SlideShare a Scribd company logo
Back

Menu

Next

GBMC HIPAA Compliance Program

Health
Insurance
Portability and
Accountability
Act
Back

Menu

Next

HIPAA Requires

Standards for Electronic Transactions and Code Sets
-Compliance
-Enforced

Date: October 16, 2003

by: Centers for Medicare and Medicaid (CMS)

Standards for Privacy of Individually Identifiable
Health Information
-Compliance
-Enforced

Date: April 14, 2003

by: Office of Civil Rights (OCR)

Standards for Security of Electronic Protected Health
Information
-Compliance
-Enforced

Date: April 20, 2005

by: Centers for Medicare and Medicaid (CMS)
2
Back

Menu

Next

Diagram of the HIPAA Statute

Security

Code Sets

3
Back

Menu

Next

Training Focus
The training that you are receiving today will focus on learning what responsibilities
you have in order to ensure GBMC complies with HIPAA Privacy and HIPAA
Security Regulations. The following topics will be covered:

HIPAA PRIVACY

HIPAA SECURITY

Protected Health Information
Protected Health Information

Electronic Protected Health Information
Electronic Protected Health Information

Minimum Necessary
Minimum Necessary

User Identity
User Identity

Patient Rights
Patient Rights

Password Management
Password Management

Notice of Privacy Practices
Notice of Privacy Practices

Appropriate Use of Computing Devices
Appropriate Use of Computing Devices

Privacy Policies
Privacy Policies

Security Policies
Security Policies

Privacy Officer
Privacy Officer

Security Officer
Security Officer

Reporting Privacy Concerns
Reporting Privacy Concerns

Reporting Security Concerns
Reporting Security Concerns
4
Back

Menu

Next

HIPAA Privacy

The Privacy Rule
Protects information known as
PROTECTED HEALTH
INFORMATION (PHI) that
exists in written, oral, and
electronic formats.

Protected Health Information
Protected Health Information

5
Back

Menu

Next

HIPAA Privacy

Examples of PHI














Name
Birth Date
Fax Number
Account Number
Web Universal Resource Locator
(URL)
Street Address
Admission Date
Electronic mail address
Certificate/License Number
License Plate Number
City
Discharge Date
Social Security Number

Protected Health Information
Protected Health Information














Vehicle and Serial Number
Device Identifier and Serial Number
Precinct
Date of Death
Medical Record Number
Internet Protocol Number
Full Face Photographic Images
Zip Code
Telephone Number
Health Plan Beneficiary Number
Biometrics Identifiers (i.e. finger
prints)
Any Other Unique Identifying
Number, Characteristic, or Code

6
Back

Menu

Next

HIPAA Privacy

The Privacy Rule




Limits the way in which members of the GBMC workforce may
use and disclose (release) PHI. GBMC workforce must
have a job-related reason to use and or disclose PHI.
Requires that all GBMC workforce use only the minimum
amount of PHI necessary to get the job done. This is what
HIPAA defines as the MINIMUM NECESSARY Standard.
“Workforce” means
employees, volunteers,
trainees, and other persons
who conduct work for GBMC
and are under the direct
control of GBMC, whether or
not they are paid by GBMC.

Minimum Necessary
Minimum Necessary

7
Back

Menu

Next

Annual Acknowledgment of the Minimum
Necessary Standard




Every year, employees affirm their commitment to this
standard by electronically signing the GBMC Code of
Business Ethics Acknowledgment, Confidentiality of
Information Agreement, and Appropriate Use Agreement.
Failure to comply with this standard will lead to disciplinary
action, up to and including termination.

Minimum Necessary
Minimum Necessary

8
Minimum Necessary Scenarios


A patient that I cared for in the ICU was transferred to a
medical unit. May I look in the patient’s record to see how
she is doing? May I call the unit and talk to the nurse who is
now caring for her?
 As much as this may reflect your compassion and concern for
patients whom you have taken care of in the past, you may not
inquire into her status unless there is a job-related reason. For
example, if you have to complete a note in her record after she
has left your unit, you may access her record to complete your
note.

Minimum Necessary
Minimum Necessary

9
Minimum Necessary Scenarios


I am a unit clerk and while I was working night shift, a nurse
named Mary became very ill. Another nurse named Alice
transported Mary to the Emergency Dept (ED) & described
for the nursing staff in the ED what symptoms Mary had
complained of having. Alice was thanked for her assistance
& told that she could return to her floor. Later that evening, I
walked by Alice while she was on the computer & she called
me over. She had Mary’s lab results up on her screen. Can
she do this?
 No, Alice should not look at this information. She has violated
the minimum necessary standard. Such violation is punishable
up to and including termination.

Minimum Necessary
Minimum Necessary

10
Back

Menu

Next

HIPAA Privacy

The Privacy Rule






Provides patients with certain rights - these rights are
commonly referred to as the PATIENT PRIVACY RIGHTS.
These rights are communicated to the patient in the Notice
of Privacy Practices.
If a patient wishes to exercise any of these Patient Privacy
Rights (which are outlined on the next slide), they must do
so in writing. You should contact Medical Records Correspondence Department (443-849-2274) for the correct
forms.

Patient Rights
Patient Rights

11
Back

Menu

Next

HIPAA Privacy

The Patient Privacy Rights


Right to access PHI



Right to request an amendment to PHI



Right to request restrictions on how PHI is used for
treatment, payment, and healthcare operations



Right to receive confidential communications



Right to request an accounting of disclosures



Right to complain to the Department of Health and Human
Services’ Office for Civil Rights

Patient Rights
Patient Rights

12
Back

Menu

Next

HIPAA Privacy

The Privacy Rule






Requires that GBMC provide all patients with a copy of its
NOTICE OF PRIVACY PRACTICES (NOPP).
Each patient must sign an acknowledgment after receiving
the NOPP unless the patient is unable to do so at the time of
registration.
Copies of the NOPP may be ordered from Purchasing.

Notice of Privacy
Practices
Effective April 14, 2003

Notice of Privacy
Practices
Effective April 14, 2003

Notice of Privacy
Practices
Effective April 14, 2003

Notice of Privacy
Practices
Effective April 14, 2003

GBMC includes Greater Baltimore
Medical Center, Gilchrist Hospice
Care and GBMC Foundation.

GBMC includes Greater Baltimore
Medical Center, Gilchrist Hospice
Care, and GBMC Foundation.

GBMC includes Greater Baltimore
Medical Center, Gilchrist Hospice
Care, and GBMC Foundation.

GBMC includes Greater Baltimore
Medical Center, Gilchrist Hospice
Care, and GBMC Foundation.

Notice of Privacy Practices
Notice of Privacy Practices

13
Back

Menu

Next

HIPAA Privacy

The Notice of Privacy
Practices


Notice of Privacy
Practices
Effective April 14, 2003
GBMC includes Greater Baltimore
Medical Center, Gilchrist Hospice
Care and GBMC Foundation.

Notice of Privacy Practices
Notice of Privacy Practices

The Notice is a useful tool not only
for you but also for the patient.
The NOPP:
 describes how GBMC may use
a patient’s PHI
 provides a clear and concise
description of the patient’s
rights
 discusses how a patient may
opt-out of the facility directory

discusses how the medical
staff may interact with the
patient’s family
14
Back

Menu

Next

HIPAA Privacy

The Privacy Rule








Requires that GBMC create policies regarding how GBMC’s
workforce is allowed to use and disclose (release) PHI.
Also requires that GBMC make available to and educate its
workforce on those policies.
All of GBMC’s PRIVACY POLICIES are located on the
Compliance Page of the GBMC InfoWeb.
Hardcopies of the policies may be printed directly from the
InfoWeb or obtained from the Compliance Department.

Privacy Policies
Privacy Policies

15
Back

Menu

Next

HIPAA Privacy

THE GBMC Privacy
Policies


Examples of GBMC
Privacy Policies include:






Privacy Policies
Privacy Policies

#003.102 Minimum Necessary Use
and Disclosure of Protected
Health Information
#003.105 Uses and Disclosures for
Involvement in the Individual’s
Care and Notification Purposes
#003.114 Uses and Disclosures of
Protected Health Information for
Law Enforcement Purposes

16
Back

Menu

Next

HIPAA Privacy

The Privacy Rule


Requires that GBMC designate someone who is
responsible for


the development and implementation of the privacy
policies



privacy related training and education



investigating privacy related complaints





conducting routine audits to make sure that all of
GBMC’s workforce are complying with the privacy
policies

The PRIVACY OFFICER for GBMC is Tara Miller.

Privacy Officer
Privacy Officer

17
Back

Menu

Next

HIPAA Privacy

THE Privacy Rule
 Requires that GBMC provide a way for patients and
workforce to REPORT PRIVACY CONCERNS or ask
privacy questions.
Tara Miller, GBMC Privacy
Officer

443-849-4327

HIPAA GroupWise Resource

To send an email, type HIPAA
in the “To” field

The Business EthicsLine is
now the Privacy Hotline too

1-800-299-7991

The Compliance Home Page
is your source for HIPAA
information.

GBMC Infoweb

Reporting Privacy Concerns
Reporting Privacy Concerns

18
Back

Menu

Next

HIPAA Privacy

Privacy Compliance Tips
 Keep all PHI locked and secured when you are away from your
work area.
 Do not include any patient identifiers in the subject line of an email.
 Do not discuss PHI in public or common areas.
 Make sure to check the fax number for accuracy before sending a
fax that contains PHI. All faxes must include a completed GBMC
standard fax cover sheet (see fax policy for limited exceptions).
 If a fax is sent to the wrong recipient in error, you must complete
the Accounting of Disclosures log located on the Compliance page
of the InfoWeb and send it to Medical Records.
 Sign-in sheets are allowed as long as we continue to follow the
standard protocols that have always been in place at GBMC. Sign
- in sheets should be limited to patient name and appointment
time.
19
Back

Menu

Next

HIPAA Security

The Security Rule




Requires administrative, physical, and technical
safeguards be implemented to address the
confidentiality, integrity, and availability of
ELECTRONIC PROTECTED HEALTH INFORMATION
(ePHI).
Security of patient information is EVERYONE’S job!
We owe it to our patients!

Electronic Protected Health Information
Electronic Protected Health Information

20
Back

Menu

Next

HIPAA Security

The Security Rule








Requires GBMC provide each computer system user with a
unique USER IDENTITY.
Your user identity is the combination of your user id and your
password – do not share or write down your password where
it can be easily retrieved by someone other than you.
Your user identity is what is used to monitor your activity on
the system(s).
Do not leave yourself signed onto a computer and then walk
away without signing off. You are responsible for any activity
that occurs under your user identity. Your user identity
appears on audit reports which are frequently monitored.

User Identity
User Identity

21
Back

Menu

Next

HIPAA Security

Protecting Your Password






In order to protect against unauthorized access to our
computers, GBMC has taken appropriate steps to monitor all
activity on the network to ensure that people are not trying to
break-in to those systems.
However, as a user of a GBMC system, it is important that
you also take measures to ensure that people cannot access
GBMC systems – this is partly accomplished through
PASSWORD MANAGEMENT.
Password management includes selecting a strong
password, protecting your password, as well as frequently
changing your password.

“A password should be like a toothbrush.
Use it every day; change it regularly and
DON’T share it with friends” - Usenet

Password Management
Password Management

22
Back

Menu

Next

HIPAA Security
Examples of How to Create a Strong Password
1. Mix upper and lowercase
characters

3bLINdmice

5gOLDenrings

4cALLingbirdS

3. Combine two words by
using a special character

Roof^Top

Sugar$Daddy

B@tterup!

2. Replace letters with
numbers

Replace “E” with “3”
 “Sp3cial” or “3l3gant”

4. Use the first letter from each
word of a phrase from a
song
“Oops! I did it again”
becomes “O!idia”

In general, passwords should have a minimum length of 6 characters but each
application may have other requirements/limitations.
Password Management
Password Management

23
Back

Menu

Next

HIPAA Security
The Security Rule




Requires that GBMC train its workforce on appropriate computer
security and APPROPRIATE USE OF COMPUTING DEVICES.
As a user of a GBMC system (including the Internet) you are
required to:






Use only your officially assigned user identity (e.g. user id and
password)
Save GBMC data only to the GBMC Network unless prior GBMC
approval has been granted
Notify your manager and the HIPAA Security Officer if your password
has been disclosed, or otherwise compromised, and immediately
change your password

Appropriate Use of Computing Devices
Appropriate Use of Computing Devices

24
Back

Menu

Next

HIPAA Security

The “Do Not’s” When Using GBMC Systems


As a user of a GBMC system (including the Internet) you
may not:


Install unauthorized software (e.g. screensavers, games, or
instant messenger programs)



Install any unlicensed software on a GBMC computer or device



Abuse your Internet or e-mail access privileges



Relocate any computer equipment without prior MIS approval



Bring into GBMC any personal computer equipment without
prior MIS approval (e.g. printer, burner, scanner, PDA, or digital
camera)

Appropriate Use of Computing Devices
Appropriate Use of Computing Devices

25
Back

Menu

Next

HIPAA Security

The Security Rule






Requires that GBMC create SECURITY POLICIES regarding
how GBMC will implement appropriate safeguards to ensure
the confidentiality, integrity, and availability of ePHI.
Examples of existing GBMC security policies are:
 # 304 Email Policy
 # 348 Information Security Policy
All GBMC policies are located on
the GBMC InfoWeb.

Security Policies
Security Policies

26
Back

Menu

Next

HIPAA Security

The Security Rule


Requires that GBMC designate someone who is responsible
for:








The development and implementation of information security
policies and procedures
Regular reviews of records of information system activity, such
as audit logs, access reports, and security incident tracking
reports
The development of awareness and training programs for all
members of its workforce

The SECURITY OFFICER for GBMC is Tara Miller.

Security Officer
Security Officer

27
Back

Menu

Next

HIPAA Security

The Security Rule




Requires that GBMC establish a way for all GBMC workforce to
REPORT SECURITY CONCERNS.
Report all risks you are currently aware of and as you see them,
such as:


Unauthorized or suspicious visitors



Logged-on but unattended workstations



Uncontrolled access to areas that house equipment and/or PHI



Passwords on Post-it™ notes



Staff accessing records without a need to know

 Report all security concerns to Tara Miller.
Reporting Security Concerns
Reporting Security Concerns

28
Back

Menu

Next

HIPAA Privacy & Security
We hope this Computer-Based Learning course has
been both informative and helpful.
Feel free to review this course until you are confident
about your knowledge of the material presented.
Click the Take Test button on the left side when you are
ready to complete the requirements for this course.
Click on the My Records button to return to your CBL
Courses to Complete list.
Click the Exit button on the left to close the Student
Interface.
29

More Related Content

What's hot

UNA HIPAA Training 8-13
UNA HIPAA Training   8-13UNA HIPAA Training   8-13
HIPAA Training - 2011
HIPAA Training - 2011HIPAA Training - 2011
HIPAA Training - 2011
darichardson
 
HIPPA COMPLIANCE (SANJEEV.S.BHARWAN)
HIPPA COMPLIANCE (SANJEEV.S.BHARWAN)HIPPA COMPLIANCE (SANJEEV.S.BHARWAN)
HIPPA COMPLIANCE (SANJEEV.S.BHARWAN)
Sanjeev Bharwan
 
HIPAA 101 Privacy and Security Training by University of Californa San Francisco
HIPAA 101 Privacy and Security Training by University of Californa San FranciscoHIPAA 101 Privacy and Security Training by University of Californa San Francisco
HIPAA 101 Privacy and Security Training by University of Californa San FranciscoAtlantic Training, LLC.
 
HIPAA Audio Presentation
HIPAA  Audio PresentationHIPAA  Audio Presentation
HIPAA Audio Presentation
Lisa Shannon, RN, BSN, JD.
 
Welcome to HIPAA Training
Welcome to HIPAA TrainingWelcome to HIPAA Training
Welcome to HIPAA TrainingJonathan Montes
 
HIPAA Basics by Brian Fleetham
HIPAA Basics by Brian FleethamHIPAA Basics by Brian Fleetham
HIPAA Basics by Brian Fleetham
Atlantic Training, LLC.
 
Sylvia hipaa powerpoint presentation 2010(2)
Sylvia hipaa powerpoint presentation 2010(2)Sylvia hipaa powerpoint presentation 2010(2)
Sylvia hipaa powerpoint presentation 2010(2)bholmes
 
Hipaa101 updated
Hipaa101 updatedHipaa101 updated
Hipaa101 updatedkkurapat
 
Personal Health Records & HIPAA
Personal Health Records & HIPAAPersonal Health Records & HIPAA
Personal Health Records & HIPAA
Margery Lynn
 
HIPAA for Dummies
HIPAA for DummiesHIPAA for Dummies
HIPAA for Dummies
hipaacompliance
 
Annual HIPAA Training
Annual HIPAA TrainingAnnual HIPAA Training
Annual HIPAA Training
Cynthia Holland
 
HIPAA Compliance
HIPAA ComplianceHIPAA Compliance
HIPAA Compliance
Manny Oliverez
 
Presentation hippa
Presentation hippaPresentation hippa
Presentation hippa
maggie_Platt
 
HIPAA Training: Preventing Employees from Violating HIPAA
HIPAA Training: Preventing Employees from Violating HIPAAHIPAA Training: Preventing Employees from Violating HIPAA
HIPAA Training: Preventing Employees from Violating HIPAA
jbhicks
 
Hippa training for healthcare employees
Hippa training for healthcare employeesHippa training for healthcare employees
Hippa training for healthcare employeesaminahallen
 
Health Insurance Portability and Accountability Act (HIPAA) Compliance
Health Insurance Portability and Accountability Act (HIPAA) ComplianceHealth Insurance Portability and Accountability Act (HIPAA) Compliance
Health Insurance Portability and Accountability Act (HIPAA) Compliance
ControlCase
 
Hipaa ppt june 6 2014
Hipaa ppt june 6 2014Hipaa ppt june 6 2014
Hipaa ppt june 6 2014
Lyndon Godsall
 
Mandatory hippa and information security
Mandatory hippa and information securityMandatory hippa and information security
Mandatory hippa and information securityHiggi123
 
HIPAA
HIPAA HIPAA
HIPAA
ravelo1212
 

What's hot (20)

UNA HIPAA Training 8-13
UNA HIPAA Training   8-13UNA HIPAA Training   8-13
UNA HIPAA Training 8-13
 
HIPAA Training - 2011
HIPAA Training - 2011HIPAA Training - 2011
HIPAA Training - 2011
 
HIPPA COMPLIANCE (SANJEEV.S.BHARWAN)
HIPPA COMPLIANCE (SANJEEV.S.BHARWAN)HIPPA COMPLIANCE (SANJEEV.S.BHARWAN)
HIPPA COMPLIANCE (SANJEEV.S.BHARWAN)
 
HIPAA 101 Privacy and Security Training by University of Californa San Francisco
HIPAA 101 Privacy and Security Training by University of Californa San FranciscoHIPAA 101 Privacy and Security Training by University of Californa San Francisco
HIPAA 101 Privacy and Security Training by University of Californa San Francisco
 
HIPAA Audio Presentation
HIPAA  Audio PresentationHIPAA  Audio Presentation
HIPAA Audio Presentation
 
Welcome to HIPAA Training
Welcome to HIPAA TrainingWelcome to HIPAA Training
Welcome to HIPAA Training
 
HIPAA Basics by Brian Fleetham
HIPAA Basics by Brian FleethamHIPAA Basics by Brian Fleetham
HIPAA Basics by Brian Fleetham
 
Sylvia hipaa powerpoint presentation 2010(2)
Sylvia hipaa powerpoint presentation 2010(2)Sylvia hipaa powerpoint presentation 2010(2)
Sylvia hipaa powerpoint presentation 2010(2)
 
Hipaa101 updated
Hipaa101 updatedHipaa101 updated
Hipaa101 updated
 
Personal Health Records & HIPAA
Personal Health Records & HIPAAPersonal Health Records & HIPAA
Personal Health Records & HIPAA
 
HIPAA for Dummies
HIPAA for DummiesHIPAA for Dummies
HIPAA for Dummies
 
Annual HIPAA Training
Annual HIPAA TrainingAnnual HIPAA Training
Annual HIPAA Training
 
HIPAA Compliance
HIPAA ComplianceHIPAA Compliance
HIPAA Compliance
 
Presentation hippa
Presentation hippaPresentation hippa
Presentation hippa
 
HIPAA Training: Preventing Employees from Violating HIPAA
HIPAA Training: Preventing Employees from Violating HIPAAHIPAA Training: Preventing Employees from Violating HIPAA
HIPAA Training: Preventing Employees from Violating HIPAA
 
Hippa training for healthcare employees
Hippa training for healthcare employeesHippa training for healthcare employees
Hippa training for healthcare employees
 
Health Insurance Portability and Accountability Act (HIPAA) Compliance
Health Insurance Portability and Accountability Act (HIPAA) ComplianceHealth Insurance Portability and Accountability Act (HIPAA) Compliance
Health Insurance Portability and Accountability Act (HIPAA) Compliance
 
Hipaa ppt june 6 2014
Hipaa ppt june 6 2014Hipaa ppt june 6 2014
Hipaa ppt june 6 2014
 
Mandatory hippa and information security
Mandatory hippa and information securityMandatory hippa and information security
Mandatory hippa and information security
 
HIPAA
HIPAA HIPAA
HIPAA
 

Viewers also liked

HIPAA Privacy Training by University of Hawaii
HIPAA Privacy Training by University of HawaiiHIPAA Privacy Training by University of Hawaii
HIPAA Privacy Training by University of HawaiiAtlantic Training, LLC.
 
Introduction to HIPAA for Healthcare Professionals by OUP
Introduction to HIPAA for Healthcare Professionals by OUPIntroduction to HIPAA for Healthcare Professionals by OUP
Introduction to HIPAA for Healthcare Professionals by OUPAtlantic Training, LLC.
 
Hazard Communication by Maine Dept. of Labor
Hazard Communication by Maine Dept. of LaborHazard Communication by Maine Dept. of Labor
Hazard Communication by Maine Dept. of Labor
Atlantic Training, LLC.
 
Slips, Trips and Falls by Connecticut DOL
Slips, Trips and Falls by Connecticut DOLSlips, Trips and Falls by Connecticut DOL
Slips, Trips and Falls by Connecticut DOL
Atlantic Training, LLC.
 
Hazard Communication Training by Maine Department of Labor
Hazard Communication Training by Maine Department of LaborHazard Communication Training by Maine Department of Labor
Hazard Communication Training by Maine Department of LaborAtlantic Training, LLC.
 
Slips, Trips, and Falls by Signalmutual
Slips, Trips, and Falls by SignalmutualSlips, Trips, and Falls by Signalmutual
Slips, Trips, and Falls by Signalmutual
Atlantic Training, LLC.
 
Preventing Slips, Trips and Falls in the Health Care Industry by GTRI
Preventing Slips, Trips and Falls in the Health Care Industry by GTRIPreventing Slips, Trips and Falls in the Health Care Industry by GTRI
Preventing Slips, Trips and Falls in the Health Care Industry by GTRI
Atlantic Training, LLC.
 
Energy Control Program by MCIEAST
Energy Control Program by MCIEASTEnergy Control Program by MCIEAST
Energy Control Program by MCIEAST
Atlantic Training, LLC.
 
Hazardous Energy Control by MSHA
Hazardous Energy Control by MSHAHazardous Energy Control by MSHA
Hazardous Energy Control by MSHA
Atlantic Training, LLC.
 
Hazard Communication Training by Oklahoma State University
Hazard Communication Training by Oklahoma State UniversityHazard Communication Training by Oklahoma State University
Hazard Communication Training by Oklahoma State UniversityAtlantic Training, LLC.
 
Lock Out-Tag Out Training by Ryko
Lock Out-Tag Out Training by RykoLock Out-Tag Out Training by Ryko
Lock Out-Tag Out Training by Ryko
Atlantic Training, LLC.
 
Lockout Tagout by Snohomish County
Lockout Tagout by Snohomish CountyLockout Tagout by Snohomish County
Lockout Tagout by Snohomish County
Atlantic Training, LLC.
 
The Control of Hazardous Energy by SAPPI
The Control of Hazardous Energy by SAPPIThe Control of Hazardous Energy by SAPPI
The Control of Hazardous Energy by SAPPI
Atlantic Training, LLC.
 
Lockout Tagout by FirstSource
Lockout Tagout by FirstSourceLockout Tagout by FirstSource
Lockout Tagout by FirstSource
Atlantic Training, LLC.
 
Hazard Communication Training Program by MIOSHA
 Hazard Communication Training Program by MIOSHA Hazard Communication Training Program by MIOSHA
Hazard Communication Training Program by MIOSHAAtlantic Training, LLC.
 
Slips, Trips and Falls Training by WITC
Slips, Trips and Falls Training by WITCSlips, Trips and Falls Training by WITC
Slips, Trips and Falls Training by WITC
Atlantic Training, LLC.
 
Personal Protective Equipment Training by San Diego State University
Personal Protective Equipment Training by San Diego State UniversityPersonal Protective Equipment Training by San Diego State University
Personal Protective Equipment Training by San Diego State UniversityAtlantic Training, LLC.
 
Manufacturing Lockout Tagout by FMIC
Manufacturing Lockout Tagout by FMICManufacturing Lockout Tagout by FMIC
Manufacturing Lockout Tagout by FMIC
Atlantic Training, LLC.
 
Slips, Trips, and Fall Prevention Training by SIA
Slips, Trips, and Fall Prevention Training by SIASlips, Trips, and Fall Prevention Training by SIA
Slips, Trips, and Fall Prevention Training by SIA
Atlantic Training, LLC.
 
Personal Protective Equipment in the Construction Industry Training by NMENV
Personal Protective Equipment in the Construction Industry Training by NMENVPersonal Protective Equipment in the Construction Industry Training by NMENV
Personal Protective Equipment in the Construction Industry Training by NMENVAtlantic Training, LLC.
 

Viewers also liked (20)

HIPAA Privacy Training by University of Hawaii
HIPAA Privacy Training by University of HawaiiHIPAA Privacy Training by University of Hawaii
HIPAA Privacy Training by University of Hawaii
 
Introduction to HIPAA for Healthcare Professionals by OUP
Introduction to HIPAA for Healthcare Professionals by OUPIntroduction to HIPAA for Healthcare Professionals by OUP
Introduction to HIPAA for Healthcare Professionals by OUP
 
Hazard Communication by Maine Dept. of Labor
Hazard Communication by Maine Dept. of LaborHazard Communication by Maine Dept. of Labor
Hazard Communication by Maine Dept. of Labor
 
Slips, Trips and Falls by Connecticut DOL
Slips, Trips and Falls by Connecticut DOLSlips, Trips and Falls by Connecticut DOL
Slips, Trips and Falls by Connecticut DOL
 
Hazard Communication Training by Maine Department of Labor
Hazard Communication Training by Maine Department of LaborHazard Communication Training by Maine Department of Labor
Hazard Communication Training by Maine Department of Labor
 
Slips, Trips, and Falls by Signalmutual
Slips, Trips, and Falls by SignalmutualSlips, Trips, and Falls by Signalmutual
Slips, Trips, and Falls by Signalmutual
 
Preventing Slips, Trips and Falls in the Health Care Industry by GTRI
Preventing Slips, Trips and Falls in the Health Care Industry by GTRIPreventing Slips, Trips and Falls in the Health Care Industry by GTRI
Preventing Slips, Trips and Falls in the Health Care Industry by GTRI
 
Energy Control Program by MCIEAST
Energy Control Program by MCIEASTEnergy Control Program by MCIEAST
Energy Control Program by MCIEAST
 
Hazardous Energy Control by MSHA
Hazardous Energy Control by MSHAHazardous Energy Control by MSHA
Hazardous Energy Control by MSHA
 
Hazard Communication Training by Oklahoma State University
Hazard Communication Training by Oklahoma State UniversityHazard Communication Training by Oklahoma State University
Hazard Communication Training by Oklahoma State University
 
Lock Out-Tag Out Training by Ryko
Lock Out-Tag Out Training by RykoLock Out-Tag Out Training by Ryko
Lock Out-Tag Out Training by Ryko
 
Lockout Tagout by Snohomish County
Lockout Tagout by Snohomish CountyLockout Tagout by Snohomish County
Lockout Tagout by Snohomish County
 
The Control of Hazardous Energy by SAPPI
The Control of Hazardous Energy by SAPPIThe Control of Hazardous Energy by SAPPI
The Control of Hazardous Energy by SAPPI
 
Lockout Tagout by FirstSource
Lockout Tagout by FirstSourceLockout Tagout by FirstSource
Lockout Tagout by FirstSource
 
Hazard Communication Training Program by MIOSHA
 Hazard Communication Training Program by MIOSHA Hazard Communication Training Program by MIOSHA
Hazard Communication Training Program by MIOSHA
 
Slips, Trips and Falls Training by WITC
Slips, Trips and Falls Training by WITCSlips, Trips and Falls Training by WITC
Slips, Trips and Falls Training by WITC
 
Personal Protective Equipment Training by San Diego State University
Personal Protective Equipment Training by San Diego State UniversityPersonal Protective Equipment Training by San Diego State University
Personal Protective Equipment Training by San Diego State University
 
Manufacturing Lockout Tagout by FMIC
Manufacturing Lockout Tagout by FMICManufacturing Lockout Tagout by FMIC
Manufacturing Lockout Tagout by FMIC
 
Slips, Trips, and Fall Prevention Training by SIA
Slips, Trips, and Fall Prevention Training by SIASlips, Trips, and Fall Prevention Training by SIA
Slips, Trips, and Fall Prevention Training by SIA
 
Personal Protective Equipment in the Construction Industry Training by NMENV
Personal Protective Equipment in the Construction Industry Training by NMENVPersonal Protective Equipment in the Construction Industry Training by NMENV
Personal Protective Equipment in the Construction Industry Training by NMENV
 

Similar to HIPAA Training by Greater Baltimore Medical Center

HIPAA Final Omnibus Rule Playbook
HIPAA Final Omnibus Rule PlaybookHIPAA Final Omnibus Rule Playbook
HIPAA Final Omnibus Rule Playbook
Elizabeth Dimit
 
Health Insurance and Portability and Accountability Act
Health Insurance and Portability and Accountability ActHealth Insurance and Portability and Accountability Act
Health Insurance and Portability and Accountability Act
সারন দাস
 
Hipaa inservice
Hipaa inserviceHipaa inservice
Hipaa inservice
Kelly Snyder
 
Patient confidentilty
Patient confidentiltyPatient confidentilty
Patient confidentiltySheena705
 
Mha690 health care capstone - confidentiality 9-26-2013
Mha690   health care capstone - confidentiality 9-26-2013Mha690   health care capstone - confidentiality 9-26-2013
Mha690 health care capstone - confidentiality 9-26-2013LeRoy Ulibarri
 
Mha690 health care capstone - confidentiality 9-26-2013
Mha690   health care capstone - confidentiality 9-26-2013Mha690   health care capstone - confidentiality 9-26-2013
Mha690 health care capstone - confidentiality 9-26-2013
LeRoy Ulibarri
 
Mha690 health care capstone - confidentiality 9-26-2013
Mha690   health care capstone - confidentiality 9-26-2013Mha690   health care capstone - confidentiality 9-26-2013
Mha690 health care capstone - confidentiality 9-26-2013LeRoy Ulibarri
 
Keys To HIPAA Compliance
Keys To HIPAA ComplianceKeys To HIPAA Compliance
Keys To HIPAA Compliance
CBIZ, Inc.
 
HIPAA INSERVICE 2017
HIPAA INSERVICE 2017 HIPAA INSERVICE 2017
HIPAA INSERVICE 2017
Meg Oser
 
Patient Confidentiality
Patient ConfidentialityPatient Confidentiality
Patient ConfidentialityMike1fla
 
HIPAA-Compliant Healthcare App.pdf
HIPAA-Compliant Healthcare App.pdfHIPAA-Compliant Healthcare App.pdf
HIPAA-Compliant Healthcare App.pdf
philipthomas428223
 
Updated modifications to the HIPAA Privacy Rule
Updated modifications to the HIPAA Privacy RuleUpdated modifications to the HIPAA Privacy Rule
Updated modifications to the HIPAA Privacy Rule
James Pekarek
 
Hippa training v2
Hippa training v2Hippa training v2
Hippa training v2
Suzanne Guggenheim
 
HIPAA Complaince
HIPAA ComplainceHIPAA Complaince
HIPAA Complaince
FarhatParveen10
 
Patient confidentiality training
Patient confidentiality trainingPatient confidentiality training
Patient confidentiality trainingSheena705
 
Confidentiality
ConfidentialityConfidentiality
Confidentiality
TravisDC4
 
Privacy and confidentiality
Privacy and confidentialityPrivacy and confidentiality
Privacy and confidentialityscarollo
 
Marc etienne week1 discussion2 presentation
Marc etienne week1 discussion2 presentationMarc etienne week1 discussion2 presentation
Marc etienne week1 discussion2 presentation
MarcEtienne6
 

Similar to HIPAA Training by Greater Baltimore Medical Center (20)

Joint Commission Inservice Hipaa
Joint Commission Inservice HipaaJoint Commission Inservice Hipaa
Joint Commission Inservice Hipaa
 
HIPAA Final Omnibus Rule Playbook
HIPAA Final Omnibus Rule PlaybookHIPAA Final Omnibus Rule Playbook
HIPAA Final Omnibus Rule Playbook
 
Hipaa
HipaaHipaa
Hipaa
 
Health Insurance and Portability and Accountability Act
Health Insurance and Portability and Accountability ActHealth Insurance and Portability and Accountability Act
Health Insurance and Portability and Accountability Act
 
Hipaa inservice
Hipaa inserviceHipaa inservice
Hipaa inservice
 
Patient confidentilty
Patient confidentiltyPatient confidentilty
Patient confidentilty
 
Mha690 health care capstone - confidentiality 9-26-2013
Mha690   health care capstone - confidentiality 9-26-2013Mha690   health care capstone - confidentiality 9-26-2013
Mha690 health care capstone - confidentiality 9-26-2013
 
Mha690 health care capstone - confidentiality 9-26-2013
Mha690   health care capstone - confidentiality 9-26-2013Mha690   health care capstone - confidentiality 9-26-2013
Mha690 health care capstone - confidentiality 9-26-2013
 
Mha690 health care capstone - confidentiality 9-26-2013
Mha690   health care capstone - confidentiality 9-26-2013Mha690   health care capstone - confidentiality 9-26-2013
Mha690 health care capstone - confidentiality 9-26-2013
 
Keys To HIPAA Compliance
Keys To HIPAA ComplianceKeys To HIPAA Compliance
Keys To HIPAA Compliance
 
HIPAA INSERVICE 2017
HIPAA INSERVICE 2017 HIPAA INSERVICE 2017
HIPAA INSERVICE 2017
 
Patient Confidentiality
Patient ConfidentialityPatient Confidentiality
Patient Confidentiality
 
HIPAA-Compliant Healthcare App.pdf
HIPAA-Compliant Healthcare App.pdfHIPAA-Compliant Healthcare App.pdf
HIPAA-Compliant Healthcare App.pdf
 
Updated modifications to the HIPAA Privacy Rule
Updated modifications to the HIPAA Privacy RuleUpdated modifications to the HIPAA Privacy Rule
Updated modifications to the HIPAA Privacy Rule
 
Hippa training v2
Hippa training v2Hippa training v2
Hippa training v2
 
HIPAA Complaince
HIPAA ComplainceHIPAA Complaince
HIPAA Complaince
 
Patient confidentiality training
Patient confidentiality trainingPatient confidentiality training
Patient confidentiality training
 
Confidentiality
ConfidentialityConfidentiality
Confidentiality
 
Privacy and confidentiality
Privacy and confidentialityPrivacy and confidentiality
Privacy and confidentiality
 
Marc etienne week1 discussion2 presentation
Marc etienne week1 discussion2 presentationMarc etienne week1 discussion2 presentation
Marc etienne week1 discussion2 presentation
 

More from Atlantic Training, LLC.

Wellness for Supervisors by SWOSU
Wellness for Supervisors by SWOSUWellness for Supervisors by SWOSU
Wellness for Supervisors by SWOSU
Atlantic Training, LLC.
 
Workplace Wellness by PHA
Workplace Wellness by PHAWorkplace Wellness by PHA
Workplace Wellness by PHA
Atlantic Training, LLC.
 
Stress Management Training by SG
Stress Management Training by  SGStress Management Training by  SG
Stress Management Training by SG
Atlantic Training, LLC.
 
Stress Management Training by SW
Stress Management Training by SWStress Management Training by SW
Stress Management Training by SW
Atlantic Training, LLC.
 
Stress and Worker Safety by Pennsylvania L&I
Stress and Worker Safety by Pennsylvania L&IStress and Worker Safety by Pennsylvania L&I
Stress and Worker Safety by Pennsylvania L&I
Atlantic Training, LLC.
 
Respectful Workplace by RDTC
Respectful Workplace by RDTCRespectful Workplace by RDTC
Respectful Workplace by RDTC
Atlantic Training, LLC.
 
Workplace Harassment by CLGW
Workplace Harassment by CLGWWorkplace Harassment by CLGW
Workplace Harassment by CLGW
Atlantic Training, LLC.
 
Workplace Harassment Prevention by UT EAP
Workplace Harassment Prevention by  UT EAPWorkplace Harassment Prevention by  UT EAP
Workplace Harassment Prevention by UT EAP
Atlantic Training, LLC.
 
Welding Safety by Pennsylvania L&I
Welding Safety by Pennsylvania L&IWelding Safety by Pennsylvania L&I
Welding Safety by Pennsylvania L&I
Atlantic Training, LLC.
 
Slips Trips & Falls Training by Signal
Slips Trips & Falls Training by SignalSlips Trips & Falls Training by Signal
Slips Trips & Falls Training by Signal
Atlantic Training, LLC.
 
Preventing Falls, Slips and Trips by MGSU
Preventing Falls, Slips and Trips by MGSUPreventing Falls, Slips and Trips by MGSU
Preventing Falls, Slips and Trips by MGSU
Atlantic Training, LLC.
 
Preventing Workplace Harassment by Pennsylvania L&I
Preventing Workplace Harassment by Pennsylvania L&IPreventing Workplace Harassment by Pennsylvania L&I
Preventing Workplace Harassment by Pennsylvania L&I
Atlantic Training, LLC.
 
Warehouses In Emergencies by WFP Logistics
Warehouses In Emergencies by WFP LogisticsWarehouses In Emergencies by WFP Logistics
Warehouses In Emergencies by WFP Logistics
Atlantic Training, LLC.
 
Prevention of Sexual Harassment by USMC
Prevention of Sexual Harassment by USMCPrevention of Sexual Harassment by USMC
Prevention of Sexual Harassment by USMC
Atlantic Training, LLC.
 
Sexual Harassment by DEOMI
Sexual Harassment by DEOMISexual Harassment by DEOMI
Sexual Harassment by DEOMI
Atlantic Training, LLC.
 
Sexual Harassment in the Workplace Training by Shumaker
Sexual Harassment in the Workplace Training by ShumakerSexual Harassment in the Workplace Training by Shumaker
Sexual Harassment in the Workplace Training by Shumaker
Atlantic Training, LLC.
 
Sexual Harassment Training by NAP
Sexual Harassment Training by NAPSexual Harassment Training by NAP
Sexual Harassment Training by NAP
Atlantic Training, LLC.
 
Scaffolds Training by Pennsylvania L&I
Scaffolds Training by Pennsylvania L&IScaffolds Training by Pennsylvania L&I
Scaffolds Training by Pennsylvania L&I
Atlantic Training, LLC.
 
Supervision
SupervisionSupervision
New Employee Safety Orientation by Oregon State University
New Employee Safety Orientation by Oregon State UniversityNew Employee Safety Orientation by Oregon State University
New Employee Safety Orientation by Oregon State University
Atlantic Training, LLC.
 

More from Atlantic Training, LLC. (20)

Wellness for Supervisors by SWOSU
Wellness for Supervisors by SWOSUWellness for Supervisors by SWOSU
Wellness for Supervisors by SWOSU
 
Workplace Wellness by PHA
Workplace Wellness by PHAWorkplace Wellness by PHA
Workplace Wellness by PHA
 
Stress Management Training by SG
Stress Management Training by  SGStress Management Training by  SG
Stress Management Training by SG
 
Stress Management Training by SW
Stress Management Training by SWStress Management Training by SW
Stress Management Training by SW
 
Stress and Worker Safety by Pennsylvania L&I
Stress and Worker Safety by Pennsylvania L&IStress and Worker Safety by Pennsylvania L&I
Stress and Worker Safety by Pennsylvania L&I
 
Respectful Workplace by RDTC
Respectful Workplace by RDTCRespectful Workplace by RDTC
Respectful Workplace by RDTC
 
Workplace Harassment by CLGW
Workplace Harassment by CLGWWorkplace Harassment by CLGW
Workplace Harassment by CLGW
 
Workplace Harassment Prevention by UT EAP
Workplace Harassment Prevention by  UT EAPWorkplace Harassment Prevention by  UT EAP
Workplace Harassment Prevention by UT EAP
 
Welding Safety by Pennsylvania L&I
Welding Safety by Pennsylvania L&IWelding Safety by Pennsylvania L&I
Welding Safety by Pennsylvania L&I
 
Slips Trips & Falls Training by Signal
Slips Trips & Falls Training by SignalSlips Trips & Falls Training by Signal
Slips Trips & Falls Training by Signal
 
Preventing Falls, Slips and Trips by MGSU
Preventing Falls, Slips and Trips by MGSUPreventing Falls, Slips and Trips by MGSU
Preventing Falls, Slips and Trips by MGSU
 
Preventing Workplace Harassment by Pennsylvania L&I
Preventing Workplace Harassment by Pennsylvania L&IPreventing Workplace Harassment by Pennsylvania L&I
Preventing Workplace Harassment by Pennsylvania L&I
 
Warehouses In Emergencies by WFP Logistics
Warehouses In Emergencies by WFP LogisticsWarehouses In Emergencies by WFP Logistics
Warehouses In Emergencies by WFP Logistics
 
Prevention of Sexual Harassment by USMC
Prevention of Sexual Harassment by USMCPrevention of Sexual Harassment by USMC
Prevention of Sexual Harassment by USMC
 
Sexual Harassment by DEOMI
Sexual Harassment by DEOMISexual Harassment by DEOMI
Sexual Harassment by DEOMI
 
Sexual Harassment in the Workplace Training by Shumaker
Sexual Harassment in the Workplace Training by ShumakerSexual Harassment in the Workplace Training by Shumaker
Sexual Harassment in the Workplace Training by Shumaker
 
Sexual Harassment Training by NAP
Sexual Harassment Training by NAPSexual Harassment Training by NAP
Sexual Harassment Training by NAP
 
Scaffolds Training by Pennsylvania L&I
Scaffolds Training by Pennsylvania L&IScaffolds Training by Pennsylvania L&I
Scaffolds Training by Pennsylvania L&I
 
Supervision
SupervisionSupervision
Supervision
 
New Employee Safety Orientation by Oregon State University
New Employee Safety Orientation by Oregon State UniversityNew Employee Safety Orientation by Oregon State University
New Employee Safety Orientation by Oregon State University
 

Recently uploaded

GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Nexer Digital
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
Assure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyesAssure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
sonjaschweigert1
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
Ralf Eggert
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 

Recently uploaded (20)

GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
Assure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyesAssure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyes
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 

HIPAA Training by Greater Baltimore Medical Center

  • 1. Back Menu Next GBMC HIPAA Compliance Program Health Insurance Portability and Accountability Act
  • 2. Back Menu Next HIPAA Requires Standards for Electronic Transactions and Code Sets -Compliance -Enforced Date: October 16, 2003 by: Centers for Medicare and Medicaid (CMS) Standards for Privacy of Individually Identifiable Health Information -Compliance -Enforced Date: April 14, 2003 by: Office of Civil Rights (OCR) Standards for Security of Electronic Protected Health Information -Compliance -Enforced Date: April 20, 2005 by: Centers for Medicare and Medicaid (CMS) 2
  • 3. Back Menu Next Diagram of the HIPAA Statute Security Code Sets 3
  • 4. Back Menu Next Training Focus The training that you are receiving today will focus on learning what responsibilities you have in order to ensure GBMC complies with HIPAA Privacy and HIPAA Security Regulations. The following topics will be covered: HIPAA PRIVACY HIPAA SECURITY Protected Health Information Protected Health Information Electronic Protected Health Information Electronic Protected Health Information Minimum Necessary Minimum Necessary User Identity User Identity Patient Rights Patient Rights Password Management Password Management Notice of Privacy Practices Notice of Privacy Practices Appropriate Use of Computing Devices Appropriate Use of Computing Devices Privacy Policies Privacy Policies Security Policies Security Policies Privacy Officer Privacy Officer Security Officer Security Officer Reporting Privacy Concerns Reporting Privacy Concerns Reporting Security Concerns Reporting Security Concerns 4
  • 5. Back Menu Next HIPAA Privacy The Privacy Rule Protects information known as PROTECTED HEALTH INFORMATION (PHI) that exists in written, oral, and electronic formats. Protected Health Information Protected Health Information 5
  • 6. Back Menu Next HIPAA Privacy Examples of PHI              Name Birth Date Fax Number Account Number Web Universal Resource Locator (URL) Street Address Admission Date Electronic mail address Certificate/License Number License Plate Number City Discharge Date Social Security Number Protected Health Information Protected Health Information             Vehicle and Serial Number Device Identifier and Serial Number Precinct Date of Death Medical Record Number Internet Protocol Number Full Face Photographic Images Zip Code Telephone Number Health Plan Beneficiary Number Biometrics Identifiers (i.e. finger prints) Any Other Unique Identifying Number, Characteristic, or Code 6
  • 7. Back Menu Next HIPAA Privacy The Privacy Rule   Limits the way in which members of the GBMC workforce may use and disclose (release) PHI. GBMC workforce must have a job-related reason to use and or disclose PHI. Requires that all GBMC workforce use only the minimum amount of PHI necessary to get the job done. This is what HIPAA defines as the MINIMUM NECESSARY Standard. “Workforce” means employees, volunteers, trainees, and other persons who conduct work for GBMC and are under the direct control of GBMC, whether or not they are paid by GBMC. Minimum Necessary Minimum Necessary 7
  • 8. Back Menu Next Annual Acknowledgment of the Minimum Necessary Standard   Every year, employees affirm their commitment to this standard by electronically signing the GBMC Code of Business Ethics Acknowledgment, Confidentiality of Information Agreement, and Appropriate Use Agreement. Failure to comply with this standard will lead to disciplinary action, up to and including termination. Minimum Necessary Minimum Necessary 8
  • 9. Minimum Necessary Scenarios  A patient that I cared for in the ICU was transferred to a medical unit. May I look in the patient’s record to see how she is doing? May I call the unit and talk to the nurse who is now caring for her?  As much as this may reflect your compassion and concern for patients whom you have taken care of in the past, you may not inquire into her status unless there is a job-related reason. For example, if you have to complete a note in her record after she has left your unit, you may access her record to complete your note. Minimum Necessary Minimum Necessary 9
  • 10. Minimum Necessary Scenarios  I am a unit clerk and while I was working night shift, a nurse named Mary became very ill. Another nurse named Alice transported Mary to the Emergency Dept (ED) & described for the nursing staff in the ED what symptoms Mary had complained of having. Alice was thanked for her assistance & told that she could return to her floor. Later that evening, I walked by Alice while she was on the computer & she called me over. She had Mary’s lab results up on her screen. Can she do this?  No, Alice should not look at this information. She has violated the minimum necessary standard. Such violation is punishable up to and including termination. Minimum Necessary Minimum Necessary 10
  • 11. Back Menu Next HIPAA Privacy The Privacy Rule    Provides patients with certain rights - these rights are commonly referred to as the PATIENT PRIVACY RIGHTS. These rights are communicated to the patient in the Notice of Privacy Practices. If a patient wishes to exercise any of these Patient Privacy Rights (which are outlined on the next slide), they must do so in writing. You should contact Medical Records Correspondence Department (443-849-2274) for the correct forms. Patient Rights Patient Rights 11
  • 12. Back Menu Next HIPAA Privacy The Patient Privacy Rights  Right to access PHI  Right to request an amendment to PHI  Right to request restrictions on how PHI is used for treatment, payment, and healthcare operations  Right to receive confidential communications  Right to request an accounting of disclosures  Right to complain to the Department of Health and Human Services’ Office for Civil Rights Patient Rights Patient Rights 12
  • 13. Back Menu Next HIPAA Privacy The Privacy Rule    Requires that GBMC provide all patients with a copy of its NOTICE OF PRIVACY PRACTICES (NOPP). Each patient must sign an acknowledgment after receiving the NOPP unless the patient is unable to do so at the time of registration. Copies of the NOPP may be ordered from Purchasing. Notice of Privacy Practices Effective April 14, 2003 Notice of Privacy Practices Effective April 14, 2003 Notice of Privacy Practices Effective April 14, 2003 Notice of Privacy Practices Effective April 14, 2003 GBMC includes Greater Baltimore Medical Center, Gilchrist Hospice Care and GBMC Foundation. GBMC includes Greater Baltimore Medical Center, Gilchrist Hospice Care, and GBMC Foundation. GBMC includes Greater Baltimore Medical Center, Gilchrist Hospice Care, and GBMC Foundation. GBMC includes Greater Baltimore Medical Center, Gilchrist Hospice Care, and GBMC Foundation. Notice of Privacy Practices Notice of Privacy Practices 13
  • 14. Back Menu Next HIPAA Privacy The Notice of Privacy Practices  Notice of Privacy Practices Effective April 14, 2003 GBMC includes Greater Baltimore Medical Center, Gilchrist Hospice Care and GBMC Foundation. Notice of Privacy Practices Notice of Privacy Practices The Notice is a useful tool not only for you but also for the patient. The NOPP:  describes how GBMC may use a patient’s PHI  provides a clear and concise description of the patient’s rights  discusses how a patient may opt-out of the facility directory  discusses how the medical staff may interact with the patient’s family 14
  • 15. Back Menu Next HIPAA Privacy The Privacy Rule     Requires that GBMC create policies regarding how GBMC’s workforce is allowed to use and disclose (release) PHI. Also requires that GBMC make available to and educate its workforce on those policies. All of GBMC’s PRIVACY POLICIES are located on the Compliance Page of the GBMC InfoWeb. Hardcopies of the policies may be printed directly from the InfoWeb or obtained from the Compliance Department. Privacy Policies Privacy Policies 15
  • 16. Back Menu Next HIPAA Privacy THE GBMC Privacy Policies  Examples of GBMC Privacy Policies include:    Privacy Policies Privacy Policies #003.102 Minimum Necessary Use and Disclosure of Protected Health Information #003.105 Uses and Disclosures for Involvement in the Individual’s Care and Notification Purposes #003.114 Uses and Disclosures of Protected Health Information for Law Enforcement Purposes 16
  • 17. Back Menu Next HIPAA Privacy The Privacy Rule  Requires that GBMC designate someone who is responsible for  the development and implementation of the privacy policies  privacy related training and education  investigating privacy related complaints   conducting routine audits to make sure that all of GBMC’s workforce are complying with the privacy policies The PRIVACY OFFICER for GBMC is Tara Miller. Privacy Officer Privacy Officer 17
  • 18. Back Menu Next HIPAA Privacy THE Privacy Rule  Requires that GBMC provide a way for patients and workforce to REPORT PRIVACY CONCERNS or ask privacy questions. Tara Miller, GBMC Privacy Officer 443-849-4327 HIPAA GroupWise Resource To send an email, type HIPAA in the “To” field The Business EthicsLine is now the Privacy Hotline too 1-800-299-7991 The Compliance Home Page is your source for HIPAA information. GBMC Infoweb Reporting Privacy Concerns Reporting Privacy Concerns 18
  • 19. Back Menu Next HIPAA Privacy Privacy Compliance Tips  Keep all PHI locked and secured when you are away from your work area.  Do not include any patient identifiers in the subject line of an email.  Do not discuss PHI in public or common areas.  Make sure to check the fax number for accuracy before sending a fax that contains PHI. All faxes must include a completed GBMC standard fax cover sheet (see fax policy for limited exceptions).  If a fax is sent to the wrong recipient in error, you must complete the Accounting of Disclosures log located on the Compliance page of the InfoWeb and send it to Medical Records.  Sign-in sheets are allowed as long as we continue to follow the standard protocols that have always been in place at GBMC. Sign - in sheets should be limited to patient name and appointment time. 19
  • 20. Back Menu Next HIPAA Security The Security Rule   Requires administrative, physical, and technical safeguards be implemented to address the confidentiality, integrity, and availability of ELECTRONIC PROTECTED HEALTH INFORMATION (ePHI). Security of patient information is EVERYONE’S job! We owe it to our patients! Electronic Protected Health Information Electronic Protected Health Information 20
  • 21. Back Menu Next HIPAA Security The Security Rule     Requires GBMC provide each computer system user with a unique USER IDENTITY. Your user identity is the combination of your user id and your password – do not share or write down your password where it can be easily retrieved by someone other than you. Your user identity is what is used to monitor your activity on the system(s). Do not leave yourself signed onto a computer and then walk away without signing off. You are responsible for any activity that occurs under your user identity. Your user identity appears on audit reports which are frequently monitored. User Identity User Identity 21
  • 22. Back Menu Next HIPAA Security Protecting Your Password    In order to protect against unauthorized access to our computers, GBMC has taken appropriate steps to monitor all activity on the network to ensure that people are not trying to break-in to those systems. However, as a user of a GBMC system, it is important that you also take measures to ensure that people cannot access GBMC systems – this is partly accomplished through PASSWORD MANAGEMENT. Password management includes selecting a strong password, protecting your password, as well as frequently changing your password. “A password should be like a toothbrush. Use it every day; change it regularly and DON’T share it with friends” - Usenet Password Management Password Management 22
  • 23. Back Menu Next HIPAA Security Examples of How to Create a Strong Password 1. Mix upper and lowercase characters  3bLINdmice  5gOLDenrings  4cALLingbirdS 3. Combine two words by using a special character  Roof^Top  Sugar$Daddy  B@tterup! 2. Replace letters with numbers  Replace “E” with “3”  “Sp3cial” or “3l3gant” 4. Use the first letter from each word of a phrase from a song “Oops! I did it again” becomes “O!idia” In general, passwords should have a minimum length of 6 characters but each application may have other requirements/limitations. Password Management Password Management 23
  • 24. Back Menu Next HIPAA Security The Security Rule   Requires that GBMC train its workforce on appropriate computer security and APPROPRIATE USE OF COMPUTING DEVICES. As a user of a GBMC system (including the Internet) you are required to:    Use only your officially assigned user identity (e.g. user id and password) Save GBMC data only to the GBMC Network unless prior GBMC approval has been granted Notify your manager and the HIPAA Security Officer if your password has been disclosed, or otherwise compromised, and immediately change your password Appropriate Use of Computing Devices Appropriate Use of Computing Devices 24
  • 25. Back Menu Next HIPAA Security The “Do Not’s” When Using GBMC Systems  As a user of a GBMC system (including the Internet) you may not:  Install unauthorized software (e.g. screensavers, games, or instant messenger programs)  Install any unlicensed software on a GBMC computer or device  Abuse your Internet or e-mail access privileges  Relocate any computer equipment without prior MIS approval  Bring into GBMC any personal computer equipment without prior MIS approval (e.g. printer, burner, scanner, PDA, or digital camera) Appropriate Use of Computing Devices Appropriate Use of Computing Devices 25
  • 26. Back Menu Next HIPAA Security The Security Rule    Requires that GBMC create SECURITY POLICIES regarding how GBMC will implement appropriate safeguards to ensure the confidentiality, integrity, and availability of ePHI. Examples of existing GBMC security policies are:  # 304 Email Policy  # 348 Information Security Policy All GBMC policies are located on the GBMC InfoWeb. Security Policies Security Policies 26
  • 27. Back Menu Next HIPAA Security The Security Rule  Requires that GBMC designate someone who is responsible for:     The development and implementation of information security policies and procedures Regular reviews of records of information system activity, such as audit logs, access reports, and security incident tracking reports The development of awareness and training programs for all members of its workforce The SECURITY OFFICER for GBMC is Tara Miller. Security Officer Security Officer 27
  • 28. Back Menu Next HIPAA Security The Security Rule   Requires that GBMC establish a way for all GBMC workforce to REPORT SECURITY CONCERNS. Report all risks you are currently aware of and as you see them, such as:  Unauthorized or suspicious visitors  Logged-on but unattended workstations  Uncontrolled access to areas that house equipment and/or PHI  Passwords on Post-it™ notes  Staff accessing records without a need to know  Report all security concerns to Tara Miller. Reporting Security Concerns Reporting Security Concerns 28
  • 29. Back Menu Next HIPAA Privacy & Security We hope this Computer-Based Learning course has been both informative and helpful. Feel free to review this course until you are confident about your knowledge of the material presented. Click the Take Test button on the left side when you are ready to complete the requirements for this course. Click on the My Records button to return to your CBL Courses to Complete list. Click the Exit button on the left to close the Student Interface. 29

Editor's Notes

  1. This is a diagram of HIPAA the statute and its various aspects.