The Personal Health Information Act (PHIA) Access and Privacy Office

Size: px
Start display at page:

Download "The Personal Health Information Act (PHIA) Access and Privacy Office"

Transcription

1 The Personal Health Information Act (PHIA) Updated: November 2017

2 The University of Manitoba is committed to the principles of access to information and the protection of privacy as they are outlined within the Province s access and privacy legislation The Freedom of Information and Protection of Privacy Act (FIPPA) and The Personal Health Information Act (PHIA). These Acts provide the public with the right of access to records in the custody or under the control of the University of Manitoba, while safeguarding the privacy of individuals.

3 The is a part of the Office of Fair Practices and Legal Affairs, and is located on the second floor of the Elizabeth Dafoe Library, Fort Garry Campus: 233 Elizabeth Dafoe Library University of Manitoba Winnipeg, MB, R3T 2N2 Fax: (204) fippa@umanitoba.ca

4 The Office consists of the following staff members: Karen Meelker, r Rachelle Ross, Records Manager/Archivist Robyn Wellman, Access and Privacy Coordinator Mary Grace Golfo-Barcelona, Office Assistant Jeanette Mockford, NCTR Access and Privacy Coordinator

5 PHIA Training This training slide show is made available to health care and nonhealth care employees, associates, appointees, agents (through contract or agreement), students, and researchers of the University of Manitoba. This content references PHIA directly, representing the perspectives of a higher education institution. This slide show takes about 1 hour to complete. Please give yourself enough time to familiarize yourself with the material.

6 PHIA Training This training is intended to provide participants with sufficient knowledge of The Personal Health Information Act in order to sign the University of Manitoba Personal Health Information Pledge of Confidentiality. Researchers, research assistants, lab technicians, and all employees, appointees, associates, and contractors who access or may be exposed to personal health information in connection with research are required to complete an institutional PHIA Training Program.

7 PHIA Training The PHIA Training Program consists of: a) Reviewing the Access and Privacy Policy and Procedures The University has Access and Privacy Policies and Procedures that provide specific rules about access to and protection of Personal Health Information held by the institution. b) Reviewing this PHIA training presentation Refer to the overview on the next slide. c) Signing the Pledge of Confidentiality

8 PHIA Training Overview The Personal Health Information Act (PHIA) Key Definitions Protection of Privacy and Confidentiality Access, Collection, Use, Disclosure, Security Safeguards, Storage and Disposal of Personal Health Information PHIA and Research Breaches of Confidentiality PHIA Quiz UM s PHIA Pledge of Confidentiality

9 Personal Health Information Act The Personal Health Information Act (PHIA) provides the legislation framework for managing the information practices of Personal Health Information (PHI) in Manitoba. PHIA applies to Manitoba government departments, agencies and public bodies, including educational bodies, and health information Trustees (health care professionals, facilities, and agencies).

10 Personal Health Information Act The purposes of PHIA are: to provide the right to examine or receive a copy of PHI to provide the right to request corrections to your own PHI to establish rules for collection, use and disclosure of PHI to control the collection, use and disclosure of the Personal Health Identification Number (PHIN) to provide for an independent review of the actions of a trustee under the Act

11 Key Definitions What is Personal Information? What is Personal Health Information? What is a Record? What is a Trustee? What is Privacy? What is Confidentiality?

12 Key Definitions What is Personal Information? istock.com/dragonimages

13 Personal Information is Recorded information about an identifiable individual including: name, home contact information age, sex, sexual orientation, marital or family status ancestry, race, colour, nationality, national or ethnic origin religion, creed, religious belief, association or activity person health information blood type, fingerprints, hereditary characteristics political belief, association or activity education, employment or occupation, history of these three source of income, financial circumstances, activities or history criminal history including regulatory offences

14 Personal Information is Continued own personal views, except if about another person views or opinions about the individual expressed by another person identifying number, symbol or other particular assigned to the individual (i.e. student number or employee number) It is important to note that the views or opinions that you have regarding another individual belongs to that individual. When a view or opinion about an individual is recorded, that information becomes that individual s Personal Information.

15 Key Definitions What is Personal Health Information? istock.com/twinsterphoto

16 Personal Health Information is Recorded information about an identifiable individual that relates to: the individual s health, or health care history, including genetic information about the individual; the provision of health care to the individual, including a doctor s note; payment for health care provided to the individual, and includes bills, receipts, etc.;

17 Personal Health Information is Recorded information about an identifiable individual that relates to: the PHIN and any identifying number, symbol or particular assigned to an individual; and any identifying information about an individual that is collected in the course of, and is incidental to, the provision of health care or payment for health care.

18 Personal Health Information is Personal Health Information may also include: Behaviour resulting from illness or treatment Financial position Home conditions Domestic difficulties Other private matters

19 Personal Health Information is Personal Health Information does not include: Anonymous or statistical information that does not permit individuals to be identified. However, if two or more seemingly anonymous or statistical data items can be combined to readily identify an individual, the data may be considered Personal Health Information.

20 Key Definitions What is a Record? Photo supplied by istock

21 What is a Record? A Record or Recorded Information Means a record of information In any form: written, photographed, recorded or stored in any manner, on any storage medium; or By any means: electronic, graphic, or mechanical means. Examples include X-ray, voic , fax or .

22 What is a Record? Examples of Records Files s Databases Documents Photographs Rough notes and drafts Annotations and sticky notes

23 Key Definitions What is a Trustee? istock.com/chris2766

24 What is a Trustee? A Trustee means any of the following: health professional, health care facility, public body, health services agency that collects or maintains Personal Health Information.

25 What is a Trustee? Health Professionals: Doctor, Dentist, Pharmacist, Nurse, Chiropractor, Therapist, Social Worker, Midwife Health Care Facilities: Hospital, Personal Care Home, Medical Clinic, Laboratory, Psychiatric Facility

26 What is a Trustee? Public Bodies: University of Manitoba, School Divisions, City of Winnipeg The University is a Public Body, and is therefore a Trustee. However, it is not a Health Facility. Health Services Agencies: J.A. Hildes Northern Medical Unit, Centre for Community Oral Health, V.O.N.

27 What is a Trustee? Certain health care units that operate within the University, which hold Personal Health Information, are also Trustees: Dental Clinics Bannatyne Campus University Health Services University Pharmacy Athletic Therapy Centre The University also holds student and employee Personal Health Information, e.g., medical notes.

28 What is a Trustee? A Trustee has a duty to: Help individuals gain access to their own PHI; and Protect the privacy of individuals in the collection, use, disclosure, security, retention and destruction of PHI.

29 Health Professionals as Trustees A health professional with a private practice conducts the administrative side of their business under the federal act, The Personal Information and Protection of Electronic Documents Act, PIPEDA. However, the health care side of the business falls under PHIA, with the health professional as the Trustee. Where a health professional works for the provincial government, a health care facility, a public body, or an agency, that other entity (provincial government, health care facility, public board or agency) is the Trustee. In Manitoba, the Trustee operates under the provincial act, PHIA.

30 Health Professionals as Trustees Some health professionals have dual or multiple roles (i.e. A private practice that operates within a public body). Records created and received in each role should be managed separately. If there is overlap in the records they need to be coordinated to meet the highest requirements of all the legislation.

31 Key Definitions What is Privacy? istock.com/alexlmx

32 What is Privacy? Privacy means an individual s right to be free from intrusion or interference from others. An important aspect of privacy is the individual s right to control access to their Personal Information and Personal Health Information.

33 Key Definitions What is Confidentiality? istock.com/ziquiu

34 What is Confidentiality? The obligation of a Trustee to protect the Personal Information and Personal Health Information entrusted to it, to maintain the secrecy of the information and not misuse or wrongfully disclose it.

35 What is Confidentiality? All persons associated with the University of Manitoba are responsible to protect all Personal Information and Personal Health Information. Accessing, using and disclosing information is acceptable only when required to do your job. Discussions about identifiable individuals should not take place in public places or in the presence of people who do not need to know the information.

36 What is Confidentiality? Individuals have an expectation that the University of Manitoba will protect the privacy, confidentiality and security of the Personal Information and Personal Health Information in it s custody. As a person associated with the University of Manitoba, it is your responsibility to hold all Personal Information and Personal Health Information in the highest of confidence.

37 Privacy and Confidentiality General responsibilities of Trustees: Limit on amount of PHI used or disclosed Limit access to employees who NEED TO KNOW to carry out their responsibilities Apply restrictions on the use of PHI Apply restrictions on the disclosure of PHI Ensure the accuracy of PHI Implement and adhere to security safeguards on PHI Protect individuals privacy

38 Privacy and Confidentiality Access only the minimum amount of information that you need to know in order to do your job. This is the minimum amount, need to know rule. Snooping means to look for information about yourself or someone else in an attempt to find out details about them you do not need in order to do your job. If you are found snooping, you may face disciplinary action and a report to your professional regulatory body (if applicable).

39 Privacy and Confidentiality Privacy and confidentiality must be protected during: Collection taking information from a patient, client, research participant or other; having an individual give information on a form Access retrieving the information Use sharing the information within the Trustee Disclosure releasing the information beyond the Trustee Storage holding the information after its day-to-day use is ended Destruction destroying the information after the need for retention is ended

40 Privacy and Confidentiality Privacy and confidentiality must be protected regardless of how information is accessed, whether it is: heard; viewed; learned; handled; or otherwise, obtained.

41 Quick Review Personal Information (PI) is recorded personal information about identifiable individuals. Personal Health Information (PHI) is recorded health information about identifiable individuals. A record may come in many forms (electronic, paper, text, image). Trustees are public bodies entrusted to collect, use, disclose, store and dispose of PI and PHI. Trustees are required to help people gain access to their own PI and PHI, and to protect the information under it s control.

42 Quick Review An important aspect of privacy is the individual s right to control access to their PI and PHI. Trustees are obliged to maintain the confidentiality, or secrecy, of the PI and PHI entrusted to them. The minimum amount, need to know rule. The privacy and confidentiality of the information in the custody of a Trustee must be maintained throughout it s entire lifespan, from collection to destruction. Privacy and confidentiality must be protected regardless if it is heard, viewed, learned, handled or otherwise obtained.

43 Access to PHI

44 Access to PHI - Individuals Individuals have a right to: Review their Personal Health Information Request corrections be made where necessary Receive a copy of their Personal Health Information upon written request Requests for access to, and correction of, PHI should first be made to the UM office where the information is held.

45 Access to PHI - Individuals A request for access must be responded to as promptly as possible, but no later than: 24 hours if the individual is a hospital in-patient and the information is about care currently being provided; 72 hours to a person who is not a hospital in-patient and the information is about care currently being provided; 30 days in any other case.

46 Access to PHI - Trustees In order to maintain the privacy and confidentiality of the PHI in the custody and under the control of the University of Manitoba, access to PHI by UM employees must be limited to: those who need to know in order to carry out their responsibilities the least amount of information necessary to carrying out the responsibility. These limitations apply to records in any form. This follows the minimum amount, need to know rule.

47 Collection of PHI istock.com/dolgachov

48 Collection of PHI Individuals are to be notified about the purpose for which their Personal Health Information is being collected. Whenever possible, Personal Health Information should be collected directly from the individual the Personal Health Information is concerning. Personal Health Information should be used only for the purpose for which it was originally collected.

49 Collection of PHI Trustees may only collect as much Personal Health Information as is reasonably necessary to accomplish the purpose for which it is collected. This follows the minimum amount, need to know rule.

50 Collection of PHI Notice of Collection Practices A Trustee who collects Personal Health Information directly from the individual the information is about must take reasonable steps to inform the individual: a) Of the purpose for which the information is being collected; and b) How to contact an employee of the Trustee who can answer the individual s questions about collection.

51 Collection of PHI Here s an example of a UM Notification Statement, which is typically placed at the bottom of the form in which the information is being collected. Note the sections in blue, which makes the form it is placed on compliant with the notice of collection practices outlined in PHIA: Notice Regarding Collection, Use, and Disclosure of Personal Health Information by the University Your personal health information is being collected under the authority of The University of Manitoba Act. The information you provide will be used by the University to provide health care services at University Health Services. Your personal health information will not be used or disclosed for other purposes, unless permitted by The Personal Health Information Act (PHIA). If you have any questions about the collection of your personal health information, contact the Access & Privacy Office (tel ), 233 Elizabeth Dafoe Library, University of Manitoba, Winnipeg, MB, R3T 2N2.

52 Use and Disclosure of PHI istock.com/xixinxing

53 Use and Disclosure of PHI USE means revealing PHI to someone within the Trustee s organization. Example: Sending a requisition that contains a patient s name and PHIN to the X-ray technician within the hospital in order to take X-rays of a patient. DISCLOSURE means revealing PHI to someone outside the Trustee s organization. Example: Disclosing a patient s name, contact information and PHIN to a specialist outside of the hospital in which you work.

54 Use and Disclosure of PHI You cannot use or disclose Personal Health Information: In the presence of those that are NOT entitled to the information; or In public places, such as elevators, lobbies, cafeterias, off premises, etc. Be aware of surroundings. Personal Health Information is best discussed in a closed setting.

55 Use and Disclosure of PHI You may use or disclose Personal Health Information ONLY if you: need to know this information to do your job; have consent from the individual the PHI is about; are a person permitted to exercise the rights of another individual (e.g., you are the child of an elderly person); or are authorized by PHIA, ss. 21, 22, or by other legislation Always remember to apply the minimum amount, need to know rule.

56 Use and Disclosure of PHI When is consent required? If the proposed use or disclosure of Personal Health Information is not outlined in Sections 21, 22 and 23 of PHIA, consent is required. When consent is required, it must: a) Relate to the purpose for which the information is used or disclosed; b) Be knowledgeable; c) Be voluntary; and d) Not be obtained through misrepresentation.

57 Use and Disclosure of PHI Knowledgeable Consent Consent is knowledgeable if the individual who gives it has been provided with the information that a reasonable person in the same circumstances would need in order to make a decision about the use or disclosure of the information. Consent With Conditions An individual may give consent subject to conditions, such as limiting which information can be used or disclosed, or setting a time frame in which the consent applies.

58 Use and Disclosure of PHI Express or Implied Consent Consent can be express or implied. Express Consent is clearly and unmistakably stated. Implied Consent is judged by conduct, rather than stated. When Express Consent is Required Consent must be express and not implied if: The disclosure is to someone who is not a Trustee; or The consent is to a Trustee, but not for the original purpose of providing health care.

59 Use and Disclosure of PHI Consent May Be Withdrawn An individual who has given consent, whether express or implied, to the use or disclosure of Personal Health Information may withdraw their consent by notifying the Trustee. A withdrawal does not have retroactive effect. Verbal Consent Express Consent need not be in writing. However, it is good practice to make a record of a consent that has been given verbally.

60 Use and Disclosure of PHI Disclosing PHI with Family and Friends If an individual is a patient or resident in a health care facility, the Trustee may provide information to family/friends about health care currently being provided: If this is in keeping with good medical and professional practice, and If the Trustee believes the individual would not object. Remember, limit the disclosure to the minimum amount about the care currently being provided.

61 Use and Disclosure of PHI Disclosing General Information Trustees may provide general health information to any person, unless the patient/client specifies otherwise. This information is limited to: The individual s name General health status Location within the facility, unless this would reveal specific information about the health of that person

62 Quick Review A person has a right to request a copy of his/her PHI from the holding trustee. Individuals need to be notified about how their PHI will be used and disclosed. Access to PHI should be limited to those who need to know to do their jobs. The use or disclosure of PHI is limited to only those who need to know the information to do their job.

63 Quick Review Consent is required to use or disclose PHI unless authorized under Sections 21, 22 and 23 of PHIA. Consent may be express or implicit, verbal or written, and may contain conditions. Disclosing PHI to family and friends is permitted. It must be limited to care currently being provided, in keeping with good practice, and if the individual would not object. General information can be disclosed unless the individual objects.

64 Security and Storage of PHI istock.com/oliver_le_moal

65 Security and Storage of PHI Personal Health Information is to be properly secured and maintained to protect privacy and confidentiality. Personal Health Information is to be protected from accidental destruction or deterioration or loss by heat, cold, moisture, theft, or vandalism.

66 Security and Storage of PHI PHIA Requires Trustees to: Adopt reasonable safeguards: administrative, technical, physical and electronic; Protect the security, confidentiality, accuracy, and integrity of the Personal Health Information; and Apply reasonable security throughout the lifetime of a record containing Personal Health Information.

67 Security and Storage of PHI Protecting the integrity of PHI means the preservation of its content. This would provide confidence that the information has not been tampered with or modified other than as authorized. Preservation of content is maintained by protecting and securing the PHI throughout collection, access/retrieval, use, disclosure/transfer, and storage.

68 Security and Storage of PHI A Trustee is obligated to protect Personal Health Information by adopting reasonable administrative, technical, physical and electronic safeguards, that ensure the confidentiality, security, accuracy and integrity of the information. In determining the reasonableness of the safeguards to be adopted, a Trustee should take into account the degree of sensitivity of the Personal Health Information to be protected.

69 Security and Storage of PHI Administrative Safeguards: Policies and Procedures; Guidelines and Resources PHIA training and signing of the Pledge of Confidentiality Proper management of swipe cards or key access Secure print codes at printers/fax machines

70 Security and Storage of PHI Technical Safeguards: Role-based profiles on new or existing information management systems Base profiles on the individual s role, which determines the level of access required Multiple levels of authentication for high degree of sensitive information

71 Security and Storage of PHI Physical Safeguards: Arrange office furniture to limit the ability of others to access your files Locks on doors and filing cabinets Clean off your desk at the end of the day (implement a Clean Desk Policy as an Administrative Safeguard)

72 Security and Storage of PHI Electronic Safeguards: Encryption of files for transmission or transport Passwords on all devices Up-to-date anti-virus software Firewalls

73 Security and Storage of PHI Additional Safeguards for Electronic Information: All Trustees must create and maintain a record of user activity for any electronic information system that is used to maintain PHI. This applies to all PHI, including research information, unless: the information is demographic, it is used or disclosed for statistical purposes, or it is disclosed under PHIA 22(2)(h) as part of an approved transfer to a health information network.

74 Security and Storage of PHI Laptops and Removable Storage Personal Health Information should not be carried on electronic portable devices unless it is for an authorized purpose. If the movement of Personal Health Information from the premises of the Trustee is absolutely necessary, and authorized, appropriate safeguards, such as encryption and passwords, must be put in place to ensure that the information is protected. Refer to the University s Travelling with Records Guidelines.

75 Security and Storage of PHI Confidentiality Maintaining the confidentiality of the information in your custody or control is another way to safeguard Personal Health Information. In your life you play several roles, such as family member, friend, relative, student, researcher, or employee. As a person associated with the University of Manitoba, you may learn confidential information about people you know. You cannot share the information you learn at the UM with people not entitled to know the information in other parts of your life.

76 Disposal of PHI istock.com/uwe_merkel

77 Disposal of PHI A Trustee must ensure that Personal Health Information is destroyed by methods that protect the privacy of the individual the information is about. Records in all University departments should be destroyed according to a destruction schedule using a Requisition to Destroy Records (RDR) form. This form serves as a destruction log for all records that contain Personal Health Information.

78 Disposal of PHI Once the RDR has been approved, confidential records may be destroyed using a secure method. The best and most secure way for destroying confidential records is shredding. The records can either be shredded using the University s preferred supplier, or using an in-office shredder. Both of these options comply with the standards for the secure destruction of confidential records.

79 Disposal of PHI The University of Manitoba s preferred shredding supplier is Shred-It, which provides bulk pick-up service for large quantities of materials, or a secure console that is serviced as required. Certificates of Destruction are provided by Shred-It for both services. Refer to our Document Disposal website for more information.

80 Disposal of PHI Small amounts can be destroyed using an in-office shredder. When the in-office shredder is full, seal the shredded material in a clear plastic bag and deposit the bag in one of the large blue recycling bins placed in or near your department. The bins are collected by Physical Plant and the shredding is sent off-site to be recycled.

81 Disposal of PHI Electronically held personal health information should be destroyed by deleting the files off the network drive. Personal Health Information should not be stored on the computer s hard drive. IST will assist any office requiring destruction of electronic records, or with the confidential destruction of hard drives, including the hard drives from multi-purpose printer/fax/scanner units.

82 Quick Review It is everyone s responsibility to ensure reasonable safeguards are in place to protect PHI. Laptops are particularly vulnerable to burglary and theft. Personal Health Information contained on a laptop must be encrypted and the laptop must be password protected. Part of protecting PHI is making sure that records are not accessed, altered or destroyed without authorization. Remember the four main types of safeguards: Administrative, Technical, Physical, and Electronic.

83 Quick Review Records in all University departments should be destroyed according to a destruction schedule. Before destruction occurs, a Requisition to Destroy Records (RDR) should be submitted and approved. Shredding is the best and most secure method of destruction. For help with the destruction of electronic records and hard drives, contact IST.

84 Research at the University istock.com/bee32

85 Research at the University Research involving humans requires Research Ethics Board (REB) approval, including: Research that involves clinical trials and other biomedical interventions; and Research that uses Personal Health Information (PHI). If the Personal Health Information is maintained by the government or a government agency, review and approval must come from the Health Information Privacy Committee (HIPC).

86 Research at the University If the research is conducted in connection with the University of Manitoba, review and approval must come from one of the five Research Ethics Boards: Psychology/Sociology REB Education/Nursing REB Joint-Faculty REB Biomedical Research Ethics Board (BREB) Health Research Ethics Board (HREB)

87 Research at the University At the Bannatyne Campus, most research is reviewed and approved by the BREB or the HREB. The BREB reviews all research ethics protocols involving clinical trials and other biomedical research interventions. The HREB reviews research involving the behavioral sciences, surveys, examinations of medical records and protocols of generally lesser risk.

88 Research at the University At the Fort Garry Campus, three boards review and approve research: Education/Nursing REB: Faculties of Education, Kinesiology and Recreation Management, Extended Education, Engineering, and the College of Nursing Psychology/Sociology REB: Faculty of Social Work, Departments of Sociology, Psychology, and Counseling Services Joint-Faculty REB: Remaining Faculties and Departments

89 Research at the University Researchers using information/data held by Manitoba Centre for Health Policy (MCHP) must fulfill several reviews and approvals: HIPC Health Information Privacy Committee; HREB approval from the UM. An HREB from another institution will be considered if it is accompanied by a letter indicating that the review is accepted by that institution; MCHP internal review. Depending on the data source other approvals may be required. A full explanation is found at U of M website: Manitoba Centre for Health Policy (MCHP) Applying for Access

90 Research at the University Disclosures of PHI for Health Research A Trustee may disclose Personal Health Information to a person conducting health research if the requirements outlined in Section 24 of PHIA are met. Outlines who can approve disclosure of PHI for health research; Establishes conditions for approval; Details required agreements for disclosure of PHI; and Sets limits on disclosure of PHI for health research. See The Personal Health Information Act, Section 24 for details.

91 Research at the University Researchers collect, access, use, and share information about research participants during the course of research. Tri-Council Policy Statement defines five classes of information to be aware of: a) Identifying b) Identifiable c) De-identified/coded d) Anonymized e) Anonymous

92 Research at the University a) Identifying information: The information identifies an individual through direct identifiers (e.g., name, address, social insurance number, or personal health identification number). b) Identifiable information: The information could be used to reidentify an individual through a combination of indirect identifiers (e.g., date of birth, place of residence, or unique personal characteristic) using reasonably foreseeable means.

93 Research at the University c) De-identified/coded information: Identifiers are removed and replaced with a code. Depending on access to the code, it may be possible to re-identify specific individuals (e.g., individuals are assigned a code name and the principal investigator retains a list that links the code name with the individual s actual name so data can be re-linked if necessary). Researchers who have access to the code and the data have identifiable information.

94 Research at the University d) Anonymized information: Information is irrevocably stripped of identifiers, and a code is not kept to allow future re-linkage. e) Anonymous information: Information never had identifiers associated with it (e.g., anonymous surveys).

95 Research at the University Retention of Research Records Researchers must outline policies and procedures to destroy or remove identifying information as soon as possible. Researchers must identify intended retention periods in the REB submission for all data. Researchers may be asked to justify the rationale for a certain period of retention in the application.

96 Quick Review All research involving humans requires REB or HIPC approval. Disclosure of Personal Health Information for health research is governed by Section 24 of PHIA. Different classes of Personal Health Information (identifiable, deidentified, anonymized, anonymous) require different levels of security protection.

97 Breach of Privacy istock.com/xixinxing

98 Breach of Privacy A Breach of Privacy occurs when Personal Information, including Personal Health Information, is collected, accessed, used, disclosed, transported, transmitted, transferred or destroyed other than as authorized, or when the accuracy, confidentiality or integrity of the information is compromised. Examples may include, but are not limited to, the viewing of confidential information by unauthorized individuals, the access, theft or loss of University Records and the unauthorized destruction of such information.

99 Breach of Privacy Snooping is an example of a breach of privacy. Under The Personal Health Information Act, snooping is a fineable offence. Any individual who willfully uses, discloses, gains access to or attempts to gain access to another person s Personal Health Information is guilty of an offence, and can be fined. Some recent examples of snooping into Personal Health Information

100 Breach of Privacy

101 Breach of Privacy A Breach of Privacy occurs when: PHI is accessed by someone not entitled to that information, including snooping. PHI is shared (used or disclosed) with those not entitled to that information. PHI is removed from the custody of the trustee without authorization. The integrity of a record is compromised. Collect more PHI than is required to do the job. Do not appropriately safeguard PHI.

102 Breach of Privacy If you know or suspect a Breach of Privacy has occurred, immediately notify: The head of your UM office, UM health unit, or health care agency. The head will notify the dean or director, the Vice-President (Administration), and the.

103 Breach of Privacy The, in consultation with others, will decide whether an investigation is necessary; If the decision is yes, the will: inquire into the incident/allegation consult with appropriate persons to determine whether a breach has occurred document findings recommend disciplinary action, if applicable

104 PHIA Quiz istock.com/cacaroot

105 PHIA Quiz True or False? In order to maintain the privacy and confidentiality of the Personal Health Information held in electronic systems, access to the electronic systems by UM employees must be limited to only those who need access in order to do their jobs. However, once they have access to the electronic system, they are permitted to view all records and information within that system. True False

106 PHIA Quiz True or False? In order to maintain the privacy and confidentiality of the Personal Health Information held in electronic systems, access to the electronic systems by UM employees must be limited to only those who need access in order to do their jobs. However, once they have access to the electronic system, they are permitted to view all records and information within that system. True False You are only permitted to view the records and information within the system that you require for your job. Remember the minimum amount, need to know rule.

107 PHIA Quiz True or False? A Trustee who collects Personal Health Information directly from the individual the information is about must take reasonable steps to inform the individual of the purpose in which the information is being collected, and how to contact an employee of the Trustee who can answer the individual s questions about collection. True False

108 PHIA Quiz True or False? A Trustee who collects Personal Health Information directly from the individual the information is about must take reasonable steps to inform the individual of the purpose in which the information is being collected, and how to contact an employee of the Trustee who can answer the individual s questions about collection. True False

109 PHIA Quiz Which of the following statements are true about consent? An individual may give consent subject to conditions, such as limiting which information can be used or disclosed, or setting a time frame in which the consent applies. An individual who has given consent to the use or disclosure of personal health information may withdraw their consent by notifying the trustee. A withdrawal of consent does not have to be retroactive. Express consent does not need to be in writing. All of the above.

110 PHIA Quiz Which of the following statements are true about consent? An individual may give consent subject to conditions, such as limiting which information can be used or disclosed, or setting a time frame in which the consent applies. An individual who has given consent to the use or disclosure of personal health information may withdraw their consent by notifying the trustee. A withdrawal of consent does not have to be retroactive. Express consent does not need to be in writing. All of the above.

111 PHIA Quiz A co-worker needs some information quickly and tells you they can t remember their password to get into a clinical database. The coworker asks if you could do them a favor and just log into the system and they will take over and get the information they need. What should you do? Give the co-worker your password. She is in a hurry and needs the information quickly to do her job. What s the big deal?! Log into the database and let the co-worker access the information she needs. Don t share your password

112 PHIA Quiz A co-worker needs some information quickly and tells you they can t remember their password to get into a clinical database. The coworker asks if you could do them a favor and just log into the system and they will take over and get the information they need. What should you do? Give the co-worker your password. She is in a hurry and needs the information quickly to do her job. What s the big deal?! Log into the database and let the co-worker access the information she needs. Don t share your password. Passwords are a safeguard that only work if they are kept confidential.

113 PHIA Quiz What type of disciplinary action may be taken if it is confirmed that you used or disclosed Personal Health Information in violation of PHIA? A verbal or written warning Suspension Termination of employment, contract, association or appointment with the University of Manitoba A report to the appropriate professional regulatory body Any of the above

114 PHIA Quiz What type of disciplinary action may be taken if it is confirmed that you used or disclosed Personal Health Information in violation of PHIA? A verbal or written warning Suspension Termination of employment, contract, association or appointment with the University of Manitoba A report to the appropriate professional regulatory body Any of the above

115 PHIA Quiz You are involved in the care of a high profile person. Your involvement in this person s care has been documented by media reports, so it has become public knowledge. Your friends and family keep asking questions about the person. Your involvement is already public knowledge, so you tell them what you know so far. Is this a breach of privacy? Yes No

116 PHIA Quiz You are involved in the care of a high profile person. Your involvement in this person s care has been documented by media reports, so it has become public knowledge. Your friends and family keep asking questions about the person. Your involvement is already public knowledge, so you tell them what you know so far. Is this a breach of privacy? Yes Disclosing information about an individual with those who have no business or health-care related purpose for knowing the information is a breach of privacy. No

117 PHIA Quiz You are training a new employee on the electronic health record system your clinic uses and want to show the new employee an example of what a completed record looks like. You are also a patient at the clinic, so you use your record as a training tool. Is this a breach? Yes No

118 PHIA Quiz You are training a new employee on the electronic health record system your clinic uses and want to show the new employee an example of what a completed record looks like. You are also a patient at the clinic, so you use your record as a training tool. Is this a breach? Yes Even though it is your record, your role as a patient is different from your role as an employee. You should only access records you require for your job. No

119 PHIA Quiz You are organizing a curling team to compete with other teams in your community. You want a ringer. You recall a former student who mentioned she was quite good at the sport but had not played for some time and was eager to start again. You access her student record to get her telephone number. You make sure to ignore all other information. Is this a breach of privacy? No, because telephone numbers are public information. You simply accessed it in a different way. Yes, because the phone number was collected for educational purposes.

120 PHIA Quiz You are organizing a curling team to compete with other teams in your community. You want a ringer. You recall a former student who mentioned she was quite good at the sport but had not played for some time and was eager to start again. You access her student record to get her telephone number. You make sure to ignore all other information. Is this a breach of privacy? No, because telephone numbers are public information. You simply accessed it in a different way. Yes, because the phone number was collected for educational purposes. Using the information for a use that is not consistent with the original purpose it was collected for is a breach.

121 PHIA Quiz You notice student counselling records sticking out of a garbage can, which includes the students names, student numbers, PHINs and contact information. Is discarding these papers in this manner a violation of PHIA? Yes No

122 PHIA Quiz You notice student counselling records sticking out of a garbage can, which includes the students names, student numbers, PHINs and contact information. Is discarding these papers in this manner a violation of PHIA? Yes. Confidential records must be destroyed appropriately (shredding). No

123 PHIA Quiz You are leaving work after a long day. Just as you get to the parking lot you notice a USB drive lying on the ground. What should you do? Do nothing and leave it there. Pick it up and take it home for your own personal use. Take it to the. Take it to the nearest lost and found.

124 PHIA Quiz You are leaving work after a long day. Just as you get to the parking lot you notice a USB drive lying on the ground. What should you do? Do nothing and leave it there. Pick it up and take it home for your own personal use. Take it to the. Take it to the nearest lost and found.

125 PHIA Quiz You meet an individual through your involvement in a research project. You feel that there is a connection and would like to contact them about meeting up for coffee. You were too shy to ask them in person, so you look up their contact information in the electronic system you are using for research and copy down their address. When you are at home, you send them an using your Yahoo account (not your work account) to see if they are interested in meeting. Is this a violation of that individual s privacy? Yes No

126 PHIA Quiz You meet an individual through your involvement in a research project. You feel that there is a connection and would like to contact them about meeting up for coffee. You were too shy to ask them in person, so you look up their contact information in the electronic system you are using for research and copy down their address. When you are at home, you send them an using your Yahoo account (not your work account) to see if they are interested in meeting. Is this a violation of that individual s privacy? Yes You have access to that information only for the purpose in which it was collected, for research, not for any other use. No

127 PHIA Pledge of Confidentiality

128 PHIA Pledge of Confidentiality At the University, a Personal Health Information Pledge of Confidentiality ( Confidentiality Pledge ) is required of individuals as a condition of their employment, appointment, contract, or association with designated faculties, programs and offices, and as a condition of research involving humans. The requirement extends to student employees and researchers.

129 PHIA Pledge of Confidentiality 1. All University employees and persons associated with the University are responsible for protecting the security and confidentiality of all Personal Health Information (verbal or recorded in any form) that is obtained, handled, viewed, heard, or learned, in the course of their work or association with the University. 2. Personal Health Information shall be protected during its collection, access, use, retention, storage and destruction.

130 PHIA Pledge of Confidentiality 3. You may only use or disclose Personal Health Information in the discharge of your responsibilities and duties (including reporting duties imposed by legislation) on a need to know basis. 4. Discussion regarding Personal Health Information shall not take place in the presence of persons not entitled to such information, or in public places (elevators, lobbies, cafeterias, off premises, etc.).

131 PHIA Pledge of Confidentiality 5. Unauthorized use or disclosure of confidential information shall result in a disciplinary response up to and including termination of employment, contract, association, or appointment with the University of Manitoba. 6. A confirmed breach of confidentiality may result in disciplinary action and be reported to the individual s professional body. 7. All individuals who become aware of a possible breach of the security or confidentiality of Personal Health Information shall follow the procedures outlined under Breach of Privacy.

132 PHIA Pledge of Confidentiality To obtain your University of Manitoba Personal Health Information Pledge of Confidentiality declaration form, click here. Submit your completed form by saving your completed form to your computer and send it as an attachment to

133 PHIA Pledge of Confidentiality Please note, it is best to view and complete the declaration form using Adobe Acrobat products. Click here to access free downloads of Adobe Reader for a variety of computer systems. If you have any questions about the declaration form, please contact our office at fippa@umanitoba.ca or

134 Thank you! If you have questions about the training presentation, please contact the at: Phone: All images are used with permission from Microsoft unless otherwise noted.

135

HIPAA Training

HIPAA Training 2011-2012 HIPAA Training New Hire Orientation and General Training 1 This training is to ensure all Health Management workforce members (associates, contracted individuals, volunteers and students) understand

More information

PRIVACY BREACH MANAGEMENT POLICY

PRIVACY BREACH MANAGEMENT POLICY \(.kon Education Education PRIVACY BREACH MANAGEMENT POLICY Effective Date: September 1, 2016 GENERAL INFORMATION Under the Access to Information and Protection of Privacy Act (A TIPP Act) public bodies

More information

I. Researcher Information

I. Researcher Information Annotations Updated: vember 25, 2016 Form Updated: August 8, 2016 Health Information Management 4040-300 Carlton Street, Winnipeg, Manitoba, Canada R3B 3M9 T 204-945-7139 F 204-945-1911 www.manitoba.ca

More information

Reporting and Investigating Privacy Breaches and Complaints Approval: Original Signed by R. Cloutier. Date: September 2017

Reporting and Investigating Privacy Breaches and Complaints Approval: Original Signed by R. Cloutier. Date: September 2017 REGIONAL Applicable to all WRHA governed sites and facilities (including hospitals and personal care homes), and all funded hospitals and personal care homes. All other funded entities are excluded unless

More information

Protecting Patient Privacy It s Everyone s Responsibility

Protecting Patient Privacy It s Everyone s Responsibility 1 of 27 Protecting Patient Privacy It s Everyone s Responsibility This presentation is comprised of 27 screens. When you have finished reading a screen, click your mouse to continue to the next screen.

More information

Student Orientation: HIPAA Health Insurance Portability & Accountability Act

Student Orientation: HIPAA Health Insurance Portability & Accountability Act _ Student Orientation: HIPAA Health Insurance Portability & Accountability Act HIPAA: National Privacy Law History of HIPAA What was once an ethical responsibility to protect a patient s privacy is now

More information

Privacy and Security For Teammates

Privacy and Security For Teammates Privacy and Security For Teammates This self-directed learning module contains information all CRHS Teammates are expected to know in order to protect our patients, our guests, and ourselves. Target Audience:

More information

Chapter 9 Legal Aspects of Health Information Management

Chapter 9 Legal Aspects of Health Information Management Chapter 9 Legal Aspects of Health Information Management EXERCISE 9-1 Legal and Regulatory Terms 1. T 2. F 3. F 4. F 5. F EXERCISE 9-2 Maintaining the Patient Record in the Normal Course of Business 1.

More information

Compliance with Personal Health Information Protection Act

Compliance with Personal Health Information Protection Act Compliance with Personal Health Information Protection Act Ontario s Personal Health Information & Protection Act (PHIPA) governs the collection, use and disclosure of personal health information by midwives

More information

Health Information Privacy Policies and Procedures

Health Information Privacy Policies and Procedures University of the Pacific Arthur A. Dugoni School of Dentistry Health Information Privacy Policies and s These Health Information Privacy Policies & s implement our obligations to protect the privacy of

More information

Information Privacy and Security

Information Privacy and Security Information Privacy and Security 2015 Purpose of HIPAA HIPAA stands for the Health Insurance Portability and Accountability Act. Its purpose is to establish nationwide protection of patient confidentiality,

More information

Updated FY15 Dignity Health General Compliance Education for Staff Module 2

Updated FY15 Dignity Health General Compliance Education for Staff Module 2 Updated FY15 Dignity Health General Compliance Education for Staff Module 2 This course will provide you with important information about the laws and regulations that affect the healthcare industry, our

More information

Study Management PP STANDARD OPERATING PROCEDURE FOR Safeguarding Protected Health Information

Study Management PP STANDARD OPERATING PROCEDURE FOR Safeguarding Protected Health Information PP-501.00 SOP For Safeguarding Protected Health Information Effective date of version: 01 April 2012 Study Management PP 501.00 STANDARD OPERATING PROCEDURE FOR Safeguarding Protected Health Information

More information

HIPAA Privacy Training for Non-Clinical Workforce

HIPAA Privacy Training for Non-Clinical Workforce Office of Compliance Programs HIPAA Privacy Training for Non-Clinical Workforce Revised: January 24, 2017 HIPAA Privacy Workforce Training The Health Insurance Portability & Accountability Act (HIPAA)

More information

MANITOBA GOVERNMENT INVENTORY OF PERSONAL INFORMATION SYSTEMS WORKSHEET. Here are a few important pointers to help you fill out the Worksheet:

MANITOBA GOVERNMENT INVENTORY OF PERSONAL INFORMATION SYSTEMS WORKSHEET. Here are a few important pointers to help you fill out the Worksheet: MANITOBA GOVERNMENT INVENTORY OF PERSONAL INFORMATION SYSTEMS WORKSHEET Here are a few important pointers to help you fill out the Worksheet: Read the Inventory Instructions. Print copies of this Worksheet.

More information

DUTIES OF A CUSTODIAN

DUTIES OF A CUSTODIAN DUTIES OF A CUSTODIAN SUMMARY OF CUSTODIAN DUTIES UNDER THE PERSONAL HEALTH INFORMATION ACT Custodians have legislated duties as outlined in the Act. A custodian is required to: 1. prepare and make readily

More information

MCCP Online Orientation

MCCP Online Orientation 1 Objectives At the conclusion of this presentation, students will be able to: Discuss application of HIPAA to student s role. Describe the federal requirements of the HIPAA/HITECH regulations that protect

More information

AN OVERVIEW OF FIPPA for FACULTY, INSTRUCTORS & ADMINISTRATORS. Information and tips on how to keep you FIPPA FRIENDLY

AN OVERVIEW OF FIPPA for FACULTY, INSTRUCTORS & ADMINISTRATORS. Information and tips on how to keep you FIPPA FRIENDLY AN OVERVIEW OF FIPPA for FACULTY, INSTRUCTORS & ADMINISTRATORS Information and tips on how to keep you FIPPA FRIENDLY Privacy Legislation Ontario universities were made subject to provincial Freedom of

More information

CLINICIAN S GUIDE TO HIPAA PRIVACY

CLINICIAN S GUIDE TO HIPAA PRIVACY CLINICIAN S GUIDE TO HIPAA PRIVACY Introduction... 2 What is HIPAA?... 2 Health Information Privacy... 2 Protected Health Information... 3 Identifiers... 3 HIPAA s Impact on Clinical Practice, Treatment,

More information

WHAT IS HIPAA? HIPAA is the ELECTRONIC transmission of Three programs have been enacted to date Privacy Rule April 2004

WHAT IS HIPAA? HIPAA is the ELECTRONIC transmission of Three programs have been enacted to date Privacy Rule April 2004 Rev. 1/22/2010 HIPAA TRAINING WHAT IS HIPAA? Health Insurance Portability and Accountability Act HIPAA is the ELECTRONIC transmission of Three programs have been enacted to date Privacy Rule April 2004

More information

HIPAA PRIVACY DIRECTIONS. HIPAA Privacy/Security Personal Privacy. What is HIPAA?

HIPAA PRIVACY DIRECTIONS. HIPAA Privacy/Security Personal Privacy. What is HIPAA? DIRECTIONS HIPAA Privacy/Security Personal Privacy 1. Read through entire online training presentation 2. Close the presentation and click on Online Trainings on the Intranet home page 3. Click on the

More information

Applicants from Diploma, Degree, and Certificate Health Care Programs Supplementary Application Form

Applicants from Diploma, Degree, and Certificate Health Care Programs Supplementary Application Form Applicants from Diploma, Degree, and Certificate Health Care Programs Supplementary Application Form Return no later than June 1 This form must be submitted if you have previously attended a professional

More information

A Deep Dive into the Privacy Landscape

A Deep Dive into the Privacy Landscape A Deep Dive into the Privacy Landscape David Goodis Assistant Commissioner Information and Privacy Commissioner of Ontario Canadian Institute Advertising & Marketing Law January 22, 2018 Who is the Information

More information

The Privacy & Security of Protected Health Information

The Privacy & Security of Protected Health Information The Privacy & Security of Protected Health Information By the end of this course, you should: Be familiar with the patient s rights to privacy under HIPAA Privacy Act Be able to identify Protected Health

More information

Dr. Kristin Heins, ND Thrive Natural Family Health 110 Eglinton Avenue East, Suite 502 Toronto, Ontario M4P 2Y1 Telephone: (647)

Dr. Kristin Heins, ND Thrive Natural Family Health 110 Eglinton Avenue East, Suite 502 Toronto, Ontario M4P 2Y1 Telephone: (647) Psychotherapy Client Information Today's date: A. Identification Your name: Date of birth: Age: Your nicknames/previous/maiden/aliases: Sex: [ ]Male [ ]Female Gender: Title: [ ]Mr. [ ]Mrs. [ ]Miss [ ]Ms

More information

Privacy and Management of Health Information

Privacy and Management of Health Information Standards Privacy and Management of Health Information Standards for s Regulated Members September : FOR S REGULATED MEMBERS i Approved by the College and Association of Registered Nurses of Alberta ()

More information

Advanced HIPAA Communications and University Relations

Advanced HIPAA Communications and University Relations Advanced HIPAA Communications and University Relations accepts no liability of any use reliance placed on it, as it is warranty, express, or implied, or completeness of 1 the HIPAA Health Insurance Portability

More information

REVIEWED BY Leadership & Privacy Officer Medical Staff Board of Trust. Signed Administrative Approval On File

REVIEWED BY Leadership & Privacy Officer Medical Staff Board of Trust. Signed Administrative Approval On File The Alexandra Hospital, Ingersoll PRIVACY POLICY SUBJECT-TITLE Privacy Policy REVIEWED BY Leadership & Privacy Officer Medical Staff Board of Trust DATE Oct 11, 2005 Nov 8, 2005 POLICY CODE DATE OF ORIGIN

More information

What is your start date? (Date in which you plan to begin seeing patients in the hospital). Specialty SECTION I. IDENTIFICATION DATA

What is your start date? (Date in which you plan to begin seeing patients in the hospital). Specialty SECTION I. IDENTIFICATION DATA This Application is for Non-employed Clinical Assistants (RN, dental assistant, orthotist, etc) who wish to assist a supervising physician at one or more of our facilities. Advanced Practice Nurses (CRNA,

More information

STEP BY STEP SCHOOL. Data Protection Policy and Privacy Notice

STEP BY STEP SCHOOL. Data Protection Policy and Privacy Notice Data Protection Policy and Privacy Notice 1 Contents 1. Aims... 3 2. Legislation and guidance... 3 3. Definitions... 3 4. The data controller... 4 5. Data protection principles... 4 6. Roles and responsibilities...

More information

Getting Ready for Ontario s Privacy Legislation GUIDE. Privacy Requirements and Policies for Health Practitioners

Getting Ready for Ontario s Privacy Legislation GUIDE. Privacy Requirements and Policies for Health Practitioners Getting Ready for Ontario s Privacy Legislation GUIDE Privacy Requirements and Policies for Health Practitioners PUBLISHED BY THE COLLEGE OF DENTAL HYGIENISTS OF ONTARIO SEPTEMBER 2004 2 This booklet is

More information

DATA PROTECTION POLICY

DATA PROTECTION POLICY DATA PROTECTION POLICY Document Number 2010/35/V1 Document Title Data Protection Policy Author Nic McCullagh Author s Job Title Information Governance Manager Department IM&T Ratifying Committee Capacity

More information

Technology Standards of Practice

Technology Standards of Practice 2016 Technology Standards of Practice Used with permission from the Association of Social Work Boards (2016) Table of Contents Technology Standards of Practice 2 Definitions 2 Section 1 Practitioner Competence

More information

HIPAA. Health Insurance Portability and Accountability Act. Presented by the UMMC Office of Integrity and Compliance

HIPAA. Health Insurance Portability and Accountability Act. Presented by the UMMC Office of Integrity and Compliance HIPAA Health Insurance Portability and Accountability Act Presented by the UMMC Office of Integrity and Compliance Rules and Regulations to ensure Privacy Set Federally recognized standards to ensure both

More information

Policy Number: Disclosure of Personal. Health Information to Police Approval Signature: Original signed by A. Wilgosh.

Policy Number: Disclosure of Personal. Health Information to Police Approval Signature: Original signed by A. Wilgosh. POLICY REGIONAL Applicable to all WRHA governed sites and facilities (including hospitals and personal care homes), and all funded hospitals and personal care homes. All other funded entities are excluded

More information

HIPAA Education Program

HIPAA Education Program HIPAA Education Program 2017-2018 Assurance and Compliance Services HIPAA Training Requirement This HIPAA Training Program is intended for and will satisfy the training requirement for the: Mount Sinai

More information

GDPR Records Management Policy

GDPR Records Management Policy GDPR Records Management Policy Last updated: April 2018 0 Contents: Statement of intent 1. Legal framework 2. Responsibilities 3. Benefits of a retention policy 4. Retention of pupil records and other

More information

HIPAA Health Insurance Portability and Accountability Act of 1996

HIPAA Health Insurance Portability and Accountability Act of 1996 HIPAA Health Insurance Portability and Accountability Act of 1996 Protected Health Information (PHI) Covers patient information in any form written, verbal, or electronic PHI Includes Any information that

More information

THE PRIVACY ACT AND THE AUSTRALIAN PRIVACY PRINCIPLES FREQUENTLY ASKED QUESTIONS

THE PRIVACY ACT AND THE AUSTRALIAN PRIVACY PRINCIPLES FREQUENTLY ASKED QUESTIONS THE PRIVACY ACT AND THE AUSTRALIAN PRIVACY PRINCIPLES FREQUENTLY ASKED QUESTIONS CONTENTS How is Privacy governed in Australia?... 3 Does the Privacy Act apply to me?... 3 I have been told that my State/Territory

More information

FREEDOM OF INFORMATION AND PROTECTION OF PRIVACY A. 38

FREEDOM OF INFORMATION AND PROTECTION OF PRIVACY A. 38 Select Public/Private If Private select Ed. Act. Section. REPORT TO GOVERNANCE AND POLICY COMMITTEE FREEDOM OF INFORMATION AND PROTECTION OF PRIVACY A. 38 Turning to the disciples, He said privately, Blessed

More information

Breach Reporting and Safeguarding PHI Outpatient Services August, UAMS HIPAA Office Anita Westbrook

Breach Reporting and Safeguarding PHI Outpatient Services August, UAMS HIPAA Office Anita Westbrook Breach Reporting and Safeguarding PHI Outpatient Services August, 2012 UAMS HIPAA Office Anita Westbrook Breaches and Breach Reporting Real Life Example An employee of a large hospital accidentally left

More information

Compliance Program, Code of Conduct, and HIPAA

Compliance Program, Code of Conduct, and HIPAA Compliance Program, Code of Conduct, and HIPAA Agenda Introduction to Compliance The Compliance Program Code of Conduct Reporting Concerns HIPAA Why have a Compliance Program Procedures to follow applicable

More information

HIPAA and HITECH: Privacy and Security of Protected Health Information

HIPAA and HITECH: Privacy and Security of Protected Health Information HIPAA and HITECH: Privacy and Security of Protected Health Information What is HIPAA? Health Insurance Portability and Accountability Act of 1996 A federal law enacted to: Protect the privacy of a patient

More information

IVAN FRANKO HOME Пансіон Ім. Івана Франка

IVAN FRANKO HOME Пансіон Ім. Івана Франка THE IVAN FRANKO HOME S COMMITMENT TO PRIVACY PRIVACY STATEMENT The Ivan Franko Home respects this privacy of our residents, employees, Directors, volunteers and donors. We are committed to ensuring that

More information

A general review of HIPAA standards and privacy practices 2016

A general review of HIPAA standards and privacy practices 2016 A general review of HIPAA standards and privacy practices 2016 45 CFR, 164 Health Insurance Portability and Accountability Act Treatment, Payment and Healthcare Operations 42 CFR, Part 2, Confidentiality

More information

PRIVACY POLICIES AND PROCEDURES

PRIVACY POLICIES AND PROCEDURES Vinay M. Reddy, M.D., Ethelynda Jaojoco, M.D. Karen D. Cain, PA-C Julie J. Stackhouse, PA-C Jacie Touart, PA-C Brian Vaccarezza, PA-C Physical Medicine & Rehabilitation Electrodiagnostic Medicine Disorders

More information

East Carolina University 2010 Annual HIPAA Privacy Training

East Carolina University 2010 Annual HIPAA Privacy Training East Carolina University 2010 Annual HIPAA Privacy Training What are the HIPAA Privacy and Security Rules? Federal laws that govern the use and disclosure of health information of our patients and research

More information

Mandatory Reporting and Breach Notification Changes to PHIPA and what you need to know

Mandatory Reporting and Breach Notification Changes to PHIPA and what you need to know Mandatory Reporting and Breach Notification Changes to PHIPA and what you need to know 1 Sarah Yun Associate Overview of amendment to O. Reg. 329/04 and What you need to know Brian Beamish Information

More information

Privacy Toolkit for Social Workers and Social Service Workers Guide to the Personal Health Information Protection Act, 2004 (PHIPA)

Privacy Toolkit for Social Workers and Social Service Workers Guide to the Personal Health Information Protection Act, 2004 (PHIPA) Social Workers and Social Service Workers Guide to the Personal Health Information Protection Act, 2004 (PHIPA) COPYRIGHT 2005 BY ONTARIO COLLEGE OF SOCIAL WORKERS AND SOCIAL SERVICE WORKERS ALL RIGHTS

More information

UNDERSTANDING OUR CODE OF CONDUCT...4 OUR RELATIONSHIP WITH THOSE WE SERVE...5 OUR RELATIONSHIP WITH PHYSICIANS AND OTHER HEALTH CARE PROVIDERS...

UNDERSTANDING OUR CODE OF CONDUCT...4 OUR RELATIONSHIP WITH THOSE WE SERVE...5 OUR RELATIONSHIP WITH PHYSICIANS AND OTHER HEALTH CARE PROVIDERS... Code of Conduct Code of Ethics Table of Contents UNDERSTANDING OUR CODE OF CONDUCT...4 OUR RELATIONSHIP WITH THOSE WE SERVE...5 OUR RELATIONSHIP WITH PHYSICIANS AND OTHER HEALTH CARE PROVIDERS...7 OUR

More information

Standard Operating Procedures (SOP) Research and Development Office

Standard Operating Procedures (SOP) Research and Development Office Standard Operating Procedures (SOP) Research and Development Office Title of SOP: Principles of Data Collection and Storage SOP Number: 8 Supercedes: 1.0 Effective date: August 2013 Review date: August

More information

VHA Privacy Policy Training FY VHA Privacy Office

VHA Privacy Policy Training FY VHA Privacy Office VHA Privacy Policy Training Applicable Confidentiality Statutes and Regulations The following legal provisions govern the collection, use, maintenance, and disclosure of information from VHA records. The

More information

Privacy and Security Compliance: The. Date Presenter Name of Member Organization

Privacy and Security Compliance: The. Date Presenter Name of Member Organization Privacy and Security Compliance: The Basics Date Presenter Name of Member Organization Privacy and Security Compliance: The Context for What We Do Privacy and Security compliance within (your office) is

More information

FACULTY OF DENTISTRY, THE UNIVERSITY OF HONG KONG THE PRINCE PHILIP DENTAL HOSPITAL

FACULTY OF DENTISTRY, THE UNIVERSITY OF HONG KONG THE PRINCE PHILIP DENTAL HOSPITAL FACULTY OF DENTISTRY, THE UNIVERSITY OF HONG KONG THE PRINCE PHILIP DENTAL HOSPITAL Rules Governing Treatment of Patients and Handling of Patient Information (Applicable to Staff and Students of both the

More information

HIPAA PRIVACY TRAINING

HIPAA PRIVACY TRAINING HIPAA PRIVACY TRAINING HIPAA Privacy Training Objective Present a general overview of HIPAA and define important terms Understand the purpose of HIPAA and the Privacy Rule Understand the term Protected

More information

PRIVACY POLICY USES AND DISCLOSURES FOR TREATMENT, PAYMENT, AND HEALTH CARE OPERATIONS

PRIVACY POLICY USES AND DISCLOSURES FOR TREATMENT, PAYMENT, AND HEALTH CARE OPERATIONS PRIVACY POLICY As of April 14, 2003, the Federal regulation on patient information privacy, known as the Health Insurance Portability and Accountability Act (HIPAA), requires that we provide (in writing)

More information

What to do When Faced With a Privacy Breach: Guidelines for the Health Sector. ANN CAVOUKIAN, Ph.D. COMMISSIONER

What to do When Faced With a Privacy Breach: Guidelines for the Health Sector. ANN CAVOUKIAN, Ph.D. COMMISSIONER What to do When Faced With a Privacy Breach: Guidelines for the Health Sector ANN CAVOUKIAN, Ph.D. COMMISSIONER INFORMATION AND PRIVACY COMMISSIONER OF ONTARIO Table of Contents What is a privacy breach?...1

More information

Emergency Medical Services Division Policies Procedures Protocols

Emergency Medical Services Division Policies Procedures Protocols Emergency Medical Services Division Policies Procedures Protocols Patient Medical Record Security and Privacy Policies and Procedures (1003.00) I. GENERAL PROVISIONS: A. The intent of these policies and

More information

INVESTIGATION REPORT

INVESTIGATION REPORT Prince Albert Co-operative Health Centre Community Clinic March 27, 2018 Summary: A patient and her spouse attended the Prince Albert Co-operative Health Centre Community Clinic (the Clinic) for lab services

More information

A PHIPA Update from the IPC

A PHIPA Update from the IPC A PHIPA Update from the IPC April 10, 2017 Brian Beamish Commissioner Information and Privacy Commissioner of Ontario PHIPA Processes Internal review of PHIPA processes led to some changes o Most significant:

More information

FCSRMC 2017 HIPAA PRESENTATION

FCSRMC 2017 HIPAA PRESENTATION FCSRMC 2017 HIPAA PRESENTATION BDO USA, LLP, a Delaware limited liability partnership, is the U.S. member of BDO International Limited, a UK company limited by guarantee, and forms part of the international

More information

POLICY STATEMENT PRIVACY POLICY

POLICY STATEMENT PRIVACY POLICY POLICY STATEMENT PRIVACY POLICY Version: 3.0 Issue Date: 01/07/2009 Last Review: 10/02/2016 Issued By: General Manager APPROVAL This policy has been approved by the Boards of METRO Church Australia and

More information

DATA PROTECTION POLICY (in force since 21 May 2018)

DATA PROTECTION POLICY (in force since 21 May 2018) DATA PROTECTION POLICY (in force since 21 May 2018) This Data Protection Policy is issued by IDM Südtirol - Alto Adige, with registered office in Piazza della Parrocchia n. 11 39100, Bolzano (hereinafter

More information

I. PURPOSE DEFINITIONS. Page 1 of 5

I. PURPOSE DEFINITIONS. Page 1 of 5 Policy Title: Computer, E-mail and Mobile Computing Device Use Accreditation Reference: Effective Date: October 15, 2014 Review Date: Supercedes: Policy Number: 4.31 Pages: 1.5.9 Attachments: October 15,

More information

Protecting PHI for Clinical Staff and Students

Protecting PHI for Clinical Staff and Students Office of Compliance Programs Protecting PHI for Clinical Staff and Students Revised: July 24, 2017 Introduction HIPAA requires that LSUHSC-NO "have in place appropriate administrative, technical, and

More information

PRIVACY AND ANTI-SPAM CODE FOR OUR DENTAL OFFICE Please refer to Appendix A for a glossary of defined terms.

PRIVACY AND ANTI-SPAM CODE FOR OUR DENTAL OFFICE Please refer to Appendix A for a glossary of defined terms. PRIVACY AND ANTI-SPAM CODE FOR OUR DENTAL OFFICE Please refer to Appendix A for a glossary of defined terms. INTRODUCTION The Personal Health Information Protection Act, 2004 (PHIPA) came into effect on

More information

Report of the Information & Privacy Commissioner/Ontario. Review of the Cardiac Care Network of Ontario (CCN):

Report of the Information & Privacy Commissioner/Ontario. Review of the Cardiac Care Network of Ontario (CCN): Information and Privacy Commissioner / Ontario Report of the Information & Privacy Commissioner/Ontario Review of the Cardiac Care Network of Ontario (CCN): A Prescribed Person under the Personal Health

More information

Health Insurance Portability and Accountability Act (HIPAA)

Health Insurance Portability and Accountability Act (HIPAA) HIPPA Review Health Insurance Portability and Accountability Act (HIPAA) What is HIPAA: Stands for Health Insurance Portability and Accountability Act Addresses three areas: 1. Insurance portability 2.

More information

UCLA HEALTH SYSTEM CODE OF CONDUCT

UCLA HEALTH SYSTEM CODE OF CONDUCT UCLA HEALTH SYSTEM CODE OF CONDUCT STANDARD 1 - QUALITY OF CARE The University s health centers and health systems will provide quality health care that is appropriate, medically necessary, and efficient.

More information

Piedmont Healthcare, Inc. Code of Conduct

Piedmont Healthcare, Inc. Code of Conduct Piedmont Healthcare, Inc. Code of Conduct You are part of the Piedmont Healthcare family, a group of talented and dedicated people who take pride in what you do and are committed to our patients and our

More information

It defines basic terms and lists basic principles that all LSUHSC-NO faculty, staff, residents and students must understand and follow.

It defines basic terms and lists basic principles that all LSUHSC-NO faculty, staff, residents and students must understand and follow. Office of Compliance Programs Revised: July 18, 2017 HIPAA Privacy HIPAA Privacy Workforce Training The Health Insurance Portability & Accountability Act (HIPAA) requires that the University train all

More information

Health Insurance Portability and Accountability Act. Awareness Training for Volunteers

Health Insurance Portability and Accountability Act. Awareness Training for Volunteers Health Insurance Portability and Accountability Act Awareness Training for Volunteers Southeastern Health Southeastern Health has a strong tradition of protecting the privacy of patient information. Confidentiality

More information

Security Risk Analysis

Security Risk Analysis Security Risk Analysis Risk analysis and risk management may be performed by reviewing and answering the following questions and keeping this review (with date and signature) for evidence of this analysis.

More information

What is HIPAA? Purpose. Health Insurance Portability and Accountability Act of 1996

What is HIPAA? Purpose. Health Insurance Portability and Accountability Act of 1996 Patient Privacy and HIPAA/HITECH What is HIPAA? Health Insurance Portability and Accountability Act of 1996 Implemented in 2003 Title II Administrative Simplification It s a federal law HIPAA is mandatory,

More information

Overview. COTBC Practice Standards for Managing Client Information, Tel: (250) Toll-Free BC: 1 (866) Fax: (250)

Overview. COTBC Practice Standards for Managing Client Information, Tel: (250) Toll-Free BC: 1 (866) Fax: (250) College of Occupational Therapists of British Columbia COTBC Practice Standards for Managing Client Information, 2014 Overview #402-3795 Carey Road Victoria, BC V8Z 6T8 Tel: (250) 386-6822 Toll-Free BC:

More information

PRIVACY IMPACT ASSESSMENT (PIA) For the

PRIVACY IMPACT ASSESSMENT (PIA) For the PRIVACY IMPACT ASSESSMENT (PIA) For the Enlisted Assignment Information System (EAIS) Department of the Navy - SPAWAR - PEO EIS SECTION 1: IS A PIA REQUIRED? a. Will this Department of Defense (DoD) information

More information

PATIENT BILL OF RIGHTS & NOTICE OF PRIVACY PRACTICES

PATIENT BILL OF RIGHTS & NOTICE OF PRIVACY PRACTICES Helping People Perform Their Best PRIVACY, RIGHTS AND RESPONSIBILITIES NOTICE PATIENT BILL OF RIGHTS & NOTICE OF PRIVACY PRACTICES Request Additional Information or to Report a Problem If you have questions

More information

Record Keeping - Legal and Ethical Core CPD

Record Keeping - Legal and Ethical Core CPD Record Keeping - Legal and Ethical Core CPD Aims: This article provides information about record keeping and the legal aspects relating to record keeping; details about CQC requirements for record keeping;

More information

INFORMATION ABOUT CHILDREN S MERCY HOSPITALS AND CLINICS

INFORMATION ABOUT CHILDREN S MERCY HOSPITALS AND CLINICS INFORMATION ABOUT CHILDREN S MERCY HOSPITALS AND CLINICS The purpose of this brochure is to provide you with a brief orientation to Children s Mercy Hospitals and Clinics. It provides important information

More information

Understanding the Privacy and Security Regulations

Understanding the Privacy and Security Regulations Omnibus Rule Update HIPAA Handbook for Long-Term Care Staff Understanding the Privacy and Security Regulations Kate Borten, CISSP, CISM Handbook for Long-Term Care Staff Understanding the Privacy and Security

More information

Notice of HIPAA Privacy Practices Updates

Notice of HIPAA Privacy Practices Updates Notice of HIPAA Privacy Practices Updates The following is a summary of the updates to the privacy notice for Meridian Hospitals Corporation, Meridian Home Care Services, Inc., Meridian Nursing & Rehabilitation,

More information

HIPAA for CNAs. This course has been awarded one (1.0) contact hour. This course expires on May 31, 2020.

HIPAA for CNAs. This course has been awarded one (1.0) contact hour. This course expires on May 31, 2020. HIPAA for CNAs This course has been awarded one (1.0) contact hour. This course expires on May 31, 2020. Copyright 2015 by RN.com. All Rights Reserved. Reproduction and distribution of these materials

More information

The University of Toledo. Corporate Compliance and HIPAA Training. Presented by: The Compliance and Privacy Office

The University of Toledo. Corporate Compliance and HIPAA Training. Presented by: The Compliance and Privacy Office The University of Toledo Corporate Compliance and HIPAA Training Presented by: The Compliance and Privacy Office Topics Compliance HIPAA (Health Insurance Portability and Accountability Act) FERPA( Family

More information

Resident/Fellow Training Orientation Policies

Resident/Fellow Training Orientation Policies Resident/Fellow Training Orientation Policies Restraint or Seclusion: Violent Behavior Prevention and Reporting of Patient Abuse Blood Component Indications & Critical Tests HIPAA Privacy and Security

More information

INFORMATION TECHNOLOGY, MOBILES DIGITAL MEDIA POLICY AND PROCEDURES

INFORMATION TECHNOLOGY, MOBILES DIGITAL MEDIA POLICY AND PROCEDURES INFORMATION TECHNOLOGY, MOBILES AND DIGITAL MEDIA POLICY AND PROCEDURES Updates Who Updated Comments Aug annually Lewis External version TABLE OF CONTENTS AIMS AND LEGISLATION... 3 MOBILE PHONES PARENTS/CARERS

More information

NOTICE OF PRIVACY PRACTICES

NOTICE OF PRIVACY PRACTICES VII-07B Notice of Privacy Practices (p) The MetroHealth System 2500 MetroHealth Drive Cleveland, OH 44109-1998 NOTICE OF PRIVACY PRACTICES THIS NOTICE DESCRIBES HOW WE MAY USE AND DISCLOSE YOUR PROTECTED

More information

Compliance Program And Code of Conduct. United Regional Health Care System

Compliance Program And Code of Conduct. United Regional Health Care System Compliance Program And Code of Conduct United Regional Health Care System TABLE OF CONTENTS Page MESSAGE FROM OUR PRESIDENT... 1 COMPLIANCE PROGRAM... 2 Program Structure...2 Management s Responsibilities

More information

Code of Ethical Conduct The Right Thing to Do and How to Do it Right!

Code of Ethical Conduct The Right Thing to Do and How to Do it Right! Code of Ethical Conduct The Right Thing to Do and How to Do it Right! Princeton HealthCare System consists of the following units and programs: University Medical Center of Princeton at Plainsboro Princeton

More information

PATIENT RIGHTS TO ACCESS PERSONAL MEDICAL RECORDS California Health & Safety Code Section

PATIENT RIGHTS TO ACCESS PERSONAL MEDICAL RECORDS California Health & Safety Code Section PATIENT RIGHTS TO ACCESS PERSONAL MEDICAL RECORDS California Health & Safety Code Section 123100-123149. 123100. The Legislature finds and declares that every person having ultimate responsibility for

More information

STANDARDS OF CONDUCT SCH

STANDARDS OF CONDUCT SCH STANDARDS OF CONDUCT SCH01242018 2018 LETTER FROM THE CEO Welcome, Thank you for choosing St. Croix Hospice. The care you provide impacts our patients, families, caregivers, and countless others every

More information

Williamson County EMS (WCEMS) HIPAA Training for Third Out Riders

Williamson County EMS (WCEMS) HIPAA Training for Third Out Riders Williamson County EMS (WCEMS) HIPAA Training for Third Out Riders Training Statement: This training program is designed to educate you on WCEMS legal requirements to protect our patients rights and confidentiality,

More information

The Queen s Medical Center HIPAA Training Packet for Researchers

The Queen s Medical Center HIPAA Training Packet for Researchers The Queen s Medical Center HIPAA Training Packet for Researchers 1 The Queen s Medical Center HIPAA Training Packet for Researchers Table of Contents Overview of HIPAA and Research 3 Penalties for violations

More information

This notice describes Florida Hospital DeLand s practices and that of: All departments and units of Florida Hospital DeLand.

This notice describes Florida Hospital DeLand s practices and that of: All departments and units of Florida Hospital DeLand. MRN: FIN: FLORIDA HOSPITAL DELAND HIPAA NOTICE OF PRIVACY PRACTICES Effective Date: September 23, 2013 THIS NOTICE DESCRIBES HOW MEDICAL INFORMATION ABOUT YOU MAY BE USED AND DISCLOSED AND HOW YOU CAN

More information

North Hawaii Community Hospital Volunteer Services Application

North Hawaii Community Hospital Volunteer Services Application North Hawaii Community Hospital Volunteer Services Application Today s Date: Name: Address: City/State/Zip: Home Phone: Business Phone: Social Security #: Birth Date: Are you 18 years of age or older?

More information

HH Health System-Shoals, LLC dba Helen Keller Hospital Notice of Privacy Practices

HH Health System-Shoals, LLC dba Helen Keller Hospital Notice of Privacy Practices HH Health System-Shoals, LLC dba Helen Keller Hospital Notice of Privacy Practices THIS NOTICE DESCRIBES HOW MEDICAL INFORMATION ABOUT YOU MAY BE USED AND DISCLOSED AND HOW YOU CAN GET ACCESS TO THIS INFORMATION.

More information

Contribute to society, and. Act as stewards of their professions. As a pharmacist or as a pharmacy technician, I must:

Contribute to society, and. Act as stewards of their professions. As a pharmacist or as a pharmacy technician, I must: Code of Ethics Preamble Pharmacists and pharmacy technicians play pivotal roles in the continuum of health care provided to patients. The responsibility that comes with being an essential health resource

More information

The Family Crisis Center of East Texas, Inc. (Women s Shelter of East Texas)

The Family Crisis Center of East Texas, Inc. (Women s Shelter of East Texas) The Family Crisis Center of East Texas, Inc. (Women s Shelter of East Texas) Volunteer/ Advocate Application (Including Interns and Work Study) Please check one: (See Volunteer Categories for details)

More information

LifeBridge Health HIPAA Policy 4. Uses of Protected Health Information for Research

LifeBridge Health HIPAA Policy 4. Uses of Protected Health Information for Research LifeBridge Health HIPAA Policy 4 Uses of Protected Health Information for Research This Policy contains the following Sections: I. Policy II. III. IV. Definitions Applicability Procedures A. Individual

More information

HIPAA Privacy Rule. Best PHI Privacy Practices

HIPAA Privacy Rule. Best PHI Privacy Practices HIPAA Privacy Rule Best PHI Privacy Practices Learning Objectives Define the acronym HIPAA. Understand your role and responsibilities under the privacy regulations. Know what patient s rights are in terms

More information

ENTERPRISE INCOME VERIFICATION (EIV) SECURITY POLICY

ENTERPRISE INCOME VERIFICATION (EIV) SECURITY POLICY ENTERPRISE INCOME VERIFICATION (EIV) SECURITY POLICY Rev. October 2011 EIV Security Policy Acknowledgment Form By signing this form I acknowledge my receipt of the EIV System Security Policy approved by

More information