Protecting PHI for Clinical Staff and Students

Size: px
Start display at page:

Download "Protecting PHI for Clinical Staff and Students"

Transcription

1 Office of Compliance Programs Protecting PHI for Clinical Staff and Students Revised: July 24, 2017 Introduction HIPAA requires that LSUHSC-NO "have in place appropriate administrative, technical, and physical safeguards to protect the privacy of protected health information." {45 CFR (c)(1)} The HIPAA Privacy Rule A covered entity (e.g. LSUHSC-NO and its faculty, staff and students) may not use or disclose protected health information (PHI)about a patient without that patient's written authorization unless the use or disclosure falls under one of the exceptions. What is PHI? PHI consists of two parts: Information that personally identifies the patient (e.g. name, SSN, MRN, DOB, Date of Service, genetic information, etc.) Any information, including genetic information, whether oral or recorded in any form or medium, that: 1. Is created or received by a health care provider, health plan, public health authority, employer, life insurer, school or university, or health care clearinghouse; and 2. Relates to the past, present, or future physical or mental health or condition of an individual; the provision of health care to an individual; or the past, present, or future payment for the provision of health care to an individual. What Form Does PHI Take? PHI can be in any format, including but not limited to: Verbal (e.g. conversations) Written (e.g. computer printouts, handwritten or typed notes, filled out forms, photographs, etc.) Electronic (e.g. EHRs, spreadsheets, databases, digital images, online forms, etc.) Where Can PHI Be Found? Depending on the format, PHI can be found in: Electronic Health Records File cabinets Desks (e.g. papers, desktop computers, etc.)

2 Hallways, waiting rooms, elevators (e.g. converstaions with others or on the phone) Spreadsheets, Word documents, PDFs, databases, etc. Pockets (e.g. Notebooks, smartphones, flash drives) Mobile devices (e.g. laptops, tablets, USB portable hard drives, etc.) Network file servers Printers, copiers, fax machines Protecting PHI We have an obligation to protect the privacy of LSUHSC-NO patients. Simple acts can have serious consequences. What are some of the ways to help insure PHI is protected? Do you REALLY need to use PHI? While using and disclosing PHI is essential for treating patients, there are many tasks that can be accomplished without using PHI. For example, the statement, "Mr. Carbuncle is ready to have his boils lanced," contains PHI. However, the statement "Mr. Carbuncle is ready for you in Room 3," does not. Many times the use and disclosure of PHI can be reduced by simply choosing to use and disclose health information OR use and dislose identifiers but not both. Most hospitals have banned using texts or to communicate PHI. When the identifiers are separated from the health information, it is no longer PHI and can be sent safely. In the example below, a resident has sent a text to an attending physician regarding a patient's lesion. The photograph does not include the patient's face or any unique identifying marks such as scars or tattoos. The text does not include the patient's name or any other identifiers. For that reason, the text does not contain PHI and is not subject to HIPAA.

3 The resident then calls and discusses the case with the attending physican. He can clarify any identifiers during the call. Scenario 1 Dr. Capaldi, a second year resident, is working the evening shift at Our Lady of Perpetual Sorrows Hospital. He is concerned about some lab values on a recently admitted patient. He phones the attending on call, Dr. Hartnell, to discuss his concerns but the list of lab values is too long to relate over the phone. Dr. Hartnell instructs Dr. Capaldi to text him the lab values. Our Lady of Perpetual Sorrows has a strict ban on texting PHI so Dr. Capaldi takes a photograph of the lab values and carefully crops out all the patient identifying information (name, MRN, etc.). He then texts the picture to Dr. Hartnell. Afterwards, Dr. Capaldi deletes the photograh from his phone. Has Dr.Capaldi violated the hospital's ban on texting PHI? Hover your mouse over or tap your finger on the box below to see the right answer. (Tap on any picture to make the answer disappear.) Yes

4 No Redaction Another method of separating identifiers and health information is redaction. Redaction is the process of obscuring or removing information from a document or record. It is a difficult and painstaking process to do correctly on existing documents and records. ALL instances of the information (e.g. name) and indirect references (e.g. mother s name) to the information must be identified and redacted. The redaction method must render the redacted information unrecoverable. In many cases, redaction is needed to prevent sensitive information from being breached. Records request (from someone other than the patient) Legal discovery Research Publication Article Web page Physical Redaction Physical redaction is applied to paper records and analog recordings. Methods include: Excising (cutting) the printed or recorded information with a knife or scissors. Erasing magnetically information from recordings. Obscuring information with a special redaction marker. When excising, be sure to collect all the cuttings and ensure they are destroyed by shredding or incinerating. When blacking out sections of paper documents ensure that information has been completely obscured. Use a marker especially designed for redaction. Shine bright light on and through the paper to ensure that the underlying information cannot be viewed. It may be necessary to blacken both sides of the paper or photocopy the blackened page and substitute the photocopy to ensure the underlying information cannot be viewed. Digital redaction Digital redaction is extremely difficult to perform correctly. Most computer programs are designed to preserve information, not destroy it. The majority of computer programs used for editing text do not have a redaction function. This requires the individual performing the digital redaction to have an in-depth knowledge of information is stored in a computer. Adobe Acrobat (not Acrobat Reader) version 9 and later has an effective redaction function. It is a two step process: 1. First, mark all the information in the document to be redacted. 2. Tell the program to redact the information. The program will warn you that the selected information is about to be destroyed and will become unrecoverable. You will need to confirm that is what you want before the information is actually redacted. Digital Redaction Methods That DON T WORK

5 Highlight Function Using the highlight function and selecting the color black produces a document that has the same appearance as a redacted document. However, the information underneath the highlight has not been destroyed. To view the redacted information, simply select the whole document and highlight it in yellow. Track Changes- Some people choose to simply delete information from their documents and save the altered version. This is effective unless the Track Changes function is turned ON. When Track Changes is active. The deleted information is preserved and can be viewed, even though it is redlined. Password protecting a document Most methods for password protecting a document are extremely weak and easily cracked. There are many free utilities available for this purpose. A search for free Adobe password remover produces over a million results. A search for free Microsoft Office password cracker produces over eight (8) million results. How to Check Digital Redaction Search the document for the redacted information. If the search function can find it, it has not been redacted. Select all the information in the document and highlight in a pastel color like yellow or light green. Does the redacted information become readable? Copy the redacted information from the document and paste it as plain text into a blank Word document. Does the redacted information become readable? Ensure Track Changes is turned OFF. REMEMBER In order for redaction to be effective, the redacted information must be unrecoverable. ALL instances of identifiers in the document must be redacted for the document. If one instance of an identifier (e.g. the patient s name, DOB, etc.) is missed, the document is considered identified information. For digital documents, use the search function to identify all instances of identifiers. For paper documents search the document from beginning to end and then from end to beginning. Get help from co-workers and fellow students in reviewing documents for identifiers. When You Really Need to Use PHI What about when it's not feasible to separate identifiers from health information and you need to use and disclose PHI (which is most of the time)? It is your responsibility to take reasonable precautions to help insure that PHI remains confidential. What are some of the precautions you can take? Verbal Never discuss a health information with a patient when others are present in the room unless you have cleared it with the patient first.discussing health information with a minor child and her/his parents is an exception. When it is anticipated that you will be speaking with relatives without the patient present (e.g. the patient is having surgery), discuss this with the patient beforehand and find out if the patient has any concerns about her or his health information being shared with loved ones. When discussing the patient's condition, whether it is a discussion with relatives or colleagues, move out of earshot of others and keep your voices low to avoid being overheard. Close exam room doors or pull curtains in patient rooms when patients are being examined/treated. On the Phone If at all possible, do not to use patient identifiers when discussing a case on the phone. Be aware of your surroundings when discussing patient information on the phone: Check to see if anyone is within earshot Use a low tone of voice

6 Written When leaving a voic message, leave the minimum information necessary. Someone other than the patient may listen to the messages. Do NOT leave any information about a patient s diagnosis or treatment on a voice mail. A message like, Please call Dr. Smith s office at your earliest convenience. is fine. A message like, Please call the LSU Clinic, is fine. (No indication of diagnosis or treatment.) A message like, This is Dr. Smith calling with the results of your STD test. is not acceptable. A message like Please call the HemOnc clinic as soon as possible. is not acceptable. (Specialty clinics reveal information about the patient s diagnosis and treatment.) Loose pieces of paper being transported from one place to another should be secured in an envelope or folder to prevent them from slipping out. Papers with PHI should not be left lying around in unsecured areas. Papers with PHI should not be brought outside the hospital unless they are being transported from one place of business to another in a secure manner. Always dispose of paper PHI in the shred bin. If you use a shredder in your office, it must be cross cut shredder that produces confetti, not long strips. Don't bring paper with PHI home. If you have documents with PHI in your work area, make sure that they are placed face down or otherwise concealed when not in use. Make sure that any room that has medical records in it is always attended by an employee. If there is not an employee with the records, store the medical records in a locked room or cabinet. If medical records are transported from one location to another, ensure that they are secured, cannot be dropped during the transport, and are not left unattended in hallways, patient waiting areas, parking garage of the hospital etc. Be aware that written PHI can show up in places other than paper. For example, a view box with an x-ray can also show PHI since the patient's name is usually noted on the x-ray. Be cautious of printed patient information, billing sheets, lab reports, notebooks with handwritten notes, report sheets for notes about patients, etc. These are items that are often left unattended in areas that are accessible by patients. They are also items that are often accidentally dropped and found by others. Faxes Verify that you have the correct information before you send it. Verify that the fax number you are using is current and correct. Always use a fax cover sheet. If it is a frequently used number, consider pre-programmed numbers (once they are verified). Call to make sure the intended recipient received the fax. Only send the required information. Make sure to update pre-programmed numbers on a regular basis. Mailings Only send the minimum information necessary. Verify that the right information is being sent to the right person. Information Handed Directly to the Patients Verify that you have the correct information going to the correct recipient. Use two identifiers to ensure you have the right patient. Thumb through the papers being sent to make sure one patient's information is not "stuck" to another PHI may be found on items such as arm bands, prescription bottles, and IV bags. Make sure that none of these are discarded in the regular trash. IV bags should have pull away labels that once torn from the bag can be disposed of in the shred bin. Paper PHI should be disposed of in shred bins. A few points about shred bins: Make sure that any shred bin that you use is locked.

7 Electronic Keys should not be left in the shred bin. If the shred bin is so full that you can pull papers out of it, immediately notify the department that is responsible for emptying the shred bin. For those emptying the shred bin, make sure that any bags of paper are in a secure, locked location while awaiting pick up from the shredding company. When working with disposal companies, verify the identity of the disposal company employee before turning over any PHI. REMEMBER: The paper in the shred bin has patient PHI, and is just as important to secure as a patient's medical record. Do not write your password down and place it around the computer for others to use or discover. Do not share your password with others. Do not download patient information onto jump drives or personal mobile devices that are not encrypted. Do not download patient information into folders that are not secured by LSU HCSD/HSC-NO Information Technology staff. If you have a laptop, do not store patient information on it unless it has been encrypted. Do not store PHI on personal laptops without expressed knowledge and permission of the healthcare institution. If possible, face your computer monitor away from public viewing, or use a privacy screen over the monitor. Do not leave screens open that contain patient information if you are not actively working on the computer. Ideally, PHI should remain on LSUHSC servers and accessed through Citrix or the VPN (remote.lsuhsc.edu). All electronic devices should be secured at all times. Lost or stolen electronic devices account for the majority of reported HIPAA breaches in the United States. The best defense is to not store PHI on such devices unless the device(s) is encrypted. If you carry a mobile device that has access to patient PHI, it should be password protected and encrypted. s Verify the individuals listed in the To:, CC:, and BCC: fields are the ones who are authorized to receive the information. Inspect any and all attachments to ensure the information is appropriate for the intended recipients Check with the IT department or your computer supporter before disposing of computers and portable storage devices such as thumb drives. Verify that processes are in place to ensure PHI is wiped from the hard drive memory of copy machines and biomedical equipment (the vendor may be contracted to do this for you). If a large amount of patient information needs to be shared, you can use secure computer folders or links. Contact your IT department for more information on this option. To share large files securely with outside entities, use LSU Health FileS (File-Sharing Solution). If you do use folders in Public Folders, or on certain drives on your local workstation, remember that identifiable patient information should not be stored there unless the folder has sufficient security to limit access to only those who need it. Other Concerns Pictures of Patients Check the policy at the institution you are working regarding photographing patients to fully understand what is or is not acceptable when it comes to taking pictures of patients. In many cases, the patient must provide written consent before a picture may be taken.

8 Strangers Hospitals and health care facilities are bustling places, with people moving quickly about everywhere. In such an environment, it would be easy for someone to go unnoticed while attempting to steal PHI. Should anyone come to you, with whom you are not familiar, asking for access to PHI, or to restricted areas within the hospital or health care facility where you work, it is important to verify their identity. If you have not been notified by your supervisor that there is someone who will need access to an area or information, verify with your supervisor, Security, Hospital Administrator or the Compliance department at the hospital or health care facility where you are working before granting them access. This is true, even if the person appears to have proper identification. Accessing Records Each of us only has authorization to access PHI based on a need to know basis for the purpose of fulfilling our job responsibilities. Unfortunately, some take advantage of various sources of PHI to satisfy curiosity or other motives instead. LSUHSC-NO faculty, staff and students may find themselves working and/or training in facilities that use electronic health record systems that are shared by multiple, independent health care providers. An example of such a system is the PELICAN electronic health record. In such cases, an individual must be granted permission to access the electronic record in writing by the facility that owns the record, in addition to having a job related need to view the information before accessing the electronic record. No matter why an employee or physician accesses PHI, if there is not a job specific reason to do so, the access is prohibited by LSU policy, and the HIPAA regulations! This includes access to family members information, including spouses, parents, adult children, siblings, significant others, coworkers, etc. Any such unauthorized access would be a direct violation of HIPAA regulations, and expose the person who violated them not only to disciplinary action, but also to possible legal action. If you are the caregiver of a family member or friend and need access to PHI, then a release of information form signed by the patient should be given to medical records so that you can be given information on the patient by medical records. Possession of Records What identified patient information do you have in your possession? To whom does this information belong? The patient The hospital or other healthcare institution Do you have right to have that information in your possession? Are you treating the patient. Do you have written authorization from the patient or the hospital to possess this information. When should patient information in your possession be destroyed, de-identified or turned over to the healthcare institution? When the treatment relationship ends. Change in rotation Change in employment In certain instances, at the end of the research study, if these are research records. (see CM-53 Section S) Social Media LSUHSC-NO recognizes that social networking websites and applications (i.e. Facebook, Twitter, and YouTube, etc.) are an important and timely means of communication. However, LSUHSC-NO faculty, staff,

9 residents, and students who use these websites and applications, must be aware that the protections of patient information required by HIPAA apply to social media as well. While it is popular to share events that happen at work or school on social media outlets in the form of posts, pictures, and/or videos, employees and students of LSUHSC-NO must be vigilant to ensure that patient information is NOT compromised in the process. Some ways to prevent PHI from being exposed on social media include: Ensure that All personal identifiers are removed (e.g. age, gender, race, before and after photographs and/or tattoos), and are NOT inadvertently included in any social media. Be familiar with the hospital's social media policy. It may have different restrictions than LSUHSC-NO's policy. In the absence of a policy, care must be exercised when posting information for educational purposes to ensure that any information posted combined with other readily available information (ex. address, telephone number, etc.) will NOT result in the identification of the patient. Policies of Affiliated Hospitals The HIPAA regulations allow hospitals to use a combination of physical, technical and administrative safeguards as necessary to protect PHI. When working in a different hospital, be mindful of the possibility that the hospital s HIPAA policies may be different from those at LSUHSC-NO.. For example, LSUHSC-NO allows access to its network from outside the campus because it has a technical control called a virtual private network (VPN) in place. Another hospital may choose not to incur the cost of a VPN and use an administrative control in the form of a policy that forbids accessing the hospital network from outside the campus. When working at another hospital, it is your responsibility to familiarize yourself with that hospital s policies and ensure that they are followed. Breaches If you become aware of a breach of PHI or suspect a breach may have occurred, it should be reported immediately to: The Compliance/Privacy Officer in the Office of Compliance Programs at LSUHSC-NO, and The appropriate official at the institution where the breach occurred if other than LSUHSC-NO. Compliance will conduct a risk assessment to determine if the breach must be reported to the patient and the U.S. Department of Health and Human Services. Timely notification of any known breach is CRITICAL as we only have 60 days from the discovery of the breach to take the necessary action required by the Breach Notification Rule. Getting Help If you have any questions, please contact the Office of Compliance Programs by: nocompliance@lsuhsc.edu Phone: (504) Anonymous Hotline: (504) In Person: RCB, suite 807 Website

HIPAA Privacy Training for Non-Clinical Workforce

HIPAA Privacy Training for Non-Clinical Workforce Office of Compliance Programs HIPAA Privacy Training for Non-Clinical Workforce Revised: January 24, 2017 HIPAA Privacy Workforce Training The Health Insurance Portability & Accountability Act (HIPAA)

More information

Privacy and Security For Teammates

Privacy and Security For Teammates Privacy and Security For Teammates This self-directed learning module contains information all CRHS Teammates are expected to know in order to protect our patients, our guests, and ourselves. Target Audience:

More information

HIPAA Training

HIPAA Training 2011-2012 HIPAA Training New Hire Orientation and General Training 1 This training is to ensure all Health Management workforce members (associates, contracted individuals, volunteers and students) understand

More information

Updated FY15 Dignity Health General Compliance Education for Staff Module 2

Updated FY15 Dignity Health General Compliance Education for Staff Module 2 Updated FY15 Dignity Health General Compliance Education for Staff Module 2 This course will provide you with important information about the laws and regulations that affect the healthcare industry, our

More information

Breach Reporting and Safeguarding PHI Outpatient Services August, UAMS HIPAA Office Anita Westbrook

Breach Reporting and Safeguarding PHI Outpatient Services August, UAMS HIPAA Office Anita Westbrook Breach Reporting and Safeguarding PHI Outpatient Services August, 2012 UAMS HIPAA Office Anita Westbrook Breaches and Breach Reporting Real Life Example An employee of a large hospital accidentally left

More information

MCCP Online Orientation

MCCP Online Orientation 1 Objectives At the conclusion of this presentation, students will be able to: Discuss application of HIPAA to student s role. Describe the federal requirements of the HIPAA/HITECH regulations that protect

More information

CLINICIAN S GUIDE TO HIPAA PRIVACY

CLINICIAN S GUIDE TO HIPAA PRIVACY CLINICIAN S GUIDE TO HIPAA PRIVACY Introduction... 2 What is HIPAA?... 2 Health Information Privacy... 2 Protected Health Information... 3 Identifiers... 3 HIPAA s Impact on Clinical Practice, Treatment,

More information

Advanced HIPAA Communications and University Relations

Advanced HIPAA Communications and University Relations Advanced HIPAA Communications and University Relations accepts no liability of any use reliance placed on it, as it is warranty, express, or implied, or completeness of 1 the HIPAA Health Insurance Portability

More information

Information Privacy and Security

Information Privacy and Security Information Privacy and Security 2015 Purpose of HIPAA HIPAA stands for the Health Insurance Portability and Accountability Act. Its purpose is to establish nationwide protection of patient confidentiality,

More information

Study Management PP STANDARD OPERATING PROCEDURE FOR Safeguarding Protected Health Information

Study Management PP STANDARD OPERATING PROCEDURE FOR Safeguarding Protected Health Information PP-501.00 SOP For Safeguarding Protected Health Information Effective date of version: 01 April 2012 Study Management PP 501.00 STANDARD OPERATING PROCEDURE FOR Safeguarding Protected Health Information

More information

Privacy and Security Compliance: The. Date Presenter Name of Member Organization

Privacy and Security Compliance: The. Date Presenter Name of Member Organization Privacy and Security Compliance: The Basics Date Presenter Name of Member Organization Privacy and Security Compliance: The Context for What We Do Privacy and Security compliance within (your office) is

More information

HIPAA Privacy & Security Training

HIPAA Privacy & Security Training HIPAA Privacy & Security Training for Nonclinicians Introduction As a Duke Medicine workforce member you may have access to patients and patient information and you have a legal and ethical obligation

More information

East Carolina University 2010 Annual HIPAA Privacy Training

East Carolina University 2010 Annual HIPAA Privacy Training East Carolina University 2010 Annual HIPAA Privacy Training What are the HIPAA Privacy and Security Rules? Federal laws that govern the use and disclosure of health information of our patients and research

More information

HIPAA PRIVACY TRAINING

HIPAA PRIVACY TRAINING HIPAA PRIVACY TRAINING HIPAA Privacy Training Objective Present a general overview of HIPAA and define important terms Understand the purpose of HIPAA and the Privacy Rule Understand the term Protected

More information

HIPAA 201: Student Self-Learning Module & Test

HIPAA 201: Student Self-Learning Module & Test HIPAA 201: Student Self-Learning Module & Test Information: This self-learning module meets the HIPAA 201 competency for Students. This requirement must be met once (it is not an annual requirement). Instructions:

More information

It defines basic terms and lists basic principles that all LSUHSC-NO faculty, staff, residents and students must understand and follow.

It defines basic terms and lists basic principles that all LSUHSC-NO faculty, staff, residents and students must understand and follow. Office of Compliance Programs Revised: July 18, 2017 HIPAA Privacy HIPAA Privacy Workforce Training The Health Insurance Portability & Accountability Act (HIPAA) requires that the University train all

More information

Health Information Privacy Policies and Procedures

Health Information Privacy Policies and Procedures University of the Pacific Arthur A. Dugoni School of Dentistry Health Information Privacy Policies and s These Health Information Privacy Policies & s implement our obligations to protect the privacy of

More information

What is HIPAA? Purpose. Health Insurance Portability and Accountability Act of 1996

What is HIPAA? Purpose. Health Insurance Portability and Accountability Act of 1996 Patient Privacy and HIPAA/HITECH What is HIPAA? Health Insurance Portability and Accountability Act of 1996 Implemented in 2003 Title II Administrative Simplification It s a federal law HIPAA is mandatory,

More information

HIPAA PRIVACY DIRECTIONS. HIPAA Privacy/Security Personal Privacy. What is HIPAA?

HIPAA PRIVACY DIRECTIONS. HIPAA Privacy/Security Personal Privacy. What is HIPAA? DIRECTIONS HIPAA Privacy/Security Personal Privacy 1. Read through entire online training presentation 2. Close the presentation and click on Online Trainings on the Intranet home page 3. Click on the

More information

HIPAA Privacy & Security Training

HIPAA Privacy & Security Training HIPAA Privacy & Security Training for Clinicians Introduction As a clinician at Duke Medicine, you have direct access to patients and patient information and a legal and ethical obligation to protect patient

More information

HIPAA Education Program

HIPAA Education Program HIPAA Education Program 2017-2018 Assurance and Compliance Services HIPAA Training Requirement This HIPAA Training Program is intended for and will satisfy the training requirement for the: Mount Sinai

More information

QUESTIONS. Print Student s/faculty Name: Date of Test Completion: Site of Experience: School/University: Semester:

QUESTIONS. Print Student s/faculty Name: Date of Test Completion: Site of Experience: School/University: Semester: 2017 - QUESTIONS Print Student s/faculty Name: Date of Test Completion: Site of Experience: School/University: Semester: Instructions: Read each question, write an answer on space provided, and return

More information

Student Orientation: HIPAA Health Insurance Portability & Accountability Act

Student Orientation: HIPAA Health Insurance Portability & Accountability Act _ Student Orientation: HIPAA Health Insurance Portability & Accountability Act HIPAA: National Privacy Law History of HIPAA What was once an ethical responsibility to protect a patient s privacy is now

More information

Health Insurance Portability and Accountability Act (HIPAA)

Health Insurance Portability and Accountability Act (HIPAA) HIPPA Review Health Insurance Portability and Accountability Act (HIPAA) What is HIPAA: Stands for Health Insurance Portability and Accountability Act Addresses three areas: 1. Insurance portability 2.

More information

HIPAA. Health Insurance Portability and Accountability Act. Presented by the UMMC Office of Integrity and Compliance

HIPAA. Health Insurance Portability and Accountability Act. Presented by the UMMC Office of Integrity and Compliance HIPAA Health Insurance Portability and Accountability Act Presented by the UMMC Office of Integrity and Compliance Rules and Regulations to ensure Privacy Set Federally recognized standards to ensure both

More information

Health Insurance Portability and Accountability Act. Awareness Training for Volunteers

Health Insurance Portability and Accountability Act. Awareness Training for Volunteers Health Insurance Portability and Accountability Act Awareness Training for Volunteers Southeastern Health Southeastern Health has a strong tradition of protecting the privacy of patient information. Confidentiality

More information

Security Risk Analysis

Security Risk Analysis Security Risk Analysis Risk analysis and risk management may be performed by reviewing and answering the following questions and keeping this review (with date and signature) for evidence of this analysis.

More information

WHAT IS HIPAA? HIPAA is the ELECTRONIC transmission of Three programs have been enacted to date Privacy Rule April 2004

WHAT IS HIPAA? HIPAA is the ELECTRONIC transmission of Three programs have been enacted to date Privacy Rule April 2004 Rev. 1/22/2010 HIPAA TRAINING WHAT IS HIPAA? Health Insurance Portability and Accountability Act HIPAA is the ELECTRONIC transmission of Three programs have been enacted to date Privacy Rule April 2004

More information

Presented by the UAMS HIPAA Office August 2013 Anita B. Westbrook

Presented by the UAMS HIPAA Office August 2013 Anita B. Westbrook HIPAA and Social Media and other PHI Safeguards Presented by the UAMS HIPAA Office August 2013 Anita B. Westbrook Social Networking Let s Talk Facebook More than 750 million users Average user has 130

More information

The Privacy & Security of Protected Health Information

The Privacy & Security of Protected Health Information The Privacy & Security of Protected Health Information By the end of this course, you should: Be familiar with the patient s rights to privacy under HIPAA Privacy Act Be able to identify Protected Health

More information

Protecting Patient Privacy It s Everyone s Responsibility

Protecting Patient Privacy It s Everyone s Responsibility 1 of 27 Protecting Patient Privacy It s Everyone s Responsibility This presentation is comprised of 27 screens. When you have finished reading a screen, click your mouse to continue to the next screen.

More information

Compliance & Privacy For Teammates

Compliance & Privacy For Teammates Carolinas HealthCare System 2014 Annual Continuing Education Module Compliance & Privacy For Teammates This self-directed learning module contains information all Carolinas HealthCare System Teammates

More information

Valley Regional Medical Center HIPAA AND HITECH EDUCATION

Valley Regional Medical Center HIPAA AND HITECH EDUCATION Valley Regional Medical Center HIPAA AND HITECH EDUCATION Privacy and Security of Protected Health Information 1 HIPAA and Its Purpose What is HIPAA? Health Insurance Portability and Accountability Act

More information

Emergency Medical Services Division Policies Procedures Protocols

Emergency Medical Services Division Policies Procedures Protocols Emergency Medical Services Division Policies Procedures Protocols Patient Medical Record Security and Privacy Policies and Procedures (1003.00) I. GENERAL PROVISIONS: A. The intent of these policies and

More information

HIPAA Health Insurance Portability and Accountability Act of 1996

HIPAA Health Insurance Portability and Accountability Act of 1996 HIPAA Health Insurance Portability and Accountability Act of 1996 Protected Health Information (PHI) Covers patient information in any form written, verbal, or electronic PHI Includes Any information that

More information

Safeguarding PHI Nutrition Services. UAMS HIPAA Office May 2015

Safeguarding PHI Nutrition Services. UAMS HIPAA Office May 2015 Safeguarding PHI Nutrition Services UAMS HIPAA Office May 2015 HIPAA (not HIPPA) What is HIPAA? The Health Insurance Portability and Accountability Act is a federal law that protects the privacy and security

More information

INFORMATION ABOUT CHILDREN S MERCY HOSPITALS AND CLINICS

INFORMATION ABOUT CHILDREN S MERCY HOSPITALS AND CLINICS INFORMATION ABOUT CHILDREN S MERCY HOSPITALS AND CLINICS The purpose of this brochure is to provide you with a brief orientation to Children s Mercy Hospitals and Clinics. It provides important information

More information

The University of Toledo. Corporate Compliance and HIPAA Training. Presented by: The Compliance and Privacy Office

The University of Toledo. Corporate Compliance and HIPAA Training. Presented by: The Compliance and Privacy Office The University of Toledo Corporate Compliance and HIPAA Training Presented by: The Compliance and Privacy Office Topics Compliance HIPAA (Health Insurance Portability and Accountability Act) FERPA( Family

More information

HOW TO MAINTAIN A LAB NOTEBOOK- RECORD KEEPING AND HIPAA. Fern Tsien, PhD Department of Genetics LSUHSC

HOW TO MAINTAIN A LAB NOTEBOOK- RECORD KEEPING AND HIPAA. Fern Tsien, PhD Department of Genetics LSUHSC HOW TO MAINTAIN A LAB NOTEBOOK- RECORD KEEPING AND HIPAA Fern Tsien, PhD Department of Genetics LSUHSC Type and Format Check with your mentor if he/she requires a specific format depending on the type

More information

A general review of HIPAA standards and privacy practices 2016

A general review of HIPAA standards and privacy practices 2016 A general review of HIPAA standards and privacy practices 2016 45 CFR, 164 Health Insurance Portability and Accountability Act Treatment, Payment and Healthcare Operations 42 CFR, Part 2, Confidentiality

More information

Title: HIPAA PRIVACY ADMINISTRATIVE

Title: HIPAA PRIVACY ADMINISTRATIVE Administrative-HIPAA Privacy Title: HIPAA PRIVACY ADMINISTRATIVE Scope: All MultiCare Health System (MHS) workforce members, which includes but not limited to, employees, residents, students, volunteers

More information

HIPAA and HITECH: Privacy and Security of Protected Health Information

HIPAA and HITECH: Privacy and Security of Protected Health Information HIPAA and HITECH: Privacy and Security of Protected Health Information What is HIPAA? Health Insurance Portability and Accountability Act of 1996 A federal law enacted to: Protect the privacy of a patient

More information

2018 Employee HIPAA Orientation (EHO) Handbook

2018 Employee HIPAA Orientation (EHO) Handbook 2018 Employee HIPAA Orientation (EHO) Handbook Using EHO The material in this booklet is designed to provide newly hired employees with an understanding of HIPAA s regulations and their impact on the employee

More information

Policy and Procedure Manual

Policy and Procedure Manual Policy and Procedure Manual Employee Duties Adaptive Educational Services 2 Table of Contents OPENING OFFICE 3 CLOSING OFFICE 3 ANSWERING TELEPHONE 4 RELAY INDIANA 6 FORMAT-STUDENT FILES 7 PREPARING FILES

More information

Compliance & Privacy For Teammates

Compliance & Privacy For Teammates Carolinas HealthCare System 2015 Annual Continuing Education Module Compliance & Privacy For Teammates This self-directed learning module contains information all Carolinas HealthCare System Teammates

More information

System Office New Hire Orientation

System Office New Hire Orientation System Office New Hire Orientation Integrity & Compliance Program Jennifer Munro, MA 2, CHC Manager, Integrity & Compliance Education, Communication & Hotline System Integrity & Audit Services munrojl@trinity-health.org

More information

INFORMATION ABOUT Children s Mercy Hospitals and Clinics for our Affiliates

INFORMATION ABOUT Children s Mercy Hospitals and Clinics for our Affiliates INFORMATION ABOUT Children s Mercy Hospitals and Clinics for our Affiliates The purpose of this brochure is to provide you with a brief orientation to Children s Mercy Hospitals and Clinics. It provides

More information

I. POLICY: DEFINITIONS:

I. POLICY: DEFINITIONS: GEORGIA DEPARTMENT OF JUVENILE JUSTICE Applicability: {x} All DJJ Staff {x} Administration {x} Community Services {x} Secure Facilities (RYDCs and YDCs) Chapter 5: RECORDS MANAGEMENT Subject: HEALTH RECORDS

More information

NOTICE OF PRIVACY PRACTICES

NOTICE OF PRIVACY PRACTICES VII-07B Notice of Privacy Practices (p) The MetroHealth System 2500 MetroHealth Drive Cleveland, OH 44109-1998 NOTICE OF PRIVACY PRACTICES THIS NOTICE DESCRIBES HOW WE MAY USE AND DISCLOSE YOUR PROTECTED

More information

AN OVERVIEW OF FIPPA for FACULTY, INSTRUCTORS & ADMINISTRATORS. Information and tips on how to keep you FIPPA FRIENDLY

AN OVERVIEW OF FIPPA for FACULTY, INSTRUCTORS & ADMINISTRATORS. Information and tips on how to keep you FIPPA FRIENDLY AN OVERVIEW OF FIPPA for FACULTY, INSTRUCTORS & ADMINISTRATORS Information and tips on how to keep you FIPPA FRIENDLY Privacy Legislation Ontario universities were made subject to provincial Freedom of

More information

Reporting a Privacy Breach to the Commissioner

Reporting a Privacy Breach to the Commissioner SEPTEMBER 2017 Reporting a Privacy Breach to the Commissioner GUIDELINES FOR THE HEALTH SECTOR To strengthen the privacy protection of personal health information, the Ontario government has amended the

More information

PRIVACY POLICIES AND PROCEDURES

PRIVACY POLICIES AND PROCEDURES Vinay M. Reddy, M.D., Ethelynda Jaojoco, M.D. Karen D. Cain, PA-C Julie J. Stackhouse, PA-C Jacie Touart, PA-C Brian Vaccarezza, PA-C Physical Medicine & Rehabilitation Electrodiagnostic Medicine Disorders

More information

FCSRMC 2017 HIPAA PRESENTATION

FCSRMC 2017 HIPAA PRESENTATION FCSRMC 2017 HIPAA PRESENTATION BDO USA, LLP, a Delaware limited liability partnership, is the U.S. member of BDO International Limited, a UK company limited by guarantee, and forms part of the international

More information

USES AND DISCLOSURES OF PROTECTED HEALTH INFORMATION: HIPAA PRIVACY POLICY

USES AND DISCLOSURES OF PROTECTED HEALTH INFORMATION: HIPAA PRIVACY POLICY Page Number 1 of 8 TITLE: PURPOSE: USES AND DISCLOSURES OF PROTECTED HEALTH INFORMATION: HIPAA PRIVACY POLICY To assure that individually identifiable health information contained in any University Health

More information

This notice describes Florida Hospital DeLand s practices and that of: All departments and units of Florida Hospital DeLand.

This notice describes Florida Hospital DeLand s practices and that of: All departments and units of Florida Hospital DeLand. MRN: FIN: FLORIDA HOSPITAL DELAND HIPAA NOTICE OF PRIVACY PRACTICES Effective Date: September 23, 2013 THIS NOTICE DESCRIBES HOW MEDICAL INFORMATION ABOUT YOU MAY BE USED AND DISCLOSED AND HOW YOU CAN

More information

DUTIES OF A CUSTODIAN

DUTIES OF A CUSTODIAN DUTIES OF A CUSTODIAN SUMMARY OF CUSTODIAN DUTIES UNDER THE PERSONAL HEALTH INFORMATION ACT Custodians have legislated duties as outlined in the Act. A custodian is required to: 1. prepare and make readily

More information

NORTHWEST TERRITORIES INFORMATION AND PRIVACY COMMISSIONER Review Recommendation File: July 13, 2015

NORTHWEST TERRITORIES INFORMATION AND PRIVACY COMMISSIONER Review Recommendation File: July 13, 2015 NORTHWEST TERRITORIES INFORMATION AND PRIVACY COMMISSIONER Review Recommendation 15-138 File: 14-192-4 July 13, 2015 BACKGROUND In November of 2014, a physician working on contract with the Stanton Territorial

More information

Failure to comply may result in WU being liable for civil and criminal penalties under the HIPAA regulations.

Failure to comply may result in WU being liable for civil and criminal penalties under the HIPAA regulations. HIPAA Privacy Procedure #1 Effective Date: April 14. 2003 Reviewed Date: February, 2011 Accountabilities for Compliance to HIPAA Privacy Revised Date: February, 2011 Rules Scope: Radiation Oncology ************************************************************************************************

More information

FEDERAL AND STATE BREACH NOTIFICATION LAWS FOR CALIFORNIA

FEDERAL AND STATE BREACH NOTIFICATION LAWS FOR CALIFORNIA FEDERAL AND STATE BREACH NOTIFICATION LAWS FOR CALIFORNIA LEGAL CITATION California Civil Code Section 1798.82 California Health and Safety (H&S) Code Section 1280.15 42 U.S.C. Section 17932; 45 C.F.R.

More information

What is your start date? (Date in which you plan to begin seeing patients in the hospital). Specialty SECTION I. IDENTIFICATION DATA

What is your start date? (Date in which you plan to begin seeing patients in the hospital). Specialty SECTION I. IDENTIFICATION DATA This Application is for Non-employed Clinical Assistants (RN, dental assistant, orthotist, etc) who wish to assist a supervising physician at one or more of our facilities. Advanced Practice Nurses (CRNA,

More information

Navigating HIPAA Regulations. Michelle C. Stickler, DEd Director, Research Subjects Protections

Navigating HIPAA Regulations. Michelle C. Stickler, DEd Director, Research Subjects Protections Navigating HIPAA Regulations Michelle C. Stickler, DEd Director, Research Subjects Protections mcstickler@vcu.edu 828-0131 Key Definitions Covered Entity: Organization that handles identifiable health

More information

Understanding the Privacy and Security Regulations

Understanding the Privacy and Security Regulations Omnibus Rule Update HIPAA Handbook for Long-Term Care Staff Understanding the Privacy and Security Regulations Kate Borten, CISSP, CISM Handbook for Long-Term Care Staff Understanding the Privacy and Security

More information

REVISED NOTICE OF PRIVACY PRACTICES ORIGINAL DATE: JANUARY 1, 2003 REVISED: JANUARY 16, 2014 REVISED: NOVEMBER 27, 2017 PLEASE REVIEW IT CAREFULLY

REVISED NOTICE OF PRIVACY PRACTICES ORIGINAL DATE: JANUARY 1, 2003 REVISED: JANUARY 16, 2014 REVISED: NOVEMBER 27, 2017 PLEASE REVIEW IT CAREFULLY REVISED NOTICE OF PRIVACY PRACTICES ORIGINAL DATE: JANUARY 1, 2003 REVISED: JANUARY 16, 2014 REVISED: NOVEMBER 27, 2017 THIS NOTICE DESCRIBES HOW MEDICAL INFORMATION ABOUT YOU MAY BE USED AND DISCLOSED

More information

PARAGOULD DOCTORS CLINIC PRIVACY NOTICE

PARAGOULD DOCTORS CLINIC PRIVACY NOTICE PARAGOULD DOCTORS CLINIC PRIVACY NOTICE Protected Health Information THIS NOTICE DESCRIBES HOW MEDICAL INFORMATION ABOUT YOU MAY BE USED AND DISCLOSED AND HOW YOU CAN GET ACCESS TO THIS INFORMATION. PLEASE

More information

Methodist Le Bonheur Healthcare Corporate Compliance and HIPAA New Associate Training

Methodist Le Bonheur Healthcare Corporate Compliance and HIPAA New Associate Training Methodist Le Bonheur Healthcare Corporate Compliance and HIPAA New Associate Training All new Methodist Le Bonheur Healthcare (MLH) Associates must complete this compliance training. It includes information

More information

LifeBridge Health HIPAA Policy 4. Uses of Protected Health Information for Research

LifeBridge Health HIPAA Policy 4. Uses of Protected Health Information for Research LifeBridge Health HIPAA Policy 4 Uses of Protected Health Information for Research This Policy contains the following Sections: I. Policy II. III. IV. Definitions Applicability Procedures A. Individual

More information

Williamson County EMS (WCEMS) HIPAA Training for Third Out Riders

Williamson County EMS (WCEMS) HIPAA Training for Third Out Riders Williamson County EMS (WCEMS) HIPAA Training for Third Out Riders Training Statement: This training program is designed to educate you on WCEMS legal requirements to protect our patients rights and confidentiality,

More information

Accommodate reasonable requests you may have to communicate health information by alternative means or at alternative locations.

Accommodate reasonable requests you may have to communicate health information by alternative means or at alternative locations. Collom & Carney Clinic Association NOTICE OF PRIVACY PRACTICES Effective Date: April 14, 2003 THIS NOTICE DESCRIBES HOW MEDICAL INFORMATION ABOUT YOU MAY BE USED AND DISCLOSED, AND HOW YOU CAN GET ACCESS

More information

PERSONALLY IDENTIFIABLE INFORMATON (PII)

PERSONALLY IDENTIFIABLE INFORMATON (PII) PERSONALLY IDENTIFIABLE INFORMATON (PII) 1 PII - REFERENCES DOD 5400.11-R, DoD Privacy Act Program, May 07 OSD Memo, Subj: Safeguarding Against and Responding to the Breach of Personally Identifiable Information,

More information

HIPAA for CNAs. This course has been awarded one (1.0) contact hour. This course expires on May 31, 2020.

HIPAA for CNAs. This course has been awarded one (1.0) contact hour. This course expires on May 31, 2020. HIPAA for CNAs This course has been awarded one (1.0) contact hour. This course expires on May 31, 2020. Copyright 2015 by RN.com. All Rights Reserved. Reproduction and distribution of these materials

More information

HIPAA Privacy and Security Training for Researchers

HIPAA Privacy and Security Training for Researchers HIPAA Privacy and Security Training for Researchers Version April 2017 Mountain States Health Alliance Bringing Loving Care to Health Care 1 Course Objectives This learning course covers HIPAA, HITECH,

More information

Technology Standards of Practice

Technology Standards of Practice 2016 Technology Standards of Practice Used with permission from the Association of Social Work Boards (2016) Table of Contents Technology Standards of Practice 2 Definitions 2 Section 1 Practitioner Competence

More information

Compliance with Personal Health Information Protection Act

Compliance with Personal Health Information Protection Act Compliance with Personal Health Information Protection Act Ontario s Personal Health Information & Protection Act (PHIPA) governs the collection, use and disclosure of personal health information by midwives

More information

HIPAA Privacy Rule. Best PHI Privacy Practices

HIPAA Privacy Rule. Best PHI Privacy Practices HIPAA Privacy Rule Best PHI Privacy Practices Learning Objectives Define the acronym HIPAA. Understand your role and responsibilities under the privacy regulations. Know what patient s rights are in terms

More information

Yale University. HIPAA PRIVACY FAQs

Yale University. HIPAA PRIVACY FAQs HIPAA PRIVACY FAQs Table of Contents I. PRIVACY FUNDAMENTALS I- 4 WHAT IS HIPAA? WHAT IS HITECH? WHO NEEDS TO ABIDE BY HIPAA? ARE THERE PENALTIES FOR NOT COMPLYING? WHAT IS PHI? WHAT IDENTIFIES AN INDIVIDUAL?

More information

Compliance Program, Code of Conduct, and HIPAA

Compliance Program, Code of Conduct, and HIPAA Compliance Program, Code of Conduct, and HIPAA Agenda Introduction to Compliance The Compliance Program Code of Conduct Reporting Concerns HIPAA Why have a Compliance Program Procedures to follow applicable

More information

THE PRIVACY ACT AND THE AUSTRALIAN PRIVACY PRINCIPLES FREQUENTLY ASKED QUESTIONS

THE PRIVACY ACT AND THE AUSTRALIAN PRIVACY PRINCIPLES FREQUENTLY ASKED QUESTIONS THE PRIVACY ACT AND THE AUSTRALIAN PRIVACY PRINCIPLES FREQUENTLY ASKED QUESTIONS CONTENTS How is Privacy governed in Australia?... 3 Does the Privacy Act apply to me?... 3 I have been told that my State/Territory

More information

The Personal Health Information Act (PHIA) Access and Privacy Office

The Personal Health Information Act (PHIA) Access and Privacy Office The Personal Health Information Act (PHIA) Updated: November 2017 The University of Manitoba is committed to the principles of access to information and the protection of privacy as they are outlined within

More information

CAPITAL SURGEONS GROUP, PLLC

CAPITAL SURGEONS GROUP, PLLC CAPITAL SURGEONS GROUP, PLLC NOTICE OF PRIVACY PRACTICES THIS NOTICE DESCRIBES HOW MEDICAL INFORMATION ABOUT YOU MAY BE USED AND DISCLOSED AND HOW YOU CAN GET ACCESS TO THIS INFORMATION. PLEASE REVIEW

More information

Compliance & Privacy Post Test

Compliance & Privacy Post Test Compliance & Privacy Post Test 1. One of your family members recently had a procedure at the CHS facility where you work. You want to find out the results. What should you do? a. Use your access rights

More information

RISK MANAGEMENT AND PATIENT SAFETY

RISK MANAGEMENT AND PATIENT SAFETY RISK MANAGEMENT AND PATIENT SAFETY Risk Management uses processes, methods, and tools to assess what can occur within the healthcare setting and to guide proactive decisions for implementing strategies

More information

HIPAA Are You As Compliant as You Think?

HIPAA Are You As Compliant as You Think? HIPAA Are You As Compliant as You Think? Jillian Harrington, MHA, CPC, CPC-I, CPC-P, CCS, CCS-P Regulatory Specialist, HCPro, a division of BLR Agenda Elements of HIPAA Regulations HIPAA Case Study Reviews

More information

MURRAY MEDICAL CENTER HIPAA NOTICE OF PRIVACY PRACTICES

MURRAY MEDICAL CENTER HIPAA NOTICE OF PRIVACY PRACTICES CW CR 618 Exhibit A MURRAY MEDICAL CENTER HIPAA NOTICE OF PRIVACY PRACTICES Effective Date: THIS NOTICE DESCRIBES HOW MEDICAL INFORMATION ABOUT YOU MAY BE USED AND DISCLOSED AND HOW YOU CAN GET ACCESS

More information

SUMMARY OF NOTICE OF PRIVACY PRACTICES

SUMMARY OF NOTICE OF PRIVACY PRACTICES LAKE REGIONAL MEDICAL GROUP 54 HOSPITAL DRIVE OSAGE BEACH, MO 65065 SUMMARY OF NOTICE OF PRIVACY PRACTICES THIS NOTICE DESCRIBES HOW MEDICAL INFORMATION ABOUT YOU MAY BE USED AND DISCLOSED AND HOW YOU

More information

HIPAA Privacy Policies & Procedures Table of Contents

HIPAA Privacy Policies & Procedures Table of Contents HIPAA POCKET GUIDE HIPAA Privacy Policies & Procedures Table of Contents I. Clinical Policies A. Accounting of Disclosures..Pg 6 B. De-Identification of Information..Pg 7 C. Facility Directory...Pg 7

More information

I. PURPOSE DEFINITIONS. Page 1 of 5

I. PURPOSE DEFINITIONS. Page 1 of 5 Policy Title: Computer, E-mail and Mobile Computing Device Use Accreditation Reference: Effective Date: October 15, 2014 Review Date: Supercedes: Policy Number: 4.31 Pages: 1.5.9 Attachments: October 15,

More information

HIPAA is the Health Insurance Portability and Accountability Act

HIPAA is the Health Insurance Portability and Accountability Act HIPAA is the Health Insurance Portability and Accountability Act It is a federal law that Protects the privacy of a patient s personal and health information Provides for electronic and physical security

More information

Associated Pediatric Dentistry Belleville, Edwardsville, O Fallon, IL

Associated Pediatric Dentistry Belleville, Edwardsville, O Fallon, IL Associated Pediatric Dentistry Belleville, Edwardsville, O Fallon, IL Patient Name: DOB: ACKNOWLEDGEMENT OF RECEIPT OF NOTICE OF PRIVACY PRACTICES AND CONSENT **You May Refuse to Sign This Consent Acknowledgement**

More information

School Based Health Services Consent Form

School Based Health Services Consent Form MRN: PCP: Teacher: Grade: School Based Health Services Consent Form Before your child sees a provider, we are asking you to authorize medical and/ or dental treatment. We will work with you to improve

More information

Student Orientation Post-Assessment

Student Orientation Post-Assessment Name Date Student Orientation Post-Assessment Print, answer questions and bring with you to Education Resources at Penrose Hospital. 1. List two (2) of the seven (7) Centura Core Values and describe their

More information

HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT

HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT INSTRUCTIONS Read through this presentation. Submit completed post test to the Portage County MRC Coordinator. Estimated completion time: 1 hour Learning

More information

Resident/Fellow Training Orientation Policies

Resident/Fellow Training Orientation Policies Resident/Fellow Training Orientation Policies Restraint or Seclusion: Violent Behavior Prevention and Reporting of Patient Abuse Blood Component Indications & Critical Tests HIPAA Privacy and Security

More information

IVAN FRANKO HOME Пансіон Ім. Івана Франка

IVAN FRANKO HOME Пансіон Ім. Івана Франка THE IVAN FRANKO HOME S COMMITMENT TO PRIVACY PRIVACY STATEMENT The Ivan Franko Home respects this privacy of our residents, employees, Directors, volunteers and donors. We are committed to ensuring that

More information

Chapter 9 Legal Aspects of Health Information Management

Chapter 9 Legal Aspects of Health Information Management Chapter 9 Legal Aspects of Health Information Management EXERCISE 9-1 Legal and Regulatory Terms 1. T 2. F 3. F 4. F 5. F EXERCISE 9-2 Maintaining the Patient Record in the Normal Course of Business 1.

More information

Security Risk Analysis and 365 Days of Meaningful Use. Rodney Gauna & Val Tuerk, Object Health

Security Risk Analysis and 365 Days of Meaningful Use. Rodney Gauna & Val Tuerk, Object Health Security Risk Analysis and 365 Days of Meaningful Use Rodney Gauna & Val Tuerk, Object Health 2 3 Agenda Guidelines for Conducting a Security Risk Analysis Scope of Analysis Risk of a Breach Security Risks

More information

HIPAA Privacy Regulations Governing Research

HIPAA Privacy Regulations Governing Research HIPAA Privacy Regulations Governing Research HIPAA Health Insurance Portability and Accountability Act In a Nutshell The Privacy Regulations govern a provider s use and disclosure of health information

More information

ERIE COUNTY MEDICAL CENTER CORPORATION NOTICE OF PRIVACY PRACTICES. Effective Date : April 14, 2003 Revised: August 22, 2016

ERIE COUNTY MEDICAL CENTER CORPORATION NOTICE OF PRIVACY PRACTICES. Effective Date : April 14, 2003 Revised: August 22, 2016 ERIE COUNTY MEDICAL CENTER CORPORATION NOTICE OF PRIVACY PRACTICES Effective Date : April 14, 2003 Revised: August 22, 2016 THIS NOTICE DESCRIBES HOW MEDICAL INFORMATION ABOUT YOU MAY BE USED AND DISCLOSED

More information

Section: Medical Staff Office Page: 1 of 2

Section: Medical Staff Office Page: 1 of 2 Section: Medical Staff Office Page: 1 of 2 Subject: Job Shadowers and Observers Not Covered Under Clinical Affiliation Agreement Executive Owner: Chief Medical Officer Original Policy: 6/4/13 Current Effective

More information

VHA Privacy Policy Training FY VHA Privacy Office

VHA Privacy Policy Training FY VHA Privacy Office VHA Privacy Policy Training Applicable Confidentiality Statutes and Regulations The following legal provisions govern the collection, use, maintenance, and disclosure of information from VHA records. The

More information

CLINICAL SERVICES POLICY & PROCEDURE (CSPP No. 25) Clinical Photography Policy in the Pre-Hospital Setting. January 2017

CLINICAL SERVICES POLICY & PROCEDURE (CSPP No. 25) Clinical Photography Policy in the Pre-Hospital Setting. January 2017 CLINICAL SERVICES POLICY & PROCEDURE (CSPP No. 25) Clinical Photography Policy in the Pre-Hospital Setting January 2017 DOCUMENT INFORMATION Author: Mark Ainsworth-Smith Consultant in Pre-hospital Care

More information