HIPAA Privacy and Security Training for Researchers

Size: px
Start display at page:

Download "HIPAA Privacy and Security Training for Researchers"

Transcription

1 HIPAA Privacy and Security Training for Researchers Version April 2017 Mountain States Health Alliance Bringing Loving Care to Health Care 1

2 Course Objectives This learning course covers HIPAA, HITECH, and MSHA Privacy and Security Program. Acronyms and Terms HIPAA and HITECH Overview (HIPAA Privacy Rule and security Rule) Requirements of the Law The concept of protected health information (PHI) Permitted and Prohibited uses and disclosures of PHI MSHA Policies & Procedures HIPAA applied to real-life situations Specifics for research Mountain States Health Alliance Bringing Loving Care to Health Care 2

3 Definitions and Terms ARRA: American Recovery and Reinvestment Act, commonly referred to as the Stimulus or The Recovery Act. Breach: Improper access, use, or disclosure of Protected Health Information. Business Associate (BA): A person or company that accesses PHI because of its relationship with a covered entity. The HIPAA responsibilities of the BA are outlined in a business associate agreement between the BA(or company of employment) and the covered entity. A company that types/transcribes medical reports for a hospital or physician office is one example. Covered Entity (CE): Health plan, Health care clearinghouses, and Health care providers who conduct certain financial and administrative transactions electronically. MSHA is a covered entity. Mountain States Health Alliance Bringing Loving Care to Health Care 3

4 Definitions and Terms Protected Health Information (PHI): Individually identifiable health information in any form, oral and recorded, that relates to past, present, or future physical or mental health or condition of an individual, including demographic information. Disclosure: The release, transfer, provision of access to, or divulging in any manner of information outside the entity who holds the information. DHHS: Department of Health and Human Services HIPAA: Health Insurance Portability and Accountability Act. The HIPAA Security Rule was implemented in HITECH: Health Information Technology for Economic and Clinical Health Act a 2009 provision of the American Reinvestment and Recovery Act (ARRA). Mountain States Health Alliance Bringing Loving Care to Health Care 4

5 Definitions and Terms Minimum necessary: Use, access, and disclosure of PHI by a covered entity or business associate are limited to the minimum amount of information necessary to accomplish the required task. Office of Civil Rights (OCR): Entity of DHHS responsible for enforcing the HIPAA privacy and security rules. Privacy officer: Designated individual by a covered entity to oversee HIPAA Privacy Regulation compliance. You may contact MSHA HIPAA Officer, if any questions. De-identified information: PHI which has been sufficiently stripped of identifying information (obtain list of 18 PHI identifiers) so that the person to who it belongs can no longer be identified. Mountain States Health Alliance Bringing Loving Care to Health Care 5

6 Privacy Laws and Regulations There are many federal and state laws regarding Privacy of patient information. One such federal law is the Health Insurance Portability & Accountability Act of 1996 (HIPAA). HIPAA sets forth regulations or improved efficiency in healthcare delivery by patient information; requiring health identifiers; and creating Privacy standards. HIPAA brought about two rules: Privacy Rule compliance date of April 2003 Security Rule compliance date of April 2005 Mountain States Health Alliance Bringing Loving Care to Health Care 6

7 What are ARRA and HITECH? American Recovery and Reinvestment Act (ARRA), Public Law is an economic stimulus package which was signed into law on February 17, Health Information Technology for Economic and Clinical Health (HITECH) Act is the part the of ARRA law that deals with many of the health information communication and technology provisions including Subpart D Privacy. In January of 2013, the Department of Health and Human Services issued the Final Rule implementing HITECH s statutory amendments to HIPAA. Mountain States Health Alliance Bringing Loving Care to Health Care 7

8 Enforcement of HIPAA The Department of Health and Human Services (DHHS) is a department of the federal government that has overall responsibility for implementing and enforcing HIPAA. Office of Civil Rights (OCR) is responsible for implementing and enforcing the Privacy and Security Rules. MSHA Corporate Audit and Compliance Services department is responsible for monitoring and assessing MSHA compliance with HIPAA. Potential Penalties: Civil Criminal Federal lawsuit Loss of professional license Employer corrective action including termination Mountain States Health Alliance Bringing Loving Care to Health Care 8

9 Criminal Liability of the American Recovery and Reinvestment Act: Clarified that employees of covered entities may be held criminally liable for obtaining or disclosing individually identifiable health information maintained by covered entities without authorization. Who? Individuals who "knowingly" obtain or disclose individually identifiable health information in violation of HIPAA What? A fine of from $50,000 up to $250,000 and Imprisonment from one year up to ten years Mountain States Health Alliance Bringing Loving Care to Health Care 9

10 Privacy Rule: Administrative Requirements The Privacy Rule contains many other requirements that MSHA must comply with such as: Business Associate Contracts: Under certain conditions, MSHA is required to maintain legal contracts with business partners whose activity may involve the use or disclosure of individually identifiable health information. MSHA Legal Counsel should be consulted regarding contracts when patient information is involved. De-Identification of PHI: Under certain scenarios, information can be used or disclosed if de-identified. Refer to MSHA policy De-Identification of Protected Health Information IM for details. Minimum Necessary: When using or disclosing PHI or when requesting PHI, a reasonable effort must be made to limit the PHI to the minimum necessary to accomplish the intended purpose of the use, disclosure, or request. Refer to MSHA policy IM Minimum Necessary Use and Disclosure of Protected Health Information for details. Mountain States Health Alliance Bringing Loving Care to Health Care 10

11 Privacy and Security Rule The Privacy Rule is intended to protect the privacy of an individual s health information; regardless of whether the information is written, spoken, or stored in a computer. The Security Rule provides protection of all health information that is housed or transmitted electronically. Mountain States Health Alliance Bringing Loving Care to Health Care 11

12 Privacy Rule MSHA follows the Privacy Rule which describes many ways how organization may use or disclose a patient s protected health information including: To the Individual; To Others Involved in the Individuals Care For Treatment, Payment, or Health Care Operations ( TPO ) When an authorization from the patient is required Within the Facility Directory Disclosure of PHI when required by law; For Public Health or Health Oversight Law Enforcement Purposes; Research Purposes; For Organ Donation; For Workers Compensation; others For Disclosures about Victims of Abuse, Neglect, Domestic Violence Mountain States Health Alliance Bringing Loving Care to Health Care 12

13 Treatment, Payment and Health Care Operations (TPO) HIPAA permits use and disclosure of PHI for TPO: Treatment: the provision, coordination or management of care and services, including the coordination by provider with a third party; consultation between health care providers; or referral from one provider to another. Payment: activities to obtain or provide reimbursement for services; Billing, claims management, collection activities; Review for medical necessity; Utilization review, pre-certification and pre-authorization of services; Disclosure to consumer reporting agencies; others. Health Care Operations: operating activities such as Conducting quality improvement activities; Reviewing competence of health care professionals: Underwriting, premium rating, etc.; Medical review, legal services, auditing; Business planning/development; others. Disclosures for TPO purposes do not require a provider to obtain authorization from the patient. Mountain States Health Alliance Bringing Loving Care to Health Care 13

14 Privacy Rule: Permitted Uses and Disclosures While the Privacy Rules describes many ways that permit MSHA to use and disclosure patient information BEFORE using or discloses any patient information you must refer to MSHA policy IM Release, Use, and Disclosure of Patient Information and MR Release of Medical Records for the Purpose of Research for details. No MSHA team member or researcher shall disclose information without first knowing: To whom they are disclosing the information Whether the recipient is authorized to receive the information Whether the requested information is appropriate for the content and purpose of the request Whether applicable content of this policy has been addressed in the process of disclosing the information. Mountain States Health Alliance Bringing Loving Care to Health Care 14

15 HIPAA Identifiers If the information includes any of the identifiers below of the patient or the patient s relative, household member, or employer the information is considered identifiable and subject to the HIPAA Rules. 1. Names 2. All geographic subdivisions smaller than state 3. All dates related to an individual, including DOB, admission date, discharge date, death date, and all ages over Telephone numbers 5. Vehicle identifiers and serial numbers including license plate numbers 6. Fax numbers 7. Device identifiers and serial numbers 8. addresses 9.URLs 10. IP addresses 11. Social Security Numbers 12. Medical Record Numbers 13. Biometric identifiers, including finger and voice prints 14. Health plan beneficiary numbers 15. Full-face photographs 16. Account numbers 17. Any other unique or identifying characteristic, number or code 18. Certificate or license numbers Mountain States Health Alliance Bringing Loving Care to Health Care 15

16 PHI Receiving Special Protections The HIPAA Rules recognize certain categories of PHI as ultrasensitive and require special protections of such information. Mental and Behavioral Health records Psychotherapy Notes STD testing HPV testing Alcohol or Drug abuse records Genetic Testing Mountain States Health Alliance Bringing Loving Care to Health Care 16

17 Privacy Rule: Authorizations There are many reasons including research that information about a patient is used within MSHA or disclosed outside of MSHA. Generally, an authorization is not required to use or disclose patient information to carry out Treatment, Payment, or Health Care Operations ( TPO ). Other exceptions may apply. MSHA also discloses patient information as required by law or as required reporting; which do not require patient authorization. Examples include: Birth data to the TN Dept of Vital Statistics Cancer data to the State Tumor Registry Data to Protective Services Agencies(for victims of crime, abuse, or neglect) Many others Mountain States Health Alliance Bringing Loving Care to Health Care 17

18 HIPAA and Research Data The HIPAA Rules regulate how protected health information may be obtained and used for research purposes. This is true whether the PHI is completely identifiable or partially deidentified in a limited data set. In order to use PHI for research purposes appropriate HIPAA documentation must be obtained, including either: 1. Individual patient authorization; or 2. Approved waiver of authorization from the IRB MSHA utilizes service of ETSU IRB; therefore, HIPAA requirements for accessing and using PHI for research can be found on the University s IRB website: Mountain States Health Alliance Bringing Loving Care to Health Care 18

19 Notice Of Privacy Practice (NPP) Notice of Privacy Practices is a requirement of HIPAA and the NPP describes how MSHA uses, discloses a patient s information and how the patient can access information. The NPP must be: Given to each patient at time of registration Posted in registration areas Signed Acknowledgement of receipt must be obtained from the patient Posted on MSHA website Access the MSHA NPP by using the link below In research: HIPAA information must be presented as free standing form or be included in Informed Consent Form (ICF). If no direct contact with patient, then HIPAA Waiver can be requested from IRB. Mountain States Health Alliance Bringing Loving Care to Health Care 19

20 Patient Rights A patient has the right to: Access his/her record (research record not included) Receive a notice (notice of privacy practices) that tells you how your health information may be used and shared. Request restrictions/confidential communications about the use and disclosure of their PHI. Restriction for Out-of-Pocket Payments: Patient may restrict disclosure of protected health information to a health plan when the patient has paid out-of-pocket in full for the services. Refer to MSHA IM Request for Restriction of the Use and/or Disclosure of Patient PHI. Request to amend specific portions of their record. MSHA may deny the amendment, but must have a procedure available for the patient to request the amendment. Refer to MSHA policy IM Corrections/Amendments to the Medical Record. Request a copy of the accounting of disclosures. MSHA is required to keep a history of when and to whom information was disclosed about a patient for purposes other than treatment, payment or health care operations. Refer to MSHA policy IM Accounting of Disclosures of Protected Health Information. Mountain States Health Alliance Bringing Loving Care to Health Care 20

21 Privacy and Security Program Additional HIPAA Administrative Requirements: MSHA must provide education to work force on the policies and procedures. MSHA may not intimidate, threaten, coerce, discriminate against, or take other retaliatory action against anyone who makes a complaint. Team members must promptly report all HIPAA concerns. Review IM Reporting of Potential or Actual Breaches of Patient Protected Health Information Remember, just because you have the ability to access a record does not mean you are authorized under the law to do so. You are only authorized to access protected health to access protected health information when necessary to perform your job! Mountain States Health Alliance Bringing Loving Care to Health Care 21

22 De-identified Data (in research) The HIPAA Rules do not restrict the use or disclosure of de-identified health information, because the information is not considered PHI if it is de-identified. The primary purpose of HIPAA is to protect the privacy of the individual when it comes to their health information. If the individual cannot be identified, the risk to the individual s privacy is minimal. Two Methods to Achieve De-identification: Safe Harbor Method 1. Removal of all 18 HIPAA identifiers; and 2. The covered entity possesses no actual knowledge that the remaining information could be used to identify the individual. Expert Determination Method 1.Expert determines that the risk is very small that the information could be used, alone or in combination with other reasonably available information, to identify the individual; and 2. Expert documents the methods and risk results of the analysis that justify such determination Information is de-identified and no longer considered PHI. HIPAA restrictions do not apply! Mountain States Health Alliance Bringing Loving Care to Health Care 22

23 Privacy and Security Program MSHA must reasonably safeguard PHI from intentional or unintentional use or disclosure: Work force must reasonably safeguard PHI to limit incidental uses or disclosures MSHA must apply sanctions when there is failure to comply with the privacy policies and procedures. MSHA work force members needing access to their own or a family members medical record should contact Medical Records department per policy IM Team Member Access to Their Own or Family Members Medical Record Protected Health Information (PHI). MSHA must implement policies and procedures with respect to PHI that are designed to comply with the HIPAA Rules. Review MSHA policy IM Privacy and Security Program. Mountain States Health Alliance Bringing Loving Care to Health Care 23

24 Privacy and Security Program Handling Work of Someone You Know You are expected to maintain the confidentiality of patient information. You may have access to and become knowledgeable about information of individuals who is known to you, such as, current and previous family members, friends, and co-workers. You should not access patient information that may place you or the patient in a compromising position or present a conflict of interest. Steps for work force member to take, when possible: Contact Supervisor/Manager to request the work be re-assigned. If a Supervisor/Manager is not readily available, then ask, as appropriate, another co-worker to complete the necessary work. If no other co-worker is available, and a Supervisor/Manager is not readily available, proceed with completing the work to insure that patient care is not compromised. Notify a Supervisor/Manager of the occurrence. Refer to policy IM Handling of Work of Someone You Know Mountain States Health Alliance Bringing Loving Care to Health Care 24

25 Where is PHI in a Healthcare Organization? Verbal Conversations Consider where electronic PHI may be stored Paper Documents and Reports Computers and Technology s Files saved on a computer/laptop/tablet Shared network drives Flash drives/usb DVD s/cd s Cloud storage

26 HIPAA Knowledge Check When entering a patient treatment area to discuss the patient s medical condition, lab results, or treatment and the patient has visitors in the room the caregiver should courteously ask the visitor(s) to please step out of the room for a minute. o True o False Answer: True. As caregivers it is our responsibility to be the patient s ambassador and ensure the patient has given us authorization to disclose their PHI with family, friends, and others. Mountain States Health Alliance Bringing Loving Care to Health Care 26

27 Patient Information Inquiries It is the practice of MSHA to release information to the media in the same manner as the release to the general public; however, all requests for information from the media must be directed to the Department of Marketing / Public Relations. If requested for research, then permission to release must be granted by Director of research department General Public: When a visitor or caller requests information about a patient, unless the patient has opted out of the facility directory, generally only the following can be provided: Patient Name Patient Location Patient Condition The caller MUST ask for the patient by name Review policy CM Release of Patient Information to the Media. Mountain States Health Alliance Bringing Loving Care to Health Care 27

28 Patient Information Inquiries At the time of registration, a patient may request that no information be released. Review IM Request for Restriction of the Use and/or Disclosure of Patient Protected Health Information. Exemption: agreement to participate in research study Information about patients under substance abuse care is more restrictive. In the event of a disaster, existing disaster protocols should be followed. MSHA has a VIP (Very Important Partner) program available for patients who are admitted as an inpatient. Review P&P PC Very Important Partner (VIP) Program. Mountain States Health Alliance Bringing Loving Care to Health Care 28

29 MSHA Policy and Procedures Policy IM Disposal of Documents Containing Patient Information addresses proper disposal of PHI. Paper Documents should be shredded. -If an outside shredding service is utilized, it should be the MSHA approved shredding vendor. -The Materials Management Department of the facility should be contacted for information about the shredding service. Magnetic Media should be destructed using bulk erasure. CDs/Platters should be pulverized or broken up. Facility records must be destroyed in a manner that ensures the confidentiality of the records and renders the PHI no longer recognizable. Mountain States Health Alliance Bringing Loving Care to Health Care 29

30 Balancing Privacy With Adoption of Technology Access to PHI Researchers and work force members should not access their own PHI or that of a family member or someone they know. Researchers should only access the records identify as part of the research study. Photographs of patients is considered PHI. Photography includes photographs, still images, videotape recordings, digital or any other image method. - All patient photographs are the property of MSHA and are to be filed in the patient s medical record. - The use of personal equipment including cellular phone cameras to photograph patients is strictly prohibited. Review P&P PCA Photography of Patients. Mountain States Health Alliance Bringing Loving Care to Health Care 30

31 HIPAA Security Rule Whereas, the HIPAA Privacy Rule deals with Protected Health Information (PHI) in general, the HIPAA Security Rule (SR) deals with electronic Protected Health Information (ephi), which is essentially a subset of what the HIPAA Privacy Rule encompasses. The Security Rule specifies a series of: Administrative Safeguards Physical Safeguards Technical Safeguards That covered entities are to use to assure the confidentiality, integrity, and availability of e-phi. 31

32 HIPAA Security Rule Specifically, covered entities must: Ensure the confidentiality, integrity, and availability of all e-phi they create, receive, maintain or transmit; Identify and protect against reasonably anticipated threats to the security or integrity of the information; Protect against reasonably anticipated, impermissible uses or disclosures; and Ensure compliance by their workforce 32

33 Administrative Safeguards Actions, policies and procedures to manage the selection, development, implementation and maintenance of security measures to protect electronic PHI. In general, these safeguards require MSHA to: Maintain processes to address management of security, including: Risk analysis Disciplinary policies System activity review Identify an individual who is responsible for overseeing compliance with the HIPAA Security Rule. At MSHA, this person is HIPAA Compliance Officer in the Corporate Audit and Compliance Services Department. 33

34 Administrative Safeguards (continued) MSHA must: Implement policies/procedures addressing access to electronic PHI. Provide training on security processes and practices. Implement policies/procedures to address security incidents/violations. Establish policies/procedures for contingency plans, data backup, disaster recovery, etc. Develop processes to perform periodic evaluations of security processes. Include security requirements in appropriate contracts. 34

35 Technical Safeguards HIPAA Security Rule requires a covered entity to implement technology, policies and procedures to properly address: Access Control: A covered entity must implement technical policies and procedures that allow only authorized persons to access electronic protected health information (e-phi). Audit Controls: A covered entity must implement hardware, software, and/or procedural mechanisms to record and examine access and other activity in information systems that contain or use e-phi. Integrity Controls: A covered entity must implement policies and procedures to ensure that e-phi is not improperly altered or destroyed. Electronic measures must be put in place to confirm that e-phi has not been improperly altered or destroyed. Transmission Security: A covered entity must implement technical security measures that guard against unauthorized access to e-phi that is being transmitted over an electronic network. 35

36 Technical Safeguards General safeguards at MSHA: Implement policies and procedures to allow access only to those who have the right to such access. This includes assigning unique user passwords for identifying and tracking user identity. Implement mechanisms that record system activity/audits. Implement processes to protect electronic PHI against improper destruction. In order to insure security of username and password MSHA users should not use MSHA password on any personal sites. This helps to minimize our exposure to inappropriate third party unknown access to your account. 36

37 Technical Safeguards Use of Personal Devices Use of personal devices to access work applications and work files is not recommended. Remote Access When a personal device is used to access work applications or work files the device the workforce member is responsible for ensuring the device has up-to-date operating systems, anti-virus and antimalware software. Access to MSHA computer systems is limited to workforce members who have appropriate work reason and requires approval by appropriate MSHA leaders. Workforce members with remote access are responsible for complying with all MSHA HIPAA Privacy and Security policies. Students generally are not granted remote access. 37

38 Passwords Passwords are considered a technical safeguard. You are responsible for your user ID and passwords and will be held accountable for any access or actions taken using your login ID. Do not share your password. Do not leave a computer you are logged on to unattended. Do not let others access PHI while you are logged on to the computer or application. Do not use your MSHA password on any third party websites. ** Review MSHA policy IM Computer Access Codes Management.** 38

39 MSHA Electronic Communication MSHA has many ways of communicating electronically. It is the Workforce members responsibility to keep PHI confidential. Electronic Mail Always us secure method if you are sending patient information to a non-msha address. Type [secur ] in the subject line. Never include patient information in the subject line even when sending the to a MSHA address. FAX Verify all FAX numbers before faxing any patient information. Routinely check auto-fax numbers. Keep faxing to a minimum. Use approved MSHA fax cover sheet with disclaimer. Lync When using Lync be thoughtful about what is presented and who the recipient(s) may be. Vocera o Be aware of your surroundings and comply with Vocera policies. 39

40 Safeguarding ephi The use of USB (flash, thumb, jump) drives, CD s is discouraged if PHI is involved. If, your job duties require you to distribute or store ephi on any electronic media per policy you must: Obtain approval from your Director, IT Security, and Compliance. Encrypted and/or password protected. Laptop computers, and other mobile devices which are used to access ephi should be encrypted. 40

41 Social Media and Recording PHI Using social media to share patient information is prohibited per policy. This includes media such as Facebook, Twitter, Instagram, etc. Texting of patient information is prohibited unless; Using a MSHA approved secure texting methodology is used and; Department leader has approved the operational process of texting. Photography or videoing of patients requires an IT approved secure solution and must have department head approval. The use of personal equipment including cellular phone cameras to photograph patients is prohibited per policy. **Review P&P HR Conduct of MSHA Using Social Media ** 41

42 Phishing/Spear Phishing/Malware Phishing s Phishing is the attempt to acquire sensitive information such as usernames and passwords. More advanced types of these attacks are called Spear-phishing. Spear-phishing attacks can capture financial data, even credit card details, by masquerading as a trustworthy entity (CEO, CFO, COO, etc.) in s and may also contain links to websites that are infected with various forms of malware, including ransomware. If you receive a suspicious , do not click on any embedded link on this message and promptly report to IS Help Desk. 42

43 Steps to Avoid Ransomware Do not reply to or visit any websites within any unexpected (especially from an unfamiliar sender). Hold the pointer over any link to see the real website it is connected to before clicking on a link. Limit any web browsing and use to official business websites only. If the text within an requires or has pressure to conduct immediate action by the user, it is likely fraudulent. Never reset a password from an unsolicited link. If you receive an that tells you to do so, visit the known primary site directly. Never use the same password for your work and personal log-ins. 43

44 Physical Safeguards Facility Access and Control: A covered entity must limit physical access to its facilities while ensuring that authorized access is allowed. Workstation and Device Security: A covered entity must implement policies and procedures to: Specify proper use of and access to workstations and electronic media. Regarding the transfer, removal, disposal, and re-use of electronic media, to ensure appropriate protection of electronic protected health information (e-phi). In general, these safeguards require MSHA to protect electronic information systems and related buildings and equipment from natural and environmental hazards and unauthorized intrusion. 44

45 Physical Safeguards (continued) Measures, policies and procedures to protect electronic information systems and related buildings and equipment from natural and environmental hazards and unauthorized intrusion. In general, these safeguards require MSHA to: Implement policies and procedures to control access to systems and facilities housing electronic PHI. Implement policies and procedures to insure facility security and appropriate functions of workstations. Implement policies and procedures that govern controls for devices and media. 45

46 Physical Safeguards (continued) Protected Health Information (PHI) originals or copies should not be taken outside of the organizations without MSHA approval. This includes reports, lists, census, s, excel and Word files, etc.. that contain PHI. PHI that is taken outside of any MSHA covered entity, as part of an approved and valid healthcare operational reason should follow the physical safeguards per MSHA policy on External Transport of Patient Information. Patient information (including screenshots that only contain a patient s name) should not be used in presentations. **Review P&P IM External Transport of Patient Information** **Review P&P IM Removal of Medical Records** 46

47 Software and Vendor Services The installation of software or hardware is prohibited without; Approval by MSHA IS Dept. Requests must be submitted per MSHA IT guidelines and are subject to approval criteria. New applications that will access, use, collect PHI or use the internet must go through the organizations review and approval process (i.e. ETAF) prior to initiating the purchase. Utilization of a vendor to provide a software solution or staffing resource requires: Financial review/approval ETAF review and approval Contracts development and possibly a business associate agreement. 47

48 Reporting Security Incidents or Concerns Report loss of any MSHA owned or managed device. Report loss of any personal device which may contain any patient information. Immediately notify MSHA IS Help Desk or MSHA Corporate Audit and Compliance Services Dept (CACS). Examples of devices that may contain PHI are: Computers (laptop s, netbooks, ipads, desktop, etc..) CD s, USB flash drive, thumb drive, jump drive Hard drive Cell phones used for work **Review P&P IM Reporting Potential or Actual Breaches of Patient Protected Health Information ** 48

49 What Can you do? A Few Ways to protect patient information: Access, use or disclose patient information only if involved in the care of the patient. Never share passwords and logoff off or lock computers when away! BE ALERT to verbal discussions and surroundings. Make other team members aware if you are hearing conversations that should not be heard. Provide privacy for patients during discussions; including asking others to leave the room if necessary. Be aware of access to patient information such as printouts, computer screens, reports, etc. Appropriately secure patient records when not in use. Patient information should be placed in confidential shred-it containers when discarding. Be knowledgeable with MSHA policies, procedures and practices relating to patient information. Mountain States Health Alliance Bringing Loving Care to Health Care 49

50 Summary This course has provided an abbreviated overview of the HIPAA: Privacy Rule Security Rule HITECH Principles practiced throughout MSHA. All patient information, whether it is verbal, written or in any computer system should be securely maintained for confidentiality. Everyone who comes into contact with patient information is responsible for ensuring compliance with HIPAA. Remember the Need to Know rule. Only access information that you have a need to know to do your job. Sanctions are applied for violation of privacy/security regulations and organization policies. Mountain States Health Alliance Bringing Loving Care to Health Care 50

51 Who to Contact for Questions? Research Department HIPAA Compliance Office Note: For purpose of research: Proof of completion of HIPAA training will be required at the time of IRB & MSHA administrative approval request submission. ETSU and MSHA employees may complete an organizational HIPAA training(s). Mountain States Health Alliance Bringing Loving Care to Health Care 51

52 Almost finished. Please close this window. Print HIPAA training confirmation letter, sign and submit to (fax) or to

What is HIPAA? Purpose. Health Insurance Portability and Accountability Act of 1996

What is HIPAA? Purpose. Health Insurance Portability and Accountability Act of 1996 Patient Privacy and HIPAA/HITECH What is HIPAA? Health Insurance Portability and Accountability Act of 1996 Implemented in 2003 Title II Administrative Simplification It s a federal law HIPAA is mandatory,

More information

MCCP Online Orientation

MCCP Online Orientation 1 Objectives At the conclusion of this presentation, students will be able to: Discuss application of HIPAA to student s role. Describe the federal requirements of the HIPAA/HITECH regulations that protect

More information

HIPAA PRIVACY TRAINING

HIPAA PRIVACY TRAINING HIPAA PRIVACY TRAINING HIPAA Privacy Training Objective Present a general overview of HIPAA and define important terms Understand the purpose of HIPAA and the Privacy Rule Understand the term Protected

More information

FCSRMC 2017 HIPAA PRESENTATION

FCSRMC 2017 HIPAA PRESENTATION FCSRMC 2017 HIPAA PRESENTATION BDO USA, LLP, a Delaware limited liability partnership, is the U.S. member of BDO International Limited, a UK company limited by guarantee, and forms part of the international

More information

HIPAA. Health Insurance Portability and Accountability Act. Presented by the UMMC Office of Integrity and Compliance

HIPAA. Health Insurance Portability and Accountability Act. Presented by the UMMC Office of Integrity and Compliance HIPAA Health Insurance Portability and Accountability Act Presented by the UMMC Office of Integrity and Compliance Rules and Regulations to ensure Privacy Set Federally recognized standards to ensure both

More information

Advanced HIPAA Communications and University Relations

Advanced HIPAA Communications and University Relations Advanced HIPAA Communications and University Relations accepts no liability of any use reliance placed on it, as it is warranty, express, or implied, or completeness of 1 the HIPAA Health Insurance Portability

More information

Information Privacy and Security

Information Privacy and Security Information Privacy and Security 2015 Purpose of HIPAA HIPAA stands for the Health Insurance Portability and Accountability Act. Its purpose is to establish nationwide protection of patient confidentiality,

More information

Privacy and Security For Teammates

Privacy and Security For Teammates Privacy and Security For Teammates This self-directed learning module contains information all CRHS Teammates are expected to know in order to protect our patients, our guests, and ourselves. Target Audience:

More information

HIPAA Education Program

HIPAA Education Program HIPAA Education Program 2017-2018 Assurance and Compliance Services HIPAA Training Requirement This HIPAA Training Program is intended for and will satisfy the training requirement for the: Mount Sinai

More information

Chapter 9 Legal Aspects of Health Information Management

Chapter 9 Legal Aspects of Health Information Management Chapter 9 Legal Aspects of Health Information Management EXERCISE 9-1 Legal and Regulatory Terms 1. T 2. F 3. F 4. F 5. F EXERCISE 9-2 Maintaining the Patient Record in the Normal Course of Business 1.

More information

Updated FY15 Dignity Health General Compliance Education for Staff Module 2

Updated FY15 Dignity Health General Compliance Education for Staff Module 2 Updated FY15 Dignity Health General Compliance Education for Staff Module 2 This course will provide you with important information about the laws and regulations that affect the healthcare industry, our

More information

Student Orientation: HIPAA Health Insurance Portability & Accountability Act

Student Orientation: HIPAA Health Insurance Portability & Accountability Act _ Student Orientation: HIPAA Health Insurance Portability & Accountability Act HIPAA: National Privacy Law History of HIPAA What was once an ethical responsibility to protect a patient s privacy is now

More information

HIPAA Policies and Procedures Manual

HIPAA Policies and Procedures Manual UNIVERSITY of NORTH CAROLINA at CHAPEL HILL SCHOOL of NURSING HIPAA Policies and Procedures Manual November 2015 1 Table of Contents I. INTRODUCTION... 3 A. GENERAL POLICY... 3 B. SCOPE... 3 II. DEFINITIONS...

More information

CLINICIAN S GUIDE TO HIPAA PRIVACY

CLINICIAN S GUIDE TO HIPAA PRIVACY CLINICIAN S GUIDE TO HIPAA PRIVACY Introduction... 2 What is HIPAA?... 2 Health Information Privacy... 2 Protected Health Information... 3 Identifiers... 3 HIPAA s Impact on Clinical Practice, Treatment,

More information

Navigating HIPAA Regulations. Michelle C. Stickler, DEd Director, Research Subjects Protections

Navigating HIPAA Regulations. Michelle C. Stickler, DEd Director, Research Subjects Protections Navigating HIPAA Regulations Michelle C. Stickler, DEd Director, Research Subjects Protections mcstickler@vcu.edu 828-0131 Key Definitions Covered Entity: Organization that handles identifiable health

More information

2018 Employee HIPAA Orientation (EHO) Handbook

2018 Employee HIPAA Orientation (EHO) Handbook 2018 Employee HIPAA Orientation (EHO) Handbook Using EHO The material in this booklet is designed to provide newly hired employees with an understanding of HIPAA s regulations and their impact on the employee

More information

Study Management PP STANDARD OPERATING PROCEDURE FOR Safeguarding Protected Health Information

Study Management PP STANDARD OPERATING PROCEDURE FOR Safeguarding Protected Health Information PP-501.00 SOP For Safeguarding Protected Health Information Effective date of version: 01 April 2012 Study Management PP 501.00 STANDARD OPERATING PROCEDURE FOR Safeguarding Protected Health Information

More information

HIPAA Privacy Training for Non-Clinical Workforce

HIPAA Privacy Training for Non-Clinical Workforce Office of Compliance Programs HIPAA Privacy Training for Non-Clinical Workforce Revised: January 24, 2017 HIPAA Privacy Workforce Training The Health Insurance Portability & Accountability Act (HIPAA)

More information

Valley Regional Medical Center HIPAA AND HITECH EDUCATION

Valley Regional Medical Center HIPAA AND HITECH EDUCATION Valley Regional Medical Center HIPAA AND HITECH EDUCATION Privacy and Security of Protected Health Information 1 HIPAA and Its Purpose What is HIPAA? Health Insurance Portability and Accountability Act

More information

A general review of HIPAA standards and privacy practices 2016

A general review of HIPAA standards and privacy practices 2016 A general review of HIPAA standards and privacy practices 2016 45 CFR, 164 Health Insurance Portability and Accountability Act Treatment, Payment and Healthcare Operations 42 CFR, Part 2, Confidentiality

More information

DE-IDENTIFICATION OF PROTECTED HEALTH INFORMATION (PHI)

DE-IDENTIFICATION OF PROTECTED HEALTH INFORMATION (PHI) PRIVACY 8.0 DE-IDENTIFICATION OF PROTECTED HEALTH INFORMATION (PHI) Scope: Purpose: All workforce members (employees and non-employees), including employed medical staff, management, and others who have

More information

Health Information Privacy Policies and Procedures

Health Information Privacy Policies and Procedures University of the Pacific Arthur A. Dugoni School of Dentistry Health Information Privacy Policies and s These Health Information Privacy Policies & s implement our obligations to protect the privacy of

More information

Compliance Program, Code of Conduct, and HIPAA

Compliance Program, Code of Conduct, and HIPAA Compliance Program, Code of Conduct, and HIPAA Agenda Introduction to Compliance The Compliance Program Code of Conduct Reporting Concerns HIPAA Why have a Compliance Program Procedures to follow applicable

More information

HIPAA Privacy Rights and Operations Guide HIPAA Security Summary For the Practice of: Vail Aspen Breckenridge Dermatology

HIPAA Privacy Rights and Operations Guide HIPAA Security Summary For the Practice of: Vail Aspen Breckenridge Dermatology HIPAA Privacy Rights and Operations Guide HIPAA Security Summary For the Practice of: Vail Aspen Breckenridge Dermatology Publish Date: 1/2/2018 This guide has been created to serve Vail Aspen Breckenridge

More information

HIPAA THE PRIVACY RULE

HIPAA THE PRIVACY RULE HIPAA THE PRIVACY RULE Reviewed December 2012 HISTORY In 2000, many patients that were newly diagnosed with depression received free samples of antidepressant medications in their mail. 2 HISTORY Many

More information

WHAT IS HIPAA? HIPAA is the ELECTRONIC transmission of Three programs have been enacted to date Privacy Rule April 2004

WHAT IS HIPAA? HIPAA is the ELECTRONIC transmission of Three programs have been enacted to date Privacy Rule April 2004 Rev. 1/22/2010 HIPAA TRAINING WHAT IS HIPAA? Health Insurance Portability and Accountability Act HIPAA is the ELECTRONIC transmission of Three programs have been enacted to date Privacy Rule April 2004

More information

East Carolina University 2010 Annual HIPAA Privacy Training

East Carolina University 2010 Annual HIPAA Privacy Training East Carolina University 2010 Annual HIPAA Privacy Training What are the HIPAA Privacy and Security Rules? Federal laws that govern the use and disclosure of health information of our patients and research

More information

HIPAA PRIVACY DIRECTIONS. HIPAA Privacy/Security Personal Privacy. What is HIPAA?

HIPAA PRIVACY DIRECTIONS. HIPAA Privacy/Security Personal Privacy. What is HIPAA? DIRECTIONS HIPAA Privacy/Security Personal Privacy 1. Read through entire online training presentation 2. Close the presentation and click on Online Trainings on the Intranet home page 3. Click on the

More information

SCHOOL OF PUBLIC HEALTH. HIPAA Privacy Training

SCHOOL OF PUBLIC HEALTH. HIPAA Privacy Training SCHOOL OF PUBLIC HEALTH HIPAA Privacy Training Public Health and HIPAA This presentation will address the HIPAA Privacy regulations as they effect the activities of the School of Public Health. It is imperative

More information

HIPAA Privacy Rule. Best PHI Privacy Practices

HIPAA Privacy Rule. Best PHI Privacy Practices HIPAA Privacy Rule Best PHI Privacy Practices Learning Objectives Define the acronym HIPAA. Understand your role and responsibilities under the privacy regulations. Know what patient s rights are in terms

More information

HIPAA Training

HIPAA Training 2011-2012 HIPAA Training New Hire Orientation and General Training 1 This training is to ensure all Health Management workforce members (associates, contracted individuals, volunteers and students) understand

More information

IRB 101. Rachel Langhofer Joan Rankin Shapiro Research Administration UA College of Medicine - Phoenix

IRB 101. Rachel Langhofer Joan Rankin Shapiro Research Administration UA College of Medicine - Phoenix IRB 101 Rachel Langhofer Joan Rankin Shapiro Research Administration UA College of Medicine - Phoenix Contents Brief discussion of regulations IRB Structure Levels of Approval Informed Consent HIPAA/HITECH

More information

HIPAA Privacy Policies & Procedures Table of Contents

HIPAA Privacy Policies & Procedures Table of Contents HIPAA POCKET GUIDE HIPAA Privacy Policies & Procedures Table of Contents I. Clinical Policies A. Accounting of Disclosures..Pg 6 B. De-Identification of Information..Pg 7 C. Facility Directory...Pg 7

More information

It defines basic terms and lists basic principles that all LSUHSC-NO faculty, staff, residents and students must understand and follow.

It defines basic terms and lists basic principles that all LSUHSC-NO faculty, staff, residents and students must understand and follow. Office of Compliance Programs Revised: July 18, 2017 HIPAA Privacy HIPAA Privacy Workforce Training The Health Insurance Portability & Accountability Act (HIPAA) requires that the University train all

More information

INSTITUTIONAL REVIEW BOARD Investigator Guidance Series HIPAA PRIVACY RULE & AUTHORIZATION THE UNIVERSITY OF UTAH. Definitions.

INSTITUTIONAL REVIEW BOARD Investigator Guidance Series HIPAA PRIVACY RULE & AUTHORIZATION THE UNIVERSITY OF UTAH. Definitions. HIPAA PRIVACY RULE & AUTHORIZATION Definitions Breach. The term breach means the unauthorized acquisition, access, use, or disclosure of protected health information which compromises the security or privacy

More information

YALE UNIVERSITY THE RESEARCHERS GUIDE TO HIPAA. Health Insurance Portability and Accountability Act of 1996

YALE UNIVERSITY THE RESEARCHERS GUIDE TO HIPAA. Health Insurance Portability and Accountability Act of 1996 YALE UNIVERSITY THE RESEARCHERS GUIDE TO HIPAA Health Insurance Portability and Accountability Act of 1996 Handbook Table of Contents I. Introduction What is HIPAA? What is PHI? What is a Covered Entity

More information

THE JOURNEY FROM PHI TO RHI: USING CLINICAL DATA IN RESEARCH

THE JOURNEY FROM PHI TO RHI: USING CLINICAL DATA IN RESEARCH THE JOURNEY FROM PHI TO RHI: USING CLINICAL DATA IN RESEARCH Helenemarie Blake, Esq. Chief Privacy Officer, Interim Office of HIPAA & Privacy Security August 2016 SCENARIO You are putting a study together

More information

Health Insurance Portability and Accountability Act. Awareness Training for Volunteers

Health Insurance Portability and Accountability Act. Awareness Training for Volunteers Health Insurance Portability and Accountability Act Awareness Training for Volunteers Southeastern Health Southeastern Health has a strong tradition of protecting the privacy of patient information. Confidentiality

More information

Safeguarding PHI Nutrition Services. UAMS HIPAA Office May 2015

Safeguarding PHI Nutrition Services. UAMS HIPAA Office May 2015 Safeguarding PHI Nutrition Services UAMS HIPAA Office May 2015 HIPAA (not HIPPA) What is HIPAA? The Health Insurance Portability and Accountability Act is a federal law that protects the privacy and security

More information

VHA Privacy Policy Training FY VHA Privacy Office

VHA Privacy Policy Training FY VHA Privacy Office VHA Privacy Policy Training Applicable Confidentiality Statutes and Regulations The following legal provisions govern the collection, use, maintenance, and disclosure of information from VHA records. The

More information

HIPAA Privacy & Security Training

HIPAA Privacy & Security Training HIPAA Privacy & Security Training for Nonclinicians Introduction As a Duke Medicine workforce member you may have access to patients and patient information and you have a legal and ethical obligation

More information

REVISED NOTICE OF PRIVACY PRACTICES ORIGINAL DATE: JANUARY 1, 2003 REVISED: JANUARY 16, 2014 REVISED: NOVEMBER 27, 2017 PLEASE REVIEW IT CAREFULLY

REVISED NOTICE OF PRIVACY PRACTICES ORIGINAL DATE: JANUARY 1, 2003 REVISED: JANUARY 16, 2014 REVISED: NOVEMBER 27, 2017 PLEASE REVIEW IT CAREFULLY REVISED NOTICE OF PRIVACY PRACTICES ORIGINAL DATE: JANUARY 1, 2003 REVISED: JANUARY 16, 2014 REVISED: NOVEMBER 27, 2017 THIS NOTICE DESCRIBES HOW MEDICAL INFORMATION ABOUT YOU MAY BE USED AND DISCLOSED

More information

OVERVIEW OF THE USES AND DISCLOSURES OF PHI

OVERVIEW OF THE USES AND DISCLOSURES OF PHI PRIVACY 24.0 OVERVIEW OF THE USES AND DISCLOSURES OF PHI Scope: Purpose: All workforce members (employees and non-employees), including employed medical staff, management, and others who have direct or

More information

Emergency Medical Services Division Policies Procedures Protocols

Emergency Medical Services Division Policies Procedures Protocols Emergency Medical Services Division Policies Procedures Protocols Patient Medical Record Security and Privacy Policies and Procedures (1003.00) I. GENERAL PROVISIONS: A. The intent of these policies and

More information

NOTICE OF PRIVACY PRACTICES

NOTICE OF PRIVACY PRACTICES Our Responsibilities Notice of Privacy Practices - Page 1 NOTICE OF PRIVACY PRACTICES Our Responsibilities. Your Information. Your Rights. This Notice of Privacy Practices ( Notice ) explains how University

More information

Protecting Patient Privacy It s Everyone s Responsibility

Protecting Patient Privacy It s Everyone s Responsibility 1 of 27 Protecting Patient Privacy It s Everyone s Responsibility This presentation is comprised of 27 screens. When you have finished reading a screen, click your mouse to continue to the next screen.

More information

Understanding the Privacy and Security Regulations

Understanding the Privacy and Security Regulations Omnibus Rule Update HIPAA Handbook for Long-Term Care Staff Understanding the Privacy and Security Regulations Kate Borten, CISSP, CISM Handbook for Long-Term Care Staff Understanding the Privacy and Security

More information

Williamson County EMS (WCEMS) HIPAA Training for Third Out Riders

Williamson County EMS (WCEMS) HIPAA Training for Third Out Riders Williamson County EMS (WCEMS) HIPAA Training for Third Out Riders Training Statement: This training program is designed to educate you on WCEMS legal requirements to protect our patients rights and confidentiality,

More information

HIPAA and HITECH: Privacy and Security of Protected Health Information

HIPAA and HITECH: Privacy and Security of Protected Health Information HIPAA and HITECH: Privacy and Security of Protected Health Information What is HIPAA? Health Insurance Portability and Accountability Act of 1996 A federal law enacted to: Protect the privacy of a patient

More information

HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT

HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT INSTRUCTIONS Read through this presentation. Submit completed post test to the Portage County MRC Coordinator. Estimated completion time: 1 hour Learning

More information

The Queen s Medical Center HIPAA Training Packet for Researchers

The Queen s Medical Center HIPAA Training Packet for Researchers The Queen s Medical Center HIPAA Training Packet for Researchers 1 The Queen s Medical Center HIPAA Training Packet for Researchers Table of Contents Overview of HIPAA and Research 3 Penalties for violations

More information

The HIPAA privacy rule and long-term care : a quick guide for researchers

The HIPAA privacy rule and long-term care : a quick guide for researchers Scripps Gerontology Center Scripps Gerontology Center Publications Miami University Year 2005 The HIPAA privacy rule and long-term care : a quick guide for researchers Jane Straker Patricia Faust Miami

More information

PARAGOULD DOCTORS CLINIC PRIVACY NOTICE

PARAGOULD DOCTORS CLINIC PRIVACY NOTICE PARAGOULD DOCTORS CLINIC PRIVACY NOTICE Protected Health Information THIS NOTICE DESCRIBES HOW MEDICAL INFORMATION ABOUT YOU MAY BE USED AND DISCLOSED AND HOW YOU CAN GET ACCESS TO THIS INFORMATION. PLEASE

More information

HIPAA Privacy Regulations Governing Research

HIPAA Privacy Regulations Governing Research HIPAA Privacy Regulations Governing Research HIPAA Health Insurance Portability and Accountability Act In a Nutshell The Privacy Regulations govern a provider s use and disclosure of health information

More information

Presented by the UAMS HIPAA Office August 2013 Anita B. Westbrook

Presented by the UAMS HIPAA Office August 2013 Anita B. Westbrook HIPAA and Social Media and other PHI Safeguards Presented by the UAMS HIPAA Office August 2013 Anita B. Westbrook Social Networking Let s Talk Facebook More than 750 million users Average user has 130

More information

CHI Mercy Health. Definitions

CHI Mercy Health. Definitions CHI Mercy Health Definitions If you have any questions about this notice, please contact the CHI Mercy Health s Privacy Office at (701) 845-6540 or 570 Chautauqua Blvd, Valley City ND 58072. Notice of

More information

Notice of HIPAA Privacy Practices Updates

Notice of HIPAA Privacy Practices Updates Notice of HIPAA Privacy Practices Updates The following is a summary of the updates to the privacy notice for Meridian Hospitals Corporation, Meridian Home Care Services, Inc., Meridian Nursing & Rehabilitation,

More information

WAKE FOREST BAPTIST HEALTH NOTICE OF PRIVACY PRACTICES

WAKE FOREST BAPTIST HEALTH NOTICE OF PRIVACY PRACTICES WAKE FOREST BAPTIST HEALTH NOTICE OF PRIVACY PRACTICES Effective April 14, 2003 Revised February 17, 2010 Revised September 23, 2013 Revised July 1, 2016 This Notice of Privacy Practices applies to the

More information

HIPAA Privacy & Security Training

HIPAA Privacy & Security Training HIPAA Privacy & Security Training for Clinicians Introduction As a clinician at Duke Medicine, you have direct access to patients and patient information and a legal and ethical obligation to protect patient

More information

New HIPAA Privacy Regulations Governing Research. Karen Blackwell, MS Director, HIPAA Compliance

New HIPAA Privacy Regulations Governing Research. Karen Blackwell, MS Director, HIPAA Compliance New HIPAA Privacy Regulations Governing Research Karen Blackwell, MS Director, HIPAA Compliance kblackwe@kumc.edu 913-588 588-0942 HIPAA Health Insurance Portability and Accountability Act In a Nutshell

More information

Compliance & Privacy For Teammates

Compliance & Privacy For Teammates Carolinas HealthCare System 2014 Annual Continuing Education Module Compliance & Privacy For Teammates This self-directed learning module contains information all Carolinas HealthCare System Teammates

More information

Parental Consent For Minors to Receive Services

Parental Consent For Minors to Receive Services Parental Consent For Minors to Receive Services Welcome to the University of San Diego s Wellness Area! We appreciate your coming our way, and look forward to working with you. The following provides important

More information

NOTICE OF PRIVACY PRACTICES

NOTICE OF PRIVACY PRACTICES Effective 10-9-2013 This notice of privacy practices describes how Family Chiropractic Health Care manages and protects your personal information. THIS NOTICE DESCRIBES HOW MEDICAL INFORMATION ABOUT YOU

More information

Patient Privacy Requirements Beyond HIPAA

Patient Privacy Requirements Beyond HIPAA Patient Privacy Requirements Beyond HIPAA Jane Hyatt Thorpe, J.D. School of Public Health and Health Services George Washington University Carrie Bill, J.D. Feldesman Tucker Leifer Fidell LLP The George

More information

ERIE COUNTY MEDICAL CENTER CORPORATION NOTICE OF PRIVACY PRACTICES. Effective Date : April 14, 2003 Revised: August 22, 2016

ERIE COUNTY MEDICAL CENTER CORPORATION NOTICE OF PRIVACY PRACTICES. Effective Date : April 14, 2003 Revised: August 22, 2016 ERIE COUNTY MEDICAL CENTER CORPORATION NOTICE OF PRIVACY PRACTICES Effective Date : April 14, 2003 Revised: August 22, 2016 THIS NOTICE DESCRIBES HOW MEDICAL INFORMATION ABOUT YOU MAY BE USED AND DISCLOSED

More information

PRIVACY POLICIES AND PROCEDURES

PRIVACY POLICIES AND PROCEDURES Vinay M. Reddy, M.D., Ethelynda Jaojoco, M.D. Karen D. Cain, PA-C Julie J. Stackhouse, PA-C Jacie Touart, PA-C Brian Vaccarezza, PA-C Physical Medicine & Rehabilitation Electrodiagnostic Medicine Disorders

More information

Privacy and Security Orientation for Visiting Observers. DUHS Compliance Office

Privacy and Security Orientation for Visiting Observers. DUHS Compliance Office Privacy and Security Orientation for Visiting Observers DUHS Compliance Office 919-668-2573 compliance@dm.duke.edu Introduction This orientation is to provide new Visiting Observers with the HIPAA Privacy

More information

The Privacy & Security of Protected Health Information

The Privacy & Security of Protected Health Information The Privacy & Security of Protected Health Information By the end of this course, you should: Be familiar with the patient s rights to privacy under HIPAA Privacy Act Be able to identify Protected Health

More information

PROTECTING PATIENT PRIVACY IS NOT ONLY

PROTECTING PATIENT PRIVACY IS NOT ONLY HIPAA POCKET GUIDE HIPAA Privacy Policies & Procedures Table of Contents I. Clinical Policies A. Accounting of Disclosures...Pg 6 B. De-Identification of Information...Pg 7 C. Facility Directory...Pg

More information

Privacy and Security Compliance: The. Date Presenter Name of Member Organization

Privacy and Security Compliance: The. Date Presenter Name of Member Organization Privacy and Security Compliance: The Basics Date Presenter Name of Member Organization Privacy and Security Compliance: The Context for What We Do Privacy and Security compliance within (your office) is

More information

HIPAA Notice of Privacy Practices

HIPAA Notice of Privacy Practices HIPAA Notice of Privacy Practices Georgia Mountains Hospice understands that your health information is highly personal and we are committed to safeguarding your privacy. Please read this Notice of Privacy

More information

What is your start date? (Date in which you plan to begin seeing patients in the hospital). Specialty SECTION I. IDENTIFICATION DATA

What is your start date? (Date in which you plan to begin seeing patients in the hospital). Specialty SECTION I. IDENTIFICATION DATA This Application is for Non-employed Clinical Assistants (RN, dental assistant, orthotist, etc) who wish to assist a supervising physician at one or more of our facilities. Advanced Practice Nurses (CRNA,

More information

Faculty Profile. PART I Privacy Training for Health Professionals. Disclaimer. Always Be Prepared 7/11/2013. Why should you care about Privacy?

Faculty Profile. PART I Privacy Training for Health Professionals. Disclaimer. Always Be Prepared 7/11/2013. Why should you care about Privacy? T-shirts & Taglines: PART I Privacy Training for Health Professionals Denise Hill, JD, MPA Des Moines University Des Moines, Iowa Faculty Profile Denise is an Assistant Professor at Des Moines University

More information

Title: HIPAA PRIVACY ADMINISTRATIVE

Title: HIPAA PRIVACY ADMINISTRATIVE Administrative-HIPAA Privacy Title: HIPAA PRIVACY ADMINISTRATIVE Scope: All MultiCare Health System (MHS) workforce members, which includes but not limited to, employees, residents, students, volunteers

More information

Health Information Exchange 101. Your Introduction to HIE and It s Relevance to Senior Living

Health Information Exchange 101. Your Introduction to HIE and It s Relevance to Senior Living Health Information Exchange 101 Your Introduction to HIE and It s Relevance to Senior Living Objectives for Today Provide an introduction to Health Information Exchange Define a Health Information Exchange

More information

CENTRAL TEXAS MEDICAL CENTER

CENTRAL TEXAS MEDICAL CENTER CENTRAL TEXAS MEDICAL CENTER Date: To: Physician Office Staff Personnel or Billing Agents From: Jan Knott, CMSCICPCS Re: Security Registration In order to register you through the CTMC security system

More information

Compliance & Privacy For Teammates

Compliance & Privacy For Teammates Carolinas HealthCare System 2015 Annual Continuing Education Module Compliance & Privacy For Teammates This self-directed learning module contains information all Carolinas HealthCare System Teammates

More information

NOTICE OF PRIVACY PRACTICES

NOTICE OF PRIVACY PRACTICES NOTICE OF PRIVACY PRACTICES 1 Effective Date: April 14, 2003 Revision Date: September 23, 2013 Revision Date: January 17, 2018 THIS NOTICE DESCRIBES HOW MEDICAL INFORMATION ABOUT YOU MAY BE USED AND DISCLOSED

More information

NOTICE OF PRIVACY PRACTICES

NOTICE OF PRIVACY PRACTICES VII-07B Notice of Privacy Practices (p) The MetroHealth System 2500 MetroHealth Drive Cleveland, OH 44109-1998 NOTICE OF PRIVACY PRACTICES THIS NOTICE DESCRIBES HOW WE MAY USE AND DISCLOSE YOUR PROTECTED

More information

HIPAA & PRIVACY TRAINING FOR HEALTH PROFESSIONALS: Part 1 Denise M. Hill, JD, MPA

HIPAA & PRIVACY TRAINING FOR HEALTH PROFESSIONALS: Part 1 Denise M. Hill, JD, MPA HIPAA & PRIVACY TRAINING FOR HEALTH PROFESSIONALS: Part 1 Denise M. Hill, JD, MPA 2016 Denise M. Hill & CEI, Photos used Creative Commons. Disclosure & Disclaimer DISCLOSURE Denise Hill reports no actual

More information

This notice describes Florida Hospital DeLand s practices and that of: All departments and units of Florida Hospital DeLand.

This notice describes Florida Hospital DeLand s practices and that of: All departments and units of Florida Hospital DeLand. MRN: FIN: FLORIDA HOSPITAL DELAND HIPAA NOTICE OF PRIVACY PRACTICES Effective Date: September 23, 2013 THIS NOTICE DESCRIBES HOW MEDICAL INFORMATION ABOUT YOU MAY BE USED AND DISCLOSED AND HOW YOU CAN

More information

NOTICE OF PRIVACY PRACTICES

NOTICE OF PRIVACY PRACTICES NOTICE OF PRIVACY PRACTICES Effective Date: April 14, 2003 Revised: September 23, 2013 THIS NOTICE DESCRIBES HOW MEDICAL INFORMATION ABOUT YOU MAY BE USED AND DISCLOSED AND HOW YOU CAN GET ACCESS TO THIS

More information

PRIVACY POLICY USES AND DISCLOSURES FOR TREATMENT, PAYMENT, AND HEALTH CARE OPERATIONS

PRIVACY POLICY USES AND DISCLOSURES FOR TREATMENT, PAYMENT, AND HEALTH CARE OPERATIONS PRIVACY POLICY As of April 14, 2003, the Federal regulation on patient information privacy, known as the Health Insurance Portability and Accountability Act (HIPAA), requires that we provide (in writing)

More information

LifeBridge Health HIPAA Policy 4. Uses of Protected Health Information for Research

LifeBridge Health HIPAA Policy 4. Uses of Protected Health Information for Research LifeBridge Health HIPAA Policy 4 Uses of Protected Health Information for Research This Policy contains the following Sections: I. Policy II. III. IV. Definitions Applicability Procedures A. Individual

More information

National Health Information Privacy and Security Week. Understanding the HIPAA Privacy and Security Rule

National Health Information Privacy and Security Week. Understanding the HIPAA Privacy and Security Rule National Health Information Privacy and Security Week Understanding the HIPAA Privacy and Security Rule HIPAA Privacy and Security HIPAA Privacy Rule Final implementation April 14, 2003 Today: Monitor

More information

UNIVERSITY OF ILLINOIS HIPAA PRIVACY AND SECURITY DIRECTIVE

UNIVERSITY OF ILLINOIS HIPAA PRIVACY AND SECURITY DIRECTIVE May 19, 2016 UNIVERSITY OF ILLINOIS HIPAA PRIVACY AND SECURITY DIRECTIVE UNIVERSITY OF ILLINOIS HIPAA PRIVACY AND SECURITY DIRECTIVE Table of Contents DIRECTIVE INFORMATION... 4 BACKGROUND... 4 APPLICABILITY...

More information

Patient name (print) Signature of Patient/ Legal Representative. Relationship to Patient FOR OFFICE USE ONLY

Patient name (print) Signature of Patient/ Legal Representative. Relationship to Patient FOR OFFICE USE ONLY NOTICE OF PRIVACY PRACTICES ACKNOWLEDGEMENT I have received a copy of the VUMC Notice of Privacy Practices. I understand that VUMC has the right to change its Notice of Privacy Practices from time to time

More information

If you have any questions about this notice, please contact our privacy officer Dr. Jev Sikes at

If you have any questions about this notice, please contact our privacy officer Dr. Jev Sikes at Notice of Privacy Practices For Deep Eddy Psychotherapy THIS NOTICE DESCRIBES HOW MEDICAL INFORMATION ABOUT YOU MAY BE USED AND DISCLOSED AND HOW YOU CAN GET ACCESS TO THIS INFORMATION. PLEASE REVIEW IT

More information

Notice of Privacy Practices

Notice of Privacy Practices Page 1 of 8 Notice of Privacy Practices Effective September 1, 2013 This Notice tells how your medical information may be used or shared. It also tells how you can get your information. Please read it

More information

WRAPPING YOUR HEAD AROUND HIPAA PRIVACY REQUIREMENTS

WRAPPING YOUR HEAD AROUND HIPAA PRIVACY REQUIREMENTS WRAPPING YOUR HEAD AROUND HIPAA PRIVACY REQUIREMENTS Jeffrey Staton Attorney at Law Legal Aid Society of Louisville 416 W. Muhammad Ali Blvd., Ste. 300 Louisville, KY 40202 Phone: 502.614.3146 Jstaton@laslou.org

More information

INFORMATION ABOUT Children s Mercy Hospitals and Clinics for our Affiliates

INFORMATION ABOUT Children s Mercy Hospitals and Clinics for our Affiliates INFORMATION ABOUT Children s Mercy Hospitals and Clinics for our Affiliates The purpose of this brochure is to provide you with a brief orientation to Children s Mercy Hospitals and Clinics. It provides

More information

Notice of Privacy Practices

Notice of Privacy Practices River Valley Chiropractic LLC Notice of Privacy Practices Effective 9/2014; Revised 9/2014 If you have any questions about this notice, please contact the River Valley Chiropractic Privacy Officer at 308-534-5840.

More information

SUMMARY OF NOTICE OF PRIVACY PRACTICES

SUMMARY OF NOTICE OF PRIVACY PRACTICES LAKE REGIONAL MEDICAL GROUP 54 HOSPITAL DRIVE OSAGE BEACH, MO 65065 SUMMARY OF NOTICE OF PRIVACY PRACTICES THIS NOTICE DESCRIBES HOW MEDICAL INFORMATION ABOUT YOU MAY BE USED AND DISCLOSED AND HOW YOU

More information

AUDIT DEPARTMENT UNIVERSITY MEDICAL CENTER HIPAA COMPLIANCE. For the period October 2008 through May JEREMIAH P. CARROLL II, CPA Audit Director

AUDIT DEPARTMENT UNIVERSITY MEDICAL CENTER HIPAA COMPLIANCE. For the period October 2008 through May JEREMIAH P. CARROLL II, CPA Audit Director UNIVERSITY MEDICAL CENTER HIPAA COMPLIANCE For the period October 2008 through May 2009 JEREMIAH P. CARROLL II, CPA Audit Director Audit Department 500 S Grand Central Pkwy Ste 5006 PO Box 551120 Las Vegas

More information

NOTICE OF PRIVACY PRACTICES MOUNT CARMEL HEALTH SYSTEM

NOTICE OF PRIVACY PRACTICES MOUNT CARMEL HEALTH SYSTEM NOTICE OF PRIVACY PRACTICES MOUNT CARMEL HEALTH SYSTEM Effective Date: 9/23/ 2013 THIS NOTICE DESCRIBES HOW MEDICAL INFORMATION ABOUT YOU MAY BE USED AND DISCLOSED AND HOW YOU CAN GET ACCESS TO THIS INFORMATION.

More information

HIPAA-HITECH HELPBOOK NJ Physician Practices

HIPAA-HITECH HELPBOOK NJ Physician Practices NOTICE OF PRIVACY PRACTICES Montgomery Medical Associates LLC Effective Date: 04/01/13 Version 2 SUMMARY WHAT IS THIS NOTICE FOR? This Notice of Privacy Practices (Notice) describes how Montgomery Medical

More information

HIPAA Health Insurance Portability and Accountability Act of 1996

HIPAA Health Insurance Portability and Accountability Act of 1996 HIPAA Health Insurance Portability and Accountability Act of 1996 Protected Health Information (PHI) Covers patient information in any form written, verbal, or electronic PHI Includes Any information that

More information

INFORMATION ABOUT CHILDREN S MERCY HOSPITALS AND CLINICS

INFORMATION ABOUT CHILDREN S MERCY HOSPITALS AND CLINICS INFORMATION ABOUT CHILDREN S MERCY HOSPITALS AND CLINICS The purpose of this brochure is to provide you with a brief orientation to Children s Mercy Hospitals and Clinics. It provides important information

More information

CAPITAL SURGEONS GROUP, PLLC

CAPITAL SURGEONS GROUP, PLLC CAPITAL SURGEONS GROUP, PLLC NOTICE OF PRIVACY PRACTICES THIS NOTICE DESCRIBES HOW MEDICAL INFORMATION ABOUT YOU MAY BE USED AND DISCLOSED AND HOW YOU CAN GET ACCESS TO THIS INFORMATION. PLEASE REVIEW

More information

San Francisco Department of Public Health Policy Title: HIPAA Compliance Privacy and the Conduct of Research Page 1 of 10

San Francisco Department of Public Health Policy Title: HIPAA Compliance Privacy and the Conduct of Research Page 1 of 10 Page 1 of 10 TITLE: HIPAA COMPLIANCE: PRIVACY AND THE CONDUCT OF RESEARCH POLICY It is the policy of the San Francisco Department of Public Health (DPH) to maintain the privacy of Protected Health Information

More information