– Account Numbers
– Biometric Identifiers
– Full Face Photos
– Any Other Unique
Identifying Number,
Characteristic, or Code
9
Use and Disclosure of PHI
• Use of PHI refers to how PHI is internally accessed, shared and
utilized by the covered entity that maintains such information.
• Disclosure of PHI refers to how PHI is shared with individuals
or entities externally.
10
Notice of Privacy Practices (NPP)
• Notice of Privacy Practices means:
– Providers and Health Plans must have a Notice of Privacy Practices (NPP)
• It provides a detailed description of the various uses and disclosures of PHI that are
permissible without obtaining a patient’s authorization.
– In general, anytime you release patient information for a reason unrelated to
treatment, payment (e.g., billing) or healthcare operations (TPO), an
authorization is required.
11
Treatment, Payment and Operations (TPO)
• Treatment: Various activities related to patient care.
• Payment: Various activities related to paying for or getting
paid for health care services.
• Health Care Operations: Generally refers to day-to-day
activities of a covered entity, such as planning, management,
training, improving quality, providing services, and education.
• NOTE:
– Research is not considered TPO.
– Written patient authorization is required to access PHI for research unless
authorization waiver is approved by the Institutional Review Board (IRB).
12
SECURITY RULES
§ 164.3xx
13
General Rule (§164.306)
• General requirements:
– Ensure the confidentiality, integrity, and availability of all its ePHI.
– Protect against any reasonably anticipated threats or hazards of its ePHI.
– Protect against any reasonably anticipated uses or disclosures of ePHI not
permitted.
• Implementation specifications.
– Required specifications must be implemented.
– Addressable specifications must be assessed and implemented as specified if
reasonable and appropriate to the Covered Entity.
• Maintenance.
14
Administrative Safeguards (§164.308(a))
– Security management process
– Assigned security
responsibility
– Workforce security
– Information access
management
– Security awareness and
training
– Security incident procedures
– Contingency plan
– Evaluation
15
Physical Safeguards (§164.310)
• Facility access controls.
• Workstation use.
• Workstation security.
• Device and media controls.
16
Policies and Procedures and Documentation
Requirements. (§164.316(b)(2))
• Time limit.
– Retain the documentation required for 6 years from the date of its
creation or the date when it last was in effect, whichever is later.
• Availability
• Updates
17
Technical Safeguards (§164.312)
• Access control.
• Audit controls.
• Integrity.
• Person or entity authentication.
• Transmission security.
18
PRIVACY RULES
§ 164.5xx
19
Required/Addressable Specifications of
Security Standards
Standards Specifications Sections
Risk Analysis 164.308(a)(1)(ii)(A)
Risk Management 164.308(a)(1)(ii)(B)
Sanction Policy 164.308(a)(1)(ii)(C)
Information System Activity Review 164.308(a)(1)(ii)(D)
Assigned Security
Responsibility
Assigned Security Responsibility 164.308(a)(2)
Authorization and/or Supervision 164.308(a)(3)(ii)(A)
Workforce Clearance Procedure 164.308(a)(3)(ii)(B)
Termination Procedures 164.308(a)(3)(ii)(C)
Isolating Health care Clearinghouse Function 164.308(a)(4)(ii)(A)
Access Authorization 164.308(a)(4)(ii)(B)
Access Establishment and Modification 164.308(a)(4)(ii)(C)
Security Reminders 164.308(a)(5)(ii)(A)
Log-in Monitoring 164.308(a)(5)(ii)(B)
Protection from Malicious Software 164.308(a)(5)(ii)(C)
Password Management 164.308(a)(5)(ii)(D)
Security Incident Procedures Response and Reporting 164.308(a)(6)
Data Backup Plan 164.308(a)(7)(ii)(A)
Disaster Recovery Plan 164.308(a)(7)(ii)(B)
Emergency Mode Operation Plan 164.308(a)(7)(ii)(C)
Testing and Revision Procedure 164.308(a)(7)(ii)(D)
Applications and Data Criticality Analysis 164.308(a)(7)(ii)(E)
Evaluation Evaluation 164.308(a)(8)
Business Associate Contracts
and Other Arrangement
Written Contract or Other Arrangement 164.308(b)(3)
Security Management Process
Workforce Security
Information Access
Mangement
Security Awareness and
Training
Contingency Plan
20
Required/Addressable Specifications of
Security Standards
Standards Specifications Sections
Contingency Operations 164.310(a)(2)(i)
Facility Security Plan 164.310(a)(2)(ii)
Access Control and Validation Procedures 164.310(a)(2)(iii)
Maintenance Records 164.310(a)(2)(iv)
Workstation Use Workstation Use 164.310(b)
Workstation Security Workstation Security 164.310(c)
Disposal 164.310(d)(2)(i)
Media Re-use 164.310(d)(1)(2)(ii)
Accountability 164.310(d)(2)(iii)
Data Backup and Storage 164.310(d)(2)(iv)
Unique User Identification 164.312(a)(2)(i)
Emergency Access Procedure 164.312(a)(2)(ii)
Automatic Logoff 164.312(a)(2)(iii)
Encryption and Decryption 164.312(a)(2)(iv)
Audit Controls Audit Controls 164.312(b)
Integrity Mechanism to Authenticate Electronic Protecte164.312(c)(1)
Person or Entity
Authentication
Person or Entity Authentication 164.312(d)
Integrity Controls 164.312(e)(2)(i)
Encryption 164.312(e)(2)(ii)
Time Limit 164.316(b)(2)(i)
Avilability 164.316(b)(2)(ii)
Update 164.316(b)(2)(iii)
Documentation
Device and Media Control
Access Control
Transmission Security
Facility Access Control
21
Minimum Necessary Rule (§164.502(b))
• Generally, the amount of PHI used, shared, accessed or
requested must be limited to only what is needed.
• Workers should access or use only the PHI necessary to carry
out their job responsibilities.
22
Authorization (§164.508)
• A covered entity may not use or disclose protected health
information for reasons generally not related to treatment,
payment or healthcare operations without an authorization.
• The Authorization must include:
– A detailed description of the PHI to be disclosed, who will make the disclosure,
to whom the disclosure will be made, expiration date, the purpose of the
disclosure, and signature.
– The individual's right to revoke, the ability or inability to condition usage, and
the potential for information disclosed.
23
Types of Disclosures
• No Authorization Required (§ 164.512)
• Authorization Required, but Must Give Opportunity to Object
(§ 164.510)
• Authorization Required (§ 164.508)
24
Uses and Disclosures for Which An Authorization or
Opportunity to Agree or Object Is Not Required
• To disclose PHI to the patient (§ 164.502)
• To use or disclose PHI for treatment, payment or healthcare
operations. (§ 164.502)
• Certain disclosures required by law (for example, public health
reporting of diseases, child abuse/neglect cases, etc.)
(§ 164.512(a)-(l))
25
Uses and Disclosures for Which An Authorization
Is Required
• A covered entity may not use or disclose protected health
information without an authorization. (§ 164.508(a)(1))
• To access, use or disclose PHI for research (§ 164.512(i)(1)(i))
• For marketing activities and sale of PHI (§ 164.508(a)(3))
26
Uses and Disclosures Requiring An Opportunity
for The Individual to Agree or to Object
• The Patient must be offered an opportunity to object before
discussing PHI with a patient’s family or friends.
(§ 164.510(b)(1)(i))
• Limited PHI (e.g., patient’s hospital room/location number) is
included in the “Hospital Directory” but patients are offered
an “Opt Out” opportunity and certain disclosures to clergy
members. (§ 164.510(b)(3))
• Exception: Emergency circumstances (§ 164.510(a)(3))
27
Breach (§164.402(b))
• Breach means the acquisition, access, use, or disclosure of
protected health information in a manner not permitted
under privacy rules.
• Amount of a civil money penalty.
– In the amount of less than $100 or more than $50,000 for each violation
– In excess of $1,500,000 for identical violations during a calendar year
• Criminal Liability
– Offenses committed with the intent to sell, transfer, or use individually
identifiable health information for commercial advantage, personal gain or
malicious harm permit fines of $250,000 and imprisonment for up to ten
years.
28
Companies & Fines
Entity Fined Fine Violation
CIGNET (Feb, 2011) $4,300,000 Online database application error.
Alaska Department of Health
and Human Services (June, 2012)
$1,700,000 Unencrypted USB hard drive stolen, poor policies and
risk analysis.
WellPoint (Sep, 2012) $1,700,000 Did not have technical safeguards in
place to verify the person/entity seeking access to PHI
in the database. Failed to conduct a technical evaluation
in response to software upgrade.
Blue Cross Blue Shield of
Tennessee (Mar, 2012)
$1,500,000 57 unencrypted hard drives stolen.
Massachusetts Eye and Ear Infirmary and
Massachusetts Eye and Ear Associates
(Sep, 2012)
$1,500,000 Unencrypted laptop stolen, poor risk
analysis, policies.
Affinity Health Plan (Aug, 2013) $1,215,780 Returned photocopiers without erasing the hard drives.
South Shore Hospital (May, 2012) $750,000 Backup tapes went missing on the way to contractor.
Idaho State University (May, 2013) $400,000 Breach of unsecured ePHI.
29
THANKS FOR LISTENING
30

More Related Content

What's hot

Hipaa and social media using new
Hipaa and social media using newHipaa and social media using new
Hipaa and social media using new
OnlineAudio Training
 
What You Don’t Know About the HIPAA Security Rule
What You Don’t Know About the HIPAA Security RuleWhat You Don’t Know About the HIPAA Security Rule
What You Don’t Know About the HIPAA Security Rule
Cooperative of American Physicians, Inc.
 
Documentation in acute care chapter 5
Documentation in acute care chapter 5Documentation in acute care chapter 5
Documentation in acute care chapter 5
Byamba Uranchimeg
 
HIPAA Training: Privacy Review and Audit Survival Guide
HIPAA Training: Privacy Review and Audit Survival GuideHIPAA Training: Privacy Review and Audit Survival Guide
HIPAA Training: Privacy Review and Audit Survival Guide
benefitexpress
 
HIPAA and How it Applies to You
HIPAA and How it Applies to YouHIPAA and How it Applies to You
HIPAA and How it Applies to You
Winston & Strawn LLP
 
Health insurance portability and act(hipaa)2
Health insurance portability and act(hipaa)2Health insurance portability and act(hipaa)2
Health insurance portability and act(hipaa)2
9535814851
 
HIPAA
HIPAAHIPAA
HIPAA
kgriffin62
 
Annual HIPAA Training
Annual HIPAA TrainingAnnual HIPAA Training
Annual HIPAA Training
Cynthia Holland
 
Knowing confidentiality
Knowing confidentialityKnowing confidentiality
Knowing confidentiality
jessie66
 
2017 HIPAA Clinical Research Training
2017 HIPAA Clinical Research Training2017 HIPAA Clinical Research Training
2017 HIPAA Clinical Research Training
Cynthia Holland
 
Keys To HIPAA Compliance
Keys To HIPAA ComplianceKeys To HIPAA Compliance
Keys To HIPAA Compliance
CBIZ, Inc.
 
Hipaa journal com - HIPAA compliance guide
Hipaa journal com - HIPAA compliance guideHipaa journal com - HIPAA compliance guide
Hipaa journal com - HIPAA compliance guide
Felipe Prado
 
HIPAA Compliance
HIPAA ComplianceHIPAA Compliance
HIPAA Compliance
Manny Oliverez
 
HIPAA for Dummies
HIPAA for DummiesHIPAA for Dummies
HIPAA for Dummies
hipaacompliance
 
Health Insurance Portability and Accountability Act (HIPPA) - Kloudlearn
Health Insurance Portability and Accountability Act (HIPPA) - KloudlearnHealth Insurance Portability and Accountability Act (HIPPA) - Kloudlearn
Health Insurance Portability and Accountability Act (HIPPA) - Kloudlearn
KloudLearn
 
The Basics of HIPAA
The Basics of HIPAA The Basics of HIPAA
The Basics of HIPAA
DamianKnowles1
 
Patient Privacy Provisions of the HITECH Act Implications for Patients and Sm...
Patient Privacy Provisions of the HITECH Act Implications for Patients and Sm...Patient Privacy Provisions of the HITECH Act Implications for Patients and Sm...
Patient Privacy Provisions of the HITECH Act Implications for Patients and Sm...
Xiaoming Zeng
 
Hipaa in clinical trails
Hipaa in clinical trailsHipaa in clinical trails
Hipaa in clinical trails
Tejaswi Reddy
 

What's hot (20)

Hipaa and social media using new
Hipaa and social media using newHipaa and social media using new
Hipaa and social media using new
 
What You Don’t Know About the HIPAA Security Rule
What You Don’t Know About the HIPAA Security RuleWhat You Don’t Know About the HIPAA Security Rule
What You Don’t Know About the HIPAA Security Rule
 
Documentation in acute care chapter 5
Documentation in acute care chapter 5Documentation in acute care chapter 5
Documentation in acute care chapter 5
 
HIPAA Training: Privacy Review and Audit Survival Guide
HIPAA Training: Privacy Review and Audit Survival GuideHIPAA Training: Privacy Review and Audit Survival Guide
HIPAA Training: Privacy Review and Audit Survival Guide
 
Hipaa
HipaaHipaa
Hipaa
 
HIPAA and How it Applies to You
HIPAA and How it Applies to YouHIPAA and How it Applies to You
HIPAA and How it Applies to You
 
Health insurance portability and act(hipaa)2
Health insurance portability and act(hipaa)2Health insurance portability and act(hipaa)2
Health insurance portability and act(hipaa)2
 
HIPAA
HIPAAHIPAA
HIPAA
 
Annual HIPAA Training
Annual HIPAA TrainingAnnual HIPAA Training
Annual HIPAA Training
 
Knowing confidentiality
Knowing confidentialityKnowing confidentiality
Knowing confidentiality
 
2017 HIPAA Clinical Research Training
2017 HIPAA Clinical Research Training2017 HIPAA Clinical Research Training
2017 HIPAA Clinical Research Training
 
Keys To HIPAA Compliance
Keys To HIPAA ComplianceKeys To HIPAA Compliance
Keys To HIPAA Compliance
 
Hipaa journal com - HIPAA compliance guide
Hipaa journal com - HIPAA compliance guideHipaa journal com - HIPAA compliance guide
Hipaa journal com - HIPAA compliance guide
 
HIPAA Compliance
HIPAA ComplianceHIPAA Compliance
HIPAA Compliance
 
HIPAA for Dummies
HIPAA for DummiesHIPAA for Dummies
HIPAA for Dummies
 
Health Insurance Portability and Accountability Act (HIPPA) - Kloudlearn
Health Insurance Portability and Accountability Act (HIPPA) - KloudlearnHealth Insurance Portability and Accountability Act (HIPPA) - Kloudlearn
Health Insurance Portability and Accountability Act (HIPPA) - Kloudlearn
 
The Basics of HIPAA
The Basics of HIPAA The Basics of HIPAA
The Basics of HIPAA
 
Patient Privacy Provisions of the HITECH Act Implications for Patients and Sm...
Patient Privacy Provisions of the HITECH Act Implications for Patients and Sm...Patient Privacy Provisions of the HITECH Act Implications for Patients and Sm...
Patient Privacy Provisions of the HITECH Act Implications for Patients and Sm...
 
Hipaa in clinical trails
Hipaa in clinical trailsHipaa in clinical trails
Hipaa in clinical trails
 
HIPAA
HIPAAHIPAA
HIPAA
 

Viewers also liked

1895 In Taiwan
1895 In Taiwan1895 In Taiwan
1895 In Taiwan
Chris Lee
 
El Joc dels errors
El Joc dels errorsEl Joc dels errors
El Joc dels errorscio
 
Zune
ZuneZune
Thirst 地球是枯渴的
Thirst 地球是枯渴的Thirst 地球是枯渴的
Thirst 地球是枯渴的Chris Lee
 
比考試和成績更重要的事
比考試和成績更重要的事比考試和成績更重要的事
比考試和成績更重要的事Chris Lee
 
Super Smash Brothers Brawl Characters
Super Smash Brothers Brawl CharactersSuper Smash Brothers Brawl Characters
Super Smash Brothers Brawl Characters
gueste8c898
 
Shelley Atkins Cis 516 Op Manager
Shelley Atkins  Cis 516 Op ManagerShelley Atkins  Cis 516 Op Manager
Shelley Atkins Cis 516 Op Managershelleyatkins
 
Alg1f Nov 28
Alg1f Nov 28Alg1f Nov 28
Alg1f Nov 28
guestf24f78
 
Apresentação GDG Natal FLISOL NATAL 2013
Apresentação GDG Natal FLISOL NATAL 2013Apresentação GDG Natal FLISOL NATAL 2013
Apresentação GDG Natal FLISOL NATAL 2013
Mayron Cachina
 
7招搶救過勞眼睛
7招搶救過勞眼睛7招搶救過勞眼睛
7招搶救過勞眼睛Chris Lee
 
El Joc Dels Errors1
El Joc Dels Errors1El Joc Dels Errors1
El Joc Dels Errors1cio
 
餓是今生最深的記憶 朱炎
餓是今生最深的記憶 朱炎餓是今生最深的記憶 朱炎
餓是今生最深的記憶 朱炎Chris Lee
 
Alg1e Nov 28
Alg1e Nov 28Alg1e Nov 28
Alg1e Nov 28
guestf24f78
 
Alg1f Jan10
Alg1f Jan10Alg1f Jan10
Alg1f Jan10
guestf24f78
 
GöLler Ve Olusumlari
GöLler Ve OlusumlariGöLler Ve Olusumlari
GöLler Ve Olusumlaripilaki
 

Viewers also liked (19)

Miro1
Miro1Miro1
Miro1
 
1895 In Taiwan
1895 In Taiwan1895 In Taiwan
1895 In Taiwan
 
Alg2
Alg2Alg2
Alg2
 
El Joc dels errors
El Joc dels errorsEl Joc dels errors
El Joc dels errors
 
Zune
ZuneZune
Zune
 
Auca1 5è
Auca1 5èAuca1 5è
Auca1 5è
 
Thirst 地球是枯渴的
Thirst 地球是枯渴的Thirst 地球是枯渴的
Thirst 地球是枯渴的
 
比考試和成績更重要的事
比考試和成績更重要的事比考試和成績更重要的事
比考試和成績更重要的事
 
Super Smash Brothers Brawl Characters
Super Smash Brothers Brawl CharactersSuper Smash Brothers Brawl Characters
Super Smash Brothers Brawl Characters
 
Auca1 5è
Auca1 5èAuca1 5è
Auca1 5è
 
Shelley Atkins Cis 516 Op Manager
Shelley Atkins  Cis 516 Op ManagerShelley Atkins  Cis 516 Op Manager
Shelley Atkins Cis 516 Op Manager
 
Alg1f Nov 28
Alg1f Nov 28Alg1f Nov 28
Alg1f Nov 28
 
Apresentação GDG Natal FLISOL NATAL 2013
Apresentação GDG Natal FLISOL NATAL 2013Apresentação GDG Natal FLISOL NATAL 2013
Apresentação GDG Natal FLISOL NATAL 2013
 
7招搶救過勞眼睛
7招搶救過勞眼睛7招搶救過勞眼睛
7招搶救過勞眼睛
 
El Joc Dels Errors1
El Joc Dels Errors1El Joc Dels Errors1
El Joc Dels Errors1
 
餓是今生最深的記憶 朱炎
餓是今生最深的記憶 朱炎餓是今生最深的記憶 朱炎
餓是今生最深的記憶 朱炎
 
Alg1e Nov 28
Alg1e Nov 28Alg1e Nov 28
Alg1e Nov 28
 
Alg1f Jan10
Alg1f Jan10Alg1f Jan10
Alg1f Jan10
 
GöLler Ve Olusumlari
GöLler Ve OlusumlariGöLler Ve Olusumlari
GöLler Ve Olusumlari
 

Similar to HIPAA2

health insurance portability and accountability act.pptx
health insurance portability and accountability act.pptxhealth insurance portability and accountability act.pptx
health insurance portability and accountability act.pptx
amartya2087
 
MHA690 confidentiality training
MHA690 confidentiality trainingMHA690 confidentiality training
MHA690 confidentiality trainingsdavis49
 
MPCA HIPAA Compliance/Meaningful Use Requirements and Security Risk Assessmen...
MPCA HIPAA Compliance/Meaningful Use Requirements and Security Risk Assessmen...MPCA HIPAA Compliance/Meaningful Use Requirements and Security Risk Assessmen...
MPCA HIPAA Compliance/Meaningful Use Requirements and Security Risk Assessmen...
Michigan Primary Care Association
 
Legal implications of HIPAA, HITECH and BAAs
Legal implications of HIPAA, HITECH and BAAsLegal implications of HIPAA, HITECH and BAAs
Legal implications of HIPAA, HITECH and BAAsOnline Tech
 
Health Insurance Portability & Accountability Act (HIPAA)
Health Insurance Portability & Accountability Act (HIPAA)Health Insurance Portability & Accountability Act (HIPAA)
Health Insurance Portability & Accountability Act (HIPAA)
Arpitha Aarushi
 
HIPAA/HITECH Requirements for FQHCs and the New Omnibus Rule
HIPAA/HITECH Requirements for FQHCs and the New Omnibus RuleHIPAA/HITECH Requirements for FQHCs and the New Omnibus Rule
HIPAA/HITECH Requirements for FQHCs and the New Omnibus Rule
Michigan Primary Care Association
 
Overview on data privacy
Overview on data privacy Overview on data privacy
Overview on data privacy
Amiit Keshav Naik
 
Privacy, Confidentiality, and Security Lecture 2_slides
Privacy, Confidentiality, and Security Lecture 2_slidesPrivacy, Confidentiality, and Security Lecture 2_slides
Privacy, Confidentiality, and Security Lecture 2_slides
ZakCooper1
 
hipaa by roy.pptx
hipaa by roy.pptxhipaa by roy.pptx
hipaa by roy.pptx
SubhamRoy63
 
Patient confidentiality
Patient confidentialityPatient confidentiality
Patient confidentiality
Jake Facer
 
Comp8 unit6a lecture_slides
Comp8 unit6a lecture_slidesComp8 unit6a lecture_slides
Comp8 unit6a lecture_slides
CMDLMS
 
Keynote Presentation "Building a Culture of Privacy and Security into Your Or...
Keynote Presentation "Building a Culture of Privacy and Security into Your Or...Keynote Presentation "Building a Culture of Privacy and Security into Your Or...
Keynote Presentation "Building a Culture of Privacy and Security into Your Or...
Health IT Conference – iHT2
 
Billings
BillingsBillings
Hippa privacy and security awareness
Hippa privacy and security awarenessHippa privacy and security awareness
Hippa privacy and security awareness
Charles Taft
 
HIPAA Rights Privacy and Enforcements RD.pptx
HIPAA Rights  Privacy and Enforcements RD.pptxHIPAA Rights  Privacy and Enforcements RD.pptx
HIPAA Rights Privacy and Enforcements RD.pptx
RAJIV RANJAN DAS
 
Hitech changes-to-hipaa
Hitech changes-to-hipaaHitech changes-to-hipaa
Hitech changes-to-hipaageeksikh
 
Hipaa for business associates simple
Hipaa for business associates   simpleHipaa for business associates   simple
Hipaa for business associates simple
Jose Ivan Delgado, Ph.D.
 
How to avoid being caught out by HIPAA compliance?
How to avoid being caught out by HIPAA compliance?How to avoid being caught out by HIPAA compliance?
How to avoid being caught out by HIPAA compliance?
Lepide USA Inc
 
HIPAA and FDCPA Compliance for Process Servers
HIPAA and FDCPA Compliance for Process ServersHIPAA and FDCPA Compliance for Process Servers
HIPAA and FDCPA Compliance for Process Servers
Lawgical
 

Similar to HIPAA2 (20)

health insurance portability and accountability act.pptx
health insurance portability and accountability act.pptxhealth insurance portability and accountability act.pptx
health insurance portability and accountability act.pptx
 
MHA690 confidentiality training
MHA690 confidentiality trainingMHA690 confidentiality training
MHA690 confidentiality training
 
MPCA HIPAA Compliance/Meaningful Use Requirements and Security Risk Assessmen...
MPCA HIPAA Compliance/Meaningful Use Requirements and Security Risk Assessmen...MPCA HIPAA Compliance/Meaningful Use Requirements and Security Risk Assessmen...
MPCA HIPAA Compliance/Meaningful Use Requirements and Security Risk Assessmen...
 
Legal implications of HIPAA, HITECH and BAAs
Legal implications of HIPAA, HITECH and BAAsLegal implications of HIPAA, HITECH and BAAs
Legal implications of HIPAA, HITECH and BAAs
 
Health Insurance Portability & Accountability Act (HIPAA)
Health Insurance Portability & Accountability Act (HIPAA)Health Insurance Portability & Accountability Act (HIPAA)
Health Insurance Portability & Accountability Act (HIPAA)
 
HIPAA/HITECH Requirements for FQHCs and the New Omnibus Rule
HIPAA/HITECH Requirements for FQHCs and the New Omnibus RuleHIPAA/HITECH Requirements for FQHCs and the New Omnibus Rule
HIPAA/HITECH Requirements for FQHCs and the New Omnibus Rule
 
Overview on data privacy
Overview on data privacy Overview on data privacy
Overview on data privacy
 
Data Management Protection Acts
Data Management Protection ActsData Management Protection Acts
Data Management Protection Acts
 
Privacy, Confidentiality, and Security Lecture 2_slides
Privacy, Confidentiality, and Security Lecture 2_slidesPrivacy, Confidentiality, and Security Lecture 2_slides
Privacy, Confidentiality, and Security Lecture 2_slides
 
hipaa by roy.pptx
hipaa by roy.pptxhipaa by roy.pptx
hipaa by roy.pptx
 
Patient confidentiality
Patient confidentialityPatient confidentiality
Patient confidentiality
 
Comp8 unit6a lecture_slides
Comp8 unit6a lecture_slidesComp8 unit6a lecture_slides
Comp8 unit6a lecture_slides
 
Keynote Presentation "Building a Culture of Privacy and Security into Your Or...
Keynote Presentation "Building a Culture of Privacy and Security into Your Or...Keynote Presentation "Building a Culture of Privacy and Security into Your Or...
Keynote Presentation "Building a Culture of Privacy and Security into Your Or...
 
Billings
BillingsBillings
Billings
 
Hippa privacy and security awareness
Hippa privacy and security awarenessHippa privacy and security awareness
Hippa privacy and security awareness
 
HIPAA Rights Privacy and Enforcements RD.pptx
HIPAA Rights  Privacy and Enforcements RD.pptxHIPAA Rights  Privacy and Enforcements RD.pptx
HIPAA Rights Privacy and Enforcements RD.pptx
 
Hitech changes-to-hipaa
Hitech changes-to-hipaaHitech changes-to-hipaa
Hitech changes-to-hipaa
 
Hipaa for business associates simple
Hipaa for business associates   simpleHipaa for business associates   simple
Hipaa for business associates simple
 
How to avoid being caught out by HIPAA compliance?
How to avoid being caught out by HIPAA compliance?How to avoid being caught out by HIPAA compliance?
How to avoid being caught out by HIPAA compliance?
 
HIPAA and FDCPA Compliance for Process Servers
HIPAA and FDCPA Compliance for Process ServersHIPAA and FDCPA Compliance for Process Servers
HIPAA and FDCPA Compliance for Process Servers
 

More from Chris Lee

唐李氏歷史
唐李氏歷史唐李氏歷史
唐李氏歷史Chris Lee
 
美加医界:10个理由禁儿童用电子产品 Ten reason for prohibiting kids from using electronic devices
美加医界:10个理由禁儿童用电子产品 Ten reason for prohibiting kids from using electronic devices美加医界:10个理由禁儿童用电子产品 Ten reason for prohibiting kids from using electronic devices
美加医界:10个理由禁儿童用电子产品 Ten reason for prohibiting kids from using electronic devices
Chris Lee
 
Algorithm2e package for Latex
Algorithm2e package for LatexAlgorithm2e package for Latex
Algorithm2e package for Latex
Chris Lee
 
留住北京胡同
留住北京胡同留住北京胡同
留住北京胡同Chris Lee
 
北極熊母子情深
北極熊母子情深北極熊母子情深
北極熊母子情深Chris Lee
 
Proactive Behavior 前攝行為
Proactive Behavior 前攝行為Proactive Behavior 前攝行為
Proactive Behavior 前攝行為Chris Lee
 
聰明人必做的十件事
聰明人必做的十件事聰明人必做的十件事
聰明人必做的十件事
Chris Lee
 
早晨的第一杯
早晨的第一杯早晨的第一杯
早晨的第一杯Chris Lee
 
再別康橋及牛津
再別康橋及牛津再別康橋及牛津
再別康橋及牛津Chris Lee
 
海洋垃圾
海洋垃圾海洋垃圾
海洋垃圾
Chris Lee
 
北越下龍灣
北越下龍灣北越下龍灣
北越下龍灣Chris Lee
 
生命的勇氣
生命的勇氣生命的勇氣
生命的勇氣Chris Lee
 
一位老師的告白
一位老師的告白一位老師的告白
一位老師的告白Chris Lee
 
品格教育.天下
品格教育.天下品格教育.天下
品格教育.天下Chris Lee
 
台南小吃呷透透
台南小吃呷透透台南小吃呷透透
台南小吃呷透透Chris Lee
 
三則感人小故事
三則感人小故事三則感人小故事
三則感人小故事Chris Lee
 
我們這一代
我們這一代我們這一代
我們這一代Chris Lee
 
最高境界
最高境界最高境界
最高境界Chris Lee
 

More from Chris Lee (20)

唐李氏歷史
唐李氏歷史唐李氏歷史
唐李氏歷史
 
美加医界:10个理由禁儿童用电子产品 Ten reason for prohibiting kids from using electronic devices
美加医界:10个理由禁儿童用电子产品 Ten reason for prohibiting kids from using electronic devices美加医界:10个理由禁儿童用电子产品 Ten reason for prohibiting kids from using electronic devices
美加医界:10个理由禁儿童用电子产品 Ten reason for prohibiting kids from using electronic devices
 
Algorithm2e package for Latex
Algorithm2e package for LatexAlgorithm2e package for Latex
Algorithm2e package for Latex
 
留住北京胡同
留住北京胡同留住北京胡同
留住北京胡同
 
Gadgets
GadgetsGadgets
Gadgets
 
北極熊母子情深
北極熊母子情深北極熊母子情深
北極熊母子情深
 
Proactive Behavior 前攝行為
Proactive Behavior 前攝行為Proactive Behavior 前攝行為
Proactive Behavior 前攝行為
 
聰明人必做的十件事
聰明人必做的十件事聰明人必做的十件事
聰明人必做的十件事
 
早晨的第一杯
早晨的第一杯早晨的第一杯
早晨的第一杯
 
再別康橋及牛津
再別康橋及牛津再別康橋及牛津
再別康橋及牛津
 
海洋垃圾
海洋垃圾海洋垃圾
海洋垃圾
 
北越下龍灣
北越下龍灣北越下龍灣
北越下龍灣
 
生命的勇氣
生命的勇氣生命的勇氣
生命的勇氣
 
一位老師的告白
一位老師的告白一位老師的告白
一位老師的告白
 
品格教育.天下
品格教育.天下品格教育.天下
品格教育.天下
 
Dizzle
DizzleDizzle
Dizzle
 
台南小吃呷透透
台南小吃呷透透台南小吃呷透透
台南小吃呷透透
 
三則感人小故事
三則感人小故事三則感人小故事
三則感人小故事
 
我們這一代
我們這一代我們這一代
我們這一代
 
最高境界
最高境界最高境界
最高境界
 

Recently uploaded

planning for change nursing Management ppt
planning for change nursing Management pptplanning for change nursing Management ppt
planning for change nursing Management ppt
Thangamjayarani
 
Triangles of Neck and Clinical Correlation by Dr. RIG.pptx
Triangles of Neck and Clinical Correlation by Dr. RIG.pptxTriangles of Neck and Clinical Correlation by Dr. RIG.pptx
Triangles of Neck and Clinical Correlation by Dr. RIG.pptx
Dr. Rabia Inam Gandapore
 
heat stroke and heat exhaustion in children
heat stroke and heat exhaustion in childrenheat stroke and heat exhaustion in children
heat stroke and heat exhaustion in children
SumeraAhmad5
 
Maxilla, Mandible & Hyoid Bone & Clinical Correlations by Dr. RIG.pptx
Maxilla, Mandible & Hyoid Bone & Clinical Correlations by Dr. RIG.pptxMaxilla, Mandible & Hyoid Bone & Clinical Correlations by Dr. RIG.pptx
Maxilla, Mandible & Hyoid Bone & Clinical Correlations by Dr. RIG.pptx
Dr. Rabia Inam Gandapore
 
Pictures of Superficial & Deep Fascia.ppt.pdf
Pictures of Superficial & Deep Fascia.ppt.pdfPictures of Superficial & Deep Fascia.ppt.pdf
Pictures of Superficial & Deep Fascia.ppt.pdf
Dr. Rabia Inam Gandapore
 
micro teaching on communication m.sc nursing.pdf
micro teaching on communication m.sc nursing.pdfmicro teaching on communication m.sc nursing.pdf
micro teaching on communication m.sc nursing.pdf
Anurag Sharma
 
Dehradun #ℂall #gIRLS Oyo Hotel 9719300533 #ℂall #gIRL in Dehradun
Dehradun #ℂall #gIRLS Oyo Hotel 9719300533 #ℂall #gIRL in DehradunDehradun #ℂall #gIRLS Oyo Hotel 9719300533 #ℂall #gIRL in Dehradun
Dehradun #ℂall #gIRLS Oyo Hotel 9719300533 #ℂall #gIRL in Dehradun
chandankumarsmartiso
 
A Classical Text Review on Basavarajeeyam
A Classical Text Review on BasavarajeeyamA Classical Text Review on Basavarajeeyam
A Classical Text Review on Basavarajeeyam
Dr. Jyothirmai Paindla
 
CDSCO and Phamacovigilance {Regulatory body in India}
CDSCO and Phamacovigilance {Regulatory body in India}CDSCO and Phamacovigilance {Regulatory body in India}
CDSCO and Phamacovigilance {Regulatory body in India}
NEHA GUPTA
 
Ophthalmology Clinical Tests for OSCE exam
Ophthalmology Clinical Tests for OSCE examOphthalmology Clinical Tests for OSCE exam
Ophthalmology Clinical Tests for OSCE exam
KafrELShiekh University
 
Effective-Soaps-for-Fungal-Skin-Infections.pptx
Effective-Soaps-for-Fungal-Skin-Infections.pptxEffective-Soaps-for-Fungal-Skin-Infections.pptx
Effective-Soaps-for-Fungal-Skin-Infections.pptx
SwisschemDerma
 
KDIGO 2024 guidelines for diabetologists
KDIGO 2024 guidelines for diabetologistsKDIGO 2024 guidelines for diabetologists
KDIGO 2024 guidelines for diabetologists
د.محمود نجيب
 
Knee anatomy and clinical tests 2024.pdf
Knee anatomy and clinical tests 2024.pdfKnee anatomy and clinical tests 2024.pdf
Knee anatomy and clinical tests 2024.pdf
vimalpl1234
 
Non-respiratory Functions of the Lungs.pdf
Non-respiratory Functions of the Lungs.pdfNon-respiratory Functions of the Lungs.pdf
Non-respiratory Functions of the Lungs.pdf
MedicoseAcademics
 
Are There Any Natural Remedies To Treat Syphilis.pdf
Are There Any Natural Remedies To Treat Syphilis.pdfAre There Any Natural Remedies To Treat Syphilis.pdf
Are There Any Natural Remedies To Treat Syphilis.pdf
Little Cross Family Clinic
 
New Drug Discovery and Development .....
New Drug Discovery and Development .....New Drug Discovery and Development .....
New Drug Discovery and Development .....
NEHA GUPTA
 
Flu Vaccine Alert in Bangalore Karnataka
Flu Vaccine Alert in Bangalore KarnatakaFlu Vaccine Alert in Bangalore Karnataka
Flu Vaccine Alert in Bangalore Karnataka
addon Scans
 
Light House Retreats: Plant Medicine Retreat Europe
Light House Retreats: Plant Medicine Retreat EuropeLight House Retreats: Plant Medicine Retreat Europe
Light House Retreats: Plant Medicine Retreat Europe
Lighthouse Retreat
 
NVBDCP.pptx Nation vector borne disease control program
NVBDCP.pptx Nation vector borne disease control programNVBDCP.pptx Nation vector borne disease control program
NVBDCP.pptx Nation vector borne disease control program
Sapna Thakur
 
Sex determination from mandible pelvis and skull
Sex determination from mandible pelvis and skullSex determination from mandible pelvis and skull
Sex determination from mandible pelvis and skull
ShashankRoodkee
 

Recently uploaded (20)

planning for change nursing Management ppt
planning for change nursing Management pptplanning for change nursing Management ppt
planning for change nursing Management ppt
 
Triangles of Neck and Clinical Correlation by Dr. RIG.pptx
Triangles of Neck and Clinical Correlation by Dr. RIG.pptxTriangles of Neck and Clinical Correlation by Dr. RIG.pptx
Triangles of Neck and Clinical Correlation by Dr. RIG.pptx
 
heat stroke and heat exhaustion in children
heat stroke and heat exhaustion in childrenheat stroke and heat exhaustion in children
heat stroke and heat exhaustion in children
 
Maxilla, Mandible & Hyoid Bone & Clinical Correlations by Dr. RIG.pptx
Maxilla, Mandible & Hyoid Bone & Clinical Correlations by Dr. RIG.pptxMaxilla, Mandible & Hyoid Bone & Clinical Correlations by Dr. RIG.pptx
Maxilla, Mandible & Hyoid Bone & Clinical Correlations by Dr. RIG.pptx
 
Pictures of Superficial & Deep Fascia.ppt.pdf
Pictures of Superficial & Deep Fascia.ppt.pdfPictures of Superficial & Deep Fascia.ppt.pdf
Pictures of Superficial & Deep Fascia.ppt.pdf
 
micro teaching on communication m.sc nursing.pdf
micro teaching on communication m.sc nursing.pdfmicro teaching on communication m.sc nursing.pdf
micro teaching on communication m.sc nursing.pdf
 
Dehradun #ℂall #gIRLS Oyo Hotel 9719300533 #ℂall #gIRL in Dehradun
Dehradun #ℂall #gIRLS Oyo Hotel 9719300533 #ℂall #gIRL in DehradunDehradun #ℂall #gIRLS Oyo Hotel 9719300533 #ℂall #gIRL in Dehradun
Dehradun #ℂall #gIRLS Oyo Hotel 9719300533 #ℂall #gIRL in Dehradun
 
A Classical Text Review on Basavarajeeyam
A Classical Text Review on BasavarajeeyamA Classical Text Review on Basavarajeeyam
A Classical Text Review on Basavarajeeyam
 
CDSCO and Phamacovigilance {Regulatory body in India}
CDSCO and Phamacovigilance {Regulatory body in India}CDSCO and Phamacovigilance {Regulatory body in India}
CDSCO and Phamacovigilance {Regulatory body in India}
 
Ophthalmology Clinical Tests for OSCE exam
Ophthalmology Clinical Tests for OSCE examOphthalmology Clinical Tests for OSCE exam
Ophthalmology Clinical Tests for OSCE exam
 
Effective-Soaps-for-Fungal-Skin-Infections.pptx
Effective-Soaps-for-Fungal-Skin-Infections.pptxEffective-Soaps-for-Fungal-Skin-Infections.pptx
Effective-Soaps-for-Fungal-Skin-Infections.pptx
 
KDIGO 2024 guidelines for diabetologists
KDIGO 2024 guidelines for diabetologistsKDIGO 2024 guidelines for diabetologists
KDIGO 2024 guidelines for diabetologists
 
Knee anatomy and clinical tests 2024.pdf
Knee anatomy and clinical tests 2024.pdfKnee anatomy and clinical tests 2024.pdf
Knee anatomy and clinical tests 2024.pdf
 
Non-respiratory Functions of the Lungs.pdf
Non-respiratory Functions of the Lungs.pdfNon-respiratory Functions of the Lungs.pdf
Non-respiratory Functions of the Lungs.pdf
 
Are There Any Natural Remedies To Treat Syphilis.pdf
Are There Any Natural Remedies To Treat Syphilis.pdfAre There Any Natural Remedies To Treat Syphilis.pdf
Are There Any Natural Remedies To Treat Syphilis.pdf
 
New Drug Discovery and Development .....
New Drug Discovery and Development .....New Drug Discovery and Development .....
New Drug Discovery and Development .....
 
Flu Vaccine Alert in Bangalore Karnataka
Flu Vaccine Alert in Bangalore KarnatakaFlu Vaccine Alert in Bangalore Karnataka
Flu Vaccine Alert in Bangalore Karnataka
 
Light House Retreats: Plant Medicine Retreat Europe
Light House Retreats: Plant Medicine Retreat EuropeLight House Retreats: Plant Medicine Retreat Europe
Light House Retreats: Plant Medicine Retreat Europe
 
NVBDCP.pptx Nation vector borne disease control program
NVBDCP.pptx Nation vector borne disease control programNVBDCP.pptx Nation vector borne disease control program
NVBDCP.pptx Nation vector borne disease control program
 
Sex determination from mandible pelvis and skull
Sex determination from mandible pelvis and skullSex determination from mandible pelvis and skull
Sex determination from mandible pelvis and skull
 

HIPAA2

  • 1. Introduction to Health Insurance Portability and Accountability Act (HIPAA) Privacy and Security Rules Speaker: Chenyu Lee 1
  • 2. HIPAA Background • 1996. Health Insurance Portability and Accountability Act (HIPAA), Public Law 104-191. – Department of Health and Human Services (HHS) adopts national standards for electronic health care transactions and code sets, unique health identifiers, and security. • 2009. Health Information Technology for Economic and Clinical Health Act (HITECH) enacted as part of the American Recovery and Reinvestment Act of 2009 (ARRA). • 2010. Patient Protection and Affordable Care Act of 2010 (ACA). • 2013. HIPAA Omnibus Rule makes changes to existing privacy, security and breach notification requirements. 2
  • 3. HIPAA Regulations • CFR 45 PART 160: General administrative requirements • CFR 45 PART 162: Administrative requirements • CFR 45 PART 164: Security and privacy rules 3
  • 5. Business Associate • Business Associate includes the partners that may provide legal, actuarial, accounting, consulting, data aggregation, management, administration or financial services wherein the services require the disclosure of individually identifiable health information. • A key concern, among many, is that some software vendors almost certainly will be categorized as Business Associates. 5
  • 6. Covered Entity & Electronic Media • Covered Entity means: – A health plan – A health care clearinghouse – A health care provider who transmits any health information in electronic form in connection with a transaction covered by this subchapter. • Electronic media means: – Electronic storage material on which data is or may be recorded electronically. – Transmission media used to exchange information already in electronic storage media. 6
  • 7. Health Care & Health Care Provider & Health information • Health care means: – Care, services, or supplies related to the health of an individual. • Health care provider means: – A provider of medical or health services, and any other person or organization who furnishes, bills, or is paid for health care in the normal course of business. • Health information means: – Any information, whether oral or recorded in any form or medium. 7
  • 8. Individual & Individually Identifiable Health Information & Protected Health Information (PHI) • Individual means: – The person who is the subject of protected health information. • Individually identifiable health information that – Identifies the individual – Or with respect to which there is a reasonable basis to believe the information can be used to identify the individual. • Protected health information means: – Individually identifiable health information that is • Transmitted by electronic media • Maintained in electronic media • Transmitted or maintained in any other form or medium 8
  • 9. PHI Includes One or More of Identifiers (§164.514(b)(2)(i)) – Names – Addresses including Zip Codes – All Dates – Telephone & Fax Numbers – Email Addresses – Social Security Numbers – Medical Record Numbers – Health Plan Numbers – License Numbers – Vehicle Identification Numbers – Account Numbers – Biometric Identifiers – Full Face Photos – Any Other Unique Identifying Number, Characteristic, or Code 9
  • 10. Use and Disclosure of PHI • Use of PHI refers to how PHI is internally accessed, shared and utilized by the covered entity that maintains such information. • Disclosure of PHI refers to how PHI is shared with individuals or entities externally. 10
  • 11. Notice of Privacy Practices (NPP) • Notice of Privacy Practices means: – Providers and Health Plans must have a Notice of Privacy Practices (NPP) • It provides a detailed description of the various uses and disclosures of PHI that are permissible without obtaining a patient’s authorization. – In general, anytime you release patient information for a reason unrelated to treatment, payment (e.g., billing) or healthcare operations (TPO), an authorization is required. 11
  • 12. Treatment, Payment and Operations (TPO) • Treatment: Various activities related to patient care. • Payment: Various activities related to paying for or getting paid for health care services. • Health Care Operations: Generally refers to day-to-day activities of a covered entity, such as planning, management, training, improving quality, providing services, and education. • NOTE: – Research is not considered TPO. – Written patient authorization is required to access PHI for research unless authorization waiver is approved by the Institutional Review Board (IRB). 12
  • 14. General Rule (§164.306) • General requirements: – Ensure the confidentiality, integrity, and availability of all its ePHI. – Protect against any reasonably anticipated threats or hazards of its ePHI. – Protect against any reasonably anticipated uses or disclosures of ePHI not permitted. • Implementation specifications. – Required specifications must be implemented. – Addressable specifications must be assessed and implemented as specified if reasonable and appropriate to the Covered Entity. • Maintenance. 14
  • 15. Administrative Safeguards (§164.308(a)) – Security management process – Assigned security responsibility – Workforce security – Information access management – Security awareness and training – Security incident procedures – Contingency plan – Evaluation 15
  • 16. Physical Safeguards (§164.310) • Facility access controls. • Workstation use. • Workstation security. • Device and media controls. 16
  • 17. Policies and Procedures and Documentation Requirements. (§164.316(b)(2)) • Time limit. – Retain the documentation required for 6 years from the date of its creation or the date when it last was in effect, whichever is later. • Availability • Updates 17
  • 18. Technical Safeguards (§164.312) • Access control. • Audit controls. • Integrity. • Person or entity authentication. • Transmission security. 18
  • 20. Required/Addressable Specifications of Security Standards Standards Specifications Sections Risk Analysis 164.308(a)(1)(ii)(A) Risk Management 164.308(a)(1)(ii)(B) Sanction Policy 164.308(a)(1)(ii)(C) Information System Activity Review 164.308(a)(1)(ii)(D) Assigned Security Responsibility Assigned Security Responsibility 164.308(a)(2) Authorization and/or Supervision 164.308(a)(3)(ii)(A) Workforce Clearance Procedure 164.308(a)(3)(ii)(B) Termination Procedures 164.308(a)(3)(ii)(C) Isolating Health care Clearinghouse Function 164.308(a)(4)(ii)(A) Access Authorization 164.308(a)(4)(ii)(B) Access Establishment and Modification 164.308(a)(4)(ii)(C) Security Reminders 164.308(a)(5)(ii)(A) Log-in Monitoring 164.308(a)(5)(ii)(B) Protection from Malicious Software 164.308(a)(5)(ii)(C) Password Management 164.308(a)(5)(ii)(D) Security Incident Procedures Response and Reporting 164.308(a)(6) Data Backup Plan 164.308(a)(7)(ii)(A) Disaster Recovery Plan 164.308(a)(7)(ii)(B) Emergency Mode Operation Plan 164.308(a)(7)(ii)(C) Testing and Revision Procedure 164.308(a)(7)(ii)(D) Applications and Data Criticality Analysis 164.308(a)(7)(ii)(E) Evaluation Evaluation 164.308(a)(8) Business Associate Contracts and Other Arrangement Written Contract or Other Arrangement 164.308(b)(3) Security Management Process Workforce Security Information Access Mangement Security Awareness and Training Contingency Plan 20
  • 21. Required/Addressable Specifications of Security Standards Standards Specifications Sections Contingency Operations 164.310(a)(2)(i) Facility Security Plan 164.310(a)(2)(ii) Access Control and Validation Procedures 164.310(a)(2)(iii) Maintenance Records 164.310(a)(2)(iv) Workstation Use Workstation Use 164.310(b) Workstation Security Workstation Security 164.310(c) Disposal 164.310(d)(2)(i) Media Re-use 164.310(d)(1)(2)(ii) Accountability 164.310(d)(2)(iii) Data Backup and Storage 164.310(d)(2)(iv) Unique User Identification 164.312(a)(2)(i) Emergency Access Procedure 164.312(a)(2)(ii) Automatic Logoff 164.312(a)(2)(iii) Encryption and Decryption 164.312(a)(2)(iv) Audit Controls Audit Controls 164.312(b) Integrity Mechanism to Authenticate Electronic Protecte164.312(c)(1) Person or Entity Authentication Person or Entity Authentication 164.312(d) Integrity Controls 164.312(e)(2)(i) Encryption 164.312(e)(2)(ii) Time Limit 164.316(b)(2)(i) Avilability 164.316(b)(2)(ii) Update 164.316(b)(2)(iii) Documentation Device and Media Control Access Control Transmission Security Facility Access Control 21
  • 22. Minimum Necessary Rule (§164.502(b)) • Generally, the amount of PHI used, shared, accessed or requested must be limited to only what is needed. • Workers should access or use only the PHI necessary to carry out their job responsibilities. 22
  • 23. Authorization (§164.508) • A covered entity may not use or disclose protected health information for reasons generally not related to treatment, payment or healthcare operations without an authorization. • The Authorization must include: – A detailed description of the PHI to be disclosed, who will make the disclosure, to whom the disclosure will be made, expiration date, the purpose of the disclosure, and signature. – The individual's right to revoke, the ability or inability to condition usage, and the potential for information disclosed. 23
  • 24. Types of Disclosures • No Authorization Required (§ 164.512) • Authorization Required, but Must Give Opportunity to Object (§ 164.510) • Authorization Required (§ 164.508) 24
  • 25. Uses and Disclosures for Which An Authorization or Opportunity to Agree or Object Is Not Required • To disclose PHI to the patient (§ 164.502) • To use or disclose PHI for treatment, payment or healthcare operations. (§ 164.502) • Certain disclosures required by law (for example, public health reporting of diseases, child abuse/neglect cases, etc.) (§ 164.512(a)-(l)) 25
  • 26. Uses and Disclosures for Which An Authorization Is Required • A covered entity may not use or disclose protected health information without an authorization. (§ 164.508(a)(1)) • To access, use or disclose PHI for research (§ 164.512(i)(1)(i)) • For marketing activities and sale of PHI (§ 164.508(a)(3)) 26
  • 27. Uses and Disclosures Requiring An Opportunity for The Individual to Agree or to Object • The Patient must be offered an opportunity to object before discussing PHI with a patient’s family or friends. (§ 164.510(b)(1)(i)) • Limited PHI (e.g., patient’s hospital room/location number) is included in the “Hospital Directory” but patients are offered an “Opt Out” opportunity and certain disclosures to clergy members. (§ 164.510(b)(3)) • Exception: Emergency circumstances (§ 164.510(a)(3)) 27
  • 28. Breach (§164.402(b)) • Breach means the acquisition, access, use, or disclosure of protected health information in a manner not permitted under privacy rules. • Amount of a civil money penalty. – In the amount of less than $100 or more than $50,000 for each violation – In excess of $1,500,000 for identical violations during a calendar year • Criminal Liability – Offenses committed with the intent to sell, transfer, or use individually identifiable health information for commercial advantage, personal gain or malicious harm permit fines of $250,000 and imprisonment for up to ten years. 28
  • 29. Companies & Fines Entity Fined Fine Violation CIGNET (Feb, 2011) $4,300,000 Online database application error. Alaska Department of Health and Human Services (June, 2012) $1,700,000 Unencrypted USB hard drive stolen, poor policies and risk analysis. WellPoint (Sep, 2012) $1,700,000 Did not have technical safeguards in place to verify the person/entity seeking access to PHI in the database. Failed to conduct a technical evaluation in response to software upgrade. Blue Cross Blue Shield of Tennessee (Mar, 2012) $1,500,000 57 unencrypted hard drives stolen. Massachusetts Eye and Ear Infirmary and Massachusetts Eye and Ear Associates (Sep, 2012) $1,500,000 Unencrypted laptop stolen, poor risk analysis, policies. Affinity Health Plan (Aug, 2013) $1,215,780 Returned photocopiers without erasing the hard drives. South Shore Hospital (May, 2012) $750,000 Backup tapes went missing on the way to contractor. Idaho State University (May, 2013) $400,000 Breach of unsecured ePHI. 29